Before You are Also Late get the Scoop on Vivo Y12

The silver display isn’t just bodily large, it also has an ultra-excessive resolution: 480 x 800 pixels. Solely a handful or other telephones can equalize this decision. To place it into context, the Contact HD has 2.5 occasions as many pixels because the iPhone 3G S! It is this ultra-high decision that offers the HD its title. Nowadays, in the case of touchscreen phone, huge is healthier! The huge expanse of silver display real property implies that you will be able to see more choices, more sensible buttons, more menus on screen at one time, and the entire system gets a lot simpler to make use of.

vivo y12

The resolution display of 480 x 800 pixels.

For more serious damage, repair work is inevitable. Cell phone repairs can embody Go through the specs of the various vivo y12 Android Handphones and make a wise choice.

In a current research individuals had been quizzed about how they used their cellphones and importantly how they’d cope if they were not capable of have fixed entry to it. Curiously most people that took part within the survey feared they’d cope really badly with out their telephones and with out the flexibility to do things like checking e-mail, to check out youngsters or loved ones or just to name residence in the course of a weekly store to see if sure products wanted replenishing.

Greater than luxury, it’s indeed a necessity.

Damaged cases three)How does this handphone benefits me? Cracked screens Allow us to have a look into the highest 7 android handphones in the marketplace now.

Having an android handphone which fits into your life-style can be excellent! It provides you loads of comfort. It is easy to seek out the suitable mannequin for you.

Conclusion

Web access is available by means of its constructed-in HSDPA connection at a speed of 3.6 Mbps. Software updates. It has GPRS and EDGE, USB and blue tooth connectivity. It has an inner reminiscence of 256 MB with the choice to utilise additional cards and the integrated microSD card slot to extend capability if required.

The Most Ignored Fact About Modern Technology Chelmsford Revealed

Undergo the specs of the various Android Handphones and make a wise alternative. Pay as go deals are simple and are proffered by those, who don’t want to get entangled in lengthy contracts. It’s mostly taken up by students and kids. Some useful shopping for ideas.

Whether or not you realize their network or not.

In the present scenario, vivo v19 price has settled down on top of all main brands. There is a bunch of touch screen phones out there at present. But, in terms of look and performance, HTC is one of the best ones. This time, it has given you another surprise. Folks have waited for this gadget for a long sufficient. So, with the launch of the HTC HD2, the market has flourished with the greatest smartphone.

Having an android handphone which fits into your lifestyle might be excellent! It gives you loads of convenience. It is easy to seek out the proper mannequin for you. Full HTML Web browser with Google Search How can a reverse cell phone lookup assist your prank call problem? By straight tackling the issue and stopping additional prank calls.

vivo V19

Here’s the place the LG GT540 Optimus shines.

Mobiles telephones, a wire-free form of communication, are manufactured by plenty of companies and is available in completely different sizes, costs, colors and with totally different features. The cellular device comes with a battery charger, battery, and a SIM card, which is the cellular quantity given by the mobile company you select. The telephones, when it was introduced consisted of solely incoming calls, outgoing calls, and SMS or Brief Message Service, because of the stiff competition, cellular phone firms which is the quickest rising industry immediately, are introducing telephones with varied features and presents.

One can retailer as much as 2000 entries in this cellphone e-book and it will definitely please every single person who is trying to find a telephone that can enlarge the telephone e-book memory. Though the internal memory of the cellphone is simply 43 MB, there is the potential for inducing more reminiscence by using memory cards of up to sixteen GB. The real grasp piece of this telephone is in the connectivity department and it makes use of 3G connection for the first time in such a low-cost cellphone from Nokia. The 3G connection choice within the Nokia C2-01 can help obtain speeds of up to 384 kb per second, which cannot sound too good initially, but contemplating the price range of the telephone, it is almost unbeatable.

Conclusion

Other tabs are for messages from Facebook contacts, name history, and emails sent by a contact. The main function in the M8800 is a highly refined 8 Megapixel digital camera which is capable of capturing extremely high color footage at a resolution of 3264 x 2448 pixels. The size is enough for a straightforward grasp or a dunk inside and side pockets.

Know How to Look for the Best WordPress Hosting for You

If you are an individual, who has spent countless time in finding the best system for your new website, this article can help you.

