Pages

Monday, 2 February 2015

what is paypal account.

A PayPal Personal Account is the right choice if you're a buyer: Shop securely on merchant websites and eBay. Make purchases with your credit card, debit card, or bank account. Send money to friends, family, or anyone with an email address.

PayPal is an American, international digital wallet based e-commerce business allowing payments and money transfers to be made through the Internet. Online money transfers serve as electronic alternatives to paying with traditional paper methods, such as checks and money orders.

PayPal is one of the world's largest internet payment companies. The company operates as an acquirer, performing payment processing for online vendors, auction sites and other commercial users, for which it charges a fee.

Established in 1998, PayPal (NASDAQ: PYPL) had its IPO in 2002, and became a wholly owned subsidiary of eBay later that year. In 2013, PayPal moved $180 billion in 26 currencies across 193 nations, generating a total revenue of $6.6 billion (41% of eBay’s total profits). In 2014, eBay announced plans to spin-off PayPal into an independent company the following year.

what is pancard

Permanent Account Number (PAN) is a ten-digit alphanumeric number, issued in the form of a laminated card, by the Income Tax Department, to any “person” who applies for it or to whom the department allots the number without an application.

What is a PAN Card?

It is a laminated card issued by the Indian Income Tax Department, that can be considered as an ID bearing a unique 10 digit alpha numeric permanent account number also known as PAN; which is now mandatory for Non resident & international organizations if they wish to carry any kind of financial transaction in India.

Is it compulsory for a NRI?

With effect from April 1st, 2007, it is compulsory for NRIs, Foreign citizens & international firms.

HOW you can get it internationally?

You need to quote it on all kinds of money related transactions in India, like buying property, opening demat/bank account, carrying business, etc.

What does a PAN card contain?

It contains your permanent account number, name, birth date, father's name, photo, Govt hologram & signature.

Who is eligible to apply for it?

Anyone of any age can register for one.

Does a NRI pay tax, if he gets a it?

Getting a PAN does not mean you have to pay taxes.
You pay tax only if you make money in India.

what is oauth

OAuth is an open standard to authorization. OAuth provides client applications a 'secure delegated access' to server resources on behalf of a resource owner. It specifies a process for resource owners to authorize third-party access to their server resources without sharing their credentials.

It is important to realize OAuth is a way to authenticate users - to ensure a user is who he says he is. The protocol was designed to circumvent problems with the sharing of user credentials in distributed and Web 2.0 environments. With OAuth, resources stored on one website can be shared or accessed by a user once he is authenticated via OAuth. There is no need for the user to create a new account on the website and, at the same time, the website is not privy to the user's credentials.

OAuth operates much like a client/server computing model, where a primary website storing the user resources acts as a server and the website or application accessing that data is a client. The primary website establishes an OAuth interface (otherwise called an API) and secret key for the requesting website as a means of establishing a session to validate the user. Once the user requests access to the data or resources of the client website, he or she takes a side trip and is forwarded to the login procedure of the primary website, at which time the user provides his or her login credentials. Upon successful authentication there, an authorization token is sent from that primary website to the requesting website as an acknowledgment of authentication - allowing the user the access of data or other resources originally requested.
 

how to change passwords in sbi internet banking

 internet banking password

1)   login to your sbi internet banking account

2)   choose the profile on the menu

3)   choose the change passwords

4) enter your profile password

5)  choose he login password

6) enter the old password first column

7) enter the new password in second column

8) re enter the new password in third column

9) enter the submit button

what is hardware and software

Computer software, on the other hand, is not something you can touch. Software is a set of instructions for a computer to perform specific operations. You need both hardware and software for a computer system to work. Some hardware components are easy to recognize, such as the computer case, keyboard, and monitor.

A computer system consists of two major elements: hardware and software. Computer hardware is the collection of all the parts you can physically touch. Computer software, on the other hand, is not something you can touch. Software is a set of instructions for a computer to perform specific operations. You need both hardware and software for a computer system to work.

Some hardware components are easy to recognize, such as the computer case, keyboard, and monitor. However, there are many different types of hardware components. In this lesson, you will learn how to recognize the different components and what they do. 

what is yarn in hadoop

YARN is one of the key features in the second-generation Hadoop 2 version of the Apache Software Foundation's open source distributed processing framework. Originally described by Apache as a redesigned resource manager, YARN is now characterized as a large-scale, distributed operating system for big data applications.

YARN is the central point of investment for Hortonworks within the Apache community. In fact, YARN was originally proposed (MR-279) and architected by one of our founders, Arun Murthy. Our engineers have been working within the Hadoop community to deliver and improve YARN for years. It has matured to become the solid, reliable architectural center of Hadoop and is a foundational component.

While relied upon by thousands, YARN can always be improved, especially with new engines emerging to interact with Hadoop data. To this end, Hortonworks has laid out the following investment themes for this foundational technology.

how to change password in sbi internet banking

 internet banking password

1)   login to your sbi internet banking account

2)   choose the profile on the menu

3)   choose the change passwords

4) enter your profile password

5)  choose he login password

6) enter the old password first column

7) enter the new password in second column

8) re enter the new password in third column

9) enter the submit button

what is 3d printing

3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. The creation of a 3D printed object is achieved using additive processes. In an additive process an object is created by laying down successive layers of material until the entire object is created. Each of these layers can be seen as a thinly sliced horizontal cross-section of the eventual object.

how to change gmail password

Change your Google Account password
Forgot password

If you forgot your password, type your username on the trouble signing in page to reset your password.
Change password

To change your Google Account password, go to the change your password page.

Or you can follow the steps listed below:

    Go to your Google Account Settings page.
    In the Signing in section, click Password.

Remember that changing your Google Account password changes it for all Google products you use, like Gmail and YouTube, so be sure to use your new password the next time you sign in.
Password requirements

Here are a few rules to keep in mind when choosing a password:

    Passwords must be at least 8 characters long.
    You can’t reuse a password that you've used in the last year.
    Passwords can contain the following characters:
        Upper and lowercase letters (A-Z and a-z). Please note that passwords are case-sensitive, so a "G" is different from a "g".
        Numbers (0-9).
        The following symbols as well as spaces: ! " # $ % & ‘ ( ) * + , - . / : ; < = > ? @ [ \ ] ^ { | } ~
    Certain passwords that are easy to guess like "12345678" can’t be chosen.

Creating a strong password

To keep your account safe, here are a few tips on how to create a strong password:

    Use a different password for each of your important accounts, like your email and online banking accounts. Choosing the same password for each of your online accounts is like using the same key to lock your home, car and office – if a criminal gains access to one, they can break in to all.
    Use a mix of letters, numbers, and symbols in your password.
    Try using a phrase that only you know. For example, “My friends Tom and Jasmine send me a funny email once a day” and then use numbers and letters to recreate it. “MfT&Jsmafe1ad” is a password with lots of variations.

how to use vlookup

Add your new column on your original worksheet that will display the info pulled from the Lookup table. ...
Place your cursor in the first blank cell in that column. ...
From the Insert menu, select Function…. ...
In the Search for a function: text box, type “vlookup” and click Go.

what is tax

A fee charged ("levied") by a government on a product, income, or activity. If tax is levied directly on personal or corporate income, then it is a direct tax. If tax is levied on the price of a good or service, then it is called an indirect tax. The purpose of taxation is to finance government expenditure. One of the most important uses of taxes is to finance public goods and services, such as street lighting and street cleaning. Since public goods and services do not allow a non-payer to be excluded, or allow exclusion by a consumer, there cannot be a market in the good or service, and so they need to be provided by the government or a quasi-government agency, which tend to finance themselves largely through taxes.

what is rac

A Reservation Against Cancellation (RAC) is a type of ticket that can be purchased for travel on the Indian Railways. Although it ensures certainty of travel, it does not guarantee a berth.

