Khmer songs

What is array?

A
series of objects all of which are the same size and type. Each object in an array is called an array element. For example, you could have an array of integers or an array of characters or an array of anything that has a defined data type. The important characteristics of an array are: Each element has the same data type (although they may have different values). The entire array is stored contiguously in memory (that is, there are no gaps between elements). Arrays can have more than one dimension. A one-dimensional array is called a vector ; a two-dimensional array is called a matrix.

Difference between a server and a client

On a high level, this is my understanding of the difference between a client and server: a server listens on a host and a port, receives requests (e.g. through a socket connection), and then sends a response to the client who initiated the socket connection. The client is what sends a request to that server socket, and waits for a response.

Programming language

Definitions
A programming language is a notation for writing programs, which are specifications of a computation or algorithm.[2] Some, but not all, authors restrict the term "programming language" to those languages that can express all possible algorithms.[2][3] Traits often considered important for what constitutes a programming language include: Function and target A computer programming language is a language used to write computer programs, which involve a computer performing some kind of computation[4] or algorithm and possibly control external devices such as printers, disk drives, robots,[5] and so on. For example, PostScript programs are frequently created by another program to control a computer printer or display. More generally, a programming language may describe computation on some, possibly abstract, machine. It is generally accepted that a complete specification for a programming language includes a description, possibly idealized, of a machine or processor for that language.[6] In most practical contexts, a programming language involves a computer; consequently, programming languages are usually defined and studied this way.[7] Programming languages differ from natural languages in that natural languages are only used for interaction between people, while programming languages also allow humans to communicate instructions to machines. Abstractions Programming languages usually contain abstractions for defining and manipulating data structures or controlling the flow of execution. The practical necessity that a programming language support adequate abstractions is expressed by the abstraction principle;[8] this principle is sometimes formulated as recommendation to the programmer to make proper use of such abstractions.[9] Expressive power The theory of computation classifies languages by the computations they are capable of expressing. All Turing complete languages can implement the same set of algorithms. ANSI/ISO SQL-92 and Charity are examples of languages that are not Turing complete, yet often called programming languages.[10][11] Markup languages like XML, HTML or troff, which define structured data, are not usually considered programming languages.[12][13][14] Programming languages may, however, share the syntax with markup languages if a computational semantics is defined. XSLT, for example, is a Turing complete XML dialect.[15][16][17] Moreover, LaTeX, which is mostly used for structuring documents, also contains a Turing complete subset.[18][19] The term computer language is sometimes used interchangeably with programming language.[20] However, the usage of both terms varies among authors, including the exact scope of each. One usage describes programming languages as a subset of computer languages.[21] In this vein, languages used in computing that have a different goal than expressing computer programs are generically designated computer languages. For instance, markup languages are sometimes referred to as computer languages to emphasize that they are not meant to be used for programming.[22] Another usage regards programming languages as theoretical constructs for programming abstract machines, and computer languages as the subset thereof that runs on physical computers, which have finite hardware resources.[23] John C. Reynolds emphasizes that formal specification languages are just as much programming languages as are the languages intended for execution. He also argues that textual and even graphical input formats that affect the behavior of a computer are programming languages, despite the fact they are commonly not Turing-complete, and remarks that ignorance of programming language concepts is the reason for many flaws in input formats.[24]

Thai Vs Khmer football match high light

Thai-Khmer football match in Phnom Penh.

Cambodia visitng places

Course will not be able to see all the things Cambodia invites in just a trip, but you can refer to the following activities and options, which are the colorful festivals in Cambodia. . quiet beaches, virgin natural features and of course what is the most beautiful of the temples of Angkor. All are worth to you to “stop” and then, see, and experience.

Boat cruise on the Mekong River

Especially at sunset, this scene would etched forever in your mind. Cruising along the river through Phnom Penh to enjoy the scenery and colors as the sun slowly sink behind the Royal Palace and the Silver Tower.
3. Banteay Srei: The temple beautiful roses decorated billion U.S., the most elaborate of all the monuments of Angkor.

The Top visiting Places in Thailand

1. Bangkok As the political, economic, cultural, culinary, and spiritual capital of Thailand, Bangkok features both old-world charm and modern convenience. Invariably, every Thailand holiday includes a visit to the kingdom’s capital city, Bangkok, or Krung Thep, “the city of angels” as it’s known to the locals. Many first-time visitors to the city are overwhelmed by its sheer size; others by the vast number of attractions scattered about the city, the result of more than two centuries of rapid development following the city’s founding in 1782. Today Bangkok is a cosmopolitan, 21st century city of more than ten million inhabitants.
2. Chiang Mai Thailand’s “Rose of the North” contains both cultural and natural diversity, a multitude of attractions, and welcoming hospitality. Chiang Mai literally means “new city” and has retained the name despite celebrating its 700th anniversary in 1996. King Meng Rai the Great, a very religious leader who founded many of the city’s temples, created the city as the capital of the Lanna Kingdom around the same time as the establishment of the Sukhothai Kingdom. Chiang Mai not only became the capital and cultural core of the Lanna Kingdom, but also the center of Buddhism in northern Thailand.
Ayutthaya Once considered the most spectacular city on Earth, the ruins of the capital of the Kingdom Ayutthaya are now a major tourist attraction easily accessible from Bangkok by car, train, or boat as either a daytrip or overnight excursion. A regional power for 417 years, the ancient city its apex in the 16th century, when the Kingdom’s territory extended into and beyond present-day Laos, Cambodia, and Myanmar. Ayutthaya had diplomatic relations with Louis XIV of France and was courted by Dutch, Portuguese, English, Chinese and Japanese merchants.
5. Kanchanaburi Kanchanaburi has become a major tourist destination, with a focus on the outdoors due to its magnificent landscape and charming beauty. Only two hours from Bangkok, Kanchanaburi is accessible by road or rail, and is popular for fishing, rafting, canoeing, mountain biking, bird-watching, star-gazing, golfing and elephant and jungle trekking. The area boasts several well-known waterfalls, caves that were once inhabited by Neolithic man, national parks, tranquil rivers, virgin forests, and several large reservoirs.

IP address - Internet Protocol (IP) address

IP address is short for Internet Protocol (IP) address. An IP address is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination.

What is My IP Address?


To view your IP address you can use the ipconfig (IPCONFIG) command line tool. Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
Note:
Class A - supports 16 million hosts on each of 126 networks
Class B - supports 65,000 hosts on each of 16,000 networks
Class C - supports 254 hosts on each of 2 million networks

How to Use Google Drive


Google Drive is a cloud storage service that allows you to store your documents, photos, videos, and more online. From Drive, you can also use Google Docs, Google Sheets, and other applications to create and edit various types of files. 88 66 62. Google Drive and Docs.

What is DHCP?

As long as you're learning about your IP address, you should learn a little about something called DHCP—which stands for Dynamic Host Configuration Protocol. Why bother? Because it has a direct impact on millions of IP addresses, most likely including yours. DHCP is at the heart of assigning you (and everyone) their IP address. The key word in DHCP is protocol—the guiding rules and process for Internet connections for everyone, everywhere. DHCP is consistent, accurate and works the same for every computer. Remember that without an IP address, you would not be able to receive the information you requested. As you've learned (by reading IP: 101), your IP address tells the Internet to send the information that you requested (Web page, email, data, etc.) right to the computer that requested it.

web server

Computer system whose primary purpose is to connect to the internet and to download stored webpages and files on to the user (client) computers when accessed or requested. A single web server may support multiple websites, or a single website may be hosted on several linked or mirrored web servers. Read more: http://www.businessdictionary.com/definition/web-server.html#ixzz3FHq5qXQa

