Monday, October 24, 2011

Key Person of Computer and Internet Revolution

dEI;wVj vkSaj baVjusV gSa ftudh cnkSyr
vkt baVjusV mlh rjg gekjs nSfud thou dk fgLlk cu x;k gS tSls fd VsfyQksu vkSj v[kckjA [kcjsa i<+us ls ysdj lans’k Hkstus rd vkSj fjlpZ ls ysdj euksjatu rd ds fy, bldk iz;ksx fd;k tk jgk gSA dEI;wVj vkSj baVjusV dks fo”o dh vc rd dh lcls cMs+ vkSj peRdkfjd vkfo’dkjksa esa fxuk tkrk gSA mUgsa bl fLFfr rd ykus esa vufxur rduhf”k;uksa] oSKkfudksa] “kks/kdrkZvksa vkSj fuos’kdksa dh izfrHkk] cjlksa dh esgur] /ku vkSj nwjn`f’V fNih gqbZ gSA muesa ls dqN ds ckjs esa laf{kIr fooj.k bl izdkj gSA
1- lj fVe cuZlZ yh
vxj fVe cuZlZ yh u gksrs rks “kk;n ge baVjusV ij fdlh Hkh rjg dh lkexzh i<+ ;k ns[k ugha ikrs D;ksafd os fo”oO;kih osc ¼oYMZ okbZM+ osc½ ¼1989½ ds vkfo’dkjd gSA fdlh Hkh osclkbV ;k osc ist ij tkus ds fy, Vkbi fd, tkus okys ;wvkj,y ¼osc ,Mªsl½ ls ysdj muds Hkhrj ds gkbijfyad yh ds efLr’d dh mit gSaA gesa irk gksuk pkfg, fd baVjusV o oYMZ okbZM+ osc nks vyx&vyx phtsa gSA baVjusV rks oYMZ okbZM+ osc ds vkus ls Ms<+ n”kd igys gh ¼1973 esa½ vk pqdk FkkA baVjusV dk vFkZ gS nqfu;k ds dEI;wVj usVodksZ dks tksMus okyk usVodZA tcfd oYMZ okbZM+ osc dk vFkZ mu osc istks ls gS ftues i<+us] lquus ;k ns[kus yk;d lkexzh ekStwn gSA
2- js VkefyUlu
1971 esa js VkefyUlu us vikZusV ds tfj, ,d dEI;wVj ls nwljs dEI;wVj dks ,d lans”k Hkstus esa lQyrk izkIr dh FkhA ;g fo”o dk bZ&esy lans”k FkkA bZ&esy irksa esa *,V n jsV vkWQ* fpUg dk iz;ksx djus dk fopkj Hkh mUgh dk FkkA ;g fpUg gekjs bZ&esy uke vkSj bZ&esy lsok nsus okys loZj ds irs dks vyx djus ds fy, bLrseky gksrk gSA
3- foaV lQZ vkSj jkcVZ dkWu
baVjusV ij MsVk ds vknku&iznku ds fy, baVjusV izksVksdkWy ¼rduhdh fu;e vkSj i}fr;ka½ dk iz;ksx gksrk gSA ;g izksVksdkWy foaV lQZ vkSj jkcVZ dkWu dh nsu gS blfy, bUgs *baVjusV ds firk* ds :i esa Hkh lacksf/kr fd;k tkrk gSA baVjusV dk fMtkbu 1973 esa rS;kj gks x;k Fkk ysfdu mldk C;kSjk 1974 esa izdkf”kr gqvkA blds ckn nl lky dh dM+h esgur ds ckn 1983 esa baVjusV dk “kqHkkjaHk gqvkA ;g /;ku j[kus dh ckr gS fd baVjusV ls feyrs tqyrs lhfer lapkj ra= *vikZusV* dk iz;ksx blls cgqr igys gh “kq: gks x;k FkkA
4- fcy xsV~l
fofy;e gsujh fcy xsV~l 3 ekbdzkslkW¶V ds laLFkkid gS ftldh LFkkiuk mUgksaus ikWy ,syu ds lkFk dh FkhA nqfu;k ds 90 Qhlnh daI;wVj ftl foaMkst vkijsfVax flLVe ls pyrs gSa mldk fodkl ekbdzkslkW¶V us gh fd;k gSA fdlh tekus esa daI;wVj brus egaxs gksrs Fks fd os flQZ n¶rjksa] fo”ofo|ky;ksa] m|ksxksa vkfn esa gh fn[kkbZ nsrs FksA mUgsa ilZuy daI;wVj ¼ihlh½ dk :i nsdj ?kj&?kj rd igqapkus esa fcy xsV~l