Latest Update

Thursday, February 14, 2019

February 14, 2019

Pulwama Terror Attack in Jammu & Kashmir on 14th Feb 2019

 Pulwama Terror Attack in Jammu & Kashmir on 14th Feb 2019



Pulwama Terror Attack in Jammu & Kashmir on 14th Feb 2019
 Pulwama Terror Attack in Jammu & Kashmir on 14th Feb 2019




At least 36 CRPF personnel have been martyred in a terrorist attack on a convoy of the security forces, according to news agency PTI.

* Jaish-e-Mohammed has claimed responsibility for the attack.

* Police have identified the terrorist as Adil Ahmad from Kakapora in 
Pulwama.

* The Scorpio SUV being driven by local Kashmiri Adil Ahmed from Kakpora in Pulwama was said to be carrying 350 kgs of explosives.

* The attack happened after an explosive-laden vehicle attacked one of the buses of the convoy.







The convay with in excess of 78 vehicles was originating from Jammu and going towards Srinagar.


 The escort began from Jammu around 3.30 am and should reach Srinagar before nightfall.

 The quantity of work force making a trip back to the Valley was high as there was no development on the interstate for the last a few days in view of awful climate and other authoritative reasons.

 There were 2,500 work force in the guard. As a rule, around 1,000 work force are a piece of a guard.





Srinagar: In the greatest fear assault in Jammu and Kashmir since the Uri Army camp strike of September 18, 2016, after which careful strikes were led in Pakistan-involved Kashmir, no less than 40 CRPF jawans were killed on Thursday evening in Pulwama region's Awantipora town, news office ANI detailed refering to K Vijay Kumar, consultant to the Jammu and Kashmir government. The fear mongers focused on a CRPF escort, which was moving from Jammu to Srinagar and had more than 70 vehicles and in excess of 2,500 work force. Numerous others were additionally harmed in the assault that occurred on the Jammu-Srinagar interstate in Awantipora's Goripora zone. PM Narendra Modi censured the assault and said that the penances of 'daring security staff will not go futile'. He later addressed National Security Advisor (NSA) Ajit Doval. President Ram Nath Kovind censured the assault.



Then, the Cabinet Committee on Security (CCS) is probably going to hold a gathering at 9.15 am on Friday.


Picture Of Terrorist Adil Ahmed
Picture Of Terrorist Adil Ahmed
Picture Of Terrorist Adil Ahmed




At least 44 CRPF jawans were executed and handfuls harmed in a dread assault in Jammu and Kashmir's Pulwama locale. Loss of life in the Pulwama's Awantipora dread assault is relied upon to rise, police authorities said. Dread gathering Jaish-e-Mohammed has assumed the liability of the assault. IED impact was trailed by shots in Goripora zone of Awantipora. The episode occurred when somewhere in the range of 2,547 CRPF work force were arriving in an escort of 78 vehicles from the travel camp in Jammu and made a beeline for Srinagar. Police sources said a suicide aggressor slammed his vehicle around 3.15 p.m., shocking the security powers totally. A prior report said an ad libbed touchy gadget (IED) was detonated and afterward activists terminated at the escort. Catch minute-to-minute live updates in Pulwama dread assault.


Thursday, February 7, 2019

February 07, 2019

Difference between System Software and Application Software

Difference between System Software and Application Software




Difference between System Software and Application Software





Sl.No
Application Software
System Software
1
Application software is utilized by client to perform specific work
System software is utilized for working PC equipment.

2

Application virtual products are introduced by client's necessities
System virtual products are introduced on the PC while working System is introduced.

3

When all is said in done, the client communicates with application software.

When all is said in done, the client does not associate with System software since it works out of sight.

4

Application software can't run freely. They can't keep running without the nearness of System software.

System software can run freely. It gives stage to running application software projects.

5

A few example of application software are spreadsheet,word processor, internet browser, media player, and so on.


A few example of system software are compiler, assembler, debugger, driver, and so on.



































Application Software: It is a software which is used to perform a specific tasks for our daily life.





Application software is utilized by client to perform specific work.

Application virtual products are introduced by client's necessities.

When all is said in done, the client communicates with application software.

Application software can't run freely. They can't keep running without the nearness of System software.

A few example of application software are spreadsheet,word processor, internet browser, media player, and so on.





 System software:  It is a software that control all the parts of hardware.


System software is utilized for working PC equipment.

System virtual products are introduced on the PC while working System is introduced.