Understanding the differences between client/server and peer-to-peer networks


If you work with computers long enough, sooner or later you’ll hear the terms “client/server” and “peer-to-peer.” These terms may seem strange at first, but each describes a particular networking architecture. And each architecture is more suitable for certain types of businesses. In this article, I’ll explore the differences between client/server and peer-to-peer networks. What’s the difference? There’s a huge difference between client/server and peer-to-peer networks. For instance, a peer-to-peer network has no central server. Each workstation on the network shares its files equally with the others. There’s no central storage or authentication of users. Conversely, there are separate dedicated servers and clients in a client/server network. Through client workstations, users can access most files, which are generally stored on the server. The server will determine which users can access the files on the network. Peer-to-peer networks should be installed in homes or in very small businesses where employees interact regularly. They are inexpensive to set up (comparatively speaking); however, they offer almost no security. On the other hand, client/server networks can become as big as you need them to be. Some support millions of users and offer elaborate security measures. As you can imagine, client/server networks can become very expensive. Peer-to-peer networks Peer-to-peer networks are appropriate only for very small businesses or for home use. A peer-to-peer network can support about ten clients (workstations) before it begins to suffer from some serious performance and management problems. Usually, peer-to-peer networks are composed of a collection of clients that run either Windows NT Workstation or Windows 98. Windows 3.11, Windows 95, and Windows 2000 Professional also support peer-to-peer networking. The concept behind peer-to-peer networking is to share files and printers as inexpensively as possible; therefore, there’s no main server on the network. Instead, each client functions both as a client and as a server simultaneously. Since users are allowed to control access to the resources on their own computers, however, security becomes very risky in a peer-to-peer environment. There’s no central security or any way to control who shares what. Users are free to create any network share points on their computers. The only security on a peer-to-peer network is at the share level. When users create network shares, they may implement no security, which means that anyone can have full access to the share, or they may assign a password to the share. Depending on which networking platform you use, a user may be able to assign one password to a share for read-only access and another password for full control over the share. Although this arrangement may sound somewhat secure, it isn’t. The computer that contains the shared resources doesn’t check on who’s trying to access those resources. Any user can access them as long as the user knows the password. If someone happens to write down a password, anyone who finds that password can access the share. Client/server networks There are an almost infinite variety of client/server networks, but all of them have a couple of things in common. For one thing, all have centralized security databases that control access to shared resources on servers. In the world of Windows, the server usually runs NetWare, Windows NT, or one of the Windows 2000 Server products. The server contains a list of usernames and passwords. Users can’t log on to the network unless they supply valid usernames and passwords to the server. Once logged on, users may access only those resources that the network administrator allows them to access. Thus, client/server networks possess much more security than do peer-to-peer networks. Client/server networks also tend to be much more stable. In a peer-to-peer network, certain shared resources reside on each user’s machine. If users decide to monkey around and crash their computers, they could seriously affect their peer-to-peer network (where coworkers depend on resources that reside on other users’ machines). On most client/server networks, however, shared resources reside on the server, where they’re safe from curious users. If a user happens to erase a shared resource from the server, you can rely on the nightly backup. (It’s very difficult to back up a peer-to-peer network every night.) The primary downside to a client/server network is its cost. Servers can become very expensive. For example, you could pay over $800 for a copy of Windows NT Server and five client licenses, and that price doesn’t even include the cost of the hardware, which must be more powerful than a standard workstation. Additionally, client/server networks require an employee to manage them. Unless you have someone in your office who’s trained in NetWare or Windows NT Server and in all of the issues that are involved in client/server networking, you’ll have to hire someone from the outside. And believe me when I say that qualified networking professionals don’t come cheap. Conclusion If you can afford it and if you have a qualified person to manage it, a client/server network is going to be your best bet. If you have only three employees who share a printer and occasional files, however, there’s absolutely nothing wrong with setting up a simple peer-to-peer networking environment. What’s best for you will depend on your budget and the size of your office. Brien M. Posey is an MCSE who works as a freelance technical writer and as a network engineer for the Department of Defense. If you’d like to contact Brien, send him an e-mail. (Because of the large volume of e-mail he receives, it's impossible for him to respond to every message. However, he does read them all.) The authors and editors have taken care in preparation of the content contained herein, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for any damages. Always have a verified backup before making any changes.

What is file server ?

In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. n the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive. A program or mechanism that enables the required processes for file sharing can also be called a file server. On the Internet, such programs often use the File Transfer Protocol (FTP).