A Reservation Against Cancellation (RAC) is technically a train ticket with confirmed seat but wait listed berth.

In other words, if your train ticket shows RAC as its status (with an RAC status number), you can board the train and occupy the seat allowed, instead of a sleeping berth at night.

In fact the seat you are allocated is a shorter version berth, shared by one more RAC status co-passenger. You still are wait listed for a berth throughout the journey. If any berth is available during the journey, the conductor (TTE) allocates it to you based on your ticket’s RAC position.

Yes, RAC & WL are a bit complicated concept in the Indian trains. But this is a very useful process in the Indian Trains systems to give a better chance for the wait listed (WL) passengers.

what is rave party

A rave is an electronic music dance party that lasts all night. It can feature performances from DJs or live music performers. Raves usually take place in dark rooms filled with laser lights, strobes and for machines. Law enforcement agencies suspect a lot of drugs, including Ecstacy, do the rounds at a rave.

what is ram

RAM (pronounced ramm) is an acronym for random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.

Random-access memory (RAM) is a type of computer data storage. A RAM device makes is possible to access data in random order, which makes it very fast to find a specific piece of information. Certain other types of storage are not random-access. For example, a hard disk drive and a CD read and write data in a predetermined order. The mechanical design of these devices prescribes that data access is consecutive. This means that the time it takes to find a specific piece of information can vary greatly depending on where it is located on the disk.

RAM devices are used in computer systems as the main memory. RAM is considered volatile memory, which means that the stored information is lost when there is no power. So RAM is used by the central processing unit (CPU) when a computer is running to store information that needs to be used very quickly, but it does not store any information permanently.

Present-day RAM devices use integrated circuits to store information. This is a relatively expensive form of storage and the cost per unit of storage ($ per gigabyte) is much higher than for devices like a hard drive. However, the time to access data is so much faster for RAM that speed outweighs cost. A computer therefore uses a certain amount of RAM for fast-access, temporary storage of information and a much larger amount of non-random, permanent mass storage like a hard disk drive. For example, a typical computer system may have 2-8 GB (gigabytes) of RAM, while the storage capacity of the hard disk drive can be several hundred GB or even one TB. 

what is uart

A UART is usually an individual (or part of an) integrated circuit used for serial communications over a computer or peripheral device serial port. UARTs are now commonly included in microcontrollers.

Short for Universal Asynchronous Receiver-Transmitter, UART is a chip used to manage computer serial ports, disk drive interrupts, screen refresh cycles, and any other device that requires timing. With a serial port transmission, the UART converts the bytes into serial bits and transmits those bits through an asynchronous transmission, stripping out the start and stop bits for each character. Below is a listing of various UART chips. The 16550 chip series is the most commonly used UART.

    8250 UART was the original UART and was capable of speeds up to 9600 bps with a 1-byte FIFO.
    8250A UART was a revised version of the 8250 with an additional register that allowed software to verify it was a 8250 UART.
    16450 UART Slightly faster than earlier UARTs.
    16540 UART capable of speeds up to 9600 bps.
    16550 UART has a 16-byte FIFO.
    16550A UART had same features as previous 16550 UART with new fixes.
    16550AF UART had same features as previous 16550 UART with faster capabilities.
    16550AFN UART had same features as previous 16550 UART except was a ceramic chip.
    16650 UART has a 32-byte FIFO.
    16750 UART has a 64-byte FIFO.
    16950 UART has a 128-byte FIFO.
 

what is earthing

The main reason for doing earthing in electrical network is for the safety. When all metallic parts in electrical equipments are grounded then if the insulation inside the equipments fails there are no dangerous voltages present in the equipment case. If the live wire touches the grounded case then the circuit is effectively shorted and fuse will immediately blow. When the fuse is blown then the dangerous voltages are away.

Studies now show that just standing on the earth barefoot has amazing health benefits as we drain off free-radicals and the electric charge we carry with us. This phenomena is also known as "earthing".

Think of it this way. The earth is a giant car battery with a liquid metal core. It carries a strongly negative charge. And anything above the ground (such as in the air or insulated from the ground) carries a positive charge. This is why lightning strikes oocur, and why we need to “ground” or protect all of our electrical and electronic equipment, to keep them from sparking or short circuiting.

In essence, to ground something is to plug it back in to the earth, which is actually the third prong on our electrical outlets (called a ground).

Human beings, and all organisms for that matter, are electrical in nature as well. We get ekgs, mri’s, and all sorts of electrical tests to measure our health, hearts, and bodies; our nervous system works on electrical impulses, and even the heart beats with an electrical charge (which is why you may get a pacemaker if it starts getting out of tune).

We are electrical in nature, and like electrical equipment and electronics needs to be properly grounded to function well (if you’ve ever listened to an ungrounded radio you know what I mean, you’ll hear tons of static and background noise until it’s grounded), we need to be grounded for proper health and well-being and for proper functioning of our bodies.

what is tan

Every deductor is required to obtain a unique identification number called TAN (Tax Deduction Account Number) which is a ten digit alpha numeric number. This number has to be quoted by the deductor in every correspondence related to TDS.

 Procedure for getting TAN :

It can be obtained by filing an application in form no. 49B to any of the TIN facilitation Centres (TIN-FC) namely NSDL. Addresses of the TIN-FC as well as the forms can be downloaded from the website http://www.incometaxindia.gov.in/Pages/default.aspx orhttp://tin-nsdl.com/. The fee for processing TAN application is Rs.  60/-. This can be paid by:

▬   Cash at TIN-FC counter

▬   Demand draft or

▬   Cheque or

▬   Credit card

The demand draft/ cheque shall be in favour of 'NSDL-TIN'.

TAN number will be communicated to the deductor by NSDL.

what is earthquake

Movements within the Earth’s crust cause stress to build up at points of weakness, and rocks to deform.

Stored energy builds up in the same way as energy builds up in the spring of a watch when it is wound. When the stress finally exceeds the strength of the rock, the rock fractures along a fault, often at a zone of existing weakness within the rock.

The stored energy is suddenly released as an earthquake.

Intense vibrations, or seismic waves, spread out from the initial point of rupture, the focus, like ripples on a pond.

These waves are what makes the ground shake and can travel large distances in all directions. Near the focus, the waves can be very large, making them extremely destructive.

what is qa and qc

QA/QC is the combination of quality assurance, the process or set of processes used to measure and assure the quality of a product, and quality control, the process of meeting products and services to consumer expectations.
 QA/QC is the combination of quality assurance, the process or set of processes used to measure and assure the quality of a product, and quality control, the process of meeting products and services to consumer expectations. Quality Assurance is process oriented and focuses on defect prevention, while quality control is product oriented and focuses on defect identification.

what is matlab

MATLAB is a high-performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include: Math and computation.

MATLAB is a high-performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include:

    Math and computation
    Algorithm development
    Modeling, simulation, and prototyping
    Data analysis, exploration, and visualization
    Scientific and engineering graphics
    Application development, including Graphical User Interface building

MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical computing problems, especially those with matrix and vector formulations, in a fraction of the time it would take to write a program in a scalar noninteractive language such as C or Fortran.

The name MATLAB stands for matrix laboratory. MATLAB was originally written to provide easy access to matrix software developed by the LINPACK and EISPACK projects, which together represent the state-of-the-art in software for matrix computation.

MATLAB has evolved over a period of years with input from many users. In university environments, it is the standard instructional tool for introductory and advanced courses in mathematics, engineering, and science. In industry, MATLAB is the tool of choice for high-productivity research, development, and analysis.

MATLAB features a family of application-specific solutions called toolboxes. Very important to most users of MATLAB, toolboxes allow you to learn and apply specialized technology. Toolboxes are comprehensive collections of MATLAB functions (M-files) that extend the MATLAB environment to solve particular classes of problems. Areas in which toolboxes are available include signal processing, control systems, neural networks, fuzzy logic, wavelets, simulation, and many others.

what is nanotechnology

Take a random selection of scientists, engineers, investors and the general public and ask them what nanotechnology is and you will receive a range of replies as broad as nanotechnology itself. For many scientists, it is nothing startlingly new; after all we have been working at the nanoscale for decades, through electron microscopy, scanning probe microscopies or simply growing and analysing thin films. For most other groups, however, nanotechnology means something far more ambitious, miniature submarines in the bloodstream, little cogs and gears made out of atoms, space elevators made of nanotubes, and the colonization of space. It is no wonder people often muddle up nanotechnology with science fiction.

what is namespace

In general, a namespace uniquely identifies a set of names so that there is no ambiguity when objects having different origins but the same names are mixed together. Using the Extensible Markup Language (XML), an XML namespace is a collection of element type and attribute names. These element types and attribute names are uniquely identified by the name of the unique XML namespace of which they are a part. In an XML document, any element type or attribute name can thus have a two-part name consisting of the name of its namespace and then its local (functional) name.

Sunday, 1 February 2015

what is cache memory

A CPU cache is a cache used by the central processing unit (CPU) of a computer to reduce the average time to access data from the main memory. The cache is a smaller, faster memory which stores copies of the data from frequently used main memory locations

Cache (pronounced cash) memory is extremely fast memory that is built into a computer’s central processing unit (CPU), or located next to it on a separate chip. The CPU uses cache memory to store instructions that are repeatedly required to run programs, improving overall system speed. The advantage of cache memory is that the CPU does not have to use the motherboard’s system bus for data transfer. Whenever data must be passed through the system bus, the data transfer speed slows to the motherboard’s capability. The CPU can process data much faster by avoiding the bottleneck created by the system bus.

As it happens, once most programs are open and running, they use very few resources. When these resources are kept in cache, programs can operate more quickly and efficiently. All else being equal, cache is so effective in system performance that a computer running a fast CPU with little cache can have lower benchmarks than a system running a somewhat slower CPU with more cache. Cache built into the CPU itself is referred to as Level 1 (L1) cache. Cache that resides on a separate chip next to the CPU is called Level 2 (L2) cache. Some CPUs have both L1 and L2 cache built-in and designate the separate cache chip as Level 3 (L3) cache.
 

what is xampp

XAMPP (/ˈzæmp/ or /ˈɛks.æmp/) is a free and open source cross-platform web server solution stack package, consisting mainly of the Apache HTTP Server, MySQL database, and interpreters for scripts written in the PHP and Perl programming languages.

what is zapr

ZAPR is a mobile app that rewards you for watching TV Ads. The next time you're watching TV and the ad break starts, just switch on ZAPR and let it run its magic. ZAPR listens to your TV, identifies what ad you're watching and unlocks awesome brand related content.

Zapr (previously known as zingee) is a curious and useful application that allows you to create a link to any file on your computer, so this link can be sent to any friend via email, thus allowing one to access the file. There is no size limit, I tried it a few months ago with sharing multiple files over 2 Gbs and was amazed at how quick and simple it is.
Three options are given by Zapr: create your channels and websites, upload your content, and share folders online. It should be noted that these links can be public or private. Besides providing these links to our friends on the list of our Zapr IM-like interface, we can set a password for security concerns. The person who receives the link via email or IM just needs an internet browser and a password (if its a private link) to be ready to download the files.

In order to use the program you or the person who is going to share files need to create an account, which by the way is free. Once you set up your user and password, you can create unlimited amount of shares and the best part is that you can even log in to the program's website and download or upload files from any computer without the need to install the program on every computer.

It allowed me to provide recovered data to a customer, quickly.... Highly recommended!

what is zabbix

Zabbix is an enterprise open source monitoring solution for networks and applications, created by Alexei Vladishev. It is designed to monitor and track the status of various network services, servers, and other network hardware. Zabbix uses MySQL, PostgreSQL, SQLite, Oracle or IBM DB2 to store data.

Zabbix was created by Alexei Vladishev, and currently is actively developed and supported by Zabbix SIA.

Zabbix is an enterprise-class open source distributed monitoring solution.

Zabbix is software that monitors numerous parameters of a network and the health and integrity of servers. Zabbix uses a flexible notification mechanism that allows users to configure e-mail based alerts for virtually any event. This allows a fast reaction to server problems. Zabbix offers excellent reporting and data visualisation features based on the stored data. This makes Zabbix ideal for capacity planning.

Zabbix supports both polling and trapping. All Zabbix reports and statistics, as well as configuration parameters, are accessed through a web-based frontend. A web-based frontend ensures that the status of your network and the health of your servers can be assessed from any location. Properly configured, Zabbix can play an important role in monitoring IT infrastructure. This is equally true for small organisations with a few servers and for large companies with a multitude of servers.

Zabbix is free of cost. Zabbix is written and distributed under the GPL General Public License version 2. It means that its source code is freely distributed and available for the general public. 

what is zamindari system

(in British India) the system of landholding and tax collection by zamindars. 2. (in British India) the office or territory held or administered by a zamindar. 3. (in Mogul India) the system of collecting farm revenue, a fixed sum based on the assigned district.

what is latitude and longitude

Latitude angles can range up to +90 degrees (or 90 degrees north), and down to -90 degrees (or 90 degrees south). Latitudes of +90 and -90 degrees correspond to the north and south geographic poles on the earth, respectively. Longitude is defined in terms of meridians, which are half-circles running from pole to pole.

Latitude is defined with respect to an equatorial reference plane. This plane passes through the center C of the sphere, and also contains the great circle representing the equator. The latitude of a point P on the surface is defined as the angle that a straight line, passing through both P and C , subtends with respect to the equatorial plane. If P is above the reference plane, the latitude is positive (or northerly); if P is below the reference plane, the latitude is negative (or southerly). Latitude angles can range up to +90 degrees (or 90 degrees north), and down to -90 degrees (or 90 degrees south). Latitudes of +90 and -90 degrees correspond to the north and south geographic poles on the earth, respectively.


Longitude is defined in terms of meridians, which are half-circles running from pole to pole. A reference meridian, called the prime meridian , is selected, and this forms the reference by which longitudes are defined. On the earth, the prime meridian passes through Greenwich, England; for this reason it is also called the Greenwich meridian . The longitude of a point P on the surface is defined as the angle that the plane containing the meridian passing through P subtends with respect to the plane containing the prime meridian. If P is to the east of the prime meridian, the longitude is positive; if P is to the west of the prime meridian, the longitude is negative. Longitude angles can range up to +180 degrees (180 degrees east), and down to -180 degrees (180 degrees west). The +180 and -180 degree longitude meridians coincide directly opposite the prime meridian.

what is karma

The definition of  karma? For every action there will always be a reaction. Your actions create a ripple in the universe. Your thoughts and actions are powerful. They carry energy. They are like an echo.

