Pages

Monday, 2 February 2015

what is paypal account.

A PayPal Personal Account is the right choice if you're a buyer: Shop securely on merchant websites and eBay. Make purchases with your credit card, debit card, or bank account. Send money to friends, family, or anyone with an email address.

PayPal is an American, international digital wallet based e-commerce business allowing payments and money transfers to be made through the Internet. Online money transfers serve as electronic alternatives to paying with traditional paper methods, such as checks and money orders.

PayPal is one of the world's largest internet payment companies. The company operates as an acquirer, performing payment processing for online vendors, auction sites and other commercial users, for which it charges a fee.

Established in 1998, PayPal (NASDAQ: PYPL) had its IPO in 2002, and became a wholly owned subsidiary of eBay later that year. In 2013, PayPal moved $180 billion in 26 currencies across 193 nations, generating a total revenue of $6.6 billion (41% of eBay’s total profits). In 2014, eBay announced plans to spin-off PayPal into an independent company the following year.

what is pancard

Permanent Account Number (PAN) is a ten-digit alphanumeric number, issued in the form of a laminated card, by the Income Tax Department, to any “person” who applies for it or to whom the department allots the number without an application.

What is a PAN Card?

It is a laminated card issued by the Indian Income Tax Department, that can be considered as an ID bearing a unique 10 digit alpha numeric permanent account number also known as PAN; which is now mandatory for Non resident & international organizations if they wish to carry any kind of financial transaction in India.

Is it compulsory for a NRI?

With effect from April 1st, 2007, it is compulsory for NRIs, Foreign citizens & international firms.

HOW you can get it internationally?

You need to quote it on all kinds of money related transactions in India, like buying property, opening demat/bank account, carrying business, etc.

What does a PAN card contain?

It contains your permanent account number, name, birth date, father's name, photo, Govt hologram & signature.

Who is eligible to apply for it?

Anyone of any age can register for one.

Does a NRI pay tax, if he gets a it?

Getting a PAN does not mean you have to pay taxes.
You pay tax only if you make money in India.

what is oauth

OAuth is an open standard to authorization. OAuth provides client applications a 'secure delegated access' to server resources on behalf of a resource owner. It specifies a process for resource owners to authorize third-party access to their server resources without sharing their credentials.

It is important to realize OAuth is a way to authenticate users - to ensure a user is who he says he is. The protocol was designed to circumvent problems with the sharing of user credentials in distributed and Web 2.0 environments. With OAuth, resources stored on one website can be shared or accessed by a user once he is authenticated via OAuth. There is no need for the user to create a new account on the website and, at the same time, the website is not privy to the user's credentials.

OAuth operates much like a client/server computing model, where a primary website storing the user resources acts as a server and the website or application accessing that data is a client. The primary website establishes an OAuth interface (otherwise called an API) and secret key for the requesting website as a means of establishing a session to validate the user. Once the user requests access to the data or resources of the client website, he or she takes a side trip and is forwarded to the login procedure of the primary website, at which time the user provides his or her login credentials. Upon successful authentication there, an authorization token is sent from that primary website to the requesting website as an acknowledgment of authentication - allowing the user the access of data or other resources originally requested.
 

how to change passwords in sbi internet banking

 internet banking password

1)   login to your sbi internet banking account

2)   choose the profile on the menu

3)   choose the change passwords

4) enter your profile password

5)  choose he login password

6) enter the old password first column

7) enter the new password in second column

8) re enter the new password in third column

9) enter the submit button

what is hardware and software

Computer software, on the other hand, is not something you can touch. Software is a set of instructions for a computer to perform specific operations. You need both hardware and software for a computer system to work. Some hardware components are easy to recognize, such as the computer case, keyboard, and monitor.

A computer system consists of two major elements: hardware and software. Computer hardware is the collection of all the parts you can physically touch. Computer software, on the other hand, is not something you can touch. Software is a set of instructions for a computer to perform specific operations. You need both hardware and software for a computer system to work.

Some hardware components are easy to recognize, such as the computer case, keyboard, and monitor. However, there are many different types of hardware components. In this lesson, you will learn how to recognize the different components and what they do. 

what is yarn in hadoop

YARN is one of the key features in the second-generation Hadoop 2 version of the Apache Software Foundation's open source distributed processing framework. Originally described by Apache as a redesigned resource manager, YARN is now characterized as a large-scale, distributed operating system for big data applications.

