What is the full meaning of PC?
The most common usage of PC is personal computer or politically correct.
People ware is sort of a joke. A computer system consists of hardware ( the machines) , software ( the programs) and peopleware ( the people who use the computer system. to do their job.
Examples would be medical records staff, bank tellers, clerks in any office or retail outlet, ticket sellers , hotel desk clerks and on and on-- anybody who uses a computer in his work.
What is decomposition in database management system?
We can explain the given information using smaller amount of dats's by using decomposition. also, we can get separate details.
What is the meaning of file processing?
File processing system is a process of storing and organizing information through a network. This is a system that is commonly used in business to keep track and to access files instantly.
What cache memory is designed inside the CPU?
L1 and L2; Many years ago L1 was the only cache memory integrated into the CPU (processor) and L2 had to be added to the motherboard. Currently (as of year 2013), CPUs implement both L1 and L2 cache in the casing of the processor. Thus, processors (CPUs) ship with amounts of L2 cache independent for each processor core.
MHz stands for Mega Hertz.
Hertz or Hz is unit for frequency and is represented by inverse of time unit i.e. second(-1) i.e. 1/second or per second.
Frequency = 1/ time period in seconds
1MHz is 10^6 or 1000000 Hz.
Difference between telephone network and internet?
Both are almost similar except internet service is more powerful than telephone network in a sense it never looses its ability to reach and you can even send ur messages to someone not online.. mean offline messages e-mails, attachment and much more..
there is difference in the hardware used between, in telephone we use telephone switches at central office but in internet more powerful and intelligent devices are used like layer 3 and layer 2 devices such as router, layer 3 switches, gateways etc
hope u understand
this question makes no sense. its like asking you How many Fahrenheit are in Miles? They are 2 totally different measurements used for totally different things. GHz=Processor Speed GB=Storage Capacity.
What is a URL and what is its purpose?
A URL, or Universal Resource Locator (also known as a URI, a Uniform Resource Identifier) is a string of characters which is used to identify or name a resource, the main purpose being to enable interaction with a representation of the resource, typically the World Wide Web.
AnswerUniversal Resource Locator
Data are information facts or numbers that help to describe something?
Measurement information that is used to describe something is called data.
per Physical Science 8th Edition by Bill W. Tillery
Why is task-switching a necessary feature of a multitasking?
The 80386 switches execution to another task in any of four cases: 1. The current task executes a JMP or CALL that refers to a TSS
descriptor.
2. The current task executes a JMP or CALL that refers to a task gate.
3. An interrupt or exception vectors to a task gate in the IDT.
4. The current task executes an IRET when the NT flag is set.
JMP, CALL, IRET, interrupts, and exceptions are all ordinary mechanisms of the 80386 that can be used in circumstances that do not require a task switch. Either the type of descriptor referenced or the NT (nested task) bit in the flag word distinguishes between the standard mechanism and the variant that causes a task switch.
To cause a task switch, a JMP or CALL instruction can refer either to a TSS descriptor or to a task gate. The effect is the same in either case: the 80386 switches to the indicated task.
An exception or interrupt causes a task switch when it vectors to a task gate in the IDT. If it vectors to an interrupt or trap gate in the IDT, a task switch does not occur. Refer to Chapter 9 for more information on the interrupt mechanism.
Whether invoked as a task or as a procedure of the interrupted task, an interrupt handler always returns control to the interrupted procedure in the interrupted task. If the NT flag is set, however, the handler is an interrupt task, and the IRET switches back to the interrupted task.
A task switching operation involves these steps:
Note that the state of the outgoing task is always saved when a task switch occurs. If execution of that task is resumed, it starts after the instruction that caused the task switch. The registers are restored to the values they held when the task stopped executing.
Every task switch sets the TS (task switched) bit in the MSW (machine status word). The TS flag is useful to systems software when a coprocessor (such as a numerics coprocessor) is present. The TS bit signals that the context of the coprocessor may not correspond to the current 80386 task. Chapter 11 discusses the TS bit and coprocessors in more detail.
Exception handlers that field task-switch exceptions in the incoming task (exceptions due to tests 4 thru 16 of Table 7-1) should be cautious about taking any action that might load the selector that caused the exception. Such an action will probably cause another exception, unless the exception handler first examines the selector and fixes any potential problem.
The privilege level at which execution resumes in the incoming task is neither restricted nor affected by the privilege level at which the outgoing task was executing. Because the tasks are isolated by their separate address spaces and TSSs and because privilege rules can be used to prevent improper access to a TSS, no privilege rules are needed to constrain the relation between the CPLs of the tasks. The new task begins executing at the privilege level indicated by the RPL of the CS selector value that is loaded from the TSS.