When all is said in done, the client does not associate with System software since it works out of sight.

System software can run freely. It gives stage to running application software projects.

A few example of system software are compiler, constructing agent, debugger, driver, and so on.

Thursday, November 29, 2018

November 29, 2018

Samsung Galaxy On6 Specifications and Price (64 GB) (4 GB RAM)


Samsung Galaxy On6 (64 GB)  (4 GB RAM)

In this article I am going to write a article about Samsung Galaxy On6 Smartphones details:
The quality of this phone is very good….. It is a budget range phone provided by Samsung.ltd.

Samsung Galaxy On6 (64 GB)  (4 GB RAM)





Display Features



Display Size
14.22 cm (5.6 inch)
Resolution
720 x 1480 Pixels
Resolution Type
HD+
GPU
ARM Mali T830 MP1
Display Type
Super AMOLED
Display Colors
16M
Other Display Features
Corning Gorilla Glass


Os & Processor Features

Operating System
  Android Oreo 8
Processor Type
  1.6 GHz Exynos Octa Core
Processor Core
  Octa Core
Primary Clock Speed
  1.6 GHz

Memory Details

Internal Storage
64 GB
RAM
4 GB
Total Memory
64 GB
Expandable Storage
256 GB
Supported Memory Card Type
microSD
Memory Card Slot Type

Dedicated Slot
Camera Features


Primary Camera Available
Yes
Primary Camera
13MP
Secondary Camera
8MP
Flash
Front and Rear Flash


Connectivity Features

Network Type
4G, 4G VOLTE, 2G, 3G
Supported Networks
4G VoLTE, GSM, 4G LTE, WCDMA
Bluetooth Support
Yes
Bluetooth Version
4.2
Wi-Fi
Yes

Battery & Power Features

Battery Capacity
3000 mAh

Dimensions



Width
70.2 mm
Height
149.3 mm
Depth
8.2 mm
Weight
154 g

 Price:          11990

Wednesday, November 21, 2018

November 21, 2018

Trojan Horse Virus, Worms Virus and Malware Protection


Trojan Horse Virus, Worms Virus and Malware Protection

This time is one of prompt data, quick correspondence and lightning Internet. However, while, from one perspective, this has given a great deal of accommodations and changed the manner in which we experience our lives, then again, it has additionally made dangers against your well being an ordinary concern. Virus and malware are one of the manners by which your information can be imperiled.

You should hear terms like virus, malware, Trojans, worms and so forth in regular daily existence. Scarcely any non-experts don't have the foggiest idea about the genuine qualification between them. Here it is, set down in straightforward, simple to get a handle on the dialect.

Trojan Horse Virus, Worms Virus and Malware Protection
Trojan Horse Virus, Worms Virus and Malware Protection

 What is Malware?


Malware is an easygoing term for malicious software. Generally, it incorporates any and each risk to your PC. It is a term for infections, worms, Trojan ponies and everything else. So to characterize it, it accompanies noxious programming with not exactly respectable aims. It is inconceivably simple to erroneously introduce malware on your framework. You should simply tap the wrong connection or misunderstand the email connection. A good anti-virus may take care of these treats.

What is Virus?



 Individuals frequently utilize the term virus to conventionally mean any kind of malicious software that infects our computer system. Viruses are created by specific higher programs that change your any information, perhaps delete your important data.

In the most cases, virus come through malevolent downloads that can harm your framework. You may get a blameless looking email with a connection, possibly from an email address you know, and once you download the connection, the virus is  enter in your system.

When you visit a specific site and download programming, regularly viruses are downloaded alongside it. Most virus just come into activity once you execute the record that you have downloaded.

What is Trojan?

 A Trojan is a program that looks genuine yet has a problematic plan. The intention behind structuring a Trojan is to gain admittance to information inside a man's PC. It offers access to your most delicate information that may incorporate Visa data. This is finished by making a secondary passage. You can ensure yourself against Trojans by downloading programming and projects that originate from known and checked sources, and not acquired by an arbitrary pursuit on the Internet.

What is Worms?

 The business as usual of the worm is straightforward – it just continues repeating itself inside your framework. On the off chance that you see that a document doesn't go even in the wake of being erased, or when your circle space is full notwithstanding you not downloading or having that numerous projects or records, the guilty party in all likelihood is a worm. Worms don't join themselves to messages or downloaded programming. They enter the PC through vulnerabilities in the framework.


 How to secure yourself?

Since you know the refinement between the most well-known sorts of pernicious projects, what would you be able to do to secure yourself against them? Following are some basic safety measures you can take to guarantee that you're shielded from these dangers.

1.      Use good Anti-Virus:

A great many people have used some time of free anti-virus, or the one that comes packaged with the Windows program when you get it. In spite of the fact that these are not awful or hurtful, but rather they are wasteful in defending your framework. On the off chance that you utilize the Internet, you require an expert enemy of infection. Locate an excellent form that meets your requirements. There are diverse sorts of antivirus for home and corporate. Refresh your enemy of infection programs when you get a caution (which is every day in the great ones).

2.      Know what malicious programs look like:

On the off chance that you think your PC has turned out to be moderate or there are a few projects that look suspicious, it is constantly helpful in the event that you realize what the issue is. May be it is a worm, an infection, a Trojan steed or something different. An essential thought of what they look like and what do they can help you here.

For instance, examples of worms are W32.SillyFDC.BBY, Packed.Generic.236. JS.Debeski.Trojan is a Trojan horse.

   Be careful about email attachment:

 Never download an email attachment without checking it first. Administrations like gmail have infection scanners for attachment inbuilt, however a decent enemy of virus  joins this email filtering administration. If your best friend send you anything, before download  scan it fast. If your friend computer is infected, then a lot of chance to attack a virus to your computer system.

4.      Avoid the Third Party Downloads:

 The significance of this can't be overemphasized. Try not to go to sites by tapping on abbreviated URLs. Type the site address in the location bar. Try not to download programming from distributers you aren't sure of. Be additional wary while filling in your Visa data on a site.

Have a Hardware-based firewall and deploy DNS:

 A firewall shields your PC from various dangers, including pernicious web activity. A firewall can likewise make preparations for infections and worms, however don't depend on just Firewall. The product based Windows Firewall, be that as it may, isn't solid enough and you should have an appropriate equipment based firewall.

From DNS assaults to visiting traded off website pages anything can taint your own PC, you should be careful about various dangers. In this way, the firewall does not ensure your framework alone. One of the manners in which you can watch yourself against this is by introducing a firewall and changing the manner in which your PC forms the DNA administrations. You can pick Open DNS for example, as it protects you against different online dangers like malware and spyware.

6.      Don't Forget to Avoid Auto run:

After inserting a Pen drive or a H.D.D to your PC. All things considered, you should make sure that the Auto run alternative is debilitated and first output the drive appropriately. Not doing as such, your PC may get influenced. Contaminated outer drives with infections are a standout amongest the most widely recognized approaches to taint your PC.

7.      Check SSL before dealing with e-commerce:

 It is very important to check validness with SSL (Secure Socket Layer) while managing the site as digital guilty parties can sniff the data or it might happen that the site has effectively any Trojan or infection. It is protected to manage an online site that has executed SSL security.

SSL anchors the continuous data with vigorous encryption so; someone else couldn't catch the voyaging information. World's most renowned internet business sites (Facebook, Amazon, PayPal, eBay and other) tie their online data and exchanges with profoundly believed Extended Validation endorsement on their site, which is a sign of greatest verification.

8.      Regular Backup Your Data:

 In the event that, if your PC is tainted with an infection or malware, ordinary information reinforcement reestablishes your information. It is sensible to scramble every one of your information so in the event that if the information is stolen or lost, there are solid odds of being anchored.


Here are some basic guidelines you can pursue to abstain from being infected by virus through email.


Do's 

1. Utilize an expert, email benefit that membership administrations give larger amounts of security and support.

2. Ensure that your email benefit infection channel is initiated.

3. Try not to download all your email to an email customer inconspicuous. Screen your email first, and erase suspicious-looking and undesirable messages previously downloading the genuine email to your nearby email customer.

4. Ensure your PC has refreshed enemy of infection programming running locally. Programmed refreshes are basic for compelling infection security. Joined with server-side examining, you presently have two layers of security.

5. Debilitate message review in your email customer, particularly on Windows stages. Something else, malignant projects joined to approaching messages may execute consequently and taint your PC.

6. Disregard or erase messages with connections giving off an impression of being sent from authority email addresses.

7. Take alert when opening illustrations and media connections, as infections can be veiled all things considered records.

8. Keep up a few autonomous email accounts. In the event that an infection taints your solitary business email address, you'll be stuck in an unfortunate situation. Additionally, keep reinforcements of your most vital email and documents independently.

9. On the off chance that any substantial message headers of an infection email demonstrate what server the message was sent from, contact the administration being referred to and record a formal protest.

