Showing posts with label Computers. Show all posts
Showing posts with label Computers. Show all posts


As you know that Linux is the best operating system of hackers. As you know that this operating system consists inbuilt hacking tools. It is also the favourite operating system of Professional hackers because of its inbuilt Hacking tools. So after installing the Linux Kali you will not have to download the hacking tools.

Kali launch its new LINUX OS, Kali Linux 2017.3, on 21st November. They reveal that new launch of Kali in their official website. They added new features in Kali 2017.3 version. They fixes many bugs and security issues. In this new update of Kali Linux, kernel has to been updated to 4.13.10.

Since the last update on September, Kali adds new additional features in their new version of Linux. There are five new features in Kali Linux.


InSpy


This feature helps you in enumeration on LinkedIn. It is very small but impressive feature in new Kali. It helps you to find people on the basis of their job title, company or email.

InSpy is a LinkedIn Enumeration which is based on Python. It has two functionalities:

  • TechSpy
  • EmpSpy

They both together complete the enumeration task in LinkedIn.


CherryTree


It is simply a note taking feature, which gives you the features like rich text with highlighting syntax. This CherryTree feature provides you to store the data in only single XML file. This feature is very familiar to all of you, if you ever used "Big-Name" note organization applications.


Sublist3r


Sublist3r will be the great application for you or may be the best application in Kali if you enumerates sub-domain. This application give you the facility to enumerate many sub-domains of multiple sources at once. It is Python-Based application.


OSRFramework


OSRFramework is used to perform IP Open source intelligence task. It is simply a set of libraries, you will used to perform that open source intelligence task. OSRFramework is a collection of scripts that can enumerate users, domains etc.


Massive Maltego Metamorphosis


Maltego is one of the favorite application in Kali Linux. Maltego is impressive open-source information gathering tool.


Requirements


On an average, every Kali Linux OS requires 20 Gigabytes of free Hard Drive Disk for installing. And your RAM of must be 1 Gigabyte with the i3 core processor and AMD64 architectures. Also, a bootable CD-ROM or USB stick.

At last, Kali Linux is best for professional penetration testing and security auditing.


Thanks for reading... 


Bitcoin is the world’s first digital currency and used as a worldwide payment system. It is cryptocurrency. Bitcoin is peer-to-peer digital currency and this transaction take place between users directly through cryptography. It was released as open-source software in 2009 by ‘Satoshi Nakamoto’. Some rumors also said that the Bitcoin was made by an unknown person and ‘Satoshi Nakamodo’ is just a group of people. The transaction works without an intermediary. Every transactions made by Bitcoin are verified by the network nodes. It is recorded in a public distributed ledger, which is known as a Blockchain. Bitcoin is completely an electronic form of money and not a physical coin; and nowadays it is using worldwide for transaction as we discuss.


Are Bitcoins Secured?


As it is an electronic currency so there is a problem of illegally copying of this currency. So preventing this, it uses network nodes in which it verifies every transactions of Bitcoin and recorded in public distributed ledger, Blockchain. For example, if I sent five Bitcoins to my friend from my Bitcoin address to my friend’s Bitcoin address. This transaction will be note and verified in a Blockchain and after the transaction, I haven’t any right on that five Bitcoins which transferred from my wallet to my friend’s wallet. So yes, we can say that Bitcoins are totally secured. But as we know technology is changing faster so we cannot give you assurance that Bitcoin are safe and always be safe.


Bitcoin Mining



Bitcoins are actually created as a reward for a process known as Mining. It can be exchanged for other countries, services, products etc. Over 100,000 merchants and vendors, in February 2015, accepted Bitcoin as a payment. And as we know that Bitcoin can also be held as an investment. Mining is a record-keeping service which is done by the use of computer processing power.


Transactions and Transaction-Fees


The transferring of Bitcoins from person to another is known as transactions. When a user sends Bitcoin by their wallet to someone else’s wallet, it uses the Bitcoin Address. Bitcoin address is a unique address of every user. 

Transaction consist one or more inputs and also one or more outputs. Since, transactions can have multiple outputs, users can send Bitcoins to multiple recipient in one transaction. If any input satoshis not accounted for in the transaction outputs become the transaction fees.

