Successfully reported this slideshow.
CSE Snaps       Articles   Mobile Dreams         1 Wear the World(6th      5       sense) Microsoft Sql Server    8Better ...
October 2010               CHANCELLOR’S MESSAGE   I am very much delighted to hear that Computer Science Engineer-  ing De...
October 2010               VICE-CHANCELLOR’S MESSAGE      I am very much delighted to learn that the department of compute...
October 2010                  REGISTRAR’S MESSAGE       I am much pleased to note that the department of Computer Science ...
October 2010               CONTROLLER OF EXAM’S MESSAGE      I am very glad to see that the Department of Computer Science...
October 2010                         DIRECTOR’S MESSAGE                         “A GOOD START MEANS HALF DONE”          I ...
October 2010                                              Mobile -DREAMs......                                            ...
October 2010        MOBILE -DREAMS......          TILES                                Hub Strategy                       ...
October 2010          MOBILE -DREAMS......        Email       The 7 will have full capability to support not just Exchange...
October 2010      Over the air Sync : Mesh      A piece of interface thats shockingly not there: A                        ...
October 2010     WEAR UR WORLD (6 SENSE)                                                             th                   ...
October 2010                                                                       W E A R   U R   W O R L D   ( 6 th   S ...
October 2010              The camera recognizes individuals, images, pictures, gestures one makes with their hands       ...
October 2010MICROSOFT SQL SERVER 2008                                                                                     ...
October 2010AvailabilityThis feature is available in the following editions of SQL 2008 and SQL 2008 R2   Datacentres (on...
October 2010                     Role Name              Role Description                     mdw_admin              Has bo...
BETTER SAFE THAN SORRY       (WIFI NETWORK SECURITY)!                                                                     ...
2. SPOOFING                                                                         network with a stronger wireless      ...
October 2010                                       CLOUD COMPUTING                                          By Nitin Goswa...
October 2010                                                                             Service providers                ...
October 2010Microsoft                                                                    complexity of security is greatly...
October 2010     Wireless LAN Security                                                                   By Monika(3rd yr,...
October 2010                      Google’s Web Browser                                                                 By ...
October 2010                   Computer Security                                                                  By Akash...
October 2010                                                         COMPUTER SECURITY                 How to Protect     ...
October 2010                                            VIRTUALITY                                                        ...
October 2010               VirtualityTechnique used in 3D view                                     New system without glas...
October 2010               VirtualityChroma key compositing Chroma key compositing (or            weather forecast broadca...
October 2010               Virtuality                 Virtual world concepts   One perception of virtual                  ...
October 2010                                         PUZZLES                                        -by Mallica(3rd yr,CSE...
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
Upcoming SlideShare
Loading in …5
×

magazine

3,759 views

Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

magazine

  1. 1. CSE Snaps Articles Mobile Dreams 1 Wear the World(6th 5 sense) Microsoft Sql Server 8Better Safe Than Sorry 11 Cloud Computing 13Wireless LAN Security 16Google’s Web Browser 17 Messages Computer Security 18 Chancellor’s Message Vice Chancellor’s Message Virtuality 20 Registrar Message Puzzles 24 COE’s Message Director’s Message Microsoft 24 Simplifier 24 Secret of maths 25 Tips & Tricks 27 Comp-Confusion 28 Student’s Activities 29 Staff Activities 34
  2. 2. October 2010 CHANCELLOR’S MESSAGE I am very much delighted to hear that Computer Science Engineer- ing Department is starting an association. I am sure the activities of the association will help improving the organizational skills and leader- ship qualities of student which are essential for their career develop- ment. I am very confident that the association of Computer Science will reach greater heights in the years to come. I wish them to have a grand success in all their moves and I wish that these steps shall bring them a drastic change in their career growth. Dr. Ishari K.Ganesh I
  3. 3. October 2010 VICE-CHANCELLOR’S MESSAGE I am very much delighted to learn that the department of computer science and Engineering is inaugurating their Association. The IT education has trans- formed our country and economy and the benefits of IT revolution has reached the common man. Vels University strives hard to impart quality edu- cation to the students so that, they have the required competencies to meet the changing needs of this nation. The activities of the association must facilitate the students to acquire organi- zational skills and bring change in their perception and attitudes. The e- Magazine to be published to mark this occasion should reflect the student’s talents and their abilities. I would like to congratulate and appreciate the students and the faculty of CSE for their efforts and I wish them all the best II
  4. 4. October 2010 REGISTRAR’S MESSAGE I am much pleased to note that the department of Computer Science Engineering is inaugurating the Department Association on 14-10- 2010. The usage of computers has increased drastical- ly in these days, computers playing a role in almost every industrial sector and also in various branches of society. They are presently the backbone of every industry that currently exists. Computers have transformed the lives of billions around the world in every possible way. No field is left out without computers, whether it is medicine, e-governance, managing laws of department activities, computers have become essential. I wish all the very best for the inau- guration of the department’s association and success in implement- ing innovative ideas for the development of the world. Dr. P. Govindarajan III
  5. 5. October 2010 CONTROLLER OF EXAM’S MESSAGE I am very glad to see that the Department of Computer Science is Inaugurating the Department Association on 14.10.2010. The present human generation is associated mostly with the computer usages which makes easy in day life like banking, accounting, ticketing, E-mailing, chatting, conduct of online Examination and E-governance etc., Most of the peoples relied on the computers for various matter and considered to be a very essential for the human being. In this connection, I wish all the very best for the inauguration of Department Association and success in implementing the new invents in the Computer Ed- ucation. IV
  6. 6. October 2010 DIRECTOR’S MESSAGE “A GOOD START MEANS HALF DONE” I am very much pleased to note that the students of Computer Science Engineering, Vels University are coming out with an e-journal. The knowledge one acquires in college has to be harnessed in real life for the betterment of self and humanity. In other words, the students should acquire the skill of presenting & utilizing their knowledge, they get during their stay in VELS UNIVERSITY fully & properly. In that way, this journal that they intend to publish on regular basis will definitely give them an opportunity to sharpen their deliverance skills. At this juncture, I request each and every student to utilize this forum fully. I wish the students and staff of Department of Computer Science Engineering all the very Best in their endeavor. God Bless You All. Prof. P. Thiagarajan V