Don'ts 

1. Try not to open an email connection except if you were expecting it and realize whom it's from.

2. Try not to open any spontaneous executable records, archives, spreadsheets, and so on.

3. Abstain from downloading executable or archives from the web, as these are regularly used to spread viruses.

4. Never open records with a twofold document expansion, e.g. filename.txt.vbs. This is a common indication of an infection program.



5. Try not to send or forward any documents that you haven't virus checked first.

6. Virus producers and spammers regularly collaborate in naughty plans to send however much spam as could reasonably be expected as proficiently as would be prudent. They make viruses that contaminate helpless PCs around the globe and transform them into spam-producing "robots". The tainted PCs at that point send monstrous measures of spam, unbeknownst to the PC proprietor.

Such virus produced email is frequently manufactured to have all the earmarks of being sent from authentic tends to gathered from location books on tainted PCs. The viruses additionally utilize such information, joined with arrangements of normal (client) names, to send spam to tremendous quantities of beneficiaries. Huge numbers of those messages will be returned as undeliverable, and touch base in guiltless and unconscious email clients' inboxes. In the event that this transpires, utilize the trainable spam channel to get those messages.

Conclusion:

These are a portion of the essential estimates that can assist you with staying safe and keep your information secure notwithstanding managing on the web. You ought to pursue the above estimations frequently to keep undesirable infection or malware outside the limit of your PC framework. On the off chance that you do feel that you have been influenced by malware, contact a specialist as opposed to attempting to analyze it all alone.

Monday, November 19, 2018

November 19, 2018

What is Computer Virus? Categories of viruses

What is a Computer Virus? 


A computer machine infection is a malignant program that self-imitates by replicating itself to another program. At the end of the day, the computer machine infection spreads without anyone else's input into other executable code or reports. The reason for making a computer machine infection is to taint powerless frameworks, gain administrator control and take client touchy information. Programmers plan computer machine infections with malevolent purpose and go after online clients by deceiving them.

What is Computer Virus? Categories of viruses
What is Computer Virus? Categories of viruses


One of the perfect techniques by which infections spread is through messages – opening the connection in the email, visiting a tainted site, tapping on an executable document, or review a contaminated promotion can make the infection spread to your framework. Other than that, diseases likewise spread while interfacing with officially contaminated removable capacity gadgets, for example, USB drives.

It is very simple and straightforward for the infections to sneak into a computer machine by avoiding the resistance frameworks. An effective break can cause difficult issues for the client, for example, contaminating different assets or framework programming, adjusting or erasing key capacities or applications and duplicate/erase or encode information.

There are two kinds of routes in infections work, when they arrive on another gadget they start recreating, while the second type plays dead until a specific trigger makes the noxious code to be executed. In this manner, it is exceptionally imperative to remain secured by introducing a strong antivirus program.

By and by, the modern ones accompany avoidance abilities that assistance in bypassing antivirus programming and other propelled dimensions of guards. In this way, the polymorphic malware improvement in the ongoing occasions empowers the infections to progressively change its code as it spreads. This has made the infection recognition and distinguishing proof exceptionally difficult.

The History of Computer Virus 

Robert thomas, an architect at bbn technologies built up the primary known computer machine infection in the year 1971. The principal infection was dedicated as the "creeper" infection, and the test program did by thomas tainted centralized servers on arpanet. The print message showed on the screens perused, "i'm the creeper: catch me on the off chance that you can."


In any case, the first wild computer machine infection, likely the first to be found in the historical backdrop of computer machine infections was "elk cloner." the elk cloner contaminated apple ii working frameworks through floppy circles. The message showed on tainted apple computers was a diverting one. The infection was produced by richard skrenta, a young person in the year 1982. Despite the fact that the computer machine infections were planned as a trick, it likewise edified how a noxious program could be introduced in a computer machine's memory and prevent clients from expelling the program.

It was fred cohen, who instituted the expression "computer machine infection" and it was following a year in 1983. The term appeared when he endeavored to compose a scholarly paper titled "computer machine viruses – theory and experiments" itemizing about the vindictive projects in his work.

Categories of Computer Viruses

 A computer machine infection is one type of malware that embeds its infection code to increase itself by modifying the projects and applications. The computer machine gets tainted through the replication of vindictive code.

Computer machine infections come in various structures to taint the framework in various ways. Probably the most widely recognized infections are

Boot sector virus :This kind of infection taints the ace boot record and it is testing and a perplexing undertaking to evacuate this infection and regularly requires the framework to be organized. For the most part it spreads through removable media.

