Friday, December 3

Stars Information

 Each star in the sky is an enormous glowing ball of gas. Our sun is a medium-sized star.

Stars can live for billions of years. A star is born when an enormous cloud of hydrogen gas collapses until it is hot enough to burn nuclear fuel (producing tremendous amounts heat and radiation). As the nuclear fuel runs out (in about 5 billion years), the star expands and the core contracts, becoming a giant star which eventually explodes and turns into a dim, cool object (a black dwarf, neutron star, or black hole, depending on its initial mass). The largest stars have the shortest life span (still billions of years); more massive stars burn hotter and faster than their smaller counterparts (like the sun).


Stars are cosmic energy engines that produce heat, light, ultraviolet rays, x-rays, and other forms of radiation. They are composed largely of gas and plasma, a superheated state of matter composed of subatomic particles.
Though the most familiar star, our own sun, stands alone, about three of every four stars exist as part of a binary system containing two mutually orbiting stars.
No one knows how many stars exist, but the number would be staggering. Our universe likely contains more than 100 billion galaxies, and each of those galaxies may have more than 100 billion stars.
Yet on a clear, dark night Earth's sky reveals only about 3,000 stars to the naked eye. Humans of many cultures have charted the heavens by these stars.

Appearance
 
Some stars have always stood out from the rest. Their brightness is a factor of how much energy they put out, which is called their luminosity, and also how far away from Earth they are.
Stars in the heavens may also appear to be different colors because their temperatures are not all the same. Hot stars are white or blue, whereas cooler stars appear to have orange or red hues.
Stars may occur in many sizes, which are classified in a range from dwarfs to supergiants. Supergiants may have radii a thousand times larger than that of our own sun.
Hydrogen is the primary building block of stars. The gas circles through space in cosmic dust clouds called nebulae. In time, gravity causes these clouds to condense and collapse in on themselves. As they get smaller, the clouds spin faster because of the conservation of angular momentum—the same principle that causes a spinning skater to speed up when she pulls in her arms.

Building pressures cause rising temperatures inside such a nascent star, and nuclear fusion begins when a developing young star's core temperature climbs to about 27 million degrees Fahrenheit (15 million degrees Celsius).
Life Cycle
Young stars at this stage are called protostars. As they develop they accumulate mass from the clouds around them and grow into what are known as main sequence stars. Main sequence stars like our own sun exist in a state of nuclear fusion during which they will emit energy for billions of years by converting hydrogen to helium.
Stars evolve over billions of years. When their main sequence phase ends they pass through other states of existence according to their size and other characteristics. The larger a star's mass, the shorter its lifespan will be.

As stars move toward the end of their lives much of their hydrogen has been converted to helium. Helium sinks to the star's core and raises the star's temperature—causing its outer shell to expand. These large, swelling stars are known as red giants.
The red giant phase is actually a prelude to a star shedding its outer layers and becoming a small, dense body called a white dwarf. White dwarfs cool for billions of years, until they eventually go dark and produce no energy. At this point, which scientists have yet to observe, such stars become known as black dwarfs.
A few stars eschew this evolutionary path and instead go out with a bang—detonating as supernovae. These violent explosions leave behind a small core that may become a neutron star or even, if the remnant is large enough, a black hole.

Thursday, December 2

CSS History & Information

 

CSS is an acronym which means Cascading Style Sheets. As the name suggests, CSS is a special purpose stylesheet language and it helps in defining the format of presentation for any document that has been written in a markup language like the HTML. Mostly, CSS is used to define the presentation of HTML and XHTML documents. CSS gives great style to your web pages that are written in any markup language.
If you are new to CSS, then you must keep in mind the basic purpose of CSS. The basic purpose of CSS is to separate the content of a web document (written in any markup language) from its presentation (that is written using Cascading Style Sheets). There are lots of benefits that you can extract through CSS like improved content accessibility, better flexibility and moreover, CSS gives you a level of control over various presentation characteristics of the document. It also helps in reducing the complexity and helps in saving overall presentation time. CSS gives the option of selecting various style schemes and rules according to your requirements and it also allows the same HTML or XHTML document to be presented in more than one varying style. Isn’t it great? Let’s now have a b3rief look at the history of Cascading Style Sheets.

