it archiveit archive file> beauty is truth's smile when she beholds her own face in a...
TRANSCRIPT
1
IT ARCHIVEIT ARCHIVEIT ARCHIVEIT ARCHIVE
Executive Committee
Chief PatronChief PatronChief PatronChief Patron : Thiru. A .Venkatachalam B.Sc.,
PatronPatronPatronPatron : Dr. N. Raman M.B.A., M.Com., M.Phil., B.Ed., PGDCA., Ph.D.,
Editor in ChiefEditor in ChiefEditor in ChiefEditor in Chief : Prof. D. Gayathri Devi M.C.A., M.Phil.
Staff AdvisorStaff AdvisorStaff AdvisorStaff Advisor
Mr. S. Vijayakumar M.C.A., M.Phil.,
Assistant Professor, Department of M.C.A.,
Staff EditorStaff EditorStaff EditorStaff Editor
Mrs. D. Gayathri Devi M.C.A., M.Phil.,
Professor& Head of the Department of M.C.A.,
OOOOrganizing Membersrganizing Membersrganizing Membersrganizing Members
Mr.Raffic Raja.R III-MCA Mr.Raj Kumar .D III-MCA Mr. Jagadeesh.M II-MCA. Mr. Karthikeyan.S II-MCA. Mr. Ramesh.L II-MCA. Mr. Arunkumar.G II-MCA. Mr. Vinoth II-MCA. Ms. Premalatha.K II-MCA. Ms. Poovizhi Selvi.C II-MCA. Mr. Senthil.V II-MCA.
Words by Rabindranath Tagore
> Beauty is truth's smile when she beholds her own face in a perfect mirror. > Don't limit a child to your own learning, for he was born in another time. > If you shut the door to all errors, truth will be shut out.
NAVIGATOR
VOL-25
Decision Support System 3
Linux Focus 10
Technologies
- Quantum cryptography 16
Intellect Explore 20
Career Objectives 22
Windows 8 24
Company Profile 27
Tips and Tricks 29
2
ACKNOWLEDGEMENT
We wish to thank Thiru. A .Venkatachalam B.Sc., Correspondent, Kongu Arts and Science
College, Erode and our Management for the support to publish the magazine. Dr. N. Raman
M.B.A., M.Com., M.Phil., B.Ed., PGDCA., Ph.D., Principal, Kongu Arts and Science College,
has provided considerable support to us during this effort. We proudly thank our Chief Editor,
Staff Advisor, Staff Editor, Staff members and the Students of Department of M.C.A for their
guidance and suggestions to complete the magazine.
3
DECISION SUPPORT SYSTEM
What is Decision Support System?
A Decision Support System (DSS) is a
collection of integrated software
applications and hardware that form the
backbone of an organization’s decision
making process. Companies across all
industries rely on decision support tools,
techniques, and models to help them assess
and resolve everyday business questions.
The decision support system is data-driven,
as the entire process feeds off of the
collection and availability of data to analyze.
Business Intelligence (BI) reporting tools,
processes, and methodologies are key
components to any decision support system
and provide end users with rich reporting,
monitoring, and data analysis.
History of Decision Support
Systems:
In the 1970s DSS was described as
"a computer based system to aid decision
making". Late 1970s the DSS movement
started focusing on "interactive computer-
based systems which help decision-makers
utilize data bases and models to solve ill-
structured problems".
In the 1980s DSS should provide systems
"using suitable and available technology to
improve effectiveness of managerial and
professional activities", and end 1980s DSS
faced a new challenge towards the design of
intelligent workstations.
Beginning in about 1990, data warehousing
and on-line analytical processing (OLAP)
began broadening the realm of DSS. As the
turn of the millennium approached, new
Web-based analytical applications were
introduced.
THE STRUCTURE OF
DECISIONS
Structured Decisions
A structured decision is one in which
all three components can be fairly well
specified, i.e., the data, process, and
evaluation are determined. Usually
structured decisions are made regularly and
therefore it makes sense to place a
comparatively rigid framework around the
decision and the people making it. An
example of this type of decision may be the
routine credit-granting decision made by
4
many businesses. It is probably the case that
most firms collect rather similar sets of data
for credit granting decision makers to use.
Unstructured Decisions
These decisions have the same
components as structured ones; however,
there is little agreement on their nature. For
instance, with these types of decisions, each
decision maker may use different data and
processes to reach a conclusion. In addition,
because of the nature of the decision there
may also be few people that are even
qualified to evaluate the decision. These
types of decisions are generally the domain
of experts in a given field
Semi-Structured Decisions
In the middle of the continuum are
semi-structured decisions, and this is where
most of what are considered to be true
decision support systems are focused.
Decisions of this type are characterized as
having some agreement on the data, process,
and/or evaluation to be used, but there is still
a desire not to place too much structure on
the decision and to let some human
judgment be used. An initial step in
analyzing which support system is required
is to understand where the limitations of the
decision maker may be manifested, i.e., will
it be in the data acquisition portion, or in the
process component, or possibly in the
evaluation of outcomes.
Components of a Decision Support
System:
Decision making, becoming a more and
more important and crucial aspect at every
step of the functioning of an organization.
The Decision Support System comprises
four major components, namely
• The user interface
• The database management systems
or DBMS
• Models and analytical tools
constituting a model based
management systems
• or MBMS and lastly the DSS
architecture and network.
Types of Decision Support Systems:
• Model-driven DSS
• Communication-driven DSS
• Data-driven DSS
• Document-driven DSS
5
• Knowledge-driven DSS
Model-driven DSS :
This type of DSS uses data and
parameters provided by users to assist
decision makers in analyzing a situation.
Parameters are provided by users for the
analysis of a situation.
Communication-driven DSS :
It supports more collaboration on a
shared task. Examples include integrated
tools like Microsoft's NetMeeting or
Groove.
Data-driven DSS :
It emphasizes manipulation of a
chronological series of corporate internal
data or occasionally, external data.
Document-driven DSS :
It manages and manipulates
unstructured information in from a variety of
electronic formats.
Knowledge-driven DSS :
It provides specialized problem
solving expertise stored as facts,
rules,procedures, or in similar structures.
Decision Making as a Component of Problem Solving
6
High-level Decision Support System
Requirements:
• Data collection from multiple
sources
• Data formatting and collation
• A suitable database location and
format built for decision support
based reporting and analysis
• Robust tools and applications to
report, monitor, and analyze the data
• Decision support systems have
become critical and ubiquitous
across all types of business. In
today’s global marketplace, it is
imperative that companies respond
quickly to market changes.
Companies with comprehensive
decision support systems have a
significant competitive advantage.
Applications
A specific example concerns the
Canadian National Railway system, which
tests its equipment on a regular basis using a
decision support system. A problem faced
by any railroad is worn-out or defective
rails, which can result in hundreds of
derailments per year. Under a DSS, CN
managed to decrease the incidence of
derailments at the same time other
companies were experiencing an increase.
A growing area of DSS application,
concepts, principles, and techniques is in
agricultural production, marketing for
sustainable development. For example, the
DSSAT4 package,[15][16] developed
through financial support of USAID during
the 80's and 90's, has allowed rapid
assessment of several agricultural
production systems around the world to
facilitate decision-making at the farm and
policy levels. There are, however, many
constraints to the successful adoption on
DSS in agriculture.
Decision Support Systems used by
people today
• Cow Culling
• Decision Net at Carnegie Mellon
University
• Tire Selector at Goodyear
• Redbrick Software
• Quest in Action
7
Why use a DSS
• Managers need to make decisions
from the knowledge available.
• DSS help to facilitate this need by
formatting data into forms.
• Enhances a manager’s ability to
work with one or more kinds of
knowledge.
Advantages of Decision Support
System
• Enhance effectiveness
• Improves personal efficiency
• Time saving
• Increase decision maker
satisfaction
• Speed up the process of decision
making
• Increases organizational control
• Encourages exploration and
discovery on the part of the
decision maker
• Speeds up problem solving in an
organization
• Facilitates interpersonal
communication
• Promotes learning or training
• Generates new evidence in
support of a decision
• Creates a competitive advantage
over competition
• Reveals new approaches to
thinking about the problem space
• Helps automate managerial
processes
Disadvantages of Decision Support
System
• Monetary cost is hike.
• Overemphasize decision process and
decision making.
• Assumption of relevance.
• Transfer of power from man to
machine.
• Unanticipated effects may overload
decision makers.
• Obscuring responsibility of the users
of decision support system.
• False belief in objectivity.
• Status reduction.
• Information overload.
Development Frameworks
DSS systems are not entirely
different from other systems and require a
structured approach. Such a framework
8
includes people, technology, and the
development approach
DSS technology levels (of hardware
and software) may include:
The actual application that will be
used by the user. This is the part of the
application that allows the decision maker to
make decisions in a particular problem area.
The user can act upon that particular
problem.
Generator contains hardware
/software environment that allows people to
easily develop specific DSS applications.
This level makes use of case tools or
systems such as Crystal, AIMMS, and
iThink.
Tools include lower level
hardware/software. DSS generators
including special languages, function
libraries and linking modules
An iterative developmental approach
allows for the DSS to be changed and
redesigned at various intervals. Once the
system is designed, it will need to be tested
and revised for the desired outcome.
DSS Key characteristics and
capabilities are:
• Supports decision makers in
semistructured and unstructured
problems.
• Supports managers at all levels.
• Supports individuals and groups.
• Supports interdependent or
sequential decisions.
• Support intelligence, design, choice,
and implementation.
• Supports a variety of decision
processes and styles.
• Should be adaptable and flexible.
• Should be interactive and easy to
use.