Your thoughts and feelings shape the world within you. Your words and actions shape the world around you. You are constantly shaping your world, little by little.

In popular sayings, we have:

    It will come home to them

    Chickens return to their roost

    They will get what's coming to them

The meaning is that evil is returned to the wrong-doer and they will eventually suffer for what they did.

This, in essence is the Law of Karma. That we receive what we give. That all our actions reflect back upon us, either in this world or in the subsequent ones.

How does Karma work?

Karma is based on logic. It is an unavoidable consequence of our creations. When we create anything, we also create other things which might not be what we intended.

If I get angry and with another harm, then I create a state in which I am harming another and another is harmed. I create a state in which I am happy with the suffering of another. But also create a state in which another is unhappy and suffering. I create a state in which I am joyful that my enemy is justly harmed. And a state in which another is resentful and angry that they have been wrongly treated.

This relates to the GAMES of life. In whichever game we play certain causes and effects arise. And certain rules are required.

So when we create anything, whether a good intention or a bad one, other side-effects are necessarily produced.

Imagine a world where no one harmed another in any way. And I harm another. I create someone who harms another and one who is harmed. This did not exist before. But now the world contains suffering.

And in the present life, or in subsequent ones, there are those who suffer and those who harm. And I, and others, play all these roles.

In the beginning before harm was created, it was impossible to suffer. But when I do harm then suffering exists to my detriment.

Of course, I am not alone, and others who create harm also create suffering and we continue to play our games in a world with suffering.

Now after many aeons, we wonder why there is suffering. And why there is harm. Yet this is the result of our own creations. 

what is hacking

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.

Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.

Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve.

If you support the cause of this website, you can contribute by sharing it with your friends, using any of the buttons below.

what is fatty liver

Fatty liver, or steatosis, is a broad term that describes the buildup of fats in the liver. Having fat in your liver is normal, but if more than five to 10 percent is fat, then it is called fatty liver disease. Fatty liver is a reversible condition and usually goes away on its own.

what is factory method in java

Definition

Provides an abstraction or an interface and lets subclass or implementing classes decide which class or method should be instantiated or called, based on the conditions or parameters given.

Where to use & benefits

Connect parallel class hierarchies.
A class wants its subclasses to specify the object.
A class cannot anticipate its subclasses, which must be created.
A family of objects needs to be separated by using shared interface.
The code needs to deal with interface, not implemented classes.
Hide concrete classes from the client.
Factory methods can be parameterized.
The returned object may be either abstract or concrete object.
Providing hooks for subclasses is more flexible than creating objects directly.
Follow naming conventions to help other developers to recognize the code structure.
Related patterns include
Abstract Factory , which is a layer higher than a factory method.
Template method, which defines a skeleton of an algorithm to defer some steps to subclasses or avoid subclasses
Prototype, which creates a new object by copying an instance, so it reduces subclasses.
Singleton, which makes a returned factory method unique.

what is matual fund

An investment vehicle that is made up of a pool of funds collected from many investors for the purpose of investing in securities such as stocks, bonds, money market instruments and similar assets. Mutual funds are operated by money managers, who invest the fund's capital and attempt to produce capital gains and income for the fund's investors. A mutual fund's portfolio is structured and maintained to match the investment objectives stated in its prospectus.

INVESTOPEDIA EXPLAINS 'MUTUAL FUND'
One of the main advantages of mutual funds is that they give small investors access to professionally managed, diversified portfolios of equities, bonds and other securities, which would be quite difficult (if not impossible) to create with a small amount of capital. Each shareholder participates proportionally in the gain or loss of the fund. Mutual fund units, or shares, are issued and can typically be purchased or redeemed as needed at the fund's current net asset value (NAV) per share, which is sometimes expressed as NAVPS.

what is bootstrap

A bootstrap is a small strap or loop at the back of a leather boot that enables you to pull the entire boot on. In computers, to bootstrap (or "to boot") is to load a program into a computer using a much smaller initial program to load in the desired program (which is usually an operating system). In general usage, bootstrapping is the leveraging of a small initial effort into something larger and more significant. There is also a common expression, "pulling yourself up by your own bootstraps," meaning to leverage yourself to success from a small beginning.

what is bpo

Business process outsourcing (BPO) is a subset of outsourcing that involves the contracting of the operations and responsibilities of a specific business process to a third-party service provider

Techopedia explains Business Process Outsourcing (BPO)

BPO categories are front office customer services (such as tech support) and back office business functions (such as billing).

The following are BPO advantages:

    Business process speed and efficiency are enhanced.
    Employees may invest more time in core business strategies to bolster competitive advantage and enhance value chain engagement.
    Organizational growth increases when capital resource and asset expenditures are not required, which averts problematic investment returns.
    Organizations are not required to invest in unrelated primary business strategy assets, facilitating a shift in focus to specific competencies.

BPO risks include:

    Data privacy breaches
    Underestimated running costs
    Overdependence on service providers

what is namespace

In general, a namespace uniquely identifies a set of names so that there is no ambiguity when objects having different origins but the same names are mixed together. Using the Extensible Markup Language (XML), an XML namespace is a collection of element type and attribute names. These element types and attribute names are uniquely identified by the name of the unique XML namespace of which they are a part. In an XML document, any element type or attribute name can thus have a two-part name consisting of the name of its namespace and then its local (functional) name.

what is vat

A type of consumption tax that is placed on a product whenever value is added at a stage of production and at final sale. Value-added tax (VAT) is most often used in the European Union. The amount of value-added tax that the user pays is the cost of the product, less any of the costs of materials used in the product that have already been taxed.

Valued-added tax, or VAT, is a tax assessed on the supply of goods and services. Read more about where to find your VAT invoices.

Airbnb charges VAT on its service fees for users from the European Union, Switzerland, Norway, Iceland, and South Africa.

Guests

VAT is charged at the time of payment and is based on the total guest fee for a reservation. If you alter your reservation, VAT adjusts to reflect any change in the service fee.

For reservations booked between May 1, 2014 and December 31, 2014, Airbnb will calculate VAT based on the Irish VAT rate of 23% for all guests in the EU, regardless of country of residence. This change is related to Airbnb’s new international headquarters in Dublin.

On January 1, 2015, a new EU tax law takes effect. At this time, Airbnb will go back to calculating VAT according to the rate in guests' local country of residence, based on the selection when you enter payment information.

Hosts

VAT is deducted from your payout and is based on total host fee for a reservation. If you alter your reservation, VAT adjusts to reflect any change in the service fee.

For reservations booked between May 1, 2014 and December 31, 2014, Airbnb will calculate VAT based on the Irish VAT rate of 23% for all hosts in the EU, regardless of country of residence. This change is related to Airbnb’s new international headquarters in Dublin.

On January 1, 2015, a new EU tax law takes effect. At this time, Airbnb will go back to calculating VAT according to the rate in hosts’ local country of residence, based on the selection when you add a payout method.

what is case study

A case study is an in-depth study of one person. Much of Freud's work and theories were developed through individual case studies.

