Sunday, March 14, 2010

Selection statement in C



C support 2 selection statement


If    and  Switch


General form of  IF is


if ( expression ) statement;
else  statement.


Nested IF


if (i)
{
if (j) does something( );
if(k) doessomething( );
else doessomething( );
}
else doessomething( );




? this operator can replace the if-else statement into the general form


? is called ternary operator


General form is


Exp1 ? Exp2 : Exp3


Exp1 is evaluvated if it is true then print Exp2 else print Exp3


Example


X=10;
Y=X>9 ? 100 : 200;

Back slash character constan



c includes some back slash character constant.
so you may easily enter these special character as constant.
They are also reffered as escape sequence.

#include
int main(void)
{

printf("\n\t This is a test.");
return 0;
}

code            meaning

\b                Back space
\f                 form used
\n                new line
\r                 carriage return
\t                 horizantal tab
\"                Double quote
\'                 Single quote
\\                 Back slash
\v                vertical tab
\a                Alert
\?                Question mark
\N               octal constant
\xN             Hexadecimal constant

Friday, March 12, 2010

what is PHP?

PHP


What is PHP ?

It is an acronym for Hypertext Preprocessor.

It is widely used open source general scripting language.

It is especially suited for web development and can be embedded into HTML.











The origins of PHP:
          
  “  Wonderful things come from singular inspiration”


PHP began life as simple way to track visitors to Rasmus Ledorf’s resume.

It also could embed SQL queries in web pages.




What can PHP do ?
                   Anything. PHP is mainly focused on
 server side scripting, so you can do anything any
other CGI program can do, such as collect from data,
generate dynamic page content or send and receive
cookies. But PHP cannot do much more.

Thursday, March 4, 2010

we are always in the right situation.


“Some flowers grow best in the Sun while others do well in Shade.
Remember, we are put where we grow the best and accordingly we get people and situations to grow with”
 A lot of times we get this question :”Why I am this situation when others are in a better one”.The quote above explains a lot. We all have different lessons to learn to grow. A dishonest man need to learn what is honesty while a greedy man needs to learn how to be generous.
Sometimes I think the whole nature is so perfect. There is a perfect rhythm and balance in all the things in nature. Only a prefect one can design such a perfect system and how can that perfect one put us in a  wrong situation. At times things seem bad but when you look back you know there was a good reason why that happened. I feel when we accept what we have and where we are, the intense peace and power that we get enable us to overcome the toughest  situation in life.
May we all realize that life is fair and we are always in the right situation

Wednesday, February 24, 2010

EOF plays a major role sometimes..!

End of File Function


So, just how much data is in that file?  The exact contents of a file may not be precisely  known.  Usually the general format style of the file and the type of data contained within the file are known.  The amount of data stored in the file, however, is often unknown.  So, do we spend our time counting data in a text file by hand, or do we let the computer deal with the amount of data?  Of course, we let the computer do the counting.


  
C++ provides a special function, eof( ), that returns nonzero (meaning TRUE) when there are no more data to be read from an input file stream, and zero (meaning FALSE) otherwise.


Rules for using end-of-file (eof( )):
1.  Always test for the end-of-file condition before processing data read from an input file stream.
     a.  use a priming input statement before starting the loop
     b.  repeat the input statement at the bottom of the loop body
2.  Use a
while loop for getting data from an input file stream.  A for loop is desirable only when you know the exact number of data items in the file, which we do not know.

Dont miss calloc function..!


 

 

 

calloc

calloc is similar to malloc, but the main difference is that the values stored in the allocated memory space is zero by default. With malloc, the allocated memory could have any value.
calloc requires two arguments. The first is the number of variables you'd like to allocate memory for. The second is the size of each variable.
Like malloc, calloc will return a void pointer if the memory allocation was successful, else it'll return a NULL pointer.
This example shows you how to call calloc and also how to reference the allocated memory using an array index. The initial value of the allocated memory is printed out in the for loop.
#include 
#include  
/* required for the malloc, calloc and free functions */

int main() {
  float *calloc1, *calloc2, *malloc1, *malloc2;
  int i;

  calloc1 = calloc(3, sizeof(float)); /* might need to cast */ 
  calloc2 = calloc(3, sizeof(float));
  malloc1 = malloc(3 * sizeof(float));
  malloc2 = malloc(3 * sizeof(float));

if(calloc1!=NULL && calloc2!=NULL && malloc1!=NULL && malloc2!=NULL) {

    for(i=0 ; i<3 ; i++) {
      printf("calloc1[%d] holds %05.5f, ", i, calloc1[i]);
      printf("malloc1[%d] holds %05.5f\n", i, malloc1[i]);
      printf("calloc2[%d] holds %05.5f, ", i, *(calloc2+i));
      printf("malloc2[%d] holds %05.5f\n", i, *(malloc2+i));
    }

    free(calloc1);
    free(calloc2);
    free(malloc1);
    free(malloc2);

    return 0;
  }
  else {
    printf("Not enough memory\n");
    return 1;
  }
}
Output:
calloc1[0] holds 0.00000, malloc1[0] holds -431602080.00000
calloc2[0] holds 0.00000, malloc2[0] holds -431602080.00000
calloc1[1] holds 0.00000, malloc1[1] holds -431602080.00000
calloc2[1] holds 0.00000, malloc2[1] holds -431602080.00000
calloc1[2] holds 0.00000, malloc1[2] holds -431602080.00000
calloc2[2] holds 0.00000, malloc2[2] holds -431602080.00000
On all machines, the calloc1 and calloc2 arrays should hold zeros. Contents of the malloc1 and malloc2 arrays will vary.
Try changing the data type from float to double - the numbers displayed were too long for me to fit onto this web page :)



C - malloc Function definition


 

 

malloc

malloc requires one argument - the number of bytes you want to allocate dynamically.
If the memory allocation was successful, malloc will return a void pointer - you can assign this to a pointer variable, which will store the address of the allocated memory.
If memory allocation failed (for example, if you're out of memory), malloc will return a NULL pointer.
Passing the pointer into free will release the allocated memory - it is good practice to free memory when you've finished with it.
This example will ask you how many integers you'd like to store in an array. It'll then allocate the memory dynamically using malloc and store a certain number of integers, print them out, then releases the used memory using free.
#include 
#include  /* required for the malloc and free functions */

int main() {
  int number;
  int *ptr;
  int i;

  printf("How many ints would you like store? ");
  scanf("%d", &number);

  ptr = malloc(number*sizeof(int)); /* allocate memory */
 
  if(ptr!=NULL) {
    for(i=0 ; i
      *(ptr+i) = i;
    }

    for(i=number ; i>0 ; i--) {
      printf("%d\n", *(ptr+(i-1))); /* print out in reverse order */
    }

    free(ptr); /* free allocated memory */
    return 0;
  }
  else {
    printf("\nMemory allocation failed - not enough memory.\n");
    return 1;
  }
}
Output if I entered 3:
How many ints would you like store? 3
2
1
0
When I first wrote the example using a Borland compiler, I had to cast the returned pointer like this:
ptr = (int *)malloc(number*sizeof(int));
The above example was tested in MSVC++ but try casting the pointer if your compiler displays an error.



