24 Dec 2013

Cloud Computing


What is Cloud Computing?

  • Cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.
  • In science, cloud computing is a synonym for distributed computing over a network, and means the ability to run a program or application on many connected computers at the same time.
  • The phrase also more commonly refers to network-based services, which appear to be provided by real server hardware, and are in fact served up by virtual hardware, simulated by software running on one or more real machines. Such virtual servers do not physically exist and can therefore be moved around and scaled up (or down) on the fly without affecting the end user - arguably, rather like a cloud.

Why it is Chosen as A Subject in MCA?

In October 2007, the Academic Cloud Computing Initiative (ACCI) was announced as a multi-university project designed to enhance students' technical knowledge to address the challenges of cloud computing.
  • To provide an understanding of the basic concepts of parallel and distributed computing and their role in Cloud Computing.
  • To study the concept of Virtualization and relevant technologies available in the market.
  • To  understand the importance of Cloud computing for higher throughput.
  • To make aware about availability of various Cloud platforms. 
  • To study different application of Cloud and Cloud management techniques.

For More Information Click On This Video....

Applications of Cloud Computing.

Today cloud computing covers anything that involves delivering hosted services over the internet.
These services are generally divided into three categories:
  • Infrastructure-as-a-Service (IaaS),
  • Platform-as-a-Service (PaaS)
  • Software-as-a-Service (SaaS). 
  • Everything-as-a-Software(EaaS). 
Cloud Computing is the result of evolution and adoption of existing technologies and paradigms. The goal of cloud computing is to allow users to take benefit from all of these technologies, without the need for deep knowledge about or expertise with each one of them. The cloud aims to cut costs, and help the users focus on their core business instead of being impeded by IT obstacles.

Cloud computing shares characteristics with:
  • Client–server model.
  • Grid computing.
  • Mainframe computer.
  • Utility computing.
  • Peer-to-peer Networking.
  • Cloud gaming.
 

After Completing This Subject You are able to...

  • Understand the role of thread and process in distributed and parallel processing and can aware about the transformation of a stand alone or web based application from distributed  and/or parallel to Cloud application.
  • Understand the  principals of Cloud computing.
  • Ability to understand the concepts of virtualization.
  • Gain an exposure about Amazon Simple Work Flow Service for Java.
  • Aware about various services provided by Cloud Computing (SaaS, IaaS, HaaS etc…).
  • Gain an exposure about  various Cloud platforms available in the IT market.

15 Dec 2013

Why Computer Graphics is Selected as a Subject?

“Computer Graphics is the use of a computer to define, store, manipulate, interrogate and present pictorial output”.

Learning Objectives

  1. The objective of the course is to enable the students to:
  2. Gain basic understanding of the underlying theory of graphics display.
  3. Develop basic algorithms for the applications of Computer Graphics.
  4. Explore and apply graphics algorithms and primitives using the OpenGL language.

Computer graphics broadly studies the manipulation of visual and geometric information using computational techniques. A broad classification of major subfields in computer graphics might be: 
  • Geometry : studies ways to represent and process surfaces.
  • Animation : studies with ways to represent and manipulate motion.
  • Rendering : studies algorithms to reproduce light transport.
  • Imaging     : studies image acquisition or image editing.

Applications of CG

  • Computer Aided Design (CAD)
  • Computer Aided Geometric Design (CAGD)
  • Entertainment (animation, games,) ™
  • Geographic Information Systems (GIS)
  • Visualization (Scientific Vis., Inform. Vis.)
  • Medical Visualization

After Completing if Used as a Main Subject and Developed Skills then

                   Computer graphics designers will be in high demand amid a rise in the use of portable electronic and communications devices and electronic media. The BLS (Bureau of Labor Statistics) expects the number of jobs to grow by 61 percent from 2010 to 2020, which is much higher than the average for all occupations. Jobs for computer systems design companies will see the fastest growth rate, while computer graphics designer jobs in the advertising industry will be on the lower end of the scale.

                   According to May 2011 data from the Bureau of Labor Statistics, a computer graphics designer earns a mean annual salary of $48,690. The median salary is $44,010 per year or $21.16 per hour. The lowest 10 percent of earners make about $26,210 per year, while the top 10 percent earn $77,370 on average.


17 Oct 2013

General Information About Cracking.....

Cracking:-

Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software.


 usually related to protection methods:
  • copy protection,
  • protection against the manipulation of software
  • trial/demo version,
  • serial number,
  • hardware key,
  • date checks,
  • CD check

                          The distribution and use of cracked copies is illegal in most countries. There have been varities over cracking software.The most common software crack is the modification of an application's binary to cause or prevent a specific key branch in the program's execution.
                       This is accomplished by reverse engineering the compiled program code using a debugger such as SoftICE, OllyDbg, GDB, or MacsBug until the software cracker reaches the subroutine that contains the primary method of protecting the software or by disassembling an executable file with a program such as IDA.
                          The binary is then modified using the debugger or a hex editor or monitor in a manner that replaces a prior branching opcode(operation Code) with its complement or a NOP opcode so the key branch will either always execute a specific subroutine or skip over it.
                            Almost all common software cracks are a variation of this type. Proprietary software developers are constantly developing techniques such as code obfuscation, encryption, and self-modifying code to make this modification increasingly difficult.
                                     Even with these measures being taken, developers struggle to combat software cracking. This is because it is very common for a professional to publicly release a simple cracked EXE or Retrium Installer for public download, eliminating the need for inexperienced users to crack the software themselves.
                                A specific example of this technique is a crack that removes the expiration period from a time-limited trial of an application. These cracks are usually programs that patch the program executable and sometimes the .dll or .so linked to the application.
                           Similar cracks are available for software that requires a hardware dongle. A company can also break the copy protection of programs that they have legally purchased but that are licensed to particular hardware, so that there is no risk of downtime due to hardware failure.
Another method is the use of special software such as CloneCD to scan for the use of a commercial copy protection application. After discovering the software used to protect the application, another tool may be used to remove the copy protection from the software on the CD or DVD.
This may enable another program such as
  • Alcohol 120%,
  • CloneDVD,
  • Game Jackal,
  •  Daemon Tools to copy the protected software to a user's hard disk.
                           Popular commercial copy protection applications which may be scanned for include SafeDisc and StarForce.In other cases, it might be possible to decompile a program in order to get access to the original source code or code on a level higher than machine code. This is often possible with scripting languages and languages utilizing JIT compilation.
                                      An example is cracking (or debugging) on the .NET platform where one might consider manipulating CIL to achieve one's needs. Java's bytecode also works in a similar fashion in which there is an intermediate language before the program is compiled to run on the platform dependent machine code.
                                          Advanced reverse engineering for protections such as SecuROM, SafeDisc or StarForce requires a cracker, or many crackers to spend much time studying the protection, eventually finding every flaw within the protection code, and then coding their own tools to "unwrap" the protection automatically from executable (.EXE) and library (.DLL) files.
                                          There are a number of sites on the Internet that let users download cracks for popular games and applications. Although these cracks are used by legal buyers of software, they can also be used by people who have downloaded or otherwise obtained pirated software.

17 Sept 2013

how to create executable jar file of java...

Step 1: Locate the Jar utility in the JDK folder
  • Before you do anything else, make sure that you have jdk installed on your computer. You also will need to know the directory to the jdk. Specifically, you will need the path to the Jar utility that is inside your jdk folder. My path to jar is:
·          C:\"Program Files"\Java\jdk1.6.0_02\bin\jar
    • As you can probably tell, I'm using Java 1.6 and within the 'bin' folder is jar which is the program that you will use to make jar files. Basically typing that line up above tells the command prompt that we're going to run the jar utility which is located in the folder C:\"Program Files"\Java\jdk1.6.0_02\bin
    • On your own computer, the path to the jar utility will probably look similar, it depends on where you installed the jdk to.
Step 2: Create themanifest file
Since you could potentially be compiling many files into one jar file, Java needs to know which one will have the main method. Our example is a bit more trivial since we're just compiling one class into a Jar. Nonetheless, the way that Java knows which of classes has the main method is from a single line in what's known as a manifest file. A manifest file can be a text file made with notepad. I called my manifest file manifest.txt, my manifest file says:
Main-Class: JarDemo


Use the command prompt to navigate to where the JarDemo.class and manifest.txt file are saved and type :


C:\>  C:\Path\to\jdk\bin\jar cvfm jarDemoCompiled.jar manifest.txt JarDemo.class
If you don't like always typing out the generally long path to the jdk. You can set the path as follows

    c:> path c:\path\to\jdk\bin;%path%

Doing so would allow you to type

C:\>  jar cvfm jarDemoCompiled.jar manifest.txt JarDemo.class

When I don't usde the shortcut on my computer, I must type:

C:\>  C:\"Program Files"\Java\jdk1.6.0_02\bin\jar cvfm jarDemoCompiled.jar manifest.txt JarDemo.class

cvfm means "create a jar; show verbose output; specify the output jar file name (jarDemoCompiled.jar); specify the manifest file name(manifest.txt) and use the file JarDemo.class to create the jar
  

16 Sept 2013

A Look Over Keyboard History and Generation.

           Input devices are hardware components that enable users to interact with a computer. Without input devices, we cant feed instructions to a computer. There are lots of possible input devices, but the two most common are a Keyboard and Mouse.

INVENTION OF KEYBOARD 

           The invention of the modern computer keyboard began with the invention of the Typewriter. Christopher Latham Sholes patente the typewriter that we commonly use today in 1868. The Remington Company mass marketed the first typewriters starting in 1877.

KEYBOARD LAYOUT  

              The keyboard is one of the most popular ways of inputting information into a computer. It is fast and accurate device.  A keyboard layout is the arrangement of the array of key across the keyboard. There are so many different types of keyboard but one keyboard layout is very familiar that layout  is “QWERTY”.

QWERTY Keyboard :

                Q,W,E,R,T,Y  is the first six latters of the top row of the alphabets of the QWERTY layout. The arrangement of QWERTYLayout was given by Sholes, the inventor of the typewriter. Besides the standard alphabet keys having the QWERTY arrangement, computer keyboards also consist of the control keys, the function keys, the numerical keys etc.


