Posts
Showing posts from 2016
IP address
- Get link
- X
- Other Apps
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. [1] An IP address serves two principal functions: host or network interface identification and location addressing . Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." [2] The designers of the Internet Protocol defined an IP address as a 32-bit number [1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, because of the growth of the Internet and the predicted depletion of available addresses , a new version of IP ( IPv6 ), using 128 bits for the address, was developed in 1995. [3] IPv6 was standardized as RFC 2460 in 1998, [4] and its deployment has been ongoing since the mid-2000s. IP addresses are usually written and displ...
search engine
- Get link
- X
- Other Apps
search engine a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web. Search engines are programs that search documents for specified keywords and returns a list of the documents where the keywords were found. A search engine is really a general class of programs, however, the term is often used to specifically describe systems like Google, Bing and Yahoo! Search that enable users to search for documents on the World Wide Web. email Short for e lectronic mail , email (or e-mail ) is defined as the transmission of messages over communications networks . Typically the messages are notes entered from the keyboard or electronic files stored on disk . Most mainframes , minicomputers , and computer networks have an email system . Some electronic mail systems are confined to a single computer system or...
what is tally and where it can be used...
- Get link
- X
- Other Apps
Tally .ERP 9 is a business management program that allows business managers to handle all of their business transactions from a centralized application and from any location. The program allows users to handle accounting, finance, point of sales, payroll and branch management . Tally is powerful accounting software, which is driven by a technology called concurrent multi-lingual accelerated technology engine. It is easy to use software and is designed to simply complex day to day activities associated in an enterprise. Tally provides comprehensive solution around accounting principles, inventory and data integrity. Tally also has feature encompassing global business. Tally software comes with easy to use interface thus making it operationally simple. What is the use of Tally software? Tally is an accounts and inventory management software which is having many other features too. With the latest version of this software Tally9 you can 1. do a...
write steps to insert a table?
- Get link
- X
- Other Apps
To insert a blank table : Place your insertion point in the document where you want the table to appear. Select the Insert tab. Click the Table command. Hover your mouse over the diagram squares to select the number of columns and rows in the table . Click your mouse, and the table appears in the document To insert a blank table: Place your insertion point in the document where you want the table to appear. Select the Insert tab. Click the Table command. Hover your mouse over the diagram squares to select the number of columns and rows in the table. ... Click your mouse, and the table appears in the document.
operating system vs application software
- Get link
- X
- Other Apps
What is application software? A program or group of programs designed for end users. Application software can be divided into two general classes: systems software and applications software. Systems software consists of low-level programs that interact with the computer at a very basic level. This includes operating systems compilers , and utilities for managing computer resources. In contrast, applications software (also called end-user programs) includes database programs, word processors, and spreadsheets. Figuratively speaking, applications software sits on top of systems software because it is unable to run without the operating system and system utilities. There are a lot of terms can be found over the internet related to computer. All type of computer have processor, Memory, keyboard, mouse and screen to display output. But their is a significant differenc...
what is a printer?
- Get link
- X
- Other Apps
A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. Printers vary in size, speed, sophistication, and cost. In general, more expensive printers are used for higher-resolution color printing. Features of impact Printer The general features of impact printer are- They create the characters by striking the paper. They print on most types of paper. Multiple (carbon) copies may be printed at once Disadvantages of impact printers They are relatively slow They do not print transparencies (documents printed on clear plastic film for use with over head projector. Dox –matrix are impact printer that draw a character from a series of dots. They are suitable for draft copies and home use, where the quality of finished document is not critical. They are also use for preparing of bills and invoices in hospital because they are cheap and durable. Other printer- las...