Transaction fees are optional. Transaction fees are based on the storage size of the transaction generated.


How to Get a Bitcoin Address?


In order to send or receive Bitcoins you will need to have your unique Bitcoin Address. If you want your unique Bitcoin address, you either download the bitcoin client or by getting an online wallet. There are two most popular Bitcoin Clients are:
  • Bitcoin-qt
  • Multibuilt

The main difference between these two clients is just the size of their blockchain that you need to be downloads. You need at least 10 Gigabyte (or 10 GB) of free hard disk in your system, to download the Bitcoin.



Where will your Bitcoin Stored?


When you downloaded the Bitcoin from one of the above client, after installing you will see the file called wallet.dat. The Bitcoins will also be stored in online wallet. There are some of the popular, specialized and safe websites in which you can store your Bitcoins securely.

If you want to store small amount of Bitcoins then online wallet is the best option for you. By using the online wallet you can easily use your Bitcoins for purchase. Bitcoin exchange is considered much safer place than online wallet.


Why You Have to Trade Bitcoins?


Bitcoin available 24/7


As you know that the stock markets closed in limited time but if you use Bitcoin so you will trade anytime. Unlike stock markets, Bitcoin have no official exchanges. There are thousands of exchanges in Bitcoin. There is no official Bitcoin price because there is no Bitcoin exchange.

Bitcoin is World wide


Bitcoin is not a physical currency but it is an electronic currency. It is currently increasing. The popularity of Bitcoin is extremely high. By using Bitcoins, you can trade anywhere in the world. No country actually declared that Bitcoin is Illegal. So until countries are not declaring this currency illegal, so you can use it anywhere.


How to Trade Bitcoin?


There are many websites for trading Bitcoins but we will not taking one website to explain. We simply explain you without any specific site. If you want to choose a website then simply search it and be sure to check it totally before signing up.

Open an Account


This step takes only few minutes. When you decide the exchange which you want to use for your Bitcoin, just sign up and make an account. You will need an IG trading account because you cannot buy or sell Bitcoin, you will not need an exchange account. You will need to confirm your account by email. Once you logged in and verified your details you will access your account.

Research


Before buying or trading the Bitcoins: firstly do research. Check the price of Bitcoins and news related to Bitcoins so you will get to know about the universe of Bitcoins. Don’t our, read others blog also related to this topic. May be you get something more. The point we want to tell you is to research as much as you can. Because it is new universe, so any feature can affect its price. You can observe the charts or many facts related to Bitcoins.




Strategy


After observing the all facts and figures related to new Bitcoin, you can make a strategy for trading. The only person who can make your strategy powerful is – You. You are the one who can understand your thinking better than anyone. Plan your strategy on your plans with keeping the facts and figures in your minds.

Risk Management


Before trading with Bitcoins, make a backup plan. It is a game of Profit and loss and there is no guarantee that you always win so always keep in mind that you can also lose and if you lose how you could deal with it. Never invest more than required on specific investment.


Benefits of Bitcoins


There are some benefits of Bitcoins:

Safe


Bitcoin is actually considered a safe currency because no one can steal it from you. Some website like PayPal allow you to t claim your money back but it takes long time.

Simple


Bitcoin is very simple currency. You can use it electronically and worldwide.

Easy to Carry


You can carry your electric currency easily either in wallet or online. And you can use it anywhere and anytime for purchase.


Risks of Bitcoins


As in every investment there are some risks in Bitcoin:

Easy to Lose


You can easily lose your Bitcoin. Unlike Credit card, it you CD is stolen then there is a chance that you will not lose you money but if your Bitcoin wallet gets hacked then you cannot get it back.

Trading is Actually Hard


Bitcoin trading is getting harder and harder at every moment and people seem it difficult to trade in this fast changing investment world.

Newness


Bitcoin trading is new and most of the countries are still not sure that Bitcoin is safe or not, so this may be the biggest risk in Bitcoins.

Lack of Stuff


Yes, you cannot buy everything by Bitcoin because there are not much shops which accept BItcoin for payments.

