Saturday, November 3, 2007

An alternative keyboard in Windows....

An alternative keyboard in Windows
In case your keyboard or some keys stop working
Microsoft provides you with an alternative way to type in using the mouse
To work this tool go to
Start menu
Then

Select Run
Type in OSK
Press OK


A keyboard will appear that you can use both in Arabic and English



Prepared by,

Raj Shah,

Founder,

Techyuth.

Mobile- 09825867994.

Quantitative preparation for GRE/CAT/GMAT


1) col a:(2^8)*(15^5)+(2^8)*(15^5)
col b:(5^10)*(8^2)

Answer B

2) one given dat x*=(x-1)/x condition is x<0 x="x*..." 99 =" 3^99" 33 =" 9^33" cube="X" cube="Xroot2" surface="Xroot2*X=" 2="main"> 0 & X>Y

Col A Col B
XZ. YZ.

Sol: Case I: X=3, Y=2, Z=1 then col A is Greater.
Case II: X=5, Y= -2, Z= -3 then Col B is Greater

Therefore the answer is D

3) cola:0.0001/0.9 + 2.456/1.294
colb:5.563/2.78 + 13.569/5.265
Answer B

4) (x+2)^(x+2)<-1

col a x col b -1

5). If a man works for an entire year, he earns an amount...But if he works for 6 months and completes his work, what was his ratio of efforts that he put in the 6 months to his expected effort?

Ans. 1/2

6) COL A: 33^99 = 3^99 * 11^99 COL B: 99^33 = 9^33 * 11^33

ANS:A

7) in 1979 the average home heating cost in central region was same as avg for entire country, in 1980 central avg cost incrsd by $260 per home, an incrs of 25% over 1979. if in 1080 avg cost of of entire cntry incrsd by 22%, wat was avg increase in cost per home for entire country?

57.2 65 228.8 317 325

8) there was a cube figure which was cut thru the centre diagonal .. had to find the T.S.A(TOTAL SURFACE AREA) of the either of d figure (which is the same)

Sol) Let side of cube=X Diagonal of side of a cube=Xroot2

Area of the diagonal surface=Xroot2*X=X^2root2

T.S.A of the cube(which is cut diagonally) =x^2+x^2+x^2/2+x^2/2+ X^2root2

9) in rectangular cubic the face diagonal was given along with the main diagonal and also the length ¡K. Had to find the volume ¡K..

ans: just apply phythagoras and also that l^2+b^2+k^2=main diognal^2.

10). XYZ > 0 & X>Y

Col A Col B
XZ. YZ.

Sol: Case I: X=3, Y=2, Z=1 then col A is Greater.
Case II: X=5, Y= -2, Z= -3 then Col B is Greater
Therefore the answer is D

11). The mean of the three numbers 2X, 7X, X^2 ( X square) is 12 what is the range of the given data ( X<0). 3 =" 12" 2="36" 36="0" x=" -12" range =" Highest" commodity =" 144-" 3y="4" 4 =" 1" 3 =" 1" circle =" Pi" circle =" Pi" probability ="number" chance =" (X^2)" television =" 84." pager =" 84-X" pager =" 72-" x =" X-" 2y="5">

Sol:
90 rupees interest„³For 600 rupees
X„³For 100 rupees

X= 9000/600 = 15 rupees for 100 , which means 15%

12)2X+3Y=4 what is the X- intercept of the line

Sol: 2X/4 + 3Y/4 = 1
X/2 + Y/4/3 = 1
Therefore the X- intercept is 2

13)The Three vertices of a parallelogram is given as (0,0) (1,2) (3,3) and asked to find out the fourth vertices.

Sol: The answer is (2,1) , Figure is given

14) A circle is drawn inside an other circle, the center of both circles are the same, the radius of the first circle is X and the radius of the second circle is X+Y , we are asked to find out the probability that if a point is taken from the circle the point should lie in the smaller circle of radius X.

Sol: Area of smaller circle = Pi ( X^2)
Area of larger circle = Pi ( X+Y)^2
The probability =number of favorable chance / Total number of chance
= (X^2) / (X+Y) ^ 2

15) There are 84 people who watch television and 72 members use pagers and X members watch only Television .
Col A Col B
Number of people use only pagers X ¡V 12

Sol: Draw a Venn diagram
Total number of ppl who watch television = 84.
No of ppl who watch TV and use pager = 84-X
Number of ppl who use only pager = 72- ( 84 ¡V X )
= 72- 84 + X
= X- 12
Therefore C is the answer.

