Don't wanna be here? Send us removal request.
Text
What is C++ language and its features?
Introduction of C++ Programming:- C++ is a OOPL (Object Oriented Programming Language) which is developed by Bjarne Stroustrup in 1979 at AT & T (American Telephone & Telegraph) Bell Laboratories. C++ runs on a variety of platform such as windows, Mac and various versions of UNIX. C++ is an enhanced version of C programming language. Its original name was c with classes but later it was renamed with C++. Features of C++:- Simple Object oriented Compile based Powerful In-built libraries Memory management Pointers Platform dependent Case sensitive Reusability Simple:- Every C++ program can be written in simple English language so that it is very easy to understand and developed by programmer. Object Oriented:- C++ is object oriented programming language which makes development and maintenance easier for developer. In Procedure-oriented programming language it is not easy to manage if code grows as project size grows. It follows the concept of oops like class, object, polymorphism, inheritance, encapsulation, abstraction, overloading. Compile based:- C++ is a compiler based programming language, it means without compilation no C++ program can be executed. First we need to compile our program using compiler and then we can execute our program. Powerful:- C++ is a very powerful programming language; with the help of it you can make wide verity of program using its data types, functions, control statements, decision making statements, and many more things. In-built libraries:- C++ provides a lot of inbuilt functions and header files that makes the development fast and easier. Memory management:- It supports the feature of dynamic memory allocation. In C++ language, we can free the allocated memory at any time by calling the free() function. Pointers:- C++ have very impressive feature that is Pointer. Pointers is a variable which hold the address of another variable. pointers are directly access the memory address of any variable. It means we can directly interact with the memory location. Platform dependent:- Platform dependent means the program is dependent on Operating System. C++ language will run on only specific OS i.e. when we develop a C++ application on DOS, so that will be running on DOS only. It is not possible to transfer that application from DOS to UNIX even if we try to do the same we need to rebuild the application. Case sensitive:- Case sensitivity means both upper case and lower case treated differently. C++ does support the case sensitivity. For example “a” and “A” both are different words in C++. Reusability:- Reusability means ability to reuse the previous or predefined code. With the help of predefine and user defined function we can reuse that code in C++ language. So that we can say C++ have a feature of reusability. Read the full article
0 notes
Text
How to install Turbo C++ in windows Operating System?

Installation Process of Turbo C++ in windows OS:- There are following C++ installation procedure in windows 8.1 operating system with screen shots. 1. Download the turbo C++ setup from the internet. It is in the form of zip file.
2. Now extract the Zip file.
3. After extraction file will be look like in the image below. Double click on that file.
4. Installation of turbo C++ is started and window look like the image which is shown in below.
5. After that just click on the next button.
6. After it click onto the finish button.
7. Installation of C++ is finish. Now the shortcut button is available on the desktop.
8. Double click on the shortcut button of Turbo C++.
9. Click on the start Turbo C++ button.
Read the full article
0 notes
Text
How to write a Program in C++?

