Thursday, 28 September 2017

Intel Demos 3D XPoint Optane Memory DIMMs, Cascade Lake Xeons Come In 2018



Using 3D Xpoint as an intermediary memory layer between DRAM and NAND is one of the most promising aspects of Intel's and Micron's new persistent media, but the speedy new DIMM form factor retreated into the shadows after the Storage Visions 2015 conference. The disappearance fueled many of the rumors that 3D XPoint isn't living up to the initial endurance claims, largely because using the new media as memory will require much more endurance than storage devices need. Aside from Intel CEO Brian Krzanich's casual mention during the company's Q4 2016 earnings call that products were shipping, we haven't seen much new information. That changed this week as Intel conducted the first public demo of working Optane memory DIMMs at the SAP Sapphire conference. Intel demoed the DIMMs working in SAP's HANA in-memory data analytics platform. Neither company revealed any performance data from the demo, but the reemergence of the Optane DIMMs is encouraging.


3D XPoint-powered Optane DIMMs will deliver more density and a lower price point than DDR4 solutions, which is a boon for the booming in-memory compute space, HPC, virtualization, and public clouds. Intel will ship the DIMMs in 2018 in tandem with the Cascade Lake refresh of the Intel Xeon Scalable family platform.
In the interim, Intel offers its value-add Memory Drive Technology in tandem with its new "Cold Stream" DC P4800X Optane SSDs (which we've tested). The software merges the DC P4800X into the memory subsystem so that it appears as part of a single large memory pool to the host. The software doesn't require any changes to the existing operating system or applications, but it's supported only on Intel Xeon platforms. The Memory Drive Technology is probably one of the most important aspects of the DC P4800X launch, as other methods of enhancing the addressable memory pool tend to be kludgy and require significant optimization of the entire platform at both the hardware and software level, which hinders adoption. A plug-and-play SSD solution will enjoy tremendous uptake, but moving up to the DIMM form factor addressed with memory semantics will provide even more of a benefit. The industry has been hard at work enabling the ecosystem, so servers and applications should greet the new DIMM form factor with open arms.
Amazon Web Services recently announced that it's developing new instances that offer up to 16TB of memory for SAP HANA and other in-memory workloads, and new AWS HANA clusters can pack a walloping 34TB of memory spread among 17 nodes. AWS hasn't released an official launch date for the new instances, but in light of the recent SAP HANA demonstration with Optane DIMMs and the fact that the new AWS instances aren't available yet, it's easy to speculate that Intel's finest are a factor in enabling the hefty memory allocation.

wish you a happy Durga navmi ( jai Mata Di)


Sarva Mangal Mangalye, Shive Sarwatha Sadhike, Sharanye Tryambake Gauri Narayani Namostute. Maha Navami ki Hardik Shubhkamnayen!

Tuesday, 26 September 2017

share excel sheet most important topic of excel




TYPES OF HACKERS





Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.

White Hat Hackers

White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.
Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessments.

Black Hat Hackers

Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc.

Grey Hat Hackers

Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.
Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owners.

Miscellaneous Hackers

Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it −

Red Hat Hackers

Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.

Blue Hat Hackers

A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Elite Hackers

This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.

Script Kiddie

A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie.

Neophyte

A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.

Hacktivist

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks.

what is computer haking




what is computer hacking
In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term hacking historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on networks and computers over the internet.​
Origins of Hacking
M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the hacks perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities.
Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the internet became popular, for example, several hackers in the U.S. experimented with methods to illegally modify telephones so they could make free long-distance calls over the phone network.
As computer networking and the internet exploded in popularity, data networks became by far the most common target of hackers and hacking.

Well-Known Hackers

Many of the world's most famous hackers began their exploits at a young age. Some were convicted of major crimes and served time for their offenses. To their credit, some of them also rehabilitated and turned their skills into productive careers.
Hardly a day goes by that you don't hear something about a hack or a hacker in the news. Now, however, hacks affect millions of computers connected to the internet, and the hackers are often sophisticated criminals. 