 

! the Blog!On Letsrider

 

Since the development of SGML (Standard Generalized Markup Language), style sheets have been used. Style Sheets dates back to the 1970S, however, later Cascading Style Sheets were created with a purpose of drawing a distinct line between the content of the document (written in a markup language) and the presentation of the document. Cascading Style Sheets gained more popularity as the HTML grew along the way. CSS evolved in the lights of expert web developers who incorporated their demanding features in it.

 

 

 

Excellent visual text editor for developing CSS

Excellent visual text editor for developing CSS

Do you know that W3C introduced nine different style sheets in order to improve the presentation of web pages? Out of these nine various style sheets; two became the foundation of Cascading Style Sheets. Those two style sheets were CHSS (Cascading HTML Style Sheets) and SSP (Stream-based Style Sheet).


Now, as you have learnt a bit about CSS, its time to know something about the syntax of CSS that is critical when using CSS. Make sure that you have the pre-requisite knowledge of CSS. In order to work on CSS, you must know some markup languages like HTML or XHTML so that you can add personalized styles on the markup documents. Before you move on towards the syntax of CSS, let’s refresh some basic concepts of CSS.
  • CSS is an acronym which means Cascading Style Sheets
  • The main purpose of CSS is to define the presentation of HTML elements
  • All styles are defined and stored in Style sheets
  • After storing styles in a separate style sheet files, these are added into HTML documents.
  • Defining the style outside the html document helps in saving lots of work and time
  • CSS allows you to define more than one style in one style sheet; known as the cascading of styles
Let’s now move towards the syntax of CSS. For all our learners; do keep in mind that there are three major parts of CSS syntax; a selector, a property and a value; selector {property: value}
  • Selector: HTML elements are usually called as the selectors and these are the subject of your presentations. You change the style of these selectors by changing one of many attributes.
  • Property: property is any characteristic of the selector that you wish to change like color, size etc.
  • Value: is what you wish the style to be. Following simple example would illustrate it all
For instance, if you want to change the color of the body of your HTML document into black; then body would become the selector because you are selecting the body part of the html document to be changed. Property would be the attribute that you want to change which is the color of the body and the value would be the new color that you want to give to the body.
Body {color : black}
You can also add multiple properties and values in the same line of code using semi colon. For instance
P {text-align : right ; color : blue}
In order to make your style definitions more readable, you can define each property along with its value on a separate line. For instance
P
{
text-align: right;
color : blue;
}

 For further information on CSS, please follow our further sections that will assist you in finding better online learning resources for learning CSS

Wednesday, December 1

Heart Attack


A heart attack occurs when blood flow to a section of heart muscle becomes blocked. If the flow of blood isn’t restored quickly, the section of heart muscle becomes damaged from lack of oxygen and begins to die.

Heart attack is a leading killer of both men and women in the United States. But fortunately, today there are excellent treatments for heart attack that can save lives and prevent disabilities. Treatment is most effective when started within 1 hour of the beginning of symptoms. If you think you or someone you’re with is having a heart attack, call 9–1–1 right away.


Overview

Heart attacks occur most often as a result of a condition called coronary artery disease (CAD). In CAD, a fatty material called plaque (plak) builds up over many years on the inside walls of the coronary arteries (the arteries that supply blood and oxygen to your heart). Eventually, an area of plaque can rupture, causing a blood clot to form on the surface of the plaque. If the clot becomes large enough, it can mostly or completely block the flow of oxygen-rich blood to the part of the heart muscle fed by the artery.

Figure A is an overview of a heart and coronary artery showing damage (dead heart muscle) caused by a heart attack. Figure B is a cross-section of the coronary artery with plaque buildup and a blood clot.

During a heart attack, if the blockage in the coronary artery isn’t treated quickly, the heart muscle will begin to die and be replaced by scar tissue. This heart damage may not be obvious, or it may cause severe or long-lasting problems.

Severe problems linked to heart attack can include heart failure and life-threatening arrhythmias (irregular heartbeats). Heart failure is a condition in which the heart can’t pump enough blood throughout the body. Ventricular fibrillation is a serious arrhythmia that can cause death if not treated quickly.



Get Help Quickly

Acting fast at the first sign of heart attack symptoms can save your life and limit damage to your heart. Treatment is most effective when started within 1 hour of the beginning of symptoms.

The most common heart attack signs and symptoms are:


Chest discomfort or pain—uncomfortable pressure, squeezing, fullness, or pain in the center of the chest that can be mild or strong. This discomfort or pain lasts more than a few minutes or goes away and comes back.

