to store 12 bits per pixel 1.for system with resolution 640 by 480 frame buffer size=(640*480*12)/8=0.46Mbyte 2.for system with resolution 1280 by 1024 frame buffer sizs=(1280*1024*12)/8=1.96Mbyte 3.for system with resolution 2560 by 2048 frame buffer sizs=(2560*2048*12)/8=7.86Mbyte to store 24 bits per pixel 1.for system with resolution 640 by 480 frame buffer size=(640*480*24)/8=0.92Mbyte 2.for system with resolution 1280 by 1024 frame buffer sizs=(1280*1024*24)/8=3.93Mbyte 3.for system with resolution 2560 by 2048 frame buffer sizs=(2560*2048*24)/8=15.72Mbyte
What is the difference between cement based and lime based skim coat?
Lime Based Skim coat (LSC) is made with lime in various formulation and there is no standard formulation. The same consists of mainly lime, oil and several other igredients which changes from place to place.
Cement based Skim coat on the other hand is factory made and contains Cement as Binder along with Filler and Additive to support various properties.
The basic difference between Lime Based Skim Coat and Cement Based are that the Lime Based Skim Coat are not water resistant and cannot be applied externally, whereas cement based Skim Coat(CSC) can be applied interiors as well as exteriors. They are water resistant. The adhesion strength of the CSC is much higher than LSC. CSC being cement based becomes an integral part of the base plaster hence the durability is very high. LSC on the other hand cannot tolerate any moisture and gets peeled off in contact with the moisture. The Skim Coats are generally done as a base coat for paints and the CSC provide a firm base for the paints. The CSC can be made water resistant which results in lower consumption of Paint by around 20%. The initial cost of application of CSC is slightly higher than the LSC which is compensated by the lesser paint consumption and becomes lower as no primer is required after application of the CSC. For any further information on the properties of the CSC if required I can be contacted in the following email ID:
sumonc@adityabirla.com
How do you differentiate soft and hard rt-os?
The hardware is the thing which we can see, feel and software is the thing which operates hardware as per user requirewmant. Hardware physical things, software is program which handle hardware.
Microsoft windows
What is the architecture of salesforce software?
Salesforce uses a cloud-based "multi-tenant" architecture.
"Cloud Based" meaning that you do not install software locally on a server. Salesforce software is accessed over the Internet (the cloud) on Salesforce servers. The Salesforce database is actually Oracle on the back end by the way. This is very nice article and useful information please keep going.tekclasses is the best online salesforce training company from india bangalore
The analogy salesforce uses frequently to describe "multi-tenancy" is an office building. Like an offie building, Salesforce users have secure barriers (likes walls in an office) that divide your business from someone else's business (and your data!). However that office building that you share provides all the structure (stairs, elevators) and utilities (power, water, etc). In a multi-tenant architecture you don't have a single installation for your Salesforce instance - you're really a sub-set of a much larger database. SAlesforce keeps your configuration unique by storing meta-data about all your customizations even though you're running on a shared database. You share Salesforce.com's services (think the "utilities" analogy aforementioned) such as the security model, the ability to access Salesforce on mobile devices, API services, etc..
What is the importance of Microsoft Windows?
Microsoft Windows is important to our lives since it offers a visual interconnection of the user, with menu, icons, dialog boxes, and the possibilities to run MS-DOS. It has provided functions that are simple to use and they have made their software affordable.
What All of the following techniques are used in a social engineering attack except?
Without knowing what the techniques are there really is not any way to know which one is not used in a social engineering attack. The options need to be given to know which is the correct answer to the question.
What is the most common vehicle for social engineering attacks?
Email is the most common vehicle for social engineering attacks, specifically phishing emails. Attackers send fraudulent emails that appear to be from a trustworthy source, enticing recipients to click on malicious links or provide sensitive information. It is essential for individuals to be cautious and verify the legitimacy of emails before taking any action.
Examples of social engineering?
"social engineering" refers to techniques designed to encourage users to take a certain action, generally one which the user would not otherwise take. For example, spammers may post links on Facebook telling users that they have received a free gift, and they should click a link to claim their gift. In reality, the link may download malware, spam their friends' profiles with the message, or some other undesirable action.
