Вы находитесь на странице: 1из 40

INFOQUEST 2007

ORing the Occult

Dr.V.Palanisamy Ph.D.,
Principal, GCT, Coimbatore.
I am glad to learn that the Departments of Computer Science & Engineering
and Information Technology is organising the technical symposium InfoQuest
2007. On the eve of this occasion, they are releasing a souvenir which consist
of the innovative technical ideas and concept from the young minds.
The abstract of the technical articles released in the souvenir is highly
appreciated and show the skill of the students.
My best wishes for the grand success of the function.

It is another milestone in CSIT Association. A sparkling wonder InfoQuest 07. I hope that it will be a
driving force in augmenting the technical knowledge and software skills of students. There are events
such as Technical paper presentation, software presentation, Quiz
Marketing etc., to exhibit the talents of students. My best wishes for the success of IQ07, CSITAs
annual technical symposium. I extend my whole hearted support and wishes for the students(wizard) of
Prof.M.L.Valarmathi

CSITA all a success in their endeavors.

For the past over a decade, infoquest has been conducted with glory by the CSE/IT students. In this National
Level Technical Symposium, students exbhit their boundless creativity, ability and technical skills. It shows
the multiple talents of the students. There is no doubt that this function will portray the magnanimity if the
CSE/IT department. I convey my heartfelt wishes for the successful completion of this function.
Asst Prof.R.Shanmugalakshmi

You achieve. I pray the almighty to strengthen the students of CSITA to achieve the best and lead the
InfoQuest has always been an event that signifies the importance of the phrase United we stand. This
edition of IQ is sure to enthrall everyone. All the best for IQ and Online 2007.

Dr.T.Purusothaman
I am overwhelmed with gladness that the CSITA is conducting InfoQuest which has always been
ne of the premier functions of our college. It has been a trend setter and a technical tornado. I
pray the almighty to make this extravaganza a grand success.
Thiru.K.Baskaran

More the effort,Better the result I wish the students


of CSITA that their untiring and tremendous efforts
may bring forth fruitful output.

-RATHI

Path to success has hurdles and trouble. I encourage


the CSITANS to leap over the hurdles and break the
blocking stones to succeed in life. -MIRACLIN.

Online Press release

CSITA Publications

index
magzine
MICROSOFT SYSTEM CENTER 2007
Managers Manager...

................3

HORIZON OF MEMORY
All in space of one. . . . . . . . . . . . . . . . . . . . . . . . . . 13

STORAGE VENDORS
Its a power efficiency startegies . . . . . . . . . . . . . 14

NEXT BIT PROGRAMMING LANGUAGE


This wont be a programming Language . . . . . . 4

VISTA
Os or Spy
Searching for the answer to the quest . . . . . . . . . . 5

ONLINE

FAREWELL TO BLINDNESS
Boon given by doctors
The lost vision can be restored . . . . . . . . . . . . . . . . 6

THY HEAL THEMSELF


We are also like Humans
Robots repair their own parts . . . . . . . . . . . . . . . . . . 6

MOBILE VIRUS
Never leave anything . . . . . . . . . . . . . . . . . . . . . . . . 6

RECYCLE YOUR RECYCLEBIN


Manipulate the unmanipulated
Deletion of the recyclebin . . . . . . . . . . . . . . . . . . . . 7

BLACK HOLE
Outside world, Outer space
What happenes when star dies . . . . . . . . . . . . . . . . 15

LOADING NEW INFORMATIONS


Keep Updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

HOLOGRAPHIC STORAGE
Winner of the future . . . . . . . . . . . . . . . . . . . . . . . . . 20

MURPHYS LAWS
Laws for Information Technology . . . . . . . . . . . . 8

BLUE RAY DISC

THE ENEMY VISTA

The next level of DVD . . . . . . . . . . . . . . . . . . . . . . . 21

Nothing is perfect
Flawes in Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

INTERNET EXPLORER VS FIREFOX


Someone will catch the fruit . . . . . . . . . . . . . . . . . . 22

LOSE UR GAL FRIEND


History of Ur Favorite website
Try the moral of the story . . . . . . . . . . . . . . . . . . . . 10

INFOQUEST 007

RIFD

HOW

TO

TRACK

THE

LOST MOBILE ?

try ... try ... till you get it


Follow what we have suggested . . . . . . . . . . . . . . . . 24

Something has to be known . . . . . . . . . . . . . . . . . 10

STUDENTS LAPTOP

UPDATE UR KNOWLEDGE

good configuration....
The best configuration for students. . . . . . . . . . . . . 24

Knowledge is wealth. . . . . . . . . . . . . . . . . . . . . . . . 11

THE DAWN OF NEW ERA


Tera in Computing . . . . . . . . . . . . . . . . . . . . . . . . . . 25

FUTURE OF CELL PHONES


cant even imagine...
Most fo the things in one . . . . . . . . . . . . . . . . . . . . . 26

FULL DISCLOSURE OF FUTURE


Imagine what U cant imagine . . . . . . . . . . . . . . . . . 26

PLAY WITH KNOWLEDGE


Entertainment Crossword . . . . . . . . . . . . . . . . . . . . . 27

LEGENDARY ARTS
They live beyond the death . . . . . . . . . . . . . . . . . . . . 28

ANALYSING THE ANNALS


HUMAN BRAIN IS DIGITAL COMPUTER

Something intersting . . . . . . . . . . . . . . . . . . . . . . . . 31

But we are very slow


Functions of brain and digital computer. . . . . . . . 12

ON THE CD
FREEWARES
- Vista Utilities
-Windows Power Toys
-Microsoft Dreamweaver
-Anitvirus
-Swish Max
-Microsoft Fireworks
-Serials2005
-PC Security

Games
-Claw Full Version
-Mini Cllips
-Quake III Arena
-DX Ball & so on

E - Books
-C Language
-C++
-Java & so on

Pictures
Some rare Collection
of pictures and some
beautiful &Digital images

On lin e
Microsoft System Center
Microsoft System Center plays a central role in
the Microsoft vision to help IT organizations benefit
from self-managing, dynamic systems. System Center
solutions capture and aggregate knowledge about your
infrastructure, policies, processes, and best practices
so your IT staff can build manageable systems and
automate operations in order to reduce costs, improve
application availability, and enhance service delivery.
System Center solutions are tuned to simplify
management of the systems and applications your
company already has implemented, including
Microsoft SQL Server, Microsoft Exchange Server,
the Microsoft Office system, and the Microsoft .NET
Framework. In addition, System Center solutions
interoperate with third-party management tools so
you can make the most of your existing investments
and build on the System Center foundation with
confidence. Already used by the majority of Fortune
500 companies, System Center solutions provide the
reliability, scalability, and security required to manage
the most mission-critical IT systems, applications,
and services.
With an aim to enable self-managing dynamic
systems, System Center solutions close the gap between
development, operations, and IT by evalua ting
dependencies and optimizing business process
performance from deep inside the operating system,
applications, and composite services and workflows.
These solutions also provide comprehensive management
of physical and virtual environments, resulting in
improved efficiencies and better control.
Independent research shows that a well-managed
IT environment improves an enterprises bottom line
and productivity. Using the System Center family
of solutions, you can connect your organizations
people, processes, and tools across your development
and operating environments. As a result, you can
optimize your IT infrastructure.

System Center: Benefits Realized:


With the System
Center family of IT
management
solutions, you have
the power to more
effectively and
easily manage all of
the components that
define IT, allowing
you to focus more on
delivering
new
business value for
your organization.
Unified Experience
Essentials 2007 provides a unified solution to
help optimize the experience of performing a broad
set of tasks across your entire IT environment.
You also get a single console from which you can
view and manage your servers, clients, hardware,
software, and IT services.
Proactive Management
Essentials 2007 accelerates troubleshooting and
problem resolution. Its a self-managing solution
that notifies you as soon as a problem occurs,
then helps you proactively diagnose and fix it,
accelerating problem resolution. Essentials 2007
also automates system updates and data collection
for your IT environment, so its more secure and
up-to-date.
Increased Efficiency
Essentials 2007 simplifies complex management
tasks like packaging and deploying software,
adding Web site monitoring, and creating and
configuring Group Policy. Essentials 2007 wizards
also help you quickly and easily configure security
settings, deploy updates, and discover assets.
- from editors...

Technology is dominated by two types of people: those who understand what they
do not manage, and those who manage what they do not understand
- Archibald Putt

On line
The next bit programming language ... will
not be a programming language
The industry seems to be in one of its Gee, I
wonder whats next? Whats the next Big Thing?
phases at the moment in the field of software
development.
Why this should be happening now is an interesting
question in itself. Lets spend a minute on that one
before proceeding. It could simply be that the big guns
of Cobol/Java/C++/C#/PHP/ASP/Perl/Python and
so on have been around long enough for the industry
to appear to be on some sort of stable plateau. If there
is one thing that this restless industry is always bent
on destroying, it is those nasty stable plateaux. The
grass is always greener on the other side. Even if it
isnt greener, it might be profitable so lets go there...
(Apologies, cynicism crept in there for a moment!)
Another reason could be that market forces are
driving developers to build certain types of systems
that are proving too hard to build with existing tools.
Some would argue that the new crop of CPUs emerging with multiple processors per core is forcing a significant re-think. Others would argue that to get the
best out of Agile Programming practices, you need to
re-think your core tools.
Personally, I think its a little simpler than that.
Squint to the point where most of the extraneous detail is blurred and you will see that most new systems development is happening in one of three,
largely stable foci: The Java ecosystem, the .NET ecosystem and the LAMP ecosystem. All three are very
large, quite stable and readily compared one to the
other. At a high enough management level, there is
little reason to pick one over either of the other two.
They all do the same job (essentially), all have readily
available tools and developer communities. How to
choose?
That, I think, is what is driving the next big thing
noodlings. Competitive forces are at work to attempt
to differentiate these offerings at a level your average developer can appreciate. Whichever one of these
three stable stacks incubates the next big thing, will
probably win big. It may completely win, striding
ahead of the competition. Alternatively, it might just
remove one of the other two contenders, resulting in
bi-polar rather than tri-polar competitive environment
for application development stacks.
Regardless of the reason for the search for the
next big thing, it is certainly well under way. What
will it be? What is the next big programming language?
Will it be some sort of Java++ or maybe Ruby or
maybe Python? Maybe Perl will make a triumphant
return on the wings of a parrot? Hey, how about Erlang
or Fortress or Haskell?...
Interesting possibilities one and all. However, I
suspect that the next big thing might be one of those
quantum leaps that happen from time to time. A game
changing leap. What if the next big programming language was not so much a language as a language for
creating languages? Intellectually, this sounds appeal

ing as it has the potential to make all the existing languages just special cases of a grander
theory. Geeks like that sort of thing.
At a practical level however, outbreaks of
this sort of thinking can be seen in the programming community, typically under the
moniker of Domain Special Languages or
DSLs[10]. Programming languages are again
starting to sprout DSL capabilities. Ruby and
Fortress - of the two languages already mentioned - are examples.
I think the time is right for this sort of thinking to become mainstream. The industry is at
the point where the irrational exuberance surrounding using XML as a DSL for programming
languages has passed (thank goodness!).
Something needs to take its place which is significantly - not just incrementally better. I think
a DSL-enabling programming language will fit
the bill.
Another reason for thinking that the time
is right for such a move is the whole XML experience. When applied to its sweet spot documents - XML is essentially an excellent
DSL. A language for expressing document languages. Significantly more developers grok
this concept now than did before the XML revolution happened. These folks are ready to apply that same thinking to algorithms - programming languages. Even better, the blind alley of
using XML as a DSL for programming languages has thankfully been explored and is
being abandoned (thank goodness!).