16). Find the Y ¡V intercept of the equation 3X-2Y=5

Sol: X/ (5/3) + Y/(-5/2) = 1, Therefore the Y intercept is : -5/2

17). The amount of Rs.600/- is given at a rate of X% per annum , If he receives additional Rs.90/- after an year then what is the rate of interest ( i.e- X )

Sol:
90 rupees interest„³For 600 rupees
X„³For 100 rupees

X= 9000/600 = 15 rupees for 100 , which means 15%

18). 90Col A Col B

The perimeter of the Triangle 24

Sol: If X = 90 then triangle is a RAT (Right angle triangle ), which satisfies Pythagorean theorem from which third side is 10 , then perimeter of triangle is 24 ( 6 + 8 + 10 ), but it is clearly given that 90

19) A parking garage rents parking spaces for $10 per week or $30 per month. How much does a person save in a year by renting by the month rather than by the week?
(A) $140
(B) $160
(C) $220
(D) $240
(E) $260

20) trains 100 m and 150m in length long are going in same direction on parallel tracks. faster train speed is 60 km ph and slower train speed 42 km/hour. at what time faster train over take slower train.

ans: 250/5 = 50secs


21)1979 approximately of the 37.3 million airline passengers traveling to or from the
United States used Kennedy Airport. If the number of such passengers that used Miami Airport was the number that used Kennedy Airport and 4 times the number that used Logan Airport, approximately how many millions of these passengers used Logan Airport that year?

(A) 18.6
(B) 9.3
(C) 6.2
(D) 3.1
(E) 1.6

22)certain basketball team that has played of its games has a record of 17 wins and 3 losses. What is the greatest number of the remaining games that the team can lose and still win at least of all of its games?
(A) 7
(B) 6
(C) 5
(D) 4
(E) 3


answer: 4 ( 2/3 is 20 so total they will play 30 games. 3/4 should be winning ratio so they can max loose 7 games. 3 they have already lost so now they can max loose 4 games...

23)If n is an integer and then which of the following could be the value of k?
(A) 22
(B) 26
(C) 35
(D) 54
(E) 60

answer: 26


24) There were 36.000 hardback copies of a certain novel sold before the paperback version was issued. From the time the first paperback copy was sold until the last copy of the novel was sold. 9 times as many paperback copies as hardback copies were sold. If a total of 441.000 copies of the novel were sold in all, how many paperback copies were sold?
(A) 45.000
(B) 360.000
(C) 364.500
(D) 392.000
(E) 396.900

answer: 364,500

25) symbolic representation problem very time consumed one given dat x*=(x-1)/x condition is x<0>


a)2x*=2(x*)
b)-x*=x*
c)(x-1)*/x=x*...
d)(x*)*=x

26) cola:0.0001/0.9 + 2.456/1.294
col b:5.563/2.78 + 13.569/5.265


Answer B

27) THE DECORATING COMMITTEE FOR A DANCE PLANS TO FIRNGE THE 3 INCH WIDE END OF A STREAMER BY MAKIN SMALL CUTS EVERY 1/16TH INCH. HOW MANY CUTS MUST BE MADE TO FRINGE THE END?


A)45 B)46 C )47 D) 48 E) 49


consider e.g. :- u have 4 inch fringe, and want to cut in each 1 inch. so we will get not 4/1, but 4/1-1, coz the last part will be detached automatically. so the answer wil not b 4, but 3. so n-1...

so the actual answer is (16*3)-1 = 48-1 = 47

28). x+5 when divided by 3 leaves a remainder 2..
col A: remainder whn x is divided by 2
col B: 1

Ans. D

29) a car goes around a circle of radius of 14km in the first round it travels with a speed of 11km/hr in sud sequent rounds its speed increases by 11km/hr in each round how much time does the car take to cover a dist of 440km

a)14*8/5 b)15*14/18 c)18*4/15 d)4*15/18 e)7*4/15

30)THE DECORATING COMMITTEE FOR A DANCE PLANS TO FIRNGE THE 3 INCH WIDE END OF A STREAMER BY MAKIN SMALL CUTS EVERY 1/16TH INCH. HOW MANY CUTS MUST BE MADE TO FRINGE THE END?


A)45 B)46 C )47 D) 48 E) 49


consider e.g. :- u have 4 inch fringe, and want to cut in each 1 inch. so we will get not 4/1, but 4/1-1, coz the last part will be detached automatically. so the answer will not be 4, but 3. so n-1...

so the actual answer is (16*3)-1 = 48-1 = 47

31) Roger sold a watch at a profit of 10%. If he had bought it at 10% less and sold it for $13 less he would have made a profit of 15%. What is the cost price of the watch?

$220
$300
$400
$480
$540

Ans. let cost price b x

so profit 15% that means selling price is 1.1x
Now purchasing at 10% less that means 0.9x

sold for 13$ less i.e. (1.1x-13) & got profit of 15% means (15/100*90/100*x)=0.135x

selling price-purchase=profit

so (1.1x-13)-0.9x=0.135x
0.2x-13=0.135x
0.065x=13
x=200 $

so by increasing it 10% means $20 gives $200+$20 = $220......

