tag:blogger.com,1999:blog-42899902181398264672024-03-05T18:09:25.115-08:00techmagic@dav pushpanjali"Technology is indistinguishable from MAGIC"HI-TECH DAV PUSHPANJALIhttp://www.blogger.com/profile/04606342971323605532noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-4289990218139826467.post-14478088531875171802015-05-11T00:43:00.000-07:002015-05-11T00:43:00.174-07:00XI MMWT CH-4,5 Exercise<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://www.megafileupload.com/E5l/ch_4_5.docx">click here to Download the File</a></div>
HI-TECH DAV PUSHPANJALIhttp://www.blogger.com/profile/04606342971323605532noreply@blogger.com0tag:blogger.com,1999:blog-4289990218139826467.post-59582323770818841472015-05-05T20:01:00.001-07:002015-05-05T20:18:19.698-07:00CLASS XI MMWT<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="http://www.megafileupload.com/12jQ/CH3_EXERCISE.docx">CH-3 EXERCISE</a><br />
<br />
<br /></div>
HI-TECH DAV PUSHPANJALIhttp://www.blogger.com/profile/04606342971323605532noreply@blogger.com0tag:blogger.com,1999:blog-4289990218139826467.post-85493240739413911162008-04-01T00:00:00.003-07:002008-04-01T00:00:41.843-07:00ARTIFICIAL INTELLIGENCE<div><embed src="http://widget-b3.slide.com/widgets/slideticker.swf" type="application/x-shockwave-flash" quality="high" scale="noscale" salign="l" wmode="transparent" flashvars="cy=bb&il=1&channel=1441151880766223283&site=widget-b3.slide.com" style="width:400px;height:320px" name="flashticker" align="middle"></embed><div style="width:400px;text-align:left;"><a href="http://www.slide.com/pivot?cy=bb&at=un&id=1441151880766223283&map=1" target="_blank"><img src="http://widget-b3.slide.com/p1/1441151880766223283/bb_t054_v000_s0un_f00/images/xslide1.gif" border="0" ismap="ismap" /></a> <a href="http://www.slide.com/pivot?cy=bb&at=un&id=1441151880766223283&map=2" target="_blank"><img src="http://widget-b3.slide.com/p2/1441151880766223283/bb_t054_v000_s0un_f00/images/xslide2.gif" border="0" ismap="ismap" /></a></div></div>HI-TECH DAV PUSHPANJALIhttp://www.blogger.com/profile/04606342971323605532noreply@blogger.com0tag:blogger.com,1999:blog-4289990218139826467.post-84782964540340039032008-03-31T21:53:00.000-07:002008-04-01T00:03:08.185-07:00<p><strong><span style="color:#3366ff;">WHAT IS ARTIFICIAL INTELLIGENCE?</span></strong></p><ul><li><strong>It is the science and engineering of making intelligent machines, especially intelligent computer programs. It is related to the similar task of using computers to understand human intelligence.</strong></li></ul><p><strong><span style="color:#3366ff;">WHAT IS INTELLIGENCE?</span></strong></p><ul><li><strong>Intelligence is the computational part of the ability to achieve goals in the world. Varying kinds and degrees of intelligence occur in people, many animals and some machines. </strong></li></ul><p><strong><span style="color:#3366ff;">APPLICATIONS OF AI:</span></strong></p><p><strong>game playing<br /></strong>You can buy machines that can play master level chess for a few hundred dollars. There is some AI in them, but they play well against people mainly through brute force computation--looking at hundreds of thousands of positions. </p><p><strong>speech recognition<br /></strong>In the 1990s, computer speech recognition reached a practical level for limited purposes. It is quite convenient. It is possible to instruct some computers using speech, most users have gone back to the keyboard and the mouse as still more convenient.<br /><strong>understanding natural language<br /></strong>Just getting a sequence of words into a computer is not enough. Parsing sentences is not enough either. The computer has to be provided with an understanding of the domain the text is about, and this is presently possible only for very limited domains.<br /><strong>computer vision</strong><br />The world is composed of three-dimensional objects, but the inputs to the human eye and computers' TV cameras are two dimensional. Some useful programs can work solely in two dimensions, but full computer vision requires partial three-dimensional information that is not just a set of two-dimensional views. </p><p><strong>expert systems</strong><br />A ``knowledge engineer'' interviews experts in a certain domain and tries to embody their knowledge in a computer program for carrying out some task. One of the first expert systems was MYCIN in 1974, which diagnosed bacterial infections of the blood and suggested treatments. It did better than medical students or practicing doctors, provided its limitations were observed. </p>HI-TECH DAV PUSHPANJALIhttp://www.blogger.com/profile/04606342971323605532noreply@blogger.com0tag:blogger.com,1999:blog-4289990218139826467.post-12195441552645921362008-03-14T23:13:00.000-07:002008-11-14T23:22:39.190-08:00FIREWALL<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLdjonvNDp4dz2_kup2FE-GYp5q8LH4lQf9eSvSV2bO84LIjVQhmJ_pn95aIWyygOlRsywCeyfz6sZh1xPIBDYUv5eGVesP4TIr0ZRZrA18Lbb375BidIPWL-Sds6CnDypdZSdAlFjFnc-/s1600-h/f1.jpg"><img