Syntax of basic C++ Programmimg:- This is basic C++ Program.
In this Programming structure. We uses following syntax. Header file :- The very first statement includes the header file. Header file is a library file, here iostream header file is a Input/output library file which provides “cin” and “cout” method for input and output. Main function:- It is the main function of program. Program always starts from this function. Under { } is called body of the function, which always executes the first. Cout :- This statement print “Hello C++ Programmer”on to the screen. Compile and Execute C++ Program :- There are following steps Open the C++ Editor. Open New tab and select new file. Type the Program above. Save the file with “.cpp” extension. Now open compile menu and click compile option for compiling the program. (For short cut use Alt + F9 key) After successful compilation, For running the program Open run menu and click run option. (For short cut use Ctrl + F9 key) For seeing the output screen Alt + F5 key is used. Returning from Output to editor press Esc Key. This is the screen short of the first Program with output.
Output:-
Read the full article
0 notes
Text
Salesforce Application Developer-I Part 6
Q 201. Universal containers has a custom object "service" which has a lookup relationship to Account. Universal containers wants to enhance Salesforce1 with an action that allows account managers to enter a new service to an Account while looking at the account? A. Enter an object specific action to Service and put it in the Account Layout B. Enter an object specific action to Service and put it in the Service Layout C. Enter an object specific action to Account and put it in the Account Layout D. Enter an object specific action to Account and put it in the Service Layout Ans C. Enter an object specific action to Account and put it in the Account Layout Q202 What determines whether a user can create a new record using a specific record type? A. Profile B. Page layout C. Field level security D. Sharing Ans A. Profile Q203 Which statements are true regarding Roll-Up Summary fields? Select all that apply A. Advanced currency management has no affect on roll-up summary fields. B. Because roll-up summary fields are not displayed on edit pages, you can use them in validation rules but not as the error location for you validation. C. Validation errors can display when saving either the detail or master record. D. Automatically derived fields, such as current date or current user, are allowed in a roll-up summary field. E. Once created, you cannot change the detail object selected or delete any field referenced in your roll-up summary definition. Ans B. Because roll-up summary fields are not displayed on edit pages, you can use them in validation rules but not as the error location for you validation. C. Validation errors can display when saving either the detail or master record. E. Once created, you cannot change the detail object selected or delete any field referenced in your roll-up summary definition. Q204 What happens when a workflow is re-evaluated? Pick 3 A. Validation B. Cross-object sharing rules C. Other Workflow types D. Previous Workflows Ans B. Cross-object sharing rules C. Other Workflow types D. Previous Workflows Q205 Which components can be added to a lightning app on custom Object? Choose 3 A. Standard Lightning component B. Custom lightning component C. Object specific actions on the custom object D. Global actions E. Visualforce Ans A. Standard Lightning component B. Custom lightning component D. Global actions Q206 A developer executes following code in Console. What will happen? listflist = new list(); for(integer i=1;i Read the full article
0 notes
Text
Salesforce Application Developer-I Part 2
Q41 Universal containers has a custom object "service" which has a lookup relationship to Account. Universal containers wants to enhance Salesforce1 with an action that allows account managers to enter a new service to an Account while looking at the account? A. Enter an object specific action to Service and put it in the Account Layout B. Enter an object specific action to Service and put it in the Service Layout C. Enter an object specific action to Account and put it in the Account Layout D. Enter an object specific action to Account and put it in the Service Layout Ans C. Enter an object specific action to Account and put it in the Account Layout Q42 Universal Containers has built a recruiting application with two custom objects, Job Applications and Reviews that have a master-detail relationship. Users should NOT be allowed to delete review records after job application records have been approved. How would a developer meet this requirement? A. Change the interviewer's profile to Read-only for the review object B. Use workflow to change the page layout to Read-only C. Remove the Delete button from the job application page layout D. Use a validation rule in conjunction with a roll-up summary field Ans D. Use a validation rule in conjunction with a roll-up summary field Q43 Universal Container want to store an area code and wants to be able to search for it in applications (apex). Which are possible fields to store the data? Choose 2 A. Email B. Multi Picklist C. Text D. Number E. Phone Ans C. Text D. Number Q44 What can a lightning component contain in its resource bundle? Choose two answers. A. Custom Client-side rendering behavior. B. Properties files with global settings. C. CSS styles scoped to the component. D. Build scripts for minification. Ans A. Custom Client-side rendering behavior. C. CSS styles scoped to the component. Q45 Describe the ramifications of field updates and potential for recursion for the following scenario: If a field update for Rule1 triggers Rule2, and a field update for Rule2 triggers Rule1. A. The updates create a loop and the org limits for workflow time triggers per hour will likely be violated. B. When the second trigger is saved a Imminent Loop Error message will be displayed and the workflow rule update will not save. C. The updates create a loop and the org will be blocked until the admin resolves the issue. D. Loop is allowed to run 25 times within one hour. If it does not end on its own the process will be stopped by R&D. Ans A. The updates create a loop and the org limits for workflow time triggers per hour will likely be violated. Q46 How would a developer change the field type of a custom field on account object from a string to an integer? A. Make the change in the declarative UI, then update the field type to an integer field in-the apex code. B. Remove all references in the code, make the change in the declarative UI, and restore the references with the new type. C. Make the change in the developer console, and then the change will automatically be reflected in the apex. D. Make the change in the declarative UI, and then the change will automatically be reflected in the apex code. Ans B. Remove all references in the code, make the change in the declarative UI, and restore the references with the new type. Q47 Which developer tool can be used to create a data model? (Choose 2) A. Force.com IDE B. Schema Builder C. Application Data Model Wizard D. Force.com Data Loader Ans A. Force.com IDE B. Schema Builder Q48 What is the name of the standard relationship from Account down to Contact? A. Accounts B. Contacts C. Account D. Contact Ans B. Contacts Q49 Which API cannot be used to create the data model? A. Force.com Single Sign-on API B. Force.com Metadata API C. AJAX Tookit for Force.com D. Force.com API Ans B. Force.com Metadata API Q50 What is a junction object? A. A custom object with two master-detail relationships. B. A custom object with one lookup relationship and one master-detail relationship. C. A custom object with two lookup relationships. D. A custom object with any number of lookup and master-detail relationships. Ans A. A custom object with two master-detail relationships. Q51 Which statement about declarations is correct? A. A developer can extend a class that is declared with Virtual keyword B. A developer can use define constant with final keyword. C. A developer can't use class or method using final keyword Ans B. A developer can use define constant with final keyword. Q52 Which permission is required to install and uninstall packages from Salesforce AppExchange? A. Manage Package Licenses B. Upload AppExchange Packages C. Download AppExchange Packages D. Create AppExchange Packages Ans C. Download AppExchange Packages Q53 In order to create an App Launcher component in lightning what must an admin do? A. Navigate to Setup-Customize-User Interface to enable the component for the Lightning App Builder. B. Contact Salesforce to have the component activated for the Lightning App Builder. C. Purchase a license for the Lightning App Builder. D. Join the pilot Lightning App Builder team Ans B. Contact Salesforce to have the component activated for the Lightning App Builder. Q54 A developer created trigger with following code , list lstAccounts = new list(); for(order__c objorder:trigger.new){ account a = ; lstAccounts .add(a); } update lstAccounts; How many order will be load when developer attempts to load 150 records? A. 0 B. 1 C. 100 D. 150 Ans A. 0 Q55 Which social networks are available in the Lightning Experience and Salesforce1? A. Klout B. Facebook C. LinkedIn D. Twitter Ans D. Twitter Q56 When a user creates a record by using an object-specific create action, what feed item for that record appears? (choose three) A. In the Chatter feed of the user who created the record B. In the feed for the record on which the new record was created C. In the user profile feed for all users who can view the record D. As the first entry in the feed for the new record E. In the Chatter feed of the first user who follows the record on which the record was created Ans A. In the Chatter feed of the user who created the record B. In the feed for the record on which the new record was created D. As the first entry in the feed for the new record Q57 You can create global actions to let users create which of the following records? (choose three) A. Question B. Chatter Posts C. Event (without invitees) D. Opportunity E. Users Ans A. Question C. Event (without invitees) D. Opportunity Q58 A salesperson at AW Computing only see's the Social Contact's link for Twitter and not Facebook on his records. Why would this be happening? A. Facebook is no longer supported by Social Contacts B. The administrator hasn't enabled