Coordinate action virus:This is likewise called non-inhabitant infection, it gets introduced or remains covered up in the computer machine memory. It remains joined to the particular kind of records that it contaminates. It doesn't influence the client experience and framework's execution.


Inhabitant virus : Unlike direct activity infections, occupant infections get introduced on the computer machine. It is hard to distinguish the infection and it is even hard to evacuate an inhabitant infection.

Multipartite virus: This kind of infection spreads through various ways. It taints both the boot part and executable records in the meantime.

Polymorphic virus: These kind of infections are hard to relate to a conventional enemy of infection program. This is on the grounds that the polymorphic infections changes its mark design at whatever point it repeats.

Overwrite virus :This kind of infection erases every one of the documents that it contaminates. The main conceivable instrument to evacuate is to erase the tainted records and the end-client needs to lose every one of the substance in it. Recognizing the overwrite infection is troublesome as it spreads through messages.

Spacefiller virus: This is likewise called "cavity viruses". This is called so as they top off the vacant spaces between the code and subsequently does not make any harm the record.

File infectors:

 Scarcely any document infector infections come joined with program records, for example, .com or .exe documents. Some record infector infections taint any program for which execution is asked for, including .sys, .ovl, .prg, and .mnu documents. Therefore, when the specific program is stacked, the infection is additionally stacked.

Other than these, the other document infector infections come as a totally included program or content sent in email connections.

Macro infections:

 As the name proposes, the full scale infections especially target large scale dialect directions in applications like Microsoft Word. The equivalent is inferred on different projects as well.

In MS Word, the macros are keystrokes that are installed in the archives or spared groupings for directions. The full scale infections are intended to add their vindictive code to the bona fide large scale successions in a Word record. Be that as it may, as the years passed by, Microsoft Word saw debilitating of macros of course in later forms. Therefore, the cybercriminals began to utilize social designing plans to target clients. All the while, they trap the client and empower macros to dispatch the infection.

Since full scale infections are making a returned the ongoing years, Microsoft immediately struck back by including another element in Office 2016. The component empowers security administrators to specifically empower large scale utilize. Truly, it very well may be empowered for confided in work processes and blocked whenever required over the association.

Overwrite Viruses:

 The infection configuration reason will in general differ and Overwrite Viruses are transcendently intended to demolish a document or application's information. As the name says everything, the infection in the wake of assaulting the COMPUTER MACHINE begins overwriting records with its own code. Not to be trifled with, these infections are more equipped for focusing on particular records or applications or deliberately overwrite all documents on a tainted gadget.

On the flipside, the overwrite infection is equipped for introducing another code in the records or applications which programs them to spread the infection to extra documents, applications, and frameworks.

Polymorphic Viruses:
 

More cybercriminals are relying upon the polymorphic infection. It is a malware type which can change or transform its hidden code without changing its fundamental capacities or highlights. This helps the infection on a computer or system to dodge identification from numerous antimalware and risk recognition items.


Since infection evacuation programs rely upon distinguishing marks of malware, these infections are deliberately intended to escape recognition and recognizable proof. At the point when a security programming distinguishes a polymorphic infection, the infection adjusts itself consequently, it is not any more perceivable utilizing the past mark.

Resident Viruses:


The Resident infection inserts itself in the memory of a PC. Fundamentally, the first infection program isn't required to taint new records or applications. Notwithstanding when the first infection is erased, the variant put away in memory can be initiated. This happens when the PC OS stacks certain applications or capacities. The inhabitant infections are troublesome because of the reason they can run unnoticed by antivirus and antimalware programming by covering up in the framework's RAM.

Rootkit Viruses:

The rootkit infection is a malware type which furtively introduces an illicit rootkit on a tainted framework. This opens the entryway for assailants and gives them full control of the framework. The assailant will have the capacity to on a very basic level adjust or debilitate capacities and projects. Like other modern infections, the rootkit infection is additionally made to sidestep antivirus programming. The most recent forms of major antivirus and antimalware programs incorporate rootkit examining.

 System or Boot-record Infectors:

 The Boot-record Infectors taint executable code found in particular framework regions on a circle. As the name infers, they join to the USB thumb drives and DOS boot segment on diskettes or the Master Boot Record on hard plates. Boot infections are not any more typical nowadays as the most recent gadgets depend less on physical capacity media.

