it archiveit archive file> beauty is truth's smile when she beholds her own face in a...

32
1 IT ARCHIVE IT ARCHIVE IT ARCHIVE IT ARCHIVE Executive Committee Chief Patron Chief Patron Chief Patron Chief Patron : Thiru. A .Venkatachalam B.Sc., Patron Patron Patron Patron : Dr. N. Raman M.B.A., M.Com., M.Phil., B.Ed., PGDCA., Ph.D., Editor in Chief Editor in Chief Editor in Chief Editor in Chief : Prof. D. Gayathri Devi M.C.A., M.Phil. Staff Advisor Staff Advisor Staff Advisor Staff Advisor Mr. S. Vijayakumar M.C.A., M.Phil., Assistant Professor, Department of M.C.A., Staff Editor Staff Editor Staff Editor Staff Editor Mrs. D. Gayathri Devi M.C.A., M.Phil., Professor& Head of the Department of M.C.A., Organizing Members rganizing Members rganizing Members rganizing Members Mr.Raffic Raja.R III-MCA Mr.Raj Kumar.D III-MCA Mr. Jagadeesh.M II-MCA. Mr. Karthikeyan.S II-MCA. Mr. Ramesh.L II-MCA. Mr. Arunkumar.G II-MCA. Mr. Vinoth II-MCA. Ms. Premalatha.K II-MCA. Ms. Poovizhi Selvi.C II-MCA. Mr. Senthil.V II-MCA. Words by Rabindranath Tagore > Beauty is truth's smile when she beholds her own face in a perfect mirror. > Don't limit a child to your own learning, for he was born in another time. > If you shut the door to all errors, truth will be shut out. NAVIGATOR VOL-25 Decision Support System 3 Linux Focus 10 Technologies - Quantum cryptography 16 Intellect Explore 20 Career Objectives 22 Windows 8 24 Company Profile 27 Tips and Tricks 29

Upload: others

Post on 01-Nov-2019

2 views

Category:

Documents


0 download

TRANSCRIPT

1

IT ARCHIVEIT ARCHIVEIT ARCHIVEIT ARCHIVE

Executive Committee

Chief PatronChief PatronChief PatronChief Patron : Thiru. A .Venkatachalam B.Sc.,

PatronPatronPatronPatron : Dr. N. Raman M.B.A., M.Com., M.Phil., B.Ed., PGDCA., Ph.D.,

Editor in ChiefEditor in ChiefEditor in ChiefEditor in Chief : Prof. D. Gayathri Devi M.C.A., M.Phil.

Staff AdvisorStaff AdvisorStaff AdvisorStaff Advisor

Mr. S. Vijayakumar M.C.A., M.Phil.,

Assistant Professor, Department of M.C.A.,

Staff EditorStaff EditorStaff EditorStaff Editor

Mrs. D. Gayathri Devi M.C.A., M.Phil.,

Professor& Head of the Department of M.C.A.,

OOOOrganizing Membersrganizing Membersrganizing Membersrganizing Members

Mr.Raffic Raja.R III-MCA Mr.Raj Kumar .D III-MCA Mr. Jagadeesh.M II-MCA. Mr. Karthikeyan.S II-MCA. Mr. Ramesh.L II-MCA. Mr. Arunkumar.G II-MCA. Mr. Vinoth II-MCA. Ms. Premalatha.K II-MCA. Ms. Poovizhi Selvi.C II-MCA. Mr. Senthil.V II-MCA.

Words by Rabindranath Tagore

> Beauty is truth's smile when she beholds her own face in a perfect mirror. > Don't limit a child to your own learning, for he was born in another time. > If you shut the door to all errors, truth will be shut out.

