Monday, February 2

KERALA PSC LECTURER IN INFORMATION TECHNOLOGY (POLYTECHNICS) Questions and Solution

Hello reader,

In this post we will discuss various questions and its solution from  LECTURER IN INFORMATION TECHNOLOGY (POLYTECHNICS). 388/2013 exam held in  2015 conducted by Kerala PSC.

Hope this will be useful for you.

Here we go.!!

Question Code:  A

Maximum marks :100

Time : 1 hour 15 minutes


1. which state of India has its secretariat in WRITERS BUILDING?
a. West Bengal
b. Tamil nadu
c. Punjab
d. Bihar

2. "NOT JUST AN ACCOUNTANCY" is a service story written by:

a. Dr. Manmohan Singh
b. Dr. Thomas Issac
c. Vinod rai
d. Dr. John Mathai

3. The well known "Kuttankulam satyagraha" was held in:
a. Irinjalakuda
b. Punjab
c.Vaikom
d.Punalur


4. "Guruvinte dukham" written by:
a. MK sanu
b. Sukumar Azhikkode
c. Dr. Babu Paul
d. Ayyappa Paniker

5. The magazine Yuktivadi founded by:
a. EMS
b. Sahodaran Ayyappan
c. K Kelappan
d. AK Gopalan

6. The founder of PratyakshaRaksha Daiva Sabha was:
a. Vaikunda swamikal
b. Ayyankali
c. poykayil Appachan
d. mannathu Padmanabhan

7. BKS Ayyangar recently passed away was a great expert of:
a. Modern medicine
b. Bharatnatyam
c.Kathak
d. Yoga

8. KPAC is a drama troupe of:
a. Kannur
b. Kozhicode
c. Thrissur
d. Alappuzha

9. "kanaleriyum kaalam" is the autobiography of:
a. Kuthattukulam Mary
b. Rosamma Punnose
c. Acama Cheriyan
d. KR Gouri

10. The brand ambassador of " Clean campus, Safe Campus" programme:
a. Mammootty
b. Mohan Lal
c. Fahad Fazil
d. Manju Warrier

11. When 0< x < π/2 the sum of series
1 -cos x +cos2x -cos3x+........
a. 1+sinx
b.  √2 tan x
c. 1/2 sec2 x/2
d. sec x /√2

12. The angle between the lines x - y= 2 and x+y=1 is
a. π/2
b. 0
c. π/4
d. π

13. Let A , B two n x n orthogonal matrices then which of the following is true:
a. AB is orthogonal
b. AB is symmetric
c. AB is triangular
d. AB is singular

14. The greatest rectangular area that can be enclosed by a 20 meter fencing is:
a. 100
b. 50
c. 200
d. 25

15. The area bounded by straight lines x=0, y=0 and x+y=a is
a. a2
b. a/2
c. a2/2
d. a

16. The solution of the system of linear equation x+y=0, 2x+y+z=1 , y+z=-1 is
a. 1,-2,2
b. 1,-1,0
c. 1,2,-2
d. 1,-1,1

17. The value of (cos 15 - sin 15)2 is:
a. 1/2
b. root3/2
c. 1/root2
d. -1/2

18. The solution of differential equation (x+2y3)dy/dx =y is:
a. x2+y2/2  =c
b. x=y3+cy
c. x2/2y+2y3/3=x+c
d. x=y2(c-e-y)

19. ∫x e-x2 dx




20. If A is 2 x 2 matrix with |A|=3 then |A adjA| is:
a. 6
b. 9
c. 4
d. 12

21. the ingredient of brick earth that gives red color to bricks is:
a. Alumina
b. iron oxide
c. Magnesia
d. Silica

22. The steel which is used in RCC is:
a. Cast steel
b. Stainless steel
c. Mild steel
d. Nickel steel

23. The most economical foundation used when heavy structural loads from columns are required to be transferred to a soil of

low bearing capacity is:
a. Raft foundation
b. Stepped Foundation
c. Grillage foundation
d. pile foundation

24. the basic principle of surveying is:
a. Working from whole to the part
b. working from art to the whole
c. Both A and B
d. Reconnaissance

25. the backsight of a BM of RL 150.205 is 1.505m. calculate the HI of the instrument:
a. 150.755
b. 150.205
c. 148.700
d. 151.710

26. The turning moment of a two stroke cycle engine is more uniform than a four stroke engine because:
a. Valve operations are required in four stroke engine , instead parts are used in two stroke engine.
b. In two stroke engine, there is one power stroke in every revolution of crank shaft
c. Both sides of the piston are effective during the operation of a two stroke engine
d. Fuel supply is more uniform in two stroke engine compared to four stroke engine

27. Higher compression ratio is employed in diesel engine compared to petrol engine because:
a. self ignition temperature of diesel fuel is higher than petrol
b. specific gravity of diesel fuel is higher than  petrol
c. hot compressed air is required to ignite the fuel injected in diesel engine
d. residual gas can be reduced at higher compression ratio


28. the function of propeller shaft in an automobile is:
a. to transmit power from gear box to the differential
b. to transmit power from engine to gear box
c. to vary power from minimum to maximum
d. to actuate steering gear mechanism

29. The function of a surge tank in a hydro electric power plant is:
a. to control level of water in  reservoir
b. to increase the power output from turbine
c. to store excess water from reservoir
d. to control the pressure fluctuation in pen stock pipe.

30. Control rod is used in nuclear power plant in order to:
a. control the pressure of coolant
b. control flow rate of coolant
c. control nuclear chain reaction
d. slow down the fast moving neutrons in reactor

31. The condition with which the Ohm's law is valid when:
a. Voltage is directly proportional to current
b. Voltage is inversely proportional to current
c. Current is proportional o resistance
d. Temperature remains constant

32. lenz's law is used to determine the direction of:
a. Dynamically induced emf
b. statically induced emf
c. magnetic field
d. mutually induced emf

33. Two resistors of 10 ohm and 20 ohm are connected in parallel. if the current in 10 ohm resistor is 2A , what is the current in other resistor?
a. 1 A
b. 3 A
c. 2 A
d. 4 A

34. The main function of earth Leakage Circuit breaker (ELCB) is to protect the circuit against:
a. over current
b. under voltage
c. lightning
d. earth leakage current

35. The voltage across an RLC series ac circuit is 10V. What will be the voltage across the capacitor if the voltage across the

resistance is 8V and inductor is 12V?
a. 8V
b. 18V
c. 5V
d. 12V

36. the ripple factor of a full bridge rectifier without any filter connected to it is:
a. 1.11
b. 0.482
c. 1.00
d. 1.21

37. An LED, 1K ohm resistor and a 5V dc source is connected in series.assume the voltage measured across the LED is 2V. the current flow through the LED is:
a. 1mA
b. 10 mA
c. 2 mA
d. 3 mA

38. A microprocessor is classified into 8 bit microprocessor based on its:
a. Data bus width
b. Address bus width
c. ALU width
d. Control bus width

39. The output voltage of a voltage source pulse width modulated inverter depends on:
a. DC battery voltage
b. DC battery voltage and modulation index
c. Output frequency
d. modulation index

40. A Bipolar Junction Transistor is used to drive an SPDT relay. When the relay is energized, the transistor will be operating in

_____ region?
a. Saturation
b. cut off
c. Active
d. Cut off and saturation

41. Which of the following Access control method is probabilistic?
a. Polling
b. Contention
c. Token passing
d. Sliding window

42. one of the addresses in a block 167.199.82.27. What is the last address in this block?
a. 167.199.170.95
b. 167.199.170.96
c. 167.199.170.255
d. 167.199.170.224

43. A network layer firewall works as a :
a. Frame filter
b. packet filter
c. both A  and B
d. none

44. A logic circuit that provides a HIGH output for both inputs HIGH or both inputs LOW:
a. ExOR
b. ExNOR
c. OR
d. NOR

45. When referring to instruction words, a mnemonic is?
a. Shorthand for machine language
b. A short abbreviation for data word stored at operand address
c. A short abbreviation for opearnd address
d. A short abbreviation for operation to be performed

46. Dijkstra's Banking Algorithm in an operating system solves the problem of:
a. Deadlock avoidance
b.  deadlock recovery
c. Mutual Exclusion
d. Context switching

47. Gray code equivalent of (1000)2 is:
a. 1111
b. 1100
c. 1000
d. None

48. Which operator is used by java run time implementations to free the memory of an object when it is no longer needed?
a. Delete
b.  Free
c. New
d. None

49. In which ARQ when a NAK is received all frames sent since the last frame acknowledged are retransmitted?
a. Stop and wait
b. Go back N
c. Selective reject
d. Both A and B

50. A Noiseless 3kHz channel transmits bits with binary level signals. What is the maximum data rate?
a.  3 kbps
b. 6 kbps
c. 12 kbps
d. 24 kbps

51. When an instruction is read from memory it is called?
a. Memory read cycle
b. Fetch cycle
c.Instruction cycle
d. memory write cycle

52. An HTML form is to be designed to enable purchases of office stationery. required  items are to be selected . credit card

details are to be entered and then the submit button is to be pressed. Which of the following options would be appropriate for

sending the data to the server?
a. GET
b .POST
c. Either GET or POST
d. Neither GET nor POST

53. Consider different activities related to email:
m1: send an email from a  mail client to a mail server
m2: Download an email from mailbox to a mail client
m3: Checking email from a web browser
which is the application level protocol used in each activity?

a.  m1: HTTP     m2: SMTP        m3:POP
b .m1:SMTP    m2:FTP        m3:HTTP
c. m1:SMTP    m2:POP        m3:HTTP
d. m1:POP        m2:SMTP        m3:IMAP

54. In an IP packet, the value of HLEN is 15 and the value of total length field is 0028. how many bytes of data are being

carried by this packet?
a. 8
b .40
c. 64
d. 20

55. In asymmetric key cryptography the private key is kept by:
a. sender
b .receiver
c. sender and receiver
d. all connected devices to the network

56. DES encrypts data in block size of______ bits each
a. 64
b .128
c. 32
d. 56

57. Which is true for a typical RISC architecture?
a.  Microprogrammed control unit
b . Instruction takes multiple clock cycles
c. Have few registers in CPU
d. Emphasis on optimizing instruction pipelines

58. A top to bottom relationship among the items in a database is established by:
a.  Hierarchical schema
b .Network schema
c. Relational schema
d. All of above

59. In a GSM system BTS and BSC together form:
a.  Network substation
b .Base station subsystem
c. maintenance subsystem
d. Operational subsystem

60. Mobile phone in roaming is registered in:
a.  Visitors Location Registry of another MSC
b.  Visitors Location registry of same MSC
c.  Home location registry of another MSC
d.  Home Location registry of same MSC


61. In a Piconet , there can be upto ----------- parked nodes in the net
a.  63
b.  127
c.  255
d.  511

62. Minimum number of NAND gates required to implement a ExOR function is:
a.  2
b.  3
c.  4
d.  5

63. A circuit in which connections to both AND and OR arrays can be programmed is called?
a.  RAM
b.  ROM
c.  PAL
d. PLA

64. Consider the schema R=(S  T  U  V) and the dependencies :
S --> T
T --> U
U -->V
V-->S
If R=(R1 and R2) be a decomposition such that R1 ^ R2= null then decomposition is :
a.  Not in 2NF
b.  In 2NF but not in 3NF
c.  in 3NF but not in 2NF
d. in both 2NF and 3NF

65. A flipflop is a:
a.  Combinational circuit
b.  Memory element
c.  Arithmetic element
d.  Memory or arithmetic

66. Which of the following true:
a.  Every relation in 3NF is also in BCNF
b.   relation R is in 3NF ife very non prime attribute of R is fully functionally dependent of every key of R
c.  Every relation in BCNF is also in 3NF
d.  No relation can be both in BCNF and 3NF

67. Offset value of code segment :
a.  Base pointer
b.  Stack pointer
c.  instruction pointer
d.  None

68. A JK flip flop can be implemented using D flip flop connected such that
a.  D= JQ'+ K'Q
b. D=J'Q+ KQ'
c.  D=J'Q'+KQ
d.  D=JQ'+KQ'


69. In a software project, COCOMO is used to estimate:
a.  Effort and duration based on the size of software
b.  Size and duration based on effort of software
c.  Effort and cost based on duration of software
d.  Size , Effort and duration based on cost of software

