One of the best bands ever. Whoever made that pronunciation should be slowly tortured to death. FUCK YOU.

Posts made by Oralee
-
RE: Misfits
-
Celebrities
They are full of self-delusion, hypocrisy and attention seeking drug habits. They are spoiled drama queens and usually have absolutely no idea what theyre talking about because theyre under-educated. They drive cars that cost enough to feed a small country. They provide nothing practical to society and pack-rat millions of dollars all the while claiming to be enlightened humanitarians and giving away a few thousand dollars to charity which they could just as well wipe their ass with.
-
XHTML
Stands for Extensible Hypertext Markup Language. Yes, apparently Extensible starts with an X. XHTML is a spinoff of the hypertext markup language (HTML) used for creating Web pages. It is based on the HTML 4.0 syntax, but has been modified to follow the guidelines of XML, the Extensible Markup Language. Therefore, XHTML 1.0 is sometimes referred to as HTML 5.0.
Because XHTML is extensible, Web developers can create their own objects and tags for each Web page they build. This gives the developers more control over the appearance and organization of their Web pages. The only requirement is that the custom tags and attributes are defined in a document type definition (DTD), that is referenced by the XHTML page.
XHTML pages must also conform to a more strict syntax than regular HTML pages. While Web browsers are rather lenient and forgiving of HTML syntax, XHTML pages must have perfect syntax. This means no missing quotes or incorrect capitalization in the markup language. While the strict syntax requires more meticulous Web page creation, it also ensures Web pages will appear more uniform across different browser platforms. -
Vector Graphic
Unlike JPEGs, GIFs, and BMP images, vector graphics are not made up of a grid of pixels. Instead, vector graphics are comprised of paths, which are defined by a start and end point, along with other points, curves, and angles along the way. A path can be a line, a square, a triangle, or a curvy shape. These paths can be used to create simple drawings or complex diagrams. Paths are even used to define the characters of specific typefaces.
Because vector-based images are not made up of a specific number of dots, they can be scaled to a larger size and not lose any image quality. If you blow up a raster graphic, it will look blocky, or pixelated. When you blow up a vector graphic, the edges of each object within the graphic stay smooth and clean. This makes vector graphics ideal for logos, which can be small enough to appear on a business card, but can also be scaled to fill a billboard. Common types of vector graphics include Adobe Illustrator, Macromedia Freehand, and EPS files. Many Flash animations also use vector graphics, since they scale better and typically take up less space than bitmap images.
File extensions: .AI, .EPS, .SVG, .DRW -
RE: Gemmer
to describe someone in Clash of Clans as a bad player because they buy the in-game currency and advance to the top level, rather than learn over time.
-
Toslink
Toslink is a type of digital audio connection developed by Toshiba Corporation. It uses a fiber optic cable to transmit an audio signal in the form of pulses of light. A single Toslink cable can be used to carry a mono, stereo, or even a surround audio signal.
Toslink is similar to the Sony/Philips Digital Interfance, known as S/PDIF. It provides the same digital audio data as S/PDIF, but uses a light beam instead of an electrical current to send the data. Because the Toslink cable does not use electrical currents, the connection is immune to electrical or magnetic interference. Toslink connections are most commonly found on high-end home theater receivers, MiniDisc players, and professional audio equipment, as well as Power Mac G5 computers. -
TFTP
Stands for Trivial File Transfer Protocol. TFTP is a file transfer protocol similar to FTP, but is much more limited. Unlike FTP, TFTP does not support authentication and cannot change directories or list directory contents. Therefore, it is most often used to transfer individual files over a local network. TFTP may also be used to boot a computer system from a network-connected storage device.
While FTP connections use the TCP protocol, TFTP connections are made over UDP, which requires less overhead than TCP. This means TFTP file transfers may be faster, but less reliable than FTP transfers. Port 20 is used for FTP transfers, while port 69 is used for transferring files via TFTP.
TFTP is most often used on Unix systems, but it is supported by Windows and Mac OS X as well. You can initiate a TFTP file transfer via a command-line interface using the following syntax:
tftp [-i] [Host] [{get | put}] [Source] [Destination]
The -i parameter is used to transfer files in binary mode and should be omitted when transferring an ASCII text file. The get command is used to retrieve a file, while the put command is used to send a file to another system.
-
System Unit
The system unit, also known as a tower or chassis, is the main part of a desktop computer. It includes the motherboard, CPU, RAM, and other components. The system unit also includes the case that houses the internal components of the computer.
The term system unit is often used to differentiate between the computer and peripheral devices, such as the monitor, keyboard, and mouse. For example, if a repair shop asks you to bring in your computer, it may be unclear whether you need to bring your monitor and peripheral devices as well. If you are told to just bring your system unit, it is clear you only need to bring the computer itself.