dk vge ;ksxnku gSA ekbdzkslkW¶V dks “kq: djus ds fy, mUgksaus 1975 esa gkoZMZ+ fo”ofo|ky; dh viuh i<+kbZ chp esa gh NksM+ nh Fkh ysfdu viuh yxu vkSj esgur ds cy ij vkxs c<+rs pys x, vkSj ekbdzkslkW¶V dks lkW¶Vos;j ds {ks= esa nqfu;k dh lcls cM+h daiuh cuk fn;kA *foaM+kst* o *vkWfQl* mlds nks lcls lQy mRikn gSaA baVjusV ds {ks= esa Hkh mldk vge ;ksxnku gSA mldk ,e,l,u uked iksVZy] ykbo uked lpZ batu vkSj gkWVesy uked bZ&esy lsok csgn yksdfiz; gSA ;g tkuuk fnypLi gksxk fd gkoZM+Z fo”ofo|ky; us 2007 esa fcy xsV~l dks ekun mikf/k iznku dhA
5- LVho tkWCl
LVho tkWCl us 1976 esa LVho okstfu;kd ds lkFk feydj ,iy daiuh dh LFkkiuk dh Fkh tks vius laqnj daI;wVjksa vkSj rstrjkZj vkijsfVax flLVe eSfdUVks”k ds fy, e”kgwj gSA ,iy dks ekbdzkslkW¶V dk izfr}a}h ekuk tkrk gSA fo”o esa daI;wVj rduhdksa ds fodkl vkSj izlkj esa nksuksa dk vge ;ksxnku gSA tkWCl us 24 tuojh 1984 dks igys ,iy eSfdUVks”k daI;wVj dks fcdzh ds fy, tkjh fd;k FkkA ;g fo”o dk igyk O;olkf;d :i ls lQy ;wt+j baVjQsl ¼ekml ;qä½ NksVk daI;wVj FkkA ;g tkudj rkTtqc gksxk fd tkWCl ds lkfFk;ksa us ebZ 1985 esa mudks vius gh }kjk LFkkfir daiuh ,iy ls ckgj fudky fn;k vkSj os lM+d ij vk x, FksA mUgksaus usDLV uke ls nwljh daiuh “kq: dh] m/kj ,iy dh gkyr bruh fcxM+ xbZ fd mlds izac/kdksa us tkWCl dks fQj ls daiuh esa ysus dk Qslyk fd;kA lu~ 1996 esa viuh okilh ds dqN lky ckn tkWCl us *vkbZeSd*] *MsLdVki daI;qVj*] *vkbZiksM*] vkbZQksu* eksckbZy tSls foy{k.k mRiknksa dh vikj lQyrk ls ,iy dks fQj ls fo”o dh lokZf/kd lQy vkbZVh daifu;ksa dh Js.kh esa ykdj [kM+k dj fn;kA
6- MWku ,fLVªt
vkbZch,e ls tqM+s MkWu ,fLVªt dks *ilZuy daI;wVj dk firk* ekuk tkrk gSA os pkSng rduhdh fo”ks’kKksa ds ml ny ds eqf[k;k Fks ftlus vkbZch,e ilZuy daI;wVj dk fodkl fd;k FkkA ;g daI;wVj 12 vxLr 1981 dks tkjh gqvkA gkykafd ilZuy daI;wVj “kCn dk iz;ksx mlls igys Hkh gksrk vk;k Fkk ysfdu vkbZch,e ihlh ¼ekWMy 5150½ dh lQyrk ds ckn gh ;g “kCn ?kj&?kj esa igqapkA bl daI;wVj dh ,d fo”ks’krk ;g Hkh Fkh fd og vU; daifu;ksa vkSj Moyijksa }kjk fodflr fd, x, lkW¶Vos;jksa ds lapkyu esa Hkh l{ke FkkA nqHkkZX; ls ,fLVªt dk 1985 esa ,d foeku nq?kZVuk esa fu/ku gks x;k vkSj os viuh bl d`fr dh tcjnLr yksdfiz;rk dks viuh vka[kks ls ugha ns[k ldsA
7- lxsZbZ fczu vkSj ySjh ist
bUgsa baVjusV dk lcls lQy O;olk;h vkSj Moyij ekuk tkrk gSA xwxy lpZ batu dk fodkl bUgha nksuks ;qodksa us fd;k FkkA vejhdk ds LVSuQksMZ fo”ofo|ky; esa ih-,pMh- djrs gq, nksuksa dh HksaV gqbZ vkSj fQj nksLrhA mUgksaus ,d xSjkt esa dke djuk 'kq: fd;k vkSj baVjusV ij lkexzh
8- MsfoM fQyks vkSj tSjh ;ax
