Pages

Sunday, 20 October 2013

4-1 PREVIOUS ONLINE BITS ECE AND CSE

What are the Differences between Boys and Girls Attitude?


For over 50 years, researchers have been studying how boys and girls interact. Not surprisingly, they have found some differences. 

For the most part, boys and girls are more similar than they are different. 
A lot of girls enjoy playing computer games, and a lot of boys enjoy more friendship-centered activities. 
Researchers have found, however, that as a general group, boys spend more time with boys in physical activities such as sports and games; whereas girls tend to spend more of their time socializing with other girls in more friendship-based activities (for example, talking with other girls) (1, 2, 3). So it is not surprising that boys and girls tend to bully and be bullied differently. One of the most consistent research findings is that boys are more likely to both bully and be bullied than are girls (3, 4, 5, 6, 7, 8, 9). Also, boys and girls experience different types of bullying behaviors.

Bullying is defined as a form of aggression that is repetitively exerted against an individual who feels unable to defend him/herself (10). This aggression may occur directly against someone in a physical (for example, slapping, pushing) or verbal (for example, swearing, name calling) manner. Bullying can also be indirect whereby the targeted person experiences the aggression through others (for example, gossiped about, excluded from a social activity).

How are Girls Involved in Bullying?
Through Peer Group

Girls tend to bully other girls indirectly through the peer group. Rather than bully a targeted child directly, girls more often share with other girls (and boys) hurtful information about the targeted child (4). For example, a girl may tell a group of girls an embarrassing story about another girl. They may create mean names, gossip, and come up with ways of letting the girl know that she is rejected from the peer group (for example, saying mean things about her on social networking sites such as Facebook or MySpace, using her email address to send harassing messages to everyone on her email list, texting her a death threat). These are called “relational” bullying because they attack relationships and friendships.

How are Boys Involved in Bullying?

In contrast to girls, boys of any age and ethnic group tend to be physically aggressive (e.g., hit, kick, slap, push, or punch) (1, 2, 9, 11, 14, 20). Also, research shows that physical abuse tends to occur more often among boys than girls at all educational levels (e.g., elementary, high school, college) (13, 15, 16). In addition, male college students tend to bully and be bullied through physical and verbal forms of bullying (e.g., name-calling) more often than college girls (15).


Also boys may be more accepting of bullying, than are girls (17). That is, boys may like a girl even if she bullies others and like other boys who bully. Girls may still befriend boys who bully, but tend to dislike girls who bully. At the core of these differences are children’s and, indeed, societal beliefs about acceptable behaviors for boys and girls. Many people may see bullying among boys as “just boys being boys”. So, girls may accept this attitude and tolerate boys’ bullying. However, girls may be less accepting of girls who bully if it is seen as overly aggressive.

Friday, 18 October 2013

CRYPTOGRAPHY AND NETWORK SECURITY





1) What is an attack? Types of attacks,security services and mechanisms?
What are the non-cryptographic protocol vulnerabilities?
DOS, DDOS and Session Hijacking?

2)What is secret key cryptography?
Explain DES ?
Explain IDEA with neat diagram?
Explain AES ?

3)Explain Chinese Remainder theorem and fermatis theorem?

4)principles of public key cryptography?
Explain about RSA algorithm and  Diffie-Hellman Key Exchange?

Monday, 16 September 2013

Procedure for writing Microsoft Exam

Procedure for writing Microsoft Exam

1)Create Hotmail Account.Click here to go

2)NEXT GO TO THIS LINK.AND SIGN IN(SEE BELOW SNAPSHOT)

3NEXT IT WILL ASK YOUR PERSONAL INFORMATION.
COMPANY NAME:GVIT
NO OF PERSONS:(500-900)

MICROSOFT ANSWERS


4))NEXT YOU WILL SEE THE BELOW SNAPSHOTS.
(IF THERE IS ANY DOUBTH ,LEAVE ME COMMENT HERE)



























MICROSOFT ANSWERS


1st Assessment
1)You need to identify on which edition or editions of Windows 8 you can use AppLockerto control access to Windows Store apps.What should you identify? (Choose all that apply.)
ANS:windows 8 enterprise

2)You download, install, and activate Windows 8 Enterprise evaluation.For how many days can you evaluate Windows 8 Enterprise evaluation?
ANS:90

3)You plan to install Windows 8 Pro on a client computer.You need to ensure that the computer can run virtual machines by using Client Hyper-V.What is required?
ANS:slat

4)You are evaluating the different editions of Windows 8.You need to identify which features are only available in Windows 8 Enterprise. Which features should you identify? (Choose all that apply.)
ANS: ALL 3 except hyper-v client

5)You have an Active Directory domain. The domain contains a client computer that runs Windows 8.You need to manage Active Directory user accounts from the computer. What should you do on the computer?
ANS: perform reinstallation and reinstall data

6)You install and activate Windows 8 Enterprise evaluation.You need to continue using Windows 8 after the evaluation period expires. You want to achieve this goal by using the minimum amount of administrative effort.What should you do?
ANS: enable remote assistance




2nd Assessment
----------------------------------------------------------------------------------------------------------------------------------------
1)You need to identify which hardware configuration supports Windows to Go.Which hardware configuration should you identify? (Choose all that apply.)
ANS: all the options except arm

2)You need to recommend a solution to encrypt the entire contents of a Windows togo drive. What should you include in the recommendation?
ANS: BitLocker Drive Encryption (BitLocker) with a password

3)You need to control which Windows Store apps can be installed from the Windows Store.Which Group Policy setting should you configure?
ANS: application control policies

4)You have a client computer that runs Windows 8.You have a removable hard disk drive named Drive1.You need to recommend a solution to encrypt the entire contents of Drive1. The solution must
ensure that Drive1 can be used on other client computers.What should you include in the recommendation?
ANS: BitLocker To Go

5)Your company plans to develop a line-of-business Windows Store app.You need to identify on which edition or editions of Windows 8 you can sideload the app.What should you identify? (Choose all that apply.)(Choose 3 answers)
ANS: CLICK ANY THREE

6)You have a client computer that runs Windows 8.The computer does not have a Trusted Platform Module (TPM).you need to recommend a solution to encrypt the hard disk drive that contains the computer’soperating system. The solution must minimize costs.What should you include in the recommendation?
ANS: BitLocker Drive Encryption (BitLocker)
7)You plan to sideload several Windows Store apps.You need to activate a sideloading product key.Which command should you run?
ANS: slmgr.vbs


3rd Assessment
--------------------------------------------------------------------------------------------------------------------------------------
1)You have a client computer that runs Windows 8 Pro.You need to ensure that Internet Explorer 10 supports browsing websites that require ActiveX controls.What should you do?
ANS:From the Opening Internet Explorer setting, select Always in Internet Explorer on the desktop.

2)You have a client computer that runs Windows 8.The desktop contains shortcuts that point to the URLs of websites.You need to ensure that the shortcuts only open in the Internet Explorer 10 Windows Store app.Which Opening Internet Explorer setting should you select?        
ANS:Open Internet Explorer tiles on the desktop


3)You need to ensure that Internet Explorer 10 always opens links in Internet Explorer for the desktop. Which Internet Options settings should you modify?
ANS:program settings

4)You have a domain member computer that runs Windows 8 Enterprise.You plan to configure Internet Explorer on the computer.You need to restrict Internet Explorer from providing access to the corporate intranet.Which feature should you use?
ANS:enhanced protected mode


5)You have a client computer that runs Windows 8.You need to locate the administrative template (.admx) files that you can use to configure the, Group Policy settings for Internet Explorer 10.Where should you search on the computer?
ANS:%WinDir%\policydef

6)On which editions IE10works on
Windows 8, Windows Server 2012, Windows 7, Windows Server 2008 R2

Blogger templates