Social Contacts for Facebook C. The salesperson's login with Facebook has expired D. None of his Facebook contacts have confirmed the nature of their relationship Ans B. The administrator hasn't enabled Social Contacts for Facebook Q59 A developer has completed work in the sandbox and is ready to send it to a related org, what deployment tool should be used? A. Change Sets B. Force.com IDE C. Unmanaged Packages D. Force.com Migration Tool Ans A. Change Sets Q60 When running an Apex test, which type of Apex syntax in tested code is counted in the code coverage calculation? A. A blank line. B. A System.debug() statement. C. A variable assignment. D. A comment. Ans C. A variable assignment. Q61 What is a capability of the Developer Console? A. Execute Anonymous Apex code, Run REST API, create/Edit code. B. Execute Anonymous Apex code, Create/Edit code, view Debug Logs. C. Execute Anonymous Apex code, Create/Edit code, Deploy code changes. D. Execute Anonymous Apex code, Run REST API, deploy code changes. Ans B. Execute Anonymous Apex code, Create/Edit code, view Debug Logs. Q62 Why would a developer use Test. startTest( ) and Test.stopTest( )? A. To avoid Apex code coverage requirements for the code between these lines B. To start and stop anonymous block execution when executing anonymous Apex code C. To indicate test code so that it does not Impact Apex line count governor limits. D. To create an additional set of governor limits during the execution of a single test class. Ans D. To create an additional set of governor limits during the execution of a single test class. Q63 What must the Controller for a Visualforce page utilize to override the Standard Opportunity view button? A. The StandardSetController to support related lists for pagination. B. the Opportunity StandardController for pre -built functionality. C. A callback constructor to reference the StandardController. D.A constructor that intrializes a private Opportunity variable. Ans B. the Opportunity StandardController for pre -built functionality. Q64 A developer uses a before insert trigger on the Lead object to fetch the Territory__c object, where the Territory__c.PostalCode__c matches the Lead.PostalCode. The code fails when the developer uses the Apex Data Loader to insert 10,000 Lead records. The developer has the following code block: Line-01: for (Lead l : Trigger.new){ Line-02: if (l.PostalCode != null) { Line-03: List terrList = ; Line-04: if(terrList.size() > 0) Line-05: l.Territory__c = terrList.Id; Line-06: } Line-07: } Which line of code is causing the code block to fail? A. Line-03: A SOQL query is located inside of the for loop code. B. Line-01: Trigger:new is not valid in a before insert Trigger. C. Line-02: A NullPointer exception is thrown if PostalCode is null. D. Line-05: The Lead in a before insert trigger cannot be updated. Ans A. Line-03: A SOQL query is located inside of the for loop code. Q65 What would a developer do to update a picklist field on related Opportunity records when a modification to the associated Account record is detected? A. Create a process with Process Builder. B. Create a workflow rule with a field update. C. Create a Lightning Component. D. Create a Visualforce page. Ans A. Create a process with Process Builder. Q66 Which requirement needs to be implemented by using standard workflow instead of Process Builder? Choose 2 answers A. Create activities at multiple intervals. B. Send an outbound message without Apex code. C. Copy an account address to its contacts. D. Submit a contract for approval. Ans A. Create activities at multiple intervals. B. Send an outbound message without Apex code. Q67 An org has different Apex Classes that provide Account -related functionality. After a new validation rule is added to the object, many of the test methods fail. What can be done to resolve the failures and reduce the number of code changes needed for future validation rules? Choose 2 answers: A. Create a method that creates valid Account records, and call this method from within test methods. B. Create a method that loads valid Account records from a Static Resource, and call this method within test methods. C. Create a method that performs a callout for a valid Account record, and call this method from within test methods. D Create a method that queries for valid Account records, and call this method from within test methods. Ans A. Create a method that creates valid Account records, and call this method from within test methods. B. Create a method that loads valid Account records from a Static Resource, and call this method within test methods. Q68 Which component is available to deploy using Metadata API?Choose 2 answers A. Case Layout B. Account Layout C. Case Feed Layout D. ConsoleLayout Ans A. Case Layout B. Account Layout Q69 In the code below, what type does Boolean inherit from? Boolean b= true; A. Enum B. Object C. String D. Class Ans B. Object Q70 What is the preferred way to reference web content such as images, style sheets, JavaScript, and other libraries that is used in Visualforce pages? A. By accessing the content from Chatter Files. B. By uploading the content in the Documents tab. C. By accessing the content from a third -party CON. D. By uploading the content as a Static Resource. Ans D. By uploading the content as a Static Resource. Q71 A company has a custom object named Warehouse. Each Warehouse record has a distinct record owner, and is related to a parent Account in Salesforce. Which kind of relationship would a developer use to relate the Account to the Warehouse? A. One -to -Many B. Lookup C. Master -Detail D. Parent -Child Ans B. Lookup Q72 A developer creates a Workflow Rule declaratively that updates a field on an object. An Apex update trigger exists for that object. What happens when a user updates a record? A. No changes are made to the data. B. Both the Apex Trigger and Workflow Rule are fired only once. C. The Workflow Rule is fired more than once. D. The Apex Trigger is fired more than once. Ans D. The Apex Trigger is fired more than once. Q73 What is true for a partial sandbox that is not true for a full sandbox? Choose 2 answers: A. More frequent refreshes. B. Only Includes necessary metadata. C. Use of change sets. D. Limited to 5 GB of data. Ans A. More frequent refreshes. D. Limited to 5 GB of data. Q74 In which order does SalesForce execute events upon saving a record? A. Before Triggers; Validation Rules; After Triggers; Assignment Rules; Workflow Rules; Commit B. Validation Rules; Before Triggers; After Triggers; Workflow Rules; Assignment Rules; Commit C. Before Triggers; Validation Rules; ilter Triggers; Workflow Rules; Assignment Rules; Commit D. Validation Rules; Before Triggers; After Triggers; Assignment Rules; Workflow Rules; Commit Ans A. Before Triggers; Validation Rules; After Triggers; Assignment Rules; Workflow Rules; Commit Q75 public class customController { public string cString { get; set;} public string getStringMethod1(){ return cString; } public string getStringMethod2(){ if(cString == null) cString = 'Method2'; return cString; } } {!cString}, {!StringMethod1}, {!StringMethod2}, {!cString} What does the user see when accessing the custom page? A. getMyString, B. , , Method2, C.Method2, getMyString D. getMyString„ Method2, getMyString Ans B. , , Method2, Q76 What is a valid Apex statement? A. Map conMap = (SELECT Name FROM Contact); B. Account acctList = new List{new Account()} C. Integer w, x, y = 123, z = 'abc', D private static constant Double rate = 775; Ans D.private static constant Double rate = 775; Q77 String nextPage = controller.save().getUrl(); A developer has a single custom controller class that works with a Visualforce Wizard to support creating and editing multiple sObjects. The wizard accepts data from user inputs across multiple Visualforce pages and from a parameter on the initial URL Which statement is unnecessary inside the unit test for the custom controller? A. public ExtendedController (ApexPages.StandardController cntrl) { } B. ApexPages.currentPage().getParameters().put('input', 'TestValue') C. Test.setCurrentPage(pageRef), D. String nextPage = controller.save().getUrl(); Ans B. Account acctList = new List{new Account()} Q78 A developer wants to display all of the available record types for a Case object. The developer also wants to display the picklist values for the Case.Status field. The Case object and the Case Status field are on a custom visualforce page. Which action can the developer perform to get the record types and picklist values in the controller? Choose 2 answers A. Use Schema.PIcklistEntry returned by Case Status getDescribe().getPicklistValues(). B. Use Schema.RecordTypeinfo returned by Case.SObjectType getDescribe().getRecordTypelnfos() C. Use SOQL to query Case records in the org to get all the RecordType values available for Case. D. Use SOQL to query Case records in the org to get all value for the Status picklist field. Ans A. Use Schema.PIcklistEntry returned by Case Status getDescribe().getPicklistValues(). B. Use Schema.RecordTypeinfo returned by Case.SObjectType.getDescribe().getRecordTypelnfos() Ref:https://developer.salesforce.com/docs/atlas.en-us.apexcode.meta/apexcode/apex_class_Schema_RecordTypeInfo.htm#apex_class_Schema_RecordTypeInfo https://developer.salesforce.com/docs/atlas.en-us.apexcode.meta/apexcode/apex_class_Schema_PicklistEntry.htm%23apex_class_Schema_PicklistEntry Q79 An sObject named Application_c has a lookup relationship to another sObject named Position_c. Both Application _c and Position_c have a picklist field named Status_c. When the Status_c field on Position_c is updated, the Status_c field on Application_c needs to be populated automatically with the same value, and execute a workflow rule on Application_c. How can a developer accomplish this? A. By changing Application_c.Status_c into a roll -up summary field. B. By changing Application_c.Status_c into a formula field. C. By using an Apex trigger with a DML operation. D. By configuring a cross-object field update with a workflow. Ans B. By changing Application_c.Status_c into a formula field. Q80 A developer wrote a workflow email alert on case creation so that an email is sent to the case owner manager when a case is created? When will the email be sent? A. Before Trigger execution B. After Committing to database. C. Before Committing to database D. After Trigger execution. Ans B. After Committing to database. Read the full article
0 notes
Text
5 Methods to Bypass Blocked Sites