In a case study, nearly every aspect of the subject's life and history is analyzed to seek patterns and causes for behavior. The hope is that learning gained from studying one case can be generalized to many others. Unfortunately, case studies tend to be highly subjective and it is difficult to generalize results to a larger

what is nfc

NFC is a short-range high frequency wireless communication technology that enables the exchange of data between devices over about a 10 cm distance. NFC is an upgrade of the existing proximity card standard (RFID) that combines the interface of a smartcard and a reader into a single device.

How does NFC work?


At its core, all NFC is doing is identifying us, and our bank account, to a computer. The technology is simple. It's a short-range, low power wireless link evolved from radio-frequency identification (RFID) tech that can transfer small amounts of data between two devices held a few centimeters from each other.

Unlike Bluetooth, no pairing code is needed, and because it's very low power, no battery in the device being read. By tapping your phone on a contactless payment terminal in a shop, train station or coffee shop is able to identify your account (and even your personal preferences, shopping habits and even your most frequently travelled route home) and takes payment through an app on your phone.

Passive NFC 'tags' on posters, in shops and on trains could contain a web address, a discount voucher, a map or a bus timetable that passers-by could touch their phones on to receive - or to instantly pay for absolutely anything.

"The SIM card in your mobile phone is a smart card identifying your account to the network," says John Elliott, Head of Public Sector at Consult Hyperion, who's worked on the Oyster Card. "On NFC phones, the SIM is being extended to act as the Secure Element that can hold other apps such as payment cards." 

what is cif number

A computerized file that stores all pertinent information about a bank customer's personal and account information. The Customer Information File (CIF) allows the bank to view its customer accounts by relationship and not strictly by account type. For example, information such as credit relationships, account ownership information, accounts owned etc are included. It is updated as often as daily in order to ensure accuracy.

what is xslt

XSLT (Extensible Stylesheet Language Transformations) is a language for transforming XML documents into other XML documents, or other formats such as HTML for web pages, plain text or into XSL Formatting Objects, which may subsequently be converted to other formats, such as PDF PostScript and PNG.

Extensible Stylesheet Language Transformations (XSLT) has evolved from the early Extensible Stylesheet Language (XSL) standard. XSL specifies a language definition for XML data presentation and data transformations. Data presentation means displaying data in some format and/or medium. Presentation is about style. Data transformation means parsing an input XML document into a tree of nodes, and then converting the source tree into a result tree. Transformation is about data exchange.

Because these functionalities serve two distinct purposes, XSLT was proposed and later accepted as a separate standard for XML data transformation only. XSL is now generally referred to as XSL Formatting Objects (XSL-FO), to distinguish it from XSLT. The future of XSL-FO as a standard is uncertain, because much of its functionality overlaps with that provided by cascading style sheets (CSS) and the HTML tag set. If cross-vendor compatibility is important, you might want to avoid XSL-FO until it becomes a standard fully accepted by the Worldwide Web Consortium.

what is xpath

XPath is a language for addressing specific parts of an XML document. XPath, like the Document Object Model (DOM), models an XML document as a tree of nodes. An XPath expression is a mechanism for navigating through and selecting nodes from the XML document.

XPath is a language for addressing specific parts of an XML document. XPath, like the Document Object Model (DOM), models an XML document as a tree of nodes. An XPath expression is a mechanism for navigating through and selecting nodes from the XML document. An XPath expression is, in a way, analogous to an SQL query used to select records from a database.

There are different types of nodes, including element nodes, attribute nodes and text nodes. XPath defines a way to compute a string-value for each type of node.

XPath defines a library of standard functions for working with strings, numbers and boolean expressions.

    child::* - Selects all children of the root node.
    .//name - Selects all elements having the name "name", descendants of the current node.
    /catalog/cd[price>10.80] - Selects all the cd elements that have a price element with a value larger than 10.80

Saturday, 31 January 2015

what is xml

Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format which is both human-readable and machine-readable.

 The buzz-word "XML" is beginning to pop up all over the Net, and in the Goodies e-mail box. People are wondering what this new language is and how it's going to effect the way people write. To be honest, I was wondering the same thing until I started looking into it.
     Avid readers of HTML Goodies already know that XML is mentioned in two other tutorials (as of 5/11/98): HTML 4.0 and the Active Channel Tutorial. The language is starting to make a few in-roads into the Web and that makes a few people nervous. As one Goodies reader put it, "I just got pretty good with HTML, and now they're bringing out this thing." I feel your pain. Believe me, I do. It means that I will need to learn it all first so that I can teach it to you.
     So, here we go. This first tutorial is an introduction to what the heck this XML thing really is.

 

what is zener diode

Zener diodes are a special kind of diode which permits current to flow in the forward direction. What makes them different from other diodes is that Zener diodes will also allow current to flow in the reverse direction when the voltage is above a certain value. This breakdown voltage is known as the Zener voltage. In a standard diode, the Zener voltage is high, and the diode is permanently damaged if a reverse current above that value is allowed to pass through it. Zener diodes are designed in a way where the Zener voltage is a much lower value. There is a controlled breakdown which does not damage the diode when a reverse current above the Zener voltage passes through a Zener diode.

what is zumba

Zumba is a fitness program that combines Latin and international music with dance moves. Zumba routines incorporate interval training — alternating fast and slow rhythms — and resistance training.

An aerobic activity, Zumba can count toward the 150 minutes a week of moderate aerobic activity or 75 minutes a week of vigorous aerobic activity recommended for most healthy adults by the Department of Health and Human Services. Aerobic exercise reduces health risks, keeps excess pounds at bay, strengthens your heart and boosts your mood. If you enjoy Zumba, you're also more likely to do it regularly — and experience its benefits as an aerobic exercise.

As with any exercise, if a certain movement or position hurts, try to modify the workout to avoid the aggravating activities. Also, anytime you're training with resistance, remember that proper technique is important. Don't get so caught up in your dancing that you forget proper form.

what is zip code

ZIP codes are a system of postal codes used by the United States Postal Service (USPS) since 1963. The term ZIP, an acronym for Zone Improvement Plan,[1] was chosen to suggest that the mail travels more efficiently, and therefore more quickly (zipping along), when senders use the code in the postal address. The basic format consists of five decimal numerical digits. An extended ZIP+4 code, introduced in 1983, includes the five digits of the ZIP code, a hyphen, and four more digits that determine a more specific location within a given ZIP code.

what is finance

A "Finance" is a broad term that describes two related activities: the study of how money is managed and the actual process of acquiring needed funds. Because individuals, businesses and government entities all need funding to operate, the field is often separated into three sub-categories: personal finance, corporate finance and public finance.

All three categories are concerned with activities such as pursuing sound investments, obtaining low-cost credit, allocating funds for liabilities, and banking. Yet each has its own specific considerations. For example, individuals need to provision for retirement expenses, which means investing enough money during their working years and ensuring that their asset allocation fits their long-term plans. A large company, on the other hand, may have to decide whether to raise additional funds through a bond issue or stock offering. Investment banks may advise the firm on such considerations and help them market the securities.

As for public finance, in addition to managing money for its day-to-day operations, a government body also has larger social responsibilities. Its goals include attaining an equitable distribution of income for its citizens and enacting policies that lead to a stable economy.

what is database

Systematically organized or structured repository of indexed information (usually as a group of linked data files) that allows easy retrieval, updating, analysis, and output of data. Stored usually in a computer, this data could be in the form of graphics, reports, scripts, tables, text, etc., representing almost every kind of information. Most computer applications (including antivirus software, spreadsheets, word-processors) are databases at their core. See also flat database and relational database.

