Wednesday, 8 May 2013

358. Q. & A.s SCI. & TECH. – 22


Q. &  A.s  ‑‑‑  SCI.  &  TECH. – 22


601Q. What is spyware?
Spyware is Internet jargon for Advertising Supported software (Adware). It is a way for shareware authors to make money from a product, other than by selling it to the users.
There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales.
This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

602Q. Why is it called "Spyware" ?
While this may be a great concept, the downside is that the advertising companies also install additional tracking software on your system, which is continuously "calling home", using your Internet connection and reports statistical data to the "mothership". While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a "live" server sitting on your PC that is sending information about you and your surfing habits to a remote location.....
603Q. Are all Adware products "Spyware"?
No, but the majority are. There are also products that do display advertising but do not install any tracking mechanism on your system. These products are not indexed in our database.
604Q. Is Spyware illegal?
Even though the name may indicate so, Spyware is not an illegal type of software in any way. However there are certain issues that a privacy oriented user may object to and therefore prefer not to use the product. This usually involves the tracking and sending of data and statistics via a server installed on the user's PC and the use of your Internet connection in the background.
605Q. What’s the hype about?
While legitimate adware companies will disclose the nature of data that is collected and transmitted in their privacy statement (linked from our database), there is almost no way for the user to actually control what data is being sent. The fact is that the technology is in theory capable of sending much more than just banner statistics – and this is why many people feel uncomfortable with the idea.



606Q. What are  the function of Tracers?
Tracers is one of the nation's leading providers of identification and credential verification data. Tracers collects and maintains databases of public and non-public background information for law enforcement, government agencies, law firms, private investigators, insurance companies and other qualified businesses. Our products are designed to assist customers in managing risk through fraud detection and prevention, risk evaluation, identity verification, pre-screening and due diligence, including:
  • Phone Numbers
  • Addresses
  • Real Property
  • Motor Vehicles
  • E-mail Addresses
  • Criminal and Civil Records
  • Relatives and Associates
  • Governmental Watch Lists
  • Driving Records
  • Bankruptcies
  • Corporate Records
  • FEIN
  • UCC Filings
  • Warrants and Arrest Records
Call now and let us show you how our online database, batch processing and XML solutions deliver the information you need when you need it.

607Q. WHAT ARE MICROCOMPUTERS?

Circuit computer processors....A microcomputer is a computer with a microprocessor as its central processing unit. Another general characteristic of these computers is that they occupy physically small and fuel systems.... A microcomputer also known as micro is a computer having a microprocessor as its central processing unit CPU. General characteristic of microcomputers 1 they occupy physically small

608Q. MAX PC Secure
Get One Stop Security for Total Peace of Mind.

Over the past few years, cyber attacks have annoyed everyone. New Government policies have been enacted to control Data Security, Privacy, Spam, Adwares, Viruses and other vulnerabilities. This product addresses issues starting from Integrity of Data to intrusion of Privacy , Internet Bandwidth misuse, catastrophic disruption to infrastructure, loss of revenue and more.
Max PC Secure is a one stop security and a complete integrated solution to achieve Peace of Mind from spyware, junk sites, cookies, hackers by preventing them from generating reports about activities running on your computer in your absence.

609Q. System Requirements:

The following minimum system requirements are needed to run Max PC Secure:
• Pentium Class Processor
• 128 MB of RAM available
• 15 MB of free hard disk space
• Internet Connectivity for Registration and Live Updates

The Blocking functionality is designed to work with IE 6.0 only and will block web sites, keywords, cookies, active X, pop-ups, animations and rest of the functionality for IE 6.0 only and no other browsers. Max PC Privacy can delete history of AOL, Opera and Netscape Navigator browsers along with the IE 6.0.