Engineer must know these extension..!



Text Files

.doc    Microsoft Word Document
.docx    Microsoft Word Open XML Document
.log    Log File
.msg    Outlook Mail Message
.pages    Pages Document
.rtf    Rich Text Format File
.txt    Plain Text File
.wpd    WordPerfect Document
.wps    Microsoft Works Word Processor Document

Data Files


.accdb    Access 2007 Database File
.blg    Windows Binary Performance Log File
.csv    Comma Separated Values File
.dat    Data File
.db    Database File
.efx    eFax Document
.mdb    Microsoft Access Database
.pdb    Program Database
.pps    PowerPoint Slide Show
.ppt    PowerPoint Presentation
.pptx    Microsoft PowerPoint Open XML Document
.sdb    OpenOffice.org Base Database File
.sdf    Standard Data File
.sql    Structured Query Language Data
.uccapilog    Microsoft UCC API Log File
.vcf    vCard File
.wks    Microsoft Works Spreadsheet
.xls    Microsoft Excel Spreadsheet
.xlsx    Microsoft Excel Open XML Document
.xml    XML File

Image Files

Raster Image Files


.bmp    Bitmap Image File
.gif    Graphical Interchange Format File
.jpg    JPEG Image File
.png    Portable Network Graphic
.psd    Photoshop Document
.psp    Paint Shop Pro Image File
.thm    Thumbnail Image File
.tif    Tagged Image File

Vector Image Files


.ai    Adobe Illustrator File
.drw    Drawing File
.eps    Encapsulated PostScript File
.ps    PostScript File
.svg    Scalable Vector Graphics File

3D Image Files


.3dm    Rhino 3D Model
.dwg    AutoCAD Drawing Database File
.dxf    Drawing Exchange Format File
.pln    ArchiCAD Project File

Page Layout Files


.indd    Adobe InDesign File
.pct    Picture File
.pdf    Portable Document Format File
.qxd    QuarkXPress Document
.qxp    QuarkXPress Project File
.rels    Open Office XML Relationships File

Audio Files


.aac    Advanced Audio Coding File
.aif    Audio Interchange File Format
.iff    Interchange File Format
.m3u    Media Playlist File
.mid    MIDI File
.mp3    MP3 Audio File
.mpa    MPEG-2 Audio File
.ra    Real Audio File
.wav    WAVE Audio File
.wma    Windows Media Audio File

Video Files


.3g2    3GPP2 Multimedia File
.3gp    3GPP Multimedia File
.asf    Advanced Systems Format File
.asx    Microsoft ASF Redirector File
.avi    Audio Video Interleave File
.flv    Flash Video File
.mov    Apple QuickTime Movie
.mp4    MPEG-4 Video File
.mpg    MPEG Video File
.rm    Real Media File
.swf    Flash Movie
.vob    DVD Video Object File
.wmv    Windows Media Video File

Web Files


.asp    Active Server Page
.cer    Internet Security Certificate
.csr    Certificate Signing Request File
.css    Cascading Style Sheet
.htm    Hypertext Markup Language File
.html    Hypertext Markup Language File
.js    JavaScript File
.jsp    Java Server Page
.php    Hypertext Preprocessor File
.rss    Rich Site Summary
.tvpi    TitanTV Television Listing File
.tvvi    TitanTV Television Listing File
.xhtml    Extensible Hypertext Markup Language File

Font Files


.fnt    Windows Font File
.fon    Generic Font File
.otf    OpenType Font
.ttf    TrueType Font

Plugin Files


.8bi    Photoshop Plug-in
.plugin    Mac OS X Plug-in
.xll    Excel Add-In File

System Files
.cab    Windows Cabinet File
.cpl    Windows Control Panel
.cur    Windows Cursor
.dll    Dynamic Link Library
.dmp    Windows Memory Dump
.drv    Device Driver
.key    Security Key
.lnk    File Shortcut
.sys    Windows System File

Settings Files


.cfg    Configuration File
.ini    Windows Initialization File
.keychain    Mac OS X Keychain File
.prf    Outlook Profile File

Executable Files


.app    Mac OS X Application
.bat    DOS Batch File
.cgi    Common Gateway Interface Script
.com    DOS Command File
.exe    Windows Executable File
.pif    Program Information File
.vb    VBScript File
.ws    Windows Script

Compressed Files


.7z    7-Zip Compressed File
.deb    Debian Software Package
.gz    Gnu Zipped Archive
.pkg    Mac OS X Installer Package
.rar    WinRAR Compressed Archive
.sit    Stuffit Archive
.sitx    Stuffit X Archive
.tar.gz    Tarball File
.zip    Zipped File
.zipx    Extended Zip File

Encoded Files


.bin    Macbinary Encoded File
.hqx    BinHex 4.0 Encoded File
.mim    Multi-Purpose Internet Mail Message File
.uue    Uuencoded File

Developer Files


.c    C/C++ Source Code File
.cpp    C++ Source Code File
.java    Java Source Code File
.pl    Perl Script

Backup Files


.bak    Backup File
.bup    Backup File
.gho    Norton Ghost Backup File
.ori    Original File
.tmp    Temporary File

Disk Files


.dmg    Mac OS X Disk Image
.iso    Disc Image File
.toast    Toast Disc Image
.vcd    Virtual CD

Game Files


.gam    Saved Game File
.nes    Nintendo (NES) ROM File
.rom    N64 Game ROM File
.sav    Saved Game

Misc Files



.dbx    Outlook Express E-mail Folder
.msi    Windows Installer Package
.part    Partially Downloaded File
.torrent    BitTorrent File
.yps    Yahoo! Messenger Data File

Tuesday, February 23, 2010

C - KEYWORDS

There are 32 words defined as keywords in C. These have predefined uses and cannot be used for any other purpose in a C program. They are used by the compiler as an aid to compiling the program. They are always written in lower case. A complete list follows;


       auto      double      int        struct
      break      else        long      switch
      case      enum      register    typedef
      char      extern      return      union
      const      float      short      unsigned
      continue      for      signed      void
      default      goto      sizeof      volatile
        do            if          static      while

C - what is identifier

An identifier is used for any variable, function, data definition, etc. In the C programming language, an identifier is a combination of alphanumeric characters, the first being a letter of the alphabet or an underline, and the remaining being any letter of the alphabet, any numeric digit, or the underline. 

