Showing posts with label Computer Articles. Show all posts
Showing posts with label Computer Articles. Show all posts

Saturday, February 25, 2017

Juggernaut - Indian Super Computer

Juggernaut - New Super Computer from India:
  • India will likely unveil its most powerful supercomputer juggernaut in June 2017
  • Juggernaut means a huge, powerful, and overwhelming force.
  • If its processors operate at the full capacity of 10 petaflops (1 followed by 15 zeroes of floating point operations per second), a clock speed a million times faster than the fastest consumer laptops, it could earn a place among the world’s top 10 fastest supercomputers.
  • EKA: Though India has built or hosted supercomputers since the 1990s, it held a ‘top 10’ spot only once, in 2007, with the EKA built by the Computational Research Laboratories, which is part of the Tata group.
  • India has built or hosted supercomputers since the 1990s, it held a ‘top 10’ spot only once, in 2007, thanks to the EKA built by the Computational Research Laboratories, which is part of the Tata group. 
  • This position was lost, though several ultra-fast machines exist in Indian academic institutions: they feature in the 100s or 200s in global rankings.
  • The as-yet-unnamed machine will be jointly hosted at the Indian Institute of Tropical Meteorology, Pune and the National Centre for Medium Range Weather Forecasting at Noida in Uttar Pradesh.
  • Government has sanctioned ₹400 crore for the project this year. Most of the machine’s computing power will help in monsoon forecasting, using a dynamical model.

Monday, July 25, 2016

Computer Policy 1984 of India

New Computer Policy 1984 of India: New Computer Policy, introduced in 1984 by Prime Minister Rajiv Gandhi, has changed the face of IT industry as well as the economic growth of India. The first Computer Policy of 1984 and Software Policy of 1986 emphasized the concept of software development and export through data communication links.The policy has brought up many changes and reforms in the field of IT. According to the policy, markets costs would we slashed for IT companies and were given many types of subsidies. One of the most important benefits avail for IT firms was financial backup from banks and some venture capitalists. Centre for Development of Telematics (C-DOT) was established in 1984 with a mission to develop switching system/exchanges in India to work in harsh tropical environment of the country. 
The idea that “import of technology could accelerate national development in the field of electronics and computer”, had gained support in the Policies/Statements of the Central Government announced between 1978-1984. Many State/Central Electronics Corporations (i.e. KELTRON, MELTRON, UPTRON, WEBEL, HARTRON, ESPL, KEONICS, ELCOT, BEL, ECIL) were established in 1970s and 1980s to develop electronics industry in the states. Various policy announcements like the Import Policy (1983), Computer Policy (1984), Electronic Policy (1985), and Software Policy (1986) laid the foundations for the liberalized growth of IT industry in the country. It was recognized that IT would become strateg

Tuesday, June 21, 2016

China makes world’s fastest computer 'Sunway-TaihuLight'

China has invented what it calls the world’s fastest computer - 'Sunway-TaihuLight'. The new Chinese computer system can make 93 quadrillions calculations per second .This supercomputer called Sunway-TaihuLight developed by the National Research Centre of Parallel Computer Engineering and Technology (NRCPC) is built entirely using processors designed and made in China, state-media reported. Sunway TaihuLight, with a new system built entirely using processors designed and made in China topped the list of the Top 500 supercomputers with 93 quadrillion calculations per second, according to the newest edition of the list which was announced at the 2016 International Supercomputing Conference in Germany.
Supercomputer Sunway-TaihuLight Highlights: 

  • As of June 2016 the fastest supercomputer in the world is the Sunway TaihuLight, with a Linpack benchmark of 93 petaFLOPS(PFLOPS), exceeding the previous record holder, Tianhe-2, by around 59 PFLOPS.
  • The computing power of the supercomputer is provided by a China-developed many-core CPU chip, which is just 25 square cm.
  • It is installed at the National Supercomputing Centre in China displaced Tianhe-2, an Intel-based Chinese supercomputer that has claimed the top 1 spot on the past six TOP500 lists.
  • Sunway TaihuLight is twice as fast and three times as efficient as Tianhe-2, which posted a performance of 33.86 quadrillions of calculations per second.
  • The system will be used for various research and engineering work, in areas such as climate, weather & earth systems modeling, life science research, advanced manufacturing, and data analytics.
  • Titan, a Cray X40 system installed at the US Department of Energy’s (DOE) Oak Ridge National Laboratory, is now at the third position, with 17.59 quadrillions of calculations per second.
  • Sequoia, an IBM BlueGene/Q system installed at DOE’s Lawrence Livermore National Laboratory and Fujitsu’s K computer installed at the RIKEN Advanced Institute for Computational Science (AICS) in Japan are at the fourth and fifth positions respectively.