Computer Memory
- Get link
- X
- Other Apps
Memory is the best essential element of a computer because computer can’t perform simple tasks. The performance of computer mainly based on memory and CPU. Memory is internal storage media of computer that has several names such as majorly categorized into two types, Main memory and Secondary memory. 1. Primary Memory / Volatile Memory. 2. Secondary Memory / Non Volatile Memory. 1. Primary Memory / Volatile Memory: Primary Memory also called as volatile memory because the memory can’t store the data permanently. Primary memory select any part of memory when user want to save the data in memory but that may not be store permanently on that location. It also has another name i.e. RAM. Random Access Memory (RAM): The primary storage is referred to as random access memory (RAM) due to the random selection of memory locations. It performs both read and write operations on memory. If power failures happened in systems during memory access then you will lose your dat...
what is mail merge?
- Get link
- X
- Other Apps
the automatic addition of names and addresses from a database to letters and envelopes in order to facilitate sending mail, especially advertising, to many addresses The feature is usually employed on a word processing document which contains fixed text (which is the same in each output document) and variables (which act as placeholders that are replaced by text from the data source). The feature dates back to early word processors on personal computers, circa 1980. write the steps of mail merge If the task pane was closed, it will open the Mail Merge task pane. Step 1: Select Document Type. Under Select document type, choose Letters. Step 2: Starting document. ... Step 3: Select Recipients. ... Step 4: Write Your Letter. ... Step 5: Preview your letters. ... Step 6: Complete the Merge. ... Step 7: Save the Merged Letters
Opening Modes in Standard I/O
- Get link
- X
- Other Apps
File Mode Meaning of Mode During Inexistence of file r Open for reading. If the file does not exist, fopen() returns NULL. rb Open for reading in binary mode. If the file does not exist, fopen() returns NULL. w Open for writing. If the file exists, its contents are overwritten. If the file does not exist, it will be created. wb Open for writing in binary mode. If the file exists, its contents are overwritten. If the file does not exist, it will be created. a Open for append. i.e, Data is added to end of file. If the file does not exists, it will be created. ab Open for append in binary mode. i.e, Data is added to end of file. If the file does not exists, it will be created. r+ Open for both reading and writing. If the file does not exist, fopen() returns NULL. rb+ Open for both reading and writing in binary mode. If the file does not exist, fopen...
C Programming Files I/O
- Get link
- X
- Other Apps
Why files are needed? When a program is terminated, the entire data is lost. Storing in a file will preserve your data even if the program terminates. If you have to enter a large number of data, it will take a lot of time to enter them all. However, if you have a file containing all the data, you can easily access the contents of the file using few commands in C. You can easily move your data from one computer to another without any changes. Types of Files When dealing with files, there are two types of files you should know about: Text files Binary files 1. Text files Text files are the normal .txt files that you can easily create using Notepad or any simple text editors. When you open those files, you'll see all the contents within the file as plain text. You can easily edit or delete the contents. They take minimum effort to maintain, are easily readable, and provide least security and takes bigger storage space. 2. Binary files...
what is difference between while loop and do while loop
- Get link
- X
- Other Apps
While: entry control loop condition is checked before loop execution never execute loop if condition is false there is no semicolon at the end of while statement Do-while: exit control loop condition is checked at the end of loop executes false condition at least once since condition is checked later there is semicolon at the end of while statement.
What is the difference between call by value and call by reference in C language?
- Get link
- X
- Other Apps
call by value call by reference In call by value , a copy of actual arguments is passed to formal arguments of the called function and any change made to the formal arguments in the called function have no effect on the values of actual arguments in the calling function. In call by reference , the location (address) of actual arguments is passed to formal arguments of the called function. This means by accessing the addresses of actual arguments we can alter them within from the called function. In call by value, actual arguments will remain safe, they cannot be modified accidentally. Example using Call by Value The classic example of wanting to modify the caller's memory is a swapByValue() function which exchanges two values. For C uses call by value, the following version of swap swapByValue() will not work... #include <stdio.h> void swapByValue ( int , int ) ; /* Prototy...
How to compose a book in corel draw ??