DBMS Formats

The information from a database can be presented in a variety of formats. Most DBMSs include a report writer program that enables you to output data in the form of a report. Many DBMSs also include a graphics component that enables you to output information in the form of graphs and charts.

what is paypal

At PayPal, we put people at the center of everything we do. Founded in 1998, we continue to be at the forefront of the digital payments revolution, processing almost 11.5 million payments for our customers per day. PayPal gives people better ways to connect to their money and to each other, helping them send money without sharing financial information and with the flexibility to pay using their PayPal account balances, bank accounts, PayPal Credit and credit cards. With our 162 million active digital wallets, we have created an open and secure payments ecosystem people and businesses choose to securely transact with each other online, in stores and on mobile devices. PayPal is a truly global payments platform that is available to people in 203 markets, allowing customers to get paid in more than 100 currencies, withdraw funds to their bank accounts in 57 currencies and hold balances in their PayPal accounts in 26 currencies. PayPal is an eBay Inc. (Nasdaq: EBAY) company. In September 2014, eBay Inc. announced the planned separation of eBay and PayPal into independent publicly traded companies in 2015. More information about PayPal can be found at www.paypal.com and www.paypal-media.com. More information about the planned separation of eBay and PayPal can be found at update.ebayinc.com.

what is ip address

a unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.

This number is an exclusive number all information technology devices (printers, routers, modems, et al) use which identifies and allows them the ability to communicate with each other on a computer network.

There is a standard of communication which is called an Internet Protocol standard (IP). In laymans terms it is the same as your home address. In order for you to receive snail mail at home the sending party must have your correct mailing address (IP address) in your town (network) or you do not receive bills, pizza coupons or your tax refund. The same is true for all equipment on the internet. Without this specific address, information cannot be received. IP addresses may either be assigned permanently for an Email server/Business server or a permanent home resident or temporarily, from a pool of available addresses (first come first serve) from your Internet Service Provider. A permanent number may not be available in all areas and may cost extra so be sure to ask your ISP.

Domain Name System (DNS): This allows the IP address to be translated to words. It is much easier for us to remember a word than a series of numbers. The same is true for email addresses.
For example, it is much easier for you to remember a web address name such as whatismyip.com than it is to remember 192.168.1.1 or in the case of email it is much easier to remember email@somedomain.com than email@192.168.1.1

Dynamic IP Address: An IP address that is not static and could change at any time. This IP address is issued to you from a pool of IP addresses allocated by your ISP or DHCP Server. This is for a large number of customers that do not require the same IP Address all the time for a variety of reasons. Your computer will automatically get this number as it logs on to the network and saves you the trouble of having to know details regarding the specific network configurations. This number can be assigned to anyone using a dial-up connection, Wireless and High Speed Internet connections. If you need to run your own email server or web server, it would be best to have a static IP.

Static IP Address: An IP address that is fixed and never changes. This is in contrast to a dynamic IP address which may change at any time. Most ISP's a single static IP or a block of static IP's for a few extra bucks a month.

IP version 4: Currently used by most network devices. However, with more and more computers accessing the internet, IPv4 addresses are running out quickly. Just like in a city, addresses have to be created for new neighborhoods but, if your neighborhood gets too large, you will have to come up with an entire new pool of addresses. IPv4 is limited to 4,294,967,296 addresses.

IP version 5: This is an experimental protocol for UNIX based systems. In keeping with standard UNIX (a computer Operating System) release conventions, all odd-numbered versions are considered experimental. It was never intended to be used by the general public.

IP version 6: The replacement for the aging IPv4. The estimated number of unique addresses for IPv6 is 340,282,366,920,938,463,463,374,607,431,768,211,456 or 2^128.

The old and current standard of addresses was this: 192.168.100.100 the new way can be written different ways but means the same and are all valid:

* 1080:0000:0000:0000:0000:0034:0000:417A

* 1080:0:0:0:0:34:0:417A

* 1080::34:0:417A

what is isis

ISIS used to be al-Qaeda in Iraq. An Iraqi soldier during a fight against al-Qaeda in Iraq in January 2014. Ali al-Saadi/AFP/Getty Images. The Islamic State of Iraq and the Levant (ISIS) used to have a different name: al Qaeda in Iraq.

The AQI militants were bit-by-bit weakened by a surge in American forces in Iraq and in 2010 current IS leader Abu Bakr al-Baghdadi took over as head.

They later rebranded themselves as IS and the withdrawal of western troops in Iraq, completed in 2011, saw a rise in the group's violent attacks in the region.

Al-Baghdadi carried on al-Zarqawi's views that Shia Muslims were a column of Islam that should be wiped out.

IS adhere to an extreme interpretation of Sunni Islam and consider themselves the only true believers.

They treat the rest of the world as unbelievers who seek to destroy Islam and use that to justify attacks against other Muslims and non-Muslims alike.

IS have citied Koranic verses about "striking off the heads" of unbelievers when discussing their brutal actions.

But Fawaz A Gerges, from the London School of Economics and Political Science, said IS feel no need to justify their horrifying deeds.

what is instagram

Instagram is a fun and quirky way to share your life with friends through a series of pictures. Snap a photo with your mobile phone, then choose a filter to transform the image into a memory to keep around forever.

What's this thing called "Instagram" that all the cool kids seem to be completely obsessed with lately? It hasn't been around for too long, so don't feel embarrassed to ask.

Instagram is a social networking app made for sharing photos and videos from a smartphone. Similar to Facebook or Twitter, everyone who creates an account has a profile and a news feed.

When you post a photo or video on Instagram, it will be displayed on your profile. Other users who follow you will see your posts in their own feed. Likewise, you'll see posts from other users who you choose to follow.

Which Devices Work with Instagram?

Instagram is available for free on iOS, Android and Windows Phone devices. It can also be accessed on the web from a computer, but users can only upload and share photos or videos from their devices.

Creating an Account on Instagram

Before you can start using the app, Instagram will ask you to create a free account. You can sign up via your existing Facebook account or by email. All you need is a username and a password.

You may be asked if you want to follow some friends who are on Instagram in your Facebook network. You can also customize your profile by adding your name, a photo, a short bio and a website.

what is internet

  1. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

what is url

URL is an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet. A URL has two main components: Protocol identifier: For the URL http://example.com , the protocol identifier is http .

what is yogurt

Yogurt, also spelled yoghurt or yoghourt, is a thick, custard- or pudding-like food, made by the natural bacterial fermentation of milk. Many people enjoy it plain or flavored with breakfast, lunch, or as a snack, and it's also an ingredient in a number of other dishes.

The process of making yogurt involves fermenting cream or milk with live and active bacterial cultures; this is accomplished by adding bacteria directly to the dairy product. Commercial varieties are usually made with a culture of Lactobacillus acidophilus and Streptococcus thermophilis, although some manufacturers use Lactobacillus bulgaricus rather than L. acidophilus. Yogurt made at home is usually started by adding a small amount of a commercial product to boiled milk.

