Computer hardwares and their Inventors.

1: Key board— Herman Hollerith, first keypunch devices in 1930’s
2: Transistor— John Bardeen, Walter Brattain & Wiliam Shockley ( 1947-48)
3: RAM— An Wang and Jay Forrester (1951)
4: Trackball— Tom Cranston and Fred Longstaff (1952)
5: Hard Disk— IBM , The IBM Model 350 Disk File (1956 )
6: Integrated Circuit— Jack Kilby & Robert Noyce ( 1958)
7: Computer Mouse — Douglas Engelbart (1964)
8: Laser printer— Gary Starkweather at XEROX in1969.
9: Floppy Disk— Alan Shugart &IBM( 1970)
10: Microprocess­or— Faggin, Hoff & Mazor – Intel 4004 (1971)

Keyboard Shortcuts

Keyboard Shortcut
Have you ever thought of why almost all application has its own Custom keyboard shortcut?. well the reason is navigating to tools and menus with mouse takes much more time that doing the same task with the help of keyboard shortcuts.

  • CTRL+C (Copy)
  • CTRL+X (Cut)
  • CTRL+V (Paste)

Database Encryption.

Database Encryption

What is Database Encryption?
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).


Database security encompasses three main properties:

Encryption.

Hi folks, Often we come across this word Encryption, and then number of questions starts to arise like, what does this word encryption refer to?, How does it works?  well now I m going to discuss these things here with you...
First thing that we need to know is What is Encryption?   Encryption is the process of transforming Information (plain text) to unreadable hash using an algorithm called Cipher. and the reverse process that is to make the encrypted data readable again, is called Decryption.  In more practical terms, the encryption methods apply a certain routine to information so that it’s no longer recognizable as it’s original. With the right key, that was determined before encrypting the data and the accompanying routine for decrypting the information, the original information can be recovered. Cryptography was first pioneered many centuries ago.It was the work of specialists to create encryption routines for