Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged They

Rss Feed Group items tagged

shalani mujer

Computer Help Online - 1 views

Lately, my computer often experiences computer problem. I keep on calling our local technician to see whats wrong with my PC but sometimes I could not find him, if he is not away, he is not availab...

online computer help

started by shalani mujer on 12 Sep 11 no follow-up yet
seth kutcher

Computer Help Online - 1 views

Lately, my computer often experiences computer problem. I keep on calling our local technician to see whats wrong with my PC but sometimes I could not find him, if he is not away, he is not availab...

online computer help

started by seth kutcher on 12 Sep 11 no follow-up yet
helen troy

Blue Screen of Death - 1 views

I was working with my school project and doing my part time job at the same time, so it happened that I opened numerous windows and tabs one after another. When all of a sudden my computer displaye...

need computer help

started by helen troy on 02 May 11 no follow-up yet
seth kutcher

Certified Expert Remote PC Tech Support Provider! - 1 views

I used to have a slow computer. It would take 10 minutes to boot up and then another 10 minutes to load. It was really a big headache. Good thing I called Remote PC Repair Now . Their remote PC...

remote PC repair

started by seth kutcher on 02 Nov 11 no follow-up yet
Janos Haits

kno.e.sis | From Information to Meaning - 0 views

  •  
    "WELCOME TO KNO.E.SIS Ten years ago we had billions of web pages, and now we have roughly 5 billion people using mobile phones, collecting observations, and sharing what they think using SMS (Social Media Services), Twitter, and Facebook. Worldwide, there are currently over 40 billion mobile sensors, with more smart devices being created each day, which make up the Internet of Things."
Janos Haits

Join the Battle for Net Neutrality - 0 views

  •  
    "This is a battle for the future of the internet Comcast & Verizon want to end net neutrality so they can control what we see & do online. In 66 days, the FCC will let them, unless we stop it. This is a battle for the Internet's future. Before you do anything else, send a letter to the FCC & Congress now!"
computersciencej

TCP/IP model questions based Study Material for gate Computer Science - 0 views

  •  
    TCP/IP protocol based questions for gate computer science exam Q1.What is the difference between transport and session layer of OSI model. Answer: OSI Model Transport Layer The transport layer uses the services provided by the network layer, such as best path selection and logical addressing, to provide end-to-end communication between source and destination. • The transport -layer data stream is a logical connection between the endpoints of a network. • End-to-end control is provided by sliding windows and reliability in sequencing numbers and acknowledgments. The transport layer regulates information flow to ensure end-to-end connectivity between host applications reliably and accurately. • The TCP/ IP protocol of Layer 4 (t transport t layer ) has two protocols. They are TCP and UDP. The transport layer accepts data from the session layer and segments the data for transport across the network. Generally, the transport layer is responsible for making sure that the data is delivered error-free and in the proper sequence. Flow control generally occurs at the transport layer. OSI Model Session Layer The session layer establishes, manages, and terminates communication sessions. Communication sessions consist of service requests and service responses that occur between applications located on different network devices. These requests and responses are coordinated by protocols implemented at the session layer. The session layer establishes, manages, and terminates sessions between applications Functions of the session layer and the different processes that occur as data packets travel through this layer. More specifically, you learned that Communication sessions consist of mini-conversations that occur between applications located on different network devices. Requests and responses are coordinated by protocols implemented at the session layer. • The session layer decides whether to use two-way simultaneous communication or two-way alternate communicati
Janos Haits

GraphQL | A query language for your API - 0 views

  •  
    'GraphQL is a query language for APIs and a runtime for fulfilling those queries with your existing data. GraphQL provides a complete and understandable description of the data in your API, gives clients the power to ask for exactly what they need and nothing more, makes it easier to evolve APIs over time, and enables powerful developer tools.'
Janos Haits

Home · Solid - 0 views

  •  
    "All of your data, under your control Solid lets people store their data securely in decentralized data stores called Pods. Pods are like secure personal web servers for data. All data in a pod is accessible via the Solid Protocol. When data is stored in someone's pod, they control who and what can access it. Solid is led by the inventor of the Web, Sir Tim Berners-Lee, to help realise his vision for its future."
Janos Haits

