SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Raspberry Pi
Technology
WHAT IS RASPBERRY PI ???
•The Raspberry Pi is a series of credit card–
sized single board computers developed in
the UK by the Raspberry Pi Foundation with the
intention of promoting the teaching of
basic computer science in schools.
RASPBERRY PI BOARD A
Ethernet
Port
Dual USB 2.0 Ports
HDMI OUT
MicroUSB Power
Port
SD Card Slot
RCA Video Out
Audio Out
Broadcom
700MHz Chip
USES OF RASPBERRY PI BOARD
Actually there are many uses of it but some of it are:
1. A gaming Console can be made
2. Raspberry Pi smart phone
3. Pi laptop
4. Pi Electronic calendar
5. Weather Forecaster
And many more things….
MORE FACTS TO KNOW ABOUT
RASPBERRY PI
• The original Raspberry Pi is based on the Broadcom BCM2835 system on a chip
• The Raspberry Pi primarily uses Linux-kernel-based operating systems.
• Most popular “WhatsApp” can also be run through Raspberry Pi created
smartphone.
• The Raspberry Pi does not come with a real-time clock, which means it cannot keep
track of the time of day while it is not powered on.
• On the older beta model B boards, 128 MB was allocated by default to the GPU,
leaving 128 MB for the CPU. On the first 256 MB release model B (and model A),
three different splits were possible.
“THE GREATEST ACHIEVEMENT OF HUMANITY IS NOT
ITS WORKS OF ART, SCIENCE, OR TECHNOLOGY, BUT
THE RECOGNITION OF ITS OWN DYSFUNCTION.”
THANK YOU!!! VERY MUCH…
- Het Shah
9th C

Weitere ähnliche Inhalte

Was ist angesagt?

Raspberry pi 3
Raspberry pi 3Raspberry pi 3
Raspberry pi 3Vipin V
 
Raspberry pi technology
Raspberry pi technologyRaspberry pi technology
Raspberry pi technologyZeeshan Aslam
 
Project-make a public website server using raspberry pi
Project-make a public website server using raspberry piProject-make a public website server using raspberry pi
Project-make a public website server using raspberry piFahim Hossain
 
Raspberry Pi Technology
Raspberry Pi TechnologyRaspberry Pi Technology
Raspberry Pi TechnologyRavi Basil
 
Presentation on Raspberry pi
Presentation on Raspberry piPresentation on Raspberry pi
Presentation on Raspberry piOpenDev
 
Seminar Presentation on raspberry pi
Seminar Presentation on raspberry piSeminar Presentation on raspberry pi
Seminar Presentation on raspberry piGeorgekutty Francis
 
Raspberry Pi Pdf File
Raspberry Pi Pdf FileRaspberry Pi Pdf File
Raspberry Pi Pdf FileRobomart
 
Delivering your message with a slice of Pi
Delivering your message with a slice of PiDelivering your message with a slice of Pi
Delivering your message with a slice of PiDaniel Messer
 
Simple Presentation On Raspberry pi
Simple Presentation On Raspberry piSimple Presentation On Raspberry pi
Simple Presentation On Raspberry piSakkar Chowdhury
 

Was ist angesagt? (19)

Raspberry pi 3
Raspberry pi 3Raspberry pi 3
Raspberry pi 3
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
 
Raspberry pi
Raspberry pi Raspberry pi
Raspberry pi
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Raspberry pi technology
Raspberry pi technologyRaspberry pi technology
Raspberry pi technology
 
Rasberry pi
 Rasberry pi Rasberry pi
Rasberry pi
 
Project-make a public website server using raspberry pi
Project-make a public website server using raspberry piProject-make a public website server using raspberry pi
Project-make a public website server using raspberry pi
 
Raspberry Pi Technology
Raspberry Pi TechnologyRaspberry Pi Technology
Raspberry Pi Technology
 
Rasp berry Pi
Rasp berry PiRasp berry Pi
Rasp berry Pi
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
 
ThinkerersA01
ThinkerersA01ThinkerersA01
ThinkerersA01
 
Presentation on Raspberry pi
Presentation on Raspberry piPresentation on Raspberry pi
Presentation on Raspberry pi
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
 
Raspberry pi
Raspberry pi Raspberry pi
Raspberry pi
 
Seminar Presentation on raspberry pi
Seminar Presentation on raspberry piSeminar Presentation on raspberry pi
Seminar Presentation on raspberry pi
 