NAVIGATOR

VOL-25

Decision Support System 3

Linux Focus 10

Technologies

- Quantum cryptography 16

Intellect Explore 20

Career Objectives 22

Windows 8 24

Company Profile 27

Tips and Tricks 29

2

ACKNOWLEDGEMENT

We wish to thank Thiru. A .Venkatachalam B.Sc., Correspondent, Kongu Arts and Science

College, Erode and our Management for the support to publish the magazine. Dr. N. Raman

M.B.A., M.Com., M.Phil., B.Ed., PGDCA., Ph.D., Principal, Kongu Arts and Science College,

has provided considerable support to us during this effort. We proudly thank our Chief Editor,

Staff Advisor, Staff Editor, Staff members and the Students of Department of M.C.A for their

guidance and suggestions to complete the magazine.

3

DECISION SUPPORT SYSTEM

What is Decision Support System?

A Decision Support System (DSS) is a

collection of integrated software

applications and hardware that form the

backbone of an organization’s decision

making process. Companies across all

industries rely on decision support tools,

techniques, and models to help them assess

and resolve everyday business questions.

The decision support system is data-driven,

as the entire process feeds off of the

collection and availability of data to analyze.

Business Intelligence (BI) reporting tools,

processes, and methodologies are key

components to any decision support system

and provide end users with rich reporting,

monitoring, and data analysis.

History of Decision Support

Systems:

In the 1970s DSS was described as

"a computer based system to aid decision

making". Late 1970s the DSS movement

started focusing on "interactive computer-

based systems which help decision-makers

utilize data bases and models to solve ill-

structured problems".

In the 1980s DSS should provide systems

"using suitable and available technology to

improve effectiveness of managerial and

professional activities", and end 1980s DSS

faced a new challenge towards the design of

intelligent workstations.

Beginning in about 1990, data warehousing

and on-line analytical processing (OLAP)

began broadening the realm of DSS. As the

turn of the millennium approached, new

Web-based analytical applications were

introduced.

THE STRUCTURE OF

DECISIONS

Structured Decisions

A structured decision is one in which

all three components can be fairly well

specified, i.e., the data, process, and

evaluation are determined. Usually

structured decisions are made regularly and

therefore it makes sense to place a

comparatively rigid framework around the

decision and the people making it. An

example of this type of decision may be the

routine credit-granting decision made by

4

many businesses. It is probably the case that

most firms collect rather similar sets of data

for credit granting decision makers to use.

Unstructured Decisions

These decisions have the same

components as structured ones; however,

there is little agreement on their nature. For

instance, with these types of decisions, each

decision maker may use different data and

processes to reach a conclusion. In addition,

because of the nature of the decision there

may also be few people that are even

qualified to evaluate the decision. These

types of decisions are generally the domain

of experts in a given field

Semi-Structured Decisions

In the middle of the continuum are

semi-structured decisions, and this is where

most of what are considered to be true

decision support systems are focused.

Decisions of this type are characterized as

having some agreement on the data, process,

and/or evaluation to be used, but there is still

a desire not to place too much structure on

the decision and to let some human

judgment be used. An initial step in

analyzing which support system is required

is to understand where the limitations of the

decision maker may be manifested, i.e., will

it be in the data acquisition portion, or in the

process component, or possibly in the

evaluation of outcomes.

Components of a Decision Support

System:

Decision making, becoming a more and

more important and crucial aspect at every

step of the functioning of an organization.

The Decision Support System comprises

four major components, namely

• The user interface

• The database management systems

or DBMS

• Models and analytical tools

constituting a model based

management systems

• or MBMS and lastly the DSS

architecture and network.

Types of Decision Support Systems:

• Model-driven DSS

• Communication-driven DSS

• Data-driven DSS

• Document-driven DSS

5

• Knowledge-driven DSS

Model-driven DSS :

This type of DSS uses data and

parameters provided by users to assist

decision makers in analyzing a situation.

Parameters are provided by users for the

analysis of a situation.

Communication-driven DSS :

It supports more collaboration on a

shared task. Examples include integrated

tools like Microsoft's NetMeeting or

Groove.

Data-driven DSS :

It emphasizes manipulation of a

chronological series of corporate internal

data or occasionally, external data.