You’re at work or school, but you want to check on Facebook, or watch something on YouTube. It’s blocked. Surprise, surprise. We’ve all been faced with it, and subsequently got annoyed. Now, you’ve two options: be productive instead, or try and bypass the filter. Let’s face it, most of us would choose the latter, particularly if you need to view Twitter for research purposes (wink, wink). But how would you do that? Here are some of your options…
1. Use a VPN

Your best bet is using a Virtual Private Network (VPN). You’ve probably heard a bit about them, but they’re not as complicated as they initially sound. VPNs are best known for adding a much-needed layer of security and privacy using encryption — that’s useful if you’re entering sensitive information and are worried about hackers, or, as in this case, bypassing blocks. These networks connect you to a website via an encrypted “tunnel”, which scrambles data travelling through it either way. Though it’s certainly not fool-proof, you can generally rely on this level of encryption. Similarly, this is a dependable way of visiting blocked sites, but can require a bit of effort to install. The TOR browser, however, is easy to download and run. The reason it works is because any software trying to keep an eye on your browsing instead only sees that you’re using a VPN. Without considerable work, no one will be able to monitor URLs: cybercriminals might put in the effort to view your data, but it’s doubtful your employer or educational institution ever will. It might also be worth downloading a VPN app onto your smartphone or tablet, if you plan on using it somewhere access is often blocked.
2. Bypass Firewalls Using Proxies
Most treat VPNs and proxy servers as interchangeable, but the latter lacks the encryption software that protects a lot of your data. That’s not to say it’s useless or a massive threat to your privacy though! Quite the opposite in fact: proxies hide your Internet Provider (IP) address — which anyone can trace back to your computer — making your searches anonymous by instead displaying the proxy’s IP. There are literally thousands of proxy sites on the web. There are also sites that list proxy servers. Do a quick search online. You’ll be bombarded with free services, and, of course, plenty of paid-for ones. The former should be acceptable if you’re just bypassing a site now and then, but if you need a proxy on a regular basis, and are looking for something more secure (and anonymous), consider whether it’s worth paying. Don’t be put off. It’s not very difficult to set up a proxy server, no matter what browser you’re using, to get past restrictions.
3. UltraSurf

