PC Section

by sagar.

Saturday, April 25, 2015

Oracle :Difference between all_objects,user_objects,dba_objects

Hi Friends,
After a long time i got interest to write something and today's containt for Database.
Table sturcture which is not defined in DB-user but in schema. it's related to user also.

Difference b/w  all_object ,user_object, dba_objects

all_objects is show you all objects of current and those object which you have rights to access.
dba_objects show all object of all users.

user_objects show you the current user objects.
 

Saturday, April 28, 2012

Google's new Easter Eag: Zerg Rush

Zerg Rush is the Google's new productive pursuit, that let you to play on Google's search Engine. 


Just type"Zerg Rush" on the Google's home page www.google.com .Wait and watch the hungry red and orange Os will come on the screen and will eat words.
This is small play , and Google powers you to destroy Os  by  just clicking on them by mouse,but this  is meaning less .There are finite number of Os , so you have to click fast .


If Os eat all words displayed on the screen then game is over and all Os will get gather makes GG-Good Game.


I also found that if you are Loged-In on Google's account then you can share your score on Google+ after GG comes ,just click on Share button and make a fun. :)



Friday, April 27, 2012

Google Drive Released


If you haven't heard about Google Drive before then let me tell you that it is Google's latest cloud storage service which is similar to Dropbox and SkyDrive. Google is providing 5 GB of free storage space on Google Drive (which is more than 2 GB free space of Dropbox).




Also similar to Dropbox & SkyDrive you can also access your files on Google Drive from your multiple devices. Drive is accessible from any web browser at drive.google.com. Also they have already released dedicated clients for Windows, Mac and Android. An iOS app is to follow in the coming weeks and I've heard about Linux client also.

Now after reading this much if you are too eager to take testdrive of Drive then just go to drive.google.com and login with your existing Google account. They might ask you to wait few days (as they asked me ) since till date they haven't enabled Drive for all users.

To check more features of Drive click here.

Wednesday, August 4, 2010

HOW TO USE INDIAN CURRANCY SYMBOL IN PC

Download Version 2.0


  •  Indian currency symbol.



  • How to use ?
1. Download the above attached font Rupee.ttf or the new version Rupee_Foradian.ttf

2. Install the font. (It is easy. Just copy the font and paste it in "Fonts" folder in control panel)

3. Start using it. :)
  • How to type the Rupee symbol ?
We mapped the grave acent symbol - ` (the key just above "tab" button in your keyboard) with the new Rupee symbol. Just select "Rupee" font from the drop down list of your fonts in your application and press the key just above your tab button. It will display our new rupee symbol.   Try it.:)




















Monday, July 26, 2010

OSI model


The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.
Application
(Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Presentation
(Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Session
(Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
Transport
(Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network
(Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing,internetworking, error handling, congestion control and packet sequencing.
Data Link
(Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Physical
(Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.