Upper body discomfort in one or both arms, the back, neck, jaw, or stomach.

Shortness of breath may occur with or before chest discomfort.

Other signs include nausea (feeling sick to your stomach), vomiting, lightheadedness or fainting, or breaking out in a cold sweat.

If you think you or someone you know may be having a heart attack:
 start of symptoms.
If your symptoms stop completely in less than 5 minutes, still call your doctor.

Only take an ambulance to the hospital. Going in a private car can delay treatment.

Take a nitroglycerin pill if your doctor has prescribed this type of medicine.


Outlook

Each year, about 1.1 million people in the United States have heart attacks, and almost half of them die. CAD, which often results in a heart attack, is the leading killer of both men and women in the United States.

Many more people could recover from heart attacks if they got help faster. Of the people who die from heart attacks, about half die within an hour of the first symptoms and before they reach the hospital.
 The heart is a muscle like any other in the body. It needs blood flow to supply oxygen to allow it to do work. When there isn't enough oxygen, the muscle starts to suffer, and when there is no oxygen, the muscle starts to die.

Heart muscle gets its blood supply from arteries that start in the aorta and run on the surface of the heart, known as the coronary arteries. The right coronary artery supplies the right ventricle of the heart and the inferior (lower) portion of the left ventricle. The left anterior descending coronary artery supplies the majority of the left ventricle, while the circumflex artery supplies the back of the left ventricle.
 
Over time, cholesterol buildup can occur in these blood vessels in the form of plaque. This narrows the artery and can restrict the amount of blood that can flow through it. If the artery becomes too narrow, it cannot supply enough blood to the heart muscle when it becomes stressed. Just like arm muscles that begin to hurt if you lift too much, or legs that ache when you run too fast; the heart muscle will ache if it doesn't get adequate blood supply. This ache is called angina.

If the plaque ruptures, a small blood clot can form within the blood vessel and acutely block the blood flow. When that part of the heart loses its blood supply completely, the muscle dies. This is called a heart attack, or an MI - a myocardial infarction (myo=muscle +cardial=heart; infarction=death due to lack of oxygen).

What is hacking? 

Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)

Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target.

We work with IBM Consulting and its customers to design and execute thorough evaluations of their computer and network security. Depending on the evaluation they request (ranging from Web server probes to all-out attacks), we gather as much information as we can about the target from publicly available sources. As we learn more about the target, its subsidiaries and network connectivity, we begin to probe for weaknesses.


Examples of weaknesses include poor configuration of Web servers, old or unpatched software, disabled security controls, and poorly chosen or default passwords. As we find and exploit vulnerabilities, we document if and how we gained access, as well as if anyone at the organization noticed. (In nearly all the cases, the Information Syhstems department is not informed of these planned attacks.) Then we work with the customer to address the issues we've discovered.

The number of really gifted hackers in the world is very small, but there are lots of wannabes.... When we do an ethical hack, we could be holding the keys to that company once we gain access. It's too great a risk for our customers to be put in a compromising position. With access to so many systems and so much information, the temptation for a former hacker could be too great -- like a kid in an unattended candy store.

MORE About Hacking

 Hackers are highly skilled computer gurus who break into computer systems for a variety of reasons, from financial gain to just for the fun of a challenge. Despite these activities being illegal, the hacker community has maintained momentum for decades and shows no signs of slowing down.

Function:

 Hacking is an activity that is engaged in by people who use their knowledge of the internet, computers, firewalls and security preferences to break into other people's computers, allowing them to view private information, alter data and steal files, information or programs. MySpace pages, software applications and email accounts are the most common programs that are hacked into. Hackers typically look for passwords or credit card information. Some will simply hack into these programs in order to change information, such as a screen name, password or other content that is written by the owner.

Significance:

Hackers are sometimes motivated by greed and steal personal information in order to take on someone's identity for their own gain, or in politics, where they try to exploit, blackmail or otherwise expose someone in power, or even just for entertainment, where hackers simply want to see what they are capable of doing. These types of hackers usually brag about their conquests on message boards or instant messaging programs, competing with fellow hackers as to who is the best among them.