Hacking vs. Cracking

While true hacking once applied only to activities having good intentions, and malicious attacks on computer networks were officially known as cracking, most people no longer make this distinction.
It is extremely common to see the term hack used to refer to activities once known only as cracks.

Common Network Hacking Techniques

Hacking on computer networks is often done through scripts and other network software. These specially-designed software programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works. Many such pre-packaged scripts are posted on the internet for anyone—typically entry-level hackers—to use. Advanced hackers may study and modify these scripts to develop new methods. A few highly skilled hackers work for commercial firms, hired to protect that companies' software and data from outside hacking.
Cracking techniques on networks include creating worms, initiating a denial of service (DoS) attacks, and establishing unauthorized remote access connections to a device. Protecting a network and the computers attached to it from malware, phishing, Trojans, and unauthorized access is a full-time job and vitally important.

Hacking Skills

Effective hacking requires a combination of technical skills and personality traits:
  • The ability to work with numbers and mathematics is essential. Hacking often requires sorting through large amounts of data, code and computer algorithms.
  • Memory recall and logical reasoning are needed because hacking involves assembling small facts and details—sometimes from many sources—into a plan of attack based on the logic of how computer systems work.
  • Patience. Hacks tend to be complex and require large amounts of time to plan and execute.

Cybersecurity

Cybersecurity is an important career choice as our economy is increasingly based on internet access. Cybersecurity experts work to identify malicious code and prevent hackers from accessing networks and computers. Unless you work in cyber security, where you have a good reason to be familiar with hacks and cracks, it is best not to test your hacking skills.
Attacking networks and computers is illegal, and the penalties are severe.

What is a robots.txt File?

What is a Screenshot?

A screenshot is a picture of your computer’s monitor screen. It can be the whole screen, just the active window or depending on what you use, it can be just a piece of the viewable area of the computer monitor screen.

What is a robots.txt File?

A robots.txt file is a text file placed in the root of your website or blog that contains instructions for the bots (spiders, search engine bots).
When a bot first arrives at the site it looks for the robots.txt file. If it does not find one it will look for and gather information about all the files on your site. e.g. If Google’s bot (GoogleBot) visits your site and there is not a robots.txt file or instruction in your robots.txt file limiting what it is allowed to look at it will have a look at everything it can find and eventually all it found will be in it’s search results. Not a good thing if there is some stuff you want kept out of the search results.
Even if you have a robots.txt file there are some not so polite bots that will ignore your instructions. For things you want kept away from these bots it is best to put in a password protected area.
You should be aware that anyone can access your robots.txt file. Try it yourself. Type www.domainname.com/robots.txt in the browser address bar and you will see the contents of the site’s robots.txt file. This is why, even if polite bots obey your instructions, it is best to keep private stuff behind password protected folders. Any snoopy person or bot could have a look at what you are trying to hide if they see a folder marked as keep out please.

Purpose of the robots.txt File

The purpose of the robots.txt file is to tell the nice bots which areas of the site you do not want included in their search index.

What Can You Do with a robots.txt File?

Each instruction (and part of) needs to be on a separate line.
No blank lines between the parts of the instruction. The blank line indicates the end of the instruction.
If you wish to pick and choose which files are indexed, it is easier to put those files you do not want indexed in a separate folder with the instruction in the robots.txt file for the bots to stay out of the folder.
Here are a few samples of what instructions you can place in your robots.txt file:

Disallow Indexing of Specific Folders

To disallow the indexing of the contents in a specific folder the instruction is:
User-agent: *
Disallow: /images/
* indicates all bots
/images/ is the name of the folder. Don’t forget the / at the beginning of the folder name and at the end.

Disallow Specific Bots

Maybe there is a specific bot you do not want to index your information.
User-agent: Bot name
Disallow: /
There are lists of User-agents and bad bots if you what to look up a specific User-agent/bot name.

Stop Images Indexed in Image Search

Some people want their images indexed in Google, Bing and Yahoo! image searches for the possible traffic but if you don’t you can let the image bots know this. e.g. For Google image bot
User-agent: Googlebot-Image
Disallow: /

How to Create a robots.txt File

You will need a plain text editor. Something like Notepad (which somes with Windows) or Notepad++ is a plain text editor. Word and other word processing software are not plain text editors.
You will also need a folder on your computer to store this file until you are finished editing it. You have a backup of your site – right? If not, create one! Use FTP software to backup your site. For WordPress we also have specific instructions: Backup WordPress.
  1. Open your plain text editor.
  2. Use File/Save As from it’s top menu bar to navigate to the folder which contains a local copy of your website or blog.
    Make sure you are in the root of the folder, not inside a folder within the website folder.
  3. Name the file robots.txt in the File Name box.
  4. Left click Save to save the file.
    The empty file’s screen becomes active again.
  5. Type in the instructions you wish to have in your robots.txt file (see above for samples).
  6. Save the file when you are done.
    The file can be closed also.
  7. Using FTP software (or your web hosting File Manager function) upload the robots.txt file to the root of your website/blog.
    The root of your website is the folder where your website files are. Sorry can’t be more specific as each web hosting setup is different. If you are not sure which folder, look at your web hosting’s documentation.
    Test you uploaded the robots.txt file to the right spot by opening your browser and typing http://www.yourdomainname.com/robots.txt. If you can see the contents of the file you just created you uploaded it to the right spot.

Testing the robots.txt File

Once you have created a robots.txt file it should be tested that there are no errors in it. Here are a few ways to test the file:
  • Google Webmaster Tools

    Within Google Webmaster Tools under Health/Blocked URLS there is a tool to test your robots.txt file. However you will need a Google account and a Google Webmaster Account to use this tool.
  • Robots.txt Checker

    The Robots.txt Checker testing tool is available to the public. Enter the web address of your robots.txt file in the box provided then click the Check robots.txt button below. On the resulting page it will explain each set of instructions you have entered. At the top of the page it will tell you if you have errors or not. The results also point out what line is incorrect.

Search Engine robots.txt Information

Below are links to two of the search engines’ robots.txt information:

Use the robots.txt File Carefully

Be sure to understand the instructions you are placing in the robots.txt file of your site. A simple mistake could be disasterous for your site.

mistory of computer

अभिकलित्र के भाग[संपादित करें]

मोटे तौर पर अभिकलित्र के चार भाग होते हैं।
निजी अभिकलित्र (पीसी) के प्रमुख भाग
एक अभिकलित्र (संगणक) निम्नलिखित चार भागों से मिलकर बनता है : निविष्ट यंत्र , संसाधन यंत्र , निर्गम यंत्र और भंडारण यंत्र। (युक्ति को यंत्र भी कहा जता है।)

निविष्ट यंत्र[संपादित करें]

  • निविष्ट यंत्र उन उपकरणों को कहते हैं जिसके द्वारा निर्देशो और आंकडों को संगणक में भेजा जाता है। जैसे- कुन्जी पटल (की-बोर्ड), माउस, जॉयस्टिक, ट्रैक बाल आदि।
    1. कीबोर्ड
    2. माउस
    3. माइक्रोफ़ोन या माइक
    4. क्रमवीक्षक (स्कैन्नर), अंकीय कैमेरा
    5. टच-स्क्रीनटच-पैद

केंद्रीय प्रक्रमन इकाई[संपादित करें]

  • केंद्रीय प्रक्रमन इकाई (सीपीयू), संसाधन युक्ति या विचार युक्ति - यह अभिकलित्र की मूल संक्रियात्मक इकाई है जो आगम उपकरणों द्वारा दिए गए आंकड़ों के अनुरूप कार्य कर उसे निर्गत इकाई को भेजती है। इसके तीन भाग होते हैं:
    1. बही या पंजी (रजिस्टर) - सबसे पहले जिन आंकड़ों या सूचनाओं पर काम करना होता है, उन्हें अभिकलित्र स्मृति से बही में अंकित किया जाता है। अलग अलग प्रक्रियाओं के लिए अलग अलग बही होते हैं आंकिक एवं तर्क इकाई की संक्रिया के बाद सूचनाएं पुनः बही में दर्ज होती हैं और वापस स्मृती में भेजी जाती हैं।
    2. आंकिक एवं तर्क इकाई - यह इकाई बही में दर्ज सूचनाओं पर निर्देशों के अनुसार कार्य करती है तथा परिणाम को पुनः उपयुक्त बही में दर्ज कर देता है।
    3. नियन्त्रण इकाई - यह केंद्रिय प्रसाधन इकाई की सभी क्रियाओं का नियंत्रण करती है। जैसे कि स्मृति से सूचनाएं बही में वहाँ से आंकिक एवं तर्क इकाई में, वापस बही में तथा वहाँ से स्मृति में वापस जाने की प्रक्रिया पर यह इकाई नियंत्रण रखती है।

