Site hosted by Angelfire.com: Build your free website today!

ASk ME!!!!
Frequently Asked Questions(FAQ)
What is Computer virus?

               A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm, however, can spread itself to other computers without needing to be transferred as part of a host. A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files. Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.

The term comes from the term virus in biology. A computer virus reproduces by making, possibly modified, copies of itself in the computer's memory, storage, or over a network. This is similar to the way a biological virus works.

Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.


What is Global Positioning System?
                   The Global Positioning System (GPS), is currently the only fully functional Global Navigation Satellite System (GNSS). More than two dozen GPS satellites are in medium Earth orbit, transmitting signals allowing GPS receivers to determine the receiver's location, speed and direction.

Since the first experimental satellite was launched in 1978, GPS has become an indispensable aid to navigation around the world, and an important tool for map-making and land surveying. GPS also provides a precise time reference used in many applications including scientific study of earthquakes, and synchronization of telecommunications networks.

Developed by the United States Department of Defense, it is officially named NAVSTAR GPS (NAVigation Satellite Timing And Ranging Global Positioning System). The satellite constellation is managed by the United States Air Force 50th Space Wing. The cost of maintaining the system is approximately US$750 million per year,[1] including the replacement of aging satellites, and research and development. Despite this fact, GPS is free for civilian use as a public good.
 
Online shopping is the process consumers go through to purchase products or services over the Internet. An online shop, e-shop, internet shop, webshop or online store evokes the physical analogy of buying products or services at a bricks-and-mortar retailer or in a shopping mall. It is an electronic commerce application used for business-to-business electronic commerce (B2B) or business-to-consumer electronic commerce (B2C). Online shopping is popular mainly because of its speed and ease of use. Some issues of concern can include fluctuating exchange rates for foreign currencies, local and international laws and delivery methods.

An advantage of shopping online is being able to use the power of the internet to seek out the lowest prices or the best deals available for items or services. For example if one is buying a digital camera he/she should enter "digital camera" into a search engine or a price search engine. Most price comparison services have the advantage of store ratings and reviews. Getting the lowest price is important but it is more important to make sure the merchant or store the customer is purchasing from is reputable. There are some online stores that display ridiculously low prices, but when you call them you may find out that the item you're seeking is out of stock. This is called the "bait and switch" technique. The best way to avoid backorder disappointment is to contact the online store by phone and verify that the product you're seeking is in stock. If you're told that there's only one left, then place your order by phone.

The differences between the online prices and local store prices also rely on the shipping cost and tax. A wise customer would consider the final prices instead of just product prices.

What is Online Shopping?
Online shopping is the process consumers go through to purchase products or services over the Internet. An online shop, e-shop, internet shop, webshop or online store evokes the physical analogy of buying products or services at a bricks-and-mortar retailer or in a shopping mall. It is an electronic commerce application used for business-to-business electronic commerce (B2B) or business-to-consumer electronic commerce (B2C). Online shopping is popular mainly because of its speed and ease of use. Some issues of concern can include fluctuating exchange rates for foreign currencies, local and international laws and delivery methods.

An advantage of shopping online is being able to use the power of the internet to seek out the lowest prices or the best deals available for items or services. For example if one is buying a digital camera he/she should enter "digital camera" into a search engine or a price search engine. Most price comparison services have the advantage of store ratings and reviews. Getting the lowest price is important but it is more important to make sure the merchant or store the customer is purchasing from is reputable. There are some online stores that display ridiculously low prices, but when you call them you may find out that the item you're seeking is out of stock. This is called the "bait and switch" technique. The best way to avoid backorder disappointment is to contact the online store by phone and verify that the product you're seeking is in stock. If you're told that there's only one left, then place your order by phone.

The differences between the online prices and local store prices also rely on the shipping cost and tax. A wise customer would consider the final prices instead of just product prices.

What is computer hacking?
A hacker is often someone who likes to create and modify computer software or computer hardware, including computer programming, administration, and security-related items. A hacker is also someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems to get extra functionality or performance. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context (see the hacker definition controversy).

In computer programming, a hacker is a software designer and programmer who builds elegant, beautiful programs and systems. A hacker can also be a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. For some, "hacker" has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This pejorative form of the noun "hack" is even used among users of the positive sense of "hacker" (some argue that it should not be due to this pejorative meaning, but others argue that some kludges can, for all their ugliness and imperfection, still have "hack value").