 

Risk and Benefit Both


There is one feature which act as a benefit in Bitcoin trading and also a risk. It is:

Untraceable


  • (Benefit) You don’t need to afraid that some organization or someone is tracing your Bitcoins because it is untraceable. This is the best point for governments, so they will never be traced by anyone.
  • (Risk) If Bitcoin is start using in the selling and buying of Drugs then it will become very tough for the government to track those authorities who are smuggling because Bitcoins are untraceable.


Last


After all, I think you understand everything about Bitcoin Trading. So if you like this article, then share it to your friends and comment below if you have any question related to this topic…


Thanks for reading…




Visualizable questions in science and medication stretch out over a tremendous scope of scale, from singular particles and cells through the assortments of tissue and interstitial interfaces to finish organs, organ frameworks, and body parts.

The act of pharmaceutical and investigation of science have dependably depended on perceptions to contemplate the relationship of anatomic structure to biologic capacity and to identify and treat sickness and injury that aggravate or undermine typical life forms. Generally, these representations have been either immediate, through surgery or biopsy, or aberrant, requiring broad mental remaking. The potential for progressive development in the act of drug and in biologic examinations lies in coordinate, completely immersive, constant multi tangible combination of genuine and virtual data information streams into on the web, ongoing perceptions accessible amid real clinical methodology or organic analyses. In the field of logical representation, the expression "four dimensional perception" as a rule alludes to the way toward rendering a three dimensional field of scalar esteems.

"4D" is shorthand for "four-dimensional"- the fourth measurement being time. 4D perception takes three-dimensional pictures and adds the component of time to the procedure. The progressive abilities of new three-dimensional (3-D) and four-dimensional (4-D) restorative imaging modalities alongside PC reproduction and rendering of multidimensional medicinal and histologic volume picture information, hinder the requirement for physical analyzation or conceptual gathering of life systems and give capable new chances to therapeutic finding and treatment, and in addition for organic investigations.In complexity to 3D imaging demonstrative procedures, 4D enables specialist to envision inside life structures moving continuously. So doctors and sonographers can identify or preclude any number of issues, from vascular inconsistencies and hereditary disorders. Time will uncover the significance of 4d perception

4D-The Modern Dimensions


"4D" is shorthand for "four-dimensional"- the fourth measurement being time. 4D representation takes three-dimensional pictures and adds the component of time to the procedure.

As opposed to 3D imaging symptomatic procedures, 4D enables specialist to envision inside life systems moving progressively. For instance: Movement examples of embryos enables conclusions to be drawn about their advancement; increment of precision in ultrasound guided biopsies on account of the representation of needle developments continuously in every one of the 3 planes. So doctors and sonographers can identify or preclude any number of issues, from vascular oddities and hereditary disorders

3D Gives Life to 4D


Bolted inside 3-D biomedical pictures is critical data about the items and their properties from which the pictures are inferred. Endeavors to open this data to uncover answers to the riddles of shape and capacity are framed in the area of picture preparing and perception. An assortment of both standard and advanced techniques have been created to process (alter) pictures to specifically upgrade the perceivability and quantifiability of wanted question highlights and properties. For instance, both authenticity protecting and observation adjusting ways to deal with picture show have fundamentally propelled the down to earth handiness of 4-D biomedical imaging.

Numerous hazardous maladies or potentially personal satisfaction tribulations still require physical intercessions into the body to decrease or expel sickness or to reduce destructive or agonizing conditions. In any case, insignificantly intrusive or noninvasive mediations are presently inside achieve that adequately increment doctor execution in capturing or curing illness; lessen chance, agony, difficulties, and reoccurrence for the patient; and diminishing human services costs. What is yet required is engaged lessening of later and proceeding with propels in representation innovation to the level of training, so they can give new apparatuses and systems that doctors ''must have'' to treat their patients and enable researchers in biomedical investigations of structure-to work connections.


Shaping a picture is mapping some property of a protest onto picture space. This space is utilized to imagine the question and its properties and might be utilized to portray quantitatively its structure or capacity. Imaging science might be characterized as the investigation of these mappings and the advancement of approaches to better comprehend them, to enhance them, and to utilize them gainfully. The test of imaging science is to give propelled capacities to procurement, handling, representation, and quantitative examination of biomedical pictures to increment considerably the loyal extraction of valuable data that they contain.