70. Arithmetic shift left operation:
a.  Produces the same result as obtained with logical shift left operation
b.  Causes sign bit to remain always unchanged
c.  Needs additional hardware to preserve sign bit
d.  is not applicable for signed 2's complement representation


71. Segment number defines:
a.  Distance from the beginning to a particular location in a segment
b.  The ending of segment within the memory space
c.  The starting of segment within the memory space
d.  None of above


72. How can you create a node for comment in javascript?
a.  comment()
b.  createcomment()
c.  comm()
d.  none

73. Which microprocessor pins are used to request and acknowledge a DMA transfer?
a.  reset and ready
b.  ready and wait
c.  HOLD and HLDA
d.  None of the above

74. Consider the following java program segment:
try{
int x=0;
int y=5/x;
}
catch(Exception e)
{
system.out.println("Exception");
}
catch(ArithmetcException ae)
{
System.out.println("Arithmetic exception);
}
System.out.println("Finished");
What will be the output of code segment?
a.  Finished
b.  Exception
c.  Compilation fails
d.  Arithmetic exception


75. Which activity does not take place during execution cycle?
a.  ALU performs the arithmetic and logical operation
b.  Effective address is calculated
c.  Next instruction is fetched
d.  Branch address is calculated and branching conditions are checked

76. SD RAM refers to:
a.  Synchronous RAM
b.  Static RAM
c.  Semi RAM
d.  Second RAM

77. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then:
a.   Deadlock can never occur
b.  Deadlock may occur
c.  Deadlock has to occur
d.  None of the above

78. cache memory works on the principle of:
a.  Locality of data
b.  Locality of reference
c.  Locality of memory
d.  Locality of reference and memory

79. Consider a logical address space of 8 pages of 104 words mapped into memory of 32 frames. how many bits are there in

logical address?
a.  9
b.  11
c.  13
d.  15

80. in a virtual memory system, the addresses used by the programmer belongs to:
a.  memory space
b.  physical address
c.  address space
d.  main memory address

81. What will be the output of the following PHP code
<?php
$a=5;
$b=5;
echo($a===$b);
?>
a.  5===5
b.  error
c.  1
d.  false

82. Determine the number of page faults when references to pages occur in the following orddr: 1,2,4,5,2,1,2,4. Assume that

main memory can accommodate 3 pages and the main memory already has pages 1 and 2 with page 1 having brought earlier than page 2. (LRU algorithm is used).
a. 3
b. 5
c. 4
d. None of above

83. Which of the following is FALSE?
a. Segmentation suffers from external fragmentation
b. Paging suffers from internal fragmentation
c. Segmented memory can be paged
d. Virtual memory is used only in multi user systems

84. Ready pin of a microprocessor is used:
a. To indicate that microprocessor is ready to receive inputs
b. To indicate that microprocessor is ready to receive outputs.
c. To provide direct memory access
d. To introduce wait states

85. An operating system uses shortest remaining time first (SRT) process scheduling algorithm. Consider the arrival times and

execution times for the following processes:
Process        Execution time        Arrival Time
P1        20            0
P2        25            15
P3        10            30
P4        15            45
What is the total waiting time for P2?
a. 5
b. 15
c. 40
d. 55

86. Let R(a,b,c) and S(d,e,f) be two relations in wich d is the foreign key of S that refers to the primary key of R. Consider the

following four operations R and S:
I. Insert into R
II. Insert to S
III. Delete from R
IV. Delete from S

Which of the following can cause violation of referntial integrity constraint above?
a. Bith I and IV
b. Both II and III
c. All of above
d. None of above

87. Given a class named student , which of the following is a valid constructor declaration for the class?
a. Student(student s) {}
b. Student student(){}
c. Private final student(){}
d. void student(){}

88. A binary tree T has n leaf nodes. the number of nodes of degree 2 in T is:
a. logn
b. 2n
c. n
d. 2^n


89. Following sequence of operations is performed on a stack push(1), push(2), pop(),push(1),push(2),pop(),pop(),pop(),push

(2),pop(). The sequence of popped out values are:
a. 2,2,1,1,2
b. 2,2,1,2,2
c. 2,1,2,2,1
d. 2,1,2,2,2

90. What can be said about the array represenation of a circular queue when it contains only one element?
a. FRONT=REAR+1
b. FRONT=REAR-1
c. FRONT=REAR=null
d. None of above


91. In the spiral model of software development the primry determinant in selecting activities in each iteartion is:
a. Iteration size
b. Cost
c. Adopted process such as relational unified process or extreme programming
d. risk


92. A software organization as been assessed at SEICMM level 4. Which of the following does the organization need to practice

beside proces change management anf technology change management in order to acheieve level 5?
a. Defect detection
b. Defect prevention
c. Defect isolation
d. Defect propagation


93. The extent to which a software can control to operate correctly despite the introduction of invalid input is called as:
a. Reliability
b. Robustness
c. Fault tolerance
d. Probability

94. Consider the following code segment  in JAVA:
class X implements Runnable
{
public static void main(String args[])
{
/*Missing code*/
}
public void run()
{
}
}

Which of the following line of code is suitable to start a thread?
a. Thread t= nw Thread(X);
b. Thread t=new Thread(X); t.start();
c. X run=new X(); Thread t=new Thread(run); t.start();
d. Thread t=new Thread(); x.run();

95. Consider the following tree:


                   (1)
       
    (2)                           (3)
(4)        (5)            (6)        (7)



If the post order traversl gives ab-cd*+ then the label of nodes 1,2,...7 wll be?
a.                + , -, * , a, b , c , d
b.                 a , - , b , + ,c ,* , d
c.                a , b , c , d , - , * , +
d.                 - , a , b ,+ , * , c , d


96. The SQL expression
Select distinct T.branchName from branch T,branch S where T.assets>S.assets and S.branchCity = "COCHIN"
Finds the names of:
a. All branches that have greater assets than some branch located in cochin
b. All branches that have greater assets than all branches located in cochin
c. The branch that has greatest asset in COCHIN
d. Any branch that have greater assets than any branch located in cochin


97. Relationship produced from an ER model will always be in:
a. 1NF
b. 2NF
c. 3NF
d. BCNF

98. Which syntax is used to describe elemnts in CSS?
a. Protectors
b. Selectors
c. Both A and B
d. None of above

99. Which object is the main entry point to all client side javascript features and APIs?
a. Standard
b. Location
c. Window
d. Position

100. The let keyword in java script can be used in:
a. in a for or for/in loop as substitute for var
b. as a block statement to define new variables
c. to define variables that are scoped to single expression
d. All the mentioned



Solution:

Thursday, January 22

C code implementing a simple DFA



Hello freinds, 

Here I am posting my C implementation of DFA shown below. This DFA will accept any string containing 'a's and 'b' and last symbol should be 'a'.


#include <stdio.h>

#define TOTAL_STATES 2
#define FINAL_STATES 1
#define ALPHABET_CHARCTERS 2

#define UNKNOWN_SYMBOL_ERR 0
#define NOT_REACHED_FINAL_STATE 1
#define REACHED_FINAL_STATE 2


enum DFA_STATES{q0,q1};
enum input{a,b};
int Accepted_states[FINAL_STATES]={q1};
char alphabet[ALPHABET_CHARCTERS]={'a','b'};
int Transition_Table[TOTAL_STATES][ALPHABET_CHARCTERS];

int Current_state=q0;
void DefineDFA()
{

    Transition_Table[q0][a] = q1;
    Transition_Table[q0][b] = q0;
    Transition_Table[q1][a] = q1;
    Transition_Table[q1][b] = q0;
}

int DFA(char current_symbol)
{
int i,pos;
    for(pos=0;pos<ALPHABET_CHARCTERS; pos++)
        if(current_symbol==alphabet[pos])   
            break;//stops if any character other than a or b
    if(pos==ALPHABET_CHARCTERS)
         return UNKNOWN_SYMBOL_ERR;
    for(i=0;i<FINAL_STATES;i++)
 if((Current_state=Transition_Table[Current_state][pos])
==Accepted_states[i])
            return REACHED_FINAL_STATE;
    return NOT_REACHED_FINAL_STATE;

}


int main(void)
{

    char current_symbol;
    int result;
 
    DefineDFA();    //Fill transition table
 
    printf("Enter a string with 'a' s and 'b's:\n
                Press Enter Key to stop\n");
 
 
    while((current_symbol=getchar())!= '\n')
        if((result= DFA(current_symbol))==UNKNOWN_SYMBOL_ERR)
            break;
    switch (result) {
    case UNKNOWN_SYMBOL_ERR:printf("Unknown Symbol %c",
  current_symbol); 
 break;
    case NOT_REACHED_FINAL_STATE:printf("Not accepted"); break;
    case REACHED_FINAL_STATE:printf("Accepted");break;
    default: printf("Unknown Error");
    }

    printf("\n\n\n");

    return 0;
}


Sunday, January 11

INTERNET SECURITY : Networking Lecture Notes

TOPIC: INTERNET SECURITY



What is IPSec?
IPSecurity (IPSec) is a collection of protocols designed to provide security at the network layer.

Transport mode:  The IPSec header and trailer are added to the information  corning from the transport layer. The IP header is added later.

Tunnel mode: It takes an IP packet, including the header, applies IPSec security methods to the entire packet, and then adds a new IP header .


What are the protocols associated with IPSec?

Authentication Header (AH): provides source authentication and data integrity. The protocol uses a hash function and a symmetric key to create a message digest;


Encapsulating Security Payload (ESP) :source authentication ,data integrity and privacy


What are the reserved Addresses for private networks?
Prefix Range Total
10/8 10.0.0.0 to 10.255.255.255 2^24
172.16/12 172.16.0.0 to 172.31.255.255 2^20
192.168/16 192.168.0.0 to 192.168.255.255 2^16

What is Virtual private Network?

Virtual private network (VPN) is a technology that is  used by large organizations that use the global Internet for both intra- and inter organization communication, but require privacy in their internal communications.

VPN technology uses IPSec in the tunnel mode to provide authentication, integrity, and privacy.
All messages for internal communication will travel through Internet after encapsulated inside another packet using IPSec Tunneling.

The public network (Internet) is responsible for carrying the packet from Source side router  to destination side router. Outsiders cannot decipher the contents of the packet or the
source and destination addresses. Deciphering takes place at destination router, which finds the destination address of the packet and delivers it.

Explain Secure Socket layer (SSL)?

Secure Socket Layer (SSL) is designed to provide security and compression to data generated from the application layer.

1. SSL divides the data into blocks of 214 bytes or less.
2. Each fragment of data is compressed by using one of the lossless compression methods
3. To preserve the integrity of data, SSL uses a keyed-hash function to create a MAC.
4. To provide confidentiality, the original data is encrypted using symmetric key
5. A header is added to the encrypted payload. The payload is then passed to a reliable transport layer protocol.

Transport Layer Security (TLS) is the IETF standard version of SSL.

What is the use of Pretty Good Privacy (PGP)?
 PGP is designed to create authenticated and confidential e-mails.

What is Firewall?

A firewall is a device (usually a router) installed between the internal network of an organization and the rest of the Internet. It is designed to filter some packets.

Packet Filter: It can forward or block packets based on the IP addresses , Transport layer protocol or port addresses. It uses a filtering table to decide which packets must be discarded (not forwarded).

Proxy firewall: The server opens the packet at the application level and finds out if the request is legitimate.

Sunday, October 26

SSC CGL 2014 Questions Answer Key and Cut off

Hey friends...

Here I am posting Questions asked in SSC CGL 2014 and respective answer. Hope it will be seful for SSC Aspirants!

SSC CGL 2014

Name the Italian traveller who visited the Vijayanagar empire in 1420AD?
a)Edoardo Barbosa
b)Nicolode Conti
c) Abdur Razzag
d)Domingos Paes

Ans b

Monday, October 7

IBPS OCTOBER 2013 QUESTIONS

These are the collected Questions Asked In IBPS Exam-06-10-2013.!! hope it will be useful ..!! SHARE IT..



1. Base Rate is decided by?
2. Full Form of RKBY?- Rashtriya Krishi Bima Yojana
3. Monetary Policy is reviewed after?
4. Who is the present Shipping Minister?- G K Vasan
5. Currency of Malaysia?- Malaysian ringgit
6. PAN full form?- Permanent Account Number
7. President of France?- Francois Hollande
8. Human Rights Day is on? December 10
9. Authour of “Interpreter of Maladies”?- Jhumpa Lahari
10. Fulform of MICR?-Magnetic Ink Character Recognition
11. Headquarters of UN Population fund?- Newyork
12. Chambal river flows into?- Yamuna
13. Fund allocated to SC sub groups in budget is?
14. Capital of Greece?- Athens
15. Capital of Dadar & Nagar Haveli?- Silvassa
16. Hirakund dam is situated in?
17. FEMA enacted in which year?- 1999
18. Bank Rate is?
19. Which sports is reinstated in olympics 2020 & 2024?- Wrestling
20. Which is the tiger city?
21. What is pay now buy now?
22. Foreign exchange is managed by?
23. Five year plan is finaly aproved by?
24. Gaganjeet Bhullar is associated with which Game?- Golf
25. Abhjeet Gupta is associated with which sports?- Chess
26. Chillika lake is situated at?- Orissa
27. Cooperative societies act in which year?- 1992

Saturday, September 7

How to Create GOD MODE FOLDER in Windows 7


Hello folks,

This time I'm gonna tell an interesting yet quite useful trick to you. This will help you to make a GOD MODE FOLDER in Windows 7 in just two steps..!!



Wait, What is this GOD MODE FOLDER??


Okay, Simply speaking  it's a folder containing all the shortcuts to just about every settings change and administrative function in Windows 7...!! 

Good.. But Why I need??

Just think ~ All settings in one folder..!! You don't need to swing from one category to another to edit your preference. Usually you have to scan a lot in all categories unless you know exactly where you can edit..

And, it also provides how much we can explore in settings of Windows..!!it's a pretty long list of things to remember - so having a nice reference like this could actually be useful from time to time.

Great... How to create this GOD MODE FOLDER??


Yeah.. With just TWO steps.!!!
  • Create a new folder anywhere
  • Rename the folder and paste in the following text:
    GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
    Cool na?  Hope this trick will be useful for you..!!  :)


Thursday, August 29

Trick to Find Cube Root of a number without Calculator








Today I 'm gonna share a simple  trick to find the Cube Root of any number (perfect Cubes only) without the need of any calculator..!! A sample C program is also providing to  prove this trick will work correctly for all perfect cubes.!!
Here We Go..!!  :)








Trick Used:

We will follow these steps to find the cube root of a number:

1. Ignore the last 3 digits of the number. Let remaining number be “Part1”.
2. From the above table check which number’s cube is less than or equal to ‘Part1’. It will be left part of our answer. Let it be “L”.
3. Let Right part of our answer be “R”. It will be determined from the above table. For Ex. If last digit of question is 7, then last digit of our answer will be 3
4. Our answer will be L|R.


Example 1
Suppose we want to find the cube root of 21952.
Step 1: Ignore last three digits of 21952. Remaining number left is ’21′.
Step 2: From the above table cube of ’2′ is less than ’21′. Therefore left part (L) of our answer will be ’2′.
Step 3: Since last digit of ‘21952‘ is ‘2‘. Therefore right part (R) of our answer will be ’8′. (Because Last digit of ‘cube of 8′ is 2. see table above.)
Step 4: Our Answer will be L|R. Therefore Answer will be 2|8 = 28.

PROOF

This C program verifies  this trick that it will work correctly for all perfect cubes.!!

#include<stdio.h>

int main()

{
 int cube[]= {0,1,8,27,64,125, 216,343 ,512 ,729 };
 int last_digit[]={0,1,8,7,4,5,6,3,2,9};
 int i=0,j=0, num, part1,part2, ans1, ans2,flag;


flag =1;
for (i=0 ;i<44;i++)
{
num =i*i*i;                  // eg : 21952
part1 =  num/1000;           // 21
for (j=0;j<10;j++)

if (cube[j]>part1)           // 27>21
 break;                      //j=3
  ans1 =j-1;                 // ans1 =2

part2 = num%10;              //2
for (j=0;j<10;j++)
if(part2 == last_digit[j]) break;

ans2 = j;                    //8

ans1= ans1*10 +ans2;         //28

if (i!=ans1)  flag = 0;

}    
 if (flag) printf ("VERIFIED");
else printf ("ERROR OCCURED");

      return 1;
      }




Hope this post was useful for you.!!
Your feedback and suggestion are always welcome..!! Keep in touch.
hugs :)