PC83-key keyboards:

            The PC 83-key was the earliest keyboard offered by IBM with its first Personal Computer.This had 83 keys. The PC/XT keyboard had many of the same features as a standard typewriter at the time, with various changes such as including the 10 function key.

84-key keyboards:

                         Later IBM added one more key with its PC AT computer keyboard to make it 84-key keyboard in the 1980s. It had 84 keys arranged in three distinct groups, with letters and commonly used keys like the Space bar occupying the center, a set of function keys to the left, and a number pad on the right. The AT keyboard used a round 5-pin connector and an electrical signaling scheme that outlived the keyboards themselves. Today, these types of keyboards are generally only used in aging legacy hardware setups and historical displays.

101-key Keyboard:

                           In 1986, IBM introduced the IBM PC/AT Model 339. Included in this last AT-family system was the new Enhanced 101-key keyboard. Little did IBM realize at the time, perhaps, but this 101-key keyboard would become the de-facto standard for keyboards for the next decade and beyond. Even today's Windows keyboards and fancy variants with extra buttons and keys are based on this layout.

108-key Keyboard:

                     A 108-key keyboard that can be connected to any computer with a PS/2 or AT keyboard connector. This is advanced model of the keyboard. This keyboard have more functionality of multimedia key which is designed at the top of keyboard.

The Dvorak Simplified Keyboard:

                  There are a number of different arrangements of alphabetic, numeric, and punctuation symbols on keys. These different Keyboard Layout arise mainly because different people need easy access to different symbols, either because they are inputting text in different languages, or because they need a specialized layout for mathematics, accounting, Computer Programming or other purpose.

NEW GENERATION KEYBOARD

Foldable Keyboard -

                           Fold able (also called flexible) keyboards are made of soft plastic or Silicon which can be rolled or folded on itself for travel. When in use, these keyboards can conform to uneven surfaces, and are more resistant to liquids than standard keyboards. These can also be connected to portable devices and smartphones. Some models can be fully immersed in water, making them popular in hospitals and laboratories, as they can be disinfected. 

Projection Keyboard -

                          Projection Keyboards project an image of keys, usually with a laser, onto a flat surface. The device then uses a camera or infrared sensor to "watch" where the user's fingers move, and will count a key as being pressed when it "sees" the user's finger touch the projected image. Projection keyboards can simulate a full size keyboard from a very small projector. Because the "keys" are simply projected images, they cannot be felt when pressed. Users of projected keyboards often experience increased discomfort in their fingertips because of the lack of "give" when typing. A flat, non-reflective surface is also required for the keys to be projected. Most projection keyboards are made for use with PDA and smartphones due to their small form factor.

Various Mobile Operating Systems....

Various Mobile Operating Systems:-

                                          There are So many types of Operating Systems available in Mobile Markets. Some are Expensive, Some are Free, Some are Chargeable, and some are Costly. In This Post we take a look and get knowledge of these operating Systems.

  1. Android:-

  2. Android (AN-droyd) is a Linux-based operating system designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Initially developed by Android, Inc., which Google backed financially and later bought in 2005, Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. The first Android-powered phone was sold in October 2008.

    Android is open source and Google releases the code under the Apache License. This open-source code and permissive licensing allows the software to be freely modified and distributed by device manufacturers, wireless carriers and enthusiast developers. Additionally, Android has a large community of developers writing applications ("apps") that extend the functionality of devices, written primarily in a customized version of the Java programming language. In October 2012, there were approximately 1,000,000 apps available for Android, and the estimated number of applications downloaded from Google Play, Android's primary app store, was 50 billion as of Sep 2013. A developer survey conducted in April–May 2013 found that Android is the most popular platform for developers, used by 71% of the mobile developer population.

  3. Symbian
  4. Symbian was a mobile operating system (OS) and computing platform designed for smartphones and currently maintained by Accenture. Symbian was originally developed by Symbian Ltd. as a descendant of Psion's EPOC and runs exclusively on ARM processors, although an unreleased x86 port existed. The current form of Symbian is an open-source platform developed by Symbian Foundation in 2009, as the successor of the original Symbian OS. Symbian was used by many major mobile phone brands, like Samsung, Motorola, Sony Ericsson, and above all by Nokia. It was the most popular smartphone OS on a worldwide average until the end of 2010, when it was overtaken by Android. Symbian rose to fame from its use with the S60 platform built by Nokia, first released in 2002 and powering most Nokia smartphones. UIQ, another Symbian platform, ran in parallel, but these two platforms were not compatible with each other. Symbian was officially released in 4 2010 as the successor of S60 and UIQ, first used in the Nokia N8, to use a single platform for the OS. In May 2011 an update, Symbian Anna, was officially announced, followed by Nokia Belle (previously Symbian Belle) in August 2011.