KDE Wikis - 0 views

  •  
    "The KDE wikis are a source of information and documentation for the KDE desktop, applications, teams, events and more. They are broadly classified into three categories described below"
veera90

Key Home Automation Technologies that Shape the Industry - 0 views

  •  
    Business enterprises and companies with effective automation endeavors make it a strategic priority to augment employees and customer experience, and they use automation to do so. Just pursuing automation technologies to lower expenses is not adequate. To achieve success while scaling new and latest technologies, organizations should focus on the individuals involved (both employees and customers), commit to revamping current processes, and create new skill sets within the workforce to follow more distinct and innovative working methods.
shalani mujer

PC Tech Support Saved the Day - 1 views

I am an owner of a small business office in Lancaster, California. I specialize in SEO, providing services to several people, most of them are in my own locality too. However, there was a day when ...

PC tech support

started by shalani mujer on 10 Nov 11 no follow-up yet
cecilia marie

Best Shield Against Computer Viruses - 1 views

I have always wondered why my files are often corrupted and to think that I have installed an antiVirus software. I always scan my external disks each time I insert them in my unit. It was only lat...

virus protection

started by cecilia marie on 04 Nov 11 no follow-up yet
shalani mujer

Certified Computer Support Specialists - 1 views

I am having trouble with my computer lately. When it does not freeze it reboots automatically. I could not point out the exact reason why it happens. I tried fixing it on my own but it never worked...

computer support specialists

started by shalani mujer on 10 Nov 11 no follow-up yet
magdy medhat

What is Domain Name Resolution - 0 views

  • What is Domain Name Resolution Introduction When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.bleepingcomputer.com. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as 192.168.1.1. Therefore when you type a domain name in your program that you wish to connect to, your application must first convert it to an IP address that it will use to connect to. The way these hostnames are resolved to their mapped IP address is called Domain Name Resolution. On almost all operating systems whether they be Apple, Linux, Unix, Netware, or Windows the majority of resolutions from domain names to IP addresses are done through a procedure called DNS.
    • Ahmed Mansour
       
      i think it's great artical !!
    • Islam TeCNo
       
      Yes .....we know that Web sites are on servers that has IP adresses like this 217.143.56.12 for example .....this article tell us how the site name [www.google.com] is converted to the IP thanks Mans
    • magdy medhat
       
      ya tecno ya gamedddddd mesh de elly kona bntklm feha fel microbus :D
  • Hosts File - There is a file called the HOSTS file that you can use to convert domain names to IP addresses. Entries in the HOSTS file override any mappings that would be resolved via a DNS server
    • Islam TeCNo
       
      I think this is what some spam and adware programs use .... you type a normal site Name but you go yo another site ... i think so !!
  • Netbios - This only applies to Windows machines and will only be used to map names to IP addresses if all previous methods failed. This method will attempt to map the netbios name you are trying to connect to with an IP address.
    • Islam TeCNo
       
      any body can explain this point for me ?
  • ...2 more annotations...
  • This can be changed though by changing certain registry keys
    • Islam TeCNo
       
      start -> run -> regedit this will allow you to edit the registry
  • DnsPriority = 30 LocalPriority = 200 HostsPriority = 75 NetbtPriority = 100
    • Islam TeCNo
       
      Or Simpler DnsPriority = 1 HostsPriority = 2 NetbtPriority = 3 LocalPriority = 4
Islam TeCNo

What's in an HTTP request? - 0 views

shared by Islam TeCNo on 15 Jun 09 - Cached
Ahmed Mansour liked it
  • These headers tell us which web server you were trying to contact.  If that seems odd, bear in mind that many web sites can be "hosted" on a single server, so when the request is received it needs to know which web site you were attempting to access
    • Islam TeCNo
       
      el server momken yekon 3aleh aktar men site ....3ashan keda lama bab3t request ba2olo bardo ana 3ayez site eh !!
  • The request method is usually either "GET" or "POST".  Basically if you fill in and submit a form on a web page it might generate a POST request (or it might be "GET"), whereas if you just click on a link, or activate one of your browser's "bookmarks" or "favourites", then the request method will always be "GET". Therefore, if it's "POST", we can tell that a form was definitely submitted.  The contents of the form would appear here, and there would also be some "Content-" headers describing the data. Web browsers generate two kinds of "POST" data: either "multipart/form-data", which is used when uploading files to a web server, or the more common "application/x-www-form-urlencoded".
    • Islam TeCNo
       