Those people who have purchased domains just now are not able to find the right web hosting services, as there are numerous options in front of them today. Even there are, so many types of hosting services available in the market these days, however, Hosting Raja’s hosting is earning a lot of popularity. This is because of the alluring benefits and features offered by this hosting service to its users. Their packages will find the right niche that suits your website and help you to obtain a hassle-free hosting service. As mentioned above, there are thousands of hosting providers operating in the market today. So, it is advised to do prior research properly and find the right option that suits your needs and budget when opting for a service.

Below mentioned are some of the important aspects that you should keep in your mind when looking for WordPress hosting services:

Server requirements:

Before you choose a web hosting server it is very essential for you to clear that what exactly you required. What kind of business package is suitable for your business? There are mainly there to four types of web servers available in the market i.e. Cloud web hosting, dedicated servers, colocation servers, reseller web servers, VPS serves, Managed servers, etc. You can easily upgrade your plan according to your business requirements.

Registration and maintenance cost:

The web hosting companies offer a lot of alluring offers to their users at the time of sign up and when you make your first payment to them. At a certain point when it comes to renewing your hosting plan, they charge more than triple.  Therefore, so avoid the surprising amount it is advised to be aware of renewal charges in advance for the package or plan that you take.

As your business will grow, at a certain point you will be required dedicated or VPS hosting plans, So, after deciding all these factors you can come to the final decision.

Ability to add domains:

Only with growth, you will be able to generate more profit. Therefore, once your business or blog will start growing you will realize the need for multiple websites to extend and popularizing your business. Therefore, before you step out to choose any WordPress hosting provider, make sure to check their options to add multiple domains or just allow single web hosting account.

User interface and control panel:

Another feature that you need to investigate is the control panel and user interface of the service provider. The interface should be user-friendly. It should be in such a way so that you can easily install and setup WordPress, FTP, and emails. You should be able to customize your website the way you want.

Customer Support:

Last but none of the least thing to consider is their customer care services. There should have a solid reputation of customer support so that in case you feel inconvenience while accessing your services you can contact them. Make sure to give customer support a priority.

Who can cover these requirements?

Most of the WordPress hosting service providers operating in the market today can cover these server software requirements. But software is a small portion of web hosting. When you are opting for hosting option make sure to keep all the points mentioned above in your mind for the best experience.

How to Avoid Being Hacked

First you log in with user name and password (we’ll get to choosing smart passwords in Part 3) to your Gmail account. There should be an avatar in a circle near the upper-left hand corner of the window. Maybe it’s even a photo of you. Click on it and you’ll see “My Account.” (Incidentally, this changes every couple of years) On the new window that opens up, click on “Sign-in & security.” Click on “2-Step Verification,” then on “Get Started.” Time to enter your username and password again. Enter a phone number and click on whether you want to receive a text or a phone call. Then you magically get a text or phone call with a 6-digit verification code. Type it in and select the option to turn on 2-step verification. It’s that easy. Okay, it’s several steps, but not that hard.

It may be that you prefer to collect your Gmail with some other app, like Outlook, rather than using a browser to go to the Gmail page for your mail. If so, it may be that once you’ve turned on two-step verification, your Outlook (or other app) keeps telling you that you have the wrong password, even though you know darn well it’s right. This has happened to me. You probably need to have Google give you a specific app password that Google will generate for you. You’ll need to go to the App passwords page, which at the time of this writing is here.

Select the app you want it for (if Outlook, then you would select “Mail”), then the device you are using (Google magically presents a list of the devices you use with their services). Then select “Generate.” It will show you a 16-digit number in a yellow bar for you to use as your new password for that app (Outlook, eg) on that device (don’t enter the spaces). You can save that password in your app and you may need that number again in the future.

Yahoo!

Yahoo! is similar: sign into your account, go to the account security page, click on “two-step verification,” and toggle the button there to turn it on. Select an option to get a text or a phone call for verification. Enter the code that comes to you via text or phone call. At this point, you can create an app password, similar to the Google process above for your various apps like Outlook or Apple (iOS) Mail.

iCloud

Now, let’s set up 2FA on your iCloud account. First, you have to have a passcode set on your iPhone or iPad.

Click on the Settings app. If your device uses iOS 10.3.3, click on your name (or the name of the account you use to sign on), then on “Passwords & Security.” Did I mention that this will change as Apple keeps us on our toes by changing everything up once we’ve gotten comfortable with the previous version? In the most recent previous version, you would have clicked on Settings, and then on iCloud, then your name, then Password & Security. But I digress…

Now tap “Turn on two-factor authentication.” Be prepared to answer some security questions – which we’ll be discussing in a future article – and then enter the phone number where you want to receive the code for 2FA, and as previously, select whether you want a phone call or a text.