  • The case of alphabetic characters is significant. Using INDEX for a variable name is not the same as using index and neither of them is the same as using InDeX for a variable name. All three refer to different variables.
  • According to the ANSI-C standard, at least 31 significant characters can be used and will be considered significant by a conforming ANSI-C compiler. If more than 31 are used, all characters beyond the 31st may be ignored by any given compiler.

Use shortcut to impress people((girls))

 
Alt + Tab                   Switch between open applications.
Alt + Shift + Tab           Switch backwards between open applications.
Alt + double-click          Display the properties of the object you double-click on. For example, doing this on a file would display its properties.
Ctrl + Tab                  Switches between program groups or document windows in applications that support this feature.
Ctrl + Shift + Tab          Same as above but backwards.
Alt + Print Screen          Create a screen shot only for the program you are currently in.
Ctrl + Print Screen         Creates a screen shot of the entire screen
Ctrl + Alt + Del            Reboot the computer and/or bring up the Windows task manager.
Ctrl + Shift + Esc          Immediately bring up the Windows task manager.
Ctrl + Esc                  Bring up the Windows Start menu. In Windows 3.x this would bring up the Task Manager.
Alt + Esc                   Switch Between open applications on taskbar.
F1                          Activates help for current open application.
F2                          Renames selected Icon.
F3                          Starts find from desktop.
F4                          Opens the drive selection when browsing.
F5                          Refresh Contents to where you were on the page.
Ctrl + F5                   X Refreshes page to the beginning of the page.
F10                         Activates menu bar.
Shift + F10                 Simulates right-click on selected item.
F4                          Select a different location to browse in the Windows Explorer toolbar.
Alt + F4                    Closes Current open program.
Ctrl + F4                   Closes Window in Program.
F6                          Move cursor to different Windows Explorer pane.
Alt + Space bar             Drops down the window control menu.
Ctrl + (the '+' key on the keypad)   Automatically adjust the widths of all the columns in Windows explorer
Alt + Enter       Opens properties window of selected icon or program.
Alt + Space bar   Open the control menu for the current window open.
Shift + Del       Delete programs/files without throwing them into the recycle bin.
Holding Shift     Boot Safe Mode or by pass system files as the computer is booting.
Holding Shift     When putting in an audio CD, will prevent CD Player from playing.
Enter  Activates the highlighted program.
Alt + Down arrow    Display all available options on drop down menu.
* (on the keypad)   Expands all folders on the currently selected folder or drive in Windows Explorer.
+ (on the keypad)   Expands only the currently selected folder in Windows Explorer.
- (on the keypad)   Collapses the currently selected folder in Windows Explorer.

Windows key keyboard shortcuts

Shortcut Keys Description

WINKEY Pressing the Windows key alone will open Start.
WINKEY + F1                  Opens the Microsoft Windows help and support center.
WINKEY + F3                  Opens the Advanced find window in Microsoft Outlook.
WINKEY + D                   Brings the desktop to the top of all other windows.
WINKEY + M                   Minimizes all windows.
WINKEY + SHIFT + M           Undo the minimize done by WINKEY + M and WINKEY + D.
WINKEY + E                   Open Microsoft Explorer.
WINKEY + Tab                 Cycle through open programs through the taskbar.
WINKEY + F                   Display the Windows Search / Find feature.
WINKEY + CTRL + F            Display the search for computers window.
WINKEY + F1                  Display the Microsoft Windows help.
WINKEY + R                   Open the run window.
WINKEY + Pause / Break key   Open the system properties window.
WINKEY + U                   Open Utility Manager.
WINKEY + L                   Lock the computer (Windows XP and above only).
WINKEY + P                   Quickly  change between monitor display types. (Windows 7 only)
WINKEY + LEFT ARROW          Shrinks the window to 1/2 screen on the left side for side by side viewing. (Windows 7 only)
WINKEY + RIGHT ARROW         Shrinks the window to 1/2 screen on the right side for side by side viewing. (Windows 7 only)
WINKEY + UP ARROW            When in the side by side viewing mode, this shortcut takes the screen back to full size. (Windows 7 only)
WINKEY + DOWN ARROW          Minimizes the screen.  Also, when in the side by side viewing mode, this shortcut takes the screen back to a minimized size. (Windows 7 only)
 

Tuesday, February 9, 2010

ஆங்கில பாடப் பயிற்சி (Simple Past Tense)

Positive (Affirmative)
Subject + Auxiliary verb + Main verb
I/He/She/It/You/We/They + __ + did a job. இவற்றில் "Subject" வாக்கியத்தின் முன்னால் வந்துள்ளதை கவனிக்கவும். இதில் (Auxiliary verb) "துணை வினை" பயன்படாது என்பதையும் நினைவில் வைத்துக்கொள்ளுங்கள்.

Negative
Subject + Auxiliary verb + not + Main verb
I/He/She/It/You/We/They + did + not + do a job

Question (Interrogative)
Auxiliary verb + Subject + Main verb
Did + I/he/she/it/you/we/they + do a job?