baVjusV dk lcls e”kgwj vkSj lQy iksVZy ;kgw! bUgha nkuksa dh jpuk gSA nksuksa LVSuQksMZ fo”ofo|ky; esa bysfDVªdy bathfu;fjax ds Nk= FksA 1994 dh ckr gS] rc baVjusV ij vPNs lpZ batuksa dk vHkko FkkA tSjh vkSj MsfoM us vuqHko fd;k fd fdlh Hkh osclkbV ij vkus okys yksxksa dh la[;k mUgsa cukus okyh laLFkk] mlls tqM+s yksxksa vkSj muds ifjfprksa rd lhfer jgrh gSA tc rd vke yksxksa dks irk ugha pysxk rc rd mlds gksus ;k u gksus dk D;k vFkZ \ mUgksaus VsfyQksu Mk;jsDVªh dh rjg osclkbVksa dh funsZf”kdk cukus dh lksphA ;kax us osclkbVksa dh lwph cukuk 'kq: fd;k vkSj mls *oYMZ okbZM osc ds fy, tSjh dh xkbM* uke ls baVjusV ij miyC/k djk;kA 'kq: esa ;g LVSuQksMZ fo”ofo|ky; dh osclkbV ij Mkyh xbZ ysfdu dqN le; ckn nksuksa us ;kgw! Uked iksVZy dh LFkkiuk dhA fnlEcj 1994 rd mudh osclkbV ij nl yk[k ls T;knk fgV gks pqds FksA MsfoM vkSj tSjh dks mlds ihNs fNih gqbZ vikj laHkkoukvksa dk ,glkl gks x;k vkSj mUgksaus ;kgw! dks ,d cM+s osc iksVZy esa cny fn;k ftlesa bZ&esy ls ysdj pSfVax vkSj lekpkjksa ls ysdj Cykx rFkk ohfM;ks tSlh lqfo/kk,a ekStwn gSaA
9- ykbul VksjokYM~l
daI;wVj ds lapkyu ds fy, foaMkst vkSj eSfdUVks”k dh rjg fyuDl uked vkWijsfVax flLVe dk Hkh iz;ksx gksrk gSA ;g ;wfuDl vk/kkfjr vkWijsfVax flLVe gS vkSj ykbul VksjokYM~l mlds izeq[k fodkldrkZ gSaA fu%”kqYd] cgqr lqjf{kr vkSj rst vkijsfVax flLVe ds :i esa fyuDl /khjs&/khjs daI;wVj iz;ksäkvksa ds chp txg cuk jgk gSA nqfu;k ds daI;wVj loZj cktkj esa fyuDl dh fgLlsnkjh djhc 12 izfr”kr gSA ok;jl vkSj gSfdax tSls geyksa ls dkQh lqjf{kr gksus ds dkj.k baVjusV ij osclkbVksa dh gksfLVax] bZ&esy O;oLFkk vkfn esa Hkh fyuDl dk iz;ksx c<+ jgk gSA
10- ekdZ ,afMªlsu
baVjusV vkSj osc dk iz;ksx djus ds fy, ge czkmt+j dk uked lkW¶Vos;j dk iz;ksx djrs gSaA ekdZ ,afMªlu O;kid iSekus ij bLrseky fd, x, nqfu;k ds igys lQy osc czkmt+j *ekstsd* ds lg&fuekZrk gSaA mUgsa usVLdsi dE;qfuds”ku dkikZsjsa”ku ds laLFkkid ds :i esa Hkh tkuk tkrk gSA ekstsd czkmt+j gh ckn esa usVLdsi usfoxsVj ds uke ls yksdfiz; gqvkA vke baVjusV iz;ksäkvksa us bldh djksMk+sa izfr;ka baVjusV ls MkmuyksM dj bLrseky dhA blus ekbdzkslkW¶V dk /;ku [khapk vkSj mlus baVjusV ,DlIyksjj ds uke ls ,d vU; czkmt+j fodflr dj foaMkst vkWijsfVax flLVe ds lkFk nsuk 'kq: fd;kA nksuksa czkmt+jksa ds chp pyh izfr}af}rk esa ekbdzkslkW¶V vkxs fudy x;k D;ksafd foaMkst daI;wVj esa baVjusV ,DlIyksjj igys ls gh ekStwn Fkk vkSj ,sls esa yksxks dks vyx ls usVLdsi MkmuyksM djus dh t:jr eglwl ugha gksrh FkhA vkt ;g czkmt+j Hkys gh bruk yksdfiz; u gks ysfdu igys izeq[k czkmt+j ds :i esa mlus baVjusV dh lQyrk esa vge ;ksxnku fn;k gSA

11- fteh osYl
baVjusV ;wtj fdlh fo"k; ij tkudkjh ikus ds fy, fodhihfM;k dk iz;ksx djrs gSA fteh osYl mlds lg laLFkkid gSaA mUgksaus 2001 esa bl vuks[ks ,ulkbDykihfM;k dh 'k:vkr dh ftlesa fo”o dk dksbZ Hkh O;fDr viuk ;ksxnku ns ldrk gSA ;g nqfu;k dh lcls lQy baVjusV ifj;kstukvksa esa ls ,d gSA blhfy, Vkbe if=dk us 2006 esa mUgsa fo”o ds lcls izHkko”kkyh yksxksa esa fxuk FkkA fodhihfM;k dks nqfu;k dk lcls cM+k ,ulkbDyksihfM;k ¼fo”odks’k½ ekuk tkrk gSA
12- lchj HkkfV;k
lchj HkkfV;k gkWVesy ds laLFkkid gSaA paMhx<+ esa tUes] fcV~l fiykuh vkSj vejhdk ds izfl) LVSuQksMZ fo”ofo|kky; ds Nk= jgs lchj us 1991 esa fo”o dh vxz.kh vkbZVh daiuh *,iy daI;wVj* esa dk;Z fd;kA rhu lky ckn mUgksaus ,iy ds gh vius lkFkh tSd fLeFk ds lkFk feydj viuk futh dk;Z 'kq: djus dk QSlyk fd;k vkSj ,d osc vk/kkfjr bZ&esy iz.kkyh dk fodkl fd;k ftls ,pVh,e,y dh rtZ ij *gkWVesy* uke fn;k x;kA 4 tqykbZ 1996 dk 'kq: gqbZ ;g lsok rsth ls yksdfiz; gqbZ vkSj Ng eghus ds Hkhrj gh blds nl yk[k ls Hkh T;knk lnL; cu x,A 3 fnlEcj 1997 dks ekbdzkslkW¶V us djhc nks gtkj djksM+ :i, esa lchj HkkfV;k ls gkWVesy [kjhn fy;kA
13- vthr ckykd`’.ku
Hkkjr ds lcls lQy vaxzsth baVjusV iksVZyksa esa ls ,d jhfMQ-dkWe ds laLFkkid gSA mUgksaus 1996 esa bldh LFkkiuk dh FkhA jhfMQ Hkkjr dh ,lh vdsyh osclkbV gS ftls fo”o ds lcls igys lkS baVjusV iksVZyksa esa 'kkfey gksus dk xkSjo gkfly gSA bl osclkbV ij lekpkjksa ds vykok bZ&esy] pSfVax] lpZ] CykWx vkSj bZ&dkWelZ tSlh yksdfiz; lsok,a Hkh ekStwn gSaA ckykd`".ku dks Hkkjr esa osc rduhd ds ik;ksfu;j vkSj lQyre O;olkf;;ksa dh Js.kh esa fxuk tkrk gSA