• Benefits exceed cost.
• Complete control by decision-
makers.
• Easy modification to suit needs and
changing environment.
• Supports modeling and analysis.
9
The future of DSS:
• Technological developments
continually allow for DSS tools
that are more effective: disk
storage,interactive operating
systems, enabled
spreadsheets,databases and
flexible modelling tools.
• Networks and
telecommunications enabled
group support and Executive
Information Systems(EIS).
Expert Systems theory and
technology enabled knowledge-
based DSS.
• It expresses that: “In future,
mobile tools, mobile e-services
and wireless Internet protocols
will mark the next set of
remarkable developments in
Decision Support Systems
(DSS),expanding the
accessibility of tools to decision-
makers where-ever they might
be.”
• It will be more accessible to the
global decision-maker because of
the popularity of the Web.
References
http://www.emeraldinsight.com/journals.htm?articleid=871027&show=html
http://en.wikipedia.org/wiki/Decision_support_system
http://www.gdrc.org/decision/dss-types.html
D.MYTHILI
II-MCA
10
LINUX FOCUS
Ubuntu
What is it?
• Ubuntu is a Linux-based
Operating System that is
open sourced (free)
• Pronounced (oo-BOON-too)
• Strong focus on usability and
ease of installation
History
Ubuntu is a fork of the Debian
project's codebase.
The original aim of the Ubuntu
team was to create an easy-to-use Linux
desktop with new releases scheduled on
a predictable six-month basis, resulting
in a more frequently updated system.
Ubuntu's first release was on 20
October 2004. Since then, Canonical has
released new versions of Ubuntu every
six months with commitment to support
each release for eighteen months by
providing security fixes, patches to
critical bugs and minor updates to
programs. It was decided that every
fourth release, issued on a two-year
basis, would receive long-term support
(LTS).
LTS releases were traditionally
supported for three years on the desktop
and five years on the server. However
with the upcoming release of Ubuntu
LTS 12.04, desktop support is to be
extended to a period of five years (April
2017) for LTS releases.
Support was extended to better
accommodate business and corporate IT
users of Ubuntu who operate on longer
release cycles and are more conscious of
the costs associated with frequent
software upgrades.
Why that name?
Ubuntu is an African concept
meaning “humanity toward others”
Sponsored by Canonical Ltd.
Owned by South African billionaire
Mark Shuttleworth
Why use it?
Huge group of “free software
proponents” (open source)
Ubuntu is free
11
Alternate to Windows and MAC OS’s
Ubuntu is most popular Linux-based OS
in the world (8 million now)
Dell now offers desktops with Ubuntu
Requirements
Last version – Feisty Fawn 7.04
Latest version – Gusty Gibbon 7.10
Next version – Hardy Heron 8.04 in
2011
256 KB RAM
4 GB hard drive space
Can be dual booted with current OS or
used from a live CD
Installation
Ubuntu Desktop 11.04
Ubuntu Desktop 11.04 started
from the Live CD with the Install
window open
Installation of Ubuntu is
generally performed with the Live CD or
can be installed via a Live USB drive.
The Ubuntu OS can be run
directly from the CD (sometimes with a
significant performance loss), allowing a
user to "test-drive" the OS for hardware
compatibility and driver support.
The CD also contains the
Ubiquity installer, which can then guide
the user through the permanent
installation process. CD images of all
current and past versions are available
for download at the Ubuntu web site.
Installing from the CD requires a
minimum of 256 MiB of RAM.
Users can download a disk image
(.iso) of the CD, which can then either
be written to a physical medium (CD or
DVD), or optionally run directly from a
hard drive (via UNetbootin or GRUB).
Ubuntu is also available on ARM,
PowerPC, SPARC, and IA-64 platforms,
although none are officially supported.
Canonical offered Ubuntu and
Kubuntu Live installation CDs of the
latest distribution of the operating
system at no cost (though discontinued
as of April 2011), including paid postage
for destinations in most countries around
the world (via a service called ShipIt).
Various third-party programs such as
remastersys and Reconstructor are
available to create customised copies of
the Ubuntu Live CDs.
12
A Microsoft Windows migration
tool, called Migration Assistant
(introduced in April 2007), can be used
to import bookmarks, desktop
background (wallpaper), and various
settings from an existing Windows
installation into a new Ubuntu
installation.
Ubuntu and Kubuntu can be
booted and run from a USB Flash drive
(as long as the BIOS supports booting
from USB), with the option of saving
settings to the flashdrive. This allows a
portable installation that can be run on
any PC which is capable of booting from
a USB drive. In newer versions of
Ubuntu, the USB creator program is
available to install Ubuntu on a USB
drive (with or without a LiveCD disc).
Variants
Ubuntu Desktop
It designed for desktop and laptop PCs.
