Saturday, October 22, 2016

// // Leave a Comment

Computer Certification: Four Tips For Maximum Performance During The Exam


There are plenty of articles out there about how to prepare for a computer certification exam. However, there are also things you can do to increase your chances of success on exam day during the most important part of the entire process — the time that you're actually taking the test.

Here are the five things you must do on exam day to maximize your efforts.

1. Show up on time. Yeah, I know everyone says that. The testing center wants you there 30 minutes early. So why do so many candidates show up late, or in a rush? If you have a morning exam appointment, take the traffic into account. If it's a part of town you don't normally drive in during rush hour, you might be surprised at how much traffic you have to go through. Plan ahead.

2. Use the headphones. Most candidates in the room with you understand that they should be quiet. Sadly, not all of them do. Smacking gum, mumbling to themselves (loud enough for you to hear, though), and other little noises can really get on your nerves in what is already a pressure situation. In one particular testing center I use, the door to the testing room has one setting: "Slam".

Luckily, that center also has a headset hanging at every testing station. Call ahead to see if yours does. Some centers have them but don't leave them at the testing stations. Wearing headphones during the exam is a great way to increase your powers of concentration. They allow you to block out all noise and annoyances, and do what you came to do — pass the exam.

3. Prepare for the "WHAT?" question. No matter how well-prepared you are, there's going to be one question on any exam that just stuns you. It might be off-topic, in your opinion. It may be a question that would take 20 of your remaining 25 minutes to answer. It might be a question that you don't even know how to begin answering. Whatever the reason, it's the question that has you thinking, "WHAT??" I have talked with candidates who got to such a question and were obviously so thrown off that they didn't do well on any of the remaining questions, either.

There is only one thing to do in this situation: shrug it off. Compare yourself to a major-league pitcher. If he gives up a home run, he can't dwell on it. He's got to face another batter. Cornerbacks in football face the same problem. If they give up a long TD pass, they can't spend the next 20 minutes thinking about it. They have to shrug it off and be ready for the next play.

Don't worry about getting a perfect score on the exam. Your concern is passing. If you get a question that seems ridiculous, unsolvable, or out of place, forget about it. It's done. Move on to the next question and nail it.

4. Finish with a flourish. Ten questions from the end of your exam, take a 15 to 30 seconds break. You can't walk around the testing room, but you can stand and stretch. By this point in the exam, candidates tend to be a little mentally tired. Maybe you're still thinking about the "WHAT??" question. Don't worry about the questions you've already answered -- they're done. Take a deep breath, remember why you're there — to pass this exam — and sit back down and nail the last ten questions to the wall.

Before you know it, your passing score appears on the screen!

Download Bryant Advantage Ultimate CCNA Study Guide.
Read More
// // Leave a Comment

Exercise 3.1 - Algebra: Solve Quadratic Equations

The program below is the answer to Liang's Introduction to Java Programming (9th Edition) Chapter 3 Exercise 3.1.
Liang Introduction to Java Exercise 3.1

 * @Author: Aghatise Osazuwa
 * Website:
 * Exercise 3.1 - Algebra: Solve Quadratic Equations

public class CheckerboardPatternOfAsterisks {
    public static void main (String [] args) {
        // declare variables
        double a, b, c, disc, r1, r2;
        // create Scanner to read user input
        Scanner input = new Scanner(;

        // prompt user to enter details
        System.out.print("Enter a, b, c: ");
        a = input.nextDouble();
        b = input.nextDouble();
        c = input.nextDouble();

        //calculate the discriminant
        disc = b * b - (4 * a * c);
        //calculate the roots
        r1 = (-b + Math.pow(disc, 0.5)) / (2 * a);
        r2 = (-b - Math.pow(disc, 0.5)) / (2 * a);

        // display the results
        if (disc > 0){
                System.out.println("The roots are " + r1 + " and " + r2 + "\n");
        if (disc == 0){
                System.out.println("The root is " + r1 + "\n");
        if (disc < 0){
                System.out.println("The equation has no real roots.\n");
Solution to exercise 3.1
Sample Program run
Click here to see other solutions to Introduction to Java Programming.
Read More

Friday, October 21, 2016

// // Leave a Comment

What Is A DIMM?

