Advert

MP3

Last edited by . Total of no comments in the discussion.

MP3 (MPEG-1 Audio Layer 3) is a digital audio encoding format that uses a lossy compression algorithm. Although the algorithm used is lossy in nature, the sound quality of the MP3 file is very good. An average listener cannot tell the difference between the MP3 file and the original uncompressed audio file. The lossy compression algorithm is very effective as it can be used to produce files that are 1/10th the size of the original uncompressed file. The MP3 file size depends on the type of compression. A mid-range bit Read More

Share on:

Convert Kilometers to Miles

Last edited by . Total of no comments in the discussion.

Convert Kilometers to Miles – Automatically To convert Kilometers to Miles, enter the number of Kilometers you wish to convert into the Kilometers box below. Kilometers: Kilometers (km) Results: Inches (in) 0 Feet (ft) 0 Yards (yd) 0 Rods (rd) 0 Miles (mi) 0 Micrometers (µm) 0 Millimeters (mm) 0 Centimeters (cm) 0 Meters (m) 0 Convert Kilometers to Miles – Manually This chart allows you to convert Kilometers to Miles manually. For example, using the chart below you can see that 8 kilometers is equal to 4.971 miles. Kilometers Read More

Share on:

Who Discovered Quantum and Particle Physics?

Last edited by . Total of no comments in the discussion.

During the nineteenth century the main theory in physics was still Newtonian Mechanics. With the advances in electricity, magnetism and the studies about light, it was clear that the theory had its limitations. The limitations appeared in the limits of the too small (atomic size) or the too fast (light speed). The study of the small limit took a long path and it has several contributors. It started in the beginning of the 1900s and laid the foundation of the modern quantum and particle physics. Max Plank and Albert Einstein Read More

Share on:

PocketDISH

Last edited by . Total of no comments in the discussion.

The PocketDISH is a great way to store your favorite TV shows, videos, photos, music, in fact almost any digital media, onto a portable device that can fit in any small bag or pocket. The PocketDISH is created to work with the Dish Network Satellite TV service; however, if you are not a subscriber to this service, you can still find plenty of great uses for this tech gadget. In essence, the PocketDISH is a portable media center. The PocketDISH has the ability to download from a Dish network, TV Read More

Share on:

How Do Password Hacking Programs Work?

Last edited by . Total of 32 comments in the discussion.

Password hacking programs work by using a number of approaches to either decrypt or guess a working password. Three of the most common approaches that password hacking programs use are: Known Ciphertext Attacks Dictionary Attacks Brute Force Attacks The specific algorithm that the password hacking program implements depends on the password system’s design. Each password hacking program is usually designed to defeat one specific type of password protection. Cisco router passwords, Zip passwords, and Microsoft Word passwords are some examples. Known Ciphertext Attacks A known ciphertext attack uses cryptanalysis to Read More

Share on:

Fixed Satellite Service

Last edited by . Total of no comments in the discussion.

Fixed Satellite Service (FSS) is a type of mobile telephone service that allows users in a specific area to make and receive cell phone calls. FSS systems or cell phone towers are placed in strategic, fixed locations and provide service to thousands of individual users simultaneously. Generally, FSS systems provide reception for several square miles around them, which borders another FSS system’s reception area. This allows users to communicate with multiple FSS systems as they travel without losing reception.   How Fixed Satellite Service Works FSS systems are essentially large Read More

Share on:

CLEC (Competitive Local Exchange Carrier)

Last edited by . Total of no comments in the discussion.

A CLEC, or Competitive Local Exchange Carrier, is a type of telecommunications provider that was formed after the breakup of AT&T. CLECs are usually smaller telecommunications providers that compete with ILECs, or Incumbent Local Exchange Carriers, which were already in place before AT&T’s separation. While CLECs generally provide the same services as ILECS for less, they usually lease their lines from existing ILECs in the area. How A CLEC Works While a CLEC generally leases its lines from an ILEC in the area, it may also rent them out to Read More

Share on:

IMSI (International Mobile Subscriber Identity)

Last edited by . Total of 1 comment in the discussion.

An IMSI (International Mobile Subscriber Identity) is a unique code used to identify an individual user on a GSM or UMTS network.  The IMSI is a 64-bit number which is usually represented as 15  decimal digits. An IMSI consists of three components: Mobile Country Code (MCC) (3 digits) Mobile Network Code (MNC) (2-3 digits) Mobile Subscriber Identity Number (MSIN) The Mobile Country Codes and Mobile Network Codes are listed at MCCList. In GSM networks, the IMSI is stored in the Subscriber Identity Module (SIM).  In CDMA networks, it is stored Read More

Share on:

USB Hub

Last edited by . Total of no comments in the discussion.

A USB hub is a piece of hardware that allows for a single USB port to be expanded into several. This allows more ports to be used for different connected devices. For example, on a computer there might be four USB slots, but within the actual computer, there might only be a single upstream port. This means that the four downstream ports are connected to one port that leads within the computer. The USB hub allows for the four separate ports to connect together while keeping their autonomy and run Read More

Share on:

Bucket/Radix Sort

Last edited by . Total of no comments in the discussion.

Most people use the bucket sort method when sorting a list of names in alphabetical order. The procedure is: First, the names are grouped according to the first letter, thus the names are arranged in 26 classes, one for each letter of the alphabet. The first class consists of those names that begin with letter A, the second class consists of those names that begin with letter B, and so on. Next, the names are grouped according to the second letter. After this step, the list of names will be Read More

Share on: