Always with you to fascinate and feisty you.I'm blessed and I thank God for every day for everything that happens for me.
Wednesday, July 30, 2014
Monday, July 28, 2014
Functions based Qs and answer in C programming
1. What is a function? Answer:- A function is a small segment of the program(sub program) designed to perform a specific task and return a result to the main or calling program. 2. What are the different types of functions supported in “C” language? Answer:- C supports two types of functions. They are 1. Built-in / Library functions 2. User defined functions 3. What are library functions? Answer:- Some of the operations are programmed and stored in C library so that they can be called in the program. These functions are called as library functions. Eg : printf(), sqrt(), pow() 4. What is a user defined function? Answer:- A user-defined function is a complete and independent program unit, which can be used(or invoked) by the main program or by other sub-programs. 5. Mention the need for a function Answer:- If there are a number of statements that are repeatedly needed in the same program at different locations,then a function may be used. 6. What do you mean by a calling function? Answer:- Once the function is created it can be called from the main program or from any other function. This main program or the function which calls another function is called calling function. 7. What is a called function? Answer:- The user-defined function which is called by the main program or from any other function is known as called function. 8. What does the return-type-specifier of a function identify? Answer:- It identifies the type of value, which will be sent back after the function has performed its task (eg: int, float). 9. Why is the return type void used? Answer:- The return type void is used if the function does not return any value to the calling function. 10. What is an argument? Answer:- Information or values are passed to the function through special identifiers are called arguments. 11. What are actual parameters? Answer:- The arguments (values) which are passed to the function when a function call is made are called actual parameters. 12. What are formal parameters? Answer:- The arguments which are used in the argument list of the function header to receive the values from the calling program are called formal parameters or dummy parameters. 13. Give the syntax of a function call? Answer:- A function call has the following syntax: variable = function_name(arg1,arg2…); where arg1, arg2… are the actual parameters. 14. How is a function invoked? Answer:- A function is invoked(or called) through an output statement or through an assignment statement by using the function name followed by the list of arguments.Example: p = prod(x, y); 15. What is the use of the return statement? Answer:- The return statement is used in the body of the function which contains the value that has to be sent back to the main program. 16. Give the syntax of return statement? Answer:- The return statement can take one of the following forms return; Or return(expression);The first form does not return any value, where the second function returns the value of the expression. 17. What are local variables? Answer:- Variables declared inside a block or function are said to belong only to that block and these are called as local variables. Values of these variables are valid only in that block. 18. What are global variables? Answer:- Variables declared before the main function block are called global variables. Values of these variables are available in every block of that program. 19. What is function prototype? Answer:- A function must be declared before it is actually called. The declaration of a function is known as function prototype. 20. Give the syntax of a function prototype. Answer:- return-type function-name (type1, type2); Ex: float power(float, int); 21. Define the term recursion. Answer:- A function which calls itself directly or indirectly again and again until a condition is satisfied is called as recursive function. This process is called recursion. 22. How do we pass an entire array to a function? Answer:- To pass an entire array to a called function only the array name without a subscript is used as argument(actual parameter). Ex: void main( ) { int a[100], n; . . . . . . . . . . sort(a, n); (where sort is the function name) } 23 What is meant by scope of a variable? Answer:- 1. The name of the variable. 2. The amount of space required to store that variable. 3. Address of the memory location. 4. The possible operations, which can be performed with the variable. 24. What are storage classes? Answer:- A storage class refers to the scope and life time of a variable i.e., the portion of program where the variable is valid and how long a variable can retain its value is defined in the storage class. 25. What are the different types of storage classes? Answer:- 1. Automatic storage class 2. External storage class 3. Static storage class 4. Register storage class 26 does Register variable have address? Answer:- No. (CPU registers do not have addresses). 27. Give the differences between library functions and user-defined functions. Answer:- Library functions :- i. Some of the operations are programmed and stored in C library so that they can be called in the program. These functions are called as library functions. ii. Library functions are in-built functions. User-defined functions :- i. Large programs can be broken down into smaller sub programs or modules. These sub programs are called user-defined functions. ii. User-defined functions are created by the user. 28. What is a function call? What is the syntax of a function call? Answer:- To execute a function we will have to call the function. A function call establishes a link between the called function and the calling program. A function call has the following syntax: variable = Function_name (arg1, arg2…); where arg1, arg2… are the actual parameters. 29. Why is the return statement is required in a function body? Answer:- When a function is called control is transferred from the calling function (main program) to the called function (sub-program). The statements of the called function are executed and finally the called function is terminated and sends the required result back to the calling function. The return statement is used to send the result from the function to the main program, thus terminating the called function. The syntax is: return; Or return(expression); The first form does not return any value, where the second function returns the value of the expression. 30. What is a function prototype? When is a function prototype necessary? Answer:- The declaration of a function before it is used is called as function prototype. A function prototype contains the data type of arguments sent as input to the function and data type of the result sent back from the function Syntax: data_type function_name(data_type1,data_type2,….); Example: float power(float, int); 31. Explain user defined function with an example Answer:- User defined function is a subprogram that is called by a main() function or any other function. A user defined function may appear before or after the main() function. The general syntax of function definition is as follows: Return_type_ specifier Function_name (type arg1, type arg2….) { local variable declarations; argument list statement1; statement2; … Body of the function statement n; return (expression); } Return data type- indicates the data type of variable sent back from called function to calling function Function name- indicates the name of the function .It is an identifier Argument list- list of input variables and their data-types received from calling function Local variable declaration-list of data that required only for the function block in which they are declared. Body of the function-It includes declaration part (local variables) and a set of executable statements which will perform the required task. Return statement- indicates termination of function and transfer of control from called function to calling function Example: int sum(int a,int b) { int c; c=a+b; return(c); } 32. Mention different types of functions. Answer:- The different types of functions are 1. functions with no input and no return value 2. functions with input and no return value 3. Functions with input and return value 4. Recursive functions 33. What are storage classes? Mention different types of storage classes. Explain Answer:- A storage class refers to the scope of data in a program. Scope of data means the portion of the program in which the variable is valid(mian() as well as sub programs) and lifetime of the variable.i.e., the length of time to which the variable retains its value. A variable must belong to any one of the following storage classes. 1. Automatic storage class 2. External storage class 3. Register storage class 4. Static storage class Automatic storage class :- Automatic storage class is similar to local variable declaration Key word auto precedes the declaration Ex: auto int x,y,z; • Automatic variables are local variables • The variables are stored in memory(RAM) • The key word auto is implicit(it means even without the word auto the variable is automatic) • Initial value stored is junk External storage class :- External storage class is similar to global variables. Keyword extern precedes the declaration Ex: Extern int m,n; • Scope of the variable is global • The variables are stored in memory • Needs explicit(must use the keyword)declaration • Initial value stored is junk Register storage class :- Register storage class is used when data is needed in cpu registers Key word register must precede the declaration Ex: register int x,y; • Scope of the variable is local • The variables are stored in registers • Needs explicit declaration • Initial value is not known Static storage class:- Static storage class is used in function blocks. The static variable can be initialized exactly once when the function is called for the first time. For subsequent calls to the same function, the static variable stores the most recent value. Key word static precedes the variable declaration Ex: static int x,y,z; • Scope of the variable is local • The variables are stored in memory • Needs explicit declaration • Default Initial value is stored is 0. |
Array based Qs and answers
1) What is an array? Answer:- An array is a group of data of the same data type stored in successive storage locations. 2)How are elements of an array accessed? Answer:- Elements of an array are accessed using subscripts. 3)What is a subscript? Answer:- A subscript or an index is a positive integer value that identifies the storage position of an element in the array. 4)Which is the smallest subscript? Answer:- 0 (zero) 5)How many subscripts does a one and two dimensional array have? Answer:- one dimensional array has one subscript and a two dimensional array has two subscripts( row and a column subscript). 6)Write the syntax for declaring a one dimensional array. Answer:- syntax: datatype arrayname [size]; 7) Write the syntax for declaring a two dimensional array. Answer:- Syntax: datatype arrayname [row size] [column size]; 8) What do you mean by initializing an array? Answer:- Initializing of an array means storing data in to an array at the design time. 9) How one dimensional array is initialized? Answer:- The initialization can be done two ways – • Initialization at design level- in this method of initialization the data values are stored in to the array at the time of array declaration. Example: int a [0]={10,-50,20,300,5}; • Initialization at run time- to initialize an array at run time means to input data values in to the array at the time of execution of the program. Example: int a[10]; for (i=0;i<10;i++) scanf(“%d”,&a[i]); 10) How to output the elements of one dimensional array? Answer:- To print elements of an array a for loop is used. Example: int a[10]; for(i=0;i<10;i++) printf(“%d\n”,a[i]); 11) How two dimensional arrays are initialized? Answer:- • initialization at design time- the data element are stored in to the array at the time of declaration of the array. The elements of each row and each column are represented within the pair of flower brackets. Example : int a[3][3]={1,3,5,3,7,82,5,8}; • initialization of the array at the time of execution- to input data in to two dimensional array, two for loops are used foe every value of the outer loop index. The inner loop is executed a specified number of times. Example: int a[4][5]; for(i=0;i<4;i++) for(j=0;j<5;j++) scanf(“%d”,&a[i][j]); 12) How do you print a matrix? Give ex. Answer:- A two dimensional array can be printed as follows- int a[3][4]; for(i=0;i<3;i++) { for(j=0;j<4;j++) { printf(“%d\t”,a[i][j]); } printf(“\n”); } |
Unix based Qs and ans
Friday, July 25, 2014
Install Windows
To install Windows XP operating system follow steps :-
Minimum System Requirements:-
Go to Boot menu and choose Boot From CD/DVD.