1. I answered the phone
நான் பதிலளித்தேன் தொலைப்பேசிக்கு

2. I studied English for ten years.
நான் படித்தேன் ஆங்கிலம் பத்து வருடங்களாக.

3. I applied for vacancies.
நான் விண்ணப்பித்தேன் தொழில் வாய்ப்புக்காக

4. I forgave him.
நான் மன்னித்தேன் அவனை.

5. I travelled by MTR.
நான் பிரயாணம் செய்தேன் MTR ல். (நவீன நிலத்தடித் தொடரூந்து வண்டி)

6. I came back last Friday.
நான் திரும்பி வந்தேன் கடந்த வெள்ளிக்கிழமை.

7. I asked for an increment.
நான் கேட்டேன் ஒரு (பதவி/சம்பல)உயர்வு.

8. I bought a car.
நான் வாங்கினேன் ஒரு மகிழூந்து.

9. I wrote an article.
நான் எழுதினேன் ஒரு கட்டுரை.

10. I borrowed money from Sarmilan.
நான் கடன் வாங்கினேன் காசு சர்மிலனிடமிருந்து.

11. I lent a book to Ravi.
நான் இரவல்/கடன் கொடுத்தேன் ஒரு புத்தகம் ரவிக்கு

12. I cracked jokes with others.
நான் பகிடிவிட்டேன் மற்றவர்களுடன்.

13. I boiled water.
நான் கொதிக்கவைத்தேன் தண்ணீர்.

14. I got wet.
நான் நனைந்தேன்.

15. I gave priority to my works.
நான் முக்கியத்துவம் கொடுத்தேன் எனது வேலைகளுக்கு.

16. I got confrontation with my Boss.
நான் எதிரெதிராகச் செயல் பட்டேன் என் தலைவனுடன்.

17. I got an appointment.
நான் பெற்றேன் ஒரு நியமனம்.

18. I got into the bus.
நான் ஏறினேன் பேரூந்துக்குள்.

19. I got a loan from the bank.
நான் பெற்றேன் ஒரு கடன் வங்கியிலிருந்து.

20. I read Thinakkural News paper.
நான் வாசித்தேன் தினக்குரல் செய்தித் தாள்.

21. I escaped from the danger.
நான் தப்பினேன் அபாயத்திலிருந்து.

22. I studied in Jaffna.
நான் படித்தேன் யாழ்ப்பாணத்தில்.

23. I ironed my clothes.
நான் அயன் செய்தேன் எனது உடைகளை.

24. I invited my friends.
நான் அழைப்புவிடுத்தேன் எனது நண்பர்களுக்கு.

25. I deposited money to the bank.
நான் வைப்பீடு செய்தேன் காசை வங்கியில்.

26. I born in 1998.
நான் பிறந்தேன் 1998 ல்.

27. I played football.
நான் விளையாடினேன் உதைப்பந்தாட்டம்

28. I introduced her to my family.
நான் அறிமுகப்படுத்தினேன் அவளை எனது குடும்பத்தாருக்கு.

29. I inquired about this.
நான் விசாரித்தேன் இதைப் பற்றி.

30. I informed to police.
நான் தெரிவித்தேன் காவல் துறைக்கு.

31. I learned driving in Hong Kong.
நான் கற்றேன் வாகனம் ஓட்ட ஹொங்கொங்கில்

32. I met Kavitha yesterday
நான் சந்தித்தேன் கவிதாவை நேற்று.

33. I married in 1995.
நான் திருமணம் செய்தேன் 1995 ல்.

34. I played Guitar.
நான் வாசித்தேன் கிட்டார்.

35. I visited Thailand last year.
நான் (பார்க்கச்) சென்றேன் தாய்லாந்து கடந்த வருடம்.

36. I opened a current account.
நான் திறந்தேன் ஒரு நடைமுறைக் கணக்கு.

37. I sent a message.
நான் அனுப்பினேன் ஒரு தகவல்.

38. I paid in Installments.
நான் செலுத்தினேன் (பணம்) தவணைமுறையில்.

39. I taught English.
நான் படிப்பித்தேன் ஆங்கிலம்.

40. I went to university.
நான் சென்றேன் பல்கலைக்கழகத்திற்கு.

41. I repaid the loan.
நான் திரும்பச் செலுத்தினேன் கடன்.

42. I arrived ten minutes ago.
நான் வந்தடைந்தேன் பத்து நிமிடங்களுக்கு முன்பே.

43. I lived in Bangkok for two years.
நான் வசித்தேன் பெங்கொக்கில் இரண்டு வருடங்களாக.

44. I worked very hard.
நான் வேலை செய்தேன் மிகவும் கடினமாக.

45. I left from home.
நான் வெளியேறினேன் வீட்டிலிருந்து.

46. I sang a song.
நான் பாடினேன் ஒரு பாடல்.

47. I practiced English last night.
நான் பயிற்சி செய்தேன் ஆங்கிலம் கடந்த இரவு.

48. I forgot her.
நான் மறந்தேன் அவளை.

49. I decorated my house.
நான் அலங்கரித்தேன் எனது வீட்டை.

50. I wrote a letter to my mother.
நான் எழுதினேன் ஒரு கடிதம் என் தாயாருக்கு.

ஆங்கில பாடப் பயிற்சி (Present Continuous Tense)

Positive (Affirmative)
Subject + Auxiliary verb + Main verb with ing
1. I + am + doing a job
2. He/ She/ It + is + doing a job.
3. You/ We/ They + are + doing a job. இவ்வாக்கிய அமைப்புகளில் எழுவாய் (Subject) வாக்கியத்தின் முன்னால் வந்துள்ளதை கவனிக்கவும். அத்துடன் இந்த Form ல் எப்பொழுதும் பிரதான வினைச்சொல்லுடன் "ing" யும் இணைந்து பயன்படும்.

Negative
Subject + Auxiliary verb + not + Main verb with ing
1. I + am + not + doing a job
2. He/ She/ It + is + not + doing a job.
3. You/ We/ They + are + not + doing a job.

Question (Interrogative)
Auxiliary verb + Subject + Main verb with ing
1. Am + I + doing a job?
2. Is + he/ she/ It + doing a job?
3. Are + you/ we/ they + doing a job?



Are you doing a job?
நீ செய்துக்கொண்டிருக்கின்றயா ஒரு வேலை?
Yes, I am doing a job. (I’m)
ஆம், நான் செய்துக்கொண்டிருக்கின்றேன் ஒரு வேலை.
No, I am not doing a job. (I’m not)
இல்லை, நான் செய்துக்கொண்டிருக்கின்றேனில்லை ஒரு வேலை.

Are you speaking in English?
நீ பேசிக்கொண்டிருக்கின்றாயா ஆங்கிலத்தில்?
Yes, I am speaking in English. (I’m)
ஆம், நான் பேசிக்கொண்டிருக்கின்றேன் ஆங்கிலத்தில்.
No, I am not speaking in English. (I’m not)
இல்லை, நான் பேசிக்கொண்டிருக்கின்றேனில்லை ஆங்கிலத்தில்.

Are you going to school?
நீ போய்க்கொண்டிருக்கின்றாயா பாடசாலைக்கு?
Yes, I am going to school. (I’m)
ஆம், நான் போய்க்கொண்டிருக்கின்றேன் பாடசாலைக்கு.
No, I am not going to school. (I’m not)
இல்லை, நான் போய்க்கொண்டிருக்கின்றேனில்லை பாடசாலைக்கு.


1. I am getting up now.
நான் எழுந்துக்கொண்டிருக்கின்றேன் இப்பொழுது.

2. I am going to toilet.
நான் போய்க்கொண்டிருக்கின்றேன் குளியலறைக்கு.

3. I am brushing my teeth.
நான் துலக்கிக்கொண்டிருகின்றேன் என் பற்களை.

4. I am having a bath.
நான் குளித்துக்கொண்டிருக்கின்றேன்.

5. I am having some tea.
நான் அருந்திக்கொண்டிருக்கின்றேன் கொஞ்சம் தேனீர்.

6. I am dressing.
நான் உடுத்திக்கொண்டிருக்கின்றேன்.

7. I am practicing my religion.
நான் பின்பற்றிக்கொண்டிருக்கின்றேன் எனது மதத்தை.

8. I am having my breakfast.
நான் சாப்பிட்டுக்கொண்டிருக்கின்றேன் எனது காலை உணவை.

9. I am worshiping to my parents.
நான் வணங்கிக்கொண்டிருக்கின்றேன் எனது பெற்றோரை.

10. I am leaving from home.
நான் வெளியேறிக்கொண்டிருக்கின்றேன் வீட்டிலிருந்து.

11. I am traveling by bus.
நான் பிரயாணித்துக்கொண்டிருக்கின்றேன் பேரூந்தில்.

12. I am getting down from the bus.
நான் இறங்குகிக்கொண்டிருக்கின்றேன் பேரூந்திலிருந்து.

13. I am entering into the Office
நான் நுழைந்துக்கொண்டிருக்கின்றேன் அலுவலகத்திற்குள்.

14. I am working.
நான் வேலை செய்துக்கொண்டிருக்கின்றேன்.

15. I am doing my duty.
நான் செய்துக்கொண்டிருக்கின்றேன் எனது கடமையை.

16. I am operating a computer.
நான் இயக்கிக்கொண்டிருக்கின்றேன் ஒரு கணனியை.

17. I am helping to people.
நான் உதவிக்கொண்டிருக்கின்றேன் மக்களுக்கு.

18. I am getting down meals from canteen.
நான் எடுபித்துக்கொண்டிருக்கின்றேன் உணவு சிற்றுண்டிசாலையிலிருந்து.

19. I am sharing my lunch.
நான் பகிர்ந்துக்கொண்டிருக்கின்றேன் எனது (பகல்) உணவை.

20. I am working as a team.
நான் வேலை செய்துக்கொண்டிருக்கின்றேன் ஒரு குழுவாக.

21. I am talking with my friends.
நான் பேசிக்கொண்டிருக்கின்றேன் எனது நண்பர்களுடன்.

22. I am leaving from office to home
நான் வெளியேறிக்கொண்டிருக்கின்றேன் அலுவலகத்திலிருந்து வீட்டிற்கு.

23. I am waiting for you.
நான் காத்துக்கொண்டிருக்கின்றேன் உனக்காக.

24. I am coming back to home.
நான் திரும்பிவந்துக்கொண்டிருக்கின்றேன் வீட்டிற்கு.

25. I am having a body wash.
நான் ஒரு (உடல்) குளியல் எடுத்துக்கொண்டிருக்கின்றேன்.

26. I am changing my clothes.
நான் மாற்றிக்கொண்டிருக்கின்றேன் எனது உடைகளை.

27. I am having a cup of coffee.
நான் அருந்திக்கொண்டிருக்கின்றேன் ஒரு கோப்பை கோப்பி.

28. I am going to play ground.
நான் போய்க்கொண்டிருக்கின்றேன் விளையாட்டு மைதானத்திற்கு.

29. I am walking.
நான் நடந்துக்கொண்டிருக்கின்றேன்.

30. I am smoking cigarette.
நான் புகைத்துக்கொண்டிருக்கின்றேன் வெண்சுருட்டு.

31. I am meeting my friends
நான் சந்தித்துக்கொண்டிருக்கின்றேன் எனது நண்பர்களை.

32. I am cracking joke with others.
நான் பகிடி விட்டுக்கொண்டிருக்கின்றேன் மற்றவர்களுடன்.

33. I am playing foot ball.
நான் விளையாடிக்கொண்டிருக்கின்றேன் உதைப்பந்தாட்டம்.

34. I am answering phone.
நான் பதிலளித்துக்கொண்டிருக்கின்றேன் தொலைப்பேசியில்.

35. I am having a rest.
நான் ஓய்வெடுத்துக்கொண்டிருக்கின்றேன்.

36. I am studying for the exam.
நான் படித்துக்கொண்டிருக்கின்றேன் பரீட்சைக்காக.

37. I am reading a book.
நான் வாசித்துக்கொண்டிருக்கின்றேன் ஒரு புத்தகம்.

38. I am watching movie.
நான் பார்த்துக்கொண்டிருக்கின்றேன் திரைப்படம்.

39. I am thinking about that.
நான் நினைத்துக்கொண்டிருக்கின்றேன் அதைப் பற்றி.

40. I am preparing tea.
நான் தாயாரித்துக்கொண்டிருக்கின்றேன் தேனீர்.

41. I am rectifying mistakes.
நான் திருத்திக்கொண்டிருக்கின்றேன் தவறுகளை.

42. I am writing an article in Tamil
நான் எழுதிக்கொண்டிருக்கின்றேன் ஒரு கட்டுரை தமிழில்.

43. I am translating English to Tamil.
நான் மொழி பெயர்த்துக்கொண்டிருக்கின்றேன் ஆங்கிலத்தை தமிழுக்கு.

44. I am improving my English knowledge.
நான் வளர்த்துக்கொண்டிருக்கின்றேன் எனது ஆங்கில அறிவை.

45. I am having my dinner.
நான் சாப்பிட்டுக்கொண்டிருக்கின்றேன் (இரவு) சாப்பாடு.

46. I am singing a song.
நான் பாடிக்கொண்டிருக்கின்றேன் ஒரு பாடல்.

47. I am doing my home work.
நான் செய்துக்கொண்டிருக்கின்றேன் எனது வீட்டுப்பாடம்.

48. I am practicing English at night.
நான் பயிற்சித்துக்கொண்டிருக்கின்றேன் ஆங்கிலம் இரவில்.

49. I am praying.
நான் பிராத்தித்துக்கொண்டிருக்கின்றேன்.

50. I am sleeping.
நான் நித்திரைசெய்துக்கொண்டிருக்கின்றேன்.

englsih learn ---present tense

Subject + Auxiliary verb + Main verb
1. I/ You/ We/ They + __ + do a job.
2. He/ She/ It + __ + does a job. இவற்றில் "Subject" வாக்கியத்தின் முன்னால் வந்துள்ளது. இவ்வாக்கிய அமைப்புகளில் "Auxiliary verb" "அதாவது துணைவினை பயன்படுவதில்லை என்பதை கவனத்தில் கொள்க.

