Showing posts with label Other. Show all posts
Showing posts with label Other. Show all posts

Saturday, 8 November 2014

TOP CODING WEBSITES

                   TOP CODING WEBSITES
Top coding urls


                        1 :- Code Academy
                            Website :-www.codecademy.com
                        2:- Code Avengers
                           Website  :-www.codeavengers.com

                          3 :- Code School
                                   Website :-www.codeschool.com

                         4 :- Tree House
                                  Website :-www.teamtreehouse.com

                        5 :- Udacity
                                  Website :-www.udacity.com
                        6  :- Code HS
                                      Website :-www.codehs.com
                         7 :- Khan Academy
                                         Website :-www.khanacademy.org

                         8 :- SQL Zoo
                                           Website :-www.sqlzoo.net
<iframe height="430" width="350" src="https://bot.dialogflow.com/de06bd49-7995-43a5-ac8b-8cd3b5135cd1"></iframe>

Friday, 22 August 2014

Most useful google chrome shortcuts

          Google Chrome Shortcuts

Hi all! Most of us use google chrome  as web browser on PC,laptops as well as in mobiles.Talking about usage of chrome on pc is good. Sometimes if we have any massive  work over internet , it requires more time .In order to reduce time ,use keyboard shortcuts which makes your work fast.Learning keyboard shortcuts of google chrome helps you more when your  mouse doesn’t work and also in software industry.Probably searching for programs and nothing else.

Google +chrome+ shortcuts

Most useful Google Chrome Shortcuts:


Ctrl+tàcreates a new tab
Ctrl+nàcreates new tab in new window
Ctrl+wà To close the current tab
Ctrl+shft+tàTo reopen the closed tab(*)
Through  this shortcut ,you can open previously 10 closed tabs
Ctrl+shft+nàTo open a new tab in incognito mode
Incognito mode doesn’t store your history and all cookies and also doesn’t save authenticated passwords.
Ctrl+hàopens history
Ctrl+jà opens downloads list
Ctrl+oà which opens system files




Friday, 1 August 2014

Motion based

        MOTION  BASED GAMES
We know about motion based games in Android,Windows,iphone  like Asphalt series. Most of us are interested in these motion based games and me too crazy about it.These motion based games works with the help of sensors .
Motion-based-games
How it works?
Motion based games  mandatorily needs Accelerometer sensor  which are also known as G-sensors.Depending on games,types of sensers  are needed.Accelerometer  measures tiltation angle and linear acceleration.So that’s how this sensor got name as accelerometer sensor.It also makes mobile screen portrait to landscape i.e., however we rotate  smartphone ,the picture or photo doesn’t change it’s position.we  can also say that it follow gravity.Comparing to accelerometer sensor we have more sensors but all sensors are not used.Fundamental  sensors like Accelerometer,Gyroscope,Magnetic sensors and Pressure sensors.
Accelerometer-Sensor

Gyroscopes
Gyroscope sensors are also known as Gyros. Gyros measures angular rotation rate about one or more axis.It doesn’t depend on anything like accelerometer depends on gravity.
Gyroscope-Sensor

Magnetic Sensors
Magnetic compass sensor  tells about directions(NEWS).Magnetic sensors are useful whenever one navigates  to  new place. Magnetic sensors are also known as E-compasses.
Magnetic c-compass-Sensor
Pressure Sensors
Pressure sensors measures pressure in terms of altitude.This will be useful when user moves to different floors in same building.The apps which supports pressure sensor are known as location based applications(pressure).
Pressure-Sensor


Tuesday, 29 July 2014

How to avoid threats?

HOW  TO  OVERCOME THREATS ?
how -to -overcome -threats

Sometimes you may come across  threats over internet.Did you avoid it? Threat may be a software problem or hardware problem or hacking. Most of us irritated by getting threats in facebook.How to avoid them and how to be secure? To avoid them follow below simple steps which makes free from malware functions.
how- to-avoid-- threats


STEP BY STEP PROCEDURE:
1.    First of all ,make your browser clean with cache. To be done with this, press ctrl+shft+del which opens cache details. Put all marks from beginning of time and remove your history.
2.    Now change the password of your facebook or something else but it  should be strong.That’s it,your  fb account becomes normal.This throws you out of danger.


Sunday, 27 July 2014

How to save your eyes from PC?



 Ways to save your eyes from computer 

1.Keep your screen clean
keep-screen-clean

2.
Use proper lighting
use-proper-lighting


3.
Use fonts that are easy to read
Use-fonts-that-are-easy-to-read

4.
Blink regularly
Blink regularly

5.
Follow 20-20-20 rule( 20 seconds break ,20 minutes to  
    focus,20 feet away from computer

20-20-20-rule

6.
Annual eye test
Annual-eye-test

7.Using computer glasses
use-computer-glasses

8.
Green diet( vitamin A)
Green-diet

Friday, 25 July 2014

Secrets of Android

          ANDROID          
1.Most of the smartphones using ANDROID as OS like samsung,Motorola,Celkon,Micromax etc., 
2.Android inc  was originally founded in 2003 and got into hands of google in the year of 2005.
Android-logo



3.Android OS currently developing by google developers.  Currently  using android version  is KITKAT .
4.Android is an open source but most of the people don’t know this.
5.Google‘s android logo actually derived from Atari game .This game is also known as "Gauntlet: The Third Encounter”.