Saturday, March 12, 2016

Normalization Primitive and Composite data Types

Normalization Primitive and Composite data Types: Normally in basic database we use numbers and strings as common datatype which is primitive datatypes while complex datatype are called composite data type in simple word. 

Primitive datatypes are the basic units of a language; each primitive value contains a single datum (as opposed to an array of multiple items) and describes that datum literally. Primitive data is very straightforward. Primitive datatypes are, as their name suggests, simple. They can hold text messages, frame numbers, movie clip size values, and so on, but they don't readily accommodate higher levels of complexity.
Examples: Number, string, boolean, undefined, and null. 


Composite data Types are complex data type. For more elaborate data handling -- such as simulating the physics of a dozen bouncing balls or managing a quiz with 500 questions and answers -- we turn to composite datatypes. Using composite data, we can manage multiple pieces of related data as a single datum. Whereas a single number is a primitive datum, a list (i.e., an array) of multiple numbers is a composite datum. 
Examples: Suppose we wanted to track the profile of a customer named Derek. We could create a series of variables that store Derek's attributes as primitive values, like this:

Friday, March 11, 2016

Conceptual Database Design Questions

Conceptual Database Design, ER Diagram Questions, MCQs: Conceptual database design involves modelling the collected information at a high-level of abstraction without using a particular data model or DBMS.
Need of Conceptual Database Design:

  • Independent of DBMS.
  • Allows for easy communication between end-users and developers.
  • Has a clear method to convert from high-level model to relational model.
  • Conceptual schema is a permanent description of the database requirements.
  • ER Diagram is Most popular conceptual model for database design.

Entity Relationship (ER) Model:

  • Most popular conceptual model for database design
  • Basis for many other models
  • Describes the data in a system and how that data is related
  • Describes data as entities, attributes and relationships

Conceptual Database Design, ER Diagram Questions, MCQs
Normalization is --------- database design technique ?
A. Bottom Up approach
B. Top down Approach
C. Both A&B
D. None of above
Answer: A

An entity which depends on other entity for its existence is a ------ ?
A. Strong Entity
B. Weak entity
C. Partial Entity
D. Dummy Entity ?
Answer: B

Attribute in ER Diagram can be ?
A. Composite
B. Multivalued
C. Null
D. All of above
Answer: D

In an E-R diagram attributes are represented by
A. rectangle
B. square
C. ellipse
D. triangle
Answer: C

In an E-R diagram an entity set is represent by a
A. rectangle
B. ellipse
C. diamond box
D. circle
Answer: A

If an attribute can be split into components, it is called a ------ attribute ?
A. Single
B. Multi-valued
C. composite
D. None of above
Answer: C

Which among the following is valid Cardinality of a Relationship ?
A. One to one (1:1) relationship
B. One to many (1:N) relationship
C. Many to many (M:N) relationship
D. All of above
Answer: D

Monday, March 7, 2016

e-mail inventor Ray Tomlinson passes away at 74

Ray Tomlinson, the inventor of email and the man who picked the @ symbol for addresses, passed away at the age of 74 in Washington on 6th March 2016. Tomlinson invented direct electronic messages between users on different machines on a certain network in 1971. Before that, users could only write messages to others using the same computer. 

Thursday, February 25, 2016

1's and 2's Complement

1's and 2's Complement, Example: 1’s complement and 2’s complement are two important binary concepts. Two’s complement is especially important because it allows us to represent signed numbers in binary, and one’s complement is the interim step to finding the two’s complement.
  • 1’s Complement
If all bits in a byte are inverted by changing each 1 to 0 and each 0 to 1, we have formed the one’s complement of the number.
 
Original       One's Complement
-------------------------------
10011001  -->  01100110
10000001  -->  01111110
11110000  -->  00001111
11111111  -->  00000000
00000000  -->  11111111
  
  • 2’s Complement
The two’s complement is a method for representing positive and negative integer values in binary. The useful part of two’s complement is that it automatically includes the sign bit.

Step 1: Begin with the original binary value

    10011001  Original byte

Step 2: Find the one's complement

    01100110  One's complement

Step 3: Add 1  to the one's complement

    01100110  One's complement
  +        1  Add 1
 -----------
    01100111  <---  Two's complement

Wednesday, February 17, 2016

Secret-Key Encryption is also known as ?