Instructive language is language that is used to give instructions or guidance on how to do something. It is clear, direct, and often focuses on providing step-by-step directions to help someone complete a task or action. Examples include recipes, manuals, and tutorials.
What are the levels of memory?
The three main levels of memory are sensory memory, short-term memory, and long-term memory. Sensory memory holds sensory information for a very brief period, short-term memory stores information for a short time without rehearsal, and long-term memory has a more permanent storage capacity for information.
In HyperMesh, skew is a measure of the quality of the elements. It calculates the deviation of the shape of an element from an ideal shape (usually a square or a cube). Lower skew values indicate better element quality, while higher skew values indicate distorted elements that may negatively impact analysis results. It is important to address and minimize skew to ensure accurate and reliable simulation results.
How do you acsess your spam folder?
The spam folder on MSN UK is the junk folder. Junk folders are the spam folder in many email programs.
What is database and database system?
A database is essentially an organized collection of data, typically stored electronically on a computer system. Imagine a giant filing cabinet with information neatly sorted and filed away. That's kind of what a database is like, but way more efficient and powerful.
Here's a breakdown of the key aspects:
Organized Collection: Data isn't just dumped in a pile. It's structured in a specific way, often using tables with rows and columns, to make it easy to find and use the information you need.
Electronic Storage: Most databases are digital these days, allowing for much faster access and manipulation of data compared to physical filing systems.
Now, to manage this data effectively, you need a database management system (DBMS). Think of it as the filing cabinet manager. A DBMS is a software application that lets you:
Interact with the Database: You can create databases, add, update, and delete data, and most importantly, retrieve information you need.
Manage Data Structure: The DBMS defines how data is organized and ensures it stays consistent and usable.
Control Access: The DBMS controls who can access the data and what they can do with it, keeping things secure.
Some common examples of DBMS software include MySQL, Microsoft SQL Server, and Oracle Database.
So, the database and DBMS work together to form a database system. The database stores the information, and the DBMS provides the tools to manage and access it effectively. This allows businesses and organizations to keep track of large amounts of data efficiently, from customer information to product inventory.
CNC (Computer Numerical Control) technology was developed in the late 1940s and became more widely used in the 1970s as computers and software became more advanced. It has since revolutionized the manufacturing industry by automating and controlling machining tools with precision.
Which term describes the smallest meaningful language unit?
You are asking about a "morpheme." This term comes from the field of linguistics: a morpheme performs many important functions that are necessary in order to create meaning. A morpheme can take many forms: for example, it can be a prefix, a suffix, or a one-syllable word.
What are the technical specifications of computer graphics?
High-quality graphics take up a large amount of disk space in a computer and require larger memory sizes to work with and edit them. One professional digital image can easily require 50 megabytes
Why would you use a hard drive in computer graphics?
A hard drive is used in computer graphics to store large files such as high-resolution images, videos, and animation sequences that are used to create visual content. The fast read/write speeds of a hard drive help in accessing and saving these files quickly, allowing for smoother rendering and processing of graphics.
What is space division multiplexing?
A road of meters wild, we devide it to 2x2, 2m for coming cars, 2 for going. that's a space mux. translate that into bandwith mode. total bw is divided to parts, each part for a user for example, that's a space mux
What is best among computer science and information technology?
The best option between computer science and information technology depends on your career goals. Computer science focuses more on the theoretical aspects of computing, algorithms, and software development, while information technology is more practical and focuses on computer systems, networks, and applications. If you are interested in coding, software development, and problem-solving, computer science may be a better choice. If you are interested in working with computer systems, networks, and IT infrastructure, information technology may be more suitable.
What is present value analysis?
Present value analysis is a financial technique used to evaluate the value of future cash flows by discounting them back to their current value. It takes into account the time value of money, allowing for better decision-making by comparing the present value of costs and benefits. The goal is to determine whether an investment or project is worth pursuing based on its potential return.
Semaphores are used in computer science for process synchronization. They help control access to shared resources to prevent conflicts between processes running concurrently. Operating systems and programming languages utilize semaphores to manage critical sections of code and coordinate communication between multiple processes or threads.
In computer science, a semaphore is a protected variable or abstract data type which constitutes the classic method for restricting access to shared resources such as shared memory in a multiprogramming environment. Hence as a security feature it is largely used Kushal P. Bathija