सूचना भंडारण उपकरण[संपादित करें]

पीसी में प्रयुक्त 64MB एसडीरैम (SDRAM)

निर्गम यंत्र[संपादित करें]

  • निर्गम यंत्र (आउटपुट डिवाइस)- इसमें वे सभी उपकरण शामिल हैं जिनसे प्रसाधित सूचनाएं या सामग्री मानवीय उपयोगी उत्पाद के रूप में बाहर आती हैं॥ जैसे-
    1. प्रदर्शक (मॉनिटर) - इसकी सहायता से प्रसाधित सामग्री दृश्य रूप में प्रकट होती है॥
      • स्क्रीन स्क्रीन पर चित्र य चल्चित्र प्रकत होते है। ये प्रदर्शक से जुडा होता है।
    2. मुद्रक- इसकी सहायता से निर्गत सामग्री को कागज़ पर मुद्रित किया जाता है। इसे अन्ग्रेजी भाषा में प्रिनटर भी कहते है।
    3. भोंपू - इसे स्पीकर भी कह्ते है, जैसा कि नाम से ही पता चलता है, ये आवाज निकालने का काम करता है। इस्का उपयोग अभिकलित्र में चालू किसी भि प्रक्रिया से उत्पन्न आवाज को उप्योगकर्ता तक पहुचाने के लिये किया जाता है।

अभिकलित्र के प्रकार[संपादित करें]

अभिकलित्र का मुख्य कार्य दिये गये आंकड़े को जमा कर उसपर दिए गए निर्देशों के अनुरूप काम कर परिणाम देना है॥ कार्यक्षमता के आधार पर इसे निम्नलिकित श्रेणियों में बाँटा गया है- सुपर संगणक, मेनफ्रेम संगणक मिनी संगणक, एव माइक्रो संगणक आदि। सुपर संगणक इनमें सबसे बडी श्रेणी होती है, तथा माइक्रो संगणक सबसे छोटी।
  • सुपर संगणक सबसे तेज गति से कार्य करने वाले संगणक होते हैं। वह बहुत अधिक डाटा को काफी कम समय में इंफार्मेशन में बदलने में सक्षम होते हैं। इनका प्रयोग बड़े-बड़े कार्य करने में होता है, जैसे मौसम की भविष्यवाणी, डाटा माइनिंग, जटिल सिमुलेशन, मिसाइलों के डिजाइन आदि। इनमें अनेक माइक्रोप्रोसेसर (MICROPROCESSOR) [एक विशेष छोटी मशीन जो कम्प्यूटिंग के कार्य को काफी आसानी से तथा बहुत ही कम समय में कर सकने में सक्षम होती है।] लगे होते हैं। किसी जटिल गणना को कम समय में पूरा करने के लिये बहुत से प्रोसेसर एकसाथ (पैरेलेल) काम कराने पडते हैं। इसे पैरेलेल प्रोसेसिंग कहा जाता है। इसके अन्तर्गत जटिल काम को छोटे-छोटे टुकडों में इस प्रकार बाँटा जाता है कि ये छोटे-छोटे कार्य एक साथ अलग-अलग प्रोसेसरों द्वारा स्वतन्त्र रूप से किये जा सकें।
  • मेनफ्रेम संगणक, सुपर संगणक से कार्यक्षमता में छोटे परंतु फिर भी बहुत शक्तिशाली होते हैं। इन कम्प्यूटरों पर एक समय में २५६ से अधिक व्यक्ति एक साथ काम कर सकते हैं। अमरीका की आईबीएम कंपनी (INTERNATIONAL BUSINESS MACHINE CORPORATION) मेनफ्रेम कंप्युटरों को बनाने वाली सबसे बडी कंपनी है।
  • मिनी संगणक मेनप्रेम कंप्यूटरों से छोटे परंतु माइक्रो कम्प्यूटरों से बड़े होते हैं।
  • माइक्रो संगणक (पर्सनल संगणक) सबसे छोटे होते हैं तथा इन्हीं को वैयक्तिक संगणक या पर्सनल संगणक भी कहा जाता है। इसका प्रथम संस्करण १९८१ में विकिसित हुआ था, जिसमे ८०८८ माइक्रोप्रोसेसरप्रयुक्त हुआ था।

