<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Alice williams on Medium]]></title>
        <description><![CDATA[Stories by Alice williams on Medium]]></description>
        <link>https://medium.com/@aw-alicewilliam?source=rss-8c227b45b950------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*CJBirteWGRk7tJC1.jpeg</url>
            <title>Stories by Alice williams on Medium</title>
            <link>https://medium.com/@aw-alicewilliam?source=rss-8c227b45b950------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 17 May 2026 17:26:04 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@aw-alicewilliam/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[What is Cybercrime? Effects, Examples and Prevention]]></title>
            <link>https://aw-alicewilliam.medium.com/what-is-cybercrime-effects-examples-and-prevention-5e8b05f2554e?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/5e8b05f2554e</guid>
            <category><![CDATA[cyber-crime-law]]></category>
            <category><![CDATA[cyber]]></category>
            <category><![CDATA[computercrime]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Sat, 22 May 2021 19:42:49 GMT</pubDate>
            <atom:updated>2021-05-22T19:42:49.959Z</atom:updated>
            <content:encoded><![CDATA[<p><strong>What’s Computer Crime?</strong></p><p>Computer crime is an act that clarifies a large group of crimes, which can be called hi-tech offense, e-crime, cybercrime, or even digital crime. It is done by means of a computer user that has great understanding of hacking. Sometimes, hackers may corrupt the pc or data files which may be quite harmful for you.</p><p>By way of instance, there are unique communities such as network administrators, personal security, law enforcement, or prosecutors, however the investigation of computer crime doesn’t require these communities. But, physical or conventional boundaries don’t confine <a href="http://javatpoint.com/what-is-computer-crime">computer crime</a> since it is by its very nature.</p><p>The very first definitional classes for computer crime are introduced by Donn Parke, who’s usually cited as the writer. A higher-level definition to the computer misuse has been clarified by him, computer crime could be any occasion involving an projected action where a unauthorize individual or offender would like to obtain associated with computers, however a victim endured or might have suffered a loss.</p><p><strong>The computer for a target:</strong> Computers are the target of an illegal activity, so the attacker needs to chief aim to deny the owners or authorized users of their machine to their computer or data. A good illustration of this group (pc for a target) is a Denial-of-Service assault or even a virus. A virus is known to ruin your system’s information or maybe a computer program, which can be a computer application.</p><p><strong>The computer as a tool of the offense</strong>: inside this class, a computer is utilized to accomplish complicated financial schemes to defraud or utilize to acquire some information or information, which information is further used for any prohibited activity. For instance, a computer program may be used by a hacker to steal private information, which may be used for the criminal purpose.</p><p><strong>The pc as incidental to some crime</strong>: The pc could be incidental to some offense which means it could only facilitate the offense but might not the primary tool of it.</p><p><strong>Crimes connected with the incidence of computers</strong>: This class comprises of those activities like software piracy, intellectual property theft, and other offenses against the pc industry.</p><p><strong>Cases of computer crimes</strong></p><p>Today, there are various Sorts of computer crime accessible, which are mentioned below:</p><p><strong>Cracking</strong>: Another illustration of computer crime is breaking, where the cracker decodes or breaks the codes which are intended to safeguard information. A cracker is a person who uses a script or application to decode breakdown or codes security systems for prohibited activities.</p><p>The script or program, which can be used to violate the security, is called crack.</p><p><strong>Copyright breach</strong>: If anybody steals another individual’s copyrighted data, it is also a kind of computer crime.</p><p><strong>Cyber offenses</strong>: inside this class, the strikes come, such as blackmailing, hacking, threats towards a individual or business to get unauthorized access to do illegal activities.</p><p><strong>Cybersquatting</strong>: Cybersquatting is a phrase, which can be known as domain and typo squatting that’s utilized to prepare a domain name of some other individual or company and hold it for resale in a top cost.</p><p><strong>Cyberbully or Cyberstalking</strong>: Cyberstalking is a sort of assault where anyone harasses or pops other individuals online by posting inappropriate or undesirable things concerning them.</p><p><strong>Establishing Malware</strong>: Malware is malicious software that’s installed on your pc without the consent as it utilizes fraudulent and dishonest tactics. It was made to view browsing habits, delete software, or perhaps open a person’s computer to assault.</p><p>For instance, occasionally you wrongly run software in your computer whenever you are visiting a website and find an unrequested download. These orders can’t be served as ordinary requests. The personal information might be in the shape of somebody’s name, address, background, password, along with other identifying info.</p><p>Someone who performs these sorts of activities is referred to as a spy or espionage agent. Espionage agents may operate in company or separate operations to discover agencies or other confidential information.</p><p><strong>Fraud</strong>: Fraud is the usage of computers, services, or apparatus to manipulating info or defraud people or associations; for instance, to participate in credit card fraud or to transfer cash to an account, altering banking documents.</p><p><strong>Cases of illegal computer activities comprise</strong>: social technologies, DDoSviruses, and phishing attacks are utilized to obtain unauthorized access to a different fund.</p><p><strong>Harvesting</strong>: A harvester is a software, also referred to as an internet harvester, that’s intended to assemble account or account-related data of other people, also it is likewise utilized to parse large quantities of information. For example, large numbers of web pages might be processed by means of a web harvester to extract names, telephone numbers, email addresses, account titles in the website.</p><p><strong>Human trafficking</strong>: It is among those severe offenses, which can be a act of participating in purchasing or selling different humans. Essentially, it graves a breach of human rights. There are hundreds and hundreds of men, women, and kids who become a casualty of traffickers. Around all states in the world become a casualty of attackers. Within this class, attackers attempt to acquire information illegally about somebody else.</p><p>In cases like this, if anybody steals technical or technical information that’s created by other organizations or persons, it comes under intellectual property theft, and this can be referred to as a crime. For this, they create webpages developed to collect personal information such as a credit card, online bank, password, or other personal info. They do this with the support of sending mails.</p><p><strong>Salami slicing</strong>: Ordinarily, it could be described as depositing small sums of money from every trade that assembles to a large amount of illegally obtained money.</p><p><strong>Scam</strong>: A scam is a phrase that’s used to deceive people into thinking something, which isn’t really correct. As an instance, individuals start a fraud strategy or business through which they get money from an unsuspecting individual. Online scams have grown because the entire world is more connected to this community. Also, it depends upon you to maintain careful yourself by these sorts of online scams</p><p><strong>Slander</strong>: A slander is a process of posting libel against a different business or individual. Now, the majority of the software might have installed on a single computer to use since it is purchased as a single-user license. Should you share this software with anybody or copy it on several pc apparatus without buying a number of permits, it is prohibited and comes beneath software piracy.