1. I get up early at 6.30.
நான் எழுகின்றேன் அதிகாலை 6.30 அளவில்.

2. I brush my teeth.
நான் துலக்குகின்றேன் என் பற்களை.

3. I have a bath.
நான் குளிக்கின்றேன்.

4. I have my breakfast.
நான் எனது காலை உணவை உண்கின்றேன்.

5. I travel by bus.
நான் பிரயாணம் செய்கின்றேன் பேரூந்தில்.

6. I go to school.
நான் போகின்றேன் பாடசாலைக்கு.

7. I get down from the bus.
நான் இறங்குகின்றேன் பேரூந்திலிருந்து.

8. I read the book.
நான் வாசிக்கின்றேன் புத்தகம்.

9. I write an article.
நான் எழுதுகின்றேன் ஒரு கட்டுரை.

10. I get down meals from canteen.
நான் எடுபிக்கின்றேன் உணவு சிற்றுண்டி சாலையிலிருந்து.

11. I pay the loan.
நான் செலுத்துகின்றேன் கடன்.

12. I borrow some books from my friend.
நான் இரவல் வாங்குகின்றேன் புத்தகங்கள் எனது நண்பனிடமிருந்து.

13. I leave from class.
நான் வெளியேறுகின்றேன் வகுப்பிலிருந்து.

14. I try to go.
நான் முயற்சி செய்கின்றேன் போவதற்கு.

15. I have a rest.
நான் எடுக்கின்றேன் ஓய்வு.

16. I answer the phone.
நான் பதிலளிக்கின்றேன் தொலைப்பேசிக்கு.

17. I watch movie.
நான் பார்க்கின்றேன் திரைப்படம்.

18. I worry about that.
நான் கவலைப்படுகிறேன் அதைப் பற்றி.

19. I drive a car.
நான் ஓட்டுகின்றேன் ஒரு மகிழூந்து.

20. I read the news paper.
நான் வாசிக்கின்றேன் செய்தித் தாள்.

21. I play foot ball.
நான் விளையாடுகின்றேன் உதைப்பந்தாட்டம்.

22. I boil water.
நான் கொதிக்கவைக்கின்றேன் தண்ணீர்.

23. I have some tea.
நான் அருந்துகின்றேன் கொஞ்சம் தேனீர்.

24. I do my homework.
நான் செய்கின்றேன் எனது வீட்டுப்பாடம்.

25. I deposit money to the bank.
நான் வைப்பீடு செய்கின்றேன் காசை வங்கியில்.

26. I wait for you.
நான் காத்திருக்கின்றேன் உனக்காக.

27. I operate computer.
நான் இயக்குகின்றேன் கணனியை.

28. I follow a computer course.
நான் பின்தொடர்கின்றேன் ஒரு கணனிப் பாடப்பயிற்சி.

29. I practice my religion.
நான் பின்பற்றுகின்றேன் என் மதத்தை.

30. I listen to news.
நான் செவிமடுக்கின்றேன் செய்திகளுக்கு.

31. I speak in English.
நான் பேசுகின்றேன் ஆங்கிலத்தில்.

32. I prepare tea.
நான் தயாரிக்கின்றேன் தேனீர்.

33. I help to people.
நான் உதவுகின்றேன் மக்களுக்கு.

34. I celebrate my birthday.
நான் கொண்டாடுகின்றேன் எனது பிறந்த நாளை.

35. I enjoy Tamil songs.
நான் இரசிக்கின்றேன் தமிழ் பாடல்களை.

36. I negotiate my salary.
நான் பேரம்பேசுகின்றேன் எனது சம்பளத்தை.

37. I change my clothes.
நான் மாற்றுகின்றேன் எனது உடைகளை.

38. I go to market.
நான் போகின்றேன் சந்தைக்கு.

39. I choose a nice shirt.
நான் தெரிவுசெய்கின்றேன் ஒரு அழகான சட்டை.

40. I buy a trouser.
நான் வாங்குகின்றேன் ஒரு காற்சட்டை.

41. I love to Tamileelam.
நான் நேசிக்கின்றேன் தமிழீழத்தை.

42. I remember this place.
நான் நினைவில் வைத்துக்கொள்கின்றேன் இந்த இடத்தை.

43. I take a transfer.
நான் எடுக்(பெறு)கின்றேன் ஒரு இடமாற்றம்.

44. I renovate the house.
நான் புதுபிக்கின்றேன் வீட்டை.

45. I give up this habit.
நான் விட்டுவிடுகின்றேன் இந்த (தீய)பழக்கத்தை.

46. I fly to America.
நான் பறக்கின்றேன் (விமானத்தில்) அமெரிக்காவிற்கு.

47. I solve my problems.
நான் தீர்க்கின்றேன் எனது பிரச்சினைகளை.

48. I improve my English knowledge.
நான் விருத்திச்செய்கின்றேன் எனது ஆங்கில அறிவை.

49. I practice English at night.
நான் பயிற்சி செய்கின்றேன் ஆங்கிலம் இரவில்.

50. I dream about my bright future.
நான் கனவு காண்கின்றேன் எனது பிரகாசமான எதிர்காலத்தை (பற்றி).


நிகழ்கால வினைச் சொற்களுடன் பயன்படும் சில குறிச் சொற்கள் [Simple Present - Signal words]

always
Often
Usually
Sometimes
Seldom
Never
Every day
Every week
Every year
On Monday
After school

Friday, January 8, 2010

Hub

 
What is a hub?

A hub is an element of hardware for centralising network traffic coming from multiple hosts, and to propagate the signal. The hub has a certain number of ports (it has enough ports to link machines to one another, usually 4, 8, 16 or 32). Its only goal is to recover binary data coming into a port and send it to all the other ports. As with a repeater, a hub operates on layer 1 of the OSI model, which is why it is sometimes called a multiport repeater.

hub

The hub connects several machines together, sometimes arranged in a star shape, which gives it its name, due to the fact that all communication coming from the machines on the network passes through it.
Types of hubs

There are several categories of hubs:

    * "Active" hubs: They are connected to an electrical power source and are used to refresh the signal being sent to the ports.

    * "Passive" ports: They simply send the signal to all the connected hosts, without amplifying it.


Connecting multiple hubs

It is possible to connect several hubs together in order to centralise a larger number of machines; this is sometimes called a daisy chain. To do this, all that is needed is to connect the hubs using crossover cable, a kind of cable which links the in/out ports on one end to those on the other.

Hubs generally have a special port called an "uplink" for connecting two hubs together using a patch cable. There are also hubs which can cross or uncross their ports automatically depending on whether they are connected to a host or a hub.

setting up a daisy chain


Note:     Up to three hubs can be chained.

If you want to connect multiple machines to your Internet connection, a hub is not enough. You'll either need to have a router or a switch, or to leave the computer connected directly as a gateway (it will stay on constantly for as long as the other computers on the network want to access the Internet.)
 



WiFi


 

Introduction to Wi-Fi (802.11)

The IEEE 802.11 specification (ISO/IEC 8802-11) is an international standard describing the characteristics of a wireless local area network (WLAN). The name Wi-Fi (short for "Wireless Fidelity", sometimes incorrectly shortened to WiFi) corresponds to the name of the certification given by the Wi-Fi Alliance, formerly WECA (Wireless Ethernet Compatibility Alliance), the group which ensures compatibility between hardware devices that use the 802.11 standard. Today, due to misuse of the terms (and for marketing purposes), the name of the standard is often confused with the name of the certification. A Wi-Fi network, in reality, is a network that complies with the 802.11 standard. Hardware devices certified by the Wi-Fi Alliance are allowed to use this logo:

Wi-Fi Certification Logo

With Wi-Fi, it is possible to create high-speed wireless local area networks, provided that the computer to be connected is not too far from the access point. In practice, Wi-Fi can be used to provide high-speed connections (11 Mbps or greater) to laptop computers, desktop computers, personal digital assistants (PDAs) and any other devices located within a radius of several dozen metres indoors (in general 20m-50m away) or within several hundred metres outdoors.

