Thursday, November 25, 2010

Monday, November 22, 2010

Computer Science Notes

4. What is a scope resolution operator? explain
A scope resolution operator (::), can be used to define the member functions of a class outside the class.

5. What do you mean by inheritance?
1).Inheritance is the property by which one class can acquire the properties of objects of another class.
2).Inheritance is the process of creating a new class called derived class from the existing class called base class.
3).Inheritance is the process of creating new classes, called derived classes, from existing classes or base classes. The derived class inherits all the capabilities of the base class, but can add embellishments and refinements of its own.

6. What is difference between polymorphism. Explain with example.
"Poly" means "many" and "morph" means "form". Polymorphism is the ability of an object (or reference) to assume (be replaced by) or become many different forms of object.
Example: function overloading, function overriding, virtual functions. Another example can be a plus ‘+’ sign, used for adding two integers or for using it to concatenate two strings.

There are two types of polymorphisms. They are
1) Compile time Polymorphism
2) Runtime Polymorphism
In compile time polymorphism we have Function Overloading and Operator Overloading.
In Runtime polymorphism we have Virtual Functions and Dynamic Binding.


7. What is encapsulation?
1) Packaging an object’s variables within its methods are called encapsulation.
2) The wrapping up of data and member function into a single unit is called encapsulation.
3) The data is not accessible to the outside world and only those functions which are wrapped into a class can access it.
4)Encapsulation is the concept to binding of data and functions. The data members are allowed to access by appropriate class functions or methods. Data members can't access from outside class.

8. What is abstraction?
1)Abstraction is of the process of hiding unwanted details from the user.
2)Abstraction is separating the logical properties from implementation details. For example driving the car is a logical property and design of the engine is the implementation detail.
3)Data Abstraction is process of separating the logical properties from its implementation. (ADT)

9. What do you mean by inline function?
1)The inline functions are functions in a class with their function body.
2)When a function define the inside the body of the class is called Inline function or we can use just like general function only we add inline keyword in the function.
3) Inline function r used to tell the compiler to insert the code where the function call is made .It is upto the Compiler to decide whether to insert the code or not depending upon the code size and compiler optimized setting

10)what is difference between constructor and destructor
constructor destructor
1 Constructor is the member function of the class which has the same name as that of class and it is invoked whenever the class object is instantiated.
destructor is also the member function of same class name and has ~ operator when ever declared in the function and it is used to destruct the object which has been constructed ,whenever we want to destroy it
2 Constructor we can allocate memory. Destructor is used for deallocate(release) the memory.
3 Constructor have three type in c++ There is no type of destructor in c++
4 It call automatic first in program, when object is created. It call automatic in program at last.

Difference between "assignment operator" and a "copy constructor"
Copy constructor is called every time a copy of an object is made. When you pass an object by value, either into a function or as a function's return value, a temporary copy of that object is made.
Assignment operator is called whenever you assign to an object. Assignment operator must check to see if the right-hand side of the assignment operator is the object itself. It executes only the two sides are not equal.
Example.

Class A{/*...*/};

main()
{
A a;
A b = a; /* copy constructor will be called */
A c;
c = a; /* assignment operator will be called*/
}

Pass By Value example:
The function receives a copy of the variable. This local copy has scope, that is, exists only within the function. Any changes to the variable made in the function are not passed back to the calling routine. The advantages of passing by values are simplicity and that is guaranteed that the variable in the calling routine will be unchanged after return from the function. There are two main disadvantages. First, it is inefficient to make a copy of a variable, particularly if it is large such as an array, structure or class. Second, since the variable in the calling routine will not be modified even if that's what is desired, only way to pass information back to the calling routine is via the return value of the function. Only one value may be passed back this way.
Consider function void foo(int i);
int j=3;
foo(j);

Pass by Reference example:
C++ provides this third way to pass variables to a function. A reference in C++ is an alias to a variable. Any changes made to the reference will also be made to the original variable. When variables are passed into a function by reference, the modifications made by the function will be seen in the calling routine. References in C++ allow passing by reference like pointers do, but without the complicated notation. Since no local copies of the variables are made in the function, this technique is efficient. Additionally, passing multiple references into the function can modify multiple variables.
Consider function void foo(int& i);
int j=3;
foo(&j);

Pass by Pointer example:
A pointer to the variable is passed to the function. The pointer can then be manipulated to change the value of the variable in the calling routine. The function cannot change the pointer itself since it gets a local copy of the pointer. However, the function can change the contents of memory, the variable, to which the pointer refers. The advantages of passing by pointer are that any changes to variables will be passed back to the calling routine and that multiple variables can be changed.
Consider function void foo(int* i);
int j=3;
int* p=&j;
foo(p);
if you look at pass by ref & pass by pointer it is almost the same but in pass by pointer you can do pointer arithmetic operation whereas in ref you cannot.

