CE-Encyclopedia


Hello CEans!

Lets have our own encyclopedia of engineering terms.
Pick a random engineering term,define it,explain it and submit it here.

As good the explaination,better the information.


Note😛lease provide true information about the term.

Replies

  • Ankita Katdare
    Ankita Katdare
    @WIN: That's a nice initiative. I think we should focus on explaining the terms in simple words. Instead of copying the term's explanation from Wikipedia or 'n' number of websites, we should try to write in our own words in a way such that we are explaining that terminology or concept to our friends. That way we get to read original ideas and different ways of explanation.

    Wow! This will be really useful 😀
    Looking forward to this.
  • Whats In Name
    Whats In Name
    AbraKadabra
    @WIN: That's a nice initiative. I think we should focus on explaining the terms in simple words. Instead of copying the term's explanation from Wikipedia or 'n' number of websites, we should try to write in our own words in a way such that we are explaining that terminology or concept to our friends. That way we get to read original ideas and different ways of explanation.

    Wow! This will be really useful 😀
    Looking forward to this.
    Explaining terminology in our own words will be really helpful.I completely agree with you.😀

    So here we go..
  • Whats In Name
    Whats In Name
    IP Address:

    It is used to identify a node(Computer connected to internet) on an IP(Internet Protocol) network.Each node is assigned a unique IP address which is a 32-bit address made up of network ID and unique host ID.
  • Manish Goyal
    Manish Goyal
    CE is itself a encyclopedia ,it has lot of information, but in unorganized form.
    If anyone can create a reorganize it then it will be damn useful to others

    Please don't discuss this here now

    carry on with your work ,it is nice initiative
  • Whats In Name
    Whats In Name
    Boot:

    The process of starting or resetting a computer.When doing cold boot(First turned on) or warm boot(reset),the computer runs the software that loads and starts the computer's operating system.
  • Whats In Name
    Whats In Name
    Buffer:

    A space reserved in RAM,for data that is held temporarily while waiting,to be moved between two locations.

    Eg: Data moved from keyboard to any particular application is first stored in buffer.
  • Whats In Name
    Whats In Name
    Print Spooler:

    It is a software which receives the document sent to the printer,stores it in memory until printer is ready.
    It manages all the print jobs.It allows user to delete,pause,restart print jobs which are currently in the queue.
  • Whats In Name
    Whats In Name
    CoDec:

    Codec is a software which is use to compress or decompress a digital media file(Video or Audio).CoDec stands for Compressor/Decompressor or sometimes Coder/Decoder.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    Modem
    A modem (modulator-demodulator) is a device that converts the analog signal to digital, understood by computers and back to analog, which can be transferred via phone line, and connect to another server, which does the same operation. It is mostly used for internet purposes.

    Wikipedia: A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from light emitting diodes to radio.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    Blog

    A Blog is a combination of two words, namely Web Log. It is also a kind of website, which primarily used to have articles or posts, posted by the author or the public, with a small comments section in the end. It is mainly used for posting their views on some subject or sharing something to others.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    Forum

    An Internet Forum is a type of website (Eg. CE Forums), where many users will be able to start a topic and discuss on it. The topics will be grouped into categories and sections, so that the posts relating to that section can be viewed by the users in an easy way.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    Netiquette

    It is formed by clubbing two words, network etiquette, which is "Internet etiquette". It is a set of ways to behave yourself in the internet and social groups. Some good ones are, posting content in the right place and posting good and ethical content. Some wrong ones include spamming, flaming, and pointing out someone, getting inside his privacy in public.
  • Whats In Name
    Whats In Name
    Bitmap:

    A bitmap is a simplistic representation of an image on a computer, simply indicating whether or not pixels are on or off, and sometimes indicating their color. Often fonts are represented as bitmaps. The term "pixmap" is sometimes used similarly; typically when a distinction is made, pixmap refers to color images and bitmap refers to monochrome images.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    Raster and Vector Graphics

    Raster is more of a photograph, with gradients, soft meshes, textures, etc. Not just spot color sharp lines. You could not cut out a raster image. Raster can be 1,2,3, or 4 colors which makes the entire spectrum (CMYK, RGB, HSL, etc.).