The desktop edition can be also installed
using the alternate install CD which
uses the debian-installer and allows
performing certain specialist
installations of Ubuntu: setting up
automated deployments, upgrading from
older installations without network
access, LVM and/or RAID partitioning,
installs on systems with less than about
256 MiB of RAM.
Ubuntu Server
It made for use in servers. The server
install CD allows the user to install
Ubuntu permanently on a computer for
use as a server. It will not install a
graphical user interface.
Kubuntu is an official variant of the
Ubuntu distribution which uses the KDE
Plasma Workspaces.
There are many Ubuntu variants (or
derivatives) based on the official Ubuntu
editions. These Ubuntu variants install a
set of packages that differ from the
official Ubuntu distributions.
The variants recognized by Canonical as
contributing significantly towards the
Ubuntu project are the following:
• Edubuntu, a GNOME-based
subproject and add-on for Ubuntu,
designed for school environments
and home users.
• Kubuntu , a desktop distribution
using the KDE Plasma Workspaces
13
desktop environment rather than
GNOME.
Lubuntu , a lightweight distribution
using the LXDE desktop environment.
Mythbuntu, designed for creating a
home theater PC with MythTV and uses
the Xfce desktop environment.
Ubuntu Studio, a distribution made for
professional video and audio editing,
comes with higher-end free editing
software and is a DVD .iso image unlike
the Live CD the other Ubuntu
distributions use.
Xubuntu , a distribution based on the
Xfce desktop environment instead of
GNOME, designed to run more
efficiently on low-specification
computers.
COMMANDS
Privileges sudo command – run command as root
sudo -s – open a root shell
sudo -s -u user – open a shell as user
sudo -k – forget sudo passwords
gksudo command – visual sudo dialog
(GNOME)
kdesudo command – visual sudo dialog
(KDE)
sudo visudo – edit /etc/sudoers
gksudo nautilus – root file manager
(GNOME)
kdesudo konqueror – root file manager
(KDE)
passwd – change your password
Display
sudo /etc/init.d/gdm restart – restart X
and return to login (GNOME)
sudo /etc/init.d/kdm restart – restart X
and return to login (KDE)
(file) /etc/X11/xorg.conf – display
configuration
sudo dexconf – reset xorg.conf
configuration
Ctrl+Alt+Bksp – restart X display if
frozen
Ctrl+Alt+FN – switch to tty N
Ctrl+Alt+F7 – switch back to X display
System Services
start service – start job service (Upstart)
stop service – stop job service (Upstart)
status service – check if service is
running (Upstart)
/etc/init.d/service start – start service
(SysV)
14
/etc/init.d/service stop – stop service
(SysV)
/etc/init.d/service status – check service
(SysV)
/etc/init.d/service restart – restart
service (SysV)
runlevel – get current runlevel
Package Management
apt-get update – refresh available
updates
apt-get upgrade – upgrade all packages
apt-get dist-upgrade – upgrade with
package
replacements; upgrade Ubuntu version
apt-get install pkg – install pkg
apt-get purge pkg – uninstall pkg
apt-get autoremove – remove obsolete
packages
apt-get -f install – try to fix broken
packages
dpkg --configure -a – try to fix broken
packages
dpkg -i pkg.deb – install file pkg.deb
(file) /etc/apt/sources.list – APT
repository List
Network
ifconfig – show network information
iwconfig – show wireless information
sudo iwlist scan – scan for wireless
networks
sudo /etc/init.d/networking restart –
reset
network for manual configurations
(file) /etc/network/interfaces – manual
configuration
ifup interface – bring interface online
ifdown interface – disable interface
Special Packages
ubuntu-desktop – standard Ubuntu
environment
kubuntu-desktop – KDE desktop
xubuntu-desktop – XFCE desktop
ubuntu-minimal – core Ubuntu utilities
ubuntu-standard – standard Ubuntu
utilities
ubuntu-restricted-extras – non-free,
but useful
kubuntu-restricted-extras – KDE of
the above
xubuntu-restricted-extras – XFCE of
the above
build-essential – packages used to
compile programs
linux-image-generic – latest generic
kernel image
linux-headers-generic – latest build
headers
15
Firewall
ufw disable – turn off the firewall
ufw default allow – allow all
connections by default
ufw default deny – drop all connections
by default
ufw status – current status and rules
ufw allow port – allow traffic on port
ufw deny port – block port
ufw deny from ip – block ip address
Application Names
nautilus – file manager (GNOME)
dolphin – file manager (KDE)
konqueror – web browser (KDE)
kate – text editor (KDE)
gedit – text editor (GNOME)
System
Recovery - Type the phrase “REISUB”
while holding down Alt and SysRq
(PrintScrn) with about 1 second between
each letter. Your system will reboot.
lsb_release -a – get Ubuntu version
uname -r – get kernel version
uname -a – get all kernel information
S.KARTHIKEYAN
II-MCA
16
TECHNOLOGIES
Quantum cryptography
Quantum cryptography
describes the use of quantum mechanical
effects (in particular quantum
communication and quantum
computation) to perform cryptographic
tasks or to break cryptographic systems.
The use of classical (i.e., non-
quantum) cryptography to protect
against quantum attackersis also often
considered as quantum cryptography(in
this case, one also speaks of post-
quantum cryptography).
Well-known examples of
quantum cryptography are the use of
quantum communication to securely
exchange a key (quantum key
distribution) and the (hypothetical) use
of quantum computers that would allow
the breaking of various popular public-
key encryption and signature schemes
(e.g., RSA and ElGamal).
The advantage of quantum
cryptography lies in the fact that it
allows the completion of various
cryptographic tasks that are proven or
conjectured to be impossible using only
classical (i.e., non-quantum)
communication .
Quantum key distribution
Arguably the best-known
application of quantum cryptography is
quantum key distribution (QKD).QKD
describes the process of using quantum
communication to establish a shared key
between two parties (usually called
Alice and Bob) without a third party
(Eve) learning anything about that key,
even if Eve can eavesdrop on all
communication between Alice and Bob.
This is achieved (roughly
speaking) by letting Alice encode the
bits of the key as quantum data before
sending them to Bob; if Eve tries to learn
these bits, the messages will be disturbed
and Alice and Bob will notice.
QKD is possible without
imposing any computational
assumptions (that is, assumptions stating
that certain mathematical problems such
as factoring large numbers take very
17
long time to solve on a computer). One
also speaks of "unconditional security".
The only assumptions are that
the laws of quantum mechanics hold
(which is to a certain extent disputable
due to the difficulties of unifying
relativity theory and quantum
mechanics), and that Alice and Bob have
an authenticated channel, i.e., Eve
should not be able to impersonate Alice
or Bob as otherwise a man-in-the-middle
attack would be possible.
QKD is the only example of
commercially available quantum
cryptography.
Quantum commitment
A commitment scheme allows a
party Alice to fix a certain value (to
"commit") in such a way that Alice
cannot change that value any more while
still ensuring that the recipient Bob
cannot learn anything about that value
until Alice decides to reveal it. Such
commitment schemes are commonly
used in cryptographic protocols. In the
quantum setting, they would be
particularly useful: Crépeau and Kilian
showed that from a commitment and a
quantum channel, one can construct an
unconditionally secure protocol for
performing so-called oblivious transfer.
Oblivious transfer, on the other hand,
had been shown by Kilian to allow to
implement almost any distributed
computation in a secure way (so-called
secure multi-party computation
Bounded- and noisy-quantum-
storage model
One possibility to construct
unconditionally secure quantum
commitment and quantum oblivious
transfer (OT) protocols is to use the
bounded quantum storage model
(BQSM). In this model, we assume that
the amount of quantum data that an
adversary can store is limited by some
known constant Q. We do not, however,
impose any limit on the amount of
classical (i.e., non-quantum) data the
adversary may store.
In the BQSM, one can construct
commitment and oblivious transfer
protocols. The underlying idea is the
following: The protocol parties exchange
more than Q quantum bits (qubits).
Since even a dishonest party cannot store
all that information (the quantum
18
memory of the adversary is limited to Q
qubits), a large part of the data will have
to be either measured or discarded.
Forcing dishonest parties to measure a
large part of the data allows to
circumvent the impossibility result by
Mayers;[10] commitment and oblivious
transfer protocols can now be
implemented.
The protocols in the BQSM
presented by Damgård, Fehr, Salvail,
and Schaffner do not assume that honest
protocol participants store any quantum
information; the technical requirements
are similar to those in QKD protocols.
These protocols can thus, at least in
principle, be realized with today's
technology. The communication
complexity is only a constant factor
larger than the bound Q on the
adversary's quantum memory.
The advantage of the BQSM is
that the assumption that the adversary's
quantum memory is limited is quite
realistic. With today's technology,
storing even a single qubit reliably over
a sufficiently long time is difficult.
(What "sufficiently long" means depends
on the protocol details. By introducing
an artificial pause in the protocol, the
amount of time over which the adversary
needs to store quantum data can be made
arbitrarily large.)
Position-based quantum
cryptography
The goal of position-based
quantum cryptography is to use the
geographical location of a player as its
(only) credential. For example, one
wants to send a message to a player at a
specified position with the guarantee that
it can only be read if the receiving party
is located at that particular position.
In the basic task of position-
verification, a player Alice wants to
convince the (honest) verifiers that she is
located at a particular point. It has been
shown by Chandran et al. that position-
verification using classical protocols is
impossible against colluding adversaries
(who control all positions except the
prover's claimed position). Under
various restrictions on the adversaries,
schemes are possible.
