Social Items

Showing posts with label Mobile. Show all posts
Showing posts with label Mobile. Show all posts
What is computer processor definition | Types and core in processor
Computer processor

What is the computer processor?

A processor is a hardware device which calculates a large number of calculation and give their result to the user, in the other word a process is an electronic device which responds when we give them instruction, this processor is looks like a chip.

The processor of the computer is also called CPU (Central processing unit), because this on one of the most important parts of the complete CPU, we cannot imagine the computer without the CPU, because in the absence of CPU computers is not able to give responses to the user.

The processor in the mobile, tablets, and other small devices are called the microprocessor, this microprocessor is very small in size, in the computer processor is not only responsible for the process of instruction, there are other elements such as Hard drive are also responsible for the processing

But the Hard drives process very small instruction, most of the processing work is doing by the main processor due to the working of this microprocessor this is called the CPU of the device, this is also called the brain of the device, Intel and AMD  are two main company which makes the processor of the computer and microprocessor of the mobile.

Elements of the Processor/Microprocessor

(a) Arithmetical and logical unit (ALU)

 ALU is the part of the processor and the working procedure of the ALU are two types
Arithmetical unit:-Under this section ALU perform basic function like Addition, Subtraction, Multiplication, and Division.

Logical unit:-Logical unit of the processor is also performs some basic operations such as the comparison between two or more numbers such that the number is greater or less than another number.

(b) Floating point unit

The floating-point is also the part of the processor this unit also process the instruction but the speed of this unit is fast than ALU, the FPU of the processor performs the operation such as Addition, Subtraction, Multiplication, Division, Square root, Trigonometric values, exponential values and perform other operations.

(c) Control unit

The Control Unit of the processor/CPU is similar to the teacher in the class, just as teacher control in all the class during the teaching similarly Control unit of the processor control all the activities of the computer it, work as a supervisor, it fetches all the instruction from the RAM and control their execution.

(d) Resistor in the Processor

This is also the main part of the CPU, because when we fetch any instruction from the memory and execute this instruction then this resistor holds the instruction.

Operation inside the Processor

There are many types of operation are executed inside the processor, Due to this execution our work may be completed this operation is discuss in below.

Fetch:-It is a process where processor collects data from the memory and execute this data according to the given condition

Decode:-It is the operation of the processor where digital data converted into the plain text (Readable language) because inside the computer all the data stay in the form of the binary number so to make it readable we use decode processing.

Execute:-This is the last operation of the processor, at this state all the instruction come in the readable form and we can easily understand it, in this process all the given instruction be solved and give their final result.

What is the Core of the processor?

The core of the process is equal to the number of CPU inside the processor, from the above article we explain that the processor of the computer is a hardware chip and in this chip made by many components such as ALU, FPU, Control unit, resistor these four component is the main part of the processor and this four-component stay inside the process.

The combination of the above four components make a CPU and this single CPU is called a single-core processor and if we add a second CPU inside the processor then the processor is called a dual-core processor.

If we add four CPU inside the processor then it is called a quad-core processor and if we add eight CPU inside the processor then it is called the Octa-core processor.


What is computer processor definition | Types and core in processor

Internet of things

The internet of things is a platform where all the devices such as mobile, software, sensor, TV, fan, and other electronic devices are connected to each other with the help of internet and transfer their data to each other for a better experience for the user.

What internet of things definition and example
Internet of things (IoT)

The development of the 5G internet services are very fast so in the future, we see that most of our surrounding devices are the part of IOT because it does our work fast and saves our time, the development of the IoT at the present time is the initial state.

Working of the IoT services

The IoT services are based on the internet, all the devices of the IoT platform is interned base so there is a specific IP address of each the device in the IoT platform, this IP address helps us to control that device to our rules and regulations.

The IoT services are used to make the device automatic so most of the work is completed without any human effort this is to improve our productivity and save our time, in the future most of the devices are working on internet-based so it improves the structure of the IoT model.

The given IoT services help us to join different types of technology, with the help of internet service, we can easily control most of the IoT  services device with our mobile phone and maintain their all services with one click this IOT service converge most of the different services.

History of IoT

The IoT platform is not the latest technology we see the services of the IoT platform in the past time, In 1982 a Coca-Cola vending the machine is developed by the Carnegie Mellon University which based on the internet, after using the internet on this device this machine send the messages to the company to load the drink or maintain its services.

Characteristics of IoT

There are large no of devices, application, and other technology are developed at the present time so this improves the infrastructure of the IoT platform, at the present time their large number of applications and other the software uses the internet to improve their services.

The IoT services improve benefits and reduce the human the effort so we produce a large amount of product with efficiently, according to expert 31% IoT devices are developed by year over year and the market value of the IoT devices reach up to 7.1 trillion dollars in 2020.