610Q. Spyware Detector Antispyware News:
*Spyware is becoming more and more insidious everyday. A recent corporate spyware/adware audit of more than 12,200 systems, representing more than 4,900 companies discovered an average of 22 pieces of spyware per corporate desktop computer, including malicious spyware and adware infections. On average eight percent of the corporate PCs in all networks audited had system monitors and six percent had Trojan horse programs, the two most nefarious and potentially malicious forms of spyware.
611Q. What is called Malware?
Malware: Malware is a generic term for any malicious software designed to disrupt the working of a network. Virus, worms and Trojans fall under the category of Malware. Malware utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware seek to exploit existing vulnerabilities on systems making their entry quiet and easy.
612Q. What are called Trojans?
Trojans: Redirects victims machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

613Q. What are called spy tools?
Spy tools: are programs which steal information from users PC such as banking information, login details and keyboard strokes etc.
614Q. What is called Keylogger?
Keylogger: is a program that captures and logs keystrokes on the computer without the user's knowledge and consent. The logged data is typically sent to a remote attacker. The keylogger is usually hidden from the user and may use cloaking (Rootkit) technology to hide from other software in order to evade easy detection by anti-Spyware applications.

615Q. How to Stop Spywares from Invading your Privacy and Reducing PC Performance?
Growing spyware attacks and constantly changing spyware technology are placing personal information, privacy, and even your identity at risk.

We at Max Secure Software provide you the most robust solution against Spywares. We have developed the world class Anti Spyware, Max Secure Spyware Detector which is a complete solution for individuals, professionals and home users. The software is specially designed to scan, detect, delete and recover spywares with an option of quick and full scan.

616Q. How software is blocked?
Enhanced Detection
We have a dedicated database team which uses state-of-the-art spyware research methods and identifies new spyware threats before they are widely distributed. Max Secure Spyware Detector ensures that you have the most powerful and up-to-date protection against new emerging spyware threats.
Advanced Blocking
Max Secure Spyware Detector has advanced blocking features which block ActiveX, Browser Header Objects, Tracking Cookies, you can also block the bad websites or the websites you feel are not worth browsing. This feature blocks the new spyware installations, ensuring that you have peace of mind you desire.
Active Monitoring
Max Secure Spyware Detector also protects your privacy and provides you security by actively protecting you against the Malicious processes, Homepage hijackers and Tracking Cookies. Thus giving you the peace of mind while you are browsing.
Complete Removal
Max Secure Spyware Detector detects and deletes the toughest spyware programs in just one scan. Also it provides advanced and comprehensive cleaning technology for the special spywares which are the nastiest next-generation spyware threats.
Instant Support
As a customer of Max Secure Spyware Detector, you are assured that you are always backed up with our technical support force. Our technical expert and friendly support team is always there to answer any questions you have, absolutely FREE!
Spyware Detector scans your entire system using a constantly updated database of thousands of known spyware threats. You can schedule regular scans or perform one manually to find and remove spyware, adwares, malwares, pests, and spybots from your PC. If any files or traces of spyware match the threat definitions database, Spyware Detector immediately quarantines them.

617Q. Eliminating Spyware & Adware that invade your privacy and security.
This software is also powered by some advanced features that are similar to our corporate edition like, Block Active X, Block Cookies, Block BHOs, Registry back up, Live Monitoring for IE home page hijacking, system and win ini file change monitor, monitor registry changes, tracking cookies monitoring and Process monitoring. The software has a complete database of the most commonly and largely found spywares, which are detected and can be deleted immediately. Our live update module will enable our users to update their spyware database frequently.

618Q. The first decline in the theatrical 3-D craze started in August and September 1953. The factors causing this decline were:
  • Two prints had to be projected simultaneously.
  • The prints had to remain exactly alike after repair, or synchronization would be lost.
  • It sometimes required two projectionists to keep sync working properly.
  • When either prints or shutters became out of sync, the picture became virtually unwatchable and accounted for headaches and eyestrain.
  • The necessary silver projection screen was very directional and caused sideline seating to be unusable with both 3-D and regular films, due to the angular darkening of these screens. Later films that opened in wider-seated venues often premiered flat for that reason (such at Kiss Me Kate at the Radio City Music Hall).