      el 7eta deh mohema ....we fe anwa3 tania bardo 3'er el GET we el POST
  • The "referer" header tells us which document referred you to us - in essence, if you followed a link to get to this page, it is the URL of the page you came from to get here.
    • Islam TeCNo
       
      el Referer by2ol lel server el page eli enta gaii menha ....we a3taked deh el tare2a eli fe sites betsta5dmha 3ashan temna3 maslan en sora aw keda tetshaf ela men el site zat nafso
  • ...2 more annotations...
  • Connection control Connection:keep-alive Keep-Alive:300 These headers are used to fine-tune the network traffic between you and the web server.  They don't tell us much, except a little about the capabilities of your web browser.
    • Islam TeCNo
       
      kan nefsi yekon fe shar7 lel 7eta deh aktar !!
  • Authorisation Username:not present If you have "logged in" to a web site, your username appears here. Note that this only applies to web sites which use proper HTTP authentication - typically, a "login" window pops up and you get three chances to enter your username and password, otherwise you see a page which says "Authentication Required" or similar.  It doesn't apply to web sites where the "login" is a separate page. It's also possible to supply the username and password in the URL you tell your browser to visit - for example, http://user:password@www.example.com/.  In that case, the username would appear here too.
    • Ahmed Mansour
       
      msh fahem el goz2 dah 2wey !! .. 7d yewad7ely please ...
    • Islam TeCNo
       
      ya3ni ya mans a7yanan fe sites bykon feha UserName we password 3an tare2 el HTTP protocol .....ya3ni el mail maslan aw cisclub dol fehom username we password mesh 3an tare2 el HTTP protocol ....el HTTP protocl el username we el pass beto3o bytlbo menak 2abl ma td5ol 3ala el page asasn we bytl3lk keda pop up tekteb feha
  •  
    really very important and useful article ... thanks tecno very match :P
  •  
    Nice Article Tecno..Go On
Abdelrahman Ogail

Common Mistakes in Online and Real-time Contests - 0 views

  • Dynamic programming problems are to be solved with tabular methods
    • Ahmed Mansour
       
      Dynamic programming, like the divide-and-conquer method, solves problems by combining the solutions to subproblems. ("Programming" in this context refers to a tabular method, not to writing computer code) y3ney 3bara 3n 2nene bn2sem el problem el kbirr le shwit probelsm so3'ira .. we ne solve el problems deh we ngma el yab2a dh 7l lel problem el kbira :D;d see introduction to algorithms book . chapter 15
  • breadth-first search
    • Ahmed Mansour
       
      In graph theory, breadth-first search (BFS) is a graph search algorithm that begins at the root node and explores all the neighboring nodes. Then for each of those nearest nodes, it explores their unexplored neighbor nodes, and so on, until it finds the goal. ya3ney be el 3arby keda lw ana 3ndy tree maslan we el tree dh bettkwen mn shwit levels 3ady gedan.. lama hagey 23mel search 3la node mo3ina fi el tree deh hamsk el tree mn el root bet3ha ely hwa level 0 we habda2 2mshy level by level y3ney hanzl 3la el level 1 we hakaz le 3'it mal2y el node bet3ty ,,,, see this ,, it's a tutorial show how BFS algorithm is work!! http://www.personal.kent.edu/~rmuhamma/Algorithms/MyAlgorithms/GraphAlgor/breadthSearch.htm
  • Memorize the value of pi You should always try to remember the value of pi as far as possible, 3.1415926535897932384626433832795, certainly the part in italics. The judges may not give the value in the question, and if you use values like 22/7 or 3.1416 or 3.142857, then it is very likely that some of the critical judge inputs will cause you to get the wrong answer. You can also get the value of pi as a compiler-defined constant or from the following code: Pi=2*acos(0)
    • Islam TeCNo
       
      hhhhhhhhhhh ...... awl mara a3rf el mawdo3 dah we awl mara a3raf en el Pi = 2*acos(0)
    • Abdelrahman Ogail
       