This is a seriously popular tool for bypassing blocked websites — except you’ll initially be put off because it uses Internet Explorer as default. That’s in its basic form, with no installation required, so download the EXE file onto a USB drive and run it whenever you need it. It will open Internet Explorer with the UltraSurf homepage. From there, the web is your oyster. Fortunately, you can use it on most browsers; notably, an add-on for Chrome and Firefox, but you can manually install it elsewhere. Though it’s only available on Windows right now, Mac and Linux trials are taking place. The good thing is, it’s fast, because it routes you through a possible three servers so you get highly reliable speeds. You might initially be put off using Internet Explorer, but this, too, can be a benefit, as it’s what you have on IT lockdown. Therefore, it doesn’t look suspicious and you don’t need to have two different browsers open at the same time. Once you close UltraSurf, it erases your history and cookies. Its main purpose is altruistic. UltraSurf was developed to get around the so-called Great Firewall of China. However, many have complained about pop-up ads, and some security suites take issue with it. You also have to make sure you’re using the authentic version: otherwise, “exe” files are often used by hackers to add malware to your device.
4. Remote Access
The idea of remote access might have negative connotations — either you immediately think of hackers, or you recall the last time you’ve had to phone a computer helpline to get someone else to sort out an infuriating PC problem. But it’s not all bad. Essentially, remote access is taking control of your computer without actually sitting in front of it. To do so, you’ll need to download a handy bit of software: it doesn’t really matter whether you use popular remote connectivity programs like LogMeIn, or opt for one of the lesser-known ones. The important thing is that you can now browse the internet at your leisure — by using your own computer remotely! It might lag a bit, but it works brilliantly! Of course, you’re then not confined solely to the web; you can use remote access to use any software on your computer, too.
5. Use RSS Feeds

There used to be a great way of getting any web page direct to your email address: in response to a URL in a subject line, WebToMail emailed you the contents of a webpage. Image Credits: Orin Zebest via Flickr. Sadly, that no longer works. Fortunately, you can still get articles and the like in your Inbox using RSS feeds. These are syndicated editions of pieces regularly collated and distributed to email addresses and RSS Readers, saving users the time spent visiting individual sites. It also affords some privacy by not forcing them into subscribing to email newsletters. Not every site has one, but that’s okay because you can easily create one! There are limitations, naturally — you won’t be able to scour YouTube, for example. Still, you definitely shouldn’t discount the usefulness of these feeds for other sites you frequent but don’t have access to otherwise. How Do You Bypass Restrictions? Don’t forget: you’ll likely get in a heap of trouble if you’re caught bypassing a block. That could mean a warning or monitoring at work, or expulsion from class detention at school. But how do you bypass blocked or censored websites? Have I missed the best? What do you think? Read the full article
0 notes
Text
Write down Block Diagram of Computer? Or Write down the Processes of Computers?
Q.1) Write down Block Diagram of Computer? Or Write down the Processes of Computers? Answer:- Computer Definition:- The word computer comes from the word “compute”, which means, “to calculate”. A computer is an electronic device that can perform arithmetic operations at high speed and it can process data, pictures, sound and graphics. It can solve highly complicated problems quickly and accurately. A computer is also called a data processor because it can store, process, and retrieve data whenever desired.
The Computer system has mainly 3 parts that is :- 1) Input Unit 2) central processing unit (CPU) 3) Output Unit Explanation of Computer Processes:- Input Unit :- An Input Unit accept the input from the outside world. There are many kinds of input devices like Keyboard , Mouse etc. There are mainly 3 functions of input device are as follows:- It accepts (or reads) instructions and data from outside world. It converts these instructions and data in computer acceptable form. It supplies the converted instructions and data to the computer system for further processing. CPU :- It is responsible for processing all the Instruction which is given to computer system or PC. The CPU is known as the heart /Brain of a computer because without the necessary action taken by the CPU the user cannot get the desired output. The Central processing unit (CPU) again consists of 3 parts:- ALU (Arithmetic Logic Unit) CU (Control Unit ) Memory Unit ALU:- It performs simple arithmetic operation such as +,-, *, / and logical operation such as >, Read the full article
0 notes
Text
Generations of Computers

The development of electronic computers can be divided into five generations depending upon the technologies used. The following are the five generations of computers. First Generation of Computers (1942-1955)

The beginning of commercial computer age is fromUNIVAC (Universal Automatic Computer). It was developed by two scientists Mauchly and Echert at the Census Department of United States in 1947.The first generation computers were used during 1942-1955. They were based on vacuum tubes. Examples of first generation computers are ENIVACand UNIVAC-1. Advantages Vacuum tubes were the only electronic component available during those days. Vacuum tube technology made possible to make electronic digital computers. These computers could calculate data in millisecond. Disadvantages The computers were very large in size. They consumed a large amount of energy. They heated very soon due to thousands of vacuum tubes. They were not very reliable. Air conditioning was required. Constant maintenance was required. Non-portable. Costly commercial production. Limited commercial use. Very slow speed. Limited programming capabilities. Used machine language only. Used magnetic drums which provide very less data storage. Used punch cards for input. Not versatile and very faulty. Second Generation Computers (1955-1964)

The second generation computers used transistors. The scientists at Bell laboratories developed transistor in 1947. These scientists include John Barden, William Brattain and William Shockley. The size of the computers was decreased by replacing vacuum tubes with transistors. The examples of second generation computers are IBM 7094 series, IBM 1400 series and CDC 164 etc. Advantages Smaller in size as compared to the first generation computers. The 2nd generation Computers were more reliable Used less energy and were not heated. Wider commercial use Better portability as compared to the first generation computers. Better speed and could calculate data in microseconds Used faster peripherals like tape drives, magnetic disks, printer etc. Used Assembly language instead of Machine language. Accuracy improved. Disadvantages Cooling system was required Constant maintenance was required Commercial production was difficult Only used for specific purposes Costly and not versatile Puch cards were used for input. Third Generation Computers (1964-1975)