Wi-Fi providers are starting to blanket areas that have a high concentration of users (like train stations, airports, and hotels) with wireless networks. These access areas are called "hot spots".


Introduction to Wi-Fi (802.11)

The 802.11 standard reserves the low levels of the OSI model for a wireless connection that uses electromagnetic waves, i.e.:

    * The physical layer (sometimes shortened to the "PHY" layer), which offers three types of information encoding.
    * The data link layer, comprised of two sub-layers: Logical Link Control (or LLC) and Media Access Control (or MAC).

The physical layer defines the radio wave modulation and signalling characteristics for data transmission, while the data link layer defines the interface between the machine's bus and the physical layer, in particular an access method close to the one used in the Ethernet standard and rules for communication between the stations of the network. The 802.11 standard actually has three physical layers, which define alternative modes of transmission:

Data Link Layer


(MAC)     802.2   802.11


Physical Layer
(PHY)    
DSSS    FHSS    Infrared

Any high-level protocol can be used on a Wi-Fi wireless network the same way it can be used on an Ethernet network.


The various Wi-Fi standards

The IEEE 802.11 standard is actually only the earliest standard, allowing 1-2 Mbps of bandwidth. Amendments have be made to the original standard in order to optimise bandwidth (these include the 802.11a, 802.11b and 802.11g standards, which are called 802.11 physical standards) or to better specify components in order to ensure improved security or compatibility. This table shows the various amendments to the 802.11 standard and their significance:

Name of standard    Name    Description

 
802.11a     Wifi5     The 802.11a standard (called WiFi 5) allows higher bandwidth (54 Mbps maximum throughput, 30 Mbps in practice). The 802.11a standard provides 8 radio channels in the 5 GHz frequency band.
802.11b    WiFi    The 802.11b standard is currently the most widely used one. It offers a maximum thoroughput of 11 Mbps (6 Mbps in practice) and a reach of up to 300 metres in an open environment. It uses the 2.4 GHz frequency range, with 3 radio channels available.
802.11c    Bridging 802.11 and 802.1d    The 802.11c bridging standard is of no interest to the general public. It is only an amended version of the 802.1d standard that lets 802.1d bridge with 802.11-compatible devices (on the data link level).
802.11d    Internationalisation    The 802.11d standard is a supplement to the 802.11 standard which is meant to allow international use of local 802.11 networks. It lets different devices trade information on frequency ranges depending on what is permitted in the country where the device is from.
802.11e    Improving service quality    The 802.11e standard is meant to improve the quality of service at the level of the data link layer. The standard's goal is to define the requirements of different packets in terms of bandwidth and transmission delay so as to allow better transmission of voice and video.
802.11f    Roaming    The 802.11f is a recommendation for access point vendors that allows products to be more compatible. It uses the Inter-Access Point Roaming Protocol, which lets a roaming user transparently switch from one access point to another while moving around, no matter what brands of access points are used on the network infrastructure. This ability is also simply called roaming.
802.11g         The 802.11g standard offers high bandwidth (54 Mbps maximum throughput, 30 Mbps in practice) on the 2.4 GHz frequency range. The 802.11g standard is backwards-compatible with the 802.11b standard, meaning that devices that support the 802.11g standard can also work with 802.11b.
802.11h         The 802.11h standard is intended to bring together the 802.11 standard and the European standard (HiperLAN 2, hence the h in 802.11h) while conforming to European regulations related to frequency use and energy efficiency.
802.11i         The 802.11i standard is meant to improve the security of data transfers (by managing and distributing keys, and implementing encryption and authentication). This standard is based on the AES (Advanced Encryption Standard) and can encrypt transmissions that run on 802.11a, 802.11b and 802.11g technologies.
802.11Ir         The 802.11r stadard has been elaborated so that it may use infra-red signals. This standard has become technologically obsolete.
802.11j         The 802.11j standard is to Japanese regulation what the 802.11h is to European regulation.
It is also useful to note the existence of a standard called "802.11b+". This is a proprietary standard with improvements in data flow. However, this standard also suffers from gaps in interoperability due to not being an IEEE standard.
Range and data flow

The 802.11a, 802.11b and 802.11g standards, called "physical standards" are amendments to the 802.11 standard and offer different modes of operation, which lets them reach different data transfer speeds depending on their range.

Standard               Frequency     Speed         Range

 
WiFi a (802.11a)     5 GHz         54 Mbit/s     10 m


WiFi B (802.11b)     2.4 GHz     11 Mbit/s     100 m


WiFi G (802.11b)     2.4 GHz     54 Mbit/s     100 m



802.11a

The 802.11 standard has a maximum theoretical data flow of 54 Mbps, five times that of 802.11b, but at a range of only about thirty metres. The 802.11a standard relies on a technology called OFDM (Orthogonal Frequency Division Multiplexing). It broadcasts in the 5 GHz frequency range and uses 8 non-overlapping channels.

Because of this, 802.11a devices are incompatible with 802.11b devices. However, there are devices that incorporate both 802.11a and 802.11b chips, called "dual band" devices.

Hypothetical speed


(indoors)      Range


54 Mbits/s     10 m


48 Mbits/s     17 m


36 Mbits/s     25 m


24 Mbits/s     30 m


12 Mbits/s     50 m


6 Mbits/s     70 m


802.11b

The 802.11b standard allows for a maximum data transfer speed of 11 Mbps, at a range of about 100 m indoors and up to 200 metres outdoors (or even beyond that, with directional antennas.)

Hypothetical speed    Range


(indoors)    Range   (outdoors)


11 Mbits/s     50 m     200 m


5.5 Mbits/s     75 m     300 m


2 Mbits/s     100 m     400 m


1 Mbit/s     150 m     500 m


802.11g

The 802.11g standard allows for a maximum data transfer speed of 54 Mbps at ranges comparable to those of the 802.11b standard. What's more, as the 802.11g standard uses the 2.4GHz frequency range with OFDM coding, this standard is compatible with 802.11b devices, with the exception of some older devices.

Hypothetical speed    Range

 
(indoors)      Range (outdoors)

 
54 Mbits/s     27 m     75 m


48 Mbits/s     29 m     100 m


36 Mbits/s     30 m     120 m


24 Mbit/s     42 m     140 m


18 Mbit/s     55 m     180 m


12 Mbit/s     64 m     250 m


9 Mbit/s     75 m     350 m


6 Mbit/s     90 m     400 m
 


Fire wall




What is a Firewall?