  7. 7. October 2010 Mobile -DREAMs...... By V.vinoth, D.Ashokkumar, NitinGoswami, K.Gautam(3rd yr, CSE) Windows phone 7 is the latest version of windows mobile in development by Microsoft, scheduled for release by October 2010. Microsoft’s idea of the Smartphone is very different from their competitors, traditionally smart phones were devices that did not have touch screens and were intended to be used by one hand ,but today’s smart phones push the boundaries of technology , Microsoft plans to push it even further . The minimum requirements for phone 7 was revealed recently  Capacitive Touch: 4 or more contact points  Sensors: A-GPS, Accelerometer, Compass, Light, Proximity  Camera: 5 megapixels or more, Camera with a flash and dedicated camera button But Microsoft has their work cut out  Multimedia: Common detailed specs, Codec accelerationfor them to address copy-paste andmulti-tasking while also spreading  Memory: 256 MB, 8 GB Flash or morethe word about their new mobile OS,which is something they have not  GPU: DirectX 9 accelerationbeen able to do in the past with ZuneHD, Windows Mobile, and other tech-  Processor: ARMv7 Cortex/Scorpion or betternology. They seem to be doing prettywell with the Xbox, so maybe Phone7  2 screen sizes: 480×800 WVGA, 480×320 HVGAteams should probably be looking atthat team for help.  Keyboard: Optional Five specific hardware buttons required: Start, back, search (a dedicated Bing button), camera button, and power -- no more, no less From the minimum requirements we can clearly understand that Microsoft is clearly targeting only the high end market for Phone 7. The basic facts Windows Phone 7 Series is the suc- are supposed to be released by branded and expansive Zune and Xbox components, and extremely cessor to Microsofts line of Windows the end of this year. strict hardware requirements for Mobile phone operating systems. Its The visual and underlying differ- partners. A couple familiar touch- based on the Windows CE 6 kernel, ences in the operating system are stones from the past include plans like the Zune HD, while current ver- almost too numerous to mention, for Outlook and Office support, as sions of Windows Mobile are based including a completely (and we do well as licensing to a wide variety mean completely) upended user of third party hardware vendors -- on Windows CE 5. Microsoft an- interface, an emphasis on finger- nounced the new OS at Mobile World despite the name change; Mi- based touch screen input, deep crosoft still isnt building any Congress 2010 in Barcelona, and social networking integration, fully phones itself says that the first handsets to run it 1
  8. 8. October 2010 MOBILE -DREAMS...... TILES Hub Strategy Apps, Lots of Apps None of the applications designed for Win- dows mobile will work on WP7. Sorry Win- The Hub strategy is the core for Win- The tile function of the screen dows Mobile developers, its for the best. replaces the icon displays seen dows Phone 7 and it makes a lot of Deep down, we all knew a clean break was on the iPhone and the Android sense. So, I will have a music hub in the the only way Windows Phone wasnt going to get stuck in the same loop. with living breathing tiles. Just shape of the Zune app. But this app is picking up the phone you can see Apps will have some standardized interface not restricted to content I have upload- what is going on in your world elements, like the app bar on the bottom for ed to, or bought in Zune, but all the common commands.. without opening any app. music content on my ‘phone. On my I know we can have push notifi- It’s all about the apps. Some of the biggest iPhone I have many music apps, each cations on the iPhone and alerts names in Apps. Seismic, Four on the Android but they both with different content. I have to remem- square, Shazam, the Associated Press –are require some element of effort. ber where my music is before I can play all bringing apps to the 7. So, we don’t need The push notifications don’t al- it. With the 7 I can access my music in ways hang around on your iPh- to worry about not having the big names you the various apps, or I can have a cen- one and on the Nexus I have to are used to. It looks like they are already tralized hub of music. slide the thing down and then lining up to come on board. “To catch the readers attention, place read through the various bits. Take the hub strategy across to other an interesting sentence or quote from the story here.” This delivery of information is just content, like business documents and one example of how Microsoft Office becomes the business hub. This are looking to fully innovate with strategy gives me the best of both this phone, not just deliver a Quality Apps worlds, I can use my preferred app or I version of what the market is used to. can find it in the main hub. Smart. The demonstrations all looked awesome with plenty of depth, functionality and interaction. These apps were developed in 3 weeks running the new Silverlight plat- form announced yesterday. Try before you buy Forget this lite/pro app business. You get to download the app as a trial. The func- tionality for the trial is core to the new Silverlight toolbox, so it is down to the app developers to decide the best way for the The Zune Phone! trial. Some apps may be fully functional but on a limited trial time. Other apps may have limited functionality or the first few Microsofts vision of Zune is finally clear with Windows Phone 7. Its an app, just levels of a game . like iPod is on the iPhone, though the Zune Marketplace is integrated with it into the music + video hub, not separated into its own little application. Its just like the Zune HD,. But you get third-party stuff like Pandora, too, built-in here., there will be an FM radio in every phone 2
  9. 9. October 2010 MOBILE -DREAMS...... Email The 7 will have full capability to support not just Exchange accounts but all other major email providers as well. So, you don’t need to have an Exchange account to be using this for email. However, if you do have exchange, this will be a boon. Remember, the iPhone has Exchange support but the Android does not offer Active Sync. The 7 will offer multiple exchange account sync which will also be good for business users. Let us not forget there are still a lot more people running Exchange emails than Gmail or Apple Mail. Blackberry, are you paying attention? TOP 10 FEATURES Games If Microsofts got an ace-in-hole with Win- ber of levels. Not only will you be able 1. Smooth transitional user interface dows Phone 7, its Xbox Live. Gamers have to continue playing your XBOX games 2. Informative lock screen and auto- hidden talked about a portable Xbox for years—this on the phone (we don’t know right now top status bar is the most logical way to do it. The N-Gage if you can play all of them) but also was ahead of its time. The DS and PSP are that it remembers you across plat- 3. Good Office integration and support the past. The iPhone showed us that the forms so you can pick up where you 4. Bing search page and functionality future of mobile gaming was going to be on left off when at home in front of your your phone, and now that just got a lot XBOX. In a sense, this is what Sony 5. Easy setup for Google, Windows Live, more interesting. The potentials there, and has been trying to achieve with the Yahoo! Mail, and others hopefully the games will be plentiful and PSP/PS3 hook up, but with all the oth- awesome enough to meet it. er mobile bits added. 6. Functional QWERTY keyboard Forget Flight Control, how about full on If the 7 can be an awesome entertain- 7. Cool camera software XBOX action on your phone? The graphics ment platform as well as the business 8. Tell me voice search look up to it and the game levels, credits platform of Microsoft’s heritage, this and achievements will be recorded against could be amazing. 9. Powerful Outlook email, calendar, and your live profile. contacts client This cross performance works on a num- 10. Zune HD functionality 3