YARN is the central point of investment for Hortonworks within the Apache community. In fact, YARN was originally proposed (MR-279) and architected by one of our founders, Arun Murthy. Our engineers have been working within the Hadoop community to deliver and improve YARN for years. It has matured to become the solid, reliable architectural center of Hadoop and is a foundational component.

While relied upon by thousands, YARN can always be improved, especially with new engines emerging to interact with Hadoop data. To this end, Hortonworks has laid out the following investment themes for this foundational technology.

how to change password in sbi internet banking

 internet banking password

1)   login to your sbi internet banking account

2)   choose the profile on the menu

3)   choose the change passwords

4) enter your profile password

5)  choose he login password

6) enter the old password first column

7) enter the new password in second column

8) re enter the new password in third column

9) enter the submit button

what is 3d printing

3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. The creation of a 3D printed object is achieved using additive processes. In an additive process an object is created by laying down successive layers of material until the entire object is created. Each of these layers can be seen as a thinly sliced horizontal cross-section of the eventual object.

how to change gmail password

Change your Google Account password
Forgot password

If you forgot your password, type your username on the trouble signing in page to reset your password.
Change password

To change your Google Account password, go to the change your password page.

Or you can follow the steps listed below:

    Go to your Google Account Settings page.
    In the Signing in section, click Password.

Remember that changing your Google Account password changes it for all Google products you use, like Gmail and YouTube, so be sure to use your new password the next time you sign in.
Password requirements

Here are a few rules to keep in mind when choosing a password:

    Passwords must be at least 8 characters long.
    You can’t reuse a password that you've used in the last year.
    Passwords can contain the following characters:
        Upper and lowercase letters (A-Z and a-z). Please note that passwords are case-sensitive, so a "G" is different from a "g".
        Numbers (0-9).
        The following symbols as well as spaces: ! " # $ % & ‘ ( ) * + , - . / : ; < = > ? @ [ \ ] ^ { | } ~
    Certain passwords that are easy to guess like "12345678" can’t be chosen.

Creating a strong password

To keep your account safe, here are a few tips on how to create a strong password:

    Use a different password for each of your important accounts, like your email and online banking accounts. Choosing the same password for each of your online accounts is like using the same key to lock your home, car and office – if a criminal gains access to one, they can break in to all.
    Use a mix of letters, numbers, and symbols in your password.
    Try using a phrase that only you know. For example, “My friends Tom and Jasmine send me a funny email once a day” and then use numbers and letters to recreate it. “MfT&Jsmafe1ad” is a password with lots of variations.

how to use vlookup

Add your new column on your original worksheet that will display the info pulled from the Lookup table. ...
Place your cursor in the first blank cell in that column. ...
From the Insert menu, select Function…. ...
In the Search for a function: text box, type “vlookup” and click Go.

what is tax

A fee charged ("levied") by a government on a product, income, or activity. If tax is levied directly on personal or corporate income, then it is a direct tax. If tax is levied on the price of a good or service, then it is called an indirect tax. The purpose of taxation is to finance government expenditure. One of the most important uses of taxes is to finance public goods and services, such as street lighting and street cleaning. Since public goods and services do not allow a non-payer to be excluded, or allow exclusion by a consumer, there cannot be a market in the good or service, and so they need to be provided by the government or a quasi-government agency, which tend to finance themselves largely through taxes.

what is rac

A Reservation Against Cancellation (RAC) is a type of ticket that can be purchased for travel on the Indian Railways. Although it ensures certainty of travel, it does not guarantee a berth.

A Reservation Against Cancellation (RAC) is technically a train ticket with confirmed seat but wait listed berth.

In other words, if your train ticket shows RAC as its status (with an RAC status number), you can board the train and occupy the seat allowed, instead of a sleeping berth at night.

In fact the seat you are allocated is a shorter version berth, shared by one more RAC status co-passenger. You still are wait listed for a berth throughout the journey. If any berth is available during the journey, the conductor (TTE) allocates it to you based on your ticket’s RAC position.