Idea Of 4D Visualization


In the field of logical representation, the expression "four dimensional perception" for the most part alludes to the way toward rendering a three dimensional field of scalar esteems. While this worldview applies to a wide range of informational collections, there are likewise utilizes for imagining information that compare to genuine four-dimensional structures. Four dimensional structures have ordinarily been envisioned by means of wire outline techniques, however this procedure alone is normally lacking for a natural comprehension. The perception of four dimensional items is conceivable through wire outline techniques with broadened representation signs, and through beam following strategies. Both the strategies utilize genuine four-space seeing parameters and geometry.

The beam following methodology effortlessly settles the concealed surface and shadowing issues of 4D questions, and yields a picture as a three-dimensional field of RGB esteems, which can be rendered with an assortment of existing techniques. The 4D beam tracer likewise bolsters genuine four-dimensional lighting, reflections and refractions. The show of four-dimensional information is generally expert by allocating three measurements to area in three-space, and the rest of the measurement to some scalar property at every three-dimensional area. This task is very able for an assortment of four-dimensional information, for example, tissue thickness in an area of a human body, weight esteems in a volume of air, or temperature dispersion all through a mechanical question


4D Image Warping


For heartily measuring worldly morphological cerebrum changes, a 4D picture distorting component can be utilized. Longitudinal steadiness is accomplished by considering all fleeting MR pictures of an individual all the while in picture distorting, instead of by separately twisting a 3D layout to an individual, or by distorting the pictures of one time-point to those of some other time-point. Also, picture includes that are reliably perceived in unequaled focuses direct the twisting system, though spurious highlights that show up conflictingly at various time-focuses are dispensed with. This misshapening methodology altogether enhances power in identifying anatomical correspondences, subsequently delivering smooth and exact estimations of longitudinal changes. The trial comes about demonstrate the huge change of 4D distorting strategy over past 3D twisting technique in measuring unpretentious longitudinal changes of cerebrum structures.
Strategy:

4D-Hammer


It includes the accompanying two stages:

Rigid arrangement of 3D pictures of a given subject gained at various time focuses, with a specific end goal to create a 4D picture. 3D-HAMMER is utilized to build up the correspondences between neighboring 3D pictures, and after that adjust one picture (time t) to its past time picture (t-1) by an inflexible change computed from the built up
correspondences.

Hierarchical misshapening of the 4D map book to the 4D subject pictures, through a various leveled quality based coordinating technique. At first, the misshapening of the map book is affected basically by voxels with particular characteristic vectors, in this way limiting the odds of poor matches and furthermore diminishing computational weight. As the disfigurement continues, voxels with less unmistakable characteristic vectors step by step pick up impact over the twisting.

Conclusion


Propelled therapeutic imaging innovation permits the procurement of high settled 3D pictures after some time i.e.4D pictures of the thumping heart. 4D representation and PC bolstered exact estimation of therapeutic markers (ventricle volume, discharge portion, divider movement and so forth.) have the high potential to significantly streamline comprehension of the morphology and elements of heart cavities, at the same time lessen the likelihood of a false determination. 4D representation goes for giving all data helpfully in single, stereo, or intuitively turning enlivened perspectives.

Thanks for Reading...


Hello friends, today we are going to talk about Operating system. What actually Operating System is? As you know we always keep it simple for you to understand easily, so it is very easy to understand about operating system.

An Operating System, referred to as an OS, is actually a set of programs that manage all the functions of computer. It works as a brain of computer. As our body needs brain to do various functions just like that operating system or OS work as a brain of the computer which tells the computer how to work and how to interact. Like, without brain our body isn’t capable of doing anything so without operating system we are not able to do anything on computer. It manages the hardware and software.

We can also describe an OS as a principal of the school. A principal of a school has various responsibilities like supervising students, teachers etc. If there is no principal in school everything become unorganized, similarly, an OS organized everything in a computer system.

Operating System is also known as system software. Computer requires specific instruction and these instructions are converted into a machine language so the computer can understand the requirements of the users. Operating system helps us (user) to interact with software and hardware to perform the specific function.

