Corporate Crowdsourcing

Friday, December 7, 2007

How to save a wet cellphone

Ever dropped your cell phone in the sink, or even worse the toilet? Did you ever leave it in your pocket and run it through the washer? It usually means you have to replace your phone, but sometimes if you're fast you can save the phone.


1. Remove the Battery. This is one of the most important steps. Don't take time to think about it, electricity and water do not mix. Cutting power to your phone is a crucial first step in saving it.
2. Dry your Phone. Obviously you need to remove as much of the water as soon as you can to prevent it from getting into the phone. Use a towel or a paper towel to remove as much of the water as possible.
3. Soak in Alcohol. Alcohol is hygroscopic (attracts water), it will dissolve all the water in the phone, which will then pour out of the phone with the alcohol. Any remaining alcohol will evaporate. Alcohol will not harm your phone but may mess up glue (from stickers and the like). Use 95% alcohol, not the regular 70% rubbing type. Do it outside!. If you use alcohol, do not follow the rest of the advice here, instead leave your phone outside for a day or two to dry.
4. Allow the phone to dry. Since you do not want to ruin your phone or lose all the numbers in your phone book, you need to allow the phone to dry. Don't try putting the battery back on to see if it works as this would risk damaging the phone with a short circuit. Leaving your phone in a bowl of dry rice will help to expedite moisture evaporation.
5. Heat your Phone. Apply enough heat to your phone to cause the water to evaporate without waterlogging your digital screen. One of the best things you can do to save a cell phone is to set it on the back of your computer monitor or TV screen over the heat vents. This is usually the perfect amount of heat to fix your phone. The convection action of the heat vents will help carry away the moisture in your phone. Leave the phone on the heat for at least 2-3 days. Another option is to leave it overnight in the oven on warm (make sure to take off the battery first).
6. Test your Phone. After you have waited 3 days, make sure everything is clean and dry looking and re-attach the battery to the phone and see if it works. If your phone does not work repeat step 4. If it still won't work, try taking your cell phone to an authorized dealer. Sometimes they can fix it.

Tips :

* Don't put the battery on for at least 3 days or longer if your digital screen is foggy.
* Place a piece of satin finish scotch tape over your water damage sticker before you drop your cell phone in the water to prevent the water damage sticker from voiding your warranty. This sticker can usually be found under your battery. It's a small round white sticker, possibly with dots on it. If this sticker gets wet it changes color and your phone is marked for water damage.
* Remove the tape if you ever have to return your phone for repairs or warranty. (See the note in the 'Warnings' section about doing this!)
* The best way to dry out your phone is to place it in front of an air conditioner or air conditioning vent. Cold air won't damage your phone (hot air can warp or in extreme cases even melt plastic), and air from an air conditioner is dry, and so will evaporate water faster than you might think (which is why a car air conditioner will de-mist the windshield so effectively, even if the engine hasn't warmed up yet). Warm air from a reverse-cycle air conditioner works even better, of course. If you dry your phone in this way overnight it should be fine by the morning.
* Use a hairdryer set on warm; it won't melt your head so your phone should be safe.
* Use a food dehydrator.
* Use the oven on the warm setting (make sure to take out the battery)

Warnings :

* Don't heat the battery or it could leak acid. If you use an oven or hairdryer, make sure to remove the battery first.
* If you use alcohol make sure to do so outside, and do not apply heat in any form, not even the gentle heat of a monitor. Do not hook up the bettery till the alcohol smell dissipates.
* Do not apply heat to your phone other than mentioned above. You don't want to melt or burn your phone.
* Warranty fraud is naughty! If you dropped your phone in the can with your other 'droppings'--are you really going to send it in for a warranty tech to have to open? Yuck!
* FYI, Most modern phones have more than one liquid damage indicator on them, only one visible to you (and sales/technician agents), and chances are, if the sticker under the battery is triggered (or would be, with the scotch tape trick), then the odds are that the internal stickers you can't access are tripped as well. This will still result in you paying a voided-warranty fee in the long run, and it may be best to just learn from your mistake (and not make it more financially severe!).
* Even if all these steps are followed, minerals dissolved in the water can precipitate on solder and component pins, causing corrosion or shorting. Components pins are packed so closely together in a modern cell phone that even a small encrustation can create a short, rendering the phone inoperable.

Cellphones are dangerous/not dangerous, hearing loss edition

Apparently, talking on a cellphone for 60 minutes or more per day can result in a partial loss of hearing — at least that’s what some researchers in India are saying. The scientists conducted an experiment to test the correlation of hearing loss to the average use of a cellphone call. The experiment covered 100 participants with cellphone usage ranging from four years and over to just started using a cellphone. The results? Long-time users seemed to suffer some high-frequency hearing loss, usually in their right ears — the ear most commonly used for chatting on the celly. There also seemed to be some correlation between warm, full, or ringing sensations in the ear.

Facts about NOKIA phone

Here are some facts of our beloved phone company "NOKIA"

1) The ringtone "Nokia tune" is actually based on a 19th century guitar work named "Gran Vals" by Spanish musician Francisco Tárrega. The Nokia Tune was originally named "Grande Valse" on Nokia phones but was changed to "Nokia Tune" around 1998 when it became so well known that people referred to it as the "Nokia Tune."

2) The world's first commercial GSM call was made in 1991 in Helsinki over a Nokia-supplied network, by Prime Minister of Finland Harri Holkeri, using a Nokia phone.

3) Nokia is currently the world's largest digital camera manufacturer, as the sales of its camera-equipped mobile phones have exceeded those of any conventional camera manufacturer.

4) The "Special" tone available to users of Nokia phones when receiving SMS (text messages) is actually Morse code for "SMS". Similarly, the "Ascending" SMS tone is Morse code for "Connecting People," Nokia's slogan. The "Standard" SMS tone is Morse code for "M" (Message).

5) The Nokia corporate font (typeface) is the AgfaMonotype Nokia Sans font, originally designed by Eric Spiekermann. Previously in advertising and in its mobile phone User's Guides Nokia mostly used the Agfa Rotis Sans font.

6) In Asia, the digit 4 never appears in any Nokia handset model number, because 4 is considered unlucky in many parts of Southeast/East Asia.

7) Nokia was listed as the 20th most admirable company worldwide in Fortune's list of 2006 (1st in network communications, 4th non-US company).

8. Unlike other modern day handsets, Nokia phones do not automatically start the call timer when the call is connected, but start it when the call is initiated. (Except for Series 60 based handsets like the Nokia 6600)

9) Nokia is sometimes called aikon (Nokia backwards) by non-Nokia mobile phone users and by mobile software developers, because "aikon" is used in various SDK software packages, including Nokia's own Symbian S60 SDK.

10) The name of the town of Nokia originated from the river which flowed through the town. The river itself, Nokianvirta, was named after the old Finnish word originally meaning sable, later pine marten. A species of this small, black-furred predatory animal was once found in the region, but it is now extinct.

Monday, November 5, 2007

Harmfull to use your Mobile Phone......Beware





How Two Russian Journalists Cooked an Egg with their Mobile Phones

How Two Russian Journalists Cooked an Egg with their Mobile Phones

Vladimir Lagovski and Andrei Moiseynko from Komsomolskaya Pravda Newspaper in Moscow decided to learn first-hand how harmful cell phones are. There is no magic in cooking with your cell phone. The secret is in the radio waves that the cell phone radiates.

The journalists created a simple microwave structure as shown in the picture. They called from one cell phone to the other and left both phones on talking mode. They placed a tape recorder next to phones to imitate sounds of speaking so the phones would stay on.

There is no magic in cooking with your cell phone. The secret is in the radio waves that the cell phone radiates.

After, 15 minutes: The egg became slightly warm.

25 minutes: The egg became very warm.

40 minutes: The egg became very hot.

65 minutes: The egg was cooked. (As you can see.)

65 minutes: The egg was cooked. (As you can see.)



Comments: The "news" that radio frequency emissions from a pair of cell phones can be harnessed for cooking caused quite a stir in the blogosphere when it broke last February. Skeptics insisted it was impossible -- that the slight wattage emitted by mobile phones isn't strong or consistent enough to heat an object to cooking temperature. Some tried to replicate the experiment, without success. Others investigated the original source of the information, the Wymsey Village Web, and questioned its authenticity. Mightn't the name "Wymsey" be a clue?

Sure enough, the site's Webmaster, one Charles Ivermee of Southampton, U.K., stepped forward to acknowledge authorship of the article and confirm that its content was purely satirical, not factual. "It was 6 years ago," Ivermee told Gelf Magazine, "but I seem to recall that there was a lot of concern about people's brains getting fried and being from a radio/electronics background I found it all rather silly. So I thought I'd add to the silliness." He expressed bewilderment at how seriously people seemed to be taking it. One British exam study site, he said, had republished the information without even attempting to verify it.

Thursday, September 20, 2007

Introduction to Web Hosting & u now learn to host

Basic Things u Should Know:

How does the Web work? How can I make my own Web Site?

What is a Web Host? What is an Internet Service Provider?




Search for “Web Hosting” in my blog for service providers




THIS IS Just an Introduction PLZ DOWNLOAD AND READ THE REMAINING WHICH U FIND IN THE BOTTOM OF THIS PAGE:





What is the World Wide Web?

  • The Web is a network of computers all over the world.
  • All the computers in the Web can communicate with each other.
  • All the computers use a communication standard called HTTP.

How does the WWW work?

  • Web information is stored in documents called web pages.
  • Web pages are files stored on computers called web servers.
  • Computers reading the web pages are called web clients.
  • Web clients view the pages with a program called a web browser.
  • Popular browsers are Internet Explorer and Mozilla Firefox.

How does a Browser Fetch a Web Page?

  • A browser fetches a page from a web server by a request.
  • A request is a standard HTTP request containing a page address.
  • An address may look like this: http://www.someone.com/page.htm.

How does a Browser Display a Web Page?