Yes, RAC & WL are a bit complicated concept in the Indian trains. But this is a very useful process in the Indian Trains systems to give a better chance for the wait listed (WL) passengers.

what is rave party

A rave is an electronic music dance party that lasts all night. It can feature performances from DJs or live music performers. Raves usually take place in dark rooms filled with laser lights, strobes and for machines. Law enforcement agencies suspect a lot of drugs, including Ecstacy, do the rounds at a rave.

what is ram

RAM (pronounced ramm) is an acronym for random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.

Random-access memory (RAM) is a type of computer data storage. A RAM device makes is possible to access data in random order, which makes it very fast to find a specific piece of information. Certain other types of storage are not random-access. For example, a hard disk drive and a CD read and write data in a predetermined order. The mechanical design of these devices prescribes that data access is consecutive. This means that the time it takes to find a specific piece of information can vary greatly depending on where it is located on the disk.

RAM devices are used in computer systems as the main memory. RAM is considered volatile memory, which means that the stored information is lost when there is no power. So RAM is used by the central processing unit (CPU) when a computer is running to store information that needs to be used very quickly, but it does not store any information permanently.

Present-day RAM devices use integrated circuits to store information. This is a relatively expensive form of storage and the cost per unit of storage ($ per gigabyte) is much higher than for devices like a hard drive. However, the time to access data is so much faster for RAM that speed outweighs cost. A computer therefore uses a certain amount of RAM for fast-access, temporary storage of information and a much larger amount of non-random, permanent mass storage like a hard disk drive. For example, a typical computer system may have 2-8 GB (gigabytes) of RAM, while the storage capacity of the hard disk drive can be several hundred GB or even one TB. 

what is uart

A UART is usually an individual (or part of an) integrated circuit used for serial communications over a computer or peripheral device serial port. UARTs are now commonly included in microcontrollers.

Short for Universal Asynchronous Receiver-Transmitter, UART is a chip used to manage computer serial ports, disk drive interrupts, screen refresh cycles, and any other device that requires timing. With a serial port transmission, the UART converts the bytes into serial bits and transmits those bits through an asynchronous transmission, stripping out the start and stop bits for each character. Below is a listing of various UART chips. The 16550 chip series is the most commonly used UART.

    8250 UART was the original UART and was capable of speeds up to 9600 bps with a 1-byte FIFO.
    8250A UART was a revised version of the 8250 with an additional register that allowed software to verify it was a 8250 UART.
    16450 UART Slightly faster than earlier UARTs.
    16540 UART capable of speeds up to 9600 bps.
    16550 UART has a 16-byte FIFO.
    16550A UART had same features as previous 16550 UART with new fixes.
    16550AF UART had same features as previous 16550 UART with faster capabilities.
    16550AFN UART had same features as previous 16550 UART except was a ceramic chip.
    16650 UART has a 32-byte FIFO.
    16750 UART has a 64-byte FIFO.
    16950 UART has a 128-byte FIFO.
 

what is earthing

The main reason for doing earthing in electrical network is for the safety. When all metallic parts in electrical equipments are grounded then if the insulation inside the equipments fails there are no dangerous voltages present in the equipment case. If the live wire touches the grounded case then the circuit is effectively shorted and fuse will immediately blow. When the fuse is blown then the dangerous voltages are away.

Studies now show that just standing on the earth barefoot has amazing health benefits as we drain off free-radicals and the electric charge we carry with us. This phenomena is also known as "earthing".

Think of it this way. The earth is a giant car battery with a liquid metal core. It carries a strongly negative charge. And anything above the ground (such as in the air or insulated from the ground) carries a positive charge. This is why lightning strikes oocur, and why we need to “ground” or protect all of our electrical and electronic equipment, to keep them from sparking or short circuiting.

In essence, to ground something is to plug it back in to the earth, which is actually the third prong on our electrical outlets (called a ground).

Human beings, and all organisms for that matter, are electrical in nature as well. We get ekgs, mri’s, and all sorts of electrical tests to measure our health, hearts, and bodies; our nervous system works on electrical impulses, and even the heart beats with an electrical charge (which is why you may get a pacemaker if it starts getting out of tune).