Document-driven DSS :

It manages and manipulates

unstructured information in from a variety of

electronic formats.

Knowledge-driven DSS :

It provides specialized problem

solving expertise stored as facts,

rules,procedures, or in similar structures.

Decision Making as a Component of Problem Solving

6

High-level Decision Support System

Requirements:

• Data collection from multiple

sources

• Data formatting and collation

• A suitable database location and

format built for decision support

based reporting and analysis

• Robust tools and applications to

report, monitor, and analyze the data

• Decision support systems have

become critical and ubiquitous

across all types of business. In

today’s global marketplace, it is

imperative that companies respond

quickly to market changes.

Companies with comprehensive

decision support systems have a

significant competitive advantage.

Applications

A specific example concerns the

Canadian National Railway system, which

tests its equipment on a regular basis using a

decision support system. A problem faced

by any railroad is worn-out or defective

rails, which can result in hundreds of

derailments per year. Under a DSS, CN

managed to decrease the incidence of

derailments at the same time other

companies were experiencing an increase.

A growing area of DSS application,

concepts, principles, and techniques is in

agricultural production, marketing for

sustainable development. For example, the

DSSAT4 package,[15][16] developed

through financial support of USAID during

the 80's and 90's, has allowed rapid

assessment of several agricultural

production systems around the world to

facilitate decision-making at the farm and

policy levels. There are, however, many

constraints to the successful adoption on

DSS in agriculture.

Decision Support Systems used by

people today

• Cow Culling

• Decision Net at Carnegie Mellon

University

• Tire Selector at Goodyear

• Redbrick Software

• Quest in Action

7

Why use a DSS

• Managers need to make decisions

from the knowledge available.

• DSS help to facilitate this need by

formatting data into forms.

• Enhances a manager’s ability to

work with one or more kinds of

knowledge.

Advantages of Decision Support

System

• Enhance effectiveness

• Improves personal efficiency

• Time saving

• Increase decision maker

satisfaction

• Speed up the process of decision

making

• Increases organizational control

• Encourages exploration and

discovery on the part of the

decision maker

• Speeds up problem solving in an

organization

• Facilitates interpersonal

communication

• Promotes learning or training

• Generates new evidence in

support of a decision

• Creates a competitive advantage

over competition

• Reveals new approaches to

thinking about the problem space

• Helps automate managerial

processes

Disadvantages of Decision Support

System

• Monetary cost is hike.

• Overemphasize decision process and

decision making.

• Assumption of relevance.

• Transfer of power from man to

machine.

• Unanticipated effects may overload

decision makers.

• Obscuring responsibility of the users

of decision support system.

• False belief in objectivity.

• Status reduction.

• Information overload.

Development Frameworks

DSS systems are not entirely

different from other systems and require a

structured approach. Such a framework

8

includes people, technology, and the

development approach

DSS technology levels (of hardware

and software) may include:

The actual application that will be

used by the user. This is the part of the

application that allows the decision maker to

make decisions in a particular problem area.

The user can act upon that particular

problem.

Generator contains hardware

/software environment that allows people to

easily develop specific DSS applications.

This level makes use of case tools or

systems such as Crystal, AIMMS, and

iThink.

Tools include lower level

hardware/software. DSS generators

including special languages, function

libraries and linking modules

An iterative developmental approach

allows for the DSS to be changed and

redesigned at various intervals. Once the

system is designed, it will need to be tested

and revised for the desired outcome.

DSS Key characteristics and

capabilities are:

• Supports decision makers in

semistructured and unstructured

problems.

• Supports managers at all levels.

• Supports individuals and groups.

• Supports interdependent or

sequential decisions.

• Support intelligence, design, choice,

and implementation.

• Supports a variety of decision

processes and styles.

• Should be adaptable and flexible.

• Should be interactive and easy to

use.

• Benefits exceed cost.

• Complete control by decision-

makers.

• Easy modification to suit needs and

changing environment.

• Supports modeling and analysis.

9

The future of DSS:

• Technological developments

continually allow for DSS tools

that are more effective: disk

storage,interactive operating

systems, enabled

spreadsheets,databases and

flexible modelling tools.

• Networks and

telecommunications enabled

group support and Executive

Information Systems(EIS).

Expert Systems theory and

technology enabled knowledge-

based DSS.

• It expresses that: “In future,

mobile tools, mobile e-services

and wireless Internet protocols

will mark the next set of

remarkable developments in

Decision Support Systems

(DSS),expanding the

accessibility of tools to decision-

makers where-ever they might

be.”

• It will be more accessible to the

global decision-maker because of

the popularity of the Web.

References

http://www.emeraldinsight.com/journals.htm?articleid=871027&show=html

http://en.wikipedia.org/wiki/Decision_support_system

http://www.gdrc.org/decision/dss-types.html

D.MYTHILI

II-MCA

10

LINUX FOCUS

Ubuntu

What is it?

• Ubuntu is a Linux-based

Operating System that is

open sourced (free)

• Pronounced (oo-BOON-too)

• Strong focus on usability and

ease of installation

History

Ubuntu is a fork of the Debian

project's codebase.

The original aim of the Ubuntu

team was to create an easy-to-use Linux

desktop with new releases scheduled on

a predictable six-month basis, resulting

in a more frequently updated system.

Ubuntu's first release was on 20

October 2004. Since then, Canonical has

released new versions of Ubuntu every

six months with commitment to support

each release for eighteen months by

providing security fixes, patches to

critical bugs and minor updates to

programs. It was decided that every

fourth release, issued on a two-year

basis, would receive long-term support

(LTS).

LTS releases were traditionally

supported for three years on the desktop

and five years on the server. However

with the upcoming release of Ubuntu

LTS 12.04, desktop support is to be

extended to a period of five years (April

2017) for LTS releases.

Support was extended to better

accommodate business and corporate IT

users of Ubuntu who operate on longer

release cycles and are more conscious of

the costs associated with frequent

software upgrades.

Why that name?

Ubuntu is an African concept

meaning “humanity toward others”

Sponsored by Canonical Ltd.

Owned by South African billionaire

Mark Shuttleworth

Why use it?

Huge group of “free software

proponents” (open source)

Ubuntu is free

11

Alternate to Windows and MAC OS’s

Ubuntu is most popular Linux-based OS

in the world (8 million now)

Dell now offers desktops with Ubuntu

Requirements

Last version – Feisty Fawn 7.04

Latest version – Gusty Gibbon 7.10

Next version – Hardy Heron 8.04 in

2011

256 KB RAM

4 GB hard drive space

Can be dual booted with current OS or

used from a live CD

Installation

Ubuntu Desktop 11.04

Ubuntu Desktop 11.04 started

from the Live CD with the Install

window open

Installation of Ubuntu is

generally performed with the Live CD or

can be installed via a Live USB drive.

The Ubuntu OS can be run

directly from the CD (sometimes with a

significant performance loss), allowing a

user to "test-drive" the OS for hardware

compatibility and driver support.

The CD also contains the

Ubiquity installer, which can then guide

the user through the permanent

installation process. CD images of all

current and past versions are available

for download at the Ubuntu web site.

Installing from the CD requires a

minimum of 256 MiB of RAM.

Users can download a disk image

(.iso) of the CD, which can then either

be written to a physical medium (CD or

DVD), or optionally run directly from a

hard drive (via UNetbootin or GRUB).

Ubuntu is also available on ARM,

PowerPC, SPARC, and IA-64 platforms,

although none are officially supported.

Canonical offered Ubuntu and

Kubuntu Live installation CDs of the

latest distribution of the operating

system at no cost (though discontinued

as of April 2011), including paid postage

for destinations in most countries around

the world (via a service called ShipIt).

Various third-party programs such as

remastersys and Reconstructor are

available to create customised copies of

the Ubuntu Live CDs.