Secret-key encryption is also known as ?
A. Private encryption
B. Secret encryption
C. Symmetric encryption
D. Asymmetric encryption
Answer: A. Private encryption

Secret-Key Encryption: In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. See public key infrastructure (PKI) for more information.

Friday, December 25, 2015

What is CERT-in

CERT India or CERT-in was established in 2005 with a purpose to provide consultancy, training and distribution services for the full range of Belbin products and materials, and conducts Belbin Accreditation training, leadership and team building training at all levels from shop floor to executive teams. CERT India is committed to partner with Indian industry in transforming performance of individuals and teams through the power of Belbin Methodology. Given the increasing performance expectations and team delivery of India Inc, we will value add to the process of competence building of individuals and teams.
Over several years Dr Meredith Belbin has researched 'work place behaviour' to identify 'Team Roles'- clusters of behaviour that relate to an individual's natural tendency in interrelating with others. Dr Belbin's team role model is now used extensively throughout the world to help bring about improvements in individual and team performance. The original self scoring Self Perception Inventory has now been replaced by the Belbin interplace 7 online system to handle the many variables and provide reliable advice on complex human resource management issues.

Tuesday, September 16, 2014

Full Names / Abbreviation based Computer GK Questions

Full Names / Abbreviation based Computer GK Questions:
* HTTP - Hyper Text Transfer Protocol.
* HTTPS - Hyper Text Transfer Protocol Secure.
* IP - Internet Protocol.
* URL - Uniform Resource Locator.
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource UnderSeized.
* 3G -3rd Generation.
* GSM - Global System for Mobile Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile Telecommunication System.
* SIM - Subscriber Identity Module .
* AVI = Audio Video Interleave

Friday, August 15, 2014

India's first computer installed ?

India's first computer installed: First Computer in india is installed at Indian Statistical Institute (ISI), Kolkata in 1995, it was the first in Asia, outside Japan. DDM lights up a Wills Navy Cut cigarette and adds that ISI had the distinction of developing the first Indian analog computer as well. Nehru came to meet the computer that solved a 10 x 10 single precision matrix in 90 minutes
Indian Statistical Institute is the first institute:
-  in Asia to acquire a digital computer.
- in India to participate in successfully building an indigenous digital computer. 

About ISI Kolkata: Indian Statistical Institute (ISI), a unique P. C. Mahalanobish institution devoted to the research, teaching and application of statistics, natural sciences and social sciences. Founded by Professor P.C. Mahalanobis in Kolkata on 17th December, 1931, the institute gained the status of an Institution of National Importance by an act of the Indian Parliament in 1959. The Headquarters of ISI is located in the northern fringe of the metropolis of Kolkata.

Quiz. Where was India's first computer installed at ?
A. Indian Statistical Institute, Calcutta
B. Indian Institute of Technology, Delhi
C. Indian Institute of Science, Bangalore
D. Indian Iron & Steel Co.Ltd., Burnpur
Ans: A

Saturday, February 22, 2014

Important Computer Keyboard Shortcuts

Some Important Keyboard Shortcuts in Daily Life:
Keyboard Shortcuts (Microsoft Windows)
1. CTRL+C (Copy)
2. CTRL+X (Cut)
... 3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete)
6. SHIFT+DELETE (Permanent Delete, without placing the item in the Recycle Bin)
7. CTRL while dragging an item (Copy the selected item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)
10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text) SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)

Friday, January 10, 2014

Who is the inventor of www - Tim Berners-Lee

Tim Berners-Lee is the inventor of www. Tim Berners-Lee was born in London, England and graduated in Physics from Oxford University in 1976. He is currently the Director of the World Wide Web Consortium, the group that sets technical standards for the Web. Tim Berners-Lee was the man leading the development of the World Wide Web (with help of course), the defining of HTML (hypertext markup language) used to create web pages, HTTP (HyperText Transfer Protocol) and URLs (Universal Resource Locators). All of those developments took place between 1989 and 1991.
Berners-Lee is the director of the World Wide Web Consortium (W3C), which oversees the Web's continued development. He is also the founder of the World Wide Web Foundation, and is a senior researcher and holder of the Founders Chair at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). He is a director of the Web Science Research Initiative (WSRI), and a member of the advisory board of the MIT Center for Collective Intelligence.

