Sunday, November 2, 2008

access

access

'access' used for verity of method. In general, word 'access' stand for 'call up' or 'activate' for use. A computer might contain a lot of program or files contain data. But until you call it. The process of call any program or file with respective computer program called as 'access' the program or file.

abstract

abstract

In computing world 'abstract' used for summary of a output of a computing process.

absolute value

absolute value

'Absolute Value' is used for mentioning a number regardless of it's sign. A result of a calculation may be positive or negative can be called as 'absolute value'. Any negative value needs to be converted to a positive number for additional calculation. The value itself called as 'Absolute Value'.

abort

Abort

'Abort' used to 'terminate a process before it is complete.

In Different Microsoft Windows Operating System, special key 'Escape Key' used to terminate any process. 'Ctrl+C' also used to terminate (abort) a program or process.

abend

Abend - Abnormal Ending of a Process

Abend: Abnormal Ending of a Computer Process. The termination of processing may caused by a program or system fault.

Wednesday, October 29, 2008

NASA National Aeronautics and Space Administration

NASA: National Aeronautics and Space Administration

In 1958, NASA was created as a government agency to replace NACA. NASA's charter is to expand frontiers in air and space, to inspire and serve America, and to benefit the quality of life on Earth.

National Aeronautics and Space Administration, headquartered in Washington, DC with field centers across the country.

Friday, October 24, 2008

Genetics

Genetics

Genetics from Ancient genetikos, “genitive” and that fenesis, “origin”, a discipline of biology, is the science of heredity and variation in living organisms. The fact that living things inherit traits from their parents has been used since prehistoric times to improve crop plants and animals through selective breeding. However, the modern science of genetics, which seeks to understand the process of inheritance, only began with the work of Gregor Mendel in the midnineteenth century. Although he did not know the physical basis for heredity, Mendel observed that organisms inherit traits in a discrete manner—these basic units of inheritance are now called genes.DNA, the molecular basis for inheritance. Each strand of DNA is a chain of nucleotides, matching each other in the center to form what look like rungs on a twisted ladder.DNA, the molecular basis for inheritance. Each strand of DNA is a chain of nucleotides, matching each other in the center to form what look like rungs on a twisted ladder.enes correspond to regions within DNA, a molecule composed of a chain of four different types of nucleotides—the sequence of these nucleotides is the genetic information organisms inherit. DNA naturally occurs in a double stranded form, with nucleotides on each strand complementary to each other. Each strand can act as a template for creating a new partner strand—this is the physical method for making copies of genes that can be inherited.The sequence of nucleotides in a gene is translated by cells to produce a chain of amino acids, creating proteins—the order of amino acids in a protein corresponds to the order of nucleotides in the gene. This is known as the genetic code. The amino acids in a protein determine how it folds into a threedimensional shape this structure is, in turn, responsible for the proteins function. Proteins carry out almost all the functions needed for cells to live. A change to the DNA in a gene can change a proteins amino acids, changing its shape and function this can have a dramatic effect in the cell and on the organism as a whole.Although genetics plays a large role in the appearance and behavior of organisms, it is the combination of genetics with what an organism experiences that determines the ultimate outcome. For example, while genes play a role in determining a persons height, the nutrition and health that person experiences in childhood also have a large effect.

Thursday, September 25, 2008

P3P

P3P 

P3P is a machine readable privacy policies for a web site. It is a W3C standard on how to specify privacy policies for a web site. The standard has both a human readable part to it, as well as a machine readable part. The standard can be found here with errata and other information about it at P3P here.

Currently IE6 will be supporting a feature that reads the machine readable p3p policy of a web site. Depending on the settings in the options dialog, it may disable certain features of the browser, such as the capability of setting cookies, unless there is a p3p file in place, and the file matches the user's preferences. So unless you implement a p3p policy on your web site, some users may have a bad experience visiting your site.

Friday, March 28, 2008

DDoS

DDoS DDoS - (Distributed Denial-of-Service attack)is one kind of DoS which is: an attempt to make a computer resource unavailable to its intended users. Although the means to, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

Main Difference Between DoS and DDoS is, DoS Attack is only performed from a Single Source, where DDoS is Distributed Denial-of-Service Attack, where Target is Single, attack Come from A group of Source which can be in Distributed area even Different Distributed Country World Wide!

Read My Writeup on DoS or DDoS Here

DoS

DoS (Denial-of-Service attack) - DoS (Denial-of-Service attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

You Can Also See DDoS (Distributed Denial-of-Service attack

Read My Writeup on DoS or DDoS Here