  • All web pages contain instructions for display
  • The browser displays the page by reading these instructions.
  • The most common display instructions are called HTML tags.

What is a Web Server?

  • The collection of all your web pages is called your web site.
  • To let others view your work, you must publish your web site.
  • To publish your work, you must copy your site to a web server.
  • Your own PC can act as a web server if it is connected to a network.
  • Most common is to use an Internet Service Provider (ISP).

What is an Internet Service Provider?

  • ISP stands for Internet Service Provider.
  • An ISP provides Internet services.
  • A common Internet service is web hosting.
  • Web hosting means storing your web site on a public server.
  • Web hosting normally includes email services.
  • Web hosting often includes domain name registration.

Summary

If you want other people to view your web site, you must copy your site to a public server. Even if you can use your own PC as a web server, it is more common to let an Internet Service Provider (ISP) host your site.

Included in a Web hosting solution you can expect to find domain name registration and standard email services.

You can read more about domain name registration, email and other services in the next chapters of this tutorial.

Hosting Your Own Web

Hosting your web site on your own server is always an option. Here are some problems to consider:

Hardware Expenses

To run a "real" web site, you will have to buy some powerful server hardware. Don't expect that a low cost PC will do the job. You will also need a permanent (24 hours a day ) high speed connection to your office, and such connections are expensive.

Software Expenses

Don't forget to count the extra cost for software licenses. Remember that server licenses often are much higher than client licenses. Also note that some server software licenses might have limits on number of concurrent users.

Labor Expenses

Don't expect low labor expenses. Remember that you have to install your own hardware and software. You also have to deal with bugs and viruses, and keep your server constantly running in an environment where "everything could happen".


Using an Internet Service Provider

Renting a server from an Internet Service Provider (ISP) is a common option. Here are some advantages:

Connection Speed

Most providers have very fast connections to the Internet, like full T3 fiber-optic 45Mps connections equivalent to about 2000 traditional (28K) modems or 1000 high speed (56K) modems.

Powerful Hardware

Service providers often have many powerful web servers that can be shared by several companies. You can also expect them to have an effective load balancing, and necessary backup servers.

Security and Stability

Internet Service Providers are specialists on web hosting. Expect their servers to have more than 99% up time, the latest software patches, and the best virus protection.





Download the Microsof Word document file to read the remaining content
Here:

EzGenerator Website Builder v.2.8

EZGenerator is a website builder targeted at the home users and organisations looking for an easy and affordable solution to create a high quality and goodlooking website.

All graphical elements & menu structures are automatically generated based on an impressive collection of over 2000 graphical templates (must see!). Comes with E-commerce Module (selling goods online never has been easier), Picture Album (publish digital pictures), Catalog Lister (publish collections: DVD/CD/MP3s, any portfolio, ...) and a full blown Contact Manager.

EZGenerator requires no technical skills , works without special CGI scripts and is not limited to proprietary hosting services.

EZGenerator makes site management a breeze and allows you to make immediate updates to your site from your home or office PC with an Internet connection.

PHP Solutions Dynamic Web design Made Easy

Book Description
In this book you'll learn how to:

* Create dynamic web sites with design and usability in mind, as well as functionality
* Understand how PHP scripts work, giving you confidence to adapt them to your own needs
* Bring online forms to life, check required fields, and ensure user input is safe to process
* Upload files and automatically create thumbnails from larger images
* Manage web site content with a searchable database

You want to make your web sites more dynamic by adding a feedback form, creating a private area where members can upload images that are automatically resized, or perhaps storing all your content in a database. The problem is, you're not a programmer and the thought of writing code sends a chill up your spine. Or maybe you've dabbled a bit in PHP and MySQL, but you can't get past baby steps. If this describes you, then you've just found the right book. PHP and the MySQL database are deservedly the most popular combination for creating dynamic web sites. They're free, easy to use, and provided by many web hosting companies in their standard packages. Unfortunately, most PHP books either expect you to be an expert already or force you to go through endless exercises of little practical value. In contrast, this book gives you real value right away through a series of practical examples that you can incorporate directly into your sites, optimizing performance and adding functionality such as file uploading, email feedback forms, image galleries, content management systems, and much more. Each solution is created with not only functionality in mind, but also visual design. But this book doesn't just provide a collection of ready-made scripts: each PHP Solution builds on what's gone before, teaching you the basics of PHP and database design quickly and painlessly. By the end of the book, you'll have the confidence to start writing your own scripts or&8212;if you prefer to leave that task to others to adapt existing scripts to your own requirements. Right from the start, you're shown how easy it is to protect your sites by adopting secure coding practices. The book has been written with an eye on forward and backward compatibility recommending the latest PHP 5 techniques, but providing alternative solutions for servers still running PHP 4.3. All database examples demonstrate how to use the original MySQL extension, MySQL Improved, or the PHP Data Objects (PDO) introduced in PHP 5.1, letting you choose the most suitable option for your setup. Summary of Contents:


* Chapter 1: What Is PHP and Why Should I Care?
* Chapter 2: Getting Ready to Work with PHP
* Chapter 3: How to Write PHP Scripts
* Chapter 4: Lightening Your Workload with Includes
* Chapter 5: Bringing Forms to Life
* Chapter 6: Uploading Files
* Chapter 7: Using PHP to Manage Files
* Chapter 8: Generating Thumbnail Images
* Chapter 9: Pages That Remember: Simple Login and Multipage Forms
* Chapter 10: Setting Up MySQL and phpMyAdmin
* Chapter 11: Getting Started with a Database
* Chapter 12: Creating a Dynamic Online Gallery
* Chapter 13: Managing Content
* Chapter 14: Solutions to Common PHP/MySQL Problems
* Chapter 15: Keeping Intruders at Bay

Paperback: 488 pages
Publisher: friends of ED (November 20, 2006)
Language: English

Monday, September 3, 2007

15 Firefox Tricks

Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.

But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.

1) More screen space. Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.

2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.

3) Keyboard shortcuts. This is where you become a real Jedi. It just takes a little while to learn these, but once you do, your browsing will be super fast. Here are some of the most common (and my personal favs):

* Spacebar (page down)
* Shift-Spacebar (page up)
* Ctrl+F (find)
* Alt-N (find next)
* Ctrl+D (bookmark page)
* Ctrl+T (new tab)
* Ctrl+K (go to search box)
* Ctrl+L (go to address bar)
* Ctrl+= (increase text size)
* Ctrl+- (decrease text size)
* Ctrl-W (close tab)
* F5 (reload)
* Alt-Home (go to home page)

4) Auto-complete. This is another keyboard shortcut, but it’s not commonly known and very useful. Go to the address bar (Control-L) and type the name of the site without the “www” or the “.com”. Let’s say “google”. Then press Control-Enter, and it will automatically fill in the “www” and the “.com” and take you there - like magic! For .net addresses, press Shift-Enter, and for .org addresses, press Control-Shift-Enter.

5) Tab navigation. Instead of using the mouse to select different tabs that you have open, use the keyboard. Here are the shortcuts:

* Ctrl+Tab (rotate forward among tabs)
* Ctrl+Shft+Tab (rotate to the previous tab)
* Ctrl+1-9 (choose a number to jump to a specific tab)

6) Mouse shortcuts. Sometimes you’re already using your mouse and it’s easier to use a mouse shortcut than to go back to the keyboard. Master these cool ones:

* Middle click on link (opens in new tab)
* Shift-scroll down (previous page)
* Shift-scroll up (next page)
* Ctrl-scroll up (decrease text size)
* Ctrl-scroll down (increase text size)
* Middle click on a tab (closes tab)

7) Delete items from address bar history. Firefox’s ability to automatically show previous URLs you’ve visited, as you type, in the address bar’s drop-down history menu is very cool. But sometimes you just don’t want those URLs to show up (I won’t ask why). Go to the address bar (Ctrl-L), start typing an address, and the drop-down menu will appear with the URLs of pages you’ve visited with those letters in them. Use the down-arrow to go down to an address you want to delete, and press the Delete key to make it disappear.

8) User chrome. If you really want to trick out your Firefox, you’ll want to create a UserChrome.css file and customize your browser. It’s a bit complicated to get into here, but check out this tutorial.

9) Create a user.js file. Another way to customize Firefox, creating a user.js file can really speed up your browsing. You’ll need to create a text file named user.js in your profile folder (see this to find out where the profile folder is).

10) about:config. The true power user’s tool, about.config isn’t something to mess with if you don’t know what a setting does. You can get to the main configuration screen by putting about:config in the browser’s address bar. See Mozillazine’s about:config tips and screenshots.

11) Add a keyword for a bookmark. Go to your bookmarks much faster by giving them keywords. Right-click the bookmark and then select Properties. Put a short keyword in the keyword field, save it, and now you can type that keyword in the address bar and it will go to that bookmark.

12) Speed up Firefox. If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads. This allows Firefox to load multiple things on a page at once, instead of one at a time (by default, it’s optimized for dialup connections). Here’s how:

* Type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them):
* Set “network.http.pipelining” to “true”
* Set “network.http.proxy.pipelining” to “true”
* Set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.
* Also, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives.

13) Limit RAM usage. If Firefox takes up too much memory on your computer, you can limit the amount of RAM it is allowed to us. Again, go to about:config, filter “browser.cache” and select “browser.cache.disk.capacity”. It’s set to 50000, but you can lower it, depending on how much memory you have. Try 15000 if you have between 512MB and 1GB ram.

14) Reduce RAM usage further for when Firefox is minimized. This setting will move Firefox to your hard drive when you minimize it, taking up much less memory. And there is no noticeable difference in speed when you restore Firefox, so it’s definitely worth a go. Again, go to about:config, right-click anywhere and select New-> Boolean. Name it “config.trim_on_minimize” and set it to TRUE. You have to restart Firefox for these settings to take effect.