evolution of computer

  • 623 ई.: जर्मन गणितज्ञ विल्हेम शीकार्ड ने प्रथम यांत्रिक कैलकुलेटर का विकास किया। यह कैलकुलेटर जोड़ने, घटाने, गुणा व भाग में सक्षम था।
  • 1642 ई.: फ्रांसीसी गणितज्ञ ब्लेज़ पास्कल ने जोड़ने व घटाने वाली मशीन का आविष्कार किया।
  • 1801 ई.: फ्रांसीसी वैज्ञानिक जोसेफ मेरी जैकार्ड ने लूम (करघे) के लिए नई नियंत्रण प्रणाली का प्रदर्शन किया। उन्होंने लूम की प्रोग्रामिंग की, जिससे पेपर कार्डों में छेदों के पैटर्न के द्वारा मशीन को मनमुताबिक वीविंग ऑपरेशन (weaving operation) का आदेश दिया जाना सम्भव हो गया।
  • 1833-71 ई.: ब्रिटिश गणितज्ञ और वैज्ञानिक चार्ल्स बैबेज ने जैकार्ड पंच-कार्ड प्रणाली का प्रयोग करते हुए 'एनालिटिकल इंजन' का निर्माण किया। इसे वर्तमान कम्प्यूटरों का अग्रदूत माना जा सकता है। बैबेज की सोच अपने काल के काफी आगे की थी और उनके आविष्कार को अधिक महत्व नहीं दिया गया।
  • 1889 ई.: अमेरिकी इंजीनियर हरमन हॉलेरिथ ने 'इलेक्ट्रो मैकेनिकल पंच कार्ड टेबुलेटिंग सिस्टम' को पेटेंट कराया जिससे सांख्यिकी आँकड़े की भारी मात्रा पर कार्य करना सम्भव हो सका। इस मशीन का प्रयोग अमेरिकी जनगणना में किया गया।
  • 1941 ई.: जर्मन इंजीनियर कोनार्डसे ने प्रथम पूर्णतया क्रियात्मक डिजिटल कम्प्यूटर Z3 का आविष्कार किया जिसे प्रोग्राम द्वारा नियंत्रित किया जा सकता था। Z3 इलेक्ट्रॉनिक कम्प्यूटर नहीं था। यह विद्युतीय स्विचों पर आधारित था जिन्हें रिले कहा जाता था।
  • 1942 ई.: आइओवा स्टेट कॉलेज के भौतिकविद जॉन विंसेंट अटानासॉफ और उनके सहयोगी क्लिफोर्ड बेरी ने प्रथम पूर्णतया इलेक्ट्रॉनिक कम्प्यूटर के कार्यात्मक मॉडल का निर्माण किया जिसमें वैक्यूम ट्यूबों का प्रयोग किया गया था। इसमें रिले की अपेक्षा तेजी से काम किया जा सकता था। यह प्रारंभिक कम्प्यूटर प्रोग्रामेबल नहीं था।
  • 1944 ई.: आईबीएम और हार्वर्ड यूनीवॢसटी के प्रोफेसर हॉवर्ड आइकेन ने प्रथम लार्ज स्केल ऑटोमेटिक डिजीटल कम्प्यूटर 'मार्क-1' का निर्माण किया। यह रिले आधारित मशीन 55 फीट लम्बी व 8 फीट ऊँची थी।
  • 1943 ई.: ब्रिटिश वैज्ञानिकों ने द्वितीय विश्वयुद्ध के दौरान जर्मन कोडों को तोडऩे के लिए इलेक्ट्रॉनिक कम्प्यूटर 'कोलोसस' का निर्माण किया।
