ⓘ Free online encyclopedia. Did you know? page 26




                                               

Hindu scripture

The Hindu scriptures are a number of books and other texts which tell about Hinduism and Hindu mythology. They are sacred literature for Hindus. Important Hindu scriptures include the following: The Upanishads The Brahmanas The Vedas The Puranas ...

                                               

Itihasa

In Sanskrit, Itihasa means history. For Hindus, an Itihasa is a story that tells about what happened in the past in the land of India. Itihasas are usually epic poems. The important itihasas to Hindus are the Ramayana and the Mahabharata. Modern ...

                                               

Kalika purana

The Kalika Purana is a Hindu script. It is one of the 18 uppurana. There are 98 lesson and 9000 sloka in this holy book. This is the only book written for Godess Kali and her special form. It explains the kamrupa mountain, river and kamakhya temp ...

                                               

Purana

In the Sanskrit language, purana means story of ancient times. For Hindus, a purana is a scripture that tells what happened in ancient times. Puranas tell about history, ancient Indian traditions, and what Hindus believe.

                                               

Ramayana

The Ramayana is an ancient Sanskrit epic about Rama and Sita. It is one of the two most important ancient epics of India, the first one being the ancient Mahabharata. The epic was originally written by sage Valmiki of Ancient India. The book has ...

                                               

Upanishad

The Upanishads are some of the sacred books of the Hindu people. The Upanishads are part of a large collection of sacred books of Hindu people, called the Vedas. They are placed at the end of the Vedas and they primarily deal with knowledge or wi ...

                                               

Vedas

The Vedas are the four holiest books of the by mankind to the next, perhaps over thousands of years. Each book has four major kinds of text – the Samhitas mantras and benedictions, the Aranyakas, the Brahmanas commentaries on rituals, ceremonies ...

                                               

Comparison of Internet Relay Chat daemons

IRC server features, mostly extensions to RFC 1459. Probably also implementations of RFC 2810, RFC 2811, RFC 2812, RFC 2813, and possibly IRCX. %##channels whose name are in UTF-8 for IRCX %&channels &channels whose name are in UTF-8 for ...

                                               

IRCd

An IRCd, meaning Internet Relay Chat server program, is a program, server software that uses the IRC protocol. This allows people to talk to each other on the Internet. They exchange textual messages in real time. The server accepts connections f ...

                                               

Comparison of Internet Relay Chat clients

The following tables compare general and technical information between a number of IRC client programs. Please see the individual products pages for more information. This page is does not include everything and may not be current.

                                               

KVIrc

KVIrc is a multilanguage, graphical IRC client for Windows, Linux, Unix and Mac OS. The K in K Visual IRC was for a dependancy to KDE, which became optional from version 2.0.0.

                                               

SeaMonkey

SeaMonkey is a free and open source Internet application suite, which uses the Gecko rendering engine. It works on many operating systems. It is very useful, and includes an e-mail client, a calendar, a HTML editor, an IRC client, and a web brows ...

                                               

Artificial intelligence

Artificial intelligence is the ability of a computer program or a machine to think and learn. It is also a field of study which tries to make computers "smart". They work on their own without being encoded with commands. John McCarthy came up wit ...

                                               

Artificial neural network

A neural network is a sort of computer software, inspired by biological neurons. Biological brains are capable of solving difficult problems, but each neuron is only responsible for solving a very small part of the problem. Similarly, a neural ne ...

                                               

Deep learning

Deep learning is a kind of machine learning, which is mostly used with certain kinds of neural networks. As with other kinds of machine-learning, learning sessions can be unsupervised, semi-supervised, or supervised. In many cases, structures are ...

                                               

Genetic algorithm

A genetic algorithm is an algorithm that imitates the process of natural selection. They help solve optimization and search problems. Genetic algorithms are part of the bigger class of evolutionary algorithms. Genetic algorithms imitate natural b ...

                                               

Loop AI Labs

Loop AI Labs is an AI and cognitive computing company that focuses on language understanding technology. The company was founded in San Francisco in 2012 by Italian entrepreneur Gianmauro Calafiore, who sold his company Gsmbox to Buongiorno in 20 ...

                                               

Turing test

The Turing test is a test to see if a computer can interact with a person. The human should not be able to realise it is interacting with a computer. Alan Turing thought that if a human could not tell the difference between another human and the ...

                                               

Computer programming

Computer programming is the process of telling a computer to do certain things by giving it instructions. These instructions are called programs. A person who writes instructions is a computer programmer. The instructions come in different langua ...

                                               

Bytecode

Bytecode, also termed portable code or p-code, is a form of instruction set designed for efficient execution by a software interpreter. Unlike human-readable source code, bytecodes are compact numeric codes, constants, and references that encode ...

                                               

C dynamic memory allocation

In the C programming language, dynamic memory allocation refers to allocating memory during a programs run time. Dynamically allocated memory is obtained from a storage pool called a heap. A group of functions in the C standard library are typica ...

                                               

Goto

goto is a statement in many programming languages. It is a combination of the English words go and to. It is a way to jump to another line of code. Many languages support the goto statement, and many do not. In Java, goto is a reserved word, but ...

                                               

Logic error

In Computer programming a logic error is a bug in a program, which causes it to work incorrectly. A logic error produces unintended behaviour or output. In many cases, the syntax of the program is correct. This means that the environment used to ...

                                               

Programming paradigm

Programming paradigms are a way of grouping programming languages by what they do. Languages can be in more than one paradigm. Some paradigms look at the way the code is run, such as allowing side effects, or having to do things in a certain orde ...

                                               

Quine

A quine is a special kind of computer program, which accepts no inputs and outputs its own source code. They are named after the philosopher Willard Van Orman Quine.

                                               

Referential transparency

Referential transparency is a feature of parts of computer programs. A part of a program is called "referentially transparent" if it can be replaced with the value it gives back without changing the programs behavior. A referentially transparent ...

                                               

Return statement

A return statement is the information that part of a computer program gives to another part. In object-oriented programming, the term return is used by methods to perform an output. Much like when a button is pressed on a vending machine, then th ...

                                               

Service oriented architecture

Service-oriented architecture is a concept in computer programming. It is a way of creating a program or application that is focused around distinct tasks or services. With an SOA model, each piece of the program or application performs a specifi ...

                                               

SOLID (object-oriented design)

SOLID is an acronym for a group of five good principles in computer programming. SOLID allows programmers to write code that is easier to understand and change later on. Solid is often used with systems that use an object-oriented design. SOLID w ...

                                               

Transclusion

Transclusion is a way to use content from one electronic document, in another document without having to copy the content from one to the other. If the original content is changed, the change will automatically show in the article that is using t ...

                                               

Vim

Vim is a text editor made by Bram Moolenaar. Moolenaar publicly released Vim on November 2, 1991. Vim stands for Vi IMproved. Vim is an improved version of the vi text editor, an editor created by Bill Joy in 1976. Vim is free, and the source cod ...

                                               

Batch processing

Batch processing is when a number of tasks are put together over a set period of time. The jobs are then loaded into a computer system and done all at once, in a "batch."

                                               

Extensible Messaging and Presence Protocol

Extensible Messaging and Presence Protocol is a protocol for instant messaging. It is inspired by XML. It is different to most protocols because it is an open standard. This means that anybody who has a domain name and an internet connection can ...

                                               

Post Office Protocol

In computing, the Post Office Protocol version 3 is an application-layer Internet standard protocol used by local e-mail clients to get e-mail from a remote mail server over a TCP/IP connection. POP3 and IMAP4 are the two most widely accepted Int ...

                                               

SCSI

SCSI is a set of standards for physically connecting and transferring data between computers and peripheral devices, such as a hard drive or CD or DVD drive. SCSI stands for Small Computer System Interface, although the "small" is historic; SCSI ...

                                               

Transmission Control Protocol

The Transmission Control Protocol is one of the main protocols of the Internet Protocol Suite. TCP is part of the popular "TCP/IP" combination used by the Internet. The Internet Protocol, or IP, makes sure data on the internet gets to the right p ...

                                               

Arbitrary code execution

In computer security, Arbitrary Code Execution is something that allows executing code without permission. A good example is cross-site scripting attacks which inject client-side scripts into a webpage such as the self-retweeting tweet on TweetDeck.

                                               

Backdoor (computing)

In computing, a backdoor is a way of bypassing security mechanisms to gain access to a resource that is otherwise secured. Backdoors give illegal access to an otherwise secured resource. A common example for a backdoor is the existence of default ...

                                               

Cross-site scripting

Cross-site scripting is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code. In a Cross-site Scripting attack XSS, the attacker uses your vulnerable web pa ...

                                               

Password

A password is a way of authentication. It can be used as a means to identify a person. Since the password is the only way to identify a person, it has to be kept secret. A password can be static. This means it will remain the same unless the user ...

                                               

WannaCry ransomware attack

WannaCry ransomware attack was a worm that infected many Windows computers around the world on May 2017. The worm had spread malware that encrypted the users computer data and demanded affected users to pay 0 Bitcoin within 3 days or 0 Bitcoin wi ...

                                               

Data structure

In computer science, a data structure is the organization and implementation of values and information. In simple words data structure is the way of organizing data in efficient manner. Data structures are different from abstract data types in th ...

                                               

Array data structure

In programming languages, an array is a way of storing several items. These items must have the same type because an array can not store different kinds of items. Every item in an array has a number so the programmer can get the item by using tha ...

                                               

Binary tree

In a balanced binary tree the left and right branches of every item differ in height by no more than 1. In a perfect binary tree all interior items have two children and all leaves have the same depth or same level. A perfect binary tree is also ...

                                               

Comma-separated values

In computing, a comma-separated values file stores information you might find in a spreadsheet, such as a table of text, numbers, and dates, in a plain text file.

                                               

Hash table

A hash table is one type of tool for storing information. In computer science, these tools for keeping track of information, or data, are called data structures. A hash table is a data structure that uses a hash function to keep track of where da ...

                                               

Heap (data structure)

In computer science, a heap is a type of tree that satisfies the heap property. Heaps are useful when you need to remove the item with the highest value. A common implementation of a heap is the binary heap in which the tree is a complete binary ...

                                               

Queue (abstract data type)

In Computer science, a queue is a data structure, used for storing items, before they are processed. Generally, the following operations exist: Dequeue: remove the item at the front of the queue Enqueue: add the item to the back of the queue Opti ...

                                               

Fluxbox

In Unix computing, Fluxbox is an X window manager based on Blackbox 0.61.1. It tries to be lightweight and customizable, and has very little support for graphical icons. Its user interface has only a taskbar and a menu that can be used by right-c ...

                                               

MATE (software)

MATE is a desktop environment for Linux. It is based on an older version of the desktop environment GNOME, called GNOME 2. Many people in the Linux community did not like the way GNOME 3 looked, and wanted GNOME 2. This called for someone to fork ...