    Vector graphics is the creation of digital images through a sequence of commands or mathematical statements that place lines and shapes in a given two-dimensional or three-dimensional space.

    Vector graphics don't have any quality factor. i.e., at any size, the quality remains as such. No change in quality. This is the reason, vector graphics are used extensively in printing purposes.


    Example of Raster and Vector Images (From Wikipedia)
    [​IMG]​
  • Whats In Name
    Whats In Name
    AIX:

    AIX is an operating system developed by IBM and is in fact is Unix-based. It is typically used for enterprise servers.AIX allows the system administrator to divide memory, CPU, and disk access between various jobs. The system supports IBM's 64-bit POWER processor and is backwards-compatible with 32-bit applications.

    Simply:

    AIX is not your typical consumer operating system. It is mainly used for servers in large businesses where IT geeks get to work with it.
  • Whats In Name
    Whats In Name
    Baseband:

    Baseband refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different frequency range. For example, an audio signal may have a baseband range from 20 to 20,000 Hz. When it is transmitted on a radio frequency (RF), it is modulated to a much higher frequency range.
  • Whats In Name
    Whats In Name
    Heard of FIFO and LIFO,Whats GIGO:

    GIGO:

    Stands for "Garbage In, Garbage Out." It means that if invalid data is entered in a computer program, the resulting output will also be invalid.Because we computer users aren't always smart enough to enter valid data, programmers have to take extensive measures to prevent GIGO errors.
  • Saijayadeep
    Saijayadeep
    ya really this section helps us to gain knowledge and terms explained here is straight and crystal clear......niceeeeee
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    The Open Systems Interconnection model

    The Open Systems Interconnection model (OSI model) is a way of sub-dividing a communications system into smaller parts called layers.

    Layers
    Layer 7: Application Layer
    Layer 6: Presentation Layer
    Layer 5: Session Layer
    Layer 4: Transport Layer
    Layer 3: Network Layer
    Layer 2: Data Link Layer
    Layer 1: Physical Layer
  • Anoop Mathew
    Anoop Mathew
    RSS FEEDS:

    RSS
    (originally RDF Site Summary, often dubbed Really Simple Syndication) is a family of Web Feed formats used to publish frequently updated works—such as Blog entries, news headlines, audio, and video—in a standardized format. An RSS document (which is called a "feed", "web feed"or "channel") includes full or summarized text, plus Metadata such as publishing dates and authorship.
    Web feeds benefit publishers by letting them Web Syndication content automatically. They benefit readers who want to subscribe to timely updates from favored websites or to aggregate feeds from many sites into one place. RSS feeds can be read using Software called an "Rss Reader", "feed reader", or "News Aggregator", which can be Web Application, Application Software, or mobile-device-based. A standardized Xml file format allows the information to be published once and viewed by many different programs. The user subscribes to a feed by entering into the reader the feed's Uniform Resource Identifier or by clicking a Feed Icon in a web browser that initiates the subscription process. The RSS reader checks the user's subscribed feeds regularly for new work, downloads any updates that it finds, and provides a User interface - Wikipedia to monitor and read the feeds. RSS allows users to avoid manually inspecting all of the websites they are interested in, and instead subscribe to websites such that all new content is pushed onto their browsers when it becomes available.
    RSS formats are specified using XML, a generic specification for the creation of data formats.

    Rss Feed
  • Anoop Mathew
    Anoop Mathew
    Wi-Fi (Wireless Fidelity) Wikipedia:ipa For English KeyWikipedia:ipa For English KeyWikipedia:ipa For English KeyWikipedia:ipa For English KeyWikipedia:ipa For English Keyis a wireless standard for connecting electronic devices. A Wi-Fi enabled device such as a personal computer, video game console, smartphone, and digital audio player can connect to the Internet when within range of a Wireless Network connected to the Internet. A single Wireless Access Point (or Hotspot %28Wi Fi%29) has a range of about 20 meters (65 feet) indoors. Wi-Fi has a greater range outdoors and multiple overlapping access points can cover large areas.

    Wi Fi
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    Wireless Application Protocol - WAP

    The Wireless Application Protocol (WAP) is an open, global specification that empowers mobile users with wireless devices to easily access and interact with information and services instantly.

    Purpose: To enable easy fast delivery of relevant information and services to mobile users.