Technology for IoT

There are a large number of wired or wireless devices are connected to each other with the help of IoT, Due to the interconnection between the devices, we can send and receive the data very fast, for the communication between two or more devices IP address is required.

The IP address of the device is unique and every internet consumer device has their unique device so when we send data to the particular the device then it goes to their original destination, The transmission of the data from one point to another point with the help of the internet is called protocol there are many types of protocol are establish for the transmission of data from one point to another point

What internet of things definition and example

What is the web?

Web browse and hyperlink in html definition
Web browse and hyperlink in HTML definition

The full form of www is world wide web it is the collection of all URL (uniform resource locator) which save on the internet most of the people think that the web and internet are the same things but in reality, both are different

The internet is the medium which helps us to reach our desire web pages or our other information;      We can say that internet is the most important element on the network communication which helps us to connect various devices which use internet data such as Mobiles, computers, laptops, etc.

To understand the web in the simple language let us take an example suppose we want to reach a place then we need their address, without the address we cannot reach that place, this address we gain with the help our relatives or any other sources similarly in the networking if we want to reach a particular web page or any other site then we need their address (URL), this the address is saved on the web which is www, so we can say that www is important element on network communication

HyperText and hyperlink

If we want to reach a website or any web page then we simply search on the browser and go to our site but before reaching our site we click on some given text which is shown on the search result then this text is called hypertext and the link which is attached to the given text is called hyperlink
If we create a hyperlink on our web pages then we can easily create it first of all select of those words which we want to make a hypertext after this process press ctrl+K button on the keyboard after this process a new page will be open we just add the link on the given area and save then after this process, the given text will be making a hypertext

Difference between HTTP or https protocol

Protocol means a set of rules in the network communication, On the internet, there are a large number of data is send and receive by the internet user so a rule is required to send this data on their consumer so this rule is called a protocol, HTTP or HTTPS is a type of protocol they are helping us to send and receive without any problems but if we send data through the HTTP protocol then there are a chance to lost this data or hijack our computer by the hacker so this a protocol may be dangerous

But if we use HTTPS protocol then there is no fear in our mind because this protocol is secure and no hacker steal our data when we send data to our relatives or any other the full form of HTTPS is Hypertext transfer protocol with security this protocol is widely used because this is trusted if you want to more about the internet protocol then click on the below and gain the full knowledge of internet protocol (IP) address

                                                  Click here

Web browse and hyperlink in html definition

SD card types
SD card format

The full form of SD card is Secure digital card it is a nonvolatile (After the turn OFF the device the storage data is not deleted) memory which is used to save our file, videos, audio and other data, there are different types of SD card available on the market and prise of these cards are different according to their property

So in this article, we know that how many types of SD card exist and why two same SD card available on different prices and how to we choose the best SD card for our device because there are many variant are available of SD in the shop

Types of SD card

There are mainly three types of SD cards which are given as below
(1) SDSC
(2) SDHC
(3) SDXC

(1) SDSC (Secure digital standard capacity)

This memory card is made for the normal uses we found this the memory card in the mobile phones, these memories are cheaper than other memory and the storage capacity of this memory is lies between 128MB to 4GB

(2) SDHC (Secure digital high capacity)

This is another type of SD card this memory card is widely used, we use this memory in our mobile phone this SD card is more expensive than SDSC card, the storage range of this memory is lies between 4GB to 32GB

(3) SDXC (secure digital extended capacity)

These memories are used in the high definition camera or another high storages devices, these memories are not made for the mobile phone because the storage capacity of this memory card is more than other memory these memories are more expensive with respect to SDSC, SDHC memory card, the storage capacity of this SD card is lies between 64GB to 2TB

Classes of SD card

When we transfer file from SD card to another device then the speed of data transferring differs from other memory this difference is due to memory constriction and quality so to see all detail about the memory we classified this SD card into different classes which are given as below.

Classes                                 Speed
2                                              2mbps
4                                              4mbps
6                                              6mbps
8                                              8mbps
10                                           10mbps
UHS-1                                   100+ Mbps
USH-2                                   300+ Mbps
UHS-3                                   600+ Mbps

SD card recovery

If we delete some file unfortunately from the SD card then we recover these file from the SD card to doing these process we need software which are easily available

To recover the SD card, first of all, we download a software which name is Recover it, To install this the software in our PC go to any browser such as Google and type recover it after this process there are many site list are shown but we click on the first link and download the software according to our operating system

After the downloading process, we install this software in our PC, the installation process can take some time it depends on the internet quality so takes patient, after the installation process of the software we just open this recover it software and choose those option which we want to do with the help of this software

But in this article, I will talk you to recover the SD card so click on the recover SD card but before the clicking on this option we plug that SD card on the PC which we want to recover it so, first of all, check the recover device is connected to the PC

After the checking the SD card we click on the recover SD card option and choose SD card from the drive after selecting the SD card we click on the start now option so the scanning process of the SD card is starts now and it scans all those which are deleted from the SD card the scanning process can take some time so take patient

After the scanning process, it shows all the file list which are deleted from the SD car so our desire we choose the file and recover the file which is deleted from the memory after this process the deleted file are recover in our device and we can use this file

What are SD card formatter and recovery?

How to increase mobile phone or computer speed

How to increase mobile phone or computer speed
Internet speed

Slow internet speed is one of the most common things on the different devices this low speed is due to a software issue or hardware issues, But in this article, we talk about the software issues only because the hardware issues of the device are not prepared by the common people so in this article we are know what are we doing to improve device performance.

(1) Disable starts programs

There are many program run in the background in our device, if the number of the running programs is more than it will impact on the device and our device is not working properly because when more program run in the background than it consumes more resources so our device is slow down

So to overcome this difficulty we disable the background apps or programs and after this process our device resources are less using so we can see that our device work fast

In the mobile phone, we can easily disable background apps or programs but this disable are not easy in the PC so to disable background apps or programs in the PC we follow these steps

First of all press the Ctrl+Alt+Delete Button after this a new page will be open here we click on the Start up option then after this process all the programs or apps which run in the background are shown here so we can disable the apps and improve device performance.

(2) Synchronization

The synchronization process is very common for this device due to this process, our device data are store on online if we don’t want to save our data online than we can disable this feature than no data of the device is being stored on the online

Due to the synchronization process, it consumes our internet data so our device are being slow so to overcome this difficulty we can disable this feature and increase the internet speed on the device, to disable this feature go to the google account setting and here the disable feature of the synchronization are available so after disable our internet data less consume and we found that our device works fast

(3) Disable Animation and visual graphics

If our device did not support high graphics or high animation then we cannot run these programs because if we run these high graphics app then the load on the device is increased and this may be harmful to our device so we run only those apps or programs which are supporting in our device

(4) Windows update

In our laptop or PC after the sometimes interval windows, the update is coming the size of the update some time is bigger and if we not update the system than it updates in the background and consume our internet data in the background

If we do not want to update the device then we can disable it and after this process, our device performance will be increased and it works better than before to disable the update feature in the device first of all press the button widows+R and than a new page will be open here we type services.msc after this step a new page will open here we search windows update option and disable the windows update feature

(5) Stop notification

In our device, there are a large number of apps or software are installed and all these apps or software give the notification according to the condition, and after some time interval if any update of the application is come then they give us notification in the top navigation bar

All the notification of the apps consume some amount of internet so this notification impact on the internet speed so if these notification is not important for us than we can disable it and improve the device internet speed because many time we get a large amount of notification at the same time and this time a very large amount of devices are used so our the device is not quickly response at that time so to overcome this problem we disable unwanted notification

(6) Clean storage 

If the space of our device is totally filled than some of the apps are not working properly due to low storage because when apps are running on the devices than it expands and consumes more resources some time our devices storages are filled with caches data and cookies data these data are important for device performance but if the size of the caches data or cookies are are more than limited level than it will be harmful foe our device and decrease the internet speed of the device

Internet speed increasing tips

Cyber security news
Cyber security

There are a large number of data is transferred through the internet so we need a security system which saves our data from a hacker, these a person which save our data from hackers and improve the cybersecurity of our the system is called analyst

The salary of the cybersecurity analyst depends on their qualification and on their skill but according to the expert the salary of the cybersecurity analyses are lies between 5-6 lack

Cybersecurity jobs

There are many different types of jobs that are available in the cybersecurity but in this article, we talk about only those jobs which are highly requirements and the salary of these jobs are high, most of the person prefer these jobs, in the below of the article we explain some jobs category in the cybersecurity so according to your interest you can choose anyone

Information security analyst

If you want to make an information security analyst of any the company then, first of all, you have a bachelor degree in computer science, under this job, you have to do to analyze the network of the company and provide the security of all the system the salary of the security analyst is 5-6 lack
 There are many hackers who wanted to steal to private data of the company and use this information for our profit so to secure our networking system we need a person which provided security to our networking these people are a security analyst which prevent the hacker and secure our personal data

Software security engineering

To make a software security engineer in any company first of all we need a bachelor degree in computer science, software engineering, etc the salary of the software security engineering is 7-8 lack
Under this job, we have done to provide the development of software because when we use computers for a long time there are many bugs and other malware are installed so to solve this problem we need software so we can just create and solve this problem easily

We can do another work in the software security engineering such as software planning, if we want to improve our services then we take up update day today so we need to plan the software and according to the requirement we just create and take in use to secure our system

Another part of the software security engineering is development of the software because without the software we can to analyze the data of the company and not generate the reports to improve our services so day to day we need some new programs and software to analyze the data because if the quantity of the data is more than it is not handled by the people so we need software the developer which make software and provide the security to our system

Chief information security officer (CISO)

If we select for the post of CISO we have to do many work in the job which is discussed as below, for this job we need a qualification which is a Bachelor degree from computer science, cybersecurity degree and the master degree in computer science

There are many qualifications that are required to make a CISO, we can not gain this CISO job directly, after working on many posts in the company we can promote to this job in the company for this job the IT security information is required compulsory, the salary of this job lies 12-80 lack.

Security Architect

This job is one of the most important jobs in any networking world because these people find the weakness of the network and give their solution, to check the security of the system this security architect attack on the system legally and find the holes in the system

In the networking, not any system which is fully anti-hack but these security Architects make the system is nearly unhackable but in the reality no any system exist which are full anti-hack
If we want to make a security architect then there are some qualification is required which is a bachelor degree in computer science, master degree compulsory in the cybersecurity or computer science the salary are provided for this job is 15-20 lack

After the joining of this job, there are many works are doing such as how to use a VPN for our security and how to use a firewall to protect our system

Penetration Tester

This is also a type of security architect the working process of both people are nearly the same, in the penetration tester jobs people find to system weakness and find their best solution, to doing this work a group of people is required which working on a different topic on this work to analyze the all system the salary of this job is 5-10 lack and the qualification are required master in computer science

Cybersecurity Analyst salary and job salary

What is Google Analytics?

Google analytic dashboard
Google Analytics

Goggle Analytics is an online tool which helps us to generate the reports of website, Blog, Digital marketing and another platform this tool is widely use to see the user experience on a different platform, for our desire we use this tool for online marketing or offline marketing.

Working of Google Analytic

The algorithm of the google analytic is changed according to the time and some new features are added according to the present time this the tool continuously upgrades their algorithm, But according to the expert this tool working on the basis of three give platforms which is discussed below.

Collect Data to analyze the given platform

Data collection is one of the most important parts of the Google analytics because without any data it cannot generates reports and not give their solution, it is the common science without any data how this tool generates the reports of the Website, Blog, or any other platform.

To analyze the website or Blog, first of all, we create a google analytics account and added our site on this tool, To doing this process we need a javascript which provided by this tool so we can just copy and paste this java code on the site where this tool says after this process our google analytics tools are ready to analyze the website and generate their reports.

The given Java code is a tracking code it tracks all the activity which is doing on the site this code is very small in size and east to past on the site to their original position, this java code track user as well as Admin activities on the site such as who user come on the site and how many posts this user read and where this user click on the site so according these reports which we can easily optimize the site and make it user friendly This java code is also tracking the user behavior, languages which mobile are used and which operating system is working on the device.

Compile of data

After collecting data from different sources an process is doing to generate the reports about this data this process is called compiling, the compilation process is a very necessary process to analyze this collecting data, the competition process of different data are different and this process is doing stepwise.

The compilation process of the google analytic is automatic and we cannot modify this process are pre-design into the google analytic tool.

Generates the Reports

After the compilation and collecting of data from different sources this tool give us reports, on the basis of this reports we can modify the site according to our desire and increase more traffic on the site this the tool is basically used to see the user experience on different platform and improve our site, this tool is easily available on the app form and we use us this tool in the desktop version because desktop version of this tool is too advance and we have gained some additional properties

What is Google Analytic and working process

What is the Hub?

Hub and switch in networking
Hub in networking

Hub is an electronic device which helps us to connect multiple the device from a single server, this is a star topology based technology and if and the device is corrupt which is connected to this hub then there is no impact on the other devices which is connected to this hub device.