  10. 10. October 2010 Over the air Sync : Mesh A piece of interface thats shockingly not there: A together. The iPhone gets better but doesn’t perfectly inte- desktop syncing app. If anyone would be expected to grate my Google life. Nor does Android completely – Gmail, tie their phone to a desktop, youd think itd be Mi- Google apps yes but other accounts like Google Finance crosoft, but theyre actually moving forward here. All of still don’t hook up. your contacts and info sync over the air. The only Microsoft is the sleeping giant. Historically not as good thing youll be syncing through your computer is music looking as Apple, and not as fast as Google. The phone 7 is and videos, which is mercifully done via the Zune the show piece if not the Centre piece of their empire which desktop clients will help them back on the path to greatness. Microsoft’s plans to sync your life across channels Of course we assume that Microsoft can get the hardware and platforms seems a little ahead of its time but right. We have seen some great things, beautiful graphics, with the 7, finally everything comes into place. Music, great games but will the hardware be up to it? Multi tasking work, games, contacts all come of age in one place. is not coming which is probably a smart reason to manage What we forget is that Microsoft has all the compo- the hardware drain. No doubt they will be working hard to nent parts to serve my digital life. Email, Search, Gam- find the right partners to deliver the best handset possible. ing, Music. Until now some of those have been a bit A glitch in the hardware could be the undoing of such great crap, the Zune didn’t really inspire, don’t get me start- potential. ed on Vista and pre Bing, search wasn’t too hot either. Until we start to see handsets in the wild, I will remain with Roll forward a year and Windows plans are coming my view that this is the iPhone Killer. together. With the phone the potential Centre of my digital universe I tend to gravitate to the platform that gives me the greatest experience to hook them all FINAL COMMENTS WHAT IS STILL MISSING? We have assumed here that Microsoft can get the hardware right. The two most obvious glaring issues are the lack of We have seen some great things, beautiful graphics, and great copy-paste and the limited multi-tasking. You can al- games but will the hardware be up to it? Multi tasking is not com- ready select a word and use the cursor so it shouldn’t be ing which is probably a smart reason to manage the hardware that much effort for Microsoft to get some developers drain. No doubt they will be working hard to find the right partners locked into a room to figure out copy-paste on WP7 to deliver the best handset possible. A glitch in the hardware Just like the previous versions of the iPhone, you can could be the undoing of such great potential. have native apps running in the background so you Until we start to see handsets in the wild, we can safely assume could listen to Zune HD streaming content while surfing that this is the iPhone Killer. the web and receiving emails on the go. There are several other areas that need work, such as REFERENCE the games in Xbox Live, Twitter support, 3rd party apps, HTTP://W W W .MIC R OSOF T.C OM/W INDOW SMOB ILE/ E N -US/ and more. However, the OS is quite refined and con- C MPNW INDOW SPHONE7/DEFA UL T.MSPX sistent and I think people are going to be quite happy H TTP :/ / TH EN EX TW EB .C O M/ MO B ILE/ 20 10/ 03/ 16/ 7 -R EA S O N S -W IN D O W S -7-PHONE-IPHONE-KILLER/ with it when it rolls out later this year. HTTP://D EVELOP ER .W INDOW SPHONE.C OM/W INDOW S - PHONE-7/ 4
  11. 11. October 2010 WEAR UR WORLD (6 SENSE) th By C.Saravanan, N.Veeramani(3rd yr,CSE)  Sixth Sense is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information.  It was developed by Pranav Mistry, a PhD student in the Fluid Interfaces Group at the MIT Media Lab.  Sixth Sense bridges the gap by bringing intangible, digital information out into the tangible world, and allowing us to interact with this information via natu- ral hand  Sixth Sense comprises a pocket projector, a mirror and a camera. The hard- ware components are coupled in a pendant like mobile wearable device COMPONENTS The hardware components are coupled in a pendant like mobile wearable device.  Camera  Projector  Mirror  Mobile Component  Colored Markers CAMERA PROJECTOR  The projector pro-  Captures an object in view jects visual infor- and tracks the user’s hand mation enabling sur- gestures faces and physical  It sends the data to smart objects to be used as phone interfaces  A tiny LED projector  It acts as a digital eye, con-  The project itself displays data sent necting you to the world of contains a battery from the smart digital information inside, with 3 hours phone on any sur- of battery life. face in view–object, wall, or person. 5
  12. 12. October 2010 W E A R U R W O R L D ( 6 th S E N S E ) MIRROR The usage of the mirror is significant as the projector dangles pointing downwards from the neck. SMART PHONE A Web-enabled smart phone in the user’s pocket processes the video data Oth- er software searches the Web and interprets the hand gestures COLOR MARKERS  It is at the tip of the user’s fingers .  Marking the user’s fingers with red, yellow, green, and blue tape helps the webcam recognize gestures.  The movements and arrangements of these makers are interpreted into gestures that act as interaction instructions for the projected application interfaces. HOW IT WORKS  The hardware that makes Sixth Sense work is a pendant like mobile wearable interface  It has a camera, a mirror and a projector and is connected wirelessly to a Bluetooth smart phone that can slip com- fortably into one’s pocket 6
  13. 13. October 2010  The camera recognizes individuals, images, pictures, gestures one makes with their hands Information is sent to the Smartphone for processing  The downward-facing projector projects the output image on to the mirror  Mirror reflects image on to the desired surface  Thus, digital information is freed from its confines and placed in the physical world. SOME EXAMPLE APPLICATIONS ADVANTAGES  Portable  Supports multi-touch and multi-user interaction  Cost effective  It is an open source Reference: http://www.freshcreation.com/entry/sixth_sense_technology/ http://theviewspaper.net/sixth-sense-technology-will-revolutionize-the-world/ http://www.ted.com/talks/pattie_maes_demos_the_sixth_sense.html http://gizmodo.com/5167790/sixth-sense-technology-may-change-how-we-look-at-the-world-forever http://boingboing.net/2009/11/12/sixth-sense-technolo.html 7
  14. 14. October 2010MICROSOFT SQL SERVER 2008 By Mallica(3rd yr., CSE) Microsoft SQL Server is a relational model database server produced by Microsoft. Its primary query languages are T-SQL and ANSI SQL. The current version of file, document, spatial, etc. gration of the data visuali- SQL Server, SQL Server 2008 as well as perform search, zation products from Dun- was released (RTM) on Au- query, analysis, sharing, and das Data Visualization Inc., gust 6, 2008 and aims to synchronization across all which was acquired by Mi- make data management data types. crosoft. On the manage- self-tuning, self organizing, ment side, SQL Server 2008 and self maintaining with SQL Server includes includes the Declarative the development of SQL better compression fea- Management Framework Server Always On technolo- tures, which also helps in which allows configuring gies, to provide near-zero improving scalability. It en- policies and constraints, on downtime. SQL Server 2008 hanced the indexing algo- the entire database or cer- also includes support for rithms and introduced the tain tables. The version of str uc tur ed a nd se mi- notion of filtered indexes. It SQL Server Management structured data, including also includes Resource Gov- Studio included with SQL digital media formats for ernor that allows reserving Server 2008 supports Intel- pictures, audio, video and resources for certain users or liSense for SQL queries other multimedia data. In workflows. It also includes against a SQL Server 2008 current versions, such multi- capabilities for transparent Database Engine. SQL Serv- media data can be stored encryption of data (TDE) as er 2008 also makes the da- as BLOBs (binary large ob- well as compression of tabases available via Win- jects), but they are generic backups SQL Server 2008 dows PowerShell providers bit streams. Intrinsic aware- supports the ADO.NET Entity and management function- ness of multimedia data will Framework and the report- ality available as Cmdlets, allow specialized functions ing tools, replication, and so that the server and all to be performed on them. data definition will be built the running instances can SQL Server 2008 can be a around the Entity Data be managed from Windows data storage backend for Model. SQL Server Reporting PowerShell. different varieties of data: Services will gain charting XML, email, time/calendar, capabilities from the inte- Performance Data Collector Performance Data Collector time consuming one. To Overcome By using this feature you are gettingis one of the new features that’s this MS has added Performance data the data in standard format and stor-accompanied from SQL Server collector feature in SQL 2008. In a ing it in relational format, so it will be2008. It’s very hard to get perfor- Nutshell performance data collector easy to correlate the data. Moreovermance data from necessary in- will collect performance dataputs. We will get the data from (integrating all your data from your it will allow the data to be stored inPerfmon (system monitor), profil- server), upload it in centralized man- centralized server so you can queryer, DMV etc and correlating this agement data warehouse (MDW) in the single server to see reports of alldata is very hard, implementing relational format and finally allows your server in single locationthe same process or scripts you to see reports in graphical for-across your environment is also mat. 8
  15. 15. October 2010AvailabilityThis feature is available in the following editions of SQL 2008 and SQL 2008 R2 Datacentres (only for R2) Enterprise Standard Web WorkgroupData CollectorBefore we stepping into configuring Data collector service, we need to configure a centralizedserver to store these data. Let’s configure the centralized server no Connect to the server, Ex-pand Management folder and right click on “Data Collection” and click on “Configure Manage-ment Data Warehouse Configuring Centralized Server for Data CollectorInitialization Process Click next on the welcome screen In this window you have the option for config- uring the centralized server. Select “ Create or upgrade a management data warehouse “ op- tion and click “next” In this window it will choose your local server as cen- In this window you will be providing necessarytralized server and you have the option to select the data- permissions to the logins to view or modify data.base. Either you can use the existing database or you can You can click on individual login and select the rolecreate a new one. To create new database click on new for that login and click ok. It’s not mandatory to setbutton, a new database creation window will be popped the permissions now you can also set it later.up. 9
  16. 16. October 2010 Role Name Role Description mdw_admin Has both reader and writer permissions mdw_reader Provides read access only to view reports mdw_writer Provides permission to modify and upload data to MDW At last it will show the summary descrip- Configuring Data collector in instance tion , if you find everything correct then Connect to the server, expand management folder and click on finish to configure the centralized right click on “Data Warehouse” as shown above. data warehouse server. Now it’s time to configure data collector at instance Version Details Captured level since centralized server is configured and ready to accept data. Pass the welcome screen.  Disk Usage  Query Statistics Select "Set up data collection” in this window to config- SQL Server 2008  Server Activity ure data collector. It will capture the following details into the DB  Disk Usage SQL Server 2008 R2  Query Statistics  Server Activity  Utility Information Once information is provided you will be shown with the summary details of the config- uration you have chosen. If you found it’s cor- rect just click on Finish button In this window select the centralized server and the data warehouse db. In this case it’s SAGAR- LAPTOP and Data Collection database. You can Reference find one more option here and it’s cache directo- ry, this will allow the data to be cached to the SQL SERVER 2005 students guide—NIIT folder and uploading it later. Data collector works in two modes as follows 10
  17. 17. BETTER SAFE THAN SORRY (WIFI NETWORK SECURITY)! -By K.Gautam(3rd yr,CSE)So you have finally worked your way past all the Network jargons of Ip addresses, SSIDs, access points…etc.and got your Wi-Fi network up and running, now you may think you are in the clear but you are far from itunless you have set up some sort of security on your wireless network.So here is a list of a few techniques that hackers use to get into your wireless network, and how to safeguardyourself.1. SniffingThis is the most simple of all the attacks, simply put an unsecured wireless network can be easily interceptedand the attacker can easily obtain almost all of your information. This is mainly caused by people with “Thiswon’t happen to me” attitude.The solution: The simplest attack has the simplest solution; just make sure you secure your network withsome sort of encryption and a password. 11
  18. 18. 2. SPOOFING network with a stronger wireless signal and a copied SSID (Access So you’ve setup your Wi-Fi net- point name) in the same area as a work you may notice that the legitimate network. This causes computer no longer asks which unsuspecting computers to auto- network to connect to , it just matically connect to the spoofed automatically connects .This very network instead of the real one. convenient feature is the basis of the spoofing attack . Hackers often attack a wireless network by simply creating a new 3. Encryption Cracking This the most difficult attack , hackers try to crack your wireless net-Conclusion work password by a combination of different techniques ,and as en- cryption keys become more advanced, hackers also increase their skills and develop new tools for penetrating even well protected wireless net- works. There are numerous ways to crack a wireless network’s encryption, but even simplistic methods can work. The website WPA Cracker, for exam- ple, can be used to hit a network with a brute force dictionary attack that simply throws random wordsThese are the most commonmethods for hacking into a at a secured wireless network to trywireless network, but there and crack it. This method can takeare other methods too, a long time, and sometimes re- quires luck on the hacker’s part, butAnd new methods are beingfound everyday so it’s very it is often effectivedifficult to be a 100% safe.That is the bad news; the The first step in protecting yourself from this kind of attack is to usegood news is that unless you WPA encryption or a combination of WPA & AES. WEP, the older en-happen to be the CEO of a cryption technology, has been completely de-constructed by hackersmulti-billion dollar Company and is now considered quite easy to crack.or the Chief Minister of a stateyou are very unlikely to be thetarget of such a sophisticated The second step is to use a long and completely random password /attempt to hack into your encryption key , these are really hard to remember but are very hardsystem. But still it’s better to and take a long time to crack.be safe than sorry, so simplesteps like using a long encryp- References :tion key can solve most secu-rity situations. Makeuseof.com Lifehacker.com Wikipedia.org engadget.com 12
  19. 19. October 2010 CLOUD COMPUTING By Nitin Goswami (3rd yr., CSE) the internet. Cloud computing pro- C loud computing is a model for enabling convenient ,on demand viders delivers a common online application which are accessed by other web services. The major cloud service provider - network access to a shared pool of Microsoft, Google, sales force ,IBM resources, such as networks, storage, etc. Applications and services that can be rapidly provisioned and released with minimal management effort or service provider. Cloud computing provides a new supplement , con- sumption and delivery model for it services based on internet. The term cloud is used as a metaphor for Architecture Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over application programming interfaces, usually web services.Need for cloud computing Key features To gain a competitive business Agility improves with users ability to rapidly and inexpensively re-edge ,small and medium scale provision technological infrastructure resources.enterprises ,which have a workforce of 10 to 15 employees or Cost is claimed to be greatly reduced and capital expenditure is convert-more need to have an it infra- ed to operational expenditure. This ostensibly lowers barriers to entry, asstructure that is scala- infrastructure is typically provided by a third-party and does not need toble ,reliable and efficient as be purchased for one-time or infrequent intensive computing tasks. Pric-that of large scale enterprises. ing on a utility computing basis is fine-grained with usage-based optionsSmes face various issues in and fewer IT skills are required for implementation (in-house).terms of cost and knowledgefor setting up such a large en-terprise network. There- Device and location independence enable users to access systemsfore ,both smes and large en- using a web browser regardless of their location or what device they areterprises came up with the using (e.g., PC, mobile). As infrastructure is off-site (typically providedsolution of new concept of by a third-party) and accessed via the Internet, users can connect fromcloud computing.in cloud com-puting the customer need not anywhere .have to invest in the physicalinfrastructure instead they canconsume the resources as a Multi-tenancy enables sharing of resources and costs across a largeservice on demand. They can pool of users thus allowing for:pay only on the usage basis.  Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)  Peak-load capacity increases (users need not engineer for highest possible load-levels) Utilization and efficiency improvements for systems that are often only 10–20% utilized. 13
  20. 20. October 2010 Service providers Google It offers various cloud computing services that come in form of Google app, which is a saas cloud computing service. Google app provides a fully integrated applica- tion environment that enables a user to host their own web applica- tion. Google provides fol- lowing web applications like- Gmail for messagingCaption describing picture or graphic Gtalk for instant mes- saging and voice over in- ternet Google docs for docu- ment sharingReliability is improved if multiple redundant sites are used, whichmakes well designed cloud computing suitable for business continuityand disaster recovery. Nonetheless, many major cloud computing ser-vices have suffered outages, and IT and business managers can at timesdo little when they are affected.Scalability via dynamic ("on-demand") provisioning of resources on afine-grained, self-service basis near real-time, without users having toengineer for peak loads. Performance is monitored, and consistent andloosely coupled architectures are constructed using web services as thesystem interface. One of the most important new methods for overcom-ing performance bottlenecks for a large class of applications is data par-allel programming on a distributed data grid.Maintenance cloud computing applications are easier to maintain,since they dont have to be installed on each users computer. They areeasier to support and to improve since the changes reach the clientsinstantly.Metering cloud computing resources usage should be measurable andshould be metered per client and application on daily, weekly, monthly,and annual basis. This will enable clients on choosing the vendor cloudon cost and reliability (QoS) 14
  21. 21. October 2010Microsoft complexity of security is greatly MS has developed win- Security could improve due to increased when data is distribut-dows azure platform centralization of data, increased ed over a wider area and / or(azure) which is an inter- security-focused resources, etc., number of devices.net-scale cloud services but concerns can persist aboutplatform. Subscribing to loss of control over certain sensi- tive data, and the lack of securityazure ,a user need not for stored kernels. Security is of-buy the software / ten as good as or better than un-applications for develop- der traditional systems, in parting the customized appli- because providers are able to de-cations for its customers, vote resources to solving securitythereby reduces the cost. issues that many customers can-Microsoft also offers not afford. Providers typically logcloud applications ready accesses, but accessing the audit Cloud Computing Modelsfor use by customers logs themselves can be difficult orsuch as windows live, Mi- impossible. Furthermore, thecrosoft dynamics, otheronline services. Software as Service Infrastructure as a service The iaas model enables a user to The saas model enables a user use it infrastructure such as hard- to use the software or applica- ware, storage, networking as a ser- tion as a service on demand by vice. The various service that are using the internet. provided by iaas are amazon ec2,gogrid etc. Growth of cloud computing Platform as a service The paas model enables a Thus ,cloud computing is an user to use a hosting envi- emerging technology which is ronment for their applica- increasing in present scenario tions. The various services that will enable user ,small that are provided by the scale enterprises as well as paas model are Ap- large scale enterprise to attain pExchange, Facebook, ama- a huge profit in terms of cost zon web services ,windows and infrastructure. Hats why azure platform and Google cloud computing is being app engine. called as Next generation computing Reference: Cloud computing – next generation computing environment student guide. 15
  22. 22. October 2010 Wireless LAN Security By Monika(3rd yr,CSE) MAC Filtering One issue with corporate wireless networks in general, and WLANs in particular, involves the need for security. Many ear- In computer network- ing, MAC Filtering (or ly access points could not discern whether or not a particular user EUI filtering, or layer had authorization to access the network. Although this problem re- 2 address filtering) re- flects issues that have long troubled many types of wired networks (it fers to a security access control methodology has been possible in the past for individuals to plug computers into whereby the 48-bit ad- randomly available Ethernet jacks and get access to a local network), dress assigned to this did not usually pose a significant problem, since many organiza- each network card is used to determine access tions had reasonably good physical security. However, the fact that to the network. radio signals bleed outside of buildings and across property lines MAC addresses are makes physical security largely irrelevant to Piggy backers. Such cor- uniquely assigned to each card, so using MAC porate issues are covered in wireless security. filtering on a network permits and denies net- work access to specific Security Options devices through the use of blacklists and white lists. While the re- There are three principal ways to secure a wireless network. striction of network ac- cess through the use of For closed networks (like home users and organizations) lists is straightforward, the most common way is to configure access restrictions in the access an individual person is not identified by a MAC points. Those restrictions may include encryption and checks address, rather a device on MAC address. Another option is to disable ESSID broadcasting, only, so an authorized making the access point difficult for outsiders to detect. Wireless In- person will need to have trusion Prevention Systems can be used to provide wireless LAN se- a white list entry for curity in this network model. each device that he or she would use to access the network. For commercial providers, hotspots, and large organiza- While giving a wireless tions, the preferred solution is often to an open and unencrypted, but network some additional completely isolated wireless network. The users will at first have no protection, MAC Filter- access to the Internet nor to any local network resources. Commercial ing can be circumvented by scanning a valid MAC providers usually forward all web traffic to a captive portal which (via airodump-ng) and provides for payment and/or authorization. Another solution is to then changing the own require the users to connect securely to a privileged network us- MAC into a validated ing VPN. one. This can be done in the Windows Registry or by using command line Wireless networks are less secure than wired ones; in tools on a Linux plat- many offices intruders can easily visit and hook up their own com- form. puter to the wired network without problems, gaining access to the network, and its also often possible for remote intruders to gain ac- cess to the network through backdoors like Back Orifice. One general solution may be end-to-end encryption, with independent authenti- cation on all resources that shouldnt be available to the public. Reference www.wardrive.net www.sans.org/reading_room/../wireless-lan-security-issues-solutions_1009 16
  23. 23. October 2010 Google’s Web Browser By V.Vinoth, D.Ashok kumar(3rd yr,CSE) Chrome the web browser from Google is touted to be the fastest web browser . It is based on the open source Chromium project . It uses the Web kit Layout engine and the V8 JavaScript engine . The first public stable release was on 11 December 2008. Today chrome is the third most widely used web browser after Firefox. Development Chrome was assembled from 25 different code libraries from Google and third parties such as Mozillas Netscape Portable Runtime, Network Security Services, NPAPI, as well as SQLite and a number of other open-source projects. The JavaScript virtual machine was considered a sufficiently important project to be split off. Chrome was one of the first browsers to include support for HTML 5. Features Tabs and Stability Incognito Mode: Chrome is a process based web browser, i.e. each tab open as an individual process, Chrome is one of the few brows- so if one of the tabs crash the whole widow does not crash and the other tabs can ers in which the private browsing remain working mode is totally separate from the normal mode operation. Both Security: windows can be simultaneously Chrome will show you a warning message when visiting a site that is suspected of used and they operate separately. containing malware or phishing. Incognito is the private browsing A phishing attack takes place when someone masquerades as someone else to trick mode, where all records like his- you into sharing personal or other sensitive information with them, usually through tory, downloads , etc. are not a fake website. Malware, on the other hand, is software installed on your machine saved not beyond the current often without your knowledge, and is designed to harm your computer or session. potentially steal information from your computer. Sandboxing helps prevent malware from installing itself on the computer or using what happens in one browser tab to affect what happens in another. The sandbox adds an additional layer of protection to your browser by protecting against malicious web pages that try to leave programs on your computer, monitor your web activities, or steal private information from your hard drive Automatic web page translation Starting with Google Chrome 4.1 the application added a built-in translation bar Reference : using Google Translate. Translation is currently available for 52 languages http://www.google.com/chrome . Omni bar http://chrome.blogspot.com/ http://en.wikipedia.org/wiki/ This is one of the best features if chrome , instead of having a separate box for Google_Chrome searching and for the URL , chrome combines both for usability and speed. 17
  24. 24. October 2010 Computer Security By Akash Goswami(3rd yr,CSE) It is a dangerous world, even for the computers that sit in our offices. Bad things can happen. Some bad things happen because computers are pieces of machinery. Parts can break, wear out, choke on dust and dirt, or simply quit working for mysteri- ous reasons. That’s why the smart computer user frequently backs up all the critical data on the hard drives. Programs can be reinstalled, but membership lists, financial records, congregation council minutes, and other data have to be saved in several places to avoid disaster. Computers are pieces of machinery, and they will fail. Viruses Spam BX316.dll. Fatal opera- the past month and tion error.” leaves the computer and More A virus has wormed its on. Someone else way from the council sec- walks by and finds the But there are other retary’s disk to the giving records of threats to church com- church’s computer. members displayed on puters. Here’s another problem the screen. The temp- Consider this. Your scenario. This time the tation is strong to church council secretary disk inserted by the scroll through and see rushes in one hour before council secretary isn’t just whether Mrs. Hob- the monthly meeting. “I infected. But after saving son is as generous as didn’t have time to print the minutes, he decides she says she is. out the minutes,” he says, to do a little web surfing Casual use of church pulling a floppy disk out of while waiting for the computers can destroy his pocket. “And I need to printout. He checks the information, get the make one final correc- trash pickup days at the church on spammers’ tion.” He inserts the disk town’s Web site, then lists, and create pasto- into the church’s comput- follows a link about recy- ral problems. er and finishes the work cling. This leads him to a so that the council can couple of additional sites. have the corrected Then he signs off, after minutes. sending a quick e-mail to The next morning the of- a colleague at work fice secretary turns on the about tomorrow’s lunch- computer. The disk drives eon meeting. whirr and whirr, but noth- Before long, the church’s ing comes up on the e-mail inbox is crammed screen. Or she boots the with spam; strange, of- computer, calls up the fensive, and unwanted monthly income report missives from places with and the computer shuts weird names. down, displaying the One more horror story. dreaded “blue screen of The financial secretary death” with the message checks the spread sheet “unable to retrieve showing the income for 18
  25. 25. October 2010 COMPUTER SECURITY How to Protect It is not hard to protect an anti-virus program server from unauthorized church computers first to make sure it is not use. from most of these infected. There is a dark side to problems. Everyone who uses computer security, for it Access to the computers church computers means that we have to must be restricted. Sec- should be instructed to think about whether retaries and others au- avoid casual Web surf- church computer users thorized to use the ing. Build a list of neces- will do unacceptable or church computers sary sites — the ELCA dangerous things. We should be required to and synod Web sites, don’t like to operate on sign on with passwords local agencies, and oth- the basis of suspicion. and instructed not to let er places useful to the But the goal of computer anyone else use their congregation’s work and security is to protect the password. known to be safe to visit. church’s equipment and “Drop-in” use by church Enforce the no-surfing data and preserve the officers or members policy. There are numer- confidentiality of neces- should be prohibited, ous stories about occa- sary records. Churches unless the church has a sions when people em- should develop a poli- separate computer