Advert

DNA Computer

Last edited by . Total of 2 comments in the discussion.

DNA computers will be the next-generation computers made of genes' building blocks. Because of their speed, miniaturization and data storage potential DNA computers are being considered as a replacement for silicon-based computers. Current DNA computer research has already proven that DNA computers are capable of solving complex mathematical equations and storing enormous amounts of data. Limitation of Silicon Chips Silicon-based computer chips have been around for more than 40 years and manufacturers have been successful in making silicon-based chips smaller, more complex and faster than their predecessors. According to Moore's Read More

Share on:

TRIAC

Last edited by . Total of no comments in the discussion.

A TRIAC is used in AC power control applications in order to switch high voltages over both parts of the AC waveform. As a result, TRIAC circuits are used in a number of applications that require power switching. The TRIAC was developed after the thyristor, which controls AC current over one half of the cycle. The TRIAC circuit can be visualized as two thyristors that are opposite, parallel, and have the two gates connected together with one device’s anode connected to another’s cathode. A common household device that uses the Read More

Share on:

Socket-A

Last edited by . Total of no comments in the discussion.

Socket-A is a 462-contact CPU socket which is used by AMD CPUs, such as the K7, Athlon, Athlon XP, Duron, and Sempron. The Socket-A is a Pin Grid Array (PGA) Zero Insertion Force (ZIF) socket. A ZIF socket features a lever on one side of the socket. When this lever is pulled up, the spring contacts inside the socket are opened. This allows the CPU to be inserted easily into the socket. The lever is then pushed down, closing the spring contacts and clamping the CPU into place.

Share on:

Configuring the ISA Server H.323 Gatekeeper

Last edited by . Total of no comments in the discussion.

Understanding the ISA Server H.323 Gatekeeper You can configure the ISA Server H.323 Gatekeeper to control the following elements over the network or Internet: Data conferencing Video Audio H.323 is a standard that specifies how this information is formatted and transmitted over networks. The H.323 standard contains a number of protocols developed by the International Telecommunications Union (ITU) that define how multimedia equipment, and computers and services should operate over the private network or Internet. The H.323 standard contains the Internet Engineering Task Force (IETF) standards listed here, as well Read More

Share on:

How an Optical Mouse Works

Last edited by . Total of 4 comments in the discussion.

Optical mice are the de facto standard for mice to communicate between the end user and the computer. The optical mouse is a great improvement of the mechanical mouse that was created in the early 1970s. Agilent Technologies introduced the Optical mouse in 1999. The technology uses a tiny camera that takes thousands of pictures per second to determine position and speed. The optical mouse uses a very small light emitting diode more commonly referred to as an LED, which is red in color. This LED bounces light off of Read More

Share on:

How to Convert iTunes to Windows Media Player

Last edited by . Total of no comments in the discussion.

A common problem created by both Apple and Microsoft for consumers is getting music to work across the iTunes and Windows Media Player applications. If you are a regular user of the iTunes program and want to export music to play in Windows Media Player, you will have to convert iTunes to Windows Media Player format or a common format that can be used on both players. One of the more popular options for this type of conversion is MP3. If you have purchased or uploaded iTunes songs within the Read More

Share on:

Network Backup

Last edited by . Total of 2 comments in the discussion.

Network backup is any backup system where the data to be backed up traverses the network to reach the backup media. Network backup typically requires a client-server software architecture. The backup server resides on a centralized server and the backup clients reside on every system to be backed up. Advanced network backup systems can manage backup media which are also connected to the backup server via a network. Network backup systems are much more scalable and manageable than local backup systems where tape drives are attached to each comouter ystem. Read More

Share on:

Acoustic Levitation

Last edited by . Total of 4 comments in the discussion.

Levitation is a phenomenon in which an object appears to 'float' in mid-air without wires or strings. Acoustic levitation is levitation using sound waves that counteract the pull of gravity and make an object float in mid-air. The Principles behind Acoustic Levitation Sound is a disturbance or vibration that moves through a medium (air, liquids or solids) in the form of waves. The source of sound is any object that moves or rapidly changes shape which causes the air around the object to vibrate. Consider a bell that is struck, Read More

Share on:

MSN Error Code 80040154

Last edited by . Total of no comments in the discussion.

MSN Messenger (now called Windows Live Messenger) is the Microsoft instant messaging program that is deployed with all versions of the Microsoft Windows Operating System (OS). The application is also installed on the Xbox 360, the Blackberry OS, the Zune HD, and the Symbian OS 9.x. The program connects the user to the Microsoft .NET messaging service and was first developed in the late 1990s. At the end of the 2000s, there were more than 300 million users of the service. Unfortunately, with the regular Windows OS updates that occur, Read More

Share on:

Microsoft PowerPoint Password Recovery

Last edited by . Total of no comments in the discussion.

Microsoft PowerPoint documents can utilize two passwords: Password to open Password to modify Password to open The Password to open requires a user to enter a password to view the document. When the user sets a Password to open, the entire Microsoft PowerPoint document is encrypted with the RC4 stream cipher. Password to modify The Password to modify requires a user to enter a password to make changes to the document. When a user sets a Password to modify, the password is stored inside the Microsoft PowerPoint document. The password Read More

Share on: