Thursday, August 12, 2010

Multimedia and its application


The simplest type of application involves adding a multimedia data object to a traditional data object (multimedia e-mail or multimedia notes, for example). This type of application uses existing point-to-point networking technology and is not interactive in real time.
A second application category involves sending multimedia data objects to multiple hosts, such as with LAN TV or other forms of broadcast. This category needs to go to multiple locations but does not tend to require much real-time interaction.
A third category is point-to-point applications that may be real-time interactive. Many vertical industries are planning multimedia kiosks, for example. Some examples are the following:
* The financial industry wants to use multimedia kiosks at banks to provide detailed information about financial services.
* The retail industry wants to use kiosks in stores to help customers locate merchandise and find out additional information about merchandise.
* The entertainment industry wants to use kiosks as points of sale and to provide advertising for scheduled entertainment events such as the theatre, concerts, plays, etc.
* The entertainment industry is also interested in multimedia kiosks that allow multiperson video games to occur over networks.
* Digital libraries use large computer servers to store books, journals, and other Multimedia literature in digital form. Users access this information via computer networks.
A fourth category is applications that are both multipoint and real-time interactive. The primary example of this category of traffic is desktop videoconferencing. Desktop videoconferencing requires real-time interactive communication among groups of individuals who may not be at the same location.

cyber law and ethics


Cybercrimes can be basically divided into 3 major categories:

1. Cybercrimes against persons.
2. Cybercrimes against property.
3. Cybercrimes against government

Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be amplified. This is one Cybercrime which threatens to undermine the growth of the younger generation as also leave irreparable scars and injury on the younger generation, if not controlled.

Using one's own programming abilities as also various progra-mmes with malicious intent to gain unauthorised access to a computer or network are very serious crimes. Similarly, the creation and dissemination of harmful computer programmes which do irreparable damage to computer systems is another kind of Cybercrime. Software piracy is also another distinct kind of Cybercrime which is perpetuated by many people online who distribute illegal and unauthorised pirated copies of software.

Professionals who involve in these cybercrimes are called crackers and it is found that many of such professionals are still in their teens. A report written near the start of the Information Age warned that America's computers were at risk from crackers. It said that computers that "control (our) power delivery, communications, aviation and financial services (and) store vital information, from medical re-cords to business plans, to criminal records", were vulnerable from many sources, including deliberate attack.

The above case cannot be registed with cyber police. You have to take help from local police station. Cyber police look for only the case that involve cyber law violation.

Offline Attack and Internet Security.


Offline attacks against Internet Security are another form of brute force attacks. This method enable the hacker to obtain data of the passwords from the server itself, and he runs the dictionary force software against this in his privacy, and tries to find out your passwords through a variety of permutations.This means your servers should be secure, which does not give the data to hackers, and keep out data-harvesters from their site. The servers have now developed formats which store passwords in a resistant format which does not yield to the brute force, even as an algorithm mixes a salt generated at random with hash-keys. These kids of passwords cannot be easily decrypted and a dictionary attack will take months to get at the right password, ensuring

Evolution Of Internet Security System


Changing Passwords is sheer wasting of time, claim some people, hitting at the conventional method of internet security. We have known that cryptic strong passwords provide personal internet security. But this conviction may be now outdated and even counter productive, exposing us to more and more risks than other users.
How Strong Should A Password Be, For Internet Security?
It is common to find that users are advised to change their passwords into strong ones, ensuring that they contain more than six characters and a mix of characters which never resemble simple words. This strength of password is based on the hunch that such passwords cannot be guessed by hackers. Times have changed and so have methods which criminals deploy.

Servers Should Have Lockout For Internet Security.
When it is clear that passwords do not offer you the best of defenses to you, the researchers have pointed out that internet security is dependent on a variety of policies which the servers should adopt to lockout instruction. While there are some websites who are already adopting such lockout methods, for example, when you fail to login after three attempts, your account is disabled albeit temporarily.
Unfortunately, this kind of lockout method punishes the user, who may have forgotten his/her passwords and logically trying to remember it. There is yet another lockout methods to keep the hackers at bay, in which a ratio is adopted, which is like if you fail to login after ten repeated attempts in a hour, your account may be withdrawn temporarily, which indeed is a better way to treat your user, at the same time locking out the attacks through dictionary method. Remember the attacker may have to try thousands of logins per hour to succeed in getting at the password

Communications protocol

The protocols in human communication are separate rules about appearance, speaking, listening and understanding. All these rules, also called protocols of conversation, represent different layers of communication. They work together to help people successfully communicate. The need for protocols also applies to network devices. Computers have no way of learning protocols, so network engineers have written rules for communication that must be strictly followed for successful host-to-host communication. These rules apply to different layers of sophistication such as which physical connections to use, how hosts listen, how to interrupt, how to say good-bye, and in short how to communicate, what language to use and many others. These rules, or protocols, that work together to ensure successful communication are grouped into what is known as a protocol suite.
The widespread use and expansion of communications protocols is both a prerequisite for the Internet, and a major contributor to its power and success. The pair of Internet Protocol (or IP) and Transmission Control Protocol (or TCP) are the most important of these, and the term TCP/IP refers to a collection (a "protocol suite") of its most used protocols. Most of the Internet's communication protocols are described in the RFC documents of the Internet Engineering Task Force (or IETF).
Object-oriented programming has extended the use of the term to include the programming protocols available for connections and communication between objects. Protocols fall into many levels of processes and complexity.
Generally, only the simplest protocols are used alone. Most protocols, especially in the context of communications or networking, are layered together into protocol stacks where the various tasks listed above are divided among different protocols in the stack.
Whereas the protocol stack denotes a specific combination of protocols that work together, a reference model is a software architecture that lists each layer and the services each should offer. The classic seven-layer reference model is the OSI model, which is used for conceptualizing protocol stacks and peer entities. This reference model also provides an opportunity to teach more general software engineering concepts like hiding, modularity, and delegation of tasks. This model has endured in spite of the demise of many of its protocols (and protocol stacks) originally sanctioned by the

History of computer in Nepal

Computer was introduced in Nepal in the year 1972 only. It was introduced by His Majesty's government for the population census of 1972(2028 B.S.) This was the second generation computer of IBM company called IBM 1401. The goverhment had paid Rs 125000 per month as rent for this computer

At that time British Government helped to develop manpower of NCC. In the meantime Nepalese students went to India, Thailand and USA for the computer education themselves. In 2039 B.S., microcomputers such as Apple, Vector, Sins, etc were imported by private companies and individuals. Many private companies like Computer Consultancy (CC), Management Information Processing System (MIPS), Data System International (DSI), etc were established. Such private companies started selling computers and training people in other to produce manpower in Nepal itself.

Nowadays, computers with faster processing and larger storage are found cheaply in Nepalese market. Students are given computer education from school level. At present Computer Association of Nepal (CAN) is the governing body of Nepal.


In 1994, Mercantile Office Systems and Royal Nepal Academy of Scient and Technology contracted an Internet feed from a site in India. Since the transmission was over cable, the quality of the line was VERY poor and the UUCP connection was not reliable. It was not uncommon to try several hundred time to retrieve a few messages from the spooled computer in India. This effort was commercialized although there were significant losses. However, the CEO, Mr Sanjib Raj Bhandari considered it a necessary investment for the future of internetworking in Nepal
Also in 1994 Sanjay Manandhar volunteered to set up a private net called HealthNet for Satellife in Cambridge, US. It was started using the same UUCP technology. However, the mail exchange was with a computer in Cambridge, US over good international lines. Hence, the throughput and reliability was good and several hospitals and doctors were, therefore, connected to the network of healthcare providers in the world.
As of January 1996 only these two nets allowed limited access (email and some newsgroups) to the Internet. Mercantile was experimented and later provided more Internet functionality such as file-transfer (ftp), remote logging in (telnet), etc. but did not have enough bandwidth to provide WWW commercially