We are electrical in nature, and like electrical equipment and electronics needs to be properly grounded to function well (if you’ve ever listened to an ungrounded radio you know what I mean, you’ll hear tons of static and background noise until it’s grounded), we need to be grounded for proper health and well-being and for proper functioning of our bodies.

what is tan

Every deductor is required to obtain a unique identification number called TAN (Tax Deduction Account Number) which is a ten digit alpha numeric number. This number has to be quoted by the deductor in every correspondence related to TDS.

 Procedure for getting TAN :

It can be obtained by filing an application in form no. 49B to any of the TIN facilitation Centres (TIN-FC) namely NSDL. Addresses of the TIN-FC as well as the forms can be downloaded from the website http://www.incometaxindia.gov.in/Pages/default.aspx orhttp://tin-nsdl.com/. The fee for processing TAN application is Rs.  60/-. This can be paid by:

▬   Cash at TIN-FC counter

▬   Demand draft or

▬   Cheque or

▬   Credit card

The demand draft/ cheque shall be in favour of 'NSDL-TIN'.

TAN number will be communicated to the deductor by NSDL.

what is earthquake

Movements within the Earth’s crust cause stress to build up at points of weakness, and rocks to deform.

Stored energy builds up in the same way as energy builds up in the spring of a watch when it is wound. When the stress finally exceeds the strength of the rock, the rock fractures along a fault, often at a zone of existing weakness within the rock.

The stored energy is suddenly released as an earthquake.

Intense vibrations, or seismic waves, spread out from the initial point of rupture, the focus, like ripples on a pond.

These waves are what makes the ground shake and can travel large distances in all directions. Near the focus, the waves can be very large, making them extremely destructive.

what is qa and qc

QA/QC is the combination of quality assurance, the process or set of processes used to measure and assure the quality of a product, and quality control, the process of meeting products and services to consumer expectations.
 QA/QC is the combination of quality assurance, the process or set of processes used to measure and assure the quality of a product, and quality control, the process of meeting products and services to consumer expectations. Quality Assurance is process oriented and focuses on defect prevention, while quality control is product oriented and focuses on defect identification.

what is matlab

MATLAB is a high-performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include: Math and computation.

MATLAB is a high-performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include:

    Math and computation
    Algorithm development
    Modeling, simulation, and prototyping
    Data analysis, exploration, and visualization
    Scientific and engineering graphics
    Application development, including Graphical User Interface building

MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical computing problems, especially those with matrix and vector formulations, in a fraction of the time it would take to write a program in a scalar noninteractive language such as C or Fortran.

The name MATLAB stands for matrix laboratory. MATLAB was originally written to provide easy access to matrix software developed by the LINPACK and EISPACK projects, which together represent the state-of-the-art in software for matrix computation.

MATLAB has evolved over a period of years with input from many users. In university environments, it is the standard instructional tool for introductory and advanced courses in mathematics, engineering, and science. In industry, MATLAB is the tool of choice for high-productivity research, development, and analysis.

MATLAB features a family of application-specific solutions called toolboxes. Very important to most users of MATLAB, toolboxes allow you to learn and apply specialized technology. Toolboxes are comprehensive collections of MATLAB functions (M-files) that extend the MATLAB environment to solve particular classes of problems. Areas in which toolboxes are available include signal processing, control systems, neural networks, fuzzy logic, wavelets, simulation, and many others.

what is nanotechnology

Take a random selection of scientists, engineers, investors and the general public and ask them what nanotechnology is and you will receive a range of replies as broad as nanotechnology itself. For many scientists, it is nothing startlingly new; after all we have been working at the nanoscale for decades, through electron microscopy, scanning probe microscopies or simply growing and analysing thin films. For most other groups, however, nanotechnology means something far more ambitious, miniature submarines in the bloodstream, little cogs and gears made out of atoms, space elevators made of nanotubes, and the colonization of space. It is no wonder people often muddle up nanotechnology with science fiction.

what is namespace

In general, a namespace uniquely identifies a set of names so that there is no ambiguity when objects having different origins but the same names are mixed together. Using the Extensible Markup Language (XML), an XML namespace is a collection of element type and attribute names. These element types and attribute names are uniquely identified by the name of the unique XML namespace of which they are a part. In an XML document, any element type or attribute name can thus have a two-part name consisting of the name of its namespace and then its local (functional) name.

