Benefits of Internet

:: Posted by - hatecrew :: Category -


The use of the Internet offers a variety of benefits to everyone who is willing to use it. The enormous amount of information available and the many uses one can have through the internet have made it the most valuable tool in various settings of a person’s life. The Internet has an enormous amount of publications added on it every day and it’s evolving as the most powerful source of information. Also, use of the Internet has made jobs easier and oversimplified tasks that would take an enormous amount of time before. Moreover, the Internet has become a great tool for avoiding the hassles of the bank, offering the chance to make the transactions quickly and safely. It also offers a powerful source for shopping and the easiness of having your products delivered straight to your house, should you decide you do not want to go out. Furthermore, the widespread use of the Internet has opened new areas of jobs in all countries and expanded the availabilities of working from home. Last, the Internet is one of the most valuable tools in educations since it provides an enormous amount of information and is the greatest source of reference for educators and students. The electronic libraries are of utmost importance for University students looking for scientific information for their courses. Another major benefit of the internet is its ability to minimize distances and provide communication services efficiently and without any cost. In general, the Internet is a multi-tool with applications on every aspect of someone’s life.

Read More......

synchronous vs asynchronous learning

:: Posted by - hatecrew :: Category -

The send, receive, and reply operations may be synchronous or asynchronous. A synchronous operation blocks a process till the operation completes. An asynchronous operation is non-blocking and only initiates the operation. The caller could discover completion by some other mechanism discussed later. The notion of synchronous operations requires an understanding of what it means for an operation to complete. In the case of remote assignment, both the send and receive complete when the message has been delivered to the receiver. In the case of remote procedure call, the send, receive, and reply complete when the result has been delivered to the sender, assuming there is a return value. Otherwise, the send and receive complete when the procedure finishes execution. During the time the procedure is executing, the sender and receiver are in a rendezvous, as mentioned before. Note that synchronous/asynchronous implies blocking/not blocking but not vice versa, that is, not every blocking operation is synchronous and not every non blocking operation is asynchronous. For instance, a send that blocks till the receiver machine has received the message is blocking but not synchronous since the receiver process may not have received it. Similarly, we will see later a Xinu receive that is non-blocking but is not asynchronous. These definitions of synchronous/asynchronous operations are similar but not identical to the ones given in your text books, which tend to equate synchronous with blocking.

Read More......

E-learning

:: Posted by - hatecrew :: Category -

E-learning is to classroom learning as cell phones are to a pay phone at the bus station. At least it is in some ways. For instance, e-learning allows you to learn anywhere and usually at any time, as long as you have a properly configured computer. Cell phone allow you to communicate any time and usually anywhere, as long as you have a properly configured phone. E-learning can be CD-ROM based, Network-based, Intranet-based or Internet-based. It can include text, video, audio, animation and virtual environments. It can be a very rich learning experience that can even surpass the level of training you might experience in a crowded classroom. It's self-paced, hands-on learning. The quality of the electronic-based training, as in every form of training, is in its content and its delivery. E-learning can suffer from many of the same pitfalls as classroom training, such as boring slides, monotonous speech, and little opportunity for interaction. The beauty of e-learning, however, is that new software allows the creation of very effective learning environments that can engulf you in the material. We'll use software from Trainer soft as an example to show you how the process works.

Read More......

History of The Internet

:: Posted by - hatecrew :: Category -

Before the wide spread of internet working that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the local network and the prevalent computer networking method was based on the central mainframe computer model. Several research programs began to explore and articulate principles of networking between physically separate networks, leading to the development of the packet switching model of digital networking. These research efforts included those of the laboratories of Donald Davies (NPL), Paul Baran (RAND Corporation), and Leonard Kleinrock at MIT and at UCLA. The research led to the development of several packet-switched networking solutions in the late 1960s and 1970s, including ARPANET and the X.25 protocols. Additionally, public access and hobbyist networking systems grew in popularity, including unix-to-unix copy (UUCP) and FidoNet. They were however still disjointed separate networks, served only by limited gateways between networks. This led to the application of packet switching to develop a protocol for internetworking, where multiple different networks could be joined together into a super-framework of networks. By defining a simple common network system, the Internet Protocol Suite, the concept of the network could be separated from its physical implementation. This spread of internetworking began to form into the idea of a global network that would be called the Internet, based on standardized protocols officially implemented in 1982. Adoption and interconnection occurred quickly across the advanced telecommunication networks of the western world, and then began to penetrate into the rest of the world as it became the de-facto international standard for the global network. However, the disparity of growth between advanced nations and the third-world countries led to a digital divide that is still a concern today.

Read More......

Computer Virus.

:: Posted by - hatecrew :: Category -


Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so that program will run the attached virus program as it boots, therefore, it is said that the virus "infects" the executable file or program. Executable files include Macintosh "system files" [such as system extensions, INITs and control panels] and application programs [such as word processing programs and spreadsheet programs.] Viruses work the same ways in Windows or DOS machines by infecting zip or exe files. A virus is inactive until you execute an infected program or application OR start your computer from a disk that has infected system files. Once a virus is active, it loads into your computer's memory and may save itself to your hard drive or copies itself to applications or system files on disks you use. Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do nothing more than display a message or make sounds / verbal comments at a certain time or a programming event after replicating themselves to be picked up by other users one way or another. Other viruses make your computer's system behave erratically or crash frequently. Sadly many people who have problems or frequent crashes using their computers do not realize that they have a virus and live with the inconveniences.

Read More......