for barrassed themselves, cy on who uses their that purpose, not linked their employers, and computers and for with any critical office their churches by inap- what reasons. This can machine. propriate use of the protect data from vi- Computers that are computer. ruses and other en- online should be protect- You might want to install croachments and ed with a “firewall” that a filter or program that avoid the serious prob- offers some protection monitors online usage to lems that can occur if against known viruses spot potential problems. someone uses the and “worms” that hide in Access to critical and church computer for e-mail and on internet confidential data should unauthorized purposes sites. Norton Utilities® be protected by a double and similar programs password, and all au- can keep out many vi- thorized users should be ruses; but the programs instructed on how to ac- must be purchased, in- cess the data without stalled, and maintained inadvertently leaving it to keep the list of virus open to others. infections updated. This If churches use “servers” usually requires an an- to store data and make it nual subscription. accessible from several If it is necessary to insert sites, you might need a “foreign” disk in a the advice of a computer church computer, it specialist to protect the should be scanned by Reference: http://en.wikipedia.org/wiki/Computer_security http://www.unixtools.com/security.html http://communications-solutions.com/security/computer-security-guide 19
  26. 26. October 2010 VIRTUALITY By sumit banerjee (be.cse.3rd yr) The word virtual refers to not being realApplication of VR it’s the presentation of reality or imagina-The range of possible VR tion. Previously it was only the part of peo-application is vast and var- ple’s thinking but as the development ofied. Here are just a few the technology virtuality took the wideexample of projects carried part in creation & development of whatout recently in developmentat the CRVM that really exist in world or only in imagi- nation.Industrial application-Design studies VIRTUAL REALITY-computer Aided design-Ergonomic validation Virtual reality (VR) it’s a term or technology that basically defined as computerizedResearch application simulated environment that can simulate places in the real as well as imaginary-Behavioral sciences: mod- worlds. Two major aspects of VR are:eling human behavior bymanipulating sensory infor- 1) Visualization is immersive, since the goal is to give the User the sensationmation. of being really in virtual world.-psycho-pharmacological 2) The user is able to interact in “real-time” with this environment.research User can interact with a virtual environment either through the use of standard in-Teaching Applications put devices such as a keyboard and mouse or through multimodal devices such as-Teaching and learningaids: visualization and vir-tual explo- Terms supporting virtual realityration of our solar system,virtual reconstruction and There are many devices that are use for virtual sensation like 3D visualization,visits of ancient architec- holography, virtual caves, etc.tural sites.-scientific visualization 3D visualizationTherapeutic application-Cyber-therapy: treatment The 3D visualization can be more easily understand by taking 3D films in ac-of phobias, depression, count.anxiety where patient arekept in virtual environ- A 3D film or S3D (stereoscopic 3D) film is a motion picture that enhances the illu-ment to relax there brain. sion of depth perception. Derived from stereoscopic photography, a special mo--Motor-therapy through tion picture camera system is used to record the images as seen from two per-sport: Virtual squash where spectives and special projection hardware and/or eyewear are use to provide thethe ball speed is matched to illusion of depth when viewing.the patient’s disability. 20
  27. 27. October 2010 VirtualityTechnique used in 3D view New system without glasses There is increasing Anaglyph images were ing filters oriented differ- emergence of new 3Dthe earliest method of ently. As each filter pass- viewing systems whichpresenting theatrical 3D. es only that light which is do not require the use of similarly polarized andNow polarization system special viewing glasses. blocks the light polarizedis used to present a stere- They are referred to differently each eye seesoscopic motion picture, a different image. Since As Auto stereoscopichere two images are pro- no head tracking is in- LCD displays.jected superimposed onto volved, the entire audi-the same screen throughdifferent polarizing fil- ence can view the stereo- Technology scopic images at the sameters. The viewer wears timeeyeglasses which also A lifelike visual display iscontain a pair of polariz- created by projectors VR caves positioned outside the Holography It is an immersive vir- cave and controlled by physical movements tual reality environ- It is a technique that from a seer inside the ment where the projec- allows the light scat- cave. Stereoscopic LCD tors are directed to tered from an object to shutter glasses convey a three, four, five or six be recorded and later 3D image. The comput- of the walls of a room- reconstructed so that it ers rapidly generate a sized cube where a appears as if the object pair of images, one for viewer contemplates is in the same position each of the user’s eye. relative to recording perception, reality and The glasses are synchro- illusion. medium as it was when nized with the projectors recorded. The image so that each eye only sees changes as the position Application the correct image. and orientation of the viewing system chang- The caves are currently being used in a es in exactly the same variety of fields. way as if the object were still present, thus -many engineering companies use CAVEs Visual effect making the recorded to enhance product development. image appears three Visual effects (commonly shortened to -prototype of parts can be created and dimensional. Visual F/X or VFX) are the various tested processes by which imagery is created It has a wide range of and/or manipulated outside the context -Factory layout can be simulated application. of a live action shoot. Visual effects often -In gaming involve the integration of live-action foot- age and computer generated imagery (CGI) in order to create environments which look realistic, but would be dan- gerous, costly, or simply impossible to capture on film. They have become in- creasingly common in big-budget films, and have also recently become accessible to the amateur filmmaker with the intro- duction of affordable animation and compositing software. 21
  28. 28. October 2010 VirtualityChroma key compositing Chroma key compositing (or weather forecast broadcasts, video. This also works for greenChroma keying) is a technique wherein the presenter appears to screens, since blue and green arefor compositing two images or be standing in front of a large considered the colors least like skinframes together in which a color map, but in the studio it is actu- tone. This technique is also used in(or a small color range) from one ally a large blue or green back- the entertainment industry, theimage is removed (or made ground. The meteorologist stands iconic theatre shots in Mystery Sci-transparent), revealing another in front of a blue screen, and ence Theater 3000, for exampleimage behind it. This technique then different weather maps areis also referred to as color key- added on those parts in the im-ing, color-separation over- age where the color is blue. If thelay (CSO; primarily by the meteorologist himself wears blueBBC), green screen, and blue clothes, his clothes will becomescreen. It is commonly used for replaced with the background Virtual world manipulate elements of sure activities. Commu- A virtual world is a nication is usually textu- genre of online commu- the modeled world and thus experien ces al, with real-time voice nity that often takes the communication using form of a computer- telepresence to a cer- tain degree. Such mod- VOIP also possible. based simulated envi- Virtual worlds are not ro nment , t h ro u gh eled worlds may appear similar to the real world limited to games but, which users can inter- act with one another or instead depict fanta- depending on the degree and use and create ob- sy worlds. The model of immediacy presented, jects .Virtual worlds are world may simulate can encompass computer intended for its users to rules based on the real conferencing and text inhabit and interact, world or some hybrid fantasy world. Example based chat rooms. Some- and the term today has become largely synony- rules are gravity, topog- times, emoticons or mous with interactive raphy, locomotion, real smiles are available, to 3D virtual environ- -time actions, and com- show feeling or facial ex- ments, where the users munication. Communi- pression. Emoticons of- take the form of avatars cation between users has ranged from text, ten have a keyboard visible to others graph- graphical icons, visual shortcut. Edward Castro cave. Stereoscopic LCD ically. These avatars are usually depicted as tex- gesture, sound, and nova is an economist who shutter glasses convey a tual, two-dimensional, rarely, forms using has argued that 3D image. The comput- or three-dimensional touch, voice command, ers rapidly generate a "synthetic worlds" is a graphical representa- and balance senses. better term for these cy- pair of images, one for tions, although other Massively multiplayer online games common- berspaces, but this term each of the user’s eye. forms are possible (auditory and touch ly depict a world very has not been widely The glasses are synchro- sensations for exam- similar to the real adopted. nized with the projectors ple). Some, but not all, world, with real world so that each eye only sees virtual worlds allow for rules and real-time ac- A lifelike visual display is the correct image. multiple users. tions, and communica- created by projectors The computer accesses tion. Players create a positioned outside the a computer-simulated character to travel be- cave and controlled by world and presents per- tween buildings, towns, and even worlds to car- physical movements ceptual stimuli to the user, who in turn can ry out business or lei- from a seer inside the 22
  29. 29. October 2010 Virtuality Virtual world concepts One perception of virtual As virtual world is a fairly example). worlds requires an online persis- vague and inclusive term, the tent world, active and available Massively multiplayer online 24 hours a day and seven days a real-life games or MMORLGs, week, to qualify as a true virtual the user can edit and alter their world. Although this is possible avatar at will, allowing them to with smaller virtual worlds, es- play a more dynamic role, or pecially those that are not actu- multiple roles. ally online, no massively multi- player game runs all day, every day. All the online games listed Virtual worlds are well-known above include downtime for as being fantasy spaces sealed maintenance that is not included as time passing in the virtual off from the real world, but world. While the interaction more careful analysis reveals with other participants is done that the boundaries between the in real-time, time consistency is above can generally be divided real and virtual worlds are quite not always maintained in online along a spectrum ranging from: porous. virtual worlds. For example, Ev- Massively multiplayer online role -playing games or MMORPGs Reference : er Quest time passes faster than real-time despite using the same where the user playing a specific http://virtualityconference.it/ calendar and time units to pre- character is a main feature of the game (World Of War craft for http://en.wikipedia.org/wiki/Virtual_reality sent game time. Do You Know? 1. The human heart creates enough pressure while 15. The ant can lift 50 times its own weight, can pull pumping to squirt blood 30 feet. 30 times its own weight and always falls over on its 2. On average people fear spiders more than they do right side when intoxicated. death. 16. Polar bears are left handed. 3. The strongest muscle in the body is the TONGUE. 17. The catfish has over 27,000 taste buds, that 4. it’s impossible to sneeze with your eyes open. makes the catfish rank #1 for animal having the most taste buds. 5. Americans on the average eat 18 acres of pizza every day. 18. The flea can jump 350 times its body length, that is like a human jumping the length of a football 6. Did you know that you are more likely to be killed field. by a champagne cork than by a poisonous spider? 19. Butterflies taste with their feet. 7. Right-handed people live, on average, nine years longer than left-handed people do. 20. It is impossible to sneeze and keep ones eyes open at the same time. 8. In ancient Egypt, Priests plucked EVERY hair from their bodies, including their eyebrows and eyelashes. 21. Elephants are the only animals that cant jump. 9. The dot on top of the letter i is called a tittle. 22. A cats urine glows under a black light. 10. A "hairbreadth away" is 1/48 of an inch. 23. An ostrichs eye is bigger than its brain. 11. The word four has four letters. In the English lan- 24. Cockroaches can change course as many as 25 guage there is no other number whose number of let- times in one second, making them the most nimble ters is equal to its value. animals known. 12. The king of hearts is the only king without a mous- 25. Mosquitoes do not bite. They stab. A mosquito tache. has no jaws, hence when attacking a victim; it pierc- es it with its long proboscis and sucks the blood up 13. No piece of square dry paper can be folded more through its nasal tube. than 7 times in half. 26. Starfishes havent got brains. 14. A crocodile cannot stick its tongue out. By Monika (1st yr,CSE) 23
  30. 30. October 2010 PUZZLES -by Mallica(3rd yr,CSE) 1. Can you find four numbers such that the sum of every two and sum of all four may be perfect squares? 2. A cubic object 3"*3"*3" is painted blue on all the outside cubic surfaces ,including the top and bottom .if the cube is cut into 27 cubes of 1"*1"*1".how many 1" cubes do have any painted surfaces? 3. How can you make a total of 1,000 by using sixteen 4s? 4. The shape shown in sketch below is a square attached to half of another similar square ,divided diagonally: 5. How will you write 31 using only digit 3 five times? 6. A man decided to drive through the city and on the first day he did only 7 miles. On the last day he did 51 miles ,increasing his journey 4 miles each day. How many days did he travel and how far? 7. Which would you say is heavier, a pound of cotton or a pound of gold? 8. There is a number which is very peculiar, this number is three times the sum of its digits .Can you find the number? 9. There is a number ,the second digit of which is smaller than its first digit by 4,and if the number was divided by the digits sum ,the quotient would be 7. What will be the number? 10. There is a number which is greater than the aggregate of its third, tenth and twelth parts by 58.Find the number? MICROSOFT The Simplifier Chorus:-Nine-tenths of a gig, Am happy that you came into my life,Biggest ever seen, You made my world very bright;God, this program is big-- I don’t think I can ever live with out you,MS Word 15! Because you’re the backbone of my life;Comes on ten CDs, Stanza 1:-And requires--damn! You may not be the greatest by looks,Word is fine, but jeez-- But you are the most stunning creation;60 megs of RAM?! You may not be as strong as the Hercules,Oh! Microsoft, Microsoft, But you can solve the Herculean problems;Bloat ware all the way! Stanza 2:-Im installing Word You are the Centre point of my work;Since breakfast yesterday! You are a citizen of the world;Oh! Microsoft, Microsoft, Every one loves you very much,Moderation, please. As you simplify the problems of their world;Guess you hadnt noticed: Stanza 3:-Four-gig drives dont grow on trees! These days you’ve even started to think by yourself, -by NitinGoswami(3rd yr, CSE) Scaling new heights every now and then; I know it’s not hard to compete with you, But now I am in love with you; - Venkateshwar.R (3rd yr, CSE) 24

×