15) Move or remove the close tab button. Do you accidentally click on the close button of Firefox’s tabs? You can move them or remove them, again through about:config. Edit the preference for “browser.tabs.closeButtons”. Here are the meanings of each value:

* 0: Display a close button on the active tab only
* 1Default) Display close buttons on all tabs
* 2on’t display any close buttons
* 3isplay a single close button at the end of the tab bar (Firefox 1.x behavior)

20 Worst Windows Features

From Windows 95's active desktop to Vista's UAC, a loving tribute to the tools, technologies, and applets that drive us absolutely bonkers.



In November of 1985, Microsoft released Windows 1.0. And thus began Windows' 22-year reign (to date) as the world's most popular, most irritating computing platform. Which Windows features have been responsible for the most angst?




1. ActiveX Controls

For years, ActiveX--the technology which dates all the way back to Windows 3.0's OLE (Object Linking and Embedding)?had not one but two majorly pernicious effects on computer users. Folks who use Web sites that run ActiveX applets on their PCs open themselves up to security risks, since an ActiveX control can do pretty much anything it wants on your PC once you'd told it to run. And the fact that ActiveX runs only in Internet Explorer in Windows stunted the growth of alternative browsers and operating systems for years. ActiveX controls still exist, but with some exceptions--mostly related to Microsoft "benefits" like Windows Update and Windows Genuine Advantage--it's easier than ever to ignore them. Thank goodness for that.

2. The Registry

Ever wonder why the U.S. power grid is so fragile that that a blip at one power plant in Cleveland can black out the Eastern Seaboard? We ask the same thing about Windows' Registry: Why did Microsoft put so many vital pieces of Windows configuration data in one place, where a minor problem with that single file can turn into a full-tilt PC disaster? You can back up your Registry religiously. You can run Registry cleaning utilities. You can edit the Registry very, very carefully, should you dare to edit it at all. But you can't eliminate the possibility that it'll bring Windows to its knees.

3. Internet Explorer 6

Beginning in the mid-1990s, Microsoft fought the browser wars against Netscape with all it had. With Internet Explorer 6, released in 2001, though, it seemed to declare "Mission accomplished." For five long years, IE barely changed, even as competitors such asFirefox and Opera showed there were plenty of ways to make browsing better. At the same time, attacking IE 6 security holes became a full-time occupation for an army of hackers--and patching them up turned into part-time work for everyone who used the browser. IE 7, released in 2006, is a passable upgrade, but wouldn't the world have been a better place if it had shown up two or three years earlier?

4. Notifications

Hey, you've just installed a program!A network cable is missing! You've got icons on your desktop you're not using! Windows is constantly alerting us to stuff it thinks we should know, usually by means of word balloons that pop up from the System Tray. (Which, incidentally, is more accurately called the TaskBar Notification Area.) An amazing percentage of these messages are painfully obvious, irrelevant, or just plain inaccurate. Never have so many computer users been distracted from their work by interruptions so useless.

5. Messenger Service

Just perusing the article in Microsoft's knowledge base about this alert service (no relation to the Windows Messenger IM client)is enough to make you shudder: "If advertisements are opening on your computer in a window titled Messenger Service, it may indicate that your system is not secure...some advertisers have started using this service to send information via the Internet, and these messages could be used maliciously to distribute a virus." Windows XP SP2 disabled it by default; Vista eliminated it. Good riddance.

6. Windows Update

There are lots of things you can criticize about Windows XP's approach to software patches. But when we asked around, the biggest complaint by far was how the OS's Windows Update feature (also known as Microsoft Update) pops up a dialog box nagging you to reboot your PC) and continues to do so every ten minutes until you obey. (Ignore it, and the machine may reboot if you walk away for a moment, sometimes destroying unsaved data in the process.) That dialog box is in desperate need of a button marked "I'll Reboot When I'm Damn Well Ready." Windows Vista's version doesn't offer that, but it does allow you to wait up to four hours before being pestered again.

7. User Access Control

Nobody can argue that the idea behind UAC is crummy: If the computer is about to do something that's potentially risky, it makes sense to verify that the PC's user wants it to happen.UAC in practice, however, is incredibly clunky, from the alarming screen blackout to the often cryptic dialog box asking for permission to the way UAC gets in the way of humble tasks that ren't particularly riky. We hope that Vista gets a more polished UAC someday--this version is so annoying it's tempting to just disable it and take your chances with attackers.

8. End Task

A program hangs. You type to bring up the Task Manager, then click End Task to kill the app. Nothing happens. You try again and again, and it eventually works. Or doesn't. Why is such a basic operating-system need so flaky in 2007? We're not sure. Especially since Mac OS X's equivalent feature, Force Quit, manages to work perfectly every time.

9. Windows Genuine Advantage

Is Microsoft entitled to fight pirates? Absolutely. But Windows Genuine Advantage, which makes you do a piracy check before downloading software from Microsoft.com, and displays nag notes if it thinks your copy of Windows is stolen, leaves millions of Microsoft customers caught in the crossfire. The first version with the nagging "feature" got installed with security updates and was famous for mistaking legit copies of Windows for stolen ones. To this day, trying to download software from Microsoft in Firefox is a miserable experience. And to add insult to inconvenience, Microsoft's marketing for WGA says it's all being done to help customers verify that their software isn't counterfeit.

10. Windows 95 USB

Today, it's hard to imagine living without USB. Back in 1997, it was hard to live with it. Windows 95 predated the USB standard, so support was added via a patch known as Windows 95 OSR2.1. When we tried it out with early USB peripherals, they worked only sporadically, and sometimes trashed the PC--and OSR2.1 managed to trash our Win 95 machine so badly that we had to reinstall the operating system from scratch. Twice. Win 98 did add built-in USB support, but in a form that was far from fabulous: Bill Gates famously managed to crash a PC during an onstage demo when he plugged a USB scanner into it.

11. Windows Explorer

If your memory stretches back to the pre-Windows 95 age, you remember Windows' File Manager. You might even miss it--Windows Explorer, even in Vista, lacks some of the features File Manager had, such as the ability to use wildcards to filter a view down to documents of a certain type. Then there features that Explorer has always needed and never gotten, like the ability to print a list of the files in a folder. As often happens, a third party has done what Microsoft hasn't: VCOM's PowerDesk is a worthy utility that's exactly what File Manager should have evolved into.

12. The Microsoft Network

Never used the original version of MSN, which shipped with Windows 95? Consider yourself fortunate. Dating from the pre-Web days when AOL was the hottest thing online, MSN 1.0 tried to bring a Win 95-style interface to online services--forums, for instance, were shortcuts that sat inside desktop folders. But the whole thing was unintuitive, sparse on content, and excruciatingly slow (connection speeds initially topped out at 14.4-kbs). And by the time it debuted, it was already an anachronism, forcing Microsoft to reinvent MSN as an ISP and purveyor of Web services.

13. Windows XP Search

It's kind of astonishing: Windows users had to wait nearly a quarter century, until Windows Vista, for an OS with really good search features. Windows XP Search may be the worst of all, with an interface that's as patronizing as it is sluggish and confusing. You search with the help of a talking dog who even Microsoft's own site says some people "loathe".

14. Active Desktop

You could make a case that Active Desktop (which originated as part of IE4.0's Windows Desktop Update and became part of the OS with Windows 98) was a decent idea a decade too early. Part of the short-lived "push" fad of the mid-1990s, it piped Web content directly to your Windows wallpaper, where it would sit and auto-update itself. That's the same basic idea as current OS enhancers such as Yahoo Widget Engine, Apple's Dashboard, and, come to think of it, Vista's Gadgets. But in an era of slow PCs and even slower dial-up connections, Active Desktop was famous mostly for making Windows run like molasses.

15. Windows Aero

Transparent Windows borders! That let you see the stuff beneath them! The Aero user interface, which Microsoft touted as one of the major breakthroughs in Windows Vista, are (mildly) cool when they work as advertised. But the upside of Aero seems tiny given the hardware oomph required: For PCs with less-than-potent graphics (including ones on sale today), Aero is a machine-choking headache. In fact, Vista sometimes decides on its own to turn off Aero without telling you. Don?t worry--you're really not missing much.

16. Paint

Call this applet the Rip Van Winkle of Windows software. Paint has been bundled with Windows since version 1.0 back in 1985, and it's changed remarkably little over the decades. (That's the Windows 3.0 edition, known as Paintbrush, in the image above.) With Vista's real photo-related features living in a different app called Windows Photo Gallery, it seems a safe bet that Microsoft won't ever bring Paint into the new millennium. If you want a taste of what Paint should be in 2007, check out the superb free photo editor known as Paint.net.

17. Shut Down

Some people gripe about how long Windows takes to boot up. Us, we're more aggravated by how long it takes to shut down--and how often it seems to just give up before it's completed the job. Microsoft says that shutting down works better in Vista, and it seems to--but we still get puzzled by the array of different ways to end a Windows session.

18. Web TV for Windows

New versions of Windows always seem to come with at least one much-hyped feature which instantly sinks into obscurity. Windows 98 had the decidedly lackluster WebTV For Windows--which, confusingly didn't have much to do with Microsoft's WebTV set-top box. Instead, it let you watch the tube (via a tuner card) and peruse TV listings. It also offered interactive TV features through Intel's short-lived Intercast service. At the time, we said it was "slow and unstable, clashed with Windows 98's screen savers, and locked up regularly even when nothing else was running." Fun bonus: The software also introduced a security flaw that could allow hackers to take over your PC.

19. Windows Movie Maker

Windows Me--which we declared the fourth worst product of all time--introduced Windows Movie Maker 1.0, Microsoft's answer to Apple's then-new iMovie video editor. You could say it was a tad bare bones: As we said in our original review, it didn't do titling or effects, offered a grand total of one transition effect, and could output video in only a proprietary format. Version 2.0, which came with Windows XP, was the first respectable one--although even it didn't live up to the Windows XP commercial it was featured in, which showed XP users flying Superman-style to the beat of Madonna's "Ray of Light." As for Windows Vista's Movie Maker 6.0, our biggest question is this: What happened to 3.0, 4.0, and 5.0?

