Computer Science and Information Technology in easy words
Subscribe to this blog
Follow by Email
PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address or other details to help you with your experience.
When do we collect information?
We collect information from you when you register on our site, subscribe to a newsletter, fill out a form or enter information on our site.
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
To personalize user’s experience and to allow us to deliver the type of content and product offerings in which you are most interested.
To improve our website in order to better serve you.
To send periodic emails regarding your order or other products and services.
How do we protect visitor information?
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
We use regular Malware Scanning.
We do not use an SSL certificate
We do not need an SSL because: We do not collect sensitive information.
Do we use ‘cookies’?
Yes. Cookies are small files that a site or its service provider transfers to your computer’s hard drive through your Web browser (if you allow) that enables the site’s or service provider’s systems to recognize your browser and capture and remember certain information.
Understand and save user’s preferences for future visits.
Keep track of advertisements.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser’s Help menu to learn the correct way to modify your cookies.
If you disable cookies off, some features will be disabled It won’t affect the users experience that make your site experience more efficient and some of our services will not function properly.
However, you can still place orders .
Third Party Disclosure
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information unless we provide you with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others’ rights, property, or safety.
However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
Third party links
Occasionally, at our discretion, we may include or offer third party products or services on our website. These third party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.
Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en
We use Google AdSense Advertising on our website.
We have implemented the following:
Remarketing with Google AdSense
Demographics and Interests Reporting
We along with third-party vendors, such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions, and other ad service functions as they relate to our website.
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising initiative opt out page or permanently using the Google Analytics Opt Out Browser add on.
California Online Privacy Protection Act
According to CalOPPA we agree to the following:
Users can visit our site anonymously
Users are able to change their personal information:
By emailing us
How does our site handle do not track signals? We honor do not track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third party behavioral tracking? It’s also important to note that we do not allow third party behavioral tracking
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under 13, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation’s consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We do not specifically market to children under 13.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur: We will notify the users via email
Within 7 business days
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
To be in accordance with CANSPAM we agree to the following:
If at any time you would like to unsubscribe from receiving future emails, you can email us at firstname.lastname@example.org and we will promptly remove you from ALL correspondence.
https://www.computercuriousity.com No.246, Rishra Kolkatta, West Bengal 712250 India email@email@example.com
PROCESSOR AND HYPERTHREADING Friends in the last post i tried to say something about computer science and mathematics relationship. Now i am going to say something about processor and hyperthreading. So let’s get started. The Physical Component By Which A Computer Is Mde Which We Can See, Touch And Feel Is Called Computer Hardware Example Ram, Motherboard. · INPUT DEVICE : These hardware are used to input any data, instruction on command insidea computer device. example keyboard mo9use scanner microphone, webcam etc · OUTPUT DEVICE : these hardware are used to get any output from a computer system. example: monitor, printer, speaker. · CENTRAL PROCESSIG UNIT (CPU) : This Device Proceses All Instruction Given By A User, And It Also Other Haqrdwqaar Peripherals Example :Microprocessor · MOTHERBOARD: It is the main electric circuit board which is made by a pcb(printed circuit board). It hods all hardware component
EXPANSION SLOTS IN MOTHERBOARD Friends today i am going to share my knowledge and understanding of the expansion slots. So lets begin with our topic. Expansion slots are used to provide additional properties for carrying the computation task such as additional video, audio and sound, advanced graphics and Ethernet. So lets begin with our knowledge hunting. I will start by AGP expansion slots. AGP AGP stands for ACCELARATED GRAPHICS PORT. AGP was introduced with high speed 3D graphics display in 1996. It is used for older graphics card types which is discontinued by PCI EX16 graphics port in 2005. These were kernel version of AGP most of the brand in 1.5 volt DC. AGP 1x channel and 66MHZ clock speed resulting a data table of 266 MBPS. AGP 2x, 4x ,8x specification multiply MHZ clock to produce increase throughput. AGP 8x produces effective clock frequency of 533 MHZ resulting a throughput of 2 GBPS (2133MHZ) resulting a throughput of over a 32 bit channel. PCI PCI stands for P
ARITHMETIC OPERATION AND CONVERSION DONE BY COMPUTER As we have seen in previous post that arithmetic computation is an important thing in calculation, if a person doesn’t know arithmetic computations, he will be doomed to be in trouble during calculations that happens in everyday life. So it is necessary to learn arithmetic computation. So in this post I am going to take one step further. I am going to write about octal and hexadecimal numbers. Now let us discuss some arithmetic conversion. Let us see what is octal and hexadecimal numbers used by digital computer. The conversion from and to binary, octal and hexadecimal plays an important part in digital computers. Since 2 3 = 8 and 2 4 = 16 each octal digit corresponds to three binary digits and each four binary digit corresponds to one hexadecimal digit. The conversion of from binary to octal is easily accomplished by partitioning the binary into group of three digit each, starting from binary