12

A Microsoft Windows migration

tool, called Migration Assistant

(introduced in April 2007), can be used

to import bookmarks, desktop

background (wallpaper), and various

settings from an existing Windows

installation into a new Ubuntu

installation.

Ubuntu and Kubuntu can be

booted and run from a USB Flash drive

(as long as the BIOS supports booting

from USB), with the option of saving

settings to the flashdrive. This allows a

portable installation that can be run on

any PC which is capable of booting from

a USB drive. In newer versions of

Ubuntu, the USB creator program is

available to install Ubuntu on a USB

drive (with or without a LiveCD disc).

Variants

Ubuntu Desktop

It designed for desktop and laptop PCs.

The desktop edition can be also installed

using the alternate install CD which

uses the debian-installer and allows

performing certain specialist

installations of Ubuntu: setting up

automated deployments, upgrading from

older installations without network

access, LVM and/or RAID partitioning,

installs on systems with less than about

256 MiB of RAM.

Ubuntu Server

It made for use in servers. The server

install CD allows the user to install

Ubuntu permanently on a computer for

use as a server. It will not install a

graphical user interface.

Kubuntu is an official variant of the

Ubuntu distribution which uses the KDE

Plasma Workspaces.

There are many Ubuntu variants (or

derivatives) based on the official Ubuntu

editions. These Ubuntu variants install a

set of packages that differ from the

official Ubuntu distributions.

The variants recognized by Canonical as

contributing significantly towards the

Ubuntu project are the following:

• Edubuntu, a GNOME-based

subproject and add-on for Ubuntu,

designed for school environments

and home users.

• Kubuntu , a desktop distribution

using the KDE Plasma Workspaces

13

desktop environment rather than

GNOME.

Lubuntu , a lightweight distribution

using the LXDE desktop environment.

Mythbuntu, designed for creating a

home theater PC with MythTV and uses

the Xfce desktop environment.

Ubuntu Studio, a distribution made for

professional video and audio editing,

comes with higher-end free editing

software and is a DVD .iso image unlike

the Live CD the other Ubuntu

distributions use.

Xubuntu , a distribution based on the

Xfce desktop environment instead of

GNOME, designed to run more

efficiently on low-specification

computers.

COMMANDS

Privileges sudo command – run command as root

sudo -s – open a root shell

sudo -s -u user – open a shell as user

sudo -k – forget sudo passwords

gksudo command – visual sudo dialog

(GNOME)

kdesudo command – visual sudo dialog

(KDE)

sudo visudo – edit /etc/sudoers

gksudo nautilus – root file manager

(GNOME)

kdesudo konqueror – root file manager

(KDE)

passwd – change your password

Display

sudo /etc/init.d/gdm restart – restart X

and return to login (GNOME)

sudo /etc/init.d/kdm restart – restart X

and return to login (KDE)

(file) /etc/X11/xorg.conf – display

configuration

sudo dexconf – reset xorg.conf

configuration

Ctrl+Alt+Bksp – restart X display if

frozen

Ctrl+Alt+FN – switch to tty N

Ctrl+Alt+F7 – switch back to X display

System Services

start service – start job service (Upstart)

stop service – stop job service (Upstart)

status service – check if service is

running (Upstart)

/etc/init.d/service start – start service

(SysV)

14

/etc/init.d/service stop – stop service

(SysV)

/etc/init.d/service status – check service

(SysV)

/etc/init.d/service restart – restart

service (SysV)