Friday, June 18, 2010

Computer Science Career Guide


Animator - Computer
Business and Information Systems Careers
Careers in Computing
Careers in Information Technology
Careers in IT
Careers in Information Technology
Cisco Career Paths and Certification
Communication Managers - Military
Computer and Information Science Careers
Computer and Information System Managers
Computer and Mathematical Occupations
Computer and Office Machine Repairers
Computer and Video Game Development
Computer Engineer
Computer Engineering
Computer Engineering
Computer Forensics
Computer Game Designer
Computer Graphic Specialists
Computer Hardware Engineer
Computer Information Systems
Computer Managers
Computer Operators
Computer Programmer
Computer Programmers
Computer Science and Engineering Careers
Computer Scientists - BLS
Computer Security Professional
Computer Service Technician
Computer Software Engineer
Computer Software Engineer
Computer Software Engineer - BLS
Computer Support Specialist
Computer Support Specialists - BLS
Computer Systems Engineer
Computer Systems Manager
Computer Systems Specialist - Military
Computers and IT Careers
Computing Careers
Cryptanalyst
Cyber Careers
Data Processing Equipment Repairers
Database Developer
Digital Media Careers
Engineering Career Paths
Engineering Careers
Electrical and Electronic Engineers
Electrical Engineer
Games Programmer
Graphic Design Careers
Information and Communications Technology
Information Science Careers
Information Systems
Information Systems Careers
Information Technology Career Overview
Information Technology Career Paths
Information Technology Occupations
Information Technology Specialist
Information Systems Career
Intelligence Specialist - Military
Internet Professional
Internet System Administrator
IT Career Cluster Pamphlet - PDF
IT Careers - Video mwv
IT Security
Medical Informatics
Multimedia Careers - Graphic
Network Systems Analyst
Robotics Engineer
Software Developer
Software Engineering
Software Programmer
Software Tester
Software Industry Careers
Systems Administrators Field
Systems Analyst
Systems Analyst
Systems Operators
Telecommunications Careers
Unmanned Vehicle Operations Specialist
Web Design
Web Developer

Computer Information Technology Degree Courses

First Courses (to be taken within the first 18 credits)
Note: Placement tests are required for math and English composition courses.
EDCP 100 Principles and Strategies of Successful Learning (3)
(strongly recommended as first course)
LIBS 150 Information Literacy and Research Methods (1)
ENGL 101/101X Introduction to Writing 3
MATH 107 College Algebra 3 or a higher-level math course
Introductory Courses (to be taken within the first 30 credits)
± CMIS 102 Introduction to Problem Solving and Algorithm Design (3) or CMIS 102A Fundamentals of Programming I
± CMIS 141 Introductory Programming (3) or
CMIS 141A Fundamentals of Programming II
PHIL 140 Contemporary Moral Issues (3) or
ENGL 240 Introduction to Fiction, Poetry, and Drama or other ARTH, ARTT, HIST, HUMN, MUSC, PHIL, THET, dance, literature, or foreign language course to fulfill the first arts and humanities requirement
BIOL 101 Concepts of Biology (3) and
BIOL 102 Laboratory in Biology (1) or other course(s) to fulfill the biological and physical sciences lecture and laboratory requirement
CMIS 160 Discrete Mathematics for Computing (3) (recommended elective)
ENGL 291 Expository and Research Writing (3) or other course to fulfill the communications/writing requirement
GVPT 170 American Government (3) or other ANTH, BEHS, ECON, GEOG, GVPT, PSYC, SOCY, or eligible AASP, CCJS, GERO or WMST course to fulfill the first behavioral and social sciences requirement
Foundation Courses (to be taken within the first 60 credits)
± CMIT 265 Networking Essentials (3)
PSYC 100 Introduction to Psychology (3) or
SOCY 100 Introduction to Sociology or other course to fulfill the second behavioral and social sciences requirement (discipline must differ from first)
NSCI 100 Introduction to Physical Science (3) or
ASTR 100 Introduction to Astronomy or other course to fulfill the biological and physical sciences lecture requirement
HIST 142 Western Civilization II (3) or
HIST 157 History of the United States Since 1865 or other course(s) to fulfill the second arts and humanities requirement (discipline must differ from first) and the historical perspective requirement
IFSM 304 Ethics in the Information Age (3) or other course to fulfill the civic responsibility requirement
ANTH 344 Cultural Anthropology and Linguistics (3) or a foreign language course
or other course to fulfill the international perspective requirement
SPCH 100 Foundations of Speech Communication (3) or
COMM 390 Writing for Managers or other course to fulfill the communications/writing or speech requirement