- Manju & Surya final IT

On lin e
VISTA AN OS OR A SPY
Microsoft has just released
its Vista operating system. I
know you are dying to know
what problems the new O.S.
has right? Vista has four
versions: Vista Home, Vista
Home
Premium,
Vista
Business, and Vista Ultimate.
If you are now running XP
Professional
and
you
upgrade to Vista Home you
are actually being downgraded
several levels. You probably
need Vista Ultimate to get
back the same features as your
XP Professional had.
Keep in mind that this
software has been 5 years in
the making. The first problem
is that the lotus program has
compatibility problems. Lotus
notes is a program that
basically
helps
with
collaborator projects and
such. If you are not using Vista
for your business, this problem
really is not a problem for you.
Microsoft has tried to keep
Vista compatible with all the
existing
hardware
and
software out there, but its just
not possible to be 100%
compatible and still add new
features and capabilities to
Windows. Scanners are
something that are particularly
tricky
when
upgrading
Windows so if you use a
scanner, double-check that
there is Vista compatible
software available for it. The
following are the official
requirements for Vista
Premium Edition (the most
complete version):1GHz or
higher processor - 1GB RAM 40GB or larger hard drive Sound card - Internet
connection - DVD drive
Did you know that the NSA
(National Security Agency)
helped design the security for
Windows Vista? This is the
same organization that helped
the Bush Administration spy on
U.S. citizens. Asking the NSA
to help design Vista security is
similar to asking the fox to
help design the hen house.

Along with Vistas activation


code and the backdoor software added by the NSA, your
Vista could be telling the corporate aliens that run the government exactly what youre
thinking. Just imagine, youre
a government employee and
you surf to a site that criticizes
the current administration.
The next day you hear a knock
at your door. Its the FBI;
theyve come to take you in
for questioning. They were
monitoring your on-line habits thanks to Vista. No one
knows what code lurks in
Microsoft software, thats the
problem. We dont actually
know whether the NSA put
any hidden code there. Using
Vista the government can be
eavesdropping on the population for years to come. Even if
this doesnt happen, you can
bet that Vista software is designed to keep giving
Microsoft and its partners, and
not the consumer, a growing
advantage.

Government is looking for new


ways to control us through
closed Operating Systems like
Vista. We can only be spared
their watchful eye by
embracing open source
software like Linux. By being
able to examine Linux code,
experts throughout the world
can say with much more
certainty that there are no
surprises placed there by
enterprising governments or
corporations.

-Pradeep.M, II Year IT

123456789012345678901234567890121234567890123456789012345678901212345678
123456789012345678901234567890121234567890123456789012345678901212345678
123456789012345678901234567890121234567890123456789012345678901212345678
123456789012345678901234567890121234567890123456789012345678901212345678
The real problem is not whether machines think but whether men do.
123456789012345678901234567890121234567890123456789012345678901212345678
123456789012345678901234567890121234567890123456789012345678901212345678
123456789012345678901234567890121234567890123456789012345678901212345678
-B
B.. F
F.. Skinner
123456789012345678901234567890121234567890123456789012345678901212345678
123456789012345678901234567890121234567890123456789012345678901212345678
123456789012345678901234567890121234567890123456789012345678901212345678

GOLDEN WORDS
A person should not be conscious
Of his own responsibility,
But also be cautious about
Others irresponsibility.
If an administer is good with all ,
He is not a
Good administer at all.
Think not the cost of living ,
Think at what cost
You are living.
Selfless service to the needy
Is better than Selfish mediation
of the greedy.

- R. MALLIGA I YEAR IT

Hoax:
A hoax is a chain letter,
typically sent over e-mail,
which carries
false warnings about viruses
or trojans. This causes
wellmeaning
users to send the warning on
in the belief that they are
doing other users a favor.
Often
such
warnings
apparently stem
from well-known companies
and organizations, but this is
not the
case. Hoaxes may also contain
other messages that are
supposed
to trick people to send the
message on, for example they
will
offer money or a cell phone as
a reward for forwarding the
message to friends.
If you receive a warning about
a virus, do not pass the
warning
on to other users! This rule
applies even if the virus
actually does
exist, and applies doubly if the
warning asks to be sent on. It
Whips up anxiety and
increases the workload.
A hoax do not replicate by
itself. They trick the user into
making copies instead
- Sekar,II Year cse

On line
FAREWELL TO BLINDNESS
-Technology That Brings WondersThe newly developed Rye chip at Johns Hopkins University
could allow some version to the sightless
sightless..

Heal Thyself
I am also like you - robot..

Nothing can possibly go wrong ... go wrong ...


go wrong ...

I have never looked at the face of my


grandson, said Churchey for many years
the manager of a snack bar in the
Nagertown Courchoine,USA to the
Washington post; But I do believe, I will
before
I die .In the place of the damaged human workings
of Churcheys 72 year-old eyes, the researchers are
trying to produce an artificial vision system that can
electronically capture and transmit images to the brain
to create sight.
The system would consist of a computerized
miniature chip that would be surgically implanted in
the eye. The camera would transmit the image to the
computer chip, which would be connected to the tissue
in the back of the eye called retina, so that it could
transmit images to the brain.
The Hopkins researchers have been working on the
idea for a decade and they remain only a few years
away from their goal of permanently implanting a chip
in a blind person. So far they have tested only crude
version of the system. Nonetheless and despite of
some daunting obstacles that remain, they are
convinced that they will somehow bring vision to
people who have none.And if they succeed, millions of
people who are blind because of their damaged retina
will have an option never imagined possible.
-MARY.K.RAJ I Year IT

MOBILE VIRUSES
Are They A Real Threat???
The first verified virus
named CABIR appeared as a
proof of concept. Some
responsible citizens from
Czech Republic and Slovakia
named 29A wrote it and send
it to the United States and to
Russia(Kaspersky lab).This
virus targeted mobile phones
running with Symbian OS. It
was also named as Proof of
Concept for obvious reasons.
CABIR was developed for
mobile phones running with
Symbian and series 60
software and using Bluetooth.
It searches with Bluetooths
range(about 30 mts)for
mobile phones running in
discoverable mode and sends
itself disguised as a security
file to any vulnerable device.
This virus spreads as a .SIS file

InfoQuest 2007

Graduate student Viktor Zykov, former student


Josh Bongard, now a professor at the University of Vermont, and Hod Lipson, Cornell assistant professor of mechanical and aerospace
engineering, watch as a starfish-like robot pulls
itself forward, using a gait it developed for itself. the robots ability to figure out how it is
put together, and from that to learn to walk,
enables it to adapt and find a new gait when it
is damaged.
- K.Arun Kumar
final cse

12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
Technology is like fish. T
he longer it stays
The
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
on
the
shelf,
the
less
desirable
it becomes
becomes..
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
- Andrew Heller, IBM
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012
12345678901234567890123456789012123456789012

which is installed in the APPS


directory. There is no major
payload apart from the vastly
shortened battery life caused
by constant scanning for
Bluetooth devices. It displays
the message CARIBE if
launched.
Getting
infected
via
Bluetooth is quite interesting,
as it is akin to a human virus,
which requires proximity to
expand. But it also severely
limits how far a virus can go.
The new variants use phones
GPRS style data capabilities to
spread.
They
have
immediately access to address
book inside your phone-book.
Then
came
the
COMMWARRIOR. It was the
first Symbian virus capable of
spreading itself via MMS messages. It can send itself to any
mobile phone in the world.

This virus can scan the infected


phone books address and periodically sends MMS to any randomly selected contact. It adds a
copy of itself with one of the several predefined text messages
designed to encourage the recipient to install the application.

Hence, it provides quite expensive


to anyone unluckly to be infected
by it, as MMS messages are
costly!
- S.Vimalkumar II CSE

On lin e
Some people are paranoid abt
how clean their desktop look,
n would rather not hav icons
lyk My Computer, My
Documents etc,. on it.
Removing these is easy. Jus
right click the desktop, select
properties>
Desktop>
customize Desktop and then
uncheck all the items which
we dont want. But what abt
Recycle Bin??
Here is the solution to how
to delete it Go to Start menu then
run
regedit.
Navigate
to
HKEY_LOCAL_MACHINE/SOFTWARE/
MICROSOFT WINDOWS/CURRENT
VERSION/EXPLORER/DESKTOP/
N A M E S P A C E look for the key

{645FF040-5081-10113-9F0800AA002F954E} and delete it.


Have u ever tried to rename Recycle Bin...??
Lets rename it Go to regedit n navigate to
HKEY_CURRENT_USER\Software\Windows\ShellNoRoam\
MUICache and change the value of
@C:\WINDOWS\System32\Shell.dll,-8964 to
whatever u want it

S
M
S
L
I
N
G
O
S

- SENDHIL KUMAR. J II CSE

Sms

Text Msg

1ce
2l8
2nite
afaik
asap
2g4u
b
bbl
cid
dk
dylm
eod
4f?
4e
Btw
cm
cu
f2t
dly
b4n
aka
ATP
f2f
h8
hand
gr8

once
too late
tonight
as far as I know
as soon as possible
too good for you
be
be back later
consider it
dont know
do u like me
end of discussion
for friends?
forever
by the way
call me
see you
free to talk
I dont like you
bye for now
also know as
All the best
face to face
hate
have a nice day
great

- Balasubramani,2nd cse

RECYCLE THE RECYCLE BIN

New sup
ercomputer to be unveiled
supercomputer
VANCOUVER,
British
Columbia, Feb. 12 (UPI) A
Canadian firm is claiming to
have taken a quantum leap in
technology by producing a
computer that can perform
64,000 calculations at once.
D-Wave Systems, Inc.,
based near Vancouver, says it
will unveil its new quantum
supercomputer Tuesday, ABC
News reports.
Though most engineers
thought quantum computers
were decades away, D-Wave
says the digital bits that race
through the circuits of its
computer are able to stand for

0 or 1 at the same time,


allowing the machine to
eventually do work that is far
more than complex than that
of digital computers.
There are certain classes of
problems that cant be solved
with digital computers, says
Herb Martin, D-Waves chief
executive officer. Digital
computers are good at running
programs;
quantum
computers are good at
handling massive sets of
variables.
Dont expect to see quantum
computers in your local stores
anytime soon.
- Anusha final IT

Feelings of a S
oftware Engineer
Software
Engineer:
away from home
In the confines of cubicles by artifical light,
Sipping the coffee day and night.
Speaking on phones, in meetings I sit,
Starting the monitor, the keyboard I hit.
Far away from loved ones, whom for days I
dont meet,
Remembering them all while working on my
seat.
This is my life away fromhome,
This is my life away from home.
With loved ones in places so far,
What a life, Oh God!

The Bluetooth core specification


v1.2 was released in 2004

- J.Sebastin Ajay I CSE

InfoQuest 2007

On line
MURPHYS LAW OF INFORMATION TECHNOLOGY
1)

Law of Inconvenient Malfunction: A device will fail at the least opportune


possible moment.

2)

Law of Cable Compatibility: If you choose a cable and a connector at random,


the probability that they are compatible is equal to zero.

3)

Law of Hardware Compatibility: The probability of a given peripheral being


compatible with a PC is inversely proportional to the immediate need for
that peripheral.