619Q.  What are the differences between Transistor and Memristor?
 Transistor
Memristor
1]  3-terminal switching device with an input electrode (e.g. source), an output electrode (e.g. drain), and a control electrode (e.g. gate)
1]  2-terminal device with one of the electrodes acting either as a control electrode or a source electrode depending on the voltage magnitude.
2] Requires a power source to retain a data state
2]  Does not require a power source to retain a data state
3]  Stores data by electron charge
3]  Stores data by resistance state
4]  Scalable by reducing the lateral length and width dimensions between the input and output electrodes
4]  Scalable by reducing the thickness of the memristor materials
5]  Capable of performing analog or digital electronic functions depending on applied bias voltages
5]  Capable of performing analog or digital electronic functions depending on particular material used for memristor
6]  Fabrication requires optical lithography
6]  Fabrication by optical lithography but alternative (potentially cheaper) mass production techniques such as nanoimprint lithography and self assembly have also been implemented


620Q. What is non-volatile memory?
As evident from the patent data, non-volatile memory is the dominant area being pursued for memristor technology. Of course most of the companies listed (with the exception of Hewlett Packard) do not refer to their memory in terms of the memristor and rather use a variety of acronyms (i.e. RRAM or ReRAM, CBRAM, PRAM, etc.) to distinguish their particular memory design. While these acronyms do represent real distinctions in terms of the materials used or the mechanism of resistance switching employed, the materials are still all memristors because they all share the same characteristic voltage-induced resistance switching behavior covered by the mathematical memristor model of Chua.

621Q. Transistor means what?
Flash memory currently dominates the semiconductor memory market. However, each memory cell of flash requires at least one transistor meaning that flash design is highly susceptible to an end to Moore’s law. On the other hand, memristor memory design is often based on a crossbar architecture which does not require transistors in the memory cells. Although transistors are still necessary for the read/write circuitry, the total number of transistors for a million memory cells can be on the order of thousands instead of millions and the potential for addressing trillions of memory cells exists using only millions (instead of trillions) of transistors.
Another fundamental limitation to conventional memory architectures is Von Neumann’s bottleneck which makes it more difficult to locate information as memory density increases.
Memristors offer a way to overcome this hurdle since they can integrate memory and processing functions in a common circuit architecture providing a de-segregation between processing circuitry and data storage circuitry .

622Q. What is Neuromorphic Electronics  ?
Neuromorphic Electronics 
Neuromorphics has been defined in terms of electronic analog circuits that mimic neuro-biological architectures. Since the early papers of Leon Chua it was noted that the equations of the memristor were closely related to the Hodgkin-Huxley model describing the behavior of neural cells. Since memristors integrate aspects of both memory storage and signal processing in a similar manner to neural synapses they may be ideal to create a synthetic electronic system similar to the human brain capable of handling applications such as pattern recognition and adaptive control of robotics better than what is achievable with modern computer architectures. While so far few patents have been issued involving memristors applied to this area, several research groups are beginning to pursue this approach and several publications from HPLabs (Greg Snider) and other researchers (M Di Ventra, Y.V. Pershin) are exploring the possibilites in this area. Some other potential applications of memristors related to this area are discussed in my other knol

623Q. What is Binary Oxide?
 Binary Oxide 
The discovery of the resistive switching properties of binary oxide compounds actually predates the original memristor paper of Chua and can be dated back to 1967 when the article "New conduction and reversible memory phenomena in thin insulating films" was published in the Proceedings of the Royal Society.
The phenomena was originally observed in silicon oxide formed with nanometer scale thickness and including gold ions. Silicon oxides have been a key insulating material used in the fabricating of electronics devices over the past 40 years.
However, there is now a search for new thin oxide films having improved insulating properties to assist in the further scaling of transistor designs. This search may be very beneficial to this class of memristor material since research in new binary oxide compounds may benefit both the conventional semiconductor industry and the upcoming memristor industry.
Furthermore, the manufacturing resources used in semiconductor processes may require less modification in comparison with other memristor materials and provide a smooth transition as semiconductor electronics is converted to memristor electronics over the next few decades.
While Samsung has some patents covering variations of binary oxide memristors there is still significant freedom to operate based on early published patents which are now expired such as US Patent 4,839,700 which teaches a variety of binary oxides such as WO3, Ir2O3, MoO3, ZrO2, and RhO2 adjusted to have memristive properties. A variety of other memristor variations based on TiO, CuO, NiO, ZrO, and HfO materials have been under experimental investigation for the past several years. Hewlett-Packard has been focusing on a TiO variation of the memristor but does not yet have any patents covering their materials or the manufacture. 