Macintosh

For a Mac, open System Preferences, and select iCloud, and then “Account Details.” You might have to login using your Apple credentials. As above, answer your security questions if it asks, enter the phone number where you want to receive calls or texts for verification. Once again, a magical robot instantly sends you the code and you have to enter that into the field that awaits your answer.

Once it’s turned on, you’ll get a message asking for approval if an unknown device or location signs onto your account. Note that on a Mac, that notification can sometimes be on a window that is hidden behind another, so look for that if you find you’re having troubles with getting the approval request.

Speaking of troubles, it seems like a lot of work to have two-factor authentication, but once it’s set up, it’s not too much of a pain and will add considerable safety to your accounts, as well as considerable barriers to potential hackers. So do it!

Next time, we’ll discuss passwords, passcodes, and why you shouldn’t fill out those fun questionnaires that all of your friends send you.

Next, in part three: Choosing smart passwords and secret questions (aka, giving away the form).

Norton Family Parental Control

The setup process is streamlined and straightforward, and the product works well with any OS, including Windows (XP, Vista, 7, 8/8.1, 10, and 10), Android (4 and later), and iOS (9 or later). The features of Norton Family features are all controlled from an intuitive dashboard.

The Time Supervision feature allows you to keep track of how much time your kids spend on their PCs and devices. Help them foster healthy habits by limiting the number of hours a day they can spend on each device. With Instant Lock, you can help them take breaks. Just enter the PIN to unlock the devices. However, even during lock mode, children and parents can still contact each other.

Literally everything your kids do online can be supervised with Norton Family Parental Control: texting, social media posting, web surfing, and more. Since you likely won’t have time to look over everything, you can still get a general idea of what types of content your children are consuming, as it is all sorted into broad genres like “Shopping”, “Gaming”, “Online Chat”, “News”, “Mature Content”, and so forth. The way it is setup allows you to still have an idea of what they are up to without actually spying on them, which is something some parents would feel uncomfortable doing. It allows kids to maintain some privacy.

Location Supervision keeps you informed about where they are, thanks to tools that help you to map the location of their iOS or Android devices. There is even a 30-day history showing where they have been. The location tracker can be used on both the Android and iOS versions of Norton Family.

Create a profile for each child by entering a name, birth year, gender, and avatar or profile photo. Norton simplifies things by setting up an initial configuration based on the information you specify, and you can always modify the settings.

This is just a general overview of Norton Family Parental Control. There are a lot of other great features as well, including Mobile App Supervision, Video Supervision, and Social Network Supervision.

Norton Security Deluxe

Cyber criminals and identity thieves are becoming more and more sophisticated and traditional anti-virus programs aren’t always enough. It’s essential that you have as many resources as possible when it comes to protecting your business or home from all sorts of cyber threats. The more connected you are, the more private and personal information is out there. If you are running a business, you have to keep not only your own personal data protected, but that of your customers, employees, and associates.

Get Norton Security Deluxe and have a peace of mind. It is an award-winning company that offers a solution for smartphones, PCs, and tablets regardless of the operating system. Get protection for Windows 10, previous versions of Windows, Mac, iOS, and Android.

The protection is always up-to-date to defend against all threats, including the newest. Keep in mind that if you already have a subscription with Norton for older products, the old subscription days don’t get added to the new one, so it’s best to wait until the existing one is about to expire to activate the new one.

The detection engine used to scan for and eliminate malware performs nearly perfectly in tests. This makes the Deluxe package really stand out among antivirus programs. You won’t have to worry about phishing emails and spyware either. Norton has added the ability to stop malicious changes to Registry files. It also utilizes an enhanced exploit blocker to keep potentially suspicious and unwanted applications from being installed. The firewall is easy to setup and adjust. The user can take control and set the rules.

It takes hardly any time at all for malware to infect a PC, and for cyber criminals to sneak in and start taking information. Only Norton Security Deluxe tools are designed to stop potential threats almost instantly. If you ever encounter any troubleshooting problems or have any questions, Norton offers 24/7 personalized customer service.