History:

 The first case of hacking occurred in the 1960s when a group of students at the Massachusetts Institute of Technology (MIT) tried to access the school's main computing systems. In the 1970s, "phone phreaks" hacked into telephone networks and made toll-free calls. Mainstream computer hacking as we know it today gained momentum in the 1980s when hackers broke into what would now be considered message boards. Congress passed the Computer Fraud and Abuse Act in 1986, which made it illegal for anyone to break into anyone else's computer system. Despite the law, the 1990s saw the invention of the Trojan Horse, which allowed hackers to access any computer that downloaded the program. Many companies were hacked into as well, such as AOL, Yahoo!, Amazon and eBay.

Types:

There are at least five main types of hackers. A hacktivist uses his hacker skills in order to broadcast a political message on the Internet. A cyberterrorist commits acts out of a desire to wreak havoc and cause harm to groups who he feels oppose him and his beliefs. A black hat typically breaks into a network in order to obtain information that will allow him to commit fraud or theft. A white hat may commit the same hacking acts as other hackers, but is not motivated by a malicious intent. A script kiddie uses hacking software in order to break into someone else's computer system. This software is usually obtained from another hacker who has figured out how to corrupt that specific program's system.

Features:

Most hackers are talented computer programmers. They know how to write software and how to remove the kinks from other programs that are written by the hacking community. The most important feature of someone who hacks, however, is the "hacker mindset," a set of beliefs that the hacker community has established. The core belief is that it is OK to hack into someone else's computer and to obtain, distribute or otherwise exploit any information that may be found in the process. Hackers usually strongly believe in their First Amendment rights and believe that hacking falls under this umbrella.

Tuesday, November 30

Divorce Law Process in UK

A brief look at the process involved in getting a divorce in the UK.Nobody spends their wedding day considering what might happen if the marriage were to break down: that simply isn’t romantic. Unfortunately, it is the grim reality that a great many marriages end in divorce, so it is important to be aware of divorce law and the process for dissolving a marriage.
Actually the process for divorcing in the UK is relatively simple. What complicate the matter are the problems that come with divorce, such as dividing assets or organising child custody. In fact, an uncomplicated divorce, although rare, can be done entirely by post, without the need for a family law solicitor and without stepping foot in court.
Either partner can petition for a divorce, providing they have been married for a year or more and that they live in England and Wales. The petitioning partner must prove that the marriage has ‘irretrievably broken down’ in order for a divorce to be granted. That means demonstrating that adultery has been committed, unreasonable behaviour has been experienced or that one partner has been the victim of desertion. Alternatively,if the couple has been separated for two years and both want a divorce, or five years if one party does not consent, then divorce may also be granted.


The first stage is that the person petitioning for divorce (the petitioner) sends the petition to the court and the husband or wife. Normally the other partner will agree to the divorce, but should it be contested expect to appear in court. If the case is straightforward and the judge is happy to grant your divorce then you will be sent a form telling you
the date and time when your divorce will be granted. This is called ‘pronouncing the decree nisi.’


Following the decree nisi, the last stage is the decree absolute. Thisis when the divorce is made official and final. At this point there is no going back as the divorce is finalised and irrevocable.



This whole process has been known to take as little as four to six months. But remember that this is very rare. Any disagreement or complication can make the process more complex and drawn out, so it is often worth
consulting a family law solicitor. 

Monday, November 29

404 and HTTP What do all the codes mean?


A question that comes up often -- especially with regards site stats -- is "What do all the codes mean?

Web standards are governed by documents prepared by standards committees, approved, and then implemented world-wide. Following are notes extracted from RFC2068, the draft governing document for the hypertext protocol.

Message Number Categories


Because you usually only see one or two error numbers it's easy to believe that's all there are. Actually, there are families of numbers; and, not all are errors. We'll explore each family and its members below.

1xx Codes (
Information). There are a few official codes in the one hundred range. But, if you see one you have probably stumbled onto some sort of experimental application. In this case, what you see will be non-standard and could be most anything.
 
100 (Continue). An interim response telling the browser the initial part of its request has been received and not rejected by the server. A final response code should be sent when the remainder of the material has been sent.


101 (Switching Protocols). The browser may wish to change protocols it's using. If such a request is sent and approved by the server this response is given.


2xx Codes (Success). The two hundred range is reserved for successful responses. You probably won't see one of these codes, but your browser will receive them and know that whatever request was sent by the browser was received, understood, and accepted.

 
200 (OK). The request was successful and information was returned. This is, by far, the most common code returned on the web.

201 (Created). If a POST command is issued by a browser (usually in processing a form) then the 201 code is returned if
the resource requested to be created was actually created. If there is a delay in creating the resource the response should be 202, but may be 201 and contain a description of when it will be created.

202 (Accepted). If a request for processing was sent and accepted but not acted upon
and the delay in acting is unknown, then this code should be sent instead of 201. Note that 202 does not commit to processing the request; it only says the request was accepted. A pointer to some status monitor for the task is often included with this response so users can check back later. 


203 (Non-Authoritative Information). Usually the preliminary information sent from a server to a browser comes directly from the server. If it does not, then this code might also be sent to indicate that information did not come from a known source.


204 (No New Content). The request was accepted and filled but no new information is being sent back. The browser receiving this response should not change its screen display (although new, and changed, private header information may be sent).

205 (Reset Content). When you fill in a form and send the data, the server may send this code telling the browser that the data was received and the action carried out so the browser should now clear the form (or reset the display in some manner).

206 (Partial Content). This code indicates the server has only filled part of a specific type of request.
 
3xx (Redirection). The 3xx codes indicate some need for further action by your browser. User action may or may not be necessary to cause this further action to take place; often it will just happen automatically. There are safeguards built into the specification designed to prevent infinite loops, which can sometimes result from automatic redirection.


300 (Multiple Choice). You should not see 300 standing alone; it serves as a template for the following specific codes.

301 (Moved Permanently). As the name implies, the addressed resource has moved and all future requests for that resource should be made to a new URL. Sometimes there is an automatic transfer to the new location.

302 (Moved Temporarily). The addresses resource has moved, but future requests should continue to come to the original URL. Sometimes there is an automatic transfer to the new location.

303 (See Other). The response to your browser's request can be found elsewhere. Automatic redirection may take place to the new location.

304 (Not Modified). In order to save bandwidth your browser may make a conditional request for resources. The conditional request contains an "If-Modified-Since" field and if the resource has not changed since that date the server will simply return the 304 code and the browser will use its cached copy of the resource.

305 (Use Proxy). This is notice that a specific proxy server must be used to access the resource. The URL of the proxy should be provided.
 
4xx (Client Error). The 4xx codes are the ones you are most likely to actually see; particularly code 404.
These codes indicate some sort of error has happened.

400 (Bad Request). The server did not understand the request. This is usually cured by resending the request.

401 (Unauthorized). The request requires some form of authentication (e.g., userid and/or password) but did not contain it. Usually, this code results in a box popping up in your browser asking you for the required
information. Once you supply it the request is sent again.

402 (Payment Required). Reserved for future use. [Who says the web is not moving toward being a commercial medium!]

403 (Forbidden). This is a sort of catch-all refusal.If the server understood the request but, for whatever
reason, refuses to fill it, a code 403 will often be returned. The server may or may not explain why it is
sending a 403 response and there is not much you can do  about it.




404 (Not Found). If you happen to mistype a URL or enter an old one that no longer exists this is the
error you will likely see. The condition may be temporary or permanent but this information is rarely
provided. Sometimes code 403 is sent in place of 404.

405 (Method Not Allowed). Your browser has requested a resource using a procedure not allowed to obtain that resource. The response should contain allowed procedures.


406 (Not Acceptable). Your browser said only certain response types will be accepted and the server says the content requested does not fit those response types. (This is one way content monitoring can be implemented.)


407 (Proxy Authentication Required). This code is similar to 401, except that the browser must first authenticate itself.


408 (Request Timeout). Your browser waited too long and the server timed out. A new request must be sent.


409 (Conflict). If a site allows users to change resources and two users attempt to change the same

resource there is a conflict. In this, and other such situations, the server may return the 409 code and
should also return information necessary to help the user (or browser) resolve the conflict.

410 (Gone). Code 410 is more specific than 404 when a resource can't be found. If the server knows, for a

fact, that the resource is no longer available and no forwarding address is known, then 410 should be
returned. If the server does not have specific information about the resource, then 404 is returned.

411 (Length Required). For some processes a server needs to know exactly how long the content is. If the

browser does not supply the proper length code 411 may result.

412 (Precondition Failed). A browser can put conditions on a request. If the server evaluates those conditions and comes up with a false answer, the 412 code may be returned.


413 (Request Entity Too Large). If your browser makes a request that is longer than the server can process code 413 may be returned. Additionally, the server may even close the connection to prevent the request from being resubmitted (this does not mean a
phone connection will hang up; just that the browser's link to the site may be terminated and have to be started over again).

414 (Request-URI Too Long). You will likely not see this one as it is rare. But, if the resource address you've sent to the browser is too long this code will result. One of the reasons this code exists is to give

the server a response when the server is under attack by someone trying to exploit fixed-length buffers by
causing them to overflow. 


415 (Unsupported Media Type). If your browser makes a request using the wrong format, this code may result.
 
5xx (Server Error). The 5xx series of codes indicate cases where the server knows it has made an error or is
not capable of answering the request. In most cases the server should include some information explaining the
error and say if the situation is temporary or permanent.

500 (Internal Server Error). An unexpected condition prevented the server from filling the request.

501 (Not Implemented). The server is not designed (or does not have the software) to fill the request.

502 (Bad Gateway). When a server acts as a go-between it may receive an invalid request. This code is returned when that happens.

503 (Service Unavailable). This code is returned when  the server cannot respond due to temporary overloading or maintenance. Some users, for example, have limited accounts which can only handle so many requests per day or bytes send per period of time. When the limits are
exceeded a 503 code may be returned.

504 (Gateway Timeout). A gateway or proxy server timed out without responding.

505 (HTTP Version Not Supported). The browser has requested a specific transfer protocol version that is
not supported by the server. The server should return what protocols are supported.

What Can Webmasters Do?

Users get frustrated by error messages that don't really tell them anything. Even the descriptions above
for the various return codes don't say what you, the user, can do.

Webmasters can help. By analyzing their logs a webmaster can determine which error codes are being
returned to users. For the most common, more descriptive error messages can be generated and the
system told to use them. This latter is done using a file named ".htaccess" placed in the main directory for
the web site. [.htaccess is used for Web hosts using
UNIX or some UNIX offshoot.]
The .htaccess file can control many things, but to help with error messages the webmaster has only to insert
line(s) of the form (each of these should be on a line by itself starting with "ErrorDocument" but they may be
wrapped in this display):


ErrorDocument 402 "
 
ErrorDocument 403 /forbidden.html

ErrorDocument 404 http://cknow.com/notfound.html

Note that the ErrorDocument command can have raw HTML code (note the leading quote only; no ending quote), file references, or URL references. Use whichever is appropriate to help users when they encounter errors at your site. If nothing else, include a 404 ErrorDocument command to help those who mistype something. If you don't they may not come back!

If you want to really help (and keep the search engines happy), when you change your Web site layout consider adding "redirect" lines into the .htaccess file. These cause requests to specific files that have been moved to be automatically directed to their new location and gives feedback to the search engines that the URL has changed. There are two forms you can use:

Sunday, November 28

Stock Market Tips


This article is a COMPLETE guide to the basics of making money in the stock market! If you are considering investing in the stock market, you MUST read this article! We have explained all the concepts and talked about all the "myths" that people have about the stock market!

What are stocks? Definition:


Plain and simple, a “stock” is a share in the ownership of a company.

A stock represents a claim on the company's assets and earnings. As you acquire more stocks, your ownership stake in the company becomes greater.


Note: Some times different words like shares, equity, stocks etc. are used. All these words mean the same thing.


So what does ownership of a company give you?


Holding a company's stock means that you are one of the many owners (shareholders) of a company and, as such, you have a claim to everything the company owns.


This means that technically you own a tiny little piece of all the furniture, every trademark, and every contract of the company. As an owner, you are entitled to your share of the company's earnings as well.


These earnings will be given to you. These earnings are called “dividends” and are given to the shareholders from time to time.


A stock is represented by a "stock certificate". This is a piece of paper that is proof of your ownership. However, now-a-days you could also have a “demat” account. This means that there will be no “stock certificates”. Everything will be done though the computer electronically. Selling and buying stocks can be done just by a few clicks.


Being a shareholder of a public company does not mean you have a say in the day-to-day running of the business. Instead, “one vote per share” to elect the board of directors of the company at annual meetings is all you can do. For instance, being a Microsoft shareholder doesn't mean you can call up Bill Gates and tell him how you think the company should be run.

