Pages

Sunday, 20 October 2013

4-1 PREVIOUS ONLINE BITS ECE AND CSE

What are the Differences between Boys and Girls Attitude?


For over 50 years, researchers have been studying how boys and girls interact. Not surprisingly, they have found some differences. 

For the most part, boys and girls are more similar than they are different. 
A lot of girls enjoy playing computer games, and a lot of boys enjoy more friendship-centered activities. 
Researchers have found, however, that as a general group, boys spend more time with boys in physical activities such as sports and games; whereas girls tend to spend more of their time socializing with other girls in more friendship-based activities (for example, talking with other girls) (1, 2, 3). So it is not surprising that boys and girls tend to bully and be bullied differently. One of the most consistent research findings is that boys are more likely to both bully and be bullied than are girls (3, 4, 5, 6, 7, 8, 9). Also, boys and girls experience different types of bullying behaviors.

Bullying is defined as a form of aggression that is repetitively exerted against an individual who feels unable to defend him/herself (10). This aggression may occur directly against someone in a physical (for example, slapping, pushing) or verbal (for example, swearing, name calling) manner. Bullying can also be indirect whereby the targeted person experiences the aggression through others (for example, gossiped about, excluded from a social activity).

How are Girls Involved in Bullying?
Through Peer Group

Girls tend to bully other girls indirectly through the peer group. Rather than bully a targeted child directly, girls more often share with other girls (and boys) hurtful information about the targeted child (4). For example, a girl may tell a group of girls an embarrassing story about another girl. They may create mean names, gossip, and come up with ways of letting the girl know that she is rejected from the peer group (for example, saying mean things about her on social networking sites such as Facebook or MySpace, using her email address to send harassing messages to everyone on her email list, texting her a death threat). These are called “relational” bullying because they attack relationships and friendships.

How are Boys Involved in Bullying?

In contrast to girls, boys of any age and ethnic group tend to be physically aggressive (e.g., hit, kick, slap, push, or punch) (1, 2, 9, 11, 14, 20). Also, research shows that physical abuse tends to occur more often among boys than girls at all educational levels (e.g., elementary, high school, college) (13, 15, 16). In addition, male college students tend to bully and be bullied through physical and verbal forms of bullying (e.g., name-calling) more often than college girls (15).


Also boys may be more accepting of bullying, than are girls (17). That is, boys may like a girl even if she bullies others and like other boys who bully. Girls may still befriend boys who bully, but tend to dislike girls who bully. At the core of these differences are children’s and, indeed, societal beliefs about acceptable behaviors for boys and girls. Many people may see bullying among boys as “just boys being boys”. So, girls may accept this attitude and tolerate boys’ bullying. However, girls may be less accepting of girls who bully if it is seen as overly aggressive.

Friday, 18 October 2013

CRYPTOGRAPHY AND NETWORK SECURITY





1) What is an attack? Types of attacks,security services and mechanisms?
What are the non-cryptographic protocol vulnerabilities?
DOS, DDOS and Session Hijacking?

2)What is secret key cryptography?
Explain DES ?
Explain IDEA with neat diagram?
Explain AES ?

3)Explain Chinese Remainder theorem and fermatis theorem?

4)principles of public key cryptography?
Explain about RSA algorithm and  Diffie-Hellman Key Exchange?

Monday, 16 September 2013

Procedure for writing Microsoft Exam

Procedure for writing Microsoft Exam

1)Create Hotmail Account.Click here to go

2)NEXT GO TO THIS LINK.AND SIGN IN(SEE BELOW SNAPSHOT)

3NEXT IT WILL ASK YOUR PERSONAL INFORMATION.
COMPANY NAME:GVIT
NO OF PERSONS:(500-900)

MICROSOFT ANSWERS


4))NEXT YOU WILL SEE THE BELOW SNAPSHOTS.
(IF THERE IS ANY DOUBTH ,LEAVE ME COMMENT HERE)



























MICROSOFT ANSWERS


1st Assessment
1)You need to identify on which edition or editions of Windows 8 you can use AppLockerto control access to Windows Store apps.What should you identify? (Choose all that apply.)
ANS:windows 8 enterprise

2)You download, install, and activate Windows 8 Enterprise evaluation.For how many days can you evaluate Windows 8 Enterprise evaluation?
ANS:90

3)You plan to install Windows 8 Pro on a client computer.You need to ensure that the computer can run virtual machines by using Client Hyper-V.What is required?
ANS:slat

4)You are evaluating the different editions of Windows 8.You need to identify which features are only available in Windows 8 Enterprise. Which features should you identify? (Choose all that apply.)
ANS: ALL 3 except hyper-v client

5)You have an Active Directory domain. The domain contains a client computer that runs Windows 8.You need to manage Active Directory user accounts from the computer. What should you do on the computer?
ANS: perform reinstallation and reinstall data

6)You install and activate Windows 8 Enterprise evaluation.You need to continue using Windows 8 after the evaluation period expires. You want to achieve this goal by using the minimum amount of administrative effort.What should you do?
ANS: enable remote assistance




2nd Assessment
----------------------------------------------------------------------------------------------------------------------------------------
1)You need to identify which hardware configuration supports Windows to Go.Which hardware configuration should you identify? (Choose all that apply.)
ANS: all the options except arm

2)You need to recommend a solution to encrypt the entire contents of a Windows togo drive. What should you include in the recommendation?
ANS: BitLocker Drive Encryption (BitLocker) with a password

3)You need to control which Windows Store apps can be installed from the Windows Store.Which Group Policy setting should you configure?
ANS: application control policies