624Q. What is HyperPhysics?
http://upload.wikimedia.org/wikipedia/commons/d/d4/Button_hide.png
HyperPhysics is an educational resource about physics topics. The information architecture of the website is based on trees that organize topics from general to specific. HyperPhysics is hosted by Georgia State University, which estimates that HyperPhysics has over 3 million users per year.
The site is under continuous development by recently retired Georgia State faculty member Rod Nave. Topics covered include;
625Q. What are the methods of Password Hacking?
1) Hashing :-
2) Guessing :-
3) Default Passwords :-
4) Brute Force
5) Phishing :-








357. Q. & A.s SCI. & TECH. – 21


Q. &  A.s  ‑‑‑  SCI.  &  TECH. – 21

575Q. What devices are connected by Bluetooth?
        Bluetooth provides a secure way to connect and exchange information between devices such as
1.      Faxes,                                  
2.      Mobile phones,        
3.      Telephones,  
4.      Laptops,       
5.      personal computers,
6.      Printers,                   
7.      Digital cameras        
8.      Global positioning system (gps) receivers, and
9.      Video game consoles.

576Q. Why is it easier to remember words of a song than those of a paragraph?
Words of a paragraph
1.      We read the text of a paragraph and grasp the contents of it
2.      We should know reading and writing for this
3.      We should know grammatical rules
4.      Sentences cannot be remembered for ever.
Words of a song
1.      Song on the other hand carries both a meaning s well as a beauty of meaning
2.      There is rhyme and rhythm
3.      Even if language is not understood, the style of presentation attracts
4.      The words are concise
5.      Sense is more important than grammatical rules
6.      The language is simpler than the text matter
7.      Even if the words do not have meaning, the humming, the stress, …attract us
8.      A song can be remembered for ever
9.      That was why in olden days things were taught in a rhythmic manner.

Words in songs are usually simple and subtle whereas those in sentences are likely to be complex and big.

577Q. Why there are more Swamijis than Scientists in India?
1.      Indians are more religious minded.
2.      They believe in magic than logic.
3.      Self Exploitation and hypocrisy
4.      More fatalist than pragmatist
That is why there are at least 3 crore sadhus, Swamijis, foretellers, etc.
No Indian ever ruled India.

578Q. What is the effective range of Bluetooth?
        The effective range of Bluetooth varies due to
1.      propagation conditions,
2.      material coverage,
3.      production sample variations,
4.      antenna configurations and
5.      battery conditions.

579Q. List out the applications of Bluetooth.

A typical Bluetooth mobile phone headset.
·Wireless control of and communication between a mobile phone and a handsfree headset. This was one of the earliest applications to become popular.
·Wireless control of and communication between a mobile phone and a Bluetooth compatible car stereo system
·Wireless Bluetooth headset and Intercom.
·Wireless networking between PCs in a confined space and where little bandwidth is required.
·Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer.
·Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX.
·Replacement of previous wired RS-232 serial communications in test equipment, GPS receivers, medical equipment, bar code scanners, and traffic control devices.
·For controls where infrared was often used.
·For low bandwidth applications where higher USB bandwidth is not required and cable-free connection desired.
·Sending small advertisements from Bluetooth-enabled advertising hoardings to other, discoverable, Bluetooth devices.
·Wireless bridge between two Industrial Ethernet (e.g., PROFINET) networks.
·Three seventh and eighth generation game consoles, Nintendo's WiFi and Sony's PlayStation 3, PSP Go and PSVita, use Bluetooth for their respective wireless controllers.
·Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a wireless modem.
·Short range transmission of health sensor data from medical devices to mobile phone, set-top box or dedicated telehealth devices.
·Allowing a DECT phone to ring and answer calls on behalf of a nearby mobile phone
·Real-time location systems (RTLS), are used to track and identify the location of objects in real-time using “Nodes” or “tags” attached to, or embedded in the objects tracked, and “Readers” that receive and process the wireless signals from these tags to determine their locations
·Personal security application on mobile phones for prevention of theft or loss of items. The protected item has a Bluetooth marker (e.g. a tag) that is in constant communication with the phone. If the connection is broken (the marker is out of range of the phone) then an alarm is raised. This can also be used as a man overboard alarm. A product using this technology has been available since 2009.

