News:

Build a stunning handcrafted website with IT Acumens

Main Menu
Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - kaja mydeen

#1
Yahoo Exec: 'People Don't Want to Search'

Search has become so pervasive on the Web as part of our regular activities that it's tempting to assume it will be central to any future Web advances.
Prabhakar Raghavan, head of research at Yahoo, didn't get the memo.

"It's very limiting to think of the Web as merely a mechanism for retrieving data," Raghavan said in a panel discussion here Tuesday wrapping up the two-day DEMO conference. "The next step is divining the intent of what people are doing and fulfilling their tasks. I've always believed people intrinsically don't want to search, they come to work to do what the boss wants.... We have to get further on achievement than the notion of the retrieval engine as the ultimate target."

One example Raghavan gave of where search is limited is trying to plan a vacation. "You spend hours or days from start to end with repeated search engine queries. At the end there's a glaring inequity, you the human being spent all that time, while the combined CPUs spent five seconds on your task."

Source:internetnews
#2
Talks over Tata Nano car deadlock

Talks have been held in the eastern Indian city of Calcutta to try to end a dispute over the building of the world's cheapest car, the Tata Nano.

The state governor called meetings with government and opposition "fruitful". More negotiations are due on Saturday.

Tata Motors suspended work at the plant in West Bengal state on Tuesday after protests over the acquisition of land from farmers and opposition parties.

The company has said it would consider relocating the car plant.

The conflict has already led to loss of life.

A few hours after Tata announced its plans to suspend work at its car factory, a villager there allegedly committed suicide fearing loss of work for his sons.

And at least six small farmers had earlier killed themselves in Singur when their land was acquired for the Tata project.

Compensation

The BBC's Subir Bhaumik in Calcutta says Tata bosses are not taking part in the discussions, arguing the crisis is political and they have no role in it.

After Friday's negotiations Governor Gopal Krishna Gandhi said: "The talks were fruitful and constructive - it helped both sides understand each other much better. We will meet for talks again on Saturday."

The leader of the opposition in the West Bengal assembly, Partho Chattopadhyay, also called the talks "fruitful".

"But we cannot talk of a solution now. We need more discussions."

The state government said it had made several proposals and was waiting for the opposition to respond.

Opposition supporters have been protesting for a fortnight at the Tata plant in Singur - some 50km (31 miles) north of Calcutta - demanding that 400 acres of requisitioned land be returned to local farmers.

The communist-led state government says that is not going to happen.

Over the last few days there have been protests in Calcutta in support of the Tatas.

The West Bengal business community fears that if Tata leaves, few will want to invest in the state, which is one of India's poorest.

Tata Motors chairman Rata Tata said on Thursday that the company was doing everything possible to launch the Nano on time but it all depended on what happened in Singur.

He had earlier indicated the car, expected to cost 100,000 Indian rupees ($2,500), would be launched in October.

Our correspondent says the state government - which acquired the land for Tata - appears to be ready to offer improved compensation to the farmers.

If that offer is turned down, the world's cheapest car may have to be built somewhere else.

source:livemint
#3
Dell Brings You Dell Inspiron Mini 9

The Inspiron Mini 9 is Dell's first foray into the mini laptop field, a realm populated by such Lilliputian creatures as the ASUS EeePC 900, the MSI Wind, the Lenovo IdeaPad S10, the Acer Aspire One, or the 2133 Mini-Note PC. How does the newcomer hold up to its more established cousins?

Physically its measurements are 6.8 by 9.2 by 1 inches, placing it between the Acer Aspire one and the EeePC 900. It weighs around 1.04 kg, about as much as the other pintsize PCs around. It has a shiny black finish, a black keyboard and silver palm-rest, giving an old-school business look. The screen sports an 8.9 inch diagonal which could stand to be bigger, but this is made up for by its good contrast and clear picture.

Under the hood, we see a 1.6 GHz Intel Atom CPU, 1GB of RAM (you can upgrade this, but not without voiding the warranty) and instead of a spinning-plate hard-disk, it stores information on an 8GB solid-state drive. This doesn't leave much space after OS installation unfortunately, and although there is a $40 upgrade to 16GB, it pales in comparison to, for instance, the MSI Wind's 90GB.

The advantage of a storage solution with no moving parts is there though, and should be taken into consideration. It comes with Windows XP preinstalled, and there is also an option for Ubuntu 8.04 (for the 4 GB version). Other accessories include three USB ports, a 4-in-1 media card reader (SD, MS, MS Pro and MMC), VGA-out, an Ethernet port, and a 1.3-megapixel webcam. The latter makes it suited for video conferences.

All this, coming at a price tag of $474 make it suitable as a secondary laptop for the businessman on the go, or for that matter anybody who doesn't want to carry a heavier 6 pound laptop on an airplane, through customs, or other travel locations.
#4
hi

Its a good Phone

Thanks for the Information and Mobile Picture..

Whats the Price of the Mobile ?


#5
New Sony Walkman Players

Sony just launched new Walkman portable media players: the S, E and B Series. The most interesting one is the high-end S-Series. It comes with a new music management software that's built to be friendly with music collection ripped from CDs (non-DRM files). It also supports windows media video with DRM (WMV) and can play video at 30fps on the 2" QVGA (320x240) LCD display. We would have preferred DivX or H.264, but both are not mentioned anywhere in the specifications. For travelers, the S-Series can act as a noise-cancelling device. If it is anything like previous models, I can tell you that it does reduce noise, but I don't expect it to be as good as dedicated noise-cancelling headphones - but it's not a bad compromise. If on the contrary, you are in a quiet environment, you can use the internal speakers.

* $150 - Walkman NWZ-S736F 4GB
* $180 - Walkman NWZ-S738F 8GB

#6
What's the number one followed by a hundred zeroes called? A Googol. That was the inspiration behind the word, Google. Now, everybody's favourite search engine is launching another blockbuster for the web.

When people say web browser, the first thing that pops in everyone's mind is the Internet explorer. However, this might change soon for Google has just released Chrome, their take on what a web browser should be.

And they have chosen a maverick way to announce it. A comic strip to explain the billion dollar product.

Google claims Chrome will be faster, less crash-prone and more secure than anything on the market yet.

Like Firefox and Opera, it will use tabs but they will be above the address bar, not below it. The address bar will be intuitive, completing addresses based on your previous searches or what's currently popular online.

A speed dial feature will display the most-visited pages and recent searches on a corner of the screen.

Finally, just like the latest Internet Explorer 8, Chrome's privacy mode prevents web activity from being recorded.

Chrome also has an open source which means one can add applications to it, if you know programming that is.

So will Chrome be the answer to your browsing woes? Well first, it has to work. The rest will be decided in the coming months.

#7
Chat Box / Re: Important Facts of EYES
Aug 21, 2008, 09:39 PM
Thats Usefull information

Software Engineers,Designers and Gamers

Take care of your eyes

Thanks for the Post
#8
Today s Word

summon = call for, arraign

use = to summon reinforcements
#9
Warning: Cell Phones Can Cause Explosions At Gas Stations

#10
How Bad Are iPods for Your Hearing?

Hearing loss is more common than ever before. About 16% of American adults have an impaired ability to hear speech, and more than 30% of Americans over age 20 — an estimated 55 million people — have lost some high-frequency hearing, according to a new study published Monday in the Archives of Internal Medicine. The finding has got experts — and concerned parents — wondering anew: Does listening to loud music through headphones lead to long-term hearing loss? Brian Fligor, director of diagnostic audiology at Children's Hospital Boston, explains how much damage your headphone habit might cause — and how to mitigate your risk.



Q: How much hearing loss does an iPod cause?

A: It depends on the person, it depends on how long you're listening, and it depends on the level at which you're setting your iPod.

If you're using the earbuds that come with an iPod and you turn the volume up to about 90% of maximum and you listen a total of two hours a day, five days a week, our best estimates are that the people who have more sensitive ears will develop a rather significant degree of hearing loss — on the order of 40 decibels (dB). That means the quietest sounds audible are 40 dB loud. Now, this is high-pitched hearing loss, so a person can still hear sounds and understand most speech. The impact is going to be most clearly noted when the background-noise level goes up, when you have to focus on what someone is saying. Then it can really start to impair your ability to communicate.

This would happen only after about 10 years or so or even more of listening to a personal audio device. One patient I had used his headphones instead of earplugs when he was on his construction job. He thought as long as he could hear his music over the sound of his saws, he was protecting his ears — because he liked the sound of his music but didn't like the sound of the construction noise. He had a good 50 dB to 55 dB of noise-induced hearing loss at 28 years old. We asked a few pointed questions about when he was having difficulty understanding people, and his response was classic. "When I'm sitting at home with the TV off, I can understand just fine," he said, "but when I go out for dinner, I have trouble."

There is huge variation in how people are affected by loud sound, however, and this is an area where a number of researchers are conducting studies. Certainly a huge part of this is underlying genetics. We know how much sound causes how much hearing loss based on studies that were conducted in the late '60s and early '70s, before employers were required to protect workers' hearing in noisy work environments. What was found is that when people are exposed to a certain level of noise every day for a certain duration, they're going to have a certain degree of hearing loss on average. But the amount of hearing loss might differ by as much as 30 dB between people who had the toughest ears and those with the most tender ones — a huge variation. Unfortunately, we don't know who has the tougher ears and who has the tender ones until after they've lost their hearing. So, as a clinician, I have to treat everyone as if they had tender ears.

Particularly with noise-induced hearing loss, the primary area where the ear is damaged is not the eardrum, not the part of the ear that you can see and not the bones that are inside the middle ear — it is actually deeper inside. It's where the nerve that brings the sound message up to the brain connects with the inner ear, and it involves some very specialized cells. These are hair cells, and specifically we're looking at the outer hair cells. When they're overexposed or stimulated at too high a level for too long a duration, they end up being metabolically exhausted. They are overworked. They temporarily lose their function, so sound has to be made louder in order for you to hear it. These cells can recover after a single exposure, but if you overexpose them often enough, they end up dying, and you lose that functional ability inside your inner ear. The cells that die are not replaceable.

As far as a rule of thumb goes, the figures we got in our studies were that people using that standard earbud could listen at about 80% of maximum volume for 90 minutes per day or less without increasing their risk for noise-induced hearing loss. But the louder the volume, the shorter your duration should be. At maximum volume, you should listen for only about 5 minutes a day.

I don't want to single out iPods. Any personal listening device out there has the potential to be used in a way that will cause hearing loss. We've conducted studies of a few MP3 players and found very similar results across the MP3 manufacturers. Some in-the-ear earphones are capable of providing higher sound levels than some over-the-ear earphones. That said, studies we've done on behavior show that the type of earphones has almost nothing to do with the level at which people set their headphones. It's all dictated by the level of background noise in their listening environment. When we put people in different listening environments, like flying in an airplane — we used noise we'd recorded while flying on a Boeing 757 commercial flight, and we simulated that environment in our lab — 80% of people listened at levels that would eventually put their hearing at risk. On the subway system here in Boston, the ambient noise levels are very comparable to the level on an airplane, although it sounds very different. The noise is sufficiently high that it induces people to listen to their headphones at excessively loud volume.

I'm a self-professed loud-music listener. I use my iPod at the gym, and I love it. I think it's one of the greatest inventions ever. I even advocate that people listen to music as loud as they want. But in order to listen as loud as you want, you need to be careful about how long you're listening. I would also strongly recommend that people invest in better earphones that block out background noise. Some of the research we did studied earphones that completely seal up the ear canal. These are passive sound-isolating earphones, as opposed to the ones that are active noise cancelers that block out some of the noise. As far as I can tell, both would allow people to listen to their headphones at their chosen level — and more likely at a lower volume than if they were using the stock earbuds.
#11
Mercedes-Benz introduces new iPhone integration kit



Mercedes-Benz's current iPod integration kit is pretty weak sauce, especially since the new COMAND nav / multimedia system is so well done, but it looks like the automaker's newest iPhone cradle will take steps to address some of the more glaring issues and also add some interesting new features. The cradle appears to finally integrate iPod controls with the main nav screen and COMAND controller instead of relying solely on the instrument display and steering wheel controls, and it will charge your phone while allowing you to make calls and listen to music. On top of that, plugging the phone in will apparently increase reception by using the vehicle's antennas as well as the iPhone's, and from what we can tell, you'll be able to access the contacts list as well — something MB's current Bluetooth system doesn't allow. If you've already got the iPod kit or Media Interface kit, the adapters needed will run you €39 ($60), and the cradle itself is available now in Germany for €249 ($385). Lots more pics at the read link.
#12
Honey is the only food that does not spoil. Honey found in the tombs of Egyptian pharaohs has been tasted by archaeologists and found edible.

Months that begin on a Sunday will always have a "Friday the 13th."

Coca-Cola would be green if colouring weren't added to it.

On average a hedgehog's  heart beats 300 times a minute.

More people are killed each year from bees than from snakes.

The average lead pencil will draw a line 35 miles long or write approximately 50,000 English words.

More people are allergic to cow's milk than any other food.

Camels have three eyelids to protect themselves from blowing sand.

The placement of a donkey's eyes in its' heads enables it to see all four feet at all times!

The six official languages of the United Nations are: English, French, Arabic, Chinese, Russian and Spanish.

Earth is the only planet not named after a god.

It's against the law to burp, or sneeze in a church in Nebraska, USA.

You're born with 300 bones, but by the time you become an adult, you only have 206.

Some worms will eat themselves if they can't find any food!

Dolphins sleep with one eye open!

It is impossible to sneeze with your eyes open

The worlds oldest piece of chewing gum is 9000 years old!

The longest recorded flight  of a chicken is 13 seconds

Queen Elizabeth I regarded herself as a paragon of cleanliness. She declared that she bathed once every three months, whether she needed it or not

Slugs have 4 noses.

Owls are the only birds who can see the colour blue.

A man named Charles Osborne had the hiccups for 69 years!

A giraffe can clean its ears with its 21-inch tongue!

The average person laughs 10 times a day!

An ostrich's eye is bigger than its brain
#13
Chat Box / 25 Amazing facts in the world
Jul 14, 2008, 08:30 PM
25  Amazing facts in the world

The word "queue" is the only word in the English language that is still pronounced the same way when the last four letters are removed.

Beetles taste like apples, wasps like pine nuts, and worms  like fried bacon.

Of all the words in the English language, the word 'set' has the most definitions!

What is called a "French kiss" in the English speaking world is known as an "English kiss" in France.

"Almost" is the longest word in the English language with all the letters in alphabetical order.

"Rhythm" is the longest English word without a vowel.

In 1386, a pig in France was executed by public hanging for the murder of a child

A cockroach can live several weeks with its head cut off!

Human thigh bones are stronger than concrete.

You can't kill yourself by holding your breath

There is a city called Rome on every continent.

It's against the law to have a pet dog in Iceland!

Your heart beats over 100,000 times a day!

Horatio Nelson, one of England's most illustrious admirals was throughout his life, never able to find a cure for his sea-sickness.

The skeleton of Jeremy Bentham is present at all important meetings of the University of London

Right handed people live, on average, nine years longer than left-handed people

Your ribs move about 5 million times a year, everytime you breathe!

One quarter of the bones in your body, are in your feet!

Like fingerprints, everyone's tongue print is different!

The first known transfusion of blood was performed as early as 1667, when Jean-Baptiste, transfused two pints of blood from a sheep to a young man

Fingernails grow nearly 4 times faster than Removeds!

Most dust particles in your house are made from dead skin!

The present population of 5 billion plus people of the world is predicted to become 15 billion by 2080.
Women blink nearly twice as much as men.

Adolf Hitler was a vegetarian, and had only ONE testicle.
#14
More than 30 Indian youths disappear in New Zealand
      
More than 30 Indian youths have disappeared in New Zealand, where they were in transit to go to Sydney for World Youth Day, a spokeswoman for the Catholic Church said on Monday.

Lyndsay Freear told Radio New Zealand that a party of 220 Indian Catholics who arrived in Auckland a week ago were due to fly to Sydney Tuesday, but 32 of them had disappeared.

All were billeted with church members in Auckland under a so-called Days in the Diocese programme before going to Australia, where Pope Benedict arrived Sunday for events associated with World Youth Day.

Freear said all the Indian pilgrims had been given 30-day visas when they arrived.

Their disappearance was "most extraordinary and most disappointing", she said.

She said the 32 who had disappeared from their billets did not have their passports with them and added, "We don't know whether this was planned or spontaneous."

She said that New Zealand immigration officials had been informed about their disappearance.
#15
Dell India is planning to put more thrust on the laptop segment

D500 model is designed with a focus on Indian and Chinese markets.

The biggest computer manufacturer Dell India is planning to put more thrust on the laptop segment. They are expecting to achieve a higher growth rate of $137 billion by this year. In a press conference, Rajan Anandan VP and GM Dell India told that they have recently started manufacturing laptops in their Sriperumbudur plant by doubling the capacity.


Dell is targeting small and medium business segments along with government and education bodies for their D500 laptop model. They have priced it upwards of Rs.24,500/-, which totally depends on the configuration of laptop. The model is designed with a focus on Indian and Chinese markets. D500 offers the choice of pre-loaded Windows XP Home edition or Ubuntu Linux full application suite.


Dell expects that, by the year 2009 number of laptops sold will overtake the sales of desktops.

#16
Imagine if your computer starts working in Punjabi then ?

Send = Sutto
Insert = Wich Paao
Attachement = Naal Laao
Edit = Sidda Karo
View = Waikhee Jaao
Forward = Aggay Sutto
Inbox = Undar Da Daak Khaana
Outbox = Baar Da Daak Khana
Trash = Mitti Paao
Recycle Bin = Koore Daan
Sent Items = Pheji Gayee Dak
Address Book = Patay Wali Kaapy
Reply = Phejan Walay Nu Jawab do
Reply All = Saareyaan Nu Jawab do
Delete = Daffa Karo
Download = Thallay Laao
Download All = Saary Cheezan Noon Thallay La ao
Properties = Jaidaad
Connect = Naal Milaao
Fonts = Likhaai
Accounts = Galla
Drafts = Chitheeyaan
Find = Labbo
Run = Pajjo
Setting = Kuri Nu Patao
Paste = Thook Naal Chipkaao
From = Phejan Walaa Banda
To = Door Betha Hoya Banda
Subject = Khaas Gall
Carbon Copy = Koelay Walee Naqal
Blind Carbon Copy = Anni Koelay Walee Naqal
Stationery = Pensal, Rubburd, Shaapnar
Folders = Thailay
High priority = Waddee Takleef

and finally Ctrl+Alt+Delete = Sara Syapa Mukao..
#17
Walkin Interview @ L n T Infotech in Chennai on 9th June to 13th June 2008

Walkin Interview Details:

Date: 9th June to 13th June 2008

Venue:
L&T Infotech
L&T Infotech Park
Mount Poonamallee Road,
Manapakkam, Chennai-600 089
Near MIOT hospital or Chennai Trade centre

Position:TM,SSE,PL AND PM
Skills:Java/J2EE

Experience:2 to 9 Years
Position:TM,SSE,PL AND PM
Skills:Mainframe

Experience:3 to 9 Years
Position:SSE,PL AND PM

Skills:Dot net

Experience:5 to 9 Years
Position:PL

Skills:Data Entry Operator,Should have very good communication skills

Experience:0 to 1 Years
#18
Firefox 3 To Make Its Debut On Tuesday, June 17

The third version of the popular browser Firefox will be available for download as soon as Tuesday 17th June, according to a note posted on the Mozilla Developer News weblog.

Mozilla has done a lot of work for this version and Firefox 3 is based on the Gecko 1.9 Web rendering platform, which has been under development for the past 34 months.

As a result Mozilla claims the new Firefox is more secure, more stable, speedier, and easier to use. Also, as you can expect many additional features.

As the security is a sensible issue for all users, Firefox 3 has added some interesting features. For example in the new version you can click the site favicon in the location bar to see who owns the site you are visiting. The identity verification is prominently displayed and easier to understand.

The new browser also integrates malware protection, a system that will warn users when they arrive at sites which are known to install viruses, spyware, trojans or other malware. Also it has a new Web Forgery Protection page, thanks to which the content of pages suspected as web forgeries is no longer shown.

Mozilla also improved the add-on update security and those add-ons that provide updates in an insecure manner will be disabled.

Beside all these security features Firefox 3 offers integration with anti-virus programs, and compliance with Vista's Parental Control settings.

Firefox 3 has also a number of ease of use enhancements. For example, it offers an easier password management (an information bar replaces the old password dialog so you can now save passwords after a successful login), simplified add-on installation, new Download Manager, full page zoom, tab scrolling and quickmenu and text selection improvements: Multiple text selections can be made with Ctrl/Cmd; Double-click drag selects in "word-by-word" mode; Triple-clicking selects a paragraph.

But one of the best features is the resumable downloading: users can now resume downloads after restarting the browser or resetting the network connection.

On the interface side, Firefox 3 has introduced a simpler management of bookmarks. For example it has a Star button with which you can: quickly add bookmarks from the location bar with a single click; a second click lets you file and tag them and Tags, that will let you associate keywords with your bookmarks to sort them by topic.

Mozilla aims for more than just a good Firefox 3.0, it aims for a Guinness World Record, all of course with the users' help. With the motto "Set a Guinness World Record, Enjoy a Better Web," Mozilla started earlier this month a campaign with one clear mission: to become the most downloaded software in 24 hours. Let's wish them good luck.
#19
Indian Oil Corporation Limited, the largest commercial undertaking in India and Fortune "Global 500".

IndianOil is looking for bright and result-oriented persons to join its journey of growth. The Corporation offers excellent opportunities for individual growth and contribution based on performance and potential.

Indian Oil plans to recruit around 400 Engineers/Officers/ HR Professionals/ CA/ ICWA/ Graduate Apprentice Engineers.

Applications are invited from young and energetic persons for abour 400 positions in the various engineering disciplines like Chemical (including petrochemicals), Mechanical (Excluding Production/ Industrial Engg.), Electrical, Civil, Instrumentation, Computer Science/ Information Technology, Metallurgy, Fire Engineering, Boiler Operations (BOEs) & other disciplines covering Human Resources and Finance (CA/ICWA only).

Qualification : The prescribed qualifications with minimum 65% marks in respect of Engineering disciplines ( Engineering / Technology (Chemical [including Petrochemicals], Mechanical [excluding Production/Industrial Engg.], Electrical, Civil, Instrumentation, Metallurgy, Computer Science / Information Technology) and Fire Engineering) and 60% in respect of HR discipline (Master of Business Administration or its equivalent 2-year Post-Graduate Diploma with specialization in Personnel Management & Industrial Relations or Human Resource / Master of Social Work with specialization in Personnel Management & Labour Welfare) for GEN/OBC candidates and pass class for SC/ST/PH candidates in concerned qualifying Degree examination (Full Time Regular Course), from recognized Indian University / Institute. For BOEs (Bachelor's Degree in Engineering/Technology in Electrical or Mechanical with Boiler Operation Engineer's Certificate (1st Class proficiency) and minimum 2 years post BOE experience in the operation of large size ) the requirement of minimum 65% marks in qualifying Engineering Degree Examination is not applicable.

Reservation : For SC/OBC/PH/EXM as applicabl.

Age Limit : Not exceeding 26 years for Engineers/GAEs/Management Graduates(HR) and 28 years for BOEs (relaxation in upper age limit by 5 years for SC/ST/EXSM, 3 years for OBC & 10 years for Physically Challenged persons).

Selection & Placement : The selection methodology will comprise - Written Test on 6th July, 2008 (objective type consisting of two parts - General Aptitude and Discipline Knowledge), Group Discussion / Group Task and Personal Interview for assessment of different facets of Knowledge, Skill, Attitude and Aptitude. Candidates will have to pass through each stage of selection process successfully before being adjudged as suitable for final selection. Candidates applying for BOE discipline, will not be required to appear in the written test.

Pay : Candidates selected as Engineers / Officers will get a Base Pay of Rs.20424/- p.m. (Basic Pay Rs.12000/- plus DA Rs.8424/-) in the scale of pay of Rs.12000-17500/- and will initially undergo training for a specified period before placement.

Fee : General & OBC candidates are required to send a crossed Demand Draft for Rs. 300/- as application fee drawn in INDIAN OIL CORPORATION LIMITED (REFINERIES DIVISION) payable at New Delhi.

Apply Details: The online registration of application commences on 3rd May 2008 and closes on 20th May 2008 at IOC website at http://216.237.121.82/aisl/iocl/. Take a print out of your filled in Application Form, put your signature at the space provided for the purpose and send the same by Ordinary Post along with Demand Draft, attested copy of caste/ disability certificate in case of SC/ST/OBC/PH by ordinary post to the Advertiser, Post Box No. 3098, Lodhi Road Head Post Office, New Delhi - 110003, the same should reach the Post Box latest by 26th May, 2008. Write Application for the post of Engineer/Officer in IOCL - 2007, Discipline and Category at the top left-hand corner of the envelope, while sending the print out of the Application Form as above.

For complete details about this recruitment, visit http://www.iocl.com/PeopleCareers/Careers.aspx
#20
Ofcourse she will be acting in kamal s movie only....

hema come to south and do more movies......
#21
Chat Box / WINNER v/s LOSER
Apr 23, 2008, 11:25 AM
WINNER v/s LOSER

Winners have dreams ;
Losers have schemes.

Winners see the gain;
Losers see the pain.

Winners make it happen;
Losers let it happen.

Winners see possibilities;
Losers see problems.

Winners makes commitments;
Losers makes promises.

Winners are a part of the team;
Losers are apart from the team.

Winner always has a programme
Loser always has an excuse..

Winner says "Let me do it for you";
Loser says "That is not my job".

Winners say "I must do something";
Losers say "Something must be done".

Winner is always a part of the answer;
Loser is always a part of the problem.

Winner sees an answer for every problem;
Loser sees a problem for every answer.

Winners believe in win/win;
Loser believe for them to win, someone has to lose.

Winner says "It may be difficult but it is possible";
Loser says "It may be possible but it is too difficult".

Winner makes a mistake. He says "I was wrong";
Loser makes a mistake; he says "It wasn't my fault".
#22
CITI TECHNOLOGY SERVICES

Solaris Admin

Experience: 4 - 9 Years

Location: Chennai, Mumbai

Education: UG - Any Graduate - Any Specialization PG - Any PG Course - Any Specialization

Industry Type: IT-Software/ Software Services

Functional Area: Client Server

Job Description

Skills required: Solaris version 8 and 10, Veritas Volume Manager and Cluster Services

Experience: 4 to 10 Yrs

Job Location: Chennai or Mumbai

Interested candidates please send us their resume with the following details

Current CTC :

Expected CTC :

Notice Period:

Reason for Change :

Note: Candidates who have attented interview with us in the past six months are not eligible to apply for this position.

HR - Recruitement
CITI Technology Services
sudarsanan.k@citi.com

Company Profile

www.citigroup.com

Contact Details

Company Name: CITI TECHNOLOGY SERVICES

Website: http://www.cititechnologyservices.com

Address:

Ground Floor,West Wing,
Wockhardt Towers,
Bandra Kurla Complex, Bandra (East)
Mumbai - Maharashtra,
INDIA 400051

Email Address: sudarsanan.k@citi.com

Telephone: 91-022-26534088
#23
Multiple Table Insert in Oracle

We will use basic DML Command to insert the values into Oracle tables.

"Insert into" Command will be used to insert the values in the Oracle table, but basically, it will accept insertion for only one table.

"Multiple Table Insert" Concept was introduced from Oracle 9i. I tried the Multiple Table Insert in Single Query in Oracle 9i and above

Basic Syntax

Insert Into Values (Values of the column present in the Table);

Example

Insert into T1 values (5,'Data');

Multiple Table insert Introduced from Oracle 9i and above.

Syntax for Multiple Table Insert

Insert ALL

Into Values

Into Values

Select from ;

Example Multiple Table Insert

Insert All

Into T1 values (Empid, Sal)

Into T2 Values (Empid, DOJ)

Select Eid Empid ,Amt Sal, Date DOJ

from Emp

Where Eid = 1000;

The above query will fetch the Records belongs to Eid 1000 from EMP and insert into T1 and T2 Table in the corresponding Columns
#24
Meiban Engineering Technologies Pvt Ltd

Sales Engineers

Experience: 2 - 5 Years

Location: Bengaluru/Bangalore, Chennai, Hyderabad / Secunderabad

Compensation: Incentives, transport, mobile phone, Medical and accident insurance provided

Education: UG - B.Tech/B.E. - Any Specialization, Automobile, Electrical, Mechanical;Diploma - Any Specialization, Engineering, Mechanical PG - Post Graduation Not RequiredIndustry

Type: Industrial Products/Heavy MachineryFunctional Area:Sales, BD

Job Description

Sales and marketing of CNC sheet metal machines and Metal cutting machines

Desired Candidate Profile

Diplomo or Degree holders in Engineering with a minimum of two years of engineering equipment, engineering capital goodsor accessories sales experience with good communication and presentation skills can apply. Basic Computer knowledge is necessary. Positions are open for Sheet Metal machines and Metal cutting machines.

Company Profile

Meiban Engg. is a fast growing associate company of Muratec, Japan. Muratec is a global leader in manufacturing Textile machinery,Machine Tools, Automation Equipment and communication equpt. Meiban Engg. is involved in the sales and service of the CNC machines.