In Western cultures, yogurt is enjoyed in a variety of ways, most popularly as a cool dish mixed with fruit. It can be used to make healthy shakes or frozen to eat like ice cream as well. Yogurt can also be used when cooking, in place of milk, sour cream, and even some cheeses. In Middle Eastern cultures, it's frequently served with meat, meat sauces, and vegetables. It can also be mixed with various other sauces or used as a tangy dollop on top of a meal.

what is tds

TDS

What is TDS or Tax Deducted at Source

Tax deducted at source (TDS), as the very name implies aims at collection of revenue at the very source of income. It is essentially an indirect method of collecting tax which combines the concepts of “pay as you earn” and “collect as it is being earned.” Its significance to the government lies in the fact that it prepones the collection of tax, ensures a regular source of revenue, provides for a greater reach and wider base for tax. At the same time, to the tax payer, it distributes the incidence of tax and provides for a simple and convenient mode of payment.
The concept of TDS requires that the person on whom responsibility has been cast, is to deduct tax at the appropriate rates, from payments of specific nature which are being made to a specified recipient. The deducted sum is required to be deposited to the credit of the Central Government. The recipient from whose income tax has been deducted at source, gets the credit of the amount deducted in his personal assessment on the basis of the certificate issued by the deductor.

what is router

A hardware device designed to take incoming packets, analyze the packets, moving the packets to another network, converting the packets to another network interface, dropping the packets, directing packets to the appropriate locations, and performing any other number of other actions. The picture shows the Linksys BEFSR11 router and is what most home routers resemble.
A router has a lot more capabilities than other network devices such as a hub or a switch that are only able to perform basic network functions. For example, a hub is often used to transfer data between computers or network devices, but does not analyze or do anything with the data it is transferring. Routers however can analyze the data being sent over a network, change how it is packaged and send it to another network or over a different network. For example, routers are commonly used in home networks to share a single Internet connection with multiple computers.

what is ecommerce

Electronic commerce or ecommerce is a term for any type of business, or commercial transaction, that involves the transfer of information across the Internet. It covers a range of different types of businesses, from consumer based retail sites, through auction or music sites, to business exchanges trading goods and services between corporations. It is currently one of the most important aspects of the Internet to emerge.

Ecommerce allows consumers to electronically exchange goods and services with no barriers of time or distance. Electronic commerce has expanded rapidly over the past five years and is predicted to continue at this rate, or even accelerate. In the near future the boundaries between "conventional" and "electronic" commerce will become increasingly blurred as more and more businesses move sections of their operations onto the Internet.

Business to Business or B2B refers to electronic commerce between businesses rather than between a business and a consumer. B2B businesses often deal with hundreds or even thousands of other businesses, either as customers or suppliers. Carrying out these transactions electronically provides vast competitive advantages over traditional methods. When implemented properly, ecommerce is often faster, cheaper and more convenient than the traditional methods of bartering goods and services.

Electronic transactions have been around for quite some time in the form of Electronic Data Interchange or EDI. EDI requires each supplier and customer to set up a dedicated data link (between them), where ecommerce provides a cost-effective method for companies to set up multiple, ad-hoc links. Electronic commerce has also led to the development of electronic marketplaces where suppliers and potential customers are brought together to conduct mutually beneficial trade.

The road to creating a successful online store can be a difficult if unaware of ecommerce principles and what ecommerce is supposed to do for your online business. Researching and understanding the guidelines required to properly implement an e-business plan is a crucial part to becoming successful with online store building.

what is erp

ERP is an industry acronym for Enterprise Resource Planning. Broadly speaking, ERP refers to automation and integration of a company's core business to help them focus on effectiveness & simplified success

what is web service

The term Web services describes a standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backbone.

what is qr code

a machine-readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone

What is QlikView

What is QlikView?

QlikView is the Business Intelligence tool used by the University of St Andrews.  Data from different University systems is combined and presented in a single dashboard in an easy and understandable way.

QlikView dashboards at the University of St Andrews are built on the following principles:

Dashboards must be effective to use
Dashboards must support users in carrying out their tasks
Dashboards must provide the right kind of functionality
It must be easy to learn how to use a dashboard
It must be easy to remember how to use a dashboard
To use QlikView, you do not need to have technical expertise in information systems, just a willingness to learn how it can support you.

what is quality assurance

Quality assurance (QA) is a process-centered approach to ensuring that a company or organization is providing the best possible products or services. It is related to quality control, which focuses on the end result, such as testing a sample of items from a batch after production. Although these terms are sometimes used interchangeably, quality assurance focuses on enhancing and improving the process that is used to create the end result, rather than focusing on the result itself. Among the parts of the process that are considered in QA are planning, design, development, production and service.

what is java programming

Java is a programming language. It was first developed by James Gosling at Sun Microsystems, which is now a part of Oracle Corporation. It was released in 1995 as a part of Sun Microsystems' Java platform. The language has developed much of its syntax from C and C++.

A high-level programming language developed by Sun Microsystems. Java was originally called OAK, and was designed for handheld devices and set-top boxes. Oak was unsuccessful so in 1995 Sun changed the name to Java and modified the language to take advantage of the burgeoning World Wide Web.

Java is an object-oriented language similar to C++, but simplified to eliminate language features that cause common programming errors. Java source code files (files with a .java extension) are compiled into a format called bytecode (files with a .class extension), which can then be executed by a Java interpreter. Compiled Java code can run on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VMs), exist for most operating systems, including UNIX, the Macintosh OS, and Windows. Bytecode can also be converted directly into machine language instructions by a just-in-time compiler (JIT).

Java is a general purpose programming language with a number of features that make the language well suited for use on the World Wide Web. Small Java applications are called Java applets and can be downloaded from a Web server and run on your computer by a Java-compatible Web browser, such as Netscape Navigator or Microsoft Internet Explorer.

what is jailbreak

Jailbreaking is the process of removing limitations on iOS, Apple's operating system, on devices running it through the use of software and hardware exploits; such devices include the iPhone, iPod touch, iPad, and second-generation Apple TV.

Many smartphone, tablet, and game console makers include a layer of Digital Rights Management (DRM) software on their products. This DRM exists either to limit the software you can run on it, or is there for security reasons. Jailbreaking is the process of hacking these devices to bypass DRM restrictions, allowing you to run "unauthorized" software and to make other tweaks to your operating system.

More technically, jailbreaking can be thought of as the process of installing "a modified set of kernel patches (the kernel being the supervisor of the operating system) that allow you to run unsigned code," as saurik explains. It also gives you root-level access, which is otherwise unavailable. The term "root" comes from UNIX, where it is the superuser account that has unrestricted rights and permissions to all files. This provides you with added flexibility, but it also has some inherent dangers (more on that later).

You can alter or install anything onto your phone or tablet such as UI hacks (like the 5-icon dock) or unofficial apps (like classic console emulators) that would not otherwise be accepted into the App Store. Saurik's alternative app store, called Cydia, is arguably the definitive repository of such apps or tweaks. Cydia is so ubiquitous in iOS jailbreaking circles that most jailbreak tools install it automatically.

iPhone hackers first coined the term "jailbreaking" in reference to breaking the iPhone out of Apple’s iTunes “jail.” The term has since been (somewhat erroneously) used in a more general sense to refer to similar hacks made to other platforms like Android, where it's also known as “rooting”. In any case, the basic concept is the same, regardless of what you call it. 

what is jquery

jQuery is a fast, small, and feature-rich JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers

what is java script

JavaScript is a scripting language designed primarily for adding interactivity to Web pages and creating Web applications. The language was first implemented by Netscape Communications Corp. in Netscape Navigator 2 beta (1995). JavaScript is different from the Java language (developed in the 1990s at Sun Microsystems). However, the two languages can interoperate well. Client-side JavaScript programs, or scripts, can be embedded directly in HTML source of Web pages. (Note: There is also server-side JavaScript, but it's beyond the scope of this FAQ collection.) Depending on the Web developer's intent, script code may run when the user opens the Web page, clicks or drags some page element with the mouse, types something on the keyboard, submits a form, or leaves the page.

what is java

What is Java?