Press F10 to save the configuration and exit BIOS then reset your computer.
Insert Windows XP DVD into your DVD drive then start up your computer,
Step 1:-Load the installer.
Once your Boot Order is set, insert the Windows XP CD into your drive and Save and Exit from the BIOS. Your computer will reboot and you will be presented with the message: Press any key to boot from CD. Press any key on your keyboard to start the Setup program.
Setup will load files necessary to begin the installation, which may take a few moments. Once the loading is complete, you will be taken to the Welcome screen.
Step 2:- Press ENTER to begin installation.
Once the loading is complete, you will be taken to the Welcome screen. You are given several options, but if you are installing or reinstalling Windows XP, you’ll want to press ENTER to start the installation configuration.
Step 3 :-Read the License Agreement.
This document tells you what you can and can’t do with Windows, and your rights as the consumer. After reading, press F8 indicating you agree to the terms.
Step 5 :-Create a new partition.
Select the Unparititioned space and press “C”. This will open a new screen where you can set the partition’s size from the available space. Enter the size in megabytes (MB) for the new partition and then press ENTER.
Step 6 :-Select your new partition.
Once you’ve created your installation partition, you will be returned to the partition selection screen. Select your new partition, usually labeled "C: Partition 1 [Raw]" and press ENTER.
Step 7 :- Select "Format the Partition using the NTFS File System" and press ENTER.
Step 8:- Wait for the format and Setup files to copy and for for the installation to proceed.
Step 9:- Choose your language and region settings.Click the Next button when that is completed.Enter your full name if you want. This will be set as the “owner” of Windows, and will be attached to certain things, such as Document creation.
Step 10:- Enter your Product Key. You will not be able to complete the installation process without a valid Product Key. Click "Next" to continue.
Step 11:-Set your computer’s name. This will be the name that represents the computer on a network. Windows sets a default name, but you can change it if you would like. You can also set a password for the Administrator account. This is optional, but recommended for public computers.
Step 12:-Select your time zone. Ensure that the date/time are correct. Click "Next" to continue.
Step 13:- Choose your network settings.
Step 14:- Wait for the installation to finalize.
This will only take a few minutes, and the computer will reboot when it is finished installing. Once the computer reboots, you will be taken to the Windows XP desktop. At this point, installation is complete, though there are a few things left to do before Windows is completely usable.
To install Windows 7 operating system follow these steps:-
Check Hardware requirements:-
Step 2:-Go to Boot menu and choose Boot From CD/DVD.
Step 3:-Press F10 to save the configuration and exit BIOS then reset your computer.
Step 4:- Insert Windows 7 DVD into your DVD drive then start up your computer, Windows 7 will be loading files.
Step 5:- Select these parts: Language to Install,Time and currency format, Keyboard or input method. Then click Next.
Step 6:-Choose Install Now if you want to install Windows 7. Choose the Windows 7 version that you want to install in 'Select the operating system you want to install' . Here we choose Windows 7 Ultimate then click next (depending on your Windows DVD, this step is an option).
Step 7 :-Click 'I accept the license terms' in 'Please read the license' then click Next.
Step 8:-Choose 'Upgrade' in 'Which type of installation do you want' if you want to upgrade from an older Windows version to Windows 7, 'Custom (advance)' if you want to install a new version of Windows.
Step 9:- Choose Partition for installation, if your computer has only one hard disk, it will be easy for selection, but if it has some Partition, you will have to consider which Partition to choose.
Step 10:-Wait for Installing Windows to progress. Your computer might be restarted during the process.
Step 11:- Type you’re a user account and computer name. After click Next.
Step 12:-Type a password for your account, you can also Type a password hint to help in case of forgetting the password in the future, and then click Next.
Step 13:-Type in activation code or key for your license in Product key box if you have any. Click Next.
Step 14 :-Choose how to protect your Windows. Here we choose Use recommended settings.
Step 15 :-Set up your Time zone then click Next.
Step 16:- Choose an option from 3 choices: Public Network, Work Network, Home Network. Choose Home Network for using Internet at home.
Minimum System Requirements:-
- 300 MHz Intel or AMD CPU
- 128 megabytes (MB) of system RAM
- 1.5 gigabytes (GB) of available drive space
- Super VGA (800x600) or higher display adapter
- CD or DVD-ROM
- Keyboard and mouse, or other pointing devices
- Network Interface Adapter required for Internet and Network Connectivity
Go to Boot menu and choose Boot From CD/DVD.
Press F10 to save the configuration and exit BIOS then reset your computer.
Insert Windows XP DVD into your DVD drive then start up your computer,
Step 1:-Load the installer.
Once your Boot Order is set, insert the Windows XP CD into your drive and Save and Exit from the BIOS. Your computer will reboot and you will be presented with the message: Press any key to boot from CD. Press any key on your keyboard to start the Setup program.
Setup will load files necessary to begin the installation, which may take a few moments. Once the loading is complete, you will be taken to the Welcome screen.
Step 2:- Press ENTER to begin installation.
Once the loading is complete, you will be taken to the Welcome screen. You are given several options, but if you are installing or reinstalling Windows XP, you’ll want to press ENTER to start the installation configuration.
Step 3 :-Read the License Agreement.
This document tells you what you can and can’t do with Windows, and your rights as the consumer. After reading, press F8 indicating you agree to the terms.
Step 4 :- Select the partition you want to install on.
You will see a list of available partitions on your installed hard drives. If you are installing Windows XP on a new hard drive, you should see only one entry labeled "Unpartitioned space." If you have a previous version of Windows or Linux installed on your computer, you will potentially have multiple partitions.
Installing Windows XP will erase all of the data on the partition that you choose. Select a partition that is empty or that contains data that you do not care to lose.
You can delete your partitions with the “D” key. This will return them to “Unpartitioned space”. Any data on the partition will be lost when it is deleted
Step 5 :-Create a new partition.
Select the Unparititioned space and press “C”. This will open a new screen where you can set the partition’s size from the available space. Enter the size in megabytes (MB) for the new partition and then press ENTER.
Step 6 :-Select your new partition.
Once you’ve created your installation partition, you will be returned to the partition selection screen. Select your new partition, usually labeled "C: Partition 1 [Raw]" and press ENTER.
Step 7 :- Select "Format the Partition using the NTFS File System" and press ENTER.
Step 8:- Wait for the format and Setup files to copy and for for the installation to proceed.
Step 9:- Choose your language and region settings.Click the Next button when that is completed.Enter your full name if you want. This will be set as the “owner” of Windows, and will be attached to certain things, such as Document creation.
Step 10:- Enter your Product Key. You will not be able to complete the installation process without a valid Product Key. Click "Next" to continue.
Step 11:-Set your computer’s name. This will be the name that represents the computer on a network. Windows sets a default name, but you can change it if you would like. You can also set a password for the Administrator account. This is optional, but recommended for public computers.
Step 12:-Select your time zone. Ensure that the date/time are correct. Click "Next" to continue.
Step 13:- Choose your network settings.
Step 14:- Wait for the installation to finalize.
This will only take a few minutes, and the computer will reboot when it is finished installing. Once the computer reboots, you will be taken to the Windows XP desktop. At this point, installation is complete, though there are a few things left to do before Windows is completely usable.
To install Windows 7 operating system follow these steps:-
Check Hardware requirements:-
- 1 GHz CPU with 32 bits or 64 bits
- 1 GB Ram for 32 bits or 2 GB Ram for 64 bits.
- 16 GB empty space hard disk for 32 bits or 20 GB for 64 bits.
- DVD drive
Step 2:-Go to Boot menu and choose Boot From CD/DVD.