580Q. What are the devices in which Bluetooth works?
Devices
        A Bluetooth USB dongle with a 100 m range. The MacBook Pro, shown, also has a built in Bluetooth adaptor.
        Bluetooth exists in many products, such as the
1.      iPhone,
2.      iPad,
3.      iPod Touch,
4.      Lego Mindstorms NXT,
5.      PlayStation 3,
6.      PSP Go,
7.      telephones,
8.      the Nintendo Wii,
and some high definition
9.      headsets,
10.  modems, and
11.  watches.

581Q. What are the advantages of Wi-Fi?
        Wi-Fi allows cheaper deployment of local area networks (LANs).
        Also spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs.
        Manufacturers are building wireless network adapters into most laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in even more devices.
        Different competitive brands of access points and client network-interfaces can inter-operate at a basic level of service.
        Products designated as "Wi-Fi Certified" by the Wi-Fi Alliance are backwards compatible.
        Unlike mobile phones, any standard Wi-Fi device will work anywhere in the world.
        Wi-Fi Protected Access encryption (WPA2) is considered secure, provided a strong passphrase is used.
        New protocols for quality-of-service (WMM) make Wi-Fi more suitable for latency-sensitive applications (such as voice and video).
        Power saving mechanisms (WMM Power Save) extend battery life.

582Q. What is an inverter? 
An inverter is a power device that transforms DC (Direct Current) into AC (Alternating Current). A typical application would be to convert your available battery or DC power to AC to power sensitive electronic devices that require clean, low distortion sine wave inputs (i.e. microprocessor based instruments and PLC's).

There are two types of "quality" inverters offered, "pure sine wave" and "modified sine wave". A 'pure sine wave' inverter produces a clean, regulated AC output with low distortion. A modified sine wave inverter produces an output that is a rectangular or stepped waveform where both the peak and RMS value is equal to a sine wave of the same magnitude, and is a lower cost alternative to the 'pure sine wave' device. 

583Q. What are Modified Standard Products portfolio called?
Modified Standard Products portfolio includes:  
·      50Hz, 60Hz and 400Hz frequency converters for Military & Aerospace GSE test sets
·      Specialized devices for production test that include remote control and measurement capability
·      Custom frequency converters for military applications (airborne, shipboard and mobile)
·      Custom DC power supplies for military applications (airborne, shipboard and mobile)
·      Custom frequency converters for railroad signaling applications
·      Rugged high voltage AC power sources for oil & gas exploration with RS485 interface and master/slave capability,
·      Custom UPS's for use on US Navy ships, US Army vehicles and USAF test sets.

584Q.   What is called Pulse Width Modulation (PWM) technology?
Switching AC power supplies use Pulse Width Modulation (PWM) technology to synthesize an AC waveform. Filtering at the output of the supply shapes and filters the PWM pulses into a clean sine wave.
Switching technology offers
1.      lighter weight,
2.      smaller size,
3.      cost savings, and
4.      sufficient bandwidth
for most applications.

Switching AC power supplies are ideal for the majority of applications, including:
1.      avionics development and test facilities,
2.      production test of 50Hz, 60Hz & 400Hz products,
3.      circuit development ,
4.      margin testing of frequency & voltage,
5.      operational conformance testing and motor testing,
to name a few.

Different types of avionics and jet engine control systems require testing and simulation over a very wide range of frequencies, 350 to 800Hz.

585Q. Determine polarity by the metallic electrode (E6010)?
1. Clean base metal and position flat
2. Set amperage at 130 to 145 for 5/32" electrode
3. Adjust to either polarity
4. Strike an arc. Hold normal arc length and standard electrode angle and run a bead
5. Listen to the sound of the arc. Correct polarity, with normal arc length and amperage, will produce a regular "crackling" sound. Incorrect polarity, with normal
    length and amperage setting will produce irregular "crackling" and "popping" with an unstable arc
6. See above for characteristics of arc and bead when using metallic electrode on correct and incorrect polarity
7. Adjust to the other polarity and run another bead
8. Clean beads and examine. With the wrong polarity, the electrode negative, you will get many of the bad bead characteristics shown in Lesson 1.6
9. Repeat several times, until you can quickly recognize correct polarity