Compute Network Lessons

Download: Compute Network Lessons

Programmer


A programmer, computer programmer, developer, coder, or software engineer is a person who writes computer software. The term computer programmer can refer to a specialist in one area of computer programming or to a generalist who writes code for many kinds of software. One who practices or professes a formal approach to programming may also be known as a programmer analyst. A programmer's primary computer language (C, C++, C#, Java, Lisp, Python, etc.) is often prefixed to the above titles, and those who work in a web environment often prefix their titles with Web. The term programmer can be used to refer to a software developer, Web developer, mobile applications developer, embedded firmware developer, software engineer, computer scientist, or software analyst. However, members of these professions possess other software engineering skills, beyond programming; for this reason, the term programmer, or code monkey, is sometimes considered an insulting or derogatory oversimplification of these other professions.[1] This has sparked much debate amongst developers, analysts, computer scientists, programmers, and outsiders who continue to be puzzled at the subtle differences in the definitions of these occupations.[2][3][4][5][6] Ada Lovelace, the first computer programmer.[7] British countess and mathematician Ada Lovelace is considered the first computer programmer, as she was the first to write and publish an algorithm intended for implementation on Charles Babbage's analytical engine, in October 1842, intended for the calculation of Bernoulli numbers.[8] Lovelace was also the first person to comment on the potential for computers to be used for purposes other than computing calculations. Because Babbage's machine was never completed to a functioning standard in her time, she never saw her algorithm run. The first person to run a program on a functioning modern electronically based computer was computer scientist Konrad Zuse, in 1941. The ENIAC programming team, consisting of Kay McNulty, Betty Jennings, Betty Snyder, Marlyn Wescoff, Fran Bilas and Ruth Lichterman were the first regularly working programmers.[9][10] International Programmers' Day is celebrated annually on 7 January.[11] In 2009, the government of Russia decreed a professional annual holiday known as Programmers' Day to be celebrated on 13 September (12 September in leap years). It had also been an unofficial international holiday before that.

Network administrator

A network administrator is an individual that is responsible for the maintenance of computer hardware and software systems that make up a computer network including the maintenance and monitoring of active data network or converged infrastructure and related network equipment. Network administrators are generally mid-level support staff within an organization and do not typically get involved directly with users. Network administrators focus upon network components within a company's LAN/WAN infrastructure ensuring integrity. Depending on the company and its size, the network administrator may also design and deploy networks.[1] The actual role of the network administrator will vary from place to place, but will commonly include activities and tasks such as network address assignment, management and implementation of routing protocols such as ISIS, OSPF, BGP, routing table configurations and certain implementations of authentication (e.g.: challenge response, etc.). It can also include maintenance of certain network servers: file servers, VPN gateways, intrusion detection systems, etc. In smaller organisations, network administrators may also be technically involved in the maintenance and administration of servers, desktop computers, printers, routers, switches, firewalls, phones, IP Phones, personal digital assistants, smartphones, software deployment, security updates and patches as well as a vast array of additional technologies inclusive of both hardware and software.

Window Server full lessons

Download: Lessons window server

Lessons window server

Download : Lessons window server

Basic Configuration

CPU - Central Processing Unit

CPU (pronounced as separate letters) is the abbreviation for central processing unit. Sometimes referred to simply as the central processor, but more commonly called processor, the CPU is the brains of the computer where most calculations take place. In terms of computing power, the CPU is the most important element of a computer system. On large machines, the CPU requires one or more printed circuit boards. On personal computers and small workstations, the CPU is housed in a single chip called a microprocessor. Since the 1970's the microprocessor class of CPUs has almost completely overtaken all other CPU implementations.

what is computer?

A computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set of instructions in a well-defined manner and it can execute a prerecorded list of instructions (a program).

What’s the Difference Between Information Technology and Computer Science Degrees?

What is Computer Science? What’s the Difference Between Information Technology and Computer Science Degrees?At its most basic level, computer science is the study of computers, their design, and their uses for computation, data processing, and systems control, according to the Merriam-Webster dictionary. Computer Science involves the design and development of all types of usable hardware and software, operating systems, and interactive games and apps.Computer Science employs the use of mathematical algorithms, the understanding of computer theory, and writing code to generate the latest in computer technology. Computer programmers—as the people who create these programs are called—write code to create software programs, then turn these designs into instructions that a computer or mobile device can follow. What is Information Technology? Information Technology (IT) involves the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data, as defined by Merriam-Webster. IT professionals apply these computer programs to solve business problems. Essentially, they use the programs created by computer scientists and focus on the practical application of computers in everyday life. They may help to explain to a client how to solve a technology issue or work with businesses to implement new technology plans that meet their needs. Information Technology has become an integral piece of every business plan for both small and large businesses.

What is health? What does good health mean?