Step 3:-Press F10 to save the configuration and exit BIOS then reset your computer.
Step 4:- Insert Windows 7 DVD into your DVD drive then start up your computer, Windows 7 will be loading files.
Step 5:- Select these parts: Language to Install,Time and currency format, Keyboard or input method. Then click Next.
Step 6:-Choose Install Now if you want to install Windows 7. Choose the Windows 7 version that you want to install in 'Select the operating system you want to install' . Here we choose Windows 7 Ultimate then click next (depending on your Windows DVD, this step is an option).
Step 7 :-Click 'I accept the license terms' in 'Please read the license' then click Next.
Step 8:-Choose 'Upgrade' in 'Which type of installation do you want' if you want to upgrade from an older Windows version to Windows 7, 'Custom (advance)' if you want to install a new version of Windows.
Step 9:- Choose Partition for installation, if your computer has only one hard disk, it will be easy for selection, but if it has some Partition, you will have to consider which Partition to choose.
Step 10:-Wait for Installing Windows to progress. Your computer might be restarted during the process.
Step 11:- Type you’re a user account and computer name. After click Next.
Step 12:-Type a password for your account, you can also Type a password hint to help in case of forgetting the password in the future, and then click Next.
Step 13:-Type in activation code or key for your license in Product key box if you have any. Click Next.
Step 14 :-Choose how to protect your Windows. Here we choose Use recommended settings.
Step 15 :-Set up your Time zone then click Next.
Step 16:- Choose an option from 3 choices: Public Network, Work Network, Home Network. Choose Home Network for using Internet at home.
Solve Computer Science Questions
1. With four programs in memory and with 80% average I/O wait , the CPU utilization is?
A) 60 %
B) 70 %
C) 90 %
D) 100 %
2. To employ multi - access in GSM , users are given different:
A) time slots
B) bandpass filters
C) handsets
D) frequency bands
3.What will be the value of 'b' after the execution of the following code statements:
c = 10;
b = ++c + ++c;
A) 20
B) 22
C) 23
D) None
4. What of the following does not represent a valid storage class in 'c'?
A) automatic
B) static
C) union
D) extern
5. Find the odd man out :
A) tail
B) cut
C) wart
D) sed
6. We can not delete the ____icon but we can made it invisible.
A) Recycle
B) My computer
C) Internet explorer
D) None of the above
7. The device which connects dissimilar LAN's of different topologies using different sets of communication protocols so that information can flow from one to another is called:
A) Router
B) Bridge
C) Gateway
D) Switch
8. Capability Maturity Model is meant for;
A) Product
B) Process
C) Product and Process
D) None of the above
9. In the light of software engineering software consists of:
A) Programs
B) Data
C) Documentation
D) All the above
10. Variable partition memory management technique with compaction results in:
A) Reduction of fragmentation
B) Minimal wastage
C) Segment sharing
D) None of the above
A) 60 %
B) 70 %
C) 90 %
D) 100 %
2. To employ multi - access in GSM , users are given different:
A) time slots
B) bandpass filters
C) handsets
D) frequency bands
3.What will be the value of 'b' after the execution of the following code statements:
c = 10;
b = ++c + ++c;
A) 20
B) 22
C) 23
D) None
4. What of the following does not represent a valid storage class in 'c'?
A) automatic
B) static
C) union
D) extern
5. Find the odd man out :
A) tail
B) cut
C) wart
D) sed
6. We can not delete the ____icon but we can made it invisible.
A) Recycle
B) My computer
C) Internet explorer
D) None of the above
7. The device which connects dissimilar LAN's of different topologies using different sets of communication protocols so that information can flow from one to another is called:
A) Router
B) Bridge
C) Gateway
D) Switch
8. Capability Maturity Model is meant for;
A) Product
B) Process
C) Product and Process
D) None of the above
9. In the light of software engineering software consists of:
A) Programs
B) Data
C) Documentation
D) All the above
10. Variable partition memory management technique with compaction results in:
A) Reduction of fragmentation
B) Minimal wastage
C) Segment sharing
D) None of the above
Solve Questions on GK and common
1. Find out the wrong number in the sequence.
52, 51, 48, 43, 34, 27, 16
A) 27
B) 34
C) 43
D) 48
2. The letters in the first set have a certain relationship.
On the basis of this relationship mark the right choice for the second set:
A) FHJL
B) RPNL
C) LNPR
D) LJHF
3.Insert the missing number in the following:
3, 8, 18, 23, 33, ?, 48
A) 37
B) 40
C) 38
D) 45
4.In a certain code ,CLOCK is written as KCOLC.How would STEPS be written in that code?
A) SPEST
B) SPSET
C) SPETS
D) SEPTS
5. 'No man are mortal' is contradictory of:
A) Some man are mortal
B) Some man are not mortal
C) All men are mortal
D) No mortal is man
6.Two ladies and two men are playing bridge and seated at North, East, South and West of a table.
No lady is facing East.Persons sitting opposite to each other are not of the same sex. One man is facing South. Which direction are the laddies facing to?
A) East and West
B) North and West
C) South East
D) None of these
7. What is blog?
A) Online music
B) Intranet
C) A personal or corporate website in the form of an online journal
D) A personal or corporate Google search
8. Bog is a wetland that receives water from :
A) nearby water bodies
B) melting
C) rain fall only
D) sea only
9. Action-research is:
A) An applied research
B) A research carried out to solve immediate problems
C) A longitudinal research
D) All the above
10.How can the objectivity of the research be enhanced ?
A) Through its impartiality
B) Through its reliability
C) Through its validity
D) All the above
Thursday, July 24, 2014
SEO
SEO: Search Engine Optimization
Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine's "natural" or un-paid ("organic") search results.
There are two ways of doing SEO
On-Page SEO- This includes providing good content, good keywords selection. putting keywords on correct places, giving appropriate title to every page etc.
Off-Page SEO - This includes link building, increasing link popularity by submitting in open directories, search engines, link exchange etc.
SEO may target different kinds of search, including image search, local search, video search, academic search,news search and industry-specific vertical search engines.
Search engines perform several activities in order to deliver search results like,
1.Crawling
2.Indexing
3.Processing
4.Calculating Relevancy
5.Retrieving Results
SEO techniques are classified into two broad categories:
1.Techniques that search engines recommend as part of good design referred to as White Hat SEO, and
2.Techniques that search engines do not approve and attempt to minimize the effect of referred to as Black Hat or spamdexing.
1.White Hat SEO:-
An SEO technique is considered white hat if it conforms to the search engines guidelines and involves no deception.
As the search engine guidelines are not written as a series of rules or commandments, this is an important distinction to note.
White hat SEO is not just about following guidelines, but is about ensuring that the content a search engine indexes and
subsequently ranks is the same content a user will see.
White hat advice is generally summed up as creating content for users, not for search engines,
and then making that content easily accessible to the spiders, rather than attempting to trick the algorithm from its intended purpose.
White hat SEO is in many ways similar to web development that promotes accessibility, although the two are not identical.
2.Black Hat SEO :-
Black hat SEO attempts to improve rankings in ways that are disapproved of by the search engines, or involve deception.
One black hat technique uses text that is hidden, either as text colored similar to the background, in an invisible div, or positioned off screen.
Another method gives a different page depending on whether the page is being requested by a human visitor or a search engine, a technique known as cloaking.
Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine's "natural" or un-paid ("organic") search results.
There are two ways of doing SEO
On-Page SEO- This includes providing good content, good keywords selection. putting keywords on correct places, giving appropriate title to every page etc.
Off-Page SEO - This includes link building, increasing link popularity by submitting in open directories, search engines, link exchange etc.
SEO may target different kinds of search, including image search, local search, video search, academic search,news search and industry-specific vertical search engines.
Search engines perform several activities in order to deliver search results like,
1.Crawling
2.Indexing
3.Processing
4.Calculating Relevancy
5.Retrieving Results
SEO techniques are classified into two broad categories:
1.Techniques that search engines recommend as part of good design referred to as White Hat SEO, and
2.Techniques that search engines do not approve and attempt to minimize the effect of referred to as Black Hat or spamdexing.
1.White Hat SEO:-
An SEO technique is considered white hat if it conforms to the search engines guidelines and involves no deception.
As the search engine guidelines are not written as a series of rules or commandments, this is an important distinction to note.
White hat SEO is not just about following guidelines, but is about ensuring that the content a search engine indexes and
subsequently ranks is the same content a user will see.
White hat advice is generally summed up as creating content for users, not for search engines,
and then making that content easily accessible to the spiders, rather than attempting to trick the algorithm from its intended purpose.
White hat SEO is in many ways similar to web development that promotes accessibility, although the two are not identical.