</p><p><strong>Spamming</strong>: Spam is an email dispersed process that’s utilized to market a particular item or a scam to acquire other people’s money by sending unsolicited email to tens of thousands and sometimes millions of individuals without their consent. It describes spam e-mail online that’s also called UCE (unsolicited commercial email ), mass email marketing, and bulk email. <strong>Spoofing</strong>: Normally, the expression spoof refers to disturbance or hacking that means to fool a method by imitating another individual, pc, hardware apparatus. You do this bypassing security steps. IP spoofing is one of those well-known movie’s.</p><p><strong>Typosquatting</strong>: Cybersquatting is a phrase used to refer to a domain that’s a misspelling of some other domain name. Typically, it is also called domain and typo squatting that signifies a company or person knowingly purchases a domain name and retains it resale in a top cost.</p><p><strong>Unauthorized access</strong>: whenever someone attempts to get a platform, server, application, and service by utilizing a illegal method or somebody else’s account info. Fundamentally, unauthorized access means obtaining a system where you don’t have any permission to get.</p><p><strong>Wiretapping</strong>: Wiretapping is your surreptitious electronic monitoring device that’s used to link a device to your telephone line to follow conversations. Protect Yourself from Computer Keyboards As a result of pc or cybercrime, losing account info, personal computer, or other private information can be quite harmful; since this information may be used by an unauthorized individual for any prohibited activity.</p><p>Notably, there are more opportunities to become victims of those crimes when you are relay increasingly more on those networks to run business. But, there are distinct ways which may help you to protect you from those offenses.</p><p>The online usage of computers is quite much involved with fraud or even computer offenses. You ought to be careful in the right time of sharing with your important personal information on the net. This advice can be regarding your social security numbers, account identification, password, and credit card number, etc..</p><p>Additionally, utilize a challenging password to take basic guidelines for keeping your information confidential and modify the password often which will be made hacking hard. A fantastic anti-virus program also will help prevent these offenses; therefore, you need to install anti-virus in your system and update it regularly. What’s more, there are various websites which could get viruses, spyware, or malware; hence, be careful once you are downloading software from such websites.</p><p><strong>There are some important Important points that can help you safeguard against offenses</strong>:</p><p>Additionally, the perennial password isn’t beneficial; therefore, don’t keep the very same passwords on various sites. And you always need to work to password with the blend of 10 -14 letters which have symbols, special characters, and amounts, so create a intricate password. A intricate password can’t be hacked like”123456&quot; or” another easy password.”</p><p><strong>Keep your software upgraded</strong>: Particularly, it is most important with your online security software; because crawlers always work to access a system using flaws or known exploits.</p><p>For this reason, you need to keep your software current, which helps to spot these exploits and defects, which resulted in a decline in the odds of being a victim of cybercrime. That means they could understand your history exactly what you are doing on the world wide web, like viewing a movie, such as they’re able to see your account information, password, or other private sensitive data you are logging onto the gadget.</p><p>To safeguard yourself from crime, don’t input your confidential information whilst utilizing Wi-Fi, and whenever you are on person Wi-Fi, then use apps that require a password to get.</p><p><strong>Handle your social networking settings</strong>: make certain your personal and private information is secured.</p><p>As you largely share your photos or other information on social networking sites openly, which may be hacked by societal engineering cybercriminals. Thus, it will be better that you less share your private details on social networking.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5e8b05f2554e" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Difference between Data Warehouse and Data Mining]]></title>
            <link>https://aw-alicewilliam.medium.com/difference-between-data-warehouse-and-data-mining-59d13be6846e?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/59d13be6846e</guid>
            <category><![CDATA[data-mining-techniques]]></category>
            <category><![CDATA[data-mining]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Fri, 21 May 2021 18:49:01 GMT</pubDate>
            <atom:updated>2021-05-21T18:49:01.557Z</atom:updated>
            <content:encoded><![CDATA[<p><strong>What is Data Warehouse?</strong></p><p>Data Warehousing is a method that is fundamentally used to gather and oversee data from different various sources to give the business a significant business knowledge. A data warehouse is explicitly intended with the end goal of help the executives choice. All in all, a data warehouse comprises of the accompanying sorts of data.</p><ol><li>Subject arranged data</li><li>Incorporated data</li><li>Time variation data</li><li>Non-unpredictable data</li></ol><p>In straightforward terms, data warehouse is characterized as quick PC framework which has a tremendous data stockpiling limit. The accompanying graph will be valuable for understanding this term and how it capacities.</p><p>There are three principle kinds of Data Warehouses which are recorded beneath:</p><p>Endeavor Data Warehouse (EDW): Enterprise Data Warehouse is a unified warehouse. It is utilized for getting sorted out and addressing the data. With the assistance of EDW the client can order data based regarding the matter.</p><p>Operational Data Store: In Operational Data Store, Data warehouse is revived progressively. Consequently, it is all the more generally utilized for routine exercises, for example, putting away records, etc.</p><p>Data Mart: A data store can be characterized as a subset of the data warehouse. It is planned deals, money, etc.</p><p><strong>Benefits of Data Warehouse:</strong></p><p>Devours less time I.e., saves times: A data warehouse can safeguard and store data from explicit sources. Additionally, the basic data is accessible to every one of the clients which permits them to settle on choices based on every one of the significant viewpoints.</p><p>Permits Historical Insights: With the assistance of this element, the business has the admittance to the chronicled data also. The records are remained careful utilizing data warehouse.</p><p>Lifts Efficiency: Data Warehouse helps in boosting the effectiveness. It is extremely tedious for a client to gather data for various sources. With the assistance of data warehouse, the client can get all the data gathered in a solitary spot. Likewise, it helps in running the data rapidly.</p><p>Versatility: The expression “adaptable” alludes to the capacity to adapt and perform well under an expanded responsibility and data warehouse in itself is versatile. In addition, it likewise empowers more noteworthy adaptability in the business moreover.</p><p>Increment the force and speed of data investigation: With data warehousing, the clients can gain admittance to high powers and sped up. This is useful as it permits the clients to enjoy a significant benefit in business.</p><p><strong>Inconveniences of Data Warehouse:</strong></p><p>Not Ideal for unstructured data: Data warehouse isn’t viewed as ideal for unstructured data. The unstructured data alludes to the data that isn’t coordinated in a pre-characterized way.</p><p>Cost and advantage proportion: This are quite possibly the most ordinarily dealt with issues of data warehousing. The data warehousing is viewed as an expensive task and that is frequently not advocated. Therefore, data warehouse is definitely not an ideal arrangement.</p><p>Similarity with the current framework: The issue of similarity with the current data warehouse framework is confounded. All the current framework functionalities that are locked in are viewed as intricate.</p><p>Data kept on the web: In data warehouse, the product as a rule don’t permit keeping the entire storehouse solely after a particular term. The data is then recorded and broke down for future references too.