586Q.  How to  Determine polarity by using the carbon electrode?
1. Clean the base metal and position flat
2. Shape the points of the two carbon electrodes on a grinding wheel, so they are identical with a gradual taper running back 2 or 3 inches from the arc tip
3. Grip one electrode in the electrode holder close to the taper
4. Set amperage at 135 to 150
5. Adjust to either polarity
6. Strike an arc (use shield) and hold for a short time. Change arc length from short to long, affording an observation of the arc action
7. Observe the arc action. If the polarity is negative (straight) the arc will be stable, easy to maintain, uniform, and conical in shape. If the polarity is positive
    (reverse), the arc will be difficult to maintain and will leave a black carbon deposit on the surface of the base metal
8. Change the polarity. Strike an arc with the other electrode and hold for a similar length of time. Observe the arc action as before
9. Examine the ends of the two electrodes and compare. The one used on negative polarity will burn off evenly, keeping its shape. The electrode used on positive polarity will quickly burn off blunt

587Q. Why polarity does change?
        The terms "straight" and "reverse" polarity are used around the shop.
        They may also be expressed as "electrode-negative" and "electrode-positive" polarity. The latter terms are more descriptive and will be used throughout this article.
        Polarity results from the fact that an electrical circuit has a negative and a positive pole. Direct current (DC) flows in one direction, resulting in a constant polarity.
        Alternating current (AC) flows half the time in one direction and half the time in the other, changing its polarity 120 times per second with 60-hertz current.

588Q. what will if irregular polarity is used?
For proper penetration, uniform bead appearance, and good welding results, the correct polarity must be used when welding with any given metallic electrode. Incorrect polarity will cause poor penetration, irregular bead shape, excessive spatter, difficulty in controlling the arc, overheating, and rapid burning of the electrode.

589Q. Negative and positive polarity?
        The first is to use a DC carbon electrode, which will work correctly only on negative polarity.
        The second is to use Fleetweld 5P electrode, which works outstandingly better on positive polarity than on negative polarity.

590Q. What are the problems of the present educated to get employment?
1.      Job oriented but not subject
2.      Cannot solve problems
3.      Don’t know the basics of the law 
4.      Don’t know what is system
5.      No humanity
6.      Don’t know ethics
7.      Produces intellectual materialism
8.      Know only the price but not the value
9.      Logical but not scientific
10.  No commitment
11.  Certificate oriented but not subject oriented
12.  For our own benefit somebody should fight

591Q.
        The use of the AC transformer-type welder necessitated the development of an electrode that would work on either polarity, due to the constant-changing of the polarity in the AC circuit.
        Though AC itself has no polarity, when AC electrodes are used on DC they usually operate best on one specific polarity.
        The covering on the electrode designates which polarity is best and all manufacturers specify on the electrode container what polarity is recommended.

592Q.  Sound travels faster in denser material like solids than the less dense liquids. Wood is a solid and sound travels faster in it than in water, but it can't be more dense than water since it floats in water! What's happening?
A simple backrounder on sound travel goes like this: Sound travels as a message by wiggling atoms and molecules. The closer these are together, the faster the message travels, much like dominoes falling down faster if they are stood up closer together than if they are separated by almost their length. So, if the sound travels along a path where the density of the atoms is higher, then the "message" gets through faster.
We make a subtle error in thinking of wood-the-solid in the way we would think of a piece of metal, or a nice big crystal. Wood is not homogeneous, and it grows as a fiber, not only with structure in a certain direction along the wood, but also with built-in stresses, and complex molecular structures. So, compared to something simple and unstructured like water, a sea of simple H2O molecules - there isn't much to compare! The microscopic structure of matter has something to do with sound propagation.
Water, a liquid, is not as dense as wood, a solid. Further, along the fiber in wood, the molecules are well stacked, tight and dense. Along the rings, there is a little air (gas) between them, so the sound is not quite as fast in propagating in that direction. Look at the following data on the speed of sound, and notice that sound does travel faster in wood than water, except the 1 piece of data about travel across the rings in Ash - it's the air pockets across the rings that slows the sound message down!

593Q. How does sound travel in different media?
WATER:
Distilled water = 1489 m/sec
Sea Water = 1531 m/sec (higher because it is denser)
WOOD:
Ash, along the fiber = 4670 m/sec
Ash, across the rings = 1390 m/sec, about 3 times slower, and a little slower
than the speed of water!
Beech, along the fiber = 3340 m/sec
Elm, along the fiber = 4120 m/sec
Maple, along the fiber = 4110 m/sec
Oak, along the fiber = 3950 m/sec.