The Third generation computers used the integrated circuits (IC). Jack Kilby developed the concept of integrated circuit in 1958. It was an important invention in the computer field. The first IC was invented and used in 1961. The size of an IC is about ¼ square inch. A single IC chip may contain thousands of transistors. The computer became smaller in size, faster, more reliable and less expensive. The examples of third generation computers are IBM 370, IBM System/360,UNIVAC 1108 and UNIVAC AC 9000 etc. Advantages Smaller in size as compared to previous generations. More reliable. Used less energy Produced less heat as compared to the previous two generations of computers. Better speed and could calculate data in nanoseconds. Used fan for heat discharge to prevent damage. Maintenance cost was low because hardware failure is reare. Totally general purpose Could be used for high-level languages. Good storage Versatile to an extent Less expensive Better accuracy Commercial production increased. Used mouse and keyboard for input. Disadvantages Air conditioning was required. Highly sophisticated technology required for the manufacturing of IC chips. Fourth Generation Computers (1975-Present)

The fourth generation computers started with the invention of Microprocessor. The Microprocessor contains thousands of ICs. Ted Hoff produced the first microprocessor in 1971 for Intel. It was known as Intel 4004. The technology of integrated circuits improved rapidly. The LSI (Large Scale Integration) circuit and VLSI (Very Large Scale Integration) circuit was designed. It greatly reduced the size of computer. The size of modern Microprocessors is usually one square inch. It can contain millions of electronic circuits. The examples of fourth generation computers are Apple Macintosh & IBM PC. Advantages More powerful and reliable than previous generations. Small in size Fast processing power with less power consumption Fan for heat discharging and thus to keep cold. No air conditioning required. Totally general purpose Commercial production Less need of repair. Cheapest among all generations All types of High level languages can be used in this type of computers Disadvantages The latest technology is required for manufacturing of Microprocessors. Fifth Generation Computers (Present & Beyond) Scientists are working hard on the 5th generation computers with quite a few breakthroughs. It is based on the technique of Artificial Intelligence (AI). Computers can understand spoken words & imitate human reasoning. Can respond to its surroundings using different types of sensors. Scientists are constantly working to increase the processing power of computers. They are trying to create a computer with real IQ with the help of advanced programming and technologies. IBM Watson computeris one example that outsmarts Harvard University Students. The advancement in modern technologies will revolutionize the computer in future. Read the full article
0 notes
Text
Does your Wi-Fi feel slow? Here’s how you can fix it

Read the full article
0 notes
Text
What is a computer ?

Introduction
Basically, a computer is an electronic device which is capable of receiving information (data) in a particular form and of performing a sequence of operations in accordance with a predetermined but variable set of procedural instructions (program) to produce a result in the form of information or signals. In order to do these things, a computer uses different programs for specific tasks. For example, it has a word processing program for typing letters and a program called a Web Browser for searching and browsing the internet. Computers also come in different shapes and sizes e.g. laptops, desktops and tablets but they are all able to perform the same or similar tasks. Beginnings Charles Babbage is called the "Grand Father" of the computer. The First mechanical computer designed by Charles Babbage was called Analytical Engine. It uses read-only memory in the form of punch cards. Computer is an advanced electronic device that takes raw data as input from the user and processes these data under the control of set of instructions (called program) and gives the result (output) and saves output for the future use. It can process both numerical and non-numerical (arithmetic and logical) calculations. Digital Computer Definition The basic components of a modern digital computer are: Input Device, Output Device, Central Processor Unit (CPU), mass storage device and memory. A Typical modern computer uses LSI Chips. Four Functions about computer are: Accepts Data -Input Processes Data -Processing Produces Output -Output Stores Results -Storage