The management of the company is supposed to increase the value of the firm for shareholders. If this doesn't happen, the shareholders can vote to have the management removed. In reality, individual investors like you and I don't own enough shares to have a material influence on the company. It's really the big boys like large institutional investors and billionaire entrepreneurs who make the decisions.


For ordinary shareholders, not being able to manage the company isn't such a big deal. After all, the idea is that you don't want to have to work to make money, right? The importance of being a shareholder is that you are entitled to a portion of the company’s profits and have a claim on assets.


Profits are sometimes paid out in the form of dividends as mentioned earlier. The more shares you own, the larger the portion of the profits you get. Your claim on assets is only relevant if a company goes bankrupt. In case of liquidation, you'll receive what's left after all the creditors have been paid.


Another extremely important feature of stock is "limited liability", which means that, as an owner of a stock, you are "not personally liable" if the company is not able to pay its debts.


In other legal structures such as partnerships, if the partnership firm goes bankrupt the creditors can come after the partners “personally” and sell off their house, car, furniture, etc. To understand all this in more detail you could read our “How to incorporate?” article.


Owning stock means that, no matter what happens to the company, the maximum value you can lose is the value of your stocks. Even if a company of which you are a shareholder goes bankrupt, you can never lose your personal assets.

Networking Tips

Mesh Topoloy:
In this topology, every node has a dedicated point-to-point connection to every other node on the network. A fully connected mesh network has n(n-1)/2 channels to link 'n' devices. Therefore, every device on the network must have 'n-1' input/output (I/O) ports.
 
In mesh network, each node is directly connected to all nodes on the network. This type of network involves the concept of routes. In this type of network, each node may send message to destination through multiple paths. It means that each node of mesh network has several possible paths to send (or to receive) message, but in Bus, Star, Ring and Tree topologies each node has only one path.

Advantages

Mesh topology has the following advantages:
It has multiple links, so if one route is blocked then other routes can be used for data communication.

Each connection can have its own data load, so the traffic problem is eliminated.


It ensures the data privacy or security, because every message travels along a dedicated link.


Troubleshooting of this topology is easy as compared to other
networks.

Its performance is not affected with heavy load of
data transmission.
Disadvantages

Mesh topology has the following disadvantages:


It becomes very expensive because a large number of cabling and 110 ports are required.

It is difficult to install.
  Tree Topology:
In tree network, the nodes are connected to each other in such a way that forms a tree like structure. Typically to form a tree network, multiple star topologies are combined together. This type of network has combined features of bus and star topology.

On tree topology the hubs of each star topology are connected to the central hub that controls the entire network. However, some nodes can be directly connected to the central hub. The tree topology configuration is shown in figure below.


The central Hub in the tree network is an active hub. It contains a repeater (a hardware device), which re-generates the received bit patterns. The secondary hubs usually are passive hubs. The passive hub controls the nodes directly connected to it and exchange data to other devices connected to the other secondary hubs (or same hub) through the central hub. The secondary hub may also be active hub if another secondary hub is directly connected to it. The cable TV network is an example of tree topology, where main cable is divided into, branches and each branch is further divided into smaller branches and so on. The hub is used when a branch is created.

 
Advantages

The tree topology has the same advantages as star topology but it has some additional advantages. These are.

It allows more devices to be connected to the central Hub.


Disadvantages

The tree topology also has the same disadvantages as star topology built has some additional disadvantages such as:
It because more expansive because more hubs are required to install the network.
 
Hybrid Topology:

Hybrid network is the combination of different topologies such as star, Ring, Mesh, Bus etc. For example, if a department uses a Bus network, second department uses the ring network, third department uses the Mesh network and fourth department uses the star network. All the networks of different types (of four departments) can be connected together through a central hub.

 
Line Configuration:

Line configuration refers to the way two or more communication devices attached to a link. Line configuration is also referred to as connection. A link is a communication medium through which data is communicated between devices. For communication to occur between two devices, they must be connected to the same link at the same time. There are two possible types of line configurations or connections. These connections are.


Point-to-point connection:


Multipoint connection:


Point-to-Point Connector:

 
The point-to-point connection provides a dedicated link between two communication devices. The entire link or channel is reserved for two devices for data communication, and no other devices can use the dedicated link. Usually, in this type of connection, the two devices are connected together with a cable.

It must be noted that microwave and satellite dedicated links are also possible. Two computers connected together (point-to-point) through microwave link.

