Skip to main content

Posts

Showing posts from September, 2020

Events and Handlers

Computer Programs are processed by the CPU to give results. A Computer Program that is being processed may be suspended. The suspension of the Computer Program is controlled by the Computer.  The suspension of processing activity related to a Computer Program is reasonable. Yes, the Computer was busy with processing activity. But something more important has to be attended. This activity that is more important may originate from Computer Software or Computer Hardware.  Let us talk in a more focused way. Yes, a Computer Program is being processed. The CPU of the Computer is busy with the said processing of the Computer Program. At the same time an attempt may be made to attract the attention of the CPU.  We say that an Event has occurred while processing of a Computer Program is going on. This Event tries to catch the attention of the CPU. An Event is an activity that has special importance. As told earlier the Event may come from a Hardware Unit, or a piece of Software. T...

The Presentation Control Layer

T he Presentation Control Layer is a part of the OSI Reference Model. It is the second Layer from the top.  This Layer provides services to the Application/User Layer that lies above.  The presentations to the Application/User Layer are controlled by the Presentation Control Layer. Exchange of information occurs between the Application/User Layer and the Presentation Control Layer. The Application/User Layer requires to be supported with  suitable Data. The Presentation Control Layer supports the Application/User Layer to perform interpretation of Data. The support required by the Application/User Layer to perform interpretation arises because of different forms of Data.  Yes, a piece of Data can be represented in various ways. The various forms of Data present a variety of Data before us. It is to mention that the Application/User Layer is presented with Computer Program and Data. The Presentation Control Layer is responsible for these presentations. Computer Progra...

Matrix of Numbers

  A matrix is an arrangement of numbers. The numbers are arranged in rows and columns.  An example of a matrix is as: _____________________________ _____________________________                        col1             col2     ______________________________ row1               4                     5 _______________________________ row2                7                     9 _______________________________ _______________________________ The first element ( 4 ) of the  matrix is the element of the first row and first column. Similarly the last element ( 9 ) of the matrix is the element of the last row and last column.  The number of r...

OSI Model: Application/User Layer

  _______________________ _______________________ Application/User Layer: The Application Layer helps us to use a Network facility. It takes care of Network Users. Network users require web pages, transfer of files, and relevant information from a database, etc.   Users can now easily access a Network. Network access is a step in the direction of serving the information seekers. Indeed it has become very easy to use a Network. Thanks to the Application/User Layer.  Network access becomes important because a Network provides vast information. Many Computers are connected to a Network. These Computers are huge sources of information. This information is stored in the memory unit of these Computers. The Application Layer needs some hints to access a Network. These hints are supplied  by the Network user. The support of Application/User Layer simplifies the tasks. A person who requires information using a Network is helped by the Application/User Layer. The Applicat...

OSI Reference Model

  OSI model is a seven layer reference model. Actually, OSI model can be likened to a small size structure that is a product of thoughtful imagination. This structure serves to guide us to interconnect  Computers.  We can say that the OSI model serves to interconnect Computer Systems that are yet open. The modelling work is in the form of seven layers. The activities mentioned in the layers help us to construct Networks. These Networks could be formed simply.  The action-oriented beautiful composition of each layer is valuable. This valuable composition of each layer forms the basis of Protocol(s) development for the layer under consideration. The OSI model is treated as a standard work. This excellent piece of work is a great gift to interconnect Computer systems. These Computer Systems lying open ( unconnected) can help more if interconnected. It can be said that OSI cannot be thought to be only a model structure for interconnection. It also serves the purpose of N...

Events Affect Programs

An Event occurs when a Software Program is running. A Hardware Unit may cause an Event. An Event may be triggered by a piece of Software.  Pressing action on the ENTER key of a connected keyboard is regarded as an Event. Keyboard generated Event originates from Computer Hardware ( Yes, the Keyboard is a part of Computer Hardware ). This Event is recognized by the Computer System.  Computer Hardware may be the source of an Event. It may be the case that an Event caused by Hardware is  handled by another piece of  Hardware. In this case the piece of  Hardware is the Event Handler.  These days specialized Hardware is very much used. Specialized Hardware may be directed to take action on an Event that occurred. Programming mistakes are called as Errors. It is a mistake by a Programmer to perform an operation that is not allowed. When Error(s) occur, they are systematically reported to a Programmer. Errors are properly handled. Error Management is a part of Soft...

Binomial Coefficient: A Viewpoint

  The formula to obtain Binomial Coefficient can be written as: n! / r! × ( n - r )! , which is equal to the number of combinations. Here, n  -> number of unique objects  r  ->  number of objects that are                           considered ( r <= n  ) ____________________ Suppose n = 4 Objects that are being considered: ( 1 ) A ( 2 ) B ( 3 ) C ( 4 ) D _____________________ Let us restrict ourselves to deal with only three objects at a time. We will attempt to form combinations taking only three objects at a time. So, here r = 3 _____________________ From the ongoing discussion, n = 4 and r = 3 So, No. of combinations =                 4! / ( 3! × ( 4 - 3 )! ) = 4 Let us observe the four combinations that are formed: ________________________...