SHooting is where 2 niggaz and a bitch on my bus start crackin jokes
Posts made by Michiko
-
RE: Shooting
-
RE: Lightning
Lightning is a proprietary I/O interface designed by Apple for its mobile devices, such as the iPhone, iPad, and iPod. It was first introduced in September, 2012, with the iPhone 5 and new iPod models. It was later added to iPads, beginning with the 4th generation iPad and the first generation iPad mini. The Lightning interface replaced the the previous dock connector, which Apple products used since 2003.
The Lightning connector has eight pins and is about one third the size of the 30-pin dock connector it supersedes. Instead of having mobile latches on the sides, the Lightning connector has small divots on each side that allow it to snap into place. Even without magnets or clips, the Lightning connection is designed to be strong enough to hold a device upside down by the cable without the cable detaching.
Unlike most other I/O interfaces, such as USB, Firewire, and the previous dock connector, the Lightning connector is reversible. The connection is fully symmetrical and the connector can be inserted either way into a Lightning port. This means it is impossible to insert the cable upside down, which makes it easier to plug in and reduces wear and tear on the interface. The order of the pins are recognized dynamically by the device when the connection is made, allowing power and data to flow through the correct channels.
The name Lightning is correlated with Thunderbolt, another I/O port Apple began using around the same time the Lightning interface was introduced. However, unlike Thunderbolt, Lightning is proprietary and is only used in Apple products. While most mobile devices (such as Android phones) have standard mini-USB or micro-USB ports, if you have an Apple device, you will need a Lightning cable to charge it and transfer data. -
iPhone
The iPhone is a smartphone developed by Apple. The first iPhone was released in June, 2007 and an updated version has been released roughly every year since then. While the iPhone was originally only available to AT
-
Goodput
When data is transferred over a communications medium, such as the Internet or a local area network (LAN), the average transfer speed is often described as throughput. This measurement includes all the protocol overhead information, such as packet headers and other data that is included in the transfer process. It also includes packets that are retransmitted because of network conflicts or errors. Goodput, on the other hand, only measures the throughput of the original data.
Goodput can be calculated by dividing the size of a transmitted file by the time it takes to transfer the file. Since this calculation does not include the additional information that is transferred between systems, the goodput measurement will always be less than or equal to the throughput. For example, the maximum transmission unit MTU of an Ethernet connection is 1,500 bytes. Therefore, any file over 1,500 bytes must be split into multiple packets. Each packet includes header information (typically 40 bytes), which adds to the total amount of data that needs to be transferred. Therefore, the goodput of an Ethernet connection will always be slightly less than the throughput.
While goodput is typically close to the throughput measurement, several factors can cause the goodput to decrease. For example, network congestion may cause data collisions, which requires packets to be resent. Many protocols also require acknowledgment that packets have been received on the other end, which adds additional overhead to the transfer process. Whenever more overhead is added to a data transfer, it will increase the difference between the throughput and the goodput. -
Floating Point
As the name implies, floating point numbers are numbers that contain floating decimal points. For example, the numbers 5.5, 0.001, and -2,345.6789 are floating point numbers. Numbers that do not have decimal places are called integers.
Computers recognize real numbers that contain fractions as floating point numbers. When a calculation includes a floating point number, it is called a floating point calculation. Older computers used to have a separate floating point unit (FPU) that handled these calculations, but now the FPU is typically built into the computers CPU. -
Flash Drive
Flash drives have many names — jump drives, thumb drives, pen drives, and USB keychain drives. Regardless of what you call them, they all refer to the same thing, which is a small data storage device that uses flash memory and has a built-in USB connection.
Flash drives are typically no more than two to three inches in length and less than an inch in width. Their size and shape may resemble a thumb or a small pen (which is where the names thumb drive and pen drive come from). Flash drives are also very thin, often having a depth of less than a centimeter. Because of their small form factor, they are highly portable and can easily fit in a pocket or on a keychain (hence the name keychain drive).
Early flash drives could store only a few megabytes of data, but modern flash drives can store several gigabytes of information. Since they are small in size but have large storage capacities, flash drives have replaced most previous portable data storage mediums such as floppy disks and removable hard disks like Zip disks. Because they have a built-in USB connection, flash drives also dont require a special disk drive to be used. Instead, they can be used on any computer with a USB port, which nearly all modern computers have. -
Drag
You can use your mouse to drag icons and other objects on your computer screen. Dragging icons from your desktop or an open window to another folder will move the objects to the new folder. You can also drag icons to the Trash (Mac) or the Recycle Bin (Windows) if you want to delete tehm. Some word processing programs allow you to select text and drag the selected text to another place in the document. To select the text, you may have to drag the mouse over the text you want to select.
Dragging is an important technique for using todays graphical user interfaces (GUIs). In fact, there are many other things you can drag besides icons. For example, you can drag the top of windows to reposition them, you can drag the scroll bar in open documents or Web pages to scroll through them, and you can drag messages to different folders in your mail program. Other programs, such as video games and image-editing programs use dragging to reposition items on the screen.
To drag an item, first move the cursor over the item you want to drag. Then click and hold down the left mouse button to grab the item. Move the mouse to position the item where you want it. Let go of the mouse button once you have moved the item to release it. This technique is known as a drag and drop. -
RE: Sequencer
Someone who uses a music program (Noteworthy Composer, Anvil Studio, etc) to recreate music by ear in MIDI format. Usually taken from video games, movies, or general theme songs.
-
Delete
Delete is computer terminology for remove or erase. You can delete text from a document of delete entire files or folders from your hard drive. When typing a document, you can remove characters behind the cursor by pressing the delete key. If you want to remove characters in front of the cursor, you can press the smaller delete key near the home and end buttons on the keyboard. You can also remove entire sections of text by selecting the text you wish to delete and pressing either delete button on the keyboard.
Files and folders can be removed from your hard drive by dragging them to the Recycle Bin (Windows) or the Trash (Macintosh) and then emptying the trash. When you delete a file, it is actually not erased, but instead the reference to the file is removed. This means deleted files are still intact until they are written over. Special utilities such as Norton Unerase can recover accidentally deleted files. -
RE: Ginnet
Aperson who is constantly earwigging into ther peoples conversations
-
CamelCase
CamelCase (also camel case or dromedary case) is a naming convention in which the first letter of each word in a compound word is capitalized. Examples include the video game StarCraft, the band FireHouse, and the company MasterCard. The term CamelCase itself incorporates the CamelCase naming convention. While CamelCase has many applications, in computing, it is most often used in programming languages and website names.
Most programming languages do not allow the use of spaces in the names of functions, variables, or other entities. Therefore, programmers often use CamelCase to define objects within the source code. For example, related variables within a C program might be might have the following lowerCamelCase names: employeeID, employeeFirstName, employeeLastName, and employeeAddress. The capital letters make the names of each variable more readable.
While most programming languages do not require CamelCase, certain programming languages use CamelCase as a standard naming convention. For example, in Java, all classes should be named using UpperCamelCase, while methods and variables should have lowerCamelCase names. The most common alternative to CamelCase is to use underscores (_) to separate lowercase words. -
Untap
~verb~
A term used to describe turning a playing card 90 degrees left or right in the card game Magic: The Gathering, returning the card to its original vertical position.Reverse acion of [tap].
see also: [tap]
-
RE: Bootstrap
Bootstrap, or bootstrapping, is a verb that comes from the saying, to pull oneself up by his bootstraps. The idiom implies a person is self sufficient, not requiring help from others. Similarly, in the computing world, bootstrapping describes a process that automatically loads and executes commands.
The most fundamental form of bootstrapping is the startup process that takes place when you start up a computer. In fact, the term boot, as in booting up a computer, comes from the word bootstrap. When you turn on or restart a computer, it automatically loads a sequence of commands that initializes the system, checks for hardware, and loads the operating system. This process does not require any user input and is therefore considered a bootstrap process.