11)In c++ have a default constructor ?
1) Yes C++ does have a default constructor provided by the compiler.In this case all the members of the class are initialized to null values.These values act as the default values.For eg: MyClass me;In the above case since the object is not initialized to any value so the default constructor will be called which will initialize the class with the default values.
2) Yes C++ does have a default constructor provided by the compiler.In this case all the members of the class are initialized to null values.These values act as the default values.For eg: MyClass me;In the above case since the object is not initialized to any value so the default constructor will be called which will initialize the class with the default values.
3) yes, In C++ we have a default constructor.
A "default constructor" is a constructor that can be called with no arguments. One example of this is a constructor that takes no parameters
class Fred {
public:
Fred(); // Default constructor: can be called with no args
...
};

12)Why array index starts from 0[zero] only?
1) This boils down to the concept of Binary digits. Take an array size of 64 for example. We start from 0 and end at 63. We require 6 bits.But, if we were to start from 1 and end at 64, we would require 7 bits to store the same number, thus increasing the storage size.
2)Because the name of an array is actually a pointer to the first element of this array in memory :array[0] is equivalent to *arrayarray[1] is equivalent to *(array + 1)...array[i] is equivalent to *(array + i)

3)C++ compilers are build such that. so array index always starts with 0.

13) What is memory leaking in c++ ?
1)Memory leak is - dynamically allocating memory and forgeting to free it. In C++, using a new operator to allocate a chunk of memory, and forgetting to delete it. There are several reasons this could occur. Some of them are,
1. Allocate a chunk of memory and assign the starting address to a pointer variable, and later, reassing another address to the same pointer without freeing its original address
2. Allocate memory for an array and not using proper delete method (delete[]) to free the memory
3. Unhandled exceptions - allocating memory and deleting it at the end of the program, but the program abnormally terminates (crashes) before the delete code line is executed.
2).Memory leak actually depends on the nature of the program. memory leaking means u store some data in memory but u forget the address of the block E.g
int *i = new int[2000]
delete i
u delete the address of the memory not hole memory
block

14) What is the difference between macro and inline()?
1. Inline follows strict parameter type checking, macros do not.
2. Macros are always expanded by preprocessor, whereas compiler may or may not replace the inline definitions.
3. Inline functions are similar to macros because they both are expanded at compile time, but the macros are expanded by the preprocessor, while inline functions are parsed by the compiler. There are several important differences: • Inline functions follow all the protocols of type safety enforced on normal functions. • Inline functions are specified using the same syntax as any other function except that they include the inline keyword in the function declaration. • Expressions passed as arguments to inline functions are evaluated once. In some cases, expressions passed as arguments to macros can be evaluated more than once.
15) What is difference between # define amd macro?
#define
The #define directive takes two forms: defining a constant and creating a macro.
Defining a constant
#define token [value]
When defining a constant, you may optionally elect not to provide a value for that constant. In this case, the token will be replaced with blank text, but will be "defined" for the purposes of #ifdef and ifndef. If a value is provided, the given token will be replaced literally with the remainder of the text on the line. You should be careful when using #define in this way; see this article on the c preprocessor for a list of gotchas.
Defining a parameterized macro
#define token( [, s ... ]) statement
For instance, here is a standard way of writing a macro to return the max of two values.
#define MAX(a, b) ((a) > (b) ? (a) : (b))
Note that when writing macros there are a lot of small gotchas; you can read more about it here: the c preprocessor . To define a multiline macro, each line before the last should end with a \, which will result in a line continuation.

16) What is different between member function and function? Explain.
When function is inside in class so it called member function otherwise it called function.

17) What is type def and sizeof operator in c++?
sizeof Operator
The sizeof operator yields the size of its operand with respect to the size of type char.
Grammar
unary-expression:
sizeof unary-expression
sizeof ( type-name )
The result of the sizeof operator is of type size_t, an integral type defined in the include file STDDEF.H. This operator allows you to avoid specifying machine-dependent data sizes in your programs.
The operand to sizeof can be one of the following:
• A type name. To use sizeof with a type name, the name must be enclosed in parentheses.
• An expression. When used with an expression, sizeof can be specified with or without the parentheses. The expression is not evaluated.
When the sizeof operator is applied to an object of type char, it yields 1. When the sizeof operator is applied to an array, it yields the total number of bytes in that array, not the size of the pointer represented by the array identifier. To obtain the size of the pointer represented by the array identifier, pass it as a parameter to a function that uses sizeof
typedef Specifier
A typedef declaration introduces a name that, within its scope, becomes a synonym for the type given by the type-declaration portion of the declaration.
Typedef int n;

18) What is Meta class? explain.
A class is consist of data member, data function and constructor and destructor and have mode private , public and protected , these combination of so many thing are called Meta class.

19)What is difference between multilevel inheritance and multiple inheritance? explain
Multiple Inheritance : while a class has inherited more
than one classes then it is called multiple inheritance.

Multi-Level Inheritance : where a class can inherit only
one class. while a class has inherited a class and it is
being inherited by other class, this hierarchy is being
called as Multi-Level Inheritance.

20) What is relationship in classes ? how many type relationship in c++?
Relationship between classes is called inheritance. There are so many types …………

21)What is difference between data memberfunction and data members in c++?
Variable in class is called datamember and function in class is called datafunction.

22) Difference between base class and subclass in c++?explain
Which class is inherit is called base class and those inherit is called derived (subclass).

23) What is Actual parameter and formal parameter in c++?
Formal parameters are written in the function prototype and function header of the definition. Formal parameters are local variables which are assigned values from the arguments when the function is called.
When a function is called, the values (expressions) that are passed in the call are called the arguments or actual parameters (both terms mean the same thing). At the time of the call each actual parameter is assigned to the corresponding formal parameter in the function definition.

24)What is difference between Local & Global? explain
Local variable can access a particular area(limited areas). And global can access any where.
global call ::(scope revelation operator ), but local call directly.
Creation of global is out side of function but local create always in side of function.

25) What is static data members and static functions in c++?
Classes can contain static member data and member functions. When a data member is declared as static, only one copy of the data is maintained for all objects of the class.

26)What is the Difference between Macro and ordinary definition?
1. Macro takes parameters where as ordinary definition does not.
2. Based on the parameter values to macro it can result in different value at run time. Ordinary definition value remains same at all place at run time.
3. Macro can be used for conditional operations where as definition can not.
4. Using macro one can achieve inline functionality in C i.e. macro can be a function performing simple operations. This is not possible using definitions.

Saturday, July 17, 2010

Operating System

An operating system (OS) is a set of system software programs in a computer that regulate the ways application software programs use the computer hardware and the ways that users control the computer. For hardware functions such as input/output and memory space allocation, operating system programs act as an intermediary between application programs and the computer hardware, although application programs are usually executed directly by the hardware. Operating Systems is also a field of study within Applied Computer Science. Operating systems are found on almost any device that contains a computer with multiple programs—from cellular phones and video game consoles to supercomputers and web servers. Operating systems are two-sided platforms, bringing consumers (the first side) and program developers (the second side) together in a single market. Some popular modern operating systems for personal computers include Microsoft Windows, Mac OS X, and Linux.

Wednesday, June 2, 2010

Green Computing

Green computing is the environmentally responsible use of computers and related resources. Such practices include the implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste (e-waste).
Government regulation, however well-intentioned, is only part of an overall green computing philosophy. The work habits of computer users and businesses can be modified to minimize adverse impact on the global environment. Here are some steps that can be taken:
• Power-down the CPU and all peripherals during extended periods of inactivity.
• Try to do computer-related tasks during contiguous, intensive blocks of time,
leaving hardware off at other times.
• Power-up and power-down energy-intensive peripherals such as laser printers
according to need.
• Use liquid-crystal-display (LCD) monitors rather than cathode-ray-tube (CRT)
monitors.
• Use notebook computers rather than desktop computers whenever possible.
• Use the power-management features to turn off hard drives and displays after
several minutes of inactivity.
• Minimize the use of paper and properly recycle waste paper.
• Dispose of e-waste according to federal, state and local regulations.

Tuesday, April 27, 2010

BIOMETRICS

Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.
Biometric characteristics can be divided in two main classes:
• Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent.
• Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers[1] have coined the term behaviometrics for this class of biometrics.
Strictly speaking, voice is also a physiological trait because every person has a different vocal tract, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral.

Monday, March 29, 2010

Difference between Static RAM and Dynamic RAM

Your computer probably uses both static RAM and dynamic RAM at the same time, but it uses them for different reasons because of the cost difference between the two types. If you understand how dynamic RAM and static RAM chips work inside, it is easy to see why the cost difference is there and you can also understand the names.
Dynamic RAM is the most common type of memory in use today. Inside a dynamic RAM chip, each memory cell holds one bit of information and is made up of two parts: a transistor and a capacitor. These are, of course, extremely small transistors and capacitors so that millions of them can fit on a single memory chip. The capacitor holds the bit of information -- a 0 or a 1. The transistor acts as a switch that lets the control circuitry on the memory chip read the capacitor or change its state.

A capacitor is like a small bucket that is able to store electrons. To store a 1 in the memory cell, the bucket is filled with electrons. To store a 0, it is emptied. The problem with the capacitor's bucket is that it has a leak. In a matter of a few milliseconds a full bucket becomes empty. Therefore, for dynamic memory to work, either the CPU or the memory controller has to come along and recharge all of the capacitors holding a 1 before they discharge. To do this, the memory controller reads the memory and then writes it right back. This refresh operation happens automatically thousands of times per second.

This refresh operation is where dynamic RAM gets its name. Dynamic RAM has to be dynamically refreshed all of the time or it forgets what it is holding. The downside of all of this refreshing is that it takes time and slows down the memory.

Static RAM uses a completely different technology. In static RAM, a form of flip-flop holds each bit of memory . A flip-flop for a memory cell takes 4 or 6 transistors along with some wiring, but never has to be refreshed. This makes static RAM significantly faster than dynamic RAM. However, because it has more parts, a static memory cell takes a lot more space on a chip than a dynamic memory cell. Therefore you get less memory per chip, and that makes static RAM a lot more expensive.
So static RAM is fast and expensive, and dynamic RAM is less expensive and slower. Therefore static RAM is used to create the CPU's speed-sensitive cache, while dynamic RAM forms the larger system RAM space.

Thursday, March 25, 2010

Windows 7

Windows 7 is, as of March 2010, the latest version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs.Windows 7 was released to manufacturing on July 22, 2009, and reached general retail availability on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time.
Unlike its predecessor, which introduced a large number of new features, Windows 7 was intended to be a more focused, incremental upgrade to the Windows line, with the goal of being fully compatible with applications and hardware with which Windows Vista is already compatible. Presentations given by Microsoft in 2008 focused on multi-touch support, a redesigned Windows Shell with a new taskbar, referred to as the Superbar, a home networking system called HomeGroup, and performance improvements. Some applications that have been included with prior releases of Microsoft Windows, including Windows Calendar, Windows Mail, Windows Movie Maker, and Windows Photo Gallery, are not included in Windows 7; most are instead offered separately as part of the free Windows Live Essentials suite.

Monday, March 22, 2010

Software Engineering

Software engineering
Software engineering is the application of a systematic, disciplined, quantifiable approach to the development, operation, and maintenance of software, and the study of these approaches; that is, the application of engineering to software.
The term software engineering first appeared in the 1968 NATO Software Engineering Conference and was meant to provoke thought regarding the current "software crisis" at the time. Since then, it has continued as a profession and field of study dedicated to designing, implementing, and improving software that is of higher quality, more affordable, maintainable, and quicker to build. Since the field is still relatively young compared to its sister fields of engineering, there is still much debate around what software engineering actually is, and if it conforms to the classical definition of engineering. It has grown organically out of the limitations of viewing software as just computer programming.

Monday, March 15, 2010

Typing Etiquettes

Positioning the Keyboard
• The keyboard should be placed directly in front of the body to avoid twisting the neck and torso.
• The keyboard should be positioned in front of the computer monitor with the letters G & H approximately in line with your navel. This is particularly good positioning when doing a lot of keyboard work.
• The keyboard should be positioned according to the distance the forearms extend from the neutral position of the elbows by the side of the body.
Keyboard Height and Slope
• Arms should be parallel to the floor when placed gently on the keyboard. The seated elbow height should be a little higher than the height of the keyboard. Raise or lower the office chair to achieve this position.
• The slope of the keyboard should be as close to the flat position as possible. It is largely determined by what feels comfortable; however there should be a good straight alignment across the forearms, wrists and hands.
Providing a keyboard without a numeric pad can reduce the keyboard width and allow the mouse to be operated closer to the user.
Using a Keyboard Platform
• If a keyboard platform is used it should be large enough to accommodate both the keyboard and mouse on the same level.
• If the keyboard platform is not large enough the mouse tends to be placed on the desktop that is higher and further away. This will lead to excessive reaching while trying to operate the mouse.
Do Not Anchor the Wrists
• When typing, it is advisable to not anchor (rest) the wrists on the desk or a wrist rest. Resting the wrists while typing may be harmful because it encourages bending and holding static postures. It can also apply pressure to the underside of the wrists.
• A wrist rest is designed to provide support during pauses, when not typing (such as when reading from the screen). If using a wrist rest ensure that it is the same height as the front edge of the keyboard.
• Where possible, the feet at the rear of the keyboard should be kept in a lowered position to minimise the height and angle of the keyboard.

