A servlet is a Java program that runs on a Web server. It is similar to an applet, but is processed on the server rather than a clients machine. Servlets are often run when the user clicks a link, submits a form, or performs another type of action on a website.
Both servlets and JSP pages contain Java code that is processed by a Web server. However, servlets are primarily Java programs, while JSP pages are primarily HTML files. In other words, a servlet is a Java program that may contain HTML, while a JSP page is an HTML file that may contain Java code. Additionally, servlets require a specific structure and must contain the following three methods:
The init() method initializes the servlet, allocates memory for the process, and passes any input parameters to the servlet. The service() method, which may also be specified as the doGet(), doPost(), doPut(), or doDelete() method, processes the HTTP request and typically provides a response that is sent to the clients browser. The destroy method may save data to a log file and frees up resources that were used by the servlet.
Servlets are one of many options Web developers can use to create dynamic websites and process data entered by website visitors. Since they are written in Java, servlets provide an easy way for programmers who are already familiar with the Java programming language to create Web applications.

Posts made by Magaret
-
Servlet
-
Scanner
A scanner is an input device that scans documents such as photographs and pages of text. When a document is scanned, it is converted into a digital format. This creates an electronic version of the document that can be viewed and edited on a computer.
Most scanners are flatbed devices, which means they have a flat scanning surface. This is ideal for photographs, magazines, and various documents. Most flatbed scanners have a cover that lifts up so that books and other bulky objects can also be scanned. Another type of scanner is a sheet-fed scanner, which can only accept paper documents. While sheet-fed scanners cannot scan books, some models include an automatic document feeder, or ADF, which allows multiple pages to be scanned in sequence.
Scanners work in conjunction with computer software programs, which import data from the scanner. Most scanners include basic scanning software that allows the user to configure, initiate, and import scans. Scanning plug-ins can also be installed, which allow various software programs to import scanned images directly. For example, if a scanner plug-in is installed for Adobe Photoshop, a user can create new images in Photoshop directly from the connected scanner.
While Photoshop can edit scanned images, some programs like Acrobat and OmniPage can actually recognize scanned text. This technology is called optical character recognition, or OCR. Scanning software that includes OCR can turn a scanned text document into a digital text file that can be opened and edited by a word processor. Some OCR programs even capture page and text formatting, making it possible to create electronic copies of physical documents. -
POST
Stands for Power On Self Test. POST (or P.O.S.T.) is a series of system checks run by computers and other electronic devices when they are turned on. The results of the test may be displayed on a screen, output through flashing LEDs, or simply recorded internally. On computer systems, the POST operation runs at the beginning of the boot sequence. If all the tests pass, the rest of the startup process continues automatically.
Both Macs and Windows PCs run a POST each time the computer is booted up or restarted. The scan checks the hardware and makes sure the processor, RAM, and storage devices are all functioning correctly. If an error is encountered during the POST, the startup process may pause or halt completely and the error may be displayed on the monitor. On PCs, POST errors are often displayed on the BIOS information screen. They may be output as cryptic codes, such as 08 for bad memory, or as a system message, such as System RAM failed at offset. On Macs, POST errors are often indicated by a simple graphic, such as a broken folder icon that indicates no bootable device was found.
In some cases, the computer screen may not even turn on before POST errors take place. If this happens, error codes may be output through flashing LED lights or audible tones. For example, an Apple iMac will sound three successive tones, followed by a five second pause, then repeat the tones when bad RAM is encountered during startup. Most PCs also emit beeps when POST errors are detected, though each manufacturer uses its own codes.
POST is rather technical term that only computer technicians use on a regular basis. However, it is a good acronym to know, since it will help you better understand error messages that may pop up on computers or other electronic devices. If your computer wont start up because of a POST error, you can use a different device to look up the meaning and cause of the error, possibly from the manufacturers website. Then you can take the appropriate action, such as removing a memory module or reseating the video card, then you can try starting up your computer again.
NOTE: POST is also a method for passing HTML form variables from one webpage to another without displaying them in the address bar. The alternative method is GET, which appends the values to the URL. -
RE: Shredder
Used seriously: A freak, one who was born defective.
Used jokingly: One who is very strange, unattractive, uncouth, and/or trashy, which could possibly be ascribed to birth defects.
Taken from the novel The Handmaids Tale by Margaret Atwood, where a shredder is one who is the defective product of radiation altered reproductive cells. -
NVRAM
Stands for Non-Volatile Random Access Memory. NVRAM is a type of RAM that retains data after the host devices power is turned off. Two common types of NVRAM include SRAM and EEPROM.
SRAM (pronounced s-ram) retains data by using an alternative source of power such as a battery. SRAM is often used to store computer hardware settings that need to be maintained when the computer is shut down. Common examples include the BIOS settings on Windows computers or the PRAM settings on Macintosh systems. Since SRAM typically uses a battery to retain memory, if the battery dies or is disconnected, the data stored in the SRAM will be lost. Therefore, if BIOS or PRAM settings are not retained after a computer is restarted, it is likely the computers battery has lost its charge and needs to be replaced.
EEPROM (pronounced e-e-p-rom) stores data using electrical charges that maintain their state without electrical power. Therefore, EEPROM does not need a battery or other power source to retain data. The most common type of EEPROM is flash memory, which is used for USB keychain drives and other portable electronic devices. -
Modifier Key
A modifier key modifies the action of another key when the keys are pressed at the same time. Common modifier keys include Shift, Function, Control, Alt, Command, and Option. The Shift key is found on all keyboards, while the other keys may be exclusive to laptops or Windows or Macintosh computers. Below is a list of the common modifier keys and their primary uses.
-
RE: Lion
Lion is another name for Mac OS X 10.7, the eighth version of Apples desktop operating system. It was released on July 20, 2011, almost two years after Mac OS X 10.6 Snow Leopard and preceded the release of Mac OS X 10.8 Mountain Lion. Lion was the first version of Mac OS X to be released on the Mac App Store and was not sold on a DVD like previous versions of the operating system.
Mac OS X 10.7 Lion was one of the most substantial updates to Mac OS X and included more than 250 new features. Most notably, Lion added several features from iOS, Apples mobile operating system that runs on the iPhone and iPad. For example, Lion supported several new multi-touch gestures, such as swiping to switch between applications and to navigate between webpages. Additionally, the user interface was updated to look more like the iOS, with hidden scroll bars and a bouncing animation when you scroll past the top or bottom of a page.
In an effort to make Mac OS X 10.7 more like iOS, Apple also introduced system-wide support for full-screen apps, which hides the menu bar and allows the current application to fill the entire screen. Several of Apples own applications including Safari, Mail, iPhoto, and Pages, were updated with full-screen support when Lion was released and many third party applications were updated shortly after. Lion also introduced Launchpad (similar to the Launcher included with early versions of the Mac OS), which provides one-click access to all programs installed in the Applications folder. Finally, Lion added a Resume feature that saves the state of open windows in applications, so they reappear automatically when you reopen a program or restart your computer.
The last Lion software update was 10.7.5, released on October 4, 2012. -
Left-Click
A left-click involves clicking the left mouse button. Typically, left-clicking means the same thing as just clicking since the left mouse button is the primary button by default. The term left-click is most often used in contrast to right-click, which involves clicking the secondary button on the right side of the mouse.
Left-clicking is used for many common computer tasks, such as selecting objects, opening hyperlinks, and closing windows. Clicking and holding the left mouse button can be used to select text or perform drag and drop operations. In video games, left-clicking is typically used to perform the primary action, such as moving a character or firing a weapon.
For right-handed users, the left-click is the most natural click, since it is done with the index finger. For people that use a mouse with their left hand, it is a bit less natural since left-clicking is done with the middle finger and the index finger is used for right-clicking. Therefore, Mac OS X and Windows allow you to switch the primary mouse button from left to right.
NOTE: Double-clicking is simply two left-clicks in rapid sequence. -
RE: Jumper
A jumper is a small metal connector that acts as an on/off switch. Multiple jumpers are often used together to configure settings for a hardware device. Some jumpers are encased in a plastic switch, that can be toggled on or off. Other jumpers are plastic sleeves with metal linings that connect two metallic prongs together. When the sleeve is applied, the connection is on and it when it is removed, the connection is off.