  5. Windows OS
  6. Windows Mobile is a family of mobile operating systems developed by Microsoft for smartphones and Pocket PCs. Windows Mobile is the predecessor of Windows Phone. In February 2010, Microsoft announced Windows Phone to supersede Windows Mobile. As a result, Windows Mobile has been deprecated. Windows Phone is incompatible with Windows Mobile devices and software. The last version of Windows Mobile, released after the announcement of Windows Phone, was 6.5.5. Most versions of Windows Mobile have a set of standard features, such as multitasking and the ability to navigate a file system similar to that of Windows 9x and Windows NT, with support for many of the same file types. Much like its desktop counterpart, it comes bundled with a set of applications to perform basic tasks. Internet Explorer Mobile is the default web browser and Windows Media Player is the default media player used for playing digital media. Microsoft Office Mobile, the mobile versions of Microsoft Office, is the default office suite.

  7. BlackBerry
  8. BlackBerry OS is a proprietary mobile operating system developed by BlackBerry Ltd for its BlackBerry line of smartphone handheld devices. The operating system provides multitasking and supports specialized input devices that have been adopted by BlackBerry Ltd. for use in its handhelds, particularly the trackwheel, trackball, and most recently, the trackpad and touchscreen. The BlackBerry platform is perhaps best known for its native support for corporate email, through MIDP 1.0 and, more recently, a subset of MIDP 2.0, which allows complete wireless activation and synchronization with Microsoft Exchange, Lotus Domino, or Novell GroupWise email, calendar, tasks, notes, and contacts, when used with BlackBerry Enterprise Server. The operating system also supports WAP 1.2. Updates to the operating system may be automatically available from wireless carriers that support the BlackBerry over the air software loading (OTASL) service. Third-party developers can write software using the available BlackBerry API classes, although applications that make use of certain functionality must be digitally signed. 

  9. iOS
  10. iOS (previously iPhone OS) is a mobile operating system developed and distributed by Apple Inc. Originally unveiled in 2007 for the iPhone, it has been extended to support other Apple devices such as the iPod Touch (September 2007), iPad (January 2010), iPad Mini (November 2012) and second-generation Apple TV (September 2010). Unlike Microsoft's Windows Phone and Google's Android, Apple does not license iOS for installation on non-Apple hardware. As of August 2013, Apple's App Store contained more than 900,000 iOS applications, 375,000 of which were optimised for iPad. These apps have collectively been downloaded more than 50 billion times. It had a 21% share of the smartphone mobile operating system units shipped in the fourth quarter of 2012, behind only Google's Android. In June 2012, it accounted for 65% of mobile web data consumption (including use on both the iPod Touch and the iPad). At the half of 2012, there were 410 million devices activated.[10] According to the special media event held by Apple on September 12, 2012, 400 million devices had been sold by June 2012. The user interface of iOS is based on the concept of direct manipulation, using multi-touch gestures. Interface control elements consist of sliders, switches, and buttons. Interaction with the OS includes gestures such as swipe, tap, pinch, and reverse pinch, all of which have specific definitions within the context of the iOS operating system and its multi-touch interface. Internal accelerometers are used by some applications to respond to shaking the device (one common result is the undo command) or rotating it in three dimensions (one common result is switching from portrait to landscape mode.

5 Sept 2013

Linux - Install on Windows 7 Virtual Machine using VirtualBox

Microsoft Virtual PC is my choice to run Windows virtual machines. However, installing Linux on Virtual PC is not something I would recommend. Main reason is the lack of integration elements; Virtual PC integration components are designed to run well on XP, Vista and 7 virtual machines. For Linux, Virtual PC does not (at least at this moment) offer any integration components.

VirtualBox integration components are called Guest Additions. They install and run well also in any Linux distro. That's why I recommended creating Linux virtual machines in VirtualBox.

I am using Ubuntu 10.10 to make this tutorial. At the moment it is the most Windows like Linux distro available, a safe bet for a beginner to start experimenting Linux.

For more advanced Linux users I recommend using Novell SUSE 11.3 which is a commercial Linux distribution, free to test, or its free counterpart OpenSUSE 11.3. The setup procedure in VirtualBox is exactly the same.


Microsoft Virtual PC, Oracle VirtualBox and VMware Player are at the moment the best free virtualization applications. All have their pros and cons, I'm not going to put them in any order here. Let's just say I'm using Microsoft Virtual PC for all my XP and Vista virtual machines, and VirtualBox for older Windows and Linux machines.

You can download these virtualization applications here:
Microsoft: Virtual PC
Oracle: VirtualBox
VMware: WMware Player


Part 1: Create a new virtual machine for Ubuntu

  •     Launch VirtualBox
  •     Click New
  •     This opens New Virtual Machine Wizard. Click Next:
  •     Give your new virtual machine a name, choose the right OS and version. These are automatically selected if VirtualBox can determine it from the name you gave. Click Next:
  •     Set the amount of RAM you want to assign to Ubuntu. For running a Linux vm (virtual machine), 512 MB is enough. You can assign as much as you want to, maximum being about 512 MB less of your host computer's RAM. Keep in mind though that RAM used by a running vm is away from the RAM Windows can use; assigning more RAM can make your vm run faster and better but at the same time make your Windows crawl so slowly even the vm halts. My recommendation is always leave at least 2 GB for Windows, or if you have under 4 GB of RAM only give maximum of 1 GB to a vm. Click Next:
  •     .VirtualBox asks now if you want to create a new vhd (virtual hard disk), or use existing vhd. Choose Create new and click Next:
  •     New Virtual Disk Wizard starts. Click Next: .
  •     Click Next to accept Dynamically expanding storage:
  •     Dynamically expanding vhd means that although the guest consideres the HD being the size given (max value), host Windows only uses as much space on HD as is actually needed; a 20 GB dynamic vhd where only 4 GB is used is seen by Windows host as a 4 GB vhd file, not as a 20 GB file, but the guest OS sees the same vhd file as a 20 GB hard disk with 16 GB free. I recommend 8 to 12 GB for Ubuntu.
  •     You can now accept the default location where VirtualBox offers to save the vhd, or change the location by clicking the small folder symbol. Default save folders are Your_Username\.VirtualBox (Virtual Box 3.2 and older) or Your_Username\VirtualBox VMs (from version 4 Beta). You can also change the original size of vhd here. Click Next:
  •     Click Finish to end New Virtual Disk Wizard:
  •     Click Finish to end New Virtual Machine Wizard:
  •     Now choose the virtual machine you just created and click Settings:
  •     Choose Storage from the left pane, CD/DVD from under the title IDE controller, and click the small CD symbol on the right:
  •     Now you need to tell VirtualBox which install media you want to use. You can assign any of the host system's CD/DVD drives to vm , or an ISO image to act as a CD/DVD drive. For now, you want to use the Ubuntu ISO you downloaded earlier. Browse to its location, choose it and click Open:
  •     Now choose Display from the left pane, assign the maximum 128 MB video RAM to virtual machine's emulated video card:
  •     Next you need to setup network controller. Click Network on the left pane, choose Enable Network Adapter, choose Bridged Adapter, and choose your host computer's network adapter from drop down list:
  •     Click OK to save edited settings:

 Part 2: Install Ubuntu on a virtual machine
  •     Choose Ubuntu vm, click Start:
  •     When vm starts, it shows you the first screen of Ubuntu setup. Choose the language you want from over 60 languages, or wait 30 seconds for English to be selected:
  •     Ubuntu starts now in so called Live Mode. Double click Install Ubuntu icon:
  •     Once again, choose your installation language:
  •     Choose Download updates while installing. You might also want to install Fluendo MP3 plugin offered for better audio features. Click Forward:
  •     Choose Erase and use the entire disk. Notice please, we are now talking about the virtual hard disk we created earlier, not the actual hd on your host computer. In other words, this does not mean your HD with Windows on it will be erased Click Forward:
  •     Click Install Now:
  •     Choose your time zone:
  •     Choose your preferred keyboard layout. To avoid confusion, I recommend choosing the same you are using on your host computer's Windows. Click Forward:
  •     Tell Ubuntu your name, choose the computer name and set up a password. Click Forward:
  •     Installation starts, you have now some 20+ minutes for a coffee break, or you can watch a presentation about Ubuntu by clicking those arrow symbols on left and right:
  •     When installation is finished, you have to unmount (deattach) Ubuntu ISO image before reboot. Before clicking Restart Now, Open Devices menu from vm window, click CD/DVD devices, choose Unmount CD/DVD Device.
  •     Click Restart Now:
  •       When Ubuntu has booted, click your username to open a password prompt. Type your password, click Log In:
  •     To fully integrate Ubuntu vm to your Windows 7 desktop, to allow networking and for instance cross platform copy & paste, you need to install VirtualBox Guest Additions. Click Devices menu, choose Install Guest Additions:
  •     If the CD/DVD icon appears on the desktop, right click it and choose Open With Autorun Prompt:
  •     If the CD/DVD icon does not appear on desktop (happens sometimes), open Ubuntu's Places menu, and choose VBOXADDITIONS. Choose then Open Autorun Prompt from VBOXADDITIONS window:
  •     Choose Run to start Guest Additions setup:
  •     You must now enter the administrative password. It is the same you chose for your account, so enter it now:
  •     When Guest Additions are set up, you must press Return (Enter) to close the window:
  •     Restart Ubuntu:
  •     After reboot, you are ready to go

2 Sept 2013

Operating System Subject's IMP Questions..

Operating System Subject's Some Important Questions..