20. DriveSpace

In a day in which half a terabyte of hard disk costs $99, it's easy to forget that megabytes were once a rare and precious commodity, and disk-compression utilities felt slightly miraculous. Microsoft's DoubleSpace was introduced with DOS 6.0 in 1993; after a patent suit by competitor Stac Electronics, it was replaced with a non-infringing twin, DriveSpace, which was part of Windows 95. DriveSpace did indeed squeeze about twice the stuff onto a disk, but the risk was immense, since data recovery was much tougher if something went awry. Windows XP was the first version without DriveSpace support of any sort--by then, nobody noticed or cared.

Speed up ur Hard disk

To speed up your hard disk speedwe need to configure a special bufferin the computer's memory in order to enable it to better deal with interrupts made from the disk.

This tip is only recommended if you have 256MB RAM or higher.
Follow these steps:

Run SYSEDIT.EXE from the Run command.

Expand the system.ini file window.

Scroll down almost to the end of the file till you find a line called [386enh].

Press Enter to make one blank line, and in that line type

Irq14=4096

Note: This line IS CASE SENSITIVE!!!

Click on the File menu, then choose Save.

Close SYSEDIT and reboot your computer.

Done. Speed improvement will be noticed after the computer reboots.

Set your favourite video as Wallpaper

Just follow the steps given below:

1.Download VLC Media Player and install it.

2.Run VLC media player,go to Settings->preferences->Interface->Main interfaces,then click on wxWidgets.Remove the tick on "Taskbar" and put a tick on "Systray icon".

3.Now go to Video->Output Modules->DirectX.On the bottom right put a tick on advanced options check box.You will now see some options.Put a tick on "Enable Wallpaper Mode ".

4.Now,select playlist and put a check or tick on "Repeat current item ".

5.Press the Save button.Now close the Vlc player and run it again(to save the settings permanently).

6.Now play any video you would like to set as Wallpaper.Right click on the video and click on "Wallpaper".The video would be set as your wallpaper!!!!



Since you have checked the option "repeat current item ",the selected video will play on continuously.It will start again when finished.VLC player will remain in your system tray.If you wish to remove the wallpaper simply close the player and you will get back your original wallpaper.

(In case you want to undo all the setting changes and go back to VLC default setting just press the reset all" button......)

It seems to work for me so i thought u people would like it too.......

Increase Your Internet Bandwidth By 20%!!!

Increase your Bandwidth by 20%
Windows uses 20% of your bandwidth! Get it back

A nice little tweak for XP. M*crosoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)

Here's how to get it back:

Click Start-->Run-->type "gpedit.msc" without the "

This opens the group policy editor. Then go to:

Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth

Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :

"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.
works on XP Pro, and 2000
other OS not tested.

Note: Do not limit it to 0%, It cuts your speed, Suggest 1-2% only.

Make FIREFOX browser run at full speed





These are few steps to make your firefox run at lightining speed

1. first in the URL bar, Type “about:config”. This will bring up a list of commands and variables you can edit.

2. The second step is to put “network.http.pipelining” in the filter and change the value to “true”.

3. After that you will want to put “network.http.proxy.pipelining” in the filter.
Like the last one, make that value set to “true” also.

4. Next, locate “network.http.pipelining.maxrequests” and change the value to some number higher, say 10,20 or even 30, it would make up to 10,20 or 30 requests at once.

5. The last step is to right click anywhere and select “New” then “Integer”. Name it “nglayout.initialpaint.delay” and make its value “0″. This will make the browser respond faster on the information of the websites it receives.

6. Close out FireFox (make sure FireFox is closed by viewing the Task Manager) and restart it and enjoy the new mega speed
Now you can browse through the net in top speed of your internet connection

Crack wireless connections!

WI-FI Buster can be used to recover WEP keys from XP's Wireless Zero Configuration utility.



Perfect for long drives if you stop at the coffee shop and dont want to pay for wifi to simply check your email.

Run this tool and grab the WEP key and your in!

I modified this so its ALOT easier to use

Bypass Rapidshare Time Limits - Simple Hacks

Rapidshare Downloader - For Dynamic IP Users, or Different Proxy Users only.

Grabber


Copy the Link, and Click Grab. If it says to Wait. Renew the IP and Try again. Supports Download Managers as well.


Bypass MegaUpload Toolbar Navigator Time Limits - Simple Hacks

For IE (Any Version)
  1. Go to Start and click Run, then type regedit.
  2. Go to: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\User Agent\Post Platform]
  3. Right click on Post Platform > New > String Value.
  4. Keep "Alexa Toolbar" as a name for the string. Don't do anything else, or else it won't work.
For Firefox.

Start using Mozilla Firefox with extension : - User Agent switcher

OR


Download and install it from :

Code:
https://addons.mozilla.org/firefox/59/
  1. Now open Firefox, go to Tools > User Agent Switcher > Options > Options
  2. In the new opened window, click on User Agents
  3. In the next window click on Add
  4. In the next window type information as follows :

Quote:
Description : - MEGAUPLOAD
User Agent : -

+ Description: MEGAUPLOAD
+ User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Alexa Toolbar)
  • Then Click on OK, again click on OK.
Once you have done the above. open Firefox again
  1. Go to Tools > User Agent Switcher > click on MEGAUPLOAD
  2. Now you can enter a downlaod link in the address bar & hurray no SLOTS issue!!
OR
  • Go to address bar and type: about:config
  • Search for general.useragent.extra.firefox

  • Double click on it
  • Change the default text with this: Firefox/2.0.0.4 MEGAUPLOAD 1.0
    (or simply the version number under Help-->About)
  • Start Downloading witout any Toolbar


Note: Repeat the Steps Over and Over Again everytime u visit a Link

How to make a virus with notepad

Index
1. Tools
2. What makes a virus a virus
3. Making your first batch file
4. Making a batch virus
5. Destructive commands
6. Most common tricks used to make someone open the file


1. Tools
To make a batch program you will need a text program (ex. Word,notepad,wordpad etc…) A keyboard if you don’t have one you can use the ON-screen keyboard
To get to the on-screen keyboard start>all programs>accessories>accessibility


2. What makes a virus a virus
When people think of a virus they think of a computer virus but the word virus came from a virus that’s in your body. They also think a virus is meant to delete or destroy things. They normally do but a virus is called a virus because, it copies itself. Like a virus in your body it copies it self to other cells cause it can’t live with out a host. Same with a computer virus with out a file or a program a virus can’t be made.
So all a computer virus is: a program that copies it self ,but some people put destructive code in it.

3. Making a Batch file
I’m going to use notepad you can use what ever you want

We are also going to make a “Hello World” Application that is the first program you make in any language

When making a batch file you are always going to use this line first

@echo off

You can turn it on if you like. All that does is telling the program not to tell its location. If you turn it on then the program will tell were it is at on the computer.
You can experiment a little if you want.

Now we are going to make it say Hello World

To do this we need a echo command which looks like this
echo

This tells the program to write something since we want it to say Hello World we are going to type Hello World next to echo to make it look like this

echo Hello World

so at this point you should have

@echo off
echo Hello World

now go to file save and name it test.bat ( you can name it whatever you want as long as it has .bat at the end.)
Save it to the desktop so you can get to it faster.

Then run it



You should of have a black box open and close really fast

To fix this we need a pause command and we will also need a goto command

The goto command is the most importent command

If you dont know the goto command tell it were to go to next.

since we need a pause command we want it to go to pause so we need to write goto pause like this

goto pause

now u should have

@echo off
echo Hello World
goto pause

now we need a subsection name pause

you make a sub section by putting a : by the first word like this

:start

or

:end

,but we said go to pause so we need one name pause like this

ause

then under that we are goin to write pause

ause
pause

this just makes it were it will keep the box open till you press a key

Optionl

At the end you can put a exit at the end of pause were the goto command should go ,but you dont have to.

save at run it now.You should be able to read your text now

4. Making a Batch file into a virus

This is alot easier then some people think.

To make a virus you just need the copy command which looks like this

copy

so lets make a new one by reading section 3 you should know you need the @echo off

@echo off
copy

allright we are going to name this file first

and we are going to make it copy itself to C:\WINDOWS just because no one looks in their

this is what it looks like (i will explain it)

@echo off
copy first C:\WINDOWS

copy-tells it to copy
first-is just the name of the file we want to copy
C:\WINDOWS- is the place you want to copy to

that is a virus

5. Destructive commands

If you get pissed at someone you might want to send him someting to mess with him. Here are some commands to add to the virus.

del -this del files

del file name
del (.txt*)

the (.txt*) would delete all txt files on the computer the * at the end just means all instead of a file called .txt

deltree- this deletes the whole folder

you can remeber it like this

Think of a tree if you type del you are only deleting a part of the tree ,but if you type deltree you are deleting the whole tree

format- this deltes everything

format c:

this delets everything in the c drive

open

this is just fun to use to scare some one but not do damage to something

open name of file

like to open notepad type

open notepad

to open microsoft paint type

open mspaint

just put ta crap load in their

also the next one that can be very usefull is looping

this will make the file repet it self til it is shut off

say your first sub section is called start

you would just make the goto command to go to start like

@echo off
:start
start notepad
goto start

that will open notepad over and over and if they dont close it it can crash their computer

to open the command window you have to use var. like %% (not going to explain var. it would be confusing)

@echo off
:whatever
start %0
goto whatever

this will open the black box over and over

6. Most command tricks

people will put it in a folder with a couple read me doc. and call it a game

people will say check this out it is so cool

people will say check out this hack or cheat i found for this game

to check if the are good do this

tell them to put it in a zip folder and send it

unzip and right click on the program(dont open it)

and press edit

that will show the sorce code and if you see something you dont like then delete it

Examples

for just a simp msg its

@echo off
echo *insert MSG here*
goto pause
ause
pause

for the a rapid command propt type screen its

@echo off
:whatever
start %0
goto whatever

for rapid note pad its


@echo off
:start
start notepad
goto start

for rapid ms paint its


@echo off
:start
start ms paint
goto start

Quite Long but good to try...