In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite them.

In other technical fields, hacker is extended to mean a person who makes things work beyond perceived limits through their own technical skill, such as a hardware hacker, or reality hacker. Hackers are often seen as harmful people when in fact they can and do help solve technical problems.

In hacker culture, a hacker is a person who has attained a certain social status and is recognized among members of the culture for commitment to the culture's values and a certain amount of technical knowledge.


What is email?
Electronic mail (abbreviated "e-mail" or, often, "email") is a store and forward method of composing, sending, storing, and receiving messages over electronic communication systems. The term "e-mail" (as a noun or verb) applies both to the Internet e-mail system based on the Simple Mail Transfer Protocol (SMTP) and to intranet systems allowing users within one organization to e-mail each other. Often these workgroup collaboration organizations may use the Internet protocols for internal e-mail service.

The message header consists of fields, usually including at least the following:
From: The e-mail address, and optionally name, of the sender of the message
To: The e-mail address[es], and optionally name[s], of the receiver[s] of the message
Subject: A brief summary of the contents of the message
Date: The local time and date when the message was originally sent

Each header field has a name and a value. RFC 2822 specifies the precise syntax. Informally, the field name starts in the first character of a line, followed by a ":", followed by the value which is continued on non-null subsequent lines that have a space or tab as their first character. Field names and values are restricted to 7-bit ASCII characters. Non-ASCII values may be represented using MIME encoded words.

Note that the "To" field in the header is not necessarily related to the addresses to which the message is delivered. The actual delivery list is supplied in the SMTP protocol, not extracted from the header content. The "To" field is similar to the greeting at the top of a conventional letter which is delivered according to the address on the outer envelope. Also note that the "From" field does not have to be the real sender of the e-mail message. It is very easy to fake the "From" field and let a message seem to be from any mail address. It is possible to digitally sign e-mail, which is much harder to fake. Some Internet service providers do not relay e-mail claiming to come from a domain not hosted by them, but very few (if any) check to make sure that the person or even e-mail address named in the "From" field is the one associated with the connection. Some internet service providers apply e-mail authentication systems to e-mail being sent through their MTA to allow other MTAs to detect forged spam that might apparently appear to be from them.

Other common header fields include:

Cc: carbon copy
Bcc: Blind Carbon Copy
Received: Tracking information generated by mail servers that have previously handled a message
Content-Type: Information about how the message has to be displayed, usually a MIME type

Many e-mail clients present "Bcc" (Blind carbon copy, recipients not visible in the "To" field) as a header field. Different protocols are used to deal with the "Bcc" field; at time the entire field is removed, and at times the field remains but the addresses therein are removed. Addresses added as "Bcc" are only added to the SMTP delivery list, and do not get included in the message data. There are differing impressions on the RFC 2822 Protocol pertaining to this subject.


What is e-commerce?
Electronic Commerce is exactly analogous to a marketplace on the Internet. Electronic Commerce (also referred to as EC, e-commerce eCommerce or ecommerce) consists primarily of the distributing, buying, selling, marketing and servicing of products or services over electronic systems such as the Internet and other computer networks. The information technology industry might see it as an electronic business application aimed at commercial transactions; in this context, it can involve electronic funds transfer, supply chain management, e-marketing, online marketing, online transaction processing, electronic data interchange (EDI), automated inventory management systems, and automated data collection systems. Electronic commerce typically uses electronic communications technology of the World Wide Web, at some point in the transaction's lifecycle, although of course electronic commerce frequently depends on computer technologies other than the World Wide Web, such as databases, and e-mail, and on other non-computer technologies, such as transportation for physical goods sold via e-commerce.

E-Commerce according to Person Halls book E-Commerce started in 1994 with the first banner ad being placed on a website.

According to the October 2006 Forrester Research report entitled, "US eCommerce: Five-Year Forecast And Data Overview, "Nontravel online retail revenues will top the quarter-trillion-dollar mark by 2011. The diver of this growth? A segment of the most active Web shopping households that is roughly 8 million strong. This group of consumers is extremely comfortable with technology and values convenience above all else in the online retail experience. As retailers begin to wade through their copious data warehouses and understand the who, what, when, where, why, and how of this segment, they will benefit from targeting these customers."