  • Why is MBR registers required?
  • Why are interrupts needed? List the limitation of Sequential interrupt processing.
  • Briefly compare all in board memory.
  • Define Virtual memory. Briefly explain all levels of system structure.
  • Define DMA. Briefly explain steps involve in Simple Interrupt Processing.
  • Explain the key elements of an Operating System for Multiprogramming with figure.
  •  List the objective of time sharing system and multiprogramming system.
  • Briefly explain Block/Suspend->Block, Ready->Ready/Suspend states of process.
  • List two events/reasons lead to the termination and suspension of a process?
  • Why are two modes (user and kernel) needed?
  • What is the difference between a mode switch and a process switch?
  • For what types of entities does the OS maintain tables of information for management purposes?
  • Explain the difference between a monolithic kernel and a microkernel.
  • Briefly explain SMP with figure. List two advantages and disadvantages of ULTs over KLTs.
  • What is I/O Management? Write a short note on UNIX SVR4 Process Management.
  • Define Thread. What resources are typically shared by all of the threads of a process?
  • Define Process. What do you mean by pure user-level thread? What are the two separate the potentially independent characteristics embodied in the concept of process?
  • When and how the short-term, medium-term and long-term scheduling policies are applied? Draw the queuing diagram for scheduling.
  • Explain the resident set management policies for virtual memory. Explain how it affects the degree of multiprogramming.
  • Define virtual memory. Compare LRU, FIFO and Clock page replacement policies with suitable example.
  • What is paging? Explain the logical to physical address translation mechanism with example.
  • What is Monitor? Explain the solution to the Bounded-Buffer
  • Producer/Consumer Problem using a Monitor.
  • What is Translation Lookaside Buffer? Explain the Paging with the use of TLB.
  • What role the main memory cache plays with the Virtual Memory Management using TLB?
  • Discuss the use of Invert Page Table in paging technique. How physical address is generated in it?
  • What is deadlock? State necessary conditions for deadlock to occur. Explain
  • banker’s algorithm for deadlock avoidance.
  • Define the term. Dispatcher.
  • What is Process Spawning.
  • List out three general categories of PCB information.
  • List out which process states works in virtual memory and which one in primary memory.
  • Write down the full form of PSW, JCL.
  • Differentiate between mode switching and process switching.
  • Define main categories of processor registers and list out the registers in each category.
  • What is interrupt handler routine?
  • What is hit ratio?
  • Explain the issues and resolution for Cash Design.
  • Explain time sharing system with basic example.
  • Write short note on Process Control Structures.
  • Explain process state transition with one and two suspended states.
  • Compare the Resident set management.
  • Briefly explain the Address translation in a paging system.
Courtasy:-
AITS and MEFGI MidTerm Papers.

30 Aug 2013

Structured Object Oriented Analysis and Design Methodology(Sooadm) Exam related Important Questions...

Sooadm Exam related Important Questions...


  •    What is HCI? Explain in details.
  •    Explain Types of System.
  •    What is the role of system analyst?
  •     How much time required for create new systems and other activities and How many times it required  to develop a new system.
  •     What is an upper case tool?
  •     What is the benefit of e-commerce and website.
  •     Explain First Phase of SDLC.
  •     Explain GDSS with Example.
  •     Explain TPS with Examples.
  •     Explain SAP with details.
  •     Explain Interviewing.
  •     Explain Decision Trees with Example.
  •     Explain Data Dictionary.
  •     Explain Normalization.
  •     Explain Rules for designing a website.
  •     Explain Aggregation with examples.
  •     What is constraints?
  •     Explain Packages.
  •     Explain interaction diagram.
  •     Explain nested state with examples.
  •     Explain MYCIN with examples.
  •     Explain First Phase of SDLC.
  •     Explain GDSS with Example.
  •     What is a lower case tool?
  •     Explain DFD diagram Symbols.
  •     What is the benefit of e-commerce and website.
  •     What is Primitive Process?
  •     Explain Event Table?
  •     What is the benefit of partitioning DFD?
  •     Define the following terms : Scaling, Metadata, Block Sequence Code.
  •     State and explain the different types of user interfaces.
  •     Define the following terms : Aggregation, Tagged Value, Realization.
  •     “UML is a language” – justify the statement. Also, explain the building
  •     blocks of UML.
  •     Define the following terms : Derived Element, Events, Qualifier.
  •     What do you mean by nested state ? How are they organized ?
  •     Explain concurrency of states within a state diagram.
  •     State and explain how presentations of output are unintentionally biased.
  •     What are the ways the analyst can avoid biasing output ?
  •     Explain the common architectural styles applied for system design.
  •     Explain various stages of System Development Life Cycle.
  •     Explain decision tables and decision trees with suitable example.
  •     Write short note on: Guidelines for designing Dialogs.
  •     What is a Data Warehouse? State any six differences between datawarehouse and traditional databases.
  •     Explain general guidelines for designing Web Sites.
  •     Explain Object Oriented Themes.
  •     Explain Object Oriented Software development process stages.
  •     State the different ways to use class diagrams to model static design view of a system.
  •     State the common steps for modeling workflows in UML using activity
  •     diagrams.
  •     Write algorithm using Structured English for a process which generates first five multiples of the user entered number.
  •     What is the purpose, properties, contents and common uses of Use Case
  •     diagrams? Explain in detail.
  •     Explain points to be considered during dialog design.
  •     List and explain different data entry methods.
  •     How will you validate input data? Describe different validation.
Courtasy:-
GTU Papers and AITS Modal question Papers.

26 Aug 2013

System Software Subject's Questions...

Some System Software Subject's Questions are...........