4)

Law of Bad Sectors: The probability that an untested diskette will have bad
sectors is directly proportional to the importance of the data written onto the
diskette.

5)

First Law of Selective Gravitation: When an object is dropped, it will fall in


such a way as to cause the greatest possible damage to itself and/or other
objects on which it lands.

6)

Second Law of Selective Gravitation: The tendency for an object to be dropped


is directly proportional to its value.

7)

Law of Reality Change: Unalterable hardware specifications will change as


necessary to maximize frustration for personnel affected by said
specifications.

8)

Law of Noise: Noise bursts occur so as to cause the most, and/or most serious,
errors in data communications, regardless of the actual amount of noise
present.

9)

Law of Expectation: Consumer expectations always outpace advances in


hardware technology.

10) Law of the Titanic: If a device cannot malfunction, it will.

Here are a few greatly simplified examples of Murphys Laws as they relate to
programming.
1)

Law of Debugging: The difficulty of debugging software is directly


proportional to the number of people who will ultimately use it.

2)

Law of Neurosis: The chances of software being neurotic (developing bugs


spontaneously without apparent reason) is directly proportional to the
confusion such neurosis can cause.

3)

Law of Available Space: If there are n bytes in a crucial software program,


the available space for its convenient storage or loading is equal to n-1 bytes.

4)

First Law of Bad Sectors: The probability of software being mutilated by bad
sectors is directly proportional to the value and/or importance of the programs.

5)

Second Law of Bad Sectors: When a program is mutilated by bad sectors, the
damage will occur at the point(s) that result in the most frequent and/or
severe errors when the program is run.

6)

Law of Noise: When a downloaded program is corrupted by noise, the


corruption will occur at the point(s) that result in the most frequent and/or
severe errors when the program is run.

7)

Law of Software Compatibility: If two programs are chosen at random, the


probability that they are compatible is equal to zero.

8)

Law of Option Preferences: When two people share a computer, their software
option preferences will differ in every possible way.

9)

Law of Expectation: Consumer expectations always outpace advances in


software technology.

10) Law of the Titanic: Bug-free software isnt.

HARINI I year IT

INTERNET AT LOW TEMPERATURE


Sometimes called a Net fridge) is a
version of the familiar kitchen appliance
with a built-in computer that can be
connected to the Internet. The Internet
refrigerator is one item in a growing
product category known as Internet
appliances that includes not only devices
such as personal digital assistants (PDAs)
and smart phones, but also Web-enabled
versions of typical household appliances
such as refrigerators and microwave
ovens.
LG Electronics Digital Multimedia SideBy-Side Fridge Freezer with LCD Display
was one of the first available products; its
features include a touch screen in a 15.1inch thin-film-transistor liquid-crystal
display (TFT-LCD) and its own LAN (local
area network) port. This refrigerator can
keep track of what foods are stored in it
and how long theyve been there. Theres
a built-in video camera, so you can leave
video memos for other household members,
and a built-in digital camera, so you can
take a photograph and save it to an album,
post it to a Web site, or send it out to an email recipient. You can also watch
television, play MP3 files, or listen to the
radio.
Although it might seem at first an
unusual combination for an appliance, there
are reasons why a Web-enabled computer
refrigerator is a good idea. As Frank Lee,
of LG Electronics Canada (quoted in an EXN
article) explains, We have so many things
going on in the kitchen. Lets put access to
the Internet there. Whats more important
is that the refrigerator is really the only
thing in the house thats on 24 hours a day,
so lets have the Internet easy to access
and also play a larger function than just
simply e-mail.
A.JERSLIN MARY I Year CSE

On line
VISTA - ENEMY OR FRIEMD
- Nothing is perfect

In the last two months alone, at least four major


security flaws involving Microsoft Word have come
to light. All are zero days flaws, meaning
Microsoft and security organizations became aware
of them at the same time that destructive hackers
became aware of them. In many zero days cases,
its the exploitation of the flaw that brings it to the
attention of the software companies; in other cases,
the software companies announce the flaw and
hackers immediately take advantage of it before a
patch can be released. The strange thing about the
latest Word problems is that almost eight weeks
after the first one hit the news because it was
exploited by attackers; Microsoft still hasnt
released a patch to fix it.
The first in this string of
security holes popped up in early
December. This flaw affects
computers running Word 2000,
2002 and 2003; Word 2004 for
Mac and Word 2004 version X
for Mac; Word Viewer 2003; and
Microsoft Works 2004, 2005 and
2006. An attacker hides a piece
of code in a Word document and
puts it on a Web site for
download or sends it out as an email attachment. When a user
downloads or opens the document, the attacker can
remotely control the users computer and execute
a wide array of codes under the users own login.
This flaw came to Microsofts attention on
December 5, 2006, when people started reporting
attacks.
A second, previously unknown flaw started to
draw attention just a week later, this one also
allowing a remote attacker to take control of a
users PC. According to Microsoft, though, this flaw
exploits an entirely different security hole one
that opens when Word undergoes a specific error.
Apparently, this attack doesnt require a user to
download a malicious file; it only requires the Word
program on the persons computer to experience
this error, at which point an attacker can enter the

InfoQuest 2007

system and run malicious code. It affects Word 2000,


2002 and 2003 and Word Viewer 2003.
Security experts have attributed these two security
holes to memory-corruption flaws in the Word
programs. Days later, a third flaw was revealed. This
one also allows for remote access and control of a users
machine and has been tied to a buffer-overflow problem
in Word. It came to public attention when a software
expert called Disco Johnny published a proof-ofconcept code on the Web that showed how a malicious
hacker could exploit it, essentially providing
instructions for running an attack in addition to showing
Microsoft it has yet another problem. And about five
weeks later, on January 25, a fourth security hole
became the subject of a malicious attack that begins
when a user opens a rigged Word file sent as an e-mail
attachment and has similar results to the previous
attacks: Remote access and control
of an entire system if its running
Word 2000. If the computer is running
Word 2003 or Word XP, it only
crashes the computer, as opposed to
opening it up to remote control.
These four issues are only the
latest in a series of attacks exploiting
previously undiscovered flaws in a
wide array of Microsoft Office
applications. In September 2006,
hackers started exploiting another
zero-day Word flaw, this one only
affecting Word 2000. A user had to open an infected
Word 2000 document using the Word 2000 program in
order for the virus, MDropper.Q, to drop a piece of code
in the users PC. This allowed a remote attacker to take
control of the infected PC. Security sources report that
this flaw still has not been patched, almost five months
later. Microsoft has, however, patched several of the
flaws involving other Office programs, including security
holes in versions of PowerPoint and Excel.
Since no security patches have been released for
the Word flaws, Microsoft recommends installing
multiple layers of security software and updating the
versions vigilantly. Beyond that, we can only use the
wariness weve become accustomed to when opening
attachments or downloading files, with an extension into
a traditionally safer area: Now, if it ends with .doc, dont
touch it unless you know and trust the source.
- B. A. ABDUL SALEEM, II YR, B.TECH [IT]
- S. HARI NARAYANAN, II YR, B.TECH [IT]

On line
Lose ur gal friend!
- History of your favorite website
A guy lost his girlfriend in a train accident....but the
gals name nowhere appeared in the dead list. This guy
grew up n became IT technical architect in his late
20?s, achievement in itself!!.
He hired developers from the whole globe and plan to
make a
software where he could search for his gal friend
through the web..
Things went as planned...
n he found her, after losing millions of dollars and 3
long years!!
It was time to shut down the search operation, when
the CEO of Google had a word with this guy n took over
this application,
This Software made a whopping 1 billion dollars profit
in its first year,
which we today know as ORKUT .
The guys name is ORKUT BUYUKKOTEN . Yes its
named after him only. Today he is paid a hefty sum by
Google for the things we do like scrapping. He is
expected to b the richest person by 2009.
ORKUT BUYUKKOTEN today has 13 assistants to
monitor his scrapbook & 8 to monitor his friends-list.

Some other Cool Facts about this guy: * He gets $12 from Google when every person registers
to this website.
* He also gets $10 when you add somebody as a friend.
* He gets $8 when your friends friend adds you as a
friend & gets $6 if anybody adds you as friend in the
resulting chain.
* He gets $5 when you scrap somebody & $4 when
somebody scraps you.
* He also gets $200 for each photograph you upload on
Orkut.
* He gets $2.5 when you add your friend in the crush-list
or in the hot-list.
* He gets $2 when you become somebodys fan.
* He gets $1.5 when somebody else becomes your fan.
* He even gets $1 every time you logout of Orkut.
* He gets $0.5 every time you just change your profilephotograph.
* He also gets $0.5 every time you read your friends
scrap-book & $0.5 every time you view your friends
friend-list.
Moral of the story? LOSE U R GIRLFRIEND AND
MAKE BILLIONS !!!!

He gets around 20,000 friend-requests a day & about

- M.ABISHEK,2ndCSE

85,000 scraps!!!

RADIO FREQUENCY IDENTIFICATION(RFID)


Over the past few years, the RFID agenda has
been driven by retail and Department of Defense
(DoD) compliance mandates. Many companies
established simple slap and ship RFID labeling
operations to comply with the mandates. Cost
constraints limited RFID tagging to the bare minimum
necessary to achieve compliance.
An RFID system consists of two major components - a reader and a transponder (or tag). They
work together to provide a non-contact solution to
uniquely identify people, objects or vehicles.The tag
is basically a RF transmitter that contains an antenna,
a microchip and a battery to power the microchip.
Information is stored in the tag can range from as
little as an identification number, to kilobytes.
The reader consists of an antenna, a RF receiver
and processing circuitry. The antenna couples the
electromagnetic energy transmitted by the Tag to the
Reader. The processing circuitry of the reader
decodes the received information and sends the data

to a Host .Using RFID tags, these systems allow


tracking the movement of assets-only or assets and
the carrier of assets, as they move through
strategically located checkpoints. The system offers
many advanced features, notably:
1)
2)

3)
4)

5)

6)

Tracking movement of men, machines and materials


within a facility.
Verifies that the correct owner is carrying a designated
tagged asset. Generates alarms if there is a mis-match
indicating possible misuse.
Can track upto 8 different variables in a system.
A watched-area (read radius) of upto 150 feet. Controllers
can be connected in loop to handle tracking at multiple
locations and cover a large area throughout a facility.
Custom solutions for bus and truck terminals, utility
fleets locations and lobbies possible by integrating tags,
readers and software modules.
Integrates with other subsystems in the AMWATCH
Family of Software.
OBED ACHUMI I Year CSE
- OBED ACHUMI I Year CSE

10

UPDATNG KNOWLEDGE...