Input (Data) Input is the raw information entered into a computer from the input devices. It is the collection of letters, numbers, images etc. Process Process is the operation of data as per given instruction. It is totally internal process of the computer system. Output Output is the processed data given by computer after data processing. Output is also called as Result. We can save these results in the storage devices for the future use. From science project to everyday tool Computers were initially of interest only to scientists and engineers. But from the human–computer interaction theories of mouse inventor Douglas Engelbart in the 1960s to the release of the Apple Macintosh computer in 1984, they became easier to use and more capable of tasks that ordinary people could carry out. Now, with the spread of personal computers (PCs), mobile phones, notebooks and tablets, computers have become part of our everyday lives. It's almost impossible to imagine modern society without them. Highlights in the development of the computer Computers started out as huge racks of glass valves and wires that occupied multiple rooms and weighed tons. Now they can fit on tiny microchips that are barely larger than an ant and are millions of times more powerful than the first ones. Computers have a huge variety of uses. Originally employed to break enemy codes and calculate artillery trajectories, they're now used for everything from word processing and spreadsheets to mobile phones and playing games. The number of computers in the world has risen incredibly. Urban myth has it that, in the 1950s, the head of IBM estimated a global market for five – yes, five – computers. But within the next few years, it's expected that there will be 2 billion computers – and that figure doesn't even include computers built into other devices. In the late 1960s, the American government created ARPANET, a network that allowed the few university and military computers in the US to talk to each other. This eventually turned into the internet, a global web that connects well over a billion computers – and people – to each other. Read the full article
0 notes
Text
Write down Block Diagram of Computer? Or Write down the Processes of Computers?
Q.1) Write down Block Diagram of Computer? Or Write down the Processes of Computers? Answer:- Computer Definition:- The word computer comes from the word “compute”, which means, “to calculate”. A computer is an electronic device that can perform arithmetic operations at high speed and it can process data, pictures, sound and graphics. It can solve highly complicated problems quickly and accurately. A computer is also called a data processor because it can store, process, and retrieve data whenever desired.
The Computer system has mainly 3 parts that is :- 1) Input Unit 2) central processing unit (CPU) 3) Output Unit Explanation of Computer Processes:- Input Unit :- An Input Unit accept the input from the outside world. There are many kinds of input devices like Keyboard , Mouse etc. There are mainly 3 functions of input device are as follows:- It accepts (or reads) instructions and data from outside world. It converts these instructions and data in computer acceptable form. It supplies the converted instructions and data to the computer system for further processing. CPU :- It is responsible for processing all the Instruction which is given to computer system or PC. The CPU is known as the heart /Brain of a computer because without the necessary action taken by the CPU the user cannot get the desired output. The Central processing unit (CPU) again consists of 3 parts:- ALU (Arithmetic Logic Unit) CU (Control Unit ) Memory Unit ALU:- It performs simple arithmetic operation such as +,-, *, / and logical operation such as >, Read the full article
0 notes
Text
Microsoft Reveals End-Of-Sales Date For Windows 7 And Windows 8.1 Devices
By now most Windows users have upgraded to Windows 10. However, some people are still using Windows 8.1 or Windows 7 while others are looking to buy a new laptop, desktop or tablet with Windows 8.1 or 7 pre-installed. If you are one of these people then you have less than a year to do so as Microsoft has just announced that it will be discontinuing both Windows 8.1 and Windows 7. According to the Microsoft Windows Lifecycle Fact Sheet, October 31st, 2016 is marked as the "end of sales for PCs with Windows 8.1 or Windows 7 pre-installed. After October 31st, 2016 the only option for customers will be to purchase new computers with Windows 10 installed. The only exception to this will be businesses with license agreements that entitle them to choose which version of Windows they wish to have pre-installed. This deadline will be putting a lot of pressure on consumers who have become quite attached to Windows 7 and may be very apprehensive to upgrading to Windows 10 if they buy a new computer. However, this is a logical and necessary step for Microsoft in its goal of having more than 1 billion Windows 10 devices powered up. This also goes along with the company's message that Windows 10 is capable of bringing together desktops, laptops, tablets, and smartphones with apps that can run across every platform. What Windows 7 users don't really realize is that this is actually really good for them. Microsoft usually sets the end-of-date for each version of Windows two years after the release of a new operating system. This means that the cutoff date for Windows 7 should have been October of 2014, which was two years after the launch of Windows 8. However, the severe lack of consumer demand for Windows 8 insisted that Microsoft keep the operating system around a while longer. Windows 8, if you remember, was Microsoft's attempt at making a touch-friendly operating system, though it transitioned horribly onto non-touch devices and was highly panned by users. If you want to continue using Windows 7 on your existing PC or laptop then you don't have to worry. Microsoft has announced that extended technical support will be available until January 14, 2020, meaning that you will be able to continue receiving patches, bug fixes, and other updates. This support is also offered to Windows 8.1 users, though it is extended to January 23rd, 2023. Despite these deadlines, Microsoft is still heavily pushing Windows 10 to users. The new operating system, which came to users at the end of July of this year, is available as a free upgrade to users of Windows 7 or Windows 8.1 for the first year of its existence. Microsoft keeps sneaking in pop-ups on the regular to remind users that Windows 10 is available. Microsoft also classified Windows 10 as an "optional update" and, as early as next year, expects to change that to a "recommended update" according to Windows and Devices Group Executive Vice President terry Myerson. I have been using Windows 10 since it launched and it's really good. It takes the best things from Windows 7 and puts them in a modern format with new features and apps that really do bring all of your devices together. In addition to that, non-touchscreen users don't feel like they've been given second billing to touchscreen users, something that Windows 8 seemed to do. If you are looking for a Windows 7 or Windows 8.1 computer or laptop, you better move quick because this time next year that won't be an option. Read the full article
0 notes
Text
Microsoft Gives You The Windows 10 Upgrade Whether You Want It Or Not!

Microsoft recently confirmed that it has been pre-loading Windows 10 installation bits onto devices whose owners have not "reserved" a copy of the operating system, let alone showed any interest in it at all. Naturally, this has upset some users of Windows 7 and Windows 8.1 with many complaining that the unsolicited downloads have caused them to exceed data caps from their internet service providers or seized storage space without their consent. Microsoft released a statement acknowledging the downloads stating, "For those who have chosen to receive automatic updates through Windows Update, we help customers prepare their devices for Windows 10 by downloading the files necessary for future installation. This results in a better upgrade experience and ensures the customer's device has the latest software. This is an industry practice that reduces the time for installation and ensures device readiness." If a Windows 7 or Windows 8.1 user has Windows Update set to the default option, which was recommended by Microsoft, that allows the operating system to download and install security and other bug patches automatically in the background then Microsoft will push the Windows 10 upgrade files to the drive. This upgrade can range from over 3GB to almost 6GB and is placed in the hidden "$Windows.~BT" folder. This folder has long been a destination for Windows upgrades and the Windows 10 upgrade will remain here until the user expresses an interest in installing the operating system...at least that's what we hope. Microsoft has been pre-loading the Windows 10 upgrade on systems since the end of July, though it was believed that the practice was limited to PCs whose users had accepted Microsoft's free offer and reserved a copy of the operating system through an app the company automatically installed back in the spring and early summer on nearly every single PC running Windows 7 Home and Windows 8.1 Home, and on many PCs running Windows 7 Professional and Windows 8.1 Professional. Once the Windows 10 upgrade was downloaded to the device, the user was notified via the app that installation was ready. But this new scheme is completely different in the fact that the bits are downloaded to the PC, regardless of the fact that the user has not asked for the upgrade whatsoever. What's not surprising is the people who noticed this first were the ones with data caps mandated by their internet service providers, especially those who relied on cellular connection to the internet. There is a particularly long thread on Slashdot that has several commenters claiming that they had exceeded their caps because Microsoft downloaded this massive update to their devices without their approval. One comment reads, "I had to travel recently, so I took a laptop with clean Windows 8.1 Pro install. At my destination, I purchased a SIM (they only had 1GB data packages) and put it into the 3G/Wi-Fi router I carry. I powered the laptop, connected to Internet via said router, checked a few things, then went away for a few hours. When I got back to the apartment, my data package (and Internet connectivity) was killed because Microsoft idiots decided to start downloading Windows 10 even though I have explicitly closed/rejected all the offers." Other users did not appreciate the unwanted upgrade that landed on their limited storage space. Anyone with a 128GB SSD would be very unhappy if 5% of their storage capacity was suddenly occupied without their approval. Others wondered whether Microsoft would take the next logical step by either giving users notifications telling them to apply the installed upgrade or make the move of triggering the download automatically. If they triggered the download automatically it wouldn't be much different from what they've already done with those users who accepted the free upgrade and reserved a copy. It is also possible that a lot of users on the receiving end of the notifications would approve of the upgrade or even appreciate the fact they didn't have to wait a long time for the download to complete. However, if Microsoft downloaded the update without consent (again) then the people may very well grab their torches and pitchforks. Read the full article
0 notes
Text
Microsoft releases new Windows 10 preview with 16 bug fixes ahead of October 2018 Update

