• Skip to main content
  • Skip to primary sidebar

Technipages

Tutorials and fixes for smartphone, gadget, and computer problems

  • Topics
    • Android
    • Browsers
    • Gaming
    • Hardware
    • Internet
    • iPhone
    • Linux
    • macOS
    • Office
    • Reviews
    • Software
    • Windows
    • Definitions
  • Product Reviews
  • Downloads
  • About

Definitions

Push Media

September 16, 2019 by Jennifer Spencer

Push media is any media marketing strategy in which the products being marketed are being suggested to the customers. Just as the term suggests, the products are pushed at the customers. Push Media is a producer of a good and service, promoting the same product to an audience to find relevance in it. Push media involves very little interaction with the audience of the product. … [Read more...] about Push Media

Technipages Explains Push Media

Push Media is a series of new content-delivery mechanisms on the Internet, in which users subscribe to what amounts to a broadcasting service. This subsequently delivers content to the user’s computer without the user having to make further requests for information. In contrast, to pull media, which must attract the user to the site, it can guarantee advertisers that subscribers will continue to receive updates and view advertising banners.
Among the various models that have been developed are applications such as PointCast that deliver news, weather, and sports scores to the user’s screen saver, and services such as Castanet, which employ a radio metaphor. The user tunes to a channel and content are delivered to the user whenever updates are available. The produced content may appear in a unique window that appears on the user’s desktop. Castanet can also automatically deliver software and updates to software, and thus creates a new and potentially significant model for software distribution and maintenance.

Common Uses of Push Media

  • Push media involves creativity and very little interaction with the audience of the product.
  • Push media, as the name implies intends to sell the idea of a product to an audience and this is done by explaining what a product does to them.
  • The push media technique of marketing has now influenced the digital and social media space.

Common Misuses of Push Media

  • Push media involves only the use of social media and not pushing a product around in a trolley.

Osi Reference Model

August 26, 2019 by Jennifer Spencer

Abbreviation for Open Systems Interconnect Reference Model. An international standard for conceptualizing the architecture of computer networks, established by the International Organization for Standardization (ISO) and the Institute of Electrical and Electronics Engineers (IEEE), that improves network flexibility. The employs a divide-and-conquer approach, in which network … [Read more...] about Osi Reference Model

Technipages Explains Osi Reference Model

OSI reference model is a representation to understand how applications communicate on a network. IT professionals, through the model, can chart how a data is sent or received. What OSI reference model does is to allow the data transmission to pass over seven layers, each of the seven layers have their distinctive roles. Better put, any communication between people from two ends can be reduced to seven layers.

Each of the layers has its; each function and that’s all the layer does. All the seven layers are powered by hardwares which ensures a signal is sent over the network. From the top of the stack of layers to the bottom, they are: application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical layer.

The model makes use of layers to understand what is going on in a particular system, if there was to be any issue, it helps the IT professional to pinpoint the source of the problem.

OSI reference model was adopted by the International Standards Organization (ISO) in 1984. Before this, it was being developed by some computer and telecommunications company in 1983. When the model was being developed, the aim was to provide a set of design standards for equipment hardware they could communicate.

Common Uses of Osi Reference Model

  • For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, which is a conceptual framework.
  • Most of the description of the OSI reference model go from top to bottom, with the numbers descending from layer 7 up till next layer 1.
  • OSI reference model is based on a proposal developed by the International Standards Organisation

Common Misuses of Osi Reference Model

  • The OSI reference models were not intended as a basis for developing universally accepted networking protocol.
  • OSI reference models have its equivalent of IP and TCP

Public Key Cryptography

August 26, 2019 by Jennifer Spencer

In cryptography, a revolutionary new method of encryption that does not require the message’s receiver to have received the decoding key in a separate transmission. The need to send the key, which is required to decode the message, is the chief vulnerability of previous encryption techniques. In public-key cryptography, there are two keys: a public one and a private one. The … [Read more...] about Public Key Cryptography

Technipages Explains Public Key Cryptography

Public key cryptography also called Asymmetric Key cryptography, is a system of encryption which is based on the use of two virtual keys, the private key, and the public key. The private key is used to decrypt a message while the public key is used to encrypt the message. In this model, once a message is encrypted by the public key, only the private key can decrypt the message. Just as the name of the key depicts, the private key is meant to be private so that only the handler of the key can access the message, unlike the public key which can be encrypted by anyone.

The keys are virtual keys, and the private and public keys are large numerical values used to encrypt and decrypt data.  The keys are produced by a trusted authority trusted by both parties. The private key is usually held by the generator of the key pair, while the public key, to anyone who wants to send data.

In 1977, public key cryptography was published by Whitfield-Diffie and Martin Hellman, but it was initially formulated by James Ellis. But even neither of them could devise applications of these in a practical world. Rivest-Shamir-Adleman was the first to publish a working public key cryptography system.

Common Uses of Public Key Cryptography

  • Public key cryptography is a modern cryptographic process  for communicating  securely without having previously agreed upon the secret key
  • In public key cryptography, it utilizes a pair of keys to establish secure communication.
  • Public key cryptography brings major security technologies to the desktop in the Windows 2000 environment.

Common Misuses of Public Key Cryptography

  • Public key cryptography doesn’t allow for non-repudiation so the sender can deny sending a message
  •  In public key cryptography, when a private key is lost, there are other ways to decrypt the message

Microsoft Windows 95

August 26, 2019 by Jennifer Spencer

A hybrid 16/32-bit operating system for Intel microprocessors that takes full advantage of the processing capabilities of Intel 80486 and Pentium microprocessors, while retaining downward compatibility with Windows 3.1 programs. Compared to Microsoft Windows 3.1, Windows 95 offers a redesigned graphical user interface (GUI) that enhances ease of learning as well as … [Read more...] about Microsoft Windows 95

Technipages Explains Microsoft Windows 95

Windows system 95 is an operating system developed by Microsoft, and the system runs with MS-DOS. It is no longer a graphic user interface but now a complete operational system. The windows system 95 supports a RAM of up to 480MB. The codename for the project was Chicago.

Windows system 95 succeeded windows 3x. Improvements made to the windows 3x include the windows control, its notable plug and play feature, improved from 16-bit to 32-bit operating system, the inclusion of a start button, the introduction of the taskbar amidst many other things. The upgrade to 32bits was one of the most notable of the windows system 95. The improved 32-bits operating system allowed for far better user experience; this was owing to the larger main memory spaces and usage of faster CPUs.

The windows system 95 was initially released on August 24, 1995. On December 31, 2001, Microsoft terminated its support for Windows 95 and based on Microsoft Lifestyle Policy, and it was termed an obsolete product. The release of Windows system 95 was the biggest release by Windows.

Common Uses of Microsoft Windows 95

  • Windows system 95 is not a true 32-bit operating system (like OS/2 Warp or Microsoft’s own Microsoft Windows NT); nevertheless, users appreciate not having to upgrade their applications.
  • In Windows 95 and 98, you can boot into MS-DOS instead of Windows if you need to run MS-DOS for older programs.
  • Follow the instructions below to allow the computer to boot into Windows 95 or Windows 98 instead of MS/DOS

Common Misuses of Microsoft Windows 95

  • Before the advent of windows system 95, there were the 32-bits operating systems in operation
  • Windows system 95 was not designed to be maximally compatible with existing MS-DOS and 16-bits Windows programs and device drivers

CSS

August 26, 2019 by Jennifer Spencer

Acronym for Cascading Style Sheet, It is a World Wide Web Consortium (W3C) standard for style sheets capable of indicating presentation formats (such as fonts, font sizes, and paragraph alignment) for HTML elements. Using syntax, Web authors can incorporate style statements using HTML 4.0’s style attribute, a separate style area (using the STYLE element) within the document’s … [Read more...] about CSS

Technipages Explains CSS

CSS, an abbreviation for Cascading style sheet is used to describe how documents written in mark up languages like HTML should appear on the screen of different types of devices either on a small screen, big screen or even printers. It also works for any XML based mark-up language. CSS controls variables on a webpage such as a font, font colors, spacing and textures.

CSS was developed to enhance the separation of presentation and content of webpages. It can control the layout for quite some webpages at the same time. With CSS, it allows multiple pages to share the formatting information, and this minimizes repetition in the structural component of the documents. So, therefore, reducing the size of file transfer causing pages to load faster.

In the year 1996, the W3C (World Wide Web Consortium) introduced CSS, because, before this, development of large websites became long and expensive due to the style information being added to every single page of the website. With HTML being in use, the variables on a webpage were being described within the HTML. CSS was introduced to solve this problem.

Common Uses of CSS

  • CSS works on HTML and also on any XML based mark up language
  • CSS is the language for describing the presentation of web pages, and these include colors, fonts, and layouts
  • The separation of HTML from CSS makes it easier to maintain sites, share style sheets across pages, and design pages to individual tastes

Common Misuses of CSS

  • A typography CSS file can not define your typefaces, sizes, leading, kerning, and possibly even color
  • CSS does not  replace any part of HTML, and it is not even customizable

Cable Modem

September 16, 2019 by Jennifer Spencer

A cable modem is a device that enables a computer to access the Internet through a cable TV connection. Cable modems typically connect to a computer through an Ethernet network card or USB port. The cable TV service offers several advantages over telephone-based Internet access technologies (such as dial-up and ADSL). Most importantly, cable TV uses broadband, the coaxial cable … [Read more...] about Cable Modem

