Tuesday, December 31, 2013

Happy New Year

2013

WISH YOU HAPPY AND PROSPEROUS NEW YEAR


Welcome to 2014


Make this year with full of joy and happiness in this world.
Let there be peace, growth and mankind with enjoyment this year.
Think always Positive to change the world.
Think Good and big to become Big.
Thanks God.
May God bless you.

Happy New year 2014

Again 365 days starts in looping.

Thursday, December 26, 2013

Programs of microprocessor

Programs of microprocessor




Microprocessor cannot understand a program written in Assembly Language .
Instruction are divided into bit pattern of word in byte as op-code(operation code) and operation.

Instruction format has three types
1.One byte-has op-code
2.Two byte- has op-code and address
3.Three byte -has code and address lower byte and address higher byte

opcode

1 byte

 
opcode
Data / address

2 byte

 
opcode
Data / address Lower byte
Data Address Higher byte

3 byte



Instructions set for 8085 are classified into five categories:

1.Data transfer group instructions
2.Arithmetic group of instructions
3.Logical group
4.Branching group
5.Machine Level
 
A program known in Assembler is used to covert a Assembly language program to machine language.

I) Data transfer copy operation:-


1)Load a 8 bit number in a register
2)Copy from Register to Register
3)Copy between Register and Memory
4)Copy between Input/Output Port and Accumulator
5)Load a 16 bit number in a Register pair
6) Copy between Register pair and Stack memory

Example :-
1.Load a 8 bit number 4F in register B                     -MVI   B ,4FH
2.Copy from Register B to Register A                     -MOV  A,B
3.Load a 16 bit number 2050 in Register pair HL     -LXI     H,2050H
4.Copy from Register B to Memory Address 2050  - MOV   M,B
5.Copy between Input/Output Port and Accumulator- OUT   01H      IN   07H

2)Arithmetic operations and instructions


1.Add 8 bit number 32 H to Accumulator                   -ADI   32 H
2.Add contents of Register B to Accumulator            - ADD B
3.Subtract a 8 bit number 32 H from Accumulator      - SUI   32H
4.Subtract contents of Register C from Accumulator   -SUB  C
5.Increment the contents of Register D by 1                - INR   D
6.Decrement the contents of Register E by 1               -  DCR   E

3)Logical and Bit Manipulation operations and instructions


1.Logically AND Register H with Accumulator             -ANA  H
2.Logically OR Register L with Accumulator                 -ORA   L
3.Logically XOR Register B with Accumulator             - XRA   B
4.Compare contents of Register C with Accumulator  -CMP  C
5.Complement Accumulator                                            -CMA
6.Rotate Accumulator Left                                             -RAL

Program to add two 8 bit numbers and store result in register C


1.Get two numbers
a) Load first no. in register D                                        MVI   D , 2H
b)Load  second no. in register E                                    MVI   E , 3H

2.Add them
a) Copy register D to A                                                  MOV  A , D
b) Add register E to A                                                     ADD E

3. Store result
a)Copy A to register  C                                                  MOV  C , A

4.Stop
a)Stop processing                                                            HLT


Program to add 8 bit number result can be more than 8 bits i.e.with carry present


1.Get two numbers
a) Load first no. in register D                                        MVI   D , 2H
b)Load  second no. in register E                                    MVI   E , 3H

2.Add them
a) Copy register D to A                                                  MOV  A , D
b) Add register E to A                                                     ADD E

3. Store result
a)Copy A to register  C                                                  MOV  C , A

4.Carry
a)Use conditional Jump instructions                           JNC  END

5.Change
a)Clear register B                                                          MVI  B ,0H
b)Increment B                                                                INR  B

6.Stop
a)Stop processing                                                         HLT


Sunday, December 22, 2013

Solve

SOLVE
 1) Find the odd man out - 49,  81 ,100 ,144
A) 49
B) 81
C) 100
D) 144


2)Which of the following numbers is different from others?
A) 3156
B) 4164
C) 5255
D) 6366


3)Fill the blank
5,35,7,42,6 ,_____,9,36,4.
A) 45
B) 48
C) 54
D) 56 


4)Find odd man out :DFEG,  JKLM,   GHIK,   RTSU
A) DFEG
B)JKLM
C)GHIK
D)RTSU


5) find odd man out 1,3,10,21,64,129,256,778
1) 10
2) 21
3) 129
4) 256


6)The missing number in the series is:
0 , 6 , 24 , 60 , 120 , ? , 336 is
A) 240
B) 220
C) 280
D)210


7)Let a means minus (-) ,b means multiplied by (*), C means divided by (/) and D means plus(+).The value of 90 D 9 a 29 C 10 b 2
A) 8
B) 10
C) 12
D) 14


8)If MOHAN is represented by the code KMFYL, then COUNT will be represented by
A) AMSLR
B) MSLR
C) MASRL
D)SAMLR


9)  32     33      37    46     62    ?
Replace ? by
A)85
B) 87
C) 94
D) 99


10)AZ       DW        GT       JQ     ? .Replace ? from following
A) LD
B) MN
C) MO
D) NM