Under the name of 'quantum
tagging', the first position-based
quantum schemes have been investigated
in 2002 by Kent. A US-patent was
19
granted in 2006, but the results have
only appeared in the scientific literature
in 2010. After several other quantum
protocols for position verification have
been suggested in 2010, Buhrman et al.
were able to show a general
impossibility result: using an enormous
amount of quantum entanglement,
colluding adversaries are always able to
make it look to the verifiers as if they
were at the claimed position. However,
this result does not exclude the
possibility of practical schemes in the
bounded- or noisy-quantum-storage
model (see above).
Post-quantum cryptography
In a predictive sense, quantum
computers may become a technological
reality; it is therefore important to study
cryptographic schemes that are
(supposedly) secure even against
adversaries with access to a quantum
computer. The study of such schemes is
often referred to as post-quantum
cryptography.
The need for post-quantum
cryptography arises from the fact that
many popular encryption and signature
schemes (such as RSA and its variants,
and schemes based on elliptic curves)
can be broken using Shor's algorithm for
factoring and computing discrete
logarithms on a quantum computer.
Examples for schemes that are, as of
today's knowledge, secure against
quantum adversaries are McEliece and
lattice-based schemes. Surveys of post-
quantum cryptography are available.
There is also research into how
existing cryptographic techniques have
to be modified to be able to cope with
quantum adversaries. For example, when
trying to develop zero-knowledge proof
systems that are secure against quantum
adversaries, new techniques need to be
used: In a classical setting, the analysis
of a zero-knowledge proof system
usually involves "rewinding", a
technique that makes it necessary to
copy the internal state of the adversary.
L.RAMESH
II-MCA
21
ANSWER
SYNONYMS
1. Restorative or stimulating.
2. To erase or to make one unaware of a thing.
3. A semantic or other pattern which calls attention to itself.
4. The study of ultimate being and universal truths.
5. Contestatory or conflictual
PUZZLES:
1. M
Working in rows, add together the numerical values of the left and right hand letters to give the numerical value of the central letter.
2. O
In each segment of the diagram are a pair of letters, one of which is the same distance from the start of the alphabet as the other is from the end.
3. K
The numerical values of the letters in opposite segments of the circle always add up to 17.
4. K
As you move down, the numerical value of the letters follows the sequence of Prime Numbers.
5. G
The numerical values of the letters in each row add up to 26 each time.
6. V
Starting at the top left, and moving anti-clockwise around the figure, letters advance through the alphabet 5 letters at a time.
7. U
Starting on the left, and moving along the line to the right, letters follow the alphabetic sequence, in steps of 1,2,3 and then 4, before repeating the sequence.
8. Y
Starting in the top left circle, and following a W pattern through the others, letters in corresponding segments of the circles follow the alphabetical sequence in steps of 4 letters.
K.KARTHIKA
II-MCA
22
CAREER OBJECTIVES
Tips for facing HR interview
1. Be well dressed, well maintained from
top to bottom.
2. Enter the interview room with positive
frame of mind.
3. Never try to bluff the interviewer. If
you do so then you will definitely be
trapped, because they have a vast
experience of testing the psychology of a
person.
4. First impression is the lasting (not
last) impression. It is very much
applicable for interview. So, when you
enter the room your body language must
be like a gentleman.
5. be confident & reply the answers.
Don't hesitate to accept your faults, if so.
6. Generally they ask your merits &
demerits. Here you have to be intelligent
while telling them about your demerits.
Represent your demerits like your
merits.
e.g., Demerit: I don’t want to sit ideal, I
always want to be busy in working. Etc.
7. Always believe that they are more
needy than you. Because companies
spend a huge amount in hiring the
candidates. By rejecting any good
resource like you, they are not going to
be benefited. They would be on looser
side.
The main things that you have to keep
in your mind are:
1)Have confidence in yourself.
2) Don’t get irritated.
3) Never say "i think....." because it
shows negative attitude
4) Always say the truth
5) Try to keep your positive points in
front of the HR
Some Interview Questions for Fresher’s
23
1. Tell me about yourself.
2. Why should I hire you?
3. What are your strengths and weaknesses?
4. Why do you want to work at our company?
5. What is the difference between confidence and over confidence?
6. What is the difference between hard work and smart work?
7. How do you feel about working nights and weekends?
8. Can you work under pressure?
9. Are you willing to relocate or travel?
10. What are your goals?
11. What motivates you to do good job?
12. What makes you angry?
13. Give me an example of your creativity.
14. How long would you expect to work for us if hired?
15. Are not you overqualified for this position?
16. Describe your ideal company, location and job.
17. What are your career options right now?
18. Explain how would be an asset to this organization?
19. What are your outside interests?
20. Would you lie for the company?
21. Who has inspired you in your life and why?
22. What was the toughest decision you ever had to make?
23. Have you considered starting your own business?
24. How do you define success and how do you measure up to your own definition?
25. If you won $10 million lottery, would you still work?
M.JAGADEESH
II-MCA
24
WINDOWS 8
Windows 8 is the codename for
the next version of the Microsoft
Windows computer operating
following Windows 7. It has many
changes from previous versions. In
particular it adds support for ARM
microprocessors in addition to the
previously supported x86
microprocessors from Intel and AMD.