In computer system, we have a bunch of hardware like monitor, keyboard, CPU etc. and Operating System organizes files and let hardware know what it should do. Operating System acts as a coordinator between the Hardware and Software of a computer system. Operating System also performs some basic tasks like controlling inputs and outputs. Nowadays, operating system gives us a graphical user interface, popularly known as GUI, for higher functions. We can also say that the OS forms a platform for other system and application software.

In early days of computer, there was only one OS but time to time, when the computer progressed, the Operating System turned into Microsoft Disc Operating System, known as MS-DOS. But, also MS-DOS was not capable of doing many tasks without the software.


What is the need of an Operating System?


I hope you are already understands about the need of an Operating System in computer system in above discussion. Now, we will provide you some more knowledge about the need of an OS in just three points:
  • What to do?
  • When to do?
  • How to do?

To explain these points let’s take an example of gaming. I hope you all play games on computers, Sony PlayStation, X-Box etc. While playing the games you used game board, joysticks, remotes, monitors or disk holder – hardware. And the sound and animation effects – software.

What to do?


To perform a set of moves in the game for the game characters.

When to do?


All the things or moves in a specific character done when we pressed the required buttons in a correct sequence.

How to do?


Through proper communication with application software, and instructing it about the correct motion of the players which we see in our screen.


Why it is a System Software?


This is also a very common that why OS is system software not application. So let’s see… if you want to run any application software you required an Operating System, without OS any application software cannot run on computer. Operating System does some important tasks for you to give a best result like, taking an input from keyboard, processing the instruction and giving the output from the computer screen.

Application program is run on OS but an application program must be written in that way so it can run on any specific operating system.


 I hope you understand everything about Operating System. Still, if you have any doubts related to anything you can feel free to comment below and please share to your friends...

Thanks for reading...


Hello friends, today we are going to talk about 32-Bit and 64-Bit Processor.


Difference Between 32-Bit and 64-Bit


32-Bit processor was the primary processor, Windows 95, 98 and XP was running on 32-Bit processor. But after the creation of 64-Bit processor by IBM in 1991, technology took a noticeable turn. But 64-Bit processor came in use for common people when Microsoft launched its operating system Windows 7 and 8 with 64-Bit processor.

After that the confusion arise, what is the difference between 32-Bit Processor and 64-Bit processor. The biggest difference between 32-Bit Processor and 64-Bit processor is the number of calculation done by CPU simultaneously. It also affect the speed of the computer system.



The next big difference between 32-Bit Processor and 64-Bit processor is: RAM support. 32-Bit Processor CPU only support less than 4 GB RAM whereas 64-Bit processor can support more than 4 GB RAM.

The varies in the support of RAM also give the advantage to 64-Bit Processor in gaming. Most of the best games which have excellent graphics required more RAM which only possible in 64-Bits.

This feature is also useful for engineers, web designers etc. They use high level softwares which mostly support 64-Bit processor.



Another advantage for 64-Bit users is they can install an operating system with both 32-Bit Processor and 64-Bit processor but 32-Bit users can only installed operating system with 32-Bit processor.

In the end, 64-Bit processor quickly taking the place in every home, because of its extra advantages. Now after this, decision is yours because you are the one who have to use the computer. Please choose the right processor as per your requirements.


Thanks for Reading...
                     
                       NEXT DEVELOPER

Hello friend, today we are introducing 'Next Developer' this site will help you in making your business, school, portfolio etc. websites.

We will make a decent websites for you, so please give a chance and then see our talent.

Our price are much cheaper than others, please give a one chance to prove the we are 'Next Developer!'

So we would like to inform you that, we are going to launch the 'Next Developer' on 21 june 2017.

The price of your dream website will be starting from Rs 1499. More information will come soon... 

Thank you so much for your attention and we hope, in future you like our services.

Once again Thank you So Much.



Hello Friends today i tell you How to make money online, there are various types of ways to make money online.

These are following ways to make money online.


1. Captcha Solver


If you have a more time then you make money from Captcha solver. This is the easiest way to make money online.