Technipages Explains Cable Modem

A cable modem is a device at the subscriber’s end of the cable that allows high-speed access to the internet through the use of cable TV networks. The cable modem depends on a coaxial cable network to send and receive data from the internet.
A cable modem takes a signal from the computer and converts it for transmission over a pre-existing cable network. A cable modem can work on multiple computers, and a cable modem can operate using an Ethernet hub or a router. It could also be used on a group of computers connected to a local area network. As opposed to Asymmetrical digital subscriber line (ADSL), cable modem networks work with Digital subscribers line. Internet information uses downstream data; the downstream data uses the cable space of a single channel of a cable TV program.
Its use of cable TV’s existing network can further the growth of internet usage in homes and businesses. Cable modems are known to be cheap and offer an efficient internet connection. The internet speed for a cable modem is currently pegged at 10megabits per second (10mps). Cable modem networks are not secured as users will still need a firewall and other security protocols to protect their computers.

Common Uses of Cable Modem

  • With a 10 Mbps cable modem, different files of different sizes can be downloaded in less than 10 seconds.
  • Meeting the minimum requirements for using a cable modem is part of things to consider while setting up an internet connection.
  • Their services include rental of a cable modem and other computer accessories.

Common Misuses of Cable Modem

  • I have seen the future and it is a standalone cable modem.  It functions all alone

Java

August 26, 2019 by Jennifer Spencer

Java is a cross-platform, object-oriented programming language enables programmers to write software that will execute on any computer capable of running an interpreter. This is a significant advantage over other programming languages which force the programmer to re-write their software for each processor or operating system combination. Java programs are compiled into … [Read more...] about Java

Technipages Explains Java

Java is a computer programming language that programmers use to write computer directives using English-based commands rather than to write in numeric codes. It’s falls in the class of a high-level language because it can be read and written easily by humans. In the event that a programmer writes a Java application, the compiled code runs on most operating systems (OS), including Windows, Linux, and Mac OS

Rewind back to the early 90s, Java, which initially went by the name Oak and then Green, was developed by a team spearheaded by James Gosling for Sun Microsystems, a subsidiary of Oracle. Java at its inception was designed for use on digital mobile devices, such as cellphones. However, when the first series Java 1.0 was launched in 1996, its primary focus then shifted to use on the internet, providing interactivity with users by giving developers a way to create animated web pages.

Java has an ordinance that determines how the instructions are written. These rules are known as its syntax. Once a program has been written, the high-level instructions are translated into numeric codes that computers can understand and execute

The popular disadvantage of java is that programs run more slowly than programs that are designed from the beginning with a specific processor in mind. Java, in essence, has transformed the way software is written, particularly for networks and the internet, replacing older technologies such as CGI which is widely accepted and used in business and Web development.

Common Uses of Java

  • It is usually common to wonder why these methods were included in Java from the onset
  • Continued research in the United States has been going on to use Java `to boost the brainpower military intelligence
  • The average computer programmer but have a basic understanding of Java

Common Misuses of Java

  • Java as a programming language is streamlined to specific operating systems.
  • Java has a destructor, so you must create an ordinary method to carry out a clean up

Binary Notation

August 26, 2019 by Jennifer Spencer

The binary notation a method of representing numbers that employ a base (radix) of 2; therefore, there are only two possible values (0 and 1). Binary notation differs from the notation systems people prefer; these have bases of 10 (decimal numbers), 12 (measurements in feet and inches), or 60 (minutes and hours). Binary notation shares one characteristic in common with more … [Read more...] about Binary Notation

Technipages Explains Binary Notation

Binary is a base-2 number system, which adopts the use of two digits (0 & 1). It is a system used at the crux of all digital computers, enabling them to encode information, perform arithmetic operations, and carry out logical control processes.

The modern binary notation system was studied in Europe in the 16th and 17th centuries by Thomas Harriot, Juan Caramuel Lobkowitz, and Gottfried Leibniz. However, methods related to binary numbers have appeared earlier in multiple cultures, including ancient Egypt, China, and India.

Using two digits as opposed to, say, the familiar ten digits used in decimal systems (0 to 9) enables hardware to be easily implemented via a simple ‘on’ or ‘off’ circuit states or logic gates. This is the basis for all digital systems.

To understand binary values imagine each digit (or ‘bit’) of the binary notation as representing an increasing power of 2 – with the rightmost digit representing 20, the next representing 21, then 22 and so on.

For each bit, the 1 or 0 signifies whether the value of the increasing power of two summates towards the number’s total.