Sunday, 1 February 2015

what is cache memory

A CPU cache is a cache used by the central processing unit (CPU) of a computer to reduce the average time to access data from the main memory. The cache is a smaller, faster memory which stores copies of the data from frequently used main memory locations

Cache (pronounced cash) memory is extremely fast memory that is built into a computer’s central processing unit (CPU), or located next to it on a separate chip. The CPU uses cache memory to store instructions that are repeatedly required to run programs, improving overall system speed. The advantage of cache memory is that the CPU does not have to use the motherboard’s system bus for data transfer. Whenever data must be passed through the system bus, the data transfer speed slows to the motherboard’s capability. The CPU can process data much faster by avoiding the bottleneck created by the system bus.

As it happens, once most programs are open and running, they use very few resources. When these resources are kept in cache, programs can operate more quickly and efficiently. All else being equal, cache is so effective in system performance that a computer running a fast CPU with little cache can have lower benchmarks than a system running a somewhat slower CPU with more cache. Cache built into the CPU itself is referred to as Level 1 (L1) cache. Cache that resides on a separate chip next to the CPU is called Level 2 (L2) cache. Some CPUs have both L1 and L2 cache built-in and designate the separate cache chip as Level 3 (L3) cache.
 

what is xampp

XAMPP (/ˈzæmp/ or /ˈɛks.æmp/) is a free and open source cross-platform web server solution stack package, consisting mainly of the Apache HTTP Server, MySQL database, and interpreters for scripts written in the PHP and Perl programming languages.

what is zapr

ZAPR is a mobile app that rewards you for watching TV Ads. The next time you're watching TV and the ad break starts, just switch on ZAPR and let it run its magic. ZAPR listens to your TV, identifies what ad you're watching and unlocks awesome brand related content.

Zapr (previously known as zingee) is a curious and useful application that allows you to create a link to any file on your computer, so this link can be sent to any friend via email, thus allowing one to access the file. There is no size limit, I tried it a few months ago with sharing multiple files over 2 Gbs and was amazed at how quick and simple it is.
Three options are given by Zapr: create your channels and websites, upload your content, and share folders online. It should be noted that these links can be public or private. Besides providing these links to our friends on the list of our Zapr IM-like interface, we can set a password for security concerns. The person who receives the link via email or IM just needs an internet browser and a password (if its a private link) to be ready to download the files.

In order to use the program you or the person who is going to share files need to create an account, which by the way is free. Once you set up your user and password, you can create unlimited amount of shares and the best part is that you can even log in to the program's website and download or upload files from any computer without the need to install the program on every computer.

It allowed me to provide recovered data to a customer, quickly.... Highly recommended!

what is zabbix

Zabbix is an enterprise open source monitoring solution for networks and applications, created by Alexei Vladishev. It is designed to monitor and track the status of various network services, servers, and other network hardware. Zabbix uses MySQL, PostgreSQL, SQLite, Oracle or IBM DB2 to store data.

Zabbix was created by Alexei Vladishev, and currently is actively developed and supported by Zabbix SIA.

Zabbix is an enterprise-class open source distributed monitoring solution.

Zabbix is software that monitors numerous parameters of a network and the health and integrity of servers. Zabbix uses a flexible notification mechanism that allows users to configure e-mail based alerts for virtually any event. This allows a fast reaction to server problems. Zabbix offers excellent reporting and data visualisation features based on the stored data. This makes Zabbix ideal for capacity planning.

Zabbix supports both polling and trapping. All Zabbix reports and statistics, as well as configuration parameters, are accessed through a web-based frontend. A web-based frontend ensures that the status of your network and the health of your servers can be assessed from any location. Properly configured, Zabbix can play an important role in monitoring IT infrastructure. This is equally true for small organisations with a few servers and for large companies with a multitude of servers.

Zabbix is free of cost. Zabbix is written and distributed under the GPL General Public License version 2. It means that its source code is freely distributed and available for the general public. 

what is zamindari system

(in British India) the system of landholding and tax collection by zamindars. 2. (in British India) the office or territory held or administered by a zamindar. 3. (in Mogul India) the system of collecting farm revenue, a fixed sum based on the assigned district.

what is latitude and longitude

Latitude angles can range up to +90 degrees (or 90 degrees north), and down to -90 degrees (or 90 degrees south). Latitudes of +90 and -90 degrees correspond to the north and south geographic poles on the earth, respectively. Longitude is defined in terms of meridians, which are half-circles running from pole to pole.