- Get link
- X
- Other Apps
First of all: not all books are the same. The best advice is to contact with your printing service before to start, in order to know the size of the page, the amount of pages, margins, colors and more. ie if you make a full-color book is more expensive than a book with only black pages. When you start, create a new document, setup the page (double click on the page border) and choose twice the real size. ie if the book is 14x20cm , choose 28x20 cm Then, go to "Layout" and choose "Booklet" and "facing pages". That's all. The first page will be alone, same for the last one, and the other page will be in the same order that you will read the book (2-3. 4-5) etc. Before to place the content, choose margins, columns and Text styles (Ctrl+F5) for a fst and secure edition. The rest of the job will be easy and simple For print the book, you can use the imposition features in the Print preview, but the best solution is to go to FI...
Advantages of Adobe Photoshop
- Get link
- X
- Other Apps
Adobe Photoshop is wonderful , It is used to edit the digital image application , It helps you improve the quality of a photograph , It is the assistant with the artists who rely on Photoshop to make the artwork , And the students can learn Photoshop in Image Editing classes . When you learn how to use Photoshop , It can improve your skills , It is possible to clear up the blemishes and the imperfections in the photos , You can remove and change the backgrounds in the photos . The i mages can be altered to fix the faults , The p hotographs can be given an professional look when a standard camera is used , New artwork images can be created and edited . It is very easy to begin editing the photos , Adobe Photoshop helps you to reduce the red eye or to whiten the teeth with the click of a button , You can adjust the skin tones of people in your pictures M ost of the edits regularly done on the photos can be completed with a sin...
Advantages of Corel Draw
- Get link
- X
- Other Apps
There are many ways in which one can bring about improvement in graphic design using computer softwares. One such tool is Corel Draw which needs to be practiced very, very deligently as it is used pretty consistently world-wide in designing images. Where one wants to improve upon the capability to design graphics, learning and practicing on corel draw is the way further. The more one practices and becomes proficient, the more the capability to handle complex demands in the field of graphic desiging. The sheer convenience of using Corel Draw makes it its biggest attraction. And with newer clientele coming in everyday, its creators, Corel Corporation has been consistently upgrading its product with newer features in every release making it today the top choice in the field of graphic designing. Advantages of Using Corel Draw Levitating towards the cyber world is the in-thing now and Corel Draw is one such move. The canvas, paper, ink and pencil function of media are now ...
What is Computer Virus?
- Get link
- X
- Other Apps
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it How Computer Viruses Work? Here is the general way that viruses work: An infected program is run. This is either a program file (in the case of a file-infecting virus) or a boot sector program at boot time . In the case of a Microsoft Word document the virus can be activated as soon as the document that contains it is opened for reading within Microsoft Word. If the "NORMAL.DOT" document template is inf...
What is a Computer Network Switch?
- Get link
- X
- Other Apps
A network switch is a small hardware device that centralizes communications among multiple connected devices within one local area network (LAN) . Standalone Ethernet switch devices were commonly used on home networks many years ago before home broadband routers became popular. Modern home routers integrate Ethernet switches directly into the unit as one of their core functions. High-performance network switches are still widely used in corporate networks and data centers. Network Switch Technology While switching capabilities exist for several kinds of networks including ATM and Token Ring , Ethernet switches are the most common type. Mainstream Ethernet switches like those inside broadband routers support Gigabit Ethernet (1 Gbps ) speeds per individual link (switch port), but high-performance switches like those in data centers generally support 10 Gbps per link. Different models of network switches support varying numbers of connected devices...
Router (computing)
- Get link
- X
- Other Apps
www.google.com A router [a] is a networking device that forwards data packets between computer networks . Routers perform the traffic directing functions on the Internet . A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node. [2] A router is connected to two or more data lines from different networks. [b] When a data packet comes in on one of the lines, the router reads the address information in the packet to determine the ultimate destination. Then, using information in its routing table or routing policy , it directs the packet to the next network on its journey. This creates an overlay internetwork. The most familiar type of routers are home and small office routers that simply pass IP packets between the home computers and the Internet. An example of a router would be the owner's cable or DSL router, which connects to the Internet through an Internet serv...