4)You have a client computer that runs Windows 8.You have a removable hard disk drive named Drive1.You need to recommend a solution to encrypt the entire contents of Drive1. The solution must
ensure that Drive1 can be used on other client computers.What should you include in the recommendation?
ANS: BitLocker To Go

5)Your company plans to develop a line-of-business Windows Store app.You need to identify on which edition or editions of Windows 8 you can sideload the app.What should you identify? (Choose all that apply.)(Choose 3 answers)
ANS: CLICK ANY THREE

6)You have a client computer that runs Windows 8.The computer does not have a Trusted Platform Module (TPM).you need to recommend a solution to encrypt the hard disk drive that contains the computer’soperating system. The solution must minimize costs.What should you include in the recommendation?
ANS: BitLocker Drive Encryption (BitLocker)
7)You plan to sideload several Windows Store apps.You need to activate a sideloading product key.Which command should you run?
ANS: slmgr.vbs


3rd Assessment
--------------------------------------------------------------------------------------------------------------------------------------
1)You have a client computer that runs Windows 8 Pro.You need to ensure that Internet Explorer 10 supports browsing websites that require ActiveX controls.What should you do?
ANS:From the Opening Internet Explorer setting, select Always in Internet Explorer on the desktop.

2)You have a client computer that runs Windows 8.The desktop contains shortcuts that point to the URLs of websites.You need to ensure that the shortcuts only open in the Internet Explorer 10 Windows Store app.Which Opening Internet Explorer setting should you select?        
ANS:Open Internet Explorer tiles on the desktop


3)You need to ensure that Internet Explorer 10 always opens links in Internet Explorer for the desktop. Which Internet Options settings should you modify?
ANS:program settings

4)You have a domain member computer that runs Windows 8 Enterprise.You plan to configure Internet Explorer on the computer.You need to restrict Internet Explorer from providing access to the corporate intranet.Which feature should you use?
ANS:enhanced protected mode


5)You have a client computer that runs Windows 8.You need to locate the administrative template (.admx) files that you can use to configure the, Group Policy settings for Internet Explorer 10.Where should you search on the computer?
ANS:%WinDir%\policydef

6)On which editions IE10works on
Windows 8, Windows Server 2012, Windows 7, Windows Server 2008 R2

Friday, 2 August 2013

CNS QUESTIONS

                                           
                                         
                                     
                                                           DOWNLOAD

OSS UNIT-1

                                   
                                                          UNIT-1

Linux Commands

                                         
                                                                   DOWNLOAD

MySql Material

                                             
                                                          DOWNLOAD

Php Material

                                            
                                                               DOWNLOAD

Thursday, 1 August 2013

Optical Communications materials (8 units)

                            
                                                   DOWNLOAD UNITS
                                                   EBOOK DOWNLOAD

Saturday, 20 July 2013

List of Project Ideas and Topics (B.Tech. CS/IT)

                                          BE/Btech, ME/Mtech, BCA/MCA, MS FInal Year Projects
List of Project Ideas and Topics (B.Tech. CS/IT)
  1. A Car Rental System
  2. Accounts Management Software
  3. Airline Reservation System
  4. Anti-Lock Braking System (Abs)
  5. Application Remote Control (Arc) Using Bluetooth
  6. Army Management System
  7. ATM System
  8. Auto Repair Shop Management System
  9. Automotive Store Management System
  10. Banking System
  11. Bus Ticket Reservation
  12. Cafeteria Ordering System
  13. Car Insurance System
  14. Car Safety System
  15. Clothing Store Management
  16. College Management System
  17. Ebook Shopping
  18. Elevator Control System
  19. Enterprise Resource Planning System
  20. Event Organizing, Planning and Management System
  21. Football Updates Information System
  22. Gym Workout Application
  23. Home Science Management System
  24. Hospital Management System
  25. Hostel Accommodation System
  26. Hotel Management System
  27. Household Budget Management System
  28. Human Resource Management
  29. Library Management System
  30. Medical Store System
  31. Mess Management System
  32. Online Admission System
  33. Online Auction System
  34. Online Course Registration System
  35. Online Education System
  36. Online Examination System
  37. Online Food Ordering
  38. Online Movie Ticket Booking System
  39. Online Recruitment System
  40. Online Recruitment System
  41. Online Shopping Inventory System
  42. Online Travel Portal
  43. Online Voting System
  44. Police Management System
  45. Power Consumption Management System
  46. Prison Management System
  47. Railway Reservation System
  48. RTO Management System
  49. School Management System
  50. Social Networking Portal
  51. Space Station Control System
  52. Sports Bulletin Management
  53. Sports Shop Management
  54. Student Attendance Management System
  55. Super Market Management System
  56. Time Monitoring Tool
  57. Toll Gate Check System
  58. Traffic Management System
  59. Vehicle Tracking System
  60. Web Publishing System


Thursday, 18 July 2013

Android Beginners

                                     
                                                      DOWNLOAD

Thursday, 11 July 2013

WALK IN INTERVIEW (QUESTIONS)

                          
                        CLICK HERE TO DOWNLOAD

Unified Modeling Language

                                                
                                                                  DOWNLOAD

If you have any textbook,leave a comment here..... 

Wednesday, 10 July 2013

Perl Complete Reference


                                                                    DOWNLOAD

Software Project Management

                                     
                                                       DOWNLOAD

Monday, 8 July 2013

CNS UNIT-1 MATERIAL

                                 
                                                 UNIT-1-DOWNLOAD



Blogger templates