Jumpers are found in computer hardware as well as other types of electronic devices. A motherboard, for instance, may include jumpers that are used to enable different types of components. Hard drives commonly include jumpers that can enable or disable different features. For example, one jumper setting might enable spread spectrum clocking (SSC) while another setting might enable PHY or physical layer mode. These settings may be required for the hard drive to work with specific types of hardware.
Jumpers are also found in common household electronics, such as remote controls. For example, a garage door remote may include a row of jumpers. These jumpers must match the settings of the garage door receiver in order for it to work. Ceiling fan remotes often include jumpers that can be customized to match the settings for a specific fan. Modifying the jumper settings of a remote typically changes the frequency on which in communicates. This allows you to use different frequencies for different devices.
While altering jumpers might seem like a high-tech process, it is usually very easy. Remotes, for example, typically have jumpers right next to the battery so they can easily be switched on or off. Just make sure that you know how to correctly modify the jumper settings before changing them. If you modify the wrong jumpers, the device might not work.
Jumpers on the back of a hard drive
Toggle switch jumpers on a circuit board -
InterNIC
Stands for Internet Network Information Center. The InterNIC is an organization created by the National Science Foundation to provide Internet information and domain name registration services. While the InterNIC was started as a joint effort between Network Solutions and AT
-
Insertion Point
An insertion point is the location on the screen where the next character typed will be inserted. This location may be in a text document, a form field, a Web browser address bar, or anywhere else on the screen that allows text input.
The insertion point is often identified by a flashing cursor. This cursor is called an I-beam pointer and is shaped like a capital I or a long vertical line. When you type a character on the keyboard, it will appear on the screen directly to the right of the flashing cursor. The insertion point continues to move to the right as each character is entered.
You can typically change the current insertion point by clicking in a different location within a text field or word processing document. This allows you to insert or delete text wherever you click. You can also create a text selection by clicking and dragging the cursor over a block of text. When text is selected, the insertion point becomes the entire selection, meaning the next character typed will replace the currently selected text. -
HSF
Stands for Heat Sink and Fan. Nearly all computers have heat sinks, which help keep the CPU cool and prevent it from overheating. But sometimes the heat sink itself can become too hot. This can happen if the CPU is running at full capacity for an extended period of time or if the air surrounding the computer is simply too hot.
Therefore, a fan is often used in combination with the heat sink to keep both the CPU and heat sink at an acceptable temperature. This combination is creatively called a heat sink and fan, or HSF. The fan moves cool air across the heat sink, pushing hot air away from the computer. Each CPU has a thermometer built in that keeps track of the processors temperature. If the temperature becomes to hot, the fan or fans near the CPU may speed up to help cool the processor and heat sink. -
Gnutella
Gnutella is a file sharing network that allows users to send and receive files over the Internet. The first part of its name comes from the GNU General Public License, which originally allowed the source of the program to be made available to the public. The second part of the name comes from Nutella, a chocolate hazelnut spread, which apparently the developers ate a lot of while working on the project.
The Gnutella network is a peer-to-peer (P2P) network, which allows users on different networks to share files. However, each user still must connect to an ultrapeer, which is a server that lists files shared by connected users. This makes it possible to search for files across hundreds or even thousands of other computers connected to the network.
Gnutella is a network protocol, not an actual program. Therefore, to access other computers on the Gnutella network, you must install a P2P program that supports Gnutella. Fortunately, many of these programs are available as shareware and can be downloaded from the Internet. Some popular Gnutella clients include Acquisition for the Mac and BearShare and Morpheus for Windows. -
Gigabit
A gigabit is 109 or 1,000,000,000 bits.
One gigabit (abbreviated Gb) is equal to 1,000 megabits or 1,000,000 kilobits. It is one-eighth the size of a gigabyte (GB).
Gigabits are most often used to measure data transfer rates of local networks and I/O connections. For example, Gigabit Ethernet is a common Ethernet standard that supports data transfer rates of one gigabit per second (Gbps) over a wired Ethernet network. Modern I/O technologies, such as USB 3.0 and Thunderbolt are also measured in gigabits per second. USB 3.0 can transfer data at up to 5 Gbps, while Thunderbolt 1.0 can transfer data bidirectionally at 10 Gbps.