You would think the term "geek" was just invented from this modern generation, but I've known this word since the 50's. Geeks (in our minds) wore horn-rimmed glasses, had bad skin, kept to themselves and got straight A's which was uncool for even my time. Funny, those "geeks" probably ended up becoming scientists or doctors or psychiatrists which many of us use! The laugh is on us!
Bloggers started soon after 9/11. They consider themselves bright, overly intelligent and non-stoppable. The are the "new journalists" etc. of the modern generation and, take great delight in so-called "uncovering the truth" (and sometimes they do succeed.) They are taking over on-line and have their very own websites (like small diaries chatting back and forth re their ideas) You don't even really need to know that much about computers. They are also "case crackers" and love a good challenge. They are often regarded as "self-important" but many are tired of the second rate form of journalism and to be honest, many are extremely bright. They don't need editors or publishers.
Their mission ... to remake political journalism and an attempt at changing the democracy itself. To make a run around the media by becoming publishers on the internet. One blogger is Matt Druge who wired the news and gossip and broke the story about Monica Lewinsky's affair with Bill Clinton (Matt is a blogger.) They are forcing mainstream news media to follow the stories they're pushing, such as the scandal that took down Senate Majority Leader Trent Lott. Bloogers run free, while "Geeks" need proof, but both get along together (intellectual minds coming together.)
Is this good or bad? I feel (my own opinion) there is a high price to pay for such things as this and one day they will. As out of control and as mistrustful as they can be about our jouranlists, news coverage, etc., Bloggers too will succumb to their own egotistic ways and be taken over by another foreign body such as they just did.
If you are interested about "Bloogers" go to www.bloggers.com
Marcy
AnswerPeople With too much time on their hands.What is touch screen called in computer terminology?
It's often simply called a touch screen or a multi touch screen. Invented by Jeffery Han. There are several different technologies that do this. It is based on blob detection. Fingertips cause an electromagnetic or other signal.
How much does a computer technician earn on average?
computer nerds can make about 10,000-50,000 depending on whether you a expirenced builder, or a website desighner. few people can be millionares.
How do you convert Microsoft word 2003 doc into a 2010 version?
Yes. Open the document with Word 2010, then go to "Save As" and in the "Save as" drop down select Word 2010.
Asking if a computer is a technology is a weird question because there is something called "computer" and there is another thing called "computer technology". Computer technology is a combination of many other technologies (main division is hardware and software) and each have their unique properties. The technology is a know-how while computer is a device. When considered this way, it becomes easier to understand how computer technology helped mobile-phones evolve and become smart-phones.
What is bigger than 1024 kryatbyte?
1Amosbyte = 1 quattordecillon bytes
1Pectrolbyte = 1 quindecillon bytes
1Bolgerbyte = 1 sexdecillon bytes
1Sambobyte = 1 septendecillon bytes
1Quesabyte = 1 octodecillon bytes
1Kinsabyte = 1 novemdecillon bytes
1Rutherbyte = 1 vigintillon bytes
1Dubnibyte = 1 unvigintillon bytes
1Seaborgbyte = 1 duovigintillon bytes
1 Bohrbyte = 1 trevigintillon bytes
1Hassiubyte = 1 quattorvigintillon bytes
1Meitnerbyte = 1 quinvigintillon bytes
1Darmstadbyte = 1 sexvigintillon bytes
1Roentbyte = 1 septenvigintillon bytes
1Coperbyte = 1 octovigintillon bytes
1Nihonbyte = 1 nonvigintillon bytes
1Flerovibyte = 1 trigintillon bytes
1Moscovibyte = 1 untrigintillon bytes
1Livermoribyte = 1 duotrigintillon bytes
1Tennessibyte = 1 trestrigintillon bytes
1Oganessibyte = 1 quattortrigintillon bytes
1Ununennibyte = 1 quintrigintillon bytes