Latitude is defined with respect to an equatorial reference plane. This plane passes through the center C of the sphere, and also contains the great circle representing the equator. The latitude of a point P on the surface is defined as the angle that a straight line, passing through both P and C , subtends with respect to the equatorial plane. If P is above the reference plane, the latitude is positive (or northerly); if P is below the reference plane, the latitude is negative (or southerly). Latitude angles can range up to +90 degrees (or 90 degrees north), and down to -90 degrees (or 90 degrees south). Latitudes of +90 and -90 degrees correspond to the north and south geographic poles on the earth, respectively.


Longitude is defined in terms of meridians, which are half-circles running from pole to pole. A reference meridian, called the prime meridian , is selected, and this forms the reference by which longitudes are defined. On the earth, the prime meridian passes through Greenwich, England; for this reason it is also called the Greenwich meridian . The longitude of a point P on the surface is defined as the angle that the plane containing the meridian passing through P subtends with respect to the plane containing the prime meridian. If P is to the east of the prime meridian, the longitude is positive; if P is to the west of the prime meridian, the longitude is negative. Longitude angles can range up to +180 degrees (180 degrees east), and down to -180 degrees (180 degrees west). The +180 and -180 degree longitude meridians coincide directly opposite the prime meridian.

what is karma

The definition of  karma? For every action there will always be a reaction. Your actions create a ripple in the universe. Your thoughts and actions are powerful. They carry energy. They are like an echo.

Your thoughts and feelings shape the world within you. Your words and actions shape the world around you. You are constantly shaping your world, little by little.

In popular sayings, we have:

    It will come home to them

    Chickens return to their roost

    They will get what's coming to them

The meaning is that evil is returned to the wrong-doer and they will eventually suffer for what they did.

This, in essence is the Law of Karma. That we receive what we give. That all our actions reflect back upon us, either in this world or in the subsequent ones.

How does Karma work?

Karma is based on logic. It is an unavoidable consequence of our creations. When we create anything, we also create other things which might not be what we intended.

If I get angry and with another harm, then I create a state in which I am harming another and another is harmed. I create a state in which I am happy with the suffering of another. But also create a state in which another is unhappy and suffering. I create a state in which I am joyful that my enemy is justly harmed. And a state in which another is resentful and angry that they have been wrongly treated.

This relates to the GAMES of life. In whichever game we play certain causes and effects arise. And certain rules are required.

So when we create anything, whether a good intention or a bad one, other side-effects are necessarily produced.

Imagine a world where no one harmed another in any way. And I harm another. I create someone who harms another and one who is harmed. This did not exist before. But now the world contains suffering.

And in the present life, or in subsequent ones, there are those who suffer and those who harm. And I, and others, play all these roles.

In the beginning before harm was created, it was impossible to suffer. But when I do harm then suffering exists to my detriment.

Of course, I am not alone, and others who create harm also create suffering and we continue to play our games in a world with suffering.

Now after many aeons, we wonder why there is suffering. And why there is harm. Yet this is the result of our own creations. 

what is hacking

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.

Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.

Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve.

If you support the cause of this website, you can contribute by sharing it with your friends, using any of the buttons below.

what is fatty liver

Fatty liver, or steatosis, is a broad term that describes the buildup of fats in the liver. Having fat in your liver is normal, but if more than five to 10 percent is fat, then it is called fatty liver disease. Fatty liver is a reversible condition and usually goes away on its own.

what is factory method in java

Definition

Provides an abstraction or an interface and lets subclass or implementing classes decide which class or method should be instantiated or called, based on the conditions or parameters given.