On lin e

Spouses take second-place to computers


DENVER, Jan. 24 (UPI) Given a choice between the computer and the significant other, most Americans go for the computer, a
new survey found.
The Cyber Stress survey of 1,001 conducted in December and January by the independent firm Kelton Research found 65
percent of respondents chose spending time with the computer over a spouse or mate.
The survey found the average American spends 12 hours each month addressing home computer problems, the Denver Post
reported. The average consumer has computer troubles about every four months, the survey said.
About 52 percent used words like anger, sadness or alienation to describe their most recent experience with a computer problem.
- Rajesh Kumar final CSE

Scientists close to cracking 10 nanometers


SEOUL, Feb. 21 (UPI) South Korean scientists say they are close to the creation of a super thin semiconductor once considered
almost impossible to achieve.
The findings by Choi Hee-cheul of Pohang University of Science and Technology, and Kim Hyun-tak of the state-run Electronics and
Telecommunications Research Institute, are featured in Nature Nanotechnology, the Korea Times reported.
Choi said he used carbon nanotubes to etch circuits that are thinner than 10 nanometers on the face of silicon wafers, the newspaper
said. One nanometer is equal to one billionth of a meter.
The newspaper said Kim is working on a new substance, called a Mott insulator, which instantly changes from a conductive metal to an
insulator. Kim said the insulator may be the answer to making super-slim circuits.
- S.Arun Sundar Final CSE

Lip-reading computer program sought


NORWICH, England, Feb. 21 (UPI) British scientists say they want to create a computer lip-reading system that
could be used to fight crime.
The researchers at the University of East Anglia say their three-year project will involve the collection of data for lipreading and use it to create machines that automatically convert videos of lip-motions into text. It builds on work
carried out at the university to develop state-of-the-art speech reading systems.
The project is in collaboration with Surrey University scientists, who have built accurate and reliable face and lip
trackers, and Britains Home Office Scientific Development Branch, which wants to investigate the feasibility of using
the technology for crime fighting.
The team also hopes to develop programs that can computerize lip-reading of other languages.
- R.Elakkiya Final CSE

Drive-by pharming newest cyber attack


SAN FRANCISCO, Feb. 20 (UPI) Drive-by pharming is the most dangerous type of cyber attack yet, security specialists at a major
scientific conference in San Francisco warned.
The fast-growing new assault covertly diverts a computers Internet activity to a server operated by the criminals rather than a
legitimate provider, the specialists said at an American Association for the Advancement of Science news conference.
The criminals then redirect connections to fake Web sites that superficially resemble places like eBay, banks and PayPal, The Toronto
Star reported.
Once consumers enter confidential data onto the fake site, the criminals can then start draining accounts.
They say curiosity killed the cat but it can also kill your bank account, said Zulfikar Ramzan, a senior security researcher with
Symantec Corp., a major provider of computer protection software.
Ramzan said users could protect themselves against drive-by pharming by entering new passwords for the default passwords that are
supplied with routers.
- S.Gomathi Sundari Final CSE

11

Human Brain Region Functions Like Digital Computer


A region of the human brain that scientists
believe is critical to human intellectual abilities
surprisingly functions much like a digital
computer, according to psychology Professor
Randall OReilly of the University of Colorado at
Boulder.
The finding could help researchers better
understand the functioning of human intelligence.
In a review of biological computer models of
the brain appearing in the Oct. 6 edition of the
journal Science, OReilly contends that the
prefrontal cortex and basal ganglia operate much
like a digital computer system.
Many researchers who create these models
shun the computer metaphor, OReilly said. My
work comes out of a tradition that says peoples
brains are nothing like computers, and now all
of a sudden as we look at them, in fact, in a
certain respect they are like computers.
Digital computers operate by turning electrical signals into binary on and off states and flexibly
manipulating these states by using switches. OReilly found the same operating principles in the
brain.
The neurons in the prefrontal cortex are binary they have two states, either active or inactive
and the basal ganglia is essentially a big switch that allows you to dynamically turn on and off
different parts of the prefrontal cortex, OReilly said.
The brain as a whole operates more like a social network than a digital computer, with neurons
communicating to allow learning and the creation of memory, according to OReilly.
However, the computer-like features of the prefrontal cortex broaden the social networks,
helping the brain become more flexible in processing novel and symbolic information, OReilly said.
The prefrontal cortex is the executive center of the brain and supports higher level cognition,
including decision making and problem solving. Researchers believe that the prefrontal cortex is
critical to human intellectual ability, and better understanding it is crucial to understanding more
about human intelligence, according to OReilly.
If researchers can gain a better understanding of this synthesis of the prefrontal cortex and the
brain as a whole, they could be on the way to a better understanding of human intelligence.
The best way to do this, OReilly says, is by developing more biologically based computer models
of the brain to help researchers understand how the biology of the brain works, and eventually
provide insights into what makes us so smart.
Modeling the brain is not like a lot of science where you can go from one step to the next in a
chain of reasoning, because you need to take into account so many levels of analysis, OReilly
said.
OReilly likens the process to weather modeling.
Most weather models dont exactly represent what happens in a low-pressure system, but
they do capture some global features, he said. If you capture the essence of it, it tells you a lot
about how the system works. Its the same premise when it comes to modeling of the brain.
- Kathick Kumar Final IT

12

on li n e 2007
FOOLPROOF
Foolproof is a Windows desktop security program, used almost exclusively by schools, or any other
large institution where the people using terminals on a network (or even lone terminals) are not trusted
to use the computers freely. It is a configurable program, and depending on the amount of precautions
taken, certain actions are restricted. Such actions include when one right clicks, all actions other than
arranging icons are disabled. Although an understandable precaution on a winblows box, it is more than
the least bit annoying for anyone who uses computers for more than checking their e-mail or playing java
games. Another rather pesky feature, is the inability to run any program that has not been previously
okayed by administrators.
Foolproof is not only annoying, but insulting. Ever since the days of The ICSS (Incompatable TimeSharing System) in Tech-square at MIT, any program or routine a computer is made to preform that
prevents or restricts the full power and capabilities of the computer, is foolish, insulting, and more than
a little annoying.

want something more....


here is fooling with fool proof....!!!
First of all, with some programs, it is possible to simply ctrl-alt-delete
and close the program- not so with foolproof. If you see it as an available
program, it will not end if you close it.
The default directory for Foolproof is C:\Sss, so look around- you will
find some .vxd files, and other interesting material Among the files you
will find are several .ini files detailing programs which are allowed- and
other interesting permission material.If you wanted to, you could just make
a blank .vxd file, with the same name, and replace the existing virtual
device drivers of foolproof, so that they no longer preform their intended
functions
- M.GAYATHRI,POOVIZHI.P I Year CSE

13

o n li n e 2007
The horizon of memory -

Swiss firm crams 5 megabytes of RAM

(I
nto the sp
ace of one)
(Into
space

The running joke at Innovative silicon, a four year old Swiss firm on the shores of Lake Geneva, is
that state- of- the art microprocessor chips shouldnt be thought as a logic chips with embedded
memory. Rather, they should be called memory chips with embedded logic.
Yes, the joke is so geeky it hurts. Buts it conveys more than a little truth and thats pretty painful
too. On-chip memory already takes up more than 50% of the surface area of any respectable
microprocessor. Its expected to occupy a whooping 90% by 2011. And thats no joke for designers
who will be hot pressed to cram in hundreds of megabytes of memory without making their chips
any bigger.
The company which is in Lausanne, has developed what it says is the densest and cheapest embedded
memory technology in the world. Its called Z-RAM, for zero capacitor dynamic random access
memory and if its grabs even a little piece of the on-chip memory market, it will change the ground
rules for micro-processor design and quickly make Innovative silicon a company to be reckoned
with.
Whats so great about Z-RAM? Basically, it does not require any new materials or extra processing
steps in the fabrication process. Thats the beauty of Z-RAM: no exotic semiconductors, no oddly
structured parts and no experimental insulators. Each memory cell is just a single transistor.
Z-RAM is a technology that straddles even more on-chip memory and transistors that operate faster
and consume less power. Z-RAM doesnt have just had to be better than traditional embedded SRAM;
it also has to be better than DRAM (dynamic random access memory), a memory technology that
has been slowly winning a place on logic chips. DRAM is a well understood technology, and it is
embedded in some memory-intensive chips such as IBMs Blue gene processor.
Add the speed of SRAM to DRAM and remove the capacitor and you get Z-RAM. Reading a bit from ZRAM is simple. As you need to do is turn the transistor on and measure the amount of current
flowing through it.
As transistors get smaller in Z-RAM, the economics till more and more in Z-RAMs favor, because
more sectors of the chip industry will turn to SOI to solve their power and performance problem.
One day, even commodity stand-alone DRAM chips might be made with Z-RAM. But-without giving
away any details-perhaps [Z-RAMs adoption] is likely to be a lot earlier than wed thought.

- S. Sindhuja I Year

123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
Computer scientists' recent interest in biology is driven by their belief that biologists can benefit from computational
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
thinking. Computer science's contribution to biology goes beyond the ability to search through vast amounts of sequence
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
data looking for patterns. The hope is that data structures and algorithms our computational abstractions and methods can
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
represent the structure of proteins in ways that elucidate their function. Computational biology is changing the way
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
biologists think. Similarly, computational game theory is changing the way economists think; nanocomputing, the way
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
chemists think; and quantum computing, the way physicists think.
- Aravindhan II CSE
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121

STORAGE VENDORS POWER EFFICIENCY


STRATEGIES
The data center is going green and storage vendors are squeezing it for all its worth.
Research from industry firm Gartner predicts that by the end of 2008, nearly 50 percent of
data centers worldwide will not have sufficient power and cooling to support high density
storage, server and network gear.
Pillar Data took advantage of this trend to develop what it calls an Efficiency
Quotient (EQ) calculation for its equipment. The EQ consists of capacity in gigabytes times
performance measured in I/Os per second divided by power consumption in watts times
square meters of space or Capacity x Performance / Power x Space.
Of course, the company has compared its Ax 500 to arrays from its closest
competitors, EMC and Network Appliance and showed that using the EQ the Ax 500 more
than doubles the EQ of EMCs Clariion CX3 Model 40 and that of NetApps FAS3050
Cluster.
3PAR launched a Carbon Neutral Storage program in which for every terabyte of
capacity it sells this year, the company will purchase equivalent carbon credits to offset the
emissions of the disk drives required to deliver that capacity. The companys Carbon
Neutral Storage program will fund clean energy projects that reduce carbon emissions and
purchase Terrapass carbon offset credits.
Copan has already established itself as a leader in energy consumption with its
Revolution 200 array, which only spins disks when data is needed. The Revolution 200 uses
a technology called Massive Array of Idle Disks, which only powers on those disks that
contain data that is requested by a specific application. The disks are then powered off
when they are not needed, significantly reducing the power consumed by the storage array.
Brocade makes the argument that its switches consume less power to operate than
those of its main competitor Cisco. You can compare the wattage output yourself.

BLUETOOTHS MEDICAL APPLICATIONS


Bluetooth technology opens up many
possibilities for medical devices to
communicate and facilitate healthcare
providers access to essential information.
Several studies are being conducted, many of
them in Europe, to evaluate the technology as
a method for synchronizing personal devices
and transferring data in hospitals. At least one
medical device has been listed on the Bluetooth
Web site as a Bluetooth-approved product.
Other devices developed by two companies
have been demonstrated, and are serving as
feasibility prototypes for Bluetooth
implementation. These include a patient-worn
pulse oximeter and a portable patient monitor.
Medical Information. Use of handheld
and mobile computing technology in the
medical field has progressed steadily. Doctors
routinely access medical databases for drug
dosages and interactions. Home-health nurses
keep information on their patients for field use.
Many other applications are allowing
practitioners to make better-informed decisions.

