Sunday, November 3, 2013

Python Data Types Code Example - පයිතන් දත්ත වර්ග

x = []
for i in range(0,10):
print x
print "______________________________________"

y = x * 10

x = "Hello World!"

print x
print "______________________________________"
print y

# What are X and Y?


# Arithmetic
4 + 4 == 8
3 - 5 == -2
16 / 2 == 8
16 * 4 == 64
3 % 2 == 1 # Modulus

# Long Int Conversion - Useful for function type mismatches - Not needed here.
100000000000000000000L + long(100) == 100000000000000000100L


# Strings

a = "Hello"
b = "World!"

# Concatenation
a + " " + b == "Hello World!"

# Repetition and Concatenation
a * 3 + " " + b == "HelloHelloHello World!"
(a + " ") * 3 + b == "Hello Hello Hello World!"

# Indexing
b[2] == "r"

# Conversion of data to string - Sesame Street:
c = 7 # Backquote ` ` or str() operations
( a + " number " + `c` ) and ( a + " number " + str(c) ) == "Hello number 7"

Friday, November 1, 2013

ICT & Digital Media helps Kandy Youth to win the World Award

YES AYV Creative Youth Media Project implemented by Shilpa Sayura has won WSYA 2013 Award. YES AYV is a Sri Lankan platform that has trained more than 100 youngsters in digital media creation in order to make an impact in the local community with the help of creative digital art. YES AYV Creative Youth Media Project started in 2011 with UNHABITAT and Adobe Youth Voices support. They have trained more than 100 under-served youngsters in digital media creation, enabled collaboration, expression, dialog and digital journalism to report on issues related to them in pursuit of truth, made success in creation and publishing of digital media on interactive social platforms making them active participants in the public interest of their community, country and world. The think an effective use of media creation tools, Social Networks and Mobiles inspires youth to use digital journalism to inquire MDG related issues.

The World Summit Youth Award (WSYA) is a unique global contest which brings together young developers and digital entrepreneurs under 30 years of age - who use internet and mobile technology to put the UN Millennium Development Goals (MDGs) into action and make a difference.

The WSYA selects and promotes best practice in e-Content. It demonstrates young people's potential to create outstanding digital contents and serves as a platform for people from all UN member states to work together in the efforts to reach the Millennium Development Goals (MDGs).

WSYA Award was given away at WSA Global Congress held in Sri Lanka.

Wednesday, October 9, 2013

Two's Complement Binary Addition

 -39 + 92 = 53:

Carryout without overflow. Sum is Correct.

104 + 45 = 149:
Overflow, no carryout. Sum is not correct.

 10 + -3 = 7:
Carryout without overflow. Sum is correct.

-1 + 1 = 0:
Carryout without overflow. Sum is correct.

Boolean Expression Simplification

  • Simplify: C + BC:
    ExpressionRule(s) Used
    C + BCOriginal Expression
    C + (B + C)DeMorgan's Law.
    (C + C) + BCommutative, Associative Laws.
    T + BComplement Law.
    TIdentity Law.
  • Simplify: AB(A + B)(B + B):
    ExpressionRule(s) Used
    AB(A + B)(B + B)Original Expression
    AB(A + B)Complement law, Identity law.
    (A + B)(A + B)DeMorgan's Law
    A + BBDistributive law. This step uses the fact that or distributes over and. It can look a bit strange since addition does not distribute over multiplication.
    AComplement, Identity.
  • Simplify: (A + C)(AD + AD) + AC + C:
    ExpressionRule(s) Used
    (A + C)(AD + AD) + AC + COriginal Expression
    (A + C)A(D + D) + AC + CDistributive.
    (A + C)A + AC + CComplement, Identity.
    A((A + C) + C) + CCommutative, Distributive.
    A(A + C) + CAssociative, Idempotent.
    AA + AC + CDistributive.
    A + (A + T)CIdempotent, Identity, Distributive.
    A + CIdentity, twice.
    You can also use distribution of or over and starting from A(A+C)+C to reach the same result by another route.
  • Simplify: A(A + B) + (B + AA)(A + B):
    ExpressionRule(s) Used
    A(A + B) + (B + AA)(A + B)Original Expression
    AA + AB + (B + A)A + (B + A)BIdempotent (AA to A), then Distributive, used twice.
    AB + (B + A)A + (B + A)BComplement, then Identity. (Strictly speaking, we also used the Commutative Law for each of these applications.)
    AB + BA + AA + BB + ABDistributive, two places.
    AB + BA + A + ABIdempotent (for the A's), then Complement and Identity to remove BB.
    AB + AB + AT + ABCommutative, Identity; setting up for the next step.
    AB + A(B + T + B)Distributive.
    AB + AIdentity, twice (depending how you count it).
    A + ABCommutative.
    (A + A)(A + B)Distributive.
    A + BComplement, Identity

Basic Logic Gates Problems

  • Draw a logic circuit for (A + B)C.
  • Draw a logic circuit for A + BC + D.
  • Draw a logic circuit for AB + AC.
  • Draw a logic circuit for (A + B)(C + D)C.

    Source :

Thursday, August 1, 2013

IPV4 Sub netsTutorial

Start > CMD > ipconfig

IPV6 Addresses was introduced to provide large address space

IPv6 Testing Tools

Check your IPv6 address formatting is correct
Check your IPv6 connectivity from this website (Sydney)
Check your IPv6 connectivity from (USA)
Check Internet Service Provider IPv6 readiness
For full IPv6 connectivity, service providers need to set up IPv6-addressed nameservers, AAAA ('quad-A') address records, AAAA mail exchange records and allow website access over IPv6.
Check your IPv6 Path Maximum Transmission Unit
If a host sends IPv6 packets that are too big for part of its route, it should get a Packet Too Big message so it can re-transmit the data in smaller packets. If that message doesn't get back (e.g. firewalls, mis-configured routers) it can affect IPv6 connectivity. 

Wednesday, July 31, 2013

Subnetting Worksheet

Host IP Address  (Class B)
Network Mask (Defaut for Class B)
Network Address
Network Broadcast Address
Total Number of Host Bits 16
Subnets 1
Hosts per subnet : 254
Number of Hosts  65534 (254 x 254)
Host Address range -

Host IP Address
Network Mask
Network Address
Network Broadcast Address
Subnets 256
Hosts per subnet : 254
Total Number of Host Bits 8
Number of Hosts
Host Address range -

Host IP Address (Class C)
Network Mask
Network Address
Network Broadcast Address
Total Number of Host Bits 8
Number of Hosts 254

Host IP Address (Class B)
Network Mask
Network Address
Network Broadcast Address
Total Number of Host Bits 16
Number of Hosts 65534

Host IP Address (C)
Network Mask
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts

Host IP Address
Network Mask
Network Address  192.168.3.
Network Broadcast Address
Total Number of Host Bits  5
Number of Hosts 30
Host Range : -

Top Web Security Risks

  • SQL Injection
  • Improper Neutralization of SQL Command

  • OS Command Injection 
  • Improper Neutralization of OS Commands

  • Cross-site Scripting
  • Improper Neutralization of Inputs During Web Page Generation

  • Open Redirect
  • URL Redirection to Untrusted Site

  • Unrestricted Upload of File with Dangerous Type

  • Cross-Site Request Forgery (CSRF)

Network Security Vulnerabilities

• Operating Systems—Windows, Unix/Linux, MAC

• Applications—Cross-platform, including web, database, Peer-to-Peer, instant messaging, media

players, DNS servers, backup software, and management servers

• Network Devices—Network infrastructure devices (routers, switches, etc.), VoIP devices

• Human Elements—Security policies, human behavior, personnel issues

• Special Section—Security issues not related to any of the above categories

Friday, July 26, 2013

Cisco CCENT Introduction

Foundations: What is a Network?
Why do we need a network? 
What does the network accomplish for us? 

Foundations: OSI
The OSI Model and layers of network functionality.

TCP/IP: Addressing Fundamentals
TCP/IP concepts, IP address format, public and private addressing, and address classes. 
Why having TWO addresses is the key to successful network communication?