1Sontbyte = 1 sestrigintillon bytes
1Sophobyte = 1 septentrigintillon bytes
1Kophobyte =1 Octotrigintillion bytes
1Goggobyte = 1 Noventrigintillion bytes
1Geegobyte = 1 Quadragintillion bytes
1Boogobyte = 1 with 126 zeros bytes
1Geggobyte = 1 with 129 zeros bytes
1Helfobyte = 1 with 132 zeros bytes
1Voogobyte = 1 with 135 zeros bytes
1 Einbyte= 1 with 138 zeros bytes
1 Shivabyte= 1 with 141 zeros bytes
1 Kominibyte= 1 with 144 zeros bytes
1 Somakanbyte= 1 with 147 zeros bytes
1 Kominibyte= 1 with 150 zeros bytes
1 Somakanbyte= 1 with 153 zeros bytes
1 Darkrumbyte= 1 with 156 zeros bytes
1 Vifficabyte= 1 with 159 zeros bytes
1 Vitabyte= 1 with 162 zeros bytes
1 Vosbyte= 1 with 165 zeros bytes
1 Controbyte= 1 with 168 zeros bytes
1 tefreebyte= 1 and 171 zeros bytes
1 tibyte= 1 with 174 zeros bytes
1 quabyte= 1 with 177 zeros bytes
1 quibyte= 1 with 181 zeros bytes
1 sebyte= 1 with 184 zeros bytes
1 septobyte= 1 with 187 zeros bytes
1 terybytes= 1 with 190 zeros bytes
1 tegobyte= 1 with 193 zeros bytes
1 tegohyte= 1 with 196 zeros bytes
1 femibyte= 1 with 199 zeros bytes
1 attibyte= 1 with 202 zeros bytes
1 zepbyte= 1 with 205 zeros bytes
1 yobyte= 1 with 208 zeros bytes
1 xentabyte= 1 with 211 zeros bytes
1 duebyte= 1 with 214 zeros bytes
1 tetrabyte= 1 with 217 zeros bytes
1 pentabyte= 1 with 220 zeros bytes
1 hexabyte= 1 with 223 zeros bytes
1 heptabyte= 1 with 226 zeros bytes
1 octabyte= 1 with 229 zeros bytes
1 nonabyte= 1 with 232 zeros bytes
1 decabyte= 1 with 235 zeros bytes
1 somethingbyte= 1 with 238 zeros bytes
1 debyte= 1 with 241 zeros bytes
1 dublebyte= 1 with 244 zeros bytes
1 hellobyte= 1 with 247 zeros bytes
1 tefreebyte= 1 with 250 zeros bytes
1 tibyte= 1 with 253 zeros bytes
1 quabyte= 1 with 256 zeros bytes
1 quibyte= 1 with 259 zeros bytes
1 sebyte= 1 with 262 zeros bytes
1 septobyte= 1 with 265 zeros bytes
1 terybytes= 1 with 268 zeros bytes
1 tegobyte= 1 with 271 zeros bytes
1 tegohyte= 1 with 274 zeros bytes
1 femibyte= 1 with 277 zeros bytes
1 attibyte= 1 with 280 zeros bytes
1 zepbyte= 1 with 283 zeros bytes
1 yobyte= 1 with 286 zeros bytes
1 xentabyte= 1 with 289 zeros bytes
1 duebyte= 1 with 292 zeros bytes
1 tetrabyte= 1 with 295 zeros bytes
1 pentabyte= 1 with 298 zeros bytes
1 hexabyte= 1 with 301 zeros bytes
1 heptabyte= 1 with 304 zeros bytes
1 octabyte= 1 with 307 zeros bytes
1 nonabyte= 1 with 311 zeros bytes
1 decabyte= 1 with 314 zeros bytes
1 somethingbyte= 1 with 317 zeros bytes
1 debyte= 1 with 321 zeros bytes
1 dublebyte= 1 with 324 zeros bytes
1 hellobyte= 1 with 327 zeros bytes
1 Summabyte= 1 with 330 zeros bytes
1 Ingensibyte = 1 with 333 zeros bytes
1 Insanisibyte= 1 with 336 zeros bytes
1 Stercusibyte = 1 with 339 zeros bytes
1 Salviabyte = 1 with 342 zeros bytes
1 Pecuniabyte = 1 with 345 zeros bytes
1 Claudobyte = 1 with 348 zeros bytes
1 Immanemquebyte = 1 with 351 zeros bytes
1 Stantibyte = 1 with 354 zeros bytes
1 Celsiobyte = 1 with 357 zeros bytes
1 Opibyte = 1 with 360 zeros bytes
1 Excretibyte = 1 with 363 zeros bytes
1 Mordebyte = 1 with 366 zeros bytes
1 Occiderebyte = 1 with 369 zeros bytes
1 Sublimibyte = 1 with 372 zeros bytes
1 Anobyte = 1 with 375 zeros bytes
1 Chalibyte = 1 with 378 zeros bytes
1 Atriubyte = 1 with 381 zeros bytes
1 Finibyte = 1 with 384 zeros bytes
1 Amerigobyte = 1 with 387 zeros
Here's the breakdown for you: 8 bits make a byte 1000 bytes make a KiloByte (KB) 1000 Kilobytes makes a MegaByte (10,000 KB/1 million bits) 1000 MegaBytes makes a Gigabyte (100,000 KB/1 billion bits) so 100,000 KB makes a Gigabyte... Hope this helps
Electronic Spam, commonly shortened and called "Spam," is a general abuse of online messaging systems, including instant messaging, email, etc. Spam is most commonly associated with email spam and is defined as a constant stream of nearly identical emails indicating a single point, e.g. advertising.
Other sSpamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.
In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.
What is a hardware device that allows users to enter data?
The primary example of a hardware component that allows user data input is a keyboard.