Types of Hub

There are mainly three types of Hub which are given as below

(a) Active Hub

These type of hubs regenerate the signal, amplifying the signal and forward the signal so to doing this process it consumes the electricity

(b) Passive Hub

These hubs do not regenerate the signal, not amplifying the signal and not forward the signal the transfer the input data on their normal a condition so for working of this hub there are no any electricity is required

(c) Intelligent Hub

These Hubs are made to do some spatial work, these hubs control the unwanted traffic on the system so the quality of the network is increase and we do our work fast

Working of Hub

When a signal comes on the Hub from the large distance then the quality of the signal is reduced and if we do not bring this signal to their normal condition then we cannot use this signal for our purpose so we use Hub in our networking, this Hub regenerate (Improve signal quality) the signal and make it usable

The input signal on the hub is weak so this hub first of all amplifying this signal and then forward to the next destination but when the hub forward this signal to another device than an error has come on the network these problems are discussed below

There are many computers that are connected to the hub so when we forward and data to the particular computer then this signal is forwarded to all the computers which is connected to this Hub so this is one of the biggest reason most of the organization company did not prefer this hub because they have another best alternative of this Hub devices so at the present time this hub does not use, there are many advance device gives the best experience with respect to this hub

Advantages and disadvantage of the Hub

(1) It is a multiple port electronic device so there are many devices are attached to it
(2) This hub is not saved the data
(3) When this hub forwards the data then is send unwanted data to another computer
(4) When we transfer data with the help of the hub then one port is used for input data and another is used for output data we cannot send or receive data at the same time with the help of computer
(5) Hub is a half-duplex device so at the time either we send the data or receive the data
(6) These hub devices are very costly so this is limited used we have another best alternative of these devices

What are the switches?

Switches are an also like as Hub but it is more advance than hub it is also a star topology based device which connects multiple of computers and share their data, in the switches we do not face data broadcasting problem because this device is made keeping this in mind that there are not transfer unwanted data to another computer

But we transfer data with the help of hub than we face a big problem to broadcast this data to other computers but switches are more advance with respect to the hub when we transfer data through the switches then a MAC the address is required to send this data

So the switches are more useful than a hub because it provides more facility in the switches when we connect and computer devices then first of all then send a data packet to find the connected device MAC address after this process the switch gives the information to the user about the this device and after the approval of the user, we can easily transfer data from one computer to another computer
In the switches, there are many paths that are defined to transfer the data from one computer to another computer in the switches there are a define path are assign to a particular port so when we transfer file from one port to another port then our data is not collapsed or not collide to another data so it improves the speed of data transferring

In the hub when we transfer file then it data goes to another computer for some common path then some time they give us error and our file is transferred to the wrong person but in the switches the sanded data goes to the right person.

Hub vs switches types and definition

software install ubuntu
software install

If our mobile phone is being corrupt then we can easily install new software on this phone and make this device new, to install new the software we need some tool which helps us install software on the phone these the tool is given as below
(a) Stock ROM
(b) SP flash tool
(c) Android USB driver

To install new software we need PC so first of all these files download on the PC with the help of using the internet these tool are easily available on the site but before the downloading of this tool we check that these tools are supporting on the device
We download those tool which is supported our device so when we download these tool on the device then we write the device name and then search these tool

(a) Stock ROM

Stock ROM is one of the most important tools for the downloading of software in the mobile these ROM are different for the different a device so to download the right Stock for our device we follow these steps, first of all, go to any browser and type STOCK ROM FOR  YOUR DEVICE NAME
 After this process, the browser shows many website lists so our requirements we open any site and download the ROM for our device accordingly.

(b) SP flash tool

This is another most important tool for the installing of ROM on the phone, if we not install this software on the PC then we cannot install software on the PC this is the supporter software of the ROM so to install stock ROM on the device we need first this tool.
We can use this SP flash tool for another work is not made only for installing ROM on the devices but we can do another most important work for this tool.

(c)  Android USB driver

To run any program, software or apps a driver has required this driver to help the software to controls all the things which are inside the software, most of the cases these drivers are attached to the software but in some rare cases these drivers are corrupted so we need a new driver

To run the program drivers are necessary to program if in our system any driver is missing then it shows error so to fix this problem we download and install the driver according to their device but in this article, we talk about the USB driver

If we want to install stock ROM on the mobile phones than we need to USB drivers because without the USB driver, the plugging devices are not connected to the PC and us cannot do any changes on the device but most of the cases these USB drivers are pre-installed so we do not need to install USB drivers on the PC

But if some of the cases, these USB driver is being corrupted than we need to install a new drive on the PC and connect our mobile with PC and do changes on the phone, to install the drivers according to the device, first of all, go to any browser and type in the search tab USB driver for your device name and search after these process there are many website lists are shown so you click any one and download the drivers for the mobile according.

What we do after the installing of the above tool

If we download all the files and install on the PC then we doing the following step to install stock ROM on the device so see all the steps carefully and install custom ROM on the mobile phone
First of all, we check the Android USB driver on the device, to check this drive on the computer we right-click on the This PC icon and go to the manage option here we click on the device manager option if the USB driver is installed on the computer than is shown here.

In the next step we go to the SP flash tool here we see many options but to install ROM on the phone we click on the scatter loader option after this process we select the stock ROM file after this process we click on the download option
After doing all the above process to connect your device with PC with the help of USB cable, after the connection the wire the stock ROM is installed in the phone and our device is ready to install fresh software on it after following all the above steps, your device is can easily install new software.