Contact Details

Company Name: Meiban Engineering Technologies Pvt Ltd

Website: [urlhttp://www.muratec.co.jp]Click here[/url]

Executive Name: A.V. Srinivasan

Address:

Meiban Engineering Technologies Pvt Ltd
370, 4th Cross,
J.P. Nagar 3rd Phase
Bangalore - Karnataka ,
INDIA 560078

Email Address: hr@meibanengg.com, srini@meibanengg.com

Telephone: 91-080-26491229

Fax: 26491239
#25
Requires Lecturers

Qualification :
Lecturers in Civil Engg : Master Degree in Structural Engineering (1 class in B.E./ M.E )
Lecturers in Electrical & Electronics Engg : Master Degree in Power Electronics or Power system or Applied Electronics (1 class in B.E./ M.E )
Lecturers in Management Studies : First class in MBA with specialization in Economics & Finance

Salary : AICTE scales of pay plus Dearness Pay, DA, HRA & CCA as per Tamilnadu Govt. rates.

Apply within 2 weeks with full details and a passport size photograph to

The Principal
BSA Crescent Engineering College
Vandalur,
Chennai - 600048

Phone: 044-22751347/ 348/ 350/ 375

Fax: 044-22750520

Email: principal@crescentcollege.org
#26
Microsoft Model Overview

Before Windows NT 3.1 was released, users had to obtain the TCP/IP protocol suite from a third party, and then install it. This was necessary for users to connect to the network, which in turn usually resulted in a number of issues. When it came to network communication, the TCP/IP software which was obtained and installed often functioned differently to that of the particular operating system.

With the release of Windows NT 3.1, TCP/IP was included as a component of the operating system. Because of TCP/IP being built into the operating system, integration existed between networking functionality in the OS.

The Microsoft model modularly defines hardware and software; and the actual connections between these components that enable networking. The Microsoft model provides a standard platform for application developers and programmers that enable developers to use standard interfaces that provide specific functionality which they can use to develop applications. The Microsoft model is therefore mainly utilized by application developers and programmers.

The advantages of using the Microsoft model are:

    * Decreased application development time
    * Common interfaces are provided for users
    * Simplifies application usage.

Understanding Boundary Layers

Boundary layers are interfaces which exist at the boundaries of functionality. By interacting between the layer above and beneath it, the boundary layers actually provide the interfaces between layers.

The Boundary layers defined in the Microsoft model are:

* Network Driver Interface Specification (NDIS) Boundary layer: The Network Driver Interface Specification (NDIS) Boundary layer relates to the Network Interface layer of the DoD model, and the Data-link layer of the OSI model. The NDIS Boundary layer therefore functions at the bottom of the stack. The NDIS Boundary layer provides the following:
    o Standard functions which enable transport protocols to utilize any network device driver which works at this layer.
    o Programming flexibility and reliability to developers
* Transport Driver Interface Boundary (TDI) Boundary layer: This is the gateway between the Transport layer and the Session layer in the OSI model. It provides the interface which developers can utilize to access functions of the Transport layer, and functions at the Session layer of the OSI model.
* Application Program Interface Boundary (API) Boundary layer: This is the interface that enables developers to access Application layer protocols, including:
    o Domain Name Service (DNS)
    o Dynamic Host Configuration Protocol (DHCP)
    o Windows Internet Name Service (WINS)

The components that perform functions at the lower layers include
    o Windows Sockets (WinSock)
    o Messaging APIs
    o NetBIOS
    o Telephony

Understanding Component Layers

The Component layers provide the following functionality

* Network Transport Protocols: The network transport protocols enable applications to transmit and receive data across the network. Common network transport protocols include:
    o TCP/IP
    o ATM
    o Internet Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
    o NetBEUI
    o AppleTalk
    o Infrared Data Association (IrDA)
    o SNA
* NDIS Wrapper: The NDIS wrapper is implemented via the ndis.sys file. This is the software code that encircles the NDIS device drivers. The NDIS wrapper is a library of common NDIS functions which both the MAC protocols and TCP/IP can utilize. The NDIS wrapper assists in reducing platform dependencies when network interface devices are developed.
* File System Drivers: The file system drivers function at the Presentation layer and Session layer of the OSI model, and include the:
    o Redirector: Requests to access a shared file is sent to the Redirector. The Redirector then chooses the proper Transport layer protocol.
    o Server service: Requests to access a local file are sent to the Server service, which then provides the access to the local file.
* Applications and User Mode Services: APIs provide access to the lower transport protocols:
    o WinSock API: The WinSock API provides standardized access to datagram and session services over:
        + TCP/IP
        + IPX/SPX
        + AppleTalk

The WinSock API enables applications to communicate with the lower layers.
    o Telephony API (TAPI): TAPI provide the standardized interface to network protocols for different telephony applications.
    o Messaging API (MAPI): MAPI enables applications to interface with messaging services through one interface.
    o NetBIOS API: The NetBIOS API is mainly supported in Windows Server 2003 to enable backward compatibility.
#27
Common Methods for Troubleshooting Internet Connectivity

With the technology available today, Internet connectivity can be established in various ways:

    * Remote access server
    * Network Address Translation (NAT)
    * Internet Connections Sharing (ICS)
    * A direct connection by using a device such as a modem or network card

Because of the various methods in which Internet connectivity can be established, and the manner in which certain organizations are dependent on the Internet for daily business transaction, it is important to have some knowledge on the methods which you can utilize to troubleshoot Internet connectivity problems. Where the Internet forms the basis of a business's operations, it is essential that high availability and reliability of Internet connectivity exists. There are various Internet connectivity issues which could arise, different methods and approaches which can be used to resolve these issues, and different tools which you can use to monitor and troubleshoot Internet connectivity issues.

The two standard approaches which you can use to troubleshoot Internet connectivity are:

    * You can start to troubleshoot Internet connectivity issues from the server connection, and progress towards the client. This approach might be better than starting to troubleshoot at the client machine, but only if you are able to identify the issue quite quickly. If not, you could find yourself navigating through various network paths to the client machine.
    * You can start to troubleshoot Internet connectivity issues at the client end and then move towards the server. While this troubleshooting approach seems the better approach, starting at the client machine could have its hiccups, and is slower than starting at the server end.

When faced with having to troubleshoot Internet connectivity issues, it is best to:

   1. Start at the server, and move towards the client.
   2. Navigate back through the network, and to the Internet.

A few common strategies for troubleshooting Internet connectivity issues are listed below. These solutions are a good place to start troubleshooting Internet connectivity issues.

    * Check that the hardware such as network adapter, modem, or whatever other device you are using to establish Internet connectivity is both connected, and functioning.
    * You can use the Ipconfig command to verify the TCP/IP configuration settings of the local host.
    * When dial-up connections are utilized, check the number and credentials which are used.
    * When a gateway is used in the process of establishing Internet connections, ensure that the actual gateway is functioning.
    * When a proxy server is used in the process of establishing Internet connections, ensure that outgoing traffic is allowed.
    * When name resolution issues exist, verify that the DNS servers are available, and that DNS is configured correctly.

One of the initial steps in troubleshooting Internet connectivity issues is to determine the type of connectivity issue. An Internet connectivity issue can be either one of the following:

    * An issue associated with the hardware being utilized
    * An issue associated with network connectivity
    * An issue associated with name resolution

Tools and Utilities for Troubleshooting Internet Connectivity

Network Diagnostics

You can use the Network Diagnostics tool to perform the following tasks:

    * Collect information on hardware and software.
    * Collect information on network connections on a local computer
    * Verify network connectivity
    * Verify whether network services are running
    * Use the information generated by Network Diagnostics to identify connectivity problems.
    * By using Network Diagnostics, you can isolate network issues relating to
          o Network connectivity problems
          o Configuration settings for network adapters, modems, and network clients
          o Internet service configuration settings for proxies, newsgroups and e-mail.
          o DNS, DHCP, and WINS configuration settings
          o Default gateways and IP addresses

Information collected through Network Diagnostics is reported in categories, with each category holding trees of data. To view information contained in a tree, simply expand the particular tree.

The default categories which Network Diagnostics reports information on are:

    * Internet Service category: Contains information on:
          o Internet Explorer Web Proxy configuration
          o Microsoft Outlook Express Mail
          o Microsoft Outlook Express News
    * Computer Information category: Contains information on:
          o Registry configuration settings for the operating system, and computer system
    * Modems And Network Adapters category: Contains information on:
          o Registry configuration settings for the network adapters, modems, and network clients.

To open and use Network Diagnostics,

   1. Click Start, and then click Help And Support
   2. Click Tools from the Support Tasks area.
   3. Select Help and Support Center Tools.
   4. Select Network Diagnostics.
   5. To start a Network Diagnostics scan on the local computer environment, click Scan Your System.
   6. To add and remove categories of data collected; click Set Scanning Options in the Network Diagnostics window.

The Netdiag Command

The Netdiag command-line utility is included on the Windows Server 2003 installation CD, and can be installed from the CD. You can use the utility to troubleshoot connectivity problems. If you have installed the Windows Server 2003 Support Tools, the Netdiag command-line utility is installed. Netdiag executes a number of tests on the local computer to determine the network client's status. You can use Netdiag's output to troubleshoot network problems.

A few default tests which can be run from Netdiag are listed below:

    * Netcard Queries Test: This test determines the network adapter configuration settings such as IP address and default gateway.
    * Domain Membership Test: The test verifies information on the domain, such as domain name and domain GUID, computer role, and whether the Netlogon service has started.
    * DNS Test: The test verifies whether the DNS cache service is presently running, and checks whether the computer is registered on the DNS servers. For a domain controller, the test checks if the entries in Netlogon.dns are registered on the DNS server.
    * IP Security Test: Checks whether IP security is enabled, and then lists all active Internet Protocol Security (IPSec) policies.
    * Binding Test: The test produces information specific to bindings:
          o Owner of the binding
          o Interface name
          o Lists whether the binding is enabled.
          o Lower module name and upper module name
    * NetBT Name Test: This test checks whether the workstation service name and computer name are equal, and checks whether the messenger service name and server service name exist on each interface.
    * WINS Service Test: Transmits NetBT Name queries to the WINS servers.
    * WAN Configuration Test: Lists the current remote access connection's status and settings.

The Netsh Command

The Netsh command-line utility can be used to troubleshoot Internet connectivity issues, and to change the network configuration of both the local computer and a remote computer. In Windows Server 2003, diagnostic commands are included for Netsh, and could be of assistance when you have to troubleshoot Internet connectivity.

The Netsh diag command contexts are listed below:

    * Connect ieproxy: Used to establish or drop, and verify a connection with the proxy specified in Internet Explorer's Properties window.
    * Connect iphost: Used to establish or drop, and verify a connection with a host via a specific port.
    * Connect mail: Used to establish or drop, and verify a connection with the host defined as the mail server in Outlook Express.
    * PING: Used to verify whether connectivity exists with a specific remote host.
    * PING adapter: Used to verify whether connectivity exists via a specific adapter. If you want to test connectivity via all network adapters, use no parameters.
    * PING DNS: Used to verify whether connectivity exists with the DNS servers defined in the specific adapter's TCP/IP Properties window.
    * PING gateway: Used to verify whether connectivity exists with the default gateways defined in the specific adapter's TCP/IP Properties window.
    * PING ieproxy: Used to verify connectivity with the proxy specified in Internet Explorer's Properties window.
    * PING iphost: Used to verify connectivity with either a local host or a remote host.
    * PING mail: Used to verify connectivity with the host defined as the mail server in Outlook Express.
    * Show gateway: For listing all Internet gateways for a particular adapter.
    * Show ieproxy: For listing all Internet proxy servers for the particular adapters.
    * Show mail: For listing the Outlook Express mail server set up on the local computer.
    * Show modem: For listing information specific to the modem.

The Ipconfig utility


As mentioned earlier, a good starting point when troubleshooting Internet connectivity issues is to verify the TCP/IP configuration settings on the server and client. The switches of the Ipconfig utility which can be used from the command prompt to verify IP configuration settings are listed below:

    * /all, lists all configuration information.
    * /flushdns, to purge the DNS cache.
    * /registerdns, to refresh each DHCP lease, and to register the DNS names.
    * /release, to release the IP address which is assigned to the particular adapter.
    * /renew, to renew the IP address which is assigned to the particular adapter.

Troubleshooting Hardware Issues

To establish Internet connectivity, some form of hardware device is utilized. You can use Device Manager to troubleshoot hardware issues relating to network adapters, modems, and other devices. Device Manager is the graphical utility that displays all the devices installed on the system. Device Manager can be used for the following:

    * To enable or disable devices
    * Change hardware settings and advanced settings for a particular device
    * You can use Device Manager to view information specific to devices and device drivers, and when troubleshooting devices.

To open Device Manager,

   1. Right-click My Computer and select Properties from the shortcut menu.
   2. Click the Hardware tab
   3. Click the Device Manager button.
   4. The initial view when you open Device Manager lists all the devices currently installed on the computer.

To use Device Manager to troubleshoot hardware issues,

   1. Open Device Manager
   2. Open the Properties window of the device which you want to troubleshoot.
   3. Check the status of the device.
   4. For basic troubleshooting tips, click the Troubleshoot button.
   5. For modem issues, check the information on the Diagnostics tab.
#28
Troubleshooting and Monitoring Network Address Translation (NAT) Activity

NAT is typically used to enable a small organization's users to access the Internet. NAT works well to enable Internet access for those smaller networks which are not routed. When client machines use NAT to access the Internet, the internal IP address of the client machines are mapped to an external IP address. In addition, the private IP address has to map the proper port for the required protocol to the external port for the identical protocol.

For NAT to function:

    * Routing and Remote Access Services (RRAS) must be running on a multihomed computer.
    * Either a network interface configured with the public IP address, or a network interface configured to use demand dial routing has to exist so that NAT can get the public address from your Internet Service Provider (ISP).

Clients that obtain their IP configurations automatically from the NAT server receive the following:

    * IP address from the specified pool
    * Subnet mask
    * Default gateway
    * DNS server

When NAT is used to establish Internet connectivity, one of the first tasks which you should perform when Internet connectivity issues arise, is to check the NAT configuration:

    * Your private LAN interfaces and your public interface to the Internet have to be added to the NAT routing protocol.
    * Each interface has to be set up to utilize the proper settings.
    * On the NAT/Basic Firewall tab of the private interface's properties, the Private Interface Connected To Private Network option under the Interface Type area of the tab has to be selected.
    * When troubleshooting NAT activity, verify that the correct Static Packet Filters options have been selected. These settings are also configured using the NAT/Basic Firewall tab of the private interface's properties. To open the Inbound Filters dialog box, click the Inbound Filters button. You can configure filters based on the following criteria:
          o Filter action: The action options that can be configured are:
                + Receive all packets except those that meet the criteria defined in the Filters list.
                + Drop all except those that meet the criteria defined in the Filters list.
          o Filters defined in the Filters List: Filters defined in the Filters List include the settings listed below:
                + Source network IP address and subnet mask; indicates the source of the packet
                + Destination network IP address and subnet mask; indicates the packet's destination.
                + Protocol to filter; indicates the protocol (TCP, UDP), source port, and destination port utilized by the filter.
    * On the NAT/Basic Firewall tab of the public interface's properties, the Enable NAT On This Interface checkbox has to be selected so that the NAT protocol can map internal address requests to the public interface. To access the NAT/Basic Firewall tab of the public interface,
         1. Open the Routing and Remote Access Console
         2. Expand the NAT/Basic Firewall node.
         3. Right-click external interface adapter LAN connection and select Properties from the shortcut menu.
    * If you want to block public Internet access to the private network, select the Enable a basic firewall on this interface checkbox.
    * You can check the mappings of NAT clients in the Network Address Translation Mappings Table. In the NAT/Basic Firewall pane of RRAS console, simply right-click the interface.
    * You can view IP, TCP and UDP information by right-clicking the interface in the General pane of the RRAS console.
    * You can use the Netstat utility to view client mappings, and to determine which process or application is the owner of a particular connection.