A firewall is a system that protects a computer or a computer network against intrusions coming from a third-party network (generally the Internet). A firewall is a system that filters data packets that are exchanged over the network.

 


  • an interface for the network being protected (internal network)
  • an interface for the external network
The firewall system is a software system, often supported by dedicated network hardware, forming an intermediary between the local network(or the local computer) and one or more external networks. A firewall system can be set up on any computer that uses any system as long as:
  • The machine is powerful enough to process the traffic
  • The system is secure
  • No other service other than the packet filtering service is running on the server
In the case that a firewall system is provided in a black box, the term "appliance" applies.


How a Firewall System Works

 

 A firewall system contains a set of predefined rules that allow the system to: 

 

  • Authorise the connection (allow)
  • Block the connection (deny)
  • Reject the connection request without informing the issuer (drop)
All of these rules implement a filtering method that depends on the security policy that was adopted by the organisation. Security policies are usually broken down into two types that allow:
  • the authorisation of only those communications that were explicitly authorised:







    "Everything that is not explicitly authorised is prohibited"










  • the refusal of exchanges that were explicitly prohibited
The first method is without a doubt the safest. However, it imposes a precise and restrictive definition of communication needs.

 









Hard disk


                              Hard drive

The hard drive is the component which is used to permanently store data, as opposed to RAM, which is erased whenever the computer is restarted, which is why the term mass storage device is sometimes used to refer to hard drives.

The hard drive is connected to the motherboard using a hard drive controller which acts as an interface between the processor and the hard drive.


Structure

 A hard drive is made up of not just one, but several rigid metal, glass, or ceramic disks, stacked very close to one another and called platters



The disks turn very quickly around an axle (currently several thousand revolutions per minute) in a counter-clockwise direction .


The data is stored in the form of 0s and 1s (called bits).

Hard drives hold millions of these bits, stored very close to one another on a fine magntic layer a few microns thick, which is covered by a protective film. 

They are read and written using read heads located on both sides of the platters. These heads are electromagnets which raise and lower themselves in order to read or write data. The read heads are only a few microns from the surface, separated by a layer of air created by the rotation of the disks, which generates a wind of about 250km/h (150 mph)! What's more, these disks are laterally mobile, so that the heads can sweep across their entire surface. 

 
However, the heads are linked to one another and only one of them can read or write at a given moment. The term cylinder is used to refer to all the data stored vertically on each of the disks.
This entire precision mechanism is contained within a fully airtight case, as the smallest particle can degrade the disk's surface. This is why hard drives are closed shut with seals, and the warning "Warranty void if removed", as only hard drive manufacturers can open them (in particle-free "cleanrooms").


How it works

 

The read/write heads are said to be "inductive", meaning that they can generate a magnetic field. This is especially important in writing: The heads, by creating positive or negative fields, polarise the disk surface in a very tiny area, so that when they are read afterwards, the polarity reversal completes a circuit with the read head, which is then transformed by an analog-digital converter (ADC) into a 0 or 1 which can be understood by the computer.

 
The heads start writing data from the edge of the disk (track 0), then move onward towards the centre. The data is organised in concentric circles called "tracks", which are created by  low level formatting.
The tracks are separated into areas (between two radii) called sectors, containing data (generally at least 512 octets per sector).

  
The term cylinder refers to all data found on the same track of different platters (i.e. above and below one another), as this forms a "cylinder" of data.


Finally, the term clusters (also called allocation units) refers to minimum area that a file can take up on the hard drive. An operating system uses blocks, which are in fact groups of sectors (between 1 and 16 sectors). A small file may occupy multiple sectors (a cluster).
On old hard drives, addressing was done physically, by defining the position of the date from the coordinates Cylinder/Head/Sector (CHS). 

Technical specifications

  • Capacity: Amount of data which can be stored on a hard drive.
  • Transfer rate: Quantity of data which can be read or written from the disk per unit of time. It is expressed in bits per second.
  • Rotational speed: The speed at which the platters turn, expressed in rotations per minute (rpm for short). Hard drive speeds are on the order of 7200 to 15000 rpm. The faster a drive rotates, the higher its transfer rate. On the other hand, a hard drive which rotates quickly tends to be louder and heats up more easily.
  • Latency (also called rotational delay): The length of time that passes between the moment when the disk finds the track and the moment it finds the data.
  • Average access time: Average amount of time it takes the read head to find the right track and access the data. In other words, it represents the average length of time it takes the disk to provide data after having received the order to do so. It must be as short as possible.
  • Radial density: number of tracks per inch (tpi).
  • Linear density: number of bits per inch (bpi) on a given track.
  • Surface density: ratio between the linear density and radial density (expressed in bits per square inch).
  • Cache memory (or buffer memory): Amound of memory located on the hard drive. Cache memory is used to store the drive's most frequently-accessed data, in order to improve overall performance; 
  • Interface: This refers to the connections used by the hard drive. The main hard drive interfaces are:
    • IDE/ATA
    • SERIAL ATA
    • SCSI
    • However, there are external cases used for connecting hard drives with USB or FIRE WIRE ports.

 





Wednesday, January 6, 2010

Random Access Memory




random access memory

A type of computer that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. 

Types of random access memory

  • DRAM memories (Dynamic Random Access Module), which are inexpensive. They are used essentially for the computer's main memory.
  • SRAM memories (Static Random Access Module), which are fast and costly. SRAM memories are used in particular for the processors cache memory.

 

Operation of the random access memory

 The random access memory comprises hundreds of thousands of small capacitors that store loads. When loaded, the logical state of the capacitor is equal to 1, otherwise it is 0, meaning that each capacitor represents one memory bit.
 

Given that the capacitors become discharged they must be constantly recharged (the exact term is refresh) at regular intervals, known as the refresh cycle. DRAM memories for example require refresh cycles of around 15 nanoseconds (ns). 

Each capacitor is coupled with a transistor (MOS-type) enabling "recovery" or amendment of the status of the capacitor. These transistors are arranged in the form of a table (matrix) thus we access a memory box (also called memory point) via a line and a column.  




Each memory point is thus characterised by an address which corresponds to a row number and a column number. This access is not instant and the access time period is known as latency time. Consequently, time required for access to data in the memory is equal to cycle time plus latency time.


Thus, for a DRAM memory, access time is 60 nanoseconds (35ns cycle time and 25ns latency time). On a computer, the cycle time corresponds to the opposite of the clock frequency; for example, for a computer with frequency of 200 MHz, cycle time is 5 ns (1/200*106)).


Consequently a computer with high frequency using memories with access time much longer than the processor cycle time must perform wait states to access the memory. For a computer with frequency of 200 MHz using DRAM memories (and access time of 60ns), there are 11 wait states for a transfer cycle. The computer's performance decreases as the number of wait states increases, therefore we recommend the use of faster memories.