2.Black Hat SEO :-
Black hat SEO attempts to improve rankings in ways that are disapproved of by the search engines, or involve deception.
One black hat technique uses text that is hidden, either as text colored similar to the background, in an invisible div, or positioned off screen.
Another method gives a different page depending on whether the page is being requested by a human visitor or a search engine, a technique known as cloaking.
In optimizing keywords on a web page are:-
Keyword Frequency:
This is calculated as how often does a keyword appear in a site's title or description. You don't want to go overboard with frequency, however, since on some engines if you repeat a word too many times, you'll be penalized for "spamming" or keyword stuffing.
In general though, repeat your keyword in the document as many times as you can get away with, and up to 3-7 times in your META tags.
Keyword Weight:
This refers to the number of keywords appearing on your Web page compared to the total number of words appearing on that same page. Some search engines consider this when determining the rank of your Web site for a particular keyword search.
One technique that often works well is to create some smaller pages, generally just a paragraph long, which emphasize a particular keyword. By keeping the overall number of words to a minimum, you will increase the "weight" of the keyword you are emphasizing.
Keyword Proximity:
This refers to the placement of keywords on a Web page in relation to each other or, in some cases, in relation to other words with a similar meaning as the queried keyword.
For search engines that grade a keyword match by keyword proximity, the connected phrase .home loans. will outrank a citation that mentions .home mortgage loans. assuming that you are searching only for the phrase "home loans".
Keyword Prominence:
A measure of how early or high up on a page the keywords are found. Having keywords in the first heading and in the first paragraph (first 20 words or so) on a page are best.
Keyword Placement:
WHERE your keywords are placed on a page is very important. For example, in most engines, placing the keywords in the Title of the page or in the Heading tags will give it more relevancy. On some engines, placing keywords in the link text, the part that is underlined on the screen in a browser, can add more relevancy to those words.
Best Places to Put Keywords:
Here is a list of places where you should try to use your main keywords.
1.Keywords in the <title> tag(s).
2.Keywords in the <meta name="description">
3.Keywords in the <meta name="keyword">
4. Keywords in <h1> or other headline tags.
5.Keywords in the <a href="http://yourcompany.com">keywords</a> link tags.
6.Keywords in the body copy.
7.Keywords in alt tags.
8.Keywords in <!-- insert comments here> comments tags.
9.Keywords contained in the URL or site address, e.g., http://www.keyword.com/keywordkeyword.htm.
Finding Keywords:
There are many different ways to find keywords for your website. Some good keyword ideas are:
1.Words people would search for to find your product or service.
2.Problems your prospective customers may be trying to solve with your product or service.
3.Keyword tags on competitors websites.
4.Visible page copy on competitors websites.
5.Related search suggestions on top search engines.
6.By using an online tools like: Google Keyword Tool
7.By analyzing your website carefully and finding out proper keywords. This task can be done by expert SEO Copywriters.
8.Pay attention to stemming for your keywords - Particularly to what the root word is and what Google considers to be a match for that word when optimizing pages over time.
9.You can do brainstorming to identify correct keywords for your site.
Wednesday, July 23, 2014
To learn Multiplication tables
Multiplication Tables:-
where,
* means multiplication(to multiply).
To write table of 9 is very simple:-
First write 0 to 9
0
1
2
3
4
5
6
7
8
9
then next from downwards that is from 9 write, 0 to 9 numbers in front of them.
09
18
27
36
45
54
63
72
81
90
0 | 1 | 2 | 3 | 4 | 5 | 6 |
0 * 1 = 0 0 * 2 = 0 0 * 3 = 0 0 * 4 = 0 0 * 5 = 0 0 * 6 = 0 0 * 7= 0 0 * 8 = 0 0 * 9 = 0 0 * 10 = 0 0 * 11 = 0 0 * 12 = 0 |
1 * 1 = 1 1 * 2 = 2 1 * 3 = 3 1 * 4 = 4 1 * 5= 5 1 * 6 = 6 1 * 7 = 7 1 * 8 = 8 1 * 9 = 9 1 * 10 = 10 1 * 11 = 11 1 * 12 = 12 | 2 * 1 = 02 2 * 2 = 04 2 * 3 = 06 2 * 4 = 08 2 * 5 = 10 2 * 6 = 12 2 * 7 = 14 2 * 8 = 16 2 * 9 = 18 2 * 10 = 20 2 * 11 = 22 2 * 12 = 24 |
3 * 1 = 03 3 * 2 = 06 3 * 3 = 09 3 * 4 = 12 3 * 5 = 15 3 * 6 = 18 3 * 7 = 21 3 * 8 = 24 3 * 9 = 27 3 * 10 = 30 3 * 11 = 33 3 * 12 = 36 | 4 * 1 = 04 4 * 2 = 08 4 * 3 = 12 4 * 4 = 16 4 * 5 = 20 4 * 6 = 24 4 * 7 = 28 4 * 8 = 32 4 * 9 = 36 4 * 10 = 40 4 * 11 = 44 4 * 12 = 48 | 5 * 1 = 05 5 * 2 = 10 5 * 3 = 15 5 * 4 = 20 5 * 5 = 25 5 * 6 = 30 5 * 7 = 35 5 * 8 = 40 5 * 9 = 45 5 * 10 = 50 5 * 11 = 55 5 * 12 = 60 |
6 * 1 = 06 6 * 2 = 12 6 * 3 = 18 6 * 4 = 24 6 * 5 = 30 6 * 6 = 36 6 * 7 = 42 6 * 8 = 48 6* 9 = 54 6 * 10 = 60 6 * 11 = 66 6 * 12 = 72 |
7 | 8 | 9 | 10 | 11 | 12 |
7 * 1 = 07 7 * 2 = 14 7 * 3 = 21 7 * 4 = 28 7 * 5 = 35 7 * 6 = 42 7 * 7 = 49 7 * 8 = 56 7* 9 = 63 7 * 10 = 70 7 * 11 = 77 7 * 12 = 84 | 8 * 1 = 08 8 * 2 = 16 8 * 3 = 24 8 * 4 = 32 8 * 5 = 40 8 * 6 = 48 8 * 7 = 56 8 * 8 = 64 8 * 9 = 72 8 * 10 = 80 8 * 11 = 88 8 * 12 = 96 | 9 * 1 = 09 9 * 2 = 18 9 * 3 = 27 9 * 4 = 36 9 * 5 = 45 9 * 6 = 54 9 * 7 = 63 9 * 8 = 72 9 * 9 = 81 9 * 10 = 90 9 * 11 = 99 9 * 12 = 108 | 10 * 1 = 10 10 * 2 = 20 10 * 3 = 30 10 * 4 = 40 10 * 5 = 50 10 * 6 = 60 10 * 7 = 70 10 * 8 = 80 10 * 9 = 90 10 * 10 = 100 10 * 11 = 110 10 * 12 = 120 |
11 * 1 = 11 11 * 2 = 22 11 * 3 = 33 11 * 4 = 44 11 * 5 = 55 11 * 6 = 66 11 * 7 = 77 11 * 8 = 88 11 * 9 = 99 11 * 10 = 110 11 * 11 = 121 11 * 12 = 132 |
12 * 1 = 12 12 * 2 = 24 12 * 3 = 36 12 * 4 = 48 12 * 5 = 60 12 * 6 = 72 12 * 7 = 84 12 * 8 = 96 12 * 9 = 108 12 * 10 = 120 12 * 11 = 132 12 * 12 = 144 |
* means multiplication(to multiply).
To write table of 9 is very simple:-
First write 0 to 9
0
1
2
3
4
5
6
7
8
9
then next from downwards that is from 9 write, 0 to 9 numbers in front of them.
09
18
27
36
45
54
63
72
81
90
Java
Java Programming Language:
Java is:
Architectural-neutral: Java compiler generates an architecture-neutral object file format which makes the compiled code to be executable on many processors, with the presence of Java run-time system.
Distributed: Java is designed for the distributed environment of the internet.
Dynamic: Java is considered to be more dynamic than C or C++ since it is designed to adapt to an evolving environment. Java programs can carry extensive amount of run-time information that can be used to verify and resolve accesses to objects on run-time.
High Performance: With the use of Just-In-Time compilers, Java enables high performance.
Interpreted: Java byte code is translated on the fly to native machine instructions and is not stored anywhere. The development process is more rapid and analytical since the linking is an incremental and light weight process.
Multi-threaded: With Java's multi-threaded feature it is possible to write programs that can do many tasks simultaneously. This design feature allows developers to construct smoothly running interactive applications.
Object Oriented: In Java, everything is an Object. Java can be easily extended since it is based on the Object model.
Platform independent: Unlike many other programming languages including C and C++, when Java is compiled, it is not compiled into platform specific machine, rather into platform independent byte code. This byte code is distributed over the web and interpreted by virtual Machine (JVM) on whichever platform it is being run.
Portable: Being architectural-neutral and having no implementation dependent aspects of the specification makes Java portable. Compiler in Java is written in ANSI C with a clean portability boundary which is a PO SIX subset.
Robust: Java makes an effort to eliminate error prone situations by emphasizing mainly on compile time error checking and run-time checking.
Secure: With Java's secure feature it enables to develop virus-free, tamper-free systems. Authentication techniques are based on public-key encryption.
Simple: Java is designed to be easy to learn. If you understand the basic concept of OOP Java would be easy to master.
History of Java:
James Gosling initiated the Java language project in June 1991 for use in one of his many set-top box projects. The language, initially called Oak after an oak tree that stood outside Gosling's office, also went by the name Green and ended up later being renamed as Java, from a list of random words.
Sun released the first public implementation as Java 1.0 in 1995. It promised Write Once, Run Anywhere (WORA), providing no-cost run-times on popular platforms.
On 13 November 2006, Sun released much of Java as free and open source software under the terms of the GNU General Public License (GPL).
On 8 May 2007, Sun finished the process, making all of Java's core code free and open-source, aside from a small portion of code to which Sun did not hold the copyright.
Software:
Linux 7.1 or Windows 95/98/2000/XP/7/8 operating system.
Java JDK 5
Microsoft Notepad or any other text editor
Java programming language was originally developed by Sun Micro-systems which was initiated by James Gosling and released in 1995 as core component of Sun Micro-systems Java platform (Java 1.0 [J2SE]).
As of December 2008, the latest release of the Java Standard Edition is 6 (J2SE).
With the advancement of Java and its widespread popularity, multiple configurations were built to suite various types of platforms. Ex: J2EE for Enterprise Applications, J2ME for Mobile Applications.
Sun Micro-systems has renamed the new J2 versions as Java SE, Java EE and Java ME respectively.
Java is guaranteed to be Write Once, Run Anywhere.
Java is a computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another. Java applications are typically compiled to byte-code (class file) that can run on any Java virtual machine (JVM) regardless of computer architecture. Java is, as of 2014, one of the most popular programming languages in use, particularly for client-server web applications, with a reported 9 million developers.
Figure :-Java Logo
Java is:
Architectural-neutral: Java compiler generates an architecture-neutral object file format which makes the compiled code to be executable on many processors, with the presence of Java run-time system.
Distributed: Java is designed for the distributed environment of the internet.
Dynamic: Java is considered to be more dynamic than C or C++ since it is designed to adapt to an evolving environment. Java programs can carry extensive amount of run-time information that can be used to verify and resolve accesses to objects on run-time.
High Performance: With the use of Just-In-Time compilers, Java enables high performance.
Interpreted: Java byte code is translated on the fly to native machine instructions and is not stored anywhere. The development process is more rapid and analytical since the linking is an incremental and light weight process.
Multi-threaded: With Java's multi-threaded feature it is possible to write programs that can do many tasks simultaneously. This design feature allows developers to construct smoothly running interactive applications.
Object Oriented: In Java, everything is an Object. Java can be easily extended since it is based on the Object model.
Platform independent: Unlike many other programming languages including C and C++, when Java is compiled, it is not compiled into platform specific machine, rather into platform independent byte code. This byte code is distributed over the web and interpreted by virtual Machine (JVM) on whichever platform it is being run.
Portable: Being architectural-neutral and having no implementation dependent aspects of the specification makes Java portable. Compiler in Java is written in ANSI C with a clean portability boundary which is a PO SIX subset.
Robust: Java makes an effort to eliminate error prone situations by emphasizing mainly on compile time error checking and run-time checking.
Secure: With Java's secure feature it enables to develop virus-free, tamper-free systems. Authentication techniques are based on public-key encryption.
Simple: Java is designed to be easy to learn. If you understand the basic concept of OOP Java would be easy to master.
History of Java:
James Gosling initiated the Java language project in June 1991 for use in one of his many set-top box projects. The language, initially called Oak after an oak tree that stood outside Gosling's office, also went by the name Green and ended up later being renamed as Java, from a list of random words.
Sun released the first public implementation as Java 1.0 in 1995. It promised Write Once, Run Anywhere (WORA), providing no-cost run-times on popular platforms.
On 13 November 2006, Sun released much of Java as free and open source software under the terms of the GNU General Public License (GPL).
On 8 May 2007, Sun finished the process, making all of Java's core code free and open-source, aside from a small portion of code to which Sun did not hold the copyright.
Software:
Linux 7.1 or Windows 95/98/2000/XP/7/8 operating system.
Java JDK 5
Microsoft Notepad or any other text editor
Java programming language was originally developed by Sun Micro-systems which was initiated by James Gosling and released in 1995 as core component of Sun Micro-systems Java platform (Java 1.0 [J2SE]).
As of December 2008, the latest release of the Java Standard Edition is 6 (J2SE).
With the advancement of Java and its widespread popularity, multiple configurations were built to suite various types of platforms. Ex: J2EE for Enterprise Applications, J2ME for Mobile Applications.
Sun Micro-systems has renamed the new J2 versions as Java SE, Java EE and Java ME respectively.
Java is guaranteed to be Write Once, Run Anywhere.
Tuesday, July 22, 2014
PHP
- PHP is a recursive acronym for "Hypertext Preprocessor".
- PHP is a widely-used, open source scripting language.
- PHP scripts are executed on the server.
- PHP costs nothing, it is free to download and use.
- PHP files can contain text, HTML, CSS, JavaScript, and PHP code.
- PHP code are executed on the server, and the result is returned to the browser as plain HTML.
- PHP files have extension ".php".
- PHP can generate dynamic page content.
- PHP can create, open, read, write, delete, and close files on the server.
- PHP can collect form data.
- PHP can send and receive cookies.
- PHP can add, delete, modify data in your database.
- PHP can restrict users to access some pages on your website.
- PHP can encrypt data.
- PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, etc.).
- PHP is compatible with almost all servers used today (Apache, IIS, etc.).
- PHP supports a wide range of databases.
- PHP is easy to learn and runs efficiently on the server side.
- With PHP you are not limited to output HTML. You can output images, PDF files, and even Flash movies.
- You can also output any text, such as XHTML and XML.
- In PHP, all user-defined functions, classes, and keywords (e.g. if, else, while, echo, etc.) are NOT case-sensitive.However; in PHP, all variables are case-sensitive.
- PHP is a Loosely Typed Language.PHP automatically converts the variable to the correct data type, depending on its value.In other languages such as C, C++, and Java, the programmer must declare the name and type of the variable before using it.
PHP Variables:-
As with algebra, PHP variables can be used to hold values (x=5) or expressions (z=x+y).
A variable can have a short name (like x and y) or a more descriptive name (age, carname, total_volume).
Rules for PHP variables:
- A variable starts with the $ sign, followed by the name of the variable
- A variable name must start with a letter or the underscore character
- A variable name cannot start with a number
- A variable name can only contain alpha-numeric characters and underscores (A-z, 0-9, and _ )
- Variable names are case sensitive ($y and $Y are two different variables)
PHP Variables Scope:-
In PHP, variables can be declared anywhere in the script.
The scope of a variable is the part of the script where the variable can be referenced/used.
PHP has three different variable scopes:
- local
- global
- static
PHP Data Types:-
PHP Integers:
An integer is a number without decimals.
Rules for integers:
- An integer must have at least one digit (0-9)
- An integer cannot contain comma or blanks
- An integer must not have a decimal point
- An integer can be either positive or negative
- Integers can be specified in three formats: decimal (10-based), hexadecimal (16-based - prefixed with 0x) or octal (8-based - prefixed with 0)
Example
<?php
$x = 5985;
var_dump($x);
echo "<br>";
$x = -345; // negative number
var_dump($x);
echo "<br>";
$x = 0x8C; // hexadecimal number
var_dump($x);
echo "<br>";
$x = 047; // octal number
var_dump($x);
?>
Basic PHP Syntax:-
A PHP script can be placed anywhere in the document.
A PHP script starts with <?php and ends with ?>
Example:
<!DOCTYPE html>
<html>
<body>
<h1>My first PHP page</h1>
<?php
echo "Hello World!";
?>
</body>
</html>
PHP statements are terminated by semicolon (;).
The closing tag of a block of PHP code also automatically implies a semicolon.
So you do not have to have a semicolon terminating the last line of a PHP block.
Mac OS
The Mac OS is designed to run on Machintosh computers .
It is a very powerful and easy-to-use operating system .It is the world most advanced operating system and the newest version of OS X is free with strongest security.
The latest version of the Machintosh operating system is OS X. This operating system provides a number of unique features:
Figure :- OS X
OS X:-
OS X is the line of graphical operating systems developed, marketed, and sold by Apple Inc.
which succeeded the original Mac OS, which had been Apple's primary operating system since 1984.
Unlike the earlier Macintosh operating system, OS X is a Unix-based operating system built on
technology developed at NeXT from the second half of the 1980s until early 1997,
when Apple purchased the company.
Latest version of OS X is OS X Yosemite (version 10.10) is the upcoming eleventh major release of OS X, Apple Inc.'s desktop and server operating system for Macintosh computers. OS X Yosemite was announced and released to developers and beta testers on June 2, 2014, at WWDC 2014. Yosemite will be released to consumers in late 2014.Following the new naming scheme introduced with OS X Mavericks, Yosemite is named after the national park in California.
System requirements:-No changes in system requirements have been made for Yosemite, meaning that all Macintosh products capable of running OS X Mavericks will be supported by Yosemite; as with Mavericks, 2 GB of RAM, 8 GB of available storage, and OS X 10.6.8 (Snow Leopard) or later are required.
It is a very powerful and easy-to-use operating system .It is the world most advanced operating system and the newest version of OS X is free with strongest security.
The latest version of the Machintosh operating system is OS X. This operating system provides a number of unique features:
- Aqua is an intuitive user interface.
- Dock provides a flexible tool for organizing files.
- Sherlock locates information on the Web as well as on the user's computer system.
Figure :- OS X
OS X:-
OS X is the line of graphical operating systems developed, marketed, and sold by Apple Inc.
which succeeded the original Mac OS, which had been Apple's primary operating system since 1984.
Unlike the earlier Macintosh operating system, OS X is a Unix-based operating system built on
technology developed at NeXT from the second half of the 1980s until early 1997,
when Apple purchased the company.
Latest version of OS X is OS X Yosemite (version 10.10) is the upcoming eleventh major release of OS X, Apple Inc.'s desktop and server operating system for Macintosh computers. OS X Yosemite was announced and released to developers and beta testers on June 2, 2014, at WWDC 2014. Yosemite will be released to consumers in late 2014.Following the new naming scheme introduced with OS X Mavericks, Yosemite is named after the national park in California.
System requirements:-No changes in system requirements have been made for Yosemite, meaning that all Macintosh products capable of running OS X Mavericks will be supported by Yosemite; as with Mavericks, 2 GB of RAM, 8 GB of available storage, and OS X 10.6.8 (Snow Leopard) or later are required.
Device Drivers
What are Device drivers? How are device drivers updated?
Answer:-
Device drivers are specialized programs that allow device such as mouse, printer, scanner or keyboard to communicate with the rest of the computer system.
Every device, such as a mouse or printer , that is connected to a computer system, has a special program associated with it. This program , called a device driver or simply a driver, works with the operating system to allow communication between the device and the rest of the computer system.
Each time the computer system is started, the operating system loads all the device drivers into memory.
Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used .
Windows supplies hundreds of different device drivers with its system software. If a particular device driver is not included , the product's manufacturer will supply one.
Many time these drivers are available directly form manufacturer's website.
You probably never think abut the drivers in your computer.
However when your computer behaves unpredictably , you find updating your drivers solves your problems.
Windows makes it easy to update the drivers on your computer using Windows Update.
Answer:-
Device drivers are specialized programs that allow device such as mouse, printer, scanner or keyboard to communicate with the rest of the computer system.
Every device, such as a mouse or printer , that is connected to a computer system, has a special program associated with it. This program , called a device driver or simply a driver, works with the operating system to allow communication between the device and the rest of the computer system.
Each time the computer system is started, the operating system loads all the device drivers into memory.
Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used .
Windows supplies hundreds of different device drivers with its system software. If a particular device driver is not included , the product's manufacturer will supply one.
Many time these drivers are available directly form manufacturer's website.
You probably never think abut the drivers in your computer.
However when your computer behaves unpredictably , you find updating your drivers solves your problems.
Windows makes it easy to update the drivers on your computer using Windows Update.
Sunday, July 20, 2014
Process States and Transitions
List containing complete set of process states:
1. The process is executing in user mode.
2. The process is executing in kernel mode.
3. The process is not executing but is ready to run as soon as the kernel schedules it.
4. The process is sleeping and resides in main memory .
5. The process is ready to run , but swapper (process 0) must swap the process into main memory before the kernel can schedule it to execute.
6. The process is sleeping, and the swapper has swapped the process to secondary storage to make room for other processes in main memory.
7. The process is returning from the kernel to user mode ,but the kernel preemprts it and does a context switch to schedule another process.The distinction between this state and state 3 (ready to run) will be brought out shortly.
8. The process is newly created and is in a transition state ; the process exists, but it is not ready to run , nor is it sleeping . This state is the start for all processes except process 0.
9. The process executed the exit system call and is in the zombie state. The process no longer exists , but it leaves a record containing an exit code and some timing statistics for its parent process to collect .The zombie state is the final state of a process.
1. The process is executing in user mode.
2. The process is executing in kernel mode.
3. The process is not executing but is ready to run as soon as the kernel schedules it.
4. The process is sleeping and resides in main memory .
5. The process is ready to run , but swapper (process 0) must swap the process into main memory before the kernel can schedule it to execute.
6. The process is sleeping, and the swapper has swapped the process to secondary storage to make room for other processes in main memory.
7. The process is returning from the kernel to user mode ,but the kernel preemprts it and does a context switch to schedule another process.The distinction between this state and state 3 (ready to run) will be brought out shortly.
8. The process is newly created and is in a transition state ; the process exists, but it is not ready to run , nor is it sleeping . This state is the start for all processes except process 0.
9. The process executed the exit system call and is in the zombie state. The process no longer exists , but it leaves a record containing an exit code and some timing statistics for its parent process to collect .The zombie state is the final state of a process.
Buffer
Definition :-
The kernel could read and write directly to and from the disk for all file system accesses,but system response time and throughput would be poor because of the slow disk transfer rate . The kernel therefore attempts to minimize frequency of disk access by keeping a pool of internal data buffers,called the buffer cache which contains the data in recently used disk blocks.
A buffer contains two parts:
a memory array that contains data from the disk and
a buffer header that identifies the buffer.
The status of buffer is a combination of the following conditions:
1. The buffer is currently locked.
2. The buffer contains valid data
3. The kernel must write the buffer contents to disk before reassigning the buffer this condition is known as "delayed-write"
4. The kernel is currently reading or writing the contents of the buffer to disk.
5. A process is currently waiting for the buffer to become free
Structure of the buffer pool:
The kernel caches data in the buffer pool according to a least recently used algorithm .
The kernel maintains a free list of buffers that preserves the last recently used order.
The free list is a doubly linked circular list of buffers with a dummy buffer header that marks its beginning and end .
Kernel organizes the buffer into separate queues, hashed as a function of the device and block number.
Five typical scenarios the kernel may follow in getblk to allocate a buffer for a disk block
1. The kernel finds the block on its hash queue, and its buffer is free.
2. The kernel cannot find the block on the hash queue,so it allocates a buffer from the free list .
3. The kernel cannot find the block on the hash queue and in attempting to allocate a buffer from the free list ,finds a buffer on the free list that has been marked "delayed write." The kernel must write the "delayed write" buffer to disk and allocate another buffer.
4. The kernel cannot find the block on the hash queue , and the free list of buffers is empty.
5. The kernel finds the block on the hash queue , but its buffer is currently busy.
The kernel could read and write directly to and from the disk for all file system accesses,but system response time and throughput would be poor because of the slow disk transfer rate . The kernel therefore attempts to minimize frequency of disk access by keeping a pool of internal data buffers,called the buffer cache which contains the data in recently used disk blocks.
A buffer contains two parts:
a memory array that contains data from the disk and
a buffer header that identifies the buffer.
The status of buffer is a combination of the following conditions:
1. The buffer is currently locked.
2. The buffer contains valid data
3. The kernel must write the buffer contents to disk before reassigning the buffer this condition is known as "delayed-write"
4. The kernel is currently reading or writing the contents of the buffer to disk.
5. A process is currently waiting for the buffer to become free
Structure of the buffer pool:
The kernel caches data in the buffer pool according to a least recently used algorithm .
The kernel maintains a free list of buffers that preserves the last recently used order.
The free list is a doubly linked circular list of buffers with a dummy buffer header that marks its beginning and end .
Kernel organizes the buffer into separate queues, hashed as a function of the device and block number.