Common Uses of Binary Notation

  • The very first message is the numbers in sequence 1 to 10 in binary notation.
  • You can erase this feature, by arranging that ‘n’ is expanded in binary notation
  • Binary notation is popularly used in computer languages.

Common Misuses of Binary Notation

  • A value of 0 and 1 is not represented internally by binary notation
  • In binary notation, there exist numbers other than 0 and 1

Cooperative Multitasking

September 16, 2019 by Jennifer Spencer

In an operating system, cooperative multitasking is a means of providing the appearance that more than one task (executing process) is running at a time. Cooperative multitasking represents an improvement over multiple programs loading, in which more than one program can be loaded into memory, but only one can execute at a given time. Multitasking creates the impression that … [Read more...] about Cooperative Multitasking

Technipages Explains Cooperative Multitasking

Cooperative multitasking is a technique in which different pieces of software give up their immediate control of the processing unit of a computer so that another software can use it. The programs voluntarily give up their control as this allows other programs to use the processor of the computer.
The technique depends on the ability of the applications to agree on the best processing ratio. The applications equally allow the processing units’ power between themselves; hence, when a program is being used, every other program stops. The applications in the background will only process data when programs in the foreground are inoperative.

The downsides to this being, when a program which was not written to comply with cooperative multitasking begins to run it will stop other programs from running. This has been a big concern for developers, as a single program can crash an entire operating system. The use of cooperative multitasking has declined, as windows 3.1 and Macintosh operating system (macOS), had cooperative multitasking built into them. Subsequent versions from the two companies now rely on pre-emptive multitasking, a new technique that silenced the use of its predecessor-cooperative multitasking.

Common Uses of Cooperative Multitasking

  • In one way or the other, weightless threads make people recall the cooperative multitasking of macOS versions and older Windows.
  • Generally speaking, in cooperative multitasking, a process won’t stop running until it figures out to do so voluntarily.
  • Cooperative multitasking helps the central processing unit of computer dedicate it’s processing resources to a singular activity.

Common Misuses of Cooperative Multitasking

  • Cooperative multitasking is not allowed for heavyweight threads.

Apache

August 26, 2019 by Jennifer Spencer

Apache is a popular open-source Web server that currently powers more than half of all websites. Originally developed by programmers who were using a Web server daemon called httpd, developed at the National Center for Supercomputing Applications (NCSA). These programmers fixed errors in httpd and modified it by releasing a series of software patches. Over time, they had … [Read more...] about Apache

Technipages Explains Apache

Apache is an HTTP based server development and management software which is currently free and open source. Apache handles Hyper Text Transfer Protocol (HTTP) data requests through the Universal Resource Locator(URL). URLs are simply the name of a website that clients enter into Web browers to locate a Web page.The HTTP protocol is the internet standard data transfer protocol for Web pages, so when URL requests are made to an Apache server, the Apache server will handle the HTTP request and return the requested Web pages.

Apache can be used alongside with plugins or add-on extensions to improve the performance. Beyond server development, Apache can also be used to host websites

Its first release was on the 25th of August, 1995. Before this, initial development began in February 1993, the aim of the eight pioneering engineers was to enhance the NCSA(National Center for Supercomputing Applications) HTTPd daemon, their collision was what formed the apache group now The Apache Software Foundation.

There have been several notions as to the coinage of the word ”Apache”; however the foundation claims that “Apache” was chosen out of respect for the various Native American nations known for their endurance and intelligence in war planning.

Common Uses of Apache

  • Apache being open-source boasts of a vibrant and teeming community of dedicated programmers, ever ready to tackle challenges.
  • Apache developers always tackle security breaches as soon as they are reported.
  • The selling point of Apache is its ability to use different add-ons and plugins extensions which improves the performance of the software.

Common Misuses of Apache

  • Apache coinage for The Apache Software Foundation was influenced because the software started with patches
  • Apache is not one of the most used software for the development of softwares.

Windows Media Player (WMP)

September 16, 2019 by Jennifer Spencer

Windows media player is an audio and video player distributed with all recent versions of Microsoft Windows. Microsoft developed WMP to counter the growing popularity of the Real audio and video player by providing streaming audio and video services. Unlike MP3 files, which contain no copyright management features, WMP and its proprietary file format, .WMA, include features … [Read more...] about Windows Media Player (WMP)

Technipages Explains Windows Media Player (WMP)

Windows media player is a media player produced by Microsoft, and its primary function is that it allows its users to view pictures, and play both music and video files. It runs on all Microsoft based platforms like Microsoft Windows, Windows Mobile-based devices as well as on Pocket PC. A free copy of a Windows media player is available on any Windows device. Other functions are that it allows its users to rip CD tracks to MP3, burn MP3 tracks to CDs, stream online radio, and download content from online music stores.
Windows media format home format is .WMA file format, asides this, Windows media player can play almost all audio and video formats. Examples of compatible formats are MP3, WMV, AVI, WAV, MPEG-4, CDA, etc. While Windows media player allows for ripping of audio CDs, the same does not apply to DVDs owing to Copyright restrictions.
Windows media player’s first version was launched in 1991, and it was called Media Player at the time. It was meant to be pre-loaded on Windows 3.0. Ever since its inception, it has been packaged with every version of Windows since Windows 98 SE. Windows 7, 8 and 10 have version 12 of Windows media player bundled to them. Every other released version from version 7 has the feature for ripping and burning audio CDs.

Common Uses of Windows Media Player (WMP)

  • WMA is the home format for files on the windows media player, other foreign formats can be used on the piece of software too.
  • Windows media player was originally meant to be a default software on any Windows software, it’s still being done.
  • Windows media player is a default software on all Microsoft platforms meant it was free to own all those platforms, non-windows users pay to use the windows media player.

Common Misuses of Windows Media Player (WMP)

  • Windows media player does not come pre-installed on any platform, both Microsoft users and non-Microsoft users have to pay to use the software.
  • A windows media player has no feature of being able to rip or burn audio files from audio CDs.

Convergence

September 16, 2019 by Jennifer Spencer

Convergence in a packet-switching network is an automatic process of network mapping that occurs after a router is switched on. A router is a device, usually a dedicated computer, that reads each incoming packet, and determines where to send it next. In carrying out this process, the router needs an accurate map of the networks to which it is directly connected. If this map had … [Read more...] about Convergence

Technipages Explains Convergence

Convergence is a state wherein routers come to a consensus as to the best path for sending packets, and this is done to complete a routing table. A routing table is a table set of data, it shows the best passage from which data packets can take, and it exists over an internet protocol (IP) network. Devices that have the compatibility of Internet protocol, these devices use the routing table. Examples include routers, webcams, security cameras, etc.
A router is an electronic device that allows internet sharing, which could take Ethernet connections or a WiFi connection. It is a gateway between the internet and computers. For a router to work, it must be connected to Internet service, this could be through and Internet service provider or a modem.
When routers converge, it simply means all the routers have the same routing table, such that when there is an update in a routing table, all the routers update their routes to show the new change. The time taken for all routers to align with the change in route is called convergence time. This is dependent on several things such as the size of the network, network design, and the routing protocol in operation. For a network to be usable, convergence must have occurred, and this is why routing protocols require a short time for convergence.

Common Uses of Convergence

  • Before convergence occurs, all the routers must have adjusted their routing tables to a newer change.
  • The convergence took more time than it does normally because of the increased number of components now in the network
  • Convergence takes a short time to occur, and this is important as usability of a network hinges on it

Common Misuses of Convergence

  • Convergence time has nothing to do with the number of objects in the network

Risk

September 16, 2019 by Jennifer Spencer

Risk is a condition where the use of a system could result in a high probability of devastating consequences, such as injury or death to humans, catastrophic financial losses, or environmental devastation. Risk is highest when there is an unsafe use of a system that is hazardous. The system is complex, having an unusual performance condition, and safe operation may push human … [Read more...] about Risk

Technipages Explains Risk

Risk is the tendency for there to be a loss of something of value due to the use of an object. Any action taken is affected risk; it could either increase or decrease the risk. Risks are hinged on uncertainty, and they are the effects of uncertainties on a business decision. It is the likelihood for there to be loss pending from a decision.

Increase of risks can stem from several things from the installation of new infrastructures, expiration of infrastructures, poor maintenance of facilities, incompetence of users of facilities, intentional sabotage of facilities and the action of uncontrolled components of a system

Hence the need for Risk assessment which is the act of analyzing potential cause scenarios that could harm individuals or a group of individuals, and it helps to determine gravity or effect a wrong decision could have, the most important ways to avoid the loss or reduce the damage.

A contingency to Risks is called Risk management, which is the plan put in place before and after events that could lead to the loss of lives. It is also part of the management of risk to organize resources to avoid unfortunate events, and in the face of occurrence of an adverse event, risk management is aimed at preventing further losses and also containing the incident.