Logitech Computer Speakers

Logitech x-230 2.1 2-Piece Dual Drive Computer Speakers

Manufacturers Description: Crank up the audio on your PC with this 2.1-channel computer speaker system and enjoy clean, crisp, consistent sound from your games, music, and more. The Logitech X-230’s high-tech subwoofer adjusts itself dynamically to deliver distortion-free bass, while the two wall-mountable satellite speakers use Logitech’s patented FDD2 technology to eliminate the uneven sound response created by conventional dual-driver designs. The result: a clear, uniform sound field without the “hot spots” and inconsistency of other dual-driver satellites.

Features:

  • 32 watts total power (6 watts x 2, plus 20-watt subwoofer)
  • Frequency Directed Dual Driver (FDD2) satellite technology produces a uniform sound field for full, rich sound
  • Dynamic, real-time bass equalization maximizes bass response while minimizing distortion
  • Ported subwoofer design displaces more air for deeper bass
  • Headphone jack enables private listening
  • Master volume and subwoofer level controls placed for quick, convenient access
  • Satellite speaker stands rotate for easy wall-mounting

Price: $50

Value Rating: 9.5 / 10 – This computer speaker system sounds better than some speakers that are $100+ with at least 50 watts of power. It has great crisp sound at nearly all volumes and the bass is surprisingly powerful. Be aware that the subwoofer is not magnetically shielded, and should be kept away from your monitor.

Logitech X620 6.1 Computer Speakers

Manufacturers Description: More speakers means more sound, more detail, and more intensity. That’s what the Logitech X-620 6.1-channel speaker system is all about. Thanks to its 6 satellites, including a dedicated rear center speaker, you can hook it up to your PC or video game console and enjoy your games, music, and movies with sound that truly surrounds you.

Are you looking for powerful bass? Crisp highs and mid-range? The X-620 delivers. Its patented, powerful pressure-driver subwoofer provides twice the bass of conventional designs for smooth, powerful lows, and the satellite speakers provide rich midrange and crisp high-end tones. Even if you don’t have a 6.1 sound card, you can still enjoy the benefits of all seven speakers by using the source selector switch.

Got a Sony PlayStation2, Microsoft Xbox, or Nintendo GameCube? Just plug in the X-620 using the convenient video game console adapter and immerse yourself in the explosions, music, and dialogue of your favorite games.

Comes with 6 satellite speakers and a powered 8-inch subwoofer; 70 watts total system power (140 watts peak).

Price: $85

Value Rating: 9.0 / 10 – Another hit from Logitech. This one is much like more expensive home theater systems. Truely one of the best speaker systems in the growing 6.1 class. An important note: prepare to buy a pricey
Sound Blaster 6.1 Audigy sound card in order to take full advantage of this speaker system.

Logitech Z-5300e 5.1 2-Piece Surround Sound PC and Gaming Speaker System

Manufacturers Description: Demanding gamers require high power, THX performance, and true surround sound. The Logitech Z-5300e delivers on all counts, with a sleek appearance featuring silver speaker accents and removable black cloth grilles. The system includes a patented dual chamber subwoofer that pounds out twice the bass of conventional designs to deliver deep, loud, and powerful bass. The Z-5300e also features polished aluminum phase-plug satellite drivers that project superb high-end and rich mid-range tones for balanced sound, along with a full-featured SoundTouch wired remote that provides convenient controls for quick adjustments. The satellite speakers’ rotating pedestals allow for easy installation on the wall or desktop.

Features:

  • 280 watts system power (35.25 watts x 4, plus 39-watt center and 100-watt subwoofer)
  • PlayStation2, Xbox, and GameCube owners can plug in the Z-5300e using a console adapter
  • Silver speaker accents and removable black cloth grilles
  • Conveniently control volume and power with the wired remote, which also features a headphone jack
  • Enjoy twice the bass of conventional designs with patented subwoofer design
  • Satellites fit on a shelf or mounted on the wall
  • Use Matrix mode and source selector switch to create breathtaking 5.1 surround sound from stereo, 4-channel, or 5.1 sound sources

Price: $150

Value Rating: 8.0 / 10 – This system is almost too much for your average computer user – but it’s great for gamers who demand perfection in their sound system. Even though it will work with game consoles, remember that it is a computer speaker system, and works best with a pc.