While gigabits and gigabytes sound similar, it is important not to confuse the two terms. Since there are eight bits in one byte, there are also eight gigabits in one gigabyte. Gigabits are most often used to describe data transfer speeds, while gigabytes are used to measure data storage. -
FSB
Stands for frontside bus. The FSB connects the computers processor to the system memory (RAM) and other components on the motherboard. These components include the system chipset, AGP card, PCI devices, and other peripherals. Because the FSB serves as the main path from the processor to the rest of the motherboard, it is also called the system bus.
The speed of the frontside bus is measured in Megahertz or Gigahertz, just like the processor. Most computers processors run faster than their system buses, so the FSB speed is typically a ratio of the processor speed. For example, a Pentium 4 processor that runs at 2.4 GHz may have an FSB speed of only 400 MHz. The CPU to FSB ratio would be 6:1. A Power Mac G5, however, with a 2.0 GHz processor, has a 1.0 GHz frontside bus. Therefore, its CPU to FSB ratio is 2:1.
The smaller the ratio, the more efficiently the processor can work. Therefore, faster frontside bus speeds lead to faster overall performance. When the CPU to FSB ratio is high, the processor often has to wait for data to be sent out over the system bus before getting new data to process. For this reason, the FSB can be a bottleneck in a computers performance. So if you are looking for a fast computer, dont just check the processor speed, but find out what the frontside bus speed is as well. -
FIFO
Stands for First In, First Out. FIFO is a method of processing and retrieving data. In a FIFO system, the first items entered are the first ones to be removed. In other words, the items are removed in the same order they are entered.
To use a real world analogy, imagine a vending machine where the items are loaded from the back. When someone selects a Milky Way bar from row E5, the machine churns out the candy bar closest to the front. The next Milky Way in line then moves to the front. Therefore, using the FIFO method, the candy bars are dispensed in the order they were placed in the machine.
Computers often implement the FIFO system when extracting data from an array or buffer. If the first data entered into the buffer must be extracted first, the FIFO method is used. The opposite of FIFO is LIFO, in which the last data entered is the first to be removed. -
E-commerce
E-commerce (electronic-commerce) refers to business over the Internet. Web sites such as Amazon.com, Buy.com, and eBay are all e-commerce sites. The two major forms of e-commerce are Business-to-Consumer (B2C) and Business-to-Business (B2B). While companies like Amazon.com cater mostly to consumers, other companies provide goods and services exclusively to other businesses. The terms e-business and e-tailing are often used synonymously with e-commerce. They refer to the same idea; they are just used to confuse people trying to learn computer terms.
-
Direct Digital Marketing
Direct digital marketing, also known as DDM, is a type of marketing that is done exclusively through digital means. It may be used to supplement or even replace traditional physical marketing strategies. The primary channels of direct digital marketing include e-mail and the Web.
While most of us still receive an abundance of physical marketing materials in our mailboxes each week, many of these mailings have been replaced by e-mail. By using e-mail marketing, companies can drastically reduce their mailing costs, since the cost of sending e-mail messages is essentially free. Compare this to mailing physical brochures that may cost sh.50 per recipient. If a company sends out one million mailings, using e-mail could save the company ,000 in mailing costs.
While e-mail marketing is great asset for many businesses, it can also be abused. Since it doesnt cost anything to send e-mail messages, it is possible to distribute unsolicited messages to large lists of recipients at little to no cost. This kind of unwanted electronic junk mail has become widely known as spam. Fortunately, junk mail filters have helped reduce the impact of these messages for most users. Many companies and organizations also offer an unsubscribe option in their mailings, which allow users to remove themselves from the mailing lists.
The Web is another popular medium for direct digital marketing. Many companies now advertise on websites through banner ads, text links, and other types of advertisements. By using Web marketing, companies can drive visitors directly to their website with a single click. This provides a tangible benefit over print and television advertising, which may fully not capture a viewers interest. Additionally, companies can target their ads on pages with relevant content using contextual ad placement services, such as Google AdSense. This allows businesses to attract people who are the most likely to be interested in the products or services they offer.
In the past few years, DDM has revolutionized the marketing industry. By using digital communications, businesses can advertise in several new ways that were not possible before. While e-mail and the Web remain the most popular mediums for DDM, digital marketing continues to expand into other areas as well. Mobile phones and video games are already being used for DDM and you can expect many other mediums to follow.