  • What is system software?
  • What is Language Processor?How expansion time variables are useful in Macro Definition?
    Explain with example:
  • What do you understand by system programming? Explain different types of system
    software in brief.
  • Discuss the lexical analysis & syntax analysis phase of a compiler.
  •  Explain synthesis phase of a compiler.
  • Write advantages of block structured language. Explain allocation and access of local
    and non-local variable for a block structured language.
  • Explain the overlay technique.
  • Explain bottom up parsing.
  • Discuss the problem of deletion of entries in the sequential search organization.
  • Discuss the problems encountered during the single pass assembly.
  • List the extension of all the files generated during the processing of assembly
    language program. Clearly describe the difference between them.
  • Show the importance of strategy routine in device driver.
  • State the main features of block device driver.
  • How expansion time variables are useful in Macro Definition?
    Explain with example.
  • Discuss briefly the phases in the compilation process.
  • Discuss various addressing modes with example.
  • Discuss functionality and processing of re-entrant procedures.
  • Discuss functionality of a linker.
  • Discuss symbol-table management techniques used with assembler and compilers.
  • Discuss concept of macros. How are they expanded and what data structures are needed in processing macros?
  • Discuss using proper block diagram the relationship between a device, a controller, a bus and memory. Show the role of a device driver in this scenario.
  • Demonstrate the functionality of assembler taking an example of a small program to find
    greater of two integers written in 8085 assembly.
  • Demonstrate using block-diagram the usage of complier, linker and loader in the process of making and running executable program from a source program in C program.
  • Demonstrate the interface of C and assembly language programs. Show how they are
    complied/assembled and made to run and what roles are played by each of the complier and the assembler.
  • Using the file system and the device driver, construct a complete picture as to how an operating system can perform the read/write operations on behalf of the application program.
  • Explain in brief Search and Allocation data structures. Write a note on Hash
    table organization.
  • State the list of registers of Execution unit in 8088 Processor. Explain any three.
  • Write a short note on Debug Monitor. 
  • Why an Allocation Data Structure used? How the memory areas are allocated
    and deallocated by various types of allocation data structure.
  • Write a short note on Editor.
  • Describe the architecture of 8088 microprocessor in detail. 
  • What do you mean by forward reference? How single pass assembler take
    care of forward reference?
  • Explain non-relocatable, relocatable and self-relocating programs.
  • Define programming language grammar.
  • Explain the design and operation of an interpreter. 
  • Differentiate between search data structure and allocation data structure.
  •  What is the function of loader? Define an absolute loader.
  • Discuss the points to be taken care while designing a macro preprocessor.
  •  What is the importance of user interface in system software development?
  • Explain the facilities provided by Debug monitors. 
  • Which grammar is suited for programming language specification? Define it.
  • What is parsing? What are the basic problems faced by the Top-down parser?
    Explain in brief.
  • Differentiate top-down parsing and bottom-up parsing.
  • Differentiate between static memory allocation and dynamic memory
    allocation.
  • Differentiate between search data structure and allocation data structure.
  • difference between Derivation and Reduction.
  • Differentiate following terms:
    1. Translation and Linking .
    2. Low –level language and High –level language. 

Courtesy :-

GTU and GU exam papers.

25 Aug 2013

Java Questions For Exams...

Some Java Questions....

  • What is JAVA?
  • Explain The Features of JAVA.
  • How many types of Modifiers are in Java? Explain Each.
  • How many type of Classes available in Java? Explain any two with example.
  • How many data types are available in Java? Explain all Wrapper class for that data type.
  • What is abstract class? Explain with example.
  • What is object class? Explain with example.
  • Class defined in Java without using extends keyword having parent(super) class.Explain Why?
  • It is not compulsory to import java.lang package in Java source file.Explain Why?
  • Define checked and unchecked exception.
  • Discuss instance of operator in brief.
  • Define Words : Final, Finally, Finalize, Super, enum, Synchronized, Variable Shadowing, Package, Import.
  • What is bytecode? How it generates?
  • Diffrence between:-
  • Public - Protected.
  • Abstract class - Object class.
  • character stream - byte stream.
  • Abstract class - Interface.
  • Catch - Finally.
  • Applet - Form.
  • A method in Interface is always abstract. Why? 
  • When no constructor defined in class then also object of such class can be created. Why?
  •  
  • Abstract and final can not be used together. Justify.
  • List any two AWT components.
  • What is use of import statement?
  • Differentiate throw and throws.
  • Discuss Piped streams in brief.
  • What is meta-annotation.
  • What is Inheritence? List types of inheritence.
  • Explain Thread Life Cycle.
  • Explain Applet Life Cycle.
  • How File handling works in java. List any three operations on file and explain it.
  • Explain Framework. What do you mean by an Applet?
  • What is the difference between "==" operator and equals() method of Object class?
  • Explain the difference between Comparable and the Comparator interfaces.
  • Write a short note on the role of Pattern and Matcher class for handling
  • regular expression with example.
  • Define anonymous class.
  • Explain the functionality of ItemEvent and TextEvent with example.


Courtesy :-
GTU Final Exam Papers.

29 Jul 2013

The Books For Learning Java...

The Books for Learning Java......

Java Logo

Java Introduction:- 
Java is a general-purpose, concurrent, class-based, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another. Java applications are typically compiled to byte code (class file) that can run on any Java virtual machine (JVM) regardless of computer architecture. Java is, as of 2013, one of the most popular programming languages in use, particularly for client-server web applications, with a reported 10 million users. Java was originally developed by James Gosling at Sun Microsystems (which has since merged into Oracle Corporation) and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++, but it has fewer low-level facilities than either of them.

(1)Java Programming Language Handbook By David H. Friedel and Anthony Potts:-

The basics Note is very helpful for the students which are new in this field. This book is sequentially managed from start to end. The normal student can easily understand the writings of this book.