If you a captcha solver, you need to read the image of Captcha and write the code this is the better way to earn money.

There are following Captcha solving Sites:

2. Advertising




This method is very popular method to earn money but is not easy, and you need a Website or YouTube Channel to show your ads on you website or you tube channel. There are following Ad Network: Google Adsense Media.net  PopAds Etc.

3. Affiliate Marketing





If you want to earn money so that's best way to earn more income from affiliate marketing.

There are thousands of sites to earn money by Affiliate Marketing:  FlipkartAmazoneBay Etc. 

But you need to sign up and promote their products.

In affiliate marketing you are help to customer to buy a products from your Websites, and companies give you a 2
% to 15% as a Commission.

4. YouTube Channel




You Tube Channel is best and best way to earn money online from videos but you need a You Tube Channel to montieze your videos from Google Adsense and they create a huge amount of earnings.


Thanks for reading...
                                                                                😃















Man accidently stops cyber attack that hit 99 countries


A cyber security researcher unintentionally found a way to temporarily stop the massive ransomware
attack  that targeted 99 countries including india on Friday.
The researcher chanced upon a domain name in the code of the ‘ Wannacry’ ransomware.
Registering the domain name triggered the switch which had been hardcoded into the malware tostop it from spreading in case of emergencies.

How should one respond to ransomware attacks?

Ransomware is malicious program that looks files on a user’s computers or smartphones till the meet attackers ‘  ransom demands. Researchers encourage users hit by ransomware to call enforcement 
and not pay the money demanded, as it doesn’t guarantee the computer will be unlocked.
Preventive measures include using anti-virus, backing up files, and updating a device’s software 
regularly.

‘ Wannacry’ malware has hit 2 lakh victims, 150 countries

Friday ‘ s large – scale cyber attack dubbed as ‘wannacry’ hit 2 lakh victims in at least 150 countries
and number is feared to increase when people will return to work on Monday, European Union’s as
the ransomware was used in combination with “a worm functionality”  so the infection spread automatically, Europol added.

What is the impact of ransomware attacks in India

With increasing digitization in India, the country faces a greater risk of being affected by malicious
software such as ransomware which locks computer files till hacker’ demands are met. Such attacks
can harm services like online Aadhaar database. Andhra Pradesh police stations confirmed being hit by Friday’s WannaCry ransomware, but its impact was minimal as documents are also recorded offiline.

                                                     😊
           


CORBA, the Common Object Request Broker Architecture defined by the Object Management Group (OMG), specifies how software objects distributed over a network can work together without regard to client and server operating systems and programming languages.

CORBA is a complete distributed object platform. It extends applications across networks, languages, component boundaries, and operating systems. A CORBA Object Request Broker (ORB) connects a client application with the objects it wishes to use.

The client application does not need to know whether the object resides on the same computer or on a remote computer elsewhere on the network. The client application needs to know only two pieces of information: the object's name and how to use the object's interface. The ORB takes care of the details of locating the object, routing the request, and returning the result.

CORBA grew at the same time as three influential trends, which lent credence to the CORBA vision. First, the software development community realized the importance of object-oriented programming techniques, even though they’d been around for the better part of two decades. Second, industry leaders - including IBM, Microsoft, and Apple - were advocating new application models based on small, task-specific components instead of large, general-purpose monoliths. The components would be easy to write and update, since they were small.

Developers could more conveniently, and cheaply, upgrade only those parts of their software that were out of date, and users wouldn't have to purchase entirely new versions of the entire package. And the small components could be distributed over a network more easily than their gargantuan ancestors. The more enlightened of these component architectures promised a cross-platform future, where all components could work together entirely independent of the underlying operating system.


Introduction of CORBA Technology


The Common Object Request Broker Architecture (CORBA) is an emerging open distributed object computing infrastructure being standardized by the Object Management Group (OMG). CORBA automates many common network programming tasks such as object registration, location, and activation; request demultiplexing; framing and error-handling; parameter marshalling and demarshalling; and operation dispatching.


How CORBA Works?