32). the number of 2 digit even numbers that can be formed from the digits 1,2,3,4 and 5 if repetitions are not allowed is :
A) 8!
B) 5!
C) 2^6
D) 16
E) 16!


33). the number of ways in which 8 different flowers can be seated to form a garland so that 4 particular flowers are never separated is :
A) 4!4!
B) 288
C) 8!/4!
D) 5!4!
E) 8!4!

ans d)

34)an examination paper contains 8 questions of which 4 have 3 possible answers,3 have 2 possible answers each and the remaining one question has 5 possible answers. The total number of possible answers to all the questions is :
A) 3240
B) 94
C) 78
D) 2880
E) 36


35). the number of 2 digit even numbers formed from the digits 1,2,3,4,5 and 6 if repetitions of digits is not allowed
A) 6
B) 9
C) 5
D) 15
E) 17

ANS -15)

36). a box contains 2 white balls,3 black balls and 4 red balls. The number of ways in which 3 balls can be drawn from the box so that atleast one of the balls is black is
A) 74
B) 64
C) 94
D) 20
E) 24

ANS ¡V 64)

37). the number of 5 digit telephone numbers having atleast one of their digits repeated is
A) 90000
B) 100000
C) 30240
D) 69760
E) 69000

ANS C)

38). the number of 4 digit even numbers that can be formed using 0,1,2,3,4,5,6 without repetition is
A) 120
B) 300
C) 420
D) 20
E) 42

ANS-B)

39) if xyz=0, x>y than
col a: xz
col b: yz

ans.: d

40)comparison of SD of following

seq1 : 50,50,50,50,50
seq2 : 5,10,0,5,15

Solution:
no. elements in both series is same, i.e. 5

Range of first= max - min value = 0
Range of second = max-min = 10

41) there is a class of 90. avg of people who passed is 84. avg of people who failed is 60. Total class avg is 80. how many people passed ?
ans: 75

Prepared by,

Riddhi Shah,

U. V. Patel College of Engineering.

Mock lunar lander contest ends with a bang...!!!



Armadillo Aerospace's Module 1 rocket came close to winning the $350,000 level 1 prize in the Lunar Lander Challenge (Image: David Shiga)

The engine of an experimental Moon lander exploded on the launch pad on Sunday, dashing Armadillo Aerospace's hopes of winning up to $1.35 million in NASA prize money.

The 2007 Northrop Grumman Lunar Lander Challenge was the main event at the X Prize Cup rocket expo this past weekend near Alamogordo, New Mexico, US. The competition is intended to promote innovative ideas for a new generation of vehicles that could land humans on the Moon.

Nine teams had registered to compete, but only Armadillo Aerospace, based in Mesquite, Texas, US, and headed by Doom video game creator John Carmack, was ready in time for the event.

The competition is divided into two levels. In order to be eligible for the lesser $350,000 level 1 prize, a rocket must rise 50 metres from its launch pad, move 100 metres horizontally and land on a concrete pad, staying in the air for a total of at least 90 seconds. It must then repeat the feat, returning to its starting point within 2.5 hours.

To qualify for the $1 million level 2 prize, a rocket must make a similar flight, but this time it must stay aloft for 180 seconds and land on a bumpy surface that simulates that of the Moon.

Armadillo had planned to compete in both levels, but in the end attempted only the easier level 1 flights. It used a rocket called Module 1, whose two spherical fuel tanks were stacked vertically (see image at right).

Cracked engine

On Saturday, Module 1's first attempted flight failed when a blockage in a fuel line prevented the vehicle's rocket engine from starting.

The following flight was successful, meeting all the requirements for the prize and putting Armadillo in place to win the level 1 prize money, if it could make a successful return flight.

The return flight came very close to winning the prize for Armadillo, with Module 1 rising 50 metres above the ground and making it across the 100 metres to hover over the landing pad.
But the vehicle ran out of fuel, which had leaked out of a crack that had formed in its engine during ignition. Module 1 then plummeted to the ground and tipped over on its side 83 seconds into the flight – just 7 seconds short of the required 90-second minimum.
Loud bang

After replacing the cracked engine overnight, Armadillo made a good first flight early on Sunday. But at the start of the second flight, the engine cracked and sprang leaks again, forcing Armadillo to land the vehicle back on its launch pad after it had barely risen from the ground.

In a last-ditch attempt to win the prize, Armadillo took the engine out of another, more powerful rocket called Pixel – which it had planned to fly in the more difficult level 2 challenge – and used it as a replacement for Module 1's cracked engine.

But the engine exploded in a fireball at launch, producing a bang that was audible from more than a kilometre away. Armadillo declared an emergency and fire trucks rushed to the scene, but the fire quickly burned itself out without any intervention or injuries.

Stand down

The engine itself was destroyed in the explosion. "There were pieces on the pad," said Ken Davidian, who heads NASA's Centennial Challenges programme, which is providing the prize money for the contest.