</p><p>Additional announcing: The data warehouse runs relying upon the danger of the association. It copies the data that existed in the sequencing of the database. The issue that emerges for this situation is that it requires some investment in the event that there is additional answering to be finished.</p><p>Utilizations of Data Warehouse:</p><p>Data warehouse is exceptionally normal and famous. Nonetheless, there are a few regions or fields where data warehousing is essentially utilized. Those territories are given underneath:</p><p>Banking administrations</p><p>Carrier administrations</p><p>Venture area</p><p>Telecom</p><p>Retail areas</p><p>Controlled assembling</p><p>Money area</p><p>Instruction area</p><p>Government area</p><p><strong>What is Data Mining?</strong></p><p>Data mining can be characterized as a cycle of gathering crude data and afterward transforming that crude data into helpful data so it tends to be utilized further. In this interaction, the data designs are investigated in enormous pieces of data with the assistance of utilizing at least one programming. <a href="https://www.tutorialandexample.com/data-mining-tutorial/">Data mining</a> is helpful and famous interaction and it is utilized in different various fields nowadays. In Data mining, the data mining instruments are utilized for the way toward building hazard models and distinguishing the cheats.</p><p>With the assistance of the accompanying chart, one can see how data mining functions and the different cycles it goes through prior to delivering the outcomes.</p><p>There are two kinds of Data Mining errands which are recorded beneath:</p><p>Prescient: It is utilized for making forecasts about upsides of data with the assistance of results from different data or based on verifiable data.</p><p>Distinct: The unmistakable capacity just works with the overall properties of data in a database. Underneath recorded are clear capacities:</p><p>Class/Concept Description</p><p>Mining of Frequent Patterns</p><p>Mining of Associations</p><p>Mining of Correlations</p><p>Mining of Clusters</p><p><strong>Benefits of Data Mining:</strong></p><p>Helps in setting up better relationship with the client: With the assistance of data mining, the client can build up better relationship with the client. It helps in realizing what is the sort of approach required with different items so the client will like it. With this, the offer of the item is ensured.</p><p>Finding and sorting out the market drifts: Another advantage of data mining is that it assists with determining the right patterns utilizing the statistical surveying. Additionally, it likewise gives the clients admittance to foresee patterns and examples. That way, the organizations understand what sort of items ought to be dispatched by the notoriety in market.</p><p>Oddity location: The aftereffects of the examination are considerably more exact with the data mining. It is even conceivable to break down databases with a lot of data. With the assistance of the data mining, the banks and other monetary establishments can get data on credits and other significant detail. What’s more, it likewise helps the Mastercard organizations by giving them insights concerning the fakes.</p><p>Advantages in Marketing/Retail: With the data mining, the different organizations can assemble models based on recorded data and thinking about the outcomes, advertisers have a well-suited methodology on the best way to sell the items productively. What’s more, it likewise helps in offering the rebate for specific items to draw in the clients in retail promoting.</p><p>Advantages in Government Department: The Government can break down the records for any exchanges to make and notice the examples that aides in distinguishing the instances of illegal tax avoidance with the assistance of data mining.</p><p><strong>Drawbacks of Data Mining:</strong></p><p>Security and Privacy Concerns: Data mining isn’t generally the most secure choice. There are numerous security and protection gives that emerges in data mining. It even disregards the protection of a client. What’s more, it has been seen that there is an abuse of data a few times. Furthermore, what’s more, some of the time, mistaken data is additionally transferred.</p><p>Costly: In the underlying phases of Data mining, it is extravagant and hard on pockets of the clients. It basically draws costs with its stockpiling and upkeep office. This is one of the primary impediments of data mining.</p><p>Wrong data is given: From time to time in data mining, it is seen that the data gave is regularly inaccurate. Likewise, the data in some cases additionally comes up short on the exactness or precision. This might be a result of the explanation that when data mining instruments dissect the data, they don’t really realize it meaning. What’s more, the outcome delivered is then introduced as different representation. Likewise, here and there the pre-preparing blunders are the explanation for the inaccurate data.</p><p>Hard to work: This point isn’t seen a ton of time. Be that as it may, sooner or later, data mining examination programming are not simple to work. Additionally, it likewise requires the clients to have information dependent on the preparation.</p><p>Various apparatuses, various calculations: The various devices work in an unexpected way. This is a result of the various calculations are utilized to make different plans. In this way, it is vital to choose the right data mining device.</p><p><strong>Utilizations of Data Mining:</strong></p><p>Data Mining is a mainstream and usually utilized interaction. Thus, it is apparent that they are utilized in different fields. A few fields/regions where data mining is famously utilized is recorded underneath:</p><p>Monetary Analysis</p><p>Media transmission</p><p>Retail Industry or Sector</p><p>Advanced education</p><p>Extortion Detection in Banks, Government areas</p><p>Different Scientific Applications</p><p>Spatial data mining</p><p>Energy Industry</p><p>Interruption Detection</p><p>In conclusion, <a href="https://www.tutorialandexample.com/difference-between-data-warehouse-and-data-mining/">data mining and data warehouse</a>, the two of them have their own arrangement of benefits and weaknesses. Albeit, despite the way that it is clear from this article that both the cycles have totally different bits of undertaking, it tends to be seen that data mining and data warehouse have numerous normal applications, this reaches the inference that the advancements are might be utilized together.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=59d13be6846e" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Software Quality Assurance (SQA)]]></title>
            <link>https://aw-alicewilliam.medium.com/software-quality-assurance-sqa-5ea1e9955ee6?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/5ea1e9955ee6</guid>
            <category><![CDATA[softwarequalityassurance]]></category>
            <category><![CDATA[software]]></category>
            <category><![CDATA[software-quality-testing]]></category>
            <category><![CDATA[software-testing]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Wed, 19 May 2021 18:23:17 GMT</pubDate>
            <atom:updated>2021-05-19T18:23:17.090Z</atom:updated>
            <content:encoded><![CDATA[<p>Software Quality Assurance (SQA) is a cycle that guarantees the quality of software while creating software. It additionally guarantees that all cycles, methods, and exercises are observed and appropriately executed.</p><p>It works alongside the advancement cycle to guarantee that the ideal quality measures are met, and accordingly, it assists with improving the improvement interaction and resolve issues at the beginning phase before they cause a huge issue.</p><p>In SQA, the software is tried at each period of the advancement cycle so the software improvement interaction can move to the following stage after the current stage satisfies the necessary quality measures.</p><p>SQA measure offers the accompanying functionalities:-</p><p>SQA gives the quality administration approach</p><p>SQA helps in recognizing the issues in the cycles</p><p>It offers a multi testing methodology to accomplish great quality software</p><p>Compelling uses of software designing innovation ought to be utilized in SDLC</p><p>Estimation and revealing system</p><p><strong>Software Quality Assurance Activities</strong></p><p>SQA exercises help to guarantee software quality. The exercises are broke down and performed bit by bit. These exercises are:-</p><p><strong>Quality Management Plan</strong> — A quality administration plan is planned during project arranging. It comprises of good specialized cycles. The undertaking group performs the board exercises, which incorporate pointing blunders, assessment, and surveys to be performed. After these exercises, records are created by the SQA group, and criticism is given to the advancement group.</p><p><strong>Software designing methods</strong> — Software designing strategy helps the software architects to acquire excellent detail. The originator gathers the data by utilizing a few strategies like the Facilitated Application Specification Technique (FAST). The gathered data is utilized for making the venture assessment by utilizing strategies like Work Break Down (WBS), Source Line of Code (SLOC) assessment, and so forth</p><p><strong>Specialized Reviews</strong> — A conventional specialized audit (FTR) is led to decide the quality and plan of the quality administration plan. Specialized surveys are performed with the specialized staff to discover the mistakes in the beginning phase.</p><p><strong>Testing Strategy</strong> — The different degrees of testing are planned and led. <a href="https://www.tutorialandexample.com/software-testing-tutorial/">Software testing</a> is a significant capacity of SQA movement, which helps in mistake identification. The testing procedures are planned dependent on organization strategy.</p><p><strong>The change control measure</strong> — This undertaking consolidates the human interaction and mechanized apparatuses to give a system to change control. The change control is the instrument which guarantees the quality of the software by formalizing the solicitation for change, assesses the idea of progress and control the impact of progress. This instrument is carried out during the turn of events and support stage.</p><p><strong>Software Quality Assurance Audits</strong> — SQA reviews investigate the software advancement measure by contrasting it with the current cycles. SQA Auditor surveys and checks the exercises. The quality of the undertaking dealing with can be dissected uniquely through the result of the survey, which is presented by the SQA Auditor.</p><p><strong>Create Reports</strong> — Suitable records are produced for all exercises for future references. These exercises assess the quality of a task and furthermore test the way project the executives measures are taken care of. This will help in surveying the presentation of the test engineer, who is responsible for the test the executives stage.</p><p><strong>Benefits of Software Quality Assurance</strong></p><p><a href="https://www.tutorialandexample.com/software-quality-assurance-sqa/">Software Quality Assurance</a> assists with creating great software.</p><p>Top notch software requires low upkeep.</p><p>SQA helps in improving the way toward creating software</p><p>Great business software builds the market worth of the association.</p><p><strong>Impediments of Software Quality Assurance</strong></p><p>The impediments of SQA are using more assets, recruiting more specialists for keeping up the quality of the software, both may influence the assessed cost.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5ea1e9955ee6" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Difference Between Structure and Union]]></title>
            <link>https://aw-alicewilliam.medium.com/difference-between-structure-and-union-48661e2405a6?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/48661e2405a6</guid>
            <category><![CDATA[c-programming]]></category>
            <category><![CDATA[structure]]></category>
            <category><![CDATA[unions]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Sun, 25 Apr 2021 19:54:18 GMT</pubDate>
            <atom:updated>2021-04-25T19:54:18.644Z</atom:updated>
            <content:encoded><![CDATA[<p>In this blog post, we’ll try to understand how they work and how exactly are they distinct from one another.</p><h3>What is Structure?</h3><p>Struct is a user-defined data-type that is used to keep a combination of data which can potentially belong to different data-types. To describe further, Consider how you can store information about a pupil in <a href="https://www.tutorialandexample.com/c-tutorial">C</a>/<a href="https://www.tutorialandexample.com/cpp-tutorial">C++</a>, where, You Have to store the following parameters:</p><blockquote>Name</blockquote><blockquote>Class</blockquote><blockquote>Phone</blockquote><blockquote>Number</blockquote><blockquote>Email Address</blockquote><p>One way to go about it would be to store it in 4 different arrays: name[], class[], phone[], email[]. Fundamentally, name[I] will represent the name of the ith student. Class[I] will signify the class of the corresponding student. Telephone [I] will represent the contact number and email[I] will signify the email address of ith student.</p><p>The advantage of this process is that it is the simplest one to consider. The downside is that it is fairly difficult to manage a student such a manner. Here we have just four parameters. Imagine a situation where we have 400 parameters associated with a pupil. One simply cannot manage 400 arrays. This is really where structs come in the picture. Defining a Structure During struct, we can define the structure of a single student as follows:</p><blockquote>struct Student <br>String name;<br> int category;<br> chain phone;<br> string email;</blockquote><p>We can then easily define a range of pupils as: Student students[10].The above structure beautifully captures the specifics of a pupil. Each of the variables of a specific pupil are packaged together and it is much cleaner.</p><p>The parameters of a specific student are all stored sequentially in the computer memory. This results in much more efficient caching of pupil information.</p><h3>What is Union?</h3><p>Suppose we are running a survey of different individuals living in our society. As part of the survey, our aim is to attempt and record the height (in mm) and weight (in kgs) of various people. The elevation could be something like 1700mm. Weight could be 74.23 kgs.</p><p>Height is always an integral value (in mm) while weight might be fractional. The issue here is that for some people we’ve got only height data. For others, we have only weight data. The obvious way to store such data is to make a struct.</p><blockquote>struct Person <br>int height;<br> double weight;</blockquote><p>The issue here is that we only have the height or the weight available for each person. However, we are allocating space for the two. This leads to a wastage of memory. What if we can keep only height for people whose height would be the accessible and only weight for individuals where we possess the weight value at our disposal? It might make things much easier and also save memory. This is where unions assist.</p><p>union Person Now, we can easily save the specifics of an Individual as follows:</p><blockquote><strong>union</strong> Person person1 = ;<br><strong>union</strong> Person person2 = {.weight=74.23};</blockquote><p>No space is allocated for height. Here, based on the architecture, we’re conserving 4–8 bytes on each of the first as well as the next object. Imagine if we had data for a million individuals, how much bytes we would Have the Ability to save.</p><h4>Conclusion</h4><p>That is about the primary <a href="https://www.javatpoint.com/structure-vs-union">difference between Structure and Union</a>. Both of these are the form of information structure. Both of these would be the aggregated info types which have a variable of distinct data types.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=48661e2405a6" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How does Python Brython Works?]]></title>
            <link>https://aw-alicewilliam.medium.com/how-does-python-brython-works-467a10bea163?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/467a10bea163</guid>
            <category><![CDATA[python]]></category>
            <category><![CDATA[brython]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Sun, 18 Apr 2021 19:28:52 GMT</pubDate>
            <atom:updated>2021-04-18T19:28:52.129Z</atom:updated>
