The journey of self-motivation and personal growth is a lifelong path, filled with twists and turns, triumphs and setbacks. By embracing this journey, we can develop the skills, confidence, and resilience needed to achieve our goals and live a fulfilling life. I hope that my insights and experiences will inspire and motivate you to embark on your own journey of self-discovery and growth.Join me as I share insights, experiences, and practical tips on living a fulfilling life.
Tuesday, January 7, 2014
Tuesday, December 31, 2013
Happy New Year
WISH YOU HAPPY AND PROSPEROUS NEW YEAR
Make this year with full of joy and happiness in this world.
Let there be peace, growth and mankind with enjoyment this year.
Think always Positive to change the world.
Think Good and big to become Big.
Thanks God.
May God bless you.
Again 365 days starts in looping.
Thursday, December 26, 2013
Programs of microprocessor
Programs of microprocessor
Microprocessor cannot understand a program written in Assembly Language .
Instruction are divided into bit pattern of word in byte as op-code(operation code) and operation.
Instruction are divided into bit pattern of word in byte as op-code(operation code) and operation.
Instruction format has three types
1.One byte-has op-code
2.Two byte- has op-code and address
3.Three byte -has code and address lower byte and address higher byte
opcode |
1 byte
opcode |
Data / address |
2 byte
opcode |
Data / address Lower byte |
Data Address Higher byte |
3 byte
Instructions set for 8085 are classified into five categories:
1.Data transfer group instructions2.Arithmetic group of instructions
3.Logical group
4.Branching group
5.Machine Level
A program known in Assembler is used to covert a Assembly language program to machine language.
I) Data transfer copy operation:-
1)Load a 8 bit number in a register
2)Copy from Register to Register
3)Copy between Register and Memory
4)Copy between Input/Output Port and Accumulator
5)Load a 16 bit number in a Register pair
6) Copy between Register pair and Stack memory
Example :-
1.Load a 8 bit number 4F in register B -MVI B ,4FH
2.Copy from Register B to Register A -MOV A,B
3.Load a 16 bit number 2050 in Register pair HL -LXI H,2050H
4.Copy from Register B to Memory Address 2050 - MOV M,B
5.Copy between Input/Output Port and Accumulator- OUT 01H IN 07H
2)Arithmetic operations and instructions
1.Add 8 bit number 32 H to Accumulator -ADI 32 H
2.Add contents of Register B to Accumulator - ADD B
3.Subtract a 8 bit number 32 H from Accumulator - SUI 32H
4.Subtract contents of Register C from Accumulator -SUB C
5.Increment the contents of Register D by 1 - INR D
6.Decrement the contents of Register E by 1 - DCR E
3)Logical and Bit Manipulation operations and instructions
1.Logically AND Register H with Accumulator -ANA H
2.Logically OR Register L with Accumulator -ORA L
3.Logically XOR Register B with Accumulator - XRA B
4.Compare contents of Register C with Accumulator -CMP C
5.Complement Accumulator -CMA
6.Rotate Accumulator Left -RAL
Program to add two 8 bit numbers and store result in register C
1.Get two numbers
a) Load first no. in register D MVI D , 2H
b)Load second no. in register E MVI E , 3H
2.Add them
a) Copy register D to A MOV A , D
b) Add register E to A ADD E
3. Store result
a)Copy A to register C MOV C , A
4.Stop
a)Stop processing HLT
Program to add 8 bit number result can be more than 8 bits i.e.with carry present
1.Get two numbers
a) Load first no. in register D MVI D , 2H
b)Load second no. in register E MVI E , 3H
2.Add them
a) Copy register D to A MOV A , D
b) Add register E to A ADD E
3. Store result
a)Copy A to register C MOV C , A
4.Carry
a)Use conditional Jump instructions JNC END
5.Change
a)Clear register B MVI B ,0H
b)Increment B INR B
6.Stop
a)Stop processing HLT
Sunday, December 22, 2013
Solve
SOLVE
1) Find the odd man out - 49, 81 ,100 ,144A) 49
B) 81
C) 100
D) 144
2)Which of the following numbers is different from others?
A) 3156
B) 4164
C) 5255
D) 6366
3)Fill the blank
5,35,7,42,6 ,_____,9,36,4.