  • 1946 ई.: अमेरिकी सेना के लिए पेनसिल्वेनिया विश्वविद्यालय में भौतिकविद् जॉन माउचली और इंजीनियर जे. प्रेस्पर इकेर्ट ने 'इलेक्ट्रॉनिक न्यूमेरिकल इंटीग्रेटेड एंड कम्प्यूटर - इनिएक' (ENIAC) का निर्माण किया। इस कमरे के आकार वाले 30 टन कम्प्यूटर में लगभग 18,000 वैक्यूम ट्यूब लगे थे। इनिएक की प्रोग्रामिंग अलग-अलग कार्य करने के लिए की जा सकती थी।
  • 1951 ई.: इकेर्ट और माउचली ने प्रथम कॉमर्शियल कम्प्यूटर 'यूनिवेक' (UNIVAC) का निर्माण किया (सं.रा. अमेरिका)।
  • 1969-71 ई.: बेल लेबोरेटरी में 'यूनिक्स ऑपरेटिंग सिस्टम' का विकास किया गया।
  • 1971 ई.: इंटेल ने प्रथम कॉमॢशयल माइक्रोप्रोसेसर '4004' का विकास किया। माइक्रोप्रोसेसर चिप पर सम्पूर्ण कम्प्यूटर प्रोग्रामिंग यूनिट होती है।
  • 1975 ई.: व्यावसायिक रूप से प्रथम सफल पर्सनल कम्प्यूटर 'MITS Altair 8800' को बाजार में उतारा गया। यह किट फार्म में था जिसमें की-बोर्ड व वीडियो डिस्प्ले नहीं थे।
  • 1976 ई.पर्सनल कम्प्यूटरों के लिए प्रथम वर्ड प्रोग्रामिंग प्रोग्राम 'इलेक्ट्रिक पेंसिल' का निर्माण।
  • 1977 ई.: एप्पल ने 'एप्पल-II' को बाजार में उतारा, जिससे रंगीन टेक्स्ट और ग्राफिक्स का प्रदर्शन संभव हो गया।
  • 1981 ई.आई बी एम ने अपना पर्सनल कम्प्यूटर बाजार में उतारा जिसमें माइक्रोसॉप्ट के DOS (डिस्क ऑपरेटिंग सिस्टम) का प्रयोग किया गया था।
  • 1984 ई.: एप्पल ने प्रथम मैकिंटोश बाजार में उतारा। यह प्रथम कम्प्यूटर था जिसमें GUI (ग्राफिकल यूज़र इंटरफेस) और माउस की सुविधा उपलब्ध थी।
  • 1990 ई.: माइक्रोसॉफ्ट ने अपने ग्राफिकल यूज़र इंटरफेस का प्रथम वजऱ्न 'विंडोज़ 3.0' बाजार में उतारा।
  • 1991 ई.: हेलसिंकी यूनीवर्सिटी के विद्यार्थी लाइनस टोरवाल्ड्स ने पर्सनल कम्प्यूटर के लिए 'लाइनेक्स' का आविष्कार किया।
  • 1996 ई.: हाथ में पकड़ने योग्य कम्प्यूटर 'पाम पाइलट' को बाजार में उतारा गया।
  • 2001 ई.: एप्पल ने मैकिंटोश के लिए यूनिक्स आधारित ऑपरेटिंग सिस्टम 'Mac OS X' को बाजार में उतारा।
  • 2002 ई.: कम्प्यूटर इंडस्ट्री रिसर्च फर्म गार्टनेर डेटा क्वेस्ट के अनुसार 1975 से वर्तमान तक मैन्यूफैक्चर्ड कम्प्यूटरों की संख्या 1 अरब पहुँची।
  • 2005 ई.: एप्पल ने घोषणा की कि वह 2006 से अपने मैकिंटोश कम्प्यूटरों में इंटेल माइक्रोप्रोसेसरों का प्रयोग आरंभ कर देगा।