Where to use & benefits

Connect parallel class hierarchies.
A class wants its subclasses to specify the object.
A class cannot anticipate its subclasses, which must be created.
A family of objects needs to be separated by using shared interface.
The code needs to deal with interface, not implemented classes.
Hide concrete classes from the client.
Factory methods can be parameterized.
The returned object may be either abstract or concrete object.
Providing hooks for subclasses is more flexible than creating objects directly.
Follow naming conventions to help other developers to recognize the code structure.
Related patterns include
Abstract Factory , which is a layer higher than a factory method.
Template method, which defines a skeleton of an algorithm to defer some steps to subclasses or avoid subclasses
Prototype, which creates a new object by copying an instance, so it reduces subclasses.
Singleton, which makes a returned factory method unique.

what is matual fund

An investment vehicle that is made up of a pool of funds collected from many investors for the purpose of investing in securities such as stocks, bonds, money market instruments and similar assets. Mutual funds are operated by money managers, who invest the fund's capital and attempt to produce capital gains and income for the fund's investors. A mutual fund's portfolio is structured and maintained to match the investment objectives stated in its prospectus.

INVESTOPEDIA EXPLAINS 'MUTUAL FUND'
One of the main advantages of mutual funds is that they give small investors access to professionally managed, diversified portfolios of equities, bonds and other securities, which would be quite difficult (if not impossible) to create with a small amount of capital. Each shareholder participates proportionally in the gain or loss of the fund. Mutual fund units, or shares, are issued and can typically be purchased or redeemed as needed at the fund's current net asset value (NAV) per share, which is sometimes expressed as NAVPS.

what is bootstrap

A bootstrap is a small strap or loop at the back of a leather boot that enables you to pull the entire boot on. In computers, to bootstrap (or "to boot") is to load a program into a computer using a much smaller initial program to load in the desired program (which is usually an operating system). In general usage, bootstrapping is the leveraging of a small initial effort into something larger and more significant. There is also a common expression, "pulling yourself up by your own bootstraps," meaning to leverage yourself to success from a small beginning.

what is bpo

Business process outsourcing (BPO) is a subset of outsourcing that involves the contracting of the operations and responsibilities of a specific business process to a third-party service provider

Techopedia explains Business Process Outsourcing (BPO)

BPO categories are front office customer services (such as tech support) and back office business functions (such as billing).

The following are BPO advantages:

    Business process speed and efficiency are enhanced.
    Employees may invest more time in core business strategies to bolster competitive advantage and enhance value chain engagement.
    Organizational growth increases when capital resource and asset expenditures are not required, which averts problematic investment returns.
    Organizations are not required to invest in unrelated primary business strategy assets, facilitating a shift in focus to specific competencies.

BPO risks include:

    Data privacy breaches
    Underestimated running costs
    Overdependence on service providers

what is namespace

In general, a namespace uniquely identifies a set of names so that there is no ambiguity when objects having different origins but the same names are mixed together. Using the Extensible Markup Language (XML), an XML namespace is a collection of element type and attribute names. These element types and attribute names are uniquely identified by the name of the unique XML namespace of which they are a part. In an XML document, any element type or attribute name can thus have a two-part name consisting of the name of its namespace and then its local (functional) name.

what is vat

A type of consumption tax that is placed on a product whenever value is added at a stage of production and at final sale. Value-added tax (VAT) is most often used in the European Union. The amount of value-added tax that the user pays is the cost of the product, less any of the costs of materials used in the product that have already been taxed.

Valued-added tax, or VAT, is a tax assessed on the supply of goods and services. Read more about where to find your VAT invoices.

Airbnb charges VAT on its service fees for users from the European Union, Switzerland, Norway, Iceland, and South Africa.

Guests

VAT is charged at the time of payment and is based on the total guest fee for a reservation. If you alter your reservation, VAT adjusts to reflect any change in the service fee.

For reservations booked between May 1, 2014 and December 31, 2014, Airbnb will calculate VAT based on the Irish VAT rate of 23% for all guests in the EU, regardless of country of residence. This change is related to Airbnb’s new international headquarters in Dublin.

On January 1, 2015, a new EU tax law takes effect. At this time, Airbnb will go back to calculating VAT according to the rate in guests' local country of residence, based on the selection when you enter payment information.

Hosts

VAT is deducted from your payout and is based on total host fee for a reservation. If you alter your reservation, VAT adjusts to reflect any change in the service fee.

For reservations booked between May 1, 2014 and December 31, 2014, Airbnb will calculate VAT based on the Irish VAT rate of 23% for all hosts in the EU, regardless of country of residence. This change is related to Airbnb’s new international headquarters in Dublin.