Friday, August 16, 2013

Computer related Full forms

All Computer related Full forms List, Common Terms:
HTTP = Hyper Text Transfer Protocol.
HTTPS = Hyper Text Transfer Protocol Secure.
IP = Internet Protocol.
URL = Uniform Resource Locator.
USB = Universal Serial Bus.
VIRUS = Vital Information Resource Under Seized.
3G = 3rd Generation.
GSM = Global System for Mobile Communication.
CDMA = Code Divison Multiple Access.
UMTS = Universal Mobile Telecommunication System.
SIM = Subscriber Identity Module.
AVI = Audio Video Interleave
RTS = Real Time Streaming
SIS = Symbian OS Installer File
AMR = Adaptive Multi-Rate Codec
JAD = Java Application Descriptor
JAR = Java Archive
JAD = Java Application Descriptor
3GPP = 3rd Generation Partnership Project
3GP = 3rd Generation Project
MP3 = MPEG player lll
MP4 = MPEG-4 video file
AAC = Advanced Audio Coding
GIF = Graphic InterchangeableFormat
JPEG = Joint Photographic ExpertGroup
BMP = Bitmap
SWF = Shock Wave Flash
WMV = Windows Media Video
WMA = Windows Media Audio
WAV = Waveform Audio
PNG = Portable Network Graphics
DOC = Document (Microsoft Corporation)
PDF = Portable Document Format
M3G = Mobile 3D Graphics
M4A = MPEG-4 Audio File
NTH = Nokia Theme (series 40)
THM = Themes (Sony Ericsson)
MMF = Synthetic Music Mobile Application File
NRT = Nokia Ringtone
XMF = Extensible Music File
WBMP = Wireless Bitmap Image
DVX = DivX Video
HTML = Hyper Text Markup Language
WML = Wireless Markup Language
CD = Compact Disk.
DVD = Digital Versatile Disk.
CRT = Cathode Ray Tube.
DAT = Digital Audio Tape.
DOS = Disk Operating System.
GUI = Graphical User Interface.
HTTP = Hyper Text Transfer Protocol.
IP = Internet Protocol.
ISP = Internet Service Provider.
TCP = Transmission Control Protocol.
UPS = UninterruptiblePower Supply.
HSDPA = High Speed Downlink Packet Access.
EDGE = Enhanced Data Rate for GSM [Global System for Mobile
Communication] Evolution.
VHF = Very High Frequency.
UHF = Ultra High Frequency.
GPRS = General Packet Radio Service.
WAP = Wireless Application Protocol.
TCP = Transmission Control Protocol .
ARPANET = Advanced Research Project Agency Network.
IBM = International Business Machines.
HP = Hewlett Packard.
AM/FM = Amplitude/ Frequency Modulation.
WLAN = Wireless Local Area Network

Monday, April 1, 2013

Steve Jobs & Dennis Ritchie

Steve Jobs & Dennis Ritchie
✔ Without Steve Jobs (February 24, 1955 – October 5, 2011) we would have:
• No iProducts.
• No over expensive laptops.
✔ Without Dennis Ritchie (September 9, 1941 – October 9, 2011) we would have:
• No Windows.
• No Unix.
• No C.
• No Programs.
• A large setback in computing.
• No Generic-text Languages.
• We would all read in Binary.
✔ They died in the same year and the same month but it seems only few notice the death of Dennis Ritchie compared to Steve Jobs.
✔ It won't cost you anything to press the share button so spread, Both of these genius ... people should be knowing of both.

Sunday, March 17, 2013

What does BIT stands for in Computers

What does BIT stands for in Computers: It's not an acronyms but we prefer to say it as World. Bit is a short for Binary DigIT. Bit is short for Binary Digit, meaning how much information is processed per clock cycle. A 64-bit computer processes 64 lots of information at one time. Each lot of information processed is made up of different combinations of 1's and 0's.

Wednesday, March 13, 2013

Which company is known as Big Blue ?

Which company is known as "Big Blue" :  International Business Machines (IBM). Corporation is called the Big Blue Company. According to the IBM website, the term did not originate from within the company. There are many stories behind "Big Blue" for IBM. Some of main stories are:
1. IBM was among the blue-chip stocks on the US stock market, IBM was a steady and consistently high performer over the years. It regularly gave good dividends to its shareholders and that's why it came to be called the Big Blue. 
2. Big Blue term term may have been derived from the blue user manuals that came with certain IBM products. 
3. Another theory is that the term simply refers to the company's blue logo.