Protect Passwords Properly

Do’s

  1. Use long complex passwords.
  2. Generate and use random passwords yourself.
  3. Keep your passwords in an isolated safe file. Write if you want. Even better is to spend a few bucks to have a dedicated drive, USB etc.
  4. Use limited login attempts at all the allowed institutions. It basically means after 3 or 2 or 4 (whatever the set number is) unsuccessful log in attempts, your account will be automatically disabled and you will have to go either personally or call to prove your ID and then get your account reinstated. It seems annoying in the beginning but it is a great tool to protect your ID in the long run.
  5. Answer security questions in a non traditional manner. Example; Name of the first dog. Traditional answer: whisky. Non traditional answer: Ihadnodog.
  6. Always keep the current back up out of your computer such as in a USB drive.
  7. Many experts suggest to use copy+paste rather than typing in the web forms, so follow it when you are logging in.
  8. Have a real complex master password for any file that you might be using to store and protect your sensitive information such as passwords, security questions etc.
  9. Often change your passwords. Update your record if you are managing it.
  10. Always have a working anti-virus program installed. Run the program every few days in manual mode.
  11. Delete the accounts you no longer need.

Don’ts

  1. Don’t use any online system to save and protect your data. It might be chrome or internet explorer provoking you to ‘remember’ your login information. It might be a service provider tool as Norton protection. I personally call it a third party dependency and it can restrict, corrupt or disintegrate any time. Your passwords and other information is lost without any back up in this case and worst case now all of it can be available to someone else as well..
  2. Never use same password for more than one log-in portfolio..
  3. Do not use easily guessable passwords such as: abc123, 123ABC, 0123456789, XYZ etc. Cyber crime computers attack through the internet and try thousands of password combinations in a minute. They can easily guess the easy passwords and log into your account. The damage can take a-lot to repair in this case!.
  4. Do not use a computer to generate random passwords.
  5. Do not give access to unknown apps through social media.
  6. Avoid using public computers in libraries, schools, restaurants, hotels etc. If you do have to use it, un-check the “remember me” option before you log-in and clear up everything after use such as cookies, history etc. Make sure you are allowed to clear it and you are not violating any public institution policy.

Save Money With Cheap Computers

For the average computer user you really wont need anything more that a basic computer package. You see most people use there PC to do Internet, email, word processing, and a few other basic tasks. Running these sorts of applications don’t require much computer power.

Now of days just about any new machine that you can buy will handle those sorts of tasks with ease. Even a machine for $500 or less will get the job done. Many of these sub $500 dollar PC’s even come with 1 year warranties. You cant go wrong with a deal like that!

I know many of you are probably thinking; “What if you do more then just those basic tasks?”

You should still be able to get a very affordable computer. Expect to pay up to a thousand if you would like to take on some digital pictures and video. This type of work will require bigger hard drives, more CPU power, and gobs of memory. You should be able to get a machine that can handle these tasks for $1000 and maybe even less.

Here are some specs of you should be able to get in a cheap computer system:

2GHz CPU or faster
256-512 of DDR RAM
60GB hard drive
17′ CRT Monitor
CD RW (CD burner)

Any machine that resembles the specs that you see here will get the job done for most computer users. You will need to decide what you want to do with your computer and then decide just how much computer power you will really need.

AngularJS Techniques

AngularJS is a Javascript MVC framework created by Google to build properly architectured and maintenable web applications.

AngularJS takes another approach. It attempts to minimize the impedance mismatch between document centric HTML and what an application needs by creating new HTML constructs. AngularJS teaches the browser new syntax through a construct we call directives. Examples include:

Data binding, as in {{}}.
DOM control structures for repeating, showing and hiding DOM fragments.
Support for forms and form validation.
Attaching new behavior to DOM elements, such as DOM event handling.
Grouping of HTML into reusable components.

AngularJS is a MVC framework that defines numerous concepts to properly organize our web application. Our application is defined with modules that can depend from one to the others. It enhances HTML by attaching directives to your pages with new attributes or tags and expressions in order to define very powerful templates directly in your HTML. It also encapsulates the behavior of your application in controllers which are instanciated thanks to dependency injection. Thanks to the use of dependency injection, AngularJS helps you structure and test your Javascript code very easily. Finally, utility code can easily be factorized into services that can be injected in your controllers. Now let’s have a closer look at all those features.

Feature 1: Two Way Data-Binding

Think of your model as the single-source-of-truth for your application. Your model is where you go to to read or update anything in your application.

Data-binding is probably the coolest and most useful feature in AngularJS. It will save you from writing a considerable amount of boilerplate code. A typical web application may contain up to 80% of its code base, dedicated to traversing, manipulating, and listening to the DOM. Data-binding makes this code disappear, so we can focus on our application.

Think of your model as the single-source-of-truth for your application. Your model is where you go to to read or update anything in your application. The data-binding directives provide a projection of your model to the application view. This projection is seamless, and occurs without any effort from you.

Traditionally, when the model changes, the developer is responsible for manually manipulating the DOM elements and attributes to reflect these changes. This is a two-way street. In one direction, the model changes drive change in DOM elements. In the other, DOM element changes necessitate changes in the model. This is further complicated by user interaction, since the developer is then responsible for interpreting the interactions, merging them into a model, and updating the view. This is a very manual and cumbersome process, which becomes difficult to control, as an application grows in size and complexity.

There must be a better way! AngularJS’ two-way data-binding handles the synchronization between the DOM and the model, and vice versa.

Here is a simple example, which demonstrates how to bind an input value to an

element.

Name:

Enter a name here

Hello, {{yourName}}!

This is extremely simple to set up, and almost magical…

Feature 2: Templates

It’s important to realize that at no point does AngularJS manipulate the template as strings. It’s all the browser DOM.

In AngularJS, a template is just plain-old-HTML. The HTML vocabulary is extended, to contain instructions on how the model should be projected into the view.

The HTML templates are parsed by the browser into the DOM. The DOM then becomes the input to the AngularJS compiler. AngularJS traverses the DOM template for rendering instructions, which are called directives. Collectively, the directives are responsible for setting up the data-binding for your application view.

It is important to realize that at no point does AngularJS manipulate the template as strings. The input to AngularJS is browser DOM and not an HTML string. The data-bindings are DOM transformations, not string concatenations or inner HTML changes. Using the DOM as the input, rather than strings, is the biggest differentiation AngularJS has from its sibling frameworks. Using the DOM is what allows you to extend the directive vocabulary and build your own directives, or even abstract them into reusable components!

One of the greatest advantages to this approach is that it creates a tight workflow between designers and developers. Designers can mark up their HTML as they normally would, and then developers take the baton and hook in functionality, via bindings with very little effort.

Here is an example where I am using the ng-repeat directive to loop over the images array and populate what is essentially an img template.

function AlbumCtrl($scope) {
scope.images = [
{“thumbnail”:”img/image_01.png”, “description”:”Image 01 description”},
{“thumbnail”:”img/image_02.png”, “description”:”Image 02 description”},
{“thumbnail”:”img/image_03.png”, “description”:”Image 03 description”},
{“thumbnail”:”img/image_04.png”, “description”:”Image 04 description”},
{“thumbnail”:”img/image_05.png”, “description”:”Image 05 description”}
];
}

{{image.description}}

It is also worth mentioning, as a side note, that AngularJS does not force you to learn a new syntax or extract your templates from your application.

Feature 3: MVC

AngularJS incorporates the basic principles behind the original MVC software design pattern into how it builds client-side web applications.

The MVC or Model-View-Controller pattern means a lot of different things to different people. AngularJS does not implement MVC in the traditional sense, but rather something closer to MVVM (Model-View-ViewModel).

The Model

The model is simply the data in the application. The model is just plain old JavaScript objects. There is no need to inherit from framework classes, wrap it in proxy objects, or use special getter/setter methods to access it. The fact that we are dealing with vanilla JavaScript is a really nice feature, which cuts down on the application boilerplate.

The ViewModel
A viewmodel is an object that provides specific data and methods to maintain specific views.

The viewmodel is the $scope object that lives within the AngularJS application. $scope is just a simple JavaScript object with a small API designed to detect and broadcast changes to its state.

The Controller
The controller is responsible for setting initial state and augmenting $scope with methods to control behavior. It is worth noting that the controller does not store state and does not interact with remote services.

The View
The view is the HTML that exists after AngularJS has parsed and compiled the HTML to include rendered markup and bindings.

This division creates a solid foundation to architect your application. The $scope has a reference to the data, the controller defines behavior, and the view handles the layout and handing off interaction to the controller to respond accordingly.

Feature 4: Dependency Injection

AngularJS has a built-in dependency injection subsystem that helps the developer by making the application easier to develop, understand, and test.

Dependency Injection (DI) allows you to ask for your dependencies, rather than having to go look for them or make them yourself. Think of it as a way of saying “Hey I need X’, and the DI is responsible for creating and providing it for you.