Saturday, September 1, 2007

Lock your folder without Installing any application

If u have a folder named "movies" in drive C: then creat a new text file in same drive and past the text fllows -

ren movies movies.{21EC2020-3AEA-1069-A2DD-08002B30309D}

Now rename the text file Loc.bat.and dobble click on it. (it is lock the folder and change it into cotrol pannel shortcut).


Same as to open or unlock the folder creat a new text file in the same drive and past the following text -

ren movies.{21EC2020-3AEA-1069-A2DD-08002B30309D} movies

Now rename the text file as "key.bat" and dobble it.it will unlock your folder and u can access the content of this folder.
Its easy......

After loking the folder if u creat another folder in same name on the same drive then the "key.bat" file cant unlock your lock folder.delete or rename the new created folder for work the "key.bat" file again.

Sunday, August 26, 2007

50 Funny Computer Pranks!!!

Read More
ducts listed here were not designed in any way to damage the end user's machine, and have been written
fonment purposes only.

1- AddRemove v1.00
2- Avoid v1.01
3- Back Pack Prank
4- Blue Screen of Death Prank
5- Bomb v1.02
6- Buttons Prank
7- Click Me v1.01
8- ClickStart v1.00
9- Clippy v1.00
10- Copy Cursor v1.00
11- Crazy Num Caps Scroll v1.04
12- Cursor Fun v1.01
13- Dirty Mouse v1.00
14- DownHoax v1.02
15- Email Fun v1.00
16- Enhance Your Mouse Prank
17- Exit P Prank
18- Fake Delete v3.05
19- Fake Format v1.05
20- Fake Shutdown v1.00
21- Fake Start Menu 95 v1.00
22- Flasher v1.00
23- Flip It v1.00
24- Floppy Madness v1.00
25- Follow Me v1.00
26- Gas Gripe v1.00
27- HeadAche v1.01
28- Image Capture Prank
29- IQ Test Prank
30- Message Manager Lite v1.06
31- Mouse Droppings v1.00
32- Mouse Move v1.00
33- MouseClicks v1.00
34- Password Prank v1.00
35- Pirated Software v1.00
36- Popup Prank v1.00
37- Print Me v1.00
38- Program - WAV Launcher v1.07
39- Random Burper v1.00
40- Relationship Test Prank
41- ReplaceKeys v1.00
42- Rotate v1.00
43- Screen Screw v1.00
44- Shakedown v1.00
45- Show - Hide Desktop v1.00
46- Swap Mouse Buttons Prank
47- The Finger v1.01
48- Time Traveler v1.00
49- Windows Wordpad Prank
50- Y2K Joke v2.00


Download Link :::::::


Password:
Code:
www.cyber-world.us

Photoshop Tutorial - Splash Interface

Request 4 any effects
Splash Interface

Mobile videos Games PC

Step one:


Start with a large black canvas. Make a new layer set titled Gell.
Select polygon tool, set sides to 4 and add polygon option settings.
In a new layer draw a #671DFF polygon. (width: 242 x height: 242)
Add the following layer styles: Inner Shadow, Outer Glow, Inner Glow, Satin, Gradient Overlay, Pattern Overlay, Stroke.

Mobile videos Games PC

In a new layer draw a white polygon using polygon tool. (width: 242 x height: 242)
Add the following layer styles: Outer Glow, Inner Glow.
Set layers blending mode to Darken.

Mobile videos Games PC

Step three:


Create a new layer set titled Stripes.
In a new layer draw a white polygon using polygon tool. (width: 15 x height: 84)
Rotate the shape by going to Edit > Transform > Flip Horizontal.
Add the following layer styles: Inner Glow, Outer Glow, Satin, Gradient Overlay, Stroke.

Mobile videos Games PC Step four:


In a new layer draw a black circle using ellipse tool. (width: 15 x height: 84)
Add the following layer styles: Gradient Overlay, Stroke.
Set layers blending mode to Lighten.

Mobile videos Games PC


Step five:


Duplicate circle from step four and resize by 30%.

Step six:


In a new layer draw a black circle using ellipse tool. (width: 76 x height: 78)
Add the following layer styles: Drop Shadow, Inner Glow, Satin, Gradient Overlay, Stroke.
Set layers blending mode to Lighten.

Mobile videos Games PC

Step seven:


In a new layer draw a small white circle. (width: 27 x height: 27)
Set layers opacity level to 9%.


Mobile videos Games PC

Step eight:


Add the same circle layer on all sides.

Mobile videos Games PC Step nine:


On top of the white circles add 4 black circles. (width: 19 x height: 19)
Set layers opacity level to 50%.

Mobile videos Games PC

Step ten:


Back to the middle, in a new layer draw a black circle using ellipse tool. (width: 41 x height: 41)
Add the following layer styles: Gradient Overlay.
Set layers blending mode to Overlay.

Mobile videos Games PC

Step eleven:


Now add “enter” using font Eurostile, regular, 12pt, sharp, and white for color.
Add the following layer styles: Gradient Overlay, Stroke.
Click on Create warped text and set style to Arc, Horizontal, Bend: +30%, Horizontal Distortion: 0%. & Vertical Distortion: +14%.

Mobile videos Games PC

Final:


Splash Interface.

Mobile videos Games PC

== Advanced Cellular Phone Repair Course ==

Create Post Edit Delete
== Advanced Cellular Phone Repair Course ==
Posted by Delano in Mobile videos Games PC on August 20, 2007 8:45:00 PM



CONTENTS :



1. Electronic Basics



2. Soldering Techniques



3. Ohm’s Law



4. Electrostatic Electricity



5. How a GSM Cellular Network Operates



6. Cell & Cell Sector Technology Explained



7. The Concept of Cellular technology and the GSM system



8. The GSM Concept



9. SIM Cards, identity numbers,IMSI, PIN, and PUK



10. How Cell Phones Work – the Cell Approach



11. From Cell to Cell



12. Cell Phones & CB Radios



13. Inside a Cell Phone -Components explained



14. Advanced Mobile Phone System – AMP

15. Digital System

16. Cellular Access Technologies

17. Cell Phone Towers and Base Stations

TECHNICAL SECTION

18. Component Identification – Base Band, RF Section, Control

19. Cellular Phone Repairs – Types of Damages incurred

20. Cellular Phone Repairs – Notes on Batteries

21. Trouble Shooting Steps – Introduction

22. Most Common Components Used in a Cellular Phone and problems that occur.

23. Dissasembly of Cellular Phones

24. Assembly of a Cellular Phone

25. Most Common Problems that occur

26. Cellular Phone Repairs – Replacing a LCD (Liquid Crystal Display)

27. Cellular Phone Repairs – Replacing Speakers

28. Cellular Phone Repairs – Replacing Microphones

29. Cellular Phone Repairs – Replacing Ringers

30. Cellular Phone Repairs – Replacing Charging
Block/Systems Connector

31. Cellular Phone Repairs – Replacing Antennas

32. Cellular Phone Repairs – Liquid & Moisture Damaged Phones

33. Cellular Phone Repairs – Refurbishing of Phones

34. Cellular Phone Repairs – Power on Procedure of a Cell Phone
35. Quick Trouble Shooting Guide & Required Action– Cell Phone Batteries

36. Quick Trouble Shooting Guide & required Action – Phone Has No Power – Switches Off

37. Quick Trouble Shooting Guide & Required Action – Phone Has No Power

38. Quick Trouble Shooting Guide & Required Action – Phone Not Charging

39. Quick Trouble Shootin
g Guide & Required Action – Phone Not Receiving Signal

40. Quick Trouble Shooting Guide & Required Action – SIM CARD related Problems

41. Quick Trouble Shooting Guide & Required Action –
Liquid Crystal Display (LCD) problems

42. Quick Trouble Shooting Guide & Required Action – Call Dropping

43. Setting Up your Workshop

44. Tools and Consumables.
ELECTRONIC BASICS

Persons new to electronics can have difficulties with the component values and
descriptions. Here are some guidelines for resolving these problems.

a) Basics
b) Resistors
c) Capacitors
d) Diodes
e)Transistors
f) IC's


Basics

The most often used terms in electronics are voltage and current
To give you a metaphor for this you can think of a river.
The voltage is the length of the river and the current can be seen the current of the river.
This current is due the difference in height between the start and end of the river.
One law you have to remember is law of Ohm. (See OHM’S LAW). It is a simple law.

Voltage = Current * Resistance
or U = I * R

Where voltage is in voltage [V], current in Ampere [A] and the resistance in
Ohm.

To make it easier for you to make conversions I will provide you [literally] a
rule of thumb.

Voltage [V]
-------------------------------
Current [i] * Resistance [Ohm]
Now just place your thumb over the unknown value and you will see what you have to do to find the value. For example. If you want the know the resistance then
you have to divide the voltage by the current.
Numbers can become quiet large in electronics. To prevent writing many zero's
they use often different names. The following names are used.

Value, milli-, micro-, nano- and pico-
Example: Farad [capacitor] Farad, milli Farad [mF], micro Farad [uF], nano Farad
[nF], pico Farad [pF]
Every step is 1000 smaller like 1 Kg is 1000 Grams.
Resistors
Symbol
---/\/\/\/\----
or
------
---| |-----
------

A resistor can be seen as a dam in a river. Water will have more difficulties to
pass this dam. In a resistor this will result in the generation of heat.
Resistors come in standard values to choose from. The value of a resistor can be
found with the help of a colour table. The resistor has a set of coloured rings
that will tell you its value.
First ring : First number
Second ring : Second number
Third ring : Number of zeros to add
Fourth ring : Tolerance [quality of the resistor. Mostly 5%]


1 Brown Examples:
2 Red 4700 Ohm 1 000 000 Ohm
3 Orange Yellow Purple Red Brown Black Green
4 Yellow
5 Green
6 Blue
7 Purple Brown Black Brown Red Red Red
8 Grey 100 Ohm 2200 Ohm
9 'White'
0 Black
Values are often written as 10K, 1M or 4K7. This means in this case 10.000,
1.000.000 and 4700 Ohm. The 'K' just stands for Kilo and tells you that there is
a factor 1000 there. The 'M' stands for mega and adds another factor 1000

Capacitors
\
Symbol
||
---||---
||


A capacitor can have more functions but one of them is to store some energy in
them. They act like a bucket. You can fill them with energy and drop the
contents back when you need it.
Values are often written as 10N or 2N2. This means in this case 10.000 and 2200
nano Farad. The 'N' just stands for nano. Small capacitors can have only numbers
on them like 104. The first two digits is a number and the third digit tells you
how many zeros you must add. In this case its four. The correct value of this
component is 100 000 pF. [note: 100 nF or 0.1uF is also correct]
Diode
Symbol
|\ |
___| \|___
| /|
|/ |

Diodes are the passive one-way locks in the river. Water can flow through them

only in one direction. And only when there is enough difference in height
[voltage].

Knowing this you may notice that a diode needs to have a direction to function.
To show this there is a small mark at the casing. Normally this is a ring. For
LED this isn't the case. You have to look inside and see the small plates. The
one with the largest plate is the side where the 'ring' would be.
Transistor
Symbol
| /c c = collector
___|/ b = basis
b |\ e = emitter
| \e

These are the active locks in the river. They have a lock gate that can control
the flow through them. They can also act like a switch. With a little current
they can be opened and let a strong current pass. In the symbol there is also a
arrow that will tell you the direction of flow. There are two basic transistor
types namely; PNP and NPN. They are named todifferentiate between different internal designs. A PNP has a symbol with the arrow pointing inwards and a NPN
transistor has a arrow pointing outwards.


IC (Intergrated Circuit)
Symbol

An IC doesn't have a universal symbol.
It all depends on its use. A few
examples are shown here.

|\ +---+
___| \___ -| & |
| / -| |-
|/ +---+
A little box that contains many small components as above. A complete circuit


can be inside the black plastic casing.

They have often 8, 14 or 16 pins.

They are used for many purposes. The casing has a small notch on top of it or carved out of it.
If you look at this mark and holding the mark on top then the first
lead on the right side will be pin number one.

All diagrams with detailed description included - Download



Mobile videos Games PC




topic 2. Soldering Techniques

How important is soldering?


Among the foremost of reasons an electronic project frequently fails to work
properly is due to "poor" soldering practices. This is usually caused by "dry
joints" when soldering. Here we discuss the correct procedures for soldering
electronic projects.
Dry joints when soldering

At first glance many solder joints appear to be quite "O.K." but on closer
examination many are in fact defective. The insidious problem with dry joints in
soldering is that the circuit frequently performs alright for a period of time,
even years before failure.

This problem even occurs with manufactured equipment. Ask any TV / Video repair/Cell Phone technician who has torn a lot of hair out over an elusive fault ultimately traced back to a dry joint.
Good soldering practices for your electronic project

The cause of dry joints in soldering is mostly the improper application of heat.
Both the component leg and the PCB need to be both heated simultaneously to the
correct temperature to allow the solder to flow freely between BOTH surfaces.
Obviously this requires practice and most newcomers inevitably get it wrong.
Improper heating while soldering and its consequences can be seen below.



Figure 1 - correct soldering procedures to avoid dry joints

Here in figure 1 entitled "correct soldering procedures to avoid dry joints" we
have three examples of soldering depicted.

The first example indicates the component lead was heated while the PCB wasn't heated.As a consequence the solder only flowed onto the component lead.




In the second example of soldering in figure 1 we find the PCB was correctly
heated while little or inadequate heat was applied to the component lead. This
is the most treachorous example because although I have made it very obvious in
the diagram, in practice it is not always particularly obvious.

Often this type of dry joint "just" allows the solder to "touch" the component lead while not actually being "soldered" to the lead. Of course it might work for a period of time depending upon environmental conditions of heat and cold.



In the final example of "correct soldering procedures to avoid dry joints" We
have depicted the solder bridging both the PCB and the component lead.

In this case the PCB and the component lead were both heated "simultaneously" AND the solder was applied to either the component lead or the PCB to "flow" freely from one to the other to provide a good "electrical" joint. Such a joint is always "bright and shiny", dull looking joints are often suspect.

You never apply the solder to the soldering iron "tip". Solder is always applied
to the "job", never the soldering iron. Allow the solder to "set" and cool
before proceeding to the next joint.




Other cases of soldering

We have discussed soldering components to a PCB yet this is not the only case of
soldering. Often we need to connect wires to switches and other components. A
common misconception is that soldering is designed to provide a good mechanical
joint. - It isn't!

Any connection should have it's own mechanical strength perhaps by twisting
wires together or twisting the wire around a binding post or through a hole
provided for the purpose.

The solder is only intended for a good "electrical" connection. Never provide a connection which can't stand mechanically on it's own merits.




What's soldering flux?

Modern quality electronics solders contain a "flux" resin within the solder.
This flux is designed to flow over the job and prevent contact with the
atmosphere.

Metals, particularly copper when heated tend to "oxidise" and prevent the alloying or good electrical bond between the copper and the solder.

Good solder containing the resin will have resin flowing over the leads and
prevent this oxidisation process and as the solder flows the resin is displaced
allowing the solder to form an "atomic" bonding with the items being soldered
together. A good resin helps to keep the surfaces clean.




Rules for good soldering

Of course some of these rules might seem very obvious but are worth repeating.

=> Use a reasonable quality iron of the correct wattage for the job.

=> Only use "electronic" resin cored solder of fine gauge.

=> Make sure all surfaces to be soldered are "bright, shiny" and thoroughly
clean.

=> If a mechanical joint, make sure it can "stand alone" before soldering.

=> Make sure the solder tip is clean, shiny and properly "wetted".

=>Remember the soldering iron tip is only to heat up the surfaces to be
soldered.

=> Apply the resin cored solder to the heated "job", not to the soldering iron
tip.

=>Remember to visually inspect ALL of your soldered joints, preferably with
magnifying glasses.

=> Consider using your multimeter to provide an "electrical continuity" check
between various parts of the circuit.

Why is ohms law so very important?

Ohms law, sometimes more correctly called Ohm's Law, named after Mr. Georg Ohm, mathematician and physicist b. 1789 d. 1854 - Bavaria, defines the relationship between power, voltage, current and resistance. These are the very basic electrical units we work with. The principles apply to a.c., d.c. or r.f. (radio
frequency).

Ohms Law is the a foundation stone of electronics and electricity.

These formulae are very easy to learn and are used extensively throughout our
tutorials.






Without a thorough understanding of "ohms law" you will not get very
far either in design or in troubleshooting even the simplest of electronic or
electrical circuits.

Mr. Ohm (that is his 'real'name) [Georg Ohm b 1789 d 1854 - Bavaria] established
in the late 1820's that if a voltage [later found to be either A.C., D.C. or
R.F.] was applied to a resistance then "current would flow and then power would
be consumed".

Some practical every day examples of this very basic rule are:

Radiators (electric fires), Electric Frypans, Toasters, Irons and electric light
bulbs.


Figure 1 - ohms law power consumption through a resistance.

The radiator consumes power producing heat for warmth, the frypan consumes power producing heat for general cooking, the toaster consumes power producing heat for toasting bread, the iron consumes power producing heat for ironing our



clothes, and the electric light bulb consumes power producing heat and more
important light for lighting up an area.

A further example is an electric hot water system. All are examples of ohms law at its most basic.

Hot and Cold Resistance encountered in Ohms Law.


One VERY important point to observe with ohms law in dealing with some of these
examples is that quite often there are two types of resistance values.

"Cold Resistance" as would be measured by an ohm-meter or digital multimeter and a "Hot Resistance". The latter phenomenon is an inherent characteristic of the type of material used as a resistor. It has a temperature co-efficient which often once heated alters the initial resistance value, usually dramatically upward.

A very good working example of this is an electric light bulb.

Measure the light bulb with a digital multimeter. It will show zero
resistance, in fact open circuit.

Again, using a light bulb marked "240V - 60W".

It measured an initial "cold resistance" of 73.2 ohms. Then I measured our actual voltage at a power point as being 243.9V A.C. at that moment [note: voltages vary widely during a day due to locations and loads - remember that fact - also for pure resistances, the principles apply equally to A.C. or D.C.].

Using the formula which you will learn below, the resistance for power consumed
should be R = E2 / P OR R = 243.92 / 60W = 991 ohms .

That is 991 ohms calculated compared to an initial reading of 73.2 ohms with a
digital multimeter.

The reason?

The "hot" resistance is always at least ten times the "cold" resistance.

Another example is what is most often the biggest consumer of power in the
average home. The "electric kettle".
Take an “Electric Kettle " which is labelled "230 - 240V 2200W".

Yes! - 2,200 watts! That is why it boils water so quickly.




What are the ohms law formulas?


To make it much easier for you, I have put all the relevent formulas together for
you here complete with worked examples of ohms law.

You will notice the formulas share a common algebraic relationship with one another.

For the worked examples voltage is E and we have assigned a value of 12V,
Current is I and is 2 amperes while Resistance is R of 6 ohms.

(Note that the asterisk *means multiply by, while "/" means divide by. )

For voltage [E = I * R] E (volts) = I (current) * R (resistance) OR 12
volts = 2 amperes * 6 ohms

For current [I = E / R] I (current) = E (volts) / R (resistance) OR 2
amperes = 12 volts / 6 ohms

For resistance [R = E / I] R (resistance) = E (volts) / I (current) OR 6
ohms = 12 volts / 2 amperes.

Notice how simple it is?

Now let's calculate power using the same examples.
For power P = E2 / R OR Power = 24 watts = 122 volts / 6 ohms

Also P = I2 * R OR Power = 24 watts = 22 amperes * 6 ohms

Also P = E * I OR Power = 24 watts = 12 volts * 2 amperes .

That's all you need for ohms law - remember just two formulas:

For voltage E = I * R and; for power P = E2 / R

You can always determine the other formulas with elementary algebra.


Ohms law is the very foundation stone of electronics!

Knowing two quantities in ohms law will always reveal the third value.
I suggest you print these formulas out and paste them onto scrap cardboard to keep your ohms law as a handy reference until you are quite familiar with it.

what is Electrostatic Electricity?


Electrostatic Electricity is generally ignored or forgotten, yet the effects of static electricity can be DEVASTATING to CMOS semiconductors and other electronic components.


It is MOST IMPORTANT, that when working on a Cellular phone, the proper precautions be adopted at ALL TIMES. Ignoring these precautions will result in both costing you a lot of money and possibly destroying vital components on a Cellular Phone.

It is strongly recommended that an antistatic wrist strap and an antistatic mat be used when carrying out repairs. These are available from Celtrain on request.



Handling of CMOS and Electronic Components.

Field Effect Transistors (FET) and IC’s make use of Complementary Metal Oxide Semiconductor (CMOS) technology.

CMOS transistors and IC’s WILL BE DAMAGED by ELECTROSTATIC ELECTRICITY.

Electrostatic Electricity is bad in dry areas, and areas covered by NYLON floor covering.

When purchasing CMOS transistors, IC’s etc, they are normally supplied in a special conductive package which shorts out all pins, this may cause predamage. IC holders or sockets should be used to minimise handling.

ALWAYS LEAVE IC’s in it’s protective packing until you need to use them.

Sit down (Preferably in an area that does NOT have a nylon floor cover) and connect yourself to EARTH so as to discharge any Electrostatic charge on your body. Put on a wrist strap and connect this to ground.

Working on an ELECTROSTATIC MAT, remove the IC from it’s packing.

DO NOT TOUCH THE PINS!!!!!!!!!!!

Place the IC the correct way around into the IC holder being careful NOT to bend the pins.


Footnote: TAKE NOTE OF THE DANGERS AND DAMAGE THAT CAN BE CAUSED BY WORKING ON CELLULAR PHONES WHEN YOU ARE CHARGED UP WITH STATIC ELECTRICITY!

What kind of applications are good for circuit switched services, what are good for packet switched services?

Data services similar to those for GSM are also being developed for IS-136 TDMA and CDMA networks. But as a more mature digital technology, GSM has a strong head start. When GPRS is deployed, no other wireless data technology will be able to match its capabilities. But it is also important to remember that GSM already offers excellent data and fax capabilities that provide more than sufficient capability for many types of applications. As technologies like GPRS become available, the scope of data applications that are practical for wireless connectivity will only increase.
Chat
Textual and Visual Information

Mobile originating call: How mobile originating call is established from a mobile to fixed telephone network?

The BSS is located between two interfaces, Air and A. From the call establishment point of view, the MS must have a connection through these two interfaces before a call can be established. The MS starts the sequence by sending a message 'Channel Request'. This message contains a reason why the signalling connection through the BSS is needed. After this, the BSC allocates a signalling channel through so-called A-bis interface located between the BTS and the BSC. When the signalling channel is ready through the A-bis interface, the MS is told to move to the signalling channel in the Air interface. The MS informs it is on the signalling channel which then triggers the BSC to set up the A interface, i.e. the BSC requests the SCCP connection. When a signalling connection between the MS and the NSS has been opened as described, the MS starts the other signalling sequences in order to completed the original requested task

Still Images
Moving Images
Web Browsing
Document Sharing/Collaborative Working
Audio
Job Dispatch
Corporate Email
Internet Email
Vehicle Positioning
Remote LAN Access
File Transfer
Home Automation,

Incoming calls: If a user has subscribed voice, data, and fax services and the mobile is attached to GSM network, how the user can control which kind of calls (voice/data/fax) she wants to now receive?

The problem remains when the only information received by the GMSC is the called number (the MSISDN). Two solutions of general application have been put on the table. The first solution consists of letting the service be chosen by the called party. The message setting the call from the network to the mobile station does not specify the service, and the mobile station indicates it in return. This solution imposes the requirement that the service is set by the user in the mobile station before the actual start of the communication. A typical scenario to send a fax to a GSM subscriber is then first to phone him (speech communication), asking him to set the mobile station so that the next call will be treated as a fax call; then hang up and re-dial to establish the fax call.
This solution has minimal impact on network, but is not very convenient for the users. This is why an alternative solution was proposed, consisting in providing a GSM subscriber with as many MSISDNs as services for which he wishes to receive incoming calls ( for instance a speech number and a fax number). The service can then be chosen by the calling party, by using the right number. The relationship between numbers and services is held in the HLR.

Data call:

a) the mobile station
b) from the mobile station to the base station; the radio path
c) from the base station to the MSC
d) from the MSC to IWU (Inter Working Unit, special modem-like device)
e) from the IWU to AM (Analogue Modem)
The GSM-only components of these data/fax interfaces are not actually modems as we traditionally understand them: the "modem" component you need to send and receive data actually resides at the network headquarters (also known as the Mobile Switching Centre, or MSC), using a special modem-like device called an IWU, or Inter Working Unit.
Data is sent digitally from the PC via the special hardware adapter, through the phone and then through the air to the IWU. The GSM phone and the data/fax interfaces thus act as one extended digital "serial" or "air-interface" link between the PC and the IWU, which now acts as the Analogue Modem.
It is only when the digital data is received by the IWU that it is converted by the IWU to the analogue Frequency Shift Keys (FSK) tones characteristic of Analogue Modems, making it possible to connect via Telkom fixed-lines to an ordinary Analogue Modem. And if an ordinary fax machine or fax/modem sends data to your mobile phone, then the IWU converts the analogue tones received into the "digital data stream" suitable for transmission across the network to your GSM mobile.
If one mobile unit sends fax or data to another mobile, then there's no need for an analogue-to-digital conversion since the entire "air interface" is already digital, as is required by the GSM specification

Transparent vs. Non-transparent: What is the difference between transparent and non-transparent data?

Transparent Data Transmission: A method of transmission in which the transmission medium will not recognize control characters or initiate any control function. Transparent-based phones do not utilise any error correction. Thus the data sent and received MIGHT be corrupted unless a greater than two-bar cellphone signal is used (South African conditions). Non-transparent data uses a special ensure robust GSM-specific error correction technique called RLP for transmission. [6]
Non Transparent communication utilises a special GSM network-based error correction facility called "Radio Link Protocol" (RLP)that ensures more robust transmission. What this essentially means is that the GSM network's IWU will add special error correction codes to control the flow of data.
This ensures that the data transmitted first obtains a special acknowledgement signal from the receiver that informs the transmitter that the data has been received as transmitted and that the receiver is ready to receive the next set of data from the transmitter. If there is no such acknowledgement signal from the receiver, the networks will utilise their "data buffering" feature by using a special "forward correction" technique to ensure uninterrupted data transmission throughout. Not all cellphones support GSM's Non Transparent (RLP-based) data capabilities.
Transparent data transmission means that there is no GSM error correction supplied over the air interface.
Non-Transparent data only applies to data transfers and not faxing since the Group 3 standard for fax transmission is a transparent protocol.

(11) Understanding of TELEphony phenomena by using corded Intercom circuit diagram and a live model of the same.

(12) Theory of Operation of Basic Telephone and Cordless Phones

(13) Principles of FREQUENCY related phenomena leading to the Basics of mobile Phone Technology involved in the MOBILE PHONE

Advanced Module :
Advanced Module Begins exactly where the Basic Module has ended
(1) How Mobile Phones work

(2) Various Mobile technologies like GSM , CDMA etc.

(3) GSM Architecture

(4) Mobile Phone BLock Diagram and it's understanding

(5) SIM Architecture

(6) Batteries & Chargers

(7) Power Supply & Charging Circuit

(8) User Interface (UI)

(9) R.F Circuit Functions : IF Amplifier , DE-Modulator, Oscillator , Modulator , Power Amplifier , Antenna Switch and it's associated Circuits

(10) Audio Circuit

(11) Comparision with a Computer

(12) CPU , Flash ICs and RAM ICs - how they Handle and collaborate between Hardware and Software Functions

(13) Opening Procedure for Various Popular Models of mobile Phones with Pictorial Illustrations for later reference

(14) Understanding of Mobile Phone's Circuit Diagrams

(15) Tracing of Mobile Phone PCB Circuits with reference to it's Circuit Diagram or Schematic.

(16) Fault Finding and Common Faults Occuring

(17) Using Soldering Gun (Hot Air gun) for removing and soldering of Chips and BGA ICs

(18) Codes for Various Mobile Phone Functions

(19) Data Cable Connection for Communicating with the PC (personal Computer

(20) Solving Software Related Problems like Repairing Dead Phones , Unlocking etc. wity the use of Commonly used Softwares.

(21) Understanding of Multi Media Applications like Ringtones, Wallpapers, games, Softwares, Themes, MP3 Songs Playback, Video Clips Downloading etc.

Power Section:

A power section deals with power related tasks such as power distribution or charging the battery so this section can be divided into two sub sections like.

1. Power Distribution

A power distribution section is built around an "power IC" it takes 3.6V power from battery and regulates its power and then distributes to the other components used in mobile phone circuit. in some mobile phones tech "RF Power amplifier" uses more Power than provided bye mobile phone's battery .i.e. 4.7 V or 5.6 V in some phones. the power Ic with a power boaster coil is used to increase voltages. so we can say that power IC is used to provide power to other components how much they needed. either less than battery voltage or more than it.

* Charging Section

A charging section works for battery charging purposes.it is often consists a fuse, a coil, a protecting diode, a filter capacitor and charging IC and some other discreet. the charging section helps battery to be charged when it needs and when battery is charged, charging IC reads its state of charge and feels it full charged and then disconnects charging from it.
Radio Section:
A radio section has basically a set of four main functions.wich are.