Thursday, 21 September 2017

interview questions part 2

What is Text Formatting?
Ans. Text formatting refers to the attributes of text other than the actual text itself. For example: bold, italics, underlining, color, and size, are all formatting attributes of text. The location of text can also be considered part of the formatting. Text can be automatically centered, indented, or positioned in other ways. When you wish to change the format of text, you usually have to select the text, then do the formatting by clicking the appropriate buttons. Occasionally, there are exceptions to the select-then-do paradigm. In Microsoft Word, there is a feature called Format Painter with which you click some already formatted text, then click the Format Painter toolbar button, then drag the mouse cursor across some other text. The other text will be "painted" with the formatting of the original text selected. If you double-click the Format Painter button, then it will be "locked" and you can paint lots of text. When you are done, click the Format Painter button again to turn it off.

What are Kilobyte, Megabyte, Gigabyte ... etc?
Ans.
Kilobyte: A Kilobyte is approximately 1,000 Bytes, actually 1,024 Bytes depending on which definition is used. 1 Kilobyte would be equal to this paragraph you are reading, whereas 100 Kilobytes would equal an entire page.
Megabyte: A Megabyte is approximately 1,000 Kilobytes. In the early days of computing, a Megabyte was considered to be a large amount of data. These days with a 500 Gigabyte hard drive on a computer being common, a Megabyte doesn't seem like much anymore. One of those old 3-1/2 inch floppy disks can hold 1.44 Megabytes or the equivalent of a small book. 100 Megabytes might hold a couple volumes of Encyclopedias. 600 Megabytes is about the amount of data that will fit on a CD-ROM disk.

Gigabyte: A Gigabyte is approximately 1,000 Megabytes. A Gigabyte is still a very common term used these days when referring to disk space or drive storage. 1 Gigabyte of data is almost twice the amount of data that a CD-ROM can hold. But it's about one thousand times the capacity of a 3-1/2 floppy disk. 1 Gigabyte could hold the contents of about 10 yards of books on a shelf. 100 Gigabytes could hold the entire library floor of academic journals.
Terabyte: A Terabyte is approximately one trillion bytes, or 1,000 Gigabytes. There was a time that I never thought I would see a 1 Terabyte hard drive, now one and two terabyte drives are the normal specs for many new computers.  To put it in some perspective, a Terabyte could hold about 3.6 million 300 Kilobyte images or maybe about 300 hours of good quality video. A Terabyte could hold 1,000 copies of the Encyclopedia Britannica. Ten Terabytes could hold the printed collection of the Library of Congress. That's a lot of data.
Petabyte: A Petabyte is approximately 1,000 Terabytes or one million Gigabytes. It's hard to visualize what a Petabyte could hold. 1 Petabyte could hold approximately 20 million 4-door filing cabinets full of text. It could hold 500 billion pages of standard printed text. It would take about 500 million floppy disks to store the same amount of data.
Exabyte: An Exabyte is approximately 1,000 Petabytes. Another way to look at it is that an Exabyte is approximately one quintillion bytes or one billion Gigabytes. There is not much to compare an Exabyte to. It has been said that 5 Exabytes would be equal to all of the words ever spoken by mankind.
Zettabyte: A Zettabyte is approximately 1,000 Exabytes. There is nothing to compare a Zettabyte to but to say that it would take a whole lot of ones and zeroes to fill it up.
Yottabyte: A Yottabyte is approximately 1,000 Zettabytes. It would take approximately 11 trillion years to download a Yottabyte file from the Internet using high-power broadband. You can compare it to the World Wide Web as the entire Internet almost takes up about a Yottabyte.
Brontobyte: A Brontobyte is (you guessed it) approximately 1,000 Yottabytes. The only thing there is to say about a Brontobyte is that it is a 1 followed by 27 zeroes!
Geopbyte: A Geopbyte is about 1000 Brontobytes! Not sure why this term was created. I'm doubting that anyone alive today will ever see a Geopbyte hard drive. One way of looking at a geopbyte is 15267 6504600 2283229 4012496 7031205 376 bytes!

 What is the difference between Save and Save As?
Ans.
  • Use SAVE when you are updating an existing document.
  • Use SAVE AS when you are creating a new document from scratch or an existing document. If you do for existing document, this will keep the original document untouched in its original format and create a new document with a new name with updated data.
Example: Open Notepad -> Type something -> Click on File -> Save As. It will save the file by asking file name (sample.txt). If you want to update the file use File -> Save. If you want another file name with (sample.txt file data + added some another data), use Save As. Here sample.txt will be untouched and new file will contain updated data.


. How can we find out basic information (Operation System, RAM, CPU, Drivers etc.) about our computer?
Ans.
We can get the basic information about our computer by following below steps:
  • Right Click at my computer icon.
  • Click Properties.
  • General tab will show the processor and ram information
  • And Hardware Tab -> Device Manger will show the entire hardware resources attached with you computer


Java
. How could Java classes direct program messages to the system console, but error messages, say to a file?
Ans. By default, both System console and err point at the system console.
The class System has a variable out that represents the standard output.
The variable err that represents the standard error device. 

What are the differences between an interface and an abstract class?
Ans.
  • An abstract class may contain code in method bodies, which is not allowed in an interface. With abstract classes, you have to inherit your class from it and Java does not allow multiple inheritance. On the other hand, you can implement multiple interfaces in your class.
  • can be implemented by classes that are not related to one another and there is "HAS-A" relationship. 
  • You cannot extend more than one abstract class. You can implement more than one interface. 
  • Abstract class can implemented some methods also. Interfaces can not implement methods. 
  • With abstract classes, you are grabbing away each class’s individuality. With Interfaces, you are merely extending each class’s functionality.
Why would you use a synchronized block vs. synchronized method?
Ans.
  •  blocks place locks for shorter periods than synchronized methods.
  • If you go for synchronized block it will lock a specific object. 
  • If you go for synchronized method it will lock all the objects. 
  • In other way Both the synchronized method and block are used to acquires the lock for an object. But the context may vary. Suppose if we want to invoke a critical method which is in a class whose access is not available then synchronized block is used. Otherwise synchronized method can be used. 
  • Synchronized methods are used when we are sure all instance will work on the same set of data through the same function Synchronized block is used when we use code which we cannot modify ourselves like third party jars etc.
 How can you force garbage collection?
Ans. You can't force GC, but could request it by calling System.gc(). JVM does not guarantee that GC will be started immediately.

The following code of program will help you in forcing the garbage collection. First of all we have created an object for the garbage collector to perform some operation. Then we have used the System.gc(); method to force the garbage collection on that object. Then we have used the System.currentTimeMillis(); method to show the time take by the garbage collector.
How do you know if an explicit object casting is needed?
Ans. If you assign a superclass object to a variable of a subclass's data type, you need to do explicit casting. For example:
What is the difference between constructors and other methods in core java?
Ans.

  •  
  •  needs to have the same name as that of the class whereas functions need not be the same.
  • There is no return type given in a constructor signature (header). The value is this object itself so there is no need to indicate a return value.
  • There is no return statement in the body of the constructor.
  • The first line of a constructor must either be a call on another constructor in the same class (), or a call on the superclass constructor). If the first line is neither of these, the compiler automatically inserts a call to the parameterless super class constructor.

resume format

क्या है डिजिटल अरेस्ट, साइबर फ्रॉड का नया तरीका, जानिए ये कैसा होता है

  क्या है डिजिटल अरेस्ट? डिजिटल अरेस्ट में किसी शख्स को ऑनलाइन माध्यम से डराया जाता है कि वह सरकारी एजेंसी के माध्यम से अरेस्ट हो गया है, उस...