To gain access to core AngularJS services, it is simply a matter of adding that service as a parameter; AngularJS will detect that you need that service and provide an instance for you.

function EditCtrl($scope, $location, $routeParams) {
// Something clever here…
}
You are also able to define your own custom services and make those available for injection as well.

angular.
module(‘MyServiceModule’, []).
factory(‘notify’, [‘$window’, function (win) {
return function (msg) {
win.alert(msg);
};
}]);

function myController(scope, notifyService) {
scope.callNotify = function (msg) {
notifyService(msg);
};
}

myController.$inject = [‘$scope’, ‘notify’];

Feature 5: Directives

Directives are my personal favorite feature of AngularJS. Have you ever wished that your browser would do new tricks for you? Well, now it can! This is one of my favorite parts of AngularJS. It is also probably the most challenging aspect of AngularJS.

Directives can be used to create custom HTML tags that serve as new, custom widgets. They can also be used to “decorate” elements with behavior and manipulate DOM attributes in interesting ways.

Here is a simple example of a directive that listens for an event and updates its $scope, accordingly.

myModule.directive(‘myComponent’, function(mySharedService) {
return {
restrict: ‘E’,
controller: function($scope, $attrs, mySharedService) {
$scope.$on(‘handleBroadcast’, function() {
$scope.message = ‘Directive: ‘ + mySharedService.message;
});
},
replace: true,
template: ‘

};
});

Then, you can use this custom directive, like so.

Creating your application as a composition of discrete components makes it incredibly easy to add, update or delete functionality as needed.

we will discuss here about how to set up AngularJS library to be used in web application development. We will also briefly study the directory structure and its contents.

When you open the link https://angularjs.org/, you will see there are two options to download AngularJS library –

AngularJS Download
View on GitHub – Click on this button to go to GitHub and get all of the latest scripts.

Download AngularJS 1 – Or click on this button, a screen as below would be seen –

AngularJS Download
This screen gives various options of using Angular JS as follows –

Downloading and hosting files locally

There are two different options legacy and latest. The names itself are self descriptive. legacy has version less than 1.2.x and latest has 1.5.x version.

We can also go with the minified, uncompressed or zipped version.

CDN access – You also have access to a CDN. The CDN will give you access around the world to regional data centers that in this case, Google host. This means using CDN moves the responsibility of hosting files from your own servers to a series of external ones. This also offers an advantage that if the visitor to your webpage has already downloaded a copy of AngularJS from the same CDN, it won’t have to be re-downloaded.

Try the new angularJS 2 – Click on this button to download Angular JS beta 2 version.This version is very fast, mobile supported and flexible compare to legacy and

latest of AngularJS 1

We are using the CDN versions of the library throughout this tutorial.

Example
Now let us write a simple example using AngularJS library. Let us create an HTML file myfirstexample.HTML as below –

Welcome {{helloTo.title}} to the world of Tutorialspoint!

Following sections describe the above code in detail –

Include AngularJS

We have included the AngularJS JavaScript file in the HTML page so we can use AngularJS –

If you want to update into latest version of Angular JS, use the following script source or else Check the latest version of AngularJS on their official website. Point to AngularJS app Next we tell what part of the HTML contains the AngularJS app. This done by adding the ng-app attribute to the root HTML element of the AngularJS app. You can either add it to HTML element or body element as shown below –

View
The view is this part –

Welcome {{helloTo.title}} to the world of Tutorialspoint!

ng-controller tells AngularJS what controller to use with this view. helloTo.title tells AngularJS to write the “model” value named helloTo.title to the HTML at this
location.

Controller
The controller part is –

This code registers a controller function named HelloController in the angular module named myapp. We will study more about modules and controllers in their respective chapters. The controller function is registered in angular via the angular.module(… ).controller(… ) function call.

The $scope parameter passed to the controller function is the model. The controller function adds a helloTo JavaScript object, and in that object it adds a title field.

Execution
Save the above code as myfirstexample.HTML and open it in any browser. You will see an output as below –

Welcome AngularJS to the world of Tutorialspoint!
When the page is loaded in the browser, following things happen –

HTML document is loaded into the browser, and evaluated by the browser. AngularJS JavaScript file is loaded, the angular global object is created. Next, JavaScript which registers controller functions is executed.

Next AngularJS scans through the HTML to look for AngularJS apps and views. Once view is located, it connects that view to the corresponding controller function.

Next, AngularJS executes the controller functions. It then renders the views with data from the model populated by the controller. The page is now ready.