    Target Devices: Handheld digital wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators -- from low-end to high-end.

    Networks: WAP is designed to work with most wireless networks such as CDPD, CDMA, GSM, PDC, PHS, TDMA, FLEX, ReFLEX, iDEN, TETRA, DECT, DataTAC, Mobitex and GRPS.

    Operating System: WAP is a communications protocol and application environment. It can be built on any operating system including PalmOS, EPOC, Windows CE, FLEXOS, OS/9, JavaOS etc. It provides service interoperability even between different device families.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    WPA (Wi-Fi Protected Access)
    WPA (Wi-Fi Protected Access) is an interim standard by the WiFi Alliance to comply with the security protocol designed for wireless security. WPA will most likely be rolled into an eventual IEEE 802.11i standard. This protocol was an outcome of numerous severe flaws researchers had discovered in the preceding wireless security system called Wired Equivalent Privacy (WEP).

    History
    Wi-Fi Alliance launched in October 2003 the next generation in WLAN security - Wi-Fi Protected Access – WPA. 802.11 equipment do not require a hardware upgrade to support Wi-Fi Protected Access. You only need to upgrade software and firmware, and it makes only minimal degradation in a network performance.
    WPA was designed as WEP replacement and answer to all WEP weaknesses. It uses Temporal Key Integrity Protocol (TKIP) with Message Integrity Check (MIC). It also has mutual pre-shared key (PSK) authentication scheme using 802.11X/EAP.
    WI-Fi Alliance launched WPA2 in September 2004. It is certified interoperable version of the WPA. WPA2 beside PSK 802.1X/EAP authentication, use an advanced encryption mechanism. This new mechanism is Counter-Mode/CBC-MAC Protocol (CCMP) called Advanced Encryption Standard (AEP).

    Types
    WPA and WPA2 have two certification modes:
    - Enterprise
    - Personal
  • Whats In Name
    Whats In Name
    BlackList:
    A blacklist is list of items, such as usernames or IP addresses, that are denied access to a certain system or protocol. When a blacklist is used for access control, all entities are allowed access, except those listed in the blacklist. The opposite of a blacklist is a whitelist, which denies access to all items, except those included in the list.
    Web servers often include a blacklist that denies access from specific IP addresses or ranges of IPs, for security purposes.
  • Whats In Name
    Whats In Name
    BOOT Sector:


    The boot sector is a dedicated section of a hard disk or other storage device that contains data used to boot a computer system. It includes the master boot record (MBR), which is accessed during the boot sequence.

    The boot sector is typically located at the very beginning of a disk, before the first partition. It includes the partition map, which identifies all the partitions on the disk. It also defines which partition contains the startup data (such as the operating system). This lets the computer know which partition to access when starting up. Therefore, if a disk's boot sector becomes corrupted or contains invalid data, the computer may not be able to start up from the disk. If this happens, you should run a disk utility or antivirus program to try and fix the problem.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    CMOS

    Short for complementary metal oxide semiconductor. Pronounced see-moss, CMOS is a widely used type of semiconductor. CMOS semiconductors use both NMOS (negative polarity) and PMOS (positive polarity) circuits. Since only one of the circuit types is on at any given time, CMOS chips require less power than chips using just one type of transistor. This makes them particularly attractive for use in battery-powered devices, such as portable computers. Personal computers also contain a small amount of battery-powered CMOS memory to hold the date, time, and system setup parameters.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    LCD

    Short for liquid crystal display, a type of display used in digital watches and many portable computers. LCD displays utilize two sheets of polarizing material with a liquid crystal solution between them. An electric current passed through the liquid causes the crystals to align so that light cannot pass through them. Each crystal, therefore, is like a shutter, either allowing light to pass through or blocking the light.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    TFT

    Short for thin film transistor, a type of LCD flat-panel display screen, in which each pixel is controlled by from one to four transistors. The TFT technology provides the best resolution of all the flat-panel techniques, but it is also the most expensive. TFT screens are sometimes called active-matrix LCDs.
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    BIOS