Raspberry Pi Pdf File
Raspberry Pi Pdf FileRaspberry Pi Pdf File
Raspberry Pi Pdf File
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Delivering your message with a slice of Pi
Delivering your message with a slice of PiDelivering your message with a slice of Pi
Delivering your message with a slice of Pi
 
Simple Presentation On Raspberry pi
Simple Presentation On Raspberry piSimple Presentation On Raspberry pi
Simple Presentation On Raspberry pi
 

Andere mochten auch

Ucs rbac aaa-backu-ps
Ucs rbac aaa-backu-psUcs rbac aaa-backu-ps
Ucs rbac aaa-backu-psKrunal Shah
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityMphasis
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
 
Role based access control - RBAC
Role based access control - RBACRole based access control - RBAC
Role based access control - RBACAjit Dadresa
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Access Control: Principles and Practice
Access Control: Principles and PracticeAccess Control: Principles and Practice
Access Control: Principles and PracticeNabeel Yoosuf
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 

Andere mochten auch (19)

Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Ucs rbac aaa-backu-ps
Ucs rbac aaa-backu-psUcs rbac aaa-backu-ps
Ucs rbac aaa-backu-ps
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 
Raspberry Pi
 Raspberry Pi  Raspberry Pi
Raspberry Pi
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentiality
 
Role Based Access Control - Overview
Role Based Access Control - OverviewRole Based Access Control - Overview
Role Based Access Control - Overview
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
 
Role based access control - RBAC
Role based access control - RBACRole based access control - RBAC
Role based access control - RBAC
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Access Control: Principles and Practice
Access Control: Principles and PracticeAccess Control: Principles and Practice
Access Control: Principles and Practice
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie Raspberry pi

Raspberrypi best ppt
Raspberrypi best ppt Raspberrypi best ppt
Raspberrypi best ppt SOMRAJ GAUTAM
 
raspberrypi-130930053532-phpapp02.pdf
raspberrypi-130930053532-phpapp02.pdfraspberrypi-130930053532-phpapp02.pdf
raspberrypi-130930053532-phpapp02.pdfVedantSonawane16
 
02-Introduction-to-RPi.pdf
02-Introduction-to-RPi.pdf02-Introduction-to-RPi.pdf
02-Introduction-to-RPi.pdfGrego M.
 
2_RaspberryPi presentation.pptx
2_RaspberryPi presentation.pptx2_RaspberryPi presentation.pptx
2_RaspberryPi presentation.pptxneelamsanjeevkumar
 
Raspberry Pi training in Ludhiana
Raspberry Pi training in LudhianaRaspberry Pi training in Ludhiana
Raspberry Pi training in LudhianaE2MATRIX
 
Raspberry Pi Training in Mohali
Raspberry Pi Training in MohaliRaspberry Pi Training in Mohali
Raspberry Pi Training in MohaliE2MATRIX
 
Raspberry Pi Training in Chandigarh
Raspberry Pi Training in ChandigarhRaspberry Pi Training in Chandigarh
Raspberry Pi Training in ChandigarhE2MATRIX
 
Raspberry Pi Training in Phagwara
Raspberry Pi Training in PhagwaraRaspberry Pi Training in Phagwara
Raspberry Pi Training in PhagwaraE2MATRIX
 
Raspberry Pi Training in Amritsar
Raspberry Pi Training in AmritsarRaspberry Pi Training in Amritsar
Raspberry Pi Training in AmritsarE2MATRIX
 
Raspberry Pi Training in Jalandhar
Raspberry Pi Training in JalandharRaspberry Pi Training in Jalandhar
Raspberry Pi Training in JalandharE2MATRIX
 
Raspberry-PI introduction
Raspberry-PI introductionRaspberry-PI introduction
Raspberry-PI introductionBasavaraj Sagar
 
Introductory raspberrypi Presentation upload.pptx
Introductory raspberrypi Presentation upload.pptxIntroductory raspberrypi Presentation upload.pptx
Introductory raspberrypi Presentation upload.pptxabdullah888715
 
INTRODUCTION TO RASPI
INTRODUCTION TO RASPIINTRODUCTION TO RASPI
INTRODUCTION TO RASPIskumartarget
 

Ähnlich wie Raspberry pi (20)