When you change the television channel by remote control, you are establishing a point-to-point connection between the remote control and the television’s control system.

Multipoint Connection:

Multipoint connection is also referred to as multidrop connection. This type of connection allows multiple devices (more than two devices) to share a single link.
 
The Telephone Network

The public switched telephone network (PSTN) is the world-wide telephone system and usually this network system uses the digital technology. In the past, it was used for voice communication only but now it is playing very important role for data communication in the computer network such as in the Internet. There are different types of telephone lines that are used for data communication in the network. These are discussed below.


1. Dial-Up Lines

It is a temporary connection that uses one or more analog telephone lines for communication. Modem is used at the sending end as well as at the receiving end. A telephone number is dialed from the sending end through modem and the modem at the receiving end answers the call. In this way, connection is established for data communication between computers or electronic devices. In dial up line connection, the cost of data communication is very low. The mobile users can also access the Internet through this connection.


2. Dedicated Lines

It is a permanent connection that is used to establish connection between two devices permanently. It is better than dial-up line connection because dedicated lines provide a constant connection. These types of connections may be digital or analog. The data transmission speed, of digital lines is very fast as compare to analog dedicated line. The data transmission speed is also measured in bits per second (bps). In dial-up and dedicated lines, it is up to 56 Kbps. The dedicated lines are mostly used for
business purposes. The most important digital dedicated lines are described below.


1) ISDN Lines

ISDN stands for Integrated Services Digital Network. It is a set of standards used for digital transmission over telephone line. The ISDN uses the multiplexing technique to carry three or more data signals at once through the telephone line. It is because the data transmission speed of ISDN line is very fast. In ISDN line, both ends of connections require the
ISDN modem and a special telephone set for voice communication. Its data transmission speed is up to 128 Kbps.

2) DSL

DSL stands for
Digital Subscriber Line. It is another digital line. In DSL, both ends of connections require the network cards and DSL modems for data communication. The data transmission speed and other functions are similar as ISDN line. DSL transmits data on existing standard copper telephone wiring. Some DSLs provide a dial tone, which allows both voice an4 data communication.

3) ADSL

The ADSL (Asymmetric Digital Subscriber Line) is another digital connection. It is faster than DSL. ADSL is much easier to install and provides much faster data transfer rate. Its data transmission speed is from 128 Kbps up to 10 Mbps. This connection is ideal for Internet access.

 4) Cable Television Line

The Cable Television (CATV) line is not a standard telephone line. It is a dedicated line used to access the Internet. Its data transmission speed is 128 Kbps to 3 Mbps.


A cable modem is used with the CATV. it provides a
high speed Internet connections through the cable television network. A cable modem sends and receives digital data over the cable television network.
To access the Internet using the CATV network, the CATV Company installs a splitter inside your house. From the splitter, one part of the cable runs to your television and other part connects to the cable modem. A cable modem usually is an external device, in which one end of a cable connects to a CATV wall outlet while the other end plugs into a port (such as on an Ethernet card) in the system unit.

5) T-Carrier Lines

It is very fast digital line that can carry multiple signals over a single communication line whereas a standard dialup telephone line carries only one signal. T-carrier lines use multiplexing so that multiple signals share the line. T-carrier lines provide very fast data transfer rates. The T-carrier lines are very expensive and large companies can afford these lines. The most popular T-carrier lines are:

 
TI Line


T3 Line


i) T1 Line


The most popular T-carrier line is the Ti line (dedicated line). Its data transmission speed is 1.5 Mbps. Businesses often use Ti lines to connect to the Internet. Many ISPs use Ti, lines to connect to the Internet backbone. Another type of TI line is the fractional TI line. It is slower than TI line but it is less expensive. The home and business users use this line to connect to the Internet and share a connection to the Ti line with other users.


ii) T3 Line

Another most popular and faster T-carrier line is T3 line. Its data transmission speed is 44 Mbps. It is more expensive than Ti line. The main users of T3 line are telephone companies and ISPs. The Internet backbone itself also uses T3 lines.
6) Asynchronous Transfer Mode (ATM)
It is very, fast data transmission connection line that can carry data, voice, video, multimedia etc. Telephone networks, Internet and other network use ATM. In near future, ATM will become the Internet standard for data transmission instead of T3 lines. Its data transmission speed is from 155 Mbps to 600 Mbps. 

Subscribe to RSS Feed Follow me on Twitter!