"It was unrecoverable."

It is not clear how much damage was done to the rest of the vehicle, but it was not totally destroyed, as it was still standing on the launch pad for some time following the fire.

This ended Armadillo's hopes of winning the level 1 challenge, since the company had used up all four of its allowed attempts. There was still the possibility that Armadillo could try to win the more difficult level 2 challenge, by flying Pixel with a spare engine, but company founder John Carmack decided not to make the attempt.

Excess fuel

"This weekend, we've had more problems than we've had in the last six months. We know what went wrong, but not why," said Armadillo vice president Neil Milburn. "We know we'll be back again, and we'll nail it next time."

One reason the engines may have cracked is that fuel used for the "outbound" leg of the competition flights did not burn up completely before the return trip, said Armadillo team member Phil Eaton. Excess fuel in an engine can explode during ignition, cracking the engine.
That particular problem did not come up in previous tests because Armadillo usually let more time pass between flights, speculates Eaton. That lag allowed excess fuel to boil out of the vehicle, producing an audible gurgling sound.

Some of the other lunar lander teams at the event expressed sympathy for Armadillo. "It's painful – even for us competitors," said David Masten of Masten Space Systems, based in Mojave, California, US.

'Gut-wrenching'

"It's just got to be gut-wrenching," added Paul T Breed of Unreasonable Rocket, based in Solana Beach, California, US. "I know how hard they worked."

The $2 million pledged by NASA for the first and second prizes in the level 1 and level 2 challenges will now be up for grabs in the 2008 challenge.

"We've got all these other teams," said Becky Ramsey of the X Prize Foundation, which organises the X Prize Cup. "Some of them just need a little more time and I would expect next year we'll have a real race on our hands."

Armadillo was also the only competitor in the first year of the challenge in 2006, but its hopes for the prize ended with a crash landing that year.

NASA has expressed interest in potentially using Armadillo vehicles on Earth to test an automatic hazard avoidance system for its future lunar lander, which would use sensors and software to detect and avoid threats like craters and boulders.

Courtesy: http://technology.newscientist.com/home.ns

Prepared by,

Riddhi shah,

U. V. Patel college of Engineering

Tuesday, October 30, 2007

Drug-eluting Biodegradable Coronary Stent

A Drug-eluting Biodegradable Coronary Stent is an expandable wire form with a drug-coating over it that delivers medications to a specific area of the artery and is degraded into harmless products in the body after its function. Currently the types of stents used for preventing the coronary artery collapse include simple metallic stents and drug-eluting metallic stents.

One of the main reasons to develop a ‘drug-eluting biodegradable coronary stent’ is the short-term need for a stent and to avoid the potential long-term complications of metallic stents.These biodegradable coronary stents are generally made of a PLA {poly-L/D-lactic acid} polymer. They are known to deliver medications at specific sites of the arteries and they degrade into the body after 2 years of their implantation. Since they are biocompatible, they evoke minimum inflammatory response as compared to the traditional metallic stents. Moreover, they decrease the artery collapse rate (restenosis) to 10.5%

Stents are inserted in the coronary arteries (that provide blood supply to heart) and are enlarged to a diameter either greater than or equal to the diameter of the lumen so as to allow the free flow of fluid there through.

Metallic stents with/without drug-coating open up the arteries that have been blocked by fatty deposits (atherosclerosis).But the downside can be formation of thrombus and the process of restenosis(re-blockage of the artery).Metallic stents also cause infection and interference with some diagnostic procedures like MRI.





To overcome these problems, stents made up of biodegradable polymer that has the capacity to deliver drugs have been developed. These stents minimize restenosis and degrade into harmless products after a few months. They deliver medications at the local areas of the arteries and then they degrade into harmless products after a few months of their implantation.

Basically these stent are double-spiral zigzag helical structures consisting of a of 0.2 mm wire. Their outer diameter varies from 2.2 to 2.4 mm; with an initial lumen of 1.8 to 2.2 mm. The zigzag structure facilitatesreduced vessel wall injury at the time of stent implantation.

There are laminated multilayers wherein one layer addresses the structural requirements of the stent and additional layers release drugs at predictable rates that prevent proliferation of cell growth and blood clotting.

With multiple layers of polymer films, up to 20 layers of drugs can be released at varying rates. They are coated with anticoagulants, such as heparin, or platelet inhibitors, such as glycoprotein IIa-IIIB.



PLA is about 37% crystalline, with a melting point of 175—178°C and a glass-transition temperature of 60—65°C.It has lower tensile strength, higher elongation and a much more rapid degradation time, making it more attractive as a drug delivery-system. Dexamethasone[DEX]andSimvastatin[SIM]are the two drugs used in the combination with poly-96L/4D-lactic acid (PLA) stents.

