Posts

Amplitude Modulation

Image
  Amplitude Modulation Using High-Level Modulation Circuit Introduction Amplitude modulation is a way of sending information like audio or voice through the air using radio waves. Imagine if there is a message you need to send to someone, like your voice message or  music then you need a carrier wave with a high frequency that can travel long distances. A common circuit for implementing amplitude modulation uses a transistor-based configuration known as the high-level modulation circuit. Circuit components  Radio frequency carrier source - generates high frequency carrier signal normally in kHz to MHz range. Radio frequency class c amplifier - a class C amplifier is a electronic amplifier that only works part of the time. Modulating signal - amplifies the low-frequency audio signal.  Modulation transformer - couples the modulated output to the next stage. Power supply - provides the DC (direct current) voltage to the circuit. Other components - Resistors and cap...

5G Network.

Image
  5G Technology And Its Impacts. 5G technology means it's the fifth generation of mobile networks, and this is also the newest wireless standard after the 1 to 4 generation. 5G enables new kinds of improvements over the old 4G network, so let’s talk about its impacts on us. 5G technology delivers higher multi-Gbps data peak speed; in addition, it offers massive network capacity, ultra-low latency, and increased availability to receivers. We can feel new user experience with improved efficiency. Now 5G technology is being expanded very quickly because it empowers new experiences and connects various industries. It can be up to 100 times faster than a 4G connection (average: 10 GB/s), so you can download movies in seconds. In 5G, you can experience low latency while you are working with it. Low latency means a delay; sometimes you had experience that while data transferring. If you are transferring a 1 GB file and your connection is unstable, it will cost you some extra time to...

Why do we need Proxy.

Image
  Proxy Server.   If you ever think about how the internet works, how it filters and manages the content you see in your interface.  I hope you all might be interested in learning about proxy servers. In the ICT field, a proxy server plays a crucial role in dictating the flow of information on the web.   Let’s talk about how it works on the web. To put it simply, a proxy server acts as an intermediary between a user and the Internet. It’s acting as a bridge that connects your requests to access websites and files on the internet. It’s like a middleman that takes your request and sends it to the appropriate place, then brings the information that you need. This setup can be particularly useful for organizations and schools; it’s allows them to control and monitor the online activities of their network users. When you use a proxy server to access the internet, all the websites you request go through this server. The websites you’re visiting only see the proxy serv...
Image
  The Secure Web: Understanding HTTP vs. HTTPS Basics of HTTP. 1. What is HTTP?  HTTP stands for Hypertext Transfer Protocol, which is the foundation of data communication on the World Wide Web. When you type a website into your browser, it sends an HTTP request to the server where the website is hosted to retrieve the content and display it on your screen. HTTP operates over port 80 and is a non-secure protocol, meaning the data exchanged between your browser and the server is not encrypted. 2. The Limitations of HTTP Since HTTP data is not encrypted, it is vulnerable to interception by cybercriminals, resulting in potential privacy and security risks for users. Hackers can eavesdrop on your connection and steal sensitive information, such as login credentials, credit card details, and personal data, when you visit an HTTP website. The Security Upgrade: HTTPS 1. What is HTTPS? HTTPS, or Hypertext Transfer Protocol Secure, is the secure version of HTTP that uses SSL/TLS en...

Cloud Computing

Image
  World wide web. What is WWW(World wide web) stand for? It's a service that provides from the internet and a large collection of electronic documents stored on computer around the world. As I mention above the inventor of www is Tim Berners-Lee in 1989 while working at CERN. On August 6, 1991, the first website was introduced to the world. This invention changed how we get and share informations, learning, business and entertainment. And now it's a key part of our daily lives and it helps to connect people in worldwide. In the world most popular part is www but they provide more useful services to the people like, File transfer protocol(FTP). E-mail. Remote login. Cloud computing. Cloud computing. Cloud computing has become a major part of our digital lives, and it offers various services to individuals and businesses. If you're new here, you might need to know some terms like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Servi...

Binary

Image
 MACHINE LANGUAGE. What is machine language? In the world right now, we use Artificial intelligence to make our lives easier, but in the past, it’s not been easy like this. Over the years, computer languages have evolved from low-level to high-level languages.In addition, there are 5 main computer generations, and each one has different technologies in their own time. First generation (1940s-1950s) - used vacuum tubes. Second generation (1950s-1960s) - used transistor. Third generation (1960s-1970s) - used Integrated circuit.(IC) Fourth generation (1970s-present) - used Microprocessor. Fifth generation (present and future) - using Artificial intelligence.(AI) Low-level Language. The first generation used low-level languages, also known as machine language. Low level language is the only language that can be understood by the computer, and it contains only two digits 1 & 0. 1 refers to “true” and 0 refers to “false”. 01100011 01101111 01101101 01110000 01110101 0111...

Tech Safe

Image
  Steps individuals can take to protect themselves from cyberattacks. In the world most of people have one big question for how we can survive from cyber attacks and how it look like. In cyber attack it has two side. One is ethical way and another one is unethical way. Ethical one is help to people’s and software companies to find bugs in their workspace. Another way is unethical and we called it by unethical hacking. There is lots of laws against them. A cyberattack is an international effort to destroy data, steal and exploits private data. World is getting priority to save individuals, organizations and government from cyber attacks. This blog outlines essential measures to safe against cyber threats. Learn cyber security. This is the easiest way to learn about cyberattacks and learn how we can survive from it. Technology is developing and AI technology is come to the world in addition there is lots of free courses offer from trusted sites in internet and most have good reviews ...