A CORBA Object Request Broker (ORB) is the middleware that establishes the client-server relationship between objects. Using an ORB, a client object can invoke a method on a server object that can be on the same machine or across a network. The ORB intercepts the call and finds an object that can implement the request, pass it the parameters, invoke its method, and return the results. CORBA, like SQL, provides both static and dynamic interfaces to its services. The client does not have to know the object's location, its programming language, its operating system, or any other system aspects that are not part of an object's interface.

The objects are small software components that provide some kind of a service, such as access to a database, account management, or inventory tracking. Fundamental to the architecture are the ORBs. For any client or server to be a part of the CORBA scheme, it must include an ORB to help it find and communicate with other CORBA objects. Once outfitted with an ORB, a client or server can use the services of any CORBA object on any server or host on the network.

An object can be both a client and a server: when it provides services to another object, it's a server; when it requests services from another object, it's a client. The CORBA architecture provides a set of services that help objects interact with each other.


Interface Definition Language


CORBA  defines a special language - IDL -which provides a language-neutral way of describing a specification for a CORBA object and the service(s) it provides. IDL lets components written in different languages communicate with each other using IIOP and the rest of the CORBA architecture.

Currently, it’s easiest to provide an IDL specification for objects written in C, C++, and Java, because the OMG has completed mapping schemes - or translation guides - from IDL to those languages. Also, there are already compilers that employ those mapping schemes to translate IDL to C, C++, and Java. (OMG is currently working on IDL mappings for ADA, SmallTalk, and other languages.)

CORBA objects may sit on different types of systems - Windows or Unix servers, IBM 3090 or DEC VAX mainframes. They may even be written in different languages. In fact, the objects don't need any inherent knowledge of each others' existence. As long as the interface to the service provided by the object is written in IDL, all the objects can communicate and use each others' services through ORBs sitting on clients, servers, database systems, mainframes, and other systems on the network.



                                                🌝😉



Today I am going to talk about the main component of any computer – Motherboard. We all are aware of the ‘Motherboard’ but you don’t know exactly what is Motherboard and how it actually works! If you don’t know then don’t worry about that! We are going to tell you.


WHAT IS MOTHERBOARD?


The Motherboard is the main and the complex part of the electronic device like computer and laptop. You can also say that the motherboard is the central part of computer which connects the computer. Motherboard connects the different parts of computer which helps to work together.

The pic of Motherboard is below...

That's how the Motherboard looks like....


The motherboard is alternatively known as the Mainboard, System Board, Baseboard, Planar board and also Logic Board.

The motherboard is the main Printed Circuit Board, known as PCB, found in general purpose microcomputers and other expandable system.

As the name says all – ‘Mother’, this connect the devices like interface cards, sound cards, video cards, network cards, hard drives, TV tuner cards, extra USB or FireWire slots, peripheral devices etc.


FUNCTIONS AND USES


There are many uses and functions of motherboard in your computer system but we are going to tell you some of the most important functions and uses:

  • Processor

The main function of the motherboard is containing the number of sockets of the CPU. You can also say that the motherboard has used for having varied configurations for the processor pins.


See that small Processors....!

  • Chipset

The chipset is basically used in a PC to transfer data from parts to parts. Therefore, chipset is used the microprocessors in motherboard.

  • Memory

Motherboard is also used for memory because the RAM used or install by users is also impact motherboard.

These are the three most important uses…


HOW MOTHERBOARD WORKS?


Actually if you are common people and only need to know little bit about the motherboard working process then – there is no working process of the motherboard….

  • If you are here for the one line answer then here it is…

The motherboard is only provide the platform for the components of the computer to work together and performs the some specific tasks.

  • But if you are here for complete answer, then read more…

A motherboard allows all the parts of your computer system to receive power, communicate and work with one another.

The first motherboards had come with IBM PC. The first motherboard had only the slots and processors.

  • The CPU points to the Memory and to the PCI (Peripheral Component Interconnect) Controller.
  • That PCI (Peripheral Component Interconnect) Controller points to the expansion cards and also hard drives.
  • The CPU points to the PCI controller that point to various other input/output such as the Network and USB connections.

Look at the Figure to understand more.... Effectively....



So, this is all I hope you understand the procedure, if you have any query please free to comment...

Thanks for reading....



Read More: