You are on page 1of 16

ACE

0 1 1 0
1 1

0 0
1

Your fundamental ingredient


INDEX
Mobile Computing Why Linux
War on WIRES Within
0011 1100
0100 0101
Pointer to the
NITTE on INDIA The
unkown YAHOO !!
my plate Growth Story
1010 0100
1000 1001
Generation today My role Model Forgot
0111 Memory
0101 Password : (
1001 1101

Wait for OLED !! JAVA pool


Can YOU do this Village
Puzzle
0110 1000 1011
1110

Message from HOD

I am very happy to note that ACE (Association of Computer Engineers) is coming out with a
magazine called “BIT”, containing technical and general articles. I am sure that these articles are
read by all the interested ones and I request all of them to give their feedback to the contributors
of the articles, so that they can improvise on their writing style. I also appeal to all my dear stu-
dent friends to contribute to the forthcoming issues of this magazine by way of writing articles
on topics of current interest. I congratulate all the contributors and magazine committee mem-
bers for their splendid work.

Prof. Niranjan N.Chiplunkar


0001

Editorial

Science.
Although there is no theme in particular for this issue, articles like ‘Why Linux’ and ‘Mobile Com-

ideas such as idea of a bizarre crossword, a quiz on the similar lines, and an algorithm challenge of the
magazine had to be done away with because of the limitation on space. A bit tardy in the beginning, the
stream of articles gathered pace by the end of February.
We heartily thank all the contributors to the magazine without whom, this magazine would just be
another blank canvas.
It would be wrong on our part not mentioning Dr. Uday Kumar Shenoy, whose subtle advices had a
long say in the process of bringing out of this issue.
We also thank Mr. Radhakrishna, ACE coordinator, for his ideas and providing the much needed extra
time during the making of this magazine.

come.

Rohit S Bhat
Madhu R Sagar

ACE Activities

22-09-2010 : Talk on “3D FGPA and Routing Algorithm”


Mr. Ashok Kumar A, Asst Professor of ISE
23-09-2010 : Placement Training Session
Mario D’cunha and Mario Monteiro

16 -10-2010: Robotics Workshop

21-10-2010: Smash – 2010(Badminton and TT)

20-01-2011: Technical Talk


Mr. Minal Santhosh, Product Manager, CISCO Systems

28-01-2011: Dumb Charades


“To iterate is human, to recurse divine.” 0010

04-02-2011: General Quiz

18-02-2011:

25-02-2011: C – Funda (C programming competition)

17-03-2011: Ping (Networking Quiz)

18-03-2011: Technical Talk


Mr. Jayakrishnan , Technical Director, Tech Mahindra
19-03-2011: Workshop on ASP.NET

ACE Cup

Mobile Computing

A wish
using old technology with new dimensions
We have seen lot of chang- cross geographical locations need a solution that allows
es with mobile computing the host to retain same IP
in the recent days. And providers and still your address, and still use same
we happen to relate many connection is not dropped. layer 2 protocols (otherwise
things to the mobile phone It means "always on" IP con- network infrastructure itself
world as ‘mobile’ is the nectivity. Looks attractive, needs to be changed).The so-
keyword that we watch. Are isn’t it? With the advent of lution that evolved is Mobile
these both, ‘Mobile comput- high-speed network con- – IP. Mobile IP eliminates
ing’ and ‘mobile phone nection and considerable a stop-and-start approach
word’ mean the one and the amount of computing power to IP connectivity that is
same? If same what is this with mobile phones, those required with network loca-
actually, if not how they are days may not be too far tion changes, thus enabling
from now. users to maintain the same
One word that is used in Without much explanation, IP address regardless of
both these areas is ‘mobil - I would say that, the current their point of attachment to
ity’. Let us see what does network subsystem does not the network.
this mean. Mobility is not have much for the mobility First of all few terminolo
-
just having a mobile device gies: Mobile Node (MN)
(a phone, laptop, pda etc.), fact that IP routing breaks - a node that moves across
nor it just using these in a under mobility. By design, networks without changing
wireless network. It is much IP host address is tied to its IP address. Home Agent
more than this. Mobility home network address and (HA) - host in the home
means you get a seamless Hosts are assumed to be network of the MN, - typi
connectivity, which means wired, immobile. Interme- cally a router. HA registers
you get continuous con- diate routers look only at the location of the MN,
nection with the network, network address and desti- tunnels IP packets to the
while you are on the move nation network responsible COA. Foreign Agent (FA)
when you were in some to get packet to right host. - host in the current foreign
sort of communication with A mobility enabled device network of the MN, - typi
another device. Mobility is moving from network cally a router. FA forwards
not referred to the situa - tunneled packets to the MN,
tion when you walk with change its IP address as typically the default router
your mobile/handheld with change in IP address results for MN. Care-of Address
in a region covered by a in un-routable packets. If (COA) address of the current
network. Rather, when you it retains its host address, tunnel end-point for the
move across the networks, then routing fails. So, we MN (at FA or MN).
0011

bile IP registration request and its home network. Even while


the MN from an IP point of sends the registration request the Mobile Node is roaming on
view. Correspondent Node to its Home Agent through the foreign networks, its move-
(CN) - a host with which MN ments are transparent to corre
is “corresponding” (TCP con- Agent checks the validity of spondent nodes. Data packets
nection). A mobility enabled the registration request . If the addressed to the Mobile Node
host outside its home network registration request is valid, the are routed to its home network,
Foreign Agent relays the re- where the Home Agent now
network, get a temporary IP intercepts and tunnels them to
from it and communicate new Home Agent checks the valid- the care-of address toward the
address to its home network. ity of the registration request, Mobile Node. Tunneling has
which includes authentication two primary functions: encap
- of the Mobile Node. If the sulation of the data packet to
dressed to this host to the new registration request is valid, the reach the tunnel endpoint, and
address (COA). Home Agent creates a mobility decapsulation when the packet
binding (an association of the is delivered at that endpoint.
How Mobile IP Works: To Mobile Node with its care-
communicate with a remote of address), a tunnel to the IP Encapsulation within IP
host, a mobile host goes care-of address, and a routing Encapsulation.
through three phases: Agent entry for forwarding packets to With Mobile IP, now the
discovery, Registration and the home address through the mobility is enabled, even
Data transfer. across heterogeneous media. A
During the agent discovery sends a registration reply to mobile host is able to commu-
phase, the Home Agent and the Mobile Node through the nicate with other hosts that do
Foreign Agent advertise their Foreign Agent. If the registra- not implement Mobile IP and
services on the network by tion reply is valid, the Foreign there is no additional con-
using the ICMP Router Dis- Agent adds the Mobile Node straint on the assignment of
to its visitor list, and creates a IP addresses. Moreover there
Mobile Node listens to these routing entry for forwarding is no requirement that is pla-
advertisements to determine packets to the home address. ced on the layer-2.
if it is connected to its home It then relays the registration Mobile IP is not out of draw-
network or foreign network. reply to the Mobile Node. Fi- backs or problems. Surely,
If a Mobile Node determines nally, the Mobile Node checks you would like to know more.
that it is connected to a foreign the validity of the registration You can look for triangular
network, it acquires a care of reply, which includes ensuring
address. When the Mobile an associated request is in its problems, replay attaches, QoS
Node hears a Foreign Agent pending list as well as proper problem due to tunneling etc.
advertisement and detects authentication of the Home and also the solutions for these
that it has moved outside of Agent. Now, the Mobile Node issues. Further, IPv6 brings lots
its home network, it begins of hope to mobile computing
registration. agents are aware of its roam- with its built-in features for the
mobile computing.
with the IP address and mobil- IP registration sets up the rout- It is said that Mobile Comput-
ity security association (which ing mechanism for transport- ing isn’t a simple extension
includes the shared key) of its ing packets to and from the of distributed computing.
Mobile Node as it roams. Instead, “traditional” distrib-
uses this information along - uted computing is a subset of
By Dr. Uday Kumar Shenoy with the information that it ets using its home IP address, mobile computing.
learns from the Foreign Agent
advertisements to form a Mo- appearance that it is always on

Pramod Kamath 8th sem


“It’s ridiculous to live 100 years and only be able to remember 30 million bytes. You know, less than a
compact disc. The human condition is really becoming more obsolete every minute.” 0100

War on the Wires


War on the Wires

As the fever rises about the two. After scanning for Siemens with countries such as Russia “to
capabilities and the reach of supervisory control and data limit the retention and use of
Stuxnet, a malicious software worm acquisition(SCADA) software- cyber-war technology.” U.S. Air
known to have hit hard the Islamic SIMATIC WinCC or PCS-7-used to Force Space Command has planned
Republic of Iran, the threat and run factories, chemical, water a five and half month graduate
possibility of cyber warfare has supply and electric power plants, it course on “network warfare
made rounds, making it look like a sends details of industrial facility to operations” which would “provide
reality taken out of the science internet servers around the world. in-depth expertise throughout the
fiction. air, space and cyberspace domains
This incident of attack on nuclear focused on the application of
Being considered by New York plant is not a lone sign that cyber network defense, exploitation and
Times as "the first attack on critical warfare has begun. In 2007, Estonia attack."
industrial infrastructure that sits at become of victim of denial-of-
the foundation of modern service attack forged by Russia(still Neighboring China is not far
economies," the Stuxnet worm, the allegation is unproved) when its behind when it comes to cyber
designed to target the control servers were flooded with useless warfare. Operation Aurora, the
systems made by German Control information during a brief squabble most high profile attack on Google
Systems major, Siemens AG, is over the removal of war memorial and other companies in recent
presumed to have been made at a at Tallinn belonging to Soviet Era times, was traced back to two
cost of $3 million at the behest of costing Estonia $26-$38 million. In universities in China. Hacking is
United States Of America or Israel. another low-level incident in 2008, institutionalized and writing virus is
The work involved the pains of 10 Russia’s virtual soldiers attacked taught. Each year $55 million is
skill programmers for 6-months, it the Georgian Ministry of Defense spent devising new methods of
is purported. earlier than Russian tanks which cyber techniques .Red Hackers
entered the Georgian territory Alliance, fifth largest hacker group
Stuxnet- named for its embedded afterwards. in the world owes its allegiance to
code- has affected 30,000 the Government which is available
computers in Iran including those at Series of such attacks have made for help at an arm’s length.
Busheshr nuclear plant, in the eye the America take cyber security as a
of storm for being at the center of “ national security priority”. Israel has “unit 8200”, which is
clandestine nuclear activities Iran is Coupled with a growing concern vested with greater resources. It is
believed to be involved in. Finding about the reconnaissance on next only to USA and Russia in
the attackers of this worm, found electricity grid, in May 2010 Cyber having the most advanced
mostly in India, Indonesia and Command was set-up, which “will capabilities. United Kingdom has
Pakistan besides Iran, is a nearly attempt to find and, when also set up cyber security
impossible task, experts believe. It necessary, neutralize cyber-attacks operations center in GCHQ(British
is been cleansed from the and to defend military computer Government Communications
computers said Iran Deputy networks.” On September 28 2010, Headquarters) as well as a new
Industry Minister recently, although Cyber Storm III, a simulated co- office of cyber security in the
the purpose of worm is still unclear. ordinated attack was done on 1,500 Cabinet Office. France is also
The worm ,which has supposedly targets which involved 12 reportedly developing cyber
bypassed firewalls after having participating countries, capabilities too.
been transferred using USB governmental agencies along with
memory stick, uses four previously banking, financial, nuclear The issue has attained an alarming
undisclosed “zero-day” networks, collectively viewed as a proportion considering the fact that
vulnerabilities in Microsoft “critical infrastructure”. An NATO is planning to reform its
Windows to execute malicious code agreement on the lines of nuclear mutual protection policy to include
when most worms use just one or weapons treaties is being mooted cyber-attack under its ambit. This
“Fifty years of programming language research, and we end up with C++?” 0101

would make an member country to established the Cooperative Cyber ought to take a firm view to
honor its commitments should any Defense Centre of Excellence in develop the capabilities to become
other member country come under Tallinn, Estonia in the wake of a reckoning force when it comes to
a cyber-attack. The issue is going to attack on Estonia in 2007, to cyber warfare, which could boost
be taken to the next level when enhance the organization’s cyber the forces present on land, air and
NATO will meet on November 18- capability, has the status of water. This was also the view
19 at Lisbon to discuss the International Military Organization. expressed by National Technical
increasing threat of cyber warfare. Research Organization inquiring the
It’s also mulling over a plan to Sadly, India is nowhere to be seen attack on Indian websites during
include cyber warfare to the on-stage. When the country is Operation Aurora. It’s high time to
charter 5 of the North-Atlantic pressed hard on its borders, it rise up when the next battles in
Treaty .NATO has already addition to being fought on ground
will be contested in virtual space
too.

Madhu Sagar 6th SEM ‘B’

Dignified ; Personality personified, Within


You walked with life,
Creating an electrifying effect
I have changed, that I know
for the people staring at you.
But what I have become is yet to come?
Soft n sweet , Gentle n neat
My heart is different that I feel,
are known words about you,
Stubborn n Strict , Creative n Stupid With some old wounds still left to heal;
is my version about you. My spirits have risen, which I see,

She is not a twig to be broken, My vision is clearer this I sense,

at the slightest hit or by the wind; As though I am someone else.


Nor is a touch-me not to be shyed away
My future is bright, like on a full moon night,
at insults or flatters.
Sometimes blur, otherwise clear,
She is a fighter- a born fighter, And face it I shall, without fear.
So no matter what happens,
She will fight for he life,
coz it is her’s to enjoy it. Myself I know…

Look in the mirror and there He will show,


People’s friend , Dad’s sweetheart,
YEP! She is my mom-a super mom, Not a single change I can see,
that’s what she is and
Because all of it is within me.
always will be !!

Veditha 6th SEM ‘C ’ Bhadresh V N 8th SEM ‘A’


0110
Can YOU do this

Folding Paper in Half 12 Times:

The task was commonly known impossible. Over the years the problem has been discussed by many people, including the
mathematicians and has been demonstrated to be impossible in TV.

That was when a high school student, Britney Gallivan (of Pomona, California) was given a mathematics problem. She would get
an extra mathematics credit, if she took up the option of solving the problem of folding a sheet in half 12 times. She tried and
failed with reasonably-sized sheets of paper.

The exact limit for single direction folding case was derived, based on the accumulative limiting effects induced by every fold in
the folding process.

So she got smart, and used something incredibly thin - gold foil, only 0.28 of millionth of a metre thick. She started with a
square sheet, 10 cm by 10 cm. It took lots of determination and practice, as well as rulers, soft paint brushes and tweezers, but
she finally succeeded in folding her gold foil in half 12 times. She ended up with a microscopic square sheet of gold foil. But her
mathematics teacher said that ultra-thin gold foil was too easy - she had to fold paper 12 times. She studied the problem, and
came with two mathematical solutions. When she looked closely, she found that if you are trying to fold the sheet as many
times as possible, there are advantages in using a long narrow sheet of paper.

Her formula told her that to successfully fold paper 12 times, she would need about 1.2 km of paper.

After some searching she found a roll of special toilet paper that would suit her needs - and that cost US $85. In January 2002,
she went to the local shopping mall in Pomona. With her parents, she rolled out the jumbo toilet paper, marked the halfway
point, and folded it the first time. It took a while, because it was a long way to the end of the paper. Then she folded the paper
the second time, and then again and again.

After seven hours, she folded her paper for the 11th time into a skinny slab, about 80 cm wide and 40 cm high, and posed for
photos. She then folded it another time (to get that 12th fold essential for her extra mathematics credit), and wrote up her
achievement for the Historical Society of Pomona in her 40 page pamphlet, "How to Fold Paper in Half Twelve Times: An
"Impossible Challenge" Solved and Explained". She wrote in her pamphlet, "The world was a great place when I made the
twelfth fold."

In one day Britney was the first person to set the record for folding paper in half 9, 10, 11 or 12 times.

The Historical Society of Pomona Valley is now selling Britney's booklet. It contains over 40 pages of solving the problem and
has interesting stories and comments from others who had tried to solve the problem. The booklet gives both detailed and
general explanations of the problem's background, the physical limit and tabulates the number of times it is possible to fold
different size sheets.

In some web pages the limits found by Britney are described as being due to thickness to width ratios of the final folds or
attributed to the folder not being strong enough to fold any more times. Both explanations for the limits are incorrect and miss
the actual reason for the physical mathematical limit. The actual understanding of the problem involves understanding the
simple dynamics of the folding model and the resulting algebra.

The first solution was for the classical fold-it-this-way, fold-it-that-way method of folding the paper. Here you fold the paper in
alternate directions. She derived a formula relating the number of folds possible (n) to the width (w, of the square sheet you
start with) and the material's thickness (t):
0111

Well, I feel sorry for my You realize these facts when you are going to have a lot of
generation. In this culture, you are not doing so well. troubles. If you don’t know
it’s so important to find a Friends are great, but friends how to compromise, you are
loving relationship with are not going to be there on going to have a lot of
someone because so much a night when you are troubles. If you can’t talk
of the culture does not give coughing and can’t sleep and openly about what goes on
you that. But the poor kids someone has to sit up all between you two , you are
today, either they are too night with you, comfort you, going to have trouble. And if
selfish to take part in a real and try to be helpful. I have you don’t have a common
loving relationship, or they learned this much about set of values in life, you are
rush into marriage and then marriage- “You get tested. going to have a lot of
six months later they get You find out who you are, troubles. Your values must
divorced. They don’t know who the other person is, and be alike. Let me end the
what they want in a partner. how you accommodate or subject by quoting the poem
They don’t know who they don’t.” There are a few rules I believe in like a prayer :
are themselves -so how can to be true about love and “Love each other or perish”
they know who they are marriage. If you don’t
marrying? respect the other person,

Parvathy Nambiar K A

CanYOU do this
6th sem ‘B’

possible length of material (l) and Jiménez, the Spanish poet and
Continued... the material's thickness (t): winner of the 1956 Nobel Prize for
Literature. He wrote, in a metaphor
The second solution was for folding for the questioning and resilient
the paper in a single direction. This human spirit, "If they give you ruled
is the case when you try to fold a paper, write the other way."
long narrow sheet of paper. She Britney Gallivan succeeded because
derived another formula relating she was as contrary and
the number of folds possible in one determined as Juan Ramon
direction (n) to the minimum

Sandhya Mittur
4th sem ‘C’
itte on my pla e
1000

itte is a small hamlet who`s .If you don’t like the Ideals shop, .The food is pretty good , it ranges
landscape predominantly consists you can go over to BCD, which is from Indian to Chinese fare. Every-
of NMAMIT .Its Located at a located near the MBA college. thing comes with a generous help-
distance of 50 km from Mangalore The tasty milkshakes and vada pavs ing of oil . Food quality aside , the
and around 8-10 km from Karkala you get there make up for the terrible downsides to the canteen are
.As far as I know, the nearest known spelling mistakes on the menu board 1. The afternoon lunch rush : At times
eating establishments outside Nitte .Another place where you can grab , one might have to wait for more than
are “Bittu da dabha” near Mulki , a quick bite is the bun palti shop half an hour to get some food .
Adve bar in Adve and the Sagar ho- .Please don’t go by the appearances 2. The cashier always seems to be out
tel in Karkala .So where do famished of the shop .It may look run down, of change!.
NMAMIT`ians go for sustenance but the bun palti served there is to die3.Vegetarian food !
?.This note aims at introducing a few for! My only qualm here is having If you hanker for home style meals
of the better known eating joints in to pay 10 bucks for a measly slice of at lunch time ,The places to be are
Nitte . cheese!. hotel Ashik , Hotel Durga Prasad or
the second canteen below the actual
Lets us start off with the leg- If you are feeling too lazy to go canteen .
endary Jayatha , which requires a out of the campus when you are hav-
special mention for its popularity!! ing a hunger pang, you can go for the If you prefer non vegetarian
.It is located right in front of the maggi shop or the Fresh & Honest fare , you can choose from a variety
Nitte bus stop and is without a doubt shop.The maggi shop , as the name of places like Food Land , Food
the most famous eating joint around suggests, serves maggi noodles and Point (both of which sport the same
.Jayatha is owned by Ramanna and Nescafe coffee .Worth the time even fare ) , Harshitha and the Hard
is generally a boys club ,known for though you have to wait for 15 mins Rock Café. All of the eating joints
the delicious puffs , the masala puri to get 2 minute noodles . Fresh & mentioned serve pretty good non-veg
and the ‘ready’! . Jayatha is the kind Honest is a coffee shop near the civil food .And all this at pretty reason-
of place where you come to unwind block .Frequented mostly by girls able prices!
after a boring hour at college by hav- who flock there during break time.
ing a ‘King sized puff’! Now , we move on to the most
Moving on to lunch .When the ‘upscale’ eating joint in Nitte 7 Bee`s
Just outside the college campus, bell rings at 1:00 pm , almost half .Opened recently , It’s the closest to
you can find the recently opened Ide- the people of the college rush to the a branded eatery that Nitte has ever
als shop where you can get ice cream, NMAMIT canteen .The first thing had . Junk food , Air conditioning , a
coffee, puffs etc. In my opinion, the you will notice about the canteen is flat screen TV and a music system ,
only decent competition for jayatha that the cashier is ‘extra friendly’ what`s not to like !

Ajay Kamath 8th SEM ‘A’

Prajna Shetty 4th sem


Mem ry 1001

“Oh my god, I don’t know how I forgot that” OR “I can’t believe I still remember that”. This is a quite a regular sentiment
we get to hear around us, especially during the time of sessionals and exams. So how do we actually REMEMBER STUFF..
Is there a rightclick-SAVE option in our brain..I tried to explore and what do you know.!!.. The memory unit what we the
CSE engineers work on and our own memory unit works almost on the same principle… Interested?... READ ON…

The Encoding Process - Laying Down Memories: You can think of the process of storing memories in your mind to be
similar to that of a computer that utilizes RAM (Random Access Memory) for the temporary storage of information before
being placed in long-term storage on the hard drive. This temporary storage depends on a different network of brain
structures than long term memories do. So not quite different eh??!!...Computer Memory and our memory!! Scientists have
determined there are different methods in how we lay down our memories.

Shallow Encoding: When we need to hold a small amount of linguistic information in mind for several seconds, this is the
technique Mr. Brain uses. This method of encoding can generally be observed outside the crowded corridors of an semester
end examination hall, when in between the repeated “GET INSIDE” warnings, we try to remember that last answer of 5th
unit!! .. This temporarily stores the information. Many people do not understand why this type of encoding doesn't work
for long-term memory -- it is due to our utilizing brain's phonological loop that relies on a part of the brain designed only
for short-term memory purposes.

Elaborative Encoding: The above technique is for the short term. In order to encode incoming information, or an event, into
long-term memory, the best way to do this is to link, associate or connect the incoming information with something already
in your memory in order to make it meaningful. You can then retrieve the memory, because you have an actual means to
recall it, due to linking the incoming information with something already in your memory. If you have completed to course
on operating systems , this bears an uncanny resemblance to the PAGING concept!!..

Engrams: How the Brain Stores Memories: The brain records an event by strengthening the connections between groups
of neurons that participate in encoding the experience. This pattern of connections constitutes the brain's record of the event
known as the engram. Engrams will lie dormant unless they are brought to conscious awareness with cues, to evoke, or
retrieve them back into memory. Again, go back to your logic design books and this is exactly how PAL and PLA memories
work.

Engrams can weaken and even disappear with time. Time plays a major role in the memory process. Past experiences are
constantly slipping away from us, some more rapidly than others. Thus we tend to remember what is most important to us
for a longer time. engrams that we never use are probably best forgotten. Scientists opine that forgetting memories over time
is an economical response to the demands placed on memory by the environment in which we live. We are better off
forgetting trivial experiences than clogging our minds with each and every on-going event. Maybe this is why we forget
what we studied in the first few years of engineering!!  

Pramod Kamath
8th sem “B”

INDIA-The Growth Story !!

India is where I was born Rather,work towards our aim.


Two decades ago at the crack of the dawn We are a booming economy
Hardly anyone knew who we were
Now we are being talked the world all-over. we should be at the top in years to come Our voices heard and suggestions valued
Lest we lose our sight. Soon we were basking in glory
1857,the seeds were sown
To act against the British's brutal throne Even during recession,we grew
1947 is the year to cheer Who played his/her part
From then on there was nothing to fear. From East to West people were all around For making India rise
To understand our country's turnaround. On the global development chart.
India's growing fast, said the World Bank
All over the world alarm bells rang Double-Digit growth is nothing new
Doubted a many,believed a few Its achievable in a year or two
Soon our progress was for all to view . But,lets not play the number game

Sandeep Nayak
6th Sem, C section
Pointer to the unknown 1010

‘Top Tech Writings of 2010’ (http://www.switched.com/2010/12/30/best-technology-writing-of-2010/) which made through the greatest
‘to be or not to be.’

com) for a quick cleaning of your dust-ridden trivia quotient.


Is outsourcing really cool? We are talking of the personal tasks. Imagine couching a pillow in your bed while your ‘remote assistant’ takes
care of everything from asking a sorry to your girlfriend, to ordering your movie tickets or wishing your parents? Read about A.J.Jacobs’
experience performing the same ritual at Esquire(http://www.esquire.com/ESQ0905OUTSOURCING_214) (Caution: Strong Language).

top 10 Rock Bands. Try top 10 Classical Composers too. If nothing strikes your head or in case you did it, then go to the List Universe i.e.
Listverse (http://www.listverse.com) to check the compatibility score.
What goes inside the mind of a 26-year old Physics graduate who is also well versed in programming? Read the geek following Randall
Munroe’s comic at xkcd (http://www.xkcd.com).

100+ levels in the ‘World’s toughest riddle’ at Notpron (www.deathball.net/notpron/){It’s N-O-T-P-R-O-N}.

all your problems in the form of ‘Sleep Hacks’ at SleepWarrior (http://www.sleepwarrior.com).


For the purely academic, try this non exhaustive link site (http://www.lecturefox.com/computerscience/) containing the list of available
videos from leading universities.

complex life experiences, concepts in the form of Venn Diagrams at Indexed (http://www.thisisindexed.com/).
Are you’re an aspiring entrepreneur? Dreaming of founding the ‘next’ Google in your bedroom? Bow down at Hacker News (http://www.
news.ycombinator.com) for indispensable tips, interesting reads, knowing about other start-ups or discussing the next big ‘thing’ (who
knows, you might end ‘ping’ing your future ‘Angel Investor’.)
-
est in the technology in Kannada, Mr. Ashok Kumar, assistant professor in the Department of Information Science, of our college, shows
the way out through his blog (http://www.ashok567.blogspot.com).

Madhu Sagar 6th sem


Sec “B”
1011

What are OLED monitors ? Diagram 1.1

consist of pixels made from OLEDs (Organic Light

Unlike computer monitors that use LCD (liquid crystal


display) technology, OLED monitors do not require

cathode and an anode, an emissive layer of organic


molecules sandwiched between these electrodes can

layer known as the conductive layer (bottom in


diagram), made up of organic plastic molecules lies

is positively charged and therefore draws electrons


from the conductive layer, leaving the conductive layer
with a positive charge that draws electrons from the
emissive layer. Light is emitted as a by-product, in a
process known as electro phosphorescence.
The OLED process is explained in the diagram 1.1

thickness of around 100-500 nanometers, which is

them extremely fragile and hence they must be

substrate is usually clear plastic, foil or glass of varying


thickness, and must be transparent, like the anode,
so that the emitted light can be seen on the OLED

emissive layer of an OLED monitor depends on the


exact organic makeup of the molecules within. As with
LCD monitors, OLED units are made up of ‘pixels’ of

‘pixels’ within the emissive layer which will emit light

the cell.

advantages

i. OLED technology is the next step in the evolution of PC monitors and TV


screens, as it does away with the backlight entirely.
ii. Response times and refresh rates are also significantly enhanced over even the
best LCDs – an OLED monitor could theoretically have a response time of around
0.01ms and a refresh rate exceeding 1 KHz (1000Hz).
iii. By doing away with the backlight you also save a tremendous amount of power;
when OLED PC monitors hit the mass-market, they could be over 10 times as
efficient as the best LED-backlit LCD monitor of today.
iv. The end result of all this is images that are much more vivid and lifelike than
anything produced by an LCD/normal LED and a revolution in display
technology.

sushanth bhat 8th sem


section “ c ”
Why LINUX
1100

? ?

5 Advantages of using Linux over Windows

of using Linux over Windows, and lists a few disadvantages as well.

Advantages of Linux:

distribution can be installed on any number of computers, without paying a single dime.
* Security – In line with the costs, the security aspect of Linux is much stronger than that of Windows. Why should you have to
-
aged to stay secure in the realm of widespread viruses, spyware and adware for all these years. Sure, the argument of the Linux desk-
top not being as widely used is a factor as to why there are no viruses. My rebuttle is that the Linux operating system is open source
and if there were a widespread Linux virus released today, there would be hundreds of patches released tomorrow, either by ordinary
people that use the operating system or by the distribution maintainers. We wouldn’t need to wait for a patch from a single company
like we do with Windows.

aspect of the operating system. Two major features you have control of are your desktops look and feel by way of numerous Window
Managers, and the kernel. In Windows, your either stuck using the boring default desktop theme, or risking corruption or failure by
installing a third-party shell.

Freshmeat and yield hundreds, if not thousands of results. My article on 5 Linux text editors you should know about explains how
there are so many options just for editing text on the command-line due to the open source nature of Linux. Regular users and

programming language. What more could you ask for?


* Hardware - Linux is perfect for those old computers with barely any processing power or memory you have sitting in your garage

386 or 486 computers with barely any RAM run Linux without any issue. Good luck running Windows on these machines and actu-

Disadvantages of Linux:

* Understanding – Becoming familiar with the Linux operating system requires patience as well as a strong learning curve. You

read howto’s and guides for Linux.


* Compatibility – Because of its free nature, Linux is sometimes behind the curve when it comes to brand new hardware compat-

there are still some applications that exist on Windows that have no equivalent Linux application. Read Alternatives to Windows Ap-

Now that you have an understanding of some of the advantages of Linux, its time get out there and experiment. Windows can be a
great tool for the lazy and incompetent, but it takes a true scholar and one who wants to learn to run a robust operating system like
Linux.

Gaurav Shenoy Konchady


th
6 Sem Section “A”
Forgot Password ? 1011

::-
1. USB dongle / Pen drive.
2. ISO image of a Linux (I used Linux mint) .
3. .
4. .
OR
Instead of the above three its ok if you just have a LIVE LINUX CD/DVD .

So now as we have all that we need we will begin .

::-

You have to use someone else’s computer to do this (not the computer whose password has to be changed).

agree, and a window will now appear in front of you. It has three steps, In Step1, you need to select
your Linux Distro/Flavor (if the name is not there on the list don’t worry just select TRY SOME OTHER
LIVE LINUX ISO). Step 2 , Here you need to give the path of your Linux ISO ,just click on Browse then
,
pen drive already then the drive name will be visible just select it . now click on CREATE button. It will take
some time , now you have a live Linux in your pen drive.

:-

Plug the pen drive/Insert the live DVD or CD into the computer whose password you have forgotten. Be-

-
.I
it up. Make sure the priority of your hard drive is below that of USB drive and CD/DVD drive, so now that
we have changed the priority restart and boot into Linux ,when you enter into Linux you ‘ll notice that your
.A do

STEP 1 : go to c:\windows \system32


STEP 2
STEP 3
STEP 4 : Now restart your computer an remove the pendrive or live CD/DVD and load windows

When get your login screen now just press windows button and u together ,you’ll notice that command
prompt has popped up. Here type the following command:
NET user <username> <newpassword>
eg. NET user Rohit computerscience

, .Y
changed password :)
*** do remember to rename utilman.exe to cmd.exe and utilman.1exe to utilman.exe back

Rohit S Bhat
6th Sem Section “A”
Puzzle
JAVA 1110

Pool Puzzle
class PoolPuzzleOne {
Your job is to take code snippets from the public static void main(String [ ] args) {
pool and place them into the blank int x = 0;
lines in the code.You may not use the
same snippets more than once and while ( ________________ ) {
you won't need to use all the snip- _____________________________
pets .Your goal is to make a class that
will compile and run and pruduce the
if ( x < 1 ) {
output listed. Dont be fooled -- this one's ____________________________
harder than it looks. }
________________________________
if ( ________________ ) {
____________________________
_____________
Output
}
if ( x == 1 ) {
________________________________
}
if ( ______________ ) {
__________________________
}
System.out.println("");
}
}
}
Note : Each snippet
from the pool can be
used only once !
x>0
x<1
x>1 x = x + 1;
x>3 x = x + 2;
x = x - 2; System.out.print("noys ");
x<4
System.out.print(" "); x = x - 1; System.out.print("oise ");
System.out.print("a "); System.out.print(" oyster ");
System.out.print("n "); System.out.print("annoys");
System.out.print("an"); System.out.print("noise");

For the Solution refer Head First Java by Kathy Sierra & Bert Bates

“If the automobile had followed the same development cycle as the computer, a Rolls-Royce would
today cost $100, get a million miles per gallon, and explode once a year, killing everyone inside.”
ACE

Behind the Scenes

ACE Co-ordinator Radhakrishna


Doddamane
Advisor Dr. Udaykumar
Shenoy
Editor Rohit Bhat Editor Madhu Sagar

You might also like