Common Uses of Risk

  • Risk management is the contingency plan put in place before and after events that could lead to the loss of lives.
  • Risk assessment is the act of analyzing potential cause scenarios that could harm individuals or a group of individuals, and it helps to determine gravity or effect a wrong decision could have
  • Risk is the tendency for there to be a loss of something of value due to the use of an object. Any action taken is the affected risk

Common Misuses of Risk

  • Sometimes being able to quantify risk doesn’t necessarily mean can control it, anything that convinces you otherwise is a fallacy in modern finance

Resolution

September 16, 2019 by Jennifer Spencer

Resolution is the quality of a computer-represented image or sound, especially concerning its capability to trick the eye (or ear) into perceiving it as a convincing duplicate of the original. In printers, quality is expressed in linear dots per inch (dpi). In soundboards, is expressed through the number of bits used to encode sounds. Resolution determines the amount of sound … [Read more...] about Resolution

Technipages Explains Resolution

Resolution is the quality that an image or sound holds. Sound resolutions are measured in bits, in an image, it is measured in pixels, which is sometimes confused as a function of the width and height of the image. It is possible to have a different resolution from the width x height ratio. The higher the resolution of an audio or image, the greater the quality.
High quality sounds resolutions are sounds which have more than 44.1 kHz and exceeds 16-bits, main high-resolution sound qualities are.WAV, FLAC (Free Lossless Audio Codec) and MQA (Master Quality Authenticated)
Images with high resolutions are images with nothing lower than 300 pixels per inch (PPI), PPI is the number of pixels in one inch. A printer’s resolution is measured in dots per inch (DPI); the dots are the dots of ink or toner in a message. The lower the DPI of a printer, the less detailed the image printed will, 300 PPI is the recommended image quality for printers.
The monitor of a computer system is made of pixels, and the resolution is measured in pixels which is a function of the width x height format, so a 640 by 480 resolution means the monitor is 480 pixels tall and 640 wide. A pixel is made of three different colors, and they are blue, red, and green.

Common Uses of Resolution

  • Resolutions tell either a viewer of pictures or one listening to songs the quality of the media they have
  • The higher the resolution of a media file, the higher the quality
  • A printers, audio and picture resolution are the determining factors about their quality

Common Misuses of Resolution

  • The resolution of a medium does not decide if they are qualitative or not, they are just mere properties
  • In sounds, higher resolutions are not in terms of the number of bits and frequency, its dependent on the price the sound was procured.

Linux

September 16, 2019 by Jennifer Spencer

Linux is a prevalent Unix-like operating system, created by Linus Torvalds that was initially designed to run on Intel-powered PCs. It is free, open-source software distributed under the terms of the GNU General Public License (GPL). The fundamental component of any operating system is the kernel. Various individuals, groups, and companies create their versions of the operating … [Read more...] about Linux

Technipages Explains Linux

Linux is a group of software that operates like Unix operating software. Linux serves as an intermediary between programs in a computer and transmitting it to the required hardware. Linux is an open-source operating system, Linux’s source code can be viewed and edited by anybody by anyone covered by the GNU General Public License. It is also suitable for contributors who would like to develop the source code, can also be redistributed commercially or non-commercially. Tux, the penguin, is the official mascot of Linux. Linux is a freely available alternative to Microsoft’s Windows.
Linux programs come in packages called “distro” short form for distribution, and the package is CD-ROM and DVDs, they contain the basic operating system kernel and a collection of application software. Linux is believed to execute commands faster than Microsoft Windows. Most applications built on Linux are usually almost free (given away at a small price) or free. Operating systems are not immune to viruses and malware, but due to the small number of Linux Operating system users, no company has developed a virus for Linux operating system.
Linus Torvalds began developing Linux in 1991, and then he was a student at the University of Helsinki in Finland. Minix is a precursor to Linux, which was a UNIX like operating system but was designed for educational purposes. Minix stands for mini UNIX, and it was developed by Andrew Tanenbaum.

Common Uses of Linux

  • The coinage of “Linux” was done without the knowledge of Linus, but Linus obliged to it anyways even though he thought “Freex” would have been a better idea.
  • Linux’s distro CD-ROMs and DVDs contain the basic operating Linux system kernel alongside other basic programs which can replace basic software being used in the Microsoft.
  •  The source code for Linux can be viewed and edited by anyone who falls under the GNU General public license’s umbrella

Common Misuses of Linux

 

  • Tux, the penguin, is not Linux’s official mascot, it is Jerry the Rat

Parameter Passing Convention

September 16, 2019 by Jennifer Spencer

Parameter passing convention in a programming language, is the method used to pass one or more values (called actual parameters) to a function by means of a function call, such as the following: square (2); This function call launches a function that squares the supplied parameter (2), returning 4. One fundamental difference among programming languages concerns what is done … [Read more...] about Parameter Passing Convention

Technipages Explains Parameter Passing Convention

Passing parameter convention is a technique in programming, in which an actual parameter is passed to a function; this happens when a function calls another function. A parameter is an intrinsic property of the procedure which is included in its definition, and there are formal parameters and actual parameters.

Formal parameters are usually written in the function prototype, and function header of the definition, i.e. they appear in function declarations. An actual parameter is the values passed in the call of a function, i.e. they appear in the function call.

So when a function is called, the actual parameters are passed, which are also known as arguments. Service is called by invocation, which is either by value or reference. In the call by value, the function creates its copy of the argument (actual parameter) and then uses it, it replicates the value of the actual parameter. The call by reference, the function when called, refers to another value (original) which is under a different name. The formal parameter becomes a reference to the actual parameter in calling a function.

It is practiced in the C and C++ programming languages, and Java only supports a call by value. All C functions are written using functions to make them re-usable and understandable.

Common Uses of Parameter Passing Convention

  • Parameter passing convention is only applicable to C programs languages, and java only supports a function called by value.
  • Parameter passing convention is used for passing objects on Foundation Classes method calls is if the object is mandatory, pass by reference; if it is optional pass by the pointer.’
  • Parameter passing convention is used in C programs, and functions calling make c programs re-usable and understandable

Common Misuses of Parameter Passing Convention

  • When parameter passing convention is exhibited, actual parameters are not sent, so a function does not call another.
  • When a parameter passing convention calls a parameter by reference, the parameter creates a copy of itself and then uses it

Floating Point Notation

September 16, 2019 by Jennifer Spencer

Floating Point Notation is a method of representing very large or very small numbers in an expression of fixed size that closely resembles scientific notation, in which a number is denoted using a mantissa (a decimal number), a multiplication symbol, the base of the numbering system being used, and an exponent (for example, X 10s). In floating-point notation, the expression is … [Read more...] about Floating Point Notation

Technipages Explains Floating Point Notation

Floating point notation is a system of operation in which numbers are represented as decimal fractions and exponents. Therefore, the relative position of the decimal is not fixed rather ‘floats.’ A float can be placed anywhere relative to the significant digits of the number. This is an effective method of representing real numbers in binary forms.
Scientific notations can be broken down into two, the exponent and mantissa. The mantissa and exponent are in binary format. The exponential part which is a designation of the location of the decimal point in case the number is to be shown in its decimal point, the mantissa is everything else but the exponential part, and the mantissa usually is signed fixed position. The sign of the mantissa depends on the presence of a” 1″ on the left side of the mantissa. If there is a 1 present at the end of the left side of the mantissa, then it is a negative binary number.
The binary notation system represents all the information in a computer, and Binary bits are used to describe Alphabetical and Numerical characters of a computer. The downside to the float notation system is that there is no way to represent binary bits exceeding 32bits. Floating point notations are usually written in the standard form as Mxre.

Common Uses of Floating Point Notation

  • A float pointing notation is so because the values of the mantissa bits “float” along with the decimal point, based on the exponent’s given value.
  • The representation of numbers using the floating point notation is not possible for numbers having more than 32bits.
  • Unlike the fixed-point notation, floating point notation ensures the numbers re represented by decimal fractions and exponents

Common Misuses of Floating Point Notation

  • Float point notation works better on integers with more than 32bits

Shrink-Wrap License

September 16, 2019 by Jennifer Spencer

Shrink-Wrap License is a software license contains an asserting language that the end-user in effect agrees to the license’s terms of breaking the shrink wrap and opening the package. Whether such licenses are legally enforceable remains a matter of legal debate. Unlike software purchased during the early years of computing, in which customers and software publishers directly … [Read more...] about Shrink-Wrap License

Technipages Explains Shrink-Wrap License

A shrink-wrap license is an agreement between the publisher of software and the purchaser, and it is an end-user agreement between the two parties, the user and the publisher. The shrink wrap license contains the set of guidelines for the use of the software, installation guide, warranties, fees, and terms of usage of the software.
The shrink-wrap license is valid immediately the software product’s seal is broken. Shrink-wrap licenses are meant to be transparent enough for buyers to go through before they make their decision as to buying the software. The license must be easy to spot on the product, and the license should be printed on the product. Publishers of software cannot get the signatures of customers to show their agreement to the terms of usage of the software; hence, most commercial software is sold as though they are ordinary packaged goods.
Software publishers are now clamoring for the passage of the Uniform Computer Information Transactions Act (UCITA), if this gets enacted by the U.S., its legislatures affirm the enforceability of software licenses even for users that unable to read the terms before using the software. Up until now, it has only been enacted in two states in the United States, namely Maryland and Virginia.

Common Uses of Shrink-Wrap License

  • A shrink-wrap license is supposed to let the buyer of a product know that if he breaks the seal on the product, the product is now his.
  • The use of shrink-wrap licenses for the sales of software does not change the ownership or the proprietorship of the software.
  • The use of the shrink-wrap license shows it is a EULA (End-user agreement) agreement between the publisher and purchaser

Common Misuses of Shrink-Wrap License

  • Breakage of the shrink wrap used in a shrink-wrap license does not equate to the breaker to have purchased the software.

Patent

September 16, 2019 by Jennifer Spencer

A patent is a form of intellectual property (IP) protection that is designed to protect inventions; creative works (such as books and musical recordings) are protected by copyright. U.S. patents protect inventors for 20 years, during which time the holder—not necessarily the same person as the inventor—can exclude others from making use of the technology that the protects. … [Read more...] about Patent

Technipages Explains Patent

A patent is a law that allows an individual or group of individuals to own an invention, and this could be a piece of technology, theorems, or regulations. Patents are granted to designs that are useful, un-ambiguous, and new. If a patent is granted, a fee has to be paid to maintain the patent, or else it is abandoned.
A patent is granted to the first person to apply for it, in a case of multiple inventors. When a patent is granted, it applies for 20 years, starting from the date of application. A patent does not allow any other person to commercialize the product for that period. On the expiration of the patent, it is then made available for public use, from which anyone can modify, rebrand, or sell it. A patent cannot be re-applied for.
Early patent law required that before the invention is submitted alongside the application for the patent. After the patent has been filed for, a patent examination is initiated in which the patent office examines the patent to examine the patentability of the invention. The public is sometimes involved in helping to determine the patency of an invention by recognizing prior arts, as this would help to show the originality of an invention.

Common Uses of Patent

  • Before a patent is awarded, after its application, an examination is carried out to verify the novelty of the invention
  • If a patent is granted, the period of a patent lasts for 20 years, starting from the day the patent was applied
  • In a case where there are a lot of inventors for a product, and the person files a patent gets to be the one who keeps the product

Common Misuses of Patent

  • A patent examination does not work with the public to make findings as to recognizing if there has been any prior look-alike invention.
  • One interesting fact to know is that most scientists refuse to file for a patent for their newly discovered technique, products, etc. to make the cost of it reaching the public cheaper

IEEE 802.11b

September 16, 2019 by Jennifer Spencer

An IEEE standard for wireless LANs. 802.11b networks range from 65 to 100 feet of the maximum data transfer rate (11 Mbps) desired; as the signal weakens with greater distances from the base unit, the protocol steps down to 5.5 Mbps and finally to 2 Mbps. 802.11b are capable of penetrating most walls (except thick concrete) at the cost of some range, 802.11b signals employ the … [Read more...] about IEEE 802.11b

Technipages Explains IEEE 802.11b

IEEE 802.11b is commonly known as WiFi is a wireless Local area network design. It is the wireless Local Area Network standard (WLAN), operating at 2.4GHz and the maximum speed rate is 11Mb/s.
Before IEEE 802.11b, the IEEE 802.11a was the standard, the speed rate of IEEE 802.11a is 54 Mbps and operating at a frequency of 5GHz. IEEE 802.11b is the predecessor for IEEE 802.11g. They are all part of the IEEE 802.11x series. IEEE 802 11a and 11b were implemented in September 1999, while IEEE 802.11g was implemented on May 2003.
IEEE 802.11b works with the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) model; this model works to prevent a collision. Before a node makes a transmission, it first listens for a clear channel, to see if no other node is transmitting at the time, then it transmits and if there is no interference. A transmission is sent back to the origin of the transfer, but if there is no transmission sent back, the node assumes there is interference and listens for a clear channel and retransmit.
IEEE 802.11b is the first most widely adopted WiFi, as it was even built-in and still being built-in into laptops. Hotels, Airports, Startup businesses, and offices adopted the IEEE 802.11b as it was portable and the cost of installation was not much.

Common Uses of IEEE 802.11b

  • IEEE 802.11b local area network design will still work at a distance of 65-80 feet if implemented the maximum speed is pegged at 11Mb/s
  • The advent of IEEE 802.11b has made the use of a wireless local area network (WLAN) to be implemented by people of all classes and walks of life.
  • IEEE 802.11a, IEEE 802.11b, and IEEE 802.11g are all part of the IEEE 802.11x series of Wi-Fi network types

Common Misuses of IEEE 802.11b

  • The maintenance of IEEE 802.11b is the same as the maintenance you carry out on your car.

« Previous Page
Next Page »

Primary Sidebar

Recent Posts

  • How to Share Files Using Google Nearby Share
  • Android Battery Will Not Charge Fix
  • Turning on Triple Touch Zoom on Android
  • How to Connect Outlook 2023 to Gmail
  • Netflix: Change Password
  • Step-by-Step Guide: How to Use WhatsApp on Your Computer
  • Android: Enable or Disable Background Data
  • Google Chrome: Enable/Disable Pop-up Blocker

Who’s Behind Technipages?

Baby and Daddy My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

© Copyright 2023 Guiding Tech Media · All Rights Reserved · Privacy