Bluetooth wireless technology will enable


medical devices to connect more easily with
each other and to information access points
provided by LANs. Bluetooths low power, low
cost, and few configuration requirements will
Energy consumption in the data center is indeed a huge concern for IT and data
center managers. Research shows that by 2011, more than 30 percent of data center budgets be traded off against 802.11bs higher speed
will be allocated to environmental costs and that in 2005, more than $6 million was spent and easy enterprise integration. The use model
and environment for each individual application
powering data centers.
P.PARTHASARATHY III Year CSE
will determine the best choice for wireless data
technology.
Medical Devices. Other exciting possibilities exist in the field of medical device communications and networking. Bluetooth
clearly provides an advantage for highly mobile battery-powered devices, and it opens up the possibility for these devices to connect
to a LAN or wide-area network. Input, output, and storage can be removed from individual devices and centralized to increase
flexibility and reduce the devices cost, size, and power. Devices also can talk to each other within a patient-area network, which will
make them less prone to medical errors.
Not to be left out, EMC late last year announced a set of Energy Efficiency
Services and an EMC Power Calculator, that lets users assess their energy consumption
requirements. The Power Calculator, like so much that EMC does, only works with EMC
storage gear.

The challenges to integrating Bluetooth in medical devices are discussed in greater detail below, but they are the same as for
any RF technology used in medicine. Bluetooth has the advantage of being an adopted and controlled industry standard with an
extensive qualification, verification, and approval process to ensure compliance with that specification.
Implementation. When a device manufacturer decides to incorporate Bluetooth into its medical product, it must proceed
thoughtfully. Perhaps the easiest way to get started is by using an external adapter to prototype the device design, gain a greater
understanding of issues associated with the implementation, and collect valuable user and marketing feedback. This approach
could also shorten time to market.
When the prototype is up and running and a manufacturer is able to navigate the make-versus-buy decisions, it will need to
consider several issues as it formulates its product and project plans.
The $5 Solution. There has been much discussion in the media about the so-called $5 Bluetooth solution, and some companies
claim to have achieved this dollar amount per unit for high-volume shipments in 2002.
The industry goal of $5 includes only the RF and baseband signal processing functions. To implement the complete Bluetooth
functionality from the baseboard layers to profiles and application requires external components (at least an antenna or board
space for an onboard implementation, and sometimes other discrete components), as well as RAM, ROM, and processor bandwidth.

14

Thinking like a computer scientist means more than being able to program a
computer. It requires thinking at multiple levels of abstraction. Charles II CSE

addition, all of the current Bluetooth software stacks that implement


more than the headset profile require an operating system.
The $5 goal assumes that a device, such as a cell phone,
already has enough of the above resources and an operating
system. It assumes a royalty-free implementation of the Bluetooth
software stack, which is not the case unless a device manufacturer
implements the rather complex specification. The goal also
assumes production volumes in the millions of units per year.
Unfortunately, very few of the above conditions are met for
medical devices, so implementations in more-realistic lower
volumes are unlikely to meet that cost goal. Realistic estimates
for medical device applications for the next year range from $25 to
$70 and would require significant development resources.
Alternatives requiring little or no development cost more but yield
quick time to market and may be the best alternative for lowvolume production runs, or until customer acceptance justifies
highly integrated solutions.
- sathishkumar,dineshkumar
I year
UTSIDE THE WORLD
UTER SPACE

ATTENTION .... NO TENSION ......


The moment oyu are tension
You will lose your attension
Then you are in total confusion
And you will feel irritiation
Then you will spoil your relation
Ultimately, you wont get any cooperation
Then you will make things complication
Then your B.P may also rise caution
And you may have to take medication

Black Hole
Black holes are one of the most intersting and intriguing phenomenons in space. They are formed by collapsing (dying) stars. Whenever a star gets older or out of
fuel(H2) it collapses in on itself and forms either a neutron star or a Black hole.
Neutron stars are formed when the mass is greater
than one and half (11/2) solar masses (snus mass). A
teaspoon full of neutron star will weigh a billion ton.
If the dying star is more than three(3) solar masses,
it cantracts to form a black hole. Black holes are very
small in size and they cannot be seen normally. If at all a
black holes are near a star, it attracts the gases of the
star so that it can be seen, as the gases formm a swirling
mass around the black hole. Black hole has enormous
gravity that even light cannot travel through (ie.,It bends
light). If is suggested that black holes can be used as a
kind of teleporting devices to travel between universes
or even through time.
It is a pratical example of Albert Einsteins theory
that, Time is also a dimension like the sparial dimensions
and both can be travelled through.

Instead Understand the situation


And try to think about the solution
Many problems will be solved by
discussion
Which will make out better in your
profession
Dont think its my free suggestion
It is only for your prevention
If you understand my intention
You will never come again to tension
- R.Subramanian I BE CSE

- M.Harish Goutham I Year CSE

How can I get back all those nice programs that they removed from my start menu?
This is also quite easy. There is a program called groupconv.exe . By running this, youll restore the default
star menu along with all the usual programs and accessories. Useful if the Admin has removed some program
that you prefer or want to use like Paint brush. Youll need paint to pull off the next trick.
- Asha final CSE
Your brain is full of nerve cells, but it has no pain receptors. Doctors can operate on
your brain while you're awake and you won't feel a thing. - samarasam 2nd cse

15

I
N
F
O

Q
U
E

Loading The New Informations....


NEXT VERSION OF MICROSOFT OFFICE COMING IN 2009
Office 2007 is just out, but Microsofts already working hard on the next version
internally known as Office 14and targeting 2009 for its release.
Eric Lai, Computerworld
Microsoft Corp. may have just released Office 2007
to consumers mere weeks ago, but the company is already
working hard on the next version internally known as
Office 14 and targeting it for release in the first half of
2009, according to information from Microsofts own Web
site.
The company plans to spend almost US$1 billion per
year in R&D for Office 14, or about 20 percent more than
the amount devoted to Office 2007, according to a
PowerPoint slide deck from a Nov. 8, 2006 presentation
by a Microsoft employee in Copenhagen, Denmark.
The information and excerpts from the slide show
were first posted on Tuesday by the independent
AeroXperience blog, which is geared toward Windows
Vista developers.
AeroXperiences senior editor Stephen Chapman
also reported that Microsoft is skipping the version 13 for
Office because it is unlucky, and that the company will
begin dogfooding, or beta-testing Office with internal
Microsoft employees, late in 2007. Chapman cited an
interview of Eric Vigesaa, program manager for Office
system client applications, with Microsofts TechNet radio
chat from December 27th .

A Microsoft spokeswoman downplayed the information.


Microsoft is always planning, said a spokeswoman. Moreover,
its typical for the Office team to deliver a new version of Office every
2 to 3 years.
The revelations about the next version of Office come hard upon
reports last week that the next version of Windows, alternately called
Windows 7 or Vienna, will also see release in 2009. Microsoft has
since tried to publicly retract that statement.
The Microsoft slides show the first beta of Office 14 due in the first
half of 2008, a second beta due in the second half of 2008, and a final
release in the first part of 2009, or between 26 and 32 months after
Office 2007s release.
The slides also indicate that in Office 14, Microsoft plans to continue
building on the established core features of the 25-year-old Office suite,
and will focus on three areas: enterprise content management,
communication and collaboration, and business process and business
intelligence.
In particular, according to AeroXperience, Microsoft hopes to improve
search relevance, enhance the management of complex documents and
content, bring business intelligence into the business process itself,
improve the offline experience in products such as SharePoint, and
simplify the building of business applications on the Office platform
through declarative programming and improved business data catalogue
integration.

New system controls computer worms

STATE COLLEGE, Pa., Feb. 12 (UPI) U.S. scientists


have created anti-worm computer technology that can identify
and contain worms milliseconds after a cyberattack begins.
A worm is a type of computer virus that doesnt alter files
but resides in active memory and can duplicate itself. Worms
are not usually noticed until their uncontrolled replication
begins to interfere with a computers operation.
Penn State University scientists said current technologies
focus mostly on signature or pattern identification. And that
means they cannot respond to attacks fast enough, allowing
worms to exploit network vulnerabilities.
The new technology instead targets a packets rate or
frequency of connections and the diversity of connections to
other networks, allowing it to react far more quickly than other
technologies.
A lot of worms need to spread quickly in order to do the
most damage, so our software looks for anomalies in the rate
and diversity of connection requests going out of hosts, said
Peng Liu, associate professor of information sciences and
technology at Penn State and lead researcher on the PWC
system.
Penn State has filed for a patent for the system invented by
Liu and doctoral students Yoon-Chan Jhi and Lunquan Li.

2007

The Future of You


Think the Net has changed your life? Wait until it
becomes an immersive 3D environmentand it will
An online game is an odd place to have your reputation precede
you. But thats exactly what happened to me not long ago in the
massively multiplayer universe of EVE Online. My character there,
a spaceship pilot named Walker Spaight, was minding his own
business one day when I got a message from
Another player, who wanted to know if I was the same Walker
Spaight from Second Life, another 3D online world.
Indeed I was, I told him. And the response I got back was
curious. My interlocutor was excited to meet a virtual celebrity.
In EVE I may simply be a midlevel combat pilot, but in Second Life
I am among the best-known figures in a community of 250,000 or
more. As editor of the Second Life Herald, an online newspaper
covering events in Second Life, Ive been digging up stories for the
last two years, profiling interesting players and their creations
(and not infrequently, their crimes), reporting on the businesses
emerging there, and taking to task the company that runs the
world.
While it may seem as though Im reporting on a game, 3D
virtual worlds like Second Life are becoming a very real component
of peoples lives, and over the next ten years theyll begin to shape
the way we work, play, and define our identities online. To Philip
Rosedale, founder and CEO of Linden Lab, the creators of Second
Life, online worlds constitute nothing less than a new means of
human expression.

An underwater robot, shaped like a flattened


orange,
maneuvered
untethered
and
autonomously within a 115-meter-deep sinkhole
during tests this month in Mexico, a prelude to
its mission to probe the mysterious nether reaches
of the worlds deepest sinkhole.
Bill Stone, leader of the NASA-funded Deep
Phreatic Thermal Explorer (DEPTHX) mission,
said the 2.5-meter-diameter vehicle performed
phenomenally well during early February tests
in the geothermal sinkhole, or cenote, known as
La Pilita. Carnegie Mellon University researchers
developed the software that guided the DEPTHX
craft.
The fact that it ran untethered in a complicated, unexplored three-dimensional space is
very impressive, said Stone, an engineer and expert cave diver who heads Stone Aerospace
Inc. of Austin, Texas. Thats a fundamentally new capability never before demonstrated in
autonomous underwater vehicles (AUVs), he added.
The autonomous navigation and mapping software that enabled DEPTHX to safely and
precisely operate in the close confines of cenote La Pilita was developed by a team of Carnegie
Mellon researchers led by David Wettergreen, associate research professor in the Robotics
Institute. These experiments give us confidence that DEPTHX will be able to meet the
challenge of its ultimate goal, the cenote El Zacatn, Wettergreen said.
Like La Pilita, Zacatn is in the Mexican state of Tamaulipas and was formed by the collapse
of a limestone chamber dissolved by warm, acidic groundwater that originated in a nearby
volcanic region. The current theory is that the cenote formed under a vast travertine bed like
that of Mammoth Hot Springs in Yellowstone National Park. But no one knows how deep
Zacatn goes. Human divers, descending far below safe depths, have made it to 282 meters
without reaching bottom. Sonar doesnt work over long distances in the confines of the
cenote, and current measurements peter out at around 270 meters.
NASA has funded the mission to develop and test technologies that might someday be used
to explore the oceans hidden under the icy crust of Europa, one of Jupiters moons. Team
members, including scientists from the Southwest Research Institute, the University of
Texas and the Colorado School of Mines, also want to learn more about the cenote, including
its physical dimensions, the geothermal vents that feed it and whatever life exists at various
depths.
Because a tether could become tangled or snagged at great depths, DEPTHX is designed to
operate autonomously independent of human control once it is under way. In areas that
are well-mapped, the AUV can operate by dead reckoning, using depth, velocity and inertial
guidance sensors to estimate its position. It is also equipped with an array of 56 sonar
sensors 32 with a range of 100 meters and 24 with a range of 200 meters that send sonar
beams out in all directions. DEPTHX uses the sonar data to detect obstacles and locate itself
on a map, providing precise navigation in the pitch-black deep water.
In unexplored areas, the sonar is combined with a software technology known as simultaneous
localization and mapping (SLAM) to produce maps of the cenote. In previous applications,
Carnegie Mellon roboticists have used a two-dimensional version of SLAM to map
environments such as building hallways and mine corridors. Because DEPTHX wont just
maneuver side to side, but also up and down, one of Wettergreens Ph.D. students, Nathaniel
Fairfield, has adapted SLAM for more complicated 3-D operation.
The DEPTHX researchers, including Project Scientist George Kantor and Senior Research
Programmer Dominic Jonak of Carnegie Mellon, traveled five hours south of the border
town of Brownsville, Texas, to reach La Pilita. From the surface, the cenote looks like an
ordinary duck pond, perhaps 30 meters across. You can swim across it in a minute and it is
warm, too, Wettergreen said. But the top is like the neck of a vase. As you get deeper, the
cenote widens until its more than 100 meters across. It is a duck pond that is 115 meters [375
feet] deep.
The overhang created by the narrowing at the top of La Pilita made the cenote a challenging
environment. Researchers made certain that, in event of emergency, DEPTHX could find its
way to the surface, even if it had been operating underneath the overhang. Kantor has
developed vehicle models and sensor filters for highly accurate dead reckoning. Repeated
tests showed that DEPTHX could estimate its position even after hours of underwater
operation, determining its location within one meter using dead reckoning and within 15
centimeters using sonar localization.