Click here to Download this Book

(2) Core Java:- 

The Core Java Subject is the main aim of this book. This PDF Contains Fundamentals, Boot Strapping, Basic Language Syntax, Common caveat, Coding Conviction. This Book is very useful while Exam is on the head and you are a simple collage boy who never reads.

Click here To Download This Book 

(3) Introduction To Java :-

This Slideshow Contains all the major topics of JAVA. This Slideshow is very helpful when you are one day ago from exam. This is written very smoothly and understandable topics make it easy to learn. Anyone can learn basics of Java from this slideshow.

Click here for Download This Book

23 Jul 2013

Various Programming Languages



PHP Programming

PHP Programming is developed in 1995. PHP is a widely used server-side general-purpose scripting language designed for web development. PHP is now installed on more than 244 million websites and 2.1 million web servers. PHP allows developing dynamic web applications. This is an open-source, interpretive, cross-platform web language that can be embedded into HTML pages. PHP is available for most operating systems including Unix and Windows, and is an excellent server-side programming language for professional web development.

C++ Programming 

C++ Programming started in 1983. It is a statically typed, free-form, multi-paradigm, compiled, object oriented, general-purpose programming language. It is regarded as an intermediate-level language, as it comprises a combination of both high-level and low-level language features. C++ is one of the most popular programming languages implemented on many hardware and operating system platforms. As an efficient compiler to native code, its application domains include systems software, application software, device drivers, embedded software, high-performance server and client applications, and entertainment software such as video games.

JavaScript

JavaScript (JS) was developed in 1995. JS is an interpreted computer programming language originally implemented as part of web browsers so that client-side scripts could interact with the user, control the browser, alter the document content that was displayed. JavaScript is a prototype-based scripting language that is dynamic, weakly typed, and has first-class functions. Its syntax was influenced by the language C. JavaScript copies many names and naming conventions from Java, but the two languages are otherwise unrelated and have very different semantics. Embedded into HTML, used in millions of dynamic web pages to validate forms, create cookies, detect browsers and improve the design. JavaScript that is implemented as a part of a web browser to provide enhanced user interfaces. JavaScript use in applications outside of web pages (PDF docs, desktop widgets, etc) also makes up its popularity.

C# Programming

C# Programming was developed in 2000. Multi-paradigm, structured, imperative, object-oriented, event-driven, functional, generic, reflective, concurrent programming language developed by Microsoft. C# is intended to be a simple, modern, general-purpose, object-oriented programming language. The most recent version of the language is 4.0 which was released in 2010. C# is suitable for writing applications for both hosted and embedded systems, ranging from the very large that use sophisticated operating systems, down to the very small having dedicated functions.

JAVA Programming 

JAVA Programming was developed in 1995. JAVA is a general-purpose, concurrent, class-based, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible. Object-oriented, structured, imperative, generic, reflective. This is a programming language and computing platform with the underlying technology that powers state-of-the-art programs including utilities, games, and business applications. Java has proved its usefulness for thousands of applications long before the rise of native mobile apps. It’s one of the most flexible programming languages, useful in most operating systems. If building desktop-based apps and/or Android mobile apps will be your niche, then Java the best programming language for that purpose.

19 Jul 2013

Uses of Microsoft Office....

 Uses Of Microsoft Office:-


   The main Use of Microsoft office is to make work very shorten to the world and make it very realistic.This can be happen by knowing few commands and characteristics of Microsoft office.

MS Word:-
This tool is used to generate or create the documentations, reports, instant documents, and documents that have lots of written lines. This tool is used as a job work or the printing machine tool because some can make money through this tool by typing the pages and printing out them.

MS Excel:- 
This tool is used to create office documents, statistical or numerical analysis and getting some type of calculation over the numbers which are used as an input to the cell. The pages of excel is called as a spread sheet because it is made by the combination of cells of rows and columns. This spreadsheet have multiple cells so we can make the statistical formula and have the proper results. Mainly used for getting figures for the office related expenses and incomes.

 MS PowerPoint:-
This tool is used to make presentation for any analysis done by the analyst. This tool presents the slide show of the documents and make it easy to understand. This tool is very useful when we have to present our ideas in a meeting or in a seminar. This tool allows the user to make charts, diagrams, slide show effects, transition effects, animation etc. This tool helps the presenter to make most of his/her presentation sufficient to understand to anyone through its graphics.

MS Access:-
This Tool helps to create database to store values and data for the uses of future analysis.  This tool make the database which is collection of tables which are created by rows and columns. This is an sufficient tool for saving lots of word pages in one database or table. It provides the data security and the most useful feature is that, this tool can be made as a back-end application or data server to any application we make or program. This tool works as a data filler in most of applications.

MS Outlook:-
This Tool is used to save the emails and reply to those emails. This tool helps to make the email security and also made easy mail receiving and sending to others. This Tool saves the email contacts and provides o computer's contact manager to store them. We can easily find out contacts which are over Internet in our computer. This tool is important to those who's work is international and those who needs the daily update of their work via Internet or emails.

Comments

© 2013-2016 ITTechnocrates. All rights resevered. Developed by Bhavya Mehta