Skip to main content

Posts

Blog Posts

  5G  Trending Mobiles 5G mobiles are the ones gadgets that can hook up with 5th era wireless networks (mmWave, sub-6GHz, and coffee-band frequencies), as defined by industry standards frame 3GPP. here is a list of 5G smartphones released across the world. you could use the kind device to set up the effects via recognition, state-of-the-art (recency of launch), high fee (from excessive to low rate), Low price (from low to high price), and through name (alphabetical). This list of 5G mobiles also can be similarly subtle, the usage of Filters together with logo, RAM, internal garage, outside storage, Battery potential, display size, primary Rear digicam megapixels, front digital camera megapixels, running machine, network kind, variety of SIM playing cards, SIM size, Processor velocity, range of Processor Cores, market reputation, and many more. List of Phones are as follows :- OnePlus Nord CE 2 Lite 5G Google Pixel 7 Samsung Galaxy S20 FE 5G Google Pixel 7 Pro Re...
Recent posts

Plastics Crises

Plastics Crises Hello Readers, Today I am starting with world most one of crises i.e. Plastics –A material which is very helpful in our daily life,it can be use anytime and anywhere .The use of plastic in our life is magnificent. I know that plastics make our life easy with usage from tiny pin to large Airplane. But you know that plastics become dangerous things for our mankind. It’s bad impact is on the rise. Some of the major compounds (vinyl chloride, dioxins, and plasticizers) are major factors of hormone-disruption, reproductive dysfunction, breast growth and testicular cancers. The harmful effects are also reflect in newborns via mothers during pregnancy. Recycling is one of the most sufficient and easiest ways. Smarter sorting, energy efficient ways, developing smarter plastics and research to develop certain fungi and bacteria are needed to resolve this issues. So, Recycling, Reduce and Reuse are 3R’s are three major aspects which control the plastics polluti...

World Largest Telescope -Fast

Five-hundred-meter Aperture Spherical radio Telescope (FAST) HISTORY On 26 December 2008, a foundation laying ceremony was held on the construction site. Construction started in March 2011,and the last panel was installed on the morning of 3 July 2016.The telescope was first proposed in 1994. The project was approved by the National Development and Reform Commission (NDRC) in July 2007.A 65-person village was relocated from the valley to make room for the telescope and an additional 9,110 people living within a 5 km radius of the telescope were relocated to create a radio-quiet area.About 500 families tried to sue the local government. Villagers accused the government of forced demolitions, unlawful detentions and not giving compensation.The Chinese government spent around $269 million in poverty relief funds and bank loans for the relocation of the local residents, while the construction of the telescope itself cost $180 million. Originally budgeted for CN¥700 millio...

Computer Facts !!!

Hy friends!!  We all know that computer play a very vital role in our life. Everyone use computer for doing works in great and attractive manners.  But computer have many interesting facts which can amaze u. So, read this article about our non living friend-computer:- Alan Turing is the father of Theoretical Computer Science. The first computer named as ENIAC having weight of 27 tons with area of 1800 square feet. "Typewriter" is longest word which we can write using letters only in one row by our computer keyboard. First computer mouse made by Doug Engelbart using wood. Every month, 5000 new computer virus generated. H.P., Microsoft and Apple have common interesting point that they were all started in a garage. U also noticed that , normally person blinks 20 times per minute but by using computer we blink only 7 times per minute. More than 80% of the emails sent daily are spams. IBM PC is design by group of 12 Engineers was commonl...

Drone

UAV Unmanned Aerial Vehicle(UAV)  or unmanned aircraft systems (UASes)  is an another name of Drone .A drone is a flying robot  Which may be remotely controlled or can fly autonomously through software-controlled flight plans in their  embedded systems working in conjunction with onboard sensors and GPS   . UAVs were most often associated with the military, where they were used initially for anti-aircraft target practice, intelligence gathering and then, more controversially, as weapons platforms. Drones are now also used in a wide range of civilian roles ranging from search and rescue, surveillance, traffic monitoring, weather monitoring and firefighting to  personal drones   and business   drone-based photography , as well as videography, agriculture and even delivery services. HISTORY The first generally used drone was a full-size retooling of the de Havilland DH82B "Queen Bee" biplane, which was fitted out with ...

Artificial Inteligence

Artificial Intelligence(A.I.) is science and engineering of making intelligent machines which thinks like human. JOHN McCARTHY known as father of A rtificial Intelligence . AI  GOALS It is used to create Expert System. To implement Human Intelligence in Machine.     History of AI Here is the history of AI during 20th century − Year Milestone / Innovation 1923 Karel Čapek play named “Rossum's Universal Robots” (RUR) opens in London, first use of the word "robot" in English. 1943 Foundations for neural networks laid. 1945 Isaac Asimov, a Columbia University alumni, coined the term  Robotics . 1950 Alan Turing introduced Turing Test for evaluation of intelligence and published  Computing Machinery and Intelligence.  Claude Shannon published  Detailed Analysis of Chess Playing  as a search. 1956 John McCarthy coined the term  Artificial Intelligence . Demonstration of the first running AI program at Carnegie Me...

Ethical Hacking

Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer. Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for the testing purpose. This sort of hacking is what we call  Ethical Hacking . A computer expert who does the act of hacking is called a "Hacker". Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems. Types of Hacking Website Hacking − Hacking a website means taking unauthorized control of a web server and its associated software such as databases and other interfaces. Network Hacking − Hacking a network means gathering information about...

Overclocking

Overclocking is the action of increasing a component’s clock rate, running it at a higher speed than it was designed to run.This usually applies to the CPU or GPU, but other components can also be overclocked. By Increasing a component’s clock rate causes it to perform more operations per second, but it also produces additional heat. Overclocking can help squeeze more performance out of your components, but they’ll often need additional cooling and care .However, you’re often not limited to that CPU speed. You can increase the CPU’s speed by setting a higher clock rate or multiplier in the computer’s BIOS, forcing it to perform more operations per second. It can speed up your CPU and therefore speed up your computer if your computer is limited by its CPU but the CPU will produce additional heat. It may become physically damaged if you don’t provide additional cooling, or it may be unstable and cause your computer to blue-screen or restart.          ...

Multi Touch Technology

Multi Touch Technology Hy Friends !!! Today we discuss other innovative technology, Multi-Touch technology allows users to interact with their devices in multiple ways, by expanding the number of interface options, rather than simply swipe and tap.Multi-Touch allows for zooming, scrolling, selecting, and more. It is designed to provide touch-screen interfaces with the same sort of flexibility and usability that a traditional mouse and keyboard provide.It works with Track Pads (or Touchpad’s) and touch-screen interfaces, like those found on laptops, smartphones, and tablets.  Multi-touch is technology that enables a surface to recognize the presence of more than one or more than two points of contact with the surface. The origins of multitouch began at CERN, MIT, University of Toronto, Carnegie Mellon University and Bell Labs. The term "multi-touch" was popularized in 2007 by Apple. Multi-Touch technology allows users to swipe, scroll, select, zoom in, zoo...