Useful technology tips
Computers are arguably the most important item in your life. You can use them to search for information, apply for jobs, work, chat, shop, bank, read the news, catch up on TV programmes and much more.
Unfortunately though, computers can also give you cause for concern. They can give you health problems, money worries and even data loss disasters.
Yes, you may find your computer useful, but just like your car, it needs looking after, regular servicing and new parts to keep it running well.
Without such maintenance, your computer will likely: slow down and show strange error messages, get choked up with unused files and software and get infected with nasty software. And you will likely have to: take it somewhere to get it fixed and spend a small fortune.
This web page seeks to offer technology advice and help you manage your computer and stay productive in the digital age, which is also an increasingly mobile age.
Staying home, embracing virtual work along with e-learning leveraging digital technologies is safer not to mention low carbon low in emissions also - the Scottish government made clear that since 2017 its intentions have been to train young children in digital technologies computer coding in particular teachers too. Simple language and clear IT advice for computers, mobiles and tablets suitable for teachers and children is available from Scottish charity Computers and Integration.
This website contains a great many links to over 50 or fifty great personal online services that you likely use every day also many great useful charities featured or linked to on the Links page.
Digital online course materials enable slow learners to pause, take a breath, learn at their own pace this directly enables the most vulnerable with complex needs to really make a life from themselves, do better, make progress. Clear communication, breaking complex topics down into simple language really helps children in particular especially when simple language is used - very young children often progress with language, comprehension and understanding.
Contents - universal also unisex technology skills education for Scottish Smart Cities and the Scottish government since 2017 wanted early years teachers to learn computer coding
- Liquid cooled computers might help to cool down computers in an age of global warming and Important to understand the term condensation to build more electric and hydrogen vehicles for sustainable transport to help people move around
- Prepare to Switch off Analogue Radio and also Mobile Proxy IP assists 5G wireless radio technology - Really preparing people to switch off AM FM radio is important to accelerate adoption to 5G free available spectrum - mobile proxy is a gateway that assigns a device mobile IP address rather than a residential IP or a VPN - mobile as in mobile data not broadband via fixed line also WiFi often wireless extension of fixed line Internet linked to a home or office
- Aberdeen City Council 17 electric vehicle chargers that are publicly available - Some people need show and tell like to see technology out and about in the civic space - watching videos is show and tell and most learners remember more from visual information also some information from the Council is wrong bad information with errors
- Longer videos shared via Facebook also YouTube may discuss topics lead to more insight and informed decisions, but longer videos require more processing time (consuming resources such as memory and disk space also need for multiple threaded processors) at the server level to analyse content before videos appear or are displayed and are found online - Shorter videos or smaller video segments less file size can really make videos appear instantly on Facebook the social network platform also the big stories are the ones that affect more people like environmental impacts such as widespread flooding, raging infernos - shorter video files minimise focus on people who may have concerns
- Watching set up progress bars and waiting around is often the hallmark of computer support - instructions to take screen grabs or screenshots with iPhone and Android also make and model of smartphone can usually be obtained from the About section of a phone like the cogwheel settings option on Android also the mobile number, also MAC addresses can be obtained to enter in a router restrict access to a network by device also IMEI slots usually shown in About menu - you may need to know corresponding numbers if you wish to unlock your phone that is linked to a particular network operator to change tariff switch mobile network operator to gain a better deal more value for money think more texts, calls and data for lower price point
- At Aberdeenshire Council HQ or headquarters Woodhill House where Police Scotland also have a presence, it appears a type 2 socket is used for EV electric vehicle chargers with 230 Volts - input is from power source and it is 50-60 Hertz 64 Amp 14.8kW per EV charger most chargers have units for up to 2 cars at a time, Output is DC Direct Current battery storage 230 Volts 64 Amp 14.8 Kilowatts, 7.4 Kilowatts per individual charger. Single charger output per Kilowatts is half the input from mains power source since EV chargers work like half-duplex - two charging points per machine is typical but at Kingswells Park and Ride one machine can hook up three cars lower part of the car park
- 720p HD at 30fps is 60MB Megabyte per minute of video so around 30MB for half a minute - 25MB is the limit for sending short video segements or files in Facebook messages so keeping video length to 15-20 seconds could help someone get help from a friend - essential information the facts to convey maybe date, place (like Where), Who, What, Where, Why and When perhaps also How - good challenge for school pupils using iMovie on iPad
- Satellites in space for telecommunications support Britain island nation Naval defence and use of expensive satellite phones also 3G, 4G and 5G masts useful since satellites are limited by line of sight due to curvature of the Earth
- Lidar is light direction and range also Lidar is measuring the time for the reflected light to return to the receiver - Important to use discretion when selecting information also question online sources challenge online information - Teachers may mark a pupil's work - some questions can have right and wrong answers, but actually it is constructive feedback for the grey areas where big improvements are likely to be found also help for the most disadvantaged. Dicussions are better supported in the digital ecosystem where learning gets recorded over a passage of time
- Antennas and The Fresnel Zone - Fresnel is an area around the visual line-of-sight of a sender or receiver of data like the visible horizon off an axis that radio waves spread out into after they leave the antenna like in a long wave and wireless signals can have a far field through the atmosphere - also there are multiple different types of antennas which emit signals in different directions, with different considerations for placement, signal intensity and range in some cases or instances
- Electrics, dynamo, alternator and battery make up an electric car also electric vehicles are self-starting and Lithium Sulfur future batteries for EV vehicles - also Semi-Autonomous Braking uses sensors to predict a crash and apply brakes and EV vehicles may come with Blind spot monitoring, Lane Departure Warning System controls steering rack, Traffic Jam assist - acceleration, braking and stopping at speeds of 40Mph also Active Parking Assist is car parking itself also finding a car parking space and LiDAR is light detection and ranging
- Selecting a handful of photos for upload from an iPhone to Dropbox online storage or to OneDrive maybe more reliable than bulk upload all photos on a phone and actually doing a select few photos is like transmitting burst messages over WiFi also over a mobile data network using TCP Tranmsmission Control Protocol
- How a PHP sticky form works on Facebook and with computer dialog boxes online to keep users in the same folder layout to enabling finding files easier - Choosing to upload a few photos at a time can actually enable better selection of content for displaying images together with a theme or a common message - visual data when combined multiple photos can provide insight also tell a story
- The Bathtub Distribution - The normal working life of most people is their useful life and actually all IT managers can change so information sharing is vital for knowledge transfer also digital data can outlive anyone and there is always bias from an individual perspective also video is very visual but often just captures snapshots in time and all the disputes they happen in the window of time between video capture. Older women like to gather to get together making arts and crafts actually sewing and knitting really gone out of fashion in Scottish schools - sewing machines have taken over along with outsourcing - garments now more likely to be made in China
- Orientation in a forign land - need for GPS and compass, locators but directions can help immensely this is the benefit of stored shared videos visual data and being objective Google Street View cars are banned in China and in some other places since Google can be intrusive - Scotland really is a great place to test out new technology due to the fast networks, still some networks such as in African nations can be much slower
- Error correcting auto corrections positive - important to reference correct pathname for images shared online uploaded to a namespace or a web server for sharing as part of a website
- Microphone input by a singer for example also electronic keyboard presses gets stored also in MIDI format during professional recording and music production in the studio also iPad first released during 2010 so people that went to University before this period likely did not have great opportunities for digital note taking during lecturers - Computers are usually shipped actually from overseas well nowt soldering of motherboards takes place in Britain - Sampling is connected to the frequency of sounds also linked to amplitude, decibels also to waveforms which are usually represented by a sine wave and sampling is also capturing sound files at a specified bit rate and converting for example from CD audio format to MP3
- E-bikes is power assisted travel - older drivers may remember when there was absolutely no power steering and the need to make complete turns of the wheel to turn a corner
- Google search terms for meanings or alternative words - training future journalists easier with open information
- Memoralising Facebook Timelines creating a digital headstone versus publishing regularly to say Hello world tell others a user is still alive
- Discharging static when building computers protects sensitive parts also components
- The 7 seven stages of the software development lifecycle explained also the stages are Analysis, Design, Implementation, Testing, Documentation, Evaluation and Maintenance also Running totals in the case of a supermarket can be linked to quantity of items or products also this can be linked to shopping baskets and the total amount of money displayed for goods, also running totals may involve counters that are first set or initialised to zero and loops of blocks of code may be used
- It is absolutely 2022 and artifical intelligence first mooted as a concept in 1968 film called 2001 A Space Odyssey - heuristics which is the foundation for anti-virus software scanning and heuristics linked to probability also to statistics like hash algorithms or hash codes also heuristics are rules of thumb in a broad sense for making immediate judgments that can facilitate problem-solving and probability judgments also heuristics like traits of a virus used to spot rogue software patterns, detect malicious software or computer code with bad intentions
- Cellular overlapping an important consideration for 5G networks with need for masts also base stations every 1000ft unlike 3G every 40 miles - 5G is an essential mobile technology for the future if mobile users want seamless coverage and fast mobile data everywhere without interruption
- Configure EIGRP routing protocol on a Cisco router and in computing there are really four types of data types - there are integers, boolean true false states or Yes / No, real numbers and characters - operands are the four standard mathematical symbols for addition, subtraction, division and multiplication symbols. Multiplication symbol usually an asterisk also like a wildcard and sometimes represents any character also Running totals actually can increment by one for example for a small set of instructions like a procedure or peice of computer code which can be linked to a loop to bring control add up for supermarket checkouts
- Images have dimentions window size, image resolution and dpi or colour bit depth - also compact cameras may come with inadequate flash memory and you may need a microSD or SD card for more capacity to store images important to look at tech specs - Computer displays RGB versus decimal image representation also mixing primary colours to form secondary and tertiary colours in primary education
- Facebook limits number of video uploaded to 35-40 within 24 hours or one calendar day - testing technology to the limits like what Channel 5's The Gadget Show did can find weaknesses also areas for improvement and also discover where there are service limitations to the detriment of users. Testing computing platforms can explore future avenues for growth and new markets also for video sharing new audience potential - scope for utilising Facebook to break areas like a large City into smaller sections or communities for sharing video and news
- Need to have interest to develop skills, keep up to date and invest in education also e-books electronic publications from Amazon can be competitively priced and cost effective with absolutely no VAT applied
- Overlapping cellular coverage and base stations also frequency spectrums and auctions, also exponential growth with IP version 6 six and twos complement for binary signal encoding over a physical medium or channel
- Computer program version numbers and stepwise refinement - The Linux command ./configure is often used in connection with building software executables or compiling from source code in the Linux world also there are useful commands make and make install
- Easy convert iPad HEIC images using Dropbox online web based interface - Elipses or three dots is really the hallmark most common element of a computing user interface. Elipses really signifies more information is coming or will follow, elipses or three dots usually reveals more menu options also Microsoft Word documents well supported enabling writing of online documents within the Dropbox online interface, for Google Docs need to log-in from Dropbox
- Always important to check your current location within a file system before transferring files to ensure copying of the latest versions instead of overwriting newer content with older files also FileZilla is the free FTP File Transfer Protocol client Windows 10 software available for download from ninite.com to enable web page upload from client user computer to web server
- Zoning, Google Maps, map search, finding a street and the DNS name service and zone files
- Berkeley, BIND and MIT Massachusetts Institute of Technology OpenCourseware
- Google Translate web-based service has evolved improved over time has a long history on the web - on mobile first though their was Google Goggles for instant language translation and also Google Latitude discontinued for WiFi tracking also DNS Domain tree structure explained
- Technical definitions from Google, copying text and plenty whitespace in HTML aids web page coding simplifies adding container tags wrapping of HTML elements around text
- Incremental back-ups can back-up just content of a website efficiently low file size - spliting documents and photos into a single container file sharing via social media websites
- Free 15GB digital accounts suitable for a child with passwords shared amongst multiple loved ones
- Google Maps zones in using IP address also GPS and compass
- Indexing delay for digital content - Search engines such as Google crawl the web to find new pages - actually topical news stories may disappear from BBC News Online website and may not appear in search results for a few days, weeks or months
- TCP windowing and buffering regulates flow control - Slots and appointments for court actually translate to use of video for people attending court via video link over the shared medium the Internet - also use of Leyer 2 two Tunnelling Protocol can encrypt connections using a Virtual Private Network - also the concept of windowing provides flow control in computer networks, controlling sending data packets between two network devices where dependable and sequential delivery of data packets is needed
- Clideo easily rotate a video up to 500Mb so for small video files and supports upload from Apple iPhone Mov or Movie format also from Android MP4 format also Radio waves and satellite signals use line of sight and also Infrared visible in the dark good for night vision, Infrared beams out TV or television signals from the Durris transmitter and bridge between Drumoak and Durris now closed to traffic
- The Speccy application can obtain a pre-installed product key for Windows 10 from a laptop that users have purchased, so important actually to take a note write down or document product keys when you first purchase and turn on a new Windows 10 or Windows 11 laptop - Really users and organisations need to always seek to migrate data formats - this is data conversion and the TXT file format is universal - TXT files created with Windows Notepad also FileInfo.com or dot com can offer applications when Windows 10 does not recognise a file type or file extension
- Broadcast storms can overwhelm a computer network and ping commands can check if a router or computer server is alive or active but also ping can lead to ping floods overwhelming servers known as Denial of Service attacks knock online servers offline also Arp cache on Windows 10 arp minus a or arp -a reveals paths to the Internet on Windows 10, also arp -d can clear or flush a local cache to resolve issues from Command Prompt
- Breakdown of how satellite communications work with Network Control Protocol also DPUs really the purpose of NCP the network protocol is to connect two remote users located geographically independent of each other useful in adverse weather - shift from 3G circuit switched network to packet switching Internet TCP/iP communications with 4G and 5G - also Assembley language specific RISC instruction set used for device drivers also ARM chips used with mobiles and tablets, also Microsoft bundles lots of device drivers with Windows 10
- Satallite Internet down to Earth use radiofrequency signals also TCP/IP and such signals is the foundation for modern life linked also RFID and bank cards, an essential technology a pre-requisite of modern communication and electronic payment solutions also computer servers need to be kept cold for optimal functioning and Law or legal firm Pinsent Masons published a statement on their website during August 2021 to say Voice over Internet Telephony or phone calls over WiFi are now to be made possible over phone networks so BT must allow this by law
- Unicast, Multicast, Broadcast and Anycast - the latter useful for sending to a computer in a group or cluster and computer servers can be clustered together for redundancy fault tolerance as well as multiple hard drives being bound together to mirror data held in racks in server farms - Fault tolerance is actually created from multiple server computers bound together in a cluster - when one server fails, a replica server computer is able to continue to provide service and replica servers are the hallmark of the Internet
- Essential summary information for online videos is year dash month dash date dash name and place are useful identifying features in a filename to create meaningful files perhaps screenshots - also Who, What, Where, Why and When really important to summarise content for indexing online by search engines with reference to online videos and discovery of relevant content also hard drives can be filled with zeroes known also as secure erase or wiping method with CCleaner also Eraser from PortableApps.com
- Data files such as videos can be bigger in file size than documents also photos. Video files represent convergence sound plus visual data - Analysing digital material is very time-consuming to properly tell a story and to organise also sequence events and time and events always move forward
- SQL or Structured Query Language can be used to change data files and data can be entered with HTML forms using PHP backend processing - also SQL query language can be connected to XML data definition files for data storage in a low file size with structure
- Knowledge acquired is actually not visible unless real people put their learning experiences into some sort of more tangible form such as a website for example or collection of web pages and Lunar modules linked with the International Space Station and soon there will be more than one space station with China and India putting their own stations in orbit - independent blocks of code are modular and modules go to space on rocket ships known as payload data
- The PhotostickOMNI three way adaptor for mobile tablet video extration also the standard round not flat screwdriver to open a computer's base unit - switching to Linux could prolong computer equipment when updates to Windows 10 end in 2025 since many computers are not capable of upgrading to Windows 11 also ability to magnify visual data can make computers more usable - buy electronics from io.com, very.co.uk and currys.com
- Contingency planning assessing risk in the digital age - really sharing information, educating others more people may lead to more offers of help. Risks can come from failure in shared computing resources but also real world physical disasters such as wildfires
- The names of igneous, sedimentary, or other metamorphic rocks were clearly labelled at RGU TechFest end of May 2022 with chemicals poured in a test tube and big explosive chemical reaction highlighted targeted at young minds also children - also Virtual Reality, Augmented Reality and 3D worlds the differences explained - very important for localised, distributed computing resources to share resources help everyone be understood, Net netrality also linked to equal rights and fairness
- Westhill in Aberdeenshire in North-East Scotland is the global centre of excellence in subsea engineering so says the sign on the entrance road from Inverurie. Aberdeen Science Centre core focus is robotics revamped during 2020 and Science, Technology, Engineering and Maths is rising in importance
- The Maths mod operator divison by remainder from Computing
- Open data and dates may be changed by a computer hacker or because of anomalies to suit a given purpose also documents can be defaced
- Pythagorus, Pi 2.14 constant data value and US President James Abram Garfield also STEM trend of the times Science, Technology, Engineering and Maths
- Multipass and Hyper V with Oracle Virtual Box which is open source virtualisation software to run for example Ubuntu Linux or maybe Linux Mint user-friendly on Microsoft Windows 10 - command line interaction enables a router on the backbone of the Internet to focus or carry out its core function of switching data packets with minimum delays or latency for maximum efficiency making also essential equipment go further last longer without needing maintenance
- Media streaming from computer to TV or tele actually LG SmartShare really pioneered it with OLED large screen TVs - actually Amazon have Alexa with Kindle Fire tablets voice activated assistant say Alexa and then issue voice commands to control smart appliances around your home (Tele Addicts was Noel Edmonds think also Deal or No Deal negotiate with banker over the phone, TV quiz with numbered boxes and random prizes of money)
- YouTube often is video viewing from televisions using set top boxes also smart TVs as is the BBC iPlayer sometimes also Demand Five but there is ITV on demand playback services such as STV viewer
- Alerting others to solutions can lead to digital empowerment and Photos captured alongside videos can help individuals to know when they are in a wrong folder in Windows 10 also Convert a Microsoft server computer to a domain controller to enable user log-in and authentication access to resources also shared files via a username and passwords using command dcpromo also CSS code for a standard website navigation bar to ease navigation and simplicity also making them uniformity in appearance always wise since consistency leads to expectations
- It is very helpful to write a description for online shared videos best actually to be concise and preferrable to use key words actually like key search terms also technical vocabulary words really ideal to direct users to the most appropriate videos shared online
- iPhone photo also video horizontal or vertical orientation? Horizontal video capture better for scenes outside to reveal immersive video suitable for sharing on social networks also social media sites - Facebook big social network, YouTube and Vimeo is a social media website and multiple media sharing sites can spread video files around preserving digital video content
- Sample JavaScript code for form to get user input and check it also code to get information on a user's screen resolution to help improve display or presentation information - JavaScript can provide interactive elements to a web page also control user input provide form field validation useful to check user input to ensure it is accurate against a valid range
- Older people and some professions in the business world may feel intimidated by the digital world and its nuances, compatibility issues also some young people may not be intereted in computers, but digital skills education can lead to empowerment - universal standards also common user interfaces often enable more uptake or greater adoption in digital services - also variables in programming synonymous with the changing state of local environments which links to adaptability and the need for humans to respond to changing conditions on the ground and blinking lights or LEDs can alert humans to issues
- Direct Memory Access really linked to input and output controllers - such as sound cards, network cards and SCSI cards, it is the process of transferring data without the involvement of the processor itself - Swap memory is virtual or extended memory in a hard disk file and it boosts a computer's physical RAM memory capacity and enables more applications to run simultaneously
- The Good Things Foundation says that a digital standard of living is really - about being able to communicate, connect and engage with opportunities safely and with confidence
- UNIX, Linux and Windows 10 all use symlinks or symbolic links - absolute file pathnames are often long, specific and precise point to an exact location more reliable but relative Shortcuts can remind users what applications they had installed. Absolute links are more definitive - can be refereneced from anywhere within a UNIX file system also Debian is an original form of UNIX and Solaris from first Sun Microsystems and now Oracle historically good platform for software development education
- Algorithms versus hand picking - Smart algorithms the rules of logic like Google actually enable more timely results make better decisions, but hand picking information, selecting and re-presenting can really benefit others lead to greater insight - those with special interests can hone in on events but most people have topics that interest them or an area of expertise
- The 1970s really is when manual human operated switchboards took calls from people to place calls help them and around this time all switchboards moved to automation - mobile phone market compeitiveness has brought down the price of smart technology in almost every pocket worldwide really enabling anyone to get help, have their say - online storage solutions also sharing nowadays can enable digital visual evidence to be preserved - this can also enable everyone including more vulnerable persons to be understood when parents are no longer around
- Three main types of data back-up - full backup, incremental backup and differential backup, differential often used by Dropbox and OneDrive to sync changes in files, but incremental back-up can be useful to save storage space
- Windows 10 shortcut key commands and Users who magnify content such as those with visual impairments may take longer to do computing tasks, so employers need to be more patient with disabled employees
- Remembering US President James Abram Garfield - the assisinated President founded Pythagoras the basis for maths and now STEM Science Technology Engineering and Maths is rising in importance
- Cisco kid Western film star Duncan Renaldo found guilty of perjury, case from the past historical and significant, a cheerful show kept children smiling without nightmares - children and young people increasingly tech savvy
- Meta HTML tag http-equiv refresh tag reloads a whole web page - AJAX loads a web page in part useful for news feeds - this HTML tag is totally different in concept from Amazon Fresh, fresh as in fresh groceries but nothing perishable
- Apple tech giant has taken over Primephonic classical music streaming making it part of Apple Music subscription service and Apple previously disputed the name with Apple the music label - also help to remotely delete an Android smartphone or Android device, remote wiping useful more for phones and tablets to protect text messages which could link to friends, family and children
- E-bikes and e-cargo to be big for delivery of products from Amazon in London also electric transport emerging from big retailer Amazon - big brand companies do usually help employees with families giving them transport so always aspiring to get job fundamental - aspiring key but with global warming more people are perspiring
- Important to turn off digit or passcode authentication on Dropbox also OneDrive on an iPad for example before copying Pages files the native document format on Apple computers and devices to really preserve duplicate data - also Long press is how to bring up a menu to copy paste files on mobile devices but a lightning connected mouse for iPad can enable easy right-click
- Using SQL Structured Query Language to query a database to produce selected output in the form of an abbreviated table output also ability to update or push data into a database table and delete or drop tables
- Colocation server farms provides the building, cooling, power, bandwidth and physical security, while the customer provides servers and storage and video files can act like a container unit for multiple files to enable more efficient user view and access - free video hosting support can be cost effective for ordinary users and free hosting services a good value for money help make computing platform services and digital services available to all where there is a data connection
- Copying text a paragraph at a time to Notepad for example to create a web page is likely more efficient and more reliable in the long-term - it is easier to wrap a line of HTML code from a PDF paragraph block in letter-p or pee or p tags the HTML element for producing paragraphs of text which create single line spacing between each paragraph - also rules of logic written by computer programs can predict behaviour and detect potential shocks to systems in advance useful for climate modelling and making predictions
- Frequency-hopping spread spectrum automatically changes carrier frequency of radio waves also signals
- For YouTube video uploads for longer videos, mobile phone numbers need to be confirmed - Facebook's free model of support for unlimited photo and video upload actually places a great burden on computer servers is really unsustainable long term, but Facebook now known as Meta like the HTML meta tag has always said the service will be free to users which is a big issue - Facebook disruptive technology
- Wiping hard drives sometimes necessary this makes data transfer very positive - also laptops with minimal data present less of a security risk overall so this makes the cloud and online storage advantageous for those with worries and anxieties and small size web pages enable universal education and also efficient downloading over slower networks such as those in the third world with General Packet radio services also UMTS Universal Telecommunications Service
- The Department of Work and Pensions use privacy guidelines known as GDPR to really protect personal information of benefit claimants also those in receipt of pensions - Annoymising data is also known as obfuscation also data masking - data mining tries to make sense of annonoymised data, such as encrypted or obscured information
- Compact Discs introduced random access to data and music tracks using Infrared to choose or pick music and lasers to read, an improvement on serial or sequential access - serial access to tape storage using Camcorders during 1990s was a big issue meant quite slow adoption of video by the average consumer or user
- The Internet is biggest threat to copyright since its inception, but merit is always given for original works - also messages sent by way of the Internet and TCP/IP have flags often priority flags, quality of service - messages can be assigned priorities based on key words or search terms such as threat to kill also children at risk messages may also be prioritised
- Google Docs has version control - saved documents in real time automatically saved when there is a data connection and work in progress - Graphical Icons need to be self-explanatory for broad widespread adoption so listening to influential voices in user interface design is important also Windows Start button always been convenient help tool and Home button on iPhone disappearing - also Martha Lane Fox female tech entrepreneur behind lastminute.com and sophisticated real-time technologies with clock syncrhonisation really underpin air travel for safety critical reasons
- Facebook, the digital world and frustrations really stem from data loss - Facebook social platform where users can request deletion of content and actually some users may delete to keep others happy, keep friends
- Linux copy cp move also rename mv command, head filename to view top of file key summary information maybe news articles, cd for change directory, also mount to make additional drives with files accessible - also Microsoft PowerShell command line tool for flexibility to build, test, and deploy Windows versions also known as operating systems across a large organisation in an efficient manner
- Slipstream service packs using the Reverse Integration Method also SysPrep to make set up of computer systems across a large organisation more efficient also SIDs defined Service Identifies for use in ActiveDirectory service to manage resources also users on Microsoft servers also domain controllers
- Books Abroad near Huntly is charity that sends books to Africa - AVI to WebM conversion needed - AVI Windows video files tend to not display on an Android smartphone also Nokia nHD format mobile 360p 320x240 pixels good visual quality for low file size but still Windows AVI format, better with WEBM preferred format low file size mobile video window and good visual quality - People can learn from real world observation - mobile data on the web helps real people understand what is going on outside and synthesise bring it all together to form new knowledge great for budding anthropologists
- Network masks are different from single computer IP addresses, also Virtual Local Area Networks can group users for security or data traffic filtering by application in a manner independent of their physical location, also Cisco routers can filter data traffic using Access control lists for greater network security and example code is given - Internet Control Message Protocol error messaging and diagnostic support for Internet Cisco routers
- The web open platform best for technical information - Information Management a subject within the realm of Aberdeen Business School linked to social sciences has links to implementing MySQL databases with PHP and more students and academics setting up websites could help to lead also advance industries since academics often demand students innovate and award top marks for originality
- Google homepage uses AJAX to display links to online services and to all web applications as does BBC Sport for live feeds - AJAX can be learnt from awesome web programming website w3schools.com
- Desktop computers easy to add a second SSD hard drive and actually a 1TB extra hard drive is cheap - buy a new computer and it is expensive for a lot less SSD storage as a second drive since real high capacity drives can be bought online - server computers in serve farms will need hardware replaced that includes hard drives in storage racks - with this data transfer is important, data held in RAID5 storage or Redundant Array of Independent Drives. Mirroring prevents data loss which can hamper a firms bottom line profits
- Dedicated web page on Computers and Integration website - Inside a CPU or computer processor - the original design by Babbage father of the computer, Boolean Logic to Build Mobiles and Tablets including the NAND gate - NAND flash memory is what modern mobile devices are made from and Floating point representation useful for going into orbit also Booleon Algebra for Electrical Circuits - AND, OR, NOT, XOR and NAND gates
- USB type C but what does it mean in practical reality? Data cables and the names of them can be confusing this has roots to engineering actually and male female connectors from electrical engineering - electricity from Michael Farraday and Benjamin Franklin and also Thomas Edison light bulb man symbolic of learning achievement in education - really simplicity is at the heart of web communication also social inclusion - Neurons of the brain or mind from a comparative perspective seem to resemble electrons with charged particles - native human behaviour in the real physical world can seem charged with often protests on the street
- SATA, Dban and Dram also rm -r rescursively Linux remove all nested files and folders also directories, rmdir remove empty directories
- Overwritting files led to warnings from conflicts such as IRQs also Interrupt requests also the noclobber Linux command prevents files being overwritten brings this to the fore
- Data transfers can result in errors sometimes error codes in hexadecimal the base 16 number system non sensical represepntation and Apple devices usually error prone due to closed nature of main core platform iOS - Academics actually like students to be critical, be innovative also and produce original work - Progress in society including technological progress is always made with communication or technical authoring - really breaking complex topics down and simplify can move people on and forward in their thinking
- Photos and videos can be backed-up from the Photos app on an Apple iPhone and this way gives multi mode configuration flexibility - also app based modes also provide a fail safe alternative means of data back-up such as the Dropbox and OneDrive apps, so user persistance with technology can preserve data
- Analog to Digital Conversion is possible with Pulse Code Modulation also Signal to Noise Ratio (SNR) WAV lossless versus MP3 lossy compression entropy encoding and source coding - you should look for an IBAN on your bank statement if you want to sell books online
- ISO standard terms in relation to computer networks and user web based interfaces
- Command based user interfaces pros and cons - sudo then command on Linux Ubuntu systems runs commands in a Terminal window as the root user with full administrative priviledges
- Basic stages of multimedia development and the various disciplines involved also helpful messages can be contained in visual communications and written works also websites and multimedia productions - the Beano also the Dandy long been written and circulated in Britain among children often aimed at children with the view to keeping them entertained with subtle educational messages
- NAND gate to build smartphones and tablets and other Maths for Computing boolean operators - Interrupt requests or IRQs can cause conflicts between IRQ2 and IRQ9 also print devices from makers such as Lexmark, Epson and Canon used to connect to pink parallel ports at the back of a computer linked to a motherboard - The Clinterty campus of Aberdeen's local College actually has changed focus from a rural skills centre to a training centre for a future in oil and gas - also significant figures in computing education recognised
- Google is powerful when technical terms from computing also science including medicine prescribed drug details entered - understanding broad concepts at University from previous study can enable whole new material to be written, memories to come back be restored based on intelligent accurate Google search results
- Flow control in computer networks and memory buffers including also overflowing buffers and hexadecimal - 16 times table taught in schools in Aberdeenshire early 20th century
- Big issue of the Day - where do you safely store digital evidence?
- Breaking down also simplifying technology could improve safety for women in future also independence as well as greater mobility
- Need for real patience with technology to gain the most benefit and to listen to signals
- Boosting signals in a computer network historical with Ethernet Local Area Networks using Hubs to link computers
- Digital signals can be amplified by routers and switches
- Protocols, rules and languages used in data communications - Carrier Sense Multiple Access with Collision Avoidance
- Skills and knowledge needed to build electric vehicles and zero emission transport
- Batteries and electronic devices like TVs, computers and DVD players use DC electricity also emerging EV or electric vehicles store DC power in their batteries - Alternating current or AC is actually what enters most homes - also smartphones use what is known as induction charging to enable wireless charging involving a pad suitable for efficient charging of multiple devices in a household minimising wires or cables, transformers enable high volumes of energy to be transported over the power grid suitable for solar panels
- nslookup for DNS info, netstat for network statistics also WEP and WPA secure WiFi wireless networks and also secure computer wiping - Knowledge sharing can empower women, professionals to resolve Internet connectivity issues quicker, faster minimising Internet downtime and reduce the need for mobile network or computer engineers driving between multiple remote sites
- 2-D 2 dimentional animation also known as stop motion animation think Wallace and Gromit required patience also animation usually involves small discrete movements using keyframes also video editing software uses a timeline and key frames - JPEG uses lossy compression along with pixelation and this is where similar pixels get copied in computer code enabling replication and duplication of similar patterns of computer code which enables file sizes to be reduced, CCTV images usually low quality due to need for rolling film and previously recorded footage getting recorded over
- Robert Mugabe failed to see the importance of knowledge transfer partnerships, information and training for arable farming in Zimbabwe formerly Rhodesia with white owners of farms - really the Internet was born to share information with universal TCP/IP this is the fundamental purpose of a network
- TCP/IP standard rules for data transmission across the universal Internet the world's largest shared network online space - small segments or data packets actually enable corrupted data to be resent most efficiently - LiveAid concerts core focus to feed everyone
- Absolutely no sound or negative response audio output on a Windows 10 computer - unplug external USB speakers and reconnect to a different USB port to take advantage of Plug n Play automatic hardware detection and configuration - Ben Shneiderman describes artificial intelligence as reliable, safe and trustworthy also the key difference between front facing and rear facing cameras on smartphones also tablets and also mirrors can be really useful or handy
- Having difficulty accessing or copying photos and videos from your phone to Windows 10 - first connect USB cable from your phone to a computer, then enter your passcode or password on your Android phone, authenticate with Touch ID on iPhone with fingerprint
- Linux Cat grep touch echo for use with TXT files and Windows start - Keep a diary of events, store your work schedule also recall fond memories later
- TXT files with UTF-8 character encoding universal the world over and ANSI is for Latin - also can be created with Notepad on Windows, also on an Android tablet, opened also in a web browser such as Google Chrome - TXT and HTML web format with formatting markers cross platform and is more standards compliant with better ability to analyse data and benefits of standard working practices is wide ranging
- Pressreader.com access multiple news websites from one web based user interface - also Google search string colon or :pressreader.com enables past also indexed news articles to be retrieved, read, accessed and referenced for free - also free news website Grampian Online
- What is Ciscopedia? It is a compiled Windows help file a dictionary of Cisco router commands that makes little sense and the original form of onscreen technical help information for offline systems - Cisco routers power the backbone of the Internet the really high-speed fibre optic light-guided data signals. Digital skills education really vital for the age of Scottish Smart Cities which is now
- Border Gateway Protcol is a routing protocol for independent or autonomous routers to exchange topology information - three main routing protocols used on the Internet are distance vector, link state and path vector. OSPF is a link state routing protocol that calculates best path most efficient route for data transmission and OSPF updates exchange topology information with nearest neighbours
- The RIP routing protocol or set of rules that enables an individual router to learn about neighbouring routers, other networks and paths through an Internetwork - also RIP enables a router to tell other routers and share information about its connected networks
- Add a password to a router also reset passwords - also Set a Cisco Internet backbone serial router interface using the ip routing command and also within that use the interface command to assign an IP address also a subnet mask to a router link, interface or port - also make an interface active come alive with command no interface shutdown - also add description text to a link to help others to understand
- What is true or accurate - Art or Science? Nowadays work is more real in shared digital format since the act of sharing enables great many witnesses but there is Aberdeen Art Gallery - Computer program constructs also known as logic in a sense - sequence or series, selection or choice and interation repeat again - repeating until it makes sense can help learners cram for exams
- Events can be timed and it is a great challenge to produce timely visual information also video even Google cannot do it with their StreetView cars - photos are often 360 and immersive but they are static images
- Transmission Control Protocol basis for Internet data trasmission uses SYN for synchronisation to help make Internet communications more reliable with less errors and Cisco routers have a clock rate command - really teamwork vital within neighbouring areas of an Internetwork to make Internet communications more reliable with less errors
- Important to be able to check on router the default gateway status and detect when links are down, fix cables, troubleshoot, replace failed routers - wireless signals can involve greater signal attenuation or more delays - real-time systems such as the banking network involve real-time changes to financial information so clock timings being in sync fundamental
- Minority report futuristic film about punishing people putting them to sleep before causing harm taught the world about false positives with advanced smart technology and how it is possible for mistakes with computer systems stemming from errors in data - Google search works well to give definitions for technical terms when students understand broad concepts from studying
- The Internet of Things first unveiled at the Consumer Electronics Show at Las Vegus and convergence of multiple technologies
- Interrupts in software development - Windows 10 uses interrupts to alert users to issues also concerns with failing technology with physical hardware components as well as software so that corrective action can be taken this enables real-time monitoring of critical systems
- Cisco routers have serial interfaces or ports and Cisco routers control the flow of information on the high-speed Internet backbone - routers reference routing tables for default route information, key information which enables a router to know what interface to put or send a data packet out by default - also multiple routers used in the default route command provides fail safe redundant options
- NAND flash used in phones and tablets stores data without power - Java device independent software used for the multimedia menus used in TVs - also Apple tech giant has been in a dispute over brand and name with Apple music label and Cisco big Internet router backend maker Internetwork Operating System also known as IOS has been around long before the iPhone and iPad which uses iOS
- Amplitude, Phase and Frequency Modulation puts signals onto carrier waves and a physical medium may be fibre or wireless - also Amplitude, Phase and Frequency Shift Keying deals with signal processing for anlog and digital devices where signals are modulated - phase shift keying is useful for closed loop control traffic signals for self-driving automated cars, also medical equipment mostly analog in Scotland using oscilloscopes so better care could happen with digital technologies
- Being creative, experimenting, inventing products, learning something new is always better more positive - getting ahead of time really important to success
- Communication signals and timings - Morse code used by vessels and seafarers used also in Titanic to send distress signal aiding rescue, then along came Radar and Sonar - also Manchester encoding tends to be used in connection with Transmission Control Protocol to synchronise clocks and signals to put a bitstream on a carrier medium such as fibre optic cable also wireless over the air medium - time began to aid transport and communication and prevent confusion
- Web link hover text known as tooltip text HTML href link title attribute adds a label to web links when mouse hovers over a link known as onmouseover event handler in JavaScript and this element add interactivity to a web page - CSS style sheets can change the appearance of links easily
- Relative links also JPEG images embedded in websites accessed from an Android phone on local storage tend to not work also embedded style sheets via style element vital - really the WebM video format is best low in file size good visual quality to coverge video visual data offline with sound or audio a key message - the Public Switched Telephone Network now comprises convergence wide range of technologies
- Video can be more authentic when combined with observation in real-time - truth and justice is often linked to fairness and what is morally accepted - defacto standards and the status quo
- American Standard Code for Information Interchange, QWERTY keyboards, HTML web pages and the World Wide Web
- Establishing a digital identity online with a web based portfolio may stand you in good stead, gain real respect, be understood also
- Microsoft versus groovy Apple iconic image aimed at designers and mucisians versus also Google
- Wireless devices tend to rely on Infrared making computing more mobile and flexible - also SSD hard drives more reliable and stable over conventional moving part hard drives
- Smartphones improve clarity in communication also converge audio and video enabling also visual lifelike recording that is truer to life - also Internet communications in data involve TCP to add a layer of reliable data transmission
- Radio communications often used the NATO phenetic alphabet to make letters or characters clear stand out make the spoken word clearer to avoid issues around misinterpretation
- Mobile Data versus stored data
- Fibre bullet proof Bridge of Dee Aberdeen evening rush hour 29 June 2022 - fibre optic networks enable high fidelity light signals to travel over a physical cable medium. Fibre optic cable made from Kevlar the stuff bullet proof vests are made from - really armed police units and guns detract away from investment in fibre optic networks due to bullet proof vests. A lot of households like Internet streamed TV, box set viewing. Traditional telephony networks made from copper cabling - rare Earth minerals
- Transport Layer Security TLS now works with HTTPS replacing Secure Sockets Layer SSL - Saying thanks ACK acknowledges data communications and saying thanks helps computer sender of data know a data packet reached its destination safely
- IP masquerading masks local computers on a private network and works with Network Address Translation - in NAT, Private IP addresses are translated into a single public IP address. In PAT, Private IP addresses are translated into the public IP address via Port numbers
- Find out the name of your computer, the address of the closest router and also access shared files on other computers across a local network such as a Windows 10 HomeGroup via Network and Sharing Centre
- Resetting Apple devices deletes apps - iPhone also iPad Pages app also iMovie need to install apps from App Store after resetting devices using the Reset option erase everything - video editing combine multiple photos into a movie Mov file
- The iMovie app - adding audio such as a narrative to provide additional contextual information to a video after shooting
- Long press is the key shortcut on mobile for right-click - can rename files in Pages app on iPhone enables short meaningful unique titles for documents descriptive titles that really make sense - also Embedded stylesheets in a web page linked using the style HTML element tag better to retain formatting when accessing own user generated web pages from Android tablets
- Hi-tech smart systems can take over bodily function think prosthetic limbs also machine voices and Java the software development language is platform independent - also software development is generally modular in a sense and involves computer programmers working in teams, A great application of a bot for automations online is password managers such as lastpass.com never forget your log-ins and passwords
- International Space Station built using modular engineering with team working with payload modules sent to outer space on rocket ships - important to document work and share plans - space stations give astronaughts a temporary home in space to maintain satellites for the monitoring of events on Earth
- Blurring out Google Street View images can make people suspicious - the curious mind stems from this and draws attention to properties also vehicles the police use ANPR Automatic Number Plate Recognition
- Arpanet is the origins of the Internet - a military network set up for education and research purposes which really enabled email and communication - threaded processing is here in multiple cores of processors linked together in chains and Quantum computing is now possible
- Lightweight Directory Access Protocol LDAP used for authentication or to manage also control access to computer systems via usernames and passwords in both Windows 10 version ten also Linux - Group Policy on Windows domain controllers can restrict user access to websites and CAPTCHAS designed to cut down on bots make users click visual icons to log-in sometimes and automated technologies can really lead to spam and unwanted communications
- Grasping PHP, variables, strings and escape sequences also core maths topics include integers, booleon true false also floating point representation essentials for going into orbit - Google automated search suggestions clever algorithm can really bring back memories when you have some previous knowledge of a technical subject
- Scottish Smart Cities and help to maintain them - Circuit Breakers, AND gates also transisters often used in electronics also in software development also algorithms are the rules that make up a computer software program or smartphone app
- Android Linux is really omnipresent and everywhere filling lots of pockets - Linux help via traditional manual or man pages based on autoflow to control flow of information really innovative concept
- Crosstalk undesirable data signals and Layer Two Tunnelling Protocol for using Virtual Private Networks
- Digital marketing is an important skill to master nowadays - Google AdWords makes advertising via search results easy but do be wary to avoid being too subtle using advertising terms
- Web pages make for great online help, help is available in Windows 10 ten via the F1 key to enable web search and Linux computer systems have Man pages
- The Earth our shared world has an electromagnetic field and multiple magnets combined has an effect on radio waves whereby mobile phone signals get blocked
- Electromagnetic interference can be minimised for data transmission in computer networks by twisting multiple strands of cable or using braiding for wires in a cable - oscillations are fluctuations in an electrical current used in the charging of electric vehicles - also MRI scanners use radio waves also magnets and MRI scanners are used to form pictures of the anaotomy
- index.html but also sometimes index.php usually represents a homepage for a website and Date modified in Windows Explorer enables the finding of new web pages to add in a menu on a homepage - displays the most recently worked on files at the top in a file explorer window - the place where all files on a computer are displayed usful for getting a filename for adding in a web page
- YouTube does enable the creation of three YouTube channels per user account and channels can logically group videos for a specific purpose useful for education, Rumble.com enables easy embed of videos in web pages but also there is Facebook and Vimeo for sharing videos - Facebook useful for sharing videos with friends also communities via public Facebook pages
- AutoComplete for filenames can help with forming file naming conventions and uniformity to make it easier to embed visual images with a theme in web pages - AutoComplete from Windows core computing platform is really the inspiration for Google search auto suggestions and now Google Chromebooks are in classrooms in Scotland for an always on data connected world challenging Microsoft
- IMG_9759 really a non-sensical filename when viewed in Windows Explorer Quick Access also creativity and imagination can really foster great progress going forward over looking back - baidu.com Chinese search engine is open, accessible to people in Scotland for example but Scots tend to not understand Chinese and Chinese language can include symbols be a hard to decipher character set
- How routers on the Internet work to filter data traffic and routers are like roundabouts - the Aberdeen bypass roundabout big inefficient router at rush hour Tuesday also electric vehicle charging at Kingswells Park and Ride
- Electric car or vehicle charging at Kingswells Park and Ride
- IEEE standards for both WiFi wireless networks and for traditional Ethernet Local Area Networks also use of multiplexing and Wavelength Division Multiplexing really used to split light signals into colours for transmission over modern fibre optic networks - 24 strands of colour identified
- Fibre optic network cable connectors bulky difficult to fit require specialist engineers - fibre optic cable connectors not yet visible in most homes in Scotland proof of Fibre to the Cabinet broadband installations where users share Internet bandwidth and access with city dwellers, Full Fibre broadband not yet here in Aberdeen despite claims to the contrary
- RFID is a means to pinpoint location provide an ID code based in technology or in hi-tech systems, you really need humans to manufacture the technology think bracelets with fine circuitry and embedded circuit boards where components are soldered together - satellites enable a top down view and can give an at a glance view support use of electronic tags for tracking through GPS or the American Global Positioning System, Europe has Galileo and Elon Musk has Starlink satellite constellations
- Windows Phone long forgotten - Google Classroom versus Microsoft Teams for online learning also computers can run Windows 10 and Linux in a dual boot giving user choice and Linux really provides for advanced security to control file and folder access with a system of permissions
- Data transfer issues discussed - USB Universal Serial Bus also HDMI High Definition Multimedia Interface explained including standard and micro interface or connector ports, also Thunderbolt is fast data transfer developed by Intel also Apple and this is where the name for the lightning connector port on Apple devices comes from - use of black USB 2.0 ports on computers usually more reliable for data transfer or for copying data also Glasgow's iMax screened or viewed the building of the International Space Station
- Facebook Creator Studio published mode enables side by side view of multiple video listing and single video screen which enables efficient copying of video web links also descriptions used for videos
- HTML page templates and etching out events chronicaling what has happened can enable digital record keeping in an efficient manner - easy to upload wrong videos from computer also so important to save video descriptions
- A Layered approach to troubleshooting with support of the OSI model explained with the view to resolving Internet connectivity issues also big events that draw a crowd can spike Internet demand also life is 24 hours 7 days a week but advanced nation states often make bigger use of Internet - fair and equal access to the Internet is fundamental to human rights in the digital age
- National Dash Cam Safety Portal for England and Wales pedestrians, cyclists and motorists to send police dashcam video footage also DailyRecord.co.uk makes clear similar website run by police in Scotland launched on 1st or first April 2022 but no website or web presence is online not listed on Google
- Banglin video glasses 32GB Model Number: GL5021 and how LED lights can be useful for shooting video, know or establish when video cameras are on and off also know when video shooting is taking place for real
- Computer simulations can be lifelike lead to real world training - Microsoft Flight Simulator for budding pilots - also LED lights on video glasses can be useful for shooting video, know or establish when video cameras are on and off also know when video shooting is taking place for real, and Augmented Reality better also useful for giving the wearer of a camera information on its working state
- Dry and wet shavers do not work when plugged-in charging for safety reaons, but dry only shavers enable shaving when charging giving more functionality and often dry only shavers more economical cost effective also
- Copy or transfer MP3 music files either ripped or extracted from CDs or downloaded from websites like Amazon Music the iTunes store also to an iPhone or iPad for offline playback without a data connection
- Media Monkey free app on Android phones and tablets is a very capable app that does enable playback of MP3s offline without a data connection - storing MP3s on a phone's SD card also duplicating music on portable external hard drives will enable you to reset your phone also retrieve music without losing data also music
- A brief history of cellular technology evolution with regards to mobile voice - 3G is really where mobile voice converged with data before that there was voice calls and SMS Simple Mail Service text messages - also email providers can disappear like Lycos so saving in other formats publishing may help preserve data
- Banglin video glasses 32GB experiment and ISO explained in photography - Apple tree a traditional fruit grown in Scotland akin to the analogy of Isaac Newton and an apple falling from a tree
- Photos and videos better enable positive reinforcement in learning encouraging young minds and milestones can document key significant moments, mobile connections can be shared through tethering - Apple's use of graphics with iPhone and icons in a trendy, groovy way made mobiles go mainstream and Google with Android using open source code brought down prices
- Control, Alt plus Delete also Control, Alt plus Escape can bring up Task Manager to inspect running live applications, close down applications freezing crashing your Windows 10 computer
- With Google Find My Device you can erase a phone of its contents when you lose it get it stolen - always better not to keep data on your most valuable possesstion, your phone with your contacts
- Alternative search engines on the web beside Google and Bing the big major players - Bing from Microsoft with fancy natural world scenes
- Get into a habit of save and bookmark from mobile iPhone and Android - also reference or cite online works for credibility
- Start with Dates - Best to always state the date in abosolute terms at the start of Facebook uploaded videos to really make sense of videos when looking back in time - also when looking back be sure to right-click on video links to open them in a new tab to minimise frustrations, content page refreshes and going back to the start - also CSS can be used to add spacing to bullet points, borders, margins and page divisisions on websites for improved readability clarity also
- How to chose an online or cloud storage provider - pick from Google One and Microsoft OneDrive with supporting app-based ecosystem, BT Cloud, Amazon Cloud Drive also Amazon Photos and Dropbox, the latter useful for just file storage and works well with Windows 10 with easy ability to make offline back-ups
- Smaller images in file size of screenshots when embedded in websites as small images can be used to provide instructional computer support to help proliferate computer literacy also known as digital skills education - also JPEG uses lossy compression and Shannon's source coding theorem of Entropy Encoding often used with H.264 and the modern MP4 video standard
- A PHP backend script used on the website of Grampian Opportunities in the past for an accessible meeting place checklist - an accompanying normal HTML page with form interface elements sought information from the user about meeting places
- Tesco Automated Till or Support at the Checkout - visual walkthrough
- Grampian Opporunities or GO for short long-term friend with Computers and Integration - also GO Charitable Trusts free website provides signposting to significant services including many web links also videos
- Ubuntu Linux started off tabbed browsing in the file explorer reducing clutter and the overhead of multiple windows before Windows 11 also application software on Ubuntu often set up or installed without computer reboots - often Microsoft Windows 10 users waste immense time waiting for updates to be installed and iPads can keep users productive while waiting, significant issue also is lecture slides created with PowerPoint using bullet points can really defy explanation
- Keeping Kids safe online - An online safety checklist for young children to really stay safe in an Internet age and an online world that is based in reality in the real physical world
- Photos uploaded by Dropbox app on a modern iPhone smartphone adds date and time of photo capture to photo file name, but renaming files giving multiple files with similar names and numerical differences may help you sift through data find images or photos at a later date for referencing for example - also direct local file transfer can be faster, save bandwidth as well as time also
- A Home button on an iPhone can provide a sense of relief an ability to restore order and a calm state of mind much like the Start menu on Windows - iPhone 11 and iPhone 12 come with Home button missing making it harder to actually switch on a phone
- A computer checklist for your child - pick out computer parts and understand what they do, learn also to interact with the barebones of a computer including the difference betweeen ROM and RAM memory - also learn about the Raspberry PI computer built for playing around with
- RGU TechFest happening this weekend 28-29 May 2022 and the key theme is robotics, sustainable energy and learning through play caring also for animals - also 100 percent electric buses on the go in Aberdeen and FirstBus is a stakeholder at TechFest
- Managing files and folders or directories in Windows 10 - three main views Title, List and Details and only Details view shows file sizes of files, folders have absolutely no fize size easily visible so using dates in file names and establishing a similar naming convention for groups of files very wise to enable efficient information retrieval for stored data to really save money with online storage solutions - also sharing files on websites can provide greater meaning and explanations
- Editing web pages in a live state visually with Nvu KompoZer also London has a bubbling tech city known as silicon roundabout bordering Hackney which aims to rejuvenate east London - California is Silicon Valley but the state of California faces major environmental issues
- Introduction: a brief history of networking
- Types and Characteristics of WANs
- Overview of Data Networks
- Congested Networks
- Routing basics and how routers work in a nutshell
- IP Addresses get assigned to computers for network communication
- PTO Switched Services Packet switching (the Internet) versus Circuit switching (traditional telephony or phone networks)
- Circuit-Switched networks explained
- Packet-Switched networks explained
- The traditional network known as X25 had error checking capabilities and Frame Relay without error checking really took off in popularity as a Wide Area Network WAN technology
- Mobile and Broadband Services - Asynchronous Transfer Mode important WAN technology and Digital Subscriber Line really started home broadband
- Mobile Services (including UMTS and GPRS)
- Voice over IP and H.32x standards
- Public Key Cryptography (PKI) Concepts - an overview of how encryption technologies work
- Public Key Authentication and Digital Signatures
- Hash Algorithms can be used to encrypt information make it harder to intercept
- Public Key Infrastructure Securing E-Commerce
- IP version 4 address space became outgrown leading to need for IP version 6 - no-one really predicted the phenomenal growth of the Internet, a network of networks even though it enabled information sharing - also high-end cars usually have hi-tech safety features before budget mass produced cars
- NetBIOS Name Format and NetBIOS used in history with Microsoft Windows clients for local network communication
- How a WINS server worked in practice
- Multi-homed Hosts or computers with multiple network interfaces
- Explaining how Routing Tables work in practice
- The RIP Router Update Process Explained
- Internet IP Sharing including Internet Connection Sharing and NAT leading onto a Proxy Server
- How a Proxy Server works
- Some great keyboard shortcuts - also CONTROL plus letter-T on Google Chrome and Mozilla Firefox opens a new tab and tabbed browsing can help Universal Credit benefit claimants look at bank financial information and switch between their online journal and send a message - tabs in web browsers support persons who can be more forgetful
- Someone's life can get scattered around all over the place interwoven in the fabric of the web with multiple digital accounts and many organisations keep data - learning HTML could help people tell real stories referencing digital data
- Apple App Store contains apps for business professionals and accounting - Apps such as Invoice2Go, FreshBooks Cloud Accounting and Time Master and Billing can help you manage invoices
- Embedding images also photos in a web page using raw HTML and Notepad - also making text bold for emphasis in HTML and creating bulleted lists to make key stand out points
- Good rule of thumb - save files always to Windows Desktop where you can visually see them, then move to Dropbox and OneDrive - also note you do need to pay attention where you save files and inventories or document maps can help where file names are mapped to storage locations
- CONTROL plus End key useful for non-wrapping lines in Notepad and lines that go sidewards off the screen also plenty white space in HTML code makes detecting or spotting mistakes easier also high contrast colours and visual display in web browser make it easier to fix mistakes
- Microsoft PowerPoint for Office 365 with OneDrive Personal subscription around £60 a year in May 2022 better suited to producing videos based on photos or screenshots than OpenShot video editor which makes the process quite slow with photos taking long time to load in preview window
- Notepad great for web page creation efficient on low end hardware - when doing video editing with open source cross-platform OpenShot Video editor important to save your work frequently and also file transfer to Dropbox and OneDrive along with periodic saving can keep you from losing work
- Create desktop shortcuts for Microsoft Word, Excel, Access, PowerPoint and Publisher - also open HTML web pages from visible files in Windows Explorer drag web page to Notepad desktop shortcut to open in Notepad for editing raw HTML
- Site Map - the core purpose of a sitemap should be to orientate users quickly to web pages giving an at a glance descriptive guide to web pages on a website
- Security set up with three routers using access control lists on Cisco routers to restrict network traffic sent over the backbone of the Internet - also CHAP and PAP authentication and no shutdown command often used to activate router network interfaces
- Ad hoc networks versus infrastructure networks and MANETs Mobile Ad hoc networks - also Computers and Integration did Portable Appliance Testing for all electronic equipment with fully qualified tester
- iCloud for Windows aimed at Windows 7 and 8 works in practice on Windows 10 via Apple support website and is really the most reliable means to get photos and videos off an iPad and iPhone using Windows Explorer limiting strange errors and disconnections
- How to understand an IP address - the link between numerical IP addresses in big real world numbers and binary
- Video streaming and use of UDP User Datagram Protocol enables more efficient data communication - less reliable than TCP but real-time video streaming could alert others, responsible people, when someone is in distress being abused
- Copying files can duplicate out of focus photos and photos you do not want to keep - also often magnified displays can result in playback of photos, videos with corrections providing or adding fact-checking with dimension in text before sharing widely - also distored photos with key details can be enhanced
- Windows Explorer or File Explorer on Windows 10 sort files and folders by Name, Date modified, Type of file JPEG or MP4 for example and file size enabling small files to be copied first saving time
- Saving clean web pages from a web broswer - Right-click web page in Mozilla Firefox, Google Chrome and click View Page Source, then CONTROL plus letter-A to select all code, copy and paste to Notepad in Windows 10 or Windows 11 to save cleaner code to be able to read
- heictojpg.com for converting HEIC images from 8th generation 2021 iPad to JPEG - also downsampling images or photos with getpaint.net to 800 by 600 pixels using automatic aspect ratio resizing makes photos ideal size for embedding in web pages creating more meaningful content supplemented with text
- Useful electricals - Amazon keeps long record of purchase history, External portable SSD hard drives, steel pins to eject SIM cards, mobile phone companies, the cable you need to connect a Sata SSD hard drive to a desktop PC, a Bluetooth lightning mouse to do more with iPad copy paste large junks of text, a microSD card to separate files from built-in storage on your mobile provide add-on storage enable factory phone resets, and an SD card reader to back-up camera photos
- External separate stylesheet versus inline CSS style sheets - CSS code snippets embedded in an HTML page can result in unified single pages useful for people to document work, share knowledge, make complaints - also use of page templates as well as copy and paste can enable code snippets to be copied to maintain consistant user experience and web page navigation
- The data encapsulation process, the four layer TCP/IP protocol stack for Internet communications with Application, Transport, Internet and Network Access Layers, the importance of audits, computer serial numbers for insurance purposes - also how to isolate where there are faults in a network with routers
- Error checking to ensure smooth install of Windows 11 first time - Perform a Cyclic Redundancy Check or md5checksum on a downloaded Windows 11 ISO file from a Windows 10 computer also set up a Domain Controller on Windows Server
- The Transport Control Protocol 3-way handshake for reliable communications with an acknowledgement over the Internet
- Connect to a Windows 10 computer also to a Chromebook to view (child) screens from an Apple or Android device also Chromebooks as dumb terminals dependent on online or cloud services
- Wide range of antennas for multi-site organisations in a city to build their own private network but Internet services can offer great savings - Virtual Private Networks can encrypt private communications mask identities also enable TV viewing from banned countries
- Tree, Ring, Bus, Star and Mesh network topologies are the main network design structures for computer networks. The Internet is a Mesh network and mesh networks offer the most redundancy, make for the most resilient information flowing networks but are harder to manage also more expensive with both equipment and human costs
- Warriers of the Dot Net video explains how data is moved across the Internet - also in the beginnings of the Internet Microsoft demonstrated abusive behaviour to suppress rivals bundling its web browser Internet Explorer with Microsoft Windows - The Internet is a mesh network topology lots of redundant network links built with routers and switches
- How to set up the Apache2 Web server on Ubuntu Linux with a MySQL database and install Wordpress
- Setting up a web server - store-and-forward switches and cut-through switches versus routers
- More documentation user support as well as software is available for older computers legacy devices, even specialist software, bespoke software for particular industries but virtualisation software can run older versions of Windows on Linux for example - also older versions of Windows can be run on Windows 11 with Oracle VirtualBox
- Historical and significant or really the key developments of computing and software development in recent history
- Windows error messages can often be solved by waiting, computer reboot, shutdown also Control Alt Delete and Windows Task Manager can close running hung processes - use of video can show historical events enable multiple witnesses
- Shortcut key CONTROL plus scroll backwards and forwards to change visual icons to Medium, Large, Extra-Large in a File Explorer or Windows Explorer window view to magnify visual data on Windows 10 or Windows 11 - important to check also all images or photos also videos download to a computer and some photos do not get stuck in the cloud
- Determining photos or videos stuck in the cloud, identifying them for copying making duplicates also copying just the files that have not been previously duplicated to save time
- Publishing online requires effort enables better presenting or organisation of files also arguments and past events have been told from multiple perspectives - paper documents copied converted into electronic format do enable wider distribution, sharing also potentially educating someone else in another country
- Modern iPhones often shoot wider angle viewpoints also perspectives better quality video when held in horizontal mode - keeping data also files, photos and videos can enable real people to move to a different home or country
- A contents of links plus scrolling gives user choice enhances understanding - Newly created informative articles at the top of a page can help returning visitors see new content and what has changed. Creating articles using headings and bookmarks in HTML can isolate segments of content into independent blocks ensuring content makes sense
- How to send emails to multiple senders with Outlook.com - click To in new mail message, click plus next to Contacts can select multiple Contacts and click Save - Video evidence often more authentic enables the truth to be borne out really shows over tells enables playback of events what happened in the past
- Publishing and sharing photos and videos can show a person's whereabouts actually make identity theft harder for criminals and naming conventions in computer filenames can help with making sense of the past - naming conventions for filenames can make embedding images in web pages more efficient, plus auto suggestions and auto corrections usually enable web users to get more help
- Understanding file sizes with Windows Exporer on Windows 10 or Windows 11 using the Detail view and also the computer mouse left and right click buttons can be changed to suit right and left handed people
- The history of the personal computer for the home and also background on programming languages - also primitive computers were error prone and real people made many costly mistakes
- Essembly language more user friendly than binary and such low level difficult to learn code is often used to create device drivers to get a physical component linked to a computer to work - all Internet connected computers have a binary IP address
- Inside Babbage's CPU or Central Processing Unit as drawn on whiteboard by Aberdeen College lecturer Chrissie Williams
- Essembly language very specific, detailed in focus - result device drivers coded specifically for a physical hardware component making it hard for users to find device drivers
- First computer programmer woman Ada Lovelace - Amstrad by Alan Sugar really designed for games and loaded casette tapes
- Lots of casette tapes still in circulation and some old songs are a classic only on casette - Computers and Integration help people to prolong their existing music collection and convert to more modern digital formats
- What is a document management system? Aberdeenshire Council use random non-sensical numbers in response to incidents flagged or reported by Council tax rates payers increasing confusion and frustration rather than meaningful names often and some incidents can take 28 days to be investigated with a full response
- What does a document management system do?
- Document Management Systems - What security mechanisms can be employed? Aberdeenshire Council use Active Directory and Group Policy to control user behaviour rights to resources also from a central location for IT systems
- Document Management Systems - What are the implications on resources?
- What are the sources for document management systems?
- You need to be proactive to be heard have your say in an online world — Digital resiliance is an important skill to be mastered by everyone and can be achieved with multiple methods of communication, patience and persistence
- Threats to the digital world you should be aware of to be vigilant on the look out for
- Mistakes and human errors can happen - testing for errors and debugging core and important part of software application development also web development and involving real world users soliciting feedback can spur on improvements to make users more productive
- Control plus scroll — Control key plus mouse scrollwheel can increase text size, also documents can fit the screen better - Flux software works to dim computer monitor at night when dusk or darkness falls
- Switch off mobiles in hospital common request in past but no more due to Radio frequency interference - new medical equipment can improve patient experience allow patients to keep working also with mobile connectivity while recovering and recuperating
- Access to data and digital services from everywhere only possible with distributed services and data - collaboration between real people positive on a fragile planet or shared world
- Spread Spectrum digital communication systems underpin modern wirless communication systems such as mobile and through the air communications - Being good at wireless maths really comes into its own when dealing with data signals and signals sent through the air to far off places even other world or planets. Crucial to understand is signals can weaken substantially, degrade to the point there is a often a need for real patience with technology and the need to innovate and experiment in an often error prone environment
- TVguideapp.co.uk app for iPad enables pick and choose what's on TV versus TV guide magazines which often have crosswords with mystic or cryptic clues and puzzles - also wireless signals sent since 1898 using antennas roof aeriels on almost every home and exploiting radio frequency signals linked to Contactless can cause money worries
- Microsoft Surface tablet with Windows 10 or 11 best for creating websites in HTML using Notepad and uploading using FTP client software also digital champions can prove immensely valuable
- Moodle free open source e-learning system used by both RGU in Aberdeen and Oxford University — Moodle is the really the accepted standard web based system for digital course materials
- Dot pub files require or need Microsoft Publisher or LibreOffice - Office Online via Outlook.com does not in any way have support for Publisher but Ubuntu most user-friendly Linux distribution or operating system comes with Libre Office out the box
- Rotating or flipping video files also slowing down video footage to really examine and analyse segments of video enabling a closer look with OpenShot Video Editor free and open source video software on Windows, Mac and Linux
- Surface tablet with one USB port enables data transfer from mobile, supports install of traditional or legacy Windows applications not through the Microsoft store but getting it on may be problematic since not always on like iPad
- Right click anywhere Windows 10 Desktop to change screen resolution and make content bigger, also more leigible also show more detail on your screen - also clearly distinguish photos from videos when you connect your mobile to Windows 10 computer to copy files
- Deploying technology and Facebook enables censorship really well - create a Custom List to share information, photos and videos with certain friends
- The British Computer Society, the European Computer Driving Licence and Scottish charity Computers and Integration core skills training
- Professional Societies - Professional Institutions — Computers and Integration provided training in British Computer Society certified European Computer Driving Licence which sought to help the most vulnerable get their hooks in computing to really invent hi-tech products and digital services help others - Motability car and scooter scheme for disabled people funded through Personal Independence Payment
- Broad ethics to oversee computer use and respect fellow humanity to enable greater fairness
- Rumble.com video sharing site makes it a doddle or real easy for users to copy the web link of the video also an embed code for inserting a video in an HTML web page - easy too to add when and where meta info about video
- Dynamic scrambled web addresses often from news publishers needlessly long and complex due to database driven sites - web pages created with native HTML and CSS can make it easier to preserve history and web page content long term so digital literacy can aid public safety
- What one volunteer James learned at Computers and Integration in Inverurie
- The basics of first aid and helping someone in distress - also ability to use someone else's iPhone and bypass security controls for emergency calls and medical info
- Windows 10 has built in mapping software that works offline — sharing videos first on Facebook can establish trust and authenticity form friendships even before video files themselves get shared or passed around
- Windows 10 set a new password for a user account when locked out — Software writers often write code to make calls and reference particular Application Programming Interfaces which are in effect a software library or repository. Programmers create APIs to enable reuse of code - creating an API is time-saving and cuts down on duplication, they also enable teamworking, sharing, collaboration and co-operation
- Web page coding tutorials from w3schools.com - HTML and CSS best to help people understand, interpret and make sense of data to provide insight, analysis and discussions - also backing-up websites with Snipping Tool small in size screenshots can help to show evolution of an organisation when images trimmed in future
- Clear step-by-step instructions can really benefit women, easy to remember passwords and data back-ups can benefit everyone
- Renewing domain names important to keep company emails working without interruption and here are MX or mail records for Gmail to point to Google's mail servers - also standards can foster great progress
- Photos and videos direct transfer from phone to separate SSD hard drive versus cloud or online storage apps - benefit of direct transfers is you can choose to share videos with YouTube, Facebook or store in online storage OneDrive and Dropbox
- Refreshing web pages ef-five F5 key shortcut necessary when web users real people return to pages and websites - new details or changes, pages as well as links can be missed without refreshing
- Crowd sourcing for jobs enables businesses to leverage economies of scale and opens up employment opportunities for those whose first language may not be English even if jobs are mundane and pay is not great - also Amazon Mechanical Turk creates digital records of someone's work ethic
- Making a note creating a record of battery types and sizes written on packets can assist those with visual impairments with re-ordering of batteries and replacing lithium batteries in phones can prolong their life
- Need for diaries to recognise positive achievements also such diaries help to highlight emotional suffering also abuse, whereby people especially vulnerable persons can be helped early on
- Find device driver software for a legacy computer component or physical device to get your device working with newer computer operating systems including more modern versions of Microsoft Windows
- Aspect ratio and Sir Malcolm Bruce, Lord Bruce of Bennachie, Charity Patron
- OpenShot Video Editor free open source cross platform runs on Windows, Mac and Linux always with MP4 video files created with Android smartphones and removing audio from video clips is possible to respect privacy of those featured
- Keeping application software executable files on a separate SSD drive or an external hard drive can enable more efficient set up of Windows 10 or version ten for example when the need arises to perform a fresh install of Windows - also schoolchidren in Scotland tend to use Chromebooks and also Google Classroom
- Be productive with your computer using great software and capture problems — CamStudio and Screencast-o-matic screen recording software to capture user interactions and frustrations to enable help to be offered, Windows Setup Software Download, Office software with PDF import and edit and OpenShot free cross platform video editing
- Linux is an alternative computing platform to Microsoft Windows and comes in many forms - Google really made Linux popular with Android open source software encouraging many people to get involved in the development of a widely popular core computing platform with broad everyday appeal
- Making the most of the web, unleash its potential — Microsoft Azure for scalable web solutions, Crucial.com the memory experts, Down detector to check network status, Electronic Frontier Foundation for digital rights, Textfixer Doc to HTML, Eye Dropper, 500px.com view and share great photos
- Web Accessibility aid to check websites for access issues to support digital inclusion
- Help with hosting multiple domains using one web hosting account with 123-reg.co.uk, the UK's most popular commercial web host
- Content Management Systems can include Wordpress, Drupal, Joomla, Moodle learning platform used by RGU University in Aberdeen, Textpattern, Microsoft SharePoint for Intranets and Google Sites for easy sharing and collaboration
- Always copy photos first before videos when transferring files from your Apple or Android phone to computer to limit time wasted from disconnection errors
- Copying text on a web page on a website to Notepad and then put it in a Word document or email often makes content more readable in the long term - also How to create basic web page using HTML
- Paying close attention to dates can ensure digital content is preserved and also web hosting packages paid for by PayPal linked directly to bank accounts enables greater flexibility to cancel contracts, migrate web hosts
- Need to know IPS tag to change the owner of a domain name and the benefits of Web Forwarding
- Send either Small (48.4 KB), Medium (165 KB), Large (1.2MB) and Actual Size (4.7MB) single photos in an email using the Mail app on an iPhone model 2020 and more recently or later models
- Use cellular data, such as 3G, 4G or 5G to back-up photos and videos on the move via an iPhone to Dropbox online or cloud storage
- PayPal enables online payment flexibility, fosters choice and competition in digital business by enabling automatic transaction links to be broken
- Alternative commercial web hosting firms in the UK and the importance of planning websites to broaden social inclusion
- PHP Server Side Includes and or planning a website as well as keeping website navigation simple can scale up websites created solely with HTML and CSS which are often more accessible to more web users
- HTTrack website copier open source free software makes it easy to back-up or copy website files
- Intellectual Property and Computer Software Definitions and Examples
- Keyboard shortcuts can be time-saving and Control-Alt-Delete can close an application causing issues on your Windows 10 computer
- RBS viewing income and credit deposited in your bank account for calculating your real income useful for tax purposes and tax reporting
- Great useful websites and online services including retailers that offer a personal service
- Windows 10 Setup with core applications and use of Personal Hotspot and mobile data
- Unfair cookie law on 25 or twenty fifth April 2022 — Facebook encourages social news, moves users forward but computers can better enable analysis of past content posted online and give others fond memories — also cookies on websites help minority web users that rely on assistive tecnologies to use websites foster digital inclusion, but EU laws put barriers in the way and force users to choose whether to accept or reject cookies
- Watching Mov or Movie files produced with an iPhone or iPad for free on Windows 10 or version ten without having to purchase special software called codecs with the K-Lite Codec Pack
- Save time by installing multiple great apps on your Windows 10 or version ten computer using website Ninite.com
- Creating a contents of links with web page headings as bookmarks for ease of navigation and an at a glance look at content with descriptive, snappy headings
- Free web hosting available from Infinity Free with a MySQL database and PHP web programming support
- Websites with social media links can cut down on the amount of storage websites require
- Free web hosting makes great start for those new to creating websites
- PHP web programming language often used for web forms including surveys and gather opinions, influence policy
- Creating a website with Infinity Free — making a note of account details can help you recover accounts
- Bots and online robots often overwhelm websites with data, knock them offline and perform many tasks quickly to an unfair advantage of users whom are not so tech savvy and not so digitally competent
- Bridging the digital divide and helping users make the most of digital services can help makes lives more enjoyable
- Aberdeen City Council have a do it online culture to improve efficiency in an independent living online age
- Denial of service attacks and port scanning often used to knock websites offline
- Create a free website with Infinity Free web hosting provider for absolutely nothing
- Infinity free web host — also often no need to purchase domain name to create a website, give yourself an established online presence
- Infinity free web host — Managing websites and noting details important to recoving account details and managing multiple websites
- Uploading files also whole folders with Infinity Free web hosting free online provider of websites
- Infinity free web host — Note the web address of your new website and learn how to log out, keep your website secure on a shared computer
- Google Drive enables management of documents, spreadments and presentations as well as upload of folders multiple files
- View stylesheets for presentation of web pages in a web browser when they are scrambled or unreadable on your Windows 10 computer to make sense of them
- Computers and Integration have long supported those with disabilities — sharing information contributes to education and can have immense public benefit
- Digital works can record events
- Stock photography and reuse — change outside constantly happeneing
- Pay close attention to file extentions whether uppercase and lowercase when creating web pages
- Photos often have detailed, specific info or information attached such as pixel width and height as well as date created and date modified - also data back-ups may save your bacon and help you
- How to take screenshots, crop images or photos with Windows Snipping Tool or Snip and Sketch
- How to really crop images in detail and cut photo file size with Windows Snipping Tool — Windows Start menu can prove invaluable as can creating shortcuts
- Creating folders with filenames with the date may help you in future reference events when you name a folder with a date and also a descriptive title to mark a special event or a place visited
- Visual verification cuts errors or human erata we all make mistakes — Viewing web pages visually in a web browser helps cut out or down on mistakes when typing code in native or raw in HTML
- Choosing the best aspect ratio or photo appearance to really make your photos stand out and improve the quality of the message when you shoot video — zoom in or magnify content and out on your smartphone
- Adding descriptions to photos on Facebook can add meaning, explain location and adding full stops prevent annoying auto suggestions which can change descriptions
- RBS mobile banking approving a tranaction for online transactions is done on first screen from log-in and it can be easy to miss when you make a payment
- Mobile operator EE or Everything Everywhere give you good value rolling calls, texts and data — 250MB data for 5 pounds a month with 500 texts and 250 minutes at present 10 or ten April 2022
- Rumble video — Scandinavian Nordic walking stemmed from basic security to keep people safe
- Rumble video — Open source software and hi-tech mobility aids enrich quality of life
- Cromebook Pros and Cons
- Copying Pages files to Dropbox on an iPad 8th generation 2 April 2022 — native Pages documents enable magnification of content on the small screen with Presenter mode
- Foldable phones show tremendous promise to enable better decisions and Galaxy Fold 3 comes with Flex Mode to enable video calls and note taking
- How to use your smartphone as a torch and be prepared for freak weather and storms
- How to retain data long-term
- Save as JPEG for the widest possible access to image data and for compatibility with Android and Linux
- Finding photos and videos you upload in Microsoft OneDrive and Dropbox
- How to end your eBay listing early if you have got cold feet about selling your item or it is lost or become damaged?
- Lost your mobile phone or had it stolen and need to access your RBS bank account?
- How to create a bootable USB flash drive to install or repair Windows 10 or 11
- How to fit Windows 11 onto a bootable USB flash drive since the installation files are larger than a standard DVD
- Preserving data, videos and embracing a digital identity while staying mobile
- News with a focus on disability and technology
- Best iPad Apps
- How to find good stuff on the Internet — tips and techniques for effective Google searching and useful sources of information
- Useful sources of information
- How to Create a Corporate Website with HTML, CSS and PHP
- Google News Showcase — news aggregate service – news from many publications and news outlets on one page
- Set up your computer in a safe way and place
- Adapt your computer to meet your needs and maintain good posture
- Computer basics – hardware versus software
- How to discover what version of Windows you are using
- Manage the contents of your computer – monitor free disk space
- Download, Set Up and Run CleanUp to free up disk space
- Profile your computer or list all your computer's components
- Stay Safe Online – keep your copy of Windows current
- Thwart the main online threats — keep your antivirus software up-to-date
- Thwart the main online threats — stay clear of software that spies on you
- Thwart the main online threats — Do not install malicious software or Trojans
- Thwart the main online threats — Do not let bad guys take over your computer, cut the risk of falling foul from hackers
- Stop hackers — Make sure that the "Windows Firewall" is on
- Stay clear of fake security software or scareware
- Do not install plug-ins when browsing the Web – be inquisitive, find out who makes plug-ins first
- Set Up new security software — Remove your existing anti-virus software – also procedure to remove programs from your computer
- Download free antivirus (Avast) and antispyware (Malwarebytes) security software to your computer
- Using e-mail safely — spotting scam e-mails, the hallmarks of scam e-mails and best practice guidelines to stay safe
- Safely shop and bank online — help and advice to check on security certificates of websites
- Hide your "Facebook" profile from strangers and restrict the visibility of your friends list to yourself
- Protect your privacy and identity — Create good, strong passwords that are easy to remember
- Set Up and Run "CCleaner" on your computer to clean your computer and clear traces of your activity
- Best practices for your online life
- Maintain your computer — Keep your files and e-mails safe and speed up your computer
- Get help and support with your computer and troubleshooting tips for computer startup problems
- Run "System Restore" to solve software problems with your computer
Caring for your computer
Liquid cooled computers might help to cool down computers in an age of global warming and Important to understand the term condensation to build more electric and hydrogen vehicles for sustainable transport to help people move around
Liquid cooled computers might help to cool down computers in an age of global warming - https://www.acer.com/ac/en/GB/content/predator-series/predatororion5000?
Condensation is the process where water vapor becomes liquid. Condensation also linked with the clouds and water vapour going into the clouds after rainfall and also water vapour is emitted from hydrogen fuel cell vehicles.
So condensation is the link when vapour becomes liquid. Consider also at the time of writing liquid cooled computers involve water inside a special part or chamber of a computer.
Coming out the back of petrol cars in the Kingswells countryside in Aberdeen capturing it in video, water vapour came out the back. So petrol cars go through a combustion engine from petrol to water vapour coming out the back - water vapour emitted from the exhaust along with fumes think carbon monoxide the poisoneous gas so really hydrogen cars are cleaner combine with electric to pack a dual punch of sophistication.
It is one thing to understand concepts - it is quite another to build technologies. People need to understand first and educators need to be ahead of their time also time is needed to build new technologies and really oil is running out but there is perhaps still a while.
Important to understand the term condensation to build more electric and hydrogen vehicles for sustainable transport to help people move around.
Prepare to Switch off Analogue Radio and Mobile Proxy IP and also Mobile Proxy IP assists 5G wireless radio technology - Really preparing people to switch off AM FM radio is important to accelerate adoption to 5G free available spectrum - mobile proxy is a gateway that assigns a device mobile IP address rather than a residential IP or a VPN - mobile as in mobile data not broadband via fixed line also WiFi often wireless extension of fixed line Internet linked to a home or office
Adoption to 5G and your fast mobile data access on the move and from anywhere is being held up postponed switch off for analogue radio not until 2032 big problem here for the nation the United Kingdom not ready in real terms - this harms the building and adoption of digital services.
Daily Mail news Website from 3rd July 2020 - Big radio switch-off is DELAYED again: AM and FM stations will be available on old devices for another decade as switchover from analogue to digital is put off until 2032 https://www.dailymail.co.uk/news/article-8485629/Radio-fans-listen-FM-decade-digital-switchover-off.html. Nearly 60 per cent of all radio listening is now done through digital - Analogue had been due to begin turning off in 2015 but this was put on hold.
Inter-Access Point Protocol or IEEE 802.11F is a recommendation that describes an optional extension to IEEE 802.11 that provides wireless access point communications among multivendor systems.
802.11 is a set of IEEE standards that govern wireless networking transmission methods.
Multi-vendor is linked to competition between businesses and tech companies - important for different devices owned by different vendors or makers to talk between each other and exchanges data messages.
This is one of the fundamental purposes behind the Institute for Electronic and Electrical Engineers.
IEEE Standard for Local and Metropolitan Area Networks - Port-Based Network Access Control.
Port-based network access control allows a network administrator to restrict the use of IEEE 802 protocol LAN Local Area Network service access points (ports) to secure communication between authenticated and authorized devices.
However, the IEEE 802.11f Working Group will provide a standard for wireless roaming - 802.11 protocol standards often range from 802.11a to perhaps f there is a range separated actually by radio frequency. Radio in Britain actually is both FM and AM at the present time along with digital DAB radio during August 2022 and older cars may still have analogue radio so Government scrappage schemes for cars can get older cars off the road, free up radio spectrum for a move to 5G radio signals.
Many people will have bought new cars with digital radios - even though cars during 2012 came with digital radios they also came with AM and FM. Really preparing people to switch off AM FM radio is important to accelerate adoption to 5G free available spectrum.
Freeing up spectrum is a consideration to move to 5G and actually radio switchover ending analogue radio is slow.
IAPP achieves roaming within the same subnet.
Level 2 Roaming is achieved by using the re-association process.
When the client moves out of the signal strength of an AP or Access Point, it re-associates with another AP in the same IP or Internet Protocol subnet.
Separate networks linked to a router actually may use a different subnet or a sub network with a different network address - separate networks or subnets independent network segments may stem from a router which is like a roundabout filters network traffic also data packets.
Level 3 three roaming allows users to roam across different subnets - level three 3 or three is linked to the Network layer of the OSI model - OSI is OpenSystems Interconnection it is a model to understand data networks. IP roaming enables seamless roaming since IP data packets are standard and IP data packets are independent blocks or messages with information or payload message data.
Standard Mobile IP.
Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address.
Mobile IP for IPv4 is described in IETF RFC 5944, and extensions are defined in IETF RFC 4721.
Proxy Mobile IP
A mobile proxy is a gateway that assigns a device mobile IP address rather than a residential IP or a VPN - mobile as in mobile data not broadband via fixed line also WiFi often wireless extension of fixed line Internet linked to a home or office.
In other words, mobile proxies make it look like their user is connected to the Internet via a mobile data network, masking their real address.
Standard Mobile IP requires Mobile IP software to be installed on all clients.
Proxy Mobile IP does not require Mobile IP software to be installed on all clients, however it does require the correct IOS image to be installed on the routers to support the Home Agent/Forwarding Agent function - Cisco router computer operating system is loaded as an ISO image known as Internetwork System Operating System.
Computing is full of acronyms and abbreviations - they represent shortcuts in a sense, learn the meaning and actually the short terms make more sense when applied in a particular context. Definitions and meanings are really important, can help people form links, connections and connotations perhaps form pathways and make leaps from one concept to another this is like stringing pieces of information together perhaps called or known as synthesis a higher cognitive skill.
The Access Points also require Proxy Mobile IP to be configured.
Level 3 Roaming is achieved across different subnets with an IP Internet Protocol address on one subnet moving to a subnet with a different IP addressing scheme. IP basis for Internet but in the past some networks were different ran IPX networks from Novell networks - important to understand how the Internet has developed, it has involved from different networks that spoke different languages. The world is diverse there are many native tongues or languages but English is International in a sense, important to keep terms simple to help foreigners to understand complex topics, break down complex difficult to understand topics to advance progress.
Routers act as Home Agents (HA) and Forwarding (or Foreign) Agents (FA).
When a client moves from an Access Point on one subnet to an AP on another, the new AP queries the client for its Home Agent. Computers send messages to routers known as Acess Points and individual computers are known as clients. There is a client server exchange between a user computer and a server computer.
When a client moves from an Access Point on one subnet to an Access Point on another, the new AP queries the client for its Home Agent. Client computers when they move always seek a Home or base - base stations in 5G masts - every 5G mast needs to be within 1000ft and also you will need multiple masts within that range for load balancing to balance the load of network traffic across a particular area like a regional area of a place, a town or City - multiple 5G masts many 5G masts within a given area.
This will be a requirement for the future for fast Internet access on the move from anywhere also moving away from analogue radio will free up spectrum for faster 5G data services.
After the Home Agent is located, an IP Internet Protocol tunnel is set up between the Home Agent and Forwarding Agent.
This then allows packets to be transferred back to the client.
Tunnelling is used to bypass normal routing functions for example a client on one subnet accessing a router on a different subnet. There is Layer 2 Tunnelling Protocol for Virtual Private Networks also known as VPN networks - VPN networks useful for a court for example for video link for court cases to respect victims of crime and privacy in cases because victims may not want to be identified perhaps fearing reprisal attacks but also victims of crime may have done bad things in the lead up to an incident to provoke an attacker. Important to treat everyone with respect - some people can be more vulnerable.
Those that are vulnerable can be at greater risk of being both victims of crime but also they may commit crimes, but also someone deprived of money may actually commit crimes out of desparation. Most people want to live - really it is those who cannot speak and are confined to wheelchairs that are the most vulnerable.
Actually consider since the dawn of the new milllennium, the mainstream media BBC News did report that a diagnosis of Autism actually was becoming more and more common - really the condition really started to gain widespread acceptance and articles of late reveal such people have been locked in hospitals for several years when Scottish ministers around the year 2000 did say those with Autism should be within a community setting.
Aberdeen City Council 17 electric vehicle chargers that are publicly available - Some people need show and tell like to see technology out and about in the civic space - watching videos is show and tell and most learners remember more from visual information also some information from the Council is wrong bad information with errors
Tesco has started using electric trucks, a responsible big business thinks about the logistics of food transport still ordinary workers need to move around - it helps if they live locally to where they work to enable active travel this is an important consideration, but still it is possible to install or fit out an EV charger in a private dwelling like connected to your garage or home - charging EV batteries for electric bikes is possible in homes from your own home and would likely be practical during the night. EV or electric cars really the future - do not panic just yet, we will simplify understanding spread awareness breakdown complex technology so everyone can understand.
Aberdeen City Council provide a list with the locations of electric vehicle chargers that are publicly accessible - see https://www.aberdeencity.gov.uk/services/roads-transport-and-parking/electric-vehicle-charging-points.
This is useful but also providing copies and repeating also highlighting this information providing direct links can also be useful - Council web pages can also be deleted and change also verification in real life with images shared in real-time of electric vehicle chargers visiting them can reveal details clues also to how the underlying technology works. Visiting EV chargers may find people charging their cars who are available to explain more how they technology works.
Engineers can be clever - the best engineers are the ones that build or design new products not the people who explain how it works based on observation but writing about technology in a clear manner can accelerate adoption by the wider public and lead to more innovation.
Some people need show and tell like to see technology out and about in the civic space - watching videos is show and tell and most learners remember more from visual information.
From the engineers to those who talk up technology like the BBC's Technology guru Rory Cellan Jones, we all have a part to play even if talking about technology is met with resentment in some circles by people who see new technology as the enemy (older people may have lived without using computers) - new technology is disruptive technology also bleeding edge technology also cutting edge technology and slow roll out is typical of what's new.
HTML numbered or ordered lists use ol and li nested elements which each element like a bullet but with a sequential order represented by li. ol great for increment adding up by one showing quantity also showing the scale of something only 17 public electric vehicle charges across the City of Aberdeen thus far.
EV chargers work like Token Passing Network please sir can I have some more juice - juice is electricity or electrical current from Alternating Current. Direct Current goes to a battery - batteries have battery acid and it leaked in the Short Circuit film - the film about the robot that got struck by lightning and Johnny Five think I'm Holding Out For a Hero soundtrack signature tune from Bonnie Tyler.
Council website corrections - Danestone Community Centre car park, AB22 8ZP. One public socket only says Aberdeen City Council this is actually a twin socket, information from the Council not accurate and real-time on the ground visual inspection needed. Available 24 hours - all charges outside are available 24 hours but looking below some are inside car parks and not immediately obvious. Car parks sometimes have barriers and close so important to check opening times of car parks.
Fredrick Street usually associated with Nuart art on buildings painted by young people - Fredrick Street opposite Hanover street school near the road to the Harbour at the intersection with the beach boulevard in Aberdeen.
Satrosphere car park, AB24 5TU. One public socket only - most EV chargers have two charging sockets sometimes three so Council information on one socket may not be accurate, it is visual verification that assess accuracy of information in a real world setting on the ground. Available from 9am to 6pm important to check times - Satrasphere car park now known as Aberdeen Science Centre located beside Broad Hill on Constitution beside the old Matalan building - Matalan moved premises or locations.
17 public accessible EV chargers in Aberdeen - some in car parks with parking times and restrictions. Keeping more people moving more of the time is a big issue and priority also with respect of care for more vulnerable persons. Time is valuable not to be wasted this emphasis digital recording when travelling locally whether by car, bike or on foot. Digital recording and saving is also digital preservation for later analysis and review.
Information below copied from Council's website - found some mistakes so treat with caution, but do bear in mind most EV chargers have at least two charging points at each site not one, but important to verify. Three charging points one machine lower part Kingswells Park and Ride - Council information implies two ports or charging points but what is important is two cars charging on one machine, charging throughput is reduced increasing charging time.
Kilowatts and wattage can vary in real life on the ground, but Aberdeen City Council from their website advise three types of chargers - really we need deployment of lots of rapid chargers everywhere.
Rapid chargers (50kW DC/ 43kW AC) - capable of delivering an 80 percent charge in around 30 minutes
Fast chargers (22kW AC) - capable of recharging a car fully in around 3 hours
Standard chargers (7kW AC) - capable of recharging a car fully in around 6 hours
- Chapel Street car park, AB10 1ST (Ground floor by exit). Three public sockets. Available 24 hours.
- Frederick Street car park, AB24 5HY (Ground floor). One public socket only. Available 24 hours.
- Dunmail Avenue car park, Cults AB15 9LW. Two public sockets. Available 24 hours.
- Golden Square outer car park, AB10 1RD (opposite South Silver Street). One public socket only. Available 24 hours.
- Danestone Community Centre car park, AB22 8ZP. One public socket only says Aberdeen City Council this is actually a twin socket, information from the Council not accurate and real-time on the ground visual inspection needed. . Available 24 hours.
- Bridge of Don Library car park, AB22 8HH. One public socket only. Available 24 hours.
- Cornhill Shopping Centre car park, AB16 5UT. Two public sockets. Available 24 hours.
- Mastrick Road car park, AB16 5PY. One public socket only. Available 24 hours.
- Hazlehead Park eastern car park, AB15 5BJ. Two public sockets. Available 24 hours.
- Satrosphere car park, AB24 5TU. One public socket only. Available from 9am to 6pm - Satrasphere car park now known as Aberdeen Science Centre located beside Broad Hill on Constitution beside the old Matalan building - Matalan moved premises or locations.
- Kincorth Library car park, AB12 5NP. One public socket only. Available 24 hours.
- Aberdeen Royal Infirmary Eye Clinic car park, AB25 2WA. Two public sockets. Available 24 hours.
- Aberdeen Royal Infirmary Rosehill Annexe, AB25 2EH. Two public sockets. Available 24 hours.
- Langdykes Road, Cove Bay, AB12 3HW. Two public sockets. Available 24 hours.
- Exploration Drive, Bridge of Don AB23 8GX. Two public sockets. Available 24 hours.
- Kingswells Park and Ride, lower car park, AB15 8UN. Two public sockets. Available 24 hours.
- Tanfield Walk car park, Aberdeen AB24 4AN. One public socket only. Available 24 hours.
Treat information from Aberdeen City Council with caution - mistakes or errors found. Important to issue caveats which are warnings.
Double unit with 7kW AC Mennekes socket on each side. Can charge two vehicles at once.
- Gallowgate car park, AB25 1DL (North side by entrance). One public socket only. Available 24 hours.
- West North Street car park, AB25 1DR (Ground floor by entrance). Two public sockets. Available 24 hours.
- Polmuir Road, AB11 7TH (at rear gates to Duthie Park). Two public sockets. Available 24 hours.
- Kingswells Park and Ride, AB15 8UN (in upper car park). Two public sockets. Available 24 hours
Longer videos shared via Facebook also YouTube may discuss topics lead to more insight and informed decisions, but longer videos require more processing time (consuming resources such as memory and disk space also need for multiple threaded processors) at the server level to analyse content before videos appear or are displayed and are found online - Shorter videos or smaller video segments less file size can really make videos appear instantly on Facebook the social network platform also the big stories are the ones that affect more people like environmental impacts such as widespread flooding, raging infernos - shorter video files minimise focus on people who may have concerns
Longer videos shared via Facebook also YouTube may discuss topics lead to more insight and informed decisions, but longer videos require more processing time (consuming resources such as memory and disk space also need for multiple threaded processors) at the server level to analyse content before videos appear or are displayed and are found online - also indexing by search engines is usually delayed. Important for video descriptions to keep them concise linked to key search terms useful for indexing and making terms meaingful and infromative. Server computers may have 32 processes in a commercial company at the backend level not your traditional computer which may now have quad core processors or four processes hyper threaded to run together process more calculation per second.
Shorter videos or smaller video segments less file size can really make videos appear instantly on Facebook the social network platform for example - this is useful for scenarios involving news where events always move on. Shorter video segments better for meaningful events - a short video segment outside can show someone what is going on, show a glimpse to highlight a point, minimise focus on people who may be worried speaking to news organisations also focus on key terms and concise descriptions can be more informative against a backdrop of a crowded information world, help ordinary people read between the lines, get facts, straight talking facts - analysis can be useful examining events but opinions can bog down a narrative straying from the facts. Courts in Scotland focus on points of law and facts in a traditional sense - facts can be disputed but video is seeing is believing.
Important consideration is also unless a video is captured or a story is written about, events can pass by - some events can be sidelined - the big stories are the ones that affect more people like environmental impacts such as widespread flooding, raging infernos gripping nations sweeping across forests think forest fires also wildfires. Also political events usually make headlines this is also linked to media shining a spotlight on politicians and also national Governments usually have a media unit with communication professionals. Still some stories affecting individuals can be worrisome - more vulnerable groups of people can be more worried this can lead to worsening anxiety also mental health issues.
Watching set up progress bars and waiting around is often the hallmark of computer support - instructions to take screen grabs or screenshots with iPhone and Android also make and model of smartphone can usually be obtained from the About section of a phone like the cogwheel settings option on Android also the mobile number, also MAC addresses can be obtained to enter in a router restrict access to a network by device also IMEI slots usually shown in About menu - you may need to know corresponding numbers if you wish to unlock your phone that is linked to a particular network operator to change tariff switch mobile network operator to gain a better deal more value for money think more texts, calls and data for lower price point
IT Support specialists do actually need real patience with IT systems - often set up installations even deleting files can involve time spent watching progress bars - Window XP had a progress bar during installation of the core operating system - Windows 7 set up got faster and Windows 10 set up is often done and all over in 10 ten minutes on a modern machine or a computer of sufficient calibre or speed. Take an Android Galaxy smartphone store a lot of files on an SD card like thousands of files, it may take some time to delete files - move off the on screen dialog when deleting and the process of deleting may be interrupted but the deletion process follows on in succession meaning the deletion process carries on from where the underlying Android operating system stalled.
Deleting wiping hard drives can be time-consuming but so can waiting for Windows Updates - also think reboots to install and configure updates on Windows 10 ten and actually many users likely waste endless hours waiting for their computer to shutdown and configure updates. Users likely long for the end of the working day but days can be longer still waiting for Windows 10 ten to configure, update the slow laptop computer bogged down with malware or malicious software. Computer nightmares abound - writing about situations that users can relate to may win over users in the battle for hearts and minds. What do users feel this is the heart where emotions run high - frustrations down tools walk away, smash up the machine but understanding how technology works this is the head - need for analytical thinking and to break complex topics down, simplify also.
Understanding technology and digital systems may lead to greater empowerment also greater safety in the long-term, but need to stay calm and be patient for the steep learning curve against the backdrop of constantly changing screens and user interfaces - screenshots and screen grabs can capture the user experience.
A screen capture is possible from a mobile phone but can be complicated often involving pushing multiple buttons quickly may not actually be a simple matter.
Deleting twice on iPhone and Samsung Galaxy smartphones also in Windows 10 ten usually necessary - phones and Windows 10 have the Recycle Bin. Think your photos have gone? Check the Recycle Bin. Windows 10 ten recovery software is also available to retrieve deleted files from a computer - perhaps harder to recover files from smartphones and tablets. Deleting can be interrpted from screen changes, a tap of the user interface so need to watch a progress bar also screen off may interrupt deletion and Android smartphone screens go off more frequently than iPhone screen to save battery life but batteries on Android smartphones tend to last longer - iPhones can be memory also battery hungry charging daily a necessity especially when shooting video outside.
iPhone SE 2020 standard budget phone suitable for students also testing standard phones may appeal to more users broad base user base - press Home button and power button the wake screen off button together to take a screenshot or screen grab image, actually it can be difficult to get the timing right in practical reality and the Home button maybe disappearing from modern high end iPhones real shame Home button convenient like the Windows Start menu. Home button convenient also consistent help system on an iPhone familiar with many a user. Do not have the latest bells and whistles iPhone, you may not realise what features are new or missing also many models of phones and tablets are different - difficult also to tailor user support, but generic advice really can help and providing it takes understanding of different competing systems, knowledge also experience from trial and error or from hands on kineaesthetic learning.
Take Android Samung Galaxy range taking a screenshot can be complex - usually involves the power button and volume keys being pressed together for example holding down the power button and lower volume key pressed together. You may not realise a screenshot has been taken and you may end up with multiple screenshots also different phones may actually take screenshots in a different way but you can usually find out the right buttons to push by doing a web search using Google or Bing for example.
You may need to know the model of your phone but you can usually obtain this from the About section of Settings.
Settings menu clearly labelled as an icon on an iPhone - for Android Settings usually available from top right sub menu screen represented by a small cog wheel pay attention notice great detail get help from the Android Linux core operating system on your smartphone.
About info usually reveals your mobile phone number also the MAC unique address of your phone a hardware identifier.
Routers can filter devices by MAC address for security - devices can be inputted in a MAC address table in a home router for example to really control access to your home network.
IMEI slots usually shown in About menu - you may need to know corresponding numbers if you wish to unlock your phone that is linked to a particular network operator.
During the unlock process, network operators usually demand a number from an IMEI - unlock phones can often be sold on for more money, but also unlocked phones enables phone users to change tariffs switch network phone operators give greater choice, freedom and flexibility to change contracts usful for those who pay a monthly tariff. Shorter tariffs give more flexibility to switch mobile network operator and there is downdetector to check on the status of mobile network firms.
In computer technical support, IT professionals do repair computer systems, reinstall core operating systems like Windows 7, Windows 8, Windows 10 and Windows 11. Supporting older operating systems is known as legacy support and there are competing computing platforms like Ubuntu Linux but also Mac OS X Snow Leopard - there might have been a flavour called Lion. Mac lineage and knowing the variants - cannot afford the high price tag of a Mac or Macintosh computer? Or indeed have time to learn the nuances of the Mac computer platform? Macintosh computers usually the realm of high performance users also artists, multimedia professionals, possibly those who do video editing, compile music perhaps also computer programmers. Computer programming best with Linux to compile source code with ./configure, make and make install - ./ is used to execute application files in the Linux world. Fedora Linux is open source, free and usually the realm of computing departments at Universities.
In a nutshell, Watching set up progress bars and waiting around is often the hallmark of computer support - instructions to take screen grabs or screenshots with iPhone and Android also make and model of smartphone can usually be obtained from the About section of a phone like the cogwheel settings option on Android also the mobile number, also MAC addresses can be obtained to enter in a router restrict access to a network by device also IMEI slots usually shown in About menu - you may need to know corresponding numbers if you wish to unlock your phone that is linked to a particular network operator to change tariff switch mobile network operator to gain a better deal more value for money think more texts, calls and data for lower price point.
Downdetector check mobile network outage and which mobile operators have better uptime are more reliable compare Giffgaff, O2, Sky and Virgin for example - https://downdetector.co.uk/.
At Aberdeenshire Council HQ or headquarters Woodhill House where Police Scotland also have a presence, it appears a type 2 socket is used for EV electric vehicle chargers with 230 Volts - input is from power source and it is 50-60 Hertz 64 Amp 14.8kW per EV charger most chargers have units for up to 2 cars at a time, Output is DC Direct Current battery storage 230 Volts 64 Amp 14.8 Kilowatts, 7.4 Kilowatts per individual charger. Single charger output per Kilowatts is half the input from mains power source since EV chargers work like half-duplex - two charging points per machine is typical but at Kingswells Park and Ride one machine can hook up three cars lower part of the car park
Normally socket type 2 two charging plug and gives off 400 volts Alternating Current at 43 kilowatts is the opposite of Chademo charger or the Combined Charging System this is the opposite one. However, what some noted down in theory may not always be what is rolled out in practice.
At Aberdeenshire Council HQ or headquarters Woodhill House where Police Scotland also have a presence, it appears a type 2 socket is used for EV electric vehicle chargers but 230 Volts is used not 400 volts. So volatage at Aberdeenshire Council HQ is lower that what one might expect in practical reality. Close up inspection of EV chargers reveals details and photos actually enable magnification of details to examine what is going down with the view to breakdown EV charging simplify it so others understand. eVolve Smart S is the system used by Aberdeenshire Council. eVolt Charge Place Scotland makes the EV electric vehicle chargers for Aberdeenshire Scotland clearly marked A to B and Aberdeenshire Council ran for many years the A to B dial a bus service demand responsive transport for the frail and infirm. Big area Councils do tend to help more infirm frail users usually social work help disabled persons with day care. Day care centres have support staff and clients the disabled persons are the service users.
If support staff start struggling to make it into work, really the clients or day service users will experience more issues, worries, anxieties and frustrations often such users are given second thought by mainstream public in the workplace and commercial sector. Want to lead a transformation? Always start by helping the most disadvantaged.
Inputs come from electrical outlets like in homes or from mains power wired through cables in the case of EV electric vehicle chargers. This is Alternating Current. Outputs is DC or Direct Current and storage goes into DC batteries such as electric car batteries charged up by EV electric vehicle chargers. This is what happens at Aberdeenshire Council Woodhill House HQ.
Input Alternating Current 230V 50-60 Hertz 64 Amp 14.8kW 230 Volts 1P+N+PE. The last letters and digits namely 1P plus N plus PE is linked to circuit breakers and limiting fires - single pole plus N neutral blue circuit breaker, and control the fire line and zero line, but only the hot wire has the function of thermal magnetic tripping function. Circuit breakers are for electrical control. Use 2P and 4P when protecting ground. When N neutral blue lines are not open neutral, the modulus is 18mm - a circuit breaker with residual current protection on a single pole.
The basics of working with electrics is that water can be harmful, cause shocks and also how to wire a plug used to be basic school science but actually most electrical appliances became mandated to come with a plug useful for people who are totally inept with science like people who may have just a simple grounding in scientific concepts. Earth yellow green, neutral blue and live red core wires in a plug. Changing a fuse involves unscrewing the plug - a fuse is generally like a cylinder oblong also in shape. Fuses can be tripped - control boxes in homes may need a fuse replaced when the wrong wattage is chosen for an electric light bulb causing sparks in electrical wiring or in the roof.
For information on circuit breakers, see https://www.maxge.com/difference-between-1p-2p-3p-and-4p.html
Output Alternating Current 230 Volts 64 Amp 14.8 Kilowatts, 7.4 Kilowatts per individual charger usually electric vehicle chargers do two vehicles at the same time and charging power is reduced per single vehicle when two vehicles are connected at the same time. 2 times or x Type 2 Socket.
Short for ampere, an amp is the base unit of electrical current in the International System of Units and the word si is often used in Scrabble - language and word games good for children, responsible aldults play Scrabble with children to bring on their vocabularly learn synonyms alternative words and terms to breakdown and explain complex topics.
The Si unit of electromotive force, or the difference of potential that would drive one ampere of current against 1 one ohm resistance.
The relationship between current, voltage and resistance is expressed by Ohm's Law. This states that the current flowing in a circuit is directly proportional to the applied voltage and inversely proportional to the resistance of the circuit, provided the temperature remains constant.
Resistance is opposition to the flow of current. A high resistance means it is harder for current to flow through - just think make resistance harder on that exercise bike and it gets harder to move the peddles, produce kinetic energy or movement from energy. Bikes in homes and offices to power applicances has always been visionary. A low resistance means current will flow through more easily. Resistance is measured in Ohms. Low resistance think peddling quickly but try and peddle uphill and you have to contend with gravity - under water is a weightless environment with zero gravity known as floating like in outer space. Gravity is where objects fall to Earth.
In a nutshell, At Aberdeenshire Council HQ or headquarters Woodhill House where Police Scotland also have a presence, it appears a type 2 socket is used for EV electric vehicle chargers with 230 Volts - input is from power source and it is 50-60 Hertz 64 Amp 14.8kW per EV charger most chargers have units for up to 2 cars at a time, Output is DC Direct Current battery storage 230 Volts 64 Amp 14.8 Kilowatts, 7.4 Kilowatts per individual charger. Single charger output per Kilowatts is half the input from mains power source since EV chargers work like half-duplex - two charging points per machine is typical but at Kingswells Park and Ride one machine can hook up three cars lower part of the car park.
720p HD at 30fps is 60MB Megabyte per minute of video so around 30MB for half a minute - 25MB is the limit for sending short video segements or files in Facebook messages so keeping video length to 15-20 seconds could help someone get help from a friend - essential information the facts to convey maybe date, place (like Where), Who, What, Where, Why and When perhaps also How - good challenge for school pupils using iMovie on iPad
The iPhone modern version Settings app, then Camera, then Record Video. Modern options include generally 720p HD at 30 fps frames per second also 1080p HD at 30 fps and 60 fps. There is also 4K at 24fps, 30 and 60fps and 60fps is High Efficiency. The higher the frame rate basically enables more detail to be preserved when video slowed down for playback useful for preserving minute detail and scenes. Really that is the main benefit, but also higher frame rate 4K resolution better quality - Slo-Mo video on the iPhone of Slowed down video playback.
40 MB 720p HD at 30 fps or frames per second on an iPad 2021 model known as space saver for a minute of video - iPad slightly different from an iPhone SE 2020, file size going down better compression algorithm perhaps there is randomness and there is also subjective experiences linked actually to the objects being filmed great variation outside - the same background and consistent green fields for example will enable space saving due to the copying of pixels, repeating patterns of sameness or from the same texture or pattern enabling file size or file space to be saved.
Slowing video down brings to the fore the keyframes nature of multimedia and how it is linked to animation and storyboarding. Storyboarding and drawing key scenes like cartoons also comics is how animation is born and modern films like Toy Story are born from animation. Wallace and Gromit was plasticene figures - Wallace Gromit went to the moon but also Wallace put on trousers that enabled him to walk on ceilings.
720p HD at 30fps is 60MB Megabyte per minute of video so around 30MB for half a minute - 25MB is the limit for sending short video segements or files in Facebook messages so keeping video length to 15-20 seconds using 720p HD at 30fps on a modern iPhone such as an iPhone SE 2020 could enable someone to show a friend a snapshot of they are witnessing. Really skills in summarising information and doing it within 15 seconds to impart key or critical information could really inform someone enable a person in distress to convice someone else like a friend to take action.
Talk about summarising information, we talk about condensing being succinct putting in a nutshell and really the essential information the facts is date, place (like Where), Who, What, Where, Why and When perhaps also How. These provide facets actually to filter information and most people will struggle to convey all this information in 15 seconds or 15-20 seconds but really this is the challenge for schools and young pupils using iMovie on the iPad which makes video capture simpler and easy. Always a challenge getting video off an iPad without uploading and sharing.
At the time of writing 17th August 2022, iPhone SE 2020 advises the following on video file size linked to resolution and frame rate:
- 130MB with 720p HD at 30fps (space saver)
- 130 MB with 1080p HD at 30fps (default) - this is a decent quality actually to be fair most users will not notice the different between this format at higher frame rates, users may not notice any difference with 4K and differences usually subjective this is known as the subjective realm linked to user perception, but perceptions are intended to stimulate real world users to describe their user experiences, issues, workaround and frustrations to shape better future products provide feedback to developers. Decribing on video and sharing really is the gold standard for now and the future - real world situations are more real when played back in video and shared video enables shared experiences and allows others to witness and join in the experience.
- 175 MB with 1080p HD at 60 fps - Control plus letter-S always a great shortcut to Save offline files and avoid cut down on data loss, of course Google Docs autosaves in the cloud when users have an always on data connection. Data loss always results in frustration and repeating work can waste time also effort and businesses usually driven by profit, money saved enables businesses to employ more workers and leverage diversity.
- 270 MB with 4K at 24 fps frames per second (film style)
- 350MB with 4K at 30 fps (higher resolution)
- 400 MB with 4K at 60 fps (higher resolution, smoother) - higher resolution usually linked with more detail. Digital skills education is for everyone, highlighting benefits from slowed down video footage more detail might encourage greater use of video because people can use it to corroborate their view points also show what they have witnessed - still most disputes and conflicts occur off video but there is CCTV in various places but watching it must be boring with law abiding people going about their daily business - the power comes from skipping forward but with skipping, potential to miss great detail and people may miss minor significant details which could help bring out a message bring a theme to the fore.
Satellites in space for telecommunications support Britain island nation Naval defence and use of expensive satellite phones also 3G, 4G and 5G masts useful since satellites are limited by line of sight due to curvature of the Earth
Satellites in space for telecommunications support Britain island nation Naval defence and use of expensive satellite phones also 3G, 4G and 5G masts useful since satellites are limited by line of sight due to curvature of the Earth.
The first moon landing was Neil Armstrong in 1969 but visits to space occurred before this period.
The first human in space was the Soviet cosmonaut Yuri Gagarin, who made one orbit around Earth on April 12, 1961, on a flight that lasted 108 minutes - Mum was a teenager by this time, but Russia and America are the big nations in space and China and India plan to follow suit still Britain does put up satellites to support telecommunications, yet mobile phones rely on 3G, 4G and mobile phone masts - the use of satellites is also linked to SatNav emergency vehicle response and also food deliveries also support for online ordering, deliveries by couriers helping them find their way.
INSAT satellites have been traditionally supporting telecommunication applications for providing voice and data communications, so Britain putting satellites into orbit to support telecommunications is to support satellite phones to help seafarers (thousands of ships think food supplies also cargo or freight) also the Royal Navy and the Merchant Navy - Britain has a strong fleet of Navy personnel and also has a strong Naval defence base with Britain being an island nation - there is also Trident linked to the Clyde area around Glasgow where nuclear submarines are built or manufactured - think protests at Faslane and Tommy Sheridan, the socialist disgraced over an encounter with the News of the World.
Telecommunications, satellite phones also support more remote applications and remote connectivity from far away places also. Satellites can reach anywhere on earth, beam down radiofrequency signals but satellites rely on line of sight also linked to the curvature of the Earth - real world curvature of the Earth poses challenges for telecommunications so actually 3G, 4G and 5G masts are vital to provide seamless coverage. Consider also outer space can be hard to reach - requires rocket ships and liquid nitrogen.
Lidar is light direction and range also Lidar is measuring the time for the reflected light to return to the receiver - Important to use discretion when selecting information also question online sources challenge online information - Teachers may mark a pupil's work - some questions can have right and wrong answers, but actually it is constructive feedback for the grey areas where big improvements are likely to be found also help for the most disadvantaged. Dicussions are better supported in the digital ecosystem where learning gets recorded over a passage of time
Lidar light direction and range - is a method for determining ranges (variable distance) by targeting an object or a surface with a laser and measuring the time for the reflected light to return to the receiver.
So Lidar linked to lasers - fibre optic cables use lasers also and lasers can have fine wavelengths also wavelenths can be fine tuned or honed for a particular application like for lazer eye treatment to ensure careful precision.
Shorter wavelengths may be preferred in a fibre optic network on the backbone of cable, trunking or raceway, to ensure higher fidelty light signals travel intact through a light-guided medium which is intended for high speed data transfer.
Multi wavelengths can be classed as multimode fibres - also important to use discretion when selecting information since information shared online can be wrong - people can make mistakes, mistakes can harm reputations but also accurate information when people are diligent may enhance reputation.
Still experts may disagree over points - sharing information may lead to improvements and drive people on lead to more innovation. Technical details is about what works and what does not work and also documenting problems, issues and workarounds may lead to learning promote or foster advancements when lessons are learned. The bedrock of progress is lifelong learning - the spirit of humility actually, admitting wrongdoing, seeing errors in ways and seeking to always move forward making corrections.
A teacher may mark a pupil's work - some questions can have right and wrong answers, but actually it is constructive feedback for the grey areas where big improvements are likely to be found. Dicussions are better supported in the digital ecosystem where learning gets recorded over a passage of time. Events in life can be unpredictable and there can be moral dilemmas - big issues that need thrashed out, debated and addressed - this also linked into divergent points of view and democracy. London is the City really that represents the world - the most diverse of views and view points and actually it is often the City with the most trouble and attracts attention. Big investment gone into London and the south of London think upmarket business district Canary Wharf.
The three main wavelengths used for fiber optic transmission are 850, 1300, and 1550 nanometers. These wavelengths are used in fiber optics because they have the lowest attenuation of the fiber.
Lidar is used in a wide range of land management and planning efforts, including hazard assessment (including lava flows, landslides, tsunamis, and floods), forestry, agriculture, geologic mapping, and watershed and river surveys.
In a nutshell, Lidar also selecting and challening information - Lidar is light direction and range also Lidar is measuring the time for the reflected light to return to the receiver - Important to use discretion when selecting information also question online sources challenge online information - Teachers may mark a pupil's work - some questions can have right and wrong answers, but actually it is constructive feedback for the grey areas where big improvements are likely to be found along with helping the most disadvantaged. Dicussions are better supported in the digital ecosystem where learning gets recorded over a passage of time.
Antennas and The Fresnel Zone - Fresnel is an area around the visual line-of-sight of a sender or receiver of data like the visible horizon off an axis that radio waves spread out into after they leave the antenna like in a long wave and wireless signals can have a far field through the atmosphere - also there are multiple different types of antennas which emit signals in different directions, with different considerations for placement, signal intensity and range in some cases or instances
The Fresnel Zone (pronounced frenel) is the area around the visual line-of-sight like the visible horizon off an axis that radio waves spread out into after they leave the antenna like in a long wave and wireless signals can have a far field through the atmosphere. Contrast a wireless signal going from the ground to outer space versus Near Field Communication which is like RFID chip in a bank debit card for Contactless payment in a shop, store or retail outlet.
The Fresnel area which is the visual line-of-sight around a transmitter must be clear or else signal strength will weaken.
The Fresnel Zone is an area of particular concern for 2.4 GHz wireless systems - the other spectrum area is 5Ghz - for a period mobile phone use was banned at hospital sites due to mobile signals interfering with medical equipment. Certain equipment can share frequency bands.
Simultaneous dual-band routers are capable of receiving and transmitting on both 2.4 GHz and 5 GHz frequencies at the same time. This provides two independent and dedicated networks which allows more flexibility and bandwidth. Routers and network adaptors can operate on different channels - pick a wireless channel for your computer or network interface card and be careful in order to avoid interference for example as a rule of thumb or best practice pick channel one 1, 6 six or 11 eleven for close by devices to avoid signal interference - network monitoring software can help to limit or avoid interference but some people may use such software to sniff data packets and steal or misappropriate data there are good intentions versus bad intentions when it comes to using digital technology.
Although 2.4 GHz signals pass rather well through walls, they have problems passing through trees - with 5G there is a need for mobile masts every 1000ft so more masts more often can limit signal loss from environmental factors.
The main difference is the water content in each, walls are very dry, but trees contain high levels of moisture.
Radio waves in the 2.4 GHz band are absorbed easily by water. Absorption is how a sponge works to soak up water and when floods happen sand bags often used - the opposite is drainage and Surface Drainage removes excess water from the land's surface through channels or ditches. There are also Subsurface Drainage Systems, Slope Drainage Systems and Downspouts and Gutter Systems - most homes have a gutter and home owners usually need to clear gutters from time to time. Gutters can collect water when it rains but also they can get blocked - fill up and also birds can nest in rooftops and gutters can collect leaves from trees.
Subsurface drainage systems used often out in the countryside fields and are commonly used in areas where soil will not drain quickly on its own. Many agricultural fields require such systems to prevent crop flooding and allow work to continue.
With Radio waves in the 2.4 GHz band are absorbed easily by water, this is why microwave ovens (which also use the 2.4GHz band) cook food. Microwaves and intense heat can evaporate water. Water absorbs the waves, and heat from the energy cooks the food.
It is important to take the Fresnel effect, which is the area around a transmitter affecting line of sight, into consideration when designing a wireless network.
Line of sight between antennas may not be in a straight line so wireless signals may bend actually, get lost, attenuate, weaken or disappear altogether into an abyss, but the ellipse is produced in the Fresnel Zone.
Accurate antenna alignment can be aided by:
Using a balloon to establish height - helium balloons drift away up into the atmosphere when let go off and rockets use liquid nitrogen as fuel linked also to helium.
Binoculars or telescope - telescope look into other galaxies into outer space like Hubble and the successor the James Webb telescope launched around Christmas Day 2021.
Global Positioning System (GPS) is based on multiple satellites relaying signals which are messages carrying a data payload.
A strobe light at night - strobe lights can be linked to flares think a distress flare fired at sea by a vessel in distress. Flares also smoke signals - smoke can be visible for a long way think Iceland volcanic ash clouds in the past. Strobe lights, flares and smoke signals connected by virtual to antennas in a sense in principle since an antenna is about the transmission and reception of signals through the air a translucent medium. Translucent means allowing light, but not detailed shapes, to pass through; semi-transparent. Light-guided fibre optic signals use light it is a light-guided medium. Signals can be blocked by objects whether in a light-guided medium or over the air through wireless so really all signals in a data network are translucent. Wireless signals result in better data transfer for shorter range line of sight signals - data rates may slow down the further a mobile user is from an Access Point such as in a home when a user tries to connect to a router.
The curvature of the earth needs to be considered when a link is longer than 7 miles (11 kilometres) - Line of sight disappears at 16 miles (25 kilometres).
At long distances, the dish antenna like a microwave requires additional height to compensate for the bulge of the earth.
Attenas that may be used with access points discussed together with their signal direction, placement, signal intensity and range in some cases or instances.
- Rubber Dipole is an omnidirectional antenna signals going in every direction - Approximate Indoor range at 1 one Mbps is 300ft, range at 11Mbps is 100ft
- Pillar Mount is a directional antenna
- Diversity Patch Wall Indoor/outdoor unobtrusive medium-range antenna around 6.5 decibels
- Patch Wall directional attennas - Indoor unobtrusive medium-range antenna (may also be used as a medium-range bridge antenna around 9 nine decibels
- Ceiling Mount Diversity ombidirectional antenna - put an antenna in the roof and perhaps there will be less interference from users to Access Point, objects on the ground can pose interference with due regard to transmission and reception of signals. Around 2.2 decibels.
- Ceiling Mount High Gain Mast - taller aerieals or masts in a ceiling or outside think 5G masts or TV transmitting towers using Ultra High Frequency Signals can cover a much wider area. Really tall masts enable signals to cover larger geographic distances with less penetration and signals being obscured by objects on the ground - objects can affect line of sight with due regards to transmission of signals. Ceiling Mount High Gain Mast may be typically Indoor medium-range antenna, typically hung from cross-bars of drop ceilings around 5.2 decibels.
Electrics, dynamo, alternator and battery make up an electric car also electric vehicles are self-starting and Lithium Sulfur future batteries for EV vehicles - also Semi-Autonomous Braking uses sensors to predict a crash and apply brakes and EV vehicles may come with Blind spot monitoring, Lane Departure Warning System controls steering rack, Traffic Jam assist - acceleration, braking and stopping at speeds of 40Mph also Active Parking Assist is car parking itself also finding a car parking space and LiDAR is light detection and ranging
Electric cars and autonomous vehicles.
Argyll was the big motor name in Scotland early 20th century. The Alvis Leonides was an air-cooled nine-cylinder radial aero engine first developed by the British Alvis Car and Engineering Company. Alvis starting during 1948 flew helicopters like the Westland WS-51 Dragonfly helicopters, a reliable engine capable of operating in all climates but Britain moved to gas powered turbine engines.
Kintore lost its passenger services for the railway to Alford in 1951 and its main line closure came in December 1965 but Kintore station recently revamped carrying passengers once again on the railway. Kemnay railway station first built during 1901 the Victorian era and Monarch Queen Victoria died that year also during the 1930s and 1940s coal powered the trains running through Kemnay. Also first bus between Kemnay and Alford started around the 1980s.
BP offer mobility services via their Whim App - this will give city wide wide mobility choices with instant ticketing and pricing. BP combined with StoreDot during 2019 to develop fast charging EV batteries.
First American electric car made by the General Electric Automobile Company of Philadelphia using light lead acid batteries - 1898 and 1899 were the years of production and in 1898 Marconi sent the first wireless signal from Ballycastle to Rathlin island in Northern Ireland.
E-Volt electric car charges require a 400 volt Alternating Current Supply this is what comes from an electric outlet of sufficient capacity. Three charging sockets in use by electric vehicles - they are 2 x direct current sockets defined Chademo and CCS or Combined Charging System. They both provide 500 volts at 50 fifty kilowatts. Other socket type 2 two charging plug and gives off 400 volts Alternating Current at 43 kilowatts. Higher capacity car batteries take longer to charge but higher capacity batteries will likely lead to more distance travelled without having to recharge. Nissan Leaf 30 minute charge time using the Chademo plug for a fast rapid quick charge like 80 percent but still around an hour for a full charge.
2017 - next or second generation Nissan Leaf released or went on the market. First Nissan Leaf came to the market in 2010. 2017 model 40 kilowatt hour kWh battery and 147hp or horsepower with 110 kilowatt motor and an average range of 150 miles so from Aberdeen to Glasgow. ProPilot driving assistance degree of autonomy or autonomous driving.
2019 Nissan Leaf 60 kWh battery and average range of over 200 miles.
Typical electric vehicle 400 volt battery pack contains 192 cells of air-cooled, lithium manganese oxide batteries with options for 24 and 30 kwh units available.
Energy density might come from Lithium Oxygen or Lithium Sulfur. The latter offers 470 Wh/kg as a step change in a pouch cell already developed by OXIS Energy with a target output of 600 Wh/kg.
Audi, Volvo and BMW plan to relase a range of plug-in Electric Vehicles by 2025 - in America plug-in Tesla Model S has already been replaced by Mercedes, BMW and Audi to become the top selling brand, so that might be why Elon Musk recently sold his stake in Tesla.
1985 saw the bypass dual-carriageway open around Stonehaven - Spurryhillock road depot is at Stonehaven also a roundabout or junction where the A90 Aberdeen bypass joins with the A92 coast road and also enters the seaside town of Stonehaven. From Stonehaven, direct road links to Banchory also.
1935 the three wheeler Reliant Robin first appeared on British roads - in 1962 the Regal for vans was introduced recall Trotters independent traders and Only Fools and Horses with David Jason and also Buster Merryfield. Sheriffmill Garage in Elgin sold Reliant Robins. Older vehicles actually were more limited in speed - speedometers were limited to 60Mph maximum in some cases and there was no range beyond this point. Think Smiths US 509.
The Grampian Transport Museum in Alford opened its electric exhibition in 2008 - if looking at vintage old cars is what you like to do, you can pay the museum a visit.
- https://www.co-wheels.org.uk/
- system integration in the fields of industrial automation, robotics and autonomous vehicles - https://www.mapix.com/
- Cepton Cepton provides state-of-the-art, intelligent, lidar-based solutions for a range of markets such as automotive (ADAS/AV), smart cities also 3D perception - https://www.cepton.com/
- Velodyne Lidar - (LIght Detection And Ranging) scanners are a highly accurate way to gather data about 3D objects and environments; data which can then be used in a number of ways to automate processes or manage assets. Common applications include vehicle automation, traffic management and in the creation and management of other smart environments - https://digiflec.com/
- Repro Overflow Aberdeen printing and scanning services - https://www.repro-overflow.com/
- Kargo autonomous delivery vehicle - https://www.academyofrobotics.co.uk/
Definitions needed for motoring these days now and in the future
Electrics, dynamo, alternator and battery make up an electric car. Electric cars are self-starting likely this is when cars stop at traffic lights and the engine falls silent. EV vehicles have electric headlights, dipping from 1920 also sidelights and brake lights.
Dynamo can power lights like on a bike for example - power lights when users also maybe commuters peddle or turn the pedals. Dynamo can power lights by kinetic energy, which is energy that is created by movement or motion for example user generated motion. Kinetic energy is motion energy and can also power watches for example shake watches to keep them functioning like a shake of the wrist. Dynamo linked also in a nutshell to kinetic energy and energy based on motion.
Cyclists give hand signals, may wobble from side to side, but indicators on vehicles replaced hand signals, semaphore arms first then flashing orange lights - blinking orange lights is hazard warning flashers and often stranded broken down motorists put up a hazard warning triangle at the rear of the vehicle to alert other motorists and prevent a collision. Electric cars have windscreen wipers and electric fan demisting - nowadays most brand new cars have windscreen wipers that come on when rain droplets fall and are sensitive to rain. Electric vehicles come with hot water filled cabin heaters with electric fan and electric push button horn. Sounding the horn is to alert other road users to your presence.
ABS is anti-lock braking.
ACC is adaptive cruise control.AI is artificial intelligence.
APP is smart phone application.
AV is autonomous vehicle may also be linked to a self-driving vehicle and also AntiVirus software.
CVO is Corporate Vehicle Observatory.
EV is electric vehicle.
LiDAR is light detection and ranging.
Sat Nav is satellite navigation which is multiple satellites in outer space that work together to give a driver co-ordinates or driving directions.
Parking assistance systems using multiple ultra sound sensors.
Semi-Autonomous Braking uses sensors to predict a crash and apply brakes first introduced in Volvo car during 2008.
Blind spot monitoring using sensors first introduced in Volvo car during 2008.
Lane Departure Warning System controls steering rack.
Traffic Jam assist - acceleration, braking and stopping at speeds of 40Mph.
Active Parking Assist is car parking itself also finding a car parking space.
Selecting a handful of photos for upload from an iPhone to Dropbox online storage or to OneDrive maybe more reliable than bulk upload all photos on a phone and actually doing a select few photos is like transmitting burst messages over WiFi also over a mobile data network using TCP Tranmsmission Control Protocol
In telecommunication, a burst transmission or data burst is the broadcast of a relatively high-bandwidth transmission over a short period. Burst transmission can be intentional, broadcasting a compressed message at a very high data signaling rate within a very short transmission time.
Burst refers to a period when user data is sent at irregular intervals, usually due to a high-bandwidth transmission over a short time. Burst is also known as burst mode.
The sending of burst messages is done often not on a regular basis or infrequently. Bursts and sending messages in burts can seek to use data most efficiently optimise data transmission and reduce the error rate - selecting a handful of photos for upload from an iPhone to Dropbox online storage or to OneDrive maybe more reliable than bulk upload all photos on a phone and actually doing a select few photos is like transmitting burst messages over WiFi also over a mobile data network.
Sudden or unexpected network traffic can increase use of bursts using TCP Transmission Control Protocol but actually bursts in a sense can control the rate of flow over a computer network for example small burst messages can help more network users to transmit or send data especially when users select a handful of photos to upload to online services.
How a PHP sticky form works on Facebook and with computer dialog boxes online to keep users in the same folder layout to enabling finding files easier - Choosing to upload a few photos at a time can actually enable better selection of content for displaying images together with a theme or a common message - visual data when combined multiple photos can provide insight also tell a story
Inspiration to help users can come from interacting with computer interface elements also web forms and Windows 10 ten is standard and the most popular computer platform of the moment even though Windows 11 will surely be being rolled out more and more - ordinary users who are non tech savvy may wonder how to do a complex task that takes computing skill. Non technical users need topics broken down explained to them to fully understand. For those with background knowledge of computing, they may instictively understand how things work - how online system work in the background but disciplines are usually split actually and people may focus on particular training. Important to career progression is actually to record learning achivements also sharing advice helping others. Explaining can also lead onto digital skills education when topics are clearly broken down in layman terms so everyone can understand and this can lead to advancements.
Windows Explorer side menu in Windows 10 ten, right-click on a folder sub-tree in the tree-like hierarchical then click Open in new window - using to have multiple windows to transfer copy and paste files also open a file and then create a new file like a basic web page in another Window. Windows 11 uses tabs now instead of Windows or tabbed-browsing from first Ubuntu from South Africa.
Create a Photo Album on Facebook for Public Pages, after you have uploaded some photos, if you click the Upload Photos button again for a second time usually the file view is the last one accessed - this is Facebook using a PHP sticky form in a sense. Choosing to upload a few photos at a time can actually enable better selection of content for displaying images together with a theme or a common message - visual data when combined multiple photos can provide insight also tell a story. Uploading a few photos at a time that are grouped logically to make a point stand out and resonate is useful for Facebook's Timeline view or feature - the Timeline snapshot window or lens that gives users the opportunity to appreciate the best of multimedia presentation.
There are two main types of forms in PHP - self-referencing forms and sticky forms there are also multipart forms and forms in PHP can collect user data well send it through the Internet to someone somewhere else by email for example.
HTML forms can be used linked to a backend PHP script but also PHP can encapsulate an HTML form together with a script - spliting an HTML form and a PHP script may breakdown what's happening make it easier for web PHP programmers.
A PHP page detects the nature of form requests and then branches like to a form also a form response such as submission through the Internet by means or by way of PHP.
Forms can point back to themselves be self-referencing.
Forms can use GET and POST where GET is an HTTP Request method and requests a form - POST is submission of a form and responses will come later.
GET is usually in capitals and is case sensitive, also GET requests a form and POST the opposite is submission of a form.
A line of PHP code establishes the request method as either POST or GET.
<?php if ($_SERVER['REQUEST_METHOD']=='GET') {
?>
For the HTML form, the following line really makes a form refer to itself be self-referencing.
<form action="<?php echo $_SERVER['PHP_SELF']; ?>" method="POST">
Self-referencing forms can be useful for selecting an option from a drop-down menu for example to pick an action - actions maybe linked to websites for example a form used for efficient navigation, a drop-down can display multiple options like courses in a College or University or just websites linked to a theme or for web pages on a website but actually text links are more accessible in any case and text links best presented using CSS or Cascading Style Sheets using a navigation bar common to every web page on a website to make for a consistent user experience. Better for a University offering courses to students to have a web page which lists the names of the courses together with a short, descriptive, meaningful summary to give users an at a glance guide make an informed decision more efficiently.
Users these days can easily view sample PHP code - a contact form was provided previously on this web page. What is important is to explain the difference between self-referencing and sticky forms.
Product ordered <?php echo $scoops; ?> scoops of <?php echo $flavour; ?> ice cream, for a total cost of <?php echo $cost; ?>
Copying computer and web code is possible, but important to do something new with it a novel application in terms of copyright also explaining how code works may benefit others.
The PHP snippet above shows that when an HTML form is submitted and linked to a PHP script, clauses in PHP using the echo command can out strings of text to a computer screen or web page also variables can be referenced. Variables can come from user form input - different users can enter different text, characters or strings hence the term variable when PHP forms reference user data.
Take the line below - the $_POST command line syntax is used to extract data from a form from user input - the name in square brackets is a variable actually.
<php $flavour = $_POST ['flavour']; ?>
Variables can store the result of calculations - possible also to do maths calculations in PHP code with the results stored in variables. For simplicity, keeping maths calculations simple can help the computer programmer or web multimedia programmer to understand.
Sticky forms remember values useful for multi-part or multiple screen forms where data is retained passed over - users get options to re-fillin invalid fields this is server side validation in PHP.
$_POST can often read form values - there is also $GET.
Sticky forms are mande with input HTML elements for forms with a name element with form fields asssigned a name also PHP code usually put inside the input HTML tag this is to make form fields sticky in a sense retain data useful for multiple screen forms.
<input type = "text" name = "variablename" <?php if (isset($variable)) {echo "value = " .&dollarvariable;} ?> >Multiple screen forms can actually have different questions on different screens and be built around a tree-like hierarchical structure - actually the big benefit of multiple screen forms is actually to control the flow of information enable saving more often for when power supplies get cut off also less questions on a visible screen can lead to less frustrated users prevent overwhelming vulnerable users with too many questions.
PHP can be used to send email or mail to someone somewhere else to process at a later date - loss of power actually can make users frustrated when they have to retype or fill-in forms again.
The Bathtub Distribution - The normal working life of most people is their useful life and actually all IT managers can change so information sharing is vital for knowledge transfer also digital data can outlive anyone and there is always bias from an individual perspective also video is very visual but often just captures snapshots in time and all the disputes they happen in the window of time between video capture. Older women like to gather to get together making arts and crafts actually sewing and knitting really gone out of fashion in Scottish schools - sewing machines have taken over along with outsourcing - garments now more likely to be made in China
Bathtab Distirbution - The bathtub curve consists of three periods including an infant mortality period with a decreasing failure rate followed by a normal life period (also known as useful life) with a low, relatively constant failure rate and concluding with a wear-out period that exhibits an increasing failure rate.
The normal working life of most people is their useful life, but people can slow down but digital technology can empower employees to do more with less and work for longer also work from home and connect over a computer network.
The Bathtub Distribution comes from reliability engineering and humans are involved everywhere usually they work in teams - humans in outer space too maintaining command modules on space ships and space stations in an attempt to put satellites into orbit and satellites work on the principle of line of sight. Information sharing and digital system controls perhaps called permissions in Linux really vital to cop-operation and moving forward - progressive forward planning. Linux may use permissions but there can be other pre-built rules as well. Cisco routers use Access Control Lists to filter data packets also firewalls in Microsoft Windows servers can use pre-built in rules to filter data packets in a network.
In a nutshell, The Bathtub Distribution - The normal working life of most people is their useful life and actually all IT managers can change so information sharing is vital for knowledge transfer also digital data can outlive anyone and there is always bias from an individual perspective. Who do you trust really? Everyone will likely retire so information exchange is vital, there is also jealousy.
People may have to act with impartiality and be objective but still there can be resentment deep down that does not manifest - really it is always important for everyone to persist, carry on, move forward, try and be positive no matter what personal struggles and obstacles they face. Some faces can really face struggles and often it is people with disabilities and the result is their life may be cut short. Those with disabilities may attract more sympathy but with digital recording people may get stronger. Lack of recording early on, going back could leave people with regrets and abuse can make people angrier still - also abuse maybe disputed and disputes more common in the data world linked to information.
Some people in third world countries may really feel the strain, go hungry so really going outside daily and taking exercise can really uplift spirits. Still some people can be confined to wheelchairs also care homes and are dependent on others, some people may need help with a lot, many daily living activities and chores.
There are life chances - some people can be more fortunate, grow up in an affluent area - life chances really a lottery. It can be nice to just be alive, but it is always nicer to have a home to go to, be loved, liked and respected also admired. Without a home, it can be cold at night under African skies - when the Sun sets, a chill can come in and often a sky without clouds makes the land below cold.
This really makes knitting blankets for African families worthwhile and people do this in the town of Westhill in Aberdeenshire for Westhill Libary Trinity Collections. This is what some of the women, likely the older women, do at Westhill Library on a Monday and Thursday at 2pm - Wednesday its Scrabble day turn up at the local library if intersted in joining in - timely information is what enables people to participate in events, take part have a good time and those on the outside can be neglected and life and events can pass people by, some people when not included can feel ignored, sidelined and then there is mental health. Important to include and involve everyone in making decisions - this involves reaching out, exploring communities and community engagement.
Older women like to gather for social get togethers and women historically been good at knitting, making arts and crafts actually sewing and knitting really gone out of fashion in Scottish schools. Sewing machines have taken over along with outsourcing - garments now more likely to be made in China.
Orientation in a forign land - need for GPS and compass, locators but directions can help immensely this is the benefit of stored shared videos visual data and being objective Google Street View cars are banned in China and in some other places since Google can be intrusive - Scotland really is a great place to test out new technology due to the fast networks, still some networks such as in African nations can be much slower
Orientation in a forign land - need for GPS and compass, locators but directions can help immensely this is the benefit of stored shared videos visual data. Foreign place names if you do not take a note of them, keep a diary actually picking places from Google Maps with foreign cities can be difficult to look back where you have been but now there is geotagging built-in to Facebook - still taking the time to note place names visited can provide greater insight and meaning.
Taking snaps of places people have visited in the past, this is the very really benefit of sharing positive imaginery. Conncting place names to photos actually derives or gives more meaning.
Go abroad on holiday in an aircraft, it is a risk travel dependent on others also these are dependencies in project management terms, but stay at home, one can stay safe - bottom line local travel can save more lives actually and planes in the past have gone deep into the Pacific Ocean the abyss much like outer space which is immense by comparison.
Staying at home after someone has travelled and got home safely, someone could live a really long life but also transport to bring food and products to UK shores is dependent on logistical backbone services this is the workers, the seafarers - pay and working conditions for those that take risks is important, but those in paid job roles may derive satisfaction from having a vocation, getting out and about the social connections, the banter, the pints with work colleagues maybe called mates - this must go on this is imagining (Robert Burns must have observed others and imagined but now there is video). Who can resonate with it? Resonating using words that resonate that is connecting with people best done after observation.
Slower forms of travel are likely safer like ferries think P and O rather than the high altitude aircraft further to fall - ferries have life support vessels anchored onto the side and in a ferry it is easier to put on a life jacket also for local travel driving slower even cycling on bikes makes stopping easier there is the braking distance and often learner drivers study it in the Highway Code. Many products are shipped also - much cargo moves around the world and the Dutch actually like caravan holidays and there are many campsites dotted around Britain. Camping teachers children survival skills think the Boy scouts and the girl guides.
Actually there is much to learn in Cities around the UK - local travel plus shared video coupled with language and linguistic skills can create newsworthy content.
BBC News is an International news organisation but focus more on conflict - really those in news rooms mostly the woman reliant on cars longing for independence do need to explore more what's around them be proactive seek out views capture the true to life persona and personality of those that have lived a significant existance, talk to those in care homes to learn lessons, make them matter to UK society in general and the world.
Video really brings people alive can bring back fond memories - but actually video is not the same as having a Mum to talk to for company, to nag a young person, motivate them, keep them on the path to a fulfilling life. Young girls can really mourn their Mum when the lose them and may describe them as their best friend. Video modern multimedia format represents converged video visual images with sound or audio and is designed for high-speed fibre optic networks around the Aberdeen area - Scotland really is a great place to test out new technology due to the fast networks, still some networks such as in African nations can be much slower much like original broadband 2Mbps this is General Packet Radio service.
In a nutshell, Orientation in a forign land - need for GPS and compass, locators but directions can help immensely this is the benefit of stored shared videos visual data and being objective Google Street View cars are banned in China and in some other places since Google can be intrusive. Fair criticism is rooted in being objective, impartial and really constructive criticism should always be preferred.
Error correcting auto corrections positive - important to reference correct pathname for images shared online uploaded to a namespace or a web server for sharing as part of a website
Embedding images into HTML important to reference correct folder or directory location in the pathname for an image - a designated folder for all images called images is helpful, but changing folder names using specific names that are logical can help with managing files and folders in a namespace on a web server within a tree-like hierarchical structure files nested within folders or directories.
Forgetting to change folder names after copying and pasting code can be frustrating - real persistance is necessary in computing, using digital systems, proof reading, scanning code, looking for errors, using text based editors like Notepad from Windows 10 to write or compose web pages also write computer programs. Enhanced text based editors are available that highlight syntax, use colour coding and display line numbers - line numbers usually linked to tracing errors useful for debugging, fault isolation, error correcting, troubleshooting and solving problems. Computer coding is different from going with the flow, establishing a narrative, creating a conversation, but still finding specific information to spot trends can be tricky also difficult and trained media professionals may use SPSS statistical software for the social sciences. Women tend to use higher level applications rather than write computer code, go into the mechanics of how stuff works. SPSS can do modelling create diagrams and charts from raw data and statistics - it is different from real life sometimes. Real life on the ground events may tell a different story and different people may view events from a different angle or from a different perspective. Everyone likely has concerns about their health, but it is people being open and sharing freely that advances the state of play.
Young people that go into computing do need to be patient, persist and have good intentions even in the face of health issues and declining health not just of yourself but also the health of parents, children and loved ones.
Those in computing need to be patient and persist, embrace trial and error even in the face of abuse, abuse by others who may have taken advantage from a priviledged position with knowledge and more money and been better at communicating in the first place in a real world live, physical setting out and about also in a healthcare setting. The person that gives advice and publishes may not be priviledged actually but just living in a nice home within an affluent community can give someone a better chance in life - this is life chances like a lottery - lotteries can be really random based on spinning machines hard to predict.
Women often very vocal, more expressive in real world outside indoors environment - going through a computer system is different.
Debug and trace web page coding errors - Right-click in Firefox web browser and click Inspect for colour coding insepction and tracing of web page code within a split lower window within the Mozilla Firefox web browser.
Microphone input by a singer for example also electronic keyboard presses gets stored also in MIDI format during professional recording and music production in the studio also iPad first released during 2010 so people that went to University before this period likely did not have great opportunities for digital note taking during lecturers - Computers are usually shipped actually from overseas well nowt soldering of motherboards takes place in Britain - Sampling is connected to the frequency of sounds also linked to amplitude, decibels also to waveforms which are usually represented by a sine wave and sampling is also capturing sound files at a specified bit rate and converting for example from CD audio format to MP3
The Apple Pages app on an iPad with the large well spaced out keys with iPad held in horizontal mode actually enables efficient typing and the elipses or three dots menu enables export to TXT format also PDF format with the option to quickly email your files this really enables instant transfer of files.
Email has long been the easiest way to transfer files between mobile also laptops and desktop computers - the big benefit is that files get stored on an email server like a temporary buffer because after file transfer you can delete emails but an inbox actually gives a secure place to store files for later processing protected by a user name and password.
iPad big benefit is to be creative type text create content for example watch TV or online streamed video take notes, take notes also of lectures but iPad first released during 2010 so most people really did not have digital luxuries when attending lectures at University before this period and it is notes actually taken by students sometimes that can help with learning and study.
Consider also laptops were the computing devices before this period but early laptops were thick actually and also connecting to wired Ethernet networks involved inserting a thick credit card like device to connect an RJ45 jack which hooks into wired Ethernet networks from a traditional laptop computer.
Bear in mind early laptops shortly after the year 2000 or new millennium were limited in RAM memory to 128MB. Limited memory storage is really what drove anti virus and anti malware scanning along with disk defragging or reallocating hard drive blocks for greater efficiency.
Slow computers is what drove computer specialists to provide user support for example computer support focused for home users on making slow computers faster.
Often the big performance gains came from adding more physical RAM memory modules. Later millennial children those born in the run up to the new millennium will likely remember endlessly defragging computers to try and gain some minor performance boost. Really around 1996 there were 16 million people on the Internet.
Nowadays laptops also desktop computers tend to come with 4GB, 8GB and upwards of RAM memory pre-installed when a computer ships from the factory.
Computers are usually shipped actually from overseas well nowt soldering of motherboards takes place in Britain, although Mesh computer do build computers.
However Mesh Computers will likely source the parts from overseas, one of the better companies because their website actually allows users to really customise their build selecting what components they want and removing the components they definitely do not want to pay for.
Computers nowadays tend to not be built without or with nowt DVD drives and this is a mild inconvenience but Windows 7, 8, 10 and 11 can be installed from USB flash drive instead of from DVD.
Want to run older software or games on DVD? You can buy an external USB connected DVD drive.
Files in Pages app on an iPad can be renamed clicking at the top in the middle of the window, but try and rename a file you may lose the existing filename.
Try to rename and the existing filename is easily erased.
The noclobber Linux command prevents file overwriting but Apple devices use the iOS operating system to power iPads and iPhones.
MacOS is the name of the operating system for the Macintosh computer and Macs been around since 1984 actually there was the iMac among early models of the Macintosh desktop computer.
The main figure of Apple was Steve Jobs thin gaunt man had liver issues or problems but is partner in the early days was Steve Wozniak.
Early days of Apple there was rivalry between Steve Jobs and Steve Wozniak of Apple and Paul Allan and Bill Gates of Microsoft.
Rivalry between the two tech giants like tech titans is symbolic of its a cruel world, a dog eat dog world - also around this time there was Britain's Alan Sugar entering the fray or computing world with Amstrad - his car in the Apprentice TV series is AMS1 or the number plate contains these characters this is a throwback to the famous Amstrad computer and also represents the main company Amstrad.
Apple for a long time really attracted professionals like artists and it still does in the present day along with music composers for creating songs and hooking up electronic keyboards and synthesisers for mixing music.
Macs built actually with acoustics in mind - open a sound application like the free open source Audicity on Windows 10 ten and you see analogue wave forms when sound is recorded - Audacity enables editing or cutting of sound samples.
In sound terminology sound files and editing them is known as sampling.
Sampling sound files is linked to multimedia. Sampling is connected to the frequency of sounds also linked to amplitude, decibels also to waveforms which are usually represented by a sine wave.
Sampling is done at bit rates like 8 bit, 16 bit and 32 bit. The higher the bit rate the better quality the sound file and there is mono sound versus stereo sound.Mono is typically a single speaker like wireless bluetooth speakers that are just one big speaker.
The name stereo is traditionally been linked with two or two also dual speakers and this is linked to language development. Actually Bluetooth speakers with just one speaker can be quite good quality in real sound terms and actually may give off the impression of stereo sound. Really modern single speakers are really stereo sound not conventional mono sound with analogue waveforms but still Bluetooth speakers are still anologue but DAB digital radios are on the go - DAB for Digital Audio Broadcasting.
Sub woofers can provide deeper sound provide like base sound. Subwoofers may come with two speakers and comprise sound systems with multiple speakers more than two speakers for dual deep base sound.
Equalisers are often used with acoustic or sound systems. Sampling MP3 sound files at 32 bit is recommended over lesser bit rates but sound files are higher take up more space resulting in less space available on personal music players - rip compact discs at the highest bit rate or sampling interval from CDFS the audio file format with WAV the format to MP3 on CDs and you may not have sufficient space on your mobile device or personal music player for all your digital music files.
However really the solution is to store your digital music files on a separate SD card inserted in your phone as add on storage, certainly doing this may enable you to reset your smartphone such as a Samsung phone to factory defaults without erasing your personal MP3 or MP4 collection.
In music terms, acapello is the term or phrase for vocals or lyrics without music and instrumental is music like classical music without lyrics and soundtracks for films also movies may be classed as instrumentals.
Sampling is actually the process of converting form analogue to digital and sampling takes place with both sound files as well as images. Also quantisation is involved and is part of the process in both cases.
Quantisation in physics is also linked to quantum mechanics, but that is different again.
In image processing quantisation is the process of filling in pixels linked to spatial processing. Quantisation in image processing is linked actually to filling in pixels and making pixels represent a coded state for discrete cosine transform the statistical method of image compression.
This is used for low frequency or less frequently occurring patterns of data so less bits are stored and this is how lossy compression in JPEG works at a fundmental level.
Lossy compression involves throwing away repeating wasted unnecessary pixels this is how JPEG typically takes up less space compared to Bitmapped graphics also TIFF files.
Sound cards in computers usually have a port for a microphone this may be the pink port, the green port is typically for speakers.
Microphone input is analogue, but computers process zeroes and ones and in digital however most speakers out in analogue so sound cards work or function as anologue to digital converters and conversion is usually done on the fly in the real time transparent or invisible to the user.
An audio AUX cable typically green cable connectors at both ends can link a sound card in the green output port on the back of a desktop computer base unit to a USB wireless Bluetooth speaker sometimes also to an iPod also an iPhone so in a way users can connect by wired means their iPhone for example to their computer maybe to an AUX port in the car by the way of an AUX cable with two green connectors at both ends.
Electronic keyboards may connect to computers and MIDI is the file format that transfers sound files from one digital system to another.
MIDI Musical Instrument Digital Interface is the digital file format for recording and playback of music via a synthesiser.
MIDI is the file format for musicians recording music but music files are normally delivered for download to users via MP3 and MP4 format.
Music that is recorded or synthesised by an electronic keyboard is more than likely going to be stored in a MIDI file - note also microphone input by a singer for example gets stored also in MIDI format during professional recording and music production in the studio.
E-bikes is power assisted travel - older drivers may remember when there was absolutely no power steering and the need to make complete turns of the wheel to turn a corner
Electric bikes is power assisted travel like power steering in cars.
Older cars had absolutely no power steering and older people in their 70s and older may recall turning the steering wheel right round just to turn a corner.
Many improvements made in the motoring world brought by power steering - younger drivers take for granted the ease to turn a steering wheel and increase speed on Scotland's roads. ABS is the Anti-Braking System assists braking but underneath it there is sophisticated electronics.
Power steering, ABS anti-braking system innovations actually - older cars had chokes and drivers pulled out a choke to start the engine also the ignition, gear sticks where longer, drivers went slower - tractors and heavy farm machinary been on the go for a long time, some people may have learnt on tractors before cars. Transport in Britain born out of the need to feed the population, move products from farm to supermarket with crops grown on the farms - second world war involved the Land Army and women working on the farms also raising the children.
From the world of motoring What is a Choke Valve? A choke valve or cable is designed to restrict the flow of air in the carburettor of an engine. This helps enrich the fuel-air mixture, improving the ability to start an engine in low temperature conditions. Scotland has historically suffered colder weather and there is Henry Ford, really one of the pioneers of the motor industry. Lifelong learning usually leads to the accumulation of knowledge making older persons valuable with wisdom - important to record knowledge gained in tangible forms and digital technology makes recording easier.
Chokes in DC motors and DC Direct Current linked to batteries - This reduces the sharp corners, or peaks, of the voltage waveform to rounded edges, protecting the motor from surges and the associated heating that occurs. Chokes important in electric cars, but cars so far may have been built without chokes.
Why use a choke? Why not just a big series resistor? A choke is used in place of a series resistor because the choke allows better filtering (less residual AC ripple on the supply, which means less hum in the output of the amp) and less voltage drop. An ideal inductor would have zero DC resistance. So chokes linked to EV vehicles since they rely on AC to DC conversion electricity supply to batteries used in electric vehicles.
A choke placed between the drive and the motor also helps to reduce electromagnetic interference from the cables and the possibility of reflected waves.
Chokes versus inductors - Inductors can generate magnetic fields and can also store energy within magnetic fields. A choke's primary purpose is to remove Alternating Current and pass DC current. Radiofrequency (RF) chokes rely on increasingly larger inductor sizes to block low-frequency signals.
Think Henry Ford and Ford Britain - we need to build the electric Ford Fiesta, an affordable, hatchback small car for families and small families think 2.4 children - that was a BBC sitcom and it was named after the size of a standard family in Britain around the time it was viewed or screend on British television. Ford Britain electric vehicles need a choke for harsh Scottish winters and snow in Aberdeenshire.
Movement actually emerged from the farming community in the 20th century and there was locomotives and trains in 20th century Britain the Steam train came first and they are often found in tourist attraction sites. Steam trains often dirtier also coal was also used historically in locomotive transport in Britain. Go to transport museum in Beamish in Northumberland.
Google search terms for meanings or alternative words - training future journalists easier with open information
Type in define then a search term or word to get back a meaning to better understand.
Type in synonym then a word or search string to reveal alternative multiple words that mean the same thing. Understanding language composition actually can return useful meanings or alternative words from a specified vocabulary to train others. Actually engineers also computing professionals also surveyors can have a very technical vocabulary also architects, building, techies and those in the construction. Sharing information also publish may train others and advance industries result in more progress - often engineers though embrace problem solving, providing solutions though would be more helpful in the future. Children and teenagers are encourage to embrace problem solving - teachers often ask questions, set tasks and encourage problem solving and collaboration. The brightest minds may enquire this skills of enquiry being proactive rather than waiting around, but people might not like messages, the results or publsihing and sharing information.
The Scottish government that's the SNP Scottish National Party have indicated expressly teachers will be delivering computer coding from 2017 to young children - it seems to be basic type in co-ordinates, draw lines for primary children, but nowadays computer gaming can really teach a lot and also there many great apps for tablets for very young children like word building to encourage also foster language development. Teachers do some reluctant to embrace the app ecosystem with mobiles phones switched off at Hazlehead Academy. Video represents converged video with audio or sound better support for deaf or hard of hearing children also the visually impaired community - this is inclusive learning or education and BBC News videos came with subtitles starting 2020.
Memoralising Facebook Timelines creating a digital headstone versus publishing regularly to say Hello world tell others a user is still alive
Complicating matters is that people that have once been alive that created pages on Facebook may have passed away - issues around loved ones not knowing passwords to mark or memoralise accounts can leave many Facebook profiles online even after someone has passed away. Contrast this with the many unmarked graves now in Ukraine and also from the past in Germany from the second world war also unmarked graves around Arnham in the Netherlands also, an historical war time town in central Dutch territory near the wartime Bridge Too Far in Deventer - some soldiers died in battle in conflict and have been gone forever, loved ones they were connected to may have gone through agonising grief the not knowing feeling for the remainder or the rest of their lives. Repatriation services can grip whole towns - think funerals cars going through streets in convoys, those have have died in conflict may come home in coffins draped in the Union Jack, a soverign colour that represents a country and actually soverignty often comes into its own through the Olympics and Commonwealth Games currently being held in Birmingham during August 2022.
Regularly publishing and posting informs others people are still alive - the most prolific posters actually drive the most attention, can engage communities in real debate, shape policies and the future for the better. Important to show fundamental respect for people, consider all views, be courteous and polite online actually this translates to offline as well. The big issue is that people outside passing in the street may seem friendly, but in closed spaces people can become agitated. People may behave differently when subject to abuse and actually medical staff are paid to be professional, responsible and care to the very end.
Good behaviour also known as good online etiquette not a new term - good etiquette stemmed from emoticons like showing emotion and smiley faces symbols that really defy explanation can evoke strong feelings and outpouring of grief. Most people have vocations, job roles, and social networks can connect people with those around them, make it easy and efficient but actually HTML the web page creation language is easy to learn and web page templates enable copying of standard page code making it easier, faster for the average user to publish and share information that helps in a frenzy.
Discharging static when building computers protects sensitive parts also components
Building a computer inserting a motherboard the core circuitboard need often for computer specialists to discharge static touch a painted metal surface.
Computer support technicians may wrap a velcro strap around their wrist attached to a mat to discharge static - this is one option another option is to touch a computer's metal base unit. Both methods discharge or transfer static and protect computer components which can be small and sensitive - RAM memory can also be sensitive and often RAM memory modules need a firm push into a computer's motherboard.
What is the relationship between discharging static and velcro? Velcro can lose its stickiness but friction with velcro can generate a charge or in the case of building a computer velcro linked to a mat can discharge static.
Static is linked to electricity shocks - If you carry a metal object like a coin, key or paper clip around with you, and touch it to something metal in your house, any electrons stuck to your body will flow through the metal and away, preventing the jumping effect that causes a shock. Having your house keys or car key on you, holding them can prevent you from giving your son or daughter an electric shock with the transfer of energy when you craddle or hold them.
Rubber is conductive and prevents static - it is rubber mats that prevent static discharge not Velcro even though Velcro may be used in the building of a computer.
In science there are two broad terms - conductors and insulators both are opposites but opposites can attract in Physics.
Conductors allow electricity to flow freely through it, whereas an insulator is a material that does not allow electricity to pass through. In conductors, some of the electrons are free electrons and can move. Copper, aluminium, steel and seawater are conductors and BP and Shell looking into seawater powered cars or vehicular transport that is more sustainable - think British Steel from Sheffield and the Full Monty unemployed Steel workers who started taking their clothes off to entertain. The Steel industry wound down and Sheffield was left run down for a significant period needed money and investment to evolve transform the economy and upskill or reskill workers and manual labourers.
Magnets have a north and south pole.
Opposites attract in magnets - The opposite is true when the same poles of two magnets are put in contact, if two south poles are put together (or if two north poles are put together) the magnets will repel one another.
Ultra High Frequency (UHF) signals linked to Infrared used in TV transmitters also TV remote control and the different divergent technologies that represent evolution from 1G to 5G the mobile data signals
Ultra High Frequency (UHF) signals linked to Infrared used in TV transmitters also TV remote controls.
1G Advanced Mobile Phone System (AMPS), 824 MHz - 894 MHz, NFM, FM, FSK.
2G CDMA (IS‑95), 850 MHZ, AM, QPSK.
3G WCDMA.
4G LTE Network Long Term Evolution Network. Also known as 4G LTE Data and Evolved Universal Terrestrial Radio Access (E-UTRA). Data service for wireless consumer devices. 700 to 2,200 MHz. OFDM, PSK and QAM worldwide nowdays.
5G new radio cellular network. 5G cellular, also known by 3GPP 5G NR (new radio), for example is a newly released cellular standard that allows for backwards compatibility with 4G LTE, and will allow for several gigabits of connection speeds, (up to 10-100Gb) per second. This is the 600 MHz downlink band for the new standard. 5G uses OFDM, PSK also QAM.
CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications. As the term implies, CDMA is a form of multiplexing, which allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth.
PSK is Pre-Shared Key (PSK) and it is really a client authentication method that uses a string of 64 hexadecimal digits and hexadecimal is the base 16 system from the 16 times table, or as a passphrase of 8 to 63 printable ASCII characters, to generate unique encryption keys for each wireless client.
QAM (quadrature amplitude modulation) is a method of combining two amplitude modulation (AM) signals into a single channel. This approach helps double its effective bandwidth. QAM is also used with pulse AM (PAM) in digital systems, like wireless applications.
The 7 seven stages of the software development lifecycle explained also the stages are Analysis, Design, Implementation, Testing, Documentation, Evaluation and Maintenance also Running totals in the case of a supermarket can be linked to quantity of items or products also this can be linked to shopping baskets and the total amount of money displayed for goods, also running totals may involve counters that are first set or initialised to zero and loops of blocks of code may be used
- HTML ol organised list element with li list element produces a numbered ordered sequenced list in HTML web page code
- Analysis - seek to understand the problem, issues and talk to the client
- Design - the planning stages for a computer program
- Implementation - translating or converting plans into an algorithm actually which is a set of steps actually, a series of procedures that get coded using a specific computer programming language like Pascal, COBOL, Cee plus plus perhaps Python
- Testing think playing computer games some people do this play games for a living to test scenarios, find areas for improvement, weaknesses in computer code - running programs with test data also to check software performs as expected. Test data can check ranges for example, lead onto checking data for validity to ensure that what someone wishes to find out is more likely to be obtained for real - actually form field validation in respect of web forms and JavaScript on focus controls for form elements can prove useful here - the onFocus JavaScript event handler to put a cursor in a specific online form field.
- Documentation - user guides and technical guides can help users but actually writing up problems, issues, workarounds can educate others in teams share knowledge pass it around advance progress at a faster rate. Important to focus on solutions also targeted solutions and highlight what problems they solved.
- Evaluation - checks to make sure end products and finished compiled software applications meet user desires and client needs - the client the person who pays for software may not be the end user and issues that affect the end user may affect the clients bottom line also profit and profitability.
- Maintenance - this is central to computer code and maintenance represents the do it again iterative nature may also be called looping of writing computer code, going back to the design stage after writing code and testing in order to alter designs and change computer code. Loops can be typical of computer code to make the process of coding more efficient - think independent blocks of code being brought together. Loops can bring more order and control - alternative events may occur when loops are broken and this is typically signified by clauses of computer code in the else statement of if then else endif.
Iterative nature of software development lifecycle like do it again involves overlap in stages and each stage feeds into each other. Iteration or do it again means repetition in a sense like repeating going back to a previous stage to make changes and improvements like in a design stage of a computer program with the view to changing computer code.
Perhaps in practice computer programmers may change code without changing designs it is easy enough to get swept away coding, but actually without changing designs changes in computer code may be less noticed and less understood and this could cause problems later when errors crop up and there is a need to debug and test. Diagrams can tell a story very well combine pictures or charts with words, but step by step explanations can really help others understand.
Computer programs may require different hardware capabilities like memory capacity, buffer allocation, processing speed also buffers can be linked to memory and also there are input and output devices. Input output can be linked to interrupts - keystrokes can be captured actually by hackers think keystroke logging and usernames and passwords can be stolen.
Consider a basic algorithm for making pancakes.
The ingredients is the inputs to the recipe.
The method is the statements that describe the process of making pancakes - statements usually step by step broken down using stepwise refinement like 2.1, 2.2 and 2.3. Computer programs need to be logical describe how to solve a problem.
The result is the outputs of the recipe - this is what people expect to happen. Normally in a computer program output appears on a computer display, on your smartphone screen in the case of apps for mobiles.
A tried and tested receipe like an algorithm or set of instructions can be used time and time again to produce reliable results.
Computer programs may involve initialising counters to zero and also a counter may increment by one after a block of code this is a running total. A running total may be used with a block of code that works in a looping fashion and be linked to a shop or supermarket. Running totals in the case of a supermarket can be linked to quantity of items or products also this can be linked to shopping baskets and the total amount of money displayed for goods.
It is absolutely 2022 and artifical intelligence first mooted as a concept in 1968 film called 2001 A Space Odyssey - heuristics which is the foundation for anti-virus software scanning and heuristics linked to probability also to statistics like hash algorithms or hash codes also heuristics are rules of thumb in a broad sense for making immediate judgments that can facilitate problem-solving and probability judgments also heuristics like traits of a virus used to spot rogue software patterns, detect malicious software or computer code with bad intentions
HAL 9000 is a fictional artificial intelligence character and the main antagonist in Arthur C. Clarke's Space Odyssey series.
First appearing in the 1968 film named, called or titled 2001: A Space Odyssey, HAL is the name for the Heuristically programmed ALgorithmic computer) and is link a sentinal or artificial general intelligence computer also a smart computer system that controls the systems of the Discovery One spacecraft and interacts with the ship's astronaut crew.
While part of HAL's computer hardware the physical devices humans or users touch or interact with is shown toward the end of the film, HAL like a computer bot is mostly depicted as a camera lens containing a red or yellow dot, with such units located throughout the ship.
HAL 9000 is voiced by Douglas Rain in the two feature film adaptations of the Space Odyssey series.
HAL speaks in a soft, calm voice and a conversational manner, in contrast to the crewmen, David Bowman and Frank Poole.
HAL used a human voice over so actually it was friendlier than some computer voices nowadays.
So, in a nutshell, artificial intelligence is not a new concept actually - it has been around for a long time and really emerged at the cinema in 1968.
HAL used heuristics which is the foundation for anti-virus software scanning - heuristics linked to probability also to statistics like hash algorithms or hash codes also heuristics are rules of thumb in a broad sense for making immediate judgments that can facilitate problem-solving and probability judgments.
Heuristics actually is the process really of matching virus code in an antivirus application and detecting viruses - heuristics like traits of a virus used to spot rogue software patterns, detect malicious software or computer code with bad intentions desgined to cause mayhem and wreck havoc.
Many synonyms are linked to words and terms in the English language - possible to draw connotations between different meanings within the field of computing and in separate fields - actually the study of linguistics is actually important to computing. Linguistics linked also to natural language processing is a broad sense.
Cellular overlapping an important consideration for 5G networks with need for masts also base stations every 1000ft unlike 3G every 40 miles - 5G is an essential mobile technology for the future if mobile users want seamless coverage and fast mobile data everywhere without interruption
Cellular overlapping an important consideration for 5G networks with need for masts also base stations every 1000ft unlike 3G every 40 miles - 5G is an essential mobile technology for the future if mobile users want seamless coverage and fast mobile data everywhere without interruption
A cell is the geographic area that is covered by a single base station in a cellular network for example a 3G, 4G and 5G mast and cells must always overlap. Bear in mind the range for a 3G mast is 40 miles, the range for a 4G mast is 10 miles and the range for a 5G mast is 1000ft.
5G masts absolutely no planning restrictions in the UK United Kingdom laid down in statute at the UK Parliament level - UK ministers usually listen to and source evidence, this is what goes on behind the scenes.
TCP/IP is the rules that govern the Internet for the sending and receiving of data, a universal support standard and actually it underpins the data world.
Configure EIGRP routing protocol on a Cisco router and in computing there are really four types of data types - there are integers, boolean true false states or Yes / No, real numbers and characters - operands are the four standard mathematical symbols for addition, subtraction, division and multiplication symbols. Multiplication symbol usually an asterisk also like a wildcard and sometimes represents any character also Running totals actually can increment by one for example for a small set of instructions like a procedure or peice of computer code which can be linked to a loop to bring control add up for supermarket checkouts
Router(config)# mode this is the general router configuration mode on a Cisco router - it is the user prompt in a terminal screen for a Telnet session accessed after the enable command is entered with a password.
The EIGRP routing protocol is linked to autonomous systems by way of an ID or identification or reference number - to enable the routing protocol the following command is entered:
router eigrp autonomous-system-id (this is actually a numerical number or integer like 109 for example. Significant to note in computing there are really four types of data types - there are integers, boolean true false states, real numbers and characters. In computer programs there are also expressions which may be strings of data.
Typical Expression - a combination of operators, constants and variables.
An expression may consist of one or more operands, and zero or more operators to produce a value for example a+b c s-1/7*f. Operands are special symbols maybe addition, subtraction, division and multiplication symbols. Multiplication symbol usually an asterisk also like a wildcard and sometimes represents any character.
A real number, in mathematics, is a quantity that can be expressed as an infinite decimal expansion for example with two decimal places - long winded numbers usually rounded to two decimal places. Exponential numbers usually reference the number 3 three and can be really long never ending, for example lots of 3s after a decimal point.
Autonomous system number that identifies the routes to the other EIGRP routers. It is also used to tag the routing information.
There are two types of data and data is not information - data is meaningless. Taking ownership of data enables human analysis and discussions to produce meaningful insights. Qualitative is like comments and strings and Quantitative data, which are further classified into four types of data: nominal, ordinal, discrete, and Continuous.
The Microsoft Access database has AutoNumber for automatically producing an ID for a field in a database - this really is like a running total useful for a computer program linked to a supermarket or small convenience store for example.
Running totals actually can increment by one for example for a small set of instructions like a procedure or peice of computer code which can be linked to a loop and a looping mechanism which can bring control and structure - this is like a construct actually, provides definition to data enables an ordered, sequenced flow of computer code instruction.
It is visual cues actually built-in to software applications that stimulate recall about how to educate others on how to build also use software applications, but also start writing and describing it forces people to explain also justify - through this process others can learn. Explaining opens up learning actually and writings provide a tangible means of recording information and instructional support.
Short Text, Long Text, Number and Long Number along with Date / Time, Currency and Yes / No that are the basic data types of Microsoft Access. Yes / No is like boolean states akin to True False.
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration.
The EIGRP transport mechanism uses a mix of multicast and unicast packets, using reliable delivery when necessary.
Network address starting 224 is a multicast address.
A multicast address identifies a group of hosts sharing the same address. Multicast addresses are not assigned to a device, rather, a device proceeds to listen for and receive traffic destined to a multicast group that it has joined by some process. Multicasting uses the UDP data packet or datagram message protocol - UDP is the connectionless transport protocol for IP data packets.
224.0. 0.22 is a multicast address. Multicast is used for IP addresses that can be subscribed to. A multicast IP address can be subscribed to by multiple network interfaces and will be routed by routers in a special way. This way you can create an IP address with multiple recipients. Multicast is send from one computer or network host to many computers or recipients or receivers usually other computers with real human users.
A simple example of multicasting is sending an e-mail message to a mailing list. Teleconferencing and videoconferencing also use multicasting.
Multicast protocols such as UDP/IP and RTP/IP are used to broadcast data to any number of receiving devices.
Unlike unicast TCP data, if a packet is not received, there is no mechanism or attempt to verify that and resend the packet. Multicast is widely used for video and audio data.
Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data. It is used in internet telephony, Voice over IP and video telecommunication.
This autonymous system number in an EIGRP network for Cisco router configuration in a console window or session is a 16-bit value between 1 and 65,535.
The value chosen must be the same for all routers within a given EIGRP routing domain.
65,535 is the number of hosts on any given class B network - class B networks typically used for private networks or for medium sized organisations. 65,535 network hosts or users in a given network segment in the class B network address segment. 254 hosts typically in a class C private network per network segment and likewise 16,277,214 hosts or users around 16 million in a network segment for a large Class A network.
Images have dimentions window size, image resolution and dpi or colour bit depth - also compact cameras may come with inadequate flash memory and you may need a microSD or SD card for more capacity to store images important to look at tech specs - Computer displays RGB versus decimal image representation also mixing primary colours to form secondary and tertiary colours in primary education
Images have dimentions like 960x720, also horizontal and vertical resolution like 96 dpi and bit depth like 24 bits.
Also compact cameras in the not so distant past - go back to early 2014 - sometimes came with limited storage and this restricted users from choosing large high resolution file sizes. This meant when images were displayed after being captured, the viewable screen or window may not have stretched across the screen or filled the viewable area completely. Stretching images is known as image processing - tweaking images distorting them is image manipulation like Photoshop an image is a catchphrase or buzzword familiar to many. Stretching images may result in quality being reduced. There is also anti-aliasing fonts and ClearType.
Anti-aliasing fonts can improve clarity on screen - for Windows XP users had to click a checkbox to make font type faces easier to read. What is anti-aliasing? The simple description of anti-aliasing is that it makes fonts display with smooth curves and angles, not jagged, low resolution looking edges. So if anti-aliased is smooth, the opposite, hard edged fonts would make sense to be called aliased. However, the better term is bit-mapped.
Zooming in and magnifying font faces or text can usually reveal jagged edges - this also impacts clarity of text in respect of magnified text.
Cameras coming with limited flash memory storage built-in restricted users from choosing large high resolution file sizes, and this thus had a knock on effect in terms of the file size, also the window size (the screen viewable size from a magnified display like a computer monitor) or the resolution size of photos.
Compact cameras actually sometimes require users to buy Micro SD cards or SD cards for more storage because the built-in flash memory is not adequate in file size.
Always important to pay attention to file storage in respect of tech specs for electronic products like cameras in respect of electrical retailers like Currys.com but there is also io.com and very.co.uk.
Computer displays RGB versus decimal image representation
Going back to image dimentions, right-click in Windows 10 ten on a JPEG image for example to reveal resolution sizes like 960x720, dpi or dots per inch and bit depth like 24 bits or 32 bits - 8 eight bits known as monochrome or black and white. More dots per inch increased the number of pixels in an image, improves quality, file size and also gives more colour.
Computer colour displays are known typically as RGB Red Green Blue and these can be represented both in hexadecimal digits and also in decimal for example 255,255,255 equals white and 0,0,0 equals black in decimal notation. In RGB hexadecimal #000000 is black and #ffffff is white - these codes often used in HTML web page code. The first two hexadecimal digits like ff represents red, the second two ff reresents green and the last two ff represents blue.
RGB differs from primary school primary colours which are red, yellow and blue.
Three Secondary Colors from primary education include Orange, Green, Violet. The Six Tertiary Colors are known as Red-Orange, Yellow-Orange, Yellow-Green, Blue-Green, Blue-Violet, Red-Violet, which are formed by mixing a primary with a secondary.
Making secondary colours in primary education
- Red and yellow usually makes orange
- Yellow and blue makes the secondary colour green
- Red and blue makes the secondary violet
Making tertiary colours in primary education
- Combine two parts red with one part yellow to create a red-orange color.
- Combine two parts yellow with one part read to create a yellow-orange color.
- You need equal parts of blue and yellow to achieve green. Then, combine yellow once more to get yellow-green.
- Blue Green also known as turquoise - make a basic green color by mixing yellow and blue, add more green to get a sea green turquoise or add more blue to get a deeper bluer
- To create Blue-Violet - you can mix straight red with blue, ensuring to add more blue than red. This works because mixing primary colors red and blue will create violet. You then add more blue to make blue violet.
- Red violet can be made by adding greater amounts of red to blue. You can adjust the value of the paint by adding white or black to make it lighter or darker.
Hue, saturation, brightness and contrast
In colours for computer display there is hue and saturation.
Hue is like share or tint - a gradation or variety or variation of a color, a tint or shade - pale hues.
Saturation is like the bucket fill tool in a computer painting program - Saturation is the process or state that occurs when a place or thing is filled completely with people or things, so that no more can be added. Note that transparency can be altered for filled boxes for example often using a sliding window.
Brightness is how vibrant or colourful an image is and brightness can be adjusted for images, but also the brightness of screens can be altered on small screens like mobiles but also on computer monitors and also on large screen televisions.
Hue, saturation and brightness are the main elements that affect an image, but there is also contrast also. You might struggle to understand the difference between brightness and contrast.
Brightness increases the overall lightness of the image—for example, making dark colors lighter and light colors whiter.
Contrast can be defined as The difference in brightness between light and dark areas of an image. Contrast determines the number of shades in the image. A low-contrast image retains detail but tends to lack dimension and looks soft.
An image with normal contrast retains detail and dimension, and looks crisp.
Shades of images and contrast since it is linked to detail is also linked to lossy compression for JPEG images. For example, white pixels are like empty so really less bits are needed to represent a pixel so space in real world physical file size terms can be saved useful for sending visual data for more efficiently over computer networks.
Facebook limits number of video uploaded to 35-40 within 24 hours or one calendar day - testing technology to the limits like what Channel 5's The Gadget Show did can find weaknesses also areas for improvement and also discover where there are service limitations to the detriment of users. Also, testing computing platforms can explore future avenues for growth and new markets also for video sharing new audience potential - scope for utilising Facebook to break areas like a large City into smaller sections or communities for sharing video and news
Video is more interesting for meaningful landmarks and events that define moments in time, but actually in most towns and Cities events can happen every day and also the landscape constantly changes or evolves with new emerging developments - also coastal videos of the seaside can be awe inspiring, waves crashing against rocks can bring a sense of calmness and serenity improve mood of users also maybe linked with improved mental health and better cognitive abilities at work or improved focus for students studying.
Shorter video segments are better actually for meaningful also interesting scenes that define events also but longer videos can be useful to convey audio or sound also a message worth imparting to stakeholders including a target audience or a commentary with video supporting multimedia convergence.
Facebook has limits to prvent spam - actually most users cannot upload more than 35-40 videos in a 24 hour period.
Shorter video segments can be useful, upload quickly over computer networks making shorter video segments better on slower networks but also improved video compression algorithms and ratios may actually enable longer video segments to be uploaded faster in a shorter space of time.
For video descriptions, better to focus on Who, What, Where, Why and How to really create concise information snippets to both inform, educate and entice users.
New technology also known as bleeding technology and testing technology to the limits can find weaknesses also areas for improvement and also discover where there are service limitations to the detriment of users. Also, testing computing platforms can explore future avenues for growth and new markets also for video sharing new audience potential. Facebook has a user aimed platform is not ideal for commercial video sharing market sectors. Facebook always said it would be free to end users and Facebook is supported by advertising, but Facebook is a good platform for education.
There is actually scope for utilising Facebook to break areas like a large City into smaller sections or communities like regions or regional areas with people uploading videos covering a small or specific area with perhaps co-ordination at a higher level - for example one Facebook page could have a videos focused on a particular area, but a bigger commercial media organisation could have a website linking to social media videos to provide more visual content that shows people in communities what is going on that is also educational and informs with newsworthy content.
The big issue is people can object to shared social media web links or videos, so web links may become inactive or not functional so there would be a need for a larger media organisation to maintain links to previously uploading videos. Really this is always an ongoing challenge - maintaining web links online in an online space. Broken links do happen because domain names can go unregistered - people and organisations can change their domain name and organisations can flounder, companies can go bust, people can retire - people are naturally fickle in a sense prone to human failures such as illness but there is also corruption from time to time.
In a nutshell, Facebook limits number of videos uploaded to 35-40 within 24 hours or one calendar day - testing technology to the limits like what Channel 5's The Gadget Show did can find weaknesses also areas for improvement and also discover where there are service limitations to the detriment of users. Also, testing computing platforms can explore future avenues for growth and new markets also for video sharing new audience potential.
Need to have interest to develop skills, keep up to date and invest in education also e-books electronic publications from Amazon can be competitively priced and cost effective with absolutely no VAT applied
Interest in keeping skills up-to-date actually comes from passions and often businesses the commercial sector are often more focused - this is the linked to profit and profitability driving ordinary workers forward.
Those with an interest in technology may self-study and rely on books and ebooks out of own pocket in the digital age keeping up with current developments along the way and actually those out of work may not actually have sufficient personal funds.
Amazon Kindle actually is a digital service really a backend Amazon.com that enables purchase of ebooks - digital ebooks usually cheaper than paperback and hardware also ebooks have no VAT or Value Added Tax attached.
Overlapping cellular coverage and base stations also frequency spectrums and auctions, also exponential growth with IP version 6 six and twos complement for binary signal encoding over a physical medium or channel
A network for wireless communications is comprised of a large number of base stations to efficiently use radio spectrum to cover the service area. Geographically separated frequencies may be reused many times.
Base stations emit cellular coverage and cells must overlap and radio spectrum is involved to emit also project outwardly electromagnetic signals or radio waves.
Radio spectrum has been auctioned off in the past for digital purposes from analgoue frequencies.
Radio stations in the UK are still on analogue despite digital radios on the market and radio stations broadcasting digital radio in the UK - lots of older cars with analogue radio. Massive challenge to convert all drivers and homes to digital radio stations but doing so could free spectrum make more available for digital services and digital radio also to acoommodate 5G.
Exponential - a term from computing originally characterized by or being an extremely rapid increase (as in size or extent) an exponential growth rate. Exponential growth exhausted the supply of IP version 4 IP addresses and this led to IP version 6 addresses, the 128-bit IP addresses that are long winded and often resemble hexadecimal numbers and digits. Exponential involves a variable in an exponent 10x and is an exponential expression.
Twos complement - Two's complement is the way every computer chooses to represent integers. To get the two's complement negative notation of an integer, you write out the number in binary. You then invert the digits, and add one to the result.
The Twos complement is a system in which the negative numbers are represented by the two's complement of the absolute value. The Two's complement is the way the computers understand and represent integers.
In a two's complement, the most significant bit is 1 one, so the value represented is negative.
Twos-complement is linked to negative numbers - the temperature scale can run from very cold minus temperatures to hot temperatures like 50C. Computers actually must be kept cold for optimal functioning so this really is the basis for understanding negative numbers in computing and twos complement.
From Wikipedia actually a great source of technical definitions but actually important to also connect the dots between seemingly random pieces of information and this is the higher cognitive skills - The system therefore allows addition of negative operands without a subtraction circuit or a circuit that detects the sign of a number. Moreover, that addition circuit can also perform subtraction by taking the two's complement of a number which only requires an additional cycle or its own adder circuit. To perform this, the circuit merely operates as if there were an extra left-most bit of 1.
Important also to be selective when choosing information and to go along with the trend of the times. The trend is STEM Science Technology Engineering and Maths - think manufacturing or building of EV vehicles or Electric vehicles and such cars for example have integrated sophisticated electronic circuits which are often soldered in Eastern countries also China.
Twos complement on Wikipedia - https://en.wikipedia.org/wiki/Two's_complement
Struggling to understand Twos complement from a mathematical perspective actually from the instructions on WikiPedia but by writing the topic can get broken down - English teacher Margaret Stevenson from Westhill Academy always considered a good school (this is the affluent aspect which usually benefits people) actually argued English is more important than Maths. Actually English is just as important as is computing as maths, English actually and writings along with sharing can help others to understand a complex topic and computing is a complex technical topic so English might actually be more important just slightly not a fundamental aspect of STEM, but NASA do technical report writing.
Chinese people may draw diagrams and these can be more visual easy to understand can help with self-assembly for DIY and building products after purchase but still books written to accompany products in Argos usually have writings plus pictures this is actually an aspect of multimedia which is text, static images, video, animation as well as sound - video is the converged medium with sound more suitable to helping the visually impaired, the deaf and hard of hearing - older people may have these cognitive limitations.
Products sold in Argus may actually have technical authoring instructions written by foreigners like people working in China.
Engineers tend to not have great communication skills - this was obvious from the language used in Cisco computer network curriculum.
Breaking topics down and explaining also known as analysing is how real progress is made in technology topics.
From Wikipedia on twos complement - The last two bits of the carry row (reading right-to-left) contain vital information: whether the calculation resulted in an arithmetic overflow, a number too large for the binary system to represent (in this case greater than 8 bits). An overflow condition exists when these last two bits are different from one another. As mentioned above, the sign of the number is encoded in the MSB of the result.
Overflows can be linked to buffers and memory architectures linked also to the design of circuitboards and processors. What use is Maths actually to computing without seeking to understand the fundamental key mathematical building blocks in relation to the architecture and the design of microchips? The best way to help the manufacturers is with writings to explain and by drawing diagrams to help to connect the dots, help the manufacturers to build real physical world products. This is the big advantage of diagrams and also 2-Dimensial vector drawings and the PNG file format without royalties, the older Animated GIF file format was proprietary where someone was paid a royalty or money having invented the standard since paying everyone a fair rate is fundmental.
In simple term 2's Complement is a way to store negative numbers in Computer Memory - it is often cold in outer space up in orbit in the celestral galaxy.
The binary number 1111 1111 is equal to 0000 0001 and this represents minus one. Twos complement inverts numbers is like the opposite at the fundamental level of binary where Assembly language is used which is often used to write device drivers to make physical touching hardware devices work with computer operating systems such as Windows 10 also Windows 11.
Understanding Twos Complement comes from Google's interpretations on the main search page linked to https://www.omnicalculator.com/math/twos-complement. Important to discuss problems, issues, workarounds facing people and actually be forward thinking helpful write up the solutions more than anything else. Explaining processes actually also problems and issues helps foster greater progress in the long term also helps everyone to understand which may lead to more sympathy and understanding also tolerance and acceptance.
Twos complement linked to binary signal encoding and Manchester encoding over computer networks on the physical medium and Global Packet Radio Service can be quite slow nowadays like 2Mbps and actually this data rate or speed was considered fast 20 years ago in the North-East of Scotland an always on data connection which enabled phone calls on the same phone line by means of Asynchrous Digital Subscriber Line technology faster downloads over uploads also known as ADSL.
Computer program version numbers and stepwise refinement - The Linux command ./configure is often used in connection with building software executables or compiling from source code in the Linux world also there are useful commands make and make install
Maths may be useful for computer programmers - maths and logic go hand in hand, maths logic useful for writing sequential, ordered in series, procedural computer programming also with stepwise refinement this is where steps are broken down like 2.1, 2.2 and 2.3 - computer program versions and versioning work like this. Google Chrome Version number at present is 103.0.5060.134 (Official Build) (64-bit) - recall Internet Explorer 6 six was dominant for a long time as a web browser.
Procedural program code normally executed in sequence - this may also be referred to as parsing, but also source code can be compiled line by line through a process known as compiling in Linux with the view or aim to executing a software program. The Linux command ./configure is often used in connection with building software executables or compiling from source code in the Linux world also there are useful commands make and make install. Running an exeutable on Linux usually involves dot forward slash like ./
Certainly dot forward slash or ./ is used to execute software source code in the Linux world.
Building or compiling source code in the Linux world has a specific order or sequence of operations or operands of command sequence - ./configure is first then make command followed by make install command. The pre-determined sequence or order of events or command syntax is important.
Stepwise refinement is based or really stems from the iterative do it again process of software development. Do it again refers to the looping nature of the software development lifecycle - for example Testing or Debug may necessitate need to go back to design stage and make changes also to computer code for improved performance also for security enhancements or create new functional aspects in software program.
Easy convert iPad HEIC images using Dropbox online web based interface - Elipses or three dots is really the hallmark most common element of a computing user interface. Elipses really signifies more information is coming or will follow, elipses or three dots usually reveals more menu options also Microsoft Word documents well supported enabling writing of online documents within the Dropbox online interface, for Google Docs need to log-in from Dropbox
HEIC images from Apple devices such as the iPhone and iPad might not open on Windows 10 ten without installing codecs or special software like a software viewer, but possible to easily convert HEIC images to JPEG and PNG images using Dropbox the file storage also the cloud online storage service.
Select a checkbox for an images, then from the menu bar right-hand side select the three dots menu which signifies more - three dots is called elipses (this is from Higher English Westhill Academy - also learnt parathensis played Who Wants To Be A Millionaire reading questions a quiz book amongst family, parathensis also known as quotes or quotation marks - asking questions taught grammar skills also, lead also to acquired knowledge firing questions at parents, this person like to ask question since answers were unknown but Google opened up possibilities to learn and discover information).
Recovered video held long-term from 1995 and shared in the recent past actually shows this person as a young Scottish loon asking his grandmother a question such as which river is the longest in the world - the Nile or the Amazon? This person's grandmother could not answer the question, but great to see grandparents alive - video really brings back positive memories and the persona of a person, always important to cherish loved ones.
Select Save As then JPEG or PNG pick an image format to create an instant copy in the Dropbox file or online storage server in the cloud. Aspiring millionaire really and a millionare is one million pounds - over a million is a multi-millionare think Bill Gates Microsoft founder and main man behind the Bill and Melinda Gates Foundation focused on Africa.
Actually when at Aberdeen College when the rest of the class from school were in sixth year with this student forced to leave since zero subjects and levels were suitable, this then student put down Millionaire for ambition for a yearbook the sixth year class were making. There will be many copies of this circulating amongst this student's year group or school year.
Definition of elipses - a sudden leap from one topic to another. or marks or a mark such as indicating an omission (as of words) or a pause.
Elipses or three dots is really the hallmark of a computing user interface - elipses one of the most common user interface elements in a computing system. Elipses really signifies more information is coming or will follow, elipses or three dots usually reveals more menu options, maybe considered tweaks or settings or customisations for a user and may lead to actions. Windows 98 was on the go when word elipses was discovered - actually websites were not really common actually, accessing the Internet was slow, not done often and by means of a dial-up 56Kbps modem in the North-East of Scotland.
From the Dropbox user interface, click Create, then Word Document or Google Docs. Word documents work efficiently and quickly within the Dropbox main online interface. Google Docs requires another log-in using Google services so Dropbox works better with Microsoft services, well a Docx document gets created within Dropbox file storage online in the cloud - Microsoft Word documents better supported by Microsoft at the present time Sunday 07 August 2022.
Always important to check your current location within a file system before transferring files to ensure copying of the latest versions instead of overwriting newer content with older files also FileZilla is the free FTP File Transfer Protocol client Windows 10 software available for download from ninite.com to enable web page upload from client user computer to web server
Losing context and a sense of perspective is easy, finding yourself in the wrong folder and uploading older web pages on local drives also local computers may happen if you are not careful - always important to check your current location within a file system before transferring files.
FileZilla is the free FTP File Transfer Protocol client Windows 10 software available for download from ninite.com. Left-hand side pane displays local web pages or computer files. The two dots icon of a folder at the top of a lower level folder may go back up the file system tree-level hierarchy.
Double-Clicking two dots multiple times can take a user back to the top-most level of folder hierarchies and on Windows 10 the top most level may look like User (or specific name of a user), All Users, Default User, Default and Public. This same folder arrangement is available from Windows Explorer within This PC for the main drive with Windows 10. Double-click your username and within your designated username folder you will find Documents, Pictures, Music, Videos folders and also possibly a Dropbox and OneDrive folder.
Actually go the top most level can enable copying of nested folders and files most efficiently to USB Universal Serial Bus external drives.
However, in Windows Explorer with reference to Dropbox folders, right-click on a folder and click either Make available offline or go to Smart sync, Make available offline depending on your version of Dropbox.
Recent updates to Dropbox enable making folders offline easier without having to go via a sub-menu such as Smart sync. Offline folders enable file download in the background and facilitate transfer or copying of files to local devices for data back-up and data duplication.
From a FileZilla open application window, it is possible to drag and drop files between two left and right panes to upload files and folders to a web server after a user has entered a hostname, username and password at the top. FTP usually uses port 21 for connections between a client computer typically a user computer and a web server.
Zoning, Google Maps, map search, finding a street and the DNS name service and zone files
Zoning in on a Google search map - can be difficult sometimes to focus, find a street when you are familiar with an area due to a maze of streets, but there is the search box. Actually parks being marked as green and hospital sites as pink can actually help parents for green spaces to take their children for a walk and for everyone to find essential medical facilities or hospital services.
Important to make a note of issues people encounter - this is what may help others, promote or champion digital technology and lead to improvements. Documenting workaround and issues can be time-consuming especially writing it up, but background syncing of photos and videos to online and cloud digital services while writing can actually make good use of time, but for many high in file size video files, uploading video files may take a while, important actually to offload photos and videos from phones and tablets on regular basis to avoid becoming frustrated with technology. More frequent data transfer can enable users to learn techniques to help master or better interact with digital technology.
The DNS Domain Name System service has zone files. A Domain Name System zone file (DNS zone file) is a simple text file which is automatically bundled with DNS records.
The basic or simple text file contains all the necessary information of all resources or name service records for the particular domain in question - a computer typically references a primary and secondary name server to map a domain name to an IP address. Real people can more easily remember domain names such as bbc.co.uk, the nation's most trusted broadcaster.
A zone file is a text file that describes a DNS zone. The BIND file format is the industry preferred zone file format and has been widely adopted by DNS server software used really in the Linux world and certainly on Ubuntu. The format is defined in RFC (Request For Comment) 1035.
Berkeley, BIND and MIT Massachusetts Institute of Technology OpenCourseware
BIND is Berekely Internet Name Daemon - daemons are the hallmark of Linux server services, for example the Apache web server is known as the httpd daemon. BIND is for DNS the name resolution service think IP address computer often four dot numeric address to logical domain name human readable name. Berkely as in University of Berkely a big established University with roots to the Internet's beginnings - MIT is another big University known also as Massachusetts Institute of Technology and has open learning materials see https://ocw.mit.edu/, great many subjects here from computing to sciences including medicine but also arts and humanities subjects including but not limited to anthropology. Actually this website has some really complex topics linked to computing. Ability to explore topics or subject matters and there are a whole range of subjects such as probability and statistics, engineering and philosophy. Also Architecture, Applied Mathematics, American History and Artificial Intelligence.
This is an example of a Google short answer from analysis and from previous technical knowledge it is accurate - RFC is also an abbreviation for Remote Function Call. A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that is the result of committee drafting and subsequent review by interested parties. Some RFCs are informational in nature.
IETF task force standards and also IEEE specifications known as the Institute of Electrical and Electronic Engineers are right through Cisco computer network curriculum via Cisco's networking Academy. Standards are the hallmark of computer networks - standards lead on to interoperability and devices being able to talk to one another also communicate back and forth seamlessly in a common message format - ICMP Internet Control Message Protocol is the error message format for Cisco routers, small error messages to aid diagnosing of problems.
Seek a definition on Request for Comments and be reminded about Remote Function Call - acronyms and abbreviations right throughout the field of computing and a thorough grasp of language enables connotations to be drawn also enables logical comparisons too look for new meanings to also better understand topics and concepts. Bear in mind actually it appears computing professionals often contribute in the online space including to Wikipedia - sharing fundamental to advancing knowledge.
In a nutshell, Remote Procedure Call is a software communication protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details. RPC calls more often than not are synchronous - The key difference between synchronous and asynchronous communication is synchronous communications are scheduled, real-time interactions by phone, video, or in-person. Asynchronous communication happens on your own time and does not need scheduling - ASDL was Asynchronous Digital Subscriber Line faster downloads than uploads this started off broadband in most homes in the North-East of Scotland, SDSL resulted in same speed upload and download - S for synchronous.
RPC is used to call other processes on the remote systems like a local system.
Reverse DNS lookup is an IP address to friendly name like a domain name mapping - The reverse DNS linked to the ARP command performs a reverse DNS lookup and return sthe name record for that IP address. This method of reverse DNS resolution of an IP address uses a PTR record. Using reverse DNS, the IP address is reversed and then the in-addr.arpa is added to the end.
Each DNS database zone file consists of one or more resource records, including the Canonical Name (CNAME) this is a friendly name usually represents a shortcut in DNS real name or real world terms, Pointer (PTR) and Mail Exchange (MX) records - MX records point to email services such as Google Gmail online service. Organisations with domain names can use Gmail for the email service.
Creating and updating the resource records that comprise the DNS zone files is one of the primary tasks of a DNS administrator.
The zone file contains mappings between domain names and IP addresses and other resources, organized in the form of text representations of resource records (RR). A zone file may be either a DNS master file, to describing a zone as an authoritative master server for name resolution, or it may be used to list the contents of a DNS cache.
DNS servers perform one or more functions also perhaps called Zone Master Servers. A master name server maintains all the data corresponding to the zone, making it the authority for that zone. Master servers are commonly called authoritative name servers.
Zones need explained as a concept - DNS is a hierarchical system and many countries have Top Level Domains such as com.au for Australia, dot jp is Japan and dot co dot uk is the United Kingdom, dot com usually American websites like dot gov which is US government websites. UK government websites are dot gov dot uk and Australian government websites are dot gov dot au.
Dutch websites use dot nl, the Dutch train time service is ns.nl and French websites are dot fr while Italian websites are dot it also Altervista is actually an Italian web hosting service but it has English facing services also. Italian websites actually difficult to understand without understanding Italian. per favore is please in Italian like sil vous plait is please in French - important to be polite when travelling holidaying abroad, try to speak to natives in their own tongue such as in restaurants. They usually like it when foreigners try the local lingo and waiters and waitresses usually smile. Electronic language translators long been on the go, but now there is Google Translate from smartphones.
Google Translate web-based service has evolved improved over time has a long history on the web - on mobile first though their was Google Goggles for instant language translation and also Google Latitude discontinued for WiFi tracking also DNS Domain tree structure explained
Google Translate has historically been available from a web service but the service from smartphone actually had a different name in the beginning - service can change names as service offering evolve. Google Goggles was the translate service from smartphone just like how Google Latitude enabled WiFi tracking from mobile devices - the latter service has been discontinued. Google Lens is the new mobile service that enables users identify names of plants and animals via camera on a smartphone using also mobile data.
Hierarchical is a tree like structure - top level domains come at the end of a domain name, in the middle is usually a specific name or string chosen by a customer or user who pays money also purchases a domain name and they usually represent a company name or brand. Domain names can have sub-domains for example news.bbc.co.uk - news is a sub-domain of the wider bbc.co.uk. This domain name is known to most people and households in the UK and the BBC has the BBC World Service which is the television service available in most parts of the world outside of the United Kingdom. Due to the BBC licence fee, it is UK households and residents that actually gain the most from BBC content, the most enriching and engaging content such as the BBC iPlayer, but the iPlayer and its content can be accessed through a Virtual Private Network - VPN services may be paid for services provided by commercial companies. Countries may restrict VPN acess based on IP address.
BBC World Service is often a basic service like CNN outside of America. Go back to James Bond and Golden Eye, Judi Dench in her first encounter as M implied American intelligence came from CNN the news broadcaster in reference to an incident in Russia implying that British intelligence was ahead and did not rely on the mainstream media - in this film Robbie Coltrane was involved as a Russian KGB agent.
Technical definitions from Google, copying text and plenty whitespace in HTML aids web page coding simplifies adding container tags wrapping of HTML elements around text
Google's answers technology is useful for technical definitions, but it is not exactly clear who owns the copyright. Google is a search service, indexes content but actually Google is an aggregator as well for online information - it is a search service that can provoke an enquiring mind stimulate information seeking behaviour and provide prompts and answers, also cues and those with additional difficulties like show and tell and often like cues also prompts someone to always be there.
Google great useful service but previous knowledge from study of concepts enables analysis also with respect of remembering events that have happened.
Google provides great definitions but actually humans can enhance definitions provide greater meaning use alternative meanings break down and simplify concepts. Technical definitions through Google search a typically short, not elaborate in a very real sense - it is humans that add real definition and explain in layman terms, educate others also connect the dots provide synthesis bring concepts together to explain help others understand.
It is always important to cite or reference sources since others can verify or substantiate your claims. Of course people may copy text and take credit for work that is not their own - broad sharing and making people aware of the author can actually out people that seek to take advantage of free content and copy and paste at will.
However, copying text can actually seek to preserve good material that is educational - copying goes hand in hand with acknowledging sources giving individuals credit for their contribution and actually this is what spurs on originally and innovation. New works and new creative works can be interesting and inform also spur on others and spark ideas also improvements when people object and complain.
Whitespace between lines it was enables rapid copying with the ability to apply mark-up or HTML tags such as wrapping p or letter-p paragraph tags around text. Nicolo Capani's advice works well applied to traditional principles of journalism with respect to typing also copying text - his advice may not work so well when web page code is more complex or complicated such as where PHP scripts are used. Really Nicolo's advice actually good for copying for example Facebook video descriptions to Notepad and then wrapping paragraph tags for example around text - really whitespace serves this purpose well also take Google Chrome and when you view source code in the web browser text automatically wraps so in a sense publishing web pages and using web browsers to access clean code and text serves well to preserve content.
Worth always remembering there is the Copyright, Design and Patents Act 1988 section 28 which stipulates fair dealing to copy 10 percent of published works. Creativity and people sharing mistakes also workarounds having humility admiting when they have done wrong is actually the hallmark of positive change when people seek also strive to be well-meaning think of others and make improvements. Continual improvements is central to improving service provision as is continuous professional development, embracing change and also new technologies. Often it is new innovative technologies that improve efficiencies lead also to a better improved quality of life and standard of living.
Incremental back-ups can back-up just content of a website efficiently low file size - spliting documents and photos into a single container file sharing via social media websites
Incremental back-ups of data really useful actually to preserving text content such as web pages - the web pages comprising a small to medium website minus all the supporting documents also images can be small in fact enabling incremental back-ups to save storage space - benefits of combining documents also images into single container video files and sharing via media sharing websites is that the real substantial detail can be viewed easily in sequence in a logical order, but sequencing and order takes planning usually for good effective story telling but sometimes events that roll on forward like life is more suited for timely news - the messages on this website can be backed-up most efficiently.
Microsoft OneDrive also Google Drive do provide 15GB free storage space actually - actually free accounts can actually provide a means to back-up really essential data you do not want to lose. Free accounts can enable data duplication.
Free 15GB digital accounts suitable for a child with passwords shared amongst multiple loved ones.
Actually a free account of 15GB could be suitable for a child where the password is shared by an Uncle or Aunty for example and parents containing positive imagery of loved ones associated with a child, photos from a child's early years and childhood including videos, also relationships such as family trees and links to Facebook Timelines of family members including people who may be understanding and supportive in the event of some unforeseen tragedy - actually multiple people knowing the passwords for an account linked to a child actually could help a child keep fond memories - tablet computers can be linked to online accounts also and when a tablet is lost it may be necessary to change the password without need to remotely wipe a tablet or smartphone.
Photos of parents, grandparents even great grandparents is one thing, but identifying people is a different matter - sometimes sharing photos is necessary to identify people, wider family members may actually people able to identify someone from the past.
This really makes the case for renaming filenames and renaming filenames linked to photos with names of linked corresponding people.
Google Maps zones in using IP address also GPS and compass
Google Maps hones in on your current location usually the place where you are or reside, your home - this is based actually on your computer's IP address from a laptop and desktop computer at home. On the move via mobile data, Google Maps refers to GPS coordinates and actually the compass plays a role here.
Compasses typially have four sides - North, East, South and West - Never Eat Shreaded Wheat is the way to remember the compass rotation.
Raster images and vector graphics also Google Image search
Google Image Search actually contains a vast number of diagrams perhaps useful for reference - if you find something useful right-click on an image and click Save Image, making sure not to click Save Link if you are running Mozilla Firefox. Diagrams are different from JPEG photographs - there are raster images also vector images.
Raster images are the types of images that are produced when scanning or photographing an object. Raster images are compiled using pixels, or tiny dots, containing unique color and tonal information that come together to create the image. Since raster images are pixel based, they are resolution dependent.
Vector graphics like PNG images or line art more suitable for diagrams with lines and textual content - a vector graphic is an artwork made up of points, lines, and curves that are based upon mathematical equations, rather than solid colored square pixels. This means no matter the size or how far zoomed in the image is, the lines, curves, and points remain smooth.
Indexing delay for digital content - Search engines such as Google crawl the web to find new pages - actually topical news stories may disappear from BBC News Online website and may not appear in search results for a few days, weeks or months
Search engines such as Google crawl the web to find new pages - actually topical news stories may disappear from BBC News Online website and may not appear in search results for a few days, weeks or months. Really important to continue flow, if a story catches your eye, copy the website address or specific page, reference it and start a discussion around topics linked to the web page having been copied. Going back in time in the timely production of Google search results in the information world is more difficult without tracking events over time whether bookmarking web pages or honing in on interesting events that have happened over time. People often hone in on topics that interest them - this is actually linked often to technical vocations and also people can be career focused with the aim to advancing career prospects bettering themselves.
This is linked to indexing of web pages and actually through what used to be Google Webmaster Tools now the main Google console, webmasters can specifically create XML sitemaps to automatically create a record of all web pages on a website to notify Google the search giant of changes also new web pages. Big issue is that journalists working for news organisations like the BBC for example, may churn out many web pages every single day but actually it is important also to notify search engines of new web pages.
Really for ordinary readers and viewers of web pages, it is important to bookmark interesting news stories they have read, but actually it is easy to discard a story, read it at a glance and feel it is not worth bookmarking - issues come actually when users or viewers want to reference past stories that have been archived at a later date. Actually index and search is important - also being specific with due regards to dates is also important - simply referring to years may not be adequate when an individual want to reference an event that has happened but cannot be specific also pinpoint the date a particular event happened.
Search engines actually enable broad distribution and copying facilitating indexing of digital content and with replicas of content actually this reinforces digital integrity - it is publishing, sharing combined with copying that reinforces digital integrity in the digital age, but still information can be changed on the fly also people make mistakes and video is more visual content and seeing really is believing.
So with this Google Bookmarks also syncing Bookmarks in Firefox is important - Google also uses active sync technology to keep bookmarks in sync across mobile, tablet and computers but still syncing can produce errors and may not always work - however exporting bookmarks to HTML web pages, deleting bookmarks synced to online services and re-importing from HTML files can help to simplify digital lives sometimes.
Deleting is also part of managing data minimising load on file servers more so in the information or document retrieval world less so with photos and videos since nice imagery natural world scenes provide snapsnot into time also summarising information and publishing also sharing with others can lead to education and teach others. HTML web pages are relatively small in size when code is kept clean and web pages efficient enabling also optimisation and faster load times on slower networks such as networks in African nationals using Global Packet Radio service. Video can also show how conversations change over time, enable abuse to actually be picked up highlighted also potentially enabling someone to get help, be supported, improve life chances and real world prospects.
Create an XML sitemap automatically a no brainer approach definitely not intimidating, a simplified approach and easy upload to Google's console to notify of web page changes - see https://www.xml-sitemaps.com/
Google's search console - https://search.google.com/search-console/about
Google search central formerly Google Webmaster Tools - https://developers.google.com/search
Google Analytics useful for general statistics about web page visitors such as what computer platform they are using also which web pages are more popular, but knowing whether the figures are accurate is a different story hard to tell with random numbers - https://accounts.google.com/ServiceLogin/signinchooser?
TCP windowing and buffering regulates flow control - Slots and appointments for court actually translate to use of video for people attending court via video link over the shared medium the Internet - also use of Leyer 2 two Tunnelling Protocol can encrypt connections using a Virtual Private Network - also the concept of windowing provides flow control in computer networks, controlling sending data packets between two network devices where dependable and sequential delivery of data packets is needed
Big issue actually 100 one hundred people may attend Aberdeen Sheriff Court on a single day all given 10am or ten in the morning just after cowboy time - traditionally ten to ten - not separate appointments for flexible travel by bike. Slots and appointments actually for court cases helps people to get there and turn up on time - appointment windows is like the windowing concept in computer networks.
Slots and appointments for court actually translate to use of video for people attending court via video link over the shared medium the Internet - also use of Leyer 2 two Tunnelling Protocol can encrypt connections using a Virtual Private Network. Video link actually has potential for more flexible use of time with also renegotiation - Internet communications use TCP Transmission Control Protocol and a 3-way handshake with an ACK to say thanks Acknowledgement packet for a message received also a SYN bit for synchroisation and syncing connections or establishing a connection.
The SSL renegotiation flaw can affect different types of systems. It is essentially caused by a vulnerability in the client-initiated renegotiation of SSL/TLS for existing server connections. Some of the symptoms of renegotiation issues include: It fails in the case of a virtual server processing SSL connections.
SSL/TLS client-initiated renegotiation is a feature that allows the client to renegotiate new encryption parameters for an SSL/TLS connection within a single TCP connection. During the SSL/TLS handshake the server incurs a higher computational cost.
Starting a new handshake negotiation inside of an existing secure session is called renegotiation.
A sliding window is also known as windowing. A sliding window is a method for controlling sending data packets between two network devices where dependable and sequential delivery of data packets is needed, such as using the Data Link Layer (OSI model) or Transmission Control Protocol (TCP). Data packets usually sent unordered but windowing brings flow control in essence to a computer network.
Buffering linked to the concept of windowing can cause a problem if the sending device transmits data much faster than the receiving device is able to manage it. Windowing in a windowing environment, data is sent in groups of segments that require only one acknowledgment. Groups of messages help to bring more order to chaos over the Internet and in data communications.
Clideo easily rotate a video up to 500Mb so for small video files and supports upload from Apple iPhone Mov or Movie format also from Android MP4 format also Radio waves and satellite signals use line of sight and also Infrared visible in the dark good for night vision, Infrared beams out TV or television signals from the Durris transmitter and bridge between Drumoak and Durris now closed to traffic
Clideo easily rotate a video dependent on a data connection from a web-based interface up to 500Mb so for small video files and supports upload from Apple iPhone Mov or Movie format also from Android MP4 format - https://clideo.com/rotate-video. Export also to WebM format high visual quality low file size good compression - innovations and new developments happen all the time.
Ever noticed how Android uses MP4 or MPEG-4 also Motion Picture Experts Group format files. Well that is linked to H.264 video compression standards and published works from Processor Iain Richardson of Aberdeen's Robert Gordon's University School of Engineering the former lecturer who moved on to become a reader preferring perhaps a role in research into compression algorithms also codecs instead of a spot in the limelight. It should be noted the author of this web page has not bought the published work of Iain Richardson but did email him as a student insisting this student was in receipt of public funds and students should not be pressurised to buy the published works of academics. MP4 and Android now everywhere - great exceptional talent might come from Aberdeen's RGU and students are usually the best ambassadors - also the University always sending Alumni bulletins to graduates might not always be read but it is proof the University keeps in touch with its graduates after graduation. Credit actually must go to Iain Richardson for producing published works on H.264 he was ahead of his time - educators must get ahead of time in a sense so that inventors create novel solutions.
Clideo actually as an online service has limits or limitations also restrictions for example it is for flipping video files solely and purely when they are the wrong way around might help some novice video users to easily change orientation of small video files. Limited to video file upload to 500Mb. Online services for video editing do tend to be limited in respect of video manipulation.
Always better to write about interactions with online services while events are fresh in your memory, documenting issues and workarounds maybe the best way to let off steam against the backdrop of constantly changing dynamic user interfaces, but actually while online websites and services can have screen changes actually it is static web pages with content that focuses on education that makes users keeping coming back or returning. Most children learn to write in early years primary school - language and comprehension gets ingrained in a young learner's mind and seems to be retained for well several decades nowadays Scottish school children are learning Jolly phonics phonetic sounds and there is the NATO phonetic alphabet Alpha, Bravo, Charlie and so on - also two-way radios also the need to say Roger that this was crackling and interference, the Linux and MS-DOS world has the echo command which writes text to the screen, with redirection indicator or greater than symbol > text strings can be output to a file.
Actually echo command can be used in MS-DOS batch files to automate installation of applications or Windows computer programs to unattended installs with screen output to inform the user what is going is on.
Batch files easily written and best written in Windows Notepad basic text editor like HTML web pages - Notepad can produce Universal TXT files compatible with Android as well as Windows, Mac and Linux enabling porting data migration of data real well between non-compatible systems but actually real benefit comes from sharing information and File, Save As in Notepad and filenames with .html or dot html the universal sharing format for web pages.
Still TXT files can be simple, useful to quickly copy text from video descriptions shared on Facebook also shared text on Facebook preservation of digital content for local storage and storage in online cloud storage providers or with online storage services.
Sometimes it is worth repeating information for clarity where it seems relevant but really this has been mentioned before and actually repeating can be wasteful, actually in conflict zones there can be need to streamline news focus on key details bring the most significant details to the fore without delay - news is usually timely and events keep on happening, delays can be costly. Historically Ethernet local area networks used Hubs for small networks and repeaters to extend signals, boost range and amplify signals.
Signals may get relayed through satellites with delays and delays also known as latency also signal attenuation - Possible communication satellites may be active or passive.
An active satellite is one which has transmitting equipment aboard, such as a transponder, a device which receives a signal from Earth, amplifies it, and retransmits the same signal back to Earth (either immediately or after a delay).
Radio waves use line of sight and also Infrared visible in the dark good for night vision, Infrared beams out TV or television signals from the Durris transmitter and bridge between Drumoak and Durris now closed to traffic - The high frequency radio waves used for telecommunications links travel by line of sight and so are obstructed by the curve of the Earth. The purpose of communications satellites is to relay the signal around the curve of the Earth allowing communication between widely separated geographical points.
Just like how satellites aid or facilitate data communication also modern telecommunications, real people do need to move around on the ground.
Simpler to charge an electric bike and charging an electric bike can be done using Alternating Current during the night from homes also households taking a lithium battery off a bike that can hold a charge typically for between 25 and 70 miles this is local travel but Aberdeen to Inverurie is possible as a day commute and Aberdeen City Council is upgrading this route - really electricity consumption might be higher during the night in future, but really most workers will need EV vehicles to get to job roles and workplaces without more localised working patterns and reorganisation of Scotland's disparete workforce affecting job opportunities perhaps also care for vulnerable persons - Aberdeenshire very rural sparsely populated with large expanses of agriculture also farming land and mostly during the Summer months there is the Hay Bail Harvest for whiskey production.
Electric vehicle EV charging instructions at Kingswells Park and Ride the future of motoring, digital skills education means more independence for women - Mennekes Type 2 plug green lights on the back of chargers indicate EV chargers ready to use. Activate charger, plug cable into vehicle, lift flap to connect to socket - flaps totally sealed impossible to open without swiping card making contact with sensor - not clear where the sensor is, it might be the user interface screen or panel. Sensors are present on EV chargers Kingswells no buttons present on EV chargers - users swipe a card at a sensor. This is breaking down EV charging, explaining. To unplug an EV car, need to power down an EV charger absolutely no instructions provided at Kingswells about how to power down a charger although instructions are provided giving detail on the EV charger still some people may appreciate show and tell more and this is hands on learning also known as kinaesthetic learning, a learning style or means of learning - learning usually learn using a varierty of methods and different learners can have preferences some people prefer visual means of learing actually most people learning better from seeing something with our own eyes. LED lights go from blue to yellow and green. Might need to push cable into unit if you struggle to get it out. Important everyone gets their head around EV chargers - electrofication is the future of motoring for everyone that has a will to live.
31st July 2022 Kingswells Park and Ride - this is solar panel sensors linked to Zebra crossing beacons, sustainable solutions and safety now going hand in hand also linked to solar power. Note also electronic panel at the Arnhall Drive bus stop on Westhill Drive for display of bus times - electronic displays make it easier to update information from afar or remotely.
The Speccy application can obtain a pre-installed product key for Windows 10 from a laptop that users have purchased, so important actually to take a note write down or document product keys when you first purchase and turn on a new Windows 10 or Windows 11 laptop - Really users and organisations need to always seek to migrate data formats - this is data conversion and the TXT file format is universal - TXT files created with Windows Notepad also FileInfo.com or dot com can offer applications when Windows 10 does not recognise a file type or file extension
There is a difference between personal stored data in online storage, what is published online and what people remember or can recall based on what they have learnt and also based on acquired knowledge.
Google search also Google smart answers based on web search or user queries actually useful for technical definitions and searching for specific technical terms reveals the most useful, informative information which translates to educational material.
Students may do courses at College perhaps Polytechnic Colleges in America and degree level courses at University also often digital course materials may be produced and shared by both academics and students. Keeping such course materials long term can be beneficial to jog memories, look back also at what was taught in the past, but actually events happen and the world moves on.
Developments in computing can be slow to roll-out on a mass scale, Facebook was very disruptive - Windows XP was around for 10 ten years from 2001-2011 being actively updated by Microsoft also there was lots of counterfeit versions which thus drove the need to activate Windows and copyright protection measures, also Windows uses product keys and they used to come on new computer units as a label for example underneath a laptop, but nowadays laptops may not come with a product key stuck to the base on a label.
The Speccy application can obtain a pre-installed product key for Windows 10 from a laptop that users have purchased, so important actually to take a note write down or document product keys when you first purchase and turn on a new Windows 10 or Windows 11 laptop to assist re-installation for when or the occurrence of malicious software or malware wreacks havoc and you need to perform a fresh setup or installation of Windows 10 for example possible via Reset This PC from Windows 10 search box.
https://www.ccleaner.com/speccy
Much software still available to download online is available for older versions of Windows than Windows 10 and this is known as legacy software applications and legacy support.
Larger organisations may still use legacy applications for bespoke purposes and for particular applications and there is a need to migrate or port data in old proprietary formats - data may be on old media like floppy disks less seldom nowadays - actually newer computers did away with floppy disk drives.
Really users and organisations need to always seek to migrate data formats - this is data conversion and the TXT file format is universal - TXT files created with Windows Notepad - click File, Save As from Notepad, then in the File type box type in a filename in double quotes with the file extention dot html or .html this is Web page format - no need for a full stop after html but important to put a full stop before the suffix html. Suffixes and prefixes are two different components of language. A prefix comes before but file extensions are known as suffixes and come at the end - right-click a file in Windows Explorer the main window for browsing files and then click Properties to view the file extension of a given file - file extensions have three dots usually the last three dots and different applications open files with a unique file extension.
The website https://fileinfo.com/ enables lookup of file extenions to match a user application to open an unknown file type or a file Windows 10 cannot open. FileInfo.com gives a choice of applications to open a given file type - some applications may be free, open source and some maybe paid for.
Paid for applications may also have 15 or 30 day trials useful for students, demos and testing software to see if it fits your needs and often trial software has limitations, this is to encourage users to spend money in the digital economy. Those who work in the digital economy are likely software developers who seek to help others, computer users, accomplish tasks, user goals, solve problems and make traditional business tasks more efficient.
Useful website of the digital age is MyAberdeenshire website pay bills, check bin collection dates and pay for Council services as well - https://www.aberdeenshire.gov.uk/my/
Legacy software applications can be useful have bespoke particular applications, but with older applications there are security vulnerabilities and the need to install updates, patch programs install hotfixes.
Hot fixes generally tend to address a particular problem - updates to Windows 10 can include new product functionity as well as security enhancements.
Stored data from past study may be different actually to events that have happened since - events in computing evolve actually during 2001 when Windows XP emerged there was really no such thing as self-driving automated cars but the year 2000 saw the emergency of the first electric vehicle the Smart car, a compact tiny electric vehicle could not take much luggage and around this time there was the Ford Ka, another small car - small cars may be preferred by female drivers like young woman with children who are parents.
Also it is difficult actually to properly assess or analyse what stored data actually is stored in online storage with most cloud storage providers such as Google Drive, Dropbox and Microsoft OneDrive without opening files and accessing stored data.
Really there is a need to open files - actually create new fresh content based on stored data become possible. Stored data can spark new ideas lead to helpful information that is more accurate, lead to more accurate reflections taken into consideration events that have happened and been published in the media.
Broadcast storms can overwhelm a computer network and ping commands can check if a router or computer server is alive or active but also ping can lead to ping floods overwhelming servers known as Denial of Service attacks knock online servers offline also Arp cache on Windows 10 arp minus a or arp -a reveals paths to the Internet on Windows 10, also arp -d can clear or flush a local cache to resolve issues from Command Prompt
Flooding and Broadcast are two routing algorithms used in computer networks today. Flooding sends all incoming packets through every outgoing edge. Broadcasting means every device in the network will receive a packet.
In the case of a ping flood or a denial of service attack, it can be harmful to the reliability of a computer network. Messages can become duplicated in the network further increasing the load on the network as well as requiring an increase in processing complexity to disregard duplicate messages.
ping commands can check if a router or computer server is alive or active but also ping can lead to ping floods overwhelming servers known as Denial of Service attacks knock online servers offline. There is always good and bad intentions with computer networks - hackers may use port scanning as pre-emptive to hacking so really firewalls are important to only allow data traffic through designate ports like windows or access holes to online services.
Broadcast storms - A broadcast or data storm is excessive transmission of broadcast traffic in a network. This happens when a broadcast across a network results in even more responses, and each response results in still more responses, in a snowball effect.
When the switch receives a broadcast frame, it sends it out to everyone connected to it. In flooding the switch sends the frame to all because it doesn't know how to reach the destination. In broadcasting the host that created the frame itself addressed the frame to everyone. ARP process uses flooding not broadcasting.
Broadcast storms can be caused by - Due to high processing demands during a broadcast storm, communication may fail between end stations in the broadcast domain. During a boardcast storm, constant changes to the MAC address table prevent a switch from accurately forwarding frames. MAC address tables are often highlighted using the arp command which shows routes or pathways to the Internet.
Mesh Topology Flooding Technique - In flooding, the same data is transmitted to all network nodes like computers connected to a network this can make information delivery efficient support efficient transmission of data. Hence, no routing logic is required here. Moreover, in flooding, the network is robust, and it is not interested to lose data, but it leads to unwanted load over the network.
Flooding in networks downside - It is wasteful if a single destination needs the packet, since it delivers the data packet to all nodes irrespective of the destination. The network may be clogged with unwanted and duplicate data packets. This may hamper delivery of other data packets.
A broadcast message is destined to all network devices. Broadcast routing can be done in two ways (algorithm): A router creates a data packet and then sends it to each host one by one. In this case, the router creates multiple copies of single data packet with different destination addresses.
ARP broadcasts a request packet to all the machines on the LAN and asks if any of the machines are using that particular IP address. When a machine recognizes the IP address as its own, it sends a reply so ARP can update the cache for future reference and proceed with the communication.
Explanation. The Reverse Address Resolution Protocol (RARP) is an obsolete computer networking protocol used by a client computer to request its Internet Protocol (IPv4) address from a computer network, when all it has available is its link layer or hardware address, such as a MAC address.
ARP is linked to updating routing tables and routing information in connection with routers on the backbone of the Internet - By extension, an ARP table is simply the method for storing the information discovered through ARP. It's used to record the discovered MAC and IP address pairs of devices connected to a network.
ARP discovers the MAC physical hardware address of a network adaptor or network interface card a circuitboard inside a computer - By extension, an ARP table is simply the method for storing the information discovered through ARP. It's used to record the discovered MAC and IP address pairs of devices connected to a network.
The arp minus a or -a command on Windows 10 from a command prompt reveals routes or pathways to the Internet. This is known as the ARP cache on a local Windows 10 computer. A cache of routes or entries is how data packets are forwarded most efficiently - well it is how local user machines running Windows 10 know how to handle information requests, for example a user request for a web page or to send an e-mail by the way of Microsoft Outlook or Windows Mail an application on Windows 10 version ten.
Arp minus d or arp -d flushes the ARP cache on a local computer or machine, zeroes it or wipes it clean. This can clear issues linked to name resolution in connection with a MAC address or a physical hardware network adaptor but also there is ipconfig/flushdns which clears the local resolver cache.
- Click Start and then Run or type in the searh box in Windows 10 ten which also works like the Run box in older versions of Windows.
- Type cmd and click OK to bring up the command line.
- Type arp -d to flush the ARP cache.
- Type arp -a or arp minus a with a dash to view the current ARP cache.
Breakdown of how satellite communications work with Network Control Protocol also DPUs really the purpose of NCP the network protocol is to connect two remote users located geographically independent of each other useful in adverse weather - shift from 3G circuit switched network to packet switching Internet TCP/iP communications with 4G and 5G - also Assembley language specific RISC instruction set used for device drivers also ARM chips used with mobiles and tablets, also Microsoft bundles lots of device drivers with Windows 10
NCP linked to parking also linked to Automatic Number Plate Recognition (ANPR) system, a different system entirely to the Network Control Protocol used in satellite communications. NCR for parking means that your vehicle registration number is captured when you drive in and out of a car parks using NCP. This allows for accurate determination of arrival and departure time in car parks.
The Network Control Protocol (NCP) is a mechanism used to establish and configure different Network Layer protocols for Point-to-Point Protocol (PPP) connections. The Network Control Protocol is used in satellite systems to relay messages also satellites are now being used for Internet access to really connect two remote users located geographically independent of each other this is what a Point-to-Point connection means in practice over the Internet normally by means of a TCP Transmission Control Protocol session.
TCP establishes sessions in communications at a data level that is why there is a three-way handshake with ACK data packets to say thanks. TCP sessions get established for the exchange of IP Internet Protocol data packets - these are the small units of information sent unordered across the Internet, packets less than 64Kbps known as runts and are malformed not proper data packets. ICMP is the error messaging protocol sends error messages and diagnostic information between routers usually these are small limited to essential information for resolving issues or problems and for fault finding may also be referred to troubleshooting.
Switches are also found in computer networks - they transfer frames. There is data encapsulation in a computer network where messages get wrapped in outer layers or encapsulated, framing is one technique and is done usually at the Data link layer the same layer where MAC Media Access Control addresses are involved these are the world unique hardware addresses physically shipping on circuitboards such as network adaptor cards. There is a protocol called Frame relay used also in connection with Cisco routers sometimes.
How Does Frame Relay Work? Frame relay uses packet switching technology. This means that it breaks data, such as call data, into smaller packets, also known as frames, to transmit it through a shared frame relay network. These data packets are then reassembled at the data's destination.
Frame really used in packet switched networks like the Internet - frame relay lower level encapsulation technology for IP Internet Protocol data packets with a message also called payload data - payload modules may go on rockets built using modular engineering by teams of people.
Traditional phone network hard wired in most homes using copper cabling is circuit-switched and 3G, 4G and 5G is known as cellular.
From circuit switching to packet switching a movement in telecommunications from 3G to 4G and 5G actually - In the cellular network GSM (2G) and UMTS (3G) use circuit switching for voice, circuit switched dialup (CSD) and short messaging service (SMS) traffic and use packet switching for GPRS data traffic. In LTE also 4G the entire network uses packet switching and has no capability for circuit switched network support.
4G vs. LTE. In laymans terms, the difference between 4G and LTE is that 4G is faster than LTE. The reason for this is that 4G meets the technical standards designated for it whereas LTE data transfer speed standard is merely a stop gap measure standard devised until actual 4G speed is realised.
The future of telecommunications is really packet-switched technology, but migration can take time - job roles here for telecoms engineers.
A DPU is a specialised piece of hardware and is used with the Network Control Protcol in satellite communications for the relay of messages between two remote users at ground level somewhere back on Earth - two users may be geographically independent of each other. So a DPU is special hardware in data communications and actually it is used in both satellite communications and also in data centres so a device with multiple practical applications in the real world.
A DPU also is essentially designed to process data moving around the data center. It focuses on data transfer, data reduction, data security and powering data analytics, as well as encryption and compression. This means it supports more efficient data storage and frees up the CPU the brain operation of a computer also known as the processor or microprocessor derived from silicon to focus on application processing.
A DPU is system on a chip (SoC) that combines three key elements: An industry-standard, high-performance, software programmable, multi-core CPU, typically based on the Arm architecture (a form of reduced instruction set like RISC from computing) and tightly coupled with the other SoC components.
ARM chips found in most mobiles and tablets from the Cambridge firm and also RISC is an instruction set linked to assembly level computer program code.
Assembly language really low level code close to binary programming - it is a special language really requires computer programmers with special knowledge of RISC (Reduced Instruction Set) computer program sets also assembly language - device drivers for computer hardware often tend to be written in low level assembly language.
Device drivers control the interface between computer hardware the physical devices and an operating system such as Windows 10.
From Windows 7 seven actually, Microsoft incroporated support for many device drivers - think Plug n' Play hardware detected automatically when connected to a computer.
Microsoft can be dominant with its Microsoft Windows software and Windows 10 is very popular certainly the software giant bundled Internet Explorer with Windows XP for example.
Really those with knowledge of special programming languages like Assembley language which really requires technical skill being close to binary can be overlooked in the computer industry by big major corporate giants who dominante the market.
Device drivers in Assembly language can be linked to Network Interface cards and nowadays there are SmartNICs increasing in popularity.
SmartNICs are different from regular NIC (Network Interface Cards) in two primary ways - capabilities and components. At a high-level, SmartNICs deliver accelerated, hardware-based networking, storage, and security capabilities for cloud, Artificial Intelligence, and traditional enterprise workloads.
In satellite message relay systems there is a Network Operations Centre likely at ground level - ground zero also linked to base stations think back to base camp and Infrared useful for night time communications also Infrared on television masts such as Durris - From a security perspective, the NOC functions as the first line of defense that enables the organization to monitor network security and recognize and address any attacks or disruptions to the network. Wireless signals from a base station radiate out to cordless phones in homes and a home can have multiple cordless phones linked to base stations loosely arranged in close proximity around a home. Nowadays mobile communications and Internet streaming also box set viewing very common in most households across the UK. Box set viewing can be linked with the couch potato lifestyle - sit back, relax watch TV passively this is also entertainment but also educational messages maybe attached.
In a business, network operations center (NOC) ensures that the business and the data are safe. The systems are operational and in order. It provides automated diagnostics and advanced alerts that help in keeping the business in operation.
Satellites higher capacity than on the ground radio waves like WiFi which use electromagnetic waves so much more data can be sent by satellite and via wireless than by cable also wireless communications more flexible but less secure also wireless more agile and natural disasters are increasing - to break it down first off, satellites use higher frequencies that are more powerful than other radio waves and allow them to concentrate all available power into a narrow beam. This helps to reduce bandwidth, which leaves more bandwidth over to send more communications.
Satellites also enable Earth monitoring and the monitoring of weather patterns also able to look down spot areas of trouble such as tree cover for example.
Satellites are GeoStationary placed 22,300 miles above the equator.
Breaking down satellite communications - GEO for radio broadcasting and VSAT for home computer users
GEO stands for Geostationary Earth Orbit. The communication satellites in this orbit operates at a distance of about 36000 km above the earth's surface and their orbital time period is about 24 hours. Geostationary Orbit Satellites are used for radio broadcasting.
Ground stations will have a satellite dish to link up or connect with satellites in the sky.
VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users. A VSAT end user needs a box that interfaces between the user's computer and an outside antenna with a transceiver. The tranceiver receives or sends a signal to a satellite transponder in the sky.
VSAT great potential application the London and New York Stock Exchanges - A very small aperture terminal (VSAT) is a data transmission technology used for many types of data management and in high-frequency trading. VSAT can be used in place of a large physical network as it bounces the signal from satellites instead of being transported through physical means like an ethernet connection.
VSATs access satellites in geosynchronous orbit or geostationary orbit to relay data from small remote Earth stations (terminals) to other terminals (in mesh topology) or master Earth station hubs (in star topology).
Economic recovery for the global financial system needs to be quick and responsive to shocks and natural phenemena - VSAT services are independant of other wired and wireless mediums used as transmission network service provider. Hence it is a great backup system which is available during disaster and emergency situations.
Satellite boosts content availability in the face of freak weather events, natural phenomena events.
2017 published by IEEE originally ICN-based protocol architectures for next-generation backhauling over satellite - https://ieeexplore.ieee.org/abstract/document/7996549
Abstract of published work or blurb in a nutshell - The increasing demand for mobile services has been calling for new anywhere-anytime communication paradigms, building on the integration of heterogeneous technologies, such as satellite, LTE, and the new generation of mobile networks, i.e., 5G. In particular, the network design philosophy has shifted towards a more content-oriented approach so as to more efficiently meet the users' demands in terms of fast content availability and service continuity. Following this line, this paper proposes an enhancement to the PURSUIT information centric network (ICN) architecture, so as to improve the quality of experience of users in highly mobile environments. Simulation campaigns show the performance gain offered by the proposed solution with respect to regular PURSUIT implementations and benchmark IP-based strategies.
Satallite Internet down to Earth use radiofrequency signals also TCP/IP and such signals is the foundation for modern life linked also RFID and bank cards, an essential technology a pre-requisite of modern communication and electronic payment solutions also computer servers need to be kept cold for optimal functioning and Law or legal firm Pinsent Masons published a statement on their website during August 2021 to say Voice over Internet Telephony or phone calls over WiFi are now to be made possible over phone networks so BT must allow this by law
Satellites are being provided in space by Elon Musk (also of Tesla electric cars) to provide Internet access - really connections to the Internet are fundamental both for the functioning of both home computers and also for computer servers contained in the cloud - the cloud actually refers to computer servers based in multiple countries across the world, some maybe in Iceland since computer servers need to be kept cold for optimal functioning. Global warming may also be happening linked to the Science of Temperature - absolute zero is the temperature of Kelvin and Glasgow has the River Kelvin near BBC Scotland HQ headquarters also the Glasgow Science Centre with the iMax Scotland's largest shimmering screen previously previewed the building of the International Space Station. Iceland is a land of geysers, hot springs, waterfalls, nice warm heated swimming pools and geothermal and volcanic activity. Geothermal energy also useful and bathing in hot springs can give feelings of sheer bliss.
Computer servers can be replicas of each other - multiple servers in a cluster to provide fault tolerance to keep the Internet functioning and server uptime as close to 100 percent as possible.
Netcraft server monitoring uptime - https://uptime.netcraft.com/
Replica servers do need power or energy to function - certainly satellite Internet access will enable more remote areas of the world to connect to the Internet, but actually understand satellite relay communications is more of a mystery.
Internet signals from satellites to the Public Switched Telephone Network on the ground do rely on radiofrequency signals - RFID chips in bank cards also linked to Contactless and Chip and Pin payment technology so really radiofrequency is the foundation for modern life, an essential technology a pre-requisite of modern communication and electronic payment solutions. Bank teller machines or ATMs Automated Teller Machines from Dundee company NCR (not really automated because they require G4S security personnel in hard hats to stock cash in machines) long used Electronic Funds Transfer to relay financial information in real-time.
Electronic Fund Transfer (EFT) is an RBI-backed Electronic Payment System. EFT enables the transfer of money via electronic mediums, reducing the dependence on cash or cheque transfers. Your fund transfer request goes through several entities before reaching the beneficiary. Electronic Funds Transfers linked also to Wire transfers online and is digital transfer of money.
Bacs is an established method of payment between banks and also between PayPal customer accounts and banks (PayPal used to be owned by eBay designed for efficient electronic transfers linked to auctions and selling also trading) - This is an electronic system to make payments directly from one bank account to another. They are mainly used for Direct Debits and direct credits from organisations. The payments take 3 three working days to clear, so money paid into your account on Monday will clear on Wednesday.
Starlink: Why is Elon Musk launching thousands of satellites? - https://www.bbc.co.uk/news/technology-62339835
Satellite communications or the relay message system are controlled or governed in a sense by or using the overarching framework the American Tracking and Data Relay Satellite System and from Wikipedia - The U.S. Tracking and Data Relay Satellite System (TDRSS) is a network of American communications satellites (each called a tracking and data relay satellite, TDRS) and ground stations used by NASA for space communications.
More details also from Wikipedia - The system was designed to replace an existing network of ground stations that had supported all of NASA's crewed flight missions. The prime design goal was to increase the time spacecraft were in communication with the ground and improve the amount of data that could be transferred.
The history of tracking and data message relay also from Wikipedia stems from the 1980s so really satellites been really dominant from that point in time but Neil Armstrong first landed on the moon in 1969 and there is the Earth-moon system of artificial satellites - Many Tracking and Data Relay Satellites were launched in the 1980s and 1990s with the Space Shuttle and made use of the Inertial Upper Stage, a two-stage solid rocket booster developed for the shuttle. Other TDRS were launched by Atlas IIa and Atlas V rockets.
Traditionally, satellite system architectures are based on layered protocols such as ISO International Standards Organisation OSI Open System Interconnection (refer to 7 seven layer networking model also) or TCP/IP protocols in which each layer in the protocol stack is designed and operated independently with interfaces between layers.
There are three types of communication services that satellites provide: telecommunications, broadcasting, and data communications. Nowadays common for telecommunications to be converged happen over the Internet or TCP/IP and this is known as Voice over Internet Telephony or VoIP not a new technology, been around for over twenty years or 20 years but banned on the phone network of telecoms giant British Telecommunications for almost that length of time, certainly a significant time period - BT needed money from line rental also from customers to build a high-speed fibre optic network due to lack of Government subsidies and investment.
Really it is households or homes as well as small businesses that make up the backbone of BT's network but BT do now provide OpenZone which enables BT customers to log-in on WiFi or wireless network routers of other customers.
BT long been the dominant telecoms giant in the United Kingdom - BT own Plusnet, but BT sold BT Cellnet to O2 but BT regained control bought PlusNet in an acquisition after selling BT Cellnet - this is market forces and competitiveness at work. Technology start-up companies can be bought over by large established rival firms even big player those with a monopology such as BT.
Law or legal firm Pinsent Masons published a statement on their website during August 2021 to say Voice over Internet Telephony or phone calls over WiFi are now to be made possible over phone networks so BT must allow this by law - really the future is in paying for broadband but actually in practice BT is still charging money for phone calls also still charging for line rental, so really better with VoIP Internet phones and customers buying a new handset or physical phone bundle multiple cordless phones for their household.
Before broadband, there was ISDN for businesses - Integrated Services Digital Network, faster than dial-up 56Kbps connections actually around 128Kbps for businesses at a premium rate price point.
Households or home users tended to not use ISDN but used standard noisier modems with digital signals modulated demodulated (modem for short) over a phone line or physical carrier medium typically copper cable runs to most homes, really a rare earth mineral from cobalt.
In a nutshell, Satallite Internet down to Earth use radiofrequency signals also TCP/IP and such signals is the foundation for modern life linked also RFID and bank cards, an essential technology a pre-requisite of modern communication and electronic payment solutions also computer servers need to be kept cold for optimal functioning and Law or legal firm Pinsent Masons published a statement on their website during August 2021 to say Voice over Internet Telephony or phone calls over WiFi are now to be made possible over phone networks so BT must allow this by law.
Unicast, Multicast, Broadcast and Anycast - the latter useful for sending to a computer in a group or cluster and computer servers can be clustered together for redundancy fault tolerance as well as multiple hard drives being bound together to mirror data held in racks in server farms - Fault tolerance is actually created from multiple server computers bound together in a cluster - when one server fails, a replica server computer is able to continue to provide service and replica servers are the hallmark of the Internet
Ability to keep personal information secure and use online storage solutions for example is really key to digital security while having the capability to transmit small updates in information across a computer network with minimum personal data stored on personal devices. Heavy lifting with computer processing power can happen in the cloud with computer servers usually built with more powerful processors and also multiple processors like 32 processers in a typical server computer in a server farm. Windows 2000 actually supported 16 processors per server computer - that was the past around 20 years ago but nowadays desktop personal computers from Mesh Computers for example may come with massive amounts of memery also multiple processors built into a computer known as cores - dul core two processors working together in tandem, quad core is four processors really quadcore more synonymous with Quantum computing but not exactly - Quantum computing involves fast computer processers, many calculations per second and high power number crunching to predict weather and climate patterns. Scientists been using high powered machines for a while and that is how they have actually predicted more intense weather patterns - they have long been warning about it.
Websites and publishing can work well to inform and educate - information on public display via a web-based platform is readily accessible from anywhere enabling right-click on a web page, clicking View source to see also save web page code. Clean code and taking the time to write in HTML the raw native language of the web may preserve information better long-term and CSS or the style sheet language can present web pages for social inclusion large print for better display on mobile devices potentially to reach more people including African children, although still an issue around web hosting firms, public computer servers also mirroring data in server farms with customer also personal data stored likely in a RAID5 configuration - different levels of RAID actually with different levels of redundancy built in, there is RAID 1-5 or five levels actually. RAID is for Redundant Array of Independent Hard Drives or perhaps Inexpensive Disks - small capacity hard drives are more cost effective so this is the benefit of mirroring also, really mirroring also enables cost savings for storage and back-up firms also cloud hosting storage providers. Everyone and individuals may have different points of view - really explaining points of view, breaking complex topics down and writing, talking about issues surrounding a topic is really how to advance education.
Internet Control Message Protocol ICMP for sharing error messages usually just essential information between backbone Cisco routers on the Internet.
Important to mention broadcasting in computer networks - for more information, see https://en.wikipedia.org/wiki/Broadcasting_(networking). Professionals in computing may devote hours to updating Wikipedia - the online encyclopaedia that actually does contain a treasure trove of useful technical information. Sharing techical information online actually is what teaches others because complex technical information can be easily forgotten and there is also a learning curve in the first place - many Cisco academies exist for the training of the Internet generation to maintain the Internet ecosystem and network of routers and switches.
Broadcasting refers to Unicast sending to a single computer on a network specifying a destination or receiver, Broadcast sending to all computers, Multicast sending to multiple computers, multicast enables recipients or receivers to be chosen so perhaps this is more useful than broadcast and Anycast. Anycast actually harder to understand in concept - a computer sending an Anycast message sends a message to one computer out of a group or cluster of computers, clustering of servers is an expression in computer networks. Anycast normally used to send data packets to a computer in a cluster and anycast tends to be used to send to the nearest computer in a group. RIP routing protocol along with RIP version 2 two actually uses a simple metric of hop count to count how many routers in a path between two end points. Hop counts and metric used with Anycast to determine the closest server computer in a cluster.
Broadcasting actually in data communications can be more efficient - telling everyone and a catch all can enable one message to be flooded across a network making Internet communications more efficient. Catch alls linked also to wildcard masks or like asterisks or stars in Cisco Access Control Lists for security on Cisco routers. Access Control Lists configured on Cisco routers can using software or a set of pre-determined rules filter data packets, or datagrams, also messages provide filter and greater security on independent networks which are segmented by routers - muliple routers and switches linked or connected together make up the Internet. There is an expression known as daisy chaining.
The daisy-chaining method of creating priority includes a serial connection of all devices that request an interrupt. The device with the highest priority is located in the first position, followed by lower-priority devices up to the device with the lowest priority, which is situated last in the chain.
Daisy chaining also occurs or happens in connection with electrical sockets or electrical outlets. Electricity is actually the future like EV electric vehicles.
Technically, you can have as many outlets on a 15 amp circuit breaker as you want. However, a good rule of thumb is 1 one outlet per 1.5 amps, up to 80 percent of the capacity of the circuit breaker. Therefore, we would suggest a maximum of 8 eight outlets for a 15 fifteen amp circuit.
The National Electric Code has no rules regarding how many outlets you can daisy chain off a single breaker. But generally speaking, it's best to keep the number below 13 because of average current draw.
For more information on electrical standards, refer to the Institute of Electrical and Electronic Engineers who define or make standards really this is the official standards body and electrical signals are used in computer networks - https://www.ieee.org/.
In a nutshell, Unicast, Multicast, Broadcast and Anycast - the latter useful for sending to a computer in a group or cluster and computer servers can be clustered together for redundancy fault tolerance as well as multiple hard drives being bound together to mirror data held in racks in server farms.
Fault tolerance is actually created from multiple server computers bound together in a cluster - when one server fails, a replica server computer is able to continue to provide service.
Replica servers are also the hallmark of the Internet and actually replica servers are really obvious in the Domain Name System or DNS or name servers. DNS servers referenced on home computers in ipconfig/all in Command Prompt Windows 10 ten - default gateways also mentioned and they are home routers and a portal or window also an Access Point to the Internet. Wired also Wireless home routers are Access Points in an Infrastructure Network or an Infrastructure Service Set network and each router has a unique Service Set Identifier. Ad hoc networks used with two digital devices send messages without the support of a router also known as an Access Point.
DNS provides name resolution services domain name to IP address machine address mappings. DNS helps everyone to remember a friendly domain name - most people would likely struggle to remember an IP address, an often four digit code separated by dots, for their favourite website. IP version 4 was becoming exhausted in supply of addresess so IP version 6 six addresses were created - these are much longer 128-bit hexadecimeal numbers built on a base of 16 from the 16 times table. The base 16 number system or the 16 times table is really the basis for Maths is STEM Science Technology Engineering and Maths as is floating point representation, boolean states true false, zero and one as well as technology gates such as AND, OR, NOT and NAND. Technology gates also refer to boolean and the NAND gate linked to NAND memory the type of memory that actually holds memory information without power.
Essential summary information for online videos is year dash month dash date dash name and place are useful identifying features in a filename to create meaningful files perhaps screenshots - also Who, What, Where, Why and When really important to summarise content for indexing online by search engines with reference to online videos and discovery of relevant content also hard drives can be filled with zeroes known also as secure erase or wiping method with CCleaner also Eraser from PortableApps.com
Essential summary information for online videos also for infographics - Year dash month dash date dash name and place are useful identifying features in a filename for summarising videos for example for creating screenshots of online videos. Key words useful for indexing online content most efficiently is Who, What, Where, Why and When and Where is also usually place - names and definitive dates with month, day and year really important in a summary for online videos.
Videos and taking screenshots, always important to remember videos reveal key frames in sequence, video born from storyboarding and animation in concept - videos are visual, move a video along and the scene usually changes, so sometimes actually a screenshot for example is better captured from the middle of a video to make a visual standalone static image more noticeable and to draw attention to some event that has happened and is significant.
Videos uploaded to Facebook the social network may be removed by the website service itself the social network when users object or maybe even removed by Facebook for some unknown reason. Facebook has guidelines for online content and actually Facebook may remove videos in line with its policies maybe referred to an editorial standard for online content on a shared platform or social network where there can be diffences of opions and differing points of view. This really makes the case for taking screenshots and keeping descriptions short with key summary text of the most pertinent or significant points. Preservation of digital online content may help some users through the recogition of events that have happened.
Media professionals can be busy, the world and events always move on - important actually to transmit really the most important also really the key information the most pertinent points most efficiently over computer networks - in some African nations slower networks around 2Mbps may be present such as Global Packet Radio Service and Universal Telecommunications networks.
Messages get broken into unordered data packets at the most fundamental level - call it the molecular level if you like certainly analysing molecules is what scientists do. Also the world is fast, BBC News journalists actually can work in conflict zones on the ground in disaster zones since the BBC is a global organisation so it merits discussion so really most important to transmit key information efficiently to support real world video more often, snippets of video with short summary and analysis.
Aberdeen actually has busy roads, sometimes fast traffic - in the evening roads can be quieter, but traffic can go faster in the city centre also along the beach front.
Hard Drive File Erasing Writes Random Data - When using One Pass Zeros or One Pass Random, the number of passes is fixed and cannot be changed. When the write head passes through a sector, it writes only zeros or a series of random characters.
Erasing files on a hard drive securely writes random data using binary digits zeros and ones actually zeros are mostly used to fill a hard drive with really random data that is blank, nothing or meaningless.
CCleaner software is free from Piriform and can wipe free space on a drive, prevent data being recovered with multiple levels of secure wiping also there is Eraser software which is portable software does much the same thing from PortableApps.com. Secure erasing to do a thorough job is very time-consuming and can take hours so really it might not be done often in practice.
Keeping your own data or copies of data your share online with others is adviseable - this is the benefit of simple text documents the TXT format or TXT files created with Windows Notepad also this is the benefit of screenshots easy screen capture using the Snipping Tool built into Windows 10 ten. Windows key plus Shift plus letter-S can take a screenshot easily using a computer keyboard using Windows 10, the version or variant of Windows likely in most common usage around end of July 2022 mid-Summer during British Summer Time. Extra information and using synonyms alternative words can promote better understanding teach also educate others.
Data files such as videos can be bigger in file size than documents also photos. Video files represent convergence sound plus visual data - Analysing digital material is very time-consuming to properly tell a story and to organise also sequence events and time and events always move forward
Data files such as videos can be bigger in file size than documents also photos. Video files represent convergence sound plus visual data this is a multimedia format but multimedia also includes text and animation, which is supported very well by Facebook.com the social network now known as Meta for its business name to enhance or change also alter professional reputation.
Video with subtitles more accommodating in learning provision for those with visual impairments also are hard of hearing - watching is what deaf people do, listening is what those with partial sight do and there is the RNIB the Royal Institute for the Blind https://www.rnib.org.uk/ also there is North East Sensory Services or https://www.nesensoryservices.org/.
Top marks always awarded by academics at University to consider multiple opposing perspectives, this is also considering others being respectful. Responsible oragnisations involved in recruitment screen applications to filter applicants - actually throughout society those with additional issues may normally have more barriers, may be overlooked also so such persons may have substantial mental health issues anyway.
Web browsers actually such as Google Chrome can be slow also unresponsive when video files are uploaded or shared on social networks from computers when online storage or cloud storage has been used to store video files. Lots of high file size video files stored in online storage can present an issue when one wants to port or migrate data to another competing platform - this is what makes localised storage and local copies of files also useful. Saving downloading large high capacity files increases performance over computer networks and actually some areas of countries also regions may have slower networks or access speeds to the Internet. Internet access can be patchy actually - still the Aberdeen area being oil rich actually has a fairly fast and responsive broadband Internet infrastructure.
Still actually many UK cities are major cosmopolitan areas with fast superfast broadband often England cities benefit first before Scottish ones for technology trials certainly this happened in connection with the mobile network Everything Everywhere or EE. Mobile data and access may not be everywhere in practical reality.
Big practical issue actually - cloud or online based world how do the police as a law enforcement organisation copy somone eles's files, well they need access to usernames and passwords - with this everyone needs to know their passwords for their digital accounts. Another issue crops up is that analysing digital material is very time-consuming to properly tell a story and to organise also sequence events and time and events always move forward, so police really always behind in real terms so this is what makes a visible police presence important, patrols, and engaging with community groups to help community members much more.
SQL or Structured Query Language can be used to change data files and data can be entered with HTML forms using PHP backend processing - also SQL query language can be connected to XML data definition files for data storage in a low file size with structure
SQL or Structured Query Language is the query language used for interacting with databases, creating tables also inputting data as well as searching a database for text strings also using pattern matching to find specific clauses, deleting data as well as deleting tables and whole databases refer to drop table. SQL can work in conjunction with XML Extensible Markup Language - XML files are more like data files with structure like also data definition files.
XML is used to define data in essence. XML files are usually parsed also known as executed line by line on a web server in sequential order or in a series, a computer server than runs SQL database software at the backend, maybe even linked to PHP the Hypertext Preprocessor - a web-based scripting language.
SQL Server provides the XQuery feature to querying XML data type or querying with the XML column with the XPATH. Using XQuery, users can Insert, Update and Delete with the XML nodes and node values in an XML column. There is SQL and MySQL and Microsoft SQL in practice - Microsoft actually as its own version of SQL used with Microsoft Access and Visual Basic is the coding language that is linked to the Access database, which is used in connection with Access forms for more user-friendly interaction with an MS Access database. MySQL is free and is very commonly used on the World Wide Web also is commonly implemented as part of a digital ecosystem on the Web.
Online MySQL databases via a web-based information system can be linked to HTML forms or user entered form elements linked to a PHP script also for backend processing. PHP is online web-based programming - MySQL and PHP the Hypertext Preprocessor akin to the Cee programming language also like Linux shell scripts can also be used in conjunction with XML data definition files.
SQL also MySQL can be used to add data values to a database and a table within it also change data values.
MySQL key commands
- get out with quit or Ctrl-D
- Try SELECT VERSION(), CURRENT_DATE;
- Note the semi-colon!
- Now try SHOW DATABASES;
- To look at a database, you have to USE it:
- USE test;
- SHOW TABLES;
Viewing all fields or entires in a table from a MySQL database - use the asterisk wildcard marked by a star which normally denotes everything all elements in a data block, basically a star is a blind catch all clause
Describe command also known as DESC and shows column names also constraints on columns.
- DESCRIBE tablename;
- SELECT * FROM tablename;
- SELECT fieldname FROM tablename;
- SELECT fieldname FROM tablename WHERE fieldname = value;
Creating a database with a table with MySQL and adding values putting data into fields
- CREATE DATABASE newsagent;
- remember to use it:
- mysql> USE newsagent;
- create a table:
- mysql> CREATE TABLE magazines (issn CHAR(10) NOT NULL, title VARCHAR(50), publisher VARCHAR(20), pub_date DATE, copy-price DOUBLE(2,2), PRIMARY KEY (issn));
- and add some data:
- mysql> INSERT INTO magazines VALUES (‘123456789x’, ‘Hamster breeding 2001’, ‘petpubs’, ‘2001-10-25’, ’04.99’);
An example of an HTML form to add sweets
<html> <head><title>Add sweets</title></head> <body> <form action="addsweet.php" method=GET> <p>Item Name: <input type=text name=itemname size=20 maxlength=20><br />
Description: <input type=text name=itemdesc size=30 maxlength=60> <br>
Price (NNN.NN): <input type=text name=price size=6 maxlength=6><br/>
Image URL: <input type=text name=imageurl size=30 maxlength=30>
<input type=submit>
</form> </body> </html>INSERT INTO table with four fields also adding values putting data values into a table
- <html>
- <head><title>Add sweets - confirmation</title></head>
- <body>
- <?php>
- <mysql_connect (localhost, ‘bbrown’, ‘butler99’);>
- <mysql_select_db (bbrown);>
- <mysql_query ("INSERT INTO demoshop (itemname, itemdesc, price, imageurl) >
- <VALUES (‘$itemname’, ‘$itemdesc’, ‘$price’, ‘$imageurl’)>
- <");>
- <print ("
");>
- <print ($itemname);>
- <print ("successfully inserted into database”);>
- <print("");>
- ?>
- </body>
- </html>
A MySQL INSERT INTO query to add data values to a database
- mysql_select_db (bbrown);
- like, USE bbrown;
- and send a query:
- mysql_query ("INSERT INTO demoshop (itemname, itemdesc, price, imageurl)
- VALUES (‘$itemname’, ‘$itemdesc’, ‘$price’, ‘$imageurl’)
- ");
In a nutshell, SQL or Structured Query Language can be used to change data files and data can be entered with HTML forms using PHP backend processing - also SQL query language can be connected to XML data definition files for data storage in a low file size with structure.
Knowledge acquired is actually not visible unless real people put their learning experiences into some sort of more tangible form such as a website for example or collection of web pages and Lunar modules linked with the International Space Station and soon there will be more than one space station with China and India putting their own stations in orbit - independent blocks of code are modular and modules go to space on rocket ships known as payload data
Scottish charity Computers and Integration from Inverurie have long produced a booklet called Caring for your computer - it is further down this web page in updated form now in web page HTML format various revisions have happened over the years also various and much digital content has been written for this website along with changes to the website over time. The charity also had a premise in Huntly and one stage but it closed down and before the Inverurie premises, the charity was based in Thainstone. The website has slowly and gradually evolved with digital content being improved with the passage of time - individuals do usually gain experience as time marches on, gain or advance knowledge and sharing wisdom or acquired knowledge often leads to progress.
Through College training vocational courses also University education people do usually gain knowledge also wisdom and often there is an opportunity for practical training sometimes there is exams on technical courses with syllabi and there maybe report writing - technical work usually graded for assessment. Through the process of learning there is usually an acquisition of knowledge - a University education can provide a grounding, a theoretical underpinning in concepts and for technology education really a thorough grasp of technology concepts is vital to future success.
Significant also to consider computing also computer networks including the discipline of engineering which may be multidisciplinary split into separate areas is a very technical profession - difficult actually to remember everything and all the specific terms including acronyms and abbreviations - this is the benefit of actually the World Wide Web, search engines, the Internet and knowledge sharing - a technical community rallying round gathering sharing information via the world's shared medium. Google smart search and smart algorithms also rules of logic can really enable useful definitions when technical terms, specific terms actually are entered.
It is not totally clear how long-term information gets stored in the brain, but long-term memory can work differently to short-term memory which is more transient in a sense, people can panic under pressure, lose their cool, lose focus and forget certain events when under duress also in a stressed environment, possibly an unfamiliar environment away from home - some people with disabilities like routine and predictable scenarios. People may have thoughts and ideas - following up on ideas may lead to something or may not, some ideas maybe worth exploring in more detail.
Some more vulnerable persons can be victims of abuse - also algorithms from computing in a sense can enable predictions with patterns and sequences of code - the human Gnome involves sequencing unique pieces of DNA to improve healthcare.
Repetition in code is possible also called looping and this is what makes software development efficient also modular with software often written by individual computer programmers in teams where each programmer writes an independent block of code that is often combined with more code in a wider software application or software ecosystem. Lunar modules linked with the International Space Station and soon there will be more than one space station with China and India putting their own stations in orbit - independent blocks of code are modular and modules go to space on rocket ships known as payload data.
Multiple programmers and multiple pieces or blocks of code coming together is what necessitates testing also known as debugging to find issues correct and eliminate faults to ensure seamless working and continual operation of a computer program or software application.
It is actually not clear how dementia the forgetfulness condition in older people affects such persons since often there is little written about an individual's subjective experience. Subjective is what one person views and view points can be dogmatic and grounded not within the realm of perceived fairness or even not within reality - objective is suspension of judgement considering fairly multiple opposing perspectives.
Video really does show what someone else as witnessed - shared video can provoke intense debates and actually it is multiple people coming together that can really decide whether someone has been treated unfairly after discussing a shared video. This is one benefit of focus groups for product demonstrations - ability to test new technology for example on a diverse mix of people to evaluate product offerings and determine whether products meet a particular user need. Without people publishing and sharing, difficult to really know what people think inside organisations.
Knowledge acquired is actually not visible unless real people put their learning experiences into some sort of more tangible form such as a website for example or collection of web pages. This is what makes teachings in web page construction important for the digital age and digital ecosystem. Without some sort of tangible media showing knowledge, others may not be aware of someone's skills and talents or expertise. Really it is sharing combined with communication that can showcase someone's abilities - digital means of communication such as iPad tablet computers can be a vehicle of expression for more vulnerable persons. Without digital technology some more vulnerable persons could become victims to abuse more easily and someone better able to articulate themselves can really take advantage.
The PhotostickOMNI three way adaptor for mobile tablet video extration also the standard round not flat screwdriver to open a computer's base unit - switching to Linux could prolong computer equipment when updates to Windows 10 end in 2025 since many computers are not capable of upgrading to Windows 11 also ability to magnify visual data can make computers more usable - buy electronics from io.com, very.co.uk and currys.com
Multimedia convergence with audio and video is certainly more possible now - networks are getting faster and faster, there is wireless, mobile data and satellites in the mix as well as under the ocean cabling. In the beginning the high-speed light-guided networks needed to be built by engineers, roads may have been dug up for it and real patience was needed from home users and office workers alike. Digital skills education very important now more than ever to empower everyone get them up to speed to make the most of the digital age - Aberdeen City Council at Marischal College have a do it online culture.
Cannot see an image for looking in a sea of multiple files? Sometimes this can happen but also some people can have issues with focusing also manual adjustments, have eye sight issues also, it may happen more as people age, more older people in hospital eye clinics but those with visual impairments can suffer disprotionately.
Important actually to know how to change the size of images within a file browser of Windows 10. Hold down CONTROL key and use mouse scrollwheel back and forth to magnify visual image data in a file explorer window on Windows 10. Also click View menu and choose Extra large or Small icons - menus can work with keyboards and without a mouse.
Alternative means of performing actions using a computer is what broadens accessibility, computers really designed to be universal with adaptive aids unlike many shops on the highstreet.
Users may now be using Windows 11 - it is end of July 2022 really mid Summer in the North-East of Scotland. Most users still likely have not migrated from Windows 10 to the new Windows variant or version eleven 11 since rollout of new technology usually slow (there is also complacency to consider and user contentment and familiarity also routine and the status quo) and actually a lot of computers that came out or were released during 2018 are not capable of installing Windows 11 or upgrading. This means buying a new computer and actually updates for Windows 10 will end in 2025 when speed limits in Scottish towns and cities will be 20Mph.
Making computer equipment last longer is also recycling making older technology go further.
Actually switching to Linux or a version or flavour of it could actually enable users to get more life out of existing computer equipment when they are able to migrate data or have invested in online storage.
Ordinary computer users cannot just take their computer along to Currys PC World and ask for Linux or Ubuntu most user-friendly version of Linux after mobile Android platform - all computers come with Windows 11 when bought from shops usually. Electrical retailers like Currys - big name big brand instantly recognisable to many this is the highstreet presence - are the ones that are the resellers and they sell new technology, but Amazon sell refurbished technology computers with Windows 10 and often at reasonable price points more bang for your buck - bucks American and in Britain we refer to pound sterling, much of continental Europe use the euro, the Yen in Japan and the dollar in Australia.
There is also io.com, another electrical retailer also there is very.co.uk, which also sells clothes but the clothes they sell are dearer than the high street and there is all the packaging associated with packaging products for home delivery and packaging really fills refuse bins.
Those with own private transport can visit the shops and actually buy more products with less wasteful packaging taking up space.
Some key tools - the PhotostickOMNI three adaptor to fit an iPad, Android tablet and smartphone also an iPhone and easily transfer photos and videos to a USB flash drive, convenient and easy data transfer with the helpful aid of simple graphical user interface and mobile phone app of the same name - PhotostickOMNI.
Only three adaptors or connectors nowadays for every modern mobile and tablet in the world - iPhones and iPads may use a separate adaptor, and there is a separate adaptor for Android but smartphones and tablets using Android tend to use the same connector.
Screwdrivers essential to open computer desktop computers - this is the one that usually unscrews a computer's main base unit for a desktop computer.
It may also work for laptops but sometimes laptops require small screwdrivers - this is embedded computing.
Embedded computing causes more nightmares for computer support personel making such people having to require advanced technical skills and develop real patience. This can actually push up computer repair costs.
Contingency planning assessing risk in the digital age - really sharing information, educating others more people may lead to more offers of help. Risks can come from failure in shared computing resources but also real world physical disasters such as wildfires
Contingency planning assessing risk in the digital age - really sharing information, educating others more people may lead to more offers of help. Risks can come from failure in shared computing resources but also real world physical disasters such as wildfires.
A contingency plan is a plan devised for an outcome other than in the usual (expected) plan.
It is often used for risk management for an exceptional risk that, though unlikely, would have catastrophic consequences.
A contingency plan is a plan for a what if scenario that could ruin your project or business. A simple example of a contingency plan is to back up all website data in case your site gets hacked. If this scenario happens, you can then restore the data after regaining access and changing passwords.
A contingency plan is a proactive strategy that describes the course of actions or steps the management and staff of an organization need to take in response to an event that could happen in the future. It plays a significant role in business continuity, risk management and disaster recovery.
Risks actually can come from digital infrastructure issues affecting computing resources and all computer servers actually are constrained also based in the real physical world.
Different countries experience different natural events also known as natural phenomena at different times. Some countries really exploit the natural physical world think volcanic eruptions also geothermal energy potential around Iceland, but also think real raging infernos sparked by unpredicable also uncontrollable wildfires - actually need for high powered pressurised water canisters sometimes and helicopters to put out fires to help contain them, control their spread observe the extent of wildfires help people in distress.
This is happening now actually during Summer July 2022 in the Northern Hemisphere also around the Mediterraneon but Summer time in Australia is around Christmas time - the world is on the go 24 hours a day 7 seven days a week. Wakefulness cannot get to sleep, talk to family and friends on the other side of the world - this is company in the digital world offsets loneliness sometimes and widows may feel loneliness more than most especially since they may have endured a long life without computers and digital technology. It may not be clear where wildfires are happening until someone shoots and shares a video or writes about it documents their witness testimony and scary experience - only survivors tell tales and those that have lived a significant existance endured a harsh time.
Disaster planning in the digital age involves data back-ups because websites can include important information to get an organisation back up and running - this is the importance of sharing information, mirroring data also educating others and distributing computing resources.
Employees whether full-time, part-time or doing voluntary roles can retire, have accidents, get trapped also, so educating others is most important.
Contingency planning is also about evacuating everyone even the most infirm and disabled - for this vehicles with automated mechanical hoists are vital and also compassionate carers willing to help.
Disaster planning
- Your objectives - what the plan is for
- What it will cover - including locations and services multiple sites for businesses, distribution and colocation in computer resources and data
- Incident response plan of action in the immediate aftermath of a disaster - what would trigger it?
- Disaster recovery procedures also should include first aid trained staff as well as restoration of computer systems, cloud online data stores may be more available immediately than traditional or conventional localised back-ups
- Alternative work locations - if your normal site is unusable, having alternative sites useful. Big benefit here with cloud online technologies to replicate data, distribute data and make copies. Better actually to share information and educate others - training others may lead to greater respect for the person educating and also others may be more willing to help also provide offers of help.
The names of igneous, sedimentary, or other metamorphic rocks were clearly labelled at RGU TechFest end of May 2022 with chemicals poured in a test tube and big explosive chemical reaction highlighted targeted at young minds also children - also Virtual Reality, Augmented Reality and 3D worlds the differences explained - very important for localised, distributed computing resources to share resources help everyone be understood, Net netrality also linked to equal rights and fairness
In computing education, specific step by step guides known as technical authoring can be useful to explain procedures this can lead to product user guides shipped with products, but actually concepts and definitions can provide a background grounding really help to explain and foster greater understanding ultimately technological progress when past events highlighted and discussed.
Concurrent Connections is the maximum amount of simultaneous connections your computer server can handle - a connection is established by a user visiting a website and also updates in the information world online via websites is linked to computer web page refreshes. F5 key on computer keyboard to refresh or reload a static web page - news feeds can use AJAX JavaScript technique to change content without the need for a page refresh initiated by a real world user.
The refresh rate of your display refers to how many times per second the display is able to draw a new image. This is measured in Hertz (Hz). For example, if your display has a refresh rate of 144Hz, it is refreshing the image 144 times per second.
It is common for applications on the World Wide Web to open multiple persistent Transport Control Protocol (TCP) connections so that different content can be served simultaneously from the same server. This actually links to commercial web hosts hosting multiple websites with different unique clients or paying customers to save money share resources - like a computer server - and this also links to virtual hosts on an Apache web server.
Virtual hosts or instances on a shared web server help Internet computer resources to be shared - resentment and anger could come in future from failures of Internet server architecture individuals losing data getting frustrated - very important for localised, distributed computing resources also for NAND flash for offline storage and with this saving data could really help someone to be better understood also sharing and explaining points of view. Virtual hosts on a web server really designed to optimise shared resources and save money manage data back-ups from the perspective of commercial web hosting firms.
Web hosting firms split a computer server, typically running Apache web server into virtual hosts - this is different from virtualisation which is a separate application window or virtual instance of a computer operating system with ability to run Ubuntu Linux on Microsoft Windows 10.
Virtual technologies big potential for resource sharing, testing and experimentation different actually from Virtual Reality which is often linked to 3D or 3-Dimensional Worlds.
Augmented Reality is actually smart specs with information overlay potential different again from Virtual Reality 3D worlds - augmented reality has roots to animation think storyboarding picture scenes denoting small changes the Beano and Dandy comics grew from this for concepts through to Toy Story film series first animated film and then there was Chicken Run also.
Smart specs may nowadays shoot video but still knowing when video recording is off and on is important - often need to pre-plan, pre-determine also known as pre-mediating to shoot video before the need arises may be difficult in real-time situations. Pre-mediated murder versus pre-mediated video shooting - needless to say shoot a video of a murder and really you will land yourself in deep trouble. Need also for LEDs or Light Emitting Diodes to detect change of status and know when video recording is happening for real and also upmarket video smart specs include Ray Ban smart glasses but then there is Facebook Stories - Facebook the company now known as Meta likely after HTML meta tag. There is also metamorphism.
Definitions important for clarity and explain avoid ambiguity multiple meanings which links to interpretation and Autism is making sense of the world - Metamorphism is a process that changes pre-existing rocks into new forms because of increases in temperature, pressure, and chemically active fluids. Metamorphism may affect igneous, sedimentary, or other metamorphic rocks. These rocks at RGU TechFest exhibit this year end of May 2022 at Sir Ian Wood School of Computing building Garthdee.
Demonstration actually at RGU TechFest of chemicals poured in test tubes around rocks - big explosive potential here as demonstrated by what looked like young students at RGU Techfest to children highlighting explosive danger. This is a chemical or chain reaction also it is University educators targeting children, young minds, school children in Aberdeen. The names of igneous, sedimentary, or other metamorphic rocks were clearly labelled at RGU TechFest aimed at school children reminding others older people about their Geography education and the names of rocks. We can all see rocks outside but actually rocks are subdivided into different types and the study of rocks is known as Geology.
Westhill in Aberdeenshire in North-East Scotland is the global centre of excellence in subsea engineering so says the sign on the entrance road from Inverurie. Aberdeen Science Centre core focus is robotics revamped during 2020 and Science, Technology, Engineering and Maths is rising in importance
Westhill in Aberdeenshire in North-East Scotland is the global centre of excellence in subsea engineering so says the sign on the entrance road from Inverurie. Aberdeen Science Centre core focus is robotics revamped during 2020 and Science, Technology, Engineering and Maths is rising in importance.
Google uses smart algorithms and search results can be very timely - important also to verify also search results, but actually careful selection of material can result in very informative, educational content.
Important actually to break down the complex field of computing also computer networks and electronics simplifying as much as possible to help newcomers to the respective fields to understand, develop an interest and progress their learning - electric vehicles or EV vehicles are increasing in usage. All these fields are actually male dominant - really rare actually to really simplify understanding so that woman understand.
Educators in computing fields may not be the best communicators - really having a firm grasp of language with first rate communication skills is really important to broad widespread digital skills education.
Commuications can actually mask crimes also in a very real sense, vital also the work of the security services in intercepting communications with the view to deter criminals also detect and stop crimes before happen.
Subsea firms in and around the area of Westhill include Subsea Corrosion Ltd, Subsea Controls Engineering Consultancy also Subsea 7 in the present day July 2022.
The Aquanaut is a subsea robotic solution that can serve both as a remotely operated vehicle (ROV) and as an autonomous underwater vehicle (AUV). Based on the requirements, the subsea robot transforms from AUV mode into an ROV.
Underwater robots do a lot these days. They can be programmed to go to remote, dangerous, and often previously unexplored parts of the ocean to measure its key characteristics—from salinity and temperature to the speed and direction of currents. They map the seafloor and benthic environments in outstanding detail.
Marine robots - Robots perform a variety of tasks, from raising fish to analyzing shipwrecks, and are helping marine biologists, water engineers, landscape developers, and even the police do their jobs better.
This is the world's first unmanned, underwater robot or glider - to cross an ocean basin, the pioneering Scarlet Knight. The robotic glider, also known as RU27, can dive to depths of 200 meters (660 feet) to collect data such as temperature, how salty the water is, and the speed and direction of ocean currents.
An AUV operates independently from the ship and has no connecting cables, whereas ROVs are connected to an operator on the ship. AUV stands for autonomous underwater vehicle and is commonly known as uncrewed underwater vehicle.
Dive length depends on factors like depth and weather, but as long as there are no technical operations, there are no limits on how long an ROV can stay down. On average, dives typically last around eight hours. In comparison, a dive in a human occupied vehicle typically lasts five hours.
Open data and dates may be changed by a computer hacker or because of anomalies to suit a given purpose also documents can be defaced
Open Data Aberdeen Council Initiative Big Trend of Now - https://data.aberdeencity.gov.uk/
Find open data from the UK government - https://www.data.gov.uk/
The Maths mod operator divison by remainder from Computing
Modulo also Mod or Remainder Operator returns the remainder of the two numbers after division
100 or one hundred days from now what day will it be? 12 twelve times 8 eight is 96 - four off one hundred. The four is significant known as the remainder, so if this is Friday in 100 days time it will be Tuesday. This is actually a very useful, practical application of Mod in the real world and the Maths mod operator to computing.
Actually it can be difficult when going back in time to determine what happened and then there is computer hackers and data integrity to consider.
Really patient medical information is often closed - there is doctor patient confidentiality. There is likely many cases with strange anomalies - actually anomalies is often linked to the data world also to databases including not limited to SQL Structured Query Language. Ordinary people and patients should really obtain their medical records their personal medical information to look through their history to better plan their future health care needs make sense of their past health history - this is e-healthcare and also it is the information flow in a hospital or healthcare setting and also it may not be coherent or as ordered or efficient as it could be.
The role of the average medic is to save lives - it may not actually be to look out for their long term well being of patients although it should be, to prevent escalating revenge attacks and attacks driven by pure or total spitefulness also hatred. Hate crime can be an issue often ethnic minorities may be on the receiving end.
There may actually be errors in retrieved data from the past and inconsistencies which could make a written story totally unreliable, bear in mind also people often share names do a Google search for your own name to reveal many similar names, some names can come from plants also and from herbs and spices - video is more lifelike actually, a visual and truer representation.
Always remember the Barbonic plague - this was brutal period in the history of the world with the black death also a significant illness. Doctors really fought hard to save lives, applying bandages and torunaquets - also that still happens in conflict and warzones far too often.
There are three types of anomalies from the SQL data world - update, deletion, and insertion anomalies. An update anomaly is a data inconsistency that results from data redundancy and a partial update.
For example, each employee in a company has a department associated with them as well as the student group they participate in. So anomolies linked to redundancy this is also linked to copying data from computer to computer - server computers can be based in server farms built in RAID5 storage, a redundant system of hard drives where data files get mirrored across other hard drives to give more redundancy.
Multiple hard drives usually used to mirror also keep user data safe stored online - the process of copying can result in files becoming corrupt. It can happen on Windows 10 - file unreadable, so really file conversion is really key to preserving data long time.
JPEG photographs been on the go for a long time but now modern Apple devices produce photos in HEIC and actually these files can be problematic to open on Windows 10 without codecs. What is a codec? Well it is file optimisation technique or algorithm may be formed by University academics actually who invest in research also such techniques may involve pattern matching and pixelation complex mathematics actually.
Codecs built into MP4 video standard may make optimisation of data also video over computer networks such as the Internet more efficient. There are competing video formats such as WMV Windows Movie format then Apple Mov or Movie format. These are the most popular. There is also AVCHD linked to Blu-ray and High Definition video from Snoy Japanese firm - Sony long been linked with quality.
Database anomalies are flaws in databases because of poor planning and storing everything in a flat database. Anomalies occur when there is too much redundancy in the database. Poor table design has related data scattered over various tables. Any new change in the database should be updated in many places.
Update Anomaly - 10 columns in a table out of which 2 are called employee Name and employee address.
Insertion Anomaly
Deletion Anomaly - This anomaly indicates unnecessary deletion of important information from the table.
Too much redundancy and copying may produce anomalies so perhaps making sense of data is better - taking ownership of data, trying or seeking to understand also interpret data. This may lead on to explaining also educating others, but still data held long term may be unreliable. Data held long term is linked to dates but actually dates may be changed online - putting dates into video may actually prove more robust be harder to change.
PHPMyAdmin often used in web hosting to manage MySQL databases - to export back-up databases linked to websites, but also to migrate a website created using a Content Management System on a local computer to web hosting for creating a website with published information presented in a clear manner and easy to update via a web-based interface instead of uploading files using FTP File Transfer Protocol client software from Windows 10 on a Desktop computer.
Pythagorus, Pi 2.14 constant data value and US President James Abram Garfield also STEM trend of the times Science, Technology, Engineering and Maths
From Computers and Integration - Remembering US President James Abram Garfield - the assasinated President founded Pythagoras the basis for maths and now STEM Science Technology Engineering and Maths is rising in importance. This is also Pi or 2.14, the special number with two decimal places.
http://computersandintegration.altervista.org/news.html#garfieldpythorus
The constant of Pi also 2.14 helps us understand our universe with greater clarity - the new telescope launched the James Webb Telescope around Christmas 2021 really telescopes look into space, look for other galaxies. Space, telescopes and STEM is rising in importance - really significant for those with a technical background in computing to educate others. The definition of Pi the constant 2.14 inspired a new notion of the measurement of angles, a new unit of measurement. This important angle measure is known as radian measure and gave rise to many important insights in our physical world.
A radian is an angle whose corresponding arc in a circle is equal to the radius of the circle.
Radian is not median values and this is maths linked also to the data digital and information world also to computing.
The median is the middle value in a set of data. First, organize and order the data from smallest to largest.
To find the midpoint value, divide the number of observations by two. If there are an odd number of observations, round that number up, and the value in that position is the median.
Operators used in Cee computer programming
- Arithmetic Operators - It includes basic arithmetic operations like addition, subtraction, multiplication, division, modulus operations, increment, and decrement - modulus operations is not modus operandi or mode of operation
- Relational Operators
- Logical Operators
- Assignment Operators
- Bitwise Operators
The Maths mod operator divison by remainder from Computing
Modulo also Mod or Remainder Operator returns the remainder of the two numbers after division
100 or one hundred days from now what day will it be? 12 twelve times 8 eight is 96 - four off one hundred. The four is significant known as the remainder, so if this is Friday in 100 days time it will be Tuesday. This is actually a very useful, practical application of Mod in the real world and the Maths mod operator to computing.
Multipass and Hyper V with Oracle Virtual Box which is open source virtualisation software to run for example Ubuntu Linux or maybe Linux Mint user-friendly on Microsoft Windows 10 - command line interaction enables a router on the backbone of the Internet to focus or carry out its core function of switching data packets with minimum delays or latency for maximum efficiency making also essential equipment go further last longer without needing maintenance
Need for something called Multipass as defined by Ubuntu help documentation also Hyper V or you will likely run into errors when trying to run a virtual instance of Linux on Windows 10. Running a Virtual copy or instance of Linux within Windows did not use to require this step and actually virtualisation is quite useful to run older versions of Microsoft Windows on the latest operating system.
Actually Windows XP was around for 10 ten years and no updates get produced for it any longer, but still a lot of legacy games run on Windows XP. Possible actually to install drivers to copy files on a host machine like Windows 10 the main core operating system where virtual instances of older versions of Windows for example are run this can enable back and forth copying of data and data transfer also enabling organisations that run legacy software to continue to use it while also having purchased new computers with up-to-date Microsoft Windows software.
Windows 10 Command Prompt - type cmd for command into Windows search box or Windows System menu near the bottom of Windows 10 start menu need to scroll down quite a bit usually. The string below installs Hyper V with Multipass necessary for a virtual copy of another operating system in another separate window using VirtualBox on a host machine likely Windows 10 at the current time.
C:\WINDOWS\system32> multipass set local.driver=virtualbox. From Notepad or a web browser this command can be easily copied to a Windows 10 Command Prompt that is the benefit of Graphical User Interfaces to system administration but Linux servers with command only interfaces such as Cisco routers can be lightweight on resources.
In the case of Cisco routers through a console or admin Telnet session, command line interaction enables a router on the backbone of the Internet to focus or carry out its core function of switching data packets with minimum delays or latency for maximum efficiency making also essential equipment go further last longer without needing maintenance. So really Cisco router configuration is really quite a complex skill to be mastered - it is really important to educate young engineers for an Internet connected future. Telnet is often used for remote log-in - Linux also has Emacs a basic text editor on Linux based systems that is light on system resources and the TXT file format is universally supported with also support on Android tablets. The echo command on Linux can put text strings into TXT files by means of the redirection indicator or greater than symbol >.
In a nutshell - Multipass and Hyper V with Oracle Virtual Box which is open source virtualisation software to run for example Ubuntu Linux or maybe Linux Mint user-friendly on Microsoft Windows 10 - need for Multipass also Hyper V or you will likely run into errors when trying to run a virtual instance of Linux on Windows 10. Fedora Linux more technical often used in University Computing departments and uses rpm file extensions for applications instead of deb for Debian like Ubuntu Linux.
sudo apt-get command in Ubuntu Linux for example is used to install software from a Terminal screen like a Windows 10 Command Prompt - right-click empty Desktop in Ubuntu the most user-friendly form of Linux also the most popular then click Terminal to launch a command console for executing commands. In Fedora Linux, yum update command updates all software on a Fedora Linux system at once is efficient - go away have a coffee let yum update work for you this is efficient system administration. Android Linux tends to be the mobile tablet form of Linux but there is Remix OS which can run Android apps from a desktop computer also PC (Personal Computer) or a laptop.
From VirtualBox window, click Machine and New to start off the process of creating a new virtual instance or another copy of an operating system in window on a host machine the current running or live operating system perhaps or possible Windows 10 if Windows 10 is the operating system the user is using at the present time.
Errors can sometimes can result when running the multipass command such as the file is not recognizeed as an internal or external command, operable program or batch file. Sometimes there is a need to resolve errors. This may happen when Multipass is not installed.
Multipass can be download from also known as Hyper V https://multipass.run/docs/installing-on-windows#heading--hyper-v - Hyper V is needed to run VirtualBox. Multipass requires Windows 10 Pro or Professional and actually sometimes when you buy the Home version of Windows 10 or 11, you may get the Professional version if a reseller does not have computers with Home versions installed ready for resale this could happen with buying from computer sellers or build computers to order such as Mesh Computers - see https://www.meshcomputers.com/.
A computer reboot of Windows 10 may be necessary after installing Multipass or Hyper V.
When a virtual interface opens such as for Ubuntu Linux on Windows 10 - you connect an ISO file downloaded from the Ubuntu website, this is the latest version of Ubuntu maybe known as LTS (Long Term Support). ISO files can also be burned to disc or DVD for example by using CD Burner XP Pro.
An ISO file of a computer operating system such as a version of Linux can be used in a virtual interface or window to run a computer setup procedure as normal. An operating system set up procedure typically involves a series of steps clicking Next. ISO files get mounted through VirtualBox the software now from Oracle but previously incepted by Sun Microsystems to really install a virtual copy of an operating system within a host machine such as Windows 10. The virtual copy is called a guest - the host is the live running computer system a user is using.
Media streaming from computer to TV or tele actually LG SmartShare really pioneered it with OLED large screen TVs - actually Amazon have Alexa with Kindle Fire tablets voice activated assistant say Alexa and then issue voice commands to control smart appliances around your home (Tele Addicts was Noel Edmonds think also Deal or No Deal negotiate with banker over the phone, TV quiz with numbered boxes and random prizes of money)
Media streaming is possible actually with the open source VLC media player, but it may be hard to configure for the average user, but LG SmartShare is Windows 7, 8 and 10 software that runs on Windows and it profiles computers or picks up scavenges computers for media files such as photos and video. LG SmartShare really was novel, innovative was on the go around 2015 in large screen TVs or televisisons of around 2000-2500 pounds or that price point or price bracket. Picking up or detecting files can be slow but the pay off is that from your sofa you can watch media including photos and videos in your living room from your large OLED television set. SmartShare can also playback music files from your television which are hosted on your computer - also USB flash drives can be loaded with MP3s for example for playback on a television set. Some TVs may not support USB flash drives and you may need a USB external drive.
Media streaming and SmartShare can be useful for home made movies enable video playback and memories are made of this. Still middle age people also millennial children actually may have grown up in the early days before widespread adoption of the Internet, and actually memories can get lost in time and space when not recorded.
https://www.lg.com/uk/microsites/tv/conception-smartshare
YouTube often is video viewing from televisions using set top boxes also smart TVs as is the BBC iPlayer sometimes also Demand Five but there is ITV on demand playback services such as STV viewer
YouTube often is video viewing from televisions using set top boxes also smart TVs as is the BBC iPlayer sometimes also Demand Five but there is ITV on demand video playback services such as STV viewer - watch again video TV programmes at your own convenience in your own time also relaxed learning at your own pace for documentaries which can be educational. People less often stream or watch Facebook videos using a television - Facebook is more for mobile video upload with consistent 16:9 video aspect ratio to maintain consistency cross platform but the user interface is more full featured from a laptop also a Desktop computer. Access Facebook from a computer or laptop, users can more easily review videos, look back using the Timeline video showing feature that is also Facebook's characteristic news feature. Looking back at videos is easier when actually users write dates in descriptions - this makes Facebook video sharing more verifiable in a sense, friends on Facebook may also include family members and work colleagues in some cases.
Facebook videos more likely to be watched via a constrictive mobile, tablet screen with less bells and whistles in the user interface - laptop viewing and browsing of Facebook content is more full featured.
Set top boxes usually powered by object oriented Java software that is cross platfrom runs on Windows, Mac and Linux. Java programming structures like tree structure and uses name also value pairs to reference objects in a file structure - this is file definition in a computer construct. File structures usually broken apart by dots similar in a sense to a Micrsoft Fully Qualified Domain Name.
Important to really understand your acquaintenances and know who your close friends are, who you trust more because actually Facebook sharing of photos and videos can be controlled with both Groups and Facebook Lists. Lists often less obvious for content sharing to users who see photos and videos in their Facebook Timeline feed. Facebook Lists really enable anyone to control who they share content with but actually sharing good imaginary, being nice and respecful is better. What children may appreciate in later life is looking back at fond memories of their childhood when they really looked happy having a good time with parents and grandparents also Uncles and Aunties.
Many people share photos of their children, others who know them actually saving them when the images are a positive representation of happy times could really bring bank fond memories when they are shared again at a later date. Photos and videos often make memories - people often post at random times on Facebook. For more control of reliving good times, people actually need to make an effort to save photos and videos also organise too using file hierarchies or tree like structures for folder definition with dates and places also descriptions. Small Facebook groups actually could be used to give family members good shared experiences of times gone by remember events more instead of forgetting.
Alerting others to solutions can lead to digital empowerment and Photos captured alongside videos can help individuals to know when they are in a wrong folder in Windows 10 also Convert a Microsoft server computer to a domain controller to enable user log-in and authentication access to resources also shared files via a username and passwords using command dcpromo also CSS code for a standard website navigation bar to ease navigation and simplicity also making them uniformity in appearance always wise since consistency leads to expectations
Learning from mistakes that's this web page in part but not completely since computing over time disected trends highlighted - alerting others to solutions can lead to digital empowerment and Photos captured alongside videos can help individuals to know when they are in a wrong folder in Windows 10 also thumbnails, visual Tiles and picture representations very positive. A picture is often worth a thousand words but accompanying text can add greater meaning, help others to understand, teach and educate spread knowledge and wisdom. Words add more dimention to pictures and video is convergence with audio also narrative and nowadays high speed multimedia light-guided networks are present in the North-East of Scotland. Really, text was more useful in times gone by due to slower networks think dial-up modem 56Kbps connections where home users may have connected also disconncted from the phone line to also enable people to talk on phones in households. ADSL modems also known as broadband faster downloads over uploads really enabled web surfing and use phones at the same time or simultaneously.
Important to discuss folder location and user orientation within a file system or file hierarchy or tree like structure in Windows 10 can change because users often browse files change the folder themselves as they look for files to find a file previously opened, created, downloaded or shared - files downloaded from the Internet go into Downloads folder or directory actually located under Quick Access in Windows Explorer left-side panel. User interfaces in web-based interfaces are usually different for each individual website but a navigation bar for each separate website can ease navigation when web links are obvious or apparent in plain sight.
Usually in Windows 10 the last folder a user has viewed is shown by default when a user opens a dialog box to source or insert files for example, but frequent browsing of a file hierarchy searching for files may lead to users being unable to remember which folder they were last in.
Digital filesystems are like namespaces - Microsoft use FQDN or Fully Qualified Domain Name to refer to files in a naming structure.
FQDN refers to computers and their location on a network within a namespace also within a domain type system - domains like a cluster of computers and multiple domains are known as forests.
Convert a Microsoft server computer to a domain controller to enable user log-in and authentication access to resources also shared files via a username and passwords using command dcpromo in the Run box in Windows 10. Usernames and passwords are a hallmark of domains, clusters of computers and sometimes there is LDAP or Lightweight Directory Access Protocol. Usernames and passwords facilitate secure file and folder sharing across organisational networks. Authentication actually usernames and passwords might have come into effect to protect sensitive commercial information but also in the case of Scottish Councils children and vulnerable adults who may need support of social services.
This web page always helps me - reusable CSS code or style sheet for presentation of a navigation bar for a website, navbar's usually central to ease of use for websites, navigation and simplicity also making them uniformity in appearance always wise since consistency leads to expectations in marketing and advertising - https://www.w3schools.com/css/css_navbar.asp. Great website w3shools.com would not like to see it disappear great many web programming tutorials on this website to increase the numbers of people creating websites to perhaps tell stories.
It is very helpful to write a description for online shared videos best actually to be concise and preferrable to use key words actually like key search terms also technical vocabulary words really ideal to direct users to the most appropriate videos shared online
For videos uploaded and shared online via Facebook for example but also YouTube, it is helpful to write a description best actually to be concise and preferrable to use key words actually - the traditional priniples of journalism work well for online content where text is summarised with the most important details first. Be concise use key words like or akin to key search terms, words or phrases someone might search for using search engine Google.
Historically the meta keywords tag in HTML code for web pages were how web pages were described. Key words actually are useful for indexing content via search engines - the key words meta tag might not longer get used in practical reality, but search engines still index content shared online.
While the key words meta tag is not used, key words are still the basis of indexing content online. Trying to think about key search terms and using them in content shared can help users find appropriate online content.
Also, key words also is useful to summarise content. For technical content, key words can include professional subject matter and specific industries can have a technical vocabulary.
Some keywords from computing are RAM, NVRAM, NAND flash, AMD, NiVidia (the latter are makers of graphics hardware). ARM is the maker from Cambridge of processers for mobiles and tablets - ARM big major player on the world stage. Nividia American firm wanted to takeover ARM - debates erupted.
Useful key words is place where a video is captured also the date coupled with why the content has been captured. Who, what, why, where (also like place) and when are really the main phrases or search terms to think about - actually these questions have hallmarks or hooks into traditional print journalism. Keywords or key search terms is useful actually for taking screen grabs of online shared videos for creating websites with thumbnails small images and hyperlinks akin to video websites like the BBC iPlayer.
Really Facebook is useful for viewing online shared videos, but the web interface can be slow to browse actually to find a video. Bespoke creations and websites with videos linked also embedded can actually help users to find, discover and watch videos. Websites can be created where connected videos are linked in themes also cross-referenced with appropriate online content or digital material.
Creating screen grabs with Snipping Tool in Windows 10 for example think a year dash month dash date dash description which includes key words or key search terms.
iPhone photo also video horizontal or vertical orientation? Horizontal video capture better for scenes outside to reveal immersive video suitable for sharing on social networks also social media sites - Facebook big social network, YouTube and Vimeo is a social media website and multiple media sharing sites can spread video files around preserving digital video content
iPhone photo also video horizontal or vertical orientation? Holding an iPhone horizontal actually may result in wider angle viewpoints or video files actually - hold an iPhone in portrait mode will likely lead to narrower video frames but portrait mode is more discrete actually can record events in video in a manner that does not attract attention in the same way as holding an iPhone in horizontal video mode when capturing video.
Really actually people behave differently when they are aware of video capture and actually it is better to respect others be upfront about video capture but being more discrete may capture more authentic genuine behaviour with audio or sound also. Videos outside actually does reveal what really goes on - actually most of the time it is real people getting on with their own lives going about their daily lives respecting others minding their own business.
There is great detail outside in an urban built up environment such as Aberdeen for example new housing developments - 2000 Council houses are being built right across in Aberdeen during July 2022, some in Kincorth others in Tillydrone not really the most affluent areas but there are likely other areas as well - it is local people actually across a City in a given locality that are aware of developments, more accutely aware putting up with roadworks also dust and debris, building sites and such sites no playground for children.
In a nutshell, iPhone photo also video horizontal or vertical orientation? Horizontal video capture better for scenes outside to reveal immersive video suitable for sharing on social networks also social media sites - Facebook big social network, YouTube, Rumble.com and Vimeo is a social media website and multiple media sharing sites can spread video files around preserving digital video content.
Sample JavaScript code for form to get user input and check it also code to get information on a user's screen resolution to help improve display or presentation information - JavaScript can provide interactive elements to a web page also control user input provide form field validation useful to check user input to ensure it is accurate against a valid range
In the head section of an HTML page, JavaScript code can be inserted in the script HTML element - JavaScript can provide interactive elements to a web page also control user input provide form field validation useful to check user input to ensure it is accurate against a valid range.
Elements in HTML forms have name value pairs in a hierarchy similar in a sense to the Java programming language which is object-oriented. Java is platform independent runs as standalone blocks of computer code on Windows, Mac and Linux and runs inside PVR Personal Video Recorder boxes that enable multiple programme recording from set top boxes with multiple tuners, and JavaScript is contained in web pages - can be contained in the body section or the head section, but always within a script container tag.
There is the basic script actually to validate input contained in the function validate below. The word form within brackets is a parameter - paramater values can change be swapped in and out of functions in JavaScript, this is changing values in an independent block of code.
Really the JavaScript code below contains code to obtain information also about a user's computer or web browser such as the screen resolution - this may be handy to better understand users, know if they may be struggling with low resolution screens on computer monitors, viewing also from a desktop computer magnified display or a mobile handheld device.
JavaScript functions can be called or loaded on web page load with reference in the HTML body tag via the onLoad event handler used to call a function or set or procedures or block of JavaScript web code - JavaScript really useful for checking user input to see if it is valid against certain criteria to actually get better more accurate information that matches the intentions of the information seeker - the person that has designed a survey or questionnaire.
Forms usually have a submit button at the end - they enable a user to submit a form, send data perhaps via email or maybe populate a database.
The onSubmission and onClick event handlers actually can be used with the submit button when sending data using a form.
HTML forms elements have name also value pairs - adding a name to a form field HTML element usually represented by the input HTML element assigns a unique idetifier to a field, values actually is the data entered in a field by a user. Values or user data entered can actually be picked up by scripts sometimes and usually nowadays PHP scripts - this is how JavaScript links to PHP the Hypertext Preprocessor. PHP is usually associated with backend processing on the web but web pages can have a dot php file extension.
<input type="submit" value="Submit">
<script type="text/javascript">
function validate ( form ) {
// ** Validation of staff name **
if (form.userinputcheck.checked == true && form.staffname.value == "") {
alert("Please enter your name.");
form.staffname.focus();
return false ;
}
// ** End of validation of staff name **
function sniff_user_browser_settings() {
window.onerror=null;
colors = window.screen.colorDepth;
document.form.color.value = Math.pow (2, colors);
if (window.screen.fontSmoothingEnabled == true)
document.form.fonts.value = "Yes";
else document.form.fonts.value = "No";
document.form.navigator.value = navigator.appName;
document.form.version.value = navigator.appVersion;
document.form.colordepth.value = window.screen.colorDepth;
document.form.width.value = window.screen.width;
document.form.height.value = window.screen.height;
document.form.maxwidth.value = window.screen.availWidth;
document.form.maxheight.value = window.screen.availHeight;
document.form.codename.value = navigator.appCodeName;
document.form.platform.value = navigator.platform;
document.form.language.value = window.navigator.language;
document.form.useragent.value = window.navigator.userAgent;
document.form.userlanguage.value = window.navigator.userLanguage;
document.form.systemlanguage.value = window.navigator.systemLanguage;
if (navigator.javaEnabled() < 1) document.form.java.value="No";
if (navigator.javaEnabled() == 1) document.form.java.value="Yes";
}
//End hiding-->
<body onload="sniff_user_browser_settings()">
<form name="form" action="example.php" method="pos" onSubmit="return validate(this)">
Older people and some professions in the business world may feel intimidated by the digital world and its nuances, compatibility issues also some young people may not be intereted in computers, but digital skills education can lead to empowerment - universal standards also common user interfaces often enable more uptake or greater adoption in digital services - also variables in programming synonymous with the changing state of local environments which links to adaptability and the need for humans to respond to changing conditions on the ground and blinking lights or LEDs can alert humans to issues
Young people are increasingly tech savvy but not every young person is interested in computers, some young people may grow up on farms in Aberdeenshire real notspots for Internet connectivity and patchy Internet (speak of disadvantage and an unfair situation) - also older people may feel intimidated by the digital world and its nuances, compatibility issues. This is what makes educating, explaining and breaking down complex terms really useful maybe important even - being able to better use digital devices to accomplish tasks is empowerment in the digital age.
Actually professionals including architects, surveyors also those in legal professions may use computers and find them frustrating - file format conversions can really make people want to reset, take a break away from a computer, go for a coffee, engage in office banter, unwind in the evening at home with a Scotch Whiskey and there is working in the information world where there is lots of changes, mistakes which can be frustrating so really a more visual means to see what has happened or what is going on can be insightful may streamline professions even if people do not like what they are reading, hearing or listening to.
Whiskey a popular beverage across the world actually appealing to a wide range of people from manual workers those in the trades after a hard days work or graft to business professionals. Councils in Scotland can mandate or require teachers use specific software and other employees in the public sector.
This is born from conformance also uniformity - universal standards often enable more uptake or greater adoption in digital services - standard user interfaces can drive greater appeal ease of use think Facebook but also think standard audio control symbols think play, pause, rewind and fast forward often familiar to most people and often found on Hi-Fi equipment but also on TV remote controls which usually use Infrared also often found on radios in cars. Some drivers may spend a longer time commuting than others - some routes can really be more congested and major trunk roads motorways can have more lanes to cope with more traffic. Fibre optic networks often increase speed can create the perception of more lanes on a motorway enable the ability to handle more traffic - data traffic in the case of data networks.
Standards also found right throughout computer networks - 802.11 is the wireless network standard think WiFi, wireless network adaptors embedded in smartphones also tablets - desktop computers usually need a USB dongle or PCI network interface card or PCIExpress the mini one, the small white component on a computer motherboard - wireless network adaptors usually have a small aerial like antenna connected to an interface or adaptor card.
Education over time enables adaptablility and ability to respond to changing conditions, survive also - knowledge really is power and lifelong learning is really a very powerful concept and actually Google searches for specific technical terms can really advance knowledge when combined with user generated websites.
Pascal was a computer programming language used in education and is still useful for teaching - it often used the term var alongside variables, other programming languages use this term, but it is not always essential.
Variables are data values that can change when the user is asked a question, for example, their age - everyone does get older and age advances often too quickly. Old before you know it and people like to be reminded of still being young - think anti aging cream making wrinkles disappear also face cream and moisturiser. We need to teach computing to men and women equally to improve life chances. Variables may change during program execution. A variable is a memory location. It has a name that is associated with that location.
Variables linked to memory and buffer locations in the architecture of a computer processor the brain of a computer that performs calculations per second often very quickly or at high speed in the case of supercomputers also computers with multiple processors or dual cores threaded processors - think the hyper V processor big number crunching.
Computer applications are born built around variables and passing parameters - events throughout life are always or usually variable. This links to the changing state of local environments which links to adaptability and the need for humans to respond to changing conditions on the ground. Changing states of conditions may be picked up by LEDs or Light Emitting Diodes these are the blinking status lights on routers in homes and business across the land, can show computers connected to a home router and tell if their is a connectivity problem - humans need indicators, need to be alerted to events.
Alerts are also part of computer networks and also part of Windows 10 in Event Manager - events synonymous with error logging. Many errors happen actually, human operators may not always be aware of them, also humans may not understand them also, but understanding errors could really lead onto improvements and for safety critical systems that could save lives.
Constants do not change in value during a computer program's execution.
Parameters allow us to pass information or instructions into functions and procedures - parameters may be used in brackets linked to function names in JavaScript the web programming language. They are useful for numerical information such as stating the size of an object. Parameters are the names of the information that we want to use in a function or procedure. The values passed in are called arguments. Many a politican also solicitor are familiar with arguments and debating.
A network alert notifies a network administrator that a key health or performance indicator has exceeded its set threshold. This real-time notification allows the administrator to quickly detect, diagnose, and resolve any associated issues.
Alerts actually in a computer network can be trigged by ICMP protocol packets or Information Control Messaging Protocol.
ICMP is the error alerts in a computer network used to determine if network data packets have reached their destination safely. ICMP data packets can assist troubleshooting also fault finding tracing errors or faults for network administrators.
Direct Memory Access really linked to input and output controllers - such as sound cards, network cards and SCSI cards, it is the process of transferring data without the involvement of the processor itself - Swap memory is virtual or extended memory in a hard disk file and it boosts a computer's physical RAM memory capacity and enables more applications to run simultaneously
Direct memory access (DMA) is the process of transferring data without the involvement of the processor itself. It is often used for transferring data to and from input and output devices. A separate DMA controller is a hardware device and it is required to handle the transfer. The controller notifies the DSP processor that it is ready for a transfer.
Standard DMA, also called third-party DMA, uses a DMA controller. A DMA controller can generate memory addresses and initiate memory read or write cycles. It contains several hardware registers that can be written and read by the CPU. These include a memory address register, a byte count register, and one or more control registers.
Transferring the data without the involvement of the processor will speed up the read-write task. DMA reduces the clock cycle requires to read or write a block of data. Implementing DMA also reduces the overhead of the processor.
Most sound cards today actually use two DMA channels - one must be chosen from DMAs 1, 2, or 3, while the other can be any free DMA channel (and so is selected from the less-used 5, 6 or 7). DMA1 is also a popular choice for many other peripherals, largely for historical reasons.
Most devices stay away from DMA0 since it is used by the system. Do not use DMA0 for peripherals - if devices are set to use DMA0 but there is a conflict, there could be a problem with your computer motherboard.
Tape accelerator cards default to DMA2 and DMA2 is often not a source of conflicts - used to traditionally with floppy disk controllers.
Network cards can also use DMA.
Sound cards tend to use DMAs 0 to 3 or certainly this range is reserved for sound coming out of the computer.
DMA3 is the busiest channel on a computer and hardly any devices use DMA channels 5, 6 and 7.
Direct Memory Access really linked to input and output controllers - such as sound cards, network cards and SCSI cards.
Virtual memory is a combination of RAM (physical system memory) and reserved hard disk space - swap files used for virtual memory on a hard disk drive. Swap files are stored files and data that expands memory and RAM in a computer.
Swap files or virtual memory in Windows 10 can store both program code and data when applications are running. When a program is running, parts of a program can get swapped out to the hard disk - this enables more applications to run, basically swap files extend memory capacity create virtual memory. Swap memory boosts a computer's memory capacity and enables more applications to run simultaneously.
From the Windows 10 Start menu, scroll down to Windows Administrative Tools, then Resource Monitor. Click the Memory tab to see how much physical memory your computer is using.
The Good Things Foundation says that a digital standard of living is really - about being able to communicate, connect and engage with opportunities safely and with confidence
The Good Things Foundation aims to make everyone digitally able, equal and safe. The organisation seeks to build a digital nation, empower people to exploit and use digital technology - this is also digital inclusion.
The Good Things Foundation says that a digital standard of living is really - about being able to communicate, connect and engage with opportunities safely and with confidence.
The Data Poverty Lab linked with Nominet during 2021 and Nominet in the United Kingdom is the Internet company that assigns domain names leases them out to customers such as commercial firms who sell domain names and web hosting.
From the Good Things Foundation - Millions of people in the UK don’t have the basic digital skills they need to thrive in today’s world.
Good Things Foundation dot org - A lack of digital skills and access can have a huge negative impact on a person’s life, leading to poorer health outcomes and a lower life expectancy, increased loneliness and social isolation, less access to jobs and education.
https://www.goodthingsfoundation.org/the-digital-divide/
Digital Nation UK 2021 Facts, Stats and Fixing the Digital Divide - Manual workers with high or very high digital engagement earn 421 pounds more per month than their less digitally savvy peers.
https://www.goodthingsfoundation.org/insights/building-a-digital-nation/
UNIX, Linux and Windows 10 all use symlinks or symbolic links - absolute file pathnames are often long, specific and precise point to an exact location more reliable but relative Shortcuts can remind users what applications they had installed. Absolute links are more definitive - can be refereneced from anywhere within a UNIX file system also Debian is an original form of UNIX and Solaris from first Sun Microsystems and now Oracle historically good platform for software development education
A symlink is a symbolic Linux also UNIX link that points to another file or folder on your computer, or a connected file system. This is similar to a Windows shortcut.
Sym links can be symbolic of an application, be relative actually instead of absolute - absolute file pathnames are often long, specific and precise point to an exact location. Absolute links are more definitive - can be refereneced from anywhere within a UNIX file system. Font sizes in pt or point in Microsoft Word are also absolute unit sizes and for fonts absolute sizes more precise not flexible - the em format in CSS or Cascading Style Sheets is flexible and expands as does percentages, increase precentages to near 200 percent for mobile devices really to make text legible and this is also greater social inclusion for visually impaired users.
Symlinks can take two forms - Soft links are similar to shortcuts, and can point to another file or directory in any file system. UNIX is not Linux actually - UNIX is older linked also to big mainframe computers.
Solaris UNIX from Sun Microsystems was a major operating system around certainly in the run up to the new millennium or the year 2000 but existed long before - UNIX really is a very established often considered stable computing platform fewer reboots than Windows.
Linux actually can install updates without reboot - normally Windows 10 needs a reboot, also many users wait ages for Windows 10 to install updates, make configuration changes on shutdown and start-up of a computer. UNIX really dates back to Debian actually and deb also rpm installation files for computer software - deb and rpm are file extensions.
Debian and think University of Berkeley in California - great minds originally eminated from this University, but actually there are many great minds this is obvious when information found online is combined to enable synthesis.
California now actually in the present day 2022 faces many threats now least wildfires and also threats from sinking land and the Pacific Ocean. Off the coast of California actually is the island prison of Alcatraz think Sean Connery and the Rock, which once contained prisoners but is now a tourist attraction off San Francisco.
Solaris now owned by data company Oracle - really data big business, trading it, exploiting it and there is a black market think automated nuisance calls to homes in Scotland where data is used to phone people intimidate them robot spam callers demanding payment sometimes for an Amazon prime subscription - really Amazon does not phone customers, responsible organisation with good reputation. Home owners can be convinces to spend money from robot calls which usually lead to a human operator eventually - robots often used first to dial multiple numbers simultaneously from call centres.
Crimes can stem from data in the digtal age - people can have bad versus good intentions. Everyone faces choices - the choice to cause trouble, upset, grief or walk away, riding away on a bike may be safer actually - safer to avoid confrontation may save someone's life.
Right-click a Windows 10 Desktop in empty space - the Desktop is the screen usually visible to users cluttered with icons for computer applications - then hover over New in the context menu also the right-click additional options menu and then click New Shortcut. These are symbolic links or symlinks in Windows 10. Absolute links and pathnames are always better - less likely to be interrupted or be broken actually. Symlinks are relative in connotation - symlinks or shortcuts do not tend to work again when a computer running Windows 10 is set up again from a DVD or USB flash drive doing a fresh install unless shortcuts are backed-up to OneDrive for example and applications are reinstalled.
Shortcuts saved if people have lots of applications and clutter on the Desktop can really make remembering what software applications or computer programs users had installed enabling faster, more efficient installtion of software applications again minimising downtime in business productivity.
However, keeping computer programs to a minimum on a computer embracing the cloud or online Citrix-like thin computer style applications may actually make a computer more stable in real terms with less interruptions, but video editing can involve heavy lifting and offline applications for conversion for example to Mov or Movie format from Apple to the WebM format low file size high visual quality, a futuristic format that is here now to really increase adoption of video in society. AVS video editor includes the WebM format - adds a watermark actually front and centre when users do not pay, but not paying actually enables those with less money to evaluate applications, play around, write, help others and say what works better and what is not so good. This is the benefit of trials, but actually the free software ecosystem can be powerful and actually free open source software can increase adoption make computing more widespread - sell more mobile and tablet devices also laptops and Desktop PCs. Mobiles really to get help, take photos and shoot videos, although people do seem to walk about looking at screens. Screens on mobiles usually hard to see and the Amazon Kindle has a screen built for the outdoors with long battery life.
Outside video capture screens on Android and iPhone often clear, crisp and vibrant even on the iPhone SE 2020 - the iPhone really made widespread adoption of women connecting with others and with technology.
The iPhone fancy trendy graphics actually made mobile computing friendly, but the closed nature of the source code and also the backend links to iTunes necessitate need for a computer - need for iTunes to sync music for offline playback when a data connection is not available.
Algorithms versus hand picking - Smart algorithms the rules of logic like Google actually enable more timely results make better decisions, but hand picking information, selecting and re-presenting can really benefit others lead to greater insight - those with special interests can hone in on events but most people have topics that interest them or an area of expertise
Yahoo is the search engine that started off as a search directory with listings curated by humans. Search engines based on smart algorithms the rules of logic like Google actually enable more timely results to help modern working class people make good, better decisions. Still, hand picking information, selecting and re-presenting can really benefit others - hand picking may also help others to make sense of what is happening, the past and events also gain a fresh perspective also insight to help for the future.
Proof reading combined with sequencing and ordering of text and digital content is key to avoid misleading people also promoting greater clarity. Copy and paste function helps with ordering sorting information to enable creators of original works to be more efficient.
Schools in Scotland usually a closed community between teachers, pupils and parents and there is much to learn outside. Learning could be enhanced with greater interaction with the outside world also through exploration and active modes of travel can support learning and education very well coupled with digital technology and sharing.
Sharing also enables reuse but there are issues around fair play also copyright - too much copying may work against creativity and innovation but at the same time sharing widely can teach others more efficiently.
Horizontal and vertical integration across industries really shows how the world is a great mix of professions also talent and expertise - those with special interests can hone in on events but most people have topics that interest them or an area of expertise.
The 1970s really is when manual human operated switchboards took calls from people to place calls help them and around this time all switchboards moved to automation - mobile phone market compeitiveness has brought down the price of smart technology in almost every pocket worldwide really enabling anyone to get help, have their say - online storage solutions also sharing nowadays can enable digital visual evidence to be preserved - this can also enable everyone including more vulnerable persons to be understood when parents are no longer around
File hierarchies or tree like structures combined with copying files can really lead to file duplication and mean more time is needed for human analysis. Also important to consider humans can make mistakes, really humans do need real patience with computer systems. This really makes the case for smart algorithms to bring timely information to people's attention, but actually historical events are still significant.
Important to remember history - the 1970s really is when manual human operated switchboards took calls from people to place calls help them and around this time all switchboards went automatic making workers typically girl calls redundant. Humans also home owners usually do not like speaking, listening or interacting with a machine - speaking to another human can really help a vulnerable person to get meaningful help interpret their circumstances and for appropriate help to be provided - the Department for Work and Pensions advisors may do this providing money also enabling more independence of at risk groups. Sometimes job interviews are involved and this really stems from a culture of encouraging a work ethic.
Important to remember that email providers can actually go bust - Lycos was a company that went out of business but provided email also SMS Simple Mail Service text messages for free from a web-based interface to basic or standard digit 0-9 mobile phones.
Mobile phone networks spotted an oportunity to make money from mobile phone calls - actually commercialisation in this sector has been positive along with compeitiveness - it has brought down the price of smart technology in almost every pocket worldwide really enabling anyone to get help. For those that cannot speak, sometimes there are phone lines that are done using text - this is the importance of such services.
Online storage solutions also sharing with communities nowadays can enable digital visual evidence to be preserved - this can also enable everyone including more vulnerable persons to be understood when parents are no longer around - a video with a parent could provide compelling more authentic evidence since seeing is often believing and technology usually progresses, important always to stay at the forefront of technological developments, get ahead and lead. Changes can be disruptive - disrupt, lives, livelihoods and market. This is market forces at work and these are often the driving force behind large economies.
Actually publishing information maybe better and sharing over online storage helping more people may result in greater progress - actually passwords on computers require need for authentication and may lead to lack of trust or trust issues among members of a household driving fear. Fear can drive paranoia and also may lead to schizophrenia.
Microsoft actually through Windows 10 keeps requiring user log-ins linked to a Microsoft account, so it is fair to say a lot of people likely have an Outlook.com and some people may have a Gmail account. Outlook.com and Gmail are better products more full functional than the basic email service provided by British Telecommunications but BT do provide up to 1TB or 1000GB of free online storage but the upload and download process is cumbersome actually. That said, care for parents can enable money to be saved - BT accounts linked to a household and actually those cared for in peaceful households can save more money. When parents die, children are likely to inherit a property - still OneDrive, Dropbox, Google Drive also Amazon Cloud Drive and BT Cloud enable data to be spread around better preserved perhaps.
Important to remember before broadband and always on connections rolled out, there was slower 56Kbps dial-up connections. Really ISDN Integrated Service Digital Networks was faster around 128Kbps and often used by businesses in the early days of the Internet.
British Telecommunications is really the telecoms giant in the UK who own most landline phonelines - BT took over Plusnet. Plusnet was a technology start-up who was around at the time of BT Cellnet, BT's mobile firm - BT currently own Plusnet. BT Cellnet was taken over by O2 the mobile network.
BT Cellnet basic or standard digit 0-9 phones were thick as a brick.
Important to note being critical can be positive, but also important to be objective since this is rooted in fairness. The actions of some people may be perceived to be unfair, but the same people may also be acting with good intentions with their own belief system - beliefs can be linked with knowledge also events can shape knowledge lead on to progress also, tolerance and better understandings when everyone is respected, cared for and listened to.
Three main types of data back-up - full backup, incremental backup and differential backup, differential often used by Dropbox and OneDrive to sync changes in files, but incremental back-up can be useful to save storage space
Data back-ups can be useful - there are different means to back-up data and incremental data back-ups can cut down on storage space yet fully comprehensive data back-ups lead onto more redundancy. File optimisation also linked to pattern matching to cut out unnecessary repating data - this is often seen with the JPEG image format where repeating visual information is removed at the pixel level - this also affects pixelation and the quality of visual data.
Incremental back-up can be useful to save storage space sometimes it is not always necessary to keep doing data back-ups where data is the same - actually online media sites with video together with PowerPoint's slide show feature can enable multiple images and documents to be combined in a single container file or object useful for sharing making it easier also for users to see a whole story for example provide greater context.
Three main types of data back-up - full backup, incremental backup and differential backup.
Google useful for technical terms and definitions - also the short descriptive text that appears first and foremost on search pages can be useful giving meaningful information - A differential backup is a data backup that copies all of the files that have changed since the last full backup was performed. This includes any data that has been created, updated or altered in any way and does not copy all of the data every time.
Copying information that has changed is the basis for Dropbox and OneDrive smart syncing also file copying or data back-up sync to an online server, a computer hosted somewhere else and is remote in a different country or part of the world. The Internet is made up of redundant servers in a distributed networks - there is the Microsoft DFS Distributed File System.
A distributed file system (DFS) is a file system with data stored on a server. The data is accessed and processed as if it was stored on the local client machine. The DFS makes it convenient to share information and files among users on a network in a controlled and authorized way.
Google maybe useful, but also websites actually enable human intelligent synthesis of information - enable multiple disparate or independent blocks of information to be brought together and with human analysis to derive greater meaning, websites can really evolve come into their own enhancing the reputation of organisations - sometimes the bottom line, think profits.
Important actually students at University study hard actually, seek to really understand material and concepts - Google actually vast store of technical information to enable further study, follow up also enable students to challenge lecturers - one lecturer is not an authority on everything.
Windows 10 shortcut key commands and Users who magnify content such as those with visual impairments may take longer to do computing tasks, so employers need to be more patient with disabled employees
Windows 10 ten is really the dominant operating system or computing platform of the moment even though more and more Windows 11 installations are happening - migrating users over to new computing platforms is usually slow, time-consuming and pain staking for IT professionals.
Windows 10 ten actually is a powerful platform and a lot of configuration flexibility can be enabled from the Windows 10 search box - type Settings for example to load the Settings window, the main window from which users can tweak or customise their computer.
Settings is also on the Windows 10 Start menu. Right-click Settings on Start menu, then click Pin to Start, or More Pin to Taskbar for convenient shortcuts to enable quick customisations to your computer.
Right-click anywhere on the Windows 10 Desktop and click Display settings - from this window users can change the resolution of their screen, make icrons bigger for example or smaller and make more icons or content visible on the screen.
More visible content is known as screen real estate - higher resolutions generally boost productivity.
Users who magnify content such as those with visual impairments may take longer to do computing tasks, so employers need to be more patient with disabled employees, but businesses are often driven by profit so most people with real disabilities are out of work - commercial secrets versus open data which is a barrier to real progress. This has care issues actually affects health and social care services. Mental health services are linked because treatment for mental health services can often be linked with social care support.
Windows shortcut commands
- cmd - for Command Prompt
- msconfig - advanced configuration command
- dcpromo - converts a Windows server to a domain controller to run Active Directory, the service to share resources
- ipconfig/all - displays IP Address details, DNS or Domain Name System servers also network card adaptor details including unique the world over MAC address, the physical address of a computer on a TCP/IP network such as the Internet
- ping followed by an IP address to check the reachability of a network router
- traceroute to really find faults in an Internetwork or network of networks
- Settings for the Settings application with a user friendly means to customise or tweak most settings with a Windows 10 computer
- Windows key plus letter-L to lock your Windows 10 device
- Alt plus F4 key to shutdown a computer.
- appwiz.cpl to open Programs and Features
- cleanmgr to Open Disk Cleanup utility
- Alt plus Tab switch between open tabs
- Copy text is Control plus letter C
- Cut text is Control plus letter X
- Paste text is Control plus letter V
- F11 is the maximise window screen useful for displaying more of web pages or more on a screen
Remembering US President James Abram Garfield - the assasinated President founded Pythagoras the basis for maths and now STEM Science Technology Engineering and Maths is rising in importance
Remembering US President James Abram Garfield founded Pythagoras
1876 James A Garfield published Pythagoras maths Pythagorum theorem - former American President and army major was assassinated.
Pythagorus is the basis for maths and now STEM Science Technology Engineering and Maths is rising in importance.
Pythagorean theorem, the well-known geometric theorem that the sum of the squares on the legs of a right triangle is equal to the square on the hypotenuse (the side opposite the right angle)—or, in familiar algebraic notation, a2 + b2 = c2.
The hypotenuse is the side of a right-angled triangle that is opposite the right angle.
March 4 1881 became US American President for around six months, died after two months being shot by an assassin.
Pythagoras of Samos was an ancient Ionian Greek philosopher and the eponymous founder of Pythagoreanism. His political and religious teachings influenced Plato, Aristotle and also the West in general.
Cisco kid Western film star Duncan Renaldo found guilty of perjury, case from the past historical and significant, a cheerful show kept children smiling without nightmares - children and young people increasingly tech savvy
From the Center for Bibliographical Studies and Research on the Cisco kid also copy and paste is best for undisputed facts and for keeping down copying to a small percentage wise using own creative efforts boosts originally and generates new knowledge that informs. Creating new knowledge with analysis and sythesis bring ideas together is the gold standard.
From the Center for Bibliographical Studies and Research - Duncan Renaldo the Cisco kid went to New York and worked his way up from janitor to scene designer, producer and writer at the old Tec Art movie studio. In later years, he told interviewers that he was orphaned at an early age and never knew where he was born, although he believed it was in Spain.
He went to Hollywood in 1926. His first leading role was in Trader Horn, but his life was disrupted just before the movie's premiere in 1931 when he was arrested by immigration authorities for entering the country illegally. After a sensational trial, he was found guilty of perjury for claiming he’d been born in New Jersey. Renaldo, who thought.
He’d been born in Spain, served 18 months in prison. President Franklin D. Roosevelt granted him an unconditional pardon the day before he was to be released. Renaldo later called that epsiode the most interesting and tragic time of my life. By 1940, he was starring in Westerns, and won the lead role in The Cisco Kid movies and TV series in 1944 He and his sidekick, Pancho, played by the late Leo Carrillo, portrayed cowboys who used their wits instead of their guns to bring justice to the Old West. The Cisco Kid was a cheerful show he once said. Pancho and I never killed anyone. The kids that watched our show went to sleep smiling and not with nightmares.
Meta HTML tag http-equiv refresh tag reloads a whole web page - AJAX loads a web page in part useful for news feeds - this HTML tag is totally different in concept from Amazon Fresh, fresh as in fresh groceries but nothing perishable
The below HTML tag below can be put in the head section of an HTML web page document. It enables a web page to autoload or fresh the whole page.
JavaScript web programming language technique AJAX is actually for dynamically changing components useful for BBC Sport news feeds, tennis scores and so on. Really tennis is actually quite a slow game like cricket also like golf - some older people may prefer slower pastimes to relax and unwind like lawn or garden bowls and really Hampden Park the original site from the 19th century is now a bowling green. This was on BBC programme Scotland from the Sky. The same programme revealed the Kessock Bridge in Inverness was opened in 1978 also Scotland is famous for the sport of curling, lumps of rock or stone for Scottish curling stones come from Aisla Craig or from the pudding stone cliffs off the West coast of Scotland near Ayr.
Before the Kessock Bridge, people located in Inverness had to go by way of Beauly also Muir of Ord to reach Dingwall and further north including Brora, Golspie, Thurso and Wick - golf resort at Golspie also at Fortrose located on the Black aisle - Montrose is near Brechin in Angus east coast of Scotland and also near Arbroath with the Declaration of Arbroath.
"As long as but a hundred of us remain alive, never will we on any conditions be brought under English rule. It is in truth not for glory, nor riches, nor honours, that we are fighting, but for freedom - for that alone, which no honest man gives up but with life itself"
"These are the best known words in the Declaration of Arbroath, foremost among Scotland's state papers and the most famous historical record held by National Records of Scotland. The Declaration is a letter written in 1320 by the barons and whole community of the kingdom of Scotland to the pope, asking him to recognise Scotland's independence and acknowledge Robert the Bruce as the country's lawful king.quot;
HTML meta tag for refreshing or reloading a web page but content does not change - it is static but useful for websites with changing content not rolling sports scores such as tennis from BBC Sport. For this there is AJAX. Automatically reloading web pages may cause issues for those focused on a topic, busy reading also honed in on a subject matter getting to grips with a complex technical topic. BBC News using live feeds for news is actually frustrating - it can be nice to read, but changing news too often distracts people from the news really, from reading in detail and in-depth.
<meta http-equiv="refresh" content="30">
Breakdown of HTML code used for display - < for less than character in HTML. " for quotation mark and > for greater than symbol - this is used to display the HTML special markers. When writing HTML code, you should use the special markers themselves as denoted on a standard computer keyboard not < for example. The special characters are also known as escape sequences intended to separate HTML special markers in code from what is displayed in a web browser.
Apple tech giant has taken over Primephonic classical music streaming making it part of Apple Music subscription service and Apple previously disputed the name with Apple the music label - also help to remotely delete an Android smartphone or Android device, remote wiping useful more for phones and tablets to protect text messages which could link to friends, family and children
While it is possible to remotely delete computers and laptops using various means, actually this is more likely by devious individuals using malware or malicious software also ransomware known as scrambled data can pose a big problem for a company's commercial success this makes actually distributing information wise, publishing, sharing creating multiple verions and formats also porting data to multiple online storage providers or solutions. However, being able to wipe a phone or a tablet from a distance is more disirable since these mobile devices can be easily lost and stolen, contain personal texts which can really identify someone and their connections including friends and family also more importantly their children. Children been kidnapped held to ransom is not impossible. WhatsApp messages can disappear in 5 days automatically - disappearing messages may protect more vulnerable people linked to someone, but taking precautions such as setting a passcode or password on your mobile device may prove useful since mobile devices are portable.
Remotely find, lock or erase an Android phone - https://android.com/find - more help available from Google, see https://support.google.com/accounts/answer/6160491?hl=en
If you love music, transferring playlists in streaming applications across multiple platforms think YouTube Music and Spotify is possible with soundiiz.com and actually this may keep your favourite tunes alive at your beck and call to nod off doze also to sleep putting you in a relaxed state - music can improve mood, be euphoric and classical tunes can chill people.
Take a chill pill this was in the Matrix first film the blue pill some might say, but really classical music can be chilling and relaxing - lots of classical tunes are produced by orchestras across the world such as the Scottish symphomy orchestra also the London symphony orchestra - there is also the Prague Philharmoic Orchestra also the Dutch Phion orchestra.
Those living in warmer regions of the world may fall asleep more easily due to the warm climate - Scotland has a temperate climate often milder temperatures but August during the last two years 2020 and 2021 saw thunder and lighting - do not forget the Stonehaven train derailment during August 2020. Those living in Scotland may like music to fall asleep more easily.
Primephonic classical streaming service has been taken over by Apple Music the big tech giant that fought off the Apple music label in a trademark war - see https://www.primephonic.com/
From https://www.primephonic.com/ at the time of writing 24th July 2022
Dear Primephonic user,
Three years ago, Primephonic was launched to create a better future for classical music by addressing the challenges and complexities of the genre for the streaming era. We felt compelled to develop a streaming service that truly gets classical right—so that’s what we did over the last 3 years. But to fully achieve the next phase of our mission, we need to bring our classical streaming expertise to millions of listeners worldwide.
As a classical-only startup, we can not reach the majority of global classical listeners, especially those that listen to many other music genres as well. We therefore concluded that in order to achieve our mission, we need to partner with a leading streaming service that encompasses all music genres and also shares our love for classical music. Today, we are therefore thrilled to share a great step forward in our mission – Primephonic is joining Apple Music!
The Primephonic service has been taken offline. We are working on an amazing new classical music experience from Apple for next year.
Yours, The Primephonic Team
E-bikes and e-cargo to be big for delivery of products from Amazon in London also electric transport emerging from big retailer Amazon - big brand companies do usually help employees with families giving them transport so always aspiring to get job fundamental - aspiring key but with global warming more people are perspiring
From Amazon website, Amazon is a pioneer with eco-friendly delivery of groceries and it is happenning in London combining health benefits with clean efficient environmentally friendly transport - really e-bikes and e-cargo actually is more not less job opportunities really helping those housebound with health conditions perhaps also disabilities. Also electric transport is going around in London for Amazon deliveries - individuals having jobs actually and really aspiring will be better looked after because big employers will likely go the extra mile to help staff learn to use electric vehicles also a fulfilling job or vocation will result in employees having electric vehicles for work purposes at home useful for family purposes.
Support for Amazon Fresh can be positive, maybe better than groceries from Tesco also Asda the major supermarkets and Asda is also known as Asda Walmart, a big major American supermarket. Maybe a need to wait longer, but actually this is the importance of planning ahead, respecting eating and drinking in moderation really aspiring ideals - stocking up at the supermarket with large trolleys useful to feed families but actually it encourages perhaps unhealthy purchases also spending on products that people would not normally buy. Children can also put non essential items in trolleys pushing up the cost of living in a crisis.
From aboutamazon.co.uk - Amazon has also unveiled plans to roll out large scale solar panel installations at facilities based in Manchester, Coalville, Haydock, Bristol and Milton Keynes before the end of this year, to help power those facilities with renewable energy. Amazon will double the number of on-site solar energy projects in the UK by 2024.
Important to turn off digit or passcode authentication on Dropbox also OneDrive on an iPad for example before copying Pages files the native document format on Apple computers and devices to really preserve duplicate data - also Long press is how to bring up a menu to copy paste files on mobile devices but a lightning connected mouse for iPad can enable easy right-click
Let's say you have an iPad - it's good to play around with iPads experiment since they can be a popular, trendy device. The Pages app is a useful note taking app actually with Presenter mode enabling magnification of text in large text useful if you want a kind of auto scroll of large text that you move with your finger may help people tell stories in future.
Pages app files stored in iCloud an online service, but actually it is easy to copy the documents to other places such as Google Drive, OneDrive and Dropbox also Amazon Cloud Drive. There are many digital services - really spreading data around is what preserves data and actually real violent thugs outside who do harm likely have not taken the time to really put data in multiple places. So really this reinforces the view of focusing on real violent life threatening injuries. Digital data when created has potential to be more use really help vulnerable persons - important also for women to become more technically savvy and also a lot happens outside in the natural world also in the natural urban built up world as well as the countryside.
These Dropbox and OneDrive apps actually with passcode authentication enabled with four digits to store files securely actually present real problems for copying data from iCloud such as the Pages app - important to disable passcode authentication actually to be able to copy files or simply you cannot do it and copy files to other competing digital services to help preserve data.
In iCloud Drive on the Pages App, the three dots at the top of the side menu provides options to enable Dropbox and OneDrive.
From the Dropbox app, click Account Tab and next to the word Account tap the cog wheel - options are thus present to turn off passcodes to enable files from the Pages app to be copied to other storage providers online.
To copy container Pages folder in iCloud on iPad, select Select top right, then the Pages icon, then More bottom of screen - click Copy then Pages top left, thus click Dropbox icon to copy files. You need to connect a lightning connected mouse to be able to right-click easily to Paste your files to a more permanent place such as the Dropbox app, so really the iPad is not that portable or mobile device with lacking the ability to paste or duplicate files from iCloud with reference to the Pages app.
To paste files with an iPad, you long press with your finger on empty space then click Paste within the Dropbox app - you might need to try to Long press with your finger a few times - iPad screens can have sensitiivity issues like all touch screens and pixels can fail actually. Screen can get scratched and the glass known as Gorilla glass can get damaged making touch screen and interaction a problem.
Long press is how you paste duplicate files on an iPhone also an iPad - sometimes Copy for make copies of files is available from the Long press menu. Touch input can be convenient on the move, but keyboards also laptops as well can make people more productive also be more reliable in a sense. Touch typing is an important skill to be taught in schools, but equally so is video editing, script writing, video production skills to enable story telling to really empower young people in the digital age.
Using SQL Structured Query Language to query a database to produce selected output in the form of an abbreviated table output also ability to update or push data into a database table and delete or drop tables
SQL also known as SEQUEL or Structured Query Language and SQL is a query language for a database, it is means to seek information from a database or to query a database.
SQL uses ANSI or American Standard Interface syntax.
The basic SELECT statement of SQL specifies the columns in a database table that are to be displayed in the resulting query data.
FROM specifies the table to be used.
WHERE filters the rows subject to some condition.
SELECT list of attributes
FROM table-name
[WHERE condition];
SELECT driver# - this refers to a table field with an id of driver, this is just an example. Multiple fields can be specified in SELECT statement separated by a comma.
FROM Drivers; - this refers to a table in a database called Drivers.
WHERE address = "Aberdeen"; - this searches an address field in a table for an entry called Aberdeen. Really the basic WHERE clause is used to refine a search - look for specific data or entered data within a field of a table which is contained within a database.
There is also a tuple which is part of a database. Fields, values and tuples exist in a database table.
Tuples are used to store multiple items in a single variable. Tuple is one of 4 built-in data types in Python used to store collections of data, the other 3 are List, Set, and Dictionary, all with different qualities and usage. A tuple is a collection which is ordered and unchangeable.
Pattern matching can be used with the SELECT command. Pattern matching for certain fields with the LIKE clause.
The IN operator with SELECT can check if a field has a specific value from a range or set of values.
COLUMN FUNCTIONS - this can perform calculations on table values - values is the actual data within a field.
A field is really a point in a table that is a cross-section of a column and a row with in a sense co-ordinates to denote the specific field, well rows are usually lettered and columns are numbered. Well fields are located on an axis really and are pinpointed by the definition of a row and a column at a cross-section.
Fields, values and tuples exist in a database table. Values is specific data or entered data and that is what is retrived actually through user queries.
User queries can use OR also AND clauses this is in addition to LIKE often the standard choice or option also operator.
ORDER BY clause sorts output into ascending also descending order.
LIKE clause used with SELECT statement to pattern match - hash or # character to match a digit for example 0-9, star or * matches any number of characters and ? matches a single character.
For example Like "?#*"
SELECT statement, WHERE and ORDERBY clauses to filter data query output
SELECT statement is used with the commands below, for example to count the number of values in a column, use SELECT COUNT(driver#) - driver# is field used in this case, the field of a table.
Let's say there is a field called points, with the WHERE clause part of the SELECT statement assuming the whole statement comprises SELECT, FROM, WHERE, a range can be determined with the AND operator to search a table for fields with a set range of values.
WHERE points >=7 AND points <=15;
ORDER BY name; - this is actually part of the SELECT, FROM, WHERE, ORDER BY statement - ORDER BY followed by field name in this case name can be used to sort a query output alphabetically - some fields can be sorted alphanumerically or by numbers in the case of fields with numbers such as an ID field which may be a primary key. ORDER name DESC used to sort a field with a name in descending order such as Z-A.
Primary key unique identifier for a table
A primary key is like an index for a table in a database - a primary key is a unique identifier for a table really and each row is given a unique identifier usually this is a number for example an ID row. Having a primary key or a unique identifier for every row does enable data values in a table to be sorted also to locate a specific field with inputted data values. Primary keys can be used to link tables together and form relationships such as one to one and one to many relationships.
Linking tables is really useful for the backend of a supermarket - for example there may be a table called ORDERS, CUSTOMERS, DRIVERS and DELIVERIES. Such tables tend to store customer data for orders linking details of groceries to customers as well as deliveries including the drivers responsible.
Maths functions in respect of a database SQL SELECT statement.
COUNT - counts the number of valus in a coloumn
SUM - adds up numbers in a column.
AVG - calculates average column values likely numbers
MAX - calculates maximum column values likely numbers
MIN - calculates minimum column values likely numbers
The below symbols can be used to perform calculations for example adding, subtraction, multiply and divide.
star *, divide /, plus +, minus - symbol
There are four main types of joins in a database and they are shown below - joins enable searching or querying a database and joins are like filters to sift through a dataset and present specific output which is a subset.
SQL join a means to query or filter a table in a database to retrieve results
PRODUCT JOIN - forms every possible combination of rows using 2 sets of columns
INNER JOIN also known EQUI-JOIN - PRODUCT JOIN performed but only those linking attributes that match in user data is retained.
LEFT-OUTER JOIN - involves matching data between two tables like an INNER JOIN, output in second table matched as NULL. Output tends to show full detail for first table on the left.
RIGHT OUTER JOIN - involves matching data between two tables like an INNER JOIN, output in first table matched as NULL. Output tends to show full detail for second table on the right.
In relational databases, a relationship exists between two tables when one of them has a foreign key that references the primary key of the other table. This single fact allows relational databases to split and store data in different tables, yet still link connected or similar corresponding data items together. Foreign keys used in the second linked table but actually a foreign key on a second table is usually the primary key on the second key.
Generally, one to one, one to many and many to many are the three different types of relations in a database.
Updating and deleting data in tables with SQL queries
UPDATE and DELETE queries in SQL can change data in tables - these action queries enable data held in tables in a database to be altered.
An SQL query like below references a Drivers table and for the points field, the number 6 is pushed into the D040 field representing a driver.
UPDATE Drivers
SET points = 6
WHERE driver# = 'D040';
DELETE SQL queries remove whole rows and do not delete data values from cells. Databases use fields but really fields are like cells with data values - really it is spreadsheets that use cells to hold data - Microsoft Access is a database that actually can store names and email addresses to do mail merge with Microsoft Word documents useful for distribution lists using electronic mail messages.
The command below deletes all rows with points field greater than 10 from the Drivers table - points may refer to penalty points, which can help ensure drivers are safe to travel deliver goods.
DELETE FROM DRIVERS WHERE points > 10;
Some useful SQL commands to create tables, alter tables and delete or drop tables.
- CREATE TABLE
- ALTER TABLE
- DROP TABLE - this deletes a table
- GROUP BY also HAVING clauses can perform queries on groups of rows
CREATE TABLE tablename (columnname data type [coloumn constraint[);
Data types can be char(size such as 8 numeral value) - fixed length string, also varchar2 variable length string, also data type can be number(size,ddds) - real number with integer numeral size and digits dds is decimal places.
Example Tables in a database using SQL you may create for a learning institution.
CREATE TABLE students (student# integer, title varchar2(3), name varchar2(20), address varchar2(40) );
CREATE TABLE courses (course# char(4), course_name varchar2(20), start_date date, end_date, date );
Change data in a table which is contained in a database using SQL.
ALTER TABLE students ADD course char(4);
Delete tables using SQL from a database.
DROP TABLE students;
DROP TABLE courses;
Colocation server farms provides the building, cooling, power, bandwidth and physical security, while the customer provides servers and storage and video files can act like a container unit for multiple files to enable more efficient user view and access - free video hosting support can be cost effective for ordinary users and free hosting services a good value for money help make computing platform services and digital services available to all where there is a data connection
A colocation facility is a data center facility in which a business can rent space for servers and other computing hardware. Typically, a cololocation facility typically a data warehouse with server farms provides the building, cooling, power, bandwidth and physical security, while the customer provides servers and storage.
Social media websites like YouTube also Rumble.com which are video sharing websites can function like a colocation storage facility for ordinary users - social media firms may pay for storage and the big issue is they provide it free to users usually in an advert supported model. Free video hosting support can be cost effective for ordinary users and free hosting services a good value for money help make computing platform services and digital services available to all where there is a data connection or Internet connection.
Video file formats are container files for multiple documents, images, JPEG also PNG files - such container files enable evidence to be preserved better also presented for playback - video files are great also for slideshow images just to be able to playback images or photographs in a pre-programmed timely interval.
Video container files can order files also images in sequence for logical viewing, but when images haves have been previously logically named with numerical incremental numbers including having a naming convention it becomes easier to more efficiently order images in sequence into a video container file such as MP4 - MP4 MPEG Level 4 works for playback independent of computing platform or on Windows, Mac and Linux also Apple and Android.
Video container files also enable outsourcing of video storage cut down on storage on web servers - actually putting multiple files in a single container file, uploading to a video sharing site makes it easier to back-up preserve websites also it makes it easier for web hosting companies to mirror content when less files are on a web server.
Lots of files on a server or computer takes its toll on indexing for search features and also files are stored on a hard drive in a scatterbrain approach - disk optimisation or defragmentation also defrag was born to move file fragments to make files open faster so that file fragments are ordered sequentially in blocks. Sequential order of file fragments in blocks makes it faster for a computing to piece together the multiple blocks that make up a file to really open or read a file to enable user view.
Copying text a paragraph at a time to Notepad for example to create a web page is likely more efficient and more reliable in the long-term - it is easier to wrap a line of HTML code from a PDF paragraph block in letter-p or pee or p tags the HTML element for producing paragraphs of text which create single line spacing between each paragraph - also rules of logic written by computer programs can predict behaviour and detect potential shocks to systems in advance useful for climate modelling and making predictions
Newbies or newcomers to writing HTML and web page code - hold down Control plus letter es or letter-s routinely to save files quickly in Notepad the Windows 10 basic text editor light on system resources, actually TXT files enable efficient ways to save online text to your computer - key shortcuts can save work offline on your computer, to Dropbox and OneDrive container folders on a computer the gold standard to prevent damage to a computer's hard drive, but really a Solid State Hard Drive as a second drive in a computer can also provide a fail safe means to save because actually the most common errors with a computer are with the Windows core operating system caused by Microsoft.
Online storage keeps files available from anywhere and at anytime - also some countries are also more stable than others with more stable weather patterns, but no-one can predict where in the world and when the next disaster will strike, but for events where humans are involved that are man-made to some extent advanced smart algorithms rules of logic written by computer programs can predict behaviour and detect potential shocks to systems perhaps better than even those responsible for computer systems who oversee day to day running - everyone can get distracted, lose focus but Microsoft Windows 10 annoyingly has Interrupt requests and memory leakages these are the hexadecimal code error messages that stop a computer from shutting down, perhaps rebooting - young people learning the base 16 hexadecimal system also learning their sixteen times table might allow greater understanding of Windows error messages when they enter search strings into Google the mightly all knowing search engine with lots of definitive answers for technical terms along with erroneous bad information in the mix. Really technical vocational qualifications and studying at polytechnic Universities also technical Colleges may help you to determine bad information from good useful information.
All computer systems do require monitoring, human input, management. Right now 23 July 2022 hot temperatures predicted for China - 40C actually that is not that hot, recall the south France during 2006 and temperatures were around 40C and actually a breeze wind chill can take the edge of exceedingly hot temperatures. Often breezy in the North-East of Scotland and just look to winter 2021-2022 several storms of strong winds across the region battering the region with billowing gales. This is freak weather - been predicted to come for decades by scientists using climate modelling software and number crunching to get ahead really fast supercomputers to churn through data at breakneck speed look for patterns, now it is happening due to carbon intensive processes such as oil use, gas extraction and the coal heated homes of the past in Scotland - coal powered most homes during the 20th century.
22nd July 2022 BBC NEWS China heatwave: Temperatures of 40C expected this weekend - https://www.bbc.co.uk/news/world-asia-china-62271975.
Web page code just using a normal dash pressing the dash key once on the keyboard in Notepad usually displays a dash on screen definitely and usually no on screen special formatting errors which is very convenient but there is the — to produce — a bigger line useful to break apart information and provide more clarity. This can really help media professionals when crafting informative meaningful headings.
There is also – or – this is how to write a dash in HTML web page code and actually the and symbol is done in HTML web page code or web page language from usually the number 7 seven key on the keyboard which shares the and key when shift is held down. Hold down shift press letter-7 to produce & denoted in HTML web page code as & - the word amp short for ampersand and resembles the word and - this is one of the most useful ASCII special character symbols also known as escape charceter sequences in HTML web page code.
Many working professionals will likely have many files saved in PDF Portable Document Format files - actually copying text a paragraph at a time to Notepad for example to create a web page is likely more efficient and more reliable in the long-term - it is easier to wrap a line of HTML code from a PDF paragraph block in letter-p or pee or p tags the HTML element for producing paragraphs of text which create single line spacing between each paragraph - a new paragraph is often used to signify new ideas also new concepts or new topics or items for discussion in news articles for example.
Those that work in law enforcement actually are mostly people who go into a job role to protect the public the ethos of Police Scotland is to protect the public - actually it is important to train everyone in computer technologies, but it is imperative the police seek to learn quickly ahead of the public to really enforce online laws linked to exploitation of children also online laws linked to harassment of women.
Being able to shoot video from a smartphone and do it efficiently also back it up make copies and duplicates is really fundamental to creating evidence that is truly without prejudice. Making duplicates and organising also sequencing including story telling is part of parcel of presenting real life cases whether of an interesting life lived or bring someone to justice for a crime that has been committed.
Becoming digital empowered through greater knowledge acquisition and real world practice or hands on skills training is key to becoming more tech or technical savvy.
Digital skills education really benefits everyone but some vulnerable groups have the most to gain such as women and disabled people including also older people who first went online as pensioners to keep in contact with their grand kids or grand children.
Frequency-hopping spread spectrum automatically changes carrier frequency of radio waves also signals
Frequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by rapidly changing the carrier frequency among many distinct frequencies occupying a large spectral band. The changes are controlled by a code known to both transmitter and receiver.
So radios use different frequences - so with frequencies being changed actually automatically likely transparent in the background, ordinary police likely do not notice. A criminal nowadays would really have to hone their skills, fine tune them harness their abilities to really pick out conversations over radio communication also switching frequency.
There are two types of spread spectrum techniques: the frequency hopping spread spectrum (FHSS) technique and the direct sequence spread spectrum (DSSS) technique.
Slow frequency hopping is a type of frequency hopping primarily used for avoiding multiple access interferences in wireless communication systems. The slow frequency hopping spread spectrum technique is a popular technique used in wireless local area networks and wireless personal area network communication.
In slow frequency hopping, multiple symbols are transmitted in one frequency hop. In fast frequency hopping, multiple hops are required to transmit one symbol. One or more symbols are transmitted over the same carrier frequency.
Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied. This results in a much greater bandwidth than the signal would have if its frequency were not varied.
More channels, more choice and actually to transmit all channel information over the air takes bandwidth - broadcasting is really done over the air through the air using wireless signals. This is TV broadcasting from both terrestrial TV and from satellite.
Satellite even in TV broadcasting is about the relay of signals in binary a two state system over a physical carrier medium. Satellite TV is about entertaining real people but also it is about educating people - some programmes really are not worth watching for example Naked Attraction. Never actually watched it - Mum revealed what she took it watching it with one of her sisters, mentioning no names multiple sisters masks identities. Naked Attraction is aimed at women - enables them to choose a partner for dating based on their penis. Really, if you want to watch it, you will find it in the TV schedules on Freeview terrestrial broadcasting - Sky TV boxes also Virgin Tivo boxes are made using Java an object oriented programming language. Freeview really is Universal in the UK, but some people actually may have signal issues, have to retune - sometimes from time to time rescanning or retuning picks up new channels.
So Sky TV offers more channels, more choice, entertainment and education for when people stay at home. Still it can be good to get outside and travel - no-one is infalliable and actually anyone may get hurt especially on the roads around Aberdeen.
Actually the most interesting developments are outside, but traditional newspapers really just reveal written up works still useful - ability to really have a mobile device with ability to read information and shoot video side by side might result in betting more engaging content also more accurate content based on what is happening in real time.
Digital technology education is really about enabling and empowering people, take part produce more engaging content based on local developments.
Most people would likely be willing to pay for such content - more visual material with narratives based on what is happening in real-time throughout an urban landscape - actually cycling on country roads is really where the danger is and the Scottish government have no plans to reduce speed limits national speed limits like 60Mph on country roads.
For YouTube video uploads for longer videos, mobile phone numbers need to be confirmed - Facebook's free model of support for unlimited photo and video upload actually places a great burden on computer servers is really unsustainable long term, but Facebook now known as Meta like the HTML meta tag has always said the service will be free to users which is a big issue - Facebook disruptive technology
For YouTube video uploads for longer videos, mobile phone numbers need to be confirmed - actually for Facebook video upload, users can upload really quite large files without a mobile phone for example, this does make the web as a platform universal in a sense actually truly universal and independent of computer platforms enabling also free speech and individuals also to have their say - equal representation is born from this.
Facebook is supported by adverts to fund the service free for users, an online service that supports connections, friendships and relationships - Facebook's use of video also Facebook pages and business pages actually makes Facebook very dominant as a powerful company.
Facebook has computer servers and with that there is actually a heavy burden on Facebook to continue to provide unlimited photo and video storage - really always investing and innovating in novel data compression formats is wise. The WebM format for video makes good use of visual quality while at the same time keeping down file size.
Different people actually see different online videos - no-one really sees a whole conversation from a person's life actually - this might be a person's life story. Story telling is also worthwhile - those that have lived a significant existance reflecting and telling stories about what they have learnt may inform others.
As far as video is concerned, video compression is important and also the algorithms underpinning them - actually shorter videos being shared actually can enable a scene in real life to be captured and shared most efficiently - big role actually for adding text content to supplement videos with reference to background data on the web - look-up of information on the web for fact checking could enable more accurate use of video for visual verification paired with text content. Still a big role for text and honesty, but visual representations make observations more authentic.
Actually big role for summarising - producing key points in video when cross-evidenced with other evidence this could make a very compelling case for use in court using a video with audio and subtitles, but actually most people that attend Aberdeen Sheriff Court for example do not see a Jury - they face a judge in practical reality, plead guilty actually since there can be 100 or a hundred people facing court on any given day according to the court role page. Cases that progress to court actually, people may feel pressurised to plead guilty when confronted with an incident to avoid harm to reputations - really a focus more on digital evidence rather than witnesses with conflicting statements and contradictions really corroborates a tale and accusations may provide more certainty and be more definitive at the end of the day.
For YouTube video uploads for longer videos, mobile phone numbers need to be confirmed - Facebook's free model of support for unlimited photo and video upload actually places a great burden on computer servers is really unsustainable long term, but Facebook now known as Meta has always said the service will be free to users which is a big issue a real problem.
Really important to keep back-ups of photos and videos on Facebook as well as conservations also posts you may have made which are worth keeping. Facebook does allow users to download their data. Actually downloading data from Facebook may not be in the same high quality format as when you uploaded data - this is compression in the backend to reduce file sizes.
Compressing file sizes doing video editing before upload of videos can cut video upload time for slower networks. Aberdeen actually and the surrounding area is an area with relatively fast broadband speeds. Some areas of Scotland such as rural area may have slower patchy connections to the Internet - this is what makes video compression technologies come into their own. The web is really built for education on technical topics - a technical vocational education is more grounded in practical reality with less grey areas of dispute.
Facebook actually is a great platform for education really opening the eyes of others, showing what is going on and teaching. With video sharing, the person uploading videos really has discretion about what videos to share - using a camera outside without upload of video may force behaviour change by others make them think twice about behaviour which is less than considerate on someone more vulnerable. Actually someone may feel alarmed enough to voice concerns - really multiple people voicing concerns and the same concern is how progress is made and change happens. This can be seen from the UK government petitions website - see https://www.change.org/start-a-petition.
There are many online services that make it easy for users to voice concerns, but really skills in website design and development can give editorial control to someone coupled with first rate written communication skills, prose can be crafted to argue and persuade others.
Teaching and educating others to create websites may lead onto great progress, advance knowledge and spread it around - digital course materials on the web enable reuse of learning material and sharing of information with broad appeal enabling the most vulnerable learners to digest what they learn and learn in their own pace at their own time at their own way and at their own convenience.
Facebook or Meta is a professional company with an ad supported business and backend based on sophisticated technology so it would likely give users the option to start paying a subscription to use the service - keep data and friends before deletion of data happens.
Google Play Music was a service that enabled users to upload unlimited music or MP3 tracks to stream or play online - this service is now known as YouTube Music and actually users were faced with the option to have their music collections deleted or migrate to YouTube Music. YouTube Music still enables users to upload MP3s and listen for free to their own music.
An advert supported model is for music playback for free, but music streamed through adverts does not work with the screen off for music users have not paid for. If users upload their own music collections, users can listed to music for free with their mobile screen off. Really users need either a laptop or a desktop computer to upload their own music to YouTube Music - this is what makes buying a computer a worthwhile investment amongst the many great things you can do with your own computer such as install a version of Linux such as Ubuntu from South Africa instead of Microsoft Windows 10 or 11.
Linux comes in many formats also flavours, Linux Mint is also very user-friendly but there is OpenSuse and Fedora - really these ones are the main ones that are popular. Fedora is often popular with computing departments at Universities, but it is traditionally not been the most user-friendly. Fedora does enable users to tinker though and experiment - important though to write about and document lessons learned.
Facebook is really disruptive technology but at the same time it is a platform that attracts interest and users, connects half of everyone on the Internet. Facebook may actually be underpinned by smart algorithms - really though if you want to get someone's attention, posting on their Timeline or sending them a direct message is best to get their attention, start a conversation.
Most people like news - Facebook uses feeds also filters with web filtering going on and usually users see posts from someone more when multiple friends click Like or someone comments on a post. Facebook Groups better for communities and also for special interest groups to target discussions also to buy and sell items in a community.
Really approval, disapproval of posts also comments is what drives traffic to posts on Facebook. Disapproval and angry comments are nagative social chitchat and banter also this may have a negative effect on someone's mental and emotional health.
Wiping hard drives sometimes necessary this makes data transfer very positive - also laptops with minimal data present less of a security risk overall so this makes the cloud and online storage advantageous for those with worries and anxieties and small size web pages enable universal education and also efficient downloading over slower networks such as those in the third world with General Packet radio services also UMTS Universal Telecommunications Service
Windows 10 Start menu, then Windows system folder, click File Explorer to open Windows Explorer. From the left panel, click This PC.
This pane, window or view reveals disk drives connected to a computer - great benefit if you have a second SSD hard drive. Files can become corrupted, get stuck, refuse to delete.
Deleting files can be useful within a file system where a user choses to delete selected files in order to give a clearer view.
When users present information for publication on the web, the benefit of HTML native web pages is they are typically low in file size - this saves space, also bandwidth with users downloading - this also enables education very well and web pages enable univeral education across the world.
Small size web pages enable efficient downloading over slower networks such as those in the third world with General Packet radio services also UMTS Universal Telecommunications Service.
From the File Explorer view multiple disk drives, data transfer and copyfiles between drives for example from an SSD hard drive to a main hard drive can enable preservation of files. For example, copy files you want to keep to a main hard drive, then on a second SSD hard drive for example, right-click on the drive and click Format to bring up the window with options for wiping a hard drive. Formatting a hard drive can clear issues caused by stuck or corrupted files that will not delete maybe even clear viruses.
Laptops are portable devices, they can be password protected but when passwords are applied sometimes the mechanism used to secure passwords can be corrupted and users cannot log-in to their machine. This is where password recovery methods are very useful - this can often be done from a Windows 10 Set Up DVD.
Passwords usually based on a hash code - actually passwords in Windows 10 is not the same thing as BitLocker or the Encrypting File System the system for a Windows 10 PC or computer to really encrypt data make others really go all out to decrypt and recover data intercept what someone is doing.
Computers can be used by people with good and bad intentions. Laptops are portable can be easily stolen but actually with Windows 10 they do enable creation of websites to share information. Web servers often involve RAID5 storage with redundant hard drives and mirroring so really publish on the web is the best way to keep data. Still great memories can be kept local with a USB external hard drive and nowadays 2TB SSD drives are cost effictive and affordable. A local external hard drive can isolate fond memories linked to a child off a computer away from viruses and malware - always keep an external hard drive unplugged and just connect to a computer to do data transfer, scanning for viruses more often like once a week will likely reduce the risk of getting an external hard drive corrupted when you connect it to a computer.
Sometimes necessary to format a hard drive, perform a clean Windows 10 install also rebooting is common in Windows 10 more common than Linux systems which are considered more stable. Linux systems have a kernel as a core part of an operating system. Windows 10 has a system known as the registry - really this is very complicated but it defines in complex data terminology all the elements that make up Windows 10 - regedit in search box launches Registry. Registry editing is not for novices since you can really damage or corrupt a Windows 10 system - sometimes registry editing is necessary to remove a virus or piece of malware causing performance and system stability issues to a computer.
In a nutshell, data transfer between drives in a computer and to external USB hard drives can enable hard disk drives to be wiped - laptops with minimal data present less of a security risk overall so this makes the cloud and online storage advantageous for those with worries and anxieties over what data they are keeping.
The Department of Work and Pensions use privacy guidelines known as GDPR to really protect personal information of benefit claimants also those in receipt of pensions - Annoymising data is also known as obfuscation also data masking - data mining tries to make sense of annonoymised data, such as encrypted or obscured information
Do you have privacy concerns? A lot of people do, so you are not alone, but their are privacy browsers and their is the privacy search engine Duck Duck Go.
The Department of Work and Pensions use privacy guidelines known as GDPR. Staff working for the department may mention GDPR really it is data protection guidelines. Staff may mention GDPR over the phone but may not explain. Companies actually may be concerned when employees disclose their salaries - their are compeition issues with this to think about for businesses. However, individual employees may like to progress their careers but still keeping bank account information private can protect real people and banking customers from online fraud in a digital age.
Annoymising data is also known as obfuscation also data masking - data mining tries to make sense of annonoymised data, such as encrypted or obscured information. The School of Computing at Aberdeen's RGU or Robert Gordon University do deal in depth with data mining in courses currently being offered by the University at present. Universities tend to offer courses in line with potential applications in industries to help students obtain graduate jobs.
Annonymising data involves removal of personal identifiers - an individual may be directly identified from their name, address, postcode, telephone number, photograph or image, or some other unique personal characteristic. It is one thing to protect data, but actually some people do job roles in the public eye and free available tools online such as BT Directory Enquiries can determine where about people live, so going ex-directory for home phones may have an advantage cut spam calls but more and more young people just have a mobile smartphone has their primary contact device - useful for mobile convenient calling, but mobiles can be lost also stolen. Get into trouble with law enforcement, the police may deal with you in harsher terms if you say no fixed abode, are unemployed not in education or training this give rise to the term NEET with reference to Scottish teens young adults.
Protection Regulation (GDPR) - anonymous data is information which does not relate to. an identified or identifiable natural person or to personal data rendered anonymous in such a manner that the data subject is not or no longer identifiable.
Annonymising data is a big benefit because it can lead to stats also public statistics or open data to show trends also better plan health and care services. Businesses can benefit from open data and annonymised data with data analysis by complex algorithms and human readable reports with human interpretation can help to foster greater progress, learn lessons from stored data and lead onto the development of better services to benefit real world customers also sometimes called clients depending on the nature of the business.
Compact Discs introduced random access to data and music tracks using Infrared to choose or pick music and lasers to read, an improvement on serial or sequential access - serial access to tape storage using Camcorders during 1990s was a big issue meant quite slow adoption of video by the average consumer or user
SCSI Small Computer Simple Interface and IDE drives a technical definition.