id="BLOGGER_PHOTO_ID_5177852536931037986" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLdjonvNDp4dz2_kup2FE-GYp5q8LH4lQf9eSvSV2bO84LIjVQhmJ_pn95aIWyygOlRsywCeyfz6sZh1xPIBDYUv5eGVesP4TIr0ZRZrA18Lbb375BidIPWL-Sds6CnDypdZSdAlFjFnc-/s320/f1.jpg" border="0" /></a> A system designed to prevent unauthorized <a href="http://www.webopedia.com/TERM/f/access.html" rtzwz="2">access</a> to or from a private <a href="http://www.webopedia.com/TERM/f/network.html" rtzwz="2">network</a>. <a class="kLink" id="KonaLink0" href="http://www.webopedia.com/TERM/f/firewall.html#" target="_top">Firewalls</a> can be implemented in both <a href="http://www.webopedia.com/TERM/f/hardware.html" rtzwz="2">hardware</a> and <a href="http://www.webopedia.com/TERM/f/software.html" rtzwz="2">software</a>, or a combination of both. Firewalls are frequently used to prevent unauthorized <a href="http://www.webopedia.com/TERM/f/Internet.html" rtzwz="2">Internet</a> users from accessing private networks connected to the Internet, especially <a href="http://www.webopedia.com/TERM/f/intranet.html" rtzwz="2">intranets</a>. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified <a href="http://www.webopedia.com/TERM/f/security.html" rtzwz="2">security</a> criteria.<br /><strong>There are several types of firewall techniques</strong>:<br />Packet filter: Looks at each <a href="http://www.webopedia.com/TERM/f/packet.html" rtzwz="2">packet</a> entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to <a href="http://www.webopedia.com/TERM/f/IP_spoofing.html" rtzwz="2">IP spoofing</a>.<br />Application gateway: Applies security mechanisms to specific applications, such as <a href="http://www.webopedia.com/TERM/f/FTP.html" rtzwz="2">FTP</a> and <a href="http://www.webopedia.com/TERM/f/Telnet.html" rtzwz="2">Telnet</a> <a class="kLink" id="KonaLink1" href="http://www.webopedia.com/TERM/f/firewall.html#" target="_top">servers</a>. This is very effective, but can impose a performance degradation.<br />Circuit-level gateway: Applies security mechanisms when a <a href="http://www.webopedia.com/TERM/f/TCP.html" rtzwz="0">TCP</a> or <a href="http://www.webopedia.com/TERM/f/UDP.html" rtzwz="0">UDP</a> connection is established. Once the connection has been made, packets can flow between the hosts without further checking.<br />Proxy server: Intercepts all messages entering and leaving the network. The <a href="http://www.webopedia.com/TERM/f/proxy_server.html" rtzwz="0">proxy server</a>HI-TECH DAV PUSHPANJALIhttp://www.blogger.com/profile/04606342971323605532noreply@blogger.com0tag:blogger.com,1999:blog-4289990218139826467.post-39349303277617886042008-03-13T22:54:00.000-07:002008-11-14T23:22:39.517-08:00Wi-Fi Technology<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpWihE0pCJcRt7drEa5hePIKaqCYQE0lAV60mVgex3paIVGwC6V2TXgkrXQN6LBSnhmjgJrgMTvvRuMRgzcma-nkh3vusSd5O8FJVcpF1HMrIYCUjnd-c_gJ9wbubXRKTRULooRR8bI-y5/s1600-h/wifi.jpg"><img id="BLOGGER_PHOTO_ID_5177472763037823746" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpWihE0pCJcRt7drEa5hePIKaqCYQE0lAV60mVgex3paIVGwC6V2TXgkrXQN6LBSnhmjgJrgMTvvRuMRgzcma-nkh3vusSd5O8FJVcpF1HMrIYCUjnd-c_gJ9wbubXRKTRULooRR8bI-y5/s200/wifi.jpg" border="0" /></a> Wi-Fi, also, WiFi, Wi-fi or wifi, is a brand originally licensed by the Wi-Fi Alliance to describe the underlying technology of wireless local area networks (WLAN) based on the IEEE 802.11 specifications.Wi-Fi was developed to be used for mobile computing devices, such as laptops, in LANs, but is now increasingly used for more services, including Internet and VoIP phone access, gaming, and basic connectivity of consumer electronics such as televisions and DVD players, or digital cameras. More standards are in development that will allow Wi-Fi to be used by cars in highways in support of an Intelligent Transportation System to increase safety, gather statistics, and enable mobile commerce IEEE 802.11p.A person with a Wi-Fib enabled device, such as a computer, cell phone, or personal digital assistant (PDA) can connect to the Internet when in proximity of an access point. The region covered by one or several access points is called a hotspot. Hotspots can range from a single room to many square miles of overlapping hotspots. Wi-Fi can also be used to create a Wireless mesh network. Both architectures are used in Wireless community network, municipal wireless networks like Wireless Philadelphia [1], and metro-scale networks like M-Taipei [2].Wi-Fi also allows connectivity in peer-to-peer mode, which enables devices to connect directly with each other. This connectivity mode is useful in consumer electronics and gaming applications.When the technology was first commercialized there were many problems because consumers could not be sure that products from different vendors would work together. The Wi-Fi Alliance began as a community to solve this issue so as to address the needs of the end user and allow the technology to mature. The Alliance created another brand "Wi-Fi CERTIFIED" to denote products are interoperable with other products displaying the "Wi-Fi CERTIFIED" brand.HI-TECH DAV PUSHPANJALIhttp://www.blogger.com/profile/04606342971323605532noreply@blogger.com0