Wettergreen said the use of SLAM was limited


during this initial test, but Stone noted that the 3-D
mapping capability was demonstrated Feb. 5 when
DEPTHX made a descent to the cenote floor.
DEPTHX spun slowly as it descended, helping the
sonar beams cover as much of the walls as possible.
The resulting map revealed a tunnel on the western
wall and a bulging of the northwest wall at a depth
of about 30 meters.
DEPTHX was able to maneuver close to the walls so
it could extend a mechanical arm with a coring
mechanism and obtain wall samples. The AUV also
conducted water-sampling experiments, though the
full science instrumentation package wont be tested
until the second week of March, when the
researchers will return to La Pilita for a science
investigation and complete rehearsal of their
mission to Zacatn. The researchers plan to begin
their exploration of Zacatn in May.

WAIT AND SEE ...!!!

NASAs Robotic Sub Readies For Dive Into Earths Deepest Sinkhole

CSITA

WHAT DO YOU DO WHEN YOU REACH ENLIGHTENMENT? KEEP


GOING. MAC OS X TIGER WAS AHEAD OF ITS TIME IN
2005. BUT THAT DIDNT STOP APPLE ENGINEERS FROM
MOVING FORWARD. GET A GLIMPSE OF THE NOT-SO-DISTANT
FUTURE. INTRODUCING MAC OS X LEOPARD.

DONT STOP EXPLORERING UNTIL U FIND THE END OF THE UNIVERSE

O
n
l
i
n
e

- FROM THE EDITORS

1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901

o n li n e 2007

INFOQUEST 2007 POLLS


No two minds think alike...
Take a break from workday drudgery with IT whirled.
Daily installment covers the best in weird news
news,, humor,
gadgets
gadgets,, and all manner of offbeat items from the world of
IT and beyond.
1 ) Will INDIA win the ICC World cup 2007..???
a) Yes b) No c) Dont No

2) Where do you stand at the end of the college life..???


a) Placement b) Higher studies c) Own Business
80
60

Placem ent

40

Higher
studies

20

business

0
1st Qtr

3) Will windows Vista Survive


a) Yes b) No c) Cant say
20
15
Yes
10

No
cant say

5
0
1st Qtr

18

1234567890123456789012345678901212345678901234567890123456789012
1234567890123456789012345678901212345678901234567890123456789012
1234567890123456789012345678901212345678901234567890123456789012
1234567890123456789012345678901212345678901234567890123456789012
1234567890123456789012345678901212345678901234567890123456789012
1234567890123456789012345678901212345678901234567890123456789012
1234567890123456789012345678901212345678901234567890123456789012
1234567890123456789012345678901212345678901234567890123456789012
1234567890123456789012345678901212345678901234567890123456789012
1234567890123456789012345678901212345678901234567890123456789012

1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901
1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901

o n li n e 2007

4) Will VijayKanth make a good CM?


25

a) Yes b) No c) Cant say

20
15

Yes

10

No
cant say

5
0
1st Qtr

5) Is sharukh khan fitting into amithabh's shoes in KBC?


a) Yes b) No c) Cant say
12
10
8

Yes

No

cant say

2
0
1st Qtr

6) will INDIA emerge as a supreme power?


100

a) Yes b) No c) Cant say

80
60

Yes

40

No
cant say

20
0
1st Qtr

FROM

SENIOR

Think differently :
You only know her two forms. One as the epitome of divinity, as mother, another as the deadliest of the
species who deceives through her beauty and seduction.
but there is much to know and about her,
and yet to know about her.
1. The world's first computer programmer was a woman named Lady Ada Lovelace. She also had foreseen
that a machine can be use to create graphics and compose music, before anyone.
2. The first person to ever receive a noble prize twice was Marie Curie for her discovery of the elements
Radium and Polonium.
3. Three astronauts made India proud. Out of that two are women.
So Boys, the next time you are about to make fun of womankind, think.
Girls, Think differently. Make a change in your attitudes, break the rules and show the world your intellectual side.
REMYAHARI GIRISH
2005 pass out
GCT

Great people Think Different....!!!!

121234567890123456789012345678901212345678901234567890123456789
121234567890123456789012345678901212345678901234567890123456789
21234567890123456789012345678901212345678901234567890123456789
21234567890123456789012345678901212345678901234567890123456789
21234567890123456789012345678901212345678901234567890123456789
21234567890123456789012345678901212345678901234567890123456789
21234567890123456789012345678901212345678901234567890123456789
21234567890123456789012345678901212345678901234567890123456789
21234567890123456789012345678901212345678901234567890123456789
21234567890123456789012345678901212345678901234567890123456789

19

Online - IQ 07
The solo winner of the future
Holographic storage T
future
Imagine 2GB of data on a postage stamp, 20
GB on a credit card, or 200 GB on a disk.
Amazed? ....... Read more to know more.

Outline of holography:

of conventional storage.. It employs 3D recording. Unlike other technologies that record one
data bit at a time, holography allows a million bits
of data to be written and read in parallel with a
single flash of light. It has the potential for high

Holography breaks through the density limits


data densities and data transfer rates exceeding those of magnetic
data storage.
In holographic data storage, an entire page of information is
stored at once as an optical interference between an object beam
and a reference beam in a thick, photosensitive optical material.
As in all other optical data storage methods, the density
increases rapidly with decreasing laser wavelength. Since it is a
volumetric technique, its density is proportional to one over the
third power of the wavelength. In principle, laser beams can be
moved with no mechanical components without mechanical inertia,
allowing access times of the order of 10 s.

How data is stored and retrived?


The data to be stored are imprinted onto the object beam with a
pixelated input device called a spatial light modulator (SLM);
typically, this is a liquid crystal panel similar to those on laptop
computers or in modern camcorder viewfinders. The SLM translates the electronic data of 0s
and 1s into an optical checkerboard pattern of light and dark pixels
An entire page of data can be retrieved by a photodetector at the same time, rather than
bit-by-bit. The holographic scheme promises fast read-out rates as well as high storage densities.
If a thousand holograms, each containing a million pixels, could be retrieved every second, for
example, then the output data rate would reach 1 gigabit per second. (In comparison, a DVD
optical-disk player reads data 100 times slower.)

The need for holographic storage


Data can be stored at densities equivalent to 390 bits per square micron. This density exceeds
the storage capabilities of DVD disks by a factor of almost 20, and of magnetic disks by a factor of
five.
Combining high storage densities, fast transfer rates, with durable, reliable, low cost media,
make holography poised to become a compelling choice for next-generation storage and content
distribution needs
Because of all of these advantages and capabilities, holographic storage is promising an
intriguing alternative to conventional data storage techniques.
However the bottleneck across the implementation of holographic storage is the development
of a suitable storage medium. When this is overcome, who knows your mobile phone may come
with a 120GB storage space.
- R.S. Siva Subramaniam & R. Anirudhan Jegannathan
I Year B.Tech IT

I cant access the disk drive or the CDROM yet I see the Admin doing it! How canI
Although you may not see the drives, they are still there. Load up ole faithful Internet
Explorer and type D:\ without the quotes and press Enter. It should display a list of
the files on the CD. If it comes up with Access Denied or Permission Denied then
simply make a shortcut to it. That way, you will see all the files.

- Sindhuja.S final CSE

Online - IQ 07
THE NEXT LEVEL OF DVD
Blu-ray is the next-generation digital video disc. It
can record, store and play back high-definition video
and digital audio, as well as computer data. The
advantage to Blu-ray is the sheer amount of information
it can hold:
* A single-layer Blu-ray disc, which is roughly the
same size as a DVD, can hold up to 27 GB of data
thats more than two hours of high-definition video or
about 13 hours of standard video.
* A double-layer Blu-ray disc can store up to 50 GB,
enough to hold about 4.5 hours of high-definition video
or more than 20 hours of standard video. And there
are even plans in the works to develop a disc with twice
that amount of storage.
The Name
The Blu-ray name is a combination of blue, for the
color of the laser that is used, and ray, for optical
ray. The e in blue was purposefully left off,
according to the manufacturers, because an everyday
word cannot be trademarked.
How Blu-ray Discs Work ?
In 1997, a new technology emerged that brought
digital sound and video into homes all over the world.
It was called DVD, and it revolutionized the movie
industry.
The industry is set for yet another revolution with
the introduction of Blu-ray Discs (BD) in 2006. With
their high storage capacity, Blu-ray discs can hold and
play back large quantities of high-definition video and
audio, as well as photos, data and other digital content.
A current, single-sided, standard DVD can hold 4.7
GB (gigabytes) of information. Thats about the size of
an average two-hour, standard-definition movie with
a few extra features. But a high-definition movie, which
has a much clearer image (see How Digital Television
Works), takes up about five times more bandwidth and
therefore requires a disc with about five times more
storage. As TV sets and movie studios make the move
to high definition, consumers are going to need
playback systems with a lot more storage capacity

Blu-ray is the next-generation digital video disc.


It can record, store and play back high-definition
video and digital audio, as well as computer data.
The advantage to Blu-ray is the sheer amount of
information it can hold:

A single-layer Blu-ray disc, which is roughly


the same size as a DVD, can hold up to 27 GB of
data thats more than two hours of highdefinition video or about 13 hours of standard
video.