These stents are designed in such a way that they can be broken down into lactic acid, which can be absorbed harmlessly into the body. The biological process of degradation begins at the 6th month of the implantation and is known to be completed after 24 months. The main degradation end products of are normal metabolic products which are then used by the body.24months after implantation, the stent material appears largely hydrolyzed and cannot be detected in polarizing light.






On performing Angiography as a post-stenting procedure it was observed stented arteries were angiographically patent.The mean luminal diameter (3.05 mm) and area (30.36 mm2) of PLA stents was decreased as compared to other stents.

Some advantages are mentioned below:

1. These stents are biocompatible, producing negligible inflammation and provide excellent haemodynamic stability.

2. They are known to self-expand for at least 3 months and this prevents restenosis process in the specific area of artery where they are placed.

3. They can be used in the cases where repeat angioplasty or bypass grafting are required.

4. They cause minimum interaction with fibrinogen and hence can minimize blood clot formation in the arteries.

5. Moreover they are opaque to X-rays and hence can be easily visualized.

Some drawbacks are mentioned below:

1. The time for the complete degradation of these stents cannot be predicted.

2. After the stenting, the patients the patient must take an anti-clotting or antiplatelet drug, (such as clopidogrel or ticlopidine) for 6 or more months to prevent the blood from reacting to the new device by thickening and clogging up the newly expanded artery.

3. To effectively impact tissue growth, it may be necessary to add specific antiproliferative compounds to this biodegradable stent and so they are very costly.

4. High temperature (65°C to 75°C for few seconds) required during the process of insertion will result in the pathologic death of the living tissues (necrosis) of the arterial walls.

5. Moreover high temperature (around 55°C) also results in the platelet adhesion to the vessel wall seems which may cause thrombosis.

CONCLUSION

Stents and other modern endovascular devices such as stent grafts have undoubtedly changed the field of vascular interventions. Their use is an important step towards more sophisticated treatment of vascular diseases.Thus, biodegradable materials, such as PLA96, may be promising for small-vessel use as stent core materials and may prove to be an effective alternative to the metallic versions.

COMPILED BY:-

MEET OZA

JAHANVI MODI

5TH BIOMEDICAL ENGINEERING

U.V.PATEL COLLEGE OF ENGINEERING

Cryptography-An Introduction...

The art of scrambling messages has actually been in use for thousands of years. However, beginning with the development of the telegraph, cryptography has been growing outside of military and highly diplomatic circles, and into the public domain. E-commerce, personal and corporate privacy have continued the pervasive need for secure communications. Additionally, cryptographic techniques are not limited to the purpose of hiding messages. For instance, archeologists can use cryptographic techniques to interpret ancient or lost languages.

Cryptography, which derives from the Greek word kryptos meaning hidden, is both an art and a science. It is the science of using mathematics to encrypt and decrypt data. The purpose of cryptography is to transmit information in such a way that access to it is restricted entirely to the intended recipient. Originally the security of a cryptotext depended on the secrecy of the entire encrypting and decrypting procedures; however, today we use ciphers for which the algorithm for encrypting and decrypting could be revealed to anybody without compromising the security of a particular cryptogram. In such ciphers a set of specific parameters, called a key is supplied together with the plain text as an input to the encrypting algorithm, and together with the cryptogram as an input to decrypting algorithm. Thus there exist three fundamental parts to the encryption/decryption process namely the message, a key and an algorithm.

The oldest encryption method is known as Secret Key (symmetric) encryption. Here the same key is used both to encrypt the plain text and then to decrypt the cipher text.

Symmetric systems are generally fast and can now be made effectively impossible to break. Like anything of this sort, there is no absolute guarantee, but it's quite reasonable to say that with the knowledge available at present and with access to current levels of computing power, a properly constructed system can be made entirely secure. For better security the key should be as large as possible. The greater the length of a key, all other things being equal, the progressively more difficult it becomes to break the encryption.

Another well-known encryption method is a system of Public (asymmetric) key cryptography. Public key systems use two keys constructed from prime numbers and which complement each other such that one key is used for encrypting plain text which can then be decrypted by, and only by, the other. One of the key pairs is kept private and is known as the private key while the other, the public key, is widely publicized. The unique nature of the process is that anyone who knows the public key can encrypt a message that can then only be decrypted by he sender using the secure private key. Conversely, a message can be encrypted with the private key and anyone decrypting it, using the freely available public key, can be confident that it came from the sender. Asymmetric keys are very long, typically ranging from perhaps 768 bits versus 56 or 128 bits.

However, inspite of the various security measures, there is a possibility of the message to get altered. For this purpose Hashing Technique is used as message authentication. It is becoming as important as information hiding. Hashing is the technique that involves a string of characters of variable length being converted to a fixed-length result, usually 128 bits. In practice, any change to the message, even one as trivial as adding or removing a space, will result in a different hash value being created when the process is run.