runlevel – get current runlevel

Package Management

apt-get update – refresh available

updates

apt-get upgrade – upgrade all packages

apt-get dist-upgrade – upgrade with

package

replacements; upgrade Ubuntu version

apt-get install pkg – install pkg

apt-get purge pkg – uninstall pkg

apt-get autoremove – remove obsolete

packages

apt-get -f install – try to fix broken

packages

dpkg --configure -a – try to fix broken

packages

dpkg -i pkg.deb – install file pkg.deb

(file) /etc/apt/sources.list – APT

repository List

Network

ifconfig – show network information

iwconfig – show wireless information

sudo iwlist scan – scan for wireless

networks

sudo /etc/init.d/networking restart –

reset

network for manual configurations

(file) /etc/network/interfaces – manual

configuration

ifup interface – bring interface online

ifdown interface – disable interface

Special Packages

ubuntu-desktop – standard Ubuntu

environment

kubuntu-desktop – KDE desktop

xubuntu-desktop – XFCE desktop

ubuntu-minimal – core Ubuntu utilities

ubuntu-standard – standard Ubuntu

utilities

ubuntu-restricted-extras – non-free,

but useful

kubuntu-restricted-extras – KDE of

the above

xubuntu-restricted-extras – XFCE of

the above

build-essential – packages used to

compile programs

linux-image-generic – latest generic

kernel image

linux-headers-generic – latest build

headers

15

Firewall

ufw disable – turn off the firewall

ufw default allow – allow all

connections by default

ufw default deny – drop all connections

by default

ufw status – current status and rules

ufw allow port – allow traffic on port

ufw deny port – block port

ufw deny from ip – block ip address

Application Names

nautilus – file manager (GNOME)

dolphin – file manager (KDE)

konqueror – web browser (KDE)

kate – text editor (KDE)

gedit – text editor (GNOME)

System

Recovery - Type the phrase “REISUB”

while holding down Alt and SysRq

(PrintScrn) with about 1 second between

each letter. Your system will reboot.

lsb_release -a – get Ubuntu version

uname -r – get kernel version

uname -a – get all kernel information

S.KARTHIKEYAN

II-MCA

16

TECHNOLOGIES

Quantum cryptography

Quantum cryptography

describes the use of quantum mechanical

effects (in particular quantum

communication and quantum

computation) to perform cryptographic

tasks or to break cryptographic systems.

The use of classical (i.e., non-

quantum) cryptography to protect

against quantum attackersis also often

considered as quantum cryptography(in

this case, one also speaks of post-

quantum cryptography).

Well-known examples of

quantum cryptography are the use of

quantum communication to securely

exchange a key (quantum key

distribution) and the (hypothetical) use

of quantum computers that would allow

the breaking of various popular public-

key encryption and signature schemes

(e.g., RSA and ElGamal).

The advantage of quantum

cryptography lies in the fact that it

allows the completion of various

cryptographic tasks that are proven or

conjectured to be impossible using only

classical (i.e., non-quantum)

communication .

Quantum key distribution

Arguably the best-known

application of quantum cryptography is

quantum key distribution (QKD).QKD

describes the process of using quantum

communication to establish a shared key

between two parties (usually called

Alice and Bob) without a third party

(Eve) learning anything about that key,

even if Eve can eavesdrop on all

communication between Alice and Bob.

This is achieved (roughly

speaking) by letting Alice encode the

bits of the key as quantum data before

sending them to Bob; if Eve tries to learn

these bits, the messages will be disturbed

and Alice and Bob will notice.

QKD is possible without

imposing any computational

assumptions (that is, assumptions stating

that certain mathematical problems such

as factoring large numbers take very

17

long time to solve on a computer). One

also speaks of "unconditional security".

The only assumptions are that

the laws of quantum mechanics hold

(which is to a certain extent disputable

due to the difficulties of unifying

relativity theory and quantum

mechanics), and that Alice and Bob have

an authenticated channel, i.e., Eve

should not be able to impersonate Alice

or Bob as otherwise a man-in-the-middle

attack would be possible.

QKD is the only example of

commercially available quantum

cryptography.

Quantum commitment

A commitment scheme allows a

party Alice to fix a certain value (to

"commit") in such a way that Alice

cannot change that value any more while

still ensuring that the recipient Bob

cannot learn anything about that value

until Alice decides to reveal it. Such

commitment schemes are commonly

used in cryptographic protocols. In the

quantum setting, they would be

particularly useful: Crépeau and Kilian

showed that from a commitment and a

quantum channel, one can construct