A double-layer Blu-ray disc can store up to


50 GB, enough to hold about 4.5 hours of highdefinition video or more than 20 hours of standard
video. And there are even plans in the works to
develop a disc with twice that amount of storage.
BLU-RAY discs will prove to be efficient storage
device with more advanced features compared
to DVDs
- VIGNESH.S , VEL IYAPPAN.P I Year IT

Faster, far-flung connectivity


In late 2007 in the US, Sprint/Nextel will roll out mobile WiMax service (high-speed wireless technology)
in test markets, with the goal of serving as many as 100 million people in 2008. The 4G service, which
will coexist with the companys current 3G cellular network, will provide 2-megabits-per-second to 4mbps downstream speed, with 500 kilobits per second to 1 mbps upstream.
.The new equipment were installing, beginning at the end of the year, technically allows us to increase
upstream speeds for FiOS by as much as eight times over what we do today, and increase downstream
speeds up to four times what we offer today, says Verizon spokesperson Bobbi Henson.
Unfortunately, most cable and DSL providers seem focused on delivering content to subscribers,
rather than enabling them to upload their own. Comcast has increased speeds four times in three years,
so it seems likely that more speed boosts will show up in the near future. - DEEPESH,II I.T

On lin e
INTERNET EXPLORER 7 Vs FIREFOX 2
Version 7 of Microsofts dominant Web browser
packs in interface changes, many new features, and
plenty of under-the-hood updates. It also arrives just
before version 2 of the up-and-coming Firefox browser,
which may be just days away. Microsoft had further to
go to bring IE up to par with the competition (IE 6 was
released in 2001), and so IE 7 is a more thorough
overhaul of its predecessor. You cant miss the new
user interface, with tabbed browsing, integrated
searching, and newsfeed support. Microsoft also
added an antiphishing tool and boosted IE 7s security
in response to seemingly never-ending IE 6 holes.
For this article, we evaluated feature-complete
release candidates of both browsers, IE7 RC1 and
Firefox 2 RC2, prior to their final release
Tabbed upgrades
IE 7s new streamlined look resembles Vistas. The
back, forward, and favorites buttons, and the address
bar, are all compressed into two rows up top, along
with a new search box you can customize with your
choice of search engine. You wont see a menu row
with standard XP options like File, Edit, or View (you
can bring it back if you want). But you will see
welcome new tabs which you can drag-&-drop to
arrange as you wish for viewing multiple pages
within one IE window.
You also get a new session-saver option: When you
close the browser, you can click a box to have IE
remember your open tabs, then open the same ones
next time. This small but highly useful feature could
gradually make a big difference in your daily
browsing.The tabs dont get their own row, however,
so they can start to appear somewhat squished if you
have many open at once. To navigate, you can click
a small button that shows thumbnail previews of all
your open tabs on a new, temporary page, and then
click one of the thumbnails to activate its tab. You can
also select from all open tabs via a drop-down list
accessed via a small button to the left of the tabs.While
less obvious, Firefox 2s tab updates are generally a
step ahead of IEs. For example, you can configure
Firefox to always save your last session for future use;
with IE 7 you have to click a box every time. Firefox
also lets you reopen closed tabs via the History menu
or by right-clicking an open tab.As in IEs

22

implementation, each Firefox tab has its own closing


button. However, Firefox provides no thumbnail previews
of open tabs.
Safer brows

Both browsers add antiphishing features meant to


protect against malicious fake sites that attempt to trick
users into divulging their log-ins or financial information.
Firefoxs default protection stops at comparing sites
against a known blacklist of phishing sites, while IE 7
includes site analysis that will try to warn you about a
suspicious site even if its not yet on a blacklist, an
approach similar to that implemented in the latest security
suites.According to the folks in Redmond, IE 7 will scan
a page for phishing hallmarks in the URL or page content.
The addresses of suspicious sites will get sent to Microsoft,
where theyre compared against a blacklist. If a site is
on the list, IE will block the page. If its a known good
site, youll see the page. If the site is unrecognized, youll
get a warning. Microsoft says it protects your privacy and
the URL queries it receives, but it does save the date.
Testing page content (as opposed to relying solely
on a blacklist) is a good idea since phishing sites typically
have very short life spans, or they shift Web addresses
quickly as the crooks behind them race to nail a few
victims before being blacklisted.By default, Firefox
compares sites against a locally stored blacklist
meaning you wont have to send out lists of the URLs
you visit and displays a warning if it sees a match.
However, you can instead choose to send the URLs you
visit to Google, which will compare them against a more
frequently updated list. Google doesnt associate the
information it logs with other personal data about you,
but the URL or other page information sent may itself
include personal data that will be logged.
E 7s new security features go beyond an antiphishing
tool. For example, its Delete Browsing History option
clears temporary files, cookies, history, form data, and
passwords, either all at once or separately, something
you can already do in Firefox 1.5. You also get a new
Fix Settings for Me feature that warns you if you reset
security settings to something Microsoft deems
unsafe.Microsoft has also improved ActiveX handling,
tightened the programs code, and changed the
underlying architecture to reduce potential areas of attack
for hackers. Overall, the new IE has many more security
fixes than the revised Firefox. But such fixes were
necessary to address IE 6s many holes, including some

On line

Let the wars rage


IE 7 includes other new features, such as quick page
zooms and enhanced Web page programming support.
Such tweaks, combined with the browsers major
improvements, might slow or even halt the generally
steady IE-user flight toward Firefox.But its telling that
the last time we compared the major browsers, back
in January, we looked at beta versions of Firefox 1.5,
IE 7,
L
O
C
A
L
H
A
C
K
I
N

and Opera 9. Mozilla will effectively lap Microsoft by


releasing both 1.5 and 2 in the time Microsoft took to
complete IE 7. (Opera remains at version 9.)Which one
should you use? For satisfied Firefox 1.5 users, moving to
version 2 is a no-brainer, as theyll get new features and
wont be thrown off by major interface changes. Confirmed
IE users have a similarly easy choice: IE 7s features make
it a much better browser than 6.x, and its security
enhancements alone make it a must-have.Of the two rivals,
Firefox remains the better application. Since IE users will
have to adjust to a new layout and interface anyway, this
might be a good time to give Firefox a try, then watch IE 8
play catch-up again in five years.
- KRISHNA MURTHY,II I.T

I cant edit the registry. How do I get around this ?


Well the easiest way is to simply remove user.dat and system.dat . When you reset the computer and login, it will come up
and tell you that it needs to reset to repair the registry. Ignore this message and use ctrl+alt+del to get it to close without
selecting ok. You will see that all the restrictions have been removed. Quickly go to Run and type command without the
quotes. This will open a DOS window and for some reason stabilises the system. Windows had a nasty tendency to crash if I
didnt open a DOS window for some reason. When you reset the computer, the old registry will kick in and the restrictions will
be active again. This isnt so bad because it means you can get a machine back to normal with the minimum of fuss.
How do I change this cursed background without using the display properties?
No one likes the default backgrounds but Admins tend to remove the ability to change them which is rather upsetting. To pull
this off, you need access to paint. Normally this isnt removed. Open your bitmap of choice into paint. From the File menu,
select Set as background. This will set your bitmap as the background. Normally this wont stay the same and will change
back next time you login. Still, you get a decent background for the duration of your session.

23

S.MEENAKSHI, Final Yr C.S.E

recent ones that allow drive-by downloads that can fill


your PC with malware if you visit a poisoned
site.Moreover, while Firefox has its share of security
flaws, Mozilla has proven much faster at patching them.
Bountiful add-ons
Firefox users have long been able
to select from a vast assortment of free extensions that
add functionalityranging from improved RSS reading
to security enhancements to ad blocking which
increases that browsers appeal to many users. IE 7 is
taking aim at that advantage with a new add-on
manager, as well as an accompanying Web site (http:/
/ieaddons.com) to promote and distribute the
extras.Microsoft doesnt quite hit the target, however.
You can enable, disable, and delete add-ons in IEs
manager, but its not very user-friendly; for example,
the manager offers no descriptions of the add-ons. Also,
to see all possible extensions, you must go through
four categories that themselves are far from intuitive:
add-ons currently loaded in Internet Explorer, add-ons
that have been used by IE, add-ons that run without
requiring permission, and downloaded ActiveX controls
(32-bit). Moreover, to update your plug-ins, you must
manually check for new versions and download each
one.By contrast, Firefox 2 builds on a good thing with
a revamped manager that controls themes and
extensions in one window. As before, each one has a
description, and a Find Updates button quickly checks
for updates for every add-on.

2007
HO
W TO TRA
CK YOUR LOST MOBILE
HOW
TRACK

Hiya dudes and dudets here is an


information which we think would be help full
to everyone who is concerned about their
mobile getting lost.
Here are few ways by which you can track
your lost mobile perhaps even can help you
to keep your mobile safely, from losing it

Every mobile comes with its own 15


digit IMEI (International Mobile Equipment
Identity) number, you can see your
mobiles IMEI number by removing your
mobiles battery the number would be
printed behind your mobile. Another easy
method is by typing the following code in
your mobile -*#06#. With this number you
can ask your network provider to track
your mobile phone, but since it is a tedious
process cos they have to scan thousands
of network, here is another alternative.

Micro Technologies a company offers


a paid service for tracking your mobile in
real time. After registering for the service,
a small

N
F
O

Q
U

- Selva kumar .M II CSE

HOW TO SELECT THE BEST STUDENT LAPTOP

Laptops are the perfect educational tool for


students. They can handle an innumerable amount
of tasks and serve many different functions that allow
students to consolidate all of their class assignments
and home studies into one convenient location, which
simplifies workflow and increases productivity.

S
T

The two most important things to look for in a


student laptop are portability and battery life. This
laptop will likely be carried in a backpack or shoulder
bag from class to class, so you will definitely want a
system that is light and easy to transport. There is
also no guarantee that you will have access to an
auxiliary power supply in your classroom or on
campus, so you will most likely want a battery that
lasts up to several hours per charge.
- MEENA II YEAR

24

application (Micro LMTS) is to be loaded into


your phone, the application occupies very
little memory so it doesnt take any useful
resource from your phone.
This service provides you with instant alerts
whenever your mobile phone sim is changed
and gives you the location of your mobile from
the nearest cell phone tower. It also provides
a web interface for anywhere access. This
service intimates the location of the register
handset.
So doesnt real time tracking sound cool! Now
all of you must be wonderin, how much this
service costs?
Well this service costs just RS 400/- per year,
is it costly considering the amount of money
you spent on buying your new mobile?
So dudes and dudets log on to http://
www.microlmts.net and stop worrying about
the piece of gadget in your hand!

Desktop real estate can be limited in your class,


so you want to make sure your laptop is compact
and economical in size, preferably around 14" X 10"
in general dimensions.
As far as individual specifications, you can get
by with most base configurations. A 1.66GHz
processor, 512MB of RAM, a 40GB hard drive, and
a standard DVD/CDRW drive should suffice, but you
may wish to upgrade certain components depending

on whether or not you want to use your notebook


for any extra curricular activities, such as gaming
or
multimedia
production.
Unless you intend to do higher-level networking,
or unless your school requires domain-based
authentication to access the school network (check
with your IT department), Windows XP Home
Edition should more than meet your needs for an
Operating System.
Lastly, you will need some office suite software
to process and edit your reports and class assignments. Microsoft Office Basic will be able to handle
most of your needs, however, if you plan on doing
any slide-show presentations or website creation,
you will want to go with Office Pro.
These are the main things you need to know
and consider before purchasing a student laptop.
This is just a general outline. Feel free to make
additional customizations if you have specific requirements for school.

2007
THE DAWN OF A NEW ERA (TERA) Blog Insights: A new era in search

What bloggers are saying about the latest in


information technology

IN COMPUTING
The shift within the last year from two processing
cores on a single computer chip to quad or four cores
on a chip might seem significant. At the International
Solid State Circuits Conference (ISSCC-2007) in san
Francisco (U.S), Intel researchers announced that they
succeeded in putting 80 cores on a thumbnail sized slab
of silicon.
With this research chip, the team was able to
achieve a Tera flop of performance- that is a computer
built around the processor crunched numbers( or
floating point operations) a trillion times a second. A
decade ago, the worlds first Tera flop super-computer
achieved a similar speed- but it took a huge machine
with 10,000 Pentium chips to achieve this.
In the process, it gobbled up 500KW of energy.
According to the paper read out by the Intel team, their
single chip solution consumed just 60watts- about the
same as an average light bulb. The breakthrough would
suggest that the TERA era is already here-when a single
chip can perform the super computing tasks hitherto
done by a room full of computers working in tandem.
It is clear that the development of this landmark
chip, which was divided between the Indian and U.S,
based R&D centers of Intel, benefitted considerably
from the desi brains. Of the fourteen authors credited
with the achievement, at least eight are Indians, five of
them based in Bangalore.
- M. Bala Murugan II CSE

DIGITAL BRAIN ATLAS


DAVIS, Calif., Feb. 28 (UPI) U.S. researchers
have created an online digital atlas of the brains of
humans, monkeys, dogs, cats, mice, birds and
other animals.
The University of California-Davis scientists said
brainmaps.org features the highest resolution
whole-brain atlases ever constructed, with more
than 50 terabytes of brain image data allowing
users to explore the brains of humans and a variety
of other species at an unprecedented level of detail.
The Web site also includes a suite of free,
downloadable tools for navigating and analyzing
brain data.

Google, Yahoo and MSN, the top dogs of


the search business, actually use technology
thats fairly simple. Their search engines dont
really understand language as people do, they
merely recognize individual words and do
statistical analyses on them to generate results
that are likely to have something to do with
what the searcher actually wants.
Google, by far the largest and deeppocketed of the three, got to where it is today
not because of excellent technology, but
because they found a good way to monetize it
with contextual ads. And its money, more than
pure science and technology, that drives the
growth of the Internet. My theory about it is
that an Internet company with pretty good
technology and a strong focus on monetization
is more likely to beat out an Internet company
with superior technology and less focus on
monetization. As consumers, we tend to accept
pretty good so long as it is convenient. Thats
why there are so many dollar stores. Why do
people shop there? Because things are cheap,
theres probably one in your neighborhood, and
the things you buy there may not be the best,
but they are good enough to get you by.

O
n
l
i
n
e

A startup called Powerset announced $12.5


million in first-round venture funding last week,
and an aggressive plan to change the very
nature of search technology. Of course, by
Google standards, $12.5 million is pocket
change, and Powerset has some very wellmoneyed rivals to take on. But, on the other
hand, successful tech companies have been
launched with less, and Ill give them credit for
taking on the 800-pound gorilla. And of course,
their technology is from Xerox PARC, which is
by no means dollar-store technology.
The big difference is Powersets natural
language technology, which understands queries
made in natural language. If you type what is
the name of Paris Hiltons dog into the Google
search bar, Googles engine sees eight
individual words, and attempts to generate
results that are probably relevant based on a
statistical analysis of that clump of words. (The
answer is Tinkerbell.) Powerset, on the other
hand, recognizes a sentence, and each words
relationship with the other.

Many users have described it as a Google


Maps of the brain, said Shawn Mikula, a
postdoctoral researcher at the University of
California-Davis who is first author of a paper
describing the work. He said the high-resolution
- Sathya & Kiruthi
maps will enable researchers to use virtual
microscopy to compare healthy brains with
others, looking at structure, gene expression and the distribution of different proteins.

final IT

Mikula said the maps will enable better understanding of the organization of normal brains and
could help researchers in identifying fine morphological and chemical abnormalities underlying
Alzheimers, Parkinsons and other neurological diseases.
Mikulas paper appears in the journal NeuroImage.

- Ganapathy final CSE

25

26
The Future of Cell Phones
Handsets get even thinner, more versatile.
Whats Next: Speed Is Just the Beginning

Networks: In the next few years, cell phone networks will move data at several megabits per second, and will
coexist with WiMax, Wi-Fi, and, for TV, DVB-H or MediaFLO. IMS will let them work together.
Handsets: Look for sleek designs (such as Frog Designs Ubik), better battery life, e-payment support, and
graphics muscle for true TV and console-style video gaming.
Cameras: Expect not just high resolutions (8 megapixels and beyond), but also the same image-processing
capabilities found in current digital still and video cameras

Network Hopping: Enabling Seamless Internet Access


GSM, CDMA, Wi-Fi, WiMax: Cant we all just get along? With IMS (IP Multimedia Subsystem), we just might.
Now in trials, IMS network technology will allow any type of packet datavoice calls, video, music, HTML, you
name itto move seamlessly between IMS-enabled networks. With IMS, youll be able to start a call on your cell
phone and end it on a VoIP landline, watch pay TV on either a handset or a big screen (smart-card technology identifies
you), and access your contacts from any connected PC or handset. But the benefits will kick in only once IMS is widely
deployed, which will take several years.
Tomorrows Phone: Fold It and Go
Many of todays hot new phones started out as just a glimmer in an industrial designers eye. The most successful of these new designs are
picked up by handset manufacturers and eventually offered to you by your cell phone service provider.
We asked Frog Design, the Silicon Valley industrial design and consulting firm with clients as diverse as Victorias Secret, Maxtor, and Yahoo
Music, what a cell phone might look like several years from now. They shared with us this innovative prototype design. Click on the image
to see more features.

- Kalaiselvan final IT

INFOQUEST

2007

Todays mobile phones can already send e-mail, browse the Web, and keep you in touch with friends and colleagues
via voice or text message. Tomorrows handsets will add even more to the menu, morphing (as needed) into alwaysconnected portable game consoles, full-featured TVs, and credit cards. Heres a quick look at whats coming:

Full Disclosure: Incredible Future TechnologyLies Ahead


Tomorrows PC will be infinitely better. Or at least weirder.
Eight-core processors! Super-smart browser-based apps! Ubiquitous high-speed wireless! Personal robotics! You may find the glimpses
of the future in this special issue thrilling, but remember: What matters isnt the technology. Its the way that gee-whiz digital stuff will
truly change our lives. Just look at these innovations due to arrive any day now:
In-control advertising: Think endless pop-ups are bothersome? You aint seen nothin yet! Thanks to Microsofts new Hyperactive Y
Chromosome technology, your browser will be able to assert complete control over your machine no matter how much you try to overcome
it.
Want to mute that loud ad? Dont botherthe advertiser will own your volume control! Think you can skip past that 2-minute
commercial? Not until you take a quiz that shows youve watched it. New industry research proves productivity soars when the browser
decides when and how often you need a break from mundane chores. (The optimal schedule is remarkably like the ad cycle in a sitcom.)
Youll spend the day in the thrall of clever advertising executives rather than boring colleaguesand will work better because of it! How
great is that?
Refreshing new interfaces: Why bother spending loads of time with tricky interfaces that Microsoft is just going to be changing with
the next release? Thanks to multicore CPUs and new graphics engines, interfaces can change on the fly every 15 minutes. Will you work
with menus, icons, or voice recognition? Yes, yes, and yes, depending on the results of a clever randomization technique designed to keep
you guessing. A new Intermittent Interface of the Month is automatically installed with every security fix pack. Its gonna be exciting!
Hi-def iPods: Thanks to patented SVTScreen Virtualization Technologyyoull be able to watch movies stored on portable
devices in 3D high-definition on a virtual 100-inch screen anywhere you go. Just tap into your multiterabyte Storage Area Network and
slap on your 3D Video Helmet. A breakthrough known as DSTDynamic Screen Transparencywill even let you watch while you drive.
Now, thats livin large!
Speedier calls: When theres so much VoIP bandwidth at the ready, why should you listen to your caller a moment longer than you
have to? Special compression algorithms will accelerate speech on both ends without a trace of that chipmunk effect. Skeptics may
scoff, but experts say youll be able to finish conversations in half the time. Works with texting too: Sp dg? Its a productivity miracle!
Neural word processing: Who has time for typing? As our machines are crammed with formerly unimaginable power, youll just
think the word and itll appear on the screen. Gee, I wonder if its time for lunch. Is that eBay auction for the vintage Barry Bonds bat still
going on? I bet the boss is going to call one of those endless meetings. Have I got enough words to fill out this page? Some 500 words per
minuteand more! What an amazing productivity booster that will be!

- Anand final IT

Play with Knowledge...


ACROSS
3 An Internet ad format that appears in a pop-up window
between Web pages.
7 The first stateful firewall implemented in Linux.
9 A consortium of technology companies formed to develop
guidelines for use of XML and related information standards
10 Random data used to supplement encryption schemes
12 The individuals or the number of individuals who view a
Web site or its advertising.
13 One of seven new top-level domain names approved in 2000
by ICANN,meant for use with air-transport industryrelated Web sites.
15 A file that contains or defines other files.
18 __death grip A warm boot by pressing the Alt+Crl+Delete
keys.
DOWN
1 A person who uses the Internet as if addicted to it.

19 A security program designed to lure and distract a network


attacker with decoy data.

Our present: Pilotless flight

2 Code that enables 16-bit code to call 32-bit code, and vice versa.
4 An animated icon that moves while an application is completing a
task, such as a browser loading a Web page.
5 An advanced object-oriented programming language with a syntax
similar to C

8 A miniature version of an image or electronic version of a page


that is generally used to allow quick browsing through multiple
images or pages.
11 A program that automatically responds to e-mail messages or
performs actions based on commands within the messages
14 A metric prefix meaning 1024
16 A text-only Web browser program for UNIX platforms
17 An open source application server for publishing objects on the
Internet.

Our future: NASA Plans

ONLINE

6 Unauthorized distribution and use of a computer program.

27

2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
210987654321210987654321098765432109876543212109876543210987654321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
210987654321210987654321098765432109876543212109876543210987654321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
210987654321210987654321098765432109876543212109876543210987654321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
210987654321210987654321098765432109876543212109876543210987654321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
210987654321210987654321098765432109876543212109876543210987654321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
210987654321210987654321098765432109876543212109876543210987654321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
321098765432121098765432109876543210987654321
1
2211009988776655443322112211009988776655443322110099887766554433221100998877665544332211221100998877665544332211009988776655443
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
3
2
1
0
9
8
7
6
5
4
3
2
1
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
1
0
9
8
7
6
5
4
3
2
210987654321210987654321098765432109876543212109876543210987654321098765432121098765432109876543210987654321
1

- C.Merlin Sheena

- N.Sathyavathi final CSE

- S.Keerthana First Year

I
N
F
O

Q
U
E
S
T

The name of the drawing legends,


1 . Neelambari I Year BE CSE.
2.K.Ranjani III Year BE CSE.
3.M.S.Vanathi I Year BE CSE
4.Surya

123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789
123456789012345678901234567890121234567890123456789012345678901212345678901234567890123456789

ANALYSING THE ANNALS

O
n
l
i
n
e

- RESEARCH OF FIRST YEARS OF GCT

On line

CHOOSE YOUR DESTINY , LOGIN YOUR GOAL,


SEARCH YOUR QUEST , LAUNCH YOUR DREAMS
AND GATHER YOUR PRIDE.
WISH YOU ALL SUCCESS....
- FROM SENIORS

32

Вам также может понравиться