Wednesday, March 10, 2010

ENCRYPTION

ENCRYPTION

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).
Encryption has long been used by militaries and governments to facilitate secret communication. Encryption is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage.[1] Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers' personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) are another somewhat different example of using encryption on data at rest.
Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years.[2] Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks.
Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication code (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. There are a number of reasons why an encryption product may not be suitable in all cases. First, e-mail must be digitally signed at the point it was created to provide non-repudiation for some legal purposes, otherwise the sender could argue that it was tampered with after it left their computer but before it was encrypted at a gateway. An encryption product may also not be practical when mobile users need to send e-mail from outside the corporate network.

Monday, March 8, 2010

Why You Need To Update Your Computer Device Drivers?

Some people don’t have the habit of updating their computer drivers regularly. Actually, like Windows updates, it is necessary for you to update device drivers periodically. Because they are also important parts of a Windows system and have a great effect on PC performance.

What is Device Driver?

Device driver is a special system program which allows Windows system to connect with the device on a computer. Only with it, can Windows system give orders to a device and make the device implement operations. Without a driver, you will not be able to use your printer, camera, scanner or other hardware on your PC. You can see how important it is.

Why Need to Update Computer Drivers?

A lot of hardware manufacturers release updates of drivers for their products frequently for the purpose of fixing some bugs or improving the performance of the hardware. Some drivers, like software, have bugs or errors more or less. And some cannot make the most of devices and even prevent the hardware from achieving high performance.

And driver files are easily corrupted or deleted by some invalid operation by you or virus. When one of them is corrupt or missing, the device will not be able to work properly. In such a situation, you will need to reinstall the driver to make the device work properly.

How to Update Device Drivers?

You can go to the websites of the manufacturers to check if there are any updates and download the latest version. Please note that for a specific hardware model there can be several versions for different Windows systems! You need to make sure the driver you download is for the model of your device and the Windows system that you are using. If you install a wrong one, not only will the device not be able to work properly but also your system can crash down.

Wednesday, March 3, 2010

Computer Safety Tips

Computer Safety Tips
Achieving good computer security can seem like a daunting task. Fortunately, following the few simple steps outlined below can provide a good measure of security in very little time.
• Use antivirus software and keep it updated. You should check for new definition updates daily. Most antivirus software can be configured to do this automatically.
• Install security patches. Vulnerabilities in software are constantly being discovered and they don't discriminate by vendor or platform. It's not simply a matter of updating Windows; at least monthly, check for and apply updates for all software you use.
• Use a firewall. No Internet connection is safe without one. Firewalls are necessary even if you have a dial-up Internet connection - it takes only minutes for a non-fire walled computer to be infected.
• Secure your browser. Many labor under the dangerous misconception that only Internet Explorer is a problem. It's not the browser you need to be concerned about. Nor is it a matter of simply avoiding certain 'types' of sites. Known, legitimate websites are frequently being compromised and implanted with malicious javascript that foists malware onto visitors' computers. To ensure optimum browsing safety, the best tip is to disable javascript for all but the most essential of sites - such as your banking or regular ecommerce sites. Not only will you enjoy safer browsing, you'll be able to eliminate unwanted pop-ups as well.
• Take control of your email. Avoid opening email attachments received unexpectedly - no matter who appears to have sent it. Remember that most worms and trojan-laden spam try to spoof the sender's name. And make sure your email client isn't leaving you open to infection. Reading email in plain text offers important security benefits that more than offset the loss of pretty colored fonts.
• Treat IM suspiciously. Instant Messaging is a frequent target of worms and trojans. Treat it just as you would email.
• Avoid P2P and distributed file sharing. Torrent, Kazaa, Gnutella, Morpheus and at least a dozen other file sharing networks exist. Most are free. And all are rife with trojans, viruses, worms, adware, spy ware, and every other form of malicious code imaginable. There's no such thing as safe anonymous file sharing. Avoid it like the plague.
• Keep abreast of Internet scams. Criminals think of clever ways to separate you from your hard earned cash. Don't get fooled by emails telling sad stories, or making unsolicited job offers, or promising lotto winnings. Likewise, beware of email masquerading as a security concern from your bank or other eCommerce site.
• Don't fall victim to virus hoaxes. Dire sounding email spreading FUD about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response.
Remember, there's far more good than bad on the Internet. The goal isn't to be paranoid. The goal is to be cautious, aware, and even suspicious. By following the tips above and becoming actively engaged in your own security, you'll not only be protecting yourself, you'll be contributing to the protection and betterment of the Internet as a whole.

Monday, February 22, 2010

TIPS FOR COMPUTER SCIENCE

1. Computer Science needs written and practical practice . So, if you study Computers 3 hours a day, out of that give 1 hours for understanding the concepts and rest 2 hours are to be given for written practice .
2. Select your study material very carefully and get focused on it
3. While studying greater emphasis should be given on the weaker areas. Analyse the topics which are not very clear to you and concentrate more on that, where you are not confident and may lose marks.
4. Set a definite goal and plan your studies. Chapters with more weightage must be completed first during the preparation.
5. The question paper is totally based on Syllabus given by CBSE and strictly according to the curriculum only, so practicing questions other than that, is a waste of time.
6. Time management should be taken care of while attempting the questions paper. Not more than 2 minutes should be given for each mark of a questions i.e.
1 mark questions – 2 minutes
2 mark question – 4 minutes
3 mark question – 6 minutes
4 mark question – 8 minutes
If you follow the above management of time, you will get ample of time to revise the paper too.
7. Never ever repeat the questions in the answer sheet,
8. Read the question paper thoroughly and attempt those questions first, which you know the best. Once you will attempt 2 to 3 such questions which you know accurately; you will be confident and can have ample time to patiently solve and attempt the rest paper.

PRO DATA DOCTOR(Pen drive data recovery software)

• Pen drive data recovery software is a prominent tool to retrieve all your
lost data from corrupted or logically damaged memory sticks data storage
media. Restores and retrieves lost, missing, deleted music files, pictures,
videos, digital photos, images and text files from inaccessible USB Pen
drive removable medias.
• Inexpensive software provides easy recovery of data from all removable media
devices also popular as Flash drive, USB Drive, Thumb Drive, Key Drive, Jump
Drive, Jet Flash Drive, Handy Drive, Smart Drive etc of Sony, Toshiba,
Samsung, Jet flash, Kingmax, Apacer, Lexar brands etc. Easily support pen
drive in ranging capacities like 512MB, 1GB, 2GB, 4GB, 8GB and even higher
capacity drives. Software supports easy recovery of entire multimedia and
picture files like mpeg, tiff, midi, mp3, wav as well as text files saved on
MS word, MS excel, MS access, ppt file formats from undetectable USB media
drives.
• Pen drive data recovery tool is safe, easy, non-destructive and read-only
utility to recover files damaged due to virus infection, hardware and
software malfunction, power failure or any type of system or human error.
Memory stick files regaining tool is compatible on windows operating system
environment.
• Software Features:
• Easiest, effective and versatile program for regaining the entire lost or
deleted data from pen drives mass storage drives.
• Efficiently retrieves data saved in all major file formats including video
files (avi, mp4, mpeg, m4v, asf), audio files (wav, ram, aac, wma, mpa),
image files (jpg, tiff, gif, bmp, png), text files (doc, txt, dbt, wpd, wps)
etc.
• Support all major pendrive brands like Kingston, Sony, Sandisk, IBM, iBall,
Super Flash, Super Talent, Lexar, Memorex, PQI, Simpletech, Imation,
Verbatim and many more.
• Restore corrupted files and folders damaged due to Human error, Virus
corrupted files, Power failure, Accidently formatted pen drives, Logical
fault etc.
• Recovers Data even if “drive not formatted” and other system generated error
messages are displayed on system monitor while working with pen drives.
• Highly interactive graphical interface and inexpensive easy-to-use
application for both novice and experts.
• Software Requirements:
• Pentium class or equivalent processor
• Memory space Minimum 128 MB RAM
• 12 MB free disk space
• Operating System Supported:
• Windows 7, Windows VISTA, Windows XP, Windows 2003, Windows 2000
• Windows 98, Windows NT, Windows ME