      Thanks Islam for the info, really useful
  • ...4 more annotations...
  • You cannot always check the equality of floating point numbers with the = = operator in C/C++. Logically their values may be same, but due to precision limit and rounding errors they may differ by some small amount and may be incorrectly deemed unequal by your program
  • #define swap(xxx, yyy) (xxx) ^= (yyy) ^= (xxx) ^= (yyy)
    • Islam TeCNo
       
      I remember someone told me that it's impossible to do swaping using macros :D ...but i think it's possible
  • But recursion should not be discounted completely, as some problems are very easy to solve recursively (DFS, backtracking)
    • Islam TeCNo
       
      Some problems are much easier when using recursion
  • Having a good understanding of probability is vital to being a good programmer
  •  
    for bignner acmers hoping to be useful !
  •  
    in this article the author discuss the common problems that faced teams in ACM contests .. and how to avoid it !
Islam TeCNo

BBCode - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 26 Jun 09 - Cached
  • Bulletin Board Code or BBCode is a lightweight markup language used to format posts in many message boards. The available tags are usually indicated by square brackets surrounding a keyword, and they are parsed by the message board system before being translated into a markup language that web browsers understand—usually HTML or XHTML.
    • Islam TeCNo
       
      Simple :D
Islam TeCNo

Scalability - Wikipedia, the free encyclopedia - 0 views

  • In telecommunications and software engineering, scalability is a desirable property of a system, a network, or a process, which indicates its ability to either handle growing amounts of work in a graceful manner, or to be readily enlarged.[1] For example, it can refer to the capability of a system to increase total throughput under an increased load when resources (typically hardware) are added. An analogous meaning is implied when the word is used in a commercial context, where scalability of a company implies that the underlying business model offers the potential for economic growth within the company.
    • Abdelrahman Ogail
       
      In web applications, the client objects are removed from the server when they are sent to the client browser. This is great for scalability, but it can hurt the user and developer experience
    • Islam TeCNo
       
      mesh fahem ya Zikas commentak :D. we men el examples 3ala el scalabilty ...Gooogle we Gmail
    • Abdelrahman Ogail
       
      In Web applications client data are saved on the server (then the server memory is decreased that decreases the scalability - الإستيعاب-) So removing the client data improvers scalability becuase it saves server memory
    • Islam TeCNo
       
      ahaa :D Keshta.... ya3ni by3mlo delete 3ala el server ba3d lama el client ye3mel download :D hehe
Islam TeCNo

Design pattern - Wikipedia, the free encyclopedia - 0 views

  • A pattern must explain why a particular situation causes problems, and why the proposed solution is considered a good one. Christopher Alexander describes common design problems as arising from "conflicting forces" -- such as the conflict between wanting a room to be sunny and wanting it not to overheat on summer afternoons. A pattern would not tell the designer how many windows to put in the room; instead, it would propose a set of values to guide the designer toward a decision that is best for their particular application. Alexander, for example, suggests that enough windows should be included to direct light all around the room. He considers this a good solution because he believes it increases the enjoyment of the room by its occupants. Other authors might come to different conclusions, if they place higher value on heating costs, or material costs. These values, used by the pattern's author to determine which solution is "best", must also be documented within the pattern. A pattern must also explain when it is applicable. Since two houses may be very different from one another, a design pattern for houses must be broad enough to apply to both of them, but not so vague that it doesn't help the designer make decisions. The range of situations in which a pattern can be used is called its context. Some examples might be "all houses", "all two-story houses", or "all places where people spend time." The context must be documented within the pattern. For instance, in Christopher Alexander's work, bus stops and waiting rooms in a surgery are both part of the context for the pattern "A PLACE TO WAIT."
    • Islam TeCNo
       
      This is Not a CS related articile ....check this link !! http://en.wikipedia.org/wiki/Design_pattern_(computer_science)
  •  
    Design Patterns
  •  
    Design Patterns
‹ Previous 21 - 40 of 44 Next ›
Showing 20 items per page