Skip to main content

Nokia C5 Information

Nokia C5 introduces a smartphone running Symbian S60, with the now classic looks, a thickness of 12 millimeters and the same modest resources. Novelty is equipped with a 2.2 "screen with 320x240 resolution and 3-megapixel camera. There is a good set, consisting of a connector microUSB, 3.5-mm headphone jacks and support A-GPS.'s Own memory in the phone 50 megabytes, the complex includes a card capacity of 2 gigabytes. The company focuses on the social nature of the phone, mention the application to work with Facebook, Google Talk, OVI cards with free voice navigation. Capacity Battery Nokia C5 is low - 1050 mAh, and the whole apparatus looks like a light with 90 grams of weight and size 112h46h12 mm. Sales can be expected in the second quarter of this year in two colors slightly different with each other - white and gray. Expected price - 7000 rubles.




Features Nokia C5:

  • Mobile networks GSM / EDGE (850/900/1800/ 1900 MHz) and WCDMA / HSDPA / HSUPA (900/2100 MHz)
  • Software platform S60 3rd Edition


  • 2.2-inch display with QVGA (320 x 240 pixels), 16,7 M colors
  • 3.2 megapixel camera with LED flash
  • Supports A-GPS
  • FM radio
  • Bluetooth 2.0, USB 2.0, 3,5 mm jack for headphones
  • 50 MB internal memory
  • Slot for memory cards format microSD (up to 16 GB)
  • Battery Nokia Battery BL-5CT 1050 mAh


  • Time running conversation - up to 12 hours (GSM), up to 4.9 hours (WCDMA)
  • Hours in standby mode - up to 630 hours (GSM), up to 670 hours (WCDMA)
  • Dimensions - 112h46h12, 3 mm
  • Weight - 89.3 grams



    Milind Audichya ( IT Professionalist )
    +919913188848

Comments

Popular posts from this blog

Quiz 1 : Mobile Application Development - Android

Download PDF Version From Here   MCQ 1. Select a component which is NOT part of Android architecture. a. Android framework   b. Libraries          c. Linux kernel   d. Android document 2. What is AAPT? a. Android Asset Processing Tool.             b. Android Asset Providing Tool.   c. Android Asset Packaging Tool.             d. Android Asset Packaging Technique 3. Required folder when Android project is created. a. build                 b. build/               c. bin     d. bin/ 4. Adb stands for   A. Android Drive Bridge.                  ...

IP Delivery Concept

It is the practice of using the IP, the network address of the connecting computer, whether robot or human, and sending different content based on that. The database used to assist with the process. In the case of geo-targeting: Databases stores various ranges of IP addresses, and indicates where this ranges of IPs are in the world. A geo-targeting script scans the list to see in which country the current IP is located. Programmer can use this value to effect changes in presentation or logic. In the case of cloaking : Databases stores the IP addresses of the various spiders that may hit your site. The cloaking script scans the list to see if the current IP is a spider. The programmer can use this information to effect changes in presentation or logic. Implementations of IP-delivery-based cloaking also look at the User-Agent header of the request. The user agent header is a header sent by both browsers and spiders. But it is not regarded authoritative, bec...

Computer problems : Some Information and Knowledge Base

Computer problems are not new to a person with a regular PC at home or at work. Problems can range from simple problems such as frozen screens and the dungeons of the main issues to work as falling food and hard disk crash. A long list of computer problems are bound to occur, some of which can be easily eliminated by turning off the computer and clicking Restart. However, there are other serious issues that can not be solved without the help of an experienced or a professional. If you find a problem like this, you can always consider calling the IT professional to get their problem solved, but just before placing callers you would do well to analyze all common computer problems and see if they can solve the problem itself. In situations that require professional intervention, such as a virus attack, it would be prudent to take a back seat of your system and to appeal to professionals. Contrary to the thinking of many people where computers are considered magical machinery, computer...