Cryptographic protocols and algorithms are difficult to get right. Creating cryptography algorithms requires years in professional review of the algorithm. Hence trying to create one is a sheer wastage of time and energy. Instead one should always opt for algorithms that are widely used, heavily analyzed, and accepted as secure. Algorithms for Symmetric Key Encryption, Public Key as well as for Cryptographic Hash are available worldwide.

Secret Key encryption and Public key cryptography techniques have been used for over thousands of years. However, if and when mathematicians or computer scientists come up with fast and clever procedures for factoring large integers the whole privacy and discretion of public-key cryptosystems would vanish overnight. Such an upcoming method is Quantum Cryptography. Recent work in Quantum computation shows that quantum computers can factorize much faster than classical computers. Quantum cryptography is a way to combine the relative ease and convenience of key exchange in public key cryptography with the ultimate security of a onetime pad. Here, any attempt by an enemy to obtain the bits in a key not only fails, but gets detected as well. This is due to a certain phenomena that occur at the subatomic level. The sender is required to prepare a chain of polarized photons. This chain is then sent through an optical fiber to the receiver. To obtain the original message the receiver makes a series of measurements.

The main objective of all these methods remains the same – Security. Security cannot be eliminated but can be improved with upcoming technologies. Cryptography has become an essential part of this strategy. It is regarded as backbone in various developments. The space of an introductory article is not enough to describe it. Efforts have been made to provide unprecedented levels of security. Using quantum computing, cryptographers will be able to build stronger crypto-systems, thus providing better security. However, the question of implementation of such systems and understanding of implications at machine level still prevails.



Prepared by,

Purnima Shewale,

Usha Mittal Institute of Technology,

S.N.D.T. University,

Mumbai.

Comparison between microsoft vista and xp...!!!


When you start using Windows Vista, you will recognize familiar elements such as the Start menu, which is now faster, more streamlined, and more helpful than in previous versions of Windows. The Start menu features integrated desktop search through a new feature called Quick Search which can help you find and launch almost anything on your PC. Just type in a word, a name, or a phrase, and Quick Search can find the right file for you. But more than that, the new start menu makes it very easy for you to navigate across all of the installed applications on your PC. Eliminating the slow performing, cascading "All Programs" view, the new start menu can help you get something! started more quickly than ever.


Explorers


The new Explorers are powerful yet easy-to-use tools for working with files consistently across Windows Vista. Explorers give you more information and control while simplifying how you work with your files. The experience is easy and consistent, whether you're browsing photos or documents or even using the new Control Panel.

The new Document Explorer makes working with your files a snap. Find your files more quickly with the new Live Icon feature, and see what they contain without having to open them.
Key elements of the Explorers in Windows Vista are designed to help you get to the informa! tion you need, when you need it. Quick Search is always available to help you find files instantly. The navigation pane contains the new Search Folders found in Windows Vista, as well as traditional folders that you have created on your computer. Command Bars display only the tasks that are most appropriate for the files being displayed. With new Live Icons (scalable thumbnails) used throughout Windows Vista, you can see the first page of documents, the actual image of a photo, or the album art for individual songs in your music collection, making it easier to find exactly what you are looking for.


Type keywords into the Quick Search box in the new Control Panel to find the right system setting quickly.

Windows Aero


Windows Vista is the first Windows operating system that has a user experience that can gracefully scale to the hard! ware capabilities of the computer it is installed on. All computers that meet minimal hardware requirements will see the Windows Vista Basic user experience, which provides the benefits of the refined interface features already mentioned.


Windows Vista Aero provides spectacular visual effects such as glass-like interface elements that you can see through.
Windows Aero is an environment with an additional level of visual sophistication, one that is even more responsive and manageable, providing a further level of clarity and confidence to Windows users.

Live taskbar thumbnails


Resting the mouse pointer over a taskbar item displays a live thumbnail of the window, showing the content of that window. The live thumbnail is displayed whether the window is minimized or not, and whether the content of the window is a document, ! photo, or even a running video or process.


See thumbnail views of the items in your taskbar by resting your mouse pointer on them.

Windows Flip and Windows Flip 3D


Windows Vista provides two entirely new features to manage windows: Windows Flip and Windows Flip 3D. Flip allows you to flip through open windows (by using Alt+Tab), providing a live thumbnail of each window, rather than just a generic icon and file name. Live thumbnails make it easier to quickly identify the window you want, particularly when multiple windows of the same kind are open. With Flip 3D, you can use the scroll wheel on your mouse to flip through open windows in a stack, and quickly locate and select the one you want to work with.


Use Flip to view and navigate more easily through open windows.

Use Flip 3D to navigate through open windows using the scroll wheel on your mouse.