Wednesday, May 26, 2010

Booking hotels in Cape town







Featured Hotels in Cape Town








From ZAR 800 VIP Icon Luxury Hotel Apartments
Cnr Lower Long & Hans Strijdom, Foreshore, City Bowl, Cape Town
Show map
VIP Icon is an apart-hotel in Cape Town’s CBD. All units are air conditioned and have a dining area, a lounge with plasma TV and a kitchen. Free secure parking is available on site.
More…
“Very professional VIP treatment, cold surroundings but thuroughly efficient and friendly.”







April 29, 2010

From ZAR 143 Protea Hotel North Wharf
No 1 Lower Bree Street, City Bowl, Waterfront, Cape Town
Show map
Protea North Wharf offers 4-star luxury apartment-style living in Cape Town with views of Table Mountain and the harbour, and is just 2km from Green Point Soccer Stadium.
More…
“Excellent size of rooms and great location at a good price. Staff were very helpful too.”
Derek, Edinburgh May 1, 2010

From ZAR 625 Ambassador Hotel
34 Victoria Road, Bantry Bay, Bantry Bay, Cape Town
Show map
Directly situated on the rocks of Bantry Bay, boasting panoramic views of the Atlantic Ocean, this deluxe hotel impresses with its spectacular setting and sophisticated atmosphere.
More…

Complete Fone Solutions - Mobile Phone Accessories, Unlocking, Flashing, Spare Parts & Equipment » iPod Accessories

Unlocking Tools & Boxes
47 Products
Unlocking Accessories
6 Products
Unlocking Logs
3 Products
Unlocking Clips
6 Products
Content / Forensic Extraction
1 Products
Box Activations & Download Accounts
13 Products
Flash File DVD's
2 Products

Friday, May 21, 2010

FIFA 2010 MATCH SCHEDULE



Dates and Cities for 2010 World Cup Matches
Overview of the exact dates of every game, in every group and every city during the 2010 Soccer World Cup in South Africa

FIFA.com - 2010 FIFA World Cup™ to pioneer 3D technology

The 2010 FIFA World Cup will be the 19th FIFA World Cup, the premier international football tournament. It is scheduled to take place between 11 June and 11 July 2010 in South Africa. The 2010 FIFA World Cup will be the culmination of a qualification process that began in August 2007 and involved 204 of the 208 FIFA national teams. As such, it matches the 2008 Summer Olympics as the sports event with the most competing nations.
This will be the first time that the tournament has been hosted by an African nation, after South Africa beat Morocco and Egypt in an all-African bidding process. This decision left the Oceania Football Confederation as the only confederation yet to host the FIFA World Cup. Italy are the defending champions. The draw for the finals took place on 4 December 2009 in Cape Town.

What is sex education?


Sex education, which is sometimes called sexuality education or sex and relationships education, is the process of acquiring information and forming attitudes and beliefs about sex, sexual identity, relationships and intimacy. Sex education is also about developing young people's skills so that they make informed choices about their behaviour, and feel confident and competent about acting on these choices. It is widely accepted that young people have a right to sex education. This is because it is a means by which they are helped to protect themselves against abuse, exploitation, unintended pregnancies, sexually transmitted diseases and HIV and AIDS. It is also argued that providing sex education helps to meet young people’s rights to information about matters that affect them, their right to have their needs met and to help them enjoy their sexuality and the relationships that they form.1 2 3 4 5