Five typical scenarios the kernel may follow in getblk to allocate a buffer for a disk block
1. The kernel finds the block on its hash queue, and its buffer is free.
2. The kernel cannot find the block on the hash queue,so it allocates a buffer from the free list .
3. The kernel cannot find the block on the hash queue and in attempting to allocate a buffer from the free list ,finds a buffer on the free list that has been marked "delayed write." The kernel must write the "delayed write" buffer to disk and allocate another buffer.
4. The kernel cannot find the block on the hash queue , and the free list of buffers is empty.
5. The kernel finds the block on the hash queue , but its buffer is currently busy.
Monday, July 14, 2014
Solve and Test Arithmetic questions
Q1. The base of a triangular field is three times its altitude.If the cost of cultivating the field at Rs.24 per hectare be Rs.324, find its base and height.
Ans. Height = 300m , base= 900m
Q2 The average monthly expenditure of a family was Rs.4,050 during first 3 months, Rs. 4,260 during next 4 month and Rs.4,346 during last 5 month of the year. If the total saving during the year be Rs.8,720, find the average monthly income.
Ans. Rs. 4,970
Q3 The student in three classes are in the ratios 2:3:5. If 20 students are increased in each class ,the ratios changes to4:5:7. What is the total number of student before the increase?
Ans. 100
Q4 A papaya tree was planted 2 year ago. It increase at the rate of 20% every year . If at present , the height of the tree is 540 cm, What was it when the tree was planted?
Ans. 375 cm
Q5 The sum of the ages of a father and son is 45 year. Five year ago , the product of their ages was 4 times the father's age at that time.Find the present ages of the father and son.
Ans. Father's age i.s 36 year and son 's age is 9 years
Q6. A man sold an article for Rs.161, gaining 1/6th of his outlay. Find the cost price of the article.
Ans. Rs. 138
Q7. Divide Rs.560 among A,Band C so that A may get half as much as C and B may get half as much as C.
Ans. A's shave =Rs. 140, B's shave =Rs. 140, C 's shave= Rs.280
Q8. If in a long division sum ,the dividend is 380606 and the successive remainders from the first to the last are 434,125 and 413,find the divisor.
Ans. 843
Q9. In a hostel there were some students.Average expenditure on their meal was Rs.60.10 more students joined and the expenses increased by Rs.350 ,but average reduced by Rs. 5 .How many students were in the hostel originally?
Ans. 40
Q10. A grocer purchased 80 kg of rice at RS .13.50 per kg and mixed it with 120 kg available at Rs. 16 per kg.At what rate per kg should he sell the mixture to have a gain of 20 per cent?
Ans. Rs 18 per kg
Ans. Height = 300m , base= 900m
Q2 The average monthly expenditure of a family was Rs.4,050 during first 3 months, Rs. 4,260 during next 4 month and Rs.4,346 during last 5 month of the year. If the total saving during the year be Rs.8,720, find the average monthly income.
Ans. Rs. 4,970
Q3 The student in three classes are in the ratios 2:3:5. If 20 students are increased in each class ,the ratios changes to4:5:7. What is the total number of student before the increase?
Ans. 100
Q4 A papaya tree was planted 2 year ago. It increase at the rate of 20% every year . If at present , the height of the tree is 540 cm, What was it when the tree was planted?
Ans. 375 cm
Q5 The sum of the ages of a father and son is 45 year. Five year ago , the product of their ages was 4 times the father's age at that time.Find the present ages of the father and son.
Ans. Father's age i.s 36 year and son 's age is 9 years
Q6. A man sold an article for Rs.161, gaining 1/6th of his outlay. Find the cost price of the article.
Ans. Rs. 138
Q7. Divide Rs.560 among A,Band C so that A may get half as much as C and B may get half as much as C.
Ans. A's shave =Rs. 140, B's shave =Rs. 140, C 's shave= Rs.280
Q8. If in a long division sum ,the dividend is 380606 and the successive remainders from the first to the last are 434,125 and 413,find the divisor.
Ans. 843
Q9. In a hostel there were some students.Average expenditure on their meal was Rs.60.10 more students joined and the expenses increased by Rs.350 ,but average reduced by Rs. 5 .How many students were in the hostel originally?
Ans. 40
Q10. A grocer purchased 80 kg of rice at RS .13.50 per kg and mixed it with 120 kg available at Rs. 16 per kg.At what rate per kg should he sell the mixture to have a gain of 20 per cent?
Ans. Rs 18 per kg
Saturday, July 12, 2014
Solve More GK Qs
General Knowledge Questions :-
1) What should be the minimum interval between two successive blood donations?
A) 6 weeks
B) 3 months
C) 6 months
D) 8 months
Ans::- B) 3 months
2) Food is mainly digested in-
A) Liver
B) Large intestine
C) Small intestine
D) Mouth
Ans::- C) Small intestine
3) The large cell in the human body is -
A) Nerve Cell
B) Muscle Cell
C) Liver Cell
D) Kidney Cell
Ans::- A) Nerve Cell
4) Which of the following is a flightless bird?
A) Emu
B) Hen
C) Swan
D) None of these
Ans::- A) Emu
5) Meningitis is a disease which affects the -
A) Kidneys
B) Liver
C) Heart
D) Brain
Ans::- D) Brain
6) Which of the following is a vector quantity?
A) Force
B) Momentum
C) Energy
D) Temperature
Ans ::- A) Force
7) The three famous Buddhist sites Ratanagiri ,Lalitgiri and Udaigiri are located in which of the following States?
A) Bihar
B) Maharashtra
C) U.P.
D) Orissa
Ans:: - Orissa
8) Who among the following earned the title of a 'Liberator'?
A) Chandragupta Vikramaditya
B) Ashoka
C) Chandragupta Maurya
D) Alexander
Ans::- C) Chandragupta Maurya
9) The strategy of 'Divide and Rule' was adopted by whom?
A) Lord Curzon
B) lord Welleslely
C) Lord Minto
D) Lord Canning
Ans:: - C) Lord Minto
10) Delhi became the Capital of India in -
A) 1910
B) 1911
C) 1916
D) 1923
Ans ::- B) 1911
11) The first President of independent India was -
A) Dr. Rajendra Prasad
B) M.K.Gandhi
C) Dr. S.Radhakrishnan
D) J.L.Nehru
Ans::- A) Dr. Rajendra Prasad
12) Who was the first European to translate the Bhagwad Gita into English?
A) William Jones
B) Charles Wilkins
C) James Prinsep
D) Sir Alexander Cunningham
Ans:: -B) Charles Wilkins
13. The population of which of the following is maximum on the earthA) Reptiles
B) Fishes
C) Birds
D) Beetles
Ans. B) Fishes
14. Which of the following is the largest living mammal?
A) Giraffe
B) White elephant
C) Rhinoceros
D) Blue Whale
Ans. D) Blue Whale
15. Which first is given by a herb?A) Mango
B) Banana
C) Apple
D) Jack- fruit
Ans. D) Jack- fruit
16. Which of the following is hereditary?
A) Dysentery
B) Tuberculosis
C) Haemophilia
D) Cancer
Ans. C) Haemophilia
17. Which of the following is knows as the jain Temple City?
A) Gimar
B) Rajagriha
C) Varanasi
D) Ilahabad
Ans. A) Gimar
18. Who was the first King to conquer Malwa,Gujarat and Maharashtra?A) Skandagupta
B) Samudragupta
C) Chandragupta Maurya
D) Harshavardhena
Ans. C) Chandragupta Maurya
19. The slogan 'Inquilab Zindabhad' was raised by whom?A) Lokmanya Tilak
B) Veer Savarkar
C) Chandrashekar Azad
D) Bhagat Singh
Ans. D) Bhagat Singh
20. The Muslim League started demanding a separate nation for the Muslims from which year?
A) 1919
B) 1925
C) 1929
D) 1940
Ans. D) 1940
21. When did the British Parliament pass the Indian Independence Bill ?
A) 20th February, 1947
B) 24th March, 1947
C) 1st July, 1947
D) 14th August,1947
Ans. C) 1st July,1947
22. Who among the following has the final power to maintain order within the House of People?A) Marshal of the People
B) Prime Minister
C) Speaker
D) Chief of Security Staff
Ans. C) Speaker
23. Which is laughing gas?
a) Carbon dioxide
b) Sulphur dioxide
c) Carbon monoxide
d) Nitrous oxide
Ans. d) Nitrous oxide
24. Detergents used for cleaning clothes and utensils contains-a) Nitrates
b) Bicarbonates
c) Sulphonates
d) Bismutnates
Ans. c) Sulphonates
25. Floppy disc in a computer system is-a) Compiler
b) Core memory
c) Software
d) Device for storage and retrieving data
Ans. d) Device for storage and retrieving data
26. The tooth with there roots is-a) Molar
b) Pre- Molar
c) Incisor
d) CanineAns. a) Molar
27. Bamboo is a-
a) Grass
b) Herb
c) Shrub
d) Tree
Ans. a) Grass
28. Which of the following cannot be controlled by vaccination?
a) Small pox
b) Diabetes
c) Polio
d) Whooping cough
Ans. b) Diabetes
29. Which of the following terms is used for several individuals of a species living together in a locality?a) Biosphere
b) Ecosystem
c) Bio- community
d) PopulationAns. c) Bio- community
30. Raman effect is associated with characteristics of-a) Heat
b) Light
c) Electricity
d) Magnetism
Ans. b) Light
31. Which of the following is known as the queen of spices?
a) Coriander
b) Cardamom
c) Fenugreek
d) ChilliesAns. b) Cardamom
32. The Peacock throne was made for -a) Jahangir
b) Akbar
c) Shahjehan
d) Aurangzeb
Ans. c) Shahjehan
33. Which of the following was built by Akbar?
a) Agra fort
b) Fort of Daulatabad
c) Red fort
d) Fort of AhmednagarAns. a) Agra fort
34. Ramayan refers to-a) Satyuga
b) Tretayuga
c) Dwaparyuga
d) Kalyuga
Ans. b) Tretayuga
35. Who is regarded as the greatest law giver of ancient India?a) Kautilya
b) Manu
c) Panini
d) Patanjali
Ans. b) Manu
36. When did the Indian National Congress ask for the 'Dominion Status'?a) 1908
b) 1929
c) 1942
d) 1947
Ans. a) 1908
37. The first woman's university in India was founded by-a) Gandhiji
b) J.K.Kumarappa
c) Dhondo Keshave Karve
d) Rani Ahilya Devi
Ans. c) Dhondo Keshave Karve
1) What should be the minimum interval between two successive blood donations?
A) 6 weeks
B) 3 months
C) 6 months
D) 8 months
Ans::- B) 3 months
2) Food is mainly digested in-
A) Liver
B) Large intestine
C) Small intestine
D) Mouth
Ans::- C) Small intestine
3) The large cell in the human body is -
A) Nerve Cell
B) Muscle Cell
C) Liver Cell
D) Kidney Cell
Ans::- A) Nerve Cell
4) Which of the following is a flightless bird?
A) Emu
B) Hen
C) Swan
D) None of these
Ans::- A) Emu
5) Meningitis is a disease which affects the -
A) Kidneys
B) Liver
C) Heart
D) Brain
Ans::- D) Brain
6) Which of the following is a vector quantity?
A) Force
B) Momentum
C) Energy
D) Temperature
Ans ::- A) Force
7) The three famous Buddhist sites Ratanagiri ,Lalitgiri and Udaigiri are located in which of the following States?
A) Bihar
B) Maharashtra
C) U.P.
D) Orissa
Ans:: - Orissa
8) Who among the following earned the title of a 'Liberator'?
A) Chandragupta Vikramaditya
B) Ashoka
C) Chandragupta Maurya
D) Alexander
Ans::- C) Chandragupta Maurya
9) The strategy of 'Divide and Rule' was adopted by whom?
A) Lord Curzon
B) lord Welleslely
C) Lord Minto
D) Lord Canning
Ans:: - C) Lord Minto
10) Delhi became the Capital of India in -
A) 1910
B) 1911
C) 1916
D) 1923
Ans ::- B) 1911
11) The first President of independent India was -
A) Dr. Rajendra Prasad
B) M.K.Gandhi
C) Dr. S.Radhakrishnan
D) J.L.Nehru
Ans::- A) Dr. Rajendra Prasad
12) Who was the first European to translate the Bhagwad Gita into English?
A) William Jones
B) Charles Wilkins
C) James Prinsep
D) Sir Alexander Cunningham
Ans:: -B) Charles Wilkins
13. The population of which of the following is maximum on the earthA) Reptiles
B) Fishes
C) Birds
D) Beetles
Ans. B) Fishes
14. Which of the following is the largest living mammal?
A) Giraffe
B) White elephant
C) Rhinoceros
D) Blue Whale
Ans. D) Blue Whale
15. Which first is given by a herb?A) Mango
B) Banana
C) Apple
D) Jack- fruit
Ans. D) Jack- fruit
16. Which of the following is hereditary?
A) Dysentery
B) Tuberculosis
C) Haemophilia
D) Cancer
Ans. C) Haemophilia
17. Which of the following is knows as the jain Temple City?
A) Gimar
B) Rajagriha
C) Varanasi
D) Ilahabad
Ans. A) Gimar
18. Who was the first King to conquer Malwa,Gujarat and Maharashtra?A) Skandagupta
B) Samudragupta
C) Chandragupta Maurya
D) Harshavardhena
Ans. C) Chandragupta Maurya
19. The slogan 'Inquilab Zindabhad' was raised by whom?A) Lokmanya Tilak
B) Veer Savarkar
C) Chandrashekar Azad
D) Bhagat Singh
Ans. D) Bhagat Singh
20. The Muslim League started demanding a separate nation for the Muslims from which year?
A) 1919
B) 1925
C) 1929
D) 1940
Ans. D) 1940
21. When did the British Parliament pass the Indian Independence Bill ?
A) 20th February, 1947
B) 24th March, 1947
C) 1st July, 1947
D) 14th August,1947
Ans. C) 1st July,1947
22. Who among the following has the final power to maintain order within the House of People?A) Marshal of the People
B) Prime Minister
C) Speaker
D) Chief of Security Staff
Ans. C) Speaker
23. Which is laughing gas?
a) Carbon dioxide
b) Sulphur dioxide
c) Carbon monoxide
d) Nitrous oxide
Ans. d) Nitrous oxide
24. Detergents used for cleaning clothes and utensils contains-a) Nitrates
b) Bicarbonates
c) Sulphonates
d) Bismutnates
Ans. c) Sulphonates
25. Floppy disc in a computer system is-a) Compiler
b) Core memory
c) Software
d) Device for storage and retrieving data
Ans. d) Device for storage and retrieving data
26. The tooth with there roots is-a) Molar
b) Pre- Molar
c) Incisor
d) CanineAns. a) Molar
27. Bamboo is a-
a) Grass
b) Herb
c) Shrub
d) Tree
Ans. a) Grass
28. Which of the following cannot be controlled by vaccination?
a) Small pox
b) Diabetes
c) Polio
d) Whooping cough
Ans. b) Diabetes
29. Which of the following terms is used for several individuals of a species living together in a locality?a) Biosphere
b) Ecosystem
c) Bio- community
d) PopulationAns. c) Bio- community
30. Raman effect is associated with characteristics of-a) Heat
b) Light
c) Electricity
d) Magnetism
Ans. b) Light
31. Which of the following is known as the queen of spices?
a) Coriander
b) Cardamom
c) Fenugreek
d) ChilliesAns. b) Cardamom
32. The Peacock throne was made for -a) Jahangir
b) Akbar
c) Shahjehan
d) Aurangzeb
Ans. c) Shahjehan
33. Which of the following was built by Akbar?
a) Agra fort
b) Fort of Daulatabad
c) Red fort
d) Fort of AhmednagarAns. a) Agra fort
34. Ramayan refers to-a) Satyuga
b) Tretayuga
c) Dwaparyuga
d) Kalyuga
Ans. b) Tretayuga
35. Who is regarded as the greatest law giver of ancient India?a) Kautilya
b) Manu
c) Panini
d) Patanjali
Ans. b) Manu
36. When did the Indian National Congress ask for the 'Dominion Status'?a) 1908
b) 1929
c) 1942
d) 1947
Ans. a) 1908
37. The first woman's university in India was founded by-a) Gandhiji
b) J.K.Kumarappa
c) Dhondo Keshave Karve
d) Rani Ahilya Devi
Ans. c) Dhondo Keshave Karve
Subscribe to:
Posts (Atom)
शिव भोलेनाथ स्तुति
जय शिवशंकर, जय गंगाधर, करुणा-कर करतार हरे, जय कैलाशी, जय अविनाशी, सुखराशि, सुख-सार हरे जय शशि-शेखर, जय डमरू-धर जय-जय प्रेमागार हरे, जय ...
-
Directions: In each Q1 to Q3 of the following questions, there are five letter groups or words in each question. Four of these letter g...
-
Program 1:- Write a function in C++ that exchanges data (passing by references )using swap function to interchange the given tw...
-
#include<stdio.h> #include<conio.h> void main() { int a[10],b[10],c[10]; int n,k,i,p,coeff; clrscr(); for(i=0;i<1...