The word health means different things to different people, depending on the situation. If somebody says "I was worried about my husband's health when he climbed Mt. Everest", it is clear that the woman is referring to her husband's physical health, possibly his heart, skin (frostbite) and risk of developing hypothermia (when the body's temperature drops too low. On the other hand, if you hear the phrase "With all these deadlines, presentations and working weekends, I wonder what the effect will be on her health," most likely the word "health" refers more to mental health than physical health (although the two are often linked). The words "health" or "healthy" can also be used in non-medical contexts. For example "A healthy economy needs an ideal GDP growth rate that is sustainable, one that remains in the expansion phase of the business cycle as long as possible." The English word "health" comes from the Old English word hale, meaning "wholeness, being whole, sound or well,". Hale comes from the Proto-Indo-European root kailo, meaning "whole, uninjured, of good omen". Kailo comes from the Proto-Germanic root khalbas, meaning "something divided". World Health Organization's (WHO's) definition of "health" The most famous modern definition of health was created during a Preamble to the Constitution of the World Health Organization as adopted by the International Health Conference, New York, 19-22 June, 1946; signed on 22 July 1946 by the representatives of 61 States (Official Records of the World Health Organization, no. 2, p. 100) and entered into force on 7 April 1948. "Health is a state of complete physical, mental and social well-being and not merely the absence of disease or infirmity." The Definition has not been amended since 1948. During the Ottawa Charter for Health Promotion in 1986, the WHO said that health is: "a resource for everyday life, not the objective of living. Health is a positive concept emphasizing social and personal resources, as well as physical capacities."

About us

Hello everyone.I write this blog in order to share some knowledge that I have to the others.I am very pleased for your visiting my blog.Thanks in advance.

Angkor Wat – Heritage of Humanity and World Wonder

Angkor Wat which literally means ‘City Temple’ is a Hindu temple complex built to replicate the heavens on earth. Constructed for King Suryavarman II in the early twelfth century, it is the best-preserved temple and is the only one to have remained a significant religious centre since its foundation; first Hindu, dedicated to Vishnu, then Buddhist. The temple is the epitome of the high classical style of Khmer architecture. This magnificent temple combines two basic plans of Khmer temple architecture; the temple mountain and the later galleried temple, based on early South Indian Hindu architecture. Constructed within a moat and an outer wall 3.6 kilometres (2.2 miles) long with three rectangular galleries, each raised above the next, it is designed to represent Mount Meru, home of the devas in Hindu mythology. At the centre of the temple stands a quincunx of towers. Unlike most Angkorian temples, Angkor Wat is oriented to the west and this has scholars divided as to its significance. The temple is admired for the grandeur and harmony of the architecture. The extensive bas-reliefs and the numerous guardian spirits adorning its walls serve as evidence of the strong Khmer religious beliefs. angor-wat angkorwat2 angkor-maraton-siemreap-1 cambodia_angkor-wat_majesty4

Computer Science Software Development and Web Application

Our unique M.S. C.S. degree (emphasizing modern software development: distributed, parallel, and web computing) attracts highly qualified students from around the world. Emphasis on Software Development using OOP (Java). Learn from experienced, caring PhD faculty in accredited university. Experience a safe, friendly, campus community with students from 80+ countries. Option: Combined 4.5 year B.S. and M.S. in Computer Science All students learn a simple systematic scientific technique for reducing stress, and increasing creativity and problem-solving abilities. Distance Education courses are now available worldwide. Graduate MIS Certificate program via distance education, beginning every August. International Students Program: Study 2 semesters (one academic year) full time on our campus (near Chicago). Pay only $4000 to $7500 to cover on-campus phase of the program. Work in a paid practical training internship in a U.S. IT company. Receive extensive financial aid. Entry dates are in February, May, August, and November for non-U.S. students. Students may have spouse and children join them for duration of studies, but additional costs and visa requirements apply. U.S. Citizens and Permanent Residents (green card holders): May only enter the program in August and February. Please click here for your different program structure. Continue to Program Structure Practical training at top IT companies Google, IBM, Microsoft, Sun, Amazon.com, Oracle, General Electric, Cisco, AT&T, and Bank of America are among the more than 1000+ U.S. companies who have hired international students in high-paying practical training positions. Over 100 of our students and graduates work at Microsoft. In the past six months, more than 70 companies have hired our students. Our Career Center offers students valuable assistance in finding jobs. Active learning with outstanding faculty You’ll get personal attention and support from professors who care deeply for your growth and fulfillment. A national study put Maharishi University among the nation’s top colleges in active and collaborative learning. One course per month By taking one course per month, you’ll eliminate the stress of studying several subjects at once. Each month you’ll absorb yourself fully in a single subject, making learning easy and satisfying. Personal development You’ll learn a scientifically validated and well-documented technique for personal development, the Transcendental Meditation® program, and enjoy clearer thinking, more energy, and many other benefits.

Cisco and Intel Testing Wireless Video

Khmer song- Pel mean luy mean brark tev bat mea