TCP and UDP 
When it communicates across the network using TCP or UDP? 
This decision determines how reliable the data transfer will be. 

Port Numbers
Port numbers help network communication between devices, allowing you to dictate what service you are trying to reach. 

Two Packets
Big picture perspective of packets on a local network communication and remote network communication using packets

Ethernet defines the standard for LAN communication around the world. 
Undersand how networks operates. Ethernet standard, CSMA/CD (the rules of communication), and the architecture of a MAC address.

LANs Physical Connections
crimping Ethernet cables, primary physical standards of Ethernet: UTP and Fiber Optics, straight-through vs. crossover cables, and an end-to-end picture of cabling in a corporate environment.

LAN Switches
Ethernet's use of CSMA/CD allowed it to obtain much faster speeds than its competitor (token ring); however, it also led to many problems with collisions in larger networks. Understanding of how the network switch fits into our network environments.

Working with the Cisco Switch IOS
How to work with IOS, Cisco's operating system: 
general navigation and help features of the IOS.

Setup of a Cisco Switch
IOS initial configuration of a Cisco switch. meaning of the physical LEDs on a switch, 
the initial boot process and configuration dialog, and the configuration of a VLAN interface.

Configuring Switch Security
Initial security of your switch, primarily focusing on configuring passwords, logon banners, and SSH.
Enabling port security for your network, control of the number and type of devices that attach to your network.

Optimizing and Troubleshooting Switches
common problems in a LAN environment.
improving your efficiency on Cisco devices.

Wireless Networking
foundations of wireless networks including radio frequency, wireless channels and standards, 
and the best way to design wireless for your organization.

Wireless Security and Implementation
Security vulnerabilities
steps to take to successfully implement and secure a wireless network.

Advanced TCP/IP
converting from decimal to binary and back
advanced TCP/IP addressing, IP subnetting
the ability to separate IP addresses into subnets based on the number of networks an organization needs
ability to separate IP addresses into subnets based on the number of hosts an organization needs in each network the ability to reverse engineer subnets based on the IP address and subnet mask that has been given

Routing: Initial Router Configuration
initial configuration of a Cisco router.

Routing: SDM and DHCP Server Configuration
graphic user interface (GUI) based Cisco Security Device Manager, or SDM
Cisco router management through the SDM.

Routing: SDM and DHCP Server Configuration
Dynamic Host Configuration Protocol (DHCP) 
configuring a DHCP server using SDM.

Routing: Implementing Static Routing
configuring the foundational form of routing known as static routing.

Routing: Implementing Dynamic Routing with RIP

dynamic routing works much better when you want to get the job done fast.
configuration of the RIP routing protocol  for small network environments

Routing: Internet Access with NAT and PAT
Network Address Translation (NAT) 
how to use the Cisco SDM to configure your router to support NAT Overload 

Routing: WAN Connectivity
types of WAN connections and configuration

Management and Security: Telnet, SSH, and CDP
management and security strategies for Cisco devices
configure and monitor our devices are Telnet and SSH. 
how to navigate through Cisco devices
Cisco Discovery Protocol (CDP) to unveil an undocumented network.

Management and Security: File Management
ability to copy files to and from your routers and switches 
to back up configurations and IOS versions
moving files to and from these file systems.

Tuesday, July 23, 2013

Data Communications & Security Terms

An Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. In summary, this person attempts to violate Security by interfering with system Availability, data Integrity or data Confidentiality. 

Active Intruder and Passive Intruder
A passive intruder just listens and records the control and data messages on the channel and doesn’t make any modification to the message, while the active intruder can remove messages from the channel and/or add messages into the channel. An active intruder threat involves a situation where an individual or individuals access a system with the intention to cause serious harm.

Intruder Lockout
Some systems monitor failed Authentication attempts, and if too many attempts to sign on with a single account are detected, the Account is locked. This mechanism is intended to deter an Intruder, who may attempt to guess the password for one or more Accounts.