Java allows you to play online games, chat with people around the world, calculate your mortgage interest, and view images in 3D, just to name a few. It's also integral to the intranet applications and other e-business solutions that are the foundation of corporate computing.

What causes hernia

There is usually no obvious reason for a hernia, except for an incisional hernia being a complication of abdominal surgery. Risk of hernia increases with age and is more common in men than women.1

A hernia can be congenital - present at birth - or develop in children with a weakness in their abdominal wall.2

Certain activities and medical problems raise pressure on the abdominal wall and can lead to a hernia, including:1,2

Straining on the toilet, for example because of long-term constipation
Long-term cough
Cystic fibrosis
Enlarged prostate
Straining to urinate
Being overweight or obese
Abdominal fluid
Lifting heavy items
Peritoneal dialysis
Poor nutrition
Smoking
Physical exertion
Undescended testicles.

what is hernia

A hernia occurs when there is a weakness or hole in the muscular wall that usually keeps abdominal organs in place - the peritoneum. This defect allows organs and tissues to push through, or herniate, producing a bulge.1,2

Hernias can be found in different areas as follows:2

Groin - a femoral hernia gives a bulge just below the groin (more common in women); an inguinal hernia (more common in men) is a bulge in the groin that may reach the scrotum
Upper part of the stomach - hiatal or hiatus hernia is the upper part of the stomach pushing up out of the abdominal cavity and into the chest cavity via an opening in the diaphragm
Belly button - a bulge around here is produced by an umbilical hernia
Surgical scar - past abdominal surgery can lead to an incisional hernia through the operational scar.

what is halloween

the night of 31 October, the eve of All Saints' Day, often celebrated by children dressing up in frightening masks and costumes. Halloween is thought to be associated with the Celtic festival Samhain, when ghosts and spirits were believed to be abroad.

what is html

HTML is a computer language devised to allow website creation. These websites can then be viewed by anyone else connected to the Internet. It is relatively easy to learn, with the basics being accessible to most people in one sitting; and quite powerful in what it allows you to create. It is constantly undergoing revision and evolution to meet the demands and requirements of the growing Internet audience under the direction of the » W3C, the organisation charged with designing and maintaining the language.

The definition of HTML is HyperText Markup Language.
HyperText is the method by which you move around on the web — by clicking on special text called hyperlinks which bring you to the next page. The fact that it is hyper just means it is not linear — i.e. you can go to any place on the Internet whenever you want by clicking on links — there is no set order to do things in.
Markup is what HTML tags do to the text inside them. They mark it as a certain type of text (italicised text, for example).
HTML is a Language, as it has code-words and syntax like any other language.

what is hadoop

Hadoop is a free, Java-based programming framework that supports the processing of large data sets in a distributed computing environment. It is part of the Apache project sponsored by the Apache Software Foundation.

what is google drive

Google Drive is a cloud storage service that allows you to store your documents, photos, videos, and more online. From Drive, you can also use Google Docs, Google Sheets, and other applications to create and edit various types of files.

What are the Greenhouse Gases

What are the Greenhouse Gases?

The most significant greenhouse gas is actually water vapor, not something produced directly by humankind in significant amounts. However, even slight increases in atmospheric levels of  carbon dioxide (CO2) can cause a substantial increase in temperature.

Why is this? There are two reasons: First, although the concentrations of these gases are not nearly as large as that of oxygen and nitrogen (the main constituents of the atmosphere), neither oxygen or nitrogen are greenhouse gases. This is because neither has more than two atoms per molecule (i.e. their molecular forms are O2 and N2, respectively), and so they lack the internal vibrational modes that molecules with more than two atoms have. Both water and CO2, for example, have these "internal vibrational modes", and these vibrational modes can absorb and reradiate infrared radiation, which causes the greenhouse effect.

Secondly,  CO2 tends to remain in the atmosphere for a very long time (time scales in the hundreds of years). Water vapor, on the other hand, can easily condense or evaporate, depending on local conditions. Water vapor levels therefore tend to adjust quickly to the prevailing conditions, such that the energy flows from the Sun and re-radiation from the Earth achieve a balance. CO2 tends to remain fairly constant and therefore behave as a controlling factor, rather than a reacting factor. More CO2 means that the balance occurs at higher temperatures and water vapor levels.

what is global warning

What is Global Warming?

Global Warming is the increase of Earth's average surface temperature due to effect of greenhouse gases, such as carbon dioxide emissions from burning fossil fuels or from deforestation, which trap heat that would otherwise escape from Earth. This is a type of greenhouse effect.

Is global warming, caused by human activity, even remotely plausible?

Earth's climate is mostly influenced by the first 6 miles or so of the atmosphere which contains most of the matter making up the atmosphere. This is really a very thin layer if you think about it. In the book The End of Nature, author Bill McKibbin tells of walking three miles to from his cabin in the Adirondack's to buy food. Afterwards, he realized that on this short journey he had traveled a distance equal to that of the layer of the atmosphere where almost all the action of our climate is contained. In fact, if you were to view Earth from space, the principle part of the atmosphere would only be about as thick as the skin on an onion! Realizing this makes it more plausible to suppose that human beings can change the climate. A look at the amount of greenhouse gases we are spewing into the atmosphere (see below), makes it even more plausible.

what is php

PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language.

what is ovulation

Ovulation is one part of the female menstrual cycle whereby a mature ovarian follicle (part of the ovary) discharges an egg (also known as an ovum, oocyte, or female gamete). It is during this process that the egg travels down the fallopian tube where it may be met by a sperm and become fertilized.

what is oracle

I guess the first question is really, "What is a database"? A database is an organized collection of data. The data can be textual, like order or inventory data, or it can be pictures, programs or anything else that can be stored on a computer in binary form.

A relational database stores the data in the form of tables and columns. A table is the category of data, like Employee, and the columns are information about the category, like name or address.

Some databases have minimal feature sets and only store data, while others include programming languages, facilities and utilities to support enterprise-level applications like ERP and data warehousing. Oracle is the #1 database and has the most advanced feature set.

Oracle is made up of a set of processes running in your operating system. These processes manage how data is stored and how it is accessed. I will cover these processes in detail in the future; but for now we just need to understand that Oracle is a program that is running in the background, maintaining your data for you and figuring out where it should go on your hard drive.

In almost all relational databases, data is accessed through SQL, or Structured Query Language, and Oracle is no exception. SQL allows you to SELECT your data, INSERT new records, UPDATE existing records and DELETE records you want to get rid of. SQL can be embedded in other languages or you can run scripts of SQL directly against the database.

PL/SQL is the procedural language extension to SQL. PL/SQL is a programming language like C, Java or Pascal. In the Oracle world, there is no better way to access your data from inside a program. SQL can be natively embedded in PL/SQL programs. I will be using both SQL and PL/SQL very heavily in my future articles.

PL/SQL is a feature-rich language geared toward developing database applications. PL/SQL is the procedural language of the database, but it is also the procedural language for most of Oracle's tools. Programs that run inside the database are called stored procedures. These stored procedures are almost always PL/SQL, but can be written in Java.