    Acronym for basic input/output system, the built-in software that determines what a computer can do without accessing programs from a disk. On PCs, the BIOS contains all the code required to control the keyboard, display screen, disk drives, serial communications, and a number of miscellaneous functions.
    The BIOS is typically placed in a ROM chip that comes with the computer (it is often called a ROM BIOS). This ensures that the BIOS will always be available and will not be damaged by disk failures. It also makes it possible for a computer to boot itself. Because RAM is faster than ROM, though, many computer manufacturers design systems so that the BIOS is copied from ROM to RAM each time the computer is booted. This is known as shadowing.
    Many modern PCs have a flash BIOS, which means that the BIOS has been recorded on a flash memory chip, which can be updated if necessary.
    The PC BIOS is fairly standardized, so all PCs are similar at this level (although there are different BIOS versions). Additional DOS functions are usually added through software modules. This means you can upgrade to a newer version of DOS without changing the BIOS.
    PC BIOSes that can handle Plug-and-Play (PnP) devices are known as PnP BIOSes, or PnP-aware BIOSes. These BIOSes are always implemented with flash memory rather than ROM.
  • Jeffrey Arulraj
    Jeffrey Arulraj
    Wow on earth did this thread die out Lots of Info here to cherish Thanks for starting this #-Link-Snipped-# Hope new members tag in here and enrich this list
  • zaveri
    zaveri
    Principal stress

    The stress that acts purely along any one of the principal axes, (x, y or z).
  • Whats In Name
    Whats In Name
    Android Beam:

    It is a feature that enables android based devices to share content with other NFC-capable devices by simply touching the devices together and pressing a button on the device sending the content. It can be use to transfer photos, web pages and links, contact details, videos and more between devices.

    In order to engage Beam(transfer), you need a phone with near field communication (NFC)capabilities.

    What is NFC?

    As wiki says,
    Near field communication (NFC) is a set of standards for Smartphone and similar devices to establish Radio communication with each other by touching them together or bringing them into close proximity, usually no more than a few centimeters.
    --
    NFC is an upgrade of the existing RFID standard that combines the interface of a smartcard and a reader into a single device. It allows users to share content between digital devices.

    The significant advantage of NFC over Bluetooth is the shorter set-up time. Instead of performing manual configurations to identify Bluetooth devices, the connection between two NFC devices is established at once (under a 1/10 second).

    Due to its shorter range, NFC provides a higher degree of security than Bluetooth and makes NFC suitable for crowded areas where correlating a signal with its transmitting physical device (and by extension, its user) might otherwise prove impossible.

    NFC can also work when one of the devices is not powered by a battery (e.g. on a phone that may be turned off, a contactless smart credit card, etc.).


    Source:Internet
  • Abhishek Rawal
    Abhishek Rawal
    We CEans,back then once debated over NFC in "Weekend Technical Discussion" in lil depth.

    check this out : #-Link-Snipped-#
  • Whats In Name
    Whats In Name
    I didn't knew that we are having scheduled technical discussions on CE,I would love to become the part of next one😀
  • Jeffrey Arulraj
    Jeffrey Arulraj
    Whats In Name
    I didn't knew that we are having scheduled technical discussions on CE,I would love to become the part of next one😀
    Well the problem is due to several reasons we could not continue it
  • Whats In Name
    Whats In Name
    Conqueror
    Well the problem is due to several reasons we could not continue it
    Lets start the discussions again,plan a new one.
  • Abhishek Rawal
    Abhishek Rawal
    Whats In Name
    Lets start the discussions again,plan a new one.
    Hey WIN,I'm all ready.
    Check this post : #-Link-Snipped-#

    It was strictly EC field discussions but then we tried to cover other Engineering branches too,sadly didn't got much response from other branch CEans.So,sadly we gotta stop it.

    If you've any suggestion then please post in the given link so we can resurrect the event 😀

You are reading an archived discussion.

Related Posts

dear friends, what is meant by virtual memory can anybody explain me.
1.A person went to meet the politician on thursday.The politician was busy and told the person to come four days after the before day of the day after tomorrow..When did...
Urdhvaa, the national level technical extravaganza organized by MCET is an ode to stupendous growth made by science and technology over the years. With six departments encompassing myriad fields of...
What is the basic concept bahind the artificial naural network?
My final year BE project is silencer design and optimization Ofcourse passive control. Reactive type silencer (non dissipative). One which uses tubular elements n creates impedance mismatch. Now the point...