594Q. Why does wood float in water?
        It is pretty clear that the average density of most wood is less than water, floating mainly because of the air pockets between the denser fibrous wood. However, ebony doesn't float. There is a possible lesson in structures of materials found in comparing a piece of ebony with a piece of oak - you really can see and feel the difference.

595Q.  How does sound travel through air and water?
        Sound is motion of atoms, and travels like a message by wiggling the atoms one by one. When you push a line of dominoes over, you send a "message" down the stack, using individual dominoes to carry it - note that the first domino doesn't move to the end of the stack, it just is one of the many carriers of the message, hitting its neighbor, which hits its neighbor, and so on.
        Because sound is this kind of motion of atoms, it really doesn't matter whether the atoms happen to be air atoms (or molecules), or water atoms (or molecules), or wood atoms for that matter!
        So sound starts with something moving or vibrating (like your vocal chords), then this moving thing starts wiggling the atoms in air (gas) or water (liquid) or wood (solid), which then wiggle their neighbors, and so on until the "message" gets to the receiver like our ear.

596Q. How loud does a sound have to be before you go deaf?
Deafness is a complicated medical subject - short loud explosions can make you go deaf, but also long use of what your parents would call "loud music" can also make you go deaf. You can think of deafness as related to the ability to just hear a sound. So do you think you could hear a feather drop on a marching band drum? If your ear bones (ossicles) and nerve endings (in the cochlea) are in good shape, you might just be able to hear this.
A sound which is about 1 million times louder, however would not only be heard by you, but it would be painful and cause damage! These extremes are called the range of hearing. The more you listen to sounds approaching painful ones or even ones that your parents consider too loud, the less likely you are compared to other 3rd graders to hear that feather drop, and the smaller your range of hearing becomes.
You slowly go deaf in the frequency range where people hear. Often you need other people to tell you what "loud" is since your ear can adjust to loud sound levels and make you able to hear loud sounds, but it is still damaging your ear.

597Q.  Compare different loudnesses?
Technically, loudness is measured in physically exact units of sound pressure or sound intensity levels (the unit "decibel" is used, and a tone of 1000 hertz played at a loudness of 40 decibels is at what we would call the pianissimo level (i.e. very soft).
This same tone played at a loudness of 80 decibels is what we would call the fortissimo level (i.e very loud), and it is not twice as loud, but rather 10,000 times louder (decibels are logarithmic, like the earthquake richter scale).
The fact is, our ear is a very incredible sensor, with a hearing range of 1,000,000 - i.e. if that feather dropping on the musical band drum is 1 and we can hear it, that ear can also probably hear something 1,000,000 times louder.

598Q.  How many light years does sound take to go to Pluto?
There is no gas, liquid or solid between here and Pluto! So, guess what? Sound doesn't get there!!!

599Q. How loud do you have to yell for glass to break?
Yelling probably would never break a glass, however a very large chested soprano could sing a note that might break a glass if she got the right pitch. If you take a wine glass and rub the rim with a slightly wetted finger, round and round, you hear a sound which has a high pitch - this is the resonance frequency of the glass.
When you yell, you usually use a lower pitch and a gruff voice. So, practice singing and singing high pitches if you want to break glasses!

600Q.  How fast can sound travel in a telephone cable?
You are probably thinking about your voice travelling in the phone lines, and I will answer that question. You speak into a mouthpiece or microphone which converts sound into something very different - whereas sound is the wiggling of atoms in a gas, liquid or solid, the microphone converts this vibration into electrical energy. Once this is done, the "message" is now electrical, not the mechanical-based sound vibrations, and this electrical message travels at near the speed of light, which is about 1 million times faster than sound vibrations travel. Once the electrical message gets to the end of the cable, it is converted back into sound vibrations by the earpiece in the phone or by the speaker in your computer. Across the United States (about 3000 miles), it takes much less than a second for the electrical message representing your voice to travel.

647. PRESENTATION SKILLS MBA I - II

PRESENTATION  SKILLS MBA   I - II There are many types of presentations.                    1.       written,        story, manual...