Microsoft today released a new preview for PCs with 16 bug fixes. This build is from the RS5 branch, which represents the Windows 10 update the company plans to release later this year (likely in October 2018). The company is also releasing builds from the 19H1 branch, which, as its name indicates, will arrive in the first half of next year. Windows 10 is being developed as a service, meaning it receives new features on a regular basis. Microsoft has released five major updates so far: November Update, Anniversary Update, Creators Update, Fall Creators Update, and April 2018 Update. We don’t yet know what the next update will be called, but the rumor is it will be “Windows 10 October 2018 Update.” Assuming this is true, Windows Insiders will likely see RS5 finalized in September, and the public will get it a month later. Given that Microsoft has stopped adding features and is now solely focused on stability, this timeline looks plausible. That said, the previous update arrived on the last day of the month after some delays. This desktop build includes the following general bug fixes and improvements: Fixed an issue where on Windows 10 in S Mode, launching Office in the Store might fail to launch with an error about a .dll not being designed to run on Windows. Fixed an issue where downloading a big file in Microsoft Edge would stop at the 4gb mark. Fixed an issue where clicking the “more” button in Microsoft Edge’s inline definition pop up when reading in recent flights would open a blank pane. Fixed an issue where items in Microsoft Edge’s Settings and More menu would become truncated when the option to increase text size was enabled in Settings. Fixed an issue where using Find on page in Microsoft Edge didn’t highlight/select the current instance of the result. Fixed an issue where after resetting Microsoft Edge saved favorites would get stuck showing a star next to the favorite name rather than populating the website’s favicon (if available). Fixed an issue where text copied from certain websites in Microsoft Edge couldn’t be pasted into other UWP apps. Fixed an issue impacting Teams resulting all unsent typed text disappearing following the completion of an emoji composition (for example ":)" 🙂 being turned into a smiley). Fixed an issue from recent flights where hiberfil.sys would unexpectedly reappear after upgrading even if it had been disabled. Fixed an issue that was highly impacting Start performance and reliability in the last few flights. Made some adjustments to improve the time it takes to render the Task Manager window on launch. Fixed an issue that could result in the left side of the Microsoft Store’s My Library section becoming unexpectedly blurry until moused over. Fixed a recent issue resulting in an increase in the amount of time taken to open large files in Notepad when word wrap was enabled. Fixed an issue where after setting a pin and removing it, the option to setup a pin from the lock screen could get stuck as the default login method, rather than the login screen remembering your preferred login method. Fixed an issue resulting in WSL’s tar and curl commands not working on x86 devices. Fixed an issue resulting in text prediction and shapewriting not working when typing in Russian using the touch keyboard. Today’s update bumps the Windows 10 build number for the RS5 branch from 17735 (made available to testers on August 10) to build 17738. This build has seven known issues: Your PC will bugcheck (GSOD) when deleting a local folder that is synced to OneDrive. When you upgrade to this build you’ll find that the taskbar flyouts (network, volume, etc) no longer have an acrylic background. When you use the Ease of Access Make Text bigger setting, you might see text clipping issues, or find that text is not increasing in size everywhere. Narrator sometimes does not read in the Settings app when you navigate using Tab and arrow keys. Try switching to Narrator Scan mode temporarily. And when you turn Scan mode off again, Narrator will now read when you navigate using Tab and arrows key. Alternatively, you can restart Narrator to work around this issue. When using Narrator Scan mode Shift + Selection commands in Microsoft Edge, the text does not get selected properly. After setting up a Windows Mixed Reality headset for the first time on this build with motion controllers, the controllers may need to be re-paired a second time before appearing in the headset. An issue where IMEs are not able to type East Asian characters into certain text fields when using Microsoft Edge. As always, don’t install this on your production machine. Read the full article
0 notes
Text
Xbox Live is down

Xbox Live isn’t working for everyone at the moment. Microsoft has confirmed the issue on its Xbox Live status site, and players are complaining about the outage on social media. This is preventing people from signing into Xbox Live, which causes issues loading just about any digital purchase on the platform. If you are unable to sign into Xbox Live, you will have difficulty loading up your downloaded games — although physical discs should still work if you go into offline mode. This outage is also causing issues for people trying to watch streaming video on Netflix, Amazon Prime, Hulu, and more. Microsoft says it is working to address the connectivity errors. “Our engineers and developers are actively continuing to work to resolve the issue causing some members to have problems signing in to Xbox Live,” reads the status page. While Xbox Live is primarily known as the networking service on Xbox One, this is also a problem for anyone using the service to connect with friends in Minecraft on mobile phones or to launch Microsoft games like Sea of Thieves on PC. The publisher has noted that Xbox Live is down across Xbox One, Xbox 360, Windows 10, and other devices. Read the full article
0 notes