Some modern computers, such as the iMac, combine the system unit and monitor into a single device. In this case, the monitor is part of the system unit. While laptops also have built-in displays, they are not called system units, since the term only refers to desktop computers.
-
SSID
Stands for Service Set Identifier. An SSID is a unique ID that consists of 32 characters and is used for naming wireless networks. When multiple wireless networks overlap in a certain location, SSIDs make sure that data gets sent to the correct destination.
The SSID is different than the name that is assigned to a wireless router. For example, the administrator of a wireless network may set the name of the router, or base station, to Office. This will be the name that users see when browsing available wireless networks, but the SSID is a different 32 character string that ensures the network name is different from other nearby networks.
Each packet sent over a wireless network includes the SSID, which ensures that the data being sent over the air arrives at the correct location. Without service set identifiers, sending and receiving data in a location with multiple wireless networks would be chaotic and unpredictable to say the least. -
Southbridge
The southbridge is a chip that connects the northbridge to other components inside the computer, including hard drives, network connections, USB and Firewire devices, the system clock, and standard PCI cards. The southbridge sends and receives data from the CPU through the northbridge chip, which is connected directly to the computers processor.
Since the southbridge is not connected directly to the CPU, it does not have to run as fast as the northbridge chip. However, it processes data from more components, so it must be able to multitask well. On Intel systems, the southbridge is also referred to as the I/O Controller Hub, since it controls the input and output devices.
-
Smartwatch
A smartwatch is a digital watch that provides many other features besides timekeeping. Examples include monitoring your heart rate, tracking your activity, and providing reminders throughout the day. Like a smartphone, a smartwatch has a touchscreen display, which allows you to perform actions by tapping or swiping on the screen.
Modern smartwatches include several apps, similar to apps for smartphones and tablets. These apps provide additional functionality, such as displaying weather information, listing stock prices, and displaying maps and directions. Most smartwatches can also be used to make phone calls and send and receive text messages.
While these apps run directly on the smartwatch, they require a smartphone to function. This is because the data is first received by the phone, then sent to watch. Most smartwatches do not include Wi-Fi and they do not have a SIM card for cellular data. Therefore, most apps rely on a compatible smartphone to provide data over a Bluetooth connection. For example, the text messaging app on your smartwatch may allow you to dictate and send a text message, but the actual message is sent using your phone. If your watch is not within range of your phones Bluetooth signal, the message will not be sent.
Since smartwatches rely on smartphones for a large percentage of their functionality, they are generally considered a smartphone accessory rather than a standalone device. Still, smartwatches provide a number of features that dont require a smartphone. For example, activity tracking is possible using the smartwatchs built-in accelerometer and heart rate monitor. A smartwatch with a GPS receiver can accurately track and record outdoor runs. If your watch has an NFC (near field communication) chip, you can pay for purchases with your watch using a stored credit card. Finally, if your watch has enough storage for music files, you can play songs directly from your watch using wireless headphones.
Popular smartwatches include the Apple Watch (watchOS), Samsung Gear (Android Wear), and LG Watch (Android Wear).
Apple Watch Series 2 (Nike Edition)
Apple Watch daily activity report
Apple Watch music source selection -
SDSL
Stands for Symmetric Digital Subscriber Line. SDSL is a type of of DSL, which is used for transferring data over copper telephone lines. The symmetric part of the term means that an SDSL connection has the same maximum upload and download speeds.
ADSL, on the other hand, typically provides much faster download speeds than upload speeds. Because most Internet users download much more data than they upload, ISPs usually offer ADSL connections rather than SDSL. -
Scrolling
Most computer programs display their content within a window. However, windows are often not large enough to display their entire content at once. Therefore, you may have to scroll through the window to view the rest of the contents. For example, on some monitors, a page from a word processing document may not fit within the main window when viewed at 100%. Therefore, you may have to scroll down the window to view the rest of the page. Similarly, many Web pages do not fit completely within a window and may require you to scroll both vertically and horizontally to see all the content.
To scroll up or down within a window, simply click the scroll bar on the right-hand side of the window and drag the slider up or down. If the window requires horizontal scrolling as well, click the scroll bar at the bottom of the window and drag the slider to the right or left. Some computer mice also include a scroll wheel that allows you to scroll through the window by rolling the wheel back and forth. -
Kingsnake
The act of having a vasectomy for the sole purpose of tricking your spouse/girlfriend into believing that you are indeed trying the have a baby. The relationship between a kingsnake and a coral snake, although they may look close to the same one is far more dangerous.
-
Phishing
Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. Some e-mails will ask that you enter even more information, such as your full name, address, phone number, social security number, and credit card number. However, even if you visit the false website and just enter your username and password, the phisher may be able to gain access to more information by just logging in to you account.
Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate, and even the Web pages where you are asked to enter your information may look real. However, the URL in the address field can tell you if the page you have been directed to is valid or not. For example, if you are visiting an Web page on eBay, the last part of the domain name should end with ebay.com. Therefore, http://www.ebay.com and http://cgi3.ebay.com are valid Web addresses, but http://www.ebay.validate-info.com and http://ebay.login123.com are false addresses, which may be used by phishers. If URL contains an IP address, such as 12.30.229.107, instead of a domain name, you can almost be sure someone is trying to phish for your personal information.
If you receive an e-mail that asks that you update your information and you think it might be valid, go to the website by typing the URL in your browsers address field instead of clicking the link in the e-mail. For example, go to https://www.paypal.com instead of clicking the link in an e-mail that appears to come from PayPal. If you are prompted to update your information after you have manually typed in the Web address and logged in, then the e-mail was probably legitimate. However, if you are not asked to update any information, then the e-mail was most likely a spoof sent by a phisher.
Most legitimate e-mails will address you by your full name at the beginning of the message. If there is any doubt that the e-mail is legitimate, be smart and dont enter your information. Even if you believe the message is valid, following the guidelines above will prevent you from giving phishers your personal information.
-
OLED
Stands for Organic Light Emitting Diode and is pronounced oh-led. OLED is a type of flat screen display similar to an LCD that does not require a backlight. Instead, each LED within an OLED panel lights up individually.
An OLED screen has six layers that work together to produce color images. These layers include the following, from bottom to top:
OLEDs display light using a process called electrophosphorescence. While this may sound like an intimidating term, the process is relatively simple. Electrical current flows from the cathode (negatively charged) to the anode (positively charged), causing electrons to move to the emissive layer. These electrons find holes (where atoms missing electrons) in the conductive layer and produce light when they fill these holes. The color of the light depends on the organic molecule that the current passed through in the emissive layer.
Since the diodes in OLED displays light up individually, there is no need for a backlight. This means OLEDs can have darker blacks than LED/LCD displays and use less electricity. They are also thinner and may be curved or even bendable. While OLEDs have many advantages over LED/LCD displays, it has been expensive to produce large, reliable OLED screens. Therefore, OLEDs have been more common in small electronics, such as smartphones and tablets. As OLED production costs decrease and reliability increases, the technology will become more commonly used in larger screens, such as televisions and computer monitors. -
OASIS
Stands for Organization for the Advancement of Structured Information Standards. To someone backpacking through the Sahara, this is not the type of OASIS you want to see. But is it a welcome sight in the computer science world. OASIS is a non-profit, global consortium that supports the development and adoption of e-business standards.
While it wont quench your thirst in the middle of the desert, OASIS does provide several useful technology standards. Common standards regulated by the OASIS consortium include protocols, file formats, and markup languages. Hardware and software companies often work with OASIS to develop and institute standards that are efficient and effective.
The standards produced by OASIS are open standards, which means they can be used by any company or organization. This allows multiple companies to develop products based on the same standard, which offers a high degree of interoperability between different computer systems. For example, a file format standardized by OASIS may be supported by several different programs. Because each program can save files in the same format, the files can be opened by any of the programs without needing to be converted or translated. This makes transferring files between applications or even different systems a seamless process. -
Num Lock
Num Lock is a key that is typically located near the keypad on the right side of a keyboard. Like Caps Lock, Num Lock is a toggle key, which toggles the input of certain keys, depending whether Num Lock is on or off.
Num Lock is short for Number Lock. It was implemented in early Windows keyboards to lock the input of the numeric keypad. When Num Lock is on, the keypad only enters numbers. When Num Lock is off, the keys may provide different input as indicated below:
While you may not need to use the Num Lock key with your keyboard, it is helpful to know the keys function. If you find yourself trying to enter numbers with the numeric keypad and nothing appears on the screen, it is possible that Num Lock is OFF. If this is the case, pressing the Num Lock key should fix the problem. -
NetBIOS
Stands for Network Basic Input/Output System. NetBIOS was introduced in 1983 by IBM as an improvement to the standard BIOS used by Windows-based computers. The BIOS provides an interface between the computers operating system and the hardware. As the name implies, NetBIOS adds support for networking, including the ability to recognize other devices connected to the network.
NetBIOS provides an API (Application Program Interface) for software developers to use. The NetBIOS API includes network-related functions and commands, which can be incorporated into software programs. For example, a programmer can use a prewritten NetBIOS function to enable a software program to access other devices on a network. This is much easier than writing the networking code from scratch. In other words, NetBIOS prevents programmers from having to reinvent the wheel just to get their program to connect to a network.