A) 45
B) 48
C) 54
D) 56
4)Find odd man out :DFEG, JKLM, GHIK, RTSU
A) DFEG
B)JKLM
C)GHIK
D)RTSU
5) find odd man out 1,3,10,21,64,129,256,778
1) 10
2) 21
3) 129
4) 256
6)The missing number in the series is:
0 , 6 , 24 , 60 , 120 , ? , 336 is
A) 240
B) 220
C) 280
D)210
7)Let a means minus (-) ,b means multiplied by (*), C means divided by (/) and D means plus(+).The value of 90 D 9 a 29 C 10 b 2
A) 8
B) 10
C) 12
D) 14
8)If MOHAN is represented by the code KMFYL, then COUNT will be represented by
A) AMSLR
B) MSLR
C) MASRL
D)SAMLR
9) 32 33 37 46 62 ?
Replace ? by
A)85
B) 87
C) 94
D) 99
10)AZ DW GT JQ ? .Replace ? from following
A) LD
B) MN
C) MO
D) NM
11) In certain code language ,PUNE is written as SXQH.How would you write DELHI in this language?
A ) FGNJL
B ) FGNJK
C ) GHOKM
D ) GHOKL
12)Find odd man out:
A) 6
B ) 18
C ) 24
D ) 36
13)Find the wrong term in the following series:
68 66 62 59 56 53
A) 59
B) 62
C) 66
D) 68
14)If P is the brotherb of Q;Q is the son of R; Sis R's father .What is P of S?
A) Son
B) Brother
C) Grandson
D) Grandfather
15) The missing number in the series 40 , 120 , 60 , 180 , 90 , ? , 135
A) 110
B) 270
C) 105
D) 210
16) The length and breadth of a rectangle are changed by +20% and by -10% respectively.What is the percentage change in the area of rectangle?
A) 10%
B) 12.5%
C) 8%
D) 15%
17) Two pipes A and B can fill a tyank in 15 minutes and 20 minutes respectively .Both the pipes are opened together but after 4 minutes,pipe A is turned off. What is the total time required to fill the tank?
A) 10 min.40 sec
B) 11 min.45 sec
C) 12 min.30 sec
D) 14 min.40sec
18)The odd number from 1 to 45 which are exactly divisible by 3 are arranged in an ascending order .The number at 6th position is
A) 18
B) 24
C) 33
D) 36
19) If the radius of a circle is increased by 50%, the perimeter of the circle will increase by
A) 30
B) 85/2
C) 170/3
D) 110
20) In code language, the word BAD is written as 658 .In the same language, what could be the code for FIG?
A) 9 12 10
B) 10 13 11
C) 8 11 13
D) 10 12 13
Wednesday, December 18, 2013
More C++ programs
//Program to display Floyd triangle:-
main()
{
int line,i,num=1,incr;
cout<<" How many lines = ";
cin>>line;
cout<<"\n \n Floyds Triangle \n \n";
for(i=1;i<=line;i++)
{
for(incr=1;incr<=i;incr++)
{
cout<<num;
cout<<"\t";
num++;
}
cout<<"\n";
}
}
Output:-
How many lines = 7
Floyds triangle
1
2 3
4 5 6
7 8 9 10
11 12 13 1 4 15
16 17 18 19 20 21
22 23 24 25 26 27 28
//Program to check whether number is prime or not:-
#include<iostream.h>
main()
{
int num,temp=0,i;
cout<<"\n Enter the number =";
cin>>num;
if(num>0)
{
for(i=2;i<=num-1;i++)
{
if(num%i==0)
{
cout<<"\n Number is not a Prime number \n \n";
temp=1;
break;
}
}
if(temp==0)
{
cout<<"\n Number is Prime \n \n";
}
}
else
cout<<"Enter only Positive numbers";
}
Output:-
Enter the number = 7
Number is Prime
//Program of destructors in c++:-
#include<iostream.h>
class ABC
{
int *width,*height;
public:
ABC(int,int);
~ABC();
int area()
{
return(*width**height);
}
};
ABC::ABC(int a,int b)
{
width=new int;
height= new int;
*width=a;
*height=b;
}
ABC::~ABC()
{
delete width;
delete height;
}
main()
{
ABC obj1(4,9),obj2(7,5);
cout<<obj1.area();
cout<<"\n";
cout<<obj2.area();
}
Output :-
3635
//Program of static member variable and member function:
class ABC
{
private :static int data;
public: static void getdata()
{
++data;
cout<<"count is =";
cout<<data<<"\n";
}
void putdata()
{
++data;
cout<<"now count is ="<<data<<"\n";
}
void newfunction()
{
++data;
cout<<"now count is ="<<data;
}
};
int ABC::data=5;
void main()
{
ABC obj;
ABC::getdata();
obj.putdata();
obj.newfunction();
}
Output:-
count is =6now count is =7
now count is =8
Monday, December 2, 2013
Sunday, November 10, 2013
Database- SQL
Database- SQL
- SQL stands for Structured Query Language.
- SQL is an ANSI (i.e. American National Standards Institute ) standard computer language for accessing and manipulating database systems.
- SQl statements are used to retrieve and update data in a database.
- SQL works with database programs like MS Access ,DB2,Informix ,MS SQL Server, Oracle ,Sybase,etc.
- The first version ,initially called SEQUEL,was designed to manipulate and retrieve data
- SQL is a Non - procedural query language.
- Sometimes referred to as a Database Gateway Language as an ANSI made it a standard language for all DBMS.
SQL commands are divided into following categories:-
1)Data Definition Language-
It uses create,alter,drop,truncate
2)Data Manipulation Language -
It uses insert ,update,delete
3)Data Query Language -
It uses select
4)Data Control Language
It uses grant ,revoke
5)Transaction control Language
It uses commit,rollback
Syntax:
Create- CREATE TABLE tablename(columnname1 data_type (size)[constraints],(columname2 data_type (size)[constraints],....)
Alter- ALTER TABLE tableman ADD(<columnname> data_declaration[constraints],<columnname> data_declaration[constraints],.....);
To delete Drop - DROP TABLE <tablename>[CASCADE CONSTRAINTS];
Truncate Table<tablename>;
removes all rows from a table and is high speed data deletion statement.
Click here for solve the quiz on sql
Saturday, November 2, 2013
Sunday, October 27, 2013
Cryptography and Security
Cryptography and Security
Cryptography is the art and science of achieving security by encoding messages to make them non-readable.
Cryptanalysis is the technique of decoding messages from a non-readable format back to readable format without knowing how they were initially converted from readable format to non-readable format.
Cryptology is a combination of cryptography and cryptanalysis.
Principles of Security:-
1)Confidentiality
2)Integrity
3)Authentication
4)Access control
5)Availability
6)Non-repudiation
7)Ethical and legal issues
Types of attacks:-
1)General attacks-Criminal attacks,publicity attacks,legal attacks
2)Technical view-
a)Theoretical concepts-
I)Passive attacks-
I)Passive attacks-
i)release of message contents
ii)traffic analysis
II)Active attacks-
i)Interception,
ii)Fabrication,
iii)Modification,
iv)Interruption
3)Program attack-
a)Virus- A virus is a computer program that attaches itself to another legitimate program and causes damage to the computer system or to the network.
During lifetime ,a virus goes through four phases:-Dormant phase,Propagation phase,Triggering phase ,Execution phase.
b)Worm
A worm does not perform any destructive actions and instead ,only consumes system resources to bring it down.
c)Trojan Horse
It allows an attacker to obtain some confidential information about a computer or a network.
d)Specific attacks-
Sniffing and spoofing-cause packet level attacks.
Phishing-It is new attack which attempts to fool legitimate users to provide their confidential information to fake sites
Pharming /DNS spoofing -attack involves changing the DNS entries so that users are redirected to an invalid site,while they thinking that they have connected to the right site.
Wednesday, October 23, 2013
Subscribe to:
Posts (Atom)
Featured posts
Happy Independence Day August 15th
Here's a message for India's Independence Day (August 15th): "शुभ स्वतंत्रता दिवस! आजादी की 79वीं वर्षगांठ पर, आइए हम अपने देश...

Popular posts
-
A warehouse in the supply chain business plays a crucial role in storing and managing inventory. Here's a brief overview: Key Functions...