Advert

Postfix

Last edited by . Total of 8 comments in the discussion.

The sum of X and Y is written as X+Y where + is the operator while X and Y are the operands. We have always learnt to write the sum of two numbers as X + Y; this notation is know as infix. Here, we’ll be talking about the postfix notation of representing arithmetic operations. XY+ // postfix The relative position of the operator with respect to the operands tells whether the expression is written in postfix or infix notation. As the above expression shows, when the position of the Read More

Share on:

Multi-Core Technology

Last edited by . Total of no comments in the discussion.

Multi-core technology is the term that describes today's processors that have two or more working processor chips (more commonly referred to as cores) working simultaneously as one system. Dual cores or chips with two processors that work as one system are the first type of multi-core technology applications. How It Works The multi-core processor technology was conceptualized and has revolved around the idea of being able to make parallel computing possible. Parallel computing could dramatically increase the speed, efficiency and performance of computers by simply putting 2 or more Central Read More

Share on:

Best iPad Apps

Last edited by . Total of 3 comments in the discussion.

An iPad is a tablet PC that Apple created. It has features that are found on both the Mac and iPhone. While iPads are not the first or only tablet PC available, they are extremely popular and have many different features that are not commonly found on portable devices. Although iPads generally include support for WiFi, Bluetooth, and 3G in addition to built-in touchscreen and cameras, they are also linked to the Apple App Store, which allows users to take advantage of a large variety of programs that are not Read More

Share on:

Electric Cars

Last edited by . Total of no comments in the discussion.

Electric cars (or Battery Electric Cars) utilize electrical energy for motion instead of relying on energy generated by burning fuel. Batteries are the main source of energy, and are used to power electric motors in order to produce wheel or axle movement History of Electric Cars In the mid-19th century Robert Anderson, a Scottish businessman, came up with the early version of an electric vehicle that more or less resembles the carriage that was popular in his time. This car came before the invention and perfection of cars that run Read More

Share on:

What Fuels Are Used in Power Plants?

Last edited by . Total of no comments in the discussion.

There are many different types of power plants. Depending on the type of fuel someone wants to use determines what kind of power plant someone would build. The most powerful power plant is a nuclear power plant, but this is also the most controversial because of events such as Chernobyl and because it is difficult to get rid of the nuclear waste. However, the ultimate purpose of most power plants is to spin the turbine which, in turn, creates electricity. Gas Power Plant With a gas power plant, they take Read More

Share on:

What is a Biometric Coprocessor?

Last edited by . Total of no comments in the discussion.

A biometric coprocessor is a device that is capable of scanning a user’s physical attributes in order to allow access to a building or computer network. A biometric coprocessor is essentially a fingerprint reader, but may also include sensors that analyze the user’s eyes, voice, or even breath. The term “biometric coprocessor” comes from the word “biometric” – the measurement of biological attributes, and “coprocessor” – a computer system that can keep track of several tasks at the same time. How Does A Biometric Coprocessor Work? A biometric coprocessor scans Read More

Share on:

.profile (Shell Script)

Last edited by . Total of no comments in the discussion.

.profile is a Unix shell script which is executed for a user every time that user logs in. A standard .profile will set important environment variables such as $PATH and may also run commands, such as `fortune`. The .profile file will be stored in the users home directory. .profile is used by the Bourne, Korn, and Bash shells. The C and TCSH shells use startup files called .login and .cshrc instead. In addition to .profile, the Korn shell also uses a startup file called .kshrc. Also, the /etc/profile shared startup Read More

Share on:

IMEI (International Mobile Equipment Identity)

Last edited by . Total of 24 comments in the discussion.

Each GSM and UMTS mobile phone has a unique IMEI (International Mobile Equipment Identity) number. An IMEI number facilitates an important function – it easily identifies a mobile phone being used on a GSM (Global System for Mobile Communications) network. The IMEI is a useful tool to stop a stolen phone from accessing a network being used. Mobile phone owners whose phones have been stolen can contact their mobile network provider and ask them to ban or shut off a phone using its IMEI number. With an IMEI number, the Read More

Share on:

Traversing and Searching a Linear Linked List

Last edited by . Total of no comments in the discussion.

Traversing a list A linear list can be traversed in two ways In order traversal Reverse order traversal In order Traversal To traverse the linear linked list, we walk the list using the pointers, and process each element until we reach the last element. .cf { font-family: Lucida Console; font-size: 9pt; color: black; background: white; } .cl { margin: 0px; } .cb1 { color: green; } .cb2 { color: blue; } .cb3 { color: maroon; }   void traverseinorder(node *head) { while(head!=NULL) { printf(“%dn”,head->info); head=head->next; } }   Reverse Order Read More

Share on:

Backing Up the Exchange Server 2003 Environment

Last edited by . Total of no comments in the discussion.

Understanding the Data Types to Back Up There are a number of reasons why Exchange data should be backed up: To provide protection in the event of a system crash. To be able to recover corrupt databases. To be able to recover the following: Mailboxes. Folders. Messages. To restore Exchange in a lab for testing. The different types of data that should be backed up can be classified as follows: Static data: Consists of data that hardly ever changes: Windows Server 2003 operating system software. Software updates and service packs. Read More

Share on: