Saturday 28 February 2015

what is buses and registers?

                   BUSES AND REGISTERS the simplified diagram of a microprocessor is shown in fig.5.3. the microprocessor is the portion enc... thumbnail 1 summary
                   BUSES AND REGISTERS
the simplified diagram of a microprocessor is shown in fig.5.3. the microprocessor is the portion enclosed by heavy black lines and it is shown connected to the memory unit. we will assume that he program and data is already in memory. there are buses external to the microprocessor and two buses within the microprocessor.the external  address and data buses are extension of the some buses inside the microprocessor, so their are really only three different buses, address, data and control. the numbers in bracket in fig.5.3 indicate how many signal lines make up each bus.
                                                                                   
the address bus is a 16-bit bus. it carries the 16-bit address code from the microprocessor to the memory unit to the select the memory location which the microprocessor is accessing for a read or write operation. the address bus is unidirectional bus because information flows in only one direction.

the data bus is an eight-line bidirectional bus over which 8-bit words can be set from the microprocessor to memory (write operation) or from the memory to the microprocessor (read operation). although, it is called data bus, they information carried on this will not always be data, if will often be instruction codes fetched by the microprocessor.

the control bus is a grouping of all the timing and control signals needed to synchronize the operation of the microprocessor with the other units of the microcomputer. some of the control lines or outputs from the microprocessor from I/O devices. most 8-bit microprocessor have an 8-bit data bus and 16-bit address bus.

Friday 27 February 2015

what is RAM and ROM ?

                                                            RAM the term RAM stand for random access memory, meaning that any memory word i... thumbnail 1 summary
                                                            RAM
the term RAM stand for random access memory, meaning that any memory word is easily accessible as any other. when the term RAM is used with semiconductor memories it is usually taken to mean READ/WRITE memory as opposed ROM.

RAMS are used in computer for the storage of active programs and data. the consent of RAM change continually as the computer executes a program. the requires first READ and WRITE operation for the RAM so as not to slow down the computer operation.

the major disadvantage of RAM is that it is volatile and will lose all stored information if power is turned off.

RAM plays Avery important role in the processing speed  of the computer. large RAM size provides large amount of information to a computer for processing and hence increases the processing speed.
                                                ROM
the term ROM stands for red only memory. the type of semiconductor memory is designed to hold information that is either permanent or will not change frequently. during normal operation, no new data can be written into a ROM, but data can be read from ROM. for some ROM's, the data can be entered during the manufacturing process; for the ROM's, the data can be entered electrically. the process of entering data is called programming the ROM. some ROM's connect have their data changed once they have been programmed; others can be erased and programmed as often as required by the manufacturing. ROM's are used to store programs that are frequently required and are not to change during the operation  of the computer. because all ROM's are volition, these programs are not lost when the computer is turned off. once of the main function of program stored in ROM is to make the computer ready for operation.


their are primarily three types of read-only memory. ROM refers to IC chips that are marked or programmed by the manufacturing.a PROM is a semiconductor chip that is obtained from the manufacturing in an unprogrammed state and the user programs it according to his desire. a PROM is programmed outside of the circuit where it is to be used and many commercially available machines, called PROM PROGRAMMER are used to program it.

what is printer?

                                                   PRINTERS printers are used to produce hard-copy of computer output, normally data or text... thumbnail 1 summary
                                                  PRINTERS
printers are used to produce hard-copy of computer output, normally data or text., but also in case of certain printers, graphics, that is, such as drawings or chart sprinters vary in capabilities so far as text enhancements such as underlining or emboldening are concerned and also in their ability to print graphics.

most printers are designed to receive data in parallel from the computer, i.e., 8 bits at time. these have to be connected to the parallel port on the computer.

computer printers differ in the following aspects:
.    there are character printers, which print one character at a time, line printers, which print a line at a time, and page printer, which print a page at a time.
.  a variety of printing technologies are possible, the main ones being dot matrix, daisy wheel, inkjet and laser.
.  some printers can only handle text whereas others can handles text and

graphic.
.  their are a variety of standards for control codes, which are commands, sent from the computer to the printer to turn on effects such as underlining and emboldening.

however most software packages are able to cope with these diffrences. they do so by means of printer drivers, special programs that adapt the output from the software to the printer. all you have to do is select your printer's name from the list that is presented to you when you first use the software.
the main types of printers are described below. the main difference between the printers depends on:
. the quality of output
.   the ability to printer graphics
.  the printing speed

Thursday 26 February 2015

what is computer units?

                              CONTROL UNIT a digital computer is a general purpose digital system. a general-purpose digital computer is cap... thumbnail 1 summary

                             CONTROL UNIT




a digital computer is a general purpose digital system. a general-purpose digital computer is capable of executing various operations and in addition, can be instructed as to what specific sequence of operations it must perform. the user of such a system can control the process by means of a program, that is, a set of instructions that specify the operation, operands and the sequence by which processing task may be altered simply by specifying a new program with different instruction or specifying the instructions with different data. a computer instruction is a binary code that specifies a sequence of micro-operations for the computer. instruction codes together with data are stored in memory. the control unit fetches an instruction from main memory by sending an address  and a READ command to the main memory. the instruction word comes from memory in the control unit. the construction which is in binary-code is then decoded by logic circuits in the control unit to determine which operation is to be performed. once this is determined, the control unit generates the signals needed to actually execute the operation.


thus, we can say that the control unit's function is to fetch, decode and execute the instruction that are in memory. the control unit contains logic and timing circuits that generate the signals needed to execute each instruction of a program one by one. the control unit performs these same steps till the last instruction of the program is executed. it directs and coordinates the operation of all the other parts of the computer by providing timing and control signals.

Saturday 21 February 2015

what is computer memories?

                                                    MEMORY one of the major advantages that digital system have over analog systems is the a... thumbnail 1 summary
                                                   MEMORY
one of the major advantages that digital system have over analog systems is the ability to esily store large quantities of digital information and data for short of long periods of time. this memory capability is what makes digital computer so versatile and adaptable to many situations. for example, in a digital computer the internal main memory stores instruction that tell the computer what to do under all possible circumstances so that the computer will do its job with a minimum amount of human intervention, magnetic type and magnetic disk are popular mass storage devices that are much less expensive in cost per bit that internal memory devices.
MEMORY TERMINOLOGY
MEMORY CELL
this is device or electrical circuit used to store a single bit (0 or 1).
MEMORY WORD
this is group of bits (cells) in a memory that represents information of data of some type. word size in modern computers typically ranges from 4 to 64 bits,depending on the size of the computer.
BYTE
this is special term used for a 8-bit word. in modern digital computers, the word size is usually a multiple of 8-bits such as 2 bytes or 4 bytes.
MEMORY CAPACITY
this is way of specifying how many bits can be stored in a particular memory device of computer memory system.to illustrate, suppose that we have a memory devices,which can store 4096 20-bits words. its represent a  total capacity of 81,920 bits. we could also express its memory's capacity as 4096 x 20. when expressed with way, the first number (4096) is the number of words and the secant number (20) is the number of bits par word (word size). computer memory is measured in terms


of bytes. the large units are kilobyte, megabyte and gigabyte.
RANDOM ACCESS MEMORY (RAM)
tis refers to memories in which the actual physical location of memory word has no effect on how long it takes to read or write into that location. in other words, the accsess time is the same for any address in  memory. most semiconductor memries and magnetic  disk memories are random access memories

what is computer windows desktop?

                 THE WINDOWS DESKTOP after your computer finishes loading windows into memory, your arrive at a screen know as the windows d... thumbnail 1 summary
                 THE WINDOWS DESKTOP
after your computer finishes loading windows into memory, your arrive at a screen know as the windows desktop. the desktop is the work space,the serf ace on which you spread out any file folder.programs and documents you want to us .technical, the desktop is the area behind all the object on the screen,including any windows that you open. no matter what you do in the windows environments, you can always gate back to the desktop even if you open an application program and expand  it to fill the whole screen. below the desktop you will most likely see a gray bar known as the task bar which will be discussed latter.
a typical windows 98 desktop is populated with the little labeled pictures known as icons.when you double-click an icon, you open it up the rectangular frame called a window. the icons that appear on your desktop when you start windows provide quick access to the places on your computer that you visit most often. desktop contain various types of icons.


            FOLDER ICONS
folder icons open into folder windows which reveal the contents of particulars folders in your computerized filing system.



              PROGRAM ICONS
program icons open into application programs, that is, they load the associated programs into memory and start them running.
                 DOCUMENT ICONS
document icons open the documents. when you double-click the document icon, windows starts the application (word processing program,spreadsheet,database or whatever)in which the document was created and then opens the document itself.
                     SHORTCUT ICONS
shortcut icons provide alternative entry-ways to program, documents and folders, shortcut icons always have arrows on them and their labels frequently contain the words"shortcut to"
                        SPECIAL ICONS
your desktop may also contain a few specialized icons, including the recycle bin, which is discussed latter in this chapter. the others are too specialized to be covered hare.

Friday 20 February 2015

what is e-mail and e-mail addresses versus urls?

                                  E-MAIL perhaps the first step that many people have tried when using the intenet is e-mail. in theory, e-m... thumbnail 1 summary

                                 E-MAIL
perhaps the first step that many people have tried when using the intenet is e-mail. in theory, e-mail is an instantaneous electronic  message from a sender to a recipient or multiple recipients. compared yo postal mail, e-mail is probably the most used application in the internet.with e-mail, the educator can let student est up "internet friends" with other children in nearby classroom, in other cities, in other countries or even in other continents. yhis promotes computer usage and allows students to improve their language skills such as their reading, writing, thinking and listing abilities.
through e-mail, students can send messages to literally thousand of businesses or to private individuals. childern can ask expert an a certain field such as politics or science, a list of questions to be answered. teachers can use the e-mail in the same way, by talking to colleagues thousand of mlies away, comparing lesson plans,etc
to use e-mail, the sender simply opens the e-mail program and types in an address, a subject, and the message in the body of the letter. once the letter is ready to be sent, the user simply clicks as send command and the letteris instantlytransmitted to its destination.
E-MAIL ADDRESSES VERSUS URLS
internet e-mail addressesare different from urls (uniform resource locators).e-mail adresses are used to identify user on the internet and urls are used for identify a web serves, that is , a computer that makes information available via the world wide web. the URLs is what you type into your web browser program to tell it to go to and display a particular page of information.

Thursday 19 February 2015

what is computer-integrated manufacturing?

COMPUTER-INTEGRATED MANUFACTURING since about 1960 there has been a growing Trent in manufacturing firms towards the use of computer to perf... thumbnail 1 summary

COMPUTER-INTEGRATED MANUFACTURING
since about 1960 there has been a growing Trent in manufacturing firms towards the use of computer to perform many of the functions related to design and production. the technology associated with this trend is called CAD/CAM. for computer-aided design and computer-aided manufacturing.today it is widely recognized that the scope of computer application must extend beyond design and production to include the business functions of the firm. the mane given to this more comprehensive use of computer is computer-integrated manufacturing (CAM).CAD/CAM is based on the capabilities of the computer system to process. store and display large amounts of data representing part and product specifications, for mechanic products. the data represent graphic models of the components.for example,for electrical products, they represent circuit information.CAD/CAM technology has been applied in many industries, including machine components, electronics products and equipment design and fabrication for chemical processing. CAD/CAM involves not only the automation of the manufacturing operation but also the automation of elements in the entire design and manufacturing proceed. computer-aided-design (CAD) makes use of computer system to assist in the creation. modification. analysis and optimization of design. the designer, working with the CAD system rather then the traditional drafting broad, creates the lines and surface that form the object and stores this model in the database.by invoking the appropriate CAD software, the designer can perform various analyses on the object, such as, heat transfer calculations. the final object design is developed as adjustments are mode on the basis of these analyses. once the design procedure has been completed, the computer aided design system can generate the detailed drawings required to make the object. computer-aided manufacturing (CAM) involves the use of computer system to assist in planning, control and management of of production operation. this is accomplished by either direct or indirect connections between the computer and production operation.

Saturday 14 February 2015

what is packet switched network?

            PACKED SWITCHED NETWORK in packet switched network, two communication subscribers can operate at different data rates, since th... thumbnail 1 summary
            PACKED SWITCHED NETWORK
in packet switched network, two communication subscribers can operate at different data rates, since the rate at which data is passed at two interfaces to the network is separately regulated by each subscriber's equipment. also, no physical connections are established through the network with a packet switched network. instead, all data to be transmitted is first assembled into one or message units,called packets.these packets include both the source and destination network addresses. they are passed by the source computer to its local packet switching exchange (ESP). on receipt of each packet, the exchange first stores the packet and then inspects the destination address it contain. each ESP contains a routing directory specifying the outgoing links' transmission paths to be used for each networks address. the ESP forwards the packed on the appropriate link at the maximum available bit rate. this mode often  referred to as packet store-and-forward.


a number of packets may arrive simultaneously at a ESP of different incoming links a each may require forwarding on the same outgoing links. if a number of particular long packets are waiting to be transmitted on the same link, other packets may experience unpredictable long delays.to prevent this and to ensure that the network has a reliably fast transit time, a maximum length is allowed for each packet.these packets are reassembled into a single message by the corresponding transport protocol at the destination.

X.25 protocol describes a method of encapsulating and handling packets with high reliability. several companies manage networks of special computerized switches spread across the nation and across the world that connect together with high-speed data communication lines and use X.25. these companies sell their network' data handling and transmission capabilities to subscribers under several pricing schemes. national telephone companies in many countries offer X.25 service, sometimes at lower rates then leased line or dial-up lines.

what is local area and wide area network?explain application sharing?

LOCAL AREA AND WIDE AREA NETWORK LOCAL AREA NETWORKS you can find several different types of computer networks in use today, depending prima... thumbnail 1 summary
LOCAL AREA AND WIDE AREA NETWORK
LOCAL AREA NETWORKS
you can find several different types of computer networks in use today, depending primarily on the size of the physical area they cover. the most common type of network is the local area network or LAN. it is a network that spans a limited physical area, usually ranging from a small office to a campus of buildings. a a
analytically


uses high-speed wired connections between the computer.
LAN's emerged in the early days of personal computers and were originally designed to share expensive printers and hard disks within an organization. since then, organization have started sharing other devices in clouding modems and scanners. LAN's are also used today for sharing applications, group scheduling, e-mail, project tracking and other tasks.
WIDE AREA NETWORKS
when a network covers a larger area, making it impractical to wire computers to gather with high-speed communication lines, it becomes a wide area network or WAN. a WAN spans a large physical area, connecting several sites of an organization a cross cities, countries and continents. because of the
APPLICATION SHARING
application sharing is nothing more then file sharing the files just happen to be the executable application files themselves. instead of installing and running an application on a local hard disk, you place the application once on a server. users then load and run the application over the network. kepi in mind that not all software vendor design their applications to run in this type of shared environment.

Friday 13 February 2015

what is anti-virus software nad virus hoax?

                ANTI-VIRUS SOFTWARE the first step to check for virus infection, is to use a reliable virus checker. however, no matter how ... thumbnail 1 summary
               ANTI-VIRUS SOFTWARE
the first step to check for virus infection, is to use a reliable virus checker. however, no matter how much they tell you how good they are, it is recommended to use at least two of them. the more famous ones are given below,
McAfee
Norton anti-virus
Demolition's anti-virus
Thunderbird
after you have installed them,run them to see if they find a virus on your computer. if the scanner tells you have a virus, it can clean it. you should make a backup copy up all the infected files before cleaning them. you can then let the anti-virus clean the originals only, not the backups. after you have cleaned them, try running the programs, to see if they work. if they appear to be working well, then all is fine and you can delete the backups. if however, they are not working, then you should  delete them and restore your backups. you should try other scanners to see if they can remove it. scanners can usually remove some viruses that others cannot. if you cannot find anything  that well remove it and you have an uninfected backup then you should re-install it. if you have not got any backups then you will have to wait a while for a new update for your anti-virus scanner so that they will be able to remove it. during this time, you should not run the infected program under any conditions. if the program i

s not important, you can always delete it. if you do not know that the file is used for do not delete it.
                VIRUS HOAX
virus hoax are false report about non-existent viruses, often claiming  to do impossible things. some reciprocally believe a hoax to be a true virus warning and hwy take drastic action such as shutting down their network.
typically, hoaxes are E-mail which describe a dangerous new undetectable virus. usually using downloading E-mails that have a particular subject line. for instance,the good time hoax claims to put your computer's CPU in "an nth-complexity infinite binary loop which can severely  damage the processor".the hoax warns you not to read or downloading anything with the subject "Good time" because ye message is a virus.it then urges you to forward the warning to as many people as possible.
sometimes hoaxes can cost you even more then a genuine virus incident. after all, no anti-virus will detect  hoaxes because they are not viruses.some companies panic when they receive a hoax virus warning  and assume the worst,making the situation much worse

Thursday 12 February 2015

what is viruses spread?and explain protect your computer viruses.

                   COMPUTER SPREAD you can get a virus only by downloading or receiving a file, which is infected that you run on your compu... thumbnail 1 summary
                   COMPUTER SPREAD


you can get a virus only by downloading or receiving a file, which is infected that you run on your computer. the different ways in which this can happen are munitioned below.
1)    if you gate an E-mail with a file attached to it(an executable program such as .exe or .com) that contains a virus and you download that file and run it, your computer will become infected.
2)     if you download a file from the internet that contains a virus and you run it, your computer will become infected.
3)viruses are also transmitted by computer networks and by infected disk ed. do not use someone else's floppy without first checking it for virus.
4)      if you boot a computer with a infected floppy(boot virus), your computer will be infected.
PROTECT YOUR COMPUTER VIRUSES
                             take the following precautionary steps:
1)        never download and/or run an attached  file on an E-mail from a stranger or from  an unknown address. be very cautious when downloading/running one from a friend. most likely if they pass you a virus, they may not know about it.
2)       never have your e-mail program set to automatically run attached files.this is especially true for browsers or e-mail programs which automatically execute Microsoft word after opening an e-mail. turn off the option to execute any programs after receiving e-mail.
3)        never run an executable file you have just received with first running it through an update anti-virus utility.
4)        make user you have got a good anti-virus program that is update often from the company.
5)         keep your e-mail software updated. software companies are always finding problems with their software and if they are good about it, will post patches to update your e-mail software.continually check your software company's web site for updates to your e-mail software.
6) take care in using floppy disks!the more computers a floppy has been used on, the better the chance of a virus infecting it. always run floppies through an anti-virus program before using it and be extremely cautious when booting your computer from a floppy disk.

Wednesday 11 February 2015

what is computer output and input units?

                                   COMPUTER UNITS INPUT UNIT                     the input unit is use to communicate with the computer. it ... thumbnail 1 summary
                                  COMPUTER UNITS
INPUT UNIT
                    the input unit is use to communicate with the computer. it consists of devices that accept data and information from the outside world in human readable from and convert it into machine readable from before providing it to the main  memory. these devices are often referred to as

peripheral because they are physically separated from the electronics that make up the "brain"of the computer. same typical input peripherals are punched-card reader's , keyboard, teleprinter(also called teletypewriter),mouse,joystick and stylus (a type of pen by witch one can writer on the screen of the computer).most personal computers come equipped with a keyboard and a mouse as input devices,other input peripherals have to be purchased at extra cost.
it is not unusual to consider magnetic tape and disk units to be both input and memory devices.one of their major functions is to store data and programs that will be fed to the computer's main memory upon commands from the control unit.
OUTPUT UNIT
                         the output units consists of peripheral devices that transfer information from the main memory to the onsite world.computer perform ll the operations in binary code and the results produced are also in binary form.the output units receives the results  produced are also in binary form and converts in Ito human readable form before communicating it to the user.typical output peripherals include video display unit, printers, plotters,teleprinters and fax machine. note that teleprinters and modems can serve as both an input and an output devices.
magnetic tape and disk memory units can also be considered output peripherals s data and programs are often recorded to one of these external storage memory devices for long-term storage.



Tuesday 10 February 2015

what is computer and electronic banking?

COMPUTER BANKING the banking business has been revolutionized by computer technology. deposits and withdrawals are instantly logged into a c... thumbnail 1 summary
COMPUTER BANKING
the banking business has been revolutionized by computer technology. deposits and withdrawals are instantly logged into a computer's account.computer-generated monthly to contain any error unless they arise during manual entry of check amounts. the technology of minicomputer networking , allows the amount of a grocery bill to be immediately deducted from the customer's bank account and transfer to the grocery store. similarly, networking allows individual to obtain cash instantly and almost worldwide by simply stepping up to an automated teller machine (ATM) and providing the proper card and personal identification number(PIN). the disadvantage of this technology is the security problems. intruders can see packets travelling on a network and can perhaps interprets them if not carefully encrypted to obtain confidential information of financial transactions. network accession personal accounts has the potential to let intruders not only see how much money an individual has but also to transfer some of it elsewhere.
     ELECTRONIC BANKING
electronic banking has many advantages such as deposits and deposits and withdrawals are instantly logged into a customer's account.ATM's are used world wide to obtain cash instantly. modern computer networks allow our bills at retail stores to be immediately deducted from our bank accounts and transfer to this webpage.

Saturday 7 February 2015

what is E-commerce?

                             E-COMMERCE   e-commerce can be defined as maintaining business relationships and selling information, services... thumbnail 1 summary
                             E-COMMERCE

 
e-commerce can be defined as maintaining business relationships and selling information, services and commodities by means of computer telecommunication  networks. although in the vernacular e-commerce usually refers only to the trading of goods and services over the internet, broader economic activity is included. e-commerce consists of business-to-consumer and business-to-business commerce as well as internal organizational and transactions that support for these activities. e-commerce originated in a standard for the exchange of business documents, such as orders or invoices, between suppliers and their business customers. with the introduction of the graphical browser software, such as Netscape and MS internet explorer, accessing the world wide web in 1993, most e-commerce shifted to the internet. in some fields new internet relaters such as the bookseller amazon.com grew up, seemingly overnight to challenge the dominance of traditional relaters. the inlet corporation had sold almost half its $30 billion in a annual computer chips sales directly through its web site by 1999 and planned to move all its sales to the web by the end of 2000. among other innovations that have contributed to the growth of e-commerce are electronic directories and search engines for finding information on the web. these services facilitate the sale of goods, the provision of services such as banking, ticket reservations and stock market transactions and even the delivery of remote education and entertainment. several important phenomena  are associated with e-commerce. the role of geographic distance in forming business relationships is reduced. barriers to entry  into the retail business are lower, as it is relatively inexpensive to start a retail web site. some traditional business intermediaries are being replaced by their electronic equivalents. for example,in developed countries, as airlines have published fare information and enabled ticketing directly over the internet, travel agencies have declined.

Thursday 5 February 2015

what is computer simulation?

             COMPUTER SIMULATION computer simulation is the use of a computer to represent to dynamic responses of one system by the behavio... thumbnail 1 summary
             COMPUTER SIMULATION
computer simulation is the use of a computer to represent to dynamic responses of one system by the behavior of another system modeled after it. a simulation uses a mathematical description or model of a real system in the form of a computer program. this model is composed of equation that duplicate the functional relationship within the real system. when the program is run. the resulting mathematical model forms a similar behavior of the r

earl system with the result presented in the form of data. a simulation can also take the form of a computer-graphics image that represents of dynamic processes in a animated sequence. computer simulations are use to study the dynamic behavior of objects or system is response to condition that cannot be easily or safely applied in real life. for example, a mathematical model that incorporates such variables as that, velocity and radioactive emissions can describe a nuclear blast. additional mathematical formulas can then be used to adjust the model to changes in certain variables, such as the amount of fissionable material that produced  that blast. simulations are especially useful in enabling observers to measure and predict how the functioning of an entire system may be affected by altering individual components within that system. simulation  performed by personal computers consist mainly of business models and geometric models. business models inculcate spreadsheet, financial and statistical software programs that are used in business analysis and planing. geometric models are used for applications that require simple mathematical modeling of objects, such as buildings, industrial parts and the molecular structures of chemicals. more advanced simulations, such as those that emulate weather patterns or the behaviors of macroeconomic system are usually performed on powerful workstations or on mainframes. in engineering, computer models of newly designed structures undergo simulated test to determine their responses to stress and other physical variables. simulations of river system can be manipulated to determine the potential effects of dams and irrigation networks before any actual construction has taken place.

Wednesday 4 February 2015

what is computer graphics?

         COMPUTER GRAPHICS computer graphics refers to images or animated motion pictures displayed on a video display unit or printed on a ... thumbnail 1 summary
         COMPUTER GRAPHICS
computer graphics refers to images or animated motion pictures displayed on a video display unit or printed on a printer.A computer-graphics system basically consists of a computer to store and manipulates images, various input and output devices and a graphics software packages enable a computer to process graphic images. these packages enable a computer to draw, color, shade and manipulate the images held in its memory.a picture can be drawn on the screen with the use of a mouse, a pressure-sensitive tablet or a light pen. preexisting images on paper can be scanned into the computer through the use of scanners or digital cameras. frame

s of image on videotape also can be entered into a computer. digital data can be sent from the computer's memory to film recorder, which can print it on photographic film. computers can also print hard copy in mulch-color by means of plotters, inkjet or laser printers. computer graphics have found widespread use in printing, product dosing and manufacturing, scientific research and entertainment. in the business office, computer routinely  create graphs and tables to illustrate text information. computer system have replaced drafting boards in the design of a vast array of products ranging from buildings to automotive bodies and aircraft hulls to electrical and electronic devices. computers are also often system in animated motion-picture sequence.this pictorial visualization can afford a clearer understanding of the multiple forces or variables at work in such phenomena as nuclear and chemical reactions. computer graphics is very popular in entertainment industry, which uses them to create the interactive animation of video games and the special effects in motion pictures.

Tuesday 3 February 2015

what is microphone?explain.

                                THE MICROPHONE   it is quite easy to convert the spoken word to a digital signal  for computer input.the mic... thumbnail 1 summary
                                THE MICROPHONE
 
it is quite easy to convert the spoken word to a digital signal  for computer input.the microphone converts audio signals to electrical waves and these can be converted by electronic circuitry in the computer to digital from.what is difficult is the recognition by the computer, of the signal, so that it can handle it in the same way as if it had been typed.highly sophisticated speech-recognition software is required to be able to match the sound uttered by the user with a vocabulary of sound signals stored in the computer and a display the words on the screen as thought they had been entered at the keyboard.
the development of workable speech-recognition systems for the English language has been major goal of many researchers for the number of years. recently, commercial system have started to emerge. one major problem is the many inconsistencies between the written and spoken words in English. Japanese, in contrast, is phonetically very precise and so speech-recognition system for those languages were relatively easy to develop and have been used for some time.
a second problem is the fact that there can be wide variations between the speech patterns of one individual and another. to cope with this, the system has to be 'trained' to recognize the user's particular speech. most systems require him or her to read a passage containing all the words stored in the computer's vocabulary on disk, so that it is able to match what is spoken with what is stored. in this way it constructs speech 'templates'for the user, which is stored for use in all subsequent dictation sessions.
schuss-recognition system in the past have suffered from either having too limited a vocabulary to be a much what was spoken with that was stored in the computer. recent increases in computer power have greatly seeded things up and voice system on personal computers have now appeared.