A new Start Screen interface has
been added that was designed for
touchscreen input in addition to mouse,
keyboard, and pen input. It is said to be
released sometime around 2012
Microsoft has yet to announce the
release date.
NEW FEATURES
Windows 8 will contain a new
user interface based on Microsoft's
design language named Metro. With the
new change, the Start Menu was
replaced in favor for the new Start
Screen, where there are tiles that contain
shortcuts to applications, Metro style
applications, and updating tiles, similar
to Program Manager and Windows
Phone.
A new authentication method
allows users to sketch in three different
places over the picture to login, instead
of typing a password.
Windows Explorer now uses
a ribbon interface, similar to those used
in Microsoft Office applications.
Another feature expected to be
introduced in Windows 8 is native USB
3.0 support, without the need to load
drivers.
Windows 8 will come
with Windows Store, an online
marketplace for buying, selling, and
advertising applications.
Windows 8 can be run from a
USB-connected drive, such as a flash
drive. This feature is called Windows to
Go. It is intended for enterprise
administrators to provide users with a
Windows 8 image that reflects the
corporate desktop; pricing and licensing
details were not discussed when the
feature was announced.WTG is not
included in Windows 8 previews.
Windows 8 will support multiple
monitors with the new ability to natively
25
display different background images on
each display and customized taskbar(s)
on each of the connected displays.
The Developer Preview comes
with two new recovery functions.
Refresh and Reset,which both make a
complete restore easier than a re-
installation. The former keeps all the
settings and files of the user intact and
only reverses all changes to Windows
files to its original state while removing
all installed programs and apps. The
latter deletes all files and effectively re-
installs Windows, but without any
additional user input such as agreeing to
license agreements or selecting a hard
disk required. After a reset completes,
the user will be asked for the product
key and will then proceed to account
creation.
One big change is that user
accounts do not have to be local-only (or
from an Active Directory domain)
anymore but can be linked up to one's
Windows Live ID. This has the
advantage that users will not lose their
settings and files as they move from
their home computer to their work laptop
or to any other computer also using
Windows 8.
Other new features include a new
Welcome screen, a new packaged
application model called AppX that is
based on Silverlight, and Open, as well
as a setting to automatically adjust
window color to fit the wallpaper.
There is also a stripped down
"Immersive" version of Internet
Explorer, using the similar Metro-based
user interface of the mobile version of
Internet. The Immersive Version of
Internet Explorer 10 does not
support ActiveX plugins, in order to be
an HTML5-only browser. The Desktop
version of IE10 does support ActiveX
plugins.
A new "Hybrid Boot" option that
uses "advanced hibernation
functionality" on shutdown to allow
faster startup times.
A new version of Task
Manager with a redesigned user
interface is also present in pre-release
versions of Windows 8.
The text on the title bar of a
dialog box or a program's window is
centered.
26
Compatibility
Windows 8 for x86 processors
will run much software compatible with
previous x86 versions of Windows, with
the usual restrictions: 64-bit Windows
will run also 32-bit software but not 16-
bit ones; 32-bit Windows will optionally
run 16-bit software if installed to do so,
but will not run 64-bit software. Either
32- or 64-bit Windows can be installed
on x86-64 processors. Some expertise in
manipulating compatibility settings may
be required to run, for example, 16-bit
software for Windows 3.x under 32-bit
Windows 8, in cases where it is possible.
In particular, applications compatible
with 32- and 64-bit Windows 7 will run
in the same way on Windows 8.
Windows 8 for ARM processors
will not run software created for x86;
software will have to be ported by its
developers to create ARM
executable from source code.
Windows 8 Developer Preview is
incompatible with some virtualization
platforms, such as Virtual PC. A blog
post by Microsoft notes that the setup
process is error-prone when installing in
a virtual machine, and installing
without hardware virtualization support
can be particularly problematic.
It is reported to work
under VMware Workstation, VMware
Player, and Virtual Box — detailed
instructions for installing in these
environments have been published.
G.ARUNKUMAAR
II-MCA
27
COMPANY PROFILE
Cognizant Technology Solutions
Cognizant is a global leader in
business and technology services that
helps clients bring the future of work to
life-today-in a business environment that
is being transformed by accelerating
globalization, virtualization, and the shift
toward cloud technologies.
Founded in 1994
Company Highlights
1994: Started as the technology arm of
The Dun & Bradstreet Corporation
1996: Began adding third-party clients
and servicing the best across industry
segments
1998: Became first IT company
leveraging India to be listed on the
NASDAQ
2002: Became the first company to be
assessed enterprise-wide against mature
industry-process certifications, such as
P-CMM level 5, BS 7799, SEI-CMMi
Level 5
2004: Acknowledged as a leading
provider of IT services by industry
analysts such as Gartner, Forrester,
AMR and IDC; added to the prestigious
NASDAQ 100 Index
2006: Became the fastest global IT
services company to reach a $1 billion
run-rate (under 12 years)
2007: Acquired MarketRx, Inc., a
leading provider of analytics and related
software services to global life sciences
companies; crossed $2 billion revenue
threshold
2008: Entered Fortune 1000; established
global systems-integration relationship
with T-Systems; formally inaugurated
nearshore delivery centers in Argentina
and Hungary; exceeded $2.8 billion
revenue mark
2009: Joined Fortune's "Most Admired
Companies" list; named to
BusinessWeek 50 list of the top-
performing U.S. companies for third
consecutive year; named to Forbes "25
Fastest Growing Technology Companies
In America" list for sixth straight year
2010: Selected for Fortune’s “Most
Admired Companies” list for the second
28
year in a row; placed in Top 5 for IT
services
Services
Cognizant provides a range of
information technology, consulting and
Business Processing Outsourcing (BPO)
services, including Business and
Technology Consulting, Complex
Systems Integration, Application
Development and aintenance, Business
Process Outsourcing, IT Infrastructure
Services, Analytics, Web Analytics,
Business Intelligence, Data
Warehousing, CRM and social
CRM,Supply Chain Management,
Engineering Management
Solutions, ERP, R&D Outsourcing,
and Testing solutions.
The company's revenue from IT
services is split roughly evenly between
application development (which is
considered discretionary spend and
hence arguably more susceptible to the
economic climate) and application
maintenance.
Management
Executive Team
Lakshmi Narayanan - Vice Chairman
Francisco D'Souza - President & Chief
Executive Officer
Gordon Coburn - Chief Financial &
Operating Officer
Chandra Sekaran - President &
Managing Director, Global Delivery
Rajeev Mehta - Chief Operating
Officer, Global Client Services
VINOTH
II-MCA
29
TIPS AND TRICKS
NOTEPAD TRICKS
You can make the notepad open
continuously with non-stop...
@ECHO off
:top
START
%SystemRoot%\system32\notepad.exe
GOTO top
Save the file as “non-stop.bat”
Just do it in your friend’s computer
& make them frustrate
Note: – This may even lead to hanging
of some computers..!!
Repeated messages in the notepad, by
following this simple notepad tricks
@ECHO off
:Begin
msg * Hai
msg * How are you dear….
msg * I am fine ya!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
And Save it as “Anything.BAT”
A simple notepad tricks to download
unlimited from Rapidshare,
Megaupload file sharing websites.
@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release
ipconfig /release
echo ipconfig /renew
ipconfig /renew
And save it as “technoskillonline.bat”
Now click on this file every time you
download a file from Rapidshare and
Megaupload
How to create fake virus in your
computer
@echo off
C:
cls
echo hello
pause
echo im a virus
pause
echo hurray !! im become a hacker
pause
30
Save the file as “.bat” extension
For example if your file name is “virus”
save it as “virus.bat”
You can make your cd-drive to open
& close repeatedly by using a
simple notepad tricks
Set oWMP =
CreateObject(“WMPlayer.OCX.7″)
Set colCDROMs =
oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save it as “im mad.VBS”.
Now watch that your cd-drive has
become MAD…!
Make your keyboard keys to type
continuously (non-stop)
Just type this code in notepad
MsgBox “stop me..! if you can”
Set wshShell
=wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as “ghostrider.VBS”
Toogle capslock continiously
Set wshShell
=wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop
Save it as “blink.VBS”.
Now watch that capslock led will blink
continuously…
31
Convey your friend a message and shut down his/ her computer.
@echo off msg * I don’t like you shutdown -c “Hahahah You are Doomed” –s
Notepad Trick - BUSH HID THE FACTS
Open notepad.
Type BUSH HID THE FACTS
Save that file.
Close it
Open It Again See…
Notepad Trick to Format Hard disk
Open Notepad and type:
a) Code: 01001011000111110010010101010101010000011111100000
b) Save as it as anything.EXE
c) Run it. Beware that the entire HDD will be erased
Notepad trick to use it as a Diary
Open notepad
Type .LOG
Save the file as LOG.txt
Write anything in it and it will be saved with the time when you edit it.
Notepad Trick to Lock Folders
Let’s lock a folder using notepad trick which is named as PICS in your D: drive, whose path is D: PICS
Then the code should be something like this: ren pics pics.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Pics are your folder name. Use the name of the folder in place for pics. Save the text file as lock.bat in the same drive.
To unlock this locked folder:
Open another new notepad text file and type the following: ren pics.{21EC2020-3AEA-1069-A2DD-08002B30309D} pics
Save the text file as key.bat in the same drive. Here again, pics is the name of the folder. Change it to the folder name you want to lock it.
K.PREMALATHA
II-MCA