Current Affair (GK) of 30 July 2015 In English For Banking Exams
Yakub To Hang Today
Clearing all the legal hurdles, the Supreme Court rejected the sole death row convict in 1993 Mumbai serial bomb blasts case Yakub Memon's last minute plea to stay his hanging when the reports last came in at around 5 am.
With this development, Memon is set to be hanged as scheduled at 7 am.
Earlier, confusion reigned supreme on whether or not Memon would be hanged as scheduled as the Supreme Court was hearing his fresh plea to stay the hanging.
Though the arguments from both sides were completed at around 4.30 am, the three-judge bench of the Supreme Court took some time before rejecting the plea at around 5 am. The length of drop while hanging the death row convict Yakub Memon early will be 7 feet.
The length of drop is the length of slack provided in the rope exactly from the curve of jaw below left ear.
Current Affair (GK) of 29 July 2015 In English For Banking Exams
Nation Salutes Dr. A P J Abdul Kalam
The powerful and the commoners jostled to offer their last respects to late A P J Abdul Kalam 28 Jully as President Pranab Mukherjee, P M Narendra Modi and leaders cutting across political divide led the nation in paying homage to a leader who rose from humble origins to occupy the top office.
Long queues of people, especially school and college students, were seen through the day at 10, Rajaji Marg residence of Kalam in Lutyen"s Delhi waiting for their turn to have a last look at the mortal remains of the person who had asked them to dream big and came to be hailed as the "People"s President".
President Pranab Mukherjee paying his last respect to former President APJ Abdul Kalam at his residence at Rajaji Marg in New Delhi on Tuesday. Vice President Hamid Ansari and Prime Minister Narendra Modi are also seen.
Networking hardware includes all computers, peripherals, interface cards and other equipment needed topperform data-processing and communications within the network.CLICK on the terms below to learn more about those pieces of networking hardware.
A Protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer ( no matter which operating system, network card, or application you are using ) can communicate with another computer located on the next desk or half-way around the world. The OSI (Open Systems Interconnection ) Reference Model defines seven layers of networking protocols. The complexity of these layers is beyond the scope of this tutorial; however, they can be simplified into four layers to help identify some of the protocols with which you should be familiar.
Kernel : In computing , the kernel is the main component of most computer operating systems : it is a bridge betwwn applications and the actual data processing done at the hardware level. The kernel's responsibilities include managing the system's resources ( the communication between hardware and software components). Usually as a basic component of an operating system, a kernel can provide the lowest -level abstraction layer for the resources (especially processors and I/O devices) that application software must control to perform its function. It typically makes these facilities available to application processes through inter-process communication mechanisms and system calls.
While viruses can be intentionally destructive(for example, by destroying data), many other viruses are fairly benign or merely annoying. Some viruses have a delayed payload, which is sometimes called a bomb. For example, a virus might display a message on a specific day or wait until it has infected a certain number of files or computers. A time bomb occurs during a particular data or time and a logic bomb occurs when the user of a computer takes an action that triggers the bomb. However, the predominant negative effect of viruses is their uncontrolled self-reproduction, which wastes or overwhelms computer resources.