11) In certain code language ,PUNE is written as SXQH.How would you write DELHI in this language?
A )  FGNJL
B )  FGNJK
C )  GHOKM
D )  GHOKL


12)Find odd man out:
A)  6
B ) 18
C )  24
D )  36


13)Find the wrong term in the following series:
68    66     62    59     56    53
A)  59
B)  62
C)  66
D)  68


14)If P is the brotherb of Q;Q is the son of R; Sis R's father .What is P of S?
A)  Son
B)  Brother
C)  Grandson
D)  Grandfather

15) The missing number in the series 40 , 120 , 60 , 180 , 90 , ? , 135
A)  110
B)  270
C)  105
D)  210


16) The length and breadth of  a rectangle are changed by +20% and by -10% respectively.What is the percentage change in the area of rectangle?
A)  10%
B)  12.5%
C)  8%
D)  15%


17) Two pipes A and B can fill a tyank in 15 minutes and 20  minutes respectively .Both the pipes are opened together but after 4 minutes,pipe A is turned off. What is the total time required to fill the tank?
A) 10 min.40 sec
B) 11 min.45 sec
C) 12 min.30 sec
D)  14 min.40sec


18)The odd number from 1 to 45 which are exactly divisible by 3 are arranged in an ascending order .The number at 6th position is
A)  18
B)  24
C)  33
D)  36


19) If the radius of a circle is increased by 50%, the perimeter of the circle will increase by

A) 30
B)  85/2
C)  170/3
D)  110

20) In code language, the word BAD is written as 658 .In the same language, what could be the code for FIG?
A)  9         12       10
B) 10        13        11
C) 8          11       13
D) 10        12       13

Wednesday, December 18, 2013

More C++ programs




//Program to display Floyd triangle:-


#include<iostream.h>
main()
{
    int line,i,num=1,incr;
    cout<<" How many lines = ";
    cin>>line;
    cout<<"\n \n Floyds Triangle \n \n";
    for(i=1;i<=line;i++)
    {
        for(incr=1;incr<=i;incr++)
        {
            cout<<num;
            cout<<"\t";
            num++;
        }
        cout<<"\n";
    }
}


Output:-


How many lines = 7

Floyds triangle


1
2           3
4           5           6
7           8           9           10
11         12         13         1 4          15
16         17         18         19            20          21
22          23         24         25           26          27          28



//Program to check whether number is prime or not:-


#include<iostream.h>
main()
{
    int num,temp=0,i;
    cout<<"\n Enter the number =";
    cin>>num;
    if(num>0)
    {
        for(i=2;i<=num-1;i++)
        {
            if(num%i==0)
            {
                cout<<"\n Number is not a Prime number \n \n";
                temp=1;
                break;
            }
        }
        if(temp==0)
        {
            cout<<"\n Number is Prime \n \n";
        }
    }
    else
        cout<<"Enter only Positive numbers";
}


Output:-


Enter the number = 7
Number is Prime

//Program of destructors in c++:-

#include<iostream.h>
class ABC
{
int *width,*height;
public:
    ABC(int,int);
    ~ABC();
        int area()
    {
            return(*width**height);
    }
};
ABC::ABC(int a,int b)
{
width=new int;
height= new int;
*width=a;
*height=b;
}
ABC::~ABC()
{
    delete width;
    delete height;
   
}
main()
{
    ABC obj1(4,9),obj2(7,5);
    cout<<obj1.area();
    cout<<"\n";
    cout<<obj2.area();
}


Output :-

36
35

//Program of static member variable and member function:


#include<iostream.h>
class ABC
{
private :static int data;
public: static void getdata()
        {
            ++data;
            cout<<"count is =";
            cout<<data<<"\n";
        }
     void putdata()
        {
            ++data;
            cout<<"now count is ="<<data<<"\n";
        }
 void newfunction()
{
++data;
cout<<"now count is ="<<data;
}
};
int ABC::data=5;
void main()
{
    ABC obj;
    ABC::getdata();
    obj.putdata();
    obj.newfunction();
}

Output:-

count is =6
now count is =7
now count is =8


Sunday, November 10, 2013

Database- SQL


Your browser does not support the HTML5 canvas tag.

Database- SQL


  • SQL stands for Structured Query Language. 

  • SQL is an ANSI  (i.e. American National Standards Institute  ) standard computer language for accessing and manipulating database systems.
  • SQl statements are used to retrieve and update data in a database.
  • SQL works with database programs like MS Access ,DB2,Informix ,MS SQL Server, Oracle ,Sybase,etc.
  • The first version ,initially called SEQUEL,was designed to manipulate and retrieve data 
  • SQL is a Non - procedural query language.
  • Sometimes referred to as a Database Gateway Language as an ANSI made it a standard language for all DBMS.

SQL commands are divided into following categories:-
1)Data Definition Language-
                   It uses create,alter,drop,truncate
2)Data Manipulation Language -
                   It uses insert ,update,delete
3)Data Query Language -
                   It uses select
4)Data Control Language
                   It uses grant ,revoke
5)Transaction control Language
                   It uses commit,rollback
Syntax:
Create-  CREATE TABLE tablename(columnname1 data_type (size)[constraints],(columname2 data_type (size)[constraints],....)

Alter- ALTER TABLE tableman ADD(<columnname> data_declaration[constraints],<columnname> data_declaration[constraints],.....);

 To delete  Drop - DROP TABLE <tablename>[CASCADE CONSTRAINTS];

Truncate Table<tablename>;
removes all rows from a table and is high speed data deletion statement.


Click here for solve the quiz on sql




Sunday, October 27, 2013

Cryptography and Security

Cryptography and Security


Your browser does not support the HTML5 canvas tag.

Cryptography is the art and science of achieving security by encoding messages to make them non-readable.


Cryptanalysis is the technique of decoding messages from a non-readable format back to readable format without knowing how they were initially converted from readable format to non-readable format.

Cryptology is a combination of cryptography and cryptanalysis.


Principles of Security:-

1)Confidentiality
2)Integrity
3)Authentication
4)Access control
5)Availability
6)Non-repudiation
7)Ethical and legal issues


Types of attacks:-

1)General attacks-

Criminal attacks,publicity attacks,legal attacks

2)Technical view-
a)Theoretical concepts-
I)Passive attacks-
i)release of message contents
 ii)traffic analysis
 
II)Active attacks-
i)Interception,
ii)Fabrication,
iii)Modification,
iv)Interruption


3)Program attack-

a)Virus- A virus is a computer program that attaches itself to another legitimate program and causes damage to the computer system or to the network.

During lifetime ,a virus goes through four phases:-
Dormant phase,Propagation phase,Triggering phase ,Execution phase.

b)Worm

A worm does not perform any destructive actions and instead ,only consumes system resources to bring it down.


c)Trojan Horse

It allows an attacker to obtain some confidential information about a computer or a network.


d)Specific attacks-

Sniffing and spoofing-cause packet level attacks.


Phishing-It is new attack which attempts to fool legitimate users to provide their confidential information to fake sites


Pharming  /DNS spoofing -attack involves changing the DNS entries so that users are redirected to an invalid site,while they thinking that they have connected to the right site.

Monday, August 26, 2013

Logic Gates

The logic gates have one or many input and only one output.The gates used to form integrated circuits (IC's) for digital circuit with combination and sequential of gates.this gates are of mainly 6 types .The three are basic gates and others are the prepared from basic gates called as derived gates.They are as follow:-
I ) Basic gates :-
                               i ) OR gate
                               ii) AND gate
                               iii)NOT gate
II) Derived gates :-
                              i ) NOR gate
                              ii) NAND gate
                              iii)EX-OR gate
The Logic gates have the following details:
1)Logic:-It is the statement.
2)Truth table:-It shows the input provided and output get.It is combination of input provided  making rows in the table with inputs and output column.
3)Boolean equation :-It is the mathematical representation with the equation.
4)Symbol:-It is the logical symbol of the logic gate.

1) OR gate

    Logic :- If A is true or B is true  then Y is true

    Boolean Equation :- Y=A+B

   Truth table:

A B Y
0 0 0
0 1 1
1 0 1
1 1 1

Symbol:-

2) AND gate

    Logic :- If A is true and B is true  then Y is true

    Boolean Equation :- Y=A.B or Y=AB

   Truth table:

A B Y
0 0 0
0 1 0
1 0 0
1 1 1

Symbol:-
 
3) NOT gate

    Logic :- If A is true then Y is false and A is false  then Y is true

    Boolean Equation :- Y=A.B or Y=AB

   Truth table:

A Y
0 1
1 0

Symbol :-
4) NAND gate
   Truth table:

A B Y
0 0 1
0 1 1
1 0 1
1 1 0


Boolean Equation :- Y=A.B 
 
Symbol:-
5) NOR gate
Boolean Equation :- Y=A+B
Truth table:

A B Y
0 0 1
0 1 0
1 0 0
1 1 0

Symbol :-

6)EX-OR gate:
Y=A.B+A.B
Logic :When A is true or Bis true but not both then Y is true.
Truth table:

A B Y
0 0 0
0 1 1
1 0 1
1 1 0

Symbol :-


De Morgan's  Law :-
First law :-
Statement:-The compliment of sum is equal to product of compliments.
OR
                   The NOR gate is equivalent to bubbled NAND gate.
 Boolean Equation :-  A+B  = A.B
Second Law :-
Statement:-The compliment of product is equal to sum of compliments.
OR
                   The NAND gate is equivalent to bubbled OR gate.
 Boolean Equation :-  A.B  = A+



 Half Adder:-
For addition of two bits half adder is used .
Truth table:

A B CarrySUM
0 0 00
0 1 01
1 0 01
1 1 1 0

 From the above table we can conclude that gates used in half adder are AND gate for carry and EX-OR gate for Sum.



Featured posts

Happy Independence Day August 15th

 Here's a message for India's Independence Day (August 15th): "शुभ स्वतंत्रता दिवस! आजादी की 79वीं वर्षगांठ पर, आइए हम अपने देश...

Popular posts