DIMM Swissbit 2GB PC2-5300U-555

A DIMM, or dual in-line memory module, is a double component of the single in-line memory module. In actual structure, DIMM contains several random-access memory chips on a single circuit board. This small board is connected to the computer motherboard. A single SIMM usually has a 36 data bit path, counting the usual four parity bits to the computer motherboard. This path normally requires a 72 pin connector between the circuit board and the motherboard.

When would DIMM be used?

When there is a need for a larger path, DIMM can be used in place of the SIMM. Essentially, what this does is increase the data bits from 36 to 72, providing a 64 bit transfer. When the computer is used in a business situation, this added power can be very helpful.

Can DIMM be connected in the same method?

Yes and no. Yes, in that DIMM will reside on a smaller circuit board that is connected to the computer motherboard. However, the 72 pin connection that works with SIMM will not be sufficient for DIMM. The more powerful device will require a 168 pin connection in order to function.

Will DIMM eventually replace SIMM completely?

This is highly likely. As even home computers begin to be configured into home networks, and the home computer is used for more functions than ever before, it is likely that DIMM will become more attractive to both residential and business users. In time, technology will most likely render SIMM obsolete and rely on DIMM as the in-line memory module of choice.

Is it possible to update a computer to use DIMM instead of SIMM?

Yes. Usually, this will simply mean modifying the pin connection to the motherboard and preparing a circuit board that will include the DIMM module instead of the SIMM. In systems that already allow for the connection of two SIMM modules, it is possible to substitute a single DIMM without making any alterations at all. Just about any computer that is powerful enough to drive Windows can be upgraded to include DIMM. However, it is always a good idea to have the system checked by a professional before making this change.
Read More

Thursday, October 20, 2016

// // Leave a Comment

7 Awesome Things You Can Do With Your Smartphones You Do Not Know

Best Smartphones manufacturers

About 1.4 billion people have and use Smartphones daily, but how many of them actually maximize its functions? Aside from voice calls, social networking, telling the time, listening to music and maybe using the device as a flashlight, there are so many other creative ways the Smartphone can be used beyond their standard features to make life easier. Below are seven awesome things you may not know you could do with your Smartphone.

Tune a guitar

Yes! You can actually use your Smartphone to tune your guitar and as such, you do not need to struggle with an out-of-tune guitar ever again. All you need to do is download and install the Strings Free app, launch gStrings, then press the Menu key and select Settings. Next, Select the "Optimize For" drop-down list, Select "Guitar" then go back to the main tuning screen. Finally, press the "Tune Auto" button to have the tuner automatically identify the notes. If your phone's mic is having problems picking up sound from the guitar, go back to Settings and set the microphone sensitivity. This function is usually possible with mostly android Smartphones though.

Control a TV

This may sound incredible, especially if your phone and your TV are not the same brand, but in reality, it can be done. Almost every Smartphone is released with an infrared port that allows you to ditch your standard TV remote and instead use your device to control your TV. You however need to download an app from google play (if your Smartphone is also android) which will help you set it all up. Once it is set up, you are able to carry out all the normal tasks you'd expect from a TV remote, but by using your Smartphone.You can try download Peel Smart Remote on Android & iOS.

Scan documents

As long as you have a Smartphone, you no longer need to go to a cybercafé or use a scanner to scan documents, photographs, receipts, business cards or anything on paper that you want to make digital. The Smartphone's camera is already a portable, pocket document scanner that you need. For those who use android Smartphones, the Google Drive app has a built-in scanning feature while Evernote Scannable is available for iPhone and iPad users. Using the camera lens, scan and then share your scans via email or text, or export them as PDF and JPG files. Most Smartphones even gives you the option of automatically rotating, cropping, and adjusting images so your scans are easy to read.

A cordless mouse and keyboard

This is super convenient if you are the type who uses a computer a lot and your computer’s touchpad is faulty. Your Smartphone, especially android, allows you to download an App called RemoteDroid, which consequently turns your phone to a wireless computer touchpad or keyboard. This function is also a great solution for people who use their computers as their entertainment hub.

A mic

When it comes to communicating with people over the internet, making audio recordings, or using speech recognition, a good microphone is needed. Although, headphones usually come with a mic or there is a built-in microphone in the computer, there are times when the audio quality is not good or the microphone stops working while you are in a middle of a conversation. In case of such an incident, your Smartphone right beside you can come in very handy. There are many Apps available for this purpose, but the one that is easy to set up is ‘WO Mic’ by Wireless Orange. All you have to do is to download that free App on your Smartphone and WO Mic Client program and WO Mic device driver on your PC. You can then use your Smartphone as a mic using WiFi or Bluetooth or USB.

Games console

If you love to play games, especially video games, you will be delighted to know that there are some tremendously powerful Smartphones around, which can give you a great gaming experience. The MHL (Mobile High-Definition Link) offers a way to connect phones and other portable electronics to HD televisions and monitors, using an MHL cable linked between the micro USB port on your phone and your screen's HDMI. While some phones are rather selective and do not support MHL, If you have got any of the Sony Xperia Z series, another idea is to make use of PS4 Remote Play and play your console games on your phone.

A microscope

A number of Smartphone cameras are great for taking selfies and short videos, but with some tweaks, you can actually turn the turn the same camera into a microscope. With magnification levels up to 375x, you easily conduct a scientific experiment with your phone and satisfy your scientific curiosity or just enjoy the aesthetics of greatly magnified photos. Parents will love this as it could come in handy when doing home science project with their kids.

Get the latest Smartphone deal at Jumia
Read More
// // Leave a Comment

5 Reasons Businesses Should Take Cyber Security Seriously

Cyber security

Since the internet trend started in the 1990s, many governments and business activities, and state secrets have moved from offline to online. But with hackers on the prowl wanting to steal and expose sensitive information, cyber security is ever more important.

When we look at what is happening around the world, cyber breach is on the rise. This breach has led to shocking revelations and release of trade secrets that are not meant for the public. In line with this, here are five reasons businesses should take cyber security serious.

Enable more trusted transactions online

Online transactions are widely used today because many businesses have moved online. If a customer patronizes your business and loses his money, it is really bad for the reputation and growth of your business. These customers will not recommend you to friends. Hence, with cyber security, your website should be hack proof 24 hours.

It prevents information espionage

There have been widespread reports of China allegedly attacking US companies to steal trade information. These trade secrets can be used to improve China’s businesses. No business will like this. You will guard your trade secrets jealously to have the competitive edge. But if you disregard cyber security, sooner rather than later, your trade secrets will be everywhere.

Makes your business less vulnerable

Hackers can wreck any business if you are targeted. They can take your website offline for hours and if your cyber security is weak, you will lose money as well as customers. So, with cyber security, your business will be less vulnerable. This is even worse if you are a small business.

Cyber criminals

It can cost your business

The cost of ignoring cyber security can be very devastating and can cripple any business. If you are a financially oriented business, you should never joke with cyber security because you can lose money in a single swoop!

Cyber criminals are always at work

Findings show that 3.5 new threats happen every second according to Trend Micro. You can only stop them by having an impenetrable cyber security. This is not negotiable if you are an online business!

Get SSL Certificate for your website today at Namecheap.
Read More

Wednesday, October 19, 2016

// // Leave a Comment

Importance Of Digital Certificate On Your Website To Your Business

SSL certificate for websites

It is very important to take the protection against online information larceny, because it's getting very easy for people to share digital products. Information theft is a type of computer safety and security risk and it's defined as thieving someone’s private or confidential information. It’s very dangerous to get the information stolen as this can cause as much damage, or possibly more then hardware or software theft.

Most of the systems on the way of your data can see what you send. A lot of companies try to stop information from being stolen by applying some user identification and authentication controls.

These constrictions are most promising for protecting computers along a company's premise. However, to protect information on the Internet and on networks, companies use a handful of encryption methods like digital certificates and SSL security.

SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers. Encryption refers to the process of converting data into an unreadable form. Encrypted data is like any other data because you can send it through a lot of options, but to read it you must decrypt or decipher it into a more readable form with the help of public and private keys provided. 

Throughout the encryption process, the unencrypted data or input is known as plaintext and the encrypted data, or output is known as cipher text. To be able to create an SSL connection a web server requires an SSL Certificate. When you choose to activate SSL on your web server you will be prompted to complete a number of questions about the identity of your website and your company. 

Your web server then creates two cryptographic keys - a Private Key and a Public Key. To encrypt information, the programmer converts the plaintext into cipher text using some type of encryption key. An encryption key is the programmed formula that the person who receives the data uses to decrypt the cipher text. There are varieties of encryption or algorithm methods. However, with an encryption key formula, you will be using more then one of these techniques.

Most common example is a nasty individual stealing credit cards so they can make illegal purchases on another person's account. If information is transmitted over a network then it has a very high chance for nasty users to capture the information.

A digital signature is a type of encrypted code that an individual, website, or company pastes to an electronic document to make sure that the individual is who they claim to be. The code will most likely consist of the user name and a hash of usually part of the message. The complexities of the SSL protocol remain invisible to your customers. Instead, their browsers provide them with a key indicator to let them know they are currently protected by an SSL encrypted session - the lock icon in the lower right-hand corner, clicking on the lock icon displays your SSL Certificate and the details about it. 

All SSL Certificates are issued to either companies or legally accountable individuals. The main purpose behind using digital signatures is to make sure that it's not a swindler participating in the transaction. So, digital signatures help narrow down e-mail frauds. A digital signature can also make sure that contents of a message have not been changed.

Typically, an SSL Certificate will contain your domain name, your company name, your address, your city, your state and your country. It will also contain the expiration date of the Certificate and details of the Certification Authority responsible for the issuance of the Certificate. When a browser connects to a secure site it will retrieve the site's SSL Certificate and check that it has not expired, it has been issued by a Certification Authority the browser trusts, and that it is being used by the website for which it has been issued.

Many ecommerce websites will usually have digital certificates. A certificate authority (CA) is an authorized company or individual for that matter that has the ability to issue and verify digital certificates.

Get SSL Certificate for your website today at Namecheap.
Read More

Saturday, October 15, 2016

// // Leave a Comment

Best Free Antivirus Apps To Protect Your Smartphone

Anti-virus apps

Your activities online can make your smartphone prone to virus. You download free apps, movies, and songs online as well as visit websites which you cannot determine if they are safe or not. But with an antivirus you can shield and protect your phone from any malware or virus.

Fortunately, you can download or purchase any antivirus app of your choice. But do you know which one to download? Here are some free and brilliant antivirus for your phone. They are also safe.

360 Security

Want real-time protection for your phone? This is the antivirus app to use. The features of the app include scanning files, antitheft feature to help you locate missing phones. You can also use passwords to make your app inaccessible to others by using this app.


Avast is a popular brand. Over 100 million users have downloaded the antivirus. However, you must have enough space on your phone because the capacity is 2GB. Besides protecting your phone, it assists in data recovery, ad-protection and app locking.


The Real-time Protection is own by AVG. And of course, AVG is another well-known antivirus. Real-time protection, task killer, remote data wipe, battery monitor, data usage checker, and call blocking are the amazing features of this app.

All-in-one solution

Like the name All-in-one solution, the app protects your phone in all entirety. The app tells users about the threats to their phone as well as alert you about websites designed to steal your information.

Antivirus security for phones

Avira Antivirus Security

It performs important functions like malware scan, real-time protection and more. The app also has some features like stage fright advisor, which help in protecting your phone. Anti-theft, anti-privacy and blacklisting features provide further protection.

Quick heal

This is another app that will protect your phone against virus attack. It shields your device from unauthorised users, review apps that may affect your privacy, and data wipe feature.
Read More

CSCPT - Subscribe To Our Email Newsletter

Computer Science Programming Tutorials (CSCPT) is a blog for sharing free programming tutorials, free source codes, eBooks, software downloads and latest technology news.

The following are some of the advantages of subscribing to our newsletter:

  • You get the latest updates sent daily to your inbox.
  • Never miss a post.
  • Be notified of freebies - ebooks, software, etc.