*

  • Band Switching
  • RF Power Amplification
  • Transmitter
    * Receiver

    Band Switching:
    In the modern mobile phone communication techniques. the frequency of mobile phone communication is divided into three bands

    *
  • GSM (operates on 900 MHz)
  • DCS (operates on 1800 MHz)
    * PCS (operates on 1900 MHz)

    the third band is used only in USA whereas the first two bands are used in the rest of the world. band switching is done bye a "ceramic antenna switch" it reads from the radiation dispersed in the air and then switches to the appropriate band.
    in the very first phase of mobile phones there were single band handsets which operated on single frequency band but now a days all the handsets are dual band or tri band in operation.
    RF Power Amplifier
    RF power amplifier is often called as ".PA" or"Transmitter" its functions is to amplify or boast the power which is being transmitted to air, so may it would be able to communicate with long distances. a typical .PA can amplify rf power up to 0.6W or 600mW. This amount of rf power is sufficient to communicate nearly 20 to 25 kilometers in open area, but all the PA's are controlled by there rf signal processor, so if we are near our cell base tower the PA of our phone will transmit low power but if we are far away it will produce its maximum power.
    Transmitting
    A mobile phone's rf section is basically built around an rf IC which is often called rf signal processor whereas in nokia it is called hagar IC in some hand sets and in some hand sets it is called Mjoelner. irrespectively of the brands and verity of names we call it rf signal processor. this IC works as transmitter and receiver as well. working as transmitter it takes instructions from phone's computer and also takes audio data from audio section and creates radio waves then mixes audio data to its radio waves according to the instructions given by computer section. this mixer of audio and radio is sent to PA to amplify its strength
    Reciever
    A reciver section for rf waves is built in rf IC, as it is said that this IC works for dual purposes first transmitting and section recieving. in the recieving section of mobile phones a radio signal is gather from ceramic antenna switch and then it is filtered and sent to rf IC to further process. in rf IC signal is detected and then rectified for audio and data which is sent to audio IC or computer section.
    Computer Section:
    A computer section in mobile phone consists of two main functions

    CPU(central processing unit)

    Memory (RAM, FLASH, COMBO CHIP)

    CPU:
    A CPU is used in mobile phones as a central processing arithematic or controler. the cpu controls various functions in mobile phones like signal, display, sound converting(DSP), charging, power on, rf channel controler, rf tx power conroller, LEDs, vibrator, data processing, data storing etc. so we can say that if a cpu is damaged in any mobile phone it cannot be repaired unless the CPU is not replaced but this type of fault is not even seen to me ever either memory chips can be damaged. in brand Nokia CPU is named with two different words (MAD or UPP)
    Memory:
    there are two main types of memories used in mobile phones

    * RAM (Random Access Memory)

    The RAM is used in mobile phones to store user data in mobile phones. So these a days we can store pictures, messages, ringtones, applications, themes and other these type of things in mobile phones so CPU stores these types of data in the RAM of our mobile phones.

    * Flash (eeprom, ROM etc)

    The flash chip is used in mobile phones to hold mobile phone's operating system in it. so if the flash chip is damaged in mobile phones the phone cannot power on properly because all the instructions to start a mobile phones and its various tasks like call making , display etc are stored in the flash chip of mobile phones.

    * Combo Chip

    In smoe mobile phones there is a combined type of memory used which is called combo memory chips these types of memories work for both like RAM and Flash.

    WHAT ARE DIODES AND HOW LEDs WORK ?

    Diodes are components that allow current to flow in only one direction. They have a positive side (leg) and a negative side. When the voltage on the positive leg is higher than on the negative leg then current flows through the diode (the resistance is very low). When the voltage is lower on the positive leg than on the negative leg then the current does not flow (the resistance is very high). The negative leg of a diode is the one with the line closest to it. It is called the cathode. The postive end is called the anode.

    Usually when current is flowing through a diode, the voltage on the positive leg is 0.65 volts higher than on the negative leg.


    A diode allows electricity to flow in one direction only and blocks the flow in the opposite direction. They may be regarded as one-way valves and they are used in various circuits, usually as a form of protection. There are different types of diode but their basic functions are the same. These are noted below along with examples of diodes in use.


    How Light Emitting Diodes Work




    Light emittingdiodes,commonlycalled LEDs, are real unsung heroes in the electronics world. They do dozens of different jobs and are found in all kinds of devices. Among other things, they form the numbers on digital clocks, transmit information from remote controls, light up watches and tell you when your appliances are turned on. Collected together, they can form images on a jumbo television screen or illuminate a traffic light.

    Basically, LEDs are just tiny light bulbs that fit easily into an electrical circuit. But unlike ordinary incandescent bulbs, they don't have a filament that will burn out, and they don't get especially hot. They are illuminated solely by the movement of electrons in a semiconductor material, and they last just as long as a standard transistor.
    In this article, we'll examine the simple principles behind these ubiquitous blinkers, illuminating some cool principles of electricity and light in the process.


    u can check detailed diagram & info of DIODS & LED ..
    What is capacitance?

    Now a capacitor (formerly condenser) is an Electronic Component which has the ability to hold a charge of electrons. Sounds like similar to a Battery ? , you are not very wrong !
    The Capacitor is somewhat like a Battery , but has some very different properties also .

    The number of electrons it can hold under a given electrical pressure (voltage) is called its capacitance or capacity. Two metallic plates separated by a non-conducting substance between them make a simple capacitor. Here is the symbol of a capacitor in a pretty basic circuit charged by a battery.

    The time required for a capacitor to reach its charge is proportional to the capacitance value and the resistance value.
    The time constant of a resistance - capacitance circuit is:

    T = R X C
    where T = time in seconds
    where R = resistance in ohms
    where C = capacitance in farads
    The time in this formula is the time to acquire 63% of the voltage value of the source. It is also the discharge time if we were discharging the capacitance. Should the capacitance in the figure above be 4U7 (4.7 uF) and the resistance was 1M ohms (one meg-ohm or 1,000,000 ohms) then the time constant would be T = R X C = [1,000,000 X 0.000,0047] = 4.7 seconds. These properties are taken advantage of in crude non critical timing circuits.
    Capacitors in series and parallel

    Capacitors in parallel ADD together as C1 + C2 + C3 + ..... While capacitors in series REDUCE by:
    1 / (1 / C1 + 1 / C2 + 1 / C3 + .....)
    Consider three capacitors of 10, 22, and 47 uF respectively.
    Added in parallel we get 10 + 22 + 47 = 79 uF. While in series we would get:
    1 / (1 / 10 + 1 / 22 + 1 / 47) = 5.997 uF.
    Note that the result is always LESS than the original lowest value.
    Simplified calculations for Capacitors

    We said above that parallel combinations simply add the values together. Series combinations are somewhat more difficult requiring 1 / (1 / C1 + 1 / C2 + 1 / C3 + ...).

    This can be simplified somewhat to:

    [(C1 X C2) / (C1 + C2)]

    Try three or more in series. Do the first two then arrive at an intermediate value, then do the third with the intermediate value and so on.



    A very important property of Capacitors

    Capacitors will pass AC currents but not DC. Throughout electronic circuits this very important property is taken advantage of to pass ac or rf signals from one stage to another while blocking any DC component from the previous stage.

    check images for detailed information
    Know the Mobile Phone with Blocks



    Have you experienced the fact that in a music listened from a very long distance, the sounds of drums are less audible than the sounds of other sharp instruments like guitar ?
    YES

    This is because the sound of a drum is a low frequency signal and low frequencies cannot travel long distances easily while the high frequencies like the sound of guitar or other string instruments can !
    See how this is applied in the Radio, TV and Mobile Technology for yourself. After all the Mobile Phone is also a radio telephone ! The broad meaning of the word "Radio" is WIRELESS. The principle of a mobile phone can be compared with that of a Radio or a television system.
    The Voice signal which is required to be sent to the other mobile phone is first converted from Analog to Digital type of Signal and is then mixed with a very high frequency signal in the mobile phone , this is called Modulation which means changing the signal by adding another frequency called carrier frequency to carry it. This is done to make it possible to be sent thro' Air to the nearest tower of the service operator. The basic principle being that the High Frequencies can travel longer distances easily. This was the transmitting part. (In Radio or Television systems, this is done at the Transmitting End which is the Radio or the TV Station.)
    In the receiving part, the reverse (De-Modulation) is required to be done. The received signal from the service operator's tower is required to be Demodulated to remove the High Frequency Signal OR the carrier frequency signal from the received signal, so that only Digital Audio signal is left out. In Mobile Phones, this Digital Audio Signal is then converted to Analog Signal and after some amplification etc. is sent to the speaker to be heard by the user. (In Radio or Television systems, this is done at the Receiving End which is the Radio or the TV itself !)
    Both this Transmitting (Tx) and Receiving (Rx) functions are required to be carried out in the Mobile Phone itself and is done by what can be called the RF section of the mobile phone.

    some useful abbreviations


    IMSI = International Mobile Subscriber Identity

    MCC = Mobile country code

    MNC = Mobile Network Code

    MSIN = Mobile Subscriber Identification Number

    PLMN = Public Land Mobile Network

    MSC = Mobile Switching Centre

    VLR = Visitor Location Register

    HLR = Home Location Register

    LAI = Location Area Identity

    BSC = Base Station Controller

    NSS = Network Subsystem

    PAGCH = Paging Channel

    AuC = AuthenticationCenter

    SRES = signed response

    BTS = Base Transceiver Station

    MS = Mobile Station

    TDMA = Time division multiple access

    RLP = Radio Link Protocol

    IWU = Inter Working Unit

    FSK = Frequency Shift Keys

    LAPD = link access procedure D-channel

    SABM =Set Asynchronous Balanced Mode

    UA = Use Air Interface

    SCCP = Signalling Connection Control Part

    GPS = Global Positioning System

    COO = Cell Of Origin

  •