On January 1, 2015, a new EU tax law takes effect. At this time, Airbnb will go back to calculating VAT according to the rate in hosts’ local country of residence, based on the selection when you add a payout method.

what is case study

A case study is an in-depth study of one person. Much of Freud's work and theories were developed through individual case studies.

In a case study, nearly every aspect of the subject's life and history is analyzed to seek patterns and causes for behavior. The hope is that learning gained from studying one case can be generalized to many others. Unfortunately, case studies tend to be highly subjective and it is difficult to generalize results to a larger

what is nfc

NFC is a short-range high frequency wireless communication technology that enables the exchange of data between devices over about a 10 cm distance. NFC is an upgrade of the existing proximity card standard (RFID) that combines the interface of a smartcard and a reader into a single device.

How does NFC work?


At its core, all NFC is doing is identifying us, and our bank account, to a computer. The technology is simple. It's a short-range, low power wireless link evolved from radio-frequency identification (RFID) tech that can transfer small amounts of data between two devices held a few centimeters from each other.

Unlike Bluetooth, no pairing code is needed, and because it's very low power, no battery in the device being read. By tapping your phone on a contactless payment terminal in a shop, train station or coffee shop is able to identify your account (and even your personal preferences, shopping habits and even your most frequently travelled route home) and takes payment through an app on your phone.

Passive NFC 'tags' on posters, in shops and on trains could contain a web address, a discount voucher, a map or a bus timetable that passers-by could touch their phones on to receive - or to instantly pay for absolutely anything.

"The SIM card in your mobile phone is a smart card identifying your account to the network," says John Elliott, Head of Public Sector at Consult Hyperion, who's worked on the Oyster Card. "On NFC phones, the SIM is being extended to act as the Secure Element that can hold other apps such as payment cards." 

what is cif number

A computerized file that stores all pertinent information about a bank customer's personal and account information. The Customer Information File (CIF) allows the bank to view its customer accounts by relationship and not strictly by account type. For example, information such as credit relationships, account ownership information, accounts owned etc are included. It is updated as often as daily in order to ensure accuracy.

what is xslt

XSLT (Extensible Stylesheet Language Transformations) is a language for transforming XML documents into other XML documents, or other formats such as HTML for web pages, plain text or into XSL Formatting Objects, which may subsequently be converted to other formats, such as PDF PostScript and PNG.

Extensible Stylesheet Language Transformations (XSLT) has evolved from the early Extensible Stylesheet Language (XSL) standard. XSL specifies a language definition for XML data presentation and data transformations. Data presentation means displaying data in some format and/or medium. Presentation is about style. Data transformation means parsing an input XML document into a tree of nodes, and then converting the source tree into a result tree. Transformation is about data exchange.

Because these functionalities serve two distinct purposes, XSLT was proposed and later accepted as a separate standard for XML data transformation only. XSL is now generally referred to as XSL Formatting Objects (XSL-FO), to distinguish it from XSLT. The future of XSL-FO as a standard is uncertain, because much of its functionality overlaps with that provided by cascading style sheets (CSS) and the HTML tag set. If cross-vendor compatibility is important, you might want to avoid XSL-FO until it becomes a standard fully accepted by the Worldwide Web Consortium.

what is xpath

XPath is a language for addressing specific parts of an XML document. XPath, like the Document Object Model (DOM), models an XML document as a tree of nodes. An XPath expression is a mechanism for navigating through and selecting nodes from the XML document.

XPath is a language for addressing specific parts of an XML document. XPath, like the Document Object Model (DOM), models an XML document as a tree of nodes. An XPath expression is a mechanism for navigating through and selecting nodes from the XML document. An XPath expression is, in a way, analogous to an SQL query used to select records from a database.

There are different types of nodes, including element nodes, attribute nodes and text nodes. XPath defines a way to compute a string-value for each type of node.

XPath defines a library of standard functions for working with strings, numbers and boolean expressions.

    child::* - Selects all children of the root node.
    .//name - Selects all elements having the name "name", descendants of the current node.
    /catalog/cd[price>10.80] - Selects all the cd elements that have a price element with a value larger than 10.80