How to install software on the mobile phone

how ping ip address | Definition and detail check
Summary of ping

The full form of ping is packet internet gopher it is used to check the internet quality between two devices or PC this is a troubleshooting a tool which can use many types to check the network quality between two devices or another device
How ping is works

To understand the working procedure of the ping in the simple language we can take an example to suppose we need to communicate with another person who lives very far for us so when we communicate with this a person with the help of internet messaging or call then our voice or text the message goes to that person and according to the sending message that person is response.

When both people communicate with each other then there are some time consuming to send or receive messages, the difference between two a person is depending on many  factors generally, this time or internet quality is calculated in the form of ping
Different facts of the ping

Summary of ping

When two computers or device are transferring their data then to check the connectivity or another detail or this device, ping is taken in use, To check the ping of the system device do much procedure first of all it send a packet of data and receive this data again.

When this data comes again on this computer then either all the data packet is the same as the sending data or the receive data may have less data packet these difference is due to connectivity between devices, According to the system default setting, there are four data packet is sent and receive by the system and check the connectivity of the network and generate a report of the ping.

Loop Backtesting

This is a method to check the connection between the devices, to doing this process, first of all, we check our device and generate the reports that our device is able to connect another device under this section we check our NIC (network interface card) or other connection tools.

To check our device is able to connect another device first of all go to the CMD (command prompt) and type ping and enter after this process we see a message which is TTL, if this message is showing after doing the above process then our device is able to connect another device, the given number is called loopback address this address is fixed.

After doing all the above process our device is getting ready to communicate to another device so we connect another device with the help of wire or wireless, after this the process we go to again CMD and type ping and IP address of the another device such as ping  and press enter key
if we see a TTL message after entering then our device is connected to another device and able to check ping of the device if this TTL message is not shown then it is not device fault, this fault come on due to wire or connector or the device

Error Report and message

If our device is not connected properly with another device then it shows two types of the error message so we can easily see the detail about the disconnection and fix it easily these messages are given as below
(a) Requested time out
(b) Destination host unreachable

(a) Requested time out

This message is coming due to the physical issue of the device such as wire, connector, NIC and another component if these issues are being on the device then our device is not working properly connect with another device, if this error is exit the data packet is not properly send or receive by the device

(b) Destination host out

This message is shown by the device when the device is off, broken and does not exist, when we ping requested to another device then due to this reason it cannot connect to the device to solve this problem we check all connection and solve their issues


The full form of ICMP is internet control message protocol, when we send a data packet to another device and receive data packet of another the device then these ICMP is shown the detail about the connection on the screen, if this ICMP is removed from the device then we not see any detail of the ping, if we do not see any detail of the ping then it is not only due to ICMP thee details are sometimes not shown by the device due to the firewall of the device because in some cases the firewall is blocking the ping information of the device.

how ping ip address | Definition and detail check

How to increase internet speed ?

Increase internet speed and check internet explorer
Increase internet speed and check internet explorer 

If we face slow internet on our mobile or another device then follow the given result you can improve your internet speed on your device in this article we discuss all the facts about the phone which is the most big reason to slow the internet speed.

So just read all the setting in the detail and configure according to your device and improve your internet speed these setting and trick are discussed as below.

Remove unnecessary apps or unused app

If we have install to many apps than it is the one of the biggest reason to decrease the speed of internet because when we using the phone then these apps are run in background and consume too many internet data so our internet speed and phone performance are decrease.

So to solve this problem we can uninstall unused apps and improve internet speed this trick is really work and most of the user follow this tips to improve their internet speed because when apps run on background it consume phone RAM and internet so after the uninstall we can free of this problem so you can use this tips for better result.

Remove widgets from phone

If we active many widgets on our home screen the it may be another reason to decrease our internet speed because this widgets use internet data to take upgrade so if we have no necessary these widgets the we can remove it and improve mobile internet speed these widgets show many detail such as Date and time, Weather information and another updates so they consume data and slow down our phone, for the best experience of internet we have not use unnecessary widgets.

Disable Synchronization (sync)  

If the synchronization of the Gmail account is enable then it will decrease the internet speed of the mobile phone because when we turn on the sync of the phone then our data is storage online so during this process internet data is consume so during the synchronization process our internet speed is less because our data is using on the uploading of our detail on the online.

If we not want to save our personal data or any other information online then we will turn off this setting then our data is not using on the synchronization process and speed of the internet is increase.

Use Advertisement (ads) blocker apps

In our mobile phone there are many apps which show ads on their home screen, these ads are also the reason to decrease the speed of internet because when we run this application then these ads consume internet data than our data is not use properly on our working app so to increase the speed of internet we can use ads blocker app.

These ads blocker apps are easily available on play store or another app store so just install these apps on the basis of star rating, after the installing the ads blocker we give to permission which they apps are required after this process we can see the effect of this ads blocker app and our internet speed is increasing by this process.

Delete caches data of the apps

When we using internet on the mobile phone then there are many apps are running on the background so a cache data is save of the phone, if we use internet for the long time then the size of cache data will be increase and this data is directly effect to the internet so after some time interval we can delete this cache data from the phone after this process we see better result on phone.

The removing of caches data is a very easy process if you not know this process then we describe about this topic so just remove your caches data first of all go to the setting of the phone and click on the storage section here we can see the option of remove cache data so click on the button and remove all cache data from phone.

We can remove the cache data of some apps which use internet to do this process go to the setting and click on the apps here we click on the those app which apps has cache data, after the click on the apps we see the remove cache data from phone option so do this process then the cache data of this app will be remove.

Use lite apps on phone

If our phone has low RAM then we not use higher apps because these app decrease the phone performance there are many apps are available on original version and their lite version these apps are Facebook, Instagram, etc.

The lite apps are very useful for the mobile so we can recommended you to use lite apps of different apps the lite apps are using less internet data and use less resources of the mobile so lite apps are god for the mobile.

Change APN setting of the mobile

The APN setting of the mobile is one of the most important setting, these APN setting are different for different internet provider so we can configure these APN setting according to their area but in the phone some APN setting are default available on the SIM but most of the cases these default setting are not provided better internet on the phone so many people are configure these default setting according their area.

If you not want what is APN and how they work to improve internet speed then just click on the link and see all detail of APN.

Change DNS server

If we use internet to access the different site than we required their IP address, to find the IP of different sites we use DNS server, this server  help us to find the different site IP address, if at the same time most of the people this site then this site is not easily access due to load on it so to access this site we use DNS server, this DNA server app are easily available on play store or any other app store this app help us to change the DNS server.

Reboot the system

At the end of we talk you that if you follow all the instruction which are discuss above then you will find better internet speed on your phone but at the end of you will reboot or switch off your device and then run this device after this process your device do better work.

Increase internet speed and check internet explorer

What is proxy server?

Proxy server | Types | In app detection
Proxy server | Types | In app detection 

Proxy server work as service provider between the user and source, when we use internet on the device then an IP address is required to access our data this IP address is the identity of the device and any one can track our activity on the device so to hide this IP address a server is used this server is called proxy server

Proxy server work as VPN (virtual private network) but is not fully as VPN, Proxy server are made only for specific website, apps, Browser we can access only limited data with the help of proxy server, but with the help of VPN we can access any website, apps, browser and other things

So we can say that VPN is more powerful than proxy server but in this article we can talk about only proxy server if you want to what is VPN and how to it work in networking then just click on the below link and see the all detail about VPN.


Proxy server | Types | In app detection

What is MAC address?

MAC address | MAC spoofing
MAC address | MAC spoofing 

Just as human are identify with the specific name, home address and other detail, similarly devices are have their own identity, these identity are known as MAC address, the full form of MAC is media access control

The MAC address of different devices are different, these MAC address is used to access to internet on the device the MAC address of the device is globally unique to understand the MAC address of the device we can take an example

Suppose we want to search a human being on the earth then we need their identity such as where this person live and their physical identity are required to reach this person similarly in the networking when we access internet on the device then the network provide can access our device MAC address, these MAC address is different from IP address

The MAC address of the device are known different name such as BIA address, Physical address, with the help of MAC address the internet service provider can stop our internet services

If we access internet on the device with the help of different sources such as Wi-Fi, Bluetooth, Ether net port then MAC address will be change according to the connection if we use internet on the device with the help of Wi-Fi then the MAC address is different and if we access internet on the device with ether net port the MAC address will be different

So we can say that the MAC address will be changed according to the connection, if in the device have three NIC (Network interface card) card then device have three MAC address these address are use to different type of internet connection which is describe above

The MAC address of the device is being 48 bit and if we converted into bytes then it will be 6 bytes but most of the cases it read only bit, the MAC address of phones, Laptop and other devices are written into hexadecimal number system

MAC spoofing

The MAC address of the device are coded in the device when it is manufacture the MAC address of the device we can change and this process is called MAC spoofing, the MAC spoofing is not illegal but if we do wrong work after the MAC spoofing then it will be illegal so we not need to try the MAC spoofing 

MAC address | MAC spoofing

What is IP (Internet protocol)?

IP address | IPv4 vs IPv6 detail | Types of IP
IP address | IPv4 vs IPv6 detail | Types of IP

When we access internet on the device then a address is required to send the data on the right person this address is called IP (Internet protocol), without the IP the data is not send by the right person, IP is play very important role in the internet communication.

To understand the internet protocol in the simple language let us take an example suppose we have a parcel and we send this parcel to our relative then to send this parcel to that person we need their home address, without the home address or any other address this parcel is not reach to that person so in the internet without IP we cannot send any data with the help of internet.

Internet is access on the device with the help of wire connection or wireless connection but most of the data is transfer through the wire because speed is more in the wire connection, We use the wireless internet connection on the mobile phone or other device but if we transfer large amount of data to one country to another country then it is possible due to wire connection of the internet.

Types of internet protocol (IP)

There are mainly two types of internet protocol which are discuss as below

IPv4 Protocol

IPv4 protocol is consist four numbers which is separated by dots the range of each number is 0-255 in decimal but computers are and understand these decimal number computers are understand only binary numbers so these decimal number are converted into binary then computer are able to understand this numbers, Each number of the IPv4 protocol are written in the binary form as (00000000-11111111) each number is combination is the combination of eight binary number combination

The all IPv4 protocol number is the combination of 32 zero or ones so we can say that IPv4 is the 32 bit address, but there are the limit of this protocol we connect only 4 Billion devices to this protocol but in the real life the number of protocol address is more than 4 Billion so we need a new protocol to connect other devices

IPv6 protocol

This protocol is more used than IPv4 protocol because the number of bit in this protocol is more than IPv4 so this is widely used in this protocol the IP address is the combination of 128 zeros or ones so we can say that this protocol is 128 bit the there are 2128 devices are connect to this protocol, if we want to see our IP address then go to the browser such as chrome and types what is my IP address then google show us our IP address.

Another type of internet protocol

Dynamic protocol

When we use internet on the device the an IP is required if this IP is change when we again connect to the internet then this protocol is called dynamic protocol, the internet service provider are continuously change IP when we connect to the internet this is doing to secure to the internet and provide better result to us

Statics protocol

This protocol is used by limited organization because in this protocol only valuable information are transfer by one place to another place this protocol is less secure so this protocol is not widely used

IP address | IPv4 vs IPv6 detail | Types of IP

What is boot loader?

Android bootloader unlock | Kernal in operating system
Android bootloader unlock | Kernal in operating system 

Boot loader is programming software which helps us to prevent the installation of unwanted software in the device most of the mobile manufacture company not give the permission to unlock the boot loader directly because it is dangerous for our device.

If we unlock legally the boot loader of the device then we take permission of the give device developer if we unlock the boot loader without any permission with the help of third party apps then we faces many problems.

If we want to install custom ROM in our device then it is necessary to unlock the boot loader of the device, without unlocking the boot loader we cannot change and customise the software of the device
Most of the mobile manufacture company not give permission to change their software so they lock the boot loader of the device and if we want to unlock this boot loader then we get to permission with the developer.

After the unlocking the boot loader we can many changes in our device such as we can install custom ROM and configure the software of the device our desire level but after the unlocking the boot loader the security of the device are reduces and unwanted software and malware may be installed in our device without our permission so this is the big reason company did not give the permission to unlock the boot loader.

What will we do on the device after unlocking boot loader?

There are many things we can do after the unlocking the boot loader on the device, most of the user unlock the boot loader to Root the devices, because after the unlocking the boot loader of the device t can be easily rooted, in the rooted device we can use moded application or other software which are blocked by our security system.

But we cannot suggest to you to root your device because after the rooting of the device there are many viruses and other malware can install in our device without our permission so we don’t use rooted device because this is harmful for our privacy.

If we want to use rooted device to run such programs then we do not save our personal data such as Photos, mail, Bank details and other private information on this device we should use rooted device when our personal data is not save on this device because after the rooting of the device the security of the system is destroyed so any malware software steal our personal data.

What is kernel?

Kernel is a programming software which is use to interaction between hardware and software of the device, the kernel of the device is decided how much resources are provided to the software such as RAM processor and other things.

Kernel is the part of the Operating system which operates different software on the devices, in our device there are many software Run the different software are consume different resources so to control on the software or apps a program is required this program is kernel

In our device we can do work with two types

(a)User mode
(b)Kernel mode

(a) User mode

In this section if we want to directly run our files and other program without system interface then we can do it this is called user mode, in this mode we can check all the detail before the run of file and all the things is right then we can procedure in the next step.

(b) Kernel mode

In this mode most of the software and apps are running with the help of kernel because it provide resources to their requirement, Kernel is work as leader of all programs.

Android bootloader unlock | Kernal in operating system