Raspberrypi best ppt
Raspberrypi best ppt Raspberrypi best ppt
Raspberrypi best ppt
 
raspberrypi-130930053532-phpapp02.pdf
raspberrypi-130930053532-phpapp02.pdfraspberrypi-130930053532-phpapp02.pdf
raspberrypi-130930053532-phpapp02.pdf
 
02-Introduction-to-RPi.pdf
02-Introduction-to-RPi.pdf02-Introduction-to-RPi.pdf
02-Introduction-to-RPi.pdf
 
2_RaspberryPi presentation.pptx
2_RaspberryPi presentation.pptx2_RaspberryPi presentation.pptx
2_RaspberryPi presentation.pptx
 
Raspberry Pi training in Ludhiana
Raspberry Pi training in LudhianaRaspberry Pi training in Ludhiana
Raspberry Pi training in Ludhiana
 
Raspberry Pi Training in Mohali
Raspberry Pi Training in MohaliRaspberry Pi Training in Mohali
Raspberry Pi Training in Mohali
 
Raspberry Pi Training in Chandigarh
Raspberry Pi Training in ChandigarhRaspberry Pi Training in Chandigarh
Raspberry Pi Training in Chandigarh
 
Raspberry Pi Training in Phagwara
Raspberry Pi Training in PhagwaraRaspberry Pi Training in Phagwara
Raspberry Pi Training in Phagwara
 
Raspberry Pi Training in Amritsar
Raspberry Pi Training in AmritsarRaspberry Pi Training in Amritsar
Raspberry Pi Training in Amritsar
 
Raspberry Pi Training in Jalandhar
Raspberry Pi Training in JalandharRaspberry Pi Training in Jalandhar
Raspberry Pi Training in Jalandhar
 
Raspberry Pi Technology
Raspberry Pi Technology Raspberry Pi Technology
Raspberry Pi Technology
 
Raspberry PI
Raspberry PIRaspberry PI
Raspberry PI
 
Maker printouts
Maker printoutsMaker printouts
Maker printouts
 
Raspberry-PI introduction
Raspberry-PI introductionRaspberry-PI introduction
Raspberry-PI introduction
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
 
Introduction to Raspberry PI
Introduction to Raspberry PIIntroduction to Raspberry PI
Introduction to Raspberry PI
 
Raspberry pi basics
Raspberry pi  basicsRaspberry pi  basics
Raspberry pi basics
 
Introductory raspberrypi Presentation upload.pptx
Introductory raspberrypi Presentation upload.pptxIntroductory raspberrypi Presentation upload.pptx
Introductory raspberrypi Presentation upload.pptx
 
INTRODUCTION TO RASPI
INTRODUCTION TO RASPIINTRODUCTION TO RASPI
INTRODUCTION TO RASPI
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Raspberry pi

  • 2. WHAT IS RASPBERRY PI ??? •The Raspberry Pi is a series of credit card– sized single board computers developed in the UK by the Raspberry Pi Foundation with the intention of promoting the teaching of basic computer science in schools.
  • 3. RASPBERRY PI BOARD A Ethernet Port Dual USB 2.0 Ports HDMI OUT MicroUSB Power Port SD Card Slot RCA Video Out Audio Out Broadcom 700MHz Chip
  • 4. USES OF RASPBERRY PI BOARD Actually there are many uses of it but some of it are: 1. A gaming Console can be made 2. Raspberry Pi smart phone 3. Pi laptop 4. Pi Electronic calendar 5. Weather Forecaster And many more things….
  • 5. MORE FACTS TO KNOW ABOUT RASPBERRY PI • The original Raspberry Pi is based on the Broadcom BCM2835 system on a chip • The Raspberry Pi primarily uses Linux-kernel-based operating systems. • Most popular “WhatsApp” can also be run through Raspberry Pi created smartphone. • The Raspberry Pi does not come with a real-time clock, which means it cannot keep track of the time of day while it is not powered on. • On the older beta model B boards, 128 MB was allocated by default to the GPU, leaving 128 MB for the CPU. On the first 256 MB release model B (and model A), three different splits were possible.
  • 6. “THE GREATEST ACHIEVEMENT OF HUMANITY IS NOT ITS WORKS OF ART, SCIENCE, OR TECHNOLOGY, BUT THE RECOGNITION OF ITS OWN DYSFUNCTION.” THANK YOU!!! VERY MUCH… - Het Shah 9th C