Audit Trail
An Audit Trail documents all security events. These include authentication attempts, change request input and authorization, access provisioning and deactivation events, Password Synchronization and reset, profile updates, etc.

Biometric Authentication
Biometric Authentication is any process that validates the identity of a user who wishes to sign into a system by measuring some intrinsic characteristic of that user. Biometric samples include finger prints, retinal scans, face recognition, voice prints and even typing patterns.

Breach of Confidentiality
A Breach of Confidentiality is a Security violation where the Confidentiality of some data was lost.
Cryptographic Certificate
A Cryptographic Certificate is a user's Public Key, which has been signed and encrypted using the private key of a well-known Certificate Authority. This allows the user to give out his or her Public Key to others, and allows those others to trust that it is, in fact, the user's correct Public Key. Ex.

Encryption is a process of translating a message, called the Plaintext, into an encoded message, called the Ciphertext. This is usually accomplished using a secret Encryption Key and a cryptographic Cipher. 

Two basic types of Encryption are commonly used:
Symmetric Encryption, where a single secret key is used for both encryption and decryption.
Asymmetric Encryption, where a pair of keys is used -- one for Encryption and the other for Decryption.

Decryption is the reverse process to Encryption. Frequently, the same Cipher is used for both Encryption and Decryption. While Encryption creates a Ciphertext from a Plaintext, Decryption creates a Plaintext from a Ciphertext.

Encryption Key
An Encryption Key is a sequence of numbers used to encrypt or decrypt data.

Private Key
A Private Key is a secret key, used in Asymmetric Encryption. It is mathematically equivalent to a Public Key, but is kept secret. This is one half of a matching key-pair.

Public Key
A Public Key is a publicly distributed key, used in Asymmetric Encryption. It is mathematically equivalent to a Private Key, but is widely distributed. Public Key's are frequently certified by a Certificate Authority, so that users of this key can verify its authenticity. 

Public key encryption system
AKA as Asymmetric Encryption. It uses two keys where, one key encrypts, only the other can decrypt. The keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it. 
In public key encryption, one of the keys is known to both receiver and sender. The key is public in other word. The other key is known only by sender.

A Hash is a code, calculated based on the contents of a message. This code should have the property that it is extremely difficult to construct a message so that its Hash comes to a specific value. Hash's are useful because they can be attached to a message, and demonstrate that it has not been modified. If a message were to be modified, then its hash would have changed, and would no longer match the original hash value.

Denial of Service
A Security intrusion which causes a system to be damaged, and where the damage is sufficient to disable at least one of the services offered by that system, is called a Denial of Service.

Fault Tolerance
Sytem includes multiple, redundant servers, and continues to offer full functionality even when one of those servers ceases to function.
It detects failures in updates to target systems, and automatically retries failed operations until they succeed.

Loss of Integrity
A set of data is said to have suffered a Loss of Integrity if some event has caused it to be corrupted or incorrectly altered. This constitutes a Security violation.

Session Hijacking
Session Hijacking is any Security attack, carried out by an Intruder, which attempts to insert commands into an active Login Session. On wide-area TCP/IP networks, this is frequently attempted using IP Spoofing. On local TCP/IP networks, this might be attempted with the help of a Packet Sniffer. 

A Firewall is a system which limits network access between two or more networks. Normally, a Firewall is deployed between a trusted, protected private network and an untrusted public network. For example, the trusted network might be a corporate network, and the public network might be the Internet. A Firewall might grant or revoke access based on user Authentication, source and destination network addresses, network protocol, time of day, network service 
or any combination of these. It might be implemented as an Application Level Firewall or a Packet Level Firewall. It might also implement a Content Filter, such as a Virus Wall.

Packet Level Firewall
A Packet Level Firewall protects an internal network against unauthorized access and attack from a public or external network by blocking some packets. Packets may be blocked based on source IP address, destination IP address, source or destination TCP port number, other packet header fields, time of day or user authentication. Filtering is carried out on a packet-by-packet basis, and the entire Packet Level Firewall may be implemented on a Router. Normally all filtering happens inside the Operating System, which makes this type of Firewall very fast.