Sunday, November 11, 2018

November 11, 2018

Computer Input Devices. [ Full Explain ] Example

Computer Input Devices. [ Full Explain ]


Those type of hardware devices are used to input instructions to our computer system is called Input Device.

There are some usable input devices below:


           Keyboard

           Mouse

           Joy Stick

           Light pen

           Track Ball

           Scanner

           Graphic Tablet

           Microphone

           Magnetic Ink Card Reader(MICR)

           Optical Character Reader(OCR)

           Bar Code Reader

           Optical Mark Reader(OMR)


Computer Input Devices. [ Full Explain ]
Computer Input Devices. [ Full Explain ] 


Keyboard

Keyboard is the most widely recognized and exceptionally prevalent input device which helps to input data to the PC. The format of the keyboard resembles that of conventional , in spite of the fact that there are some extra keys accommodated playing out extra capacities.

Keyboards are of two sizes 84 keys or 101/102 keys, however now keyboards with 104 keys or 108 keys are additionally accessible for Windows and Internet.

Mouse

Mouse is the most well known pointing device. It is an extremely popular cursor-control device having a little palm estimate box with a round ball at its base, which detects the development of the mouse and sends relating signals to the CPU when the mouse buttons are pressed.

By and large, it has two button called the left and right button and a wheel is available between the buttons. A mouse can be utilized to control the situation of the cursor on the screen, yet it can't be utilized to enter content into the PC.

Joystick



Joystick is additionally a pointing device, which is utilized to move the cursor position on a screen. It is a stick having a round ball at its both lower and upper closures. The lower circular ball moves in an attachment. The joystick can be moved in each of the four headings.

The capacity of the joystick is like that of a mouse. It is chiefly utilized in Computer Aided Designing (CAD) and playing for computer games.


Light Pen

Light pen is a pointing device comparative as a pen. It is utilized to choose a shown menu thing or draw pictures on the screen. It comprises of a photocell and an optical framework put in a little tube.

At the point when the tip of a light pen is moved over the screen and the pen button is pressed, its photocell detecting component distinguishes the screen area and sends the comparing signals to the CPU.

Track Ball

Track ball is an input device that is generally utilized in notebook, laptops instead of  a mouse. This is a ball which is half embedded and by moving fingers on the ball, the pointer can be moved.

Since the whole device isn't moved, a track ball requires less space than a mouse. A track ball comes in different shapes as a ball, a button, or a square.

Scanner



Scanner is an input device that looks like a photocopy machine.It is utilized when some data is accessible on paper and after manipulating it is transferred to hard disk.

Scanner captures pictures from the source which are then changed over into a digital shape that can be put on hard disk . These pictures can be edited before printed.

Digitizer

Digitizer is an input device which changes over simple data into computerized form. Digitizer can change over a flag from the TV or camera into a series of numbers that could be stored in a PC. They can be utilized by the PC to make an image of whatever the camera had been pointed at.

Digitizer is also called Tablet or Graphics Tablet as it changes over illustrations and pictorial information into parallel sources of info. A realistic tablet as digitizer is utilized for fine works of illustration and picture control applications.

Microphone

Microphone is an input device to include sound that is sore in pc in digital form.
The microphone is utilized for different applications, for example, adding sound to a media introduction or for mixing music.

Magnatic Ink Card Reader (MICR)

MICR input device is for the most part utilized in banks as there are huge number of checks to be handled each day. The bank's code number and check number are imprinted on the checks with a unique sort of ink that contains particles of attractive material that are machine readable.


This reading procedure is called Magnetic Ink Character Recognition (MICR). The fundamental focal points of MICR is that it is quick and less blunder inclined.

Optical Character Reader (OCR)

OCR is an input device used to peruse a printed content.

OCR filters the content optically, character by character, changes over them into a machine decipherable code, and stores the content on the framework memory.

Bar Code Reader



BCR is a device utilized for perusing bar coded (information as light and dull lines). Bar coded information is for the most part utilized in marking merchandise, numbering the books, and so on. It might be a handheld scanner or might be implanted in a stationary scanner.

BCR filters a scanner tag picture, changes over it into an alphanumeric esteem, which is then nourished to the PC that the scanner tag peruse is associated with.

Optical Mark Reader (OMR)

OMR is an exceptional sort of optical scanner used to perceive the kind of check made by pen or pencil. It is utilized where one out of a couple of choices is to be chosen and checked.

It is exceptionally utilized for checking the appropriate response sheets of examinations having various decision questions.