            <content:encoded><![CDATA[<p>For understanding the way <a href="https://www.javatpoint.com/how-brython-works">Brython functions</a>, we first need to put in brython with our favorite method, which we’ve discussed in”How to set up Brython essay”.</p><p>Few this, we ought to understand before talking how brython functions:</p><p>The best way to execute python from JavaScript The best way to interpret Python into JavaScript and a runtime executive at the browser.</p><p>Both chief libraries of JavaScript document:</p><p>brython_stdlib. Js, which will be regular library of Brythonbrython.js, that’s the crux of the brython speech The way to invoke brython(), that will compiles Python app saved at the script tags together with the text/python form. In the following guide, we’ll discuss Brython core elements, regular libraries, and the way it functions.</p><p>The brython.js and brython.min.js (the reduced version of this Brython motor ) comprises the core elements of brython.</p><p>The two of these comprises the following key elements:</p><p>The brython.js and brython.min.js (the reduced version of this Brython motor ) include the core elements of Brython. The two of these comprises the following key elements:_BRYTHON_: it’s the JavaScript worldwide thing which holds all inner objects which needs to be required for conducting Python script. _BRYTHON_ isn’t used right if we compose Brython software. If we take a look at the Brython app, broth the Python and JavaScript, then we’ll observe the normal happenings of _BRYTHON_.</p><p>We don’t have to use this thing, but we ought to know about that when we see a mistake or once we would like to debug our app from the browser console. Brython(): it’s the principal JavaScript function that’s exposed from the JavaScript international namespace. We can’t perform any Python application without calling this purpose.</p><p>Here is the only JavaScript purpose that people should have to call explicitly. Browser: it’s the module of this browser, which displays the JavaScript objects which are widely utilized in the front website software such as the Document Object Model interfaces utilize to record, along with also the browser window uses the window thing. Built-in forms: All these are implementations of the Python constructed kinds in JavaScript.</p><p>Like py_dicts. After having an notion about what heart Brython document, brython.js, we’ll now know about their company document, brython_stdlib. js.The Python standard library is vulnerable by brython_stdlib. js.</p><p>Following the creation of this brython_stdlib. Js document, Brython can compile the Python standard library to JavaScript and hyperlinks the effect into the bundle brython_stdlib. js.Brython ought to be shut to CPython, and also the Python’s favorite execution.</p><p>Since Brython runs within the context of a website browser, it’s few constraints, like the browser doesn’t permit direct access into the file system, therefore, os.open() function can’t open the file. Functions that aren’t about the website browser can’t be implemented.</p><p>For instance:# let us run the code at the Brython surroundings:<br>Here, os.unlink() is raising an exception, since it’s not protected for deletion of a local file in the browser environment, along with the File and Directories Entries API is merely a default suggestion.</p><p>Brython simply supports native Python modules. It doesn’t support Modules of Python built in C till they’ve been implemented in JavaScript. By way of instance, hashlib module is written in C and executed at JavaScript at Brython. The programmers and users may also consult the listing of modules at the Brython supply for assessing the CPython implementation.</p><p>The consumer should include brython_stdlib. Min.js for importing modules in the Python standard library.</p><p><strong>Brython Working</strong></p><p>Now, let us see how Brython functions inside the Browser, which will be just conscious of the JavaScript engine. We’ll comprehend this with the support of an example as well as the tools which can be found in the browser. We’ll find out about the procedure that’s involved in the implementation of Python code from the browser.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=467a10bea163" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How does differ Compiler from Interpreter? Explain in Details.]]></title>
            <link>https://aw-alicewilliam.medium.com/how-does-differ-compiler-from-interpreter-explain-in-details-471e7a0453fb?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/471e7a0453fb</guid>
            <category><![CDATA[interpreters]]></category>
            <category><![CDATA[compilers]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Fri, 16 Apr 2021 19:05:51 GMT</pubDate>
            <atom:updated>2021-04-16T19:05:51.564Z</atom:updated>
            <content:encoded><![CDATA[<p>Apparently, Humans can comprehend anything via normal languages, but a computer does not. <a href="https://www.tutorialandexample.com/difference-between-compiler-and-interpreter/">Compiler and interpreter</a> would be the kinds of a language .</p><p>What’s Language translator? This query may be arising in mind.</p><p>A language translator is a program which translates the applications out of a source language which are in human-readable type into an equivalent program in an object language. The source speech is normally a high-level programming language, along with the thing terminology is typically the machine terminology of a genuine computer.</p><p>There are two sorts of Translators</p><ol><li>Compiler</li><li>Interpreter</li></ol><p>It transforms the whole source code in 1 go or may take a number of passes to accomplish this, but in the beginning, the consumer receives the code that’s prepared to execute. The returned goal code file may be conducted with several distinct inputs over and above. The compiler does not have to be accessible for any succeeding reruns. Normally, the source type is a higher-level language compared to the destination type, like when converting from C into machine code.</p><p>Compiler works on stages; different phases could be grouped into two different parts which are:</p><p>Analysis Stage of this compiler can also be known as the front end in which application is broken into fundamental constituent components and tests grammar, semantic and syntax of this code and intermediate code is created. Synthesis stage of this compiler is also called the back end in which intermediate code is optimized, and the target signal is created. Grace Hopper’s job on the initial compiler laid the groundwork for one more translator which came into existence a couple of decades after: the interpreter.</p><p><strong>PHASES OF COMPILER</strong></p><p>Now let us know the working of every phase in detail.</p><p><strong>Syntax Analyzer</strong>: In this stage, the components that are created in the previous phase are assessed against the Bible of programming language, whether the expressions are syntactically correct or not. It creates parse trees for doing this.</p><p><strong>Semantic Analyzer</strong>: It verifies if the statements and expressions created in the preceding stage follow the principle of programming language or not and it generates annotated parse trees.</p><p><strong>Intermediate code generator</strong>: This creates an equal intermediate code of this source code.</p><p><strong>Code Optimizer</strong>: It enhances space and time requirement of this program. For doing that, it eliminates the code existing in the app. It performs operations such as memory management, Register mission, and machine-specific optimization. The symbol table is a little data structure that manages the identifiers alongside the appropriate kind of information it is storing. Error Handler discover, report, fix the mistakes encountering in between different stages of a compiler.</p><p><strong>Definition of Interpreter</strong></p><p>The interpreter is an option for implementing a programming language also does exactly the exact same work for a compiler. However, interpreter procedures syntax tree straight to get expressions and implement statement instead of generating code in the syntax tree.</p><p>An interpreter may necessitate processing the exact same syntax tree over once that’s why interpretation is relatively slower than executing the compiled program.</p><p>A compiler is relatively faster than Interpreter since the compiler take the entire program at a single move whereas interpreters compile every line of code following another.</p><p><strong>What’s the requirement of Interpreter when we had Compiler?