Wednesday 19 June 2013

Selection Sort

It is the sorting technique with O (n2) Complexity. Hence this technique can’t be used for sorting large lists. This sorting technique finds maximum Value from the list and swaps it with first element. This process is repeated for the remaining list until list is not sorted.

Only n swaps are required to swap n number of elements.

Example: Consider the following unordered list   

10
40
7
3
25
33
                                                               

First Pass: Highest element in the list is 40 swap it with first element

40
10
7
3
25
33

40 is now first

Bubble Sort

It is the simplest type of sorting technique. In this sorting technique, first two elements are compared and if first element is greater than second, they are swapped. This process is repeated for each pair of adjacent elements to the end of the data set. It again starts with first two elements and repeat the process until no swap occurs.
This sorting technique can only be used for sorting small lists. This technique can also be used for the large lists if only few elements require sorting.

Important: Average and worst case performance of this sorting technique is O (n2).


Example: Consider the following unordered list 


5              10           3              1              9              0

First Pass

 5 <10 so there is no need of swapping.

Addressing Modes

Addressing modes are the way to identify operands in machine language instructions. It defines how to calculate effective address of operand with the information held in registers and/or constants contained by a machine instruction.
Some commonly used addressing modes are as follows:

Implied Mode: In this addressing mode operands are specified implicitly in the definition of instruction. E.g. complement Accumulator. In this instruction operand in the accumulator is implicitly defined in the instruction.
Example: CLA

Immediate Mode: In this addressing mode operand is specified in the instruction itself. Hence instruction contains operand instead of Address field. These addressing modes are used for the initialization of registers to a constant value.
Example: MOV R2, 123

Tuesday 18 June 2013

Scanning Technologies

Four types of scanning techniques are used by manufactures to generate soft copy of color images or documents:
1) Multi Pass Technology
2) Single Pass Technology
3) Photo Multiplier Tubes(PMT) Technology
4) Contact I Image sensing Technology.

Multi Pass Technology:This scanning system was used in traditional scanners. Three different light sources (i.e. Red, Green and Blue) are used to scan the image. First red light is switched on and green and blue are left off. Scanning is done with red light source. In second pass red and blue are left off and image is scanned with green light source. In third pass image is scanned with blue light by placing red and green sources in off condition. Result obtained from these three scans is combined to get the final image scan.This problem has the problem that all the scans must be precisely aligned so that when images are combined image with sharp edges can be generated.

Flash Memory

It is a type of EEPROM that is much faster than traditional EEPROM. It reads or writes data in form of blocks. Block size is usually 512 bytes.

Sometimes flash memory is termed as flash RAM. But there is a much difference between flash RAM and flash memory. Flash RAM requires constant power to maintain its contents whereas flash ROM can store its contents even without any power.

Inside Flash Chips

Boot Block Section: - This area is used for booting and may consist of one or more blocks that is kept secure from erasing blocks. This block is generally used to store firmware of for memory management.

Block Erase Section: -It is the user working area and is divided into blocks. This area can be accessed randomly for read/write operations. Memory Erased blocks contain no data.

Types of Flash Memories

Monday 17 June 2013

Ext, Ext2, Ext3 and Ext4 Linux File Systems

EXT (Extended File System)

 It was the first file system for Linux kernel developed by Remy Card in April 1992. It was based on metadata structure .It was the first file system that implemented VFS( Virtual File System ). Some features of this file system are as follows:
a) It supports maximum partition size up to 2 Giga Bytes.
b) It support file name size up to 255 characters long.
c) It lacked in timestamps (the current time of an event that is recorded by a computer) for modifications to inodes (a data Structure that stores all the information about a file except its name and its actual data) and to data.
d) It lacked in providing support for separate access for each user and group.
e) Linked list technique was used for file handling.

EXT2(The Second Extended File System)

Sunday 16 June 2013

Display Problem Solutions

Computer is nothing if it is not generating display because user can’t work on that. This Problem can arise due to any of the following reason:
a) Due to Monitor Problem
b) Due to Motherboard/RAM Problem
c) Due to loose Connections
d) Due to wrong CMOS settings
e) Due to Wrong Display Settings
f) SMPS faulty

Here are some troubleshooting steps that can be used to resolve display problems.

Case1: If Monitor is Faulty
Symptoms: Faded Colors, Red Display, Green Display, Blue Display, distorted display, lines on monitor, display too bright or too fade.
Solution: This problem can be due to any of the following reasons
1) Display connection is loose, Tight them Properly
2) Data Cable is Faulty, Change that.
3) PCB is dry soldiered, Re Soldier the PCB, especially neck card.
4) Neck card IC can be faulty, Change that.
5) FBT Faulty, Change that with same value

90% of such problems can be solved just be re soldiering the neck card and changing display cable. 

Case2: if Motherboard /RAM are faulty