Troubleshooting Name Resolution

The types of name resolution typically utilized to resolve names to IP addresses are:

    * Host name resolution translates a host name to an IP address. When WinSock programs are configured to utilize host name resolution to establish a connection to remote hosts, either of the following can be utilized:
          o IP address
          o Host name
      The forms of host names are:
          o Fully qualified domain names (FQDNs)
          o Aliases
      To troubleshoot host name resolution, you can use the following command-line utilities:
          o Nslookup: This command-line utility can be utilized to perform the following tasks:
                + Execute domain name queries against a DNS server.
                + Verify or validate entries contained in the zone records within the DNS database.
                + View zone files.
          o Netdiag: This command-line utility can be utilized to perform the following tasks:
                + Check DNS and WINS name resolution.
                + Check network services (IPSec).
          o Dnscmd: This command-line utility can be utilized to perform the following tasks:
                + Configure DNS servers.
                + View and verify records contained in the DNS database.
                + Add and delete records in the DNS database.
                + Administer zones.
          o Dcdiag: This command-line utility can be utilized together with the Netdiag and Dnscmd utilities to verify that your domain controllers are operating as expected.
    * NetBIOS name resolution resolves the NetBIOS name to the NetBIOS resource. A NetBIOS name consists of 16 characters. A unique 15 character name is based on the host computer's name, and the last character indicates the host computer's role. The different NetBIOS node types which can be specified for the client host affects the manner in which NetBIOS names are resolved to IP addresses. The different NetBIOS node types are listed below:
          o B-node type - broadcast: Broadcasts NetBIOS name queries for resolving NetBIOS names.
          o P-node type - peer-peer: Resolves NetBIOS names via a direct request to a NetBIOS name server.
          o M-node type - mixed: Uses a combination of B-node and P-node. B-node broadcasts are attempted first. When unsuccessful, NetBIOS names are resolved via a direct request to a NetBIOS name server.
          o H-node type - hybrid: Uses a combination of P-node and B-node. In this instance, a direct request is first sent directly to a NetBIOS name server, and B -node broadcasts are utilized after this.

You can use the ipconfig utility, discussed previously in this Article, to view information on the IP address configurations of adapters such as subnet mask, and default gateway.
Troubleshooting IP Addressing Problems

The tools which should be utilized to troubleshoot IP addressing problems and to pinpoint addressing issues associated with client configuration settings and connections to hosts on the Internet are:

    * Ping
    * Ipconfig
    * Tracert

A few common problems which result from manually configuring IP addresses are listed below:

    * Duplicated IP addresses
    * Incorrect or even missing DNS and WINS name resolution configuration settings.
    * Incorrect or invalid subnet masks and default gateways.

A few strategies which can be used to troubleshoot IP addressing issues are listed below:

    * Use the Ipconfig utility by entering ipconfig /all at a command prompt.
    * To verify that the TCP/IP protocol stack has been configured correctly, ping the loopback address.
    * To verify that the default gateway can be contacted, ping the address of the default gateway.
    * To ensure that data can be passed over the default gateway, ping the IP address of the remote host.
    * To verify that no address conflicts exist, and to verify that the host is on the network; ping the external IP address of the local computer.

DHCP simplifies the administration of IP addressing assignment for large networks by eliminating most of the issues which arise from manually configuring IP addresses. You can also eliminate address conflicts which are usually caused by manual IP address configurations. With DHCP, a machine sends a request for a lease to the DHCP server using a DHCPREQUEST message. Machines that obtain IP addresses from the DHCP server basically obtain a lease. The lease duration for a particular IP address is determined by the DHCP scope configured on the DHCP server. The default is eight days.

The factors that you should consider when deciding on the lease duration are:

    * The lease duration should be short when the number of hosts is fairly close to the total number of IP addresses included in the scope of the DHCP server.
    * The lease duration can be long when the number of IP addresses far exceeds the number of hosts.
    * You can configure long lease durations when you have a few mobile users and the client machines hardly ever move between networks.
    * You should set up shorter lease durations when you have quite a number of mobile users.

When planning your DHCP implementation, include the points listed below:

    * The lease duration
    * The number of hosts in a DHCP scope
    * DHCP scope options
    * Expected network traffic

A few typical situations that could prevent the DHCP server from relaying DHCP information to clients are:

    * The IP addresses in the DHCP scope are depleted.
    * The Boot Protocol (BOOTP) is being blocked by a router
    * There are no DHCP relay agents on those segments with no BOOTP relay.

A few approaches which can be used to troubleshoot DHCP issues are:

    * Verify that the address range is being allocated correctly.
    * Verify that the gateway is valid.
    * Check that the DNS servers are pointing to the correct location.
#29
Monitoring Network Activity with Network Monitor

The tool which you can utilize to both monitor and log network activity as it occurs on the network is the Network Monitor. You can use the information obtained from Network Monitor to optimize network traffic as well. Network Monitor stems directly from the Windows NT Network Monitor. Network Monitor is included with Windows Server 2003.

The key administration tasks which you can perform using Network Monitor are summarized below:

    * You can capture frames directly from the network which you are monitoring.
    * You can configure capture filters to specify the type of information which should be captured by Network Monitor.
    * You can view captured frames immediately once the capture is complete, or at some later stage.
    * You can filter captured frames by creating display filters. This allows you to find specific information in a capture.
    * You can create triggers if you want certain actions performed when the content of a packet(s) match a predefined condition.
    * You can edit captured frames and pass them on.
    * You can capture frames from a remote computer.

There are two versions of Network Monitor available:

    * The basic Network Monitor version which is included with Windows Server 2003.
    * The full Network Monitor version which is included with Microsoft Systems Management Server (SMS).

The main differences between the two versions of Network Monitor are:

    * Basic Network Monitor version: You can monitor network activity and capture frames only on the local computer running Network Monitor.
    * Full Network Monitor version: You can monitor network activity and capture frames on all devices on the network segment. The features listed below are solely available when the full version is utilized:
          o Capture frames from a remote computer
          o Edit captured frames and pass them on.
          o Resolve device names to MAC addresses
          o You can also determine information:
                + The user who is consuming the most bandwidth
                + The protocol that is consuming the most bandwidth
                + The devices which are routers

Network Monitor contains the following components:


    * Network Monitor Driver: The Network Monitor driver is the component of Network Monitor which captures frames passed to and passed from the network adapter on which it is installed. The Network Monitor driver therefore needs to be installed on the machine for which you want to monitor network activity.
    * Network Monitor Tools (application): The network monitor tools are used to examine and analyze traffic which was captured by the Network Monitor driver.

A few requirements to use Network Monitor for monitoring network activity are summarized below:

    * The basic version of Network Monitor included with Windows Server 2003 can only be used to capture frames on Windows 2000 and Windows XP clients.
    * The full version of Network Monitor included with Systems Management Server (SMS) has to be used to capture frames for Windows NT, Windows 98, and Windows 95 clients.
    * If you want to monitor network activity throughput the network, you have to utilize the full version of Network Monitor.

How to install Network Monitor included with Windows Server 2003
While Network Monitor is shipped with Windows Server 2003, it is not automatically installed when you install Windows Server 2003. When you install Network Monitor, the Network Monitor driver is automatically installed.

To install Network Monitor,

1. Click Start, and then click Control Panel.
2. Click Add Or Remove Programs to open the Add Or Remove programs dialog box.
3. Click Add/Remove Windows Components.
4. The Windows Components Wizard launches.
5. Select Management and Monitoring Tools and click the Details button.
6. On the Management and Monitoring Tools dialog box, select the Network Monitor Tools checkbox and click OK.
7. Click Next when you are returned to the Windows Components Wizard.
8. If prompted during the installation process for additional files, place the Windows Server 2003 CD-ROM into the CD-ROM drive. If the required files exist on the network, specify the location to these files.
9. Click Finish on the Completing the Windows Components Wizard page.

While the Network Monitor driver is automatically installed when you install Network Monitor, there may be situations when you need to manually install the Network Monitor driver.

To install the Network Monitor driver,

1. Click Start, click Control Panel, and then click Network Connections.
2. Right-click Local Area Connection, and click Properties from the shortcut menu.
3. Click the Install button on the Properties dialog box.
4. When the Select Network Component Type dialog box opens, click Protocol in the Component list, and then click Add.
5. In the Select Network Protocol dialog box, select Network Monitor Driver.
6. Click OK.

In Network Monitor, the Frame Viewer window is used to view the contents of any captured frames. To view captured data during the capture, select Stop And View from the Capture menu. The Capture window in Network Monitor displays information on the frames' statistics.

How to change the default size of the capture buffer
The size of the capture buffer determines how much data can be viewed in Network Monitor. The buffer setting which you specify cannot be more than the actual available physical memory. To change the buffer setting,

1. Open Network Monitor
2. Select Buffer Settings from the Capture menu.
3. The Capture Buffer Settings dialog box appears.
4. Proceed to change the Buffer Size (MB) setting and Frame Size (Bytes) setting.

How to configure Network Monitor to display address names over hexadecimal network addresses

1. Open Network Monitor
2. Select Show Address Names from the Options menu
3. A check mark is displayed alongside Show Address Names.

How to configure the amount of information that you want to print for captured frames

1. Open Network Monitor
2. The Frame Viewer window is used to configure the amount of information which you want to print.
3. Select Print from the File menu
4. When the Print dialog box appears, click the Netmon tab
5. In the Output Detail section, select one of the following
          * Print Frame Summary Lines
          * Print Protocol Details
          * Print Hex Data.

How to create a capture filter
Creating a capture filter involves defining those capture conditions which should be used to capture frames. You can define the capture conditions which should be used by specifying:

    * Capture filter protocols
    * Address pairs
    * Data pattern matches

To create a capture filter,

1. Open Network Monitor.
2. Select Filter from the Capture menu.
3. The Capture Filter dialog box opens.
4. All capture filters are illustrated in a decision tree.
5. To create a capture filter, double-click the default filter

How to create a display filter

   1. Open Network Monitor
   2. Select Filter from the Display menu.
   3. The Display Filter dialog box appears.
   4. Proceed to configure the required display filter.
#30
Monitoring Network Activity with System Monitor

You can use System Monitor to monitor, collect and measure real-time performance data of the local computer or of a remote computer. You can monitor real-time activity by viewing current data, or you can monitor data from a log file.

System Monitor enables you to perform the following tasks to monitor network activity.

    * You can collect real-time performance data on different elements of system performance.
    * You can collect data from the local computer or from a remote network computer.
    * You can collect data from one computer or from multiple computers at the same time.
    * You can define which data should be collected by specifying certain objects and counters.
    * You can create specific monitoring configurations for monitoring data which you can export to, and use on other computers.
    * You can view real-time data, or you can view log files. You create log files by saving the collected data to file.
    * You can view and analyze collected data in a number of formats:
          o Graph view
          o Histogram view
          o Report view
    * You can also create HTML pages to view data

How System Monitor works
System Monitor uses objects, counters and instances to monitor the system. An object is a collection of counters which are associated with a system resource or service. As the object executes a function, its associated counters are updated. A counter represents data for a particular component of the system or service. Each object has a set of counters. An instance refers to the incident of multiple performance objects of the identical type on a computer. An object can have one or multiple instances.

The objects most commonly used for monitoring network activity are listed below:

    * Browser object, monitors the Browser service for the domain or the workgroup
    * Cache object, monitors disk cache usage
    * Memory object, monitors physical and virtual memory performance
    * Objects object, monitors the events, processes and threads on the computer as data is collected.
    * Paging File object, monitors page file usage
    * Physical Disk object, monitors the hard disks
    * Process object, monitors the processes running on the computer
    * Processor object, monitors the processors on the system.
    * Server object, monitors items such as bytes, sessions, pool paged usage, and pool non-paged usage.
    * System object, monitors counters associated with system hardware and software
    * Thread object. monitors threads running in the system

You have to be a member of one of the groups listed below to use System Monitor:

    * Administrators group
    * Server Operators group
    * Performance Log Users group
    * Performance Monitor Users group

The Network Interface performance object which you can use to monitor data sent to and from a computer, is automatically added in System Monitor when the TCP/IP protocol is installed. The counters which can be used to isolate network card problems/issues are listed below:

    * Packet Outbound Errors: Shows the number of outbound packets which could not be sent because of errors.
    * Packet Received Errors: Shows the number of received packets which could not be forwarded because they had errors.
    * Packets Outbound Discarded: Shows the number of packets that had no errors, which were discarded.
    * Packets Received Discarded: Shows the number of received packets that had no errors, which were discarded.

How to start System Monitor

   1. Click Start, click Administrative Tools, and then click System Monitor.
   2. If this is the first time that you are accessing System Monitor, you will notice that there are default counters which are tracked:
          * Memory - Pages/Sec
          * PhysicalDisk - Avg. Disk Queue Length
          * Processor - % Processor Time

How to add counters to System Monitor

   1. Open System Monitor.
   2. Click the Add button located on the toolbar.
   3. When the Add Counters dialog box opens, choose one of the following options:
          * To monitor the local computer, click the Local Computer Counters option.
          * To monitor the remote computer, click Select Counters From Computer, and select the computer which you want to utilize.
   4. Choose the performance object from the available list.
   5. To monitor each counter associated with the object which you have selected, click the All Counters option. To monitor only certain counters, click the Select Counters From List option, and select the counters from the available list box.
   6. To track all associated instances, click the All Instances option. To track only certain instances, click the Select Instances From List option, and then choose the instances from the available list box.
   7. Click Add.
#31
.NET And Asp.Net Interview Questions Answers

How many languages .NET is supporting now?

When .NET was introduced it came with several languages. VB.NET, C#, COBOL and Perl, etc. 44 languages are supported.

How is .NET able to support multiple languages?

A language should comply with the Common Language Runtime standard to become a .NET language. In .NET, code is compiled to Microsoft Intermediate Language (MSIL for short). This is called as Managed Code. This Managed code is run in .NET environment. So after compilation to this IL the language is not a barrier. A code can call or use a function written in another language.

How ASP .NET different from ASP?

Scripting is separated from the HTML, Code is compiled as a DLL, these DLLs can be executed on the server.

What is smart navigation?

The cursor position is maintained when the page gets refreshed due to the server side validation and the page gets refreshed.

What is view state?

The web is stateless. But in ASP.NET, the state of a page is maintained in the in the page itself automatically. How? The values are encrypted and saved in hidden controls. this is done automatically by the ASP.NET. This can be switched off / on for a single control

How do you validate the controls in an ASP .NET page?

Using special validation controls that are meant for this. We have Range Validator, Email Validator.

Can the validation be done in the server side? Or this can be done only in the Client side?
Client side is done by default. Server side validation is also possible. We can switch off the client side and server side can be done.

How to manage pagination in a page?

Using pagination option in DataGrid control. We have to set the number of records for a page, then it takes care of pagination by itself.

What is ADO .NET and what is difference between ADO and ADO.NET?

ADO.NET is stateless mechanism. I can treat the ADO.Net as a separate in-memory database where in I can use relationships between the tables and select insert and updates to the database. I can update the actual database as a batch.

Explain the differences between Server-side and Client-side code?

Server side scripting means that all the script will be executed by the server and interpreted as needed. ASP doesn't have some of the functionality like sockets, uploading, etc. For these you have to make a custom components usually in VB or VC++. Client side scripting means that the script will be executed immediately in the browser such as form field validation, clock, email validation, etc. Client side scripting is usually done in VBScript or JavaScript. Download time, browser compatibility, and visible code - since JavaScript and VBScript code is included in the HTML page, then anyone can see the code by viewing the page source. Also a possible security hazards for the client computer.

What type of code (server or client) is found in a Code-Behind class?

C#

Should validation (did the user enter a real date) occur server-side or client-side? Why?
Client-side validation because there is no need to request a server side date when you could obtain a date from the client machine.

What does the "EnableViewState" property do? Why would I want it on or off?

Enable ViewState turns on the automatic state management feature that enables server controls to re-populate their values on a round trip without requiring you to write any code. This feature is not free however, since the state of a control is passed to and from the server in a hidden form field. You should be aware of when ViewState is helping you and when it is not. For example, if you are binding a control to data on every round trip (as in the datagrid example in tip #4), then you do not need the control to maintain it's view state, since you will wipe out any re-populated data in any case. ViewState is enabled for all server controls by default. To disable it, set the EnableViewState property of the control to false.

What is the difference between Server.Transfer and Response.Redirect?

Why would I choose one over the other? Server.Transfer() : client is shown as it is on the requesting page only, but the all the content is of the requested page. Data can be persist across the pages using Context.Item collection, which is one of the best way to transfer data from one page to another keeping the page state alive. Response.Dedirect() :client know the physical location (page name and query string as well). Context.Items loses the persistence when navigate to destination page. In earlier versions of IIS, if we wanted to send a user to a new Web page, the only option we had was Response.Redirect. While this method does accomplish our goal, it has several important drawbacks. The biggest problem is that this method causes each page to be treated as a separate transaction. Besides making it difficult to maintain your transactional integrity, Response.Redirect introduces some additional headaches. First, it prevents good encapsulation of code. Second, you lose access to all of the properties in the Request object. Sure, there are workarounds, but they're difficult. Finally, Response.Redirect necessitates a round trip to the client, which, on high-volume sites, causes scalability problems. As you might suspect, Server.Transfer fixes all of these problems. It does this by performing the transfer on the server without requiring a roundtrip to the client.

Can you give an example of when it would be appropriate to use a web service as opposed to a non-serviced .NET component?

When to Use Web Services:

* Communicating through a Firewall When building a distributed application with 100s/1000s of users spread over multiple locations, there is always the problem of communicating between client and server because of firewalls and proxy servers. Exposing your middle tier components as Web Services and invoking the directly from a Windows UI is a very valid option.

* Application Integration When integrating applications written in various languages and running on disparate systems. Or even applications running on the same platform that have been written by separate vendors.

* Business-to-Business Integration This is an enabler for B2B integration which allows one to expose vital business processes to authorized supplier and customers. An example would be exposing electronic ordering and invoicing, allowing customers to send you purchase orders and suppliers to send you invoices electronically.

* Software Reuse This takes place at multiple levels. Code Reuse at the Source code level or binary component-based reuse. The limiting factor here is that you can reuse the code but not the data behind it. Webservice overcome this limitation. A scenario could be when you are building an app that aggregates the functionality of several other Applications. Each of these functions could be performed by individual apps, but there is value in perhaps combining the multiple apps to present a unified view in a Portal or Intranet.

* When not to use Web Services: Single machine Applications When the apps are running on the same machine and need to communicate with each other use a native API. You also have the options of using component technologies such as COM or .NET Components as there is very little overhead.

* Homogeneous Applications on a LAN If you have Win32 or Winforms apps that want to communicate to their server counterpart. It is much more efficient to use DCOM in the case of Win32 apps and .NET Remoting in the case of .NET Apps.
#32
.NET And Asp.Net Interview Questions Answers

Can you explain the difference between an ADO.NET Dataset and an ADO Recordset?
In ADO, the in-memory representation of data is the RecordSet. In ADO.NET, it is the dataset. There are important differences between them.

* A RecordSet looks like a single table. If a recordset is to contain data from multiple database tables, it must use a JOIN query, which assembles the data from the various database tables into a single result table. In contrast, a dataset is a collection of one or more tables. The tables within a dataset are called data tables; specifically, they are DataTable objects. If a dataset contains data from multiple database tables, it will typically contain multiple DataTable objects. That is, each DataTable object typically corresponds to a single database table or view. In this way, a dataset can mimic the structure of the underlying database. A dataset usually also contains relationships. A relationship within a dataset is analogous to a foreign-key relationship in a database —that is, it associates rows of the tables with each other. For example, if a dataset contains a table about investors and another table about each investor's stock purchases, it could also contain a relationship connecting each row of the investor table with the corresponding rows of the purchase table. Because the dataset can hold multiple, separate tables and maintain information about relationships between them, it can hold much richer data structures than a recordset, including self-relating tables and tables with many-to-many relationships.

* In ADO you scan sequentially through the rows of the recordset using the ADO MoveNext method. In ADO.NET, rows are represented as collections, so you can loop through a table as you would through any collection, or access particular rows via ordinal or primary key index. DataRelation objects maintain information about master and detail records and provide a method that allows you to get records related to the one you are working with. For example, starting from the row of the Investor table for "Nate Sun," you can navigate to the set of rows of the Purchase table describing his purchases. A cursor is a database element that controls record navigation, the ability to update data, and the visibility of changes made to the database by other users. ADO.NET does not have an inherent cursor object, but instead includes data classes that provide the functionality of a traditional cursor. For example, the functionality of a forward-only, read-only cursor is available in the ADO.NET DataReader object. For more information about cursor functionality, see Data Access Technologies.

* Minimized Open Connections: In ADO.NET you open connections only long enough to perform a database operation, such as a Select or Update. You can read rows into a dataset and then work with them without staying connected to the data source. In ADO the recordset can provide disconnected access, but ADO is designed primarily for connected access. There is one significant difference between disconnected processing in ADO and ADO.NET. In ADO you communicate with the database by making calls to an OLE DB provider. In ADO.NET you communicate with the database through a data adapter (an OleDbDataAdapter, SqlDataAdapter, OdbcDataAdapter, or OracleDataAdapter object), which makes calls to an OLE DB provider or the APIs provided by the underlying data source. The important difference is that in ADO.NET the data adapter allows you to control how the changes to the dataset are transmitted to the database — by optimizing for performance, performing data validation checks, or adding any other extra processing. Data adapters, data connections, data commands, and data readers are the components that make up a .NET Framework data provider. Microsoft and third-party providers can make available other .NET Framework data providers that can be integrated into Visual Studio.

* Sharing Data Between Applications. Transmitting an ADO.NET dataset between applications is much easier than transmitting an ADO disconnected recordset. To transmit an ADO disconnected recordset from one component to another, you use COM marshalling. To transmit data in ADO.NET, you use a dataset, which can transmit an XML stream.

* Richer data types.COM marshalling provides a limited set of data types — those defined by the COM standard. Because the transmission of datasets in ADO.NET is based on an XML format, there is no restriction on data types. Thus, the components sharing the dataset can use whatever rich set of data types they would ordinarily use.

* Performance. Transmitting a large ADO recordset or a large ADO.NET dataset can consume network resources; as the amount of data grows, the stress placed on the network also rises. Both ADO and ADO.NET let you minimize which data is transmitted. But ADO.NET offers another performance advantage, in that ADO.NET does not require data-type conversions. ADO, which requires COM marshalling to transmit records sets among components, does require that ADO data types be converted to COM data types.

* Penetrating Firewalls.A firewall can interfere with two components trying to transmit disconnected ADO recordsets. Remember, firewalls are typically configured to allow HTML text to pass, but to prevent system-level requests (such as COM marshalling) from passing.

Can you give an example of what might be best suited to place in the Application_Start and Session_Start subroutines?
The Application_Start event is guaranteed to occur only once throughout the lifetime of the application. It's a good place to initialize global variables. For example, you might want to retrieve a list of products from a database table and place the list in application state or the Cache object. SessionStateModule exposes both Session_Start and Session_End events.

If I'm developing an application that must accomodate multiple security levels though secure login and my ASP.NET web appplication is spanned across three web-servers (using round-robbin load balancing) what would be the best approach to maintain login-in state for the users?

What are ASP.NET Web Forms? How is this technology different than what is available though ASP?

Web Forms are the heart and soul of ASP.NET. Web Forms are the User Interface (UI) elements that give your Web applications their look and feel. Web Forms are similar to Windows Forms in that they provide properties, methods, and events for the controls that are placed onto them. However, these UI elements render themselves in the appropriate markup language required by the request, e.g. HTML. If you use Microsoft Visual Studio .NET, you will also get the familiar drag-and-drop interface used to create your UI for your Web application.

How does VB.NET/C# achieve polymorphism?
By using Abstract classes/functions.

Can you explain what inheritance is and an example of when you might use it?
Inheritance is a fundamental feature of an object oriented system and it is simply the ability to inherit data and functionality from a parent object. Rather than developing new objects from scratch, new code can be based on the work of other programmers, adding only new features that are needed.

How would you implement inheritance using VB.NET/C#?
When we set out to implement a class using inheritance, we must first start with an existing class from which we will derive our new subclass. This existing class, or base class, may be part of the .NET system class library framework, it may be part of some other application or .NET assembly, or we may create it as part of our existing application. Once we have a base class, we can then implement one or more subclasses based on that base class. Each of our subclasses will automatically have all of the methods, properties, and events of that base class ? including the implementation behind each method, property, and event. Our subclass can add new methods, properties, and events of its own - extending the original interface with new functionality. Additionally, a subclass can replace the methods and properties of the base class with its own new implementation - effectively overriding the original behavior and replacing it with new behaviors. Essentially inheritance is a way of merging functionality from an existing class into our new subclass. Inheritance also defines rules for how these methods, properties, and events can be merged.

What's an assembly?
Assemblies are the building blocks of .NET Framework applications; they form the fundamental unit of deployment, version control, reuse, activation scoping, and security permissions. An assembly is a collection of types and resources that are built to work together and form a logical unit of functionality. An assembly provides the common language runtime with the information it needs to be aware of type implementations. To the runtime, a type does not exist outside the context of an assembly.

Describe the difference between inline and code behind - which is best in a loosely coupled solution?
ASP.NET supports two modes of page development: Page logic code that is written inside <script runat=server> blocks within an .aspx file and dynamically compiled the first time the page is requested on the server. Page logic code that is written within an external class that is compiled prior to deployment on a server and linked "behind" the .aspx file at run time.

Explain what a diffgram is, and a good use for one?
A DiffGram is an XML format that is used to identify current and original versions of data elements. The DataSet uses the DiffGram format to load and persist its contents, and to serialize its contents for transport across a network connection. When a DataSet is written as a DiffGram, it populates the DiffGram with all the necessary information to accurately recreate the contents, though not the schema, of the DataSet, including column values from both the Original and Current row versions, row error information, and row order.

Where would you use an iHTTPModule, and what are the limitations of anyapproach you might take in implementing one?
One of ASP.NET's most useful features is the extensibility of the HTTP pipeline, the path that data takes between client and server. You can use them to extend your ASP.NET applications by adding pre- and post-processing to each HTTP request coming into your application. For example, if you wanted custom authentication facilities for your application, the best technique would be to intercept the request when it comes in and process the request in a custom HTTP module.

In what order do the events of an ASPX page execute. As a developer is it important to understand these events?
Every Page object (which your .aspx page is) has nine events, most of which you will not have to worry about in your day to day dealings with ASP.NET. The three that you will deal with the most are: Page_Init, Page_Load, Page_PreRender.

Which method do you invoke on the DataAdapter control to load your generated dataset with data?
System.Data.Common.DataAdapter.Fill(System.Data.DataSet);
If my DataAdapter is sqlDataAdapter and my DataSet is dsUsers then it is called this way:
sqlDataAdapter.Fill(dsUsers);

Which template must you provide, in order to display data in a Repeater control?
ItemTemplate

How can you provide an alternating color scheme in a Repeater control?
AlternatingItemTemplate Like the ItemTemplate element, but rendered for every other row (alternating items) in the Repeater control. You can specify a different appearance for the AlternatingItemTemplate element by setting its style properties.

What property must you set, and what method must you call in your code, in order to bind the data from some data source to the Repeater control?
You must set the DataMember property which Gets or sets the specific table in the DataSource to bind to the control and the DataBind method to bind data from a source to a server control. This method is commonly used after retrieving a data set through a database query.

What base class do all Web Forms inherit from?
System.Web.UI.Page

What method do you use to explicitly kill a user's session?
The Abandon method destroys all the objects stored in a Session object and releases their resources.
If you do not call the Abandon method explicitly, the server destroys these objects when the session times out.
Syntax: Session.Abandon

How do you turn off cookies for one page in your site?
Use the Cookie.Discard Property which Gets or sets the discard flag set by the server. When true, this property instructs the client application not to save the Cookie on the user's hard disk when a session ends.

Which two properties are on every validation control?
ControlToValidate & ErrorMessage properties

How do you create a permanent cookie?
Setting the Expires property to MinValue means that the Cookie never expires.

Which method do you use to redirect the user to another page without performing a round trip to the client?
Server.transfer()
#33
.NET And Asp.Net Interview Questions Answers

What is the transport protocol you use to call a Web service?

Answer1:
SOAP. Transport Protocols: It is essential for the acceptance of Web Services that they are based on established Internet infrastructure. This in fact imposes the usage of of the HTTP, SMTP and FTP protocols based on the TCP/IP family of transports. Messaging Protocol: The format of messages exchanged between Web Services clients and Web Services should be vendor neutral and should not carry details about the technology used to implement the service. Also, the message format should allow for extensions and different bindings to specific transport protocols. SOAP and ebXML Transport are specifications which fulfill these requirements. We expect that the W3C XML Protocol Working Group defines a successor standard.

Answer2:
SOAP is not the transport protocol. SOAP is the data encapsulation protocol that is used but the transport protocol is fairly unlimited. Generally HTTP is the most common transport protocol used though you could conceivanly use things like SMTP or any others. SOAP is not dependant on any single transport protocol or OS, it is a syntactical and logical definition, not a transport protocol.

True or False: A Web service can only be written in .NET.?

False.

What does WSDL stand for?

Web Services Description Language

Where on the Internet would you look for Web services?

UDDI repositaries like uddi.microsoft.com, IBM UDDI node, UDDI Registries in Google Directory, enthusiast sites like XMethods.net.

What tags do you need to add within the asp:datagrid tags to bind columns manually?

Column tag and an ASP:databound tag.

How is a property designated as read-only?

In VB.NET:
Public ReadOnly Property PropertyName As ReturnType
Get 'Your Property Implementation goes in here
End Get
End Property

in C#
public returntype PropertyName
{
get{
//property implementation goes here
}
// Do not write the set implementation
}

Which control would you use if you needed to make sure the values in two different controls matched?

Use the CompareValidator control to compare the values of 2 different controls.

True or False: To test a Web service you must create a windows application or Web application to consume this service?
False.

How many classes can a single .NET DLL contain?

Unlimited.

Describe session handling in a webfarm, how does it work and what are the limits?

Set the sessionState mode in the web.config file to "StateServer".
StateServer mode uses an out-of-process Windows NT Server to store state information.
It solves the session state loss problem in InProc mode.
Allows a webfarm to store session on a central server.
It provides a Single point of failure at the State Server.

Follow these simple steps:

- In a web farm, make sure you have the same in all your web servers.
- Also, make sure your objects are serializable.
- For session state to be maintained across different web servers in the web farm, the Application Path of the website in the IIS Metabase should be identical in all the web servers in the web farm.

What are the disadvantages of viewstate/what are the benefits?

Answer1:
Disadvantage of viewstate is that additional data is sent to the browser. The benefits are that you do not have to manually manage refreshing the page fields after a submit, (when re-displaying the same page).

Answer2:
Automatic view-state management is a feature of server controls that enables them to repopulate their property values on a round trip (without you having to write any code). This feature does impact performance, however, since a server control's view state is passed to and from the server in a hidden form field. You should be aware of when view state helps you and when it hinders your page's performance.

What tags do you need to add within the asp:datagrid tags to bind columns manually?

Answer1:
Set AutoGenerateColumns Property to false on the datagrid tag

Answer2:
tag and either or tags (with appropriate attributes of course)

What is State Management in .Net and how many ways are there to maintain a state in .Net? What is view state?

Web pages are recreated each time the page is posted to the server. In traditional Web programming, this would ordinarily mean that all information associated with the page and the controls on the page would be lost with each round trip.
To overcome this inherent limitation of traditional Web programming, the ASP.NET page framework includes various options to help you preserve changes — that is, for managing state. The page framework includes a facility called view state that automatically preserves property values of the page and all the controls on it between round trips.
However, you will probably also have application-specific values that you want to preserve. To do so, you can use one of the state management options.
Client-Based State Management Options:
View State
Hidden Form Fields
Cookies
Query Strings
Server-Based State Management Options
Application State
Session State
Database Support

What tag do you use to add a hyperlink column to the DataGrid?

Depends on who's definition of hyperlink your using. Manually a std html anchor tag (a) will work or you can use the micro-magical tag

What is the standard you use to wrap up a call to a Web service?

Several possible answers depending on your interpretation of the quesiton, but I think you were aiming for SOAP (with the caveat that this is MS's version of SOAP)

What is the difference between boxing and unboxing ?

Boxing allows us to convert value types to reference types. Basically, the runtime creates a temporary reference-type box for the object on heap.
Eg:
int i=20;
object o=i;

Describe the difference between a Thread and a Process?

Answer1:
Thread - is used to execute more than one program at a time.
process - executes single program

Answer2:
A thread is a path of execution that run on CPU, a proccess is a collection of threads that share the same virtual memory. A process have at least one thread of execution, and a thread always run in a process context.

Answer3:
The operating system creates a process for the purpose of running a program. Each process executes a single program. Processes own resources allocated by the operating system. Resources include memory, file handles, sockets, device handles, and windows. Processes do not share address spaces or file resources except through explicit methods such as inheriting file handles or shared memory segments, or mapping the same file in a shared way.
Threads allow a program to do multiple things concurrently. At least one thread exists within each process. If multiple threads can exist within a process, then they share the same memory and file resources.

Answer4:
Thread is a light weight process, which is initialized itself by a process. Light weigt processes does not loads resources required by it itself, these are loaded by its parent process which has generated it.

What is a Windows Service and how does its lifecycle differ from a "standard" EXE?

Windows Service applications are long-running applications that are ideal for use in server environments. The applications do not have a user interface or produce any visual output; it is instead used by other programs or the system to perform operations. Any user messages are typically written to the Windows Event Log. Services can be automatically started when the computer is booted. This makes services ideal for use on a server or whenever you need long-running functionality that does not interfere with other users who are working on the same computer. They do not require a logged in user in order to execute and can run under the context of any user including the system. Windows Services are controlled through the Service Control Manager where they can be stopped, paused, and started as needed.
#34
.NET And Asp.Net Interview Questions Answers

What is the difference between an EXE and a DLL?

An EXE can run independently, whereas DLL will run within an EXE. DLL is an in-process file and EXE is an out-process file

What is strong-typing versus weak-typing? Which is preferred? Why?

Strong type is checking the types of variables as soon as possible, usually at compile time. While weak typing is delaying checking the types of the system as late as possible, usually to run-time. Which is preferred depends on what you want. For scripts & quick stuff you'll usually want weak typing, because you want to write as much less code as possible. In big programs, strong typing can reduce errors at compile time.

What are PDBs? Where must they be located for debugging to work?

Answer1:
To debug precompiled components such as business objects and code-behind modules, you need to generate debug symbols. To do this, compile the components with the debug flags by using either Visual Studio .NET or a command line compiler such as Csc.exe (for Microsoft Visual C# .NET) or Vbc.exe (for Microsoft Visual Basic .NET).

Using Visual Studio .NET
1. Open the ASP.NET Web Application project in Visual Studio .NET.
2. Right-click the project in the Solution Explorer and click Properties.
3. In the Properties dialog box, click the Configuration Properties folder.
4. In the left pane, select Build.
5. Set Generate Debugging Information to true.
6. Close the Properties dialog box.
7. Right-click the project and click Build to compile the project and generate symbols (.pdb files).

Answer2:
A program database (PDB) file holds debugging and project state information that allows incremental linking of a Debug configuration of your program.
The linker creates project.PDB, which contains debug information for the project's EXE file. The project.PDB contains full debug information, including function prototypes, not just the type information found in VCx0.PDB. Both PDB files allow incremental updates.
They should be located at bin\Debug directory

What is cyclomatic complexity and why is it important?

Cyclomatic complexity is a computer science metric (measurement) developed by Thomas McCabe used to generally measure the complexity of a program. It directly measures the number of linearly independent paths through a program's source code.

The concept, although not the method, is somewhat similar to that of general text complexity measured by the Flesch-Kincaid Readability Test.

Cyclomatic complexity is computed using a graph that describes the control flow of the program. The nodes of the graph correspond to the commands of a program. A directed edge connects two nodes, if the second command might be executed immediately after the first command. By definition,

CC = E - N + P

where
CC = cyclomatic complexity
E = the number of edges of the graph
N = the number of nodes of the graph
P = the number of connected components.

What is FullTrust? Do GAC'ed assemblies have FullTrust?

Your code is allowed to do anything in the framework, meaning that all (.Net) permissions are granted. The GAC has FullTrust because it's on the local HD, and that has FullTrust by default, you can change that using caspol

What does this do? gacutil /l | find /i "about"

Answer1:
This command is used to install strong typed assembly in GAC

Answer2:
gacutil.exe is used to install strong typed assembly in GAC. gacutil.exe /l is used to lists the contents of the global assembly cache. |(pipe) symbol is used to filter the output with another command. find /i "about" is to find the text "about" on gacutil output. If any lines contains the text "about" then that line will get displayed on console window.

Contrast OOP and SOA. What are tenets of each

Service Oriented Architecture. In SOA you create an abstract layer that your applications use to access various "services" and can aggregate the services. These services could be databases, web services, message queues or other sources. The Service Layer provides a way to access these services that the applications do not need to know how the access is done. For example, to get a full customer record, I might need to get data from a SGL Server database, a web service and a message queue. The Service layer hides this from the calling application. All the application knows is that it asked for a full customer record. It doesn't know what system or systems it came from or how it was retrieved.

How does the XmlSerializer work? What ACL permissions does a process using it require?

XmlSerializer requires write permission to the system's TEMP directory.

Why is catch(Exception) almost always a bad idea?

Well, if at that point you know that an error has occurred, then why not write the proper code to handle that error instead of passing a new Exception object to the catch block? Throwing your own exceptions signifies some design flaws in the project.

What is the difference between Debug. Write and Trace. Write? When should each be used?

Answer1:
The Debug. Write call won't be compiled when the DEBUG symbol is not defined (when doing a release build). Trace. Write calls will be compiled. Debug. Write is for information you want only in debug builds, Trace. Write is for when you want it in release build as well. And in any case, you should use something like log4net because that is both faster and better

Answer2:
Debug. Write & Trace. write - both works in Debug mode, while in Release Mode,Trace.write only will work .Try changing the Active Config property of Solution in Property page nd find the difference. Debug.write is used while debugging a project and Trace.write is used in Released version of Applications.

What is the difference between a Debug and Release build? Is there a significant speed difference? Why or why not?

Debug build contain debug symbols and can be debugged while release build doesn't contain debug symbols, doesn't have [Conational("DEBUG")] methods calls compiled, can't be debugged (easily, that is), less checking, etc. There should be a speed difference, because of disabling debug methods, reducing code size etc but that is not a guarantee (at least not a significant one)

Contrast the use of an abstract base class against an interface?

Answer1:
In the interface all methods must be abstract, in the abstract class some methods can be concrete. In the interface no accessibility modifiers are allowed, which is ok in abstract classes

Answer2:
Whether to Choose VB.NET/C#.
Both the languages are using same classes and namespaces. Once it compile and generates MSIL, there is no meaning of which language it was written. If you are Java/C++ programmer better to choose C# for same coding style otherwise you can choose VB.net.
#35
.NET And Asp.Net Interview Questions Answers

What is the difference between a.Equals(b) and a == b?

Answer1:
a=b is used for assigning the values (rather then comparison) and a==b is for comparison.

Answer2:
a == b is used to compare the references of two objects
a.Equals(b) is used to compare two objects

Answer3:
A equals b -> copies contents of b to a
a == b -> checks if a is equal to b

Answer4:
Equals method compares both type and value of the variable, while == compares value.
int a = 0;
bool b = 0

if(a.Equals(b))

Answer5:
a.Equals(b) checks whether the Type of a is equal to b or not! Put it in another way,
Dim a As Integer = 1
Dim b As Single = 1

a.Equals(b) returns false. The Equals method returns a boolean value.
a == b is a simple assignment statement.

Answer6:
a.equals(b) will check whether the "b" has same type as "a" has and also has the same data as "a" has.
a==b will do the same thing.
if you have done this in c++ under "operator overloading" than you guys must be aware of this sytaxts. they are doing the same thing there is only sytaxtical difference.
let me explain it in different manner.
a==b : means compare "b" with "a". always left hand side expression evaluated first so here in this case "a" (considered an object) will call the overloaded operator "=" which defines "Equals(object)" method in it's class. thus, ultimately a.equals(b) goanna called.
so the answer is: both will perform the same task. they are different by syntaxt

Answer7:
Difference b/w a==b,a.Equals(b)
a.Equals(b):
The default implementation of Equals supports reference equality only, but derived classes can override this method to support value equality.

For reference types, equality is defined as object equality; that is, whether the references refer to the same object. For value types, equality is defined as bitwise equality
== :
For predefined value types, the equality operator (==) returns true if the values of its operands are equal, false otherwise. For reference types other than string, == returns true if its two operands refer to the same object. For the string type, == compares the values of the strings.

How would one do a deep copy in .NET?

Answer1:
System.Array.CopyTo() - Deep copies an Array

Answer2:
How would one do a deep copy in .NET?
The First Approach.
1.Create a new instance.
2.Copy the properties from source instance to newly created instance.
[Use reflection if you want to write a common method to achive this]

The Second Approach.
1. Serialize the object and deserialize the output.
: Use binary serialization if you want private variables to be copied.
: Use xml Serialization if you dont want private variable to be copied.

What is boxing?

Boxing is an implicit conversion of a value type to the type object
int i = 123; // A value type
Object box = i // Boxing
Unboxing is an explicit conversion from the type object to a value type
int i = 123; // A value type object box = i; // Boxing
int j = (int)box; // Unboxing

Is string a value type or a reference type?
Answer1:
String is Reference Type.
Value type - bool, byte, chat, decimal, double, enum , float, int, long, sbyte, short,strut, uint, ulong, ushort
Value types are stored in the Stack
Reference type - class, delegate, interface, object, string
Reference types are stored in the Heap


Answer2:
Yes String is reference type. C# gives two types of variable reference and value type. string and object are reference type.

How does the lifecycle of Windows services differ from Standard EXE?

Windows services lifecycle is managed by "Service Control Manager" which is responsible for starting and stopping the service and the applications do not have a user interface or produce any visual output, but "Standard executable" doesn't require Control Manager and is directly related to the visual output

What's wrong with a line like this? DateTime.Parse(myString)

the result returned by this function is not assigned to anything, should be something like varx = DateTime.Parse(myString)

NET is Compile Time OR RunTime Environment?

.Net's framework has CLS,CTS and CLR.CTS checks declartion of types at the time when u write code and CLS defines some rules and restrictions.and CLR comile everything at runtime with following benefits: Vastly simplified development Seamless integration of code written in various languages Evidence-based security with code identity Assembly-based deployment that eliminates DLL Hell Side-by-side versioning of reusable components Code reuse through implementation inheritance Automatic object lifetime management Self describing objects

Describe the role of inetinfo.exe, aspnet_isapi.dll andaspnet_wp.exe in the page loading process.

inetinfo.exe is theMicrosoft IIS server running, handling ASP.NET requests among other things.When an ASP.NET request is received (usually a file with .aspx extension),the ISAPI filter aspnet_isapi.dll takes care of it by passing the request tothe actual worker process aspnet_wp.exe.

What's the difference between Response.Write() andResponse.Output.Write()?

The latter one allows you to write formattedoutput.

What methods are fired during the page load?

Init() - when the pageis
instantiated, Load() - when the page is loaded into server memory,PreRender()
- the brief moment before the page is displayed to the user asHTML, Unload()
- when page finishes loading.

Where does the Web page belong in the .NET Framework class hierarchy?

System.Web.UI.Page

Where do you store the information about the user's locale?

System.Web.UI.Page.Culture

What's the difference between Codebehind="MyCode.aspx.cs" andSrc="MyCode.aspx.cs"?

CodeBehind is relevant to Visual Studio.NET only.

What's a bubbled event?

When you have a complex control,  like DataGrid, writing an event processing routine for each object (cell, button, row, etc.) is quite tedious. The controls can bubble up their event handlers, allowing the main DataGrid event handler to take care of its constituents.

Suppose you want a certain ASP.NET function executed on MouseOver overa certain button. Where do you add an event handler?

It's the Attributesproperty,
the Add function inside that property. So

btnSubmit.Attributes.Add("onMouseOver","someClientCode();")

A simple"Javascript:ClientCode();" in the button control of the .aspx page will attach the handler (javascript function)to the onmouseover event.

What data type does the RangeValidator control support?

Integer,String and Date.
#36
Oracle, DBA - Interview Questions - Placement Papers

1. What is a mutating table error and how can you get around it?

2. Describe the use of %ROWTYPE and %TYPE in PL/SQL

3. What packages (if any) has Oracle provided for use by developers?

4. Describe the use of PL/SQL tables

5. When is a declare statement needed ?

6. In what order should a open/fetch/loop set of commands in a PL/SQL block be implemented if you use the %NOTFOUND cursor variable in the exit when statement? Why?

7. What are SQLCODE and SQLERRM and why are they important for PL/SQL developers?

8. How can you find within a PL/SQL block, if a cursor is open?

9. How can you generate debugging output from PL/SQL?

10. What are the types of triggers?

11. Why in 10G, when you use real time apply feature in conjunction with Maximum Protection, you can achive

12. You have taken import of a table in a database. you have got the Integrity constraint violation error.

13. what are the diffrent file types that are supported by SQL*Loader?

14. How to find how many database reside in Oracle server in query?

15. Assuming today is Monday, how would you use the DBMS_JOB package to schedule the execution of a given

16. What spfile/init.ora file parameter exists to force the CBO to make the execution path of a given statement

17. HOW 2 ENABLE PARTITIONING FEAUTURE IN ORACLE 8i

18. How many memory layers are in the shared pool?

19. What are the attributes of the Virtual Indexes

20. Virtual Indexes in Oracle

21. What are materialized views? when are they used?

22. What is a functional index - explain?

23. Where we use bitmap index ?

24. What is an extent

25. How to you move from Dedicated server Process to a Shared Server Process

26. What are the components of physical database structure of Oracle database

27. What are the components of logical database structure of Oracle database

28. How can be determine the size of the log files

29. How can be determine the size of the database?

30. How can you check which user has which Role

31. Can you start a database without SPfile in oracle 9i?

32. Do a view contain data

33. Can objects of the same schema reside in different tablespaces

34. can we create index on long raw column?

35. What are the basic element of base configuration of an Oracle database

36. What is the function of redo log.
#37
Oracle Job Interview questions PL/SQL SQL

1. You have just had to restore from backup and do not have any control files. How would you go about bringing up this database?

2. How do you switch from an init.ora file to a spfile?

3. Explain the difference between a data block, an extent and a segment.

4. Give two examples of how you might determine the structure of the table DEPT.

5. Where would you look for errors from the database engine?

6. Compare and contrast TRUNCATE and DELETE for a table.

7. Give the reasoning behind using an index.

8. Give the two types of tables involved in producing a star schema and the type of data they hold.

9. What type of index should you use on a fact table?

10. Give two examples of referential integrity constraints.

11. A table is classified as a parent table and you want to drop and re-create it. How would you do this without affecting the children tables?

12. Explain the difference between ARCHIVELOG mode and NOARCHIVELOG mode and the benefits and disadvantages to each.

13. What command would you use to create a backup control file?

14. Give the stages of instance startup to a usable state where normal users may access it.

15. What column differentiates the V$ views to the GV$ views and how?

16. How would you go about generating an EXPLAIN plan?

17. How would you go about increasing the buffer cache hit ratio?
#38
FAQ In Object Oriented Concepts


· What is friend function?

· What is a scope resolution operator?

· What do you mean by inheritance?

· What is abstraction?

· What is polymorphism? Explain with an example.

· What is encapsulation?

· What do you mean by binding of data and functions?

· What is function overloading and operator overloading?

· What is virtual class and friend class?

· What do you mean by inline function?

· What do you mean by public, private, protected and friendly?

· When is an object created and what is its lifetime?

· What do you mean by multiple inheritance and multilevel inheritance? Differentiate between them.

· Difference between realloc() and free?

· What is a template?

· What are the main differences between procedure oriented languages and object oriented languages?

· What is R T T I ?

· What are generic functions and generic classes?

· What is namespace?

· What is the difference between pass by reference and pass by value?

· Why do we use virtual functions?

· What do you mean by pure virtual functions?

· What are virtual classes?

· Does c++ support multilevel and multiple inheritance?

· What are the advantages of inheritance?

· When is a memory allocated to a class?

· What is the difference between declaration and definition?

· What is virtual constructors/destructors?

· In c++ there is only virtual destructors, no constructors. Why?

· What is late bound function call and early bound function call? Differentiate.

· How is exception handling carried out in c++?

· When will a constructor executed?

· What is Dynamic Polymorphism?

· Write a macro for swapping integers.
#39
FAQ In Object Oriented Concepts

· Which header file should you include if you are to develop a function which can accept variable number
   of arguments?

· Can you write a function similar to printf()?

· How can a called function determine the number of arguments that have been passed to it?

· Can there be at least some solution to determine the number of arguments passed to a variable argument
  list function?

· How do you declare the following:

· An array of three pointers to chars

· An array of three char pointers

· A pointer to array of three chars

· A pointer to function which receives an int pointer and returns a float pointer

· A pointer to a function which receives nothing and returns nothing

· What do the functions atoi(), itoa() and gcvt() do?

· Does there exist any other function which can be used to convert an integer or a float to a string?

· How would you use qsort() function to sort an array of structures?

· How would you use qsort() function to sort the name stored in an array of pointers to string?

· How would you use bsearch() function to search a name stored in array of pointers to string?

· How would you use the functions sin(), pow(), sqrt()?

· How would you use the functions memcpy(), memset(), memmove()?

· How would you use the functions fseek(), freed(), fwrite() and ftell()?

· How would you obtain the current time and difference between two times?

· How would you use the functions randomize() and random()?

· How would you implement a substr() function that extracts a sub string from a given string?

· What is the difference between the functions rand(), random(), srand() and randomize()?

· What is the difference between the functions memmove() and memcpy()?

· How do you print a string on the printer?

· Can you use the function fprintf() to display the output on the screen?

· What is an object?

· What is the difference between an object and a class?

· What is the difference between class and structure?

· What is public, protected, private?

· What are virtual functions?
#40
FAQ In Object Oriented Concepts


· What is the maximum combined length of command line arguments including the space between adjacent
  arguments?

· If we want that any wildcard characters in the command line arguments should be appropriately
  expanded, are we required to make any special provision? If yes, which?

· Does there exist any way to make the command line arguments available to other functions without
  passing them as arguments to the function?

· What are bit fields? What is the use of bit fields in a Structure declaration?

· To which numbering system can the binary number 1101100100111100 be easily converted to?

· Which bit wise operator is suitable for checking whether a particular bit is on or off?

· Which bit wise operator is suitable for turning off a particular bit in a number?

· Which bit wise operator is suitable for putting on a particular bit in a number?

· Which bit wise operator is suitable for checking whether a particular bit is on or off?

· which one is equivalent to multiplying by 2:Left shifting a number by 1 or Left shifting an unsigned int or
  char by 1?

· Write a program to compare two strings without using the strcmp() function.

· Write a program to concatenate two strings.

· Write a program to interchange 2 variables without using the third one.

· Write programs for String Reversal & Palindrome check

· Write a program to find the Factorial of a number

· Write a program to generate the Fibinocci Series

· Write a program which employs Recursion

· Write a program which uses Command Line Arguments

· Write a program which uses functions like strcmp(), strcpy()? etc

· What are the advantages of using typedef in a program?

· How would you dynamically allocate a one-dimensional and two-dimensional array of integers?

· How can you increase the size of a dynamically allocated array?

· How can you increase the size of a statically allocated array?

· When reallocating memory if any other pointers point into the same piece of memory do you have to
  readjust these other pointers or do they get readjusted automatically?

· Which function should be used to free the memory allocated by calloc()?

· How much maximum can you allocate in a single call to malloc()?

· Can you dynamically allocate arrays in expanded memory?

· What is object file? How can you access object file?
#41
FAQ In Object Oriented Concepts

· Where does global, static, local, register variables, free memory and C Program instructions get stored?

· Difference between arrays and linked list?

· What are enumerations?

· Describe about storage allocation and scope of global, extern, static, local and register variables?

· What are register variables? What are the advantage of using register variables?

· What is the use of typedef?

· Can we specify variable field width in a scanf() format string? If possible how?

· Out of fgets() and gets() which function is safe to use and why?

· Difference between strdup and strcpy?

· What is recursion?

· Differentiate between a for loop and a while loop? What are it uses?

· What are the different storage classes in C?

· Write down the equivalent pointer expression for referring the same element a[j][k][l]?

· What is difference between Structure and Unions?

· What the advantages of using Unions?

· What are the advantages of using pointers in a program?

· What is the difference between Strings and Arrays?

· In a header file whether functions are declared or defined?

· What is a far pointer? where we use it?

· How will you declare an array of three function pointers where each function receives two ints and

  returns a float?

· what is a NULL Pointer? Whether it is same as an uninitialized pointer?

· What is a NULL Macro? What is the difference between a NULL Pointer and a NULL Macro?

· What does the error 'Null Pointer Assignment' mean and what causes this error?

· What is near, far and huge pointers? How many bytes are occupied by them?

· How would you obtain segment and offset addresses from a far address of a memory location?

· Are the expressions arr and &arr same for an array of integers?

· Does mentioning the array name gives the base address in all the contexts?

· Explain one method to process an entire string as one unit?

· What is the similarity between a Structure, Union and enumeration?

· Can a Structure contain a Pointer to itself?

· How can we check whether the contents of two structure variables are same or not?

· How are Structure passing and returning implemented by the complier?

· How can we read/write Structures from/to data files?

· What is the difference between an enumeration and a set of pre-processor # defines?

· what do the 'c' and 'v' in argc and argv stand for?

· Are the variables argc and argv are local to main?
#42
FAQ In Object Oriented Concepts

· Is there something that I can do in C and not in C++?

· Why preincrement operator is faster than postincrement?

· What is the difference between "calloc" and "malloc"?

· What will happen if I allocate memory using "new" and free it using "free" or allocate sing "calloc" and free
   it using "delete"?

· What is Memory Alignment?

· Explain working of printf.

· Difference between "printf" and "sprintf".

· What is "map" in STL?

· When shall I use Multiple Inheritance?

· What are the techniques you use for debugging?

· How to reduce a final size of executable?

· Give 2 examples of a code optimization.

· What is inheritance?

· Difference between Composition and Aggregation.

· Difference: Sequence Diagrams, Collaboration Diagrams.

· Difference: 'uses', 'extends', 'includes'

· What shall I go for Package Diagram?

· What is Polymorphism?

· Is class an Object? Is object a class?

· Comment: C++ "includes" behavior and java "imports"

· What do you mean by "Realization"?

· What is a Presistent, Transient Object?

· What is the use of Operator Overloading?

· Does UML guarantee project success?

· Difference: Activity Diagram and Sequence Diagram.

· What is association?

· How to resolve many to many relationship?

· How do you represent static members and abstract classes in Class Diagram?

· What does static variable mean?

· What is a pointer?

· What is a structure?

· What are the differences between structures and arrays?

· In header files whether functions are declared or defined?

· What are the differences between malloc() and calloc()?

· What are macros? what are its advantages and disadvantages?

· Difference between pass by reference and pass by value?

· What is static identifier?

· Where are the auto variables stored?
#43
FAQ In Object Oriented Concepts

. How do you write a program which produces its own source code as its output?

· How can I find the day of the week given the date?

· Why doesn't C have nested functions?

· What is the most efficient way to count the number of bits which are set in a value?

· How can I convert integers to binary or hexadecimal?

· How can I call a function, given its name as a string?

· How do I access command-line arguments?

· How can I return multiple values from a function?

· How can I invoke another program from within a C program?

· How can I access memory located at a certain address?

· How can I allocate arrays or structures bigger than 64K?

· How can I find out how much memory is available?

· How can I read a directory in a C program?

· How can I increase the allowable number of simultaneously open files?

· What's wrong with the call "fopen("c:\newdir\file.dat", "r")"?

· What is the output of printf("%d")

· What will happen if I say delete this

· Difference between "C structure" and "C++ structure".

· Diffrence between a "assignment operator" and a "copy constructor"

· What is the difference between "overloading" and "overridding"?

· Explain the need for "Virtual Destructor".

· Can we have "Virtual Constructors"?

· What are the different types of polymorphism?

· What are Virtual Functions? How to implement virtual functions in "C"

· What are the different types of Storage classes?

· What is Namespace?

· What are the types of STL containers?.

· Difference between "vector" and "array"?

· How to write a program such that it will delete itself after exectution?

· Can we generate a C++ source code from the binary file?

· What are inline functions?

· Talk sometiming about profiling?

· How many lines of code you have written for a single program?

· What is "strstream" ?

· How to write Multithreaded applications using C++?

· Explain "passing by value", "passing by pointer" and "passing by reference"

· Write any small program that will compile in "C" but not in "C++"

· Have you heard of "mutable" keyword?

· What is a "RTTI"?
#44
Chat Box / More than 100 Keyboard Shortcuts
Mar 18, 2008, 05:55 PM
More than 100 Keyboard Shortcuts

Keyboard Shorcuts (Microsoft Windows)

   1. CTRL+C (Copy)
   2. CTRL+X (Cut)
   3. CTRL+V (Paste)
   4. CTRL+Z (Undo)
   5. DELETE (Delete)
   6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
   7. CTRL while dragging an item (Copy the selected item)
   8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
   9. F2 key (Rename the selected item)
  10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
  11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
  12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
  13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
  14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
      SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or
      select text in a document)
  15. CTRL+A (Select all)
  16. F3 key (Search for a file or a folder)
  17. ALT+ENTER (View the properties for the selected item)
  18. ALT+F4 (Close the active item, or quit the active program)
  19. ALT+ENTER (Display the properties of the selected object)
  20. ALT+SPACEBAR (Open the shortcut menu for the active window)
  21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents open
        simultaneously)
  22. ALT+TAB (Switch between the open items)
  23. ALT+ESC (Cycle through items in the order that they had been opened)
  24. F6 key (Cycle through the screen elements in a window or on the desktop)
  25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
  26. SHIFT+F10 (Display the shortcut menu for the selected item)
  27. ALT+SPACEBAR (Display the System menu for the active window)
  28. CTRL+ESC (Display the Start menu)
  29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a
        command name on an open menu (Perform the corresponding command)
  30. F10 key (Activate the menu bar in the active program)
  31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
  32. LEFT ARROW (Open the next menu to the left, or close a submenu)
  33. F5 key (Update the active window)
  34. BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
  35. ESC (Cancel the current task)
  36. SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically
        playing)

Dialog Box Keyboard Shortcuts

   1. CTRL+TAB (Move forward through the tabs)
   2. CTRL+SHIFT+TAB (Move backward through the tabs)
   3. TAB (Move forward through the options)
   4. SHIFT+TAB (Move backward through the options)
   5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
   6. ENTER (Perform the command for the active option or button)
   7. SPACEBAR (Select or clear the check box if the active option is a check box)
   8. Arrow keys (Select a button if the active option is a group of option buttons)
   9. F1 key (Display Help)
  10. F4 key (Display the items in the active list)
  11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts

   1. Windows Logo (Display or hide the Start menu)
   2. Windows Logo+BREAK (Display the System Properties dialog box)
   3. Windows Logo+D (Display the desktop)
   4. Windows Logo+M (Minimize all of the windows)
   5. Windows Logo+SHIFT+M (Restore the minimized windows)
   6. Windows Logo+E (Open My Computer)
   7. Windows Logo+F (Search for a file or a folder)
   8. CTRL+Windows Logo+F (Search for computers)
   9. Windows Logo+F1 (Display Windows Help)
  10. Windows Logo+ L (Lock the keyboard)
  11. Windows Logo+R (Open the Run dialog box)
  12. Windows Logo+U (Open Utility Manager)
  13. Accessibility Keyboard Shortcuts
  14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
  15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
  16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
  17. SHIFT five times (Switch the StickyKeys either on or off)
  18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
  19. Windows Logo +U (Open Utility Manager)
  20. Windows Explorer Keyboard Shortcuts
  21. END (Display the bottom of the active window)
  22. HOME (Display the top of the active window)
  23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
  24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
  25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
  26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
  27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut Keys for Character Map

After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:

   1. RIGHT ARROW (Move to the right or to the beginning of the next line)
   2. LEFT ARROW (Move to the left or to the end of the previous line)
   3. UP ARROW (Move up one row)
   4. DOWN ARROW (Move down one row)
   5. PAGE UP (Move up one screen at a time)
   6. PAGE DOWN (Move down one screen at a time)
   7. HOME (Move to the beginning of the line)
   8. END (Move to the end of the line)
   9. CTRL+HOME (Move to the first character)
  10. CTRL+END (Move to the last character)
  11. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
#45
More than 100 Keyboard Shortcuts

Microsoft Management Console (MMC)

Main Window Keyboard Shortcuts

   1. CTRL+O (Open a saved console)
   2. CTRL+N (Open a new console)
   3. CTRL+S (Save the open console)
   4. CTRL+M (Add or remove a console item)
   5. CTRL+W (Open a new window)
   6. F5 key (Update the content of all console windows)
   7. ALT+SPACEBAR (Display the MMC window menu)
   8. ALT+F4 (Close the console)
   9. ALT+A (Display the Action menu)
  10. ALT+V (Display the View menu)
  11. ALT+F (Display the File menu)
  12. ALT+O (Display the Favorites menu)

MMC Console Window Keyboard Shortcuts

   1. CTRL+P (Print the current page or active pane)
   2. ALT+Minus sign (-) (Display the window menu for the active console window)
   3. SHIFT+F10 (Display the Action shortcut menu for the selected item)
   4. F1 key (Open the Help topic, if any, for the selected item)
   5. F5 key (Update the content of all console windows)
   6. CTRL+F10 (Maximize the active console window)
   7. CTRL+F5 (Restore the active console window)
   8. ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
   9. F2 key (Rename the selected item)
  10. CTRL+F4 (Close the active console window. When a console has only one console window, this
       shortcut closes the console)

Remote Desktop Connection Navigation

   1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
   2. ALT+PAGE UP (Switch between programs from left to right)
   3. ALT+PAGE DOWN (Switch between programs from right to left)
   4. ALT+INSERT (Cycle through the programs in most recently used order)
   5. ALT+HOME (Display the Start menu)
   6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
   7. ALT+DELETE (Display the Windows menu)
   8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal
       server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
   9. CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server
       clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Navigation

   1. CTRL+B (Open the Organize Favorites dialog box)
   2. CTRL+E (Open the Search bar)
   3. CTRL+F (Start the Find utility)
   4. CTRL+H (Open the History bar)
   5. CTRL+I (Open the Favorites bar)
   6. CTRL+L (Open the Open dialog box)
   7. CTRL+N (Start another instance of the browser with the same Web address)
   8. CTRL+O (Open the Open dialog box, the same as CTRL+L)
   9. CTRL+P (Open the Print dialog box)
  10. CTRL+R (Update the current Web page)
  11. CTRL+W (Close the current window)
#46
Whizbytes technologies

Job Description

Required Experience

• Minimum 1 year experience developing in a Unix or Linux Environment.

• No less than 1 year experience with J2ME.

• Experience with application development across several mobile devices and carriers.

• Knowledge of back-end software technologies: Linux, J2EE, Servlets, and MySQL.

• Experience with J2ME and memory/performance restrictions.

• Experience developing WAP applications using WML or XHTML.

• Experience with REST/SOAP and XML.

• Experience with GPS or precision navigation.

Required Skills

• J2ME

• Java

• J2EE

• GPS Protocols / NMEA Sentences

• REST/XML

• Object Oriented Programming

No less than 1 year experience programming with Java.

Job Function: [blink]J2ME Programmer[/blink]

Education: Undergraduate degree in computer science or equivalent work experience.

Company Details

Company Name: Whizbytes technologies

Company Profile: WhizBytes Technologies Pvt. Ltd. (www.whizbytes.com) is a software services provider partnered with Biber Technologies, USA, (www.bibertech.com), an Award Winning Software Solution Provider pioneering in the field of Software Application and Database Development.

Candidate Details

Desired profile

Desired Skills

WAP, XHTML, WML, .Net

Windows Mobile Development

Knowledge of Cartography

Experience with Google Maps API

Experience: 6 months

Location: Chennai
      
Contact Information

Contact Name Vimala

Apply Details

Apply Email vjacob@whizbytes.com
#47
JAVA INTERVIEW QUESTIONS AND ANSWERS

[blink]Inheritance[/blink]

1) What is the difference between superclass & subclass?

Ans : A super class is a class that is inherited whereas subclass is a class that does the inheriting.

2) Which keyword is used to inherit a class?

Ans : extends

3) Subclasses methods can access superclass members/ attributes at all times?

True/False

Ans : False

4) When can subclasses not access superclass members?

Ans : When superclass is declared as private.

5) Which class does begin Java class hierarchy?

Ans : Object class

6) Object class is a superclass of all other classes?

True/False

Ans : True

7) Java supports multiple inheritance?

True/False

Ans : False

8 ) What is inheritance?

Ans : Deriving an object from an existing class. In the other words, Inheritance is the process of inheriting all the features from a class

9) What are the advantages of inheritance?

Ans : Reusability of code and accessibility of variables and methods of the superclass by subclasses.

10) Which method is used to call the constructors of the superclass from the subclass?

Ans : super(argument)

11) Which is used to execute any method of the superclass from the subclass?

Ans : super.method-name(arguments)

12) Which methods are used to destroy the objects created by the constructor methods?

Ans : finalize()

13) What are abstract classes?

Ans : Abstract classes are those for which instances can't be created.

14) What must a class do to implement an interface?

Ans: It must provide all of the methods in the interface and identify the interface in its implements clause.

15) Which methods in the Object class are declared as final?

Ans : getClass(), notify(), notifyAll(), and wait()

16) Final methods can be overridden.

True/False

Ans : False

17) Declaration of methods as final results in faster execution of the program?

True/False

Ans: True

18) Final variables should be declared in the beginning?

True/False

Ans : True

19) Can we declare variable inside a method as final variables? Why?

Ans : Cannot because, local variable cannot be declared as final variables.

20) Can an abstract class may be final?

Ans : An abstract class may not be declared as final.

21) Does a class inherit the constructors of it's super class?

Ans: A class does not inherit constructors from any of it's super classes.

22) What restrictions are placed on method overloading?

Ans: Two methods may not have the same name and argument list but different return types.

23) What restrictions are placed on method overriding?

Ans : Overridden methods must have the same name , argument list , and return type. The overriding method may not limit the access of the method it overridees.The overriding method may not throw any exceptions that may not be thrown by the overridden method.

24) What modifiers may be used with an inner class that is a member of an outer class?

Ans : a (non-local) inner class may be declared as public, protected, private, static, final or abstract.

25) How this() is used with constructors?

Ans: this() is used to invoke a constructor of the same class

26) How super() used with constructors?

Ans : super() is used to invoke a super class constructor

27) Which of the following statements correctly describes an interface?

a)It's a concrete class

b)It's a superclass

c)It's a type of abstract class

Ans: c

28) An interface contains __ methods

a)Non-abstract

b)Implemented

c)unimplemented

Ans:c
#48
Nokia-Siemens | Reliance | Lucid Software MEGA FRESHERS Job Fair

[blink]MEGA Job Fair for Freshers: Mar 22,23[/blink]

LOCATION: Chennai

Date: Mar 22,23

Companies Participating

    * Reliance Infocomm
    * Lucid Software
    * Nokia-Siemens
    * ETA Ascon
    * DSM Soft
    * Lason & More


Eligibility:

    * B.E / B.Tech / M.E / M.Tech
    * B.Sc / M.Sc
    * B.A / M.A
    * Diploma

Note:

    * Students have to bring 10 copies of bio-data's, mark sheets (or) degree certificate and photographs.
    * Students have to register their name before the fair. (Before Mar 19)
    * Transport will be provided to all the students from 7.30 onwards at Tambaram Administrative Office.

Venue:

DHAANISH AHMED COLLEGE OF ENGINEERING
Dhanish Nagar, Padappai, ( Near Tambaram )
Chennai, Tamilnadu,
India - 601 301.

How to Register
Click Here to Register

For Further Details:

ADMINISTRATIVE OFFICE
No.166, Mudichur Road,
Tambaram West,
Chennai,
Tamilnadu,
India-600 045.

Phone: 044 - 32918452,

Mobile: 9962470885, 9381755855.
#49
Question Marks Rise over Brain Monitors Effectiveness

[wiki]Bispectral[/wiki] index (BIS) monitor, a widely used device that employs brainwaves to help doctors prevent patients from waking up during surgery is no more effective than an older, far less costly technique, a new study reveals.

Michael Avidan of Washington University School of Medicine in St. Louis and colleagues discovered that the BIS device, made by Aspect Medical Systems Inc., and used in about 60 percent of U.S. operating rooms, did not help doctors prevent any more patients from waking up while under inhaled anesthesia.

"Our findings do not support routine BIS monitoring as part of standard practice. Reliance on BIS technology may provide patients and health care practitioners with a false sense od security about the reduction in the risk of anesthesia awareness," Prof. Avidan wrote in the report.

Anesthesia awareness or unintended intraoperative awareness happens rarely – to about one or two out of 1,000 surgery patients - but it does happen. During surgery, patients become aware of things that are happening to them. Patients may feel pain, discomfort, and fear, but they cannot tell anyone what is happening to them as they are paralyzed by anesthesia. The experience is usually painless, and usually is brief, but occasionally it leaves patients deeply traumatized, says Prof. Avidan.

"Anesthesia awareness can be understood as people undergoing general anesthesia and having some sensory stimuli during the procedure – something visual or auditory or painful – which they remember afterward. It is often the case that it is not disturbing, that it is a brief experience, and patient will experience negative psychological consequences and even have posttraumatic stress disorder," Prof. Avidan told WebMD.

This study is the first major scientific challenge to the monitors, which cost at least $3,000 and require new $16.50 sensors for each procedure. Prof. Avidan enrolled 1,941 patients considered to be at high risk for anesthesia in their randomized study. Risk factors include chronic use of certain drugs and a variety of cardiac and pulmonary problems.

Anesthesia was guided either by bispectral index monitoring (967 patients), targeted to the 40-60 range, or by monitoring end-tidal anesthetic gas concentrations in exhaled breath (974 patients). Based on patients' answers on whether they had awareness or not, the researchers found that two patients in each group were determined to have had definite anesthesia awareness. The brain monitor group had four additional cases described as "possible" while the second group had one possible case. There was no statistically significant difference between the groups, said lead author Michael S. Avidan.

"The addition of the BIS-guided protocol did not reduce the frequency of definite or possible awarness," Dr. Beverly Orser of the University of Toronto wrote in a commentary.

Aspect's medical director, Dr. Scott Kelley did not welcome the study's findings saying it does not reflect real-world conditions because doctors do not usually measure exhales gases. He also added that Avidan study fails to assess other important benefits of BIS technology, such as comfort and better recovery from anesthesia.

"It is important to emphasize that the results of this trial should not be extrapolated to patients receiving total intravenous anesthesia, which is considered to be a risk factor for anesthesia awareness. Indeed, BIS monitoring may be useful during total intravenous anesthesia, since it is not presently possible to monitor the blood concentrations of anesthetic agents continuously," Prof. Avidan wrote in the study.

The findings of the study appeared in the March 13 issue of the New England Journal of Medicine.

source: eflux

MORE PICTURES:

#50
Walkin Interview @ HCL in Bangalore / Chennai / Noida / Gurgaon / Kolkatta on 15th March 2008

Walkin Interview Details:

Date: 15th March 2008

Time: 10 am

Venue:
HCL Technologies
#6 , A S Chambers , 80 Feet Road
Koramangla , 6th Block , Bangalore - 95
(Near Sony World and Next to Dal Restuarant

Chennai:

HCL Technologies Ltd.
No. 51 , Jawaharlal Nehru Road,
Guindy Industrial Estate ,
Ekkaduthangal ,
Chennai - 97

Contact Person: Praveen

Noida

HCL Technologies Ltd.
A - 8/9 , Sector - 60
Near Shopprix Mall,
Noida , U.P (India).

Contact Person: Shailendra

Gurgoan

HCL Technologies Ltd.
Plot No : 3 , Udyog Vihar Phase 1 ,
Gurgaon

Contact Person: Shailendra

Kolkata

HCL Technologies Ltd.
Infinity Towers II ,
14th Floor , Block GP ,
Sector V , Salt Lake City , Kolkata - 700091

Contact Person: Ranjit Jaiswara

Consultant / Senior Consultant / Lead Consultant:

We require candidates with multiple implementation expertise with the following SAP Skills:

SAP-FICO / Consolidation/ Fund Management

SAP-BW (Experience in BI is an added advantage)

SAP-Basis (Core/New Dimensional with Upgrade)

SAP-HR (Payroll, Organisational management, Personnel Administration)

SAP-ABAP (ALE/IDOC/Workflow)

SAP-ABAP (Technofunctional - FICO/SRM/HR)

SAP- Sales and Distribution

SAP  - Projects and Systems

SAP -  CRM / SRM / SEM

SAP Netweaver


Experience: 4 - 9 Years

For technical positions , educational qualification would be BE / MCA and for functional positions , CA / ICWA / MBA is a must.

Candidates who are interested for the below opening can walk in with their CV and latest Passport Size photograph to below location.