</strong></p><p>The actual need of interpreter comes in which compiler fails to meet the applications development requirements. The compiler is a really strong tool for developing apps in a language that is high-level. But, there are numerous demerits connected with the compiler. In case the source code is enormous in size, then it may take a while to compile the source code. That will considerably increase the compilation length . This interpreter comes useful and will cut this massive set length. Interpreters are made to interpret single instruction at a time and implement them immediately.</p><p>An interpreter also comes handy if you often update the source code. As when it takes 5 minutes to compile the whole source code. In case you’ve upgraded it 5 times. Then the complete compile time will be 25 minutes that’s substantially significant. But when we use an interpreter we could lessen this compile time. The compiler needs more memory than interpreter due to the creation of object code of the entire program at the same time.</p><p>Compiler presents all mistakes simultaneously, and it is hard to discover the mistakes in contrast interpreter screen mistakes of every invoice one by one, and it is a lot easier to discover mistakes. In compiler when an error happens in the application, it quits its interpretation and following removing error entire program is interpreted again.</p><p>To the contrary, when an error occurs in the interpreter, it averts its interpretation and after removing the mistake, translation aids. Intermediate code or target signal is generated in the event of a compiler. As against interpreter does not produce intermediate code. Once we use interpretation we could disperse our source code right, instead of worrying about platform-specific executables, or thinking about how we will go about compiling binaries for everybody to utilize.</p><p>Nonetheless, in this scenario, we will require the customer of our app to get an interpreter — that frequently actually just comes together with a speech — and also make confident the interpreter is based on their machine(s). As soon as they have the interpreter they could view our original source code, then choose that code, then rely upon their very own variant of the interpreter to run it locally.</p><p>In this scenario we rely upon the interpreter to produce the compatible with platforms, and we, as developers and consumers, do not need to think about doing it. Moreover, if something goes wrong (either something in the origin we published, or something relating to their platform), the user of our code may determine what the matter is considerably more readily than using a compiled file.</p><p>The interpreter will make it effortless to fix any issues, irrespective of who’s running our code. How?</p><p>The Compiler of coffee called as javac transforms source code into an Intermediate document called Bytecode file. The Bytecode document is exceptional for all kinds of OS ways bytecode is platform-independent. The Interpreter of coffee (coffee ) converts Bytecode into the particular OS-compatible machine code. This code will be different according to OS.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=471e7a0453fb" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is DevOps Automation Tools?]]></title>
            <link>https://aw-alicewilliam.medium.com/what-is-devops-automation-tools-af1538485697?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/af1538485697</guid>
            <category><![CDATA[devops-automation]]></category>
            <category><![CDATA[devops-automation-tools]]></category>
            <category><![CDATA[devops]]></category>
            <category><![CDATA[devops-tool]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Thu, 15 Apr 2021 22:05:53 GMT</pubDate>
            <atom:updated>2021-04-15T22:05:53.662Z</atom:updated>
            <content:encoded><![CDATA[<p>DevOps shouldn’t be confused with just automation. DevOps is a massive set of actions in a civilization with automation comprised. <a href="https://www.tutorialandexample.com/devops-automation/">DevOps automation</a> is reached by obeying the agile process. Agile additionally supports the collaborative culture, which aids in the program development by taking comments solutions.</p><p>Automation is the combo of this construction procedure, the deploying procedure, along with the observation procedure. The construction process has programmers who plan to produce the code and incorporating small releases into the new or existing repository. Deploying is to be performed after the practice of testing is powerful. Tracking is completed after the program is upgraded on the production server. Now those programs on the production server have been viewed. Tracking the logs along with the metrics would be the very best approach to understand more about the applications’ functionality. And about the code reliability, performance, and extent.</p><h3>Need of Automation</h3><p>Automation in the market has been required to keep the customers’ needs in time and boost the product’s quality. Ahead of the automation, the application development lifecycle was quite slow and frenzied. The programmers weren’t so regular about the commits, and in addition to about the releases. The resources and time consumed in the older procedure weren’t great for the business reputation and rewarding.</p><p>A few of the qualities of automation are given below.</p><p>The DevOps automation isn’t the job of one team. Organizations have to have different groups to handle every phase of their DevOps procedure. These teams need to work to your organization’s welfare, producing very good quality products, making at regular rates, establishing a fantastic relationship with the customer, and keeping up the <a href="https://www.tutorialandexample.com/devops-tutorial/">DevOps</a> culture across the business. Here we’ve split the automation functions and obligations depending on the teams and rankings.</p><p>DevOps evangelists are such men and women that are specialists of the domain name and work extensively with numerous groups. DevOps evangelists function to enhance the state of this DevOps direction in the business.</p><p>Programmers are individuals that are liable for the functioning and structure of this program running on the creation. The programmers are necessary to work on little parts and also make regular commits into the centralized repository available. Release supervisors have various jobs to be performed such as, the release manager required to plan for the program development, schedule the jobs and respective functions. In addition they have the right to control both the applications development along with the delivery. They must check all of the requirements within the program and suitable to the customer.</p><p>These could be in comparison to the quality assurance group within almost any software development lifecycle. These are accountable for delivering quality merchandise and increase the company value. These are accountable for identifying distinct core-level issues and solve them one by one. They’re specialists in a variety of technologies, which aids them in discovering and solving other domain issues.</p><p>Automation Architects need to set a DevOps surroundings on the organization’s premises. They also manage reviewing and monitoring. Automation architects need to decide on which automation tool ought to be utilized, which can be more acceptable for your own company.</p><p>Security Team must cope with the security-related concerns. As in DevOps, we must use a number of tools and numerous configurations, resulting in some security violation. This safety group deals with all those dangers.</p><p>The automation scope could be determined by identifying the software components that need automation support. For the automation execution on any program, it has to be examined. There’s a specific set of principles that have to be followed in this program investigation. To begin with, you need to check all of the program’s common functionalities and assess those significant features for your organization and must be automated. Additionally, check to your technical feasibilities of those evaluations. After assessing these attributes, you’ll have the ability to determine the reach of the automation testing.</p><p>Automation testing plays a very important role within a business development. In the same way, if the generated application doesn’t have any flaws and satisfies the client’s requirement, it’ll be a lucrative ecosystem. Thus, every firm must use DevOps automation features to raise the productivity of their workers as well as the scalability of the firm.