SCSI enables personal computers to talk to physical devices such as disk drives also the old fashioned tape drives which usually enabled access to data in a serial or sequential manner - story telling can often be done in a series with a set order but actually the process of story telling may involve sequencing and putting an order to a set of events.
Multiple smaller capacity disks used together in a RAID5 redundant multiple hard drive system may be better in terms of cost effectiveness also reliability to preserving data over a single large capacity hard drive. Server farms with racks of hard drives bundled together to duplicate user data likely use multiple high capacity hard drives to really protect user data - data mirroring to back-up data is not the same thing as data integrity. Data integrity can involve real errors in data sent across a computer network - this is what leads to a Cyclic Redundancy Check or CRC useful for files like operating system ISO files to be downloaded from the Internet, checked for integrity so absolutely no errors are present to enable a successful installation or a fresh install of Windows 10 or Windows 11.
- AV (Audio-Visual) Hard Drives,
- avoid thermal recalibration between read/writes,
- suitable for desktop multimedia.
- New drives are fast enough for direct to disk audio and video capture.
- But not adequate for commercial / professional Multimedia.
- Employed in RAID architectures the multiple drive and storage redundant mediums often deployed in server farms - RAID5 really intended for professional data storage firms mirroring data making copies to keep user data that is permanent not transient or temporary like an e-mail inbox where users may delete emails at will and also emails can be junk mail, so actually without taking more time reading, e-mails could be overlooked or accidently deleted. Real patience is needed in the digital ecosystem - lack of respect for those with digital skills actually is quite serious in respect of the fact emails have a date and time also emails create a digital record or footprint a tract in history - actually websites can create a digital footprint this is the benefit of publishing - also takes notes of important details including dates, times and user interactions with certain websites with screenshots can also provide useful digital evidence worth referencing at a later date.
The ever popular CD-ROM disc still used but streaming of music and Spotify is popular
CDs also compact disc used traditional for music WAV files involve lasers to read music tracks and also music tracks enable random access to data - this was an improvement over sequential access used with casette tapes also video casette tapes - having to watch videos on video casette tapes for playing with serial or sequential access really discouraged the use of video recording from Camcorders in the 1990s for capturing visual image data and video recording of events - also only 16 million people on the Internet during 1996 there was definitely no social networks, no Facebook which has evolved over time and network speeds and data rates have got faster really enabling multimedia transmission over computer networks this is convergence in a sense started or pioneered by Cisco Systems, Inc as a concept described as the future - CEOs of technology firms really need to be futuristic with a vision, educators too must be ahead of their time partner with industry commercial firms this is what makes innovation at University level so important and with this creativity at every level is important fundamental even from students also lecturers.
A CD contains a long string of pits written spirally on the disk. The edges of the pits correspond to binary ones and binary ones and zeros used in computer networks for data transmission on a carrier known as a physical media such as fibre optic cable. Zeros and ones also known as binary digits is the basic storage unit for data in a computer system, but hexadecimal digits are often used in computing this is the base 16 system instead of two state base 2 system of binary. Two state system is also boolean logic and true false representation or states. Boolean refers also to electrical signals in electrical engineering and refers to the manufacturing or soldering of circuitboards.
Nowadays embedded computing is here minitiature circuits in the palm of your hand with radio frequency interference also defices that have this issue have RFID like bank cards this is an ID - frequencies can be fine tuned also honed to a certain extent. Audio can be enhanced for use in hearing aids with reference to induction loops.
RFID is not the same thing as a digital identity or a digital certificate - digital certificates can be used to authenticate real people to ensure genuine trust in a communication.
Digital certificates been possible for over 20 years now and Verisign was a company that really pioneered it but digital certificates can be difficult to understand how to use, linked in concept actually to public key cryptography and encryption. Digital certificates may prove useful in the future with more understanding and explaining with due regards how to use and implement them.
Encrypting communications can mask crimes, but being open with others, whether with a group of close confidents or more generally, may increase trust with other people. Lives and issues can be complex - the police investigate matters in the here and now useful for stopping threat to life incidents, but really a lot of information exchanges happen over time - real conversations can happen with greater meaning. More thorough investigations including video being analysed could shed more light on the thinking of someone accused of a crime - also help thwart crime helping stop a potential offender before actions really do spiral or escalate.
Encryption can lead to subterfuge, hidden agendas but always making your prejudices also your biases including sources that inform your beliefs known can help with public trust overall.
Compact discs from the traditional music world
- Allow for storage of data as hierarchical tree-like file system in CDFS file system - DVDs allow for bigger capacity around 4.7 GB advertised size or 4.2GB in practical reality.
- CDs have additional layer of error detection/correction depending on data type.
- Random access directly to block address, then sequential scan, compact discs
can be accessed at random for a music track often using a remote control with
a laser using Infrared - Ultraviolet opposite of Infrared there is a spectrum
of colour, children may learn it primary school science and often Prism
show a spectrum of light. Ultraviolet radiation lamps can grow
fruit and veg in polytunnels indoors and Ultraviolet radiation is also
referred to as the Sun from sunlight. Prisms actually is related
to refraction and reflection also diffraction and also
the bending of light signals in fibre optic networks.
Light in a Prism can be obscured - this is obvious actually when
you look inside an often triangular prism. Obscuring light signals
may also be linked to solar panels and light reflection with due regard
to producing solar electricity. Primary school science
needs to include Physics these days - Rays of light enter a prism and bend toward the base, while objects viewed through a prism are displaced
toward the apex with light signals being bent or obsecured.
This phenomenon of how a prism displaces light toward its base, and then effectively displaces objects towards its apex,
is a constant rule in physics.
Primary school science for building fibre optic networks really Prisms are simple containers for light signals and Prisms being simple actually work very well in early years education to demonstrate light signals - A prism works because the different colors of light travel at different speeds inside the glass. Because the colors of light travel at different speeds, they get bent by different amounts and come out all spread out instead of mixed up. - CD lasers never touch the compact disc use also fine wavelengths
- CDs made from reflective aluminium
- CDs involve data bits in a spiral track with an aluminium coating
- CDs use binary ones and zeros to read data - it is this rapid succession of pit-land-pit transitions passing under the laser which is sent to the digital-to-analogue converter in an audio CD player. Music tracks on CD digital actually think track numbers you usually see 01, 02, 03 but audio gets convereted to analogue for speakers. Digital speakers are not that common in usage even though sometimes computer motherboards comes with lots of multi-coloured audio jacks on the back of a computer - user confustion can result and sometimes computers often have an analogue audio port on the front of new computers which usually always works with all headphones and speakers on the market. Still a long way to go for analogue to digital conversion.
- CDs are normally mastered, as opposed to burned. That means that one master copy is made and then hundreds, or thousands, or millions (if you're lucky enough to need that many) of replicates are pressed from the master.
- A CD has a drive motor, a laser and a tracking mechanism.
- CDs use Constant Linear Velocity - this is where the rotational speed of the media changes depending on how close to the centre of the disk the data is located.
http://www.cdspeed2000.com/ - Opti Drive Speed is a small tool to change the read speed of a CD, DVD or BD drive. This will help reading damaged discs and provide higher quality audio rips.
The Internet is biggest threat to copyright since its inception, but merit is always given for original works - also messages sent by way of the Internet and TCP/IP have flags often priority flags, quality of service - messages can be assigned priorities based on key words or search terms such as threat to kill also children at risk messages may also be prioritised
Learning materials are usually created by well paid academics also lecturers, not so much teachers in schools to an extent since there are lots of websites with teaching resources. Academics at Universities usually reward students for innovation and creativity - so really instilling in children creativity is important. Creative works may be lost when not retained and the digital world makes copies and ability to duplicate real easy. Lost creative works setback learning progress may lead to greater anger and resentment, so this is the importance of saving - the World Wide Web is universal and enables sharing.
Events happen in the media often get recorded by journalists - actually making sense of events, providing analysis and interpretation, synthesising bringing events together, assimilating themes is higher cognitive skills and this is a very desirable quality can lead to great progress in society and maybe even technological progress.
The information below is from lecture slides titled Legal and Copyright - Overview written by a lecturer at Aberdeen RGU's School of Computing no name actually mentioned within the slides as to the original creator and there are 37 slides. If people want acknowledgement they need to use names.
The below highlights what is copyright well the bullet points to be clear the bulleted list items to avoid ambiguity be clear as to what has been copied - important to copy it all actually to provide meaning and significance. Preceding text provides analysis also explains, provides also context, which puts meaningless random text strings into context actually - data is meaningless without analysis and analysing is to disseminate using communication methods, formatting, presentation and also styles of presentations.
Copying is infringed upon within the Academic community, but individuals may do it anyone thinking no-one is looking, but all computers have an IP address, a source address in a computer network - messages sent get sent to a destination IP address, really packet tracing is possible - there is also packet sniffing and there are a great many free open source applications from Sourceforge.net where computer programmers may publish bespoke novel applications with the view to establish themselves within the wider field of computing and also in software development - it is ordinary computer programmers that write the algorithms the rules of logic that underpin well sophisticated smart electronics even signal control traffic light boxes - really the future is closed loop control for traffic signals since it supports motion and also positive feedback, open loop control is linked to traffic signal timings and really the traffic lights at the Aberdeen bypass roundabout near Kingswells on route to Westhill are based on open loop control traffic signal timings that have been preset - these were ereted during 2019 in response to around 150 traffic collisions before traffic signals were ereceted - it is not clear whether this is the fault of the Aberdeen City roads department or the IT services department.
Always important to distinguish in the copyright world between what is copyright and what is genuinely in the public interest - publishing alerting multiple people making people aware may save more lives, and the lives of more vulnerable persons, since alarming actions can be detected - really this is the benefit of shared video. Video really is digital evidence and police usually like evidence but in Scotland police like to source evidence themselves - the police have priorities and some cases are flagged a greater priority than others such as threat to life incidences.
Digital report of crime via the online form on the website of Police Scotland can cut down on time and effort also retyping by call handlers - also messages sent by way of the Internet and TCP/IP have flags often priority flags, quality of service - messages can be assigned priorities based on key words or search terms such as threat to kill. Message flags in the protocol or the rules that govern Internet communications is exactly what makes a message go through in a sense for real action - also children at risk messages may also be prioritised. Having a background in technology gives someone confidence to predict how technology systems work, but actually it may not totally work in this manner - there is often also a human element and human discretion and police can face conflicting messages coming in over the radio and police radio often crackes with interference but is two-way real-time communication.
Radio communications hark back to saying Roger for clarity and there is a term echo also in Linux and MS-DOS to capture input actually put stored data in file, this may have great potential when universal multi platform TXT messages are used - messages can sometimes be truncated or shortened sometimes for efficiency sometimes due to corrupted data malformed data packets often called runts less than 64Kbps.
Those vulnerable persons may have limitations - also older people usually develop health related issues, really life is a gift and actually police responding to threat to life incidents is wise but when officers arrive, really trying to understand the viewpoints of an offender, listening and being patient, sourcing video evidence is really much better for long term peaceful outcomes and big role for restorative justice where offenders and victims meet - role play and plays with scripts could really be useful to understand why a crime happened or took place known also as a reconstruction acted out with witnesses from living memory.
Copyrighted material as defined by RGU School of Computing lecturer from the past - if you want credit for originality, always better to be upfront about what material has been referenced and also provide links to corroborate copied material in a hypermedia age
Copyrighted works on the Net include:
- news stories,
- software,
- novels,
- screenplays,
- graphics,
- pictures,
- usenet messages
- almost everything on the Net is protected by copyright law - even copies kept in caches
Google Docs has version control - saved documents in real time automatically saved when there is a data connection and work in progress - Graphical Icons need to be self-explanatory for broad widespread adoption so listening to influential voices in user interface design is important also Windows Start button always been convenient help tool and Home button on iPhone disappearing - also Martha Lane Fox female tech entrepreneur behind lastminute.com and sophisticated real-time technologies with clock syncrhonisation really underpin air travel for safety critical reasons
Google Docs has version control - saved documents in real time automatically saved when there is a data connection and work in progress.
Version control symbolic of the iterative nature of computer software development going back to the design stage to make modifications to move on change code - changing code always requires testing and debug.
Google Docs saving versions assists accountability for saved documents and tracking of changes who did what? Shared documents with contributors attached using real names not abbreviated names shielded for privacy could result in pay increases among employees of established businesses also public sector employees in Scotland. Online names can sometimes be short but humans identifying themselves can lead to more respect in wider communities perhaps but then there is jealousy to consider. Open data could lead to more accurate story telling - there may be many people who have stories with great coincidences that have happened with reference to events.
Events can shape someone’s character and actually there are many chance events that happen in life that may be linked or people may perceive links when details are scrutinised.
Some links may be symbolic and flow from the connotation of mind with meanings significant to merit teaching others to really help make progress advancements with concepts maybe even technology, flowing on in a manner that has hallmarks in lifelong learning the bedrock of Curriculum for Excellence - main policy or key theme of Scotland’s flagship learning programme is to create lifelong learners who are environmentally responsible.
Version control also known as computer software release numbers going up in an incremental manner - Windows actually used to focus on years think Windows 95, Windows 98 and Windows 2000 - the big issue with a focus on years is that end users or business customers want a release every year so this results in change of tact for Microsoft, the established player in the computer sector.
Windows Changed with Windows XP the computing platform brought more stability, the platform was around for about 10 years many users felt confident in a consistent user experience - Windows Start menu always been consistent and that brings user confidence and empowerment like the Home button on iPhone not present on latest models but popular features can make a comeback - Windows start menu in software went away in Windows 8 only to return in Windows 10.
It is harder for device manufacturers to change hardware after new devices are soldered and created - being critical of design features for mobile computing can lead onto digital empowerment for more people. Women actually are drawn to an iPhone’s ease of use the simple icons that are colourful, trendy and self-explanatory.
Icons need to be self-explanatory for broad widespread adoption so listening to influential voices in user interface design is important like Jakob Nielsen use it.com also there is University of Maryland technology guru Ben Sneiderman.
Icons that are graphical only may be confusing lead to confusion but Windows desktop shortcuts also have a text accompaniment which aids text to speech voice playback making computing technologies more accessible.
The mobile screen is small but actually text like the HTML link attribute the tooltip from web accessibility Web Content Accessibility Guidelines 2.0 can enable text in a pop up for graphical icons on a smartphone to help non technical users.
Broad appeal for a smartphone manufacturer can assist bigger profits also more sales.
Upload a new document or file to Google Docs from your computer, a second version of the same file gets stored or uploaded and marked as version two of a file this is clearly shown in the Google Drive interface - Google Drive is like a file manager that brings together multiple files created also uploaded into a single window or management interface.
Google Drive user interface a smart, sleek efficient user interface that enables file compatibility very well and it also represents convergence with Google Drive acting as a central point of management to files of varying types also folders in an efficient manner but Google Drive really data dependent - need for WiFi wireless connectivity also mobile data on the move this is a resilient network access approach enabling access to the universal network the Internet that uses TCP/IP as the set of rules to govern or control Internet communications.
TCP with a SYN bit for synchronisation useful to ensure well timed data communication also TCP has a quality of service flag really digital communications more reliable and consistent than human with an ACK packet to say thanks message received. Still data packets the single unit of currency in a digital system that underpins actually Bitcoin a volatile currency for paying for digital goods and services can go astray also malformed data packets can result - data packets of less than 64Kb or kilobytes are considered malformed data packets this leads to error checking also Cyclic Redundancy Checks and need to check integrity of files downloaded from the Internet using the md5 hash sum or signature which is complex mathematics - hash signatures really underpin digital signatures to authenticate human to humaninteraction.
Really lessons from the digital world and digital technology has many benefits to make more reliable human to human interaction where people really consider the needs of others and are nicer.
Greater digital skills education becoming more widespread can actually lead on to a nicer, safer society where more vulnerable persons are considered and have their needs truly considered.
Really this all stems from having good ethics and morals and actually very young children do need to consider the wellbeing of other more vulnerable persons from early on and always consider multiple perspectives.
Academics at Universities award the top marks for really considering the needs of others this actually has roots in universal usability - really many African nations are underdeveloped with lack of even basic technology systems.
Some people are always more fortunate than others - everyone needs a safe place to sleep, also everyone needs care when they are older.
Older people need help to embrace the digital world - this is what gave rise actually to woman in technology Martha Lane Fox with the view to promoting greater social inclusion.
Martha Lane Fox started lastminute.com - air travel flights booked at the last minute leading onto charity Antigone. Booking flights at the last minute relies on advanced hi-tech computer support systems at the backend - online booking is flexible when there is data integrity and information exchange in real time is reliable.
Airport systems really do use advanced systems for real-time communications and such topics were often taught in Computing during the mid to late 1990s in Scotland.
Real-time systems were really the focus of computing systems 20 years ago and that led onto a surge of real-time applications springing up written by computer programmers, real-time systems need to be based on synchronisation and accurate clock signals relaying between computer systems for proper operating function - lack of synchronisation can lead onto errors in the data world - really collaboration between people, tolerance and respect for each other is at the heart of a civil society and also a future sustainable world with less conflict and peace as well as harmony at the centre.
Peace and harmony boils down to technology skills education - really most primary school teachers in Scotland do not have the knowledge and skills to impart the essential skills onto the children to really help everyone also everyone grows older, need care and carers against the backdrop of competitive industries demanding salaries.
Paying everyone a fair rate is fundamental to social and technological progress, but actually when vulnerable persons are really cared for, they can survive on very little money.
Care and respect is at the centre of a safer society but so to is seeing potential in people really helping the most vulnerable to make a meaningful, significant contribution - giving back is also about teaching others.
Memories actually really transient and temporary and putting them into digital form and sharing with others really teaches what has gone before.
Big future role for young psychiatrists to evoke memories - some memories can be traumatic, evoke strong feelings running back to childhood - themes often run through a dataset, and analysing themes also recurring themes can spot trouble before it happens.
Legal minds need to be aware of themes troubling themes and that involves communication and vulnerable persons sometimes being willing to share data.
Really bringing prosecutions after analysing recurring themes in a dataset is really the future and data whether writings, photos also photographs and lifelike video provide more permanent forms of media than transient memories.
Prosecutions are really important for public respect and integrity the judicial system also the legal system but courts need to be capable of supporting everyone in an inclusive society.
Video with subtitles really important actually to help deaf or hard hearing juror members listen, watch and digest digital evidence also this is convergence in media in real terms - it is fair to say not everyone is deaf or blind, so there is always a need for a human element and discretion to be exercised in a professional capacity.
Suspension of judgement is also an important principle in a fair legal system that considers evidence without prejudice - this is really borne out with video.
Honesty has always been central to integrity, truth and justice in the Scottish legal system resulting in shorter sentences also community payback schemes including ASBOs anti social behaviour orders can promote better behavour encourage offenders to get back on track, make a positive fulfilling life for themselves.
Facebook, the digital world and frustrations really stem from data loss - Facebook social platform where users can request deletion of content and actually some users may delete to keep others happy, keep friends
Sometimes upload a video to Facebook, type a description, click somewhere else by accident and your typed description gets lost - important actually to copy and paste actually routinely transient or temporary data to TXT files - well these work very well a universal data format supported by both Android, Windows and Linux as well as the Mac world of Macintosh computers truly cross platform enabling information exchange and the porting of data among computer platforms for competitiveness reasons and saving money.
Some organisation and many businesses actually a lot of organisations have set ways of working - change can present disruptions. The most tech savvy and the technology world cope with change a lot. Change enables progress, but a lot of organisations may face real issues, complexities from embracing technological change headaches can stem from this also data loss because file conversion is part and parcel of preserving data - also representing data, analysing it, making sense of data can lead to real progress when data is shared with others in meaningful ways such as producing journalistic style articles - actually the best form of journalism is really that based on technology empowerment to help others. This may actually be called technical authoring.
There is also less disputes with technical information since all those in a sector may have a shared background information or a technical grounding in subject matters.
Sharing technical information online was the basis for the development of both the Internet and the World Wide Web - email from Arpanet originally was the basis for information exchange over a military network.
Technical information intertwined with events from history may explain more what has happened and what is happening when timely information is shared - always a real delay in the information world also the same with video sharing with text accompaniment to enhance understanding increase accuracy.
Facebook, the digital world and frustrations really stem from data loss - Facebook social platform where users can request deletion of content and actually some users may delete to keep others happy, keep friends.
copy cp move also rename mv command, head filename to view top of file key summary information maybe news articles, cd for change directory, also mount to make additional drives with files accessible - also Microsoft PowerShell command line tool for flexibility to build, test, and deploy Windows versions also known as operating systems across a large organisation in an efficient manner
Linux systems actually have quite a few commands to manipulate files also do data back-ups - copying files can seek to preserve data, renaming files can add meaning, but keeping duplicates may add an additional burden to system administration and actually there is the additional chore of data anlysis which takes humans and human effort also ability to analyse data - making sense of data and data ownership is really key for patients actually of health services to better inform and direct patient treatment, so really medical professionals for example listening to patient feedback is really central to improve long term health outcomes with due regards to patient care. This is e-healthcare in a sense, but e-healthcare is also hospitals having easy access to patient records stored at doctor's surgeries.
cp old file name new file name - copying files assists duplicating files making backups.
mv old file name new file name - moving files may mean data loss, need to know where you move a file, need to know be aware of file structure in file system when moving files and Linux through Nautilus the file browser moving files can keep file sizes down and reorganise your files.
mv old filename new filename - this command can also rename files as well as move files.
head filename - shows top part of file, really putting key details first important principle of journalism but stories and story telling may not follow journalistic principles however HTML markup tags can be used to make key points stand out, highligh key points and also make key terms resonate drawing attention to arguments.
head command in Linux actually suited to retrieving information and archive stories written by journalists.
tail filename - useful to view the end of a file, film credits usually come at the end of scripts and film credits also credits for TV programmes can identify people in them such as actors and production assistants.
Linux file systems additional drives actually require to be mounted to access files on them - mounting nowadays may happen in modern Linux operating systems automatically when a user connects a physical device to a computer - Windows calls this capability Plug n Play.
mount - show mounted file systems
date - shows the current date
uptime - shows uptime of a computer or length of time computer has been on or user logged in.
cd .. - go up a directory by one level in a tree like nested folder structure or hierarchy.
ls - Listing of current processes.
Mkdir - Make a new folder or directory
pwd - Present working directory useful to establish user context when in a command driven environment, basic command oriented user interfaces can bring greater flexibility and control also such systems can make good efficient use of older hardware or prolong the life out of computing equipment.
whoami - Show your username on Linux systems also servers, note that nowadays computer servers likely have graphical user interfaces, but actually some may just have a command oriented environment or user interface to really make efficient use out of computing resources, minimise overheads and also overload including reduce energy requirements.
Netcraft shows uptime of Internet web servers
https://gs.statcounter.com shows web browser statistics
In Windows computing the big brand from Microsoft, ren (or rename ) is a command in various command-line interpreters (shells) such as COMMAND.COM, cmd.exe and Windows PowerShell. The ren for rename command is used to rename computer files and in some implementations also directories.
Microsoft PowerShell as a scripting language, PowerShell is commonly used for automating the management of systems. It is also used to build, test, and deploy solutions.
Scheduling Windows tasks
Need to schedule a task - make sure it’s set to run as NT AUTHORITY\SYSTEM rather than the logged-on user or it will not work. This applies to Windows 7 and also Windows 10.
Backing up user files on Windows Vista also Windows 7 also Windows 10
Need to format a Windows Vista also Windows 7 also Windows 10 computer - back-up data located under username folder for example C:\Users\username. Make sure you show hidden files before backing-up data. This makes sure that Outlook also Thunderbird e-mails get backed up.
Slipstream service packs using the Reverse Integration Method also SysPrep to make set up
of computer systems across a large organisation more efficient also SIDs defined Service Identifies for use
in ActiveDirectory service to manage resources also users on Microsoft servers also domain controllers
This was a historical procedure that worked with Windows Vista also Windows 7 seven - it might still work with Windows 10 and it involves the System Preparation Tool, which is a means to actually set up a version of Windows 7 seven for example with service packs embedded. Virtual operating systems using for example Oracle Virtual Box running on one single host computer system could be used to run a dual boot configuration of Windows Vista or Windows 7 seven with the view to embedding service packs also known as slipstreaming for efficient deployment of a version of Windows such as Windows Vista also Windows 7 seven. Slipstreaming service packs to create DVD ISO images makes deploying computer systems across organisations also enterprises very efficient - creating a DVD ISO with service packs embedded or up-to-date computer system updates makes set up of computer systems more efficient.
Sysprep (System Preparation Tool) Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation. It is a command-line tool that can be run manually or through a script.
Sysprep is used to clone an existing Windows installation across multiple computer system set ups in an organisation. Cloning Microsoft Windows without first running Sysprep would be problematic because Windows 10, Windows Server and other versions of Microsoft Windows include security identifiers (SIDs) that must be unique from one computer to the next.
SID (Security Identifier) is a unique id number assigned to each user on a windows computer, group or computer on domain-controlled network. You can get current user SID in Active Directory using PowerShell Get-LocalUser.
Reverse Integration Method
- From the Windows Vista / 7 install screen that prompts you to enter a username and password, press [Ctrl] + [Shift] + [F3].
- When Windows loads, leave the System Preparation Tool window open.
- Install service packs.
- Click “Start” and then type in compcln.
- Look under “Programs” and then right-click compcln.
- Click Run as Administrator and then enter y to start.
- From the “System Preparation Tool” window, look under System Cleanup Action” and then select “Enter System Out-of-Box Experience (OOBE).
- Select the Generalize checkbox.
- From the Shutdown Options drop-down menu, select Shutdown.
- Using the working OS, create three folders named:
- \Media
- \Media\Vista x86 SP2
- \Media\ISO
- Copy all the files on the original Windows DVD to the Vista x86 SP2 folder.
- From the Start menu, type in comm.
- Right-click Windows PE Tools Command Prompt.
- Click Run as Administrator.
- From the User Account Control screen, click Continue.
- Copy the following line to your computer’s clipboard and modify as required: imagex /compress maximum or fast /flags HomePremium /capture H:\ "C:\Media\ Vista x86 SP2\sources\install.wim" "Home Premium x86 SP2. After changing the command, copy and paste it into the Windows PE Tools Command Prompt window, and then hit Enter to submit the command.
- View the Vista x86 SP2\sources folder and check that the creation date for the install.wim file is new.
- Copy the following line to your computer’s clipboard and modify as required: oscdimg /b "C:\Program Files\Windows AIK\Tools\PETools\x86\boot\ etfsboot.com" /n /o /m /l Home Premium x86 SP2" "C:\Media\Vista x86 SP2" "C:\ Media\ISO\Vista x86 HP SP2.iso"
- After changing the command, copy and paste it into the Windows PE Tools Command Prompt window, and then hit Enter to submit the command. Ignore the warning you get after completion.
- varies nonlinearly with frequency
- very low or high frequency sounds must be much more intense
- than mid-range sounds to be heard
- We are most sensitive to sounds in the frequency range 2 to 4 kHz
- Sounds below the threshold can be discarded
- compression algorithm uses a psychoacoustical model that describes how the threshold varies with frequency
- One sound may be obscured by another sound - this is known as masking
- Message reinforcing - the use of background sounds that link to a topic of debate
- Change of ambient sound to reinforce a change of context.
- Music background - at the start and end of a presentation music can be used to alert the user.
- Sound effects - can be used to enhance presentations in a number of ways.
- Ambient sounds can have strong emotional impact.
- Keeping website files or web pages small also compressing images optimises data transmission
over networks with limited speeds - network links in the third world on the African
continent slower. Efficient web pages with clean code can really speed
up web browsing also learning - the web is world wide, universal and global.
Do not rely on colours unnecessarily for example say the left button not the red button also say Double Left Click also Right Click to differentiate between mouse actions - this is helpful for computer application support.
If you are colour blind get a non-colour blind colleague to check your colour schemes
If you are not colour blind (or only mildly so) use colour-blindness simulators to test your interfaces and colour schemes for example www.vischeck.com an online image/web-page tester
Vischeck simulates colourblind vision.
Daltonize - see https://www.vischeck.com/daltonize/ corrects images for colourblind viewers.
Dyslexia - a specific learning difficulty that hinders the learning of literacy skills
Dyslexia nothing to do with intelligence
Dyslexia Different pale-coloured backgrounds may help dyslexic users, but will not work for all
Avoid use of plain white backgrounds to text to help those with dyslexia.
For those with dyslexia allow change of background colours if possible.
Aberdeen's RGU Robert Gordon University has the Disability and Dyslexia Services.
User interaction forms or different styles
- Menu selection - menus can be in horizontal or vertical orientation, drop-down menus harder to use, really text links on one level, one top level, most accessible - drop-down menus can be difficult to use for users who cannot work a mouse. Drop-down menus can be used with touch on an iPad but that relies on finger eye coordination or movements.
- Form fill-in
- Command language
- Natural language - issues sometimes around natural spoken language and speech recognition, often there are issues around dialects with due regard to accuracy of speech to text. Website links in graphic format really not accessible to users that rely on voice activated web browsing. CSS or Cascading Stylesheets is the preferred way to format text links - apply changes such as underlining of text colour changes when a mouse hovers over a link, also link background text can be changed by CSS code to.
- Direct manipulation
Menu Selection
Advantages:
shortens training,
reduces keystrokes,
structures decision-making,
permits use of dialogue management tools,
easy to support error handlingDisadvantages:
danger of many menus
may slow frequent users,
requires screen space,
requires rapid display rate
Command based user interfaces pros and cons - sudo then command on Linux Ubuntu systems runs commands in a Terminal window as the root user with full administrative priviledges
User interfaces brought many advantages over command based interfaces or a command line means of interaction with a computer system.
Advantages:
flexibility,
supports user initiative,
appeals to power users or technical users such as computer support persons,
potentially rapid for complex tasks,
supports macro capabilityDisadvantages:
requires substantial training and burden on memory also need to learn commands also command syntax the order of parameters or strings in a given command,
difficult to retain commands without creating user manuals, technical guides, help manuals or online documentation but doing this can enable education teach others how to accomplish complex tasks more efficientlyPoor error handling - easy to make a mistake when entering a given command and mistakes more likely in long commands, more frustrating also when errors result upon running a command - computer source code can be compiled on Linux systems from tarballs and really errors on compiling or executing or running source could can lead to prolonged debugging and troubleshooting.
Running commands in a Linux system - often need to have root access to the file system when you open a Terminal window. Root is the main user with all administraive priviledges more than any other user or standard users with standard accounts, additional user accounts created as new on a Linux computer system.
sudo then command on Linux Ubuntu systems runs commands in a Terminal window as the root user with full administrative priviledges. Right-click on a Ubuntu Desktop to open a Terminal window - Ubuntu is the most common Linux distro or distribution really the most user-friendly but actually Linux Mint the Cinnamon flavour has a really appealing Start menu and has a familiar feel to Windows 10.
Basic stages of multimedia development and the various disciplines involved also helpful messages can be contained in visual communications and written works also websites and multimedia productions - the Beano also the Dandy long been written and circulated in Britain among children often aimed at children with the view to keeping them entertained with subtle educational messages
Toy Story first animated film series where toys moved and had human voices - Woody the voice of Tom Hanks. Animation is stop start motion really picture sequences. Video is time varying motion - multimedia is text, static images, graphics, sound, video and animation. Multimedia projects such as large complex websites also films and movies can comprise many or multiple people in the film production process - animated cartoons usually start off with storyboards and children's cartoons usually have subtle educational messages. Adult films and most of them do usually have subtle messages - the nuances of language have run through works of literature for centuries with often poets and authors observing events, creating writings and records in print.
The second world war was stortened by code breaking actually at Bletchley Park, Milton Keynes - the Germans used an Enigma machine with rotars and rotating parts to move, hide also rotate blocks of code also known as ciphers to scramble messages. The Data Encryption Standard and Triple DES cryptography algorithms use a rotating meachanism of advanced mathematics to rotate cipher code scramble a message. Encryption may make use of caesar ciphers - messages have been scrambled and encoded, foreign languages can be deceptive to outsiders. Encoding is also a means to put signals onto a carrier medium or physical media in a computer network such as wired fibre or wireless - Manchester encoding really a common type of encoding over TCP/IP networks such as the Internet.
Really the underlying key message is helpful messages can be contained in communications also written works also websites and multimedia productions - many people record events actually from journalists the most prolific to bloggers also to police officers writing reports - also NASA engineers also write up reports. Being a NASA engineer can involve mundane tasks such as technical report writing but actually working for NASA is likely more exciting than most other organisations. Report writing important to document lessons learned, spread knowledge and students at Universities often write reports, essays and dissertations - reports may be more likely in technical subjects such as computing and engineering, also sometimes a long report is known as a thesis. Depending on your subject of study, you may have to write a thesis or dissertation when your course nears completion.
Many different disciplines are involved in multimedia production - multimedia authoring can involve many different skillsets - multimedia productions can be linked to story telling involve plays, play wrights and actors - in film Alec Baldwin is now famous fatal shot fired on set. Plays could be useful for reconstructions give those that have done wrong a chance to take part in restorative justice - this is where those accused of something meet a victim face to face. Creative acts such as writings can keep people busy, give them a fulfilling vocation also help them come to terms with their actions in some circumstances.
Disciplines involved in a multimedia production
- Acting
- Animation
- Art and graphics
- Audio recording and editing - Audacity is useful free software to record audio or sound also edit sound files as well available for both Windows and Linux computing platforms
- Computer programming
- Copyright law - usually in the UK refers to the Copyright, Design and Patents Act 1988
- Engineering
- Graphic Design
- Human factors analysis - this can involve human computer interaction and user interface design
- Instructional design
- Legal analysis
- Marketing
- Networking - nowadays there is social networks and computer networking, the latter is linked to data communications. Social networks online is Facebook but still people can congregate in the real physical world in Starbucks and Costa Coffee coffee shop chains. A coffee in the morning as a pick me up on the commute to work is not uncommon - the Diet Coke advert long been famous think Etta James and the song I just want to make love to you.
- Photography
- Producing
- Scriptwriting
- Software design
- Stage and set design
- Storytelling - stories in multimedia usually start off with the concept of storyboards and this is uasually the basic for comics - the Beano also the Dandy long been written and circulated in Britain among children often aimed at children with the view to keeping them entertained with subtle educational messages as well. Parents of millennial children likely grew up with comics such as the Beano and Dandy with their own parents buying them from a typical corner shop maybe a sweet shop. The world's oldest sweet shop is in Kirriemuir home town of JM Barrie, the famous writer. A famous childrens' author is Judy Blume, a classic book is fudge. Most children can like sweet things - Judy Blume books were really born and written with the aim to keep children happy also entertained.
- Technical writing
- Text design and layout
- User interface design
- Video editing - free open source video editing software for Windows, Mac and Linux is OpenShot Video Editor but AVS Video editor on Windows 10 also useful software with watermarks placed on videos created or edited for free to obsecure the video slightly. Free software is abundant but there is a wide range of commercial software offerings that enhances function and functionality.
Multimedia can be used to grab and hold attention and humans have limited or short attention span and combined media can provide alteratives for accessibility and enhance also reinforce a message. Interactive interfaces can aid learning - doing can aid learning also known as kineaesthetic learning.
Structuring designs can help to order information - site maps on websites can make it easier to locate information. Making key points stand out or resonate can enhance learning - this is the importance of heading tags h1, h2, h3 in raw HTML web page code.
Good multimedia design takes a creative effort - those involved may be known as cultured geeks.
Basic stages of multimedia development
- Client's proposal with scoping meeting to discuss idea for project with client. Scoping meeting usually involves getting requirements of a project from a client, finding what it is a client wants to achieve, to gather enough information to produce a clear proposal. Scoping meeting can involve asking questions also listening to a client's response, note taking also, drawing up designs for proposed websites also producing wire diagrams showing a wire mesh - websites usually organised in a mesh logical topology with top level links for example a top level menu links to multiple web pages and a menu is a common consistent element in a website's design, appearance and implementation.
- Determing the type of project - application point of sale, point of information, multimedia presentation, training, advertising, education, publishing, educational or product demo often these are at kiosks at events sometimes trade events and user interaction is often by touch screen. Touch screen not a new concept, been around since the start of the new millennium and the year 2000 used in the DVLA driving theory test with multiple choice answers.
- Designer's proposal often involving mock-up prototype and evaluation - can also include wire mesh mock-up designs for website structures. Key stages may include User Analysis, Knowledge Analysis, Interaction Definition, Media Object Definition projecting what media forms to include for example text, still images, video, sound or animation - video can include sound but when social media videos are shared on Facebook they are usually muted by default - need to turn up the volume. Social media volume controls may not extend well enough in all circumstances for everyone - by the Windows 10 clock the volume control present there with a vertical slider can usually make sound or audio higher in volume.
- From design to production - complex websites can involve multiple people and some people may have special skills in interacting with databases such as MySQL with knowledge of PHP the Hypertext Preprocessor
- Website user forms often involve PHP to collect input from a web user - form may be in standard HTML code, but PHP pages may be used or referenced at the backend of a website known as backend processing which may or may not be apparent to a web user.
- Delivery of a multimedia project could involve making a website live for example uploading HTML, PHP website files and JPEG, PNG images using File Transfer Protcol and free also open source Filezilla FTP client software.
- Delivering a finish product could involve publishing or sharing a video on YouTube.com, Rumble.com and Facebook.com - these are social media video sharing websites.
- Delivering a product may also involve putting video files on DVD - still Amazon.com makes a wide range of DVDs available for online ordering and purchase but there is Amazon Prime Video online video streaming. There is also the Vimeo.com video sharing website usually aimed at more professional users in video production.
Key considerations for a multimedia project
Timescales - begin and end dates, fixed dates for demonstrations, other milestones
Platform specification - target platform Windows, Mac or Linux also a website or offline at a standalone kiosk at an event or on a DVD also Internet streamed programmes from a streaming server like Kodi, strategic decisions, cost. Kodi is also a means to watch TV channels on your computer - VLC media streaming software also enables playback of a wide range of sound and video formats. Many codec formats available - Movie Player Classic also the KM Player is free software to view a wide range of media audio and video codecs available for download for Media Player Classic through ninite.com. This enables video playback for a wide range of video formats - Linux may have additional issues with video playback for some video files over Windows 10 due to the fact video codecs are usually licensed and Linux is free and open source software, but the MP4 video format is widely supported cross platform.
Media mix - percentage text, video, graphics, audio, animation
Budget - rough estimate based on above
Beaware of a client saying it's just a small change or tweak to a design - there may be cost implications and extensive rework.
A designer's proposal setting out client requirements
General introduction with an overview or summary
Collates data from the scoping meeting.
Defines type of project, purpose, description of numbers and type of audience also computing platform versus open universal web platform.
Statement of clients requirements — Sharp focussed business account, using terminology relating to the business practices of the client.
Statement of user requirements — Emphasis on user experience, expectations, level of experience, user needs also goals and motivations also projected user gains, important to highlight where there maybe information overload. Bullet points can highlight stand out key terms and phrases and these are marked by ul and li nested elements in HTML web code - ul unordered list really dotted bullet points, ol ordered list is a numbered list with numbers added to points in order 1, 2, 3 and so on automatically.
Work schedule - start and end dates, key stages also milestones.
Proposed cost and payment - may change if rework is necessary, computer software development and multimedia work can be iterative.
Proposals may have limitations or limits - there may be missing details, clients may not have full details to hand, may need to do further research to produce definitive lists.
In a nutshell, a designer's response to a client's brief may be broken up into Functional requirements - Data requirements - Usability requirements -Task requirements - Environmental requirements.
Considering multiple users also multiple perspectives
- An elderly lady sending her first email - this was Queen Elizabeth II during 1976 well she was around 50 years old more like middle age
- A student searching the web for essay materials
- An accountant using financial software
- A small child playing a computer game
Pay attention to the navigational aspects projects for websites - how do users move from one level to another, how can users move quickly to their area of interest, how easy is it for users to find information, locate elements within a broader website and how do users know where they are in the overall body of material - web browsers have built-in Find and search tools for search for strings of text? This can be useful when you see a search term highlight in a Google search listing but then struggle to find a text element on a long web page. Search tools assist with finding and also contextualising. Useful to bookmark in a web browser and sync bookmarks favourite websites also books or ebooks also products you are looking at or interested in so you can come back and make a purchasing decision later.
Think utility of end product often includes usability. For example, how well does the product do what it is expected to do? Do user expectations match user goals? Users may seek out information, may also be unable to find it.
Information also videos can evoke users, provoke users, upset users and lead to changed user behaviour. What emotional responses do multimedia products that have been designed including hypermedia websites elicit? What cultural associations do they trigger?
A lexicon of design elements
A lexicon of design elements can include well choreograhed words, colour, type, form, layout, texture, light, animation, camera work, screen transitions, musical composition. Musical composition can include scores or soundtracks to multimedia productions - also voices with narrators can be overlayed onto videos to produce informing, engaging educational content useful for teaching and learning.
Synthesise means bringing multiple ideas or media together - students at Universities often expected to have higher cognitive skills with ability to analyse (break topics down into bite sized chunks) and synthesise (combine)
Putting it all together, using creative and design flair:
Keep track of processes - Document concepts, content, and structure, as appropriate also produce a media list also produce media definitions to explain to other multimedia developers in a project useful for forming storyboards and producing complex productions such as animated films or animated childrens' cartoons.
For evaluating an end product - Focus groups also real world user testing of websites also known as usability testing can give you detailed information such as the a user's comments and thoughts to stimulate and elaborate on user experiences.
NAND gate to build smartphones and tablets and other Maths for Computing boolean operators - Interrupt requests or IRQs can cause conflicts between IRQ2 and IRQ9 also print devices from makers such as Lexmark, Epson and Canon used to connect to pink parallel ports at the back of a computer linked to a motherboard - The Clinterty campus of Aberdeen's local College actually has changed focus from a rural skills centre to a training centre for a future in oil and gas - also significant figures in computing education recognised
Interrupt requets or IRQs can cause conflicts between IRQ2 and IRQ9 for example - modems, network cards in computers which can be wired or wireless and serial cards can be connected to IRQ2. IRQ3 also IRQ4 typically used for modems and serial ports - a serial port was typically different from a parallel port which print devices often connected to, the usually and often pink ports on the back of a computer wide in appearance.
Parallel ports were often larger and on the back of a computer comprised part of the motherboard actually being the ports on the back of a computer.
Printer parallel ports progressed to USB connections - adding software printers in Windows actually did and still does can enable Print to PDF sometimes useful but HTML is more open also more natively supported by web browsers Google Chrome and Mozilla Firefox enables information sharing very well via the web with access from pocket handheld devices - TXT also known as plain text a universal file format. TXT is plain text export option on the Pages app on an iPhone and iPad. Plain text different actually from ciphertext - ciphertext marks passwords on Cisco routers and such routers are the real backbone data packet forwarding devices on the Internet - an email message usually comprises multiple data packets. Ciphers actually refer to data encryption and computer security - ciphers can be blocks of code that are obscured and rotars also rotating can be a good way of obsecuring a message this was done with the German enigma machine used during the second world war. Blocks of code can be rotated to really encrypt a message - this underpins the Data Encryption Standard also Triple Des and these are advanced cryptography standards also known as standards in computer security. Bletchley Park was the code breaking centre - key man was Alan Turing who was awarded a posthumous award by Prime Minister Gordon Brown - Alan Turing gay significant code breaker involved in crimes linked to homosexuality.
Parallel ports also serial ports really been replaced by USB Universal Serial Bus interface ports which enable also more rapid transfer of data - important to make highlight clearly that data actually can represent the flow of binary zeros and ones actually data help maintain a computer's working state this is different actually from a user's files. This is a differnt sort of data think Word documents, Adobe Portable Document Format files, JPEG images, PNG Portable Network Graphics line drawings newer than Graphics Interchange Format GIF used with Animated GIFs multiple images put together to form quick changing animated sequences which involved paying the inventor a royalty. Binary data at the zero and one level actually also represents electrical charges through electrical circuits involving boolean logic which is AND, OR and NOR gates together with true false states in computer programming or software development. Booleon logic gates often used with transistors to build microcircuit boards also a computer motherboard - embedded computing is buzzword and underpins mobile and tablets along with Cambridge based ARM processors. ARM big company in the mobile market - rivals Nividi also AMD. Nividi and AMD real rivals in the computer processor market for laptops also desktop computers. ARM processors usually on mobile devices - really ARM major player in mobile computing and American firm Nividi wanted to takeover ARM British company based in Cambridge.
Computing education can actually become dated in time - developments happen, events move on - educators normally move with the times update their skills, but actually there is also an important role for those who reflect look back at times gone by to really analyse developments, show how technology has developed, highlight the positives also the dangers with the view to charting a more positive trajectory. In recent years actually, a trend of e-healthcare has been emerging think smart watches measuring a heartbeat and electrical impulses - actually keeping older course materials from study enables looking back to be able to analyse, understand put events in context and also write new material.
Copy and paste is an issue for those who are creative - the World Wide Web is vast and actually those in education or educators normally do it for a living receive pay and salaries, can also raise families be under pressure - really taking shortcuts and copying online material to pass off as your own is quite easy these days - think Control plus letter-C to copy text and Control plus letter-V to paste text make duplicated text another copy - CC in email terminology refers to Carbon Copy, it means a recipient has been copied in to an email been sent a copy also. Actually it is fairer to always acknowledge creators and point students at the online web based resources teachers use - really failing to acknowledge the original creator of works or highlight significant online websites and resources may lead to educators who copy text being found out at a later date.
In the North-East of Scotland, computing education at a vocational technical level was done at Aberdeen College - college courses often more technical than University and at college apprenticeships may be more common. Such lecturers 20 years ago involved people like Ian Cockburn focus on Unix commands also document management and computer networks, Stewart Law technical support lecturer, Ian Steele, Margaret Duncan core focus MS-DOS computer operating systems also file systems and structures including Microsoft Office applications later took an interest in computer networks, Danooter who focused on Maths for Computing also floating point representation really ideal for those going into orbit or outer space, Chrissie Williams who focused on Computer Architecture, Debbie Scott, also Kathleen Smith focus on computer networks, also Ken Ross Microsoft trainer married to Catherine Ross also a women in computing actually Ken has a website which is still active (see https://www.catherineandken.co.uk/). There was also lecturer Frank Bradley from the parachute regiment focus on computer programming including French Pascal - he also worked with the University of Aberdeen logging-in remotely via telnet connections doing work for the University - he was proud when his first grandchild was born. Also in the computing section of the College known as Aberdeen College there was Pamela Cumming - important for lecturers to publish information on themselves with a photo because people can have the same names (photos plus profiles involving research agenda and interests can uniquely identify people give them greater recognition of achievements). Also there was Laura Muir, a rising star young woman also computer programmer and she moved also progressed to the Department of Information Management at the Robert Gordon University for better career prospects to further research likely also for better pay and working conditions. Laura Muir actually saw the benefit of e-commerce systems and e-business early on and did tailor a module at a later date in web accessibility this came after the course MSc Electronic Information Management had its named changed around 2007 to Information Management. Courses can change names to preserve reputations save face and continue also carry on an educational path. Academic staff having profiles showing photos and a research agenda really important in an easy age of copy and paste, intellectual property and also an established iconic image - Jonathan Ive linked to iPhone user interface.
Change of name the main College building at Gallowgate just along from Marischal College in Aberdeen is now known as North East Scotland College. The College merged with Banff and Buchan College and has multiple sites in Aberdeen - the Balgownie campus closed down as did the Gordon Barracks where the army were stationed. No longer any army presence in Aberdeen - the Clinterty campus of the College actually has changed focus from a rural skills centre to a training centre for a future in oil and gas.
This can also show an educator's influences - teachers and academics often educators and they use and reference resources. Always important for such people to be transparent and show their influences for teachings to the pupils and students - young people in Scottish schools normally known as pupils and those at College and University normally known as students.
This is a key difference - actually school children in Sweden go to a gynasium this is actually school. Gynasium in Scottish schools refers to gymnastics often bend and stretch, keep fit in older women - modern women know it as Zumba. Gymnastics in Scottish schools may be taught in a gymnasium with horses - tall wooden structures for pupils to do head rolls maybe backflips on. Think the Frosby Flop, also gymnastics may refer to the high jump, the long jump. Shott putt often a sport at the Olympics so also are the jumps - in Scotland at the Braemar gathering also at the Highland games, adults do cabber tossing also known as hammer throwing. The Braemar gather usually has been historically been attended by royalty think Queen Elizabeth the second also Prince Charles.
Boolean Algebra coined or named after George Boole - this is the algebra of logic also refers to true and false states. Algebra of logic refers to a set of rules is the basis for algorithms and smart procedural computer programs which bear resemblance to step-by-step instructions also known as a series of steps, which can be repeated in loops for efficiency. Boolean algebra can be adapted for use in computing with zero 0 and one 1 states which also mean true and false - one is true and zero is false. Three operators in Boolean algebra known as AND usually represented by a dot. Or Booleon algebra also represented by a plus, and NOT boolean operator also represented by a minus symbol. Boolean logic AND, OR and NOT also technology gates used in the manufacturer of circuitboards - nowadays embedded or mini small circuitboards are soldered.
Algebra is an important subject of maths for computing - the laws of Boolean algebra can be applied to the simplification of digital ciruits. Boolean algebra linked to maths and it is also linked to physics in a sense. Simplyfying digital circuits can result in the reduction of the number of chips required thus savings in cost, power consumption this is energy saving also the speed in the timing of signals can be more efficient - really this refers to electrical signals with reference to computer motherboards also circuitboards - a computer motherboard can include small components called transistors. This can also be applied to logical decisions in computer programming or software development.
Boolean Laws alegbra also essential maths for building electrical circuits and computer electronics
- A + B = B + A
- A.B = B.A
- A + (B + C) = (A + B) + C
- A.(B.C) = (A.B).C
- A.(B + C) = A . B + A . C
- A + 0 = A
- A + 1 = 1
- A + A = A
- A + A = 1
- A . 0 = 0
- A . 1 = A
- A . A = A
- A . A = 0
- A = A
- A . (A + B) = A
- A + (A. B) = A
- De Morgan's Laws = A + B + C = A . B . C
- De Morgan's Laws = A . B . C = A + B + C
- Useful rule for remembering De Morgan's laws - Break the line, change the sign
Logic operation can be referred also defined by truth tables.
A and B is equal to A . B
You can see possible combinations of A and B in the corresponding binary number sequence shown below. Binary digits known as base 2 - two states also can be represented by boolean true and false logic operators linked to technology gates and transistors or circuit boards. ITV TV show once broadcast the Yes No game with Matthew Kelly - the TV presenter wrongfully accused of indecent behaviour against a child. Matthew Kelly thus gave up hosting ITV popular show Stars in their Eyes - wrongful accusations can really harm employment also career prospects.
- A, B, f = A. B
- 0, 0, 0
- 0, 1, 0
- 0, 1, 0
- 1, 0 ,0
- 1, 1, 1
The output is 1 only if A is 1 AND B is 1 - truth tables also known as a table of closure properties.
A OR B = A + B
Resulting OR Truth table
- A, B, f = A + B (plus linked to OR boolean state)
- 0, 0, 0
- 0, 1, 1
- 1, 0, 1
- 1, 1, 1
The output function is 1 or one when either A or B or both is 1.
Key difference between AND also OR logic gate - a zero state in AND results in zero overall. With reference to the OR boolean function, a one state is the result when either A or B is one or digit 1.
NOT Function truth table - NOT boolean function is an inverse operator this is where 0 become 1 and vice versa.
- A, A
- 0, 1
- 1, 0
It is possible to construct a truth table or table of closure properties from a transmission function using 1 or 0 - also one or zero - putting the booleon operators in the appropriate slots in the truth table.
Possible to derive a Boolean expression or transmission function from a truth table by noting the combinations of variables which produce an output of one or 1. The result will always be the maximum form.
AND, OR and NOT boolean operators also referred to as switches - in computing, data and instructions are transmitted between the various parts of the processor or between the processor and peripherals by means of pulse trains. Various tasks are performed by passing pulse trains through electronic sitches called Gates - gates also used in connection with transistors on electronic circuits.
NOT gate does the inverse also known as an invertor - not in software development quite difficult to understand concept, it is programming logic used in a computer program to refer to the opposite for example do something when the opposite is true or possibly false as the case maybe, NOT also referred to usually as false.
The XOR gate such as Q = A B is the exclusive OR function. Exclusive OR where the output is 1 or one when either A or B is 1 but not both. Output Q = A . B + A . B
Logic gates can be combined, boolean logic gates are also logical representative or true false states - Example one the OR gates, A + B and C + D
There is a NAND gate in technology computer circuits, with symbol Q = A . B
There is NAND gate boolean function and there is NAND memory which mobile smartphones and tablets use to store data long term without power.
NOR or NOT Or logic gate or operator is Q = A + B
The NAND and NOR gates are most commonly used in computers because all the other gates can be constructed using either of them.
It is accepted practice when drawing circuits that when two lines cross they do not imply a physical join unless a dot is present.
NAND gate to build smartphones and tablets
In a nutshell - Interrupt requests or IRQs can cause conflicts between IRQ2 and IRQ9 also print devices from makers such as Lexmark, Epson and Canon used to connect to pink parallel ports at the back of a computer linked to a motherboard - The Clinterty campus of Aberdeen's local College actually has changed focus from a rural skills centre to a training centre for a future in oil and gas.
Google is powerful when technical terms from computing also science including medicine prescribed drug details entered - understanding broad concepts at University from previous study can enable whole new material to be written, memories to come back be restored based on intelligent accurate Google search results
Type a search string into Google, often at the top of search results you can get short definitions - be specific with technical computing terms also names of medications also, a lot of useful accurate detail can be releaved to copy and paste put on a website with additional analysis and commentary to really make sense of stored data. Google searches can actually bring back memories from previous study at University even lots of technical detail from Cisco computer network curriculum. Remembering what has gone before is useful - study at University paired with more modern developments in the news linked to computing combining with analysis can put a new interpretation on things shed light enable progress. Cisco's curriculum was web based and access was revoked a long time ago shortly after study, but actually understanding broad concepts from study really working hard at University can enable new fresh helpful material to be written informed by short useful snippets of stored Google answers maybe called data.
Google is powerful - Google is powerful when technical terms from computing also science including medicine prescribed drug details entered - understanding broad concepts at University from previous study can enable whole new material to be written, memories to come back be restored based on intelligent accurate Google search results. Google information can sometimes be wrong actually but it is the questions that stem from Google's search alogorithm the Google answers technology is very useful to provoke an enquiring mind and lead on to great educational material and helpful material being written. Medicine prescribed drug details - using long names for search strings can lead onto matching complications of drugs when web users have some basic knowledge of biology really. The human anatomy usually linked to biology a broad term from science - chemistry linked to silicon, sand and circuitboards also microprocessors with onboard stored memory and buffers, physics is really the realm of what is possible in outer space and beyond also linked to electricity and electronics including electrical engineering - mechanical engineering more linked to manufacture of products and technology like electric cars. Students have to make a choice for a broad specialism. The web is a universal open platform and access to open data enables multidisciplinary research enables boundaries to be pushed and explored grounded in evidence based study and research.
Flow control in computer networks and memory buffers including also overflowing buffers and hexadecimal - 16 times table taught in schools in Aberdeenshire early 20th century
Flow control happens also in computer networks - flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace. Too much data arriving before a device can handle it causes data overflow, meaning the data is either lost or must be retransmitted. This is often linked to buffers - overflowing buffers are linked to Babbage's original processor which is linked to memory or storage locations. Babbage designed the first computer processor is known as the father of the computer. Cambridge firm ARM produce world class designs for processors fitted in mobiles and tablets - this is an example of the UK's big service industry, an industry suited to home working actually to mitigate environmental harms. Difficult to get jobs working online from home unless you have enterpreneurial flair and talent also are part of established businesses and organisations with physical buildings and retail spaces.
A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold. Buffers contain a defined amount of data; any extra data will overwrite data values in memory addresses adjacent to the destination buffer.
Boot ROM is often the BIOS or Basic Input Output System of a computer - contains information on a computer's start up, usually the boot order of a computer can be altered from the BIOS for example change to boot from the core hard drive to a USB flash drive. Also with a PXE network card, remote booting of a computer is possible.
Boot ROM information is stored when power is lost and is a form of Non Volatile RAM or memory like smartphones and tablets but mobile devices use Nand flash.
Boot ROM is static in nature means it does not require refreshing. Actually BIOS batteries contain clock settings - a failing battery can rest a clock change its state from what is normal. The need to replace a BIOS battery actually happens from time to time - often need for a screwdriver a small one to push small metal holders out the way to lift a BIOS battery off a motherboard also a circuitboard inside a computer to replace a BIOS battery.
ROM Read Only Memory is more reliable than RAM since it is non-volatile in nature and cannot be altered or accidentally changed.
The contents of the ROM can always be known and verified - actually memory locations are often referred to with hexadecimal values based on the unit of 16 so the 16 times table is useful in schools and that was taught in Scottish schools in the early 20th century around the time of Prime Minister David Lloyd George. Grandad knew his 16 times table and he was born in Fyvie, Aberdeenshire - this is a verifiable event well the birth place for the birth certificate a piece of paper now available online with ordering possible from the Scottish people's website - make a purchase on this website and all revenue goes to the Scottish government paying the wages of Scottish ministers. Family tree research really can pay the salaries of Scottish ministers - make a purchase on Scotland's people and you will receive a receipt of purchase.
Keeping digital evidence though can lead to compensation sometimes when people respect the evidence.
When talking about overflowing buffers in computer, important to discuss computer architecture, a subject also linked to advanced and complex mathematics - rising in important among young people is the topic of STEM Science Technology Engineering and Maths, really essential topics of study for maintanance of Scottish Smart Cities - open data is also important as is existing professionals working in engineering and computing fields sharing data to help others including young people learn. Education often the biggest driver of technological development in computing, but also in science and in medicine.
Big issue of the Day - where do you safely store digital evidence?
Big issue - where do you safely store digital evidence? Homes can experience flooding also fires and natural disasters. Distributing data seems wiser, but still a local USB external hard drive or multiple hard drives at the present time is a workaround to the solution of downloading files again which can be time consuming over slow networks such as GPRS General Packet Radio Service and UMTS and Universal Mobile Telecommunications Service - universal networks for the world more likely to be found in the third less developed world such as Africa.
UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps).
Breaking down also simplifying technology could improve safety for women in future also independence as well as greater mobility
Women actually could be a lot more vulnerable in future than they are at present since often women are often less technical savvy. Less women in technical professions such as computing, engineering but also surveying, architecture and the building trade also the construction industry.
Really breaking down technology which can be a complex field can help non technical people to understand also young children. Simple language and explaining using analogies from real life example assist explaining and education very well.
Greater understanding of how technology works, helping women to master technology, deploy it better in their life may give them greater mobility and independence in the long term also greater safety.
Women tend to do more secretarial services supporting businesses - they often tend to be less paid than senior surveyors and architects. Secretarial services is also linked to journalism and also more women in the media field telling stories. Business managers in professions that are technical may actually take advantage of their wife more exploit them - pay them less well, have them care for children while doing housework, do the shopping also do a job have a career. The modern women is very career minded, but still looking after children is a serious responsibility - really where is Madelaine McCann? Schools in Aberdeen usually have nurseries alongside primaries and also for nursery children there are ratios around adult to child supervision. Really those adult staff in playgrounds looking after children preventing escapes trying to stop intruders are not the teachers - staff in the playground of a school's perimeter are paid less well than teachers and established teachers can earn over 40,000 pounds.
Mental health nurses do actually serve lunches and dinners on the wards of the Royal Cornhill Hospital in Aberdeen - really LiveAid concerts were born out of a need to feed the third world mostly African nations out of a desire to ensure adequate food reaches everyone and there is Lenny Hendry and Comic relief focusing on Africa. It is fair to say some people admitted to the Royal Cornhill Hospital go to the eating disorders unit. Mental health nurses are also paid professionals and actually they should really go out of their way to engage with patients, listen and engage in whatever form patients feel comfortable. The hospital has Loriston and Strathbeg wards to focus on learning disabilities and an inspection report revealed patients were using iPads.
Need for real patience with technology to gain the most benefit and to listen to signals
Quick knee jerk reactions and responding to fast paced events may save lives in some instances, but often there is a need for real patience with technology for it to be very effective.
Signals over computer networks placed on carrier mediums whether wired high-speed light-guided fibre optic cable or wireless can experience delays and this is known as attenuation.
Really NASA engineers must be very patient when listening for signals from far off worlds including Mars - signals can break apart also weakon when going through outer space in a vacuum. Outer space may in real terms, the realm of Physics, also be referred to the cosmos with the moon and the stars and Fusion clean nuclear energy is based on the moon and the stars.
Boosting signals in a computer network historical with Ethernet Local Area Networks using Hubs to link computers
Signals in traditional computer networks think Ethernet were boosted with the aid of repeaters because in Ethernet networks segments of networks were contiguous and one segment could not be longer than 100 metres - btshop.com sells a range of extenders and repeaters for home and business networks.
Hubs were a basic network management device that aided the relay of signals - hubs were basic useful for small networks and all computers that connected by way of a Hub shared a single collision and broadcast domain.
Digital signals can be amplified by routers and switches
Signals in computer networks often relayed by multiple routers and switches - signals get relayed and forwarded amplified to an extent to ensure a signal from a computer in one location reaches its intended destination.
A computer in Australia can talk to a computer in Scotland - usually signals often represented by binary ones and zeros on a carrier medium cable and wireless both used in a heterogeneous network such as the Internet.
Signals get boosted by routers nowadays - traditionally repeaters in a Ethernet local area network with multiple or two or more contiguous segments of no more than 100 metres for each segement.
Heterogenous networks opposite of homeogeneous - hetero implies differences in devices connecting to a network think in the modern age desktop computers running Windows, Mac and Linux competing computing platforms but also modern smartphones and tablets from Apple also from Google with the Android lineage from various manufacturers.
Homeo as in homeogeneous may refer to devices that are the same on a network - some small companies may actually order devices that are the same or uniform for all their employees to ensure universal compatibility with information exchange. Devices that are the same actually make bespoke tailored support easier for users - where networks involve many different devices, user support gets harder with different in hardware so important to focus on broad computer support principles really delve into the history of computing from Babbage's computer processor to processors designed by Chip marker Arm in Cambridge often used for mobiles to chart a more positive trajectory help ensure real technological progress is made for the benefit of everyone. Those with disabilities can be dependent on technology for mobility think Motability car discounts through Arnold Clark for those in receipt of higher class Personal Independent Payments for mobility to hydraulic mechanical hoists with automation fitted to special taxis and minibuses to help those confined to wheelchairs to have more independence and enjoy life more. Life is the ultimat gift of everything.
Large networks split into segments with routers and switches to minimise collisions ensure a message gets through or is received in tact
Segmentation technical term for each local division of a computer network - routers and switches can break up networks.
Switches have multiple ports or interfaces - each computer connects to a separate interface on a switch and a computer to port on a switch connection is dedicated in a sense with a separate collision and broadcast domain.
Collisions really symbolic of road traffic collisions in the data or digital world - multiple computers wanting to transmit data over a network led to users having to wait in a Token ring token passing network.
Protocols, rules and languages used in data communications - Carrier Sense Multiple Access with Collision Avoidance
In Ethernet networks often used for Local Area Networks, protocols were developed to minisise collisions and ensure data packets which comprised a message such as an email reached its destination safely. One such protocol was Carrier Sense Multiple Access with Collision Avoidance.
Protocols are really languages in data communications or a set of rules that seek to govern or control data communications in order to ensure the successful trasmission and recepting of data also a message. Before computer networks, messages were slower to travel around the planet and in various localities - from the postal service to telegrams and carrier pigeons. From the telephone to two way radio communication which cracked often a need to shout Roger for repeat - Linux networks use echo to print a line to a screen, put text into a file, preserve data at the most fundamental level with digital preservation of text in a universal TXT file.
Electric vehicles big future upward trend driving force of motoring
Electrofication is the trend for transport with more and more EV or electric vehicles being developed - Nissan Leaf electric car born in 2010 around the same time as the iPad tablet computer. Apple and Samsung really compete with a range of tablets and smartphones think Apple iPhones and iPads versus the Samsung Galaxy range.
Tachographs record information about driving time, speed and distance are often fitted in HGV juggernaut vehicles. They are used to make sure drivers and employers follow the rules on drivers hours this is also working conditions in the cab of a lorry - see https://www.gov.uk/tachographs.
Use of techographs can bring greater safety on the roads.
Skills and knowledge needed to build electric vehicles and zero emission transport
Skills are needed to be acquired to build electric vehicles, so really education is very important. Technology education is fundamental to future Scottish smart cities - to equip young people with the knowledge and skillsets to make a life for themselves, contribute and help the older generation. Electric or EV vehicles are 100 percent electric with an electric combustion engine - Hydrogen fuel cell vehicles emit water vapour, but still electric vehicles do not have an exhaust and emit nothing this is clean zero emission transport.
Batteries and electronic devices like TVs, computers and DVD players use DC electricity also emerging EV or electric vehicles store DC power in their batteries - Alternating current or AC is actually what enters most homes - also smartphones use what is known as induction charging to enable wireless charging involving a pad suitable for efficient charging of multiple devices in a household minimising wires or cables, transformers enable high volumes of energy to be transported over the power grid suitable for solar panels
Defining terms can help young learners make a choice, also choose a future career path.
Engineering is a discipline often split into mechanical (think building or manufacturing electric cars), electrical and civil engineering (think building bridges). Electrical engineering involves electronics and hard wiring circuits also involves transformers and transistors where AND, OR and NOR gates are often used on microelectronics also circuitboards. Electrical engineering concepts tend to get taught in Technology in secondary school - computing actually is a discipline more focused on computer programming or software development, algorithms or rules of logic and use of computer applications. Gates in electronic ciruits certainly AND, OR and NOR is often referred to as boolean logic in computing, but also boolean also refers to true false states or modes of operation. Web programming think HTML, CSS, JavaScript and PHP is more in the realm of multimedia with often reference to hypermedia interactive website elements. Computer networks involves data communicaions and this is more closely linked to computing also cyber security, but maybe studied in the Department of Engineering at the Aberdeen's Robert Gordon University.
Cell phones also called mobile phones or smartphones as well as MP3 players may use what is known as wireless charging - this is also known as induction charging. The back of a phone for example may be fixed to an adaptor which has contact points. Smartphones are places on a charging pad which is linked to a power socket, an electrical wall outlet with voltage through which a current and amps flow.
Wireless charging also induction charging great in theory with potential to do away with lots of cables when users have multiple devices - wireless charging also induction charging via a charging mat would be useful in households with multiple occupants who each have mobile and tablet devices.
Resonant inductive coupling - also known as inductive or resonant power transfer. The resonant inductive coupling is the near field wireless transmission of electrical energy between magnetically coupled coils. Resonant inductive coupling is also used for near field communication, which is the operating principle of smartphones being scanned against Chip and pin machines. Both Chip and pin machines also smartphones are electronic digital devices.
16amp to 32amp cable needed for EV or electric vehicle charging. A 16amp cable will charge your electric car at 3.6kw and a 32amp cable will charge an electric vehicle at 7.2kw.
Capacitive coupling uses electric fields, so wireless charging for mobile phones use capacitive coupling. Inductive coupling uses magnetic fields, so this is more suited to electric car charging with an electromagnetic field also. Generally capacitive coupling is used in very low power applications, while inductive coupling does not really have a power limit. Giant power system transformers work by inductive coupling.
A power transformer is a static machine used for transforming power from one circuit to another without changing the frequency. As there is no rotating or moving parts, a transformer is classified as a static device. Transformer operates on an AC supply.
Transformers are important component and they make large power systems possible - this actually is the basis of the electricity network or the national grid. More and more homes are having solar panels fitted with options to export unused energy back to the grid - solar panels store energy when the Sun does not shine but actually solar panels can actually generate electricity from reflective light when the Sun is not shining.
To effectively transfer hundreds of megawatts of power over long distances, very high line voltages are required - in the range of 161 to 1000 kV or kilovolts. This is where above ground electricity pylons come in think power or energy provided by Scottish and Southern Energy. Note that Eon is the French nuclear power company - France has a country is made up of 70 percent nuclear power.
Power transformers can be divided into three types according to the ranges. They are large power transformers, medium power transformers, and small power transformers. These transformers transmit the voltage.
Transformers are used to transfer energy produced from one Alternating circuit to another.
Alternating current describes the flow of charge that changes direction periodically. As a result, the voltage level also reverses along with the current. AC is used to deliver power to houses, office buildings, and so on.
The current produced by generators also wind turbines are AC currents and the current we get from power sockets in homes are AC current. Mostly Electrical appliances like fans, Bulbs, also Motors works on AC current.
Batteries and electronic devices like TVs, computers and DVD players use DC electricity - once an AC current enters a device, it's converted to DC. A typical battery supplies around 1.5 volts of DC.
Flashlights, cell or mobile phones, laptops - use DC power; they have to store it. Plug-in vehicles are portable so they use DC batteries too (although most of them have AC motors).
Solar panels produce direct current - the sun shining on the panels stimulates the flow of electrons, creating current. These electrons flow in the same direction, so the current is direct.
When you plug things into the outlet in your house, you do not get DC. Household outlets are AC - Alternating Current. This current has a frequency of 60 Hz.
Laptop charger voltage is usually 100-240V AC (input) delivering a 19V DC output. What is this? This means that most laptop chargers convert mains electricity, that have voltages between 100V (110V is common in the US) and 240V (common in the UK), into 19V to power the laptop and charge its battery.
In a nutshell - DC current used for batteries and AC current comes from electrical outlets in homes - AC current from an electrical wall socket converts to DC current for storage and for charging batteries for example.
Modern smartphones tend to use Lithium batteries which actually can last a long time, but charging frequency is dependent on usage - switching phones off can save the battery potentially, but when a phone is switched off it can take longer to turn on and sometimes you may get error screens or boot messages.
Lithium batteries ideals suited and used in smartphones can withstand extreme low temperatures - this makes the smartphone suited for both life in Scotland and also life in Siberia, Russia. Lithium can operate without failing in a very cold climate, so it's ideal for outdoor applications. Lithium batteries are lighter than alkaline batteries, so they offer an advantage when used with portable devices, especially cordless power tools.
The typical estimated life of a Lithium-Ion battery is about two to three years or 300 to 500 charge cycles, whichever occurs first.
Electric bike batteries may last from 2-4 years and will likely last for 1000 charges before it is necessary to purchase a new battery.
Lithium-ion performs well at elevated temperatures but prolonged exposure to heat reduces longevity. Charging and discharging at elevated temperatures is subject to gas generation that might cause a cylindrical cell to vent and a pouch cell to swell. Many chargers prohibit charging above 50°C (122°F).
Cobalt-based Lithium ion batteries are used in most cases in smartphones - cobolt is a rare Earth mineral. However, in terms of thermal stability, it is not very good. Manganese based Lithium ion batteries are the newest edition to the market. It offers superior thermal stability as it can sustain temperatures up to 250 C (482 F) before it becomes unstable.
nslookup for DNS info, netstat for network statistics also WEP and WPA secure WiFi wireless networks and also secure computer wiping - Knowledge sharing can empower women, professionals to resolve Internet connectivity issues quicker, faster minimising Internet downtime and reduce the need for mobile network or computer engineers driving between multiple remote sites
ipconfig/all can display the names of both primary and secondary DNS or Domain Name System servers - usually a computer has two DNS name resolution servers addresses stored in its configuration. This serves as a back-up a fail safe alternative to enable real world users using a computer, smartphone or tablet to access websites by the way of a home router for example - offices likely have routers too and they likely need powered down from time to time to restore Internet access.
Aberdeenshire Council for example has multiple regional social work offices with staff so each local office likely has a local router which serves has the central point of access to the Internet for multiple users - this is also an access point in an Infrastructure or an established network different from ad hoc networks where each device in a network talks to each other and co-operates.
Routers co-ordinate sharing of resources such as an Internet connection or link to the outside world - Internet Connection Sharing was a tick box way for a single computer running Windows XP for example to share an Internet connection or a Net link in an ad hoc network on an informal basis where computers loosely talked to another and shared resources.
In an ad hoc network entering \\hostname where hostname was the name of a computer as identified by ipconfig/all at a command prompt enabled a computer in an ad hoc network to access shared files on a another computer.
Knowledge sharing can empower women, professionals to resolve Internet connectivity issues quicker, faster minimising Internet downtime and reduce the need for mobile engineers driving between numerous or various sites. Technology education is really at the forefront of a low carbon low emission world. EV or electric vehicles are actually zero emission being 100 percent electric combustion engine. Hydrogen fuel cell card emit water as vapour this is in stark contrast to a petrol car with an exhaust. Hydrogen is cleaner but still a fossil fuel. Electrification of motoring is the long term future.
ipconfig/displaydns - displays details of DNS domain name system servers.
ipconfig/flushdns - useful to reset DNS settings when name resolution may not be working properly. Internet connection issues may not be caused by DNS however it is unlikely but not impossible - it could be patchy WiFi and more likely issues with an access point in an infrastructure network, such as a router - routers can fail also they need to be unplugged also replaced sometimes.
Often routers are the central point in most home and office networks. Unplugging a router or pushing a reset button on the router itself may solve issues. There is a difference between both these actions - routers use Non Volatile RAM so when they are unplugged data and connection settings such as WiFi passwords are retained when routers do not have power - mobile and tablets used NAND flash memory to retain data when power is lost.
Reset buttons erase settings such as WiFi passwords also security encryption technologies linked to a router and most WiFi connections use encryption between computers and an access point also a router.
nslookup - can be run in both Linux and in Windows 10 from a command prompt. nslookup tells a user of a computer an IP address a computer numeric address of a MAC network card or network adaptor when a domain name is entered such as nslookup aberdeenshire.gov.uk or Scot.gov.
nslookup followed by a numeric IP address then Enter at a Windows 10 command prompt can identify a domain name, translate an IP address which represents a computer’s network adaptor to a given domain name.
WiFi connections historically were secured with WEP or Wired Equivalent Privacy but then it was replaced with WiFi Protected Access. WEP passwords were 8 characters in length and alphanumeric restrictive in a sense easily cracked by those eavesdropping on a connection using packet sniffers such as ethereal software. WiFi Protected Access really made passwords much longer involving use of special characters or symbols too - also with options for 128 bit and 256 encryption. Encryption scrambles passwords and may also be known as ciphers - classic encryption known as the Caesar cipher.
The Data Encryption Standard known as Des encryption uses a short 56 bit encryption key too short for modern advanced technologies - it was a symmetric encryption algorithm also a basic encryption algorithm.
Triple Des or the Triple Data Encryption algorithm is a block cipher which applies the standard Des encryption algorithm three times to each block. Use of these encryption algorithms actually underpin secure computer wiping and the Reset this PC feature in Windows 10 which enables computers to be securely wiped for safe disposal.
Secure computing wiping can take considerable time to really erase data - 5 hours likely standard if you choose to do it through Windows 10 Reset this PC which also can install a fresh copy of Windows 10 giving a user a fresh desktop a computer free of issues and complications until the need arises to reload a computer again with a fresh install. Through Reset this PC in the Windows 10 search box, users can choose to remove applications, reinstall just basic Windows 10 applications and retain user data without the need for secure data removal.
Without secure wiping of personal data also organisation confidential information, disposal of computers is much faster. Reselling computers and also securely removing data is very time consuming to do a thorough job, so it is unlikely really securely wiping computers is done often by organisations.
netstat is also a useful command that displays information on network statistics for TCP/IP such as information pertaining to a network connection, also routing tables, network protocols in use and also network interface details. A computer can have a network adaptor card inserted which is an interface that can either connect by cable or by wireless means to a router, the central point in a network. A computers network adaptor is also an interface to the Internet and ports are also interfaces on routers. Routers are also known as multi homed hosts - they have multiple interfaces or ports where cables may attach in the case of cabled routers with fibre optic links and filter or forward data packets, segments in messages, send them unordered reading a source and destination address. netstat can show a router table - routes also paths through a network and can also show where data packets are going to go. Usually the network protocol is TCP/IP for Internet communications but routers can use routing protocols such as RIP Router Information Protocol the most basic rules for routers to communicate that use the metric of hop count to determine how far one router is from another, RIP version 2 also OSPF Open Shortest Path First and BGP Border Gateway Protocol.
netstat in Windows identifies really listening ports or interfaces also incoming and outgoing connections in summary form.
ipconfig in Windows and the equivalent in Linux is ifconfig to identify network interfaces and details associated with logical addresses. Note that computers have logical addresses and a physical address. IP addresses are logical addresses and are represented at the Internet layer of the TCP/IP four layer model. Physical addresses are MAC addresses which are imprinted on network adaptors inserted in computers may also be embedded they have a unique the world over address usually in hexadecimal long and complex also numbers 0-9 including letters A-F. Physical addresses are represented by the Data link layer in the four layer model for TCP/IP.
md5sum Linux command calculates and verifies hash algorithms which can be 128-bit. This is used for Cyclic Redundancy Checks and for error checking. CRC checks usually done on files downloaded over the Internet to confirm file integrity also contents to avoid wasting time setting up computers in case of operating system ISO images including versions of Windows but also Linux distribution files. Operating system files usually downloaded in ISO files. ISO is also the International Organisation for Standardisation, the main body that makes standards in respect of digital technology.
2-D 2 dimentional animation also known as stop motion animation think Wallace and Gromit required patience also animation usually involves small discrete movements using keyframes also video editing software uses a timeline and key frames - JPEG uses lossy compression along with pixelation and this is where similar pixels get copied in computer code enabling replication and duplication of similar patterns of computer code which enables file sizes to be reduced, CCTV images usually low quality due to need for rolling film and previously recorded footage getting recorded over
Video playback when a video has been previously watched or played and a user opens the video again to look closer, analyse detail also take notes, the opened video actually can open up in a marker spot where the user last stopped or paused the video.
Important to always check times on videos such as video length and also position of information.
Taking notes of key video elements or segments at a particular moment in time can enable recording of what has been said and what natural world features are present at a particular moment of time in a video sequence.
Videos use keyframes in traditional multimedia authoring programmes such as when creating educational demos with Adobe Director software - educational demos usually start of as storyboards and stem from animation - this is multimedia.
Multimedia is usually interactive think hypermedia websites with multimedia elements - multimedia involves text, images or 2D 2-dimensial still graphics, video, animation also sound or audio - Plug n Play with speakers connected to a computer can malfunction, sometimes necessary to change USB port - unplug speakers and hook up to a different USB port.
2-dimensial still images traditionally were used to form animated GIFs - a sequence of images used in quick succession to give the appearance of changes.
GIF format was proprietary involved paid for royalties inventor getting paid - PNG useful for vector graphics and preferred image format over GIF.
JPEG better for photos uses lossy compression unecessary pixels get thrown away - certain photo editing applications enable exporting to JPEG where you can scale the image quality and resolution using a slider compressing images reducing file size for efficient transmission over a data network such as the Internet.
Picasa from Google was a smart photo editing application that did this or enabled this.
Pixelation is the term used in computer graphics to describe blurry sections or fuzziness in an image due to visibility of single-colored square display elements or individual pixels. Pixelated images linked to lossy compression - similar pixels get copied in computer code enabling replication and duplication of similar patterns of computer code which enables file sizes to be reduced. Pattern matching used in pixelation and copying computer code for pixel representation but use of this technique where image quality is distorted actually makes it harder to pick out suspects on CCTV images. CCTV cameras can be poor quality with the need for rolling video and after a certain period of time, video footage gets taped over or lost in time and space.
Animation usually involves small discrete movements using keyframes - plasticene figures from both Tony Hart also Nick Park think Wallace and Gromit involve stop motion animation - stopping and starting filming in keyframes. Animation historically from still images - Wallace and Gromit involved slowing moving figures to produce a captivating TV episode of about 30 minutes. Great patience went into producing animation and animated TV programmes Wallace and Gromit.
Animation linked to video editing - video editing software uses a timeline and key frames - the Facebook Timeline comes from the concept of video editing timelines where video clips short segments of video are put on a film strip to produce a longer video.
Combing a series of video clips is possible as is cutting out video segements to really emphasis important parts of a video provide a key message also a stand out message that resonates and captivates an audience. Possible to add voice overlays to video actually easy on an iPad with iMovie absolutely no need to talk when out and about engaged in active travel but when you keep moving actually people do not hear what you say. Aberdeen streets are usually quiet actually with few pedestrians in most parts of the City. When shooting video outside, wind and wind direction can be an issue - but audio is often amplified by modern smartphones using clever technology and smart algorithms.
Robert Mugabe failed to see the importance of knowledge transfer partnerships, information and training for arable farming in Zimbabwe formerly Rhodesia with white owners of farms - really the Internet was born to share information with universal TCP/IP this is the fundamental purpose of a network
Trying to avoid being racist and being respectful - the Africa league of nations is often a black member panel representing the often coloured continent of Africa.
Calling someone black can be insulting but really black and white is the main difference between mankind even though there are off white shades known as mixed races in Asia and there is Chinese people who are unique and to need to be respected for they often mass produce goods for Western countries.
Those with darker pigmented skin can burn more easily in Sunlight also those with darker skin are less able to absorb vitamin D from the Sun, but also Apartheid happened in South Africa - Nelson Mandela was the black man imprisoned who went on to become President of the wealthiest, most economically successful part of the African continent.
South Africa and also neighbouring Zimbabwe had white farmers - Robert Mugabe with warlords took aggressive action against white farmers to reclaim arable farmland of good pasture, but really Robert Mugabe made a big mistake.
The main mistake was that the white farmers had knowledge of how to manage farms keep them lush - this is agriculture practices and really knowledge transfer partsherships as well as information sharing is most important between both highly developed countries and under developed countries also the third world including a lot of African nations.
TCP/IP standard rules for data transmission across the universal Internet the world's largest shared network online space - small segments or data packets actually enable corrupted data to be resent most efficiently - LiveAid concerts core focus to feed everyone
In a nutshell - Robert Mugabe failed to see the importance of knowledge transfer partnerships, information and training for arable farming in Zimbabwe formerly known as Rhodesia - really the Internet was born to share information with universal TCP/IP this is the fundamental purpose of a network. TCP/IP is a standard set of rules to govern data commuication - TCP brings more reliable transfer with SYN bit for synchronisation to unordered data packets which are sent out of sequence in multiple data packets in an email. TCP also uses an ACK bit to say thanks for message or a data packet part of a message.
The main reason for small data packets in segments is because if one small data packet gets damaged or corrupted in transit, it is easier also faster to resend a small part of a message - this is efficieny in data communications across the universal network the Internet. Efficient data transmission like efficient transport is fundamental to feed the global or world population.
With this, you need to consider the historical importance of the Live Aid concerts which typically focused on helping Africans and the African continent. Think Bob Geldof but also Paul McCartney and then there is the Bill and Melinda Gates Foundation with charity work focused on Africa. Bill Gates technology great founded Microsoft, the global giant that powers all Windows software.
Absolutely no sound or negative response audio output on a Windows 10 computer - unplug external USB speakers and reconnect to a different USB port to take advantage of Plug n Play automatic hardware detection and configuration - Ben Shneiderman describes artificial intelligence as reliable, safe and trustworthy also the key difference between front facing and rear facing cameras on smartphones also tablets and also mirrors can be really useful or handy
Men are more likely to be computing professionals, women on the other hand more likely to watch online videos, engage with friends, start conversations online well keep in touch with friends via Facebook.com maintain contact not necessarily engage with men online, but men more likely to pester women online harass and stalk them - stalking crimes can have roots in communication. Really press the Windows key plus Shift plus letter-S or S to save screenshots in JPEG or PNG of conversations online such as Facebook messages even emails - small screenshots when cropped can be good for story telling and embedding into web pages.
With all this and with women watching online videos, they may actually sometimes not be able to hear any sound or audio coming from external speakers connected to their computer either by USB port or by the green audio connector in the back. The pink audio connector on the back of a desktop computer for example is a microphone but these days quite common to have a webcam connected via USB to your computer with a camera or video also a microphone built-in for video calling via Skype on Microsft Windows 10 version ten computer also Facebook.com via a computer think a laptop with a webcam on the front can enable video calling from a web browser via Facebook.com. The blue connector port on the back of a computer is typically an Auxiallory port or Line In - sometimes it is used in connection with a headset with earphones and a microphone.
Unplugging USB devices and changing to a different USB port on your computer can reset a device enable it to work again when it is malfunctioned. This is known as Plug n Play in Windows terms the automatic detection of a hardware component linked to a computer to enable human computer interaction with a computer also automatic configuration of a physical hardware user touching device with a computer. Big on Human Computer interaction also user interfaces was Ben Shneiderman from the University of Maryland - http://www.cs.umd.edu/users/ben/
Starting with user interfaces, Ben Shneiderman has moved into the realm of Artificial Intelligence - http://www.cs.umd.edu/users/ben/presentations.html - Ben Shneiderman describes artificial intelligence as reliable, safe and trustworthy. Really artificial intelligence is more likely to stem from Linux based systems where there are a set of permissions invoked on user files and directories to really control resources prevent one rogue employee from doing harm running rampage.
Controls for security built into an operating system actually help to boost safety in hi-tech smart computer systems making them more robust and reliable also making them very effective at performing a particular function.
Computers also need human operators, but use of computers can cut mistakes by humans even though electrical signals at the binary zero and one level can actually produce random data from time to time or errata is the technical term for errors in data. Mistakes can be good actually - type a wrong keystroke by accident, it may enable more thoughts and more content to flow out if you embrace the mistake. Mistakes and learning lessons long been an important or core part of learning.
Important to draw to people's attention camera specs with tablets and laptops on the website of electrical retailer Currys.com - usually front facing cameras lower in quality maybe 2 Megapixels typical whereas rear facing cameras may be higher quality or higher resolution also known as pixel count maybe 8 megapixels.
Rear facing cameras usually take photos of scenes also enable video of other people including what's around a user - front facing cameras used for selfies they are lower quality - a selfie is a portrait image of oneself just like looking in a mirror. Mirrors can actually distort reality think those fun mirrors you may see at a hanuted house where people sometimes look fatter image perception stems from this and concerns around eating disorders - the Harry Potter fantasy movies actually made reference to mirrors also. Take the rear view mirror in a car, as Meat Loaf sang objects in the rear view mirror appear closer than they are. Really reversing can be tricky using mirrors, but some cars usually the high end ones have reverse parking sensors using lights LEDs and also beeps - lights combined with sound aids accessibility for disabled persons very well. Mirrors on a car think wing mirrors are very handy - they do provide an excellent guide to really prevent a driver from clipping an object to the side useful also for going forward to avoid hitting objects at the side of the road.
Mirror signal manoevre important when learning to drive - mirrors and checking them frequently staying alert can help drivers also motorists plan ahead give timely signals before really making a manoevre - also changing lanes. Lane discipline is important actually it can prevent collisions from cars veering into another lane without a timely signal before hand.
Actually shoot a video at a mirror makes it easy to capture the video shooter in a video and panning around moving the camera around at different angles and within a room or space enables other people to be captured. Mirrors actually useful to identify a video shooter when evoking memories or really telling stories with older people. Use of a mirror can actually bring visual idendity to life and expose a link between a video shooter and the other people that are the subject of a video. Mirrors are reflections and actually all light outside is reflective and good conductor of solar electriciy whether it is sunny or not.
Having difficulty accessing or copying photos and videos from your phone to Windows 10 - first connect USB cable from your phone to a computer, then enter your passcode or password on your Android phone, authenticate with Touch ID on iPhone with fingerprint
Some people may struggle to transfer photos also videos from their Apple iPhone or Android smartphone to a Windows 10 version ten computer when they have a passcode or password also security set on their phone - Windows 10 is the most common computer operating system in the world on most computers at the moment.
When you connect a phone to a Windows 10 computer with security set, sometimes when you access the drive representing your phone in This PC via Windows Explorer, nothing is displayed.
To reveal files, before you access your mobile device in This PC, use Touch ID biometric authentication on an iPhone - basically use your finger or thumb your fingerprint to access your iPhone pressing gently the palm of the finger used initially when you set up security - for Android enter a passcode or password.
Android phones may also have Face recognition enabled to access your phone - this is sometimes a security option, but actually face recognition could be abused when you are with a bully really in the company of peers - peer pressure amongst a group could intimidate someone to grant a group of friends or bullies access to their phone. Some people may not be well-meaning. Easier for a group to force someone to hold their phone in front of their face - really face recognition on phones is a danger when in a group of people like a gang.
Face recognition for access to smartphones does not actually work at all times in practice - use of glasses on a wearer can obsecure face authentication. If you set face authentication without glasses, you may find it easier to access your smartphone without glasses - doing this would likely be more accurate enable more effective access to your phone with security.
To be able to transfer photos and videos from your phone to computer, you need to authenticate with your phone first of all after connecting a mini USB to USB adaptor to a USB port on your computer. The standard iPhone cable USB connector to computer from model 2020 and onwards is known as USB Type C. There are actually only three different adaptors or connectors in the world for phones and tablets - one for iPhone, one for iPad and one for all Android devices. This is actually brought to the fore from the OMNIPhotostick which is a small device which is designed to help phone tablet users easily transfer photos and videos to a USB flash drive or back-up their files with a few on screen presses.
Control plus letter-C then Control plus letter-V enables copy and then paste of photos and videos on your phone in Windows Explorer on Windows 10 to a designated folder on your computer. Control plus letter-A may also be useful to select all files including photos and videos on your phone for copying. If you copy files from phone to computer, then back-up to online storage OneDrive or Dropbox or Google Drive, you can delete files on your phone to free up space to be able to capture more videos or take more photos go crazy happy snapping in the moment.
Linux Cat grep touch echo for use with TXT files and Windows start - Keep a diary of events, store your work schedule also recall fond memories later
Keep a diary of events, store your work schedule also recall fond memories later
Cat for cancatonate to read txt or basic text also TXT files on Linux - Windows 10 version ten has cmd command prompt start command - type in cmd in Windows search box or Run box. Applications executable set up files can be run with start command - for example combine multiple apps into a batch file to install multiple Windows applications using a batch script useful for automation.
Linux has shell scripts similar syntax to Cee computer programs. Automation also means deployment of multiple computer systems concurrently or go away and have a coffee or lunch while applications are being set up on a computer system. Starbucks and Costa coffee often popular with people going to work in the mornings - workers and commuters often seek a caffeine fix need to stay alert on the road also for work.
Linux has Grep command to search strings of text in a file - useful for pattern matching also for smart artificial intelligence applications also to build smart algorithms rules of logic which are often procedural in nature. Computer programs made up of algorithms which are really rules of logic and a sequence of instructions, tend to be procedural - step by step instructions.
Touch followed by multiple txt or TXT file names on a single line one after the other can create multiple empty txt basic text files on a Linux system - may be useful for creating container object text files which could be later used with the echo command to put strings of text into txt files. TXT files are universal compatible with multiple computing platforms think Windows and Linux also Android.
Android open source Linux software free to tinker with and play around with made for mobile and tablet computing, which is flexible but limited in functionality - large screen displays enable magnification. Windows 10 Surface tablets have a USB port which supports use of more modern video capture devices think smart specs enabling data transfer also upload via Windows 10 also Windows 11 to cloud or online storage solutions such as Dropbox also Microsoft OneDrive - Google One is commercial online storage extended from Google Drive with the option to store huge amounts of data like 100GB or 1000GB also known as 1TB.
MS-DOS Batch file for installing multiple executable or setup files on Windows
The MS-DOS batch file below makes referance to some legacy software, some of which may not be on the go anymore and is historical but is included for educational purposes. The batch file below shows how to construct a script to automate the installation of computer program set up files or executable program files on Windows 10 version ten for example but also Windows 7 or seven. Batch files for automation also unattended computer program installs.
At the end of the script the shutdown /r or switch r command flag reboots a Windows computer automatically after all computer program set up files have been run or installed on the computer being set up by unattended means or when the script is run.
The start /wait command is used to start or run a set up executable file and also wait until set up is completed before installing the next application in the procedural sequence of the batch script.
On the same line has start /wait the next part of the command line is a pathname such as the location of specific executable or set up files for computer programs. Useful to keep set up files for computer programs on a USB flash drive with an MS-DOS batch file script located also on the USB flash drive. Batch file scripts are saved with the file extension dot cmd or .cmd and can be easily created in Notepad the basic text editor on Windows.
Be careful when you double-click on the .cmd file the MS-DOS batch script if you include the line shutdown /r since it will reboot your computer unexpectantly if you run the batch file by mistake.
CLS
@echo off
TITLE Essential Apps - Unattended Installation
ECHO.
ECHO Installing Application Software...
ECHO.
ECHO Installing Internet Essentials...
ECHO.
ECHO Installing Adobe Flash Player for Internet Explorer
ECHO Please wait...
start /wait Adobe/install_flash_player_ax_32bit.exe -install
ECHO.
ECHO Installing Adobe Flash Player for Firefox, Opera and Safari
ECHO Please wait...
start /wait Adobe/install_flash_player_32bit.exe -install
ECHO.
ECHO Installing Adobe Reader
ECHO Please wait...
start /wait Adobe/AdbeRdr1013_en_US.exe /sAll
ECHO.
ECHO Installing Mozilla Firefox
ECHO Please wait...
start /wait Firefox_Setup_12.exe -ms
ECHO.
ECHO Installing Windows Live Essentials
ECHO Please wait...
start /wait wlsetup-all.exe /q /noHomepage /noLaunch /noSearch /AppSelect:Messenger
ECHO.
ECHO Finished Installing Internet Essentials
ECHO.
ECHO Installing Multimedia Software...
ECHO.
ECHO Installing Picasa
ECHO Please wait...
start /wait picasa39-setup.exe /S
ECHO.
ECHO Installing VLC Media Player
ECHO Please wait...
start /wait vlc-2.0.1-win32.exe /S
ECHO.
ECHO Finished Installing Multimedia Software
ECHO.
ECHO Installing Utility Software...
ECHO.
ECHO Installing 7-Zip
ECHO Please wait...
start /wait 7z920.msi /quiet
ECHO.
ECHO Installing CCleaner
ECHO Please wait...
start /wait ccsetup318.exe /S
ECHO.
ECHO Installing Speccy
ECHO Please wait...
start /wait spsetup116.exe /S
ECHO.
ECHO Finished Installing Utility Software
ECHO.
ECHO Finished Installing Application Software
ECHO Restarting the computer...
shutdown /r
TXT files with UTF-8 character encoding universal the world over and ANSI is for Latin - also can be created with Notepad on Windows, also on an Android tablet, opened also in a web browser such as Google Chrome - TXT and HTML web format with formatting markers cross platform and is more standards compliant with better ability to analyse data and benefits of standard working practices is wide ranging
Adopting standard working practices has many advantages and standards in the digital world also has benefits - TXT files are universal, can be created in Notepad in Windows also opened in web browsers - TXT files can also be opened on Android tablets and there are lots of them from Samsung to tablets made by Google. Right-click on a file in Windows Explorer, then go to Open with to choose a specific application - you can open TXT files in a web browser such as Google Chrome with this method.
Additonal benefit is using Notepad, click File then Save As and in the File type box put a filename in quotes and after the name use .html or dot html. This really makes creating web pages simple for sharing combined with simple markup such as the letter-p or p paragraph tag for new ideas and issues being discussed - white space between paragraphs improves readability. Heading tags in HTML think h1, h2 and h3 useful to make points stand out and resonate.
Notepad can create UTF-8 files also ANSI files, the format of TXT files - ANSI is based on the Latin language and Latin is the precursor to English.
UTF-8 is more universal the world over can include special symbols as well but actually the iso-8859-1 charactor encoding standard in an HTML web document can support Western languages with ANSI web pages using HTML.
ANSI with iso-8859-1 character encoding tends to be more reliable for web pages published in Western countries.
In the head of an HTML document, use the line of code below to refer to character encoding set encoding for a web page to iso-8859-1 - this is the Latin standard, web page authors need to state character encoding to display special symbols also formatting markers properly. You can change iso-8859-1 to UTF-8 for universal the world over support with also support for Chinese web pages.
<meta charset="iso-8859-1">
Benefits of standards
- Reduce costs
- Potentially make workers more efficient through the use of TXT files or by cutting out the need for formatting issues and file conversion when TXT files are exchanged which are platform neutral and independent
- TXT files usually create more consistent text formatting when line length kept short - HTML tags can actually control information layout when combined with CSS style sheets - embedded stylesheets have an advantage to control presentation for standalone documents
- Customer confidence and reassurance goes hand in hand with feedback and communication including positive feedback, recognition of mistakes also errors that have been made - admitting mistakes and learning lessons for future improvement is always positive.
- Universal support for TXT and HTML web page formats lead on to uniformatity and better more compatible exchange of documents cross platform suitable for a world of Windows, Mac, Linux also iPad and Android tablets.
- echo command in Linux can export text strings into a TXT file - really this is useful for future smart applications, also smart apps being written involving smart algorithms
- echo command was also used in the days of MS-DOS - TXT is a basic format but universal like HTML and web pages.
- Big issue really with HTML pages in Notepad and TXT is that lines can scroll horizontally making it difficult to make sense of the written word, but actually TXT files could enable more integration with XML the data language - let's face it data is everywhere, but making sense of it and interpreting it is really key to helping others
- XLST is the formatting and presentation language for XML - XML files usually store data, they are a data definition format - XML defines data built around programming constructs in a sense.
- Data is big business, but just storing data and hoarding it is not much use - big future in analysing data and lots of job opportunities for real people and humans.
- Stories can emerge from data - real life stories of people which can shed light on what has gone before, lead on to better understanding the past to solve unresolved problems to better help others.
- TXT files better support integration with databases actually, also very compatible with free open source Linux systems.
- Apache web server on Linux powers the vast majority of web servers on the Internet and Linux is also used by big organisations - Red Hat Linux big commercial firm powering enterprises.
- IT professionals really need to be skilled and be specialists to use Linux systems, but Linux is free and open source - free for programmers to tinker with, customise and create bespoke applications and platforms for novel uses.
- Raspberry Pi budget cheap computer built into a keyboard that can hook up to a TV - really intended to get young people started with coding and playing around with computers understanding how they work.
Pressreader.com access multiple news websites from one web based user interface - also Google search string colon or :pressreader.com enables past also indexed news articles to be retrieved, read, accessed and referenced for free - also free news website Grampian Online
Newspapers in print are still in circulation, while online new media from traditional newspapers tend to have their content locked to only subscribers. This is the case with the Press and Journal the news publication for North-East Scotland also the Highlands of Scotland.
Grampian Online free online news for the area of North-East Scotland including Aberdeenshire.
https://www.grampianonline.co.uk/
News articles usually indexed by search giant Google - indexing based on key words or key search terms - indexing linked to information retrieval, a discipline of both computing also information management - the latter often linked to archiving material and creating reference works, libraries often used the Dewy decimal system to reference literature works.
Type in a search string into Google followed by colon or :pressreader.com and you can discover articles for free no subscription. Pressreader.com really has access to thousands of newspapers also enables access daily to new topics of news current affairs to paying subscribers.
Pressreader.com articles need to be indexed for display in Google search results, actually indexing all web pages is energy intensive consumes resources and electricity - server computers need to be kept cold for optimal functioning - server farms often have fans and also a fan is usually on a computer's motherboard and it covers over the Processor the brain of a computer. Processor or brain does all calculations inside a computer - really Windows XP had multi-tasking ability to shift a user's focus between windows with Alt key plus Tab, still a useful short key combination.
During the Summer think around Ronda in Spain, Spanish people sleep in the afternoon during the heat of the day. Ronda village in the mountains with historic bridge - road on approach with twists and turns. Siesta is the term from Spanish which translates to Spanish people sleeping in the afternoon - taking a short nap.
News can be discovered actually by individuals being creative, telling stories, seeking to search and discover because the web and world is vast. Retelling stories is also how people learn what happened in the past and discover what events have been significant have shaped future developments.
Aberdeen actually different from Aberdeenshire with regards to bin collection and recycling also. Aberdeen has three bins at present July 2022 collected fortnightly - the brown one is for food waste and garden rubbish, the black bin is for general rubbish and the other one usually grey is for mixed recycling. Mixed recycling and the brown bin for food waste and garden waste are collected together and on a differnt date a week apart from rubbish only bins.
Significant to note comparisons across the city of Aberdeen reveal that food waste and garden waste bins are collected on different days in different areas of the city. Really waste collection also recycling is done by teams.
This is segmentation of waste collection - waste collection along with burial provision are the two core statutory duties also provision of Council tax fee payers all residients of towns and cities in Scotland eligible for Council tax (not every home is eligible) - this is what most households pay their Council tax rates for in Scotland.
Possible to check on dates for bin collection using Council websites - https://www.aberdeencity.gov.uk/services/bins-waste-and-recycling/check-bin-collection-days.
Make sure you click the pink Check bin collection days button above - sometimes it is easy to miss links also buttons in plain sight - crammed web pages can obsecure items, really taking time to breaking apart also breaking down information and explaining can really help others - often the most vulnerable have the most to gain and benefit.
Uniform web links to make websites easier to use, but sometimes making links and information more distinguishable is useful - the h1, h2 and h3 headings in HTML can be useful for emphasis make key points stand out and resonate. Percentages near 200 percent in CSS for stylesheets useful for the presentation of web pages really can lead to improved more readable also legible text on a mobile handset or smartphone.
What is Ciscopedia? It is a compiled Windows help file a dictionary of Cisco router commands that makes little sense and the original form of onscreen technical help information for offline systems - Cisco routers power the backbone of the Internet the really high-speed fibre optic light-guided data signals. Digital skills education really vital for the age of Scottish Smart Cities which is now
Ciscopedia is a compiled Windows help file with file extension dot chm. Compiled Windows help file is the original form of onscreen help information - really suited for an offline world and was used to provide help to computer users before the online world really took over.
Ciscopedia actually was included as part of Cisco's computer network curriculum delivered online - it provides lots of raw commands with descriptions around role and purpose, but really with very little explanatory text which made interpretation and understanding difficult.
Still Ciscopedia represents a dictionary of Cisco router commands - the help file can likely now be downloaded from the Internet, but still mystery often surrounds Cisco and the commands used to configure Cisco routers.
Type in specific technical information into Google search and the result is short definitions in summary form at the top of search results pages - information provided can evoke great meaning, but sometimes the information is wrong, inaccurate - this is bad information and misinformation stems from the circulation of the bad, inaccurate information.
The role for intelligent humans is to make sense of technical information from abstract form and put it into user-friendly information others can understand - basic child-like langauge can really help young people to make sense of advanced technical topics.
Cisco training materials are often written likely by engineers and the language used may not be the clearest in a true sense. Using simple langauge and breaking topics down really can broaden access to education - teach complex technical topics. So really sharing information can be powerful but also using simple easy-to-understand language can really pay dividinds for progress with technological innovation.
Cisco is really one of the world's greatest companies, a visionary, the company that built the router for the backbone of the Internet all the high-speed links where light-guided fibre optic cables connect through sending data signals - terminating fibre optic cables is complex, requires special equipment as well as knowledge.
Terminating cables refers to the end points of cables, because multiple contiguous cable segments often combine under the road network to form a high-speed network backbone, but cables are also under the Atlantic ocean - Royal Naval personnel work to repair undersea Internet cables as well as provide aspects linked to defence.
Continguous cable segments with Ethernet historically could in absolutely no way not be any longer than 100 metres - Ethernet networks are local area networks often confined to buildings also small to medium sized computer networks in a given locality or local area.
Short cable segments likely gave network engineers great problems troubleshooting cable problems throughout buildings.
Wireless technology and networks give more freedom, but wireless networks can be slower in speed and there are more security issues in a sense - think warchalking driving around communities looking for open WiFi networks.
Warchalking really done away with thanks to BT Openzone and the ability for BT customers to be able to log-in on the BT routers of other BT customers - big expansive BT network of routers.
Still BT Openzone access points as routers can be unreliable as a network in practical reality - really more publically accessible WiFi network hotspots is better also 5G masts are also better where individuals can access mobile data at a fair rate also price point - roaming for mobile data around Europe can incur high charges or tariffs.
British Telecommunications is the big telecoms company in the UK, but the landscape is more compeitive with other small network operators think Three the small mobile phone network - PlusNet sprung up, but BT made an acquisition and took over PlusNet making BT the owner.
Significant to note here most BT landlines historically been made from copper cables these are what go to homes - copper like nikol and iron ore are rare Earth minerals, difficult also expensive to extract and really not suitable or sustainable for long-term extraction. Fibre optics light-guided signals more high fidelity is really future proofing the data network to converge audio and video signals - this means digging up roads, more roadworks in Aberdeen the oil capital of Europe. Electric vehicles also more sustainable long-term - Nissan Leaf electric vehicle developed in 2010. Electrification of motoring is the future. This may mean more localised travel in the future - really a need for innovation and for young people to be smart and clever. Digital skills education is really at the forefront of advancing technology, but most primary teachers in Scottish schools may not actually have the knowledge and skills to do the training for a high-tech future world.
Scottish charity Computers and Integration really recognises the importance of integration with computer technology and how it is part and parcel of life nowadays in Scotland.
Really Cisco network computer training has used online eLearning for over two decades really since around the time of the new millennium or the year 2000 giving learners a chance to take their time with learning, pause and digest content.
Scottish schools and teachers really lag far behind in best practice for teaching yet teachers enjoy the perks of Council funded jobs often safe jobs. Councils invest less in innovation than business and industry - this is why RGU Aberdeen's Robert Gordon University likes to strethen its links with the business community, this is also to help graduates land jobs in a competitive marketplace.
E-learning not a new concept - the open University first major University to make e-learning a big theme focused on distance learning to really cater for those immobile persons give them a fulfilling ambition when at home either with physical disabilities or parents looking after children.
The concept of distance learning really founded to empower education and Cisco an early pioneer in both e-learning online course material delivery as well as Internet instrastructure equipment maker.
Cisco really had the bold vision for convergence with digital technology - 20 years ago around the year 2000 when the millennium child was born and when Sir Cliff Richard released the Millennium Prayer based on Auld Lang Syne, Voice over Internet Telephony or VoIP was much hype much talked about - Skype calling software really made it for free over the Internet and Microsoft went for an acquisition bought over Skype incroporated it, included it or bundled it in Microsoft products - Microsoft bundled Internet Explorer into Windows for competitive advantage, a dominant web browser for a long time until Google Chrome based on open source software, based also on Mozilla Firefox from free software Linux - Linux always been free to inspect the computer code and copy and Android is based on Linux.
Rivals nowadays are Facebook video calling and Apple FaceTime - Apple's operating system iOS really the same as Cisco IOS Internetwork Operating System.
Cisco's IOS (Internetwork Operating System from the days when Windows ME, 2000 and XP were on the go approaching the year 2000) powers all Cisco routers, yet Cisco as a company is really relatively unknown to the average person on the street even though they likely rely and use its technology every day.
In a nutshell - Cisco is a true visionary with technology. Cisco managers often great leaders think John Chambers former CEO, and there is a need for young people to be smart, clever have ambition as well as a clear vision rooted in technology since Scottish smart cities are here now. Digital cameras being added to traffic lights - open loop versus closed loop control for traffic signals on the go during 1998 Computing curriculum. Closed loop control uses feedback and motion suitable and necessary for self-driving automated cars think the Google smart cars that are often driven without a driver.
Border Gateway Protcol is a routing protocol for independent or autonomous routers to exchange topology information - three main routing protocols used on the Internet are distance vector, link state and path vector. OSPF is a link state routing protocol that calculates best path most efficient route for data transmission and OSPF updates exchange topology information with nearest neighbours
Border Gateway Protocol can be configured on Cisco routers, which are the backbone of the Internet - also Open Shortest Path First or OSPF is another routing protocol, the best path protocol for sharing topology information in the most efficient manner.
BGP Border Gateway Protocol is a distance vector routing protocol. It really enables the exchange of routing information - topology information for the networks associated with a router - between independent systems also known as autonomous systems.
Routers talk to one another - routing protocols enable the machine to machine communication or exchange of management data packets for a network.
Distance vector routing algorithm simplifies the routing process by assuming the cost of every link is one unit. This means or translates to the efficiency of transmission being measured by the number of links to reach the destination.
In Distance vector routing, the cost is based on hop count. Hops refers to routers linked or interlinked in a chain also a network - routers generally connect to one another filter or forward data packets onto a destination computer as well as send neighbouring routers management information on the connected networks - this is topology information often sent using routing protocols think RIP Routing Information Protocol the basic one also RIP version 2, BGP also EIGRP, IGRP and OSPF. These are all the main routing protocols that are in existance and used with Cisco routers on the backbone of the Internet, a network of networks.
From the Router(config)# interface screen, type in router bgp 120 to enable the Border Gateway Protocol for autonomous system 120.
Again from the Router(config)# interface screen, type in network 192.168.1.0 where the numeric dots represent the IP address of a network - change as appropriate.
The show ip route command displays all available routes or paths in a router also the networks a specific router knows about or has learnt about. Neighbouring routers in a heterogenous Internetwork learn about other networks with the aid of small, efficient management updates or information exchanges using routing protocols.
When a data packet comes in on a network link, the router reads the network address information in the packet header to determine the ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey.
Data packets are sent unordered across a network - reassembly of data packets in a split message is possible by a router reading header information in a data packet, basically each packet have flags in the header information, the real message is known as payload data.
Three main types of routing protocols used on the Internet - distance vector, link state and path vector. OSPF is a link state routing protocol - topology information for linked networks exchanged with nearest neighbours.
OSPF (Open Shortest Path First) routing protocol enables complete knowledge of a network topology - all neighbouring routers can calculate best path through the network - the optimum path, the most efficient path for data transmission.
show ip ospf command displays status information of running OSPF processes.
OSPF link state best path routing updates a flooded throughout a network, so all neighbouring routers becoming aware of all networks connected to the routers involved in the exchange of management router updates.
OSPF does not use TCP or UDP transport protcols, so the OSPF routing protocol reproduces or replicates data in every data packet transmitting much redundant information. OSPF is a routing protocol with significant overhead in respect of management updates conveying topology information for connected or linked networks to a router and neighbouring routers.
From Router(config)# mode, type in router ospf 1 to enable ospf routing protocol.
From Router(config-router)# mode, type in network 192.168.1.0 255.255.255.0 area 0 - change for your own IP address and subnet mask for the network you are trying to configure for use with the router.
The area part of the command above is just a means to classify networks into a given area or cluster in a sense.
In a path vector protocol, a router does not just receive the distance vector for a particular destination from its nearest neighbor. Instead, a network router receives the distance as well as path information.
Distance is known as a metric in a network - the other main or major metrics include jitter, packet loss, throughput, packet reordering and quality of service. Packet reordering really symbolic of the fact data packets are often small with header or control information with addressing information and payload or message data - also packets sent and received in unordered data packets, packets sent in segments.
Jitter - The lower the speed of the connection the higher the latency or network delay. The more people using a connection, the greater the degree of jitter - more users equals more congestion so jitter really indicates a delay in data transmission.
Add a password to a router also reset passwords - also Set a Cisco Internet backbone serial router interface using the ip routing command and also within that use the interface command to assign an IP address also a subnet mask to a router link, interface or port - also make an interface active come alive with command no interface shutdown - also add description text to a link to help others to understand
Cisco routers can be secured for admin access using a password using the command enable password followed by a password. This is a simple means to add a password to a Cisco backbone Internet router. All router admins will need this password to log into a particular router that has been password protected - important to circulate passwords among admin personnel responible for a router within a designated area. A group of people may be responsible for a collection of routers within a small segment of an Internetwork.
The enable secret command followed by the password set using enable password is used to enter the enable mode. enable password command sets a password for a Cisco router once and enable secret followed by the password enters enable mode - this enables a Cisco router for configuration, puts it in the global configuration state or the main state where all other commands are entered to configure a router.
The command no enable password removes a password from a router, but to remove a password when you do not know a password, there is a password recovery procedure to follow. Different router makes and models tend to have a different procedure with varying help offered.
The passwd admin command from the main root Router prompt when the router is switched on or powered on and after brief start-up instructions loaded from flash NVRAM memory enables a new password to be set. passwd admin followed by a new password sets a new password on a router. The passwd command can also be used on Linux systems to set or change a password for a user account.
Cisco routers have what is known as flash memory - NVRAM or Non-volatile RAM, memory that does not get erased when routers are powered down or disconnected.
Routers are configured via console ports connecting via Aux or Auxiallary ports via Telnet mode connections.
The ip routing command on a Cisco router from the main global configuration mode marked as Router(config) enables a router to perform its core function to route, switch, filter or forward data packets entering from one router interface or port and switching a data packet to the most appropriate port based on its destination address.
The interface command identifies serial interfaces or router ports for advanced configuration such as to set an IP address on a router interface or port. Router interface ports can be ethernet or serial, but usually when the interface command is used, the first ethernet port for a local network is set for configuration as interface ethernet 0.
Interfaces or ports the points that link to cables for example are identified as numerical numbers going up in increments - a router can have multiple interfaces since routers are like roundabouts, for example to configure a serial port or interface type in the command interface serial0 for the first serial ports.
Parameters can be added to the interface command to really configure a Cisco router - two options are point-to-point and multipoint. Most connections over the Internet actually are point-to-point - this signifies two end stations connecting and sending data through an Internetwork with multiple routers where the rules of operation are TCP/IP.
Point-to-point links usually use Point-to-Point Tunelling Protocol on the worldwide Internet to connect computers over a telecommunications network, a protocol is just a set of rules to control or govern data communication ensure the two or more computers that engage each other speak the same language.
From an interface configuration mode represented by Router(config-if), type in ip address followed by a numeric ip address and a subnet mask. For example, ip address 192.168.1.0 255.255.255.0. The subnet mask used in this example is for a private Class network with around 254 hosts or computer on the private network.
Usually assigning an IP address and a subnet mask to a router interface or port is standard - the command interface no shutdown brings an interface up, puts in an active state ready to send and receive data across a network of networks or the Internet.
Interface configuration mode represented by Router(config-if) - the standard router global configuration mode is represented by Router(config). Note the key discrete differences between router modes - it is important because depending what mode you are in, it affects the commands available for entering as part of router configuration.
Interface commands are different from global router configuration commands. In the main Router(config) or global configuration mode, the interface command changes the mode to Router(config-if). The command interface serial0 does specify serial interface 0 the first serial port as active for configuration or set up.
In the Router(config-if) or interface configuration mode for a particular interface, type in description and then a text string, logical text that identifies the purpose of a link. Adding meaningful text can really help others, other admins responsible for the same router in an Internetwork.
Within the Router(config-if) command mode for configuring an interface, type in for example bandwidth 1540. This sets the bandwidth for a link to 1.54 megabits per second. Link speeds can vary - much faster link speeds are in common use these days.
The RIP routing protocol or set of rules that enables an individual router to learn about neighbouring routers, other networks and paths through an Internetwork - also RIP enables a router to tell other routers and share information about its connected networks
The router rip command is entered in the general Router(config) mode of a Cisco router - this command begins the RIP router process. The no router rip disables the RIP routing protocol. RIP is a routing protocol and the set of rules that describe how routers exange information with due regard to the networks each router links to. The RIP routing protocol is used to help connected routers in a network learn about other networks. In a nutshell, the RIP router process is a network learning process for connected networks within the same logical area or group also clustering of an Internetwork.
When the router rip command is entered it enables the RIP router process, a basic routing protocol with a metric of hop count. Hops measure all the routers in an Internetnetwork - in essence one router is a certain number of hops from a distant router. Hops is just a way to count all routers in a network or over a backbone link. The tracert command in Windows 10 version ten Command Prompt can be used to trace points of failure in a network isolate routers causing problems or connectivity issues alongside the ping command to test the responsiveness of each router (type in cmd in a Windows 10 search box to access Command Prompt).
From the Router(config-router)# screen (the RIP mode), the networks linked to a given router (the router being configured) are thus entered from the RIP router configuration mode.
From Router(config-router), type in network network-address so something like network 192.168.1.0. The network command is used to add all networks connected to a specific router to its routing table. A routing table on a given router is really a map of all networks or all learned routers a router knows about. Each router is aware of local networks directly connected and local routes to other routers out of its interface ports.
show ip route command shows a router's routing table - lists all directly connected networks as well as all paths or routes to other neighbouring routers. Really the show ip route command shows paths through an Internetnetwork from the perspective of an individual router - routers running the RIP routing protocol can learn new information from other routers about other networks that are alive and active are neighbours in a sense in a given area. Worth bearing in mind that the Internet is made up of multiple routers and switches - the Internet is vast.
Education on Cisco router configuration can broaden awareness about how the Internet works also how routers work at the high-speed backbone level. This can accelerate Internet development, encourage and inspire young minds to go into roles associated with router configuration and network design and management. Education must always come first to really lead the pace of change and Internet development.
What is true or accurate - Art or Science? Nowadays work is more real in shared digital format since the act of sharing enables great many witnesses but there is Aberdeen Art Gallery - Computer program constructs also known as logic in a sense - sequence or series, selection or choice and interation repeat again - repeating until it makes sense can help learners cram for exams
Aberdeen Art Gallery after revamp opened early on 2nd or second November 2019 - see BBC News Aberdeen Art Gallery reopens after £34.6m revamp or see https://www.bbc.co.uk/news/uk-scotland-north-east-orkney-shetland-50263849
Hanging paintings on display is still different to online only exhibitions - real people can gather and mingle to discuss portraits for example, become inspired - there is Aberdeen Art Gallery but there is also the Tait Modern. People can collect paintings, hang them up in their home, their office - some paintings can be worth a lot of money, become traded and antiques become worth money. The BBC has its flagship TV programme The Antiques Roadshow presented in modern times by Fiona Bruce also Crimewatch presenter. Artistic works such as paintings can be photographed and shared on online media for appreciation by more people.
The revamp of Aberdeen Art Gallery was years in the making and beside it the Cowdry Hall was built with chairs belonging to residents of Aberdeen who sadly passed away - Aberdeen City Council asked the public if they wanted to dedicate a chair to a loved one and pay 150 pounds sterling.
Aberdeen City Council running short of money asked the public to provide memorial chairs to complete the revamp of the Aberdeen Art Gallery - the chairs are single chairs with an inscription of loved ones who sadly passed away, not benches and the Cowdry Hall adjoining Aberdeen Art Gallery can be used for concerts.
What is true or accurate - Art or Science? Nowadays work is more real in shared digital format since the act of sharing enables great many witnesses. For young budding artists who draw or paint canvasses, really taking photos also videos and sharing online can showcase their artistic work and creative endeavours. RGU Gray's School of Art at the RGU Riverside Campus along the banks of the River Dee does have a degree show for student work for students coming close to graduation. Students making their work available to others is really a centerpiece in getting discovered - this is how talent gets hired in the job marketplace.
The scientific community surrounding physical sciences such as biology and chemistry has peer review, but actually the discipline of computing is very technical even though developments can be fast paced in the computing sector but slow to roll-out in the wider communitity and to local places where people live.
Computing being very technical in nature actually serves very well to prevent corruption of people in a very real sense to an extent. Computing systems are generally independent - video evidence is certainly objective and without prejudice when videos can be confirmed to be real and genuine in the real physical world out and about by the presence of multiple people, also places and defining landmarks. Individuals can have conflicting points of view - also witnesses can see events from different angles, tell stories at a later date from a different point of view.
Computer programming also known as software deveopment is defined by three main constructs - actually the Matrix film triology series introduced the idea of constructs.
Really the film The Matrix with also EMI Electromagnetic Interference was at cinemas first around 1999 and perhaps it was intended to spark curiosity in computer programming.
The film famous for special effects might be what has given rise to all the smartphone and tablets apps on the market today in July 2022 in the Apple App store and also on Google Play.
Computer programs can loop - the looping nature is what enables repetition, the same instructions or block of code repeated.
Looping enables repeating also reuse of code, indpendent blocks of code so this is why computer programs are modular.
Modular engineering is often more efficient enables assembly of objects built in parts - need for assembly when items are built in parts also called modules.
Sometimes reassembly and disassembly may be necessary - reassembly useful for multiple items that are built the same or to exact specification.
Buidling items to specification is really how physical items are mass produced in an efficient manner.
Loops often controlled with the logic sequence while do in computer programming. Loops coupled with programming logic can give rise to the perception of artificial intelligence.
Really all computer code is written by humans and often in independent blocks of code that are isolated in modules may be called procedures or functions, so computer programmers need to work together.
Traditinally Pascal was the programming language used in education, Cobol for business - Java runs set top boxes also TVs such as Virgin Tivo and also Sky Q the multiple channel recording service, Sky HD started with ability to watch one TV programme, record another, but now Sky boxes and Sky bosses really do enable more channel recording simultaneously - this is the couch potato junk food lifestyle think I'm a Celebrity Get Me Out of Here also Embarrassing Bodies and Naked Attraction where women can decide which men to date by looking at the size of their penis. Some programmes really are not worth being broadcast.
Java software is platform independent, requires to be compiled before it can be set up or installed or run.
Combining modules or functions also procedures may produced intended and unintended could not be foreseen issues, consequences and unforeseen problems - need for debugging also testing. A typical software development life cycle is Analysis, Design, Implementation, Testing, Documentation, Evaluation and Maintenance. Really there are seven main stages - the process from Analysis to Maintenance of code is iterative in a sense, also known as do it again and repeat. For example, the maintenance stage can involve going back to the Design stage of creating a computer program, a software application or an app for a mobile smartphone or tablet.
Selection another key construct also logical nature of computer program code - this is usually signified by If then statements. Basically If a condition is true, then do something - also else statements can be used for when a condition is false. These statements usually found in computer programming logic known as selection statements also referred to if then else.
Iteration is also a part of looping in computer programs - computer programs may involve procedural steps executed in sequence or in a series but independent blocks of code can loop be performed again - even time and time again in a repetitive pattern. Repetition is part of iteration in a sense, but the software development lifecycle is iterative in a sense where programmers go back along in stages to make improvements, for example after coding the core implementation stage a programmer may go back and make tweaks to a program's design.
Iteration and repetition is also useful for learning something new - video enables playback and allows slower learners to go back and replay content until they understand it.
Breaking down content explaining can help others to understand technical topics and also widen talent pools leading onto an uptake in those with an interest in computing.
Those that start off learning from a website, may go on to study at a technical vocational College also a University to further their understanding and gain recognised qualifications.
Jobs do tend to demand candidates are qualified - some jobs demand an HGV license also some jobs require drivers to know how to drive a forklift truck which has an hydraulic arm much like the mechanical hoists that are automated on the back of vehicles that transport disabled people confined to wheelchairs and also mechanical hoists are also found in hospitals to help the old and infirm.
Computer program constructs also known as logic in a sense - sequence or series, selection or choice and interation repeat again - repeating until it makes sense can help learners cram for exams
- sequence is the order in which instructions occur and are processed.
- selection determines which path a program takes when it is running.
- iteration is the repeated execution of a section of code when a program is running.
Events can be timed and it is a great challenge to produce timely visual information also video even Google cannot do it with their StreetView cars - photos are often 360 and immersive but they are static images
6th July Summertime 2022 raining outside, grass cutter on Westhill Golf course and poets for centuries have written about events described what has been happening. There was the most famous one Robert Burns but there was also Robert Louis Stephenson and also Robert the Bruce - the latter not a poet or writer.
Grass grows longer in the Summertime and rain helps fertilise the grass, so really environmental services are seasonal or have been historically the case. Times are actually changing, more winter storms of high winds means fallen tress. Storm Arwen on 26 November 2021 across the North-East of Scotland was devastating - Councillor Hasson of Haddo Country Park admitted it will take a few years to restore order.
The big issue of the day is that there are not that very many environmental services being advertised as jobs in real times or real terms by Aberdeenshire Council and this is the reason for a slow clearup operation, yet many people like woodland walks.
Time marches on - observations and reflections can promote learning of lessons chart a better future path or a more positive trajectory.
Universal access to education, healthcare and training are usually great ideals rooted in equality. Free prescriptions for older people get handed out in Scotland, also students get tuition fees paid for them for going to University for free courtesy of the Students Awards Agency for Scotland - English students have to pay and all English Universities charge tuition fees. International students pay a premium to attend Scottish Universities - really it is foriegn students that pay most or contribute the most to the salaries of academics, yet foreign students have additional barriers have to cope with possibly a different language even though English is spoken on International Space Station.
Forign students and foreigners in Aberdeen Scotland's richest City can be made to feel unwelcome.
BBC News Fuel protests cause traffic queues in Scotland from one day ago so presumably yesterday 5th July 20222 - see https://www.bbc.co.uk/news/uk-scotland-62037018. The timing of events is quite important - blockades by tractors in the morning can really make people late for work. This can impact a delicate balance - students at Universities usually have to do coursework to meet deadlines. Student deadlines is synonymous with being under pressure at work - having to do a job, perhaps serve customers.
Retail outlets and restaurants have to serve customers to everyone regardless of colour, disability or creed - abuse can happen, foreigners may be more likely to face abuse looking foreign in apperance - language differences and dialects can give the game away.
Last year, the Scottish Parliament introduced the Protection of Retail Workers Act 2021 to try to discourage abuse.
It is an important law worth mentioning, but actually it could divide or segment also seggregate society further because other professions of workers often do a job that is just as important.
Really laws targeting professions and particular sectors actually divides society in a very real sense - could make someone feel their contribution is not valued.
Nowdadays information is a commodity, people can make decisions based on information - visual information can really inform lead to better decisions.
It is a great challenge to produce timely visual information even Google cannot do it with their StreetView cars - photos are often 360 and immersive but they are static images.
Really those that work for traditional print news publications should really put more effort in to focusing on what is actually happening referncing photos and lifelike video a visual medium really intended for high-speed fibre optic networks guided by light signals, try to find positive stories, dig deeper, find out what certain professions do day-to-day on a daily basis to inspire young people to want to do a job role in a particular line of work or industry.
Transmission Control Protocol basis for Internet data trasmission uses SYN for synchronisation to help make Internet communications more reliable with less errors and Cisco routers have a clock rate command - really teamwork vital within neighbouring areas of an Internetwork to make Internet communications more reliable with less errors
Cisco routers which are often the main link on the backbone on the Internet have a clock rate command to enable clock timings really to be set. Clocks might enable synchronisation of signals in Internet communications, but actually the clock rate on a Cisco router is not actually linked to time in a very really sense not the standard 24 hour clock we all know which is also linked to timezones.
Well clock rate might be linked to time since it helps to keep signals in sync or in synchronisation helping real-time systems to work normally in an optical state - keeping signal synchronisation actually is really important and vital for real-time systems where real-time information is relayed across the world by way of the Internet. Transmission Control Protocol has a SYN flag or bit - end to end connections by way of the Internet start off with a three-way handshake for reliable data communications.
SYN for synchronisation used also with ACK for saying thanks acknowledging a data transmission. The world now depends on the Internet and real-time information really fundamental for future hi-tech air travel - last year 2021 saw an all-electric plane deliver parcels to Scottish islands as announced by BBC News. It is really a test flight for electric aircraft.
The clock rate command setting in a Cisco router is useful for linking or connecting routers in a lab environment - useful to help students learn more about Cisco routers and computer networking.
Clock rate sets how many bits can be sent over a networked link in a given timeframe. If the clock rate is set to 64000, you will never be able to send faster then 64 kbs over the interface. The rate of modems actually was 56k - some users may still remember dial-up modems often they made a noise when dialling to the Internet. Broadband and ADSL modems was an advancement on traditional 56k modems which really started off Internet connectivity in most homes in Scotland.
The command show controller identifies the specific end of a cable plugged into a Cisco router - this might aid fault finding also troubleshooting help in the repair of cabled network links connecting to routers and also prevent user frustrations with network downtime also failues involves cables on the backbone of Internet the real high-speed fibre links where light signals penetrate or travel through the cables.
Use the clock rate (or clock rate) interface configuration command to configure the clock rate for the hardware connections on serial interfaces to an acceptable bit rate. Use the no form of this command (no clock rate) to remove the clock rate if you change the interface from a DCE to a DTE device.
A data circuit-terminating equipment (DCE) is a device that sits between the data terminal equipment (DTE) and a data transmission circuit. It is also called data communication equipment and data carrier equipment. Usually, the DTE device is the terminal (or computer), and the DCE is a Cisco router.
A transmission circuit is a network such as the Internet a packet-switched network.
DCE is a router terminator of a circuit (the device that filters Internet traffic, forwards data packets out the most appropriate interface or port onto network links choosing a link in the process) and DTE is a computer - computers are terminals (dumb terminals referred to Citrix for example really dumb as in light user activities with most processing on a server computer).
Using the no form of this command on a DCE interface such as a router sets the clock rate to the hardware-dependent default value. bps (bits per second) values are physical-layer dependent (for example RS232 or V.35).
Officially, RS-232 is defined as the Interface between data terminal equipment and data communications equipment using serial binary data exchange.
V.35 is an ITU International Telecommunications standard for high-speed synchronous data exchange. Asynchronous links on the Internet are actually more common where rates are variable - this actually is what leads to the occurance of more errors. This is what makes data transmission error prone and Cyclic Redundancy Checks enable error checking on file integrity for example after file download.
Asynchronous Transfer Mode is an important WAN or Wide Area Network technology that involves or makes use of frame encapsulation. Data packets get encapsulated in frames at the lower levels of the 7-level Open System Interconnection model often used in computer networking to help others understand teach computer networking principles. Education is usually at the forefront of technological advancements.
Asynchronous Transfer Mode is used with time division multiplexing - fast fibre optic networks with light-guided signals use wavelength division multiplexing. Being able to fine tune wavelengths actually has advantages with due regard to data integrity and high fidelity signals. There is a trade-off actually fast fibre networks enable ability to send data again persist versus errors in data.
Really understanding clock synchronisation is at the heart of making data sent and received by way of the Internet more reliable, better data integrity with less errors. The Cisco clock rate command and keeping clock rates the same across logical parts of an Internetwork is fundamental to improving data reliability with less errors - really co-operation and teamwork is really important.
Clock rate measured in bits per second or bps - the bit is the most basic unit using in computing on computer networks represented by two binary states zero and one.
Clock rates can be set on a Cisco router using the following values - 1200, 2400, 4800, 9600, 19200, 38400, 56000, 64000, 72000, 125000, 148000, 500000, 800000, 1000000, 1300000, 2000000, and 4000000.
Higher clock rates obviously result in more bits per second being sent in a smaller time frame - data packets usually unordered when sent and received with header information in the actually data packet as well as payload data the actual message sent across a network, need for reassembly making higher bit rates uncessary in practical reality.
Important to be able to check on router the default gateway status and detect when links are down, fix cables, troubleshoot, replace failed routers - wireless signals can involve greater signal attenuation or more delays - real-time systems such as the banking network involve real-time changes to financial information so clock timings being in sync fundamental
Cisco big tech company makes routers for the backbone of the Internet.
Main mode for router configuration is known as the global configuration mode.
show ip interface followed by an interface could be represented by int0, int1 for example so command is show ip interface int0.
show ip interface useful to check on the status of a router's interface from Cisco's global configuration mode - when the link is up, working and active or whether the link is down and not working. Link failures can be caused by broken cables need for cable testers also finding cable faults difficult and repairing cables more difficult than wireless a real physical demanding job - failure of routers on the backbone more likely when computers are connected by wireless means - routers main connection devices no cables linking routers to wireless connected computers, but computers connected via wireless have wireless network adaptors either PCI / PCI Express which can fail with a unique the world over MAC (Media Access Control) address linked to a computer's motherboard or as wireless USB dongles. PCI slots bigger and white - PCI Express really smaller slots more representative of embedded computing as part of modern desktop computers.
Wireless connected computers usually slower to access the Internet than wired computers and with this signal attenuation is greater over wireless links hence the delays NASA engineers really experience when communicating with rovers on far away worlds such as Mars.
Links and networks can and do fail also go down but then there is downdetector.com to monitor the status of downtime affecting mobile phone networks.
Web monitoring also alerts is really useful - network administrators really being alerted to network issues in a timely manner is actually important to keeping users happy, productive also and also this is also fundamental to business profits and ongoing success in business for telecom and broadband provider firms also same applies to mobile networks such as Three, Everything Everywhere and O2.
Cisco router interfaces can have a status of Ethernet usually eth0 for short, but also null (or no active link), serial, token ring and so forth. Cisco router interfaces normally serial but aux or auxiallry links are used for telnet connections and for remote control or log-in to routers for admin purposes.
Cisco routers usually found in enterprises on the backbone of the Internet - young people though do usually learn at home in an Infrastructure mode network with a home router as an Access Point, which is also the central point in a network that links computers together shares an Internet connection.
The sole purpose or the primary also fundamental purpose of a network actually is to share resources - such as an Internet or Net connection, also print devices (Apple Air printers actually enable printing over WiFi from iPhones and iPads). This is wireless printing.
Files can be shared between computers - networks enable back-up of files from computer to computer easier and Linux back-ups were usually scheduled as cron jobs - Windows 10 version ten forms a HomeGroup for a network of computers and there is an option for usernames and passwords this is authenticated access to resources based on priviledge. Confidential information is usually secured with usernames and passwords such as medical information.
Significant to note also the default gateway line represented by ipconfig/all in Windows 10 command prompt launched or opened by cmd command in Windows 10 search box gives the IP address of a router, even a home router. The address of a local router for a home network is usually an IP version 4 four address, not the 128-bit IP version 6 long winded IP number. Type in http://192.168.1.254 or the IP address that represents the default gateway in ipconfig/all to access the router admin interface for a typical home or office router. The IP address maybe http://192.168.1.1 and also the exact number can vary - it may also be http://192.168.2.1 but the main point is the default gateway line in the command ipconfig/all sheds more light pinpoints or tells the exact specific address.
Cron is a job scheduling utility present in Unix like systems. The crond daemon enables cron functionality and runs in background. The cron reads the crontab (cron tables) for running predefined scripts. By using a specific syntax, you can configure a cron job to schedule scripts or other commands to run automatically.
Shedule a cron job - this uses a script to automate back-ups of data, often it is more efficient to do back-ups during the night when minimal server activity is taking place. System maintainance of banking services such as that used by RBS the Royal Bank of Scotland is done in the early hours of the morning - if you try and log-in to mobile or digital banking at the time, you will likely be unable to due to system maintenance. System maintenance for banking systems can be automated however - banking systems are known as real-time computing systems where information, really key financial information, changes in real-time or very quickly. There is a need for clock timing synchronisation between multiple Automated Teller Machines for example and the network of ATMs is vast at present.
Daemons are usually responsible for services in the Linux world for example computer server services - a server provides services to a user, online services in an Internet connected world. The httpd daemon is used for a web server such as the popular Apache web server - Apache really is the most popular web server on the Internet, more popular than Microsoft's Internet Information Services.
Linux daemons absolutely no relation whatsoever to Daemon Internet, a company that provided Internet services in the UK - the company actually has gone by the wayside. Companies can go bust and actually the technology industry is highly competitive. The fierce competitive nature drives on improvements in services for the user, but young people do need to keep a digital skills portfolio so their skills development is tracked long term and fosters ongoing continuous improvement as well as career progression.
Minority report futuristic film about punishing people putting them to sleep before causing harm taught the world about false positives with advanced smart technology and how it is possible for mistakes with computer systems stemming from errors in data - Google search works well to give definitions for technical terms when students understand broad concepts from studying
The film Minority Report with Tom Cruise was futuristic about predicting the future really sentencing people putting them to sleep before they committed a crime. It was based on preminations from really special people that could predict the future, see what was coming in advance before it happened.
The film really brought the attention of the world false positives with smart hi-tech sophisticated technology, where anomalies were possible. Really mistakes are still possible with hi-tech smart technology based on algorithms (rules or interlinked procedures) because no matter how smart technology, there is usually human input with human interpreation also - in software development and systems there are IRQ Interrupt Requests to notify system users to issues, problems and concerns also errors.
IRQ interrupt requests are also linked to stored memory locations and memory leakages - in the early design of processors from Charles Babbage which modern ARM processors are designed from for mobiles and tablets which use NAND non-volatile memory which keeps data when the power is off, processors from the early days were designed actually to perform calculations also to store data in memory buffers and locations - also referencing or accessing the stored data.
Human analysis and intelligence is important - actually memories in a sense are not reliable and everyone is forgetful, but at the same time what one has learnt from study for example at University can be easily forgotton, but University study is really about learning broad concepts to help students to cope with life, also make sense of events and also understand technical subjects, learn how to move forward, develop understand, innovate and be creative.
Even with technical vocations, and with technical subjects, really Google search works best when users are specific with queries. This is really linked to the indexing of key words or search terms which is linked to the computing discipline of information retrieval - indexing all the world's content from Google's perspective is energy intensive, requires clustering or grouping of web servers and multiple redundant links for load balancing network traffic.
Specific queries interacting with Google search for technical terms, can reveal useful, short and snappy definitions for technical terms - combine Google definitions with understanding from previous study including concepts and also with communication it is possible to provide great educational material to help others, train up others.
The Internet of Things first unveiled at the Consumer Electronics Show at Las Vegus and convergence of multiple technologies
The goal behind the Internet of things is to have devices that self report in real-time, improving efficiency and bringing important information to the surface more quickly than a system depending on human intervention.
Significant system alerts when problems arise are important bringing events to a user's attention quickly in the forground.
Self-learning smart connected computer systems with automatic reporting of events and incidents to a user by mobile device or by smartphone is really what the Internet of Things represents.
The fifth industrial revolution is dawning upon the world in unforeseeable ways with Internet Protocol version 6 six taking centre stage more public IP addresses available - longer addresses too creating more addresses with capability to connect more devices than ever before.
IP version 4 four was becoming exhausted - IP addresses becoming limited.
As we increasingly rely on Industry 4.0 technologies including Artificial Intelligence, Big Data including crunching big data and big number crunching, the Internet of Things (IoT), digital platforms, augmented and virtual reality, and 3D printing. Smart specs is augmented reality and it is really animation.
The plan for the Internet of things is to connect all devices including washing machines, microwaves and ovens with LCD panels with information presented to the user for example cooking information also the ingredients of food that is cooking.
Convergence of multiple technologies is a big theme in the Internet of Things - WiFi, cellular think 4G also are important digital technologies for connectivity.
Smart watches which measure heart rate count steps taken also, Smartphones also bring together or converge phone calling, messaging as well as sending video and photos over the air or by wireless means whether via WiFi networks or via mobile data.
Voice over Internet Protocol enables phones calls over wireless networks without the need for a mobile contract with a mobile network service provider.
The primary function of IPv6 is to allow for more unique TCP/IP address identifiers to be created, now that we've run out of the 4.3 billion created with IPv4. This is one of the main reasons why IPv6 is such an important innovation for the Internet of Things (IoT).
Cisco actually predicted in 2002 IP version 4 or four would run out and spoke of the need for IP version 6 six - Cisco was well ahead of time actually and had foresight and vision to speak of convergence. That was the vision of former Chief Executive of Cisco Systems, Inc John Chambers.
IPv6 uses 128-bit addresses, allowing 3.4 x 1038 unique IP addresses. This is equal to 340 trillion trillion trillion IP addresses. IPv6 is written in hexadecimal notation, separated into 8 groups of 16 bits by the colons, thus (8 x 16 = 128) bits in total.
The IP version 6 six namespace is vast - it is not going to run out any time soon.
Chuck Robbins is currently the Chief Executive of Cisco Systems in July 2022.
The need to support IP version 6 six led telecoms operators such as British Telecommunications in the UK to upgrade and replace routers in the homes of customers - it was an expensive undertaking. BT has actually partnered with Finish firm Nokia to make routers for customers with 5G technology phasing out reliance on Chinese firm Huawei with EE or Everything Everywhere.
29 September 2020 BBC News Nokia clinches 5G deal with BT to phase out Huawei's kit in EE network - https://www.bbc.co.uk/news/technology-54337759
Britain and India have long had strong links and there is the Indian Institute of Technology in Bombay - https://www.iitb.ac.in/
From the website of Indian Institute of Technology in Bombay - The Ministry of Home Affairs (MHA) has setup the Indian Cyber Crime Coordination Centre (I4C) to strengthen the capability of prevention, detection, investigation and prosecution of cybercrimes, in a coordinated and comprehensive manner. The Ministry on August 30, 2019 has operationalized the National Cybercrime reporting Portal, which provides for a centralized mechanism of complaint reporting by citizens relating to cybercrime.
Interrupts in software development - Windows 10 uses interrupts to alert users to issues also concerns with failing technology with physical hardware components as well as software so that corrective action can be taken this enables real-time monitoring of critical systems
Computer operating systems use systems known as interrupts - an interrupt can alert a user to issues of concern also problems. Interrupts in a sense enable monitoring and control of events - enable problems to be tackled remedied early on. Events may include hanging freezing processes, including crucial system processes also viruses.
Interrupts core part of a computer operating system.
Interrupts linked actually to multi-tasking and the running of multiple applications running on a computer system concurrently.
An interrupt is a signal from a device attached to a computer or from a program within the computer that requires the operating system to stop and figure out what to do next.
Interrupts enable computer systems to switch tasks - also a non-reponsive or crashing program or freezing application can alert the issue with an error message using in a dialog box getting the users attention front and centre on the screen - this is really where the term interrupt comes from. Interrupts are noticeable and interrupt user activity. An interrupt done in the foreground getting a users attention against the backdrop of multiple concurrent running processes can alert a user to the failure of a critical Windows 10 system process or component - also viruses may appear as interrupts.
The average user used to often see error messages which said words to the effect do you want your computer to notify Microsoft about the problem. On a fresh set up of Windows 10 version ten, users can choose whether they want to turn on automatic notification of errors to Microsoft - the same applies on Apple mobile devices.
There are hardware and software interrupts - hardware interrupts can really tell those who monitor critical systems about failures of a physical device or hardware component.
Hardware Interrupts is an electronic signal sent from an external device or hardware to communicate with the processor indicating that it requires immediate attention.
Software Interrupts acctually appear in Windows 10 Event Viewer, the place where all errors are logged in Windows 10.
Event Viewer can be opened from Computer Management in Windows 10 version ten. File Explorer can be found on the Windows System menu in the Windows 10 Start menu. From within File Explorer also Windows Explorer the main window for viewing files, right-click This PC and click Manage to open Computer Management. Really three main events in Event Viewer marked as Critical, Error and Warning.
An interrupt request is known as an IRQ.
In a computer, an interrupt request (or IRQ) is a hardware signal sent to the processor that temporarily stops a running program and allows a special program, an interrupt handler, to run instead.
Hardware interrupts are used to handle events such as receiving data from a modem, router or network card, key presses, or mouse movements.
IRQ stands for interrupt request. Interrupts are used to perform automatic serial polling and to implement asynchronous (background) data transfers.
In Synchronous transmission, data is sent in form of blocks or frames. In Asynchronous transmission, data is sent in form of bytes or characters. Asynchronous transmission is usually used on the web for web forms where forms are limited in characters - the reason for limiting forms in characters really is to limit backend processing by humans when web forms are received and also to reduce spam messages transmitted or sent by way of the web or Internet. Messages sent over the Internet usually always go to a human on the receiving end who reads the message into to process it.
A wide-area network (WAN) technology, asynchronous transfer mode (ATM) is a transfer mode for switching and transmission that efficiently and flexibly organizes information into cells also known as frames. Transfer of data is done in frames or messages encapsulated inside a frame. Asynchronous also refers to both ends of a link at a different speed.
ATM WANs involve multimedia virtual private networks and managed services, frame relay backbone, residential broadband networks and carrier infrastructure for phones and private line networks.
Synchronous data transfer used often to transfer data blocks or segments of data quickly.
Cisco routers have serial interfaces or ports and Cisco routers control the flow of information on the high-speed Internet backbone - routers reference routing tables for default route information, key information which enables a router to know what interface to put or send a data packet out by default - also multiple routers used in the default route command provides fail safe redundant options
Routers contain routing tables which really contain navigation information - incoming data packets to a rounter interface or port get checked against rules in a routing table. Routing tables can contain network information about what to do with a data packet that arrives, and in particular where to send it to - in other words, which router port a data packet should be switched to also referred to as traffic filtering in data communications.
In computer networking, the default route is a configuration of the Internet Protocol (IP) that establishes a forwarding rule for data packets, the unit of information for a message sent over the Internet, when no specific address of a next-hop host is available from the routing table or other routing mechanisms.
The default route is a route that a router uses to forward an incoming packet when no other route is available for that packet in the routing table. Routers use the routing table to make a forwarding decision, decide what to do with a data packet and select the most appropriate router port and network link - routers can have multiple ports and some network links can have a higher bandwidth. Router ports are usually known as serial links usually called int0 or int1 to denote the names interface0 also interface1, the names of interfaces router ports with numerical differences, changes or states.
The default-route is used on Cisco routers, while the default gateway is used on hosts - a default gateway is typically the address of a home router, a gateway is an Access Point or AP to the Internet in a Infrastructure network, ad hoc networks have definitely no Access Point, there are more security issues and devices talking to one another are independent.
Access Points also home routers can function with Network Address Translation where a private network and multiple computers, hosts or network nodes link or connect to the Internet via a single publicly accessible IP address.
Use of NAT and PAT really do cut down on wasting publicly accessible IP addresses, the numerical addresses that all computers on the Internet are assigned. PAT uses port numbers and a single IP address, different ports used for a different Internet service on a computer.
A home router typically has a firewall built-in - this is a hardware firewall but computers can also install software firewalls, these are software applications.
As an example, consider a simple home router that connects your home network to the Internet. This router will have two routing rules - one for computers on your internal network, and a default route.
Router ports or interfaces can function at different speeds or rates - this affects data transmission and also data throughput, the amount of data that can be transferred through a router interface in a certain period of time.
Internet Protocol data packets or datagrams are sent unordered in segments not in sequential order (the Internet messaging service IP is chaotic really and in practical reality, routers help to provide an ordered flow of information filtering data traffic on the high-speed Internet backbone in the case of Cisco routers) - so a message must be reassembled when multiple data packets reach their destination.
Data packets sent in unordered all jumbled up segments, reordering of data packets in a standard message for example an e-mail is a complete message happens by routers referencing header information in a data packet - this is control information with also address information such as source and destination also message flags as well including control bits binary state information, payload data is the message that gets sent and received passes through a router in transit.
On a Cisco router, type in default-router and then hit Enter to go into dhcp-config mode. DHCP is Dynamic Host Configuration Protcol - DHCP is a service that automatically assigns IP addresses to computers on a network, this is a service all home routers normally do and this role is transparent to most home users. DHCP automatic assignment of IP addresses to client computers on a home network happens has background process oblivious to the average home user.
From the dhcp-config Cisco router mode, the following command line namely - default-router 192.168.0.1 192.168.0.2
The line above sets two routers which are set as the default route - basically a default route represents a router where data packets are sent or forwarded to.
Setting multiple routers using IP addresses actually provides redundancy since just having one router address may cause one problem if a router is available or is suffering downtime. Redundant routers and switches is a really important fail safe concept on the backbone of the Internet - the real high-speed links, the often total fibre optic links with the light-guided signals.
NAND flash used in phones and tablets stores data without power - Java device independent software used for the multimedia menus used in TVs - also Apple tech giant has been in a dispute over brand and name with Apple music label and Cisco big Internet router backend maker Internetwork Operating System also known as IOS has been around long before the iPhone and iPad which uses iOS
NAND flash memory used for smartphones to store data such as photos and videos when the phone is powered off, but data stored on an SD card is better in a sense this enables phones to be reset or factory resets.
NAND flash memory used in Solid State hard drives - external hard drives are usually disconnected from a computer and kept safe - good practice to keep data in another location offsite on an external hard drive.
NVRAM is storage that is non-volatile - when the power is lost data is retained.
Cisco routers use configuration files normally saved as txt or text files. Configuration text files can set passwords for Cisco routers - this is basic security but the passwords are in plain text not in cipher or code.
Config.txt is a Cisco router configuration file.
Echo string to write > output file.txt - echo has long been used in MS-DOS batch scripts. Executable setup files in Windows 10 version ten actually can be run from batch scripts to automate the installation of program setup files.
Echo is also a command on Linux systems to output text strings to the screen useful for creating shell scripts.
Shell scripts have a useful role in compiling Linux software from source code which is distributed in tarballs.
Software distributed in dot tar or tarballs is usually source code raw computer program code in open source software.
Shell scripts the native language similar to the Cee programming language actually young people focusing on learning the Cee programming language also Cee plus plus and Java would be useful programming languages.
Java software is often in set top boxes for TVs to control smart multimedia menus such as Virgin’s TiVo also SkyHD also Sky Q.
Java software is platform independent written in blocks actually. Java is an object oriented programming language.
Platform independent makes it possible to move or port independent blocks of code to other computing platforms - the core platforms are Windows, Mac and Linux.
Cisco routers use an Internetwork Operating System known as IOS - text files dot txt used for configuration files also used to contain the configuration detail also the set of instructions used to code also control Cisco routers which form the backbone of the Internet.
Apple uses iOS software for the iPhone and iPad - Cisco’s Internetwork Operating System was on the go first - Cisco big brand company largely unknown in the public eye but makes hardware devices for the backbone of the Internet.
Apple being popular and commanding has sought to exert influence, muscle or marketing dominance to really dwarf the native operating system of Cisco routers which was around first and is still an active operating system.
Apple technology company maker of the iPhone, iPad and Macintosh computer has in the past been involved in a dispute with another company called Apple a music label company representing artists and single. Apple tech giant really fought and beat the smalller rival Apple the music label.
It is often women who support Apple tech giant with its aesthetically appealing, nice graphics and user interface centred on colourful icons.
The iPhone can be user-friendly, but some people can struggle to get photos and videos off iPhones also it is difficult actually to put videos on an iPhone via data transfer - requirement to use iTunes from a computer and sync data this defeats the point of mobile.
Need also for online storage with an iPhone and iPad.
Android phones open source and with them it is easier to copy files to and from computers do data back-ups, preserve digital content also put videos on an Android phone and other content including web pages for example which makes it easier to preserve digital content, carry it around and tell stories also using video.
Media professionals mostly women and actually Android coupled with web pages make story telling much easier from a mobile digital devices.
Amplitude, Phase and Frequency Modulation puts signals onto carrier waves and a physical medium may be fibre or wireless - also Amplitude, Phase and Frequency Shift Keying deals with signal processing for anlog and digital devices where signals are modulated - phase shift keying is useful for closed loop control traffic signals for self-driving automated cars, also medical equipment mostly analog in Scotland using oscilloscopes so better care could happen with digital technologies
Definitions from Google automated search - short definitions for technical terms can be informative and actually stimulate or lead on to greater analysis, in-depth discussions with the view to educating others.
Google search can actually produce bad information - when in doubt, dig deeper refer to other sources, cross-reference, fact-checking from official sources also media articles from published events in time, from articles previously published in the past, leads on to more accurate educational material to teach and help others including students but also adults who educate others, lecturers and teachers.
Pre-existing knowledge from a technical subject previously studied can be reinforced when memories are jogged based on events - Google search actually enables pre-existing technical knowledge to be honed with reference to key words also key search terms - information retrieval in computing is based on the indexing of key terms.
Google's mission is to organise the world's information and indexing online material including text also multimedia content including images and videos is energy intensive, also it places significant load on servers.
Need for clustering of servers also for load balancing, whereby network traffic user-generated traffic is balanced across multiple redundant network links can included fibre cables but also wireless links.
Through blancing network load, need for young people to have knowledge of mathematics to design networks since network links can work at different speeds and rates.
The Internet is a mesh network toplogy with lots of interconnected links to serve as redundancy to keep Internet users connected.
Young people are relying on the Internet more and more - they also like box set video viewing which takes its toll on network infrastructure.
Amplitude Modulation - the modulation of a wave by varying its amplitude, used especially as a means of broadcasting an audio signal by combining it with a radio carrier wave. Amplitude also linked to sound which is measured in decibels - a decibel is the unit for the measurement of sound or audio. Sound also linked to the fourier transform function.
The Fourier transform can be used to interpolate functions and to smooth signals. For example, in the processing of pixelated images, the high spatial frequency edges of pixels can easily be removed with the aid of a two-dimensional Fourier transform.
Phase modulation (PM) is a modulation pattern for conditioning communication signals for transmission. It encodes a message signal as variations in the instantaneous phase of a carrier wave. Phase modulation is one of the two principal forms of angle modulation, together with frequency modulation.
Phase modulation is widely used for transmitting radio waves and is an integral part of many digital transmission coding schemes that underlie a wide range of technologies like Wi-Fi, GSM (Global System for Mobile Communications) and satellite television.
UMTS (Universal Mobile Telecommunications Service) linked to GSM is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps). The name universal implies that it is used widely throughout the world - really high speed fibre connections are a luxuary and is now often standard in most Scottish towns and cities, the urban landscape. Other parts of the world are not as fortunate and do connect to the Internet at slower speeds.
FM radio also Frequency Modulation - Because the frequency of a radio wave is less vulnerable to noise than the amplitude, FM was originally introduced to reduce noise and improve the quality of radio reception. In order to accomplish this, FM radio signals have bandwidth several times that of AM signals.
Frequency modulation technologies are also used by Ear, Nose and Throat departments to diagnose tinnitus which is linked to ear noises and in ear disturbances.
Amplitude-shift keying (ASK) is a form of amplitude modulation that represents digital data as variations in the amplitude of a carrier wave.
In Amplitude Shift Keying system, a symbol, representing one or more bits, is sent by transmitting a fixed-amplitude carrier wave at a fixed frequency for a specific time duration.
Amplitude Shift Keying is widely used for wireless LANs, RFID and Bluetooth communication. Any digital modulation scheme uses a finite number of distinct signals to represent digital data.
Phase Shift Keying uses a finite number of phases, each assigned a unique pattern of binary digits. Usually, each phase encodes an equal number of bits. Wireless base stations and automated systems use Phase Shift Keying. Digital systems use binary signals - modern digital traffic signals being digital do relay signals. Traffic signals deal in open loop and closed loop control - the latter the closed sort deals in positive feedback and motion, so closed loop control traffic signals useful for automated self-driving cars. Closed loop traffic signals must also therefore use phase shift keying to represent the binary bits used in signal processing to control digital traffic filtering systems.
Frequency-shift keying (FSK) is a method of transmitting digital signals using discrete signals.
Frequency shift keying refers to analog signals and also binary zeroes and ones - analog signals have tended to be represneted by oscilloscopes to measure and show frequences - music players and mixers sometimes show freuency changes on a constantly changing analog graph in picture representation. Oscilloscopes can show electric current useful for measuring voltages but also a heartbeat.
Medical equipment used in hospitals with oscilloscopes are analog rather than digital. Frequency modulation and also FM radio is still analog in the UK - really switching over to digital radio also digital technologies in hospitals could lead to advancements free up spectrum for moving to 5G, improved signal or sound quality in radio and improved patient diagnostic care in hospital and a better standard of patient care leading to improved long-term health outcomes.
Being creative, experimenting, inventing products, learning something new is always better more positive - getting ahead of time really important to success
What's your passion? What is your favourite study at school? What do you like doing? Always best to follow your passion based on what you love doing, go on to do a course either at a technical vocational College or at a University - polytechnic Universities are the practical vocational Colleges in America for technology and digital skills also training in renewables also the environment along with rural skills is likely going to be more sustainable a vocation. Aberdeenshire in North-East Scotland has Willows Animal Sanctuary also Foxlane Garden Centre which cater for disabled people, really helping them to gain a fulfilling life and existance. Really social enterprises that seek a profit can also give those less fortunate the chance to earn a living, pay their way, work their way up in the world - Aberdeen on the Lang Stracht has Glencraft which make beds for retail sale. Glencraft is a social enterprise that employs disabled people - also their is the Bread Maker in Aberdeen, learn to bake a loaf of bread and bread can be yummy. Really every day the French buy baguattes which are long loaves of bread and Tesco in Westhill also bake or pre-cook French baguettes, the bakery in Tesco is often popular.
Virginia Tech in America actually is associated with a massacre on 16 April 2007 - sadly America seems to suffer gun violence all too often or frequently. Who is viewing this website really?
The web is global - digital course materials also learning materials really do target anyone and everyone no matter where they are located and English is the language spoken mostly on the International Space Station, which can actually include American and Russian astraunaughts side by side.
No guns also no ammunition allowed in space and actually the environment is usually friendly despite being multi-national also multi-faith. Digital course materials enable slower learners to pause, digest content, take a breath and learn at their own pace. E-learning has many advantages is boundless and really challenges in concept teachers in Scottish schools and traditional schooling of marking, paperwork and jotters which still happens.
Digital course materials really when combined with the universal nature of the web cut down on much redundancy in learning that happens in schools in Scotland - sharing information is important because everyone has knowledge of something. We can all learn from each when we connect and share.
Really what are pupils learning in schools in Scotland? Teachers often exploit free online course material with the web being an open universal platform with no tracking - giving back is important, opening up what the lessons taught in schools the subjects in a sense can spread knowledge lead to a faster pace of developments, but also enable those willing to denote their time and effort to do more research and help others contribute to education.
The first animal to make an orbital spaceflight around the Earth was the dog Laika, aboard the Soviet spacecraft Sputnik 2 on 3 November 1957. The first dog a stray Moscow pup traveled into orbit in 1957 with one meal and only a seven-day oxygen supply. Taking animals also pets into space is not really wise - they cannot really aclimatise to the harsh lunar also bouncy landscape to be able to survive long, no air or oxygen in outer space and breathing aparatus required for humans.
Testing on animals has long been done and it is a practice that is controversial, usually met with opposition by animal rights groups.
Dogs are actually food for humans in some parts of the world also in Iceland where temperatures can be cold - meat can really be a comfort food in a sense providing warmth and nourishment, often meat is a staple of most Western diets and an important part - think Sunday roast dinners early 20th century with family gathered around a stove coal fire after church going.
Church going really comes to the fore in the poem Church Going by Philip Larkin, but he also wrote The Whitsun Weddings, an appropriate poem which references time since this is now Summer.
The Whitsun Weddings describes the speaker's train journey into London on Whitsun Saturday (a date in summer that was once a popular choice for weddings due to certain tax breaks). As it does so, the poem takes an unsentimental look at what it means to be human in light of the unstoppable forward march of time.
Communication signals and timings - Morse code used by vessels and seafarers used also in Titanic to send distress signal aiding rescue, then along came Radar and Sonar - also Manchester encoding tends to be used in connection with Transmission Control Protocol to synchronise clocks and signals to put a bitstream on a carrier medium such as fibre optic cable also wireless over the air medium - time began to aid transport and communication and prevent confusion
Morse code was traditional communication used by seafarers such as Captains on board boats and was used to send an emergency distress signal from the HMS Titanic sank in the middle of Atlantic Ocean during April 1912 - a distress signal resulted in the dispatch of rescue boats to save passengers from lifeboats adrift in the North Atlantic - many lives were lost from the Titanic ship disaster since there were not enough lifeboats, the ship was considered unsinkable.
Morse code is a signaling method that uses a series of on-off tones, lights, or clicks to send text over telephone wires or between ships at sea.
Radar and sonar were improvements on morse code.
Radar systems operate using radio waves primarily in air, while sonar systems operate using sound waves primarily in water (Minkoff, 1991). Despite the difference in medium, similarities in the principles of radar and sonar can frequently result in technological convergence.
Radars send out electromagnetic waves similar to wireless computer networks and mobile phones. The signals are sent out as short pulses which may be reflected by objects in their path, in part reflecting back to the radar. When these pulses intercept precipitation, part of the energy is scattered back to the radar.
Radar was created by Heinrich Hertz and Christian Huismeyer. Hertz was also instrumental in developing wireless technology alongside Marconi.
Infrared waves have longer wavelengths than visible light and can pass through dense regions of gas and dust in space with less scattering and absorption. Thus, infrared energy can also reveal objects in the universe that cannot be seen in visible light using optical telescopes.
Before mobile phones, business professionals used pagers - call from a landline leave a message on a pager. It was one-way communication actually and pagers were more common approaching the new millennium or year 2000. Walkie talkies used by the police was 2-way communication that crackled lots of interference with often the need to repeat and check for accuracy of received information by way of a radio signal - the term Roger was historically used to confirm messages and also signals.
Data packets sent using Transmission Control Protocol on the Internet use an ACK for acknowledgement bit in data packets to say thanks message received and understood. ACK part of three-way handshake used along with a SYN or synchronisation bit to start off an end to end connection initiate a conversation between two computers in a network. Transmission Control Protocol 3-way handshake really used to enable more reliable data transmission.
Manchester encoding is a synchronous clock encoding technique used by the physical layer of the Open System Interconnection to encode the clock and data of a synchronous bit stream.
Manchester encoding involves placing zeros and ones on a carrier physical cable or wireless over the air medium - zeros and ones is known as a bitstream. The main advantage of Manchester encoding is signal synchronisation - really Manchester encoding is the main signal encoding used with TCP/IP the rules that govern Internet communications since also Transmission Control Protocol when a connection is first established it has a SYN or synchronisation bit. Synchronisation is linked to signal timings - ensuring data send and received is in sync at both ends of a point-to-point connection.
Data being in sync actually is important for setting clocks - Greenwich Meantime is the timezone of London, Dublin, Lisbon and Edinburgh.
Greenwich Mean Time is the yearly average (or mean) of the time each day when the Sun crosses the Prime Meridian at the Royal Observatory Greenwich. Essentially, mean time is clock time rather than solar (astronomical) time.
Signal encodings on a carrier medium are related to signal timings.
https://www.timeanddate.com/time/map/
The expansion of transport and communication during the 19th century created a need for a unified time-keeping system, and time zones were introduced. Time zones have a long history. Before clocks were invented, people kept time using different instruments to observe the Sun's meridian passing at noon.
In the 19th century, goods and freight were moved actually by canals in Britain through the expansive waterway network, then along came the industrial revolution and the railways. James Watt invented the Steam engine.
A signalling system known as Anderson's Piano to detect rockfalls along the railway through the Pass of Brander in Argyll was developed by John Anderson, a famous Scottish inventor.
Sundials and watching for Sunrise and Sunset were how people told the time long ago.
New Zealand (then a British colony) adopted a standard time zone that became known as the New Zealand Mean Time in November 1868, making the country the first one to adopt a standardized time zone observed in the entire colony.
He developed the system of standard time, still in use today (courtesy NAC/C-14128). Canada's Sir Sandford Fleming played a crucial role in developing a global system for setting time. He apparently became an advocate of time zones after spending an uncomfortable night in a railway station because of time confusion.
As the planet rotates, some places receive sunlight or darkness, resulting in day and night. As the Earth rotates into the sunlight, you'll see the sunrise, whereas rotating out of the sunlight is where you see the sunset. The Earth's rotation is the primary cause why countries follow different time zones.
If you can beat the speed of the Earth's rotation, you can watch and enjoy a second sunrise. This is possible with high speed aircraft. The BBC demonstrated this in a science documentary called Forces of Nature with Brian Cox featuring Brian Cox using Mach fighter aircraft in the first episode. Professor Brian Cox has produced a YouTube video called Prof Brian Cox on measuring the speed the Earth rotates - https://www.youtube.com/watch?v=aZy1e8SrTuk.
BBC iPlayer - Forces of Nature with Brian Cox - https://www.bbc.co.uk/iplayer/episodes/b07k8lpv/forces-of-nature-with-brian-cox
Rockets definitely fly faster than jets. A supersonic airplane can fly faster than the speed of sound (1,236 kmh or 768 mph). The SR-71 Blackbird holds the record for fastest jet, flying at 3,418 kmh (2,124 mph). The Space Shuttle, though, accelerates to 29,000 kmh!
Jet propulsion is a practical application of Sir Isaac Newton's third law of motion, which states that, for every force acting on a body there is an opposite and equal reaction.
Web link hover text known as tooltip text HTML href link title attribute adds a label to web links when mouse hovers over a link known as onmouseover event handler in JavaScript and this element add interactivity to a web page - CSS style sheets can change the appearance of links easily
A tooltip typically becomes visible, after a short delay of generally one to five seconds, in response to a mouse hover, or after the owning element receives keyboard focus. Just as it appears when a mouse hovers over a web links, without user request, it is closed automatically when the focus is lost or on mouse out - JavaScript also has an onmouseout event handler for adding or controlling dynamic interaction with a web page.
Tool tips are created on web page href links using the title attribute. For the title attribute, best to put a web page filename in the attribute - you could also put brief text to help users really understand filenames to corrobating meaning of pages. This can help with understanding and bring significance of connected information to the fore.
Tool tips are part of the main or core Web Accessibility guidelines known as the Web Content Accessibility Guidelines (WCAG) 2.1 provided by the W3C the World Wide Web Consortium and Sir Tim Berners-Lee oversees the development of web standards. Web standards really intended to make information independent of a device and to enable the sharing of information in a device-independent manner.
Web Content Accessibility Guidelines (WCAG) 2.1 - https://www.w3.org/TR/WCAG21/
Web link hover text known as tooltip text adds a label to web links when mouse hovers over a link known as onmouseover event handler in JavaScript and this element add interactivity to a web page - CSS style sheets can change the appearance of links easily.
The tooltip or hover text activated by mouse hovering - JavaScript has onmouseover event handler to add interactivity to a web page. Cascading Style Sheet or CSS code been around for almost two decades is an easy way to alter the appearance or presentation of a web page - also external style sheets and one stylesheet can control appearance for multiple web pages in a website or a collection of web pages.
The tooltip syntax element in web page code great potential to be used when added to web pages to really show the filenames - the names of files that make up a web page, to determine a web page file name easily from an ordered web page that lists multiple web links with a narrative for story telling. This has a very practical application - to determine the filename of a single web page using tooltip from a smartphone with local web pages stored on it for offline referencing - also an index.html page typically the homepage that references multiple web pages can actually help to locate a particular web page quickly amongst an all on one level list of multiple web pages helping to locate information in a more efficient manner.
The title HTML syntax or tooltip on the href web link code segment actually needs to be incorporated in a web page from outset - it can be time-consuming to add titles to pages in the aftermath of an established website with lots of pages when web pages have been hand coded.
Really storing information in web page HTML format is intended to teach others but also help people remember about events, the past also - really explaining is education and teachings help others make others wiser also.
CSS style sheet code to be placed in style HTML container within head of page - style CSS code in a web page makes web page presentation standalone may help in some circumstances
CSS code on multiple lines breaks it apart, makes it easier to understand but often CSS files may get scrambled on one line on computers such as Windows 10 version ten and it can be time-consuming to split up CSS code all on one line frustrating. Some computer programmers must have worse nightmares - isolating errors in code known as debugging - fault finding in computer hardware the physical components is known as troubleshooting. Isolating faults involves testing - locating and isolating faults and it may not be straightforward. There is a need for lights or Light Emitting Diodes on instruments to really determine where there is a fault - LEDs can tell a pilot of an aircraft what engine is on fire.
The Kegworth air disaster over England 8th eighth January 1989 near Leicestershire that happened big issues with communication actually - passengers could see what engine was on fire, but the pilot shut down the wrong engine.
In any case, CSS code on one line actually is better for teaching or education embedded on a web page to really help young people understand. Sometimes analysing issues people experience also the frustrations or grievance can help others learn lessons. Technology usually improves based on someone somewhere trying to solve a problem.
In CSS code, the line /* unvisited link */ - a slash and a star with a comment can enable someone else to understand code. This is the importance of comments in computer code - and software application developers do put comments into code. When they do not, fault finding becomes more problematic.
Actually the web is an open platform, better to explain snippets of code on the great medium the World Wide Web - sharing information can benefit someone else on the other side of the world. Those that share information often do not know who really benefits, but some people can really appreciate useful information provided for free and have good intentions.
Education is important, but also there is still a need to protect business interests and intellectual property - explaining snippets of code with the view to educating future coders the makers of apps for mobiles and tablets, web pages and also software applications is important.
Explaining the general principles behind developments in computing also software engineering including software development is really fundamental to advancing progress. Software applications usually built in independent blocks, so with this when software developers really understand their code, they can write about an independent block of code and what it is meant to do, discuss in detail issues, problems, workarounds and solutions.
Really the CSS code below really changes the appearance of text links or web links also called hyperlinks. A normal unvisited link is represented by a:link - a:visited web links in CSS code are visited or clicked on links or links visited when original page revisited, also refreshed. Links within a page known as bookmarks make a link with the hash symbom in the href element of a standard link - also connected to the name element to reference a bookmark or element of page text to really create internal links on a web page, which actually work offline on an Android smartphone.
The a:hover can be useful for adding an underline to links - underline on link usually removed with the top line of CSS code below. The a:active link does not do much in practice. Really web links are unvisited, or become visited and become active. Normal unvisited links are marked by a:link.
a { text-decoration: none; }
/* unvisited link */ a:link {color: blue;}
/* visited link */ a:visited {color: green;}
/* mouse over link */ a:hover { color: red; text-decoration: underline; }
/* selected link */ a:active {color: red; }
Relative links also JPEG images embedded in websites accessed from an Android phone on local storage tend to not work also embedded style sheets via style element vital - really the WebM video format is best low in file size good visual quality to coverge video visual data offline with sound or audio a key message - the Public Switched Telephone Network now comprises convergence wide range of technologies
The modern web - Websites a collection of interlinked HTML pages (also may include PHP pages) are intended for the web to be shared hosted on a Web server either running Apache or Microsoft Internet Information Services, but still offline access to own web pages may help some people to remember events.
Having offline access to data and information can help in places that are notspots for digital connectivity - remote places where there is no Internet access also no mobile data signal. The Internet enriches many lives these days.
Apple is the trendy company with slick graphics and icons with the iPhone popular and agreeable to young people also women - iPhone colour icons trendy and easy to use thank interface designer Jonathan Ive, but Apple have not really thought about how web pages also HTML the language of the web which is quite easy to learn is universal in terms of accessing web pages locally from a phone.
It is actually not easy to copy normal files you might associate with Windows 10 version ten such as documents to Apple's flagship device the iPhone - also the iPad actually requires iTunes Windows software to sync or copy across music to an iPad - unless users subscribe to Apple Music for a price or a premium to stream or play music - history dictates many households have CDs or Compact Discs and iTunes music software on Windows 10 enables CD music tracks to be converted to MP3.
The File browser on an Android smartphone when you click on Documents actually displays all files on one level - even if you have files within folders, folders are not shown making it more important really to give files a short, meaningful, descriptive title to find and open the web page you intend.
In the days of Unix also MS-DOS, filenames were limited to 8 eight characters plus three - the three was the file extension think dot doc for documents also dot exe for executable. The underscore character next to equals and plus on a standard computer keyboard did help represent a space. No spaces in files aids machine to machine readability and communication. Look at some web page addresses or URLs Uniform Resource Locator and sometimes they are really long, often with no spaces but parameters may be separated by and symbols or the ampersand symbol located at number seven 7 on a computer keyboard.
Parameters used in computer programming and separate modules, often independent blocks of computer code, pass parameters which can change in value. Computer code is modular often and the modular nature really promotes teamwork - multiple computer programmers really work together doing their own work written in separate modules.
Assembling modules through manufacturing is also important - rocket ships that go to space only have limited space for payload, payload is materials often modular used to build a space station construct a large orbiting home for astronaughts in space - even though it is a temporary fleeting home orbiting the Earth, a planet shared world multiple countires with multiple artifical satellites in space to monitor climate patters, predict weather, find environmental destruction, provide directions to drivers also the emergency services on the ground via SatNav - satellite navigation involves multiple satellites to triangulate locations and satellites relay signals between them, there can be latency in signal transmission or significant delays and really timely information is vital for vehicles to reach their destination. Earth monitoring from space can spot signs of environmental destruction - check on tree cover for example. BBC Earth from Space programme about the Earth the planet or shared world from outer space the dark matter cosmos with the moon and stars showed that it is possible to spot flamingos bright pink animals - the Millennium Dome in London is also visible from outer space where you'll find the aging International Space Station now the O2 arena which hosts concerts. Fusion energy clean nuclear energy based on the function or role of the moon and the stars. China building new station - India plans to launch a space station by 2030.
The modular nature of both computer programming and also assembly in manufacturing really means open data, sharing plans for educational purposes is really important to teach young people open up employment opportunities.
Open data and sharing information is not without issues - there is issues around commercial advantage. The business world driven by profit actually is a big barrier in real terms to the education of young people and future generations. Really important businesses also organisations offer more apprenticeships training for young people also offer more training opportunities for those out of work. Collaboration between different companies across the globe is also important - secure means of collaboration and sharing are important think Microsoft Teams. Microsoft Teams and Google Classroom is what young people are using for education purposes. Virtual Private Networks enable encryption on phone lines point-to-point connections - Voice over IP or Internet Protocol enables phone calls over the Internet by the way of a data connection instead of the traditional public switched telephone network.
There is the public switched telephone network traditionally a circuit switched network with copper cable versus packet switched networks - data packets sent over the Internet using TCP/IP communication protocols, which are sets of rules that govern data communication. Circuit switched networks involved a dedicated connection - basically Circuit switching is a type of network configuration in which a physical path is obtained and dedicated to a single connection between two endpoints in the network for the duration of a dedicated connection. Ordinary voice phone service uses circuit switching. This reserved circuit is used for the duration of a call. Circuit switched networks were analog really - An example of a circuit-switched network is an analog telephone network. It contrasts with packet-switched networks, which break the communication into packets and then send those packets through the network independently of one another.
The Internet uses packet switching, messages sent and received in independent unordered data packets out of order actually not in a sequence - packet switching is not circuit switching. Data packets have payload data (the main message) and header information (contains source and destination address). Circuit switching is very wasteful of resources because it dedicates an end-to-end circuit to a call, where packet switching can use a circuit for many, many different calls - many people the whole world actually share the Internet, but still only 4 four billion people on the Internet. There is a real digital divide - advanced civilisations such as Western countries really do have a better quality of life. Carrying or carrier pigeons used to be used in the past think telegrams being delivered - they were time-consuming people had to wait - often people still have to wait for letters delivered by Royal Mail, the postal service that takes on more recruits around Christmas time usually students. Cables and wireless over the air medium is a carrier for data or information also at the physical level, data signals are put on a carrier and there is modulation also at the bit stream level usually symbolic of two states binary zeroes and ones.
Modulation and demolution was abbreviated to modem a technology on the go when Pierce Brosnan starred in GoldenEye James Bond around the mid 1990s - the traditional Internet dial-up connection device which was slow with maximum speed of around 56Kbps - ISDN Integrated Switched Digital Network was a premium paid for higher speed Internet access connection device available in homes and officers in the early days of the Internet. Offices more likely to pay for ISDN the premium paid for Internet connection device.
A public switched telephone network nowadays is a combination of telephone networks used worldwide, including telephone lines, fiber optic cables, switching centers, cellular networks, satellites and cable systems. Such a network lets users make landline telephone calls to one another. Voice over Internet telephony can enable someone to make a phone call over WiFi - Pinsent Masons the law firm announced on their website during 2021 that all telecoms operators in the UK must allow Voice over IP on their traditional phone networks - conventional telephony networks or landline networks going to homes and offices around the UK.
A Public switched telephone network twenty years ago was mainly made up of conventional copper cables really the rare Earth minerals. Talk about rare Earth minerals and we talk about cobolt can be hard to extract, require real effort - A hard, brittle metallic element, found associated with nickel, silver, lead, copper, and iron ores and resembling nickel and iron in appearance. It is used chiefly for magnetic alloys, high-temperature alloys, and in the form of its salts for blue glass and ceramic pigments.
A modern public switched network is really the hallmark of the convergence of multiple technologies - cellular networks is 4G and 5G (Huwawi Chinese telecoms equipment maker is big in mainland China, but Western governments have really tried to block the big Chinese telecoms equipment maker from making inroads in Britain, Europe and America). For satellites in orbit, really collaboration across the world with mutiple countries as stakeholders is really key in a shared world. Opposition to China, Chinese technology and 5G is really putting the good way of life those in Western countries take for granted.
Issues around viewing web pages on an Android smartphone - certainly issues apply with the Samsung Galaxy A10
- Web pages require embedded style HTML element for Cascading Style Sheets for best formatting - referencing an external dot css file does not apply formatting
- Links on a web page, relative links, to other pages on a site do not work actually when you try to navigate to other web pages in a group a website for example
- Really important is to keep filenames of web pages short and meaningful - think 8 or eight character file names plus three the file extension. Filenames in Windows 10 can be longer make filenames more descriptive and meaningful, but short filenames with meaning really are better on the web and on mobile devices. Some conventions and traditions in computing are positive and may prove to be long lasting when people really understand digital skills education. Organisations often use numbers to represent cases - with this there is a need for naming conventions but important to not lose the document map that links numeric case numbers with real life cases and people - losing track of people and events is possible with use of numbers over more meaningful messages that take human effort. Numbers might help protect privacy of individuals, but actually the use of random numbers can be annoying when looking back tracing events - doing detailed and prolonged investigation work.
- JPEG images embedded within web pages also do not display on local web pages stored on an Android phone from a web browser
- JPEG images files can be viewed on screen when you view them within a file hierarchy or tree like structure
- Really WebM videos good visual quality low file size possible to convert to the format for free using OpenShot Video Editor and AVS Video Editor, the latter software program adds a visible watermark if you do not pay money but does not interefere with the sound or audio. Videos, compression and keeping videos small actually enable efficient transmission over networks reducing network delays and latency caused by travelling through an Internetwork going through multiple routers and switches. Video also enables convergence of visual truer to life information also with audio or sound - video enables playback also records visual represntation of people and what they say. This is really the important of retaining videos long-term.
- WebM video small in file size while retaining good visual quality accessed from a smartphone stored on an Android smartphone can be played back offline without and Internet connection but having access to mobile data also WiFi is also preferrable.
- Folders or directories in the Android file browser on an SD card enable files to be sorted logically grouped.
- Important to stress you need an SD card really embedded in a Android smartphone as an add-on - really two main reasons isolating files on a separate SD card enables phones to be reset to factory defaults when problems arise, secondly files viewed on an SD card from the Android file browser show the nested folder or directory structure.
- Limitations on Android phones at present such as those from big popular manufacturer Samsung actually when you browse Documents tend to just list files in an unsorted manner.
Video can be more authentic when combined with observation in real-time - truth and justice is often linked to fairness and what is morally accepted - defacto standards and the status quo
Actually those in a media role are also secretaries to a certain extent but no typewritters used any longer and they produced costly mistakes need to retype and print - lots of typing goes behind the scenes when in reality video is more visual a truer representation of what accually happens or goes on.
With the printed, written online word, more care can go into what is said - prose can be crafted, events can be ordered but the spoken word on video can be more authentic when combined with observation in real-time about what is actually happening forcing also greater honesty to certain extent - honesty tends to be linked to trust, integrity and also truth is linked to justice. Truth and justice is often linked to fairness and what is morally accepted - defacto standards and the status quo.
De facto standards are those which have been accepted as the best standard for their purpose. They have evolved to be accepted because of wide public support and market forces. This is often because they have a proven track record for efficiency and reliability.
American Standard Code for Information Interchange, QWERTY keyboards, HTML web pages and the World Wide Web
ASCII American Standard Code for Information Interchange charceters often special code values also numbers used in HTML web page code - ASCII code character set is an established defacto standard. The de facto standard for the format of text files in computers and on the Internet that assigns a 7-bit binary number to each alphanumeric or special character. ASCII defines 128 possible characters.
The QWERTY keyboard layout is the standard pattern in countries that use a Latin-based alphabet. Latin also linked to the Romans and Italian - Latin is the precursor to English and actually Latin was taught at Westhill Academy during the early 1990s but it was phased out. Teaching Scottish Gaelic may eventually go the same way. Some school subjects can remain out of a legacy core teaching base with staff teachers having specific skills, but really innovation and creativity - ongoing learning lifelong learning is important to update knowledge and skills.
Establishing a digital identity online with a web based portfolio may stand you in good stead, gain real respect, be understood also
De facto is Latin for in fact, so a de facto standard is one that is used as a universal standard just because over time it became widely used. De factor standards are born out of public acceptance and usage - it may not be always wise to go along with peer pressure when young, be influenced by what others are doing such as friends, peers and classmates. Establishing your own digital identity online with a web based portfolio may stand you in good stead, gain real respect and give you a bigger voice in a crowded online world. 4 four billion in the world online active sending messages for example via Transmission Control Protocol / Internet Protocol still room for growth in the world's Internet population.
TCP/IP popular for Internet communications versus early days Novell IPX protocols - Novell Netware really rivalled Microsoft Windows in the enterprise, but Novell is no more
TCP/IP underpins Internet communications - it is the established de facto standard - the competing standard early on was IPX from Novell - Novell company gone by the wayside, pionered enterprise grade software an alternative to Microsoft Windows called Novell Netware.
Netware really rivalled Microsoft Windows at the enterprise level to share resources - files, folder also called directories also print devices.
Microsoft versus groovy Apple iconic image aimed at designers and mucisians versus also Google
Really the companies that challenge Microsoft globally are Apple and Google. Apple still quite niche market with innovative iPhones with fancy graphics and a groovy icon centred image - iPhones can be trendy popular with young women.
The Macintosh computer usually aimed at artists and designers also music professionals in a professional context (The Mac computer good and suitable for professional musicians) - this explains why it is usually expensive has a high price tag.
Sleek graphics makes devices appealing, attractive to use. However there is the Mac Mini - really a small base unit for a computer to connect to larger screens but it is limited in USB ports for connecting to peripheral devices - physical hardware devices such as USB Universal Serial Bus flash drives, USB external hard drives including newer SSD Solid State Drive external hard drives, also USB printers. A wireless keyboard and mouse with betteries can really cut down on the required number or need for a vast amount of USB ports on computers.
Wireless devices tend to rely on Infrared making computing more mobile and flexible - also SSD hard drives more reliable and stable over conventional moving part hard drives
Wireless devices such as mice usually rely on sensor technology such as Infrared - look under a mouse to see a red glow - actually wired mice can rely on infrared but infrared technology more suited ideally to wireless. Wireless Infrared technology increases also broadens the application of use increasing utility in computing making mobile computer more possible, flexible and dynamic.
SSD hard drives are so called Solid State different from conventional hard drives which had moving parts. Moving parts led to more errors in data - had performance as well as more reliability issues.
Roger used historically to repeat for clarity in radio communications - repeating and repeaters used in computer networks to amplify or extend signals since signals for data attenuate or weaken over greater distances
The radio also known traditionally as the wireless set - terms radio and wireless also used interchangeably mean the same thing stems from radio communications. Terms such as Roger often used in radio communications to get people to repeat voice messages since often radios crackle. Term or phrase Roger historically encouraged repetition - repeating and repeaters used in computer networks to amplify or extend signals since signals for data attenuate or weaken over greater distances. Repetition also good for learning or education and video enables replay also playback cuts down on duplication makes everyone more efficient also enables ability to look back in time. Video recording as well as video broadcasting has really transformed the world by enabling the recording of historical events.
Older people who have lost eyesight may listen to the radio also some people are blind (deafblind.org good charity) - really digital radio signals can improve sound quality and hearing often gets worse with age. Free hearing tests from Specsavers the optometrists who make spectacles offer eyesights in the United Kingdom.
Smartphones improve clarity in communication also converge audio and video enabling also visual lifelike recording that is truer to life - also Internet communications in data involve TCP to add a layer of reliable data transmission
Mobile phones great improvement also advancement over traditional radios used by spoken voices over the airwaves helping to bring about more clarity in communication.
Smartphones converge audio phone calls with video and colour - visual representation also JPEGs often can be saved from smartphones. JPEGs use lossy compression with pixels that are unecessary in an image are thrown away helping to create smaller images while retaining visual quality possible for data transmission or for sending and receiving over a computer network, or an Internetwork or network of networks such as the Internet which is overseen or governed by TCP/IP the defacto standard for Internet communications.
TCP/IP communications is more reliable actually than traditional radio communications and walkie talkies.
Transmission Control Protcol also TCP provides reliability to transmission of IP Internet Protocl data packets with a three-way handshake.
TCP enables synchronisation with a SYN bit at the start of messages in data communications over a medium and also features acknowledgements ACK data packets for data sent and received helping to make data sent over the Internet more reliable. This also ensures greater quality of service in an end to end or point to point connection between two computers or end stations that are remote to one another connected or linked over a great distance. Point to Point Tunelling Protocol also Layer 2 Two Tunnelling Protocol is often used to encrypt connections and messages used in connection with Virtual Private Networks.
Radio communications often used the NATO phenetic alphabet to make letters or characters clear stand out make the spoken word clearer to avoid issues around misinterpretation
The NATO phenetic alphabet often used to make radio communications clearer avoid misinterpretation is as follows:
Everyone should really learn the phenetic alphabet to pronounce letters and sounds over the phone to others such as letters in the name for clarity. This is an established good standard for phone communication that reduces mistakes also mistakes that can happen in data entry by call handlers.
The NATO phenetic alphabet needs to become a widespread accepted standard used over the phone in society by the public and in society - actually Finland and Sweden are talking about joining NATO the North Atlantic Treaty Organisation. Use of the phenetic alphabet can lead onto clearer communications - this can be useful involving phone conservation with the Department for Work and Pensions over benefits, pensions and tax cut down or cut out mistakes in data entry make mistakes less likely to occur - lead to more accurate data also more accurate letters with less errors in data.
- A for Alpha
- B for Bravo
- C for Charlie
- D for Delta
- E for Echo
- F for Foxtrot
- G for Golf
- H for Hotel
- I for India
- J for Juliet
- K for Kilo
- L for Lima
- M for Mike
- N for November
- O for Oscar
- P for Papa
- Q for Quebec
- R for Romeo
- S for Sierra
- T for Tango
- U for Uniform
- V for Victor
- W for Whiskey - middle name of George W Bush, the W stands for Walker
- X for X-ray
- Y for Yankee
- Z for Zulu
Mobile Data versus stored data
Mobile data connections such as 4G may not be always available - an always on data connection can enrich lives, enable individuals to access information, check facts and argue their case - many laws exist in the United Kingdom dating back to the 12th century just after 1066 Battle of Hastings. The World Wide Web is an open platform, universal also this enables everyone to have their say and lead on greater equality and fairness - truth is often linked to justice. Think Batman the caped crusader and cartoon character also sought justice and masquarded behind a wealthy figure Bruce Wayne. Cartoons really designed and intended to teach children about justice also fair justice. Fair justice is really about considering ethics and morals more than laws of the land where ordinary people may struggle to understand also remember and reference on the spot. The rule of law also the Scottish Courts is linked to Contempt of Court and a focus on facts - what happened in the past can be difficult to determine.
Judges must consider without prejudice though and really video really is the only form of evidence that does this. There can be contradictions in multiple witness testomonies - did you see that meteour shower last night?
Some people though do see some extraordinary spectacular sights there is the Aurora Burealis or the green lights display also known as the Northern Lights sometimes visible from Aberdeen after dark - this is what makes video and digital recording powerful.
Scottish music legend Kenneth McKellar (singer) sang the Northern Lights of Old Aberdeen - https://en.wikipedia.org/wiki/Kenneth_McKellar_(singer). McKellar studied forestry at the University of Aberdeen, after graduation working for the Scottish Forestry Commission. He later trained at the Royal College of Music as an opera singer - opera usually sung in Italian think Pavaroti and the three tenors. Kenneth McKellar did not enjoy his time with the Carl Rosa Opera Company and left them to pursue a career singing traditional Scottish songs and other works. Kenneth McKellar also sang Scotland the Brave also the Lewis Bridal song - a favourite often with Brides getting married often walking down the aisle.
Highlight how technology and hi-tech smart systems helps others may actually spur on others to going into hi-tech careers which may also enrich lives for others lead onto improvements in quality of life, make advanced technology more affordable available on the mass market to the least well off - really buzzword of the moment in education is STEM Science Technology Engineering and Maths. Technology for energy also for transport can help to sustain a comfortable way of living for more people.
STEM being highlighted by RGU the Robert Gordon University for a generation almost since the University was founded with now annual events this is the RGU TechFest - the TechFest this year was on Sunday 29th twenty ninth May 2022 twenty twenty two at the Sir Ian Wood building and young people were able to put their hands on a sphere with an electrical current feel the flow of electrons and ions flowing through them. Feeling the flow of electrics can spark electrick shocks or also a real transformation - brain waves also stem from electric shocks and there was electroconvulsive therapy or ECT used to treat mentally disorderd patients - this was the mainstay of mental health treatment for a while.
The core focus of the Aberdeen Science Centre is robotics and the town of Westhill seven miles to the West of the granite City also the silver city is the global centre of excellance in subsea engineering with signs marking the entrance to the town from Inverurie. Robots often used under the ocean since robots can go to place humans cannot - no humans have been to Mars far off world but NASA over many years have deployed several rovers think Beagle2, Curioristy also Perseverance. When controlling these delays remotely there can be delays this is antenuation in data signals - delays really require real patience with understanding and progressing moving forward with hi-tech advancements. Signal delays really can lead to misunderstanding - need to also understand complex mathematics when dealing with signal processing for life in outer space in orbit such as floating point representation. This is Maths for Computing in essence - understanding maths enables calculations to be done also predictions to some extent which can cut down on humans making costly mistakes and also reduce delays also.
Fibre bullet proof Bridge of Dee Aberdeen evening rush hour 29 June 2022 - fibre optic networks enable high fidelity light signals to travel over a physical cable medium. Fibre optic cable made from Kevlar the stuff bullet proof vests are made from - really armed police units and guns detract away from investment in fibre optic networks due to bullet proof vests. A lot of households like Internet streamed TV, box set viewing. Traditional telephony networks made from copper cabling - rare Earth minerals
WebM format can compress 450 Mb Apple Mov file format down to 33Mb WebM format for four minute video length good visual quality with 480 pixel resolution ideal for the web and for sharing enabling also efficient data tramission over computer network links with limited capacity. Video compression really enables more users to actully upload and share video - actually converting to WebM format using AVS video editor really makes the process easy also a doddle.
In recent times young children were doing martial arts in the town of Westhill at Westdyke Leisure Centre on Sunday the traditinal day when families long ago went to Church enjoyed Sunday roasts getting together round roaring coal fires burning coal, logs and peat - peat bogs common in the Western Isles of Scotland, peat can be used for fuel to give warmth in cold Scottish winters in farflung outlying remote communities and islands. Really children gearing up to fight perhaps or is it just self-defence or brevado? Karate also martial arts can be fun for children, but it can also be provocative - it can also give children a sense of achievement with awards for mastering skills such as breaking a block of solid wood coming from cut down or more likely fallen trees nowadays with your hand. This is within the realm of possibility and 6-year-olds are doing it in the Aberdeen area.
https://rumble.com/v1aklvh-fibre-bullet-proof-bridge-of-dee-29-june-2022.html
Transport Layer Security TLS now works with HTTPS replacing Secure Sockets Layer SSL - Saying thanks ACK acknowledges data communications and saying thanks helps computer sender of data know a data packet reached its destination safely
From Webopedia.com the tech dictionary - Secure Sockets Layer (SSL) is a protocol developed by Netscape for providing a secure connection between two or more devices via the Internet. This encryption is necessary to secure and safeguard private data such as personal details like names and addresses of individuals or financial information like credit card numbers while in transit between the user’s device and the server. Until the early 2000s, the Secure Sockets Layer was a key technology in making internet commerce possible.
SSL in connection with Microsoft Outlook also BT email uses also TLS Transport Layer Security on top of Secure Sockets Layer.
From Webopedia.com the tech dictionary definitions for Transport Layer Security follow - Short for Transport Layer Security, a protocol that guarantees privacy and data integrity between client/server applications communicating over the Internet.
The TLS protocol is made up of two layers:
The TLS Record Protocol - layered on top of a reliable transport protocol, such as TCP, it ensures that the connection is private by using symmetric data encryption and it ensures that the connection is reliable. The TLS Record Protocol also is used for encapsulation of higher-level protocols, such as the TLS Handshake Protocol.
The TLS Handshake Protocol - allows authentication between the server and client and the negotiation of an encryption algorithm and cryptographic keys before the application protocol transmits or receives any data.
In a nutshell - Transport Layer Security uses the TCP 3-way handshake to make data communications more reliable. TCP underpins Internet communications using TCP/IP the main rules that govern or control Internet communications. 3-way handshake makes end to end connections more reliable with a SYN for synchronisation and ACK for acknowledgement data packet a means to say thanks in other worlds by a computer. Saying thanks acknowledges communication and in data communications saying thanks helps a computer a sender of data know a data packet reached its destination safely.
From Webopedia the tech dictionary - HTTPS (Hypertext Transfer Protocol Secure), the secure update of HTTP, uses an authentication process to encrypt the connection between web browsers (or clients) and servers. This process overlays Transport Layer Security (TLS), or what used to be SSL, onto HTTP.
Transport Layer Security is now the SSL Secure Sockets Layer part of HTTP - all web addresses start with http visible in a web browser's address bar, you can actually see it when you copy and paste a web address. The http might not be visible in the address bar in Google Chrome or immediately obvious until you copy and paste a web link.
SSL and TLS used to send email securely with Simple Mail Transport Protocol or SMTP. SSL plus TLS actually helps prevent email spoofing, someone sending an email as someone else faking email addresses - this is also known as masquarding as someone else. Improvements in web protocols are often driven by security concerns and issues.
Spoofing is when someone or something pretends to be something else in an attempt to gain a victim's confidence, get access to a system, steal data, or spread malware.
IP masquerading masks local computers on a private network and works with Network Address Translation - in NAT, Private IP addresses are translated into a single public IP address. In PAT, Private IP addresses are translated into the public IP address via Port numbers
IP masquerading is a process where one computer acts as an IP gateway for a network. All computers on the network send their IP packets through the gateway, which replaces the source IP address with its own address and then forwards it to the internet.
IP masquerading is also what a Network Address Translator does in a network - IP masquerading is one of the main or core roles of NAT network adddress translation. The purpose of a NAT is to conserve or save public IP addresses - one of the big roles for NAT is to allow the use of private IP addresses for internal networks that belong to an organisation.
Cisco routers or routers manufactured by tech giant Cisco, the company that manufactures routers on the backbone of the Internet actually enable routers to be configured for NAT and PAT function. PAT is Port Address Translation. Most home networks use PAT - this is where Internet services go through a certain port on a computer, for example port 25 for sending email or for SMTP, POP3 the traditional email where messages were downloaded to computer used port 110, FTP for uploading files to websites use port 21. HTTP GET request retrieves web pages and uses port 80. Hackers look for open ports - usually start with port scanning profiling computers for open ports. HTTPS port for secure web pages uses port 443 also port 8080 is also sometimes used for insecure web page retrieval.
Main difference between NAT and PAT - In NAT, Private IP addresses are translated into the public IP address. In PAT, Private IP addresses are translated into the public IP address via Port numbers.
Find out the name of your computer, the address of the closest router and also access shared files on other computers across a local network such as a Windows 10 HomeGroup via Network and Sharing Centre
Computers usually have names also called hostnames - you can find out the name of a computer by typing in ipconfig/all into a Windows 10 command prompt - in the Windows search box bottom of screen type in cmd for command prompt (CMD to make it clear), then ipconfig/all and then Enter to reveal computer hostname details, your computer's IP address and also the address of typically the router closest to your home computer known as the default gateway.
ipconfig/all also reveals the address of DNS Domain Name System servers - these enable web users to enter a friendly domain name and DNS enables backend conversion or lookup of an IP address for a computer, a numeric address usually in decimal but links to binary, the zero and one state computers use to talk to each other using.
To access resources on another computer, in the Windows 10 version ten search or Run box, type in two backslashes followed by a computer hostname, for example \\hostname where hostname equals a computer's name as defined in the details of ipconfig/all.
Resources are shared resources such as files shared on another computer including music files, photos, video and also documents. Networks enable the sharing of files amongst multiple computers close together in local networks or far apart in Wide Area Networks such as the Internet.
Windows 10 Network and Sharing Centre is available from Control Panel - bottom right far right Windows 10 screen click the icon just on the right of the clock, then click All settings from the panel that appears to open the Control Panel window. Click Network and Sharing Centre.
Bottom left of screen is Internet Options where you can change your homepage in Internet Explorer - this web browser has really been phased out, it is the legacy web browser native to Windows 10 replaced by Microsoft Edge modern cool blue e or letter-e bottom of screen on the Windows taskbar usually left most icon next to the yellow Windows Explorer icon.
Top left panel Network and Sharing Centre there is Change Advanced sharing settings. From this screen, you can click Turn on file and printer sharing - this enables the sharing of both files including photos and videos and also enables the sharing of print devices. Make sure Turn on network discovery radio button icon to enable other computers to find your computer on a Local Area Network - a home wireless network can be a local network.
With a router at the centre it is known as an Infrastructure network, but with just each device having a network adaptor definitely no router, the local network is an ad hoc network.
Resetting Apple devices deletes apps - iPhone also iPad Pages app also iMovie need to install apps from App Store after resetting devices using the Reset option erase everything - video editing combine multiple photos into a movie Mov file
iPhone also iPad Pages app also iMovie need to install apps from App Store after resetting devices using the Reset option erase everything - video editing combine multiple photos into a movie Mov file.
The big point is if you erase using factory reset your iPhone also an iPad choosing to erase all data and apps, even Apple apps such as Pages and iMovie get removed.
You may be pleased to reset your mobile or iPad to get rid or remove quirks also remove rogue apps causing issues, but there is always a need to reinstall Apps. Actually remembering the names of Apps you had installed on your iPhone for example may not be straightforward. Quirks can happen with all mobiles also tablets producing strange anomolies also errors - errors in data is known as errata this is the technical term from computing.
The Pages app enables note taking very well with also Presenter mode to magnify native text input on the mobile device. Magnifying text enables transfer of narratives into video very well although you still need multiple devices - another video capture device. You could use a camera - compact cameras do come with video capture normally to MP4, the format that also works freely with Linux think Ubuntu most popular Linux version for Desktop after Android Linux the mobile open source operating system overseen principally by Google. Cameras may also enable capture in video using AVCHD the Sony Blu-ray format also known as Sony HD or High Definition format, the storage format for films or movies on Bluray disc.
Video cameras dedicated to video capture can be quite compact these days, but you could purchase two smartphones since actually video capture from a modern phone is decent quality when you know how to adjust the aspect ratio - iPhones turned horizontal do produce wider anger video also viewpoints in 3:2 format the standard of traditional photographs taken with cameras. There is still the issue of balancing also juggling multiple digital devices when out in the field faced with natural real world conditions such as snow, hail, rain, wind and if you're lucky Sun - sunshine and better weather more likely during Scottish summertime. Start of July 2022 and floods again round Western Sydney, Australia - winter time in Australia when the schools break up in Scotland for Summer holidays.
Never forget the most useful apps for iPhone and iPad for playing music, backing-up files, creating documents converting to PDF format also as well as video editing with iMovie
- Pages and iMovie apps from Apple App Store on iPhone and iPad
- OneDrive and Dropbox - online storage solutions with ability to back-up documents, photos and videos over mobile data also as well as Wifi. In Dropbox app, click on Account. Left-hand panel, click Camera Uploads, then turn on flick the switch in essence next to Use cell data to back up. This enables back-up of photos and videos on the move - data quotas for mobile data will get used up more quickly with video and cost more money depending on your monthly storage quota for bandwidth.
- The Chrome app from Google makes a good choice of web browser and a good additional app for an iPhone and iPad for example - having multiple web browsers installed is a good idea since some websites work better with a certain web browser. Most websites work well with Google Chrome, but you may experience caching problems for downloaded websites, so try an alternative web browser such as Mozilla Firefox.
- Spotify music streaming app great to listen to music on demand, but offline playback with Spotify Premium may not work due to caching issues - clearing the cache can solve the issue or problem, but really you can listen to Spotify via the web - https://open.spotify.com/ and also there is YouTube Music - https://music.youtube.com/ supported by adverts for the free model and advert driven site version does not work with screen off unless you upload your own music collection MP3s or MP4s.
The iMovie app - adding audio such as a narrative to provide additional contextual information to a video after shooting
From the iMovie app, select your video from list of displayed videos - this is a video previously captured displayed in the iMovie window on an iPad for example, but iMovie also available for iPhone. iMovie does however work better on a bigger screen such as a 10.1 inch screen iPad with Gorilla Glass - you can see more of what you are doing. This video view enables you to watch your video previously captured also upload videos to online storage such as Dropbox or Microsoft OneDrive. Three icons bottom of screen main video viewing window - play video, upload to online storage also delete video marked by waste or rubbish bin (the receptacle in American terms - Americans refer receptacles to also garbage).
The iMovie app has three main options for creating a movie a Mov file movie, the Apple format - Magic Movie, Storyboard and Movie. Best to choose Movie it provides more control even though options are limited.
In the Movie window, there are two small icons at the left hand, select the left one to start a microphone recording with ability to overlay sound onto a video after video capture.
The microphone add audio icon or symbol is usually for adding audio your own voice or a narrative to videos you have previously captured with no sound. This could be useful if you have captured a video but did not let on to other people around you that you were shooting video - in a way the microphone feature to add audio can really enable more detail to be added to videos at a later date, provide additional contextual information to enhance video presentation for publishing or sharing.
Long press is the key shortcut on mobile for right-click - can rename files in Pages app on iPhone enables short meaningful unique titles for documents descriptive titles that really make sense - also Embedded stylesheets in a web page linked using the style HTML element tag better to retain formatting when accessing own user generated web pages from Android tablets
Sending documents written work between devices has long been craved for and has long been useful - information sharing really the desire that led to the inception also the beginnings of the first computer network. Information sharing via e-mail and communications is the basis for the formation of the Arpanet the US American miilitary network run by Defence of Advanced Research Projects Agency - the network sparked the Internet or in short the Internet or a network of networks evolved from a network started by the US American military.
Really email and attaching documents sending them to others also yourself is a means to make copies, back-up work also distribute and share with others - teachings can stem for electronic transmission of documents.
The Pages app on an iPhone has several options - long press is the key shortcut on a smartphone and within the Pages app works as right-click from a traditional mouse such as an Infrared mouse, a mouse with a red glow and usually Infrared is synonymous with wireless transmission and wireless capability of signals sent through the air.
Long press on a document a Pages app document to reveal Get Info, Rename, Duplicate, Tags, Copy, Move, Share and Delete. Rename handy convenient tool a great option enables short meaningful unique titles for documents - descriptive titles to really make sense when read on the small screen to evoke meaning. Get Info provides detailed info on files such as when they were Created, Modified and Last opened - this is a timestamp with date and time. Pages app for iPhone now comes with MailMerge - new feature enables the sending of documents information sharing amongst a group of people multiple recipients.
E-mail traditional used to share information send documents to others, but the Pages app has built-in synchronisation technology - files created with the Pages app on an iPhone can sync to an iPad automatically when multiple devices are connected via WiFi for example across a network also via mobile data. So email does not need to be configured on an iPad if you prefer greater security and an iPad has multiple users and is passed around in a household situation amongst a family.
iPhones often more personal by nature Android smartphones too - even adding a simple passcode can add a layer of security if you value privacy and secrecy, but helping others leads to greater trust - sharing information before people ask, being proactive can lead to greater openness also more trust in the long-term.
Smartphones are often personal but at the same time there are a lot more of them in distribution and circulation - Android smartphones are easier to connect to computers via USB and transfer data - also store a collection of web pages and JPEG images on a smartphone the same goes for Android tablets such as the Samsung Galaxy range.
Embedded stylesheets in a web page linked using the style HTML element tag actually can format web pages retain web designer formatting when single web pages accessed on a Samsung Galaxy tablet for example. External stylesheets actually break with formatting from stylesheets or CSS making web pages harder to read when users wish to for example view their own personal data created in web page HTML format.
Hi-tech smart systems can take over bodily function think prosthetic limbs also machine voices and Java the software development language is platform independent - also software development is generally modular in a sense and involves computer programmers working in teams, A great application of a bot for automations online is password managers such as lastpass.com never forget your log-ins and passwords
Web forms work in a client server model to collect user inputted data from the average web user - from a web browser to a web server, a user interacts with a request form (the HTTP REQUEST method used to fetch or retrieve web pages), then there is a return form and a Submit form. Over the Internet, forms usually filled-in using a three way handshake think Transmission Control Protocol with SYN bit for synchronisation in a connection also an ACK for acknowledgement. Web form interaction based on client server model with data sent or received. One server computer can serve many users or client computers. Forms get sent to script engine and data processing begins then output to server and respond to client - data processing on Artificial Intelligence Systems known as big number crunching.
Crunching data efficient can be used to predict weather patterns in respect of global warming and freak weather. Clustering is using multiple computer servers for load balancing - to a balance a network load of data traffic across multiple redundant network links.
Intensive data processing can be used to better understand also map the human Gnome - the human body is very complex. Actually the brain has billions of neurons also nerve cells - electrons really flow through the brain this is the movement of ions which often have a positive net charge, but neurons can behave oddly and electrons can misfire also creating all sorts of unpredictabile behaviour and chaotic scenes.
The brain stem is also known as the Central Nervous System in the human body and really the brain is what controls all bodily functions including movement - but actually with technology support, hi-tech smart systems can take over bodily function, useful with prosthetic limbs also with modern developments such as 3D printing to support medicine but also machines can help some people speak do not forget Stephen Hawking - giving examples also analogies helps to explain in education.
The Common Gateway Interface known as CGI is a back end to a web server and runs in a separate process assiting communication with a web server - between a client computer to a web server in a client server model.
CGI was historically written using Perl but actually it can be written in many langauges including C, C plus plus, Perl, Java, Fortran, Basic also JavaScript web programming language - JavaScript code embedded into web pages but can be referenced contained in a separate external independent file with the file extension dot js. JavaScript functions can be called on the loading of web pages via the onLoad= tag within the main body tag of a web page. The script tag also HTML element within the HEAD section of a web page provides a container HTML element put JavaScript scripts embed them into HTML web pages. There are websites that work as libraries for indpendent blocks of JavaScript code written by other people to really add interactivity and more functions to a web page - JavaScript Kit and also http://www.dynamicdrive.com/. The modular nature of software development, computer programming also web programming works well to really isolate independent blocks of computer code to separate or modulate computer code based on different functions.
This enables team work - multiple computer programmers working together, but errors can result when different multiple blocks of programming code come together - Microsoft Office very buggy slow unresponsive software contains millions of lines of code often written in house at Microsoft Labs by teams of software developers - the process is closed in a sense not transparent unlike the more open source model of software development. With open source code, there is more eyes or humans really to inspect code and look for bugs - make improvements also efficiences to computer code to help others.
In a nutshell, the Common Gateway Interface was often used for web forms to collect data also known as inputted data from an online user which usually represents a human user - but also bots can increase automation, and automate the process of filling-in forms.
A great application of a bot for automations online is password managers such as lastpass.com the website which can help users to remember passwords for websites can log them automatically into websites.
Microsoft web servers has the native language known as Active Server Pages - you may see in a web browser's address bar pages ending dot asp to denote the name for web pages. Really ASP is custom code bespoke in a sense intended for running on Microsoft web servers - most web servers run the open source Apache web server.
Really learning PHP the Hypertext Preprocessor the open source web programming language will give the average web programmer brighter employment prospects with an ability to change employer also progress - being agile in the computer industry is needed since the industry is very or highly competitive, need always to stay ahead and innovate, gain a real competitive advantage.
PHP also enables the interaction with databases such as MySQL - databases useful for storing data. It is one thing to store random data, but really it is more important to present data after analysis - XSLT can do this to display XML web pages the data storage language used on the web. Both XML and XSLT can be learnt from w3schools.com.
Files with the file extension dot jsp means Java Server Pages - java is a programming langauge useful for creating device or platform independent software applications. Java for software development is totally different in application from JavaScript the web programming language where scripts become embedded in web pages.
PHP version one started out during 1994 as a set of CGI scripts written using the Cee programming language - really introduced the idea of embedding code in HTML web pages. PHP version 2 two during 1996 was still used on Unix - really Unix enabled computer programming better than Windows in the early days. PHP version two scripting language embedded in the Apache web server.
Explaining breaking down complex topics is always worthwhile but actually for those experienced professionals in computing that have learnt the hard way through making mistakes by trial and error, they may get annoyed and frustrated when complex topics are really broken down or simplified - people can take advantage of free information known as freeloading, but also more quality information that is educational has great potential to lead to advancements in the computer also the technology industry - also women tend to be less tech savvy than men always playing catch up.
Significant also is encourage everyone to share knowledge on the web help them to author web pages may actually educate younger people in non computing disciplines. Really individuals sharing or passing on knowledge with junior workers fosters education the learning of lessons and keeps businesses also profitable.
People that become angry can really want revenge - important always to understand that digital is more than just a buzzword representing the current digital landscape. Digital is the cornerstone of modern life, the basis for almost everything now - really almost everyone on the Internet is a stakeholder in the digital ecosystem. Important everyone shares, contributes their unique knowledge of their industry and gives back to the world educates others.
International Space Station built using modular engineering with team working with payload modules sent to outer space on rocket ships - important to document work and share plans - space stations give astronaughts a temporary home in space to maintain satellites for the monitoring of events on Earth
The Kelvin temperature scale is an absolute temperature scale with zero at absolute zero. Since it is an absolute scale, measurements made using the Kelvin scale do not have degrees. Water freezes at temperatures below 273 or minus 273 or the temperature of Kelvin - Glasgow also has the River Kelvin and also it is the City with the Scottish Exhibition and Conference Centre also the Glasgow Science Centre with the iMax screen, Scotland's largest shimmering screen.
The temperature of Kelvin reflects the complete absence of thermal energy. Want to study science? The Kelvin temperature is fascinating, worth studying but global warming is predicted still it can actually be very cold in outer space in orbit even though astronaughts get closer to the Sun.
The sun transfers energy to objects far away (like us and the earth) by radiation. Radiation is the energy carried by electromagnetic waves.
The International Space Station first started to be built during 1998 and was completed around 2011 but ongoing maintenance is ongoing with new parts replacement parts arriving in rockets from Earth in modules - modular engineering is very important to transport payload maintenance modules for space stations from Earth to outer space. With modular engineering, important to draw up plans and share plans with others - sharing knowledge passes it on to younger people and future generations.
The International Space Station (ISS) is a modular space station (habitable artificial satellite) in low Earth orbit. It is a multinational collaborative project involving five participating space agencies: NASA (United States), Roscosmos (Russia), JAXA (Japan), ESA (Europe), and CSA (Canada).
China announced they plan to build a new space station - India also has similar plans. The international space station does provide a base for astronaughts to maintain rockets that orbit in space as well as repair satellite installations that are fixed in position orbiting high above the Earth in outer space - multiple satellites normally grouped in constellations and actually multiple satellites needed to work together to transmit signals for the proper functioning of SatNav whereby a SatNav fixed in a vehicle's dashboard references GPS coordinates in outer space to tell a driver their location and help drivers reach their intended destination safely. The International Space station does need to be maintained - actually new space stations will benefit astronaughts from other countries. Signals weakon over distance travelled - this is known as attenuation.
The first piece of the International Space Station was launched in 1998. A Russian rocket launched that piece. After that, more pieces were added. Two years later, the station was ready for people.
Building of the International Space Station was fought with challenges - zero gravity environment floating astronaughts with also physical objects floating as well.
Google as a source of information is not always accurate, but media news articles or online news articles have date of publication - fact checking referring to news stories can actually more accurately pinpoint when events happened in time as there is also the British Newspaper Archive with an online website - printed news and the printed word been happening for a long time.
29 twenty nine May 2022 twenty twenty two - China Space News: Image of Tiangong Space Station was Released Ahead of June Launch - Bloomberg. China space station in the early stages of development. Building a space station can take a while and also they need regular maintenance. Real life in orbit in space is not like the fantasy Red Dwarf space TV programme.
The International Space Station moves in a circle around Earth at just the right speed orbiting the Earth - the Earth is a sphere shape also satellites can both move and are fixed sometimes and also orbit the Earth - long ago people thought the Earth was flat, this might have come from seafarers not being able to see beyond the horizon when at sea - such sea farers were Sir Francis Drake who was the first explorer to circumnaviagte the globe in the Golden Hind docked at Brixham harbour on display near Torquay.
The International Space Station orbits the Earth at a constant speed - the centrifugal force pushing it away is exactly the same as the force of gravity pulling it in. This balance is called a stable orbit.
China first furoe into building a space station but the Chinese manufacture lots of products for Western countries, a friendly country willing to trade with Europe - China is seeking to enhance its capacity for scientific and technological innovation by building a large modular space station. Chinese leaders also hope that research conducted on the Chinese Space Station (CSS) will support their long-term goals for space exploration, including missions to the Moon and Mars.
The Moon is a natural satellite that orbits Earth. Artificial satellites also orbit Earth, carrying instruments for all sorts of communication, weather forecasting, scientific research, and even spying. Spying is really monitoring large land masses from above - for example check on tree count, find issues where there has been large scale destruction due to wildlifes. Climate change driving more intense, freak weather with more wildfires happening. Flood waters usually recede, but there can be damage for residents to homes and buildings - tsunamis can be dangerous real threat to life. The 2004 Asian tsunami was quite dangerous, 2005 for New Orleans engulfed in flood waters. Advance warnings for tsunamis really important in the Asian Pacific region of the world where most of the world's population actually live or reside.
In a nutshell - International Space Station built using modular engineering with team working with payload modules sent to outer space on rocket ships - important to document work and share plans - space stations give astronaughts a temporary home in space to maintain satellites for the monitoring of events on Earth.
Blurring out Google Street View images can make people suspicious - the curious mind stems from this and draws attention to properties also vehicles the police use ANPR Automatic Number Plate Recognition
The outside of a property or home only really becomes a major privacy or security issue when your neighbours also other people in a town or city know who lives there.
It is actually difficult to discover who lives in a particular dwelling, but actually Royal Mail must have a great deal of priviledge information linked to occupiers as well as the address of properties. However, postal service workers often just cover a small area and postal workers usually low paid and move on with their life have career aspirations. Royal Mail usually recruit a lot of students around Christmas time. Think the young boy or girl, loon or lassie, an average teenager delivering newspapers on a bike. Newspaper delivery can help older people read all about the news, but really helping older people to adopt digital technology and access pressreader.com thousands of newspapers available via onscreen in a web browser for around 22 pound sterling a month. With this, there is a need for ongoing manufacturing of large screen displays - small displays smartphones tend to be made with AMOLED and Gorilla glass. Really most televisions or teles likely still using OLED - before OLED there was LCD and Cathode Ray tube. Cathode ray tube were the bulky televisions which often took up great space. LCD Liquid Crystal Display and also TFT Thin Film Transistor the flat panel televisions or teles were an improvement in homes across the land.
Google Street View enables real people to block their home from view if they so wish, but really the most at risk are those in communities where everyone knows where they live. Masking addresses or homes where someone lives really hides crime in a sense - it is always better to help others, be respectful, provide useful digital services - have a moral compass, consider ethics and morals, be nice also.
There is actually a home blurred out on Google Street View beside Riverbank School by Tillydrone Library and Learning Centre on Hayton Road. Home blurred out next to a primary school - who lives here really? There is https://offenders.org.uk/?city=Aberdeen. This is the sex offenders database, important to make people aware. Blurring out homes may actually cause more distress, cause people to be alarmed. Really it is better for everyone to be of good behaviour also of good character. Blurring images can really hide crime, may it harder for the police to track offenders also criminals.
Residents obscuring their property on Google Street View makes one wonder what is going on there - what crimes are happening in a given locality - this is the curious mind. Active travel really can explore neighbourhoods, towns and cities and photo and video capture along with sharing can really show others nothing sinister is happening at a given address or locality.
A lot of people may be concerned they do not have a choice to opt out of Google street view image capture, but that would make driving around streets much harder, be more time-consuming and really the world is large - there are many residential streets in Aberdeen also. Street view images can really assist real people with navigation around a physical real world geographic area.
Those that seek privacy and greater privacy protections provoke inner curioristy leading to perhaps driveby police visits. It is not clear if the police actually do this, but openness and people being nice helping others including the most vulnerable is always better.
Hayton road in Tillydrone during Spring 2022 had a nice wild flower meadow attracting bumble bees at the entrance to the street.
What do people see online? It is likely no two people read or see the same news articles or videos. See something interesting, you need to bookmark it since it can disappear - actually BBC News Online is a rolling comprehesive news website with extensive coverage world events, but sometimes stories can be hard to find or locate again if you want to later reference something you have read. Smart algorithms for web search become necessary - and search is really driven by key search terms. Search for something in particular and search results are often retrieved that are similar this is use of themes to classify data. Classifying data has roots actually to libraries think the Dewy classification system of works of literature. Really, classifying written works of literature relies on smart professionals with knowledge of information retrieval but also computer programming including algorithms which rely also on logic.
Finding images again actually necessitates remembering key terms - key search terms actually can really help to index online material - historically HTML web pages had the meta tag to denote keywords to describe a web page, but search engines tended to not rely on human entered key words or search terms since it was too open to abuse - really every webmaster wants their website to appear at the top of search results. This is what has drive smart search really - web search driven by smart algorithms from computer software. Algorithms are a set of rules computer programming logic in the truest sense - a computer program really a set of sequential instructions that may go through an interpreter or compiler - some applications on Linux need to be compiled from tarballs files with the file extension dot tar. This gave rise to the Tor network for software download. Tor network can also be associated with the Dark net? What is the Dark net really? All web pages seem to be publicly available.
Of course, Google may not index every website, but then there is word of mouth, social chitchat in office buildings and schools. Who knows what really? What information goes around inside a school? Really being able intercept communications, break people up is really vital to public safety. Schools revolve around a community - it may be a close knit community in some circumstances and teachers are in overall responsibility for 20-30 children. The Scottish government have long planned to lower class sizes to 20 children - the Scots government has long recognised the importance of one to one support, keeping class sizes down to help really the most disadvantaged children those with special needs.
Burglars may be able to better plot how to enter a home when images of the outside are shown, but really domestic abuse tends to be more common anyway and may go unreported. Warchalking is driving around neighbourhoods to look for unsecure WiFi networks or unsecure wireless networks to piggyback on - actually BT Openzone tries to make warchalking uncessary by enabling all BT customers to log-in to routers belonging to all other BT customers.
How to ask Google to remove items
Here’s how to request that images of your home or car get blurred out:
1. Search for your home address on Google Maps.
2. Click on the image of your home or click on the little orange man at the lower right of the screen and drag him to your house.
3. Click on Report a Problem available from the three vertical dots top left of a screen next to where the address is mentioned. User interfaces can be dynamic and change - actually user interfaces changing can better provide positive feedback to users be more helpful in a sense. This is the primary driver of dynamic user interfaces - to tailor screens to the user provide more relevant information. This approach works well online with screens built using often PHP web forms, but very frustrating when done over the phone such as the 101 Police call line for non-emergency calls also 111 NHS 24 - very frustrating when callers prevented with multiple options put on hold also.
PGP is Pretty Good Privacy - the free encryption service which can scramble information sent and received over email or over a computer network. Users can make mistakes, but actually mistakes can be positive when people seek to learn from their mistakes share their lessons with others. This can lead onto real breakthroughs also transformations in society. It is often the sending of messages and communications where real people learn what they did wrong - this also leads onto improvements to help others. The most well meaning may not be paid - but the core purpose of a charity is charitable purpose with community benefit in mind. Social enterprises can really be worthwhile to support - help more vulnerable people while at the same time support business and the economy, create jobs and job opportunities also.
4. Fill out the form, where you can select what part of the image you would like to blur. Google asks for descriptive information, such as the color and model of your car. Add that you are making this request because of privacy concerns.
Google will need your email address for follow-up questions and to send a confirmation once the action has been taken. Blurring cannot be undone but photos of homes may be shared elsewhere when people with influence photograph them or shoot video. Masking privacy really only fuels a situation in a sense - discoveries usually born out of curiosity. Marco Polo was an explorer. Marco Emilio Polo was a Venetian merchant, explorer and writer who travelled through Asia along the Silk Road between 1271 and 1295.
Marco Polo was born in 1254 in Venice, capital of the Venetian Republic. His father, Niccolò Polo, had his household in Venice and left Marco's pregnant mother in order to travel to Asia with his brother Maffeo Polo. Their return to Italy in order to go to Venice and visit their household is described in The Travels of Marco Polo as follows: they departed from Acre and went to Negropont, and from Negropont they continued their voyage to Venice. On their arrival there, Messer Nicolas found that his wife was dead and that she had left behind her a son of fifteen years of age, whose name was Marco.
Nicholas Negroponte (born December 1, 1943) is a Greek American architect. He is the founder and chairman Emeritus of Massachusetts Institute of Technology's Media Lab, and also founded the One Laptop per Child Association (OLPC). Negroponte is the author of the 1995 bestseller Being Digital translated into more than forty languages.
One Laptop Per Child the project started by Nicholas Negroponte to put laptops in the hands of African children which were solar powered designed for a rugged envionment gave laptops away for free https://laptop.org/ - Aberdeen City Council has been giving Chromebooks away for free to Scottish school children and they all need power - a Scottish child is really priviledged think John Logie Baird and James Webb now there is the James Webb telescope, but there was also James Watt as well inventor of the steam engine. Scots children live a lavish power hungry lifestyle - need for sustainable energy arises to keep Scotland a safe, peaceful country.
James Watt was a Scottish inventor, mechanical engineer, and chemist who improved on Thomas Newcomen's 1712 Newcomen steam engine with his Watt steam engine in 1776, which was fundamental to the changes brought by the Industrial Revolution in both his native Great Britain and the rest of the world.
Website with details on how to remove images from Google Street View - removing also obscuring images can actually lead to curious individuals wondering what is going on
In a nutshell - Blurring out Google Street View images can make people suspicious - the curious mind stems from this and draws attention to properties also vehicles the police use ANPR Automatic Number Plate Recognition.
Arpanet is the origins of the Internet - a military network set up for education and research purposes which really enabled email and communication - threaded processing is here in multiple cores of processors linked together in chains and Quantum computing is now possible
The Internet has its origins in the United States of America Advanced Research Project Agency Network (Arpanet) - this was the first public packet-switched computer network. It was first used in 1969 and finally its fate was sealed during 1989 - the military network was decommissioned. Arpanet really the first computer network started out with a military purpose also with the aim to support electronic communications also email among military personnel. The main use of Arpanet was for academic and research purposes, but actually it was used by the US military. The first military network started in the US and then the network grew into an Internetwork or a network of networks using TCP/IP as the set of rules to govern the network - TCP/IP is the four layer model that oversees regulation of the Internet and governs data transmission ensuring two computers anywhere in the world can talk to one another using the same language or set of rules.
To enable data communication on the Internet, all computers must speak the same language. Really computers on the Internet use the same basic language - this is in stark contrast to people around the world - countries tend to have their own native tongue - actually learning a local langauge or local lingo can help travellers also migrants to integrate with a country that is foreign.
The Internet and data communications supported by TCP/IP is really what has brought the world together, brought people of different creed and colour together - the Internet enables real world sharing in real-time and with this information can start in one locality and reach someone in another part of the world on the other side of the world.
Computer scientists Vinton Cerf or Vint Cerf and Bob Khan are credited with inventing the protocols, or set of rules, that are used on the Internet today for computers to talk to one another in a machine-to-machine manner. Arnold Swarzenegger the former governor of California starred in Terminator 3 - Rise of the Machines. California is also Silicon Valley - the state of California is quite fragile in real physical terms with often exotic temperatures and wildfires in recent years in nearby forests. Just north of California there is the often dry and humid state of Nevada home to slot machines and gambling small City Reno also - between Colarado and Utah there is the Grand Canyon and nearby Death Valley where temperatures have reached the highest in the world.
The first computer - really the first CPU or processor linked to a computer's memory function was created by Charles Babbage around 1822. Alan Turing famous for code breaking also synonymous with Britain's second world war code breaking centre Bletchley Park and code breaking effort against German Enigma machine - the name Enigma means mystery in simplest terms, the museum near Milton Keynes threatened with closure in the past.
Knowledge of maths and logic useful for computer programming also essential to build AI and Artifical Intelligence based on smart algorithms - smart cities are born from this, but actually language and communication is just as important - being able to digest language and interpret subtle cues in cryptic messages is just as important. Being able to look for themes and make them stand out and resonate is important to bring out a message - this is really vital to advancing technology.
A CPU is the brain of a computer performs calculations per second often quickly think Snapdragon Quantum processors and Quantum computing and is connected to memory locations or RAM. A processor stores data temporarily in RAM memory and accesses when it is needed - RAM memory is volatile and gets erased when the power goes down. That is why a computer's start-up information is kept, stored and load in ROM. ROM data includes boot information linked to PXE network cards or network adaptors which can acually enable the remote boot up of computers from a distance.
Computer processors are more efficient when processors are linked or connected together think Dual Core processors this is two processors connected together. Quad core processors more powerful this is four processors linked together really enabling many more calculations per second. Super computing really comes into its own for climate predictions and modelling - think climate science and number crunching.
Intel is really the quality processor manufacturer but AMD competes the competition is quite intense. Also America and China constantly competing to see who can develop the fastest computer - this is really to improve and advance computing technologies with the view to doing more with a single computer. A big supercomputer likely has multiple processors really the more processors chained together really is what enables climate predictions much more efficiently. Creating models using supercomputers for climate predictions is really key to try and look into the future to mitigate harms from natural world destruction coming from events of mother nature.
Raymond Samual Tomlinson was an American computer programmer who implemented the first email program on the Arpanet system a US military network with educational and research purposes. This was the precursor to the Internet in 1971. Really the first military network Arpanet was just used for email the sending of messages and for communication.
Guglielmo Marconi one of the pioneers of radio communications - he sent the first wireless signal during 1898 from Ballycastle to Rathlin Island along with local politician George Kemp - Marconi stationed at 45 North Street, Ballycastle - a small village near Torr Head opposite the Mull of Kintyre and the Scottish mainland. This event in history is recognised by the Ulster History Circle.
Heinrich Rudolf Hertz was a German physcist who first proved the existance of electromagnetic waves predicted by James Clark Maxwell's equations of electromagnetism. Hertz is the unit of frequency that measures cycles per second. Electromagnetic waves are also known as radio waves.
America and China often compete to see who can build the fastest supercomputer Quantum computing is now here a real breakthrough enabling fast complex calculations at the processor level - America and Britain actually have a special interest relationship - when the war in Iraq broke out messages were beamed down to the Iraqi people via airship to help them actually keep them safe prevent them from engaging in warfare. The Iraq war around 2003 was an American British joint invasion spearheaded by Tony Blair who convinced George W Bush with a dossier making a case that Saddam Hussein had weapons of mass destruction.
Lightweight Directory Access Protocol LDAP used for authentication or to manage also control access to computer systems via usernames and passwords in both Windows 10 version ten also Linux - Group Policy on Windows domain controllers can restrict user access to websites and CAPTCHAS designed to cut down on bots make users click visual icons to log-in sometimes and automated technologies can really lead to spam and unwanted communications
In a Linux system, access to files, folders also system resources can be controlled using a system of permissions to control user access - users can be placed in groups to manage users. This can provide security to an extent give users access to their locally saved files, but also authentication involves usernames and passwords this is logging-in on computer systems. Linux also Microsoft Windows uses LDAP the Lightweight Directory Access Protcol for authentication or to control access to system resources on computer systems. Permissions on Linux control user access in terms of read, write and execute to files and folders - permission or right of access settings placed on files and folders.
LDAP Lightweight Directory Access Protocol user authentication is the process of validating a username and password combination with a directory server such MS Active Directory, OpenLDAP or OpenDJ. LDAP directories are standard technology for storaging user, group and permission information and serving that to applications in the enterprise.
Authentication involves use of usernames and passwords - sometimes online users may encounter CAPTCHAS small icons usually users have to click on and these involve matching images, choosing the correct image through clicking to demonstrate users are human - CAPTCHAS designed to cut down on bots automated technologies which can really lead to spam and unwanted communications. Completeing web forms using CAPTCHAS can be quite difficult for some users - even for users proficient with online web based technology, such users can still encounter difficulties also frustrations.
Personalised online also Internet web based services can be useful, but actually openness, open data, sharing and publishing may help others and also the person who shares may find it more rewarding also satisfying.
Google short or brief automated search results can be useful to copy and paste, enable also a human intelligent user to expand on short descriptions with more details and also helpful analysis which real users may actually gain tremendous benefit from.
Microsoft Windows server uses Active Directory, which is the system used to share resources - access often shared through the system known as Group Policy which can restrict users. Group Policy restrictions can also enable web filtering also, filter websites visited - Proxy servers can also do this but Proxy servers are more complicated to configure. Group Policy built into Microsoft Windows servers running Active Directory - domain controllers run Active Directory and to convert an ordinary server to a domain controller type in dcpromo into a Windows search box and type Enter.
LDAP is a directory services protocol. Active Directory is a directory server that uses the LDAP protocol. LDAP is the Lightweight Directory Access Protocol.
Simple authentication using LDAP protocol - Simple authentication consists of sending the LDAP server the fully qualified domain name of the client (user) and the client's clear-text password (see RFC 2251 and RFC 2829). This mechanism has security problems because the password can be read from the network.
How do enable LDAP authentication in Active Directory - Select Start then Run or use the Windows search box lower left Windows 10 version ten computer system, type ldp.exe, and then select OK. Select Connection and then Connect. In Server and in Port, type the server name and the non-SSL/TLS port of your directory server, and then select OK. For an Active Directory Domain Controller, the applicable port is 389.
A protocol that uses SSL or TLS to secure communication between LDAP clients and LDAP servers. The terms SSL and TLS are often used interchangeably unless referring to a specific version of the protocol.
Grasping PHP, variables, strings and escape sequences also core maths topics include integers, booleon true false also floating point representation essentials for going into orbit - Google automated search suggestions clever algorithm can really bring back memories when you have some previous knowledge of a technical subject
With HTML, CSS also JavaScript and PHP, you can learn how to develop in a practical way an Intranet using bare bones web programming languages - the setup of Apache with MySQL also PHP the Hypertext Preprocessor open source programming language on a local web server can really enable a local storage location or home of web page files that comprise a website.
JavaScript is client side scripting and PHP is server side processing often used to create web forms to get or seek information from a web user. JavaScript useful to check form data for input or to verify it - checking data with JavaScript can really add validty checks on to user entered data much better actually and certainly more user friendly than the form submission controls whereby you often after to click on icons to verify you are a human - icons which represent certain graphics. These picture representations can be hard to use at times - hard to transmit data complete a form.
PHP stands for Hypertext Preprocessor - PHP embeds into HTML and it is akin to the C or C plus plus programming language same syntax has Linux shell commands.
PHP is open source also platform independent.
PHP can actually generate HTML files on a dynamic basis - PHP server side includes can enable a single page like a template to be reused.
Alt tab is very useful Windows shortcut key to move between apps - really useful when PowerPoint files are saved in the PPS or PowerPoint Show format.
PHP has an interpreter bullt-in and completely parses and compiles a page before processing it.
PHP data types include Boolean logic, numbers and strings - boolean logic refers to AND also OR gate.
Notepad window resizing very handy or useful feature on Windows 10 can really enable a user copy text like the traditional document holder approach with documents beside a computer, also add new text analyse data also.
Loose comparison in PHP ignores the differences between numbers and strings, for example ("2" == 2) is true.
Strict comparison in PHP rejects the differences between numbers and strings, for example ("2" == 2) is false. True and false is what is known as boolean logic or boolean states.
Integers and floating points are two different types of number there is also floating point representation - and actually STEM is Science, Technology, Engineering and Maths. Numbers is maths, electronics is actually engineering and actually this is really the remit of mechanical also electrical engineering not computer networks or computing, but electronic components are usually solded into circuitboards so in essence if you want a hands on job role messing around with transisters making new electronic ciruits you need to study electrical engineering. Civil engineering is usually associated with building bridges.
However really to properly understand the function of a computer network, young people need to be smarter now more than ever before for an age of Scottish Smart Cities - electronics and physics is actually very important. Physics is really about what's possible in terms of the spatial atmosphere and with this there is gravity - actually go into orbit and astranaughts reach zero gravity this is weightless like also being underwater this is the opposite actually of floating up to the surface also treading water.
Really Google search and the automated results are actually very clever and intelligent smart also based from a clever algorithm can really bring back memories when you have some previous knowledge of a technical subject or discipline such as computing also networking also data communications. That said having previous knowledge actually makes Google search automated results much more effective enables honing or fine tuning also ability to select results based on relevance - this is also part and parcel of information retrieval. Always keeping lecture notes from previous study long-term, scanning notes taking the time and effort, can really help to reflect look back over a subject previous studied.
PHP strings can use double quotes also single quotes - double quotes also quotation marks or parathensis are interpolated and single quote strings are not interpolated. Interpolation is where variables expand. In computer programming there is also constants which is a constant number that does not change, variables are variable and values can change in a dynamic way. Constants not to be confused with consonants which is any letter in the alphabet really other than the vowels A, E, I, O and U - Carol Vonderman on Countdown always used to refer to consonants. Carol Voderman was a maths expert skilled in numbers appeared on Channel 4 four programme Countdown. What is she doing now? Is she training children in maths for STEM careers?
PHP variables start with the dollar symbol and variable names are case sensitive.
PHP has escape sequences such as \n for a newline, \t for new tab character, \\ two double slahes is actually a single slash charater. Really the most important escape sequence is actually the ability to create a new line - with this you can send data through PHP forms in a clean format with statements and user data separated on different lines - this is clarity in communication. Seeking to be clear and avoid ambiguity words with multiple meanings also making disambigous statements is always wise.
The unset PHP function can be used to empty a variable.
Arrays in PHP also computer programming lanaguages are lists in the purest sense. Really lists enable lots of options or stored data, an efficient way to store multiple variables that share a similar theme.
PHP contact form for getting data input from a web user
<form action="http://www.google.com/cse"><p><label for="q">SITE SEARCH:</label> </p>
<p><input name="q" id="q" type="text" size="15" />
<input name="sa" type="submit" value="Go" class="searchbutton" />
<input type="hidden" name="cx" value="011609466277370695250:umaa-ygo0zi" />
<input type="hidden" name="domains" value="domainname.com" />
</form>
Scottish Smart Cities and help to maintain them - Circuit Breakers, AND gates also transisters often used in electronics also in software development also algorithms are the rules that make up a computer software program or smartphone app
Computer programs also apps for smartphones and tablets involve programming logic - inherent in this is the work of algorithms, which are a set of rules. Algorithms are often procedural written in a sense as an independent block, a control block in the case of circuit breaker code. JavaScript the web programming language uses functions instead of procedures - procedures more used in software development.
However, parameters can be passed to both procedures and functions. In a program for drawing shapes, the program could ask the user what shape to draw. Drawing shapes useful programs for kids or children to start learning computer programming in primary school. Always best to get kids into programming young - teach them to make helpful programs that are useful help others perform some sort of novel program. Parents likely have problems - better to tell your kids what problems you face, sound or bounce ideas off your children. Tell them what you would like - what would make your life better.
It is actually young people that are really digitally aware - middle age people actually most of them unless they studied computing do not have much grasp on how to really get computers to do want they want. This is the important of computer literacy courses aimed at adults also training up adults in computing - the teachers of Maths and English also - the primary teachers so they can impart wisdom onto the children. Teachers often well meaning want the best for their children, but most actually have not been adequately trained by the Scottish government.
Most teachers plough on from day to day doing their best - they do a great job for often a modest pay put up with tantrums also demanding or challening behaviour. Children from a very young age really have their own personality often a great zest for life and a will to live.
Circuit breaker is a design pattern used in software development. It is used to detect failures and encapsulates the logic of preventing a failure from constantly recurring, during maintenance, temporary external system failure or unexpected system difficulties.
Circuit breaker is a design pattern used in modern software development. It is used to detect failures and encapsulates the logic of preventing a failure from constantly recurring, during maintenance, temporary external system failure or unexpected system difficulties.
Circuit breakers interrupt the flow of electrical current when it exceeds a predetermined amount, which is where a circuit breaker's ratings come into play. Circuit breakers are rated based on the amount of current that they can safely carry and the amount they can safely interrupt.
In a nutshell, Scottish Smart Cities and help to maintain them - Circuit Breakers often used in electronics also in software development also algorithms are the rules that make up a computer software program or smartphone app.
Circuit breakers are also a means to control the flow of ions in an electric current.
When you need to limit the flow of current to a device a resistor would be the component used.
So there is circuit breakers and also resistors.
In computer programming logic there are AND and OR gates - these same gates are also present in minitiature electronics such as circuitboards, which are often manufactured in countries such as China.
In a series circuit, the output current of the first resistor flows into the input of the second resistor; therefore, the current is the same in each resistor. In a parallel circuit, all of the resistor leads on one side of the resistors are connected together and all the leads on the other side are connected together.
An AND gate is an electrical circuit that combines two signals so that the output is on if both signals are present. The output of the AND gate is connected to a base driver which is coupled to the bases of transistors, and alternately switches the transistors at opposite corners of the inverter.
AND gates, OR gates also transisters is the stuff of technology minitiature components and circuit boards linked to soldering actually small fragile components also connected to silicon the microchip - the name Silicon Valley is California.
Android Linux is really omnipresent and everywhere filling lots of pockets - Linux help via traditional manual or man pages based on autoflow to control flow of information really innovative concept
Android Linux is everywhere and Android is free open source software, free to play around and tinker with, experiment also advance education of yourself and others - really the new Raspberry Pi is cheap a compuer built into a keyboard that can be linked to a bigger screen, a monitor or a TV enable magnification of content very well.
How many people can really remember the IP address of a website - the four numerical dots? DNS translates domain names - the often logical names that be good branding in advertising - ability to point a police officer or solicitor at a website might help you when in panic mode, in distress, suffering perhaps halluciations from LCD perhaps also known as magic mushrooms the pyschadelic drug with aphrodisiac properties that really changes or alters perception of reality. What do you hold to be true - the science community long had peer review to check work against others? Sharing information also open information enables wider scrutity and this is really how advancements happen. People can have thoughts - they may not be accurate but you have to start writing and talking to really start a discussion or create a topical debate to make progress - open your life up to scrutiny. With this, having a good moral compass or framework to shape your decisions is always very wise - called also ethics and morals.
AutoFlow great concept with big potential to really enable dynamic help control the flow of information including help systems
Linux is different from Windows 10 in terms of the help that is available to the user - Linux systems have what are known as manual or man pages - these are the help pages. Right-click on a Ubuntu desktop for example and click Terminal to open a command screen - Ubuntu most popular form of Linux and is user-friendly also from South Africa.
On a Linux system such as Ubuntu, Typing the word man brings up help options - type man then a command such as ls -l to explain the listing or ls -l command for example man ls -l. The man ls -l command displays or lists running processes - this is a useful command on a Linux system. The man command has a piping command known as man | - the pipe command is usually left of the zed or zee key on a computer keyboard and usually you need to hold down the shift key to make a pipe symbol.
Piping commands enable man pages or screens to be displayed slowly a screen at a time with an element of control like an autoflow - this really enables Linux users to get detailed info, help info on a particular command. The man command with the pipe symbol enables information, useful helpful information also to be broken up given or displayed in small screens, windows also segments is another term.
Getting help from a computer system can be very useful - it enables resourceful individuals who are able to do problem-solving. Getting help also enables information seeking behaviour - the web is vast and being able to do a thorough search can really help to find really useful information. Type in a search phrase, word or string into Google for example then type colon and a specific site URL also Uniform Resorce Locator (domain name) or web address to search a specific site. This can really help you search particular websites for information.
DNS is the Domain Name System and domain names help computer also web users to remember names of websites - computers usually have a numeric IP address, numbers separated by dots. DNS enables domain name to IP address mappings enables translation helping ordinary users to type in a domain name of a website and go to the correct web page, retrieve previously visited information or a website visited before or in the past.
Apple Pages app magnification Presenter mode does not work after conversion when existing text inputed into Pages - Cloud Convert Apple Pages converter shows promise
The Apple iPhone also the iPad can be useful mobile devices for productivity - actually the Pages app can be useful ability on these devices to Magnify text using Presenter mode with an autoscroll like technology feed also akin to autoflow - news readers long relied on autoscrolling to broadcast news programmes.
HTML web pages best format really to share and preserve information but actually hard to convert existing text on a web page to the Pages app to really make news worthy content without typing again wasting time. Text to Pages app conversion is possible but Presenter mode and magnification may not work. Really this is an area for future work - there are other benefits besides news actually but news is a great example, basically use of magnified text using Presenter mode Pages app iPhone could help more vulnerable persons at job interviews also at board meetings - it could help MPs to really read back points, read them aloud, debate ideas for laws while also drafting them at the same time really cutting out the need for printed sheets of paper this is how mobile technology benefits the environment.
The ability to reuse text for example copy your own content also the work of others to put into a Pages app document could really make for more educational content broadcast in shared video on the web also on social networks also support TV producers.
At present there is duplication actually with the need to retype on Macintosh computers also iPads for copying over syncing to more mobile devices for example the iPhone, but actually being creative should always be encouraged, people giving back to society and the world. There is a still a place for copying but copying also adding in new content can enable greater understanding also analysis enable also great progress.
When people learn to create a computer program - the first output line is usually Hello world.
Convert from Pages app documents to Doc, DocX, PDF also export to TXT, EPUB and JPEG. Really conversion is possible but actually enabling magnification also autoscroll possibly autoflow after conversion to the Pages app actually does not work. This hinders the production of educational videos with narratives being distributed.
https://cloudconvert.com/pages-converterCrosstalk undesirable data signals and Layer Two Tunnelling Protocol for using Virtual Private Networks
As it relates to structured cabling, crosstalk is electromagnetic interference from one unshielded twisted pair (UTP) to another. Typically, it occurs because they are running in close proximity to each other.
Crosstalk - unwanted signals in a communication channel (as in a telephone, radio, or computer) caused by transference of energy from another circuit (as by leakage or coupling) also conversation that does not relate to the main topic being discussed and conversation for an audience.
What causes Crosstalk in Ethernet - So, when wires are not tightly twisted, crosstalk happens. To prevent crosstalk, wire pairs in a Cat5e cable should not be untwisted more than 0.5 inches and not more than 0.375 inches for Cat6 cables. Crosstalk can also happen when cables are poorly designed or installed.
What is wireless crosstalk - In wireless communication, crosstalk is often denoted co-channel interference, and is related to adjacent-channel interference. In integrated circuit design, crosstalk normally refers to a signal affecting another nearby signal.
The best way to eliminate crosstalk is to exploit the very parallelism that leads to its creation by closely coupling the return path to ground to your high-speed signals. Since the return path is equal in magnitude but opposite in direction, the fields cancel out and reduce crosstalk.
There is near-end crosstalk and far-end crosstalk also there are other forms of crosstalk nowadays used in telecommunications. The crosstalk signal can be induced from the aggressor interconnect into the victim interconnect as the signal travels, and where the signal is detected depends on the coupling mechanism and signal swing direction (rising vs. falling edge).
Twisting copper wire reduces crosstalk, interference from neighboring lines, and interference from other environmental sources.
You can use Layer 2 Tunneling Protocol (L2TP) to create virtual private networks (VPNs) over public networks such as the Internet. Because L2TP is an Internet Engineering Task Force or IETF standard, it provides the interoperability between different VPN vendors that protocols such as Microsoft’s Point-to-Point Tunneling Protocol (PPTP) and Cisco’s Layer 2 Forwarding (L2F) protocol do not, although L2TP essentially combines the best features of these two protocols and is an extension of them.
Digital marketing is an important skill to master nowadays - Google AdWords makes advertising via search results easy but do be wary to avoid being too subtle using advertising terms
Digital marketing and communication these days as never been so important - getting your message across or understood in a crowded online world can be difficult. Even Sir David Attenburgh admitted it is a challenge to get your message across, but actually when he joined Instagram he had a million followers in no time.
Advertising online involves writing short adverts for use with Google AdWords - this is pay to advertise with adverts delivered alongside search results. Google AdWords can really clutter search results, make users click on links to websites they would rather not visit - also some false companies and some individuals peddle false pills using Google AdWords.
Businesses, advertising executives and political campaign strategists know the power of subliminal messages to advertise commercial products for retail sale - such messages are often subtle but can be very powerful influence shopping behaviour in terms of commercial adverts in connection with retail stores and online ecommerce websites with a shopping basket. Scientists have proven that hidden messages, say in advertising, attract the brain’s attention even while the individual in question remains blissfully unaware they are being advertised to. Some might say such advertising tactics like this or such as this is devious coy even.
Cookies on websites are small files linked to a website that download to a user's computer that can track behaviour also keep a record of a person or user's access to a particular website. It is possible to delete cookies that track behaviour via your web browser. Using Mozilla Firefox, click the three horizontal lines top right, then click Privacy and Security and Clear Data to clear or rid your computer of tracking cookies linked to websites. In Google Chrome, click three vertical dots top right, then More tools, then Clear browsing data. From time range drop-down menu, click All time and then click Clear data. Cookies are selected by default for deletion but you can click the Advanced tab to customise options for deletion.
Do sublime or subtle messages really work in advertising - Some early research suggests that subtle messages which affect the subconscious mind may influence food and diet-related thoughts and behaviors, this could lead to obesity and also lead to the development of eating disorders. However, other research has found that subtle messages with weight loss cues have no effect. The research is mixed, and there are not nearly enough studies on the topic. Some research actually shows subtle messages can have an impact when used in connection with magnetic resonance imaging. MRI scans can also be used as brain scans to map the human brain which is very complex with billions of neurons - also MRI scans can examine the spinal cord as well as diagnose numerous conditions such as torn ligaments. MRI scans offer more detailed view of the human body than conventional X-rays.
In a nutshell - digital marketing is an important skill to master nowadays - Google AdWords makes advertising via search results easy but do be wary to avoid being too subtle using advertising terms. Subtle messages often sublime or also known as subliminal in psychology.
Web pages make for great online help, help is available in Windows 10 ten via the F1 key to enable web search and Linux computer systems have Man pages
Everyone has knowledge of something - when we all document our knowledge share and connect, we can all learn more.
Creating web pages using Notepad typing in HyperText Markup Language or HTML and saving web pages with dot html file extension can make it easy for really anyone to write and share useful knowledge that helps others.
In Windows 10 or ten, press the F1 or ef-one key top left on a keyboard to launch a web browser for help - this is the new help system in Windows 10 - the search box at the bottom of the screen can be used to get help also in a sense, type in program names search also for files on your computer.
Linux is different from Windows 10 in terms of the help that is available to the user - Linux systems have what are known as manual or man pages - these are the help pages. Right-click on a Ubuntu desktop for example and click Terminal to open a command screen - Ubuntu most popular form of Linux and is user-friendly also from South Africa.
On a Linux system such as Ubuntu, Typing the word man brings up help options - type man then a command such as ls -l to explain the listing or ls -l command for example man ls -l. The man ls -l command displays or lists running processes - this is a useful command on a Linux system. The man command has a piping command known as man | - the pipe command is usually left of the zed or zee key on a computer keyboard and usually you need to hold down the shift key to make a pipe symbol. Piping commands enable man pages or screens to be displayed slowly a screen at a time - this really enables Linux users to get detailed info, help info on a particular command. The man command with the pipe symbol enables information, useful helpful information also to be broken up given or displayed in small screens, windows also segments is another term.
Getting help from a computer system can be very useful - it enables resourceful individuals who are able to do problem-solving. Getting help also enables information seeking behaviour - the web is vast and being able to do a thorough search can really help to find really useful information. Type in a search phrase, word or string into Google for example then type colon and a specific site URL also Uniform Resorce Locator (domain name) or web address to search a specific site. This can really help you search particular websites for information.
DNS is the Domain Name System and domain names help computer also web users to remember names of websites - computers usually have a numeric IP address, numbers separated by dots. DNS enables domain name to IP address mappings enables translation helping ordinary users to type in a domain name of a website and go to the correct web page, retrieve previously visited information or a website visited before or in the past.
The Earth our shared world has an electromagnetic field and multiple magnets combined has an effect on radio waves whereby mobile phone signals get blocked
Inverse Square Law linked to omnidirectional also light sources, radiation also electric fields - Any point source which spreads its influence equally in all directions without a limit to its range will obey the inverse square law. This is worth discussing in relation to Electromagnetic Interference or EMI. Seeking to limit interference in wireless signals sent over the air also through a medium can increase throughput in data trasmission. Messages sent over the Internet are sent and received in data packets - packets of data less than 64Kb are known as runts or malformed or corrupted data packets - really User Datagram Protocol or UDP has no error checking and makes use of audio and video over computer networks efficient - actually less error checking with video makes sending video more efficient. The WebM format really compresses video down keeping good visual quality for low file size. The ability to talk on video alter a conversation on the fly actually is a compromise to lack of error checking making error checking unnecesary.
Inverse square law is actually physics and really you have to understand physics to a certain degree or extent to learn how computer networks work or function.
This comes from strictly geometrical considerations - the planet our shared world or Earth is a sphere. The intensity of the influence at any given radius is the source strength divided by the area of the sphere.
Earth’s vertical electric field Although we do not realise it, we are walking around in a strong electric field and it turns out that high on the Antarctic plateau is a great place to study it.
Why is the Earth and its atmosphere like a pair of charged parallel plates? In a region of the atmosphere known as the ionosphere, parts of the spectrum of the radiation from the sun is so energetic, that atoms and molecules in the air are separated from some of their electrons. This ionisation is where the ionosphere gets its name. Its lowest levels are about 100 km above the earth’s surface. And because the electrons are free to move around, the region can conduct electricity like one of a pair of parallel plates.
The other parallel plate is the earth itself, which is also capable of conducting electricity. And although the earth is spherical, the atmosphere is quite thin. The atmosphere also has the ozone layer which is also linked to emissions and fossil fuels since holes in the ozone layer can happen - really electric vehicles are low in emissions and encouraging their use and spread will seek to limit harms for our shared world.
So the atmosphere and the ground form a pair of parallel plates with the same slight curve in them.
For more info see https://www.antarctica.gov.au/site/assets/files/54311/e_field_final.pdf
Being strictly geometric in its origin, the inverse square law applies to diverse phenomena. Point sources of gravitational force, electric field, light, sound or radiation obey the inverse square law.
On the earth's surface, the electric field that goes round the spherical Earth can be as strong as 100 to 300 volt per metre or V/m. This means that if you are out in the open, and away from buildings or other things that would affect the field, there can be a few hundred volts between your head and your toes! Currents from the ionosphere to the ground.
Our shared planet the Earth has a magnetic field - Although the crust is solid, the core of the Earth is surrounded by a mixture of molten iron and nickle - the real molten of the Earth the core is red hot, actually this is what gives rise geothermal activity in places such as Iceland, an island which is also volcanic.
The magnetic field of Earth is caused by currents of electricity that flow in the molten core. These currents are hundreds of miles wide and flow at thousands of miles per hour as the earth rotates.
Currents usually flow in ions - an ion is an atom or molecule with a net electrical charge. The charge of an electron is considered to be negative by convention and this charge is equal and opposite to the charge of a proton, which is considered to be positive by convention.
Electromagnetic interference can be minimised for data transmission in computer networks by twisting multiple strands of cable or using braiding for wires in a cable - oscillations are fluctuations in an electrical current used in the charging of electric vehicles - also MRI scanners use radio waves also magnets and MRI scanners are used to form pictures of the anaotomy
In computer networks, sometimes spectrum analyzers are used, power line monitors to detect spikes which can corrupt data and oscilloscopes to measure fluctuating signals. These tools can test for electromagnetic interference or EMI not to be confused with the music label of the same name. EMI really came to the fore in the Matrix film trilogy series. Oscillations is a swinging motion like a pendulum and can be used often to monitor an electrical signal also a heartbeat. The Matrix film series had groundbreaking effects that were built to last.
The dawn of the 21st century was an exciting time for special effects in films at the cinema - sound improved as well with Dolby Digital. Computers were introducing new visual possibilities also and these were incorporated first in the Matrix. An oscillation is also a fluctuation in an alternating current and AC to DC conversion is used in the charging of EV or electric vehicles and also AC to DC conversion underpins how universal chargers work for charging batteries.
Both man-made and natural sources generate changing electrical currents and voltages that can cause EMI. EMI can be caused by ignition systems, cellular network of mobile phones, lighting, solar flares and auroroas (northern and southern lights). EMI does frequently affect AM radios - actually this really makes the case for switchover from FM/AM radio stations to digital radio stations. Switchover from analog to digital radio would free radio spectrum which could be used to allocate faster 5G bandwidth or data signals for mobile data on the move and a mobile, flexible workforce.
EMI can be intentional and unintentional - really interference from the mobile phones of others closeby is really unintentional interference so really if you value your privacy, you are best keeping your distance from others when you use a phone - going for a walk on a country path or through a suburb on your way to work could give you more privacy in mobile communications while at the same time improve your mood and health with exercise and a breath fresh of air.
In a nutshell - Electromagnetic interference is unwanted noise or interference in an electrical path or circuit caused by an outside or external source. EMI interference is also known as radio frequency interference. EMI can cause electronics to operate poorly, malfunction or stop working completely. EMI can be caused by natural and man-made sources.
Cables or networking media the physical medium where traditional unshielded twisted pair cabling was used think CAT5, CAT6e was braided in a sense with multiple strands of wires in a cable. Cables need terminated at both ends - terminating fibre optic cables is more complex than traditional unshielded twsited pair cabling. The reason for the twisting of pairs of cables is actually to minimise interference, increase data throughput also - significant also where fibre optic cable uses light to guide data signals, light signals are more easily corrupted so this is the reason fibre optic cables often protected with kevlar the stuff of bullet proof vests.
Electromagnetic interference can be minimised by the twisting together of cables to make braided cables this increases the integrity of data signals in a cable - also tinfoil can block electromagnetic radiation.
Use of networking cables can lead to more reliable data transmissions over wireless or over the air media, but really there is a need for network specialists also usually a need to drill through walls - network equipment usually is in a closet or cupboard, a central place in a building with switches also routers linked together. Switches via dediacted ports create a dedicated connection between two network nodes or computers - also each port is a separate collision and broadcast domain to optimise data transmission.
Wireless networks or over the air media really brings greater flexibility this gives rise to ad hoc networks with more security worries with the view to getting passwords also log-in credentials intercepted.
First MRI Magnetic Resonance Imaging scanner was invented in Aberdeen - often used in hospitals and in medicine to examine body parts also scan bones and tissues. MRI scanners use radio waves also magnets - MRI scanners are used to form pictures of the anaotomy. Radiation at high doses is really not good can damage organs when used in a hospital setting - radiotherapy may kill cancer cells but there can be side effects, some patients may experience more side effects and others.
MRI does not require the use of ionizing radiation and scans can be performed at any chosen orientation. It features full three-dimensional (3-D) capabilities, excellent soft-tissue contrast and high spatial resolution.
As well as X-rays which is often used in medicine there are also Gamma rays. Gamma rays are stronger than X-rays and they tend to be used for sterilization and disinfection and also used in the nuclear industry. Shielding for humans from gamma rays is important to avoid radioactive particles also illness.
Energy emitted from a source is generally referred to as radiation. Examples include heat or light from the sun, microwaves from an oven, X rays from an X-ray tube and gamma rays from radioactive elements. Ionizing radiation can remove electrons from the atoms, in other words it can ionize atoms. This is the stuff of physics actually also part of science which is a broader term.
From the BBC originally - The Story of Electricity now on YouTube - https://www.youtube.com/watch?v=6hloc6xhpa0. X-rays first invented at the turn of the 20th century.
index.html but also sometimes index.php usually represents a homepage for a website and Date modified in Windows Explorer enables the finding of new web pages to add in a menu on a homepage - displays the most recently worked on files at the top in a file explorer window - the place where all files on a computer are displayed usful for getting a filename for adding in a web page
Windows Explorer also called File Explorer is accessible by right-clicking on Windows 10 Start menu - this is a shortcut also Windows Explorer is the yellow icon button of screen in Windows 10 but sometimes it can disappear computer refreshes stem from this - refresh or reload web pages automatically pressing F5 on the computer keyboard.
In a nutshell - index.html but also sometimes index.php usually represents a homepage for a website and Date modified in Windows Explorer enables the finding of new web pages to add in a menu on a homepage.
Date modified look in a Windows explorer window for browsing files also folders and see Name, Date modified, Type and Size along the top in the top row but below File, Home, Share, View menu the same menu ribbon panel where you will find Copy and Paste graphic buttons - copyright violations really stem from copy and paste and the inventor of copy paste actually died at the start of the pandemic, always best to produce original work but actually Google can produce some automated results really worth copying when you are trying to explain a complex topic rooted in technical jargon this is really the Computing profession.
Date modified can cut frustration with computers actually or sorting files by Date modified since it can display the most recently worked on files at the top in a file explorer window - the place where all files on a computer are displayed. This can help web page authors who may have lots of web pages HTML pages created with Notepad a basic text editor to really find again a specific file amongst lots of files and link to it on a homepage or on a Site Map a page that clearly references multiple pages maybe giving each page a separate topic but also creating themed pages whereby multiple subjects are grouped into a theme for easier reference also easier in understanding what has happened.
Events that have happened in the past can be chaotic and all stories have a sequence with an order this enables effective story telling which can bring the truth to the surface.
At the heart of justice and safety is also truth also widespread acceptance of the truth and recognising what has happened giving people time to process mentally and acknowledge come to terms with is very important - some people still have not accepted the Holocaust and actually disputes are very common over something that has happened. Actually story telling can assist thorough investigations also work to keep people safer including more vulnerable persons - everyone is getting older.
Files named index.html also index.php are automatically loaded by default for a website from a designated folder or directory on a computer web server usually running the Apache the very common web server.
Actually index.htm likely works - in the past file extensions all had three letters think dot exe - these executable files spreaded viruses very well and all application setup files on Windows 10 are dot exe files - right click on a given file visible in Windows Explorer, then click Properties to reveal the file type or file extension of a particular file. The website fileinfo.com enables users discover or find also match an unknown file type to open the file using an application capable of opening a particular file type - the web is a good resource to consult to open unknown file types or files that do not open or are unable to open for the average user.
In computing, developments can be fast paced happen at brakeneck speed but it usually takes a long time for rollout and really widespread adoption amongst everyone - some people older people in particular can really be not very digital literate but do like to keep in touch with friends and family - women historically been good communicators.
Some people can really be digital champions and enable transformations.
YouTube does enable the creation of three YouTube channels per user account and channels can logically group videos for a specific purpose useful for education, Rumble.com enables easy embed of videos in web pages but also there is Facebook and Vimeo for sharing videos - Facebook useful for sharing videos with friends also communities via public Facebook pages
Vimeo.com Premium the video sharing site for professionals hefty price tag enables live events and webinars 7TB terrabyte total storage, so with video sharing having a price tag with vimeo actually video compression is quite important and maintaining video quality is an issue as videos are compressed in size.
There is more than one video sharing website - for example, there is Facebook individual user accounts for sharing videos with friends, business user accounts and Facebook public pages linked to an individual user account for sharing videos with communities.
Rumble.com video sharing makes embedding videos into websites easy providing embed code also web links to Rumble.com site for shared videos after you upload a video.
YouTube enables the creation of channels and users can create multiple channels for free which really enables videos to be grouped around a specific purpose. Click the Grey G for Google icon top right when logged-in to YouTube right of the big CREATE button. Click Switch account, then Add account to add a new channel create a new channel - maximum three channels for each individual user account. YouTube being popular is actually quite restrictive in terms of being scalable, not really suitable for video sharing for commercial purposes. YouTube good for individuals sharing videos, for limited education purposes also but YouTube really lacks ability to customise and create multiple YouTube channels tailored around specific themes.
Vimeo also enables sharing of videos - it is yet another video sharing website. Always good to use a few video sharing sites to really keep videos alive since some video sharing websites may one day go offline - it is unlikely YouTube will go offline since it is owned by the mighty Google with commercial OneDrive online storage but YouTube restricts user upload of videos to ten 10 a day. Creating an account with vimeo.com - Password must be at least 8 eight characters long and must contain at least one number and at least one symbol, good symbols to use are the exclamation symbol to represent the letter-i, or the letter-l or the number 1 or one also the @ symbol or the at symbol useful to represent the letter-a, the dollar symbol useful on the keyboard to represent the letter-s. Google search giant dominant in user search makes its money through advertising linked to search putting adverts on search results think AdWords where companies place adverts to direct users at websites to sell commercial products.
YouTube and Rumble.com put adverts into their videos for users to see first, Facebook has not any adverts absolutely no adverts and vimeo.com is a video sharing site for professional users and purposes - Vimeo Plus is six 6 dollars a month ability to upload 5GB per week and 250GB per year with shareable video albums. Vimeo Pro for 16 dollar month ability to upload 20GB a week, 1TB per year. Vimeo Business is 40 dollar per month billed annually no weekly uploads on video shared and also 5TB video storage total. Vimeo Premium 70 dollars per month billed annually 7TB total storage live events and webinars. Prices accurate as of 19 nineteen June 2022.
AutoComplete for filenames can help with forming file naming conventions and uniformity to make it easier to embed visual images with a theme in web pages - AutoComplete from Windows core computing platform is really the inspiration for Google search auto suggestions and now Google Chromebooks are in classrooms in Scotland for an always on data connected world challenging Microsoft
The average web surfer or silver surfer that uses the web to check on the news or weather also check their electriciy or gas bill also energy bill may not really appreciate the useful detail designed to help contained within a typical Windows 10 dialog box.
If you adopt a naming convention for files with each file having similar names with numerical differences including dates in a filename, it becomes easier to crop also snip images and embed them into website or web pages using Notepad using HTML using the img command enabling copy and paste for images real genuine visual data that share a common theme. Themes often run through literature - the best students that study language look for themes, analyse to bring out a message a core message make it resonate. Analysing details can really tell a story - job descriptions usually demand graduates have attention to detail.
A simple text editor can be very responsive enabling efficient editing no crashing failure of Microsoft Word and Word can save in web page format. Taking the time to learn to use a basic text editor, create a web page with special syntax tags which resemble the language the HTML, this can lead on to a lot of great content being shared helping the creator benefiting others also - many people benefit through problem-solving actions since the basis for problem solving tends to lead onto great new products and innovations with real practical utility.
A Save dialog box when images are saved in Windows 10 ten has a drop-down menu, start typing familiar charecters in a filename, and the result is autocomplete. Autocomplete in the saving of files on Microsoft Windows is really what translates to Auto suggestions in the Google search box. Autocomplete in filenames can help with bringing uniformity for creating web pages when slight changes numerical slight changes are appended onto files. Autocomplete really comes into its own when users are faced with many images visual data in a folder also called a directory - really finding information visual data is a big problem in the digital world can lead to frustration and aggression can really stem from this - then there is malicious hackers also users who may delete files also data on an unsecured computer.
Delete from Dropbox on an unsecured computer and files delete from everywhere online in Dropbox the cloud also on computer but not from external USB hard drives if users have made local copies done data back-ups ahead of time on a planned schedule with routine. USB flash drives can become corrupted also easily lost and stolen.
Files have attributes actually - users can mark a file as hidden in Windows 10. Hidden files usually referred to as Window system files but any file can be marked as hidden even user data - these files are usually system critical for the proper functioning of Windows 10. Hiding possesions around homes can make this difficult for others - the police must get a search warrant to conduct searches and have good grounds based in evidence.