Android-logo-copied- from- ATARI-GAME

6. Android released commercially on date  September      23,2008.
7.Till date(July 25,2014) have 1,313,357 android apps.




Android versions named  as below...........
Android Versions:
1.Android (System)
2.Beta (version 1.0) (released on November 5th, 2007)
3.CupCake (version 1.5)
4.Donut (version 1.6)
5.Eclair (version 2.0)
6.Froyo aka Frozen Yoghurt (version 2.2.x)
7.Gingerbread (version 2.3.x)
8.Honeycomb (version 3.x)
9.Icecream Sandwich (version 4.x) (The latest stable version is 4.0.4 which was released at march 28th)
10.Jellybean
11.Kitkat
and upcoming version 'L'named as laddoo. May be it turns out as “LOLLIPOP”.

Wednesday, 23 July 2014

Everyday you are using technology wrong


  WE  NEED  PROPER  WAY  TO USE TECH 

     Everyday most of us  using technology in wrong,so how to do those things in proper way.
Watch this video to aware of these things.


Proper-way-to-use-tech



USING BROWSER AS NOTEPAD

    INTERESTING  INTERNET  TIPS

        Making browser as notepad
Browser-As-Notepad

Normally we use browser for surfing but we can also use it as notepad.
HOW IT CAN BE USED AS NOTEPAD?
To done with this,paste this below code in url box after removing current URL.Immediately the browser acts as notepad.
        data:text/html,%20<html%20contenteditable><Title>Notepad</Title>


Now you can write anything in this notepad.If you want to write the samething in nightmode ,paste this below code in URL box.
data:text/html;charset=utf-     8,%20<title>Notepad%20(Nightmode)</title>   <body%20contenteditable%20style="font-family:%20DejaVu;font-weight:bold;background:#1E1E1E;color:#FFFFFF;font-size:1rem;line-height:1.4;max-width:80rem;margin:0%20auto;padding:2rem;"%20spellcheck="false">
BROWSER-NOTEPAD-IN-NIGHTMODE



  Simple trick na, so try to do it before your    friends. 


Saturday, 19 July 2014

eBay HACKED ,128 MILLION USERS IMPACTED

     EBAY HACKED
ebay-hacked


eBay has confirmed that it is hacked by outside people of it’s organization. It experienced one of the biggest criminal cyber attacks ever and has requested its 128 million users to change passwords.
TIP: Changing passwords is a best practice and it will help enhance security for your account .It also  worth for all social networking websites too.
HOW IT WAS  HACKED?
The hackers found small number of employee log-in credentials and gained unauthorized  access to eBay’s corporate network . As far as they informed that eBay database contained encrypted passwords and other non-financial data compromised between late February and early march,however eBay discovered it only two weeks ago. The cracked data contains information about customer’s name,encrypted password ,email address,physical address,phone number and date of birth.
But other financial information and other confidential personal information about users were safe .
eBay has stated officially “there is no evidence of compromising resulting in unauthorized activity for eBay users,and no evidence  of any unauthorized access to financial or credit card information.
This eBay attack could be the largest online breach(crack) following previous year’s information,which had impacted about 110 million customers.


Friday, 18 July 2014

Technology behind touch screen working

HOW TOUCH SCREEN WORKS:
     
   Touch screen works on one of three principles:-
Touch-screen




 1. Resistive system 
 2. Capactive System
 3.Surface Acoustic Wave


RESISTIVE SYSTEM:
resistive-system

It consists of glass panel which is covered with conductive and resistive metallic layer. These two layers are held apart by spacers. Electrical current moves through these two layers.When touch the screen ,voltage difference appeared at that spot, immediately OS recognises coordinates of spot and does it's operation.

CAPACTIVE SYSTEM:
capactiive-system

It consists  a layer on galss panel which stores electrical charge. when we touch the screen,it transfers some of charge to user .Thereby capactive layer charge decreases,within short span OS recognises the cordinates where the charge is decreased and applies it operation overthere.


SURFACE ACOUSTIC WAVE( pen tip):
surface acoustic wave

This works with two transducers( one receiver and one transmitter). Electrical signal is sent from one to other transducer.
When user touch the screen ,passing electrical signal is disturbed.
Receiving transducer  recognises wave disturbance and tells to OS, then OS traces the spot and does it's operation overthere.
eg: Smartphones uses pen sticks.






Thursday, 17 July 2014

Reputed Organizations Founders

         Founders of reputed Organizations:



organisations





ORGANIZATIONS

FOUNDERS

                                                                          GOOGLE

-- >Larry Page & Sergey Brin


FACEBOOK

— >Mark Zuckerberg


 YAHOO

— >David Filo & Jerry Yang


TWITTER

— >Jack Dorsey & Dick Costolo


INTERNET

-->Tim Berners Lee


LINKDIN

-->Reid Hoffman, Allen Blue& Koonstantin Guericke


EMAIL 

—> Shiva Ayyadurai

GTALK

àRichard Wah kan


WHATSAPP

-àJan koum & Brian Acton


HOTMAIL

àSabeer Bhatia


ORKUT

àBuyukkokten


WIKIPEDIA

àJimmy Wales


. WIKIPEDIA

àjimmy Wales


YOU TUBE

àSteve Chen, Chad Hurley & JawedKarim

REDIFFMAIL

---> Ajit Balakrishnan


Nimbuzz

—>Martin Smink & Evert Jaap Lugt


. Myspace

—>Chris Dewolfe & Tom Anderson


Ibibo


—>Ashish Kashyap

OLX

—>Alec Oxenford & Fabrice Grinda



Skype

—>Niklas Zennstrom,JanusFriis & Reid Hoffman


Opera

—>Jon Stephenson von Tetzchner & Geir lvarsoy


Mozilla Firefox


—> Dave Hyatt & Blake Ross

. Blogger

—>Evan Willams

 

Copyright @ 2013 Geektech.