</p><p>Numerous evaluations are done to look at the functionality and usability of this code. Automation evaluations are crucial for creating great company-client relationships. Here we’ll know about a few of the automation evaluations which help create a problem-free program for your customer.</p><p>Unit Evaluation: Largely, unit evaluations are complete by the programmers only, but on occasion the operation team may also execute them. These evaluations are done to examine the respective modules or elements within the source code. They’re conducted to assess whether the program is set to utilize. This type of testing is generally performed on web software frequently.</p><p>Smoke Evaluation: this type of testing is done in order to look at the stability of this construct. All these are carried out on the main functionalities of this program. If a number of those new functionalities are incorporated into the program, then smoke check is carried out. The title smoke testing is by the pipes businesses, and they utilize the smoke to inspect that the leakages. Likewise, this testing device way is called a smoke test.</p><p>Functional Evaluation: This testing process doesn’t assess the inner structure of this program. This generates the testing output signal by providing regular inputs to several purposes of this program and check the outcome. This testing technique is part of Quality Assurance procedures.</p><p>Functional testing is principally carried out to ensure all of the interface functionalities are functioning properly. In Integration testing, different program elements are either combined or encapsulated to examine them for a specific performance in this type of testing. This testing is followed before the whole application is incorporated. This testing generates a record which informs about the part’s behaviour following the integration procedure and prior to the integration.</p><p>Regression Test: this type of testing is done if any recent alterations are completed in the app code of this program. This evaluation ensures that the functionalities of all of the components. This may result in problems in the performance of the program. Thus, regression testing is quite much crucial to perform regularly.</p><p>DevOps automation includes a huge region of implementation. Every business needs automation in its own creation in the present world, while it’s a service-based or product-based firm. Automation is the basis of the new universe. It has made it much easier to keep the data and upgrade the software quicker.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=af1538485697" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How to Improve Alexa Rank of Your Website/Blog?]]></title>
            <link>https://aw-alicewilliam.medium.com/how-to-improve-alexa-rank-of-your-website-blog-59f57ff6b53b?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/59f57ff6b53b</guid>
            <category><![CDATA[seo]]></category>
            <category><![CDATA[alexa-rank]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Wed, 17 Mar 2021 18:50:01 GMT</pubDate>
            <atom:updated>2021-03-17T18:50:01.484Z</atom:updated>
            <content:encoded><![CDATA[<p>There are many bloggers and site owners who take attention upon their blog’s Alexa ranking a lot. The reason for it is many of advertisers took interest on advertising with sites which has good rank in Alexa so to earn money it is important to take attention on it. So in this article we’ll see ways by which you can improve Alexa rank of your site and also ways which is not good for you and your site to try.</p><p><strong>How to Improve Alexa Rank of Your Site?</strong></p><p><strong>SEO:</strong></p><p>SEO (<a href="https://www.javatpoint.com/seo-tutorial">Search Engine Optimization</a>) is one of the most recommended and best ways to improve your traffic by which your Alexa rank can be improve. Nearly every advertiser likes to advertise with sites that get more organic traffic than referral traffic. So it is important to get better traffic from search engines and for this you have to improve your site’s SEO. You can learn here few basic but important SEO techniques from here.</p><p><strong>Promotion on Social Networking Sites:</strong></p><p>Many peoples get good rank only due to social networking sites. You can share your site on various social networks which allows promotion (important). If you are on Facebook, then you can join various groups which allow sharing your links and get good number of traffic from there. Also if you have huge number of fans on various social networks than you just needs to share your site on there and you can easily get good number of traffic from there which will help you to improve your Alexa rank.</p><p>Also read: Social Media promotion for your blog: Advantages &amp; Disadvantages.</p><p><strong>Guest Posting:</strong></p><p>If you can do guest posting than you can generate few traffic from the blog where you are doing post also. If you found blogs on your site’s niche, such as if your site is related with technology than you can do guest post on another technology blog so you could get targeted traffic. If you are posting on a high traffic getting site than surely you can get hundreds of visitors from that blog.</p><p>If you want to improve your blog’s rank than you can also start allowing guest posting on your blog, as you cannot write too many articles every day so if you get many guest authors than they may also do posts in daily basis so your blog will start getting additional traffic from both search engines and social networks (if you or your guest authors share the post they written). However allowing guest authors is not a good idea for Google PageRank, so I couldn’t recommend it but you should allow if you are not able to do post on your blog every day.</p><p><strong>Commenting:</strong></p><p>This is the way which many of peoples use. Commenting on same niche blogs can also generate little traffic for your site. It would be better to comment on blogs which uses CommentLuv named commenting system which allows one post to be shown within your comment in which peoples may visit. However it will increase your referral traffic which is not good for earnings so I couldn’t recommend this also but if you are not thinking about earnings and only about ranking than this will surely help you.</p><p><strong>Recommending Alexa Toolbar:</strong></p><p>Having Alexa toolbar by your visitors will surely improve your rank the reason is, Alexa get know where peoples do visit from Alexa toolbar also so it would give simply boost to your rank. You can place banner of Alexa toolbar for your visitors to download and install that, so when your visitors visit your site again they will also get counted by Alexa and you will get better rank.</p><p><strong>Pro Subscription of Alexa:</strong></p><p>Sign up for Alexa premium subscriptions packs to get better information about your traffic and also to get your every single visitor counted by Alexa. However it would be good to use their trial services before taking any subscription pack as few peoples also get their rank increased due to it, so before making any purchase test yourself its trial version and if it get beneficial for you than simply purchase its subscription if you want.</p><h3>What you should not do?</h3><p><strong>Traffic Exchange:</strong></p><p>Many peoples use such type sites which do traffic exchange, which means you visit others site to get visits on yours. But most of such type sites uses iFrame to open sites which will not help your site to get better rank and will not worth you and even if you have Google AdSense ad network than it can be dangerous for it, so trying these will only affect your site badly.</p><p><strong>Alexa rank boosters:</strong></p><p>You may also get few sites which helps in improving Alexa rank of sites and most of them really work, as they open the site in new window but using them will leave an bad impression upon your Alexa rank, because as they will improve your rank by opening your site in new window so they will also show as the referrals on your Alexa rank and the reason for accuracy of most of them is they need to have users Alexa toolbar, so Alexa get accurate results that from where you are receiving traffic and it will not work even if you use Google Search link on your site to get search engine traffic on Alexa.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=59f57ff6b53b" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is the Difference Between CDMA and GSM?]]></title>