Right-click any file and tick Hidden to mark it as hidden on a computer running Windows 10 - the hidden attribute is available in immediate plain sight on the first main screen of the Properties dialog for any file. Another attribute is Read-only - actually Word documents sometimes open as Read-only and users cannot edit - unable to edit a file can be frustrating on users. Actually open data that is text shared in HTML web page format is very easy to copy and paste - images and videos visual data harder to change actually and when shared the act of sharing creates many witnesses, always difficult to work out or determine who has seen what.
Google took this idea from AutoComplete from Microsoft and adopted it for search giving rise to AutoSuggestions or dynamic search. Google is now challenging schools in Scotland with Chromebooks aimed at children while adult workers in Scottish Councils use Office 365, but Chromebooks rely on a data always on connection - not really suitable for the offline world of copying local files and saving even though they do now come with limited local storage of around 32GB.
Roadworkers and engineers are very important to lay high speed high fidelty fibre optic cabling and replace copper cabling in traditional telephony networks. Communications come from satellites also.
IMG_9759 really a non-sensical filename when viewed in Windows Explorer Quick Access also creativity and imagination can really foster great progress going forward over looking back - baidu.com Chinese search engine is open, accessible to people in Scotland for example but Scots tend to not understand Chinese and Chinese language can include symbols be a hard to decipher character set
In a nutshell - IMG_9759 really a non-sensical filename when viewed in Windows Explorer Quick Access also creativity and imagination can really foster great progress going forward over looking back.
Being creative and creation instructional computer support can really help others, but still reflecting on history and developments in computing can be useful really show how technology has evolved and how the world has moved on, developed in a sense - some third world African states are still under developed with lack of access to the Internet as well as clean water.
Take the Quick Access pane in the Windows Explorer or File Explorer window or pane where users typically browse files. Quick Access is intended to find also relaunch files you have recently opened and files that are part of your current workflow - it is really intended to streamline your work processes on a computer or computer platform running Windows 10. Windows is evolving with dynamic user interfaces - this is Windows 11 with an app centred world think the Windows 10 store carried over to Windows 11. The Windows 10 store tended to be buggy sometimes applications failed to download, slow to download also.
Filenames and random file names such as IMG_9759 can be hard to remember also can be meaningless without a small icon picture representation - Windows Explorer View menu on the ribbon - the ribbon is File, Home, Share and View top menu items in Windows 10 - really enables change of views including to Extra large icons to Small icons - Details view useful for sorting JPEG image files also PNG files with MP4 also AVCHD video files when you click also the Type name representation above filenames - refer to options Name, Date modified, Type and size. AVCHD the video file format of Sony Blu-ray actually still in use and budget compact camcorders sold via Currys do support saving video in this feature along with MP4 in June 2022.
The main point is that renaming files also going for logical groupings for common files also uniformity in a sense with slight numerical differences can really enable or facilitate copy and paste of HTML code even if you have to write the first line of code when embedding an image and subsequent images. Images smaller in file size created with the Windows Snipping Tool also Snip and Sketch are really ideal for web pages since for mobile devices minimising or reducing with compression - lossy compression or compressing in the case of JPEG where unncessary image data is discarded or thrown away unncessary pixels removed - web page overhead can speed up the downloading of web pages from mobile devices.
Web page overhead refers to all the files on the web server that download with a given page or are referenced by a given web page associated also in the web page HTML code. PNG royalty free images suitable for line drawings also for images with text such as for screenshots on computer of user interfaces with text added to support digital skills education also computer IT support - convergence happened at the start of the new millennium IT became ICT from Information Technology to Information and Communication Technology.
This also coincided with the rise of mobile phones among the general public - phoning people and texting also sending Simple Mail Messages or SMS messages was popular and trendy. SMS messages became Multimedia Messages or MMS but actually these were sent less frequently since it cost more money to send pictures also photos using MMS using mobile phones and mobile networks - the Blackberry smartphone introduced a large keyboard a mini keyboard on a phone really enabling messaging, then along came the iPhone with a groovy, trendy user interface app-based icon centred easy to use thanks goes to Jonathan Ive for the user interface design.
iPhone and Blackberry competed for a while then Google introduced Android based on open source software and Linux really encouraging deviersity of manufacturing among the mobile industry - Google and Microsoft always been fierce competitors but actually Microsoft seem to find more profitability with Windows and Office software for the desktop, Google a real challenge to Microsoft with its cloud Internet approach and also Google's worldwide distributed server architecture and technology. Google really dominant in web search but there are competing search engines - bing.com from Microsoft is one, then there is Yandex popular in Russia. Some search engines can be focused on particular countries.
China has baidu.com - Baidu, Inc is a Chinese multinational technology company specializing in Internet-related services and products and artificial intelligence. Visit Baidu.com and you really appreciate Chinese and how lots of web pages are locked or cannot be accessed inaccessible also to English users Chinese encryption in a sense when you do not understand the language - the web is still an open platform.
The British media may complain about Chinese censorship, but actually baidu.com is open, accessible to people in Scotland for example but Scots tend to not understand Chinese - actually the Scottish government has been putting Gaelic on ambulances and police cars when really few people speak Gaelic - a language often relegated to the Western isles, the Scottish islands and small remote isolated communities.
With few Scots people understanding Gaelic, really Scotland needs to welcome people from Hong Kong to help teach Chinese - there are actually two main forms of the Chinese language such as Mandarin the main form. Chinese character sets different from English in a big way - often symbols represent the Chinese language and at first glance it is impossible actually for an outsider to China or the Chinese language to understand. Really people need to study also learn Chinese put in effort.
The two best-known and most-spoken variants of Chinese are Mandarin and Cantonese. These two languages are not mutually intelligible, so they cannot be called dialects. They have a significant number of differences in both their written and spoken forms, including: Number of tones: Chinese dialects are tonal languages.
It is wrong actually to suggest China and the Chinese government suppress the flow of information, although there may still be web filtering going on, but actually Facebook.com being controlled by users is a platform where web filtering goes on - individual users have editorial control of content on their profile page or Timeline, users can remove content posted by other users even users they have befriended. Even when people post nice images and photos, put in effort, they can still be removed, so if you do not want content you have created and shared deleted it is useful to save, take screenshots and create your own digital files also back-ups.
Everyone has a different point of view - differences can become more apparent when people engage with one another. Really respect for others is the foundation of a fair society also a fair online or digital world that is based in the real physical world.
How routers on the Internet work to filter data traffic and routers are like roundabouts - the Aberdeen bypass roundabout big inefficient router at rush hour Tuesday also electric vehicle charging at Kingswells Park and Ride
https://fb.watch/dFc-BgXU8m/ 14 June 2022 - How routers on the Internet work to filter data traffic and routers are like roundabouts - the Aberdeen bypass roundabout big inefficient router at rush hour Tuesday. The year 2000 saw fuel crises tailbacks into Aberdeen slow moving traffic, oil refinery Grangemouth blocked, Kingswells roundabout blocked by farmers and tractors.
Pedal power bikes can give people exercise also enjoyment, active travel only becomes commuting when people are employed, in work, have a job also a fulfilling vocation.
Long tailbacks to Westhill stretching from Kingswells around 5pm rush hour 14 June 2022 and gridlock congestion at the roundabout, a bottleneck.
Bottlenecks also happen in computer networks - routers are like roundabouts and filter traffic known as data packets keeping traffic moving also making data communications efficient.
Routers and switches segment networks - routers like roundabouts filter traffic. The Aberdeen bypass roundabout is not a very efficient router. Routers and roundabout comparison is an analogy and analogies good for explaining in education using real world examples.
Routers need to be efficient and they are the backbone of the Internet - bottlenecks lead to slow downs also disconnection from the Net or Internet.
20 years ago in 2002 people were using dial-up modems 56 Kbps transfer speeds maximum. ADSL thus introduced around 2003 in the North-East of Scotland giving faster downloads than uploads and broadband Internet.
Green man at pedestrian crossing symbolic of LEDs or Light Emitting Diodes on routers often blinking lights to function as indicators of router status.
Roundabouts are a British concept actually - not many roundabouts in Florida, roads are straight - also there is a five lane motorway around Belfast encircles the City. The UK government pumped lots of money into Northern Ireland to keep it a stable region and country due to its troubled history of violence. Switches often used on internal networks to segment or split networks and each port on a switch is a dedicated port with a separate collision and broadcast domain.
Storing digital content enables playback - analogies and real world examples enables education very well.
Aberdeen bypass the longest construction project for a UK road in modern British history says the Scottish government.
Cars the data packets and traffic - human drivers that is the payload data. Payload data includes the message as well as address details including source and destination address.
Some drivers do not know where they are going - they rely on SatNav multiple satellites. SatNav works based on triangulating a driver's location bouncing signals off multiple satellites. SatNav often above the clouds in satellites - this is cloud Internet, but also the cloud is computer servers based in other countries. SatNav really comes into its own for the emergency services - they need to get where they are going quickly.
SatNav is American GPS Global Positioning Satellite, European Galileo a competing platform designed for redundancy - redundant systems alternatives - and less reliance on American systems. GPS can misfire also produce misleading signals. Elon Musk Tesla electric cars has StarLink satellites - those successful in business put satellites into space into orbit.
Electric car or vehicle charging at Kingswells Park and Ride
https://fb.watch/dFcUBlSTFi/ 14 June 2022 three electric cars charging at Kingswells Park and Ride and only two charge points in lower part of the car park, many more cars and the drivers have abandoned their cars must have taken a bus ride or journey further into the City of Aberdeen.
Also electric charging points are sophisticated, complex - need to be almost an engineer to understand how to work them, engineering is a male dominant field.
Charging stations at Kingswells use Alternating Current AC 43 Kw to Direct Current DC 50Kw conversion which is often built-in to universal battery chargers.
A single electric charger can be divided between two cars and when two cars are hooked up to a single charger, often the charger does not have full power.
Car charging in this example gave reading of 90 percent complete for almost an hour - it likely takes over an hour for a complete charge.
AC/DC conversion often used in the semi-conductor business to manufacture small transister components also there are medical applications as well as defence.
An uninterruptible power supply (UPS) is a type of power supply system that contains a battery to maintain power to provide power to electronics in the event of a power surge or outage.
Typically UPS power keeps a personal computer (PC) running for several minutes after a power outage, enabling users to save data that is in memory and shut down the computer properly.
Many uninterruptible power supplies now offer a software component that enables you to automate backup and shut down procedures in case there’s a power failure while the user is away from the computer.
IEEE standards for both WiFi wireless networks and for traditional Ethernet Local Area Networks also use of multiplexing and Wavelength Division Multiplexing really used to split light signals into colours for transmission over modern fibre optic networks - 24 strands of colour identified
Electricians and others often refer to connectors in general as male or female. For example, a plug with prongs at the end of an electrical cord is called a male connector, and a wall socket with holes is called a female connector.
Important definitions - the terms plug, pin, and prong are also often used for male connectors, and receptacle, socket, and slot are used for female connectors.
The Institute of Electrical and Electronic Engineers (IEEE) is an important organisation on the world or global stage and often sets technology standards in respect to electrical aspects of digital technologies and computer network technologies.
The IEEE - https://www.ieee.org/
The IEEE have several standards actually which really oversee how network technologies work.
IEEE 802 is a collection of networking standards that cover the physical and data-link layer specifications for technologies such as Ethernet and wireless. These specifications apply to local area networks (LAN) and metropolitan area networks (MAN).
The IEEE 802.11 standard is also known as WiFi - this is why you might see in tech specs on the website of electrical retailers wireless network support referred to as 802.11 - there are actually several versions such as 802.11n which is really quite common nowadays. 802.3 is referred to as Ethernet networks - this is the base standard core technical specification as defined by the IEEE.
Main standards for wireless networks - There are several standards of IEEE 802.11 wireless LANs or wireless networks. The prominent among them are 802.11, 802.11a, 802.11b, 802.11g, 802.11n and 802.11p. All the standards use carrier-sense multiple access with collision avoidance (CSMA/CA). CSMS/CA is a protocol or a set of rules that is often deployed on networks to enable each computer on a network to send and receive data packets, sensing the media to check it is clear to transmit data and avoid collisions also.
The most widely used standards are for Ethernet, Bridging and Virtual Bridged LANs, Wireless LAN, Wireless PAN (Personal Area Network think USB also Bluetooth connections short range communications, Bluetooth lower in speed than WiFi often used in a home network environment with a HomeGroup). Other standards for wireless networks include Wireless Metrolitan Area Network, also Wireless Coexistence for a heterogenous network to ensure multiple different device communication.
Media Independent Handover Services used in 5G data networks these are cutting edge or bleeding edge networks now spring up - IP or Internet Protocol provides a connectionless delivery system. This means that every data packet that is sent across the network is treated as an independent unit. IP does not maintain the details of the connection between the server and the client. IP does not guarantee a reliable data transfer.
Real genuine advantages with media independent networks - Being media independent means that different types of PHY devices for connecting to different media (for example, twisted pair, fiber optic and so on) can be used without redesigning or replacing the MAC hardware.
Thus any MAC network adaptor device may be used with any PHY, independent of the network signal transmission media. Wireless network adaptors or dongles for wireless connectivity and traditional 1000GB network cards linked to motherboards in a computer have a unique the world over MAC address.
Really Media independent networks such as 5G the fifth generation mobile network enables reuse of existing hardware and also enables mobile data networks to increase substantially in speed making use of video much more possible over mobile data - video and voice communications usually down over UDP User Datagram Protocol which does not check for errrors this really makes efficient use of existing networks enables real world users to do more online. Bear in mind 4 billion people on the Internet - only half the world's population. Some way to go still to roll out Internet access across the world make access to the Internet and web-based networks really and truly universal.
5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices - washing machines and dishwashers also ovens are getting smarter. Past expositions at the Consumer Electronics Show in Las Vegas revealed ovens with LCD displays where the ingredients of food to be prepared was shown on an LCD panel. Such products are starting to appear on the market.
Wireless Radio Access Network is used for a typical 5G network. An individual Working Group provides the focus for each area set out by different wireless networking standards.
A radio access network (RAN) is a major component of a wireless telecommunications system such as 5G nowadays that connects individual devices to other parts of a network through a radio link. A 5G a modern Radio Access Network links user equipment, such as a cellphone, computer or any remotely controlled machine, over a fiber or wireless backbone connection.
Also, they have support for both a centralised base station this is an Infrastructure Service Set network with an access point usually a router at the central point of the network in focus as well as ad hoc networks.
Traditional data networks - in computer networks, Fast Ethernet is a variation of Ethernet standards that carry data traffic at 100 Mbps (Mega bits per second) in local area networks also usually abbreviated or known as a LAN for short.
Fast Ethernet was launched as the IEEE 802.3u standard in 1995, and stayed the fastest network till the introduction of Gigabit Ethernet which is 10 times faster with speeds up to 1000 or one thousand Mbps.
10Base2 - this is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband, these were really the first networks and data transfer rate was limited.
Signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments - repeaters were used to extend, amplify signals since data signals attenuate or weaken over greater distances.
10Base5 is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband.
In telecommunications and signal processing, baseband is the range of frequencies occupied by a signal that has not been modulated to higher frequencies. Baseband signals typically originate from transducers, converting some other variable into an electrical signal.
Baseband firmware accepts special commands, which control the device's cellular functions. These commands can be used to tell the modem which phone number to call.
DSL Digital Subscriber Line was a type of broadband connection, such as Wi-Fi - routers took over and really replaced DSL broadband modems.
Broadband is the method of receiving and sending data. DSL is one of the technologies that allow for this. It uses copper cables in the house to connect to the Internet.
Baseband refers to analog or digital data before being intermixed with other data. Baseband is also related in concept to multiplexing and modulation. The output of an analog microphone is baseband.
When an FM station's carrier frequency is stripped away in the radio (demodulated), the original audio signal that you hear is the baseband signal. Analogue radio still present in the United Kingdom in June 2022 and still on public sector BBC and commercial broadcast stations.
Multiplexing is the process of combining multiple signals into one signal, over a shared medium. If analog signals are multiplexed, it is Analog Multiplexing and if digital signals are multiplexed, that process is Digital Multiplexing.
Multiplexing is often split into the three types mentioned below:
- Frequency Division Multiplexing (FDM) - a technique by which the total bandwidth available in a communication medium is divided into a series of non-overlapping frequency bands, each of which is used to carry a separate signal
- Wavelength Division Multiplexing (WDM) used with new fast high speed fibre optic networks like Fibre to the Home - Wavelength Division Multiplexing (WDM) is a fiber-optic transmission technique that enables the use of multiple light wavelengths (or colors) to send data over the same medium. Fibre optic light signals can have different wavelengths - being able to fine tune wavelengths has a useful and practical application in laser eye surgery to improve eyesight, often careful precision is necessary with respect of eyesight. Sight is precious really a gift and actually greater investment in fibre optic networks could really advance technologies to help real people perhaps those with sight loss are blind to see again.
- Time Division Multiplexing (TDM) - a mechanism for transmitting and receiving multiple data and impulses over a single transmission line. This is a methodology for sending and receiving large amounts of information over a single line. This form of multiplexing is older - The disadvantages of time division multiplexing - Synchronization is required in time division multiplexing. It is complex to implement and due to slow narrowband fading, all the multiplexing channels may get wiped out. ISDN stands for Integrated Services Digital Network - it was telephone lines often used in the past and was expensive the faster alternative to 56Kbps dial-up modems which were more common and made a noise when home users connected to the Internet. Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration. Each individual data stream is reassembled at the receiving end based on the timing.
Multiplexer means many into one. A multiplexer is a circuit used to select and route any one of the several input signals to a single output.
Fibre optic cables are split into 12 strands of multimode different colours this is multiplexing to separate data signals that represent light onto a physical cable medium in a street cabinet.
Generally, 12 fibers or less are a bundle of tubes, and each tube will be numbered or colored according to the same fiber color code. For example, the first tube is blue and the second is orange. For cables consisting of more than 12 strands, the cable color code will appear to repeat with also variation.
White light can be split up to form a spectrum using a prism. This is a block of glass with a triangular cross section. The light waves are refracted as they enter and leave the prism. The shorter the wavelength of the light, the more it is refracted.
Reflection can simply be defined as the reflection of light when it strikes the medium on a plane.
Refraction can be defined as the process of the shift of light when it passes through a medium leading to the bending of light. The light entering the medium returns to the same direction.
Diffraction is the bending of waves around obstacles and openings. The amount of diffraction increases with increasing wavelength, so shorter wavelengths in fibre optic cables will reduce defraction. Shorter defraction useful where cable laid is straighter - cable can become coiled in ducts particular at points where cables meet or converge.
Since light signals are imposed on a physical medium a cabel as a wave, it has the capability to bend around corners. This is called diffraction. Light signals bending around corners is really what makes data signals high fidelity also installing more fibre optic cables will boost data speeds. Fidelity is the degree of exactness with which something is copied or reproduced so fibre optic signals being high fidelity mean that signals will likely be retained intact and will also make amplification of data signals over a light guided fibre optic cable medium better increasing reliability in data communications and computer networking.
Fibre optic cable position and jacket colour
- 1 - Blue
- 2 - Orange
- 3 - Green
- 4 - Brown
- 5 - Slate
- 6 - White
- 7 - Red
- 8 - Black
- 9 - Yellow
- 10 - Violet
- 11 - Rose
- 12 - Acqua
- 13 - Blue with black tracer
- 14 - Orange with black tracer
- 15 - Green with black tracer
- 16 - Brown with black tracer
- 17 - Slate with black tracer
- 18 - White with black tracer
- 19 - Red with black tracer
- 20 - Black with yellow tracer
- 21 - yellow with black tracer
- 22 - violet with black tracer
- 23 - Rose with black tracer
- 24 - Acqua with black tracer
Fibre optic network cable connectors bulky difficult to fit require specialist engineers - fibre optic cable connectors not yet visible in most homes in Scotland proof of Fibre to the Cabinet broadband installations where users share Internet bandwidth and access with city dwellers, Full Fibre broadband not yet here in Aberdeen despite claims to the contrary
Building a fibre optic network is really more complicated than a traditional copper cable based network upon which traditional telephony networks are based.
Engineers with specialist skills are needed - also specialist equipment is needed to actually terminate fibre optic cables at a particular end point in a connection or data link usually a physical cable in the case of a broadband installation going to a home or office. Fibre optic cable is also sensitive - uses light inside to transmit signals so fibre optic cable is made of kevlar the stuff of bullet proof vests similar strong material to Harris tweed Scottish material that is thick usually made in the Outer Hebrides.Fibre optic cables really needed to be protected to protect the integrity of the light signals and data signals can be of high fidelity vulnerable to corruption changes in binary one and zero status at will on a whim - light travels faster than sound and Concorde was the only commercial aircraft that broke through the sound barrier and carried passengers business customers but also Tony Blair in recent history, a joint building venture between Britain and France. Concorde is a retired fleet of aircraft, retired on safety grounds - aeroplanes often the safest mode of transport but passengers have the least control so feel uneasy flying. Roads are actually the most dangerous.
Fibre optic connectors - you can see the termination end points not straightforward to fit. You do not see these on most equipment in your home. This is actually proof that most homes and businesses just have Fibre to the Cabinet technology whereby BT exchanges are in more central locations and broadband network links as well as bandwidth is shared among residents of a town or City, so throttling data connections is important for fair equal Internet access.
Fibre to the Cabinet most common in Aberdeen and Aberdeenshire. It has really taken about 20 years for BT to get an impressive digital connectivity record of reaching broadband with coverage to rural locations and still there are some notspots for digital connectivity - satellite Internet access helps to bridge the digital divide for some places without conventional wired access to the Internet where Internet access is provided by cables. Some places in the Highlands of Scotland can really be remote - Scotland also has many islands - actually there is an undersea road tunnel connecting or linking Shetland islands.
In a nutshell - Fibre optic network cable connectors bulky difficult to fit require specialist engineers - fibre optic cable connectors not yet visible in most homes in Scotland proof of Fibre to the Cabinet broadband installations where users share Internet bandwidth and access with city dwellers, Full Fibre broadband not yet here in Aberdeen despite claims to the contrary.
RFID is a means to pinpoint location provide an ID code based in technology or in hi-tech systems, you really need humans to manufacture the technology think bracelets with fine circuitry and embedded circuit boards where components are soldered together - satellites enable a top down view and can give an at a glance view support use of electronic tags for tracking through GPS or the American Global Positioning System, Europe has Galileo and Elon Musk has Starlink satellite constellations
Heterogeneous in sex terms male and female used to be more common and is also more ethical - people can be charged for being homophobic nowadays but really everyone grows old. Really LGBT Lesbian Gay Bisexual and Transgender is a movement in society some might say however controversial.
Everyone is different also, people have different views, perspectives informed or shaped by unique experiences - really this leads to prejudice. Real world evidence is important to fairness and also fair play.
Lack of understanding about how something works leads to prejudice in a real sense and yet to really grasp a topic often study at University is important, but there are tuition fees to consider.
This is what makes the Scottish government's stance to pay tuition fees for students really great through the Students Awards Agency for Scotland, - equal chances important but also fair chances in employment is also important. Those with good jobs high earners should also pay back student loans, pay their fair share of tax also.
What is Homogeneous Network? A network that uses a single network architecture and operating system. An example is an Ethernet local area network (LAN) in which all machines are running Microsoft Windows Server.
Another example is an enterprise-level messaging system based solely on Microsoft Exchange Server - this could be an organisation network a Council in Scotland that uses or runs Office 365 with also support for personal computers running Windows 10 ten.
Wikipedia on heterogenous networks - In computer networking, a heterogeneous network is a network connecting computers and other devices where the operating systems and protocols have significant differences. For example, local area networks (LANs) that connect Microsoft Windows and Linux based personal computers with Apple Macintosh computers are heterogeneous.
Wikipedia also says at the time of writing 14 fourteen June Juin 2022 MMXXII this is one calendar month before the French national day Bastille day - Heterogeneous network also describes wireless networks using different access technologies.
For example, a wireless network that provides a service through a wireless LAN and is able to maintain the service when switching to a cellular network is called a wireless heterogeneous network.
Wikipedia on electronic tagging - https://en.wikipedia.org/wiki/Electronic_tagging. In short, radio frequency ID or identification is the technology which is linked to electronic tags. Basically each electronic tag has a unique tag in essence called an RFID - bank cards including debit cards and credit cards also use RFID or Radio Frequency Identification technology.
RFID is a means to pinpoint location provide an ID code based in technology or in hi-tech systems, you really need humans to manufacture the technology think bracelets with fine circuitry and embedded circuit boards where components are soldered together - embedded computing is really here to stay since minitiature computing really minimise interference with life in the truest sense.
Soldering can be quite common in Chinese factories think Foxconn company the electronics support maker with sometimes human rights issues and welfare issues attached certainly this came to the fore in the past, but actually Scotland has long had welders skilled in welding - this often happened in the past at the port of Ardesier near Inverness. Also there is the Arnish fabrication houses convereted from traditional barns in the Western isles of Scotland.
Welders in Scotland tended to support the offshore oil industry - there was the port of Nigg as well in the Highlands of Scotland.
The future of motoring is electrification due to the low carbon low emissions electric vehicles give off.
Really welders for small electrical components needs to be more distributed across the world.
It is actually likely distributed already to some extent, but often events do not get noticed until someone writes or talks about it.
This really places emphasis on open information and open web based systems open source code to some extent in computer programming also enabling greater access to information to support business and industry also enable entrepreneurship encourage future inventors with ideas to experiment, also play with technology and fool around.
The RGU TechFest and events like it such as the Consumer Electronics Show or CES in Las Vegas are really hands-on - hands-on kineaesthetic learning is really a more natural way to learn. Natural learning often speeds up learning fosters education and greater understanding when individuals also write, document, tell others, share and publish.
Academic communities usually the science community has a system of peer review usually when fellow scientists are critics of the work of others.
Wikipedia on Oscillation says - Oscillation is the repetitive or periodic variation, typically in time, of some measure about a central value (often a point of equilibrium) or between two or more different states.
Familiar examples of oscillation include a swinging pendulum and alternating current. Oscillations can be used in physics to approximate complex interactions, such as those between atoms.
Wikipedia also says - Oscillations occur not only in mechanical systems but also in dynamic systems in virtually every area of science: for example the beating of the human heart (for circulation), business cycles in economics, predator–prey population cycles in ecology, geothermal geysers in geology, vibration of strings in guitar and other string instruments, periodic firing of nerve cells in the brain, and the periodic swelling of Cepheid variable stars in astronomy. The term vibration is precisely used to describe a mechanical oscillation.
For more info from Wikipedia on Oscillation see https://en.wikipedia.org/wiki/Oscillation
Computing is not a separate topic - it is often referred to as STEM subjects such as Science, Technology, Engineering and Maths and actually computing also embedded computing is really interwoven into the fabric of modern everyday life.
The only way to advance technology is to keep playing around with it hands-on learning is important - write about mistakes made also what you would do differently in the future also outline how technology products can be improved to really improve things for others.
If a child swings on a swing, they gain momentum with their legs. For physicists, this is a reasonably easy movement. They call it parametric oscillation.
Oscillation is part of Physics actually, but science generally comprises chemistry and biology as well. Science is a complex topic - machines can be built but the human body is very complex - the human brain is the most sophisticated complex organism in the world with billions of neurons. Physics useful along with computing for engineers, but really brains can involve chemical imbalances complicating matters.
Science at school can involve putting chemicals into test tubes - often different substances when mixed can create reactions. Many substances actually in the world that exist, so really ongoing experimentation is really important to test out chemical reactions and learn more about science at the molecular level.
Science really a complex topic - science is about experiments but more importantly writing up results of tests. This is also what NASA engineers do.
Writing up results may be classed as boring, but being methodical and systematic may lead on technological improvements and changes for the better, may also lead onto helping also convincing others how something works when explanations are given in depth.
It can often be difficult to really understand make sense of a topic particularly in the area of science so lifelong learning is important fundamental even.
In a nutshell - RFID is a means to pinpoint location provide an ID code based in technology or in hi-tech systems, you really need humans to manufacture the technology think bracelets with fine circuitry and embedded circuit boards where components are soldered together - satellites enable a top down view and can give an at a glance view support use of electronic tags for tracking through GPS or the American Global Positioning System, Europe has Galileo and Elon Musk has Starlink satellite constellations.
Use of electronic tags assists monitoring of offenders, giving prisoners more freedom can free up prison overcrowding and may lead to greater consideration of human rights leading on to greater respect and a safer society in the long term. Some people can face lack of chances for reasons that are not fair - prejudices can be very apparent and show through. Prejudice stems also from discrimination whether blatant or otherwise, whether deliberate or accidental - people may discriminate by accident through sub-conscious unfair perceptions over also fears about someone.
Windows Phone long forgotten - Google Classroom versus Microsoft Teams for online learning also computers can run Windows 10 and Linux in a dual boot giving user choice and Linux really provides for advanced security to control file and folder access with a system of permissions
Linux operating systems do tend to be built with greater security protections - what is Group Policy in Microsoft servers through Active Directory, Linux uses a similar structure to control access to files and folders called user permissions. Access to an individual's files and folder also directories is a question of who do you trust really? Actually there is an upside to openness and publishing because it has potential to contribute to education, better understandings maybe even support offers of help and assistance - modern communication technologies do really assist everyone and the web and access to it is also universal in a sense. Access to the web can be done from virtually any information seeking device - not usually from your microwave and microwaves do usually interfere with WiFi signals. Smart appliances are increasing and with it demand for IP addresses to give each device a unique address on the Internet.
Collegaues, students and staff at Universities often form communities - teachers often mingle in staff rooms when they have spare minute - people from similar backgrounds share experiences and with that will likely experience similar issues - the TUC trade union is born from this as is the Teaching union. More people learning to self-publish whether via Amazon Kindle Direct Publishing where authors can earn money or freely on the web, knowledge can be shared and spread around.
Linux better for security than Windows - organisations also commercial companies think Microsoft and Google usually distributed in multiple countries, so really security of computer systems likely gets shared or distributed to people across m
Books Abroad near Huntly is charity that sends books to Africa - AVI to WebM conversion needed - AVI Windows video files tend to not display on an Android smartphone also Nokia nHD format mobile 360p 320x240 pixels good visual quality for low file size but still Windows AVI format, better with WEBM preferred format low file size mobile video window and good visual quality - People can learn from real world observation - mobile data on the web helps real people understand what is going on outside and synthesise bring it all together to form new knowledge great for budding anthropologists
A Windows Avi sound file 384MB for 5 minute video duration or video file segment can be lowered using OpenShot Video editor for Windows, Mac and Linux free open source software on Windows 10 in both resolution and file size converted to Nokia nHD format mobile 360p 320x240 pixels with file size 38Mb or Megabytes for a 384Mb 5 minute video segment. AVI files are Windows sound files so probably would not work with video editing software for Linux.
All Formats menu option on OpenShot Video Editor export menu enables changed to WEBM format vp9 lossless. Avi files do not work on Linux really but the WebM format does work on Android display thumbnails on an Android smartphone in the Movies folder. With great video compression with good video quality even though the resolution and viewable video window is small, WebM great format for putting video on a smartphone with audio and sound as well to replay contextual descriptive information - video segment files with a conversation and visual information contained. If the future is smart specs, AVI is not the best format, better to support WEBM - embracing the digital world and computers when you have an interest keeps minds self-aborbed, is good for mental wellbeing and also keeps people safer really - online delivery and takeaways being delivered can really lead to a fulfilling existance in front of a computer. Perks of jobs at Google labs is exercise equipment in house also relaxed culture where employees do not feel pressure - learn at your own pace can really bring out the best in learners.
1024x576 16:9 PAL video format of Europe - PAL is for Europe - this format is used by OpenShot Video editor WEBM lossless. It can be sometimes necessary to convert video files again if Avi is used so conversion for compatibility is a two step process. When video resolution is reduced, upscaling making video resolution bigger tends to not be possible, but smaller windows of video segments with audio or narratives also voices suitable for contained video playback from a smartphone. This can enable a more mobile digital lifestyle in a sense, but always from a smartphone really productivity is hampered and actually it will likely be hampered for the foreseeable future - need for big time innovation, change of thinking, need to think out the box, for inventors and entrepreneurs to be really clever.
Important consideration is the Web Content Accessibility Guidelines 2.0 - these really known as Web Accessibility version two different from web 2 two or Web 2 which represents the social web where users connect. Accessibility guidelines, techniques including tooltip from the title tag on links and also use of clear simple language, web page content in text can make efficient optisation for content sent in transit across a network backbone also from web pages from an Android Smartphone. HTML pages on a phone good format for information display with built-in web browsers on a smartphone - also WebM format good container for video that resembles convergence of audio and video. Offline websites enable access to information when there is no data connection or Net connection also definitely not any mobile data or Internet connection.
Windows 10 Snipping Tool for JPEG and PNG can make meaningful images with detail compressed really small to help educate African children where children may connect via solar powered laptops outdoors powered by the One Laptop Per Child project designed by Nicolas Negroponte from MIT Labs big famous American University with an open project for e-learning resources available on the web. Solar power and energy efficiciency works hand in hand with efficient data transmission minimising network load on Cisco routers, the network backbone in a shared world where really all Internet users are equally considered - this is Net neutrality and access to the Net should be a basic human right.
Many people that connect to the Net would argue it improves their quality of life - in Transmission Control Protocol there is quality of service as a parameter designed to ensure data packets are sent and received with integrity non-corrupted units of data sent and received.
Nokia nHD format mobile 360p 320x240 pixels is an efficient low size video file type but still produces AVI video files with sound - not compatible with Android smartphones. AVI is a Windows compatible sound format. Microsoft long opposed competition in the computer industry - Apple was a fierce rival with another closed computer system the Macintosh main chief rival actually but Google really sought to open up computing, but Apple's groovy easy to use user interface with logical icons that are symbolic that link connotation with meaning and icon resemblance to real world tasks on the iPhone is easy to use by women.
Icons that are Symbolic that link connotation with meaning and icon resemblance to real world tasks mimic pathways and connections also neurons through the brain at a fundamental level in terms of role or function. Pathways through the brain actually may link from experiences - new events may bring up memories trigger memories and from memories it may be possible to understand events and why they happened, also help people to cope with life come to terms with the past. The most vulnerable may suffer emotional turmoil but actually the digital world can open up learning, give people hope, read and watch news events elsewhere in the world - people at a fundamental level in psychology like to know what is happening, what is going in - this is the same curious mind that leads to great inventions, products to help everyone.
Psychology is the study of behaviour that stems from the mind and thoughts - slightly different from anthropology actually which is observing people outside in a natural setting outside against the backdrop of the natural world and built up urban landscape.
People can learn from real world observation - mobile data on the web helps real people understand what is going on outside and synthesise bring it all together to form new knowledge - analyse is breaking down concepts and what's happening, synthesise is intellectual higher cognitive thinking and brings facts also observations together into some new medium and video works well as the medium of convergence with audio or sound. Video with audio really enables others to see what has happened - shared video is shared experiences also, evidence without prejudice - totally objective in the truest sense.
Always when you embrace video conversion, aspect ratio is an issue also letterboxing the black borders around video from a magnified display - may not be noticeable from a smartphone where the window of view is smaller. 16:9 really the format of choice at the present time that seeks to keep compatibiliy in video cross platform or across devices.
Renaming files can be useful to make data more meaningful, but creating multiple copies on local computers also on separate second SSD hard drives can actually complicate matters when you do not delete local copies on really a transient hard drive that runs Windows 10. Windows 10 main core operating system really vulnerable or prone to issues malfunction so really data back-up, file conversion and deleting local copies on a hard drive running Windows 10 is important.
Really data on a hard drive with Windows 10 is likely transient or temporary since it is online storage also external hard drives also perhaps a second SSD hard drive in a computer that will keep data safer although hackers can affect online storage files and still viruses can run rampant - it is ransomware really the dangerous type that encrypts file so really off computer local files important and utilising multiple digital services also counters issues around rogue individuals.
If you must put out text content - keep paragraphs short actually using the letter-p paragrah tag in HTML more frequently to divide text content into independent meaningful blocks to help readers of web pages reading from a small mobile device - consider also some basic CSS Cascading Style Sheet commands in the head also style element of an HTML page to set a good size of text close to 200 percent. Bigger text on mobile makes the mobile computing platform more usable - enables education of under privaleged children in third world countries.
General Packet Radio Service and Universal Telecommunications are slow universal networks - keeping page file size down also the size of JPEG files is advisable for universal education.
Books Abroad near Huntly, Aberdeenshire, in North East Scotland is a charity that sends books to countries in Africa to assist with education - second hand books are abound, sending books to Africa is also recycling enables reuse.
https://www.booksabroad.org.uk/
Network masks are different from single computer IP addresses, also Virtual Local Area Networks can group users for security or data traffic filtering by application in a manner independent of their physical location, also Cisco routers can filter data traffic using Access control lists for greater network security and example code is given - Internet Control Message Protocol error messaging and diagnostic support for Internet Cisco routers
ip nat outside - also ip nat inside are two Cisco router commands used to configure NAT also known as Network Address Translation where a single public IP address is used to represent a private network that comprises multiple computers.
Use of a NAT helps to save or ration public IP addresses also provide greater security to computers on a private network. Rationing of IP addresses is less likely with IP version 6 six addresses which are much longer with hexadecimal numbers base 16 instead of a binary or base two or a two state system.
NAT configuration on a Cisco router involves Virtual LANs sometimes - NAT can be used with a Virtual LAN. NAT can also be used with access control list filtering - access lists are used to filter network traffic useful for packet filtering controlling the flow of network traffic and for forwarding data packets also blocking data packets at a particular router interface or router port.
Virtual Local Area Networks can group users for security or data traffic filtering by application in a manner independent of their physical location
A VLAN or a Virtual Local Area Network is a group of end stations in a switched network that is logically segmented by function or application, without regard to the physical locations of the users.
VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the same LAN segment.
A Virtual Local Area Network really enables a network administrator to group users based on their role within an organisation or by what applications they use to provide greater safety within a network and also to enable co-operation and information sharing amongst employees within a given section of an Internetwork.
A virtual LAN can really be used in this abundant information age to enable greater information sharing amongst a subset group of employees within an organisation.
Big role and potential for Virtual LANs and Cisco routers within large organisations. Cisco routers really suited to large enterprise level networks and also the backbone of the Internet.
Cisco routers relay signals, filter network traffic and forward data packets throughout the Internet - switches are often involved in organisation networks that link to the Internet.
Switches offer a dedicated connection between each computer on a network and a switch also a separate collision and broadcast domain ensuring actually congestion free networks.
Multiport switches offer full-duplex send and receive both directions
Multiport switches that are full duplex really offer the best connectivity on a network - half duplex is also sometimes referred to one way transmission at any given time. Half duplex more synonymous in the past with token ring token passing networks - wait your turn be patient and actually British people do usually spend a long time in queues it is opposite of the Italians actually who may push and shouve on crowsed buses - still Italians can be polite. Actually pushing and shouving is also linked to automation - for a long time now Italian trains and buses had tickets stamped at a machine on board buses in the case of the bus. This bypassed the driver but often necissitated the need for a bus condutor. Bus conductors used in Aberdeen around 1970. Automation and the digital industry still requires people and jobs - multiple people working in teams is really what powers the Internet, but still everyone needs to think about their own actions be responsible. Positive actions often shown over time when people show restraint refrain from acting on impulses even in a state of distress.
Full duplex (FDX) switches allow for the simultaneous transmission of information between the switch and the endpoint. In a half duplex (HDX) system, communication flows in one direction at a time.
Traditional phone circuits are full-duplex - The most familiar example of a full-duplex communication channel is telephony, where both participants in a call can send and receive audio simultaneously.
Full-duplex Ethernet does save time when compared to half-duplex because it alleviates collisions and frame retransmissions. Sending and receiving are separate functions, creating a system where there is full data capacity in each direction. In contrast, half-duplex can be used to conserve bandwidth.
Power over Ethernet is wireless networks over the power line in homes and RJ45 is for Ethernet
PoE (Power over Ethernet) is often used in homes to use electrical sockets as points in a computer network to hard wire computers.
RJ45 Port is the technical term for an Ethernet port or jack on a standard laptop or computer for example with Gigabit Ethernet definitely not a Chromebook no such point of wired connection on a Chromebook, those devices are wireless only with limited storage for offline actually around 32GB - bare in mind hard drivers were around 10GB in the late 1990s - 20GB was a luxuary actually when you present for the web you need to think about keeping file size down file optimisation for the web over what was traditionally slow networks in the beginning - often simplicity reaches more people and makes web content more universally accessible - but still conducting real world usability tests of online web systems with real world users can identify issues that affect real people.
It is not clear actually how difficult websites are to use without involvement of real people with disabilities actually - macula degeneration loss of eyesight in old age can actually be a barrier to reading content and those with macular degeneration actually can have difficulty to pick up a glass of water spill water (a video shared online actually shared by a health service showed this - such a situation can really freak people out). There is the wireless set or the radio and also audiobooks for those who have sight issues, are visually impaired also.
Amplitude Modulation AM radio still live on the air in the UK
Radio broadcasting in the UK is still actually live in analogue on AM Amplitude Modulation. There is digital radio in cars and new cars had this in the last decade but older cars beyond this point may still access the radio via AM think BBC Radio 4 four talk news radio programmes in the morning on the way to work. Converting AM radio to digital actually is a massive undertaking.
There are a wide range of abilities and also disabilities the world over - helping real people and being accommodating is fundamental. Some persons with disabilities may not want to admit their condition also they may feel shame and also a disability may severely affect a person, computers can be a great benefit.
Women more often than not provide care services, really helping women to master understand technology can really have a big impact help a wide range of people.
Cisco routers relay messages and Access Control Lists allow or permit data traffic at router interfaces
Important saying that has gone around in the past - do not shoot the messenger, but actually messages are relayed through Cisco routers with clock signals for timing and synchronisation an important part so admin workers on Cisco routers may be messengers to all part of a chain really that is interlinked like the Internet - clock signals and timing are core part and e-mails also have dates helping to pinpoint events in time.
Access control lists filter data traffic usually rules are positive and seek to allow traffic from one router interface to another - positive rules marked by permit, but deny is an allowable parameter also. A single access list rule shows a source IP address first for a router interface, then a destination IP address for a router interface. Port numbers are also revealed marking a service either using a number such as 80 for the web service port 80 or using www to mark a web service with a logical name - www is for the web access, and marks an access point on a router for web filtering traffic.
Sample configuration and playing around with it in a multi router simulation on a small scale is the best way to learn how to manage a Cisco router for managing Internet communications where data is involved in connection with a computer network where web filtering is required - and Universities do have dedicated router set up labs with a few routers for experimentation by students.
Access Control Lists to filter and also group network traffic
Access lists usually grouped using a logical number - this groups multiple rules together for a small router network set up - group numbers are a way to manage Cisco router web traffic filtering.
Need for educators willing to break down complex technical subjects
Security on Cisco routers is complex - finding skilled engineers can be an issue and also finding educators willing to explain break down complex topics linked to essential Internet infrastructure in language young people also women can understand is really rare actually. Training in Cisco routers can lead to certification, but Universities may not actually enable students to do the final exam - often training in computing is down out of own pocket of money and over time using books, ebooks and online materials.
Internet Control Message Protocol error messaging and the wildcard mask of four zeros allows all data packets through a router port or interface
Access list rules may include ICMP the Internet Control Message Protocol and also a wildcard mask may maybe mentioned in code, sometimes by 0.0.0.0.
IP address wildcard mask of 0.0. 0.0 is used on servers to designate a service may bind to all network interfaces. It tells a server to listen for and accept connections from any IP address. Using a specific IP address for a wildcard mask to represent a network also known as a network mask or a segment of a network may control web filtering of given data packets for a given portion of a network or Internetwork providing greater security to an organisation's internal network and protect intellectual property also the digital assets of an organisation. Really using specific IP addresses would give network administrators greater control of a network, but a wildcard mask of 0.0.0.0 or four zeros is useful on the backbone of the Internet to keep Internet traffic free flowing.
Internet Control Message Protocol error messaging and diagnostic support for Internet Cisco routers not to be confused with Simple Mail Service SMS the service that sends text messages using mobile phones - SMS been around since the year 2000 and basic also standard mobile phones with digits 0-9 including hash and star enabled messaging where users pressed keys multiple times to select a specific character, smartphones make sending messages easier and at night with a backlit display also called illumination.
ICMP is a diagnostic messaging error system used between devices akin to ping and traceroute commands in Windows 10. Ping to identify connectivity issues, traceroute to isolate find faults with routers in a network.
From Wikipedia - The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address, for example, an error is indicated when a requested service is not available or that a host or router could not be reached.
Wikipedia edits may be done by computing professionals in their spare time
Wikipedia is a definitive resource anyone can edit information and actually Wikipedia contains great vast amounts of technical information likely been added to by students doing technical courses or employees of firms maybe even mighty Google also Microsoft with an interest in computing.
Wikipedia edits are often annonymous and information in Wikipedia can be wrong but when people have done previous study at University for example, they may have better judgement to tell the difference between what is useful accurate information also altervatively tell when information is purely, totally and utterly misleading.
Technical skills certifications can boost employment prospects
A technical skills education in computing also computer networks gives someone credibility using leads to qualifications and certificates boosts employment prospects - also explaining to others breaking down technical terms assists education of others but also can showcase what knowledge a person has. Sharing information online can help others, also the Internet and the web is global across the world - technical concepts can help someone in Mongolia also Bangladesh equally.
Learned knowledge is one thing - but really understanding course material, taking time to understand refrain from drinking alcoholic beverages and study material can enable lead onto greater analysis, combine, scruitinise and move forward with an enquiring mind and Google's Answers technology with questions based on search terms key words can really stimulate education encourage people to move forward. Also alcoholic drinks may cloud judgement and perception and going against the grain of peer pressure may give someone better long term prospects, better employment prospects, a healthy life with job satisfaction also may enable someone to be more positive in themselves with a more positive outlook in life.
Enable is the key word that enters a router global configuration mode with a password - you need often to be sober to remember passwords. Alcohol can really affect performance at work affect balance, coordination as well as speech lead onto also sickness in the morning during pregnancy and then there is faetal alcohol syndrome which can affect unborn babies.
Creating diagrams and being creative can help young people to really get to grips with a subject matter, do better in exams and learn a complex technical topic.
Wildcard masks, network masks and private IP addresses
The quick definition: A wildcard mask allows or denies all the traffic from a network IP address. The wildcard mask tells the router which bits in the IP address need to match the access list and which do not.
A netmask or network mask different from a computers IP address - a netmask may have more zeros actually since zero or 0 represents the start often of a network segment and includes all hosts or computers within a network segment.
IP addresses are unique when giving reference to public IP addresses on the Internet, represent every IP address the world over on the Internet.
Private IP addresses may be used in many networks the world over for computers inside an organisation - class C network address class typically used more routinely with up to 254 computers allowed on a network segment - all Class C or Cee for Charlie (think phenetic alphabet and Scottish early age primary children learn using Jolly phonics) networks have the numbers 192.168.0.0 - a single network may be 192.168.1.0 and a single host or computer also a network node representing a user computer may be 192.168.1.1 and collagues next to someone might have a computer number of 192.168.1.2 or 192.168.1.10 up to 192.168.1.253.
The default gateway of a network is a router pathway to Internet usually
The number represented by 192.168.1.254 might be the last computer in a network or could be a router known as a default gateway, sometimes BT home routers use this number. A default gateway really is the door on an internet network to the Internet representing a pathway to the outside world, which is a network of networks linking together to form the wide area network known as the Internet. Type in http://192.168.1.254 on a home computer and it may reveal your router configuration if your router is provided by BT British Telecommunications telecoms giant but these numbers can vary and are pre-determined when a router leaves a factory - factory default values linked to factory reset on routers also smartphones, reset to fixed pre-determined values has held in NVRAM Non-volatile RAM for smartphones such as NAND flash which retains data when the power is lost. Best to type in ipconfig/all in a Windows 10 command prompt to determine the exact address of a router linked to a computer on your home network.
Launch a Command Prompt window or screen in Windows 10
To launch a command prompt window in Windows 10 the most common operating system of all time in July 2022 with update to Windows 11 happening now type in lower search box on Windows desktop screen the command cmd - the normal screen a user sees when they first log-in to Windows for example (some people do not understand the concept Desktop need for definitions also explanations to include more people).
Command prompt in Windows 10 available via Start menu, Windows System menu - need to scroll down to almost the bottom of Windows 10 start menu. Breaking topics down can assist older people also women, children and even doctors. Doctors may know more about a patient that they let on and actually some patients could be exploited because care for older people can be expensive. Aberdeenshire Council has a care at home service - the Press and Journal announced it was exceptional - but looking at advertised jobs it seems it might have issues around attracting carers.
In a nutshell, Network masks are different from single computer IP addresses, also Virtual Local Area Networks can group users for security or data traffic filtering by application in a manner independent of their physical location, also Cisco routers can filter data traffic using Access control lists for greater network security and example code is given - Internet Control Message Protocol error messaging and diagnostic support for Internet Cisco routers.
Cisco router example code for router configuation involving Access Control Lists for greater network security and web filtering - examples help to reinforce learning always teach others young people the future network managers
enable
configure terminal
line console 0
password class
exit
line vty 0 4
password class
exit
enable secret class
no enable password
service password-encryption
hostname Admin_Router
interface fastethernet0
ip address 194.15.29.1 255.255.255.248
ip access-group 103 in
no shutdown
exit
interface serial0
ip address 194.15.29.25 255.255.255.252
clock rate 128000
ip access-group 101 in
no shutdown
exit
interface serial1
ip address 194.15.29.29 255.255.255.252
ip access-group 102 in
clock rate 128000
no shutdown
exit
interface loopback 1
ip address 194.15.29.33 255.255.255.252
exit
interface loopback 2
ip address 194.15.29.37 255.255.255.252
exit
interface loopback 3
ip address 194.15.29.41 255.255.255.252
exit
interface loopback 4
ip address 194.15.29.45 255.255.255.252
exit
interface loopback 5
ip address 194.15.29.49 255.255.255.252
exit
router rip
version 2
network 194.15.29.0
network 194.15.29.24
network 194.15.29.28
exit
ip http server
no access-list 101
access-list 101 permit tcp 194.15.29.8 0.0.0.7 194.15.29.45 0.0.0.0 eq www
access-list 101 permit tcp 194.15.29.8 0.0.0.7 194.15.29.49 0.0.0.0 eq www
access-list 101 permit tcp 194.15.29.8 0.0.0.7 194.15.29.2 0.0.0.0 eq 3306
access-list 101 permit udp any eq rip any eq rip
access-list 101 permit icmp 194.15.29.0 0.0.0.255 194.15.29.0 0.0.0.255
access-list 101 permit tcp any any established
no access-list 102
access-list 102 permit tcp 194.15.29.16 0.0.0.7 194.15.29.45 0.0.0.0 eq www
access-list 102 permit tcp 194.15.29.16 0.0.0.7 194.15.29.49 0.0.0.0 eq www
access-list 102 permit udp any eq rip any eq rip
access-list 102 permit icmp 194.15.29.0 0.0.0.255 194.15.29.0 0.0.0.255
access-list 102 permit tcp any any established
no access-list 103
access-list 103 permit tcp 194.15.29.2 0.0.0.0 194.15.29.9 0.0.0.0 eq 23
access-list 103 permit tcp 194.15.29.2 0.0.0.0 194.15.29.26 0.0.0.0 eq 23
access-list 103 permit tcp 194.15.29.2 0.0.0.0 194.15.29.25 0.0.0.0 eq 23
access-list 103 permit tcp 194.15.29.2 0.0.0.0 194.15.29.30 0.0.0.0 eq 23
access-list 103 permit tcp 194.15.29.2 0.0.0.0 194.15.29.29 0.0.0.0 eq 23
access-list 103 permit tcp 194.15.29.2 0.0.0.0 194.15.29.17 0.0.0.0 eq 23
access-list 103 permit tcp 194.15.29.2 0.0.0.0 194.15.29.1 0.0.0.0 eq 23
access-list 103 permit tcp 194.15.29.0 0.0.0.7 194.15.29.45 0.0.0.0 eq www
access-list 103 permit tcp 194.15.29.0 0.0.0.7 194.15.29.49 0.0.0.0 eq www
access-list 103 permit tcp 194.15.29.0 0.0.0.7 194.15.29.1 0.0.0.0 eq www
access-list 103 permit udp any eq rip any eq rip
access-list 103 permit icmp 194.15.29.0 0.0.0.255 194.15.29.0 0.0.0.255
access-list 103 permit tcp any any established
end
The web open platform best for technical information - Information Management a subject within the realm of Aberdeen Business School linked to social sciences has links to implementing MySQL databases with PHP and more students and academics setting up websites could help to lead also advance industries since academics often demand students innovate and award top marks for originality
The World Wide Web is an open platform is best for technical information and for education - the web originally came into being as a military network from the Defence of Advance Projects Agency or American Darpa. Technical information really can be often corroborated much more reliably by experts in technical fields who are practitioners are may work in specific fields - the nature of online news is such there is always issues around misinformation and really believing what has happened. The notion of practitions is linked actually to Aberdeen's Robert Gordon University who prepare students for industries and for employment - RGU in Aberdeen often trains students in more vocational specific courses which are technical from midwifery birth of babies to computing topics also engineering even Information Management a subject within the realm of Aberdeen Business School linked to social sciences has links to implementing MySQL databases with PHP the Hypertext Preprocessor. Many courses feature real world planning of projects with modules in project management. More students and academics setting up websites could actually share more technical information and help to lead also advance industries since academics often demand students innovate and award top marks for originality.
Google homepage uses AJAX to display links to online services and to all web applications as does BBC Sport for live feeds - AJAX can be learnt from awesome web programming website w3schools.com
AJAX is an important web technology for dynamic web applications, but also AJAX is used to generate basically all the web applications in the upper right on the Google homepage or to diaplay the icons to Gmail, Google Drive and Google Docs also Google Maps and Google Photos links and all the other icons that are available. It is obvious AJAX is used since these links upper right not available when there is no Internet or Net also data connection available. Sometimes USB network adaptors for wireless connections need unplugged to re-establish a Net connection, but the devices can fail altogether and you need to buy a new adaptor so another device is essential - the Amazon app on a smartphone useful for ordering new computer components.
AJAX is a developer's dream, because you can:
Update a web page without reloading the page - useful for BBC News live feeds, however
with the BBC new details can emerge at the top when readers are busy in focus
reading. The use of the BBC's implementation of AJAX for live feeds can be frustrating at times,
but actually AJAX is best used has a practical application not for news, but for BBC Sport and up to the minute developments
such as for tennis scores during Wimbledon, a flagship tennis tournament - 2013
saw Andy Murray from Dunblane win Winbledon after winning the same event
at the London 2012 Olympics.
Request data from a server - after the page has loaded
Receive data from a server - after the page has loaded
Send data to a server - in the background
Notice the difference between receive for reception of data and request for sending an HTTP GET request this is obvious from the code on the web page below.
Learn AJAX from W3schools.com or visit https://www.w3schools.com/xml/ajax_intro.asp
Desktop computers easy to add a second SSD hard drive and actually a 1TB extra hard drive is cheap - buy a new computer and it is expensive for a lot less SSD storage as a second drive since real high capacity drives can be bought online - server computers in serve farms will need hardware replaced that includes hard drives in storage racks - with this data transfer is important, data held in RAID5 storage or Redundant Array of Independent Drives. Mirroring prevents data loss which can hamper a firms bottom line profits
Deleting photos and videos on smartphones and tablets actually can help users ensure all content stored on a digital mobile device has been copied or backed-up also duplicated to a more permanent location such as online storage, a second SSD hard drive in a computer also an external hard drive - really smartphone and tablet storage is transient in a sense or not truly permanent since phones can become lost, get stolen also.
Sometimes some photos and videos can get stuck on devices - this is where alternative means of data transfer can be useful may also be needed. Always important to check small thumbnail icons on a mobile, delete images and videos transferred and visible on a large screen display - check with a mobile, delete as necessary transferred visual data and persist to get files captured with a phone to a more permanent means of storage - no storage medium truly permanent since technology can fail, but SSD external hard drives may last a long time if you can manage to transfer data - online storage provides a safety net in the event of well swell floods around Sydney - Sydney seems to be prone to serious floods in recent years.
Smartphone memory is actually non-volatile and data kepts stored without power in NAND memory storage - there is a NAND gate linked to micro circuitboards - transistors often part of secondary school technology education, but really the mobile nature of a modern communications device such as an iPhone means that a phone and its contents is transient as in temporary also known as fleeting - alternative names are synonyms and terms can be synonymous, in other word different terms can mean the same thing.
Sometimes not all photos and videos backs up to online storage using apps such as Dropbox and OneDrive - those that play around with technology are wise to write up useful lessons and wisdom - also sharing with others is useful and web-based information is an open platform and the basic language for creating web pages HTML is easy to learn, difficult to know who is really viewing a web page and benefiting. Really what does not get written about can be forgotten and it can be time-consuming to really evoke deep rooted events from the past also events ingrained in memories - memories really can be distressing for those blown up by landmines.
Writing technical support documentation is useful to actually explain the state of current developments in computing - issues and problems with current smartphones such as the iPhone and Android and also workarounds, solutions to empower users - most women would benefit from digital empowerment.
Desktop computers easy to add a second SSD hard drive and actually a 1TB extra hard drive is cheap - buy a new computer and it is expensive for a lot less SSD storage as a second drive. SSD or Solid State Hard Drives really still an emerging technology for more reliability data storage - server computers in serve farms where server computers are group in clusters will need hardware replaced that includes hard drives in storage racks - with this data transfer is important, data held in RAID5 storage or Redundant Array of Independent Drives. Data transfer also mirroring because professional companies that store data have professional reputations - data loss can affect a businesses's reputation which keeps them profitable - profits often the bottom line of any business.
Google employees technical support specialists including computer support personnel who maintain computer systems as well as write software applications, write algorithms to administer the core of the business the main search algorithm.
USB type C but what does it mean in practical reality? Data cables and the names of them can be confusing this has roots to engineering actually and male female connectors from electrical engineering - electricity from Michael Farraday and Benjamin Franklin and also Thomas Edison light bulb man symbolic of learning achievement in education - really simplicity is at the heart of web communication also social inclusion - Neurons of the brain or mind from a comparative perspective seem to resemble electrons with charged particles - native human behaviour in the real physical world can seem charged with often protests on the street
Unplugging an iPad to Windows 10 computer via a mini USB to USB data transfer cable may be called type C - data cables and the names of them can be confusing this has roots to engineering actually and male female connectors like terms such as prongs, plugs and sockets given a name really to identify them for the purposes of education really in electrical engineering.
Electricity from both Michael Farraday and Benjamin Franklin and also Thomas Edison light bulb man symbolic of learning achievement in education - educators and teachers do really like to see young minds light up connect the dots link events - linking events may have symbolic relative links in the mind the neurons of the brain often wired and connected together.
The Story of Electricity from the BBC originally but on YouTube - see https://www.youtube.com/watch?v=NUUeGianTKM, YouTube is the media sharing platform from Google the search giant, maker of the 7 seven inch Google Nexus and also the Chromebook without Ethernet ports for local networks including provider of Gmail and Google Docs online cloud based solutions built for an age of always on data to save files in real time prevent loss of work and user frustrations also aggression in the real world. Google One is commercial online storage that can preserve lots of digital data for a premium at a cost actually more economical than Dropbox with also Google's suite of apps included such as Docs, Sheets, Slides and Forms rivalling the established computing platfrom provider Microsoft who started Windows around 1993 with Windows 3.1 a system of cascading windows on top of one another filled the screen but aimed at the business community for Word processing, creating spreadsheets for tax purposes.
Spreadsheets linked to Visual Basic for Applications, a Microsoft programming language that can make database interaction through Microsoft Access more user friendly offline - MySQL is typically the online free database to store data online manipulated by PHP the Hypertext Preprocessor web based programming language like the language Cee also like Linux shell scripts. Data may be held in XML data definition files - XSLT can help to format and present daat but these languages complex - HTML and CSS is easier to learn and HTML is the web language that started off the World Wide Web, really simplicity is at the heart of web communication aimed at mass adoption to teach educate others with roots in mass communications. When educating en masse always important to have a good sense of perspective considering ethics and morals.
Microsoft Visual Basic for Applications used to be taught with instruction material in real thick books thousands of pages you cannot begin to understand this concept unless you saw them - this is technical education. Online communication affords many benefits and breaking down complex topics can really help non technical people to understand bridge the digital divide and lead to greater social inclusion.
Neurons of the brain or mind from a comparative perspective seem to resemble electrons with charged particles - native human behaviour in the real physical world can seem charged with often protests on the street, peaceful protests are better.
SATA, Dban and Dram also rm -r rescursively Linux remove all nested files and folders also directories, rmdir remove empty directories
Commerial secure deletion software for computers with a professional reputation include Blancco - https://www.blancco.com/ but there is the free Darik's Boot and Nuke for normal hard drives definitely not Solid State Hard Drives - https://dban.org/. Scrubbiing a hard drive to eradicate files can take a long time but actually keeping data can show tracks of what has happened in the past may be an advantage for the most vulnerable. Events from history when analysed, scrutinised, could help others learn chart a more positive trajectory moving forward - learning lessons the hallmark of making great progress.
Linux rmdir deletes an empty directory, Linux rm -r recursively deletes nested folders or directories including files in a related hierarchy or logical structure.
rm -i then a file name gives a prompt or a warning before deleting a file.
rm -rf in Linux enables directories or folders than contain files to be deleted with force.
rmdir filename or pathname in Command Prompt also known as MS-DOS mode removes a directory or folder in Windows 10. Right-click Command Prompt in Windows Start menu - search for cmd in search box - from right-click menu click with the left mouse button once on Run as administrator to spawn admin privilege to really run commands with the authority of the administrator user.
dban dot org is free open source secure wiping software for Windows computers for moving part hard drives the traditional hard drives not Solid State Hard drives or SSDs the newer faster more stable hard drives often smaller in capacity for a specified price point than the IDE hard drives known as the traditional hard drives with metallic clicking moving parts.
Laptop hard drives are known as SATA 2.5 inch hard drives - modern desktop hard drives are 3.5 inch SATA hard drives but traditional hard drives are IDE with metallic moving parts. There was also SCSI Small Computer System Interface which is a smart bus controlled by a microprocessor with ability to connect a printer, scanner and other physical devices a user can touch up to 15 devices to a computer.
Dban software runs from a DVD usually to boot a computer and securely erase it - the software likely runs quicker than Windows 10 Reset this PC which can take five hours or more, but Dban might not be as thorough. The Windows 10 Reset this PC feature to reinstall Windows perform a clean installation, securely remove user data is likely the easiest method to refurbish a computer for resale or to give away for the average user - to perform a clean install and wipe data is also to repurpose a computer give it another lease of life extend its use, donate a used computer to charity and someone in need, someone less fortunate.
Giving or donating a computer to someone else someone less fortunate is preferable over selling a used computer because second hand computers have wear and tear in terms of processor and memory performance known also as overhead - processors go through clock cycles usually per second and processors can be overclocked to run faster than the manufacturer of the processor recommends - usually there is some leeway to speed up a processors clock speed to get more bang for buck in computer processing terms, but with increasing clock rates more load also known as strain or network traffic demand in computer networking terms gets placed on hardware - this is one reason Cisco routers that perform a core Internet backbone router function are better with slower clock rates. Slower clock rates at the Cisco router level working on the high speed backbone links can prolong router network equipment hardware and also increase reliability in data transmission over an Internetwork or network of networks.
Memory modules can be replaced easy enough and additional memory modules can often be inserted in a computer’s motherboard. Adding memory to a desktop computer is easier than a laptop, but adding a memory module usually requires a firm push down on a computer’s motherboard the main circuit board and actually sensitive components on the circuit board can be damaged if too much force is exerted. Laptop memory known as SODIMM and desktop computer memory is known as DIMMs. Memory nowadays is named like DDR2, DDR3 and DDR4 known also as DRAM. DDR for Double data rate and is the advanced version of Synchronous dynamic random access memory SDRAM waits for clock signals before responding to control inputs. DRAM a common type of memory used in computers known as Dynamic Random Access Memory.
Overwritting files led to warnings from conflicts such as IRQs also Interrupt requests also the noclobber Linux command prevents files being overwritten brings this to the fore
Established conventions such as IMG_0001 numeric random filenames can sometimes make it more efficient to transfer data to a Windows 10 computer especially when the data transfer connection gets interrupted or breaksdown. In the past files deleted from a camera named IMG_0001 led onto new files on the same camera when deleted being created named the same - conflicts and files being overwritten led to this - the Linux command noclobber sought to correct this. Conflicts in files being overwritten led onto Windows error message dialogs also alerts - interrupt requests also known as IRQs can inform users about errors give them warnings of incidents in the data connected world.
Always frustrating when a data transfer gets interrupted - video or movie files always larger than JPEG even the modern HEIC images. Videos files on an iPad in Mov or Movie format only works with Windows and Apple Macintosh computers, the Android MP4 format actually is more cross platform supporting Linux as well - MP4 from MPEG version 4 H.264 standard with really core explanations of the format from Professor Iain Richardson from Aberdeen's Robert Gordon University producing published works.
The Linux noclobber option prevents you from overwriting existing files with the > operator. If the redirection operator is >, and the noclobber option to the set built-in and has been enabled, the redirection will fail if the file whose name results from the expansion of word exists and is a regular file.
Data transfers can result in errors sometimes error codes in hexadecimal the base 16 number system non sensical represepntation and Apple devices usually error prone due to closed nature of main core platform iOS - Academics actually like students to be critical, be innovative also and produce original work - Progress in society including technological progress is always made with communication or technical authoring - really breaking complex topics down and simplify can move people on and forward in their thinking
Device unreachable error while copying files from an iPad to a computer? Old filenames such as IMG_0004 to IMG_0033 worked better in a sense for when mobile devices or cameras malfunctioned in respect of the connection the typical cable data transfer cable between a physical device and a Microsoft Windows computer - the data transfer cable from a Windows 10 computer to an iPhone is mini USB to USB Type C, a different cable for an modern iPad altogether and another cable for Android smartphones and tablets but actually just three adaptors the world over for modern devices supported by the PhotoStick OMNI - a device with three adaptors, special software to simplicy data transfer from mobile tablet devices to a computer - https://getthephotostickomni.io/.
With the older filenames being sorted alphabetically in numerical order, it does make it easier when in Large icons mode of Windows Explorer to establish what files you have copied to your computer before data transfer interruptions. Copying files to a new folder or directory with a logical name of place or venue plus date made sense to really solve the problem of cameras actually starting called every file IMG_0001 when image JPEG files deleted from a camera having been transferred to a computer. Note that BT have been offering online storage or cloud storage since at least 2005 and Microsoft OneDrive did once give customers of free accounts 25GB of online storage, but Microsoft have cut that to 15GB even for established accounts - no loyalty for Microsoft customers this is Microsoft's aggressive market stance of decisions made in business on a firecely competitive level. This decision by Microsoft in respect of OneDrive is actually driven by the major rival Google of taking a free open source Linux distribution and creating Android putting it everywhere - multiple device manufacturers now make smartphone and tablets for Android and Android is really the divergent computing platform that is dominant - Android apps now run on Windows 11.
Modern versions of the Apple iPhone certainly since iPhone SE 2020 are giving files of image data or JPEG images a filename with the date and time appended - this is useful for establish when events happened in a clear manner - but always renaming files using folders with meaningful place names or venues or dates actually can bring greater significance with digital computer platforms. Often there is a real need for patience with computer systems.
Overwritting files led to warnings from conflicts such as IRQs also Interrupt requests also the noclobber Linux command brings this to the fore
Established conventions such as IMG_0001 numeric random filenames can sometimes make it more efficient to transfer data to a Windows 10 computer especially when the data transfer connection gets interrupted or breaksdown. In the past files deleted from a camera named IMG_0001 led onto new files on the same camera when deleted being created named the same - conflicts and files being overwritten led to this - the Linux command noclobber sought to correct this. Conflicts in files being overwritten led onto Windows error message dialogs also alerts - interrupt requests also known as IRQs can inform users about errors give them warnings of incidents in the data connected world.
Always frustrating when a data transfer gets interrupted - video or movie files always larger than JPEG even the modern HEIC images. Videos files on an iPad in Mov or Movie format only works with Windows and Apple Macintosh computers, the Android MP4 format actually is more cross platform supporting Linux as well - MP4 from MPEG version 4 H.264 standard with really core explanations of the format from Professor Iain Richardson from Aberdeen's Robert Gordon University producing published works.
This web page author took opposition to Iain Richardson over Advanced Data Networks module for BSc Hons in third year Computer Network Management and Design passing with Distinction also although downgraded for the module exam (not from the questions written by Iain Richardson) writing to the lecturer by email to say how he should not be encouring students to buy his published book when students pay course fees with money coming from the Students Award Agency for Student, a Scottish government agency or perhaps a quango. Quangos can be spread throughout the public sector and maybe more often than not linked to efficiency and buereacracy.
Academics actually like students to be critical, be innovative also and produce original work - actually Dr Tony Miller from the School of Engineering also lectured on Advanced Data Networks and did award or give this student top marks for coursework involving complex mathematics even though the student could not make head nor tail of the maths involved. This student now graduate understood the broad principles and was better at communication also sharing information - plagiarism can be linked to sharing and copy and paste. Copy and paste can be useful for technical definitions for taking definitions from Google Answers technology which is designed to stimulate an enquiring mind move learners forward and develop - Google is a very innovative company first sporting driverless self driving cars, but important to always analyse media events in computing over time and analyse. Open data very useful to help others learn - really sharing and publishing as many benefits, some people can really appreciate quality information written with the aim to help not cause harm.
Progress in society including technological progress is always made with communication or technical authoring - really breaking complex topics down and simplify can move people on and forward in their thinking but some people can take advantage of more vulnerable persons - the most caring consider ethics and morals, but actually real moral dilemmas can crop up, also with advancement of knowledge, people get smarter and that makes moving forward more compeitive and forces a need also and a focus on continual improvement and lifelong learning which is borne out in Curriculum for Excellence, the education scheme dating back to Labour's Jack McConnell - Lord McConnell incepted Curriculum for Excellence in the aftermath of Tony Blair's relentless focus during 1997 at the election on education, education and education. Curriculum for Excellence seeks to make learners environmentally responsibe - with this it is always important teachers or educators are good role morals and are also environmentally responsible to be able to inspire confidence in pupils and students also young people.
After a device unreachable error on an iPad, iPads can switch off, screens can go blank, iPads can disconnect from a computer - it is not always easy to work out why file transfers have been interrupted and it can be frustrating. Real patience needed with digital technology to work out, isolate and break down what has gone wrong with the view to seeking a resolution - successful data transfer nowdays is key fundamental to preserving data long time in one respect but fast data networks and access to mobile data at sufficient speed can enable visual data including video to be uploaded to online storage think Dropbox and OneDrive also shared on YouTube.com, Rumble.com or Facebook.com now also as social networks or media sharing sites. Facebook.com is the real social network where people may have formed relationships, friendships and connections in real life, but YouTube also Rumble.com and Vimeo.com are media sharing sites for video.
The WebM format file makes efficient use of compression low file size - file size at an optimum for data transmission the sending of data across a network most efficiently while preserving good visual quality. MP4 format files is often video used on Android tablets - for advancements with mobiles and tablets also with digital technology, technical education must always come first.
Events throughout the world can unfold at rapid pace and now more than ever real raging infernos are unfolding before everyone's eyes with wildfires often.
News often rolls 24 hours a day 7 days a week and people can lose their lives in an instant - if you are alive, important to have a work ethic, be productive and make progress for the greater good always considering others are how people can help each other.
Unplugging an iPad from a Windows 10 computer does not always result in an iPad device reappearing in Windows Explorer and This PC view - This PC left side of Windows Explorer panel shows all devices connected to a computer including a computer's main hard drive and any extra SSD hard drives - new computers tend to come with two hard drives nowadays - storing data on the second hard drive such as an Solid State hard drive is more advisable to enable Windows to be reloaded with a fresh install - Android apps able to work on Windows 11 and Android stores with apps not as well vetted as the Apple App store - Apple has been on the receiving end of critics in the past for blocking apps and also Apple's policy for blocking apps the rules of engagement between Apple and Apple App developers may not be fully transparent or clear. Apple the company of iOS the mobile operating system computing platform for Apple devices including the iPhone and iPad naming its core system after Cisco's flagship router software is a clear and blatant trademark violation of Cisco Systems Inc with its IOS or Internetnetwork Operating System. Cisco make routers for the backbone of the Internet, really pioneeed online learning twenty years ago - Cisco the main company that made the Internet popular also made it possible. The technology industry is fiercely competitive.
Apple often the company of proprietary closed technology like Microsoft - Apple iTunes often needed to transfer data to a Microsoft Windows 10 computer historically slow and buggy software. Possible though to connect to an iPad transfer photos and videos without iTunes.
Apple maker of the Macintosh computer often expensive high end fancy graphics aimed at designers, artists and music composers but with the iPhone has really rolled out mobile computing to women across the globe - this in itself made mobile computing easier to use but data transfer and copying data also preserving it long term is a real challenge often fought with headaches and real user frustrations - this is the importance of breaking topics down, simple language, explaining and teaching.
Unplugging an iPad to Windows 10 computer via a mini USB to USB data transfer cable may be called type C - data cables and the names of them can be confusing this has roots to engineering actually and male female connectors like terms such as prongs, plugs and sockets given a name really to identify them for the purposes of education really in electrical engineering. Electricity from both Michael Farraday and Benjamin Franklin and also Thomas Edison light bulb man symbolic of learning achievement in education - educators and teachers do really like to see young minds light up connect the dots link events - linking events may have symbolic relative links in the mind the neurons of the brain often wired and connected together. Neurons from a comparative perspective seem to resemble electrons with charged particles - native human behaviour in the real physical world can seem charged with often protests on the street, peaceful protests are better.
Related links
Photos and videos can be backed-up from the Photos app on an Apple iPhone and this way gives multi mode configuration flexibility - also app based modes also provide a fail safe alternative means of data back-up such as the Dropbox and OneDrive apps, so user persistance with technology can preserve data
There are three main ways to back-up photos and videos from a smartphone such as Apple iPhone - multiple methods may be considered fail safe modes of data back-up or duplicating also copying data making copies also back-ups - Linux has the cron job on desktop to schedule back-ups.
If one method does not work, switch to another - persistance and trying is when people learn to become self-reliant also learning from mistakes is how people really learn - producing writings of solutions and workarounds is how progress happens with technology - NASA technical reports fundamental to advancing everything with outer space.
Really it is written works that have historically passed on information through the generations but now video has audio and high-speed fibre optic netwoks are present mostly in the developed world, industrialised countries. Important to be able to back-up video files. Important for people from less industrialised countries to access websites if web pages are low in file size and images visual data is also low in file size with the best compression ratio for visual quality to optimise transmission over data computer networks. Web pages with simple HTML mark-up actually has big potential to broaden social inclusion also educate third world countries better, but of course, faster networks in under developed nations could really close the poverty gap and educational divide.
Always important to buy fairtrade produce to support developing countries - bear in mind also some nations may suffer with crop harvests, conditions of blight affecting fields and the agricultural pastures of foreign lands. Clean sustainable transport long term is a priority as is advancement of technology.
From iPhone main screen - use TouchID to authenticate with finger gain access to personal smartphone if you have set up TouchID, otherwise enter a password or passcode.
Tapping TouchID bevel Home button on models around 2020 - some latest models are doing away with home screen bevels, home button disappearing from latest iPhone models.
Tap Photos - then select button top right, tap on graphic or photo thumbnail representative icons to select.
Bottom left tap document icon, then select Dropbox or OneDrive to upload quickly to online storage over WiFi home network for example. May have to enter a passcode - maybe four or six digits depending on model and then click Save.
From Dropbox app, enter a passcode if you have one set up, the same applies to the OneDrive app.
Mobile users can upload files through the dedidcated apps also, but through the Photos may be easier and mobile users can choose whether to mail a photo, and also choose which online storage app to push a photo or video to.
The Photos app offers more configuration flexibility with due regard to data back-up.
Analog to Digital Conversion is possible with Pulse Code Modulation also Signal to Noise Ratio (SNR) WAV lossless versus MP3 lossy compression entropy encoding and source coding - you should look for an IBAN on your bank statement if you want to sell books online
Pulse Code Modulation is what is known as analogue to digital conversion, can involve sampling and quantization also an analog to digital converter for bits of data on a carrier by the way of a bitstream.
Signal to Noise Ratio (SNR) - In any analogue system, some of the voltage (amplitude) is what you want to measure (signal), and some of it is random fluctuations (noise).
The ratio of the power of the two is called the signal to noise ratio (SNR). SNR is a measure of the quality of the signal. SNR is usually measured in decibels (dB).
Sound is difficult to compress without loss of data, because of its complex and unpredictable nature.
Digital CD in audio is usually in WAV format that is the file extension anyway. Compact Discs or CDs involve Linear coding (for historical reasons) because it is designed for more than speech - usually CDs play music and DVDs play music videos sometimes. Advantage of a CD or DVD is you get a blurb with track names - a blurb is typically the back description of a book, summary text that gives readers hooks into books, makes them decided whether they want to buy a book or loan a book from a public library. Books have a unique identifier known as an ISBN or International Standard Book Number - books and works of literature are classified under the Dewy decimal system.
You may notice your bank account number has a long number known as an IBAN - this is a world unique identifer actually known as an International bank account number - you may need this number if you try to make money selling books online. There are a few competing platforms actually from Amazon Kindle Direct Publishing to Smashwords which makes ebooks available on both Apple Books via iPad and Barnes and Noble.
Downsampling also known as lossy compression from WAV audio CD music track to MP3 - quantization is signal to noise ratio
Music files like MP3 actually may be encoded or sampled at a certain bit rate such as 8 bits, 16 bits also 32 bits - higher bit rates linked to music files improve sound quality but with improvements in sound quality, file size is increased. Bit rate sampling also known as downsampling when going from large CD WAV files down to smaller MP3 or MP4 files - MP4 files can be used for audio only but also video as well. Bit rate sampling is known as quantization and there is a signal to noise quantization noise ratio (SQNR).
The quantization error (or quantization noise) is the difference between the actual value of the analogue signal at the sampling time and the nearest quantization interval value.
The largest (worst) quantization error is half of the quantization interval. The Signal to Quantization Noise Ratio (SQNR) measures the quality of the quantization.
Audio or sound sampling analogue to digital conversion - Typical sampling resolution (sample size)
8-bit (256 values) or 16-bit (65536 values), sampling rates are usually in KHz and a typical rate is 44.1KHz for CD quality recording, good quality suitable for voice overs also low end devices also when audio is saved in MP3 for example instead of the usually inflated file size WAV which is typical of sound or audio files on standard music CDs or Compact Discs. 22.05KHZ is not a bad rate for speech.
Mono versus stereo audio or sound - Use mono when original source is mono, stereo can also be two speakers
dual sound approach to mono single speaker
The delivery platform supports only basic audio
For voice recordings
For simple interface sounds
Wireless speakers sometimes are just a single speaker and often better quality
comes with higher purchase price for a typical wireless bluetooth speaker.
Note that for sampling rates of 11 kHz or less, the distinction between stereo and mono is lost.
Compression and encoding
Compressing data down is useful for more efficient data or network transmission - also modern image, video and audio codecs involve compression algorithms.
Encoding - The process of capturing and translating an analogue signal to a binary representation
Compression - The process of reducing the number of bits needed to represent a signal
Asymmetry in compression also decompression
Compression usually takes longer time than decompression
Asymmetry is acceptable in non-interactive applications
Delays, latency and signals in data communications
Delays also known as latency and also attenuation in a computer network in respect of data signals cannot be too long in an interactive electronic conference. Signal attenuation and signals breaking apart can be really noticeable with distant far away communication such as signals relayed via satellite and also between satellites - you may notice delays with SatNav instruments in vehicles on the ground and also you can be misdirected. Juggernaut vehicles and HGV usually have tachographs fitted to limit and monitor driver time prevent tiredness on the road and encourage breaks. Tachographs also SatNav hi-tech instruments fitted in lorries to improve road safety also aid lorry drivers.
WAV lossless versus MP3 lossy compression entropy encoding and source coding
WAV files the big file size files the hallmark of audio CDs involve Lossless compression which exploits redundancy (predictability, low entropy) in the signal. Also called bit-preserving or reversible compression. This contrasts with MP3 MPEG Level 3 files which use lossy compression - in MP3 audio files there is sound usually contained in higher quality CD WAV files that the human ear cannot detect. MP3 smaller size audio or sound files become possible due to throw away bits also referred to as lossy compression similar to JPEG image files.
Younger people do usually hear more higher pitch sounds - as people get older the higher frequencies are more difficult to hear. Music might actually be deep bass low sounds but actually you can change sound accoustics and there are terms like Treble - some songs are known as Acapello which is just lyrics and no music. The depth of sound can sometimes be changed using buttons on music players.
Frequency modulation is thus a technique used at Ear, Nose and Throat to determine the frequency of sounds experienced by people with noises in their ears.
Two main coding types for sound or audio files - Entropy encoding lossless and Source coding lossy compression.
Entropy encoding involves repetitive sequence suppression with zero length suppression and run length encoding.
Entropy encoding also involves statistic encoding with pattern substition and also Shannon's theory is involved also there is Huffman Coding - no links to the Huffington Post.
Huffman coding is a form of lossless compression so it is preserves data integrity but file sizes are bigger than methods of compression using lossy compression.
Huffman coding makes files smaller using the frequency with which characters appear in a message. This works particularly well when characters appear multiple times in a string as these can then be represented using fewer bits. This reduces the overall size of a file. Hoffman compression might well make files smaller, but files are likely still larger than using lossy compression.
In a nutshell, Huffman coding is an algorithm based on the frequency of the characters appearing in a file.
Source coding also lossy compression like JPEG and MP3 involves the Discrete Cosine Transform also it uses differential coding such as DPCM, DM and ADPCM also there is vector quantisation in source coding.
Differential pulse code modulation (DPCM) is a procedure of converting an analog into a digital signal in which an analog signal is sampled and then the difference between the actual sample value and its predicted value (predicted value is based on previous sample or samples) is quantized and then encoded.
DPCM requires less Bandwidth than Pulse Code Modulation for transmitting the same signal. DPCM is used to decrease quantization noise.
Audio or sound playback, the AUX port and bluetooth speakers
Audio signals on home HiFi machines are usually connected to MP3 players also smartphones using an AUX for Auxiallary cable using the AUX port - an AUX cable normally connects to the green port on the back of a standard computer motherboard. You can use an AUX cable to both connect a smartphone to your computer for audio or music playback, but equally you can also playback music in a car with an AUX jack using such a cable also to bluetooth wireless speakers with an AUX jack also a home HiFi. Home HiFis and wireless speakers usually nowadays come with bluetooth this is short range wireless communication suited to music.
Modulation and Run length coding means of compression repeating similar code blocks
DM stands for delta modulation while in ADM stands for adaptive delta modulations. Both are used for only one bit per one sample, In Delta, the modulation step size is kept fixed and cannot be varied while in Adaptive delta modulation according to signal variations step sizes varies.
Run Length coding - Replace long sequences of identical symbols with short repeat code. Repeating code enables redundant blocks of code to be done away with to make files smaller.
Threshold of hearing
Ambient sounds background sounds that can inform
Popular music has lyrics which can be suggestive also normal hearing is binaural
Music from popular culture often has lyrics and song words can have attached meaning and resonate with people perhaps influence their thoughts also get people up and dancing to a beat singing along sometimes in the shower - popular music really started during the 1950s with Buddy Holly and Elvis Presley - also Sir Cliff Richard really the doctor who of Pop music been around since the 1960s and around the New millennium or year 2000 he sang the Millennium prayer to the music of Auld Lang Syne. Sir Cliff Richard really did release hits during the 1960s, the 1970s, the 1980s, the 1990s and into the 21st Century. Sir Cliff Richard came second for Britain at the Eurovision song contest with Congratulations.
Normal hearing is binaural for example the listener hears typically with two ears that point in different directions and are a distance apart, although some people are deaf and older people may rely on hearing aids with batteries.
The brain processes the information received at these two receptors to identify the type of sound (for example car or traffic noise, voice, musical instrument) and its location within the surrounding three-dimensional space (for example to the left or right, in front or behind, above or below).
Digital audio and manipulation
Volume adjustments - so that individual sounds have same playback volume, heavy bass sounds that radiate out from speakers can reverbarate around a room, deaf people often feel vibrations such as Evelyn Glennie Channcellor of Aberdeen's Robert Gordon University in July 2022.
Format conversion - converting sound files from one format to another
Resampling or downsampling - reducing the sampling rates and sizes to reduce disc space
Fade-in and fade-out
Digital signal processing special effects, for example reverberation/echo/tremulo
Fourier analysis
Fourier analysis is a method by which periodic functions (data/signal) are broken down into a series of sine functions with increasing frequency.
Fourier analysis therefore consists of identifying the frequencies present in the function (data/signal).
Filters - Removal of selected frequencies from a signal, and attenuation of others.
Music can actually act as a filter and mask unwannted noise - also some faint noises may not be noticeable in a noisy environment, outside in real world natural surroundings.
Sound is also linked to hearing and ears and actually ears in children work differently to adults - children can be more susciptible to ear infections due to the horizontal nature of the ear canal.
Recording audio - from soundwaves to electrical signal to digital or digitised signal to audio file.
In sound generation and transduction for input to a computer, the pressure wave is convereted to an analogue electrical signal (transduced) also converted to a digital signal also known as digitised.
For the output from a computer, the digitised signal is convereted to an analogue signal and converted to a pressure wave.
Analog to Digital Conversion
There is discrete sampling of both time and voltage
Sampling - divide the horizontal axis (the time dimension) into discrete pieces. (Use a fixed time sampling interval.
Quantization - divide the vertical axis (signal strength) into pieces. Sometimes a non-linear function is applied.
ISO standard terms in relation to computer networks and user web based interfaces
Message - The content of communication between a sender and receiver may also be referred to a bitstream using zeros and ones also known as binary digital data also binary electronic signals that are put on a carrier medium to relay data communications.
Medium usually wired or wireless at the most basic level - The means by which that content is delivered (how the message is represented rather than the technology, but technologies can include copper cable in traditional BT telephony networks, fibre optics, satellite links to relay signals, often timing in signals is important as is clock synchronisation - Cisco routers have a clockrate command with setting options for various clock speeds or clock rates). Copper a real Earth mineral like nickel and iron ore derived from cobalt.
Infrared signals are also wireless really advantageous for seeing in the dark during night time or for night time vision. Infrared is the opposite of ultra violet light which comes from the Sun but also can be used in the form of UV lights in polytunnels for growing fruit for example - UV lamps also nail lamps have UV rays.
Modality - The way a message is perceived by a person (for example seeing via vision also via video, listening via hearing also audiobooks, touching via tactile input, touchscreen can be user-friendly but drawbacks come in function and productivity). Videos can have subtitles and also BBC News published videos came with subtitles added since the start of 2020 - text overlay onto video enables deaf people to understand videos but also everyone else when videos are muted online. Videos can sometimes be muted by default or automatically.
Input modalities
Tactile - keyboard, mouse, touch screen, data glove
Auditory or by hearing also sound - speech recognition also speech to text, also for blind web users text to speech to enable web navigation.
Visual - gestural interfaces, eye tracking
Ouput modalities - Visual forms include text, graphics, GUIs, menus, icons
Auditory -sound, speech generation
Tactile - Braille displays also refreshable Braille displays also as you may recall former Home Secretary David Blunkett was blind.
For more on ISO terms or for an online glossary, see https://www.iso.org/glossary.html
User considerations - Colour blindness and Dyslexia
Lack of thought by website designers can cause major problems for colour blind users.