IP is the Internet Protocol. It is a mechanism by which packets may be routed between computers on a network-of-networks. IP allows computers to be connected using various physical media, ranging from modems to Ethernet cabling, fiber-optic cables and even satellite and radio links. IP is designed to be robust, and to gracefully handle the loss of some connections. Individual packets of data are routed by hosts with little knowledge of the overall network structure - just a few local routing rules. The global Internet is constructed using the IP network protocol.

IP Spoofing
IP Spoofing is a security exploit where an Intruder attempts to send packets to a system which appear to originate from a source other than the Intruder's own. If the target system already has an authenticated TCP session with another system on the same IP network, and it mistakenly accepts a spoofed IP packet, then it 
may be induced to execute commands in that packet, as though they came from the authenticated connection. Improved reliability and routing filters in major Internet routers make this attack largely obsolete on the Internet in cases where the Intruder and target system are topologically distant.

Packet Sniffer
A Packet Sniffer is a program that can record all network packets that travel past a given network interface, on a given computer, on a network. It can be used to troubleshoot network problems, as well as to extract sensitive information such as Credentials from unencrypted Login Session's.

HTTP is the Hyper-Text Transfer Protocol. It is the most popular network protocol for exchanging documents on the World-Wide Web. Uses port 80.

Ftp is the file transfer protocol. It is based on the TCP/IP network protocols. Ftp allows a user on one machine to send files to or retrieve files from an Ftp server. FTP uses User ID / Password Credentials, sent as Plaintext over the network, with no Encryption, for Authentication. Uses port 21.

HTTPS is the Hyper-Text Transfer Protocol with SSL Encryption. It is the most popular network protocol for establishiing secure connections for exchanging documents on the World-Wide Web. It is basically HTTP carried over a TCP socket, which has been secured using SSL. (Uses port 443)

SSL is the Secure Socket Layer. It is a protocol that encrypts a single TCP session. Using this Asymmetric Encryption, all data exchanged over a TCP socket can be cryptographically protected. SSL is the base of HTTPS - the secure WWW protocol. 

TCP is the Transmission Control Protocol. It is used to establish connection-oriented, sequenced and error-free sessions over IP networks.

UDP is the User Datagram Protocol. It is used to send individual packets across an IP network, in an unreliable fashion. This means that successful, error-free delivery of a message is not guaranteed. 

SMTP is the Simple Mail Transfer Protocol. It is the most popular protocol for transferring electronic mail on the Internet. SMTP is quite robust, but provides no facilities for Authentication of the sender or recipient; for encryption; or for attaching non-ASCII data. (Port 25)

SNMP is the simple network management protocol. It is used by network management frameworks to manage and monitor network devices, such as hubs and routers. Some computer systems also respond to SNMP queries.  (Port 161)

Telnet is a TCP/IP protocol that allows a User to remotely Login to a Unix, VMS or mainframe system, and execute commands in that Login Session. Telnet does not use Encryption. However, Ssh is functionally equivalent and secure. (Port 23)

POP is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. (Port 110)

Simple Mail Transfer Protocol (SMTP)—used for e-mail routing between mail servers. The Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. (Port 25)

Ssh is the Secure Shell and improves on them by incorporating Asymmetric Encryption and a simple Public Key Infrastructure. 

Internet Message Access Protocol (IMAP)—management of email messages. (Port 143)

Virtual Private Network
A Virtual Private Network is software hosted on two machines, which forwards network traffic between them. The packets exchanged between the machines is protected against Intruder's equipped with Packet Sniffer's using Encryption. All packets that pass through the network are encrypted, and so provide little or no 

value to an Intruder.A Virtual Private Network makes it possible to pass private data over a public network, thus simulating a private network without the expense of separate, protected communication media.

Proxy Server
A Proxy is a server that forwards requests from a community of users to the Internet, and retrieves those documents from the World-Wide Web. WWW Proxies are useful since they can cache documents (and avoid downloading them repeatedly), control access to documents (thus acting as a Content Filter) and scan for 
Viruses (thus acting as a Virus Wall). They also can be used to access wesites annonymously hiding your IP.

Spam is unsolicited electronic mail, usually delivered over the Internet. Some SMTP servers can filter out Spam (thus making a Spam Filter). Some jurisdictions are trying to make Spam illegal. 

Spam Filter
A Spam Filter is software that processes electronic mail messages, either for a single user or an entire network. While processing these messages, the Spam Filter attempts to identify Spam messages, and deletes them. 

Whis is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system. Ex. whois gives information on

Domain Name System (DNS)
The Domain Name System (DNS) is a hierarchical distributed naming system used in internet. DNS translates domain names to IP addresses needed by users of internet.

Monday, July 15, 2013

Data Protection and Data Privacy

With ever expanding ICT uses enormous amount of provate data collected, processed and stored as part of business operations. It's important that technologists and organisations aware of Data Protection and Privacy Law. 

Important Definitions

Data Subject: This is the person whose data is stored on systems. They give their personal data to allow organisations to for various needs.

Data Controller: This is a person/organization that collects data from Data Subjects.

Data Processor: This is a organisation that processes and manages data from data controllers. 

Data Controllers are obliged to protect the privacy of their customers with trust and transparency. They require to adhere to local legal regulations. They must publish a privacy statement outlining what types of data will be stored and how that data will be managed. Data Controller needs to have policies in place to ensure that data and privacy is protected 

They include

  • Opt-in/Opt-Out policies for Email & Lists
  • Unsubscribe processes for Email
  • Social media, disclosure and ethics
  • SMS Text STOP compliance
  • Telephone calling and call recording procedures

Data Processor
Data Controller ensures that the Data Processor is bound to manage the personal data of the controller’s subjects according to the wishes of the controller. 

The Data Controller owns the data submitted to the system

The Data Processor will not edit, delete or view the subject data without permission of the Controller.

The Data Processor will not pass the data onto a third party.

The Data Processor will have the appropriate technology in place to protect the data.

At the end of the contract the Data Processor will remove all of the data they have managed.

The Data Processor will not transfer the data without the permission of the Data Controller.

The Data Processor may use aggregate statistical data to optimise delivery of services.

Data Processor should publish detail on their own service performance. 

Thursday, July 11, 2013

Top Ten ICT for the 21st Century

  • ICT will become powerful extension of human beings designed to augment intelligence, learning, communications, and productivity.
  • ICT will become intuitive—they will “learn,” “recognize,” and “know” what we want, who we are, and even what we desire.
  • Computer chips will be used everywhere, and they become invisible-embedded in everything from brains and hearts, to clothes and toys.
  • Computers will manage essential global systems, such as
    transportation and food production, better than humans will.
  • Online resources will enable us to download applications on-demand via wireless access anywhere and anytime.
  • ICT will be voice-activated, networked, video-enabled, and connected together over the Net, linked with each other and humans.
  • Computers will have digital senses-speech, sight, smell, hearing-enabling them to communicate with humans and other machines.
  • Neural networks and other forms of artificial intelligence will make computers both as smart as humans, and smarter for certain jobs.
  • Human and computer evolution will converge. Synthetic intelligence will greatly enhance the next generations of humans.
  • As computers surpass humans in intelligence, a new digital species and a new culture will evolve that is parallel to ours.

Source :

Top Trends in 2013 - IEEE

"Sustainable Development Through Effective Man-Machine Co-Existence"

1. Technical advances in disaster management (Tsunami), humanitarian de-mining and rehabilitation: This includes disaster management techniques especially applied to rescue operations in Tsunami, landslides, earthquakes & floods, robots & sensors in landmine detection & removal, navigation of mobile robots in rugged terrain, robot manipulators and control, prosthetic devices, tele-operation & remote manipulation, robotics
in physiotherapy etc. 

2. Industrial Automation and modern civilization: This will try to discuss the latest developments in industrial automation. 

3. A wired society and Tele-presence: A discussion on novel concepts in virtual reality,kansei systems, and tele-presence in the context of a networked system. It is expected to cover novel results as to how these technologies have revolutionized distributed production and marketing, education, medicine and surgery, space travel, defense etc. 

4. Intelligent robots and man-machine co-existence: This will cover new developments in intelligent robots, their hardware, learning algorithms, sensory systems, and actuators.

Source IEEE

Future Trends in Computing

1) Man machine Coexistence?

The development of ICT should be sustainable that machine shall not take the place of the man. Machines shall always be a tool for man, not other way. 

2) Artificial intelligence? (5th Gen. Computers)
Artificial intelligence (AI) studies and develops intelligent machines and software. It develops intelligents agents which perceives its environment and takes actions that maximize its chances of success.

3) Ubiquitous computing? 
Ubiquitous computing is a  model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities.  Someone using ubiquitous computing uses devices and systems, and may not even be aware of it. The machines that fit the human environment instead of forcing humans to enter theirs. 

4) Kansei systems/Engneering? 
The development ICT products and services that operates on users emotions  feelings and needs, The devices responds users's emotional responses

5) Augmented reality
AR is a live, direct or indirect, view of a physical, real-world environment whose elements are augmented (or supplemented) by computer-generated sensory input such as sound, video, graphics or GPS data. As a result, the technology functions by enhancing one’s current perception of reality.By contrast, virtual reality replaces the real world with a simulated one. Augmentation is conventionally in real-time and in semantic context with environmental elements, such as sports scores on TV during a match. With the help of advanced technology the information about the surrounding real world of the user becomes interactive and digitally manipulable. Artificial information about the environment and its objects can be overlaid on the real world.

6.) Context Aware Computing
Context awareness is a property of mobile devices that is defined complementary to location awareness. Whereas location may determine how certain processes in a device operate, context may be applied more flexibly with mobile users, especially with users of smart phones. Context awareness originated as a term from ubiquitous computing or as so-called pervasive computing which sought to deal with linking changes in the environment with computer systems, which are otherwise static. The term has also been applied to business theory in relation to business process management issues.

7.) Quantum computing
QC developed on quantum physics where atoms are used as memory and processors. They are called quantum bits (qubits). Qubits can perform certain calculations exponentially faster than conventional computers. While traditional computers encode information into bits using binary numbers, either a 0 or 1. They can do calculations on one set of numbers at once, quantum computers encode information as a series of quantum-mechanical states can represent 1 , 4 or 16 states. It can do computations on many different numbers at once. Quantum computers are more powerful than a classical computers. Quantum computing is used in cryptography and modeling and indexing very large databases.

8). Evolutionary computing
This is a subfield of artificial intelligence that involves continuous optimization and combinational optimization problems. Evolutionary computation uses iterative progress, such as growth or development in a population. This population is then selected in a guided random search using parallel processing to achieve the desired end. Such processes are often inspired by biological mechanisms of evolution. As evolution can produce highly optimised processes and networks, it has many applications in computer science.

9). Biology Systems
is ICT applied to biomedical and biological scientific research. It focuses on complex interactions within biological systems to discover emergent properties, properties of cells, tissues and organisms functioning as a system. These typically involve metabolic networks or cell signaling networks. Genetic algorithms
A genetic algorithm (GA) is a search heuristic that follows natural evolution. It is used to generate useful solutions to search problems using techniques inspired by natural evolution, such as inheritance, mutation, selection, and crossover. Genetic algorithms find application in bioinformatics, phylogenetics, computational science, engineering, economics, chemistry, manufacturing, mathematics, physics and other fields.

11). Nature Inspired Computing (NIC) 
NIC aims to develop new computing techniques after getting ideas by observing how nature behaves in various situations to solve complex problems. Nano technologies are best examples of NIC. Nature Inspired Computing techniques are so flexible that they can be applied to wide range of problems, so adaptable that they can deal with unseen data and capable of learning, so robust that they can handle incomplete data. They have decentralized control of computational activities.

Saturday, July 6, 2013

What is CSS? Lesson #2

Embedded CSS - The <style> Element: CSS # 2
You can place CSS embedded in  head section

<style type="text/css" media="screen">
Style Rules

Specifies the style sheet language as a content-type (MIME type).

Specify the device that would display the document.
Default value is all. This is optional attribute.

options =tty, tv, projection, handheld, print, braille,aural, all

CSS Overriding Rules :
The CSS defined in external style sheet file takes lowest priority.
CSS defined in <style>...</style> tags will override any external style sheet.
The inline styles takes highest priority and override other <style>...</style> tags or external styles.

CSS Measurement Units
% measurement as a percentage of enclosing element.

p {font-size: 16pt; line-height: 125%;}

cm measurement in centimeters.

div {margin-bottom: 2cm;}

em relative measurement for the height of a font in em spaces.
if you assign a font to 12pt, each "em" unit would be 12pt;
thus, 2em would be 24pt.

p {letter-spacing: 7em;}

pc measurement in picas. A pica is equivalent to 12 points; thus, there are 6 picas per inch.

p {font-size: 20pc;}

pt measurement in points. A point is defined as 1/72nd of an inch.
body {font-size: 18pt;}

px measurement in screen pixels.

p {padding: 25px;}

Friday, June 21, 2013

SQL (Structured Query Language)

SQL (Structured Query Language) is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS). sql IS based upon relational algebra and tuple relational calculus.

SQL consists of a data definition language and a data manipulation language. The scope of SQL includes data insert, query, update and delete, schema creation and modification, and data access control.
Although SQL is often described as, and to a great extent is, a declarative language (4GL), it also includes procedural elements. SQL was one of the first commercial languages for Edgar F. Codd's relational model, as described in his influential 1970 paper "A Relational Model of Data for Large Shared Data Banks".

Thursday, June 20, 2013

Digital Divide

This is more of a O/L ICT Topic, However related to A/L ICT in many ways. Describe how Wireless Technologies, Mobile Computing and Cloud Computing help bridge the digital divide in Society.

Monday, June 17, 2013

What is CSS? Lesson #1

Cascading Style Sheets (CSS) is a design language. It

simplify the presentation of web pages. CSS take care of the look and feel of a web page. CSS help control the color of the text, the style of fonts, spacing between paragraphs, background images and other effects. CSS enable presenting same content on different devices like mobiles , tabs, Web TV and desktops. CSS is combined with HTML and XHTML.

CSS Syntax
Selector: is an HTML element like <h1> for style to be applied.Property: is an attribute HTML element like width or border
Value: Values are assigned to attributes/properties. color:red etc.

Inline CSS
<p style="color:red;margin-left:10px;">This is a paragraph.</p>

Internal Style Sheet
Internal styles are defined in the <head> section of an HTML document, by using the <style> tag.

<style type="text/css">
body {background-color:brown;}
p {color:yellow;}

External Style Sheet
An external style sheet is used to apply same style to many pages. As each page links to a common style sheet, you can change look and feel of all web pages  by changing the external css.

<link rel="stylesheet" type="text/css" href="mystyle.css">

Importing an external style sheet
@import "mystyle.css";

Universal selector
The css renders the content of every element in black.
* {
  color: #000000;

The Descendant Selectors: style rule will apply to <em> element only when it lies inside <ul> tag.

ul em {
  color: #000000;

The Class Selectors:
All the elements having "black" will have text in black.

.black {
  color: #000000;

Renders the text in black for <h1> elements with class name "black" {

  color: #000000;

<div class="centerbold">
This content will be styled by the class centerbold.

ID Selectors:
All the elements having same id will be formatted.

Renders the content in black for every element with id "black"

#black {
  color: #000000;

Renders only the H1 with id ="black"

h1#black {

  color: #000000;

Multiple Styling:
define multiple styles of single element, class or id.

h1 {
color: red;
margin-bottom: 1.1em;
text-transform: lowercase;

Grouping Selectors:
You can apply a style to many selectors in one go.

h1, h2, h3 {
color: #EFEFEF;
font-weight: normal;
letter-spacing: .4em;
margin-bottom: 1em;
text-transform: lowercase;

You can combine various class selectors together as shown below:

#content, #footer, #supplement {
position: absolute;
left: 510px;
width: 200px;