While bootstrapping is often associated with the system boot sequence, it can be used by individual applications as well. For example, a program may automatically run a series of commands when opened. These commands may process user settings, check for updates, and load dynamic libraries, such as DLL files. They are considered bootstrap processes because they run automatically as the program is starting up.
NOTE: Bootstrap is also a popular web development framework used for creating websites. It was developed by a team at Twitter and has been an open source project since 2011. The Bootstrap framework includes CSS styles, JavaScript libraries, and HTML files. Bootstrap provides a way for developers to easily build responsive websites rather than designing them from scratch. -
ARP
Stands for Address Resolution Protocol. ARP is a protocol used for mapping an IP address to a computer connected to a local network LAN. Since each computer has a unique physical address called a MAC address, the ARP converts the IP address to the MAC address. This ensures each computer has a unique network identification.
The Address Resolution Protocol is used when information sent to a network arrives at the gateway, which serves as the entrance point to the network. The gateway uses the ARP to locate the MAC address of the computer based on the IP address the data is being sent to. The ARP typically looks up this information in a table called the ARP cache. If the address is found, the information is relayed to the gateway, which will send the incoming data to the appropriate machine. It may also convert the data to the correct network format if necessary.
If the address is not found, the ARP broadcasts a request packet to other machines on the network to see if the IP address belongs to a machine not listed in the ARP cache. If a valid system is located, the information will be relayed to the gateway and the ARP cache will be updated with the new information. By updating the ARP cache, future requests for that IP address will be much quicker. While this may seem like a complex process, it usually takes only a fraction of a second to complete. If only it was just as easy to find old receipts when you need them. -
Animated GIF
An animated GIF is a GIF file that includes multiple images or frames. These frames are played back in sequence when the file is opened or displayed in a web browser. The result is an animated clip or a short movie.
The GIF file format includes a Graphics Control Extension (or GCE block), which enables a single GIF file to store multiple frames. This section also specifies the delay between frames, which can be used to set the frame rate or insert pauses at certain points within the animation. Another section, called the Netscape Application Block (NAB), specifies how many times the animation will repeat (a setting of 0 is used for infinite repetitions).
In the early years of the Web, animated GIFs were a popular way to display motion and liven up websites. They were commonly used for advertisements, such as banners and leaderboards. As Flash animations became more popular, animated GIFs became less prominent. However, animated GIFs have recently seen a resurgence on the web since they are supported by all platforms. For example, Apples iOS does not support Flash animations, but can display animated GIFs.
Several image editing programs, such as Adobe Photoshop and GIMP, can be used to create animated GIFs. Other graphics programs can merge multiple image files into a single GIF. Some video utilities can even convert short videos to animated GIFs. While this can be useful for sharing small videos on the web, the GIF format is not as efficient as the MPEG format for storing videos longer than a few seconds. -
Active-Matrix
Active-matrix is a technology used in LCD displays, such as laptop screens, and flat screen monitors. It uses a matrix of thin film transistors (TFTs) and capacitors to control the image produced by the display. The brightness of each pixel is controlled by modifying the electrical charge of the corresponding capacitors. Each pixels color is controlled by altering the charge of individual capacitors that emit red, green, and blue (RGB) light.
The term active-matrix refers to the active nature of the capacitors in the display. Unlike a passive-matrix display, which must charge full rows of wires to alter individual pixels, an active-matrix display can control each pixel directly. This results in a significantly faster response time, meaning the pixels can change state much more rapidly. In practical terms, an active-matrix monitor can display motion and fast-moving images more clearly than a passive-matrix display can. The fast switching of TFTs also prevents the ghosting of the cursor that is common on passive-matrix screens.
Since active-matrix technology provides individual control of each pixel, active-matrix screens typically exhibit more even brightness and color across the screen than passive-matrix displays. Because of the multiple advantages of active-matrix technology, most modern computer monitors, laptop screens, and LCD televisions use active-matrix screens.