Windows Sidebar and Gadgets

As you use your computer to access more information, perform more tasks, and interact with more software applications, you increasingly face information overload. You open a web browser just to check the weather, open an application to view your calendar, and open a calculator program to simply add numbers. You need simple, specialized, and lightweight mini-applications that put information and tasks at your fingertips—no matter what you're doing.
Windows Sidebar boosts your personal productivity by providing i! nstant access to gadgets—a wide variety of engaging, easy-to-use, and customizable mini-applications that offer information at a glance and provide easy access to frequently used tools.


Windows Sidebar gives you quick access to gadgets like picture slide shows, Windows Media Player controls, or news headlines. You pick the gadgets you want to see in Windows Sidebar.


Windows Internet Explorer 7


New Internet Explorer 7 features, like tabbed browsing and live previews, make it easier for you to get to the websites you want to visit.
Internet Explorer 7 also provides new tools to give you direct access to information you want, with built-in support for web feeds known as Re! ally Simple Syndication (RSS). RSS is a technology you can use to have information sent to you, so you don't have to look for it. Through RSS subscriptions, you can automatically receive feeds (lists) of headlines from Internet sites. Internet Explorer 7 discovers these feeds on sites and allows you to preview and subscribe to them. Once you subscribe, Internet Explorer 7 systematically consolidates headlines from each feed into one list. This lets you quickly browse new information from various sites without having to visit each site separately.
Windows Vista also builds upon the User Account Protection initiative—by default, limiting Internet Explorer 7 to just enough permissions to browse the web, but not enough to modify your files or settings—keeping your PC safer from web-based attacks. This Windows Vista-only feature, known as protected mode, means that even if a malicious site attacks a potential vulnerability in Internet Explorer 7, the site's code will not have enou! gh privileges to install software, copy files to the Startup folder, or hijack the settings for your browser's home page or search provider.

Windows Vista enhances the Internet Explorer experience. The upcoming release of Internet Explorer 7 not only adds important new security and privacy features, but makes everyday tasks easier through features such as tabbed browsing, inline search, and shrink-to-fit printing.

Network Center

Windows Vista puts you in control of your network experience with the Network Center —the central place for all your networking needs. Network Center informs you about the network your computer is connected to and verifies whether it can successfully reach the Internet. It even presents this information in a summary in the Network Map so you can immediately see your connectivity to the network and Internet. If a PC on the network loses Internet connectivity, you can graphically see that the link is down, and t! hen use Network Diagnostics to help determine the cause of the problem and get a suggestion for a solution.

Check your connection status, see your network visually, or troubleshoot a connection problem in the Network Center .
Network Center also allows you to quickly connect to other available networks, or create entirely new connections. You can view and configure your most important network settings in one place. And for less frequently accessed settings, Network Center provides direct links so you can easily find what you're looking for.
Network Center also makes it easy to connect your workplace network from home.


Easily connect to your workplace from home using the Network Center .

Network Setup

With Windows Vista, setting up a network between multiple PCs and devices (including printers, music players, and game systems) is simple and intuitive. The Network Setup Wizard allows you to set up wired or wireless networks by identifying unconfigured network devices and adding them to the network. The Network Setup Wizard also automates the process of adding new devices to your network. It automatically generates secure network settings to keep your network safe from intruders.
Network settings can also be saved to a portable USB flash drive to make adding PCs and devices to the network a quick and easy process. Simply insert the USB flash drive into a PC or device and it will automatically read the data and ready itself to join the network. File and printer sharing is also easily enabled on each PC on the network from the Network Setup Wizard, so you can share documents, photos, music, and other files across your network.
Network Explorer


Once a network is set up, you need to be able to easily browse content on networked PCs, devices, and printers. The new Network Explorer in Windows Vista makes it easy to share files and take advantage of the connectivity that a network provides. It presents a view of all PCs, devices, and printers on the network, and is significantly faster and more reliable than My Network Places in Windows XP. The Network Explorer is even able to use custom, representative icons for different devices (when enabled by manufacturers). You can also directly interact with select devices—adjust settings or control music playback, for example.


Create networks to share files, printers, and other devices.

Network Map

When people have multiple computers and devices on a network, with a combination of wireless a! nd wired connections, it can be difficult to understand how everything is connected. Windows Vista provides a new feature called Network Map which shows you an easy-to-understand, graphical view of everything on the network, and how everything is connected. This helps you optimize your network for the best performance and easily locate any problems.


Network Map in a home environment showing a broken connection to a wireless router.


Wireless Networking


Windows Vista improves the wireless network experience in a number of ways. The new Network Awareness feature in Windows Vista keeps your applications aware of and optimized for the network's changing capabilities. Your data is also more secure with enhanced support for the latest wireless security protocols, including WPA2. Windows Vista helps you avoid connecting to fra! udulent wireless networks which seem like legitimate hotspots but, in fact, are not. Windows Vista also provides an easy way to create ad-hoc wireless networks to use peer-to-peer applications such as file sharing and application collaboration.