Monday, October 17, 2011

VPN (Virtual Private Network) and VRML(Virtual Reality Markup Language)


Virtual Private Network - VPN

1. For data, the logical configuration of a group of hardware components that includes direct connection THROUGH (as opposed to TO) the Internet. Usually refers to a network in which some of the parts are connected using the public Internet, but the data sent across the Internet is encrypted, so the entire network is "virtually" private. This sort of arrangement allows certain users reasonable access to a fully operational corporate network via the Internet.
2. In telephony, a switched network with special services like abbreviated dialing. A customer can call between offices in different area codes without having to dial all eleven digits.

Virtual Reality Markup Language - VRLM

A scripting language used to define three-dimensional "worlds". VRML, pronounced ver-mal, and short for Virtual Reality Markup (or Modeling) Language, VRML is a specification for displaying 3-dimensional objects on the World Wide Web. You can think of it as the 3-D equivalent of HTML. Files written in VRML have a.wrl extension (short for world). To view these files, you need a VRML browser or a VRML plug-in to a Web browser. VRML produces a hyperspace (or a world), a 3-dimensional space that appears on your display screen. And you can figuratively move within this space. That is, as you press keys to turn left, right, up or down, or go forwards or backwards, the images on your screen will change to give the impression that you are moving through a real space. The newest VRML 2.0 specification was finalized in August, 1996. It is known officially as ISO/IEC 14772.

Friday, October 7, 2011

Wireless Technologies : Bluetooth,WiFi,WiMAX

What is Bluetooth, WiFi and WiMAX?

Bluetooth, WiFi and WiMAX are wireless technologies which allow devices to inter-connect and communicate with each other. Radio waves are electomagnetic waves and have different frequencies. These technologies are radio frequencies. Similar to the analogue radio, or FM radio. Bluetooth works on 2.45GHz frequency. WiFi works in two frequency bands 2.4GHz and 5GHz. WiMAX works in two frequency bands, 2 - 11GHz and 10 - 66GHz.

Bluetooth

Named after the Danish king, Harold Bluetooth,was the first to emerge, several devices like mobile phones, pdas, headsets, keyboards, mice, medical equipment and even cars now come with this feature. Due to its low cost, manufacturers are willing to implement this technology in most devices. It is designed for short range communications with a range of about 10m. As a result, it consumes less power and are suited for very small battery powered devices and portable devices. Problems associated when devices communicate via infrared or cables are removed. Infrared requires a line of sight, bluetooth only needs to be in reasonable vicinity. As cables are not required, it would be less cumbersome carrying a personal bluetooth device and space would be less cluttered. As bluetooth devices automatically communicate with each other, it requires very little from the user. Bluetooth allows for a wireless Personal Area Network (PAN) with it's short range.





WiFi


WiFi or Wireless Fidelity, has a range of about 100m and allows for faster data transfer rate between 10 - 54Mbps. There are three different wireless standards under WiFi, 802.11a, 802.11b and 802.11g. 802.11 being the wireless standard set by The Institue of Electrical and Electronic Engineers (IEEE). WiFi is used to create wireless Local Area Networks (WLAN). The most widely used standard is 802.11b and 802.11g is expexcted to grow rapidly. These two standards are relatively inexpensive and can be found providing wireless connectivity in airports, railway stations, cafes, bars, restaurants and other public areas. The main difference between the two is the speed. 802.11b has data transfer rate of upto 11Mbps and 802.11g has a rate of upto 54Mbps. 802.11g is a relatively new and has yet to be adopted widely. 802.11a is more expensive and as a result it not available for public access.


WiMAX

WiMAX is Worldwide Interoperability for Microwave Access. The IEEE standard for WiMAX is 802.16 and falls under the category of wireless Metropolitan Area Network (WMAN). WiMAX operates on two frequency bands, 2 - 11GHz and 10 - 66GHz and has a range of about 50km with speeds of upto 80Mbps. This enables smaller wireless LANs to be interconnected by WiMAX creating a large wireless MAN. Networking between cities can beachieved without the need for expensive cabling. It is also able to provide high speed wireless broadband access to users. As it can operate in two frequency bands WiMAX can work by line-of-sight and non-line-of-sight. At the 2 - 11GHz frquency range it works by non-line-of-sight, where a computer inside a building communicates with a tower/antenna outside the building. Short frequency transmissions are not easily disrupted by physical obstructions. Higher frequency transmissions are used for non-line-of-sight service. This enables to towers/antennae to communicate with each other over a greater distance. Due to infrastructure and costs involved it would be more suited to provide the backbone services for ISPs and large corporations providing wireless networking and internet access.


Friday, July 22, 2011

Differences B/W CDMA And GSM

The ultimate outcome of the battle for dominance between these two competing cellular data transmission technologies may lie more in their history than their respective merits. To understand the current prevalence of GSM, one needs a foundation in the forces that converged to push one technology ahead of the other.

One of the most contentious battles being waged in the wireless infrastructure industry is the debate over the efficient use and allocation of finite airwaves. For several years, the world's two main methods -- Code-Division Multiple Access (CDMA) and Global System for Mobile communications (GSM) -- have divided the wireless world into opposing camps. Ultimately, the emergence of a victorious technology may owe more to historical forces than the latest wireless innovation, or the merits of one standard over the other.

CDMA's World War II Foundations
CDMA, put into an historical context, is a recently patented technology that only became commercially available in the mid-1990s, but had its roots in pre-World War II America. In

CDMA was not field tested for commercial use until 1991, and was launched commercially in Hong Kong in 1995. CDMA technology is currently used by major cellular carriers in the United States and is the backbone of Sprint's Personal Communications System (PCS). Along with Sprint, major users of CDMA technology are Verizon and GTE.

Advantages of CDMA include:

  • Increased cellular communications security.
  • Simultaneous conversations.
  • Increased efficiency, meaning that the carrier can serve more subscribers.
  • Smaller phones.
  • Low power requirements and little cell-to-cell coordination needed by operators.
  • Extended reach - beneficial to rural users situated far from cells.
Disadvantages of CDMA include:
  • Due to its proprietary nature, all of CDMA's flaws are not known to the engineering community.
  • CDMA is relatively new, and the network is not as mature as GSM.
  • CDMA cannot offer international roaming, a large GSM advantage.

The Euro-Asian Alternative: GSM

Analysts consider Qualcomm's major competitive disadvantage to be its lack of access to the European market now controlled by Global System for Mobile communications (GSM). The wireless world is now divided into GSM (much of Western Europe) and CDMA (North America and parts of Asia).

Mobile Handset manufacturers ultimately split into two camps, as Motorola, Lucent, and Nextel chose CDMA, and Nokia and Ericsson eventually pushed these companies out and became the dominant GSM players.Advantages of GSM:
  • GSM is already used worldwide with over 450 million subscribers.
  • International roaming permits subscribers to use one phone throughout Western Europe. CDMA will work in Asia, but not France, Germany, the U.K. and other popular European destinations.
  • GSM is mature, having started in the mid-80s. This maturity means a more stable network with robust features. CDMA is still building its network.
  • GSM's maturity means engineers cut their teeth on the technology, creating an unconscious preference.
  • The availability of Subscriber Identity Modules, which are smart cards that provide secure data encryption give GSM m-commerce advantages.

In brief, GSM is a "more elegant way to upgrade to 3G," says Strategis Group senior wireless analyst Adam Guy.

Disadvantages of GSM:
  • Lack of access to burgeoning American market.

Conclusion

Today, the battle between CDMA and GSM is muddled. Where at one point Europe clearly favored GSM and North America, CDMA, the distinct advantage of one over the other has blurred as major carriers like AT&T Wireless begin to support GSM, and recent trials even showed compatibility between the two technologies.

GSM still holds the upper hand however. There's the numerical advantage for one thing: 456 million GSM users versus CDMA's 82 million.


Sunday, June 19, 2011

Some Useful Bank Abbreviations

SBBJ - State Bank of Bikaner and Jaipur
SBI - State Bank of India
BOB - Bank of Baroda
OBC - Oriental Bank of Commerce
ICICI - International Credit and Investment Corporation of India
HDFC - Housing Development and Finance Corporation
HSBC - Honkong Shanghai Banking Corporation
IDBI - Industrial Development Bank of India
EXIM - Export Import Bank of India
PNB - Punjab National Bank
CBI - Corporation Bank of India
RBI - Reserve Bank of India

Monday, April 4, 2011

Some Features of Standered Calculator

1. MC = Memory Clear (Sets the memory to zero.)
2. MR = Memory Recall (Get the number from memory which you have keyed earlier in the memory.)
3. MS = Memory Store (Puts the number into the memory.)
4. M+ = Add the number to the number into the memory.
5. M- = Subtract the number from the number into the memory.
6. C = It just clear the last number you put in.
7. CE = Clear everything to start all over again.

Thursday, March 3, 2011

Changing the logon background image in windows 7

Step 1: Use the following Group Policy setting.
-Start the Group Policy editor(gpedit.msc).
-Go to the following branch:
Comp.Configuration->Admin Templates->System->Logon
-Set the "Always use custom logon background" to Enabled.
-Close the Group Policy Editor.

Step 2: Next step is to place the background wallpaper(Jpeg File) in the following folder:
C:/Windows/System32/oobe/info/backgrounds

Note that the info folder does not exist by default, you need to create the info and backgrounds folder manually.

Place the background image file(name it as backgroundDefault.jpg) into the above folder.

The file size must not be more than 256 kb.

Friday, January 21, 2011

Controlling Incoming Mails in Gmail

Go to Settings > Filter > Create a new Filter.
After this fill up some information like From,To,Subject etc.You can directly delete,label,archive or forward these mails with specified criteria.