            <link>https://aw-alicewilliam.medium.com/what-is-the-difference-between-cdma-and-gsm-ff8b5ec56354?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/ff8b5ec56354</guid>
            <category><![CDATA[cdma]]></category>
            <category><![CDATA[gsm]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Sun, 24 Jan 2021 18:42:55 GMT</pubDate>
            <atom:updated>2021-01-24T18:42:55.285Z</atom:updated>
            <content:encoded><![CDATA[<p>Cellular mobile services are used all around the world for quite a while and still evolving daily. With these solutions, various communication solutions also evolved, and CDMA and GSM are just two of these. CDMA and GSM will be both main technology standards which are known for cellular communication.</p><p>The GSM and CDMA transforms the information in the cell telephone into radio waves. However, these technologies are distinguished in the manner by which the calls &amp; information transfer occurs over a network. One of the critical <a href="https://www.javatpoint.com/cdma-vs-gsm">differences between CDMA and GSM</a> is that GSM uses SIM cards to join a cell phone using its system, whereas CDMA doesn’t require any SIM card also works on ESNs (Electronic Serial Number). Within this subject, we’ll know what GSM and CDMA technologies are and how they distinguish from one another in detail.</p><p>GSM or Global System for Mobile Communication is a digital cellular communication standard, that can be used for receiving and transmitting voice and data signals over a community. It’s also referred to as the second-generation standard for cellular networks or telecommunication, and it functions on a wedge spectrum. It works on three separate radio frequencies, that can be 900MHz, 1800MHz, and 1900MHz. One of those three frequencies, the 900MHz band frequency is utilized by the First GSM system, and the 1800 MHz band frequency is utilized to offer the extra support for raising clients. The GSM users have taken advantage of this service Short Message System (SMS), where the consumers may communicate with each other using text messages within the specified network.</p><p><strong>Benefits of GSM:</strong></p><p>Together with GSM technologies, we may have a cheap portable collection and base stations. It enhances spectrum efficacy. The voice or data signals are of top caliber in GSM. CDMA is a acronym for Code Division Multiple Access, That’s also a radio standard like GSM.</p><p>The CDMA was created at 2G and 3G creation because the protocol of wireless communication. It’s predicated on the spread spectrum technologies and makes best use of the bandwidth that is available. As it utilizes the spread spectrum technologies, thus allows each user to transmit the information over the whole frequency spectrum in any moment. The CDMA supplies among the very protected modes of communication as a result of its spread spectrum land. It’s employed in UHF or Ultra high-frequency mobile systems, together with frequency bands which range from 800MHz into 1900MHz.</p><p><strong>Benefits of CDMA:</strong></p><p>It utilizes a predetermined frequency spectrum in an efficient manner. There’s not any limit on the amount of Clients. It’s compatible with other mobile technologies; therefore it permits nation-wide roaming.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ff8b5ec56354" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is Bitcoin and how does it work?]]></title>
            <link>https://aw-alicewilliam.medium.com/what-is-bitcoin-and-how-does-it-work-efdd1977c30c?source=rss-8c227b45b950------2</link>
            <guid isPermaLink="false">https://medium.com/p/efdd1977c30c</guid>
            <category><![CDATA[bitcoin]]></category>
            <category><![CDATA[blockchain-technology]]></category>
            <category><![CDATA[bitcoin-mining]]></category>
            <category><![CDATA[blockchain]]></category>
            <dc:creator><![CDATA[Alice williams]]></dc:creator>
            <pubDate>Sat, 09 Jan 2021 17:29:44 GMT</pubDate>
            <atom:updated>2021-01-09T17:29:44.145Z</atom:updated>
            <content:encoded><![CDATA[<p>Let us start with a fascinating fact: Specific Bitcoin address sent 10000 Bitcoins to another Bitcoin speech in May of 2010. This specific trade is the first purchase that was made out of bitcoin and it was used to buy 2 pizzas by a man named Laszlo. Laszlo printed a post back in 2010 asking for someone to sell him two pizzas in exchange for 10000 Bitcoins. Well, someone did, and now the purchase price of both of these pizzas is worth more than 100 million dollars today.</p><p><strong>Who Invented Bitcoin?</strong></p><p>In October 2008 a document was published online by a man calling himself <a href="https://en.wikipedia.org/wiki/Satoshi_Nakamoto#:~:text=Satoshi%20Nakamoto%20is%20the%20name,devised%20the%20first%20blockchain%20database.">Satoshi Nakamoto</a>. The record, also referred to as a whitepaper, indicated a way of creating a system to get a decentralized money called bitcoin.</p><p>Its core, Bitcoin is a transparent ledger with no central authority. What does that mean? Well, let us compare Bitcoin to the Bank. Because most money today is currently electronic the bank handles its own ledger of accounts and transactions. However, the bank’s ledger isn’t transparent and it’s stored on the bank’s primary computer. Just the bank has total control over it. At any point in time</p><p>I can sneak a glimpse to the ledger and see all of the transactions and balances that are happening. The one thing you can figure out is that owns these balances and who is behind every transaction. Everything is open, transparent, and traceable but you still can’t tell who’s sending what to whom.</p><p><strong>Could Bitcoin Be Hacked?</strong></p><p>Bitcoin is also decentralized; Together with Bitcoin, each computer that engages in the system can also be keeping a copy of the ledger, also known as the Blockchain. Therefore, in the event that you would like to take the system down or hack the ledger you’ll need to take down tens of thousands of computers which are keeping a backup and constantly updating it. There aren’t any real coins. After you ”Own” Bitcoin it means that you own that right to get a specific bitcoin speech record in the ledger and ship funds from it into a different address.</p><p>The issue of security has been a basic one for bitcoin because its development. On one hand, bitcoin itself is very tricky to hack, and that’s largely due to this <a href="https://www.javatpoint.com/blockchain-tutorial">blockchain technology</a>. Since blockchain is constantly being reviewed by bitcoin users, hacks are unlikely.</p><p>On the flip side, but the fact that bitcoin itself is hard to hack doesn’t mean that it’s always a safe investment. There will be the possibility of safety risks at various phases of the trading procedure.</p><p><a href="https://www.javatpoint.com/bitcoin">Bitcoin</a> has many advantages over the current system. It gives you total control over your money. Together with bitcoin, you and you can access your funds. No govt. Or Bank can decide to freeze your accounts or confiscate your holdings.</p><p>The legal status of bitcoin (and related crypto instruments) varies substantially from state to state and is still undefined or altering in many of them. Whereas the majority of countries don’t make the usage of bitcoin itself prohibited, its standing as money (or a commodity) changes, with diverse regulatory implications.</p><p>Finance minister Arun Jaitley, in his budget speech on 1 February 2018, said that the authorities will do everything to stop using Bitcoin and other digital currencies in India for offender applications. He reiterated that India does not recognize them as legal tender and will rather encourage blockchain technology in payment systems.”</p><p>The government doesn’t recognize cryptocurrency as legal or money and can take all steps to eliminate using those crypto-assets in funding illegitimate actions or as an element of their payments system,” the finance minister said.</p><p>In 2019, a petition was registered by the Internet and Mobile Association of India together with the Supreme Court of India challenging the legality of cryptocurrencies and looking for a direction or order restraining their transaction.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=efdd1977c30c" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>