Network Awareness


Network Awareness provides the ability to report changes in network connectivity to applications in order to provide a more seamless connected experience. As you connect to different networks, the change is communicated to Network Awareness-supported applications, which can then take appropriate actions for your connection to that network. For example, when you switch from your home office to your corporate network, firewall settings can be configured to open the ports needed to allow the use of IT management tools. Group Policy will detect the reconnection to the corporate network and automatically begin processing policy changes instead of waiting for the next detection cycle.



Prepared by,

Raj Shah,

Techyuth,

Contact no: 09825867994

TIPS TO MAKE YOUR SELECTION IN TCS A SUCCESS!!!!

TIPS TO MAKE YOUR SELECTION IN TCS A SUCCESS !

TCS’ recruitment and selection process has been designed to identify potential and select that talent which will take the company to newer levels of growth and excellence. Our vision of achieving Global Top 10 by 2010 can only be achieved by choosing those who have the knowledge, the skill and the attitude to make the real difference.

The criteria that have been laid down primarily assess the candidate on multiple parameters by ensuring that the candidate has been assessed holistically via various levels and processes.

Mentioned below are brief guidelines that will keep you informed about what we really are looking for in you:

APTITUDE TEST:

Part I: Comprehension and English grammar - Assesses your vocabulary, understanding of concepts, comprehension, contextual differentiation, knowledge of antonyms and synonyms.

Part II: General reasoning - Maths, quantitative reasoning, time and motion studies, calculus, pie-charts, logarithms etc.

Part III: Critical reasoning - This includes scenarios with preferred outcomes that are given to you. Choice of the correct solution to the scenario is required here.

Guidelines:


1.The test is on-line and automated.

2.The questions are generated by a random sampler so question papers are unique.


3.There is no negative marking.


4.Use of calculators are not permittedTime duration is of 1-½ hours.


5.Each section has a cut off time.

6.There is no sectional cut-off

TECHNICAL INTERVIEWS:

1.Knowledge of specialization/ discipline and subject matter.

2.Competence reflected while executing projects and your role in the team.

3.Additional skills that have been developed by undertaking value-adding assignments.

4.Ability to think out of the box to analyze technical questions and problems.

5.Problem solving capability and the ability to persevere in confusing and ambiguous situations


6.Ability to comprehend questions, assimilate and interpret the same in a manner that meets the expectations of the panel.

7.Minimal knowledge of software related subjects and various applications.

8.Logical sequencing and analytical resonating would be assessed here


9.Ability to communicate effectively, which includes oratory skills, grammatical accuracy, pronunciation and presentation skills.


10.Knowledge of the industry, current events and topics of national importance.

HR ASSESSMENT:

(This would be done either at the Technical round or at the management round)

1.Confidence in your capabilities, potential and growth

2.Clarity in your objectives and goals


3.Reflections of team skills and interpersonal attributes

4.Capability to handle ambiguity and challenging situations

5.Well-rounded personality, which reflects value-systems like truth and integrity

6.Ability to envision the future and identify a career path

7.Reflection of resilience (ability to continue with perseverance and enthusiasm when faced with failure)

8.
Enthusiasm to undertake new challenges and tasks

9.Willingness to unlearn, learn and re-learn so as to adapt to new challenges and situations.

10.Excellent presentation skills and communication of ideas.

MANAGEMENT INTERVIEW:

(Final round that is conducted by either a Senior Consultant, Principal Consultant or Vice President with 15 years and above of experience).


1.Re-confirm the initial assessment that was done by the technical panel

2.Ascertain whether the candidate has the capability and the potential of being a software consultant

3.Determine whether the candidate reflects the knowledge, skill and the attitude commensurate for the job profile

4.Probe into whether the candidate has the qualities meritorious of a TCSer.

5.Validate whether the candidate will complement TCS’ vision of becoming Global Top 10 by 2010.

DO’s:

1.Dress code for gents must be formal shirts and trousers, a tie, polished shoes and well kept hair. For ladies, a saree, salwar kameez or formal western outfits are preferred. Light make will further enhance your personality.

2.Prepare an introduction line of not more than 30 words mentioning your capabilities, strengths, personality traits and your career outlook.

3.Carry certificates of any extra-curricular events that you have participated in along with your project report.

4.Maintain a kit with a water bottle, sandwiches and a hand towel in the eventuality of the process getting delayed.

5.Always listen to the question being asked before responding

6.Seek a clarification incase you are not certain about the nature of the question

DON’TS

1.Wear flashy/ bright clothes or a combination that lacks taste.Ask other candidates what questions are being asked by the panel for it may alter your thought processes and responsiveness to various questions.

2.It is like studying for one paper for an examination and going for another!

3.Argue with the panel member to assert your point of view.

4.Shielding away from the question by giving ambiguous answers.

5.Jump to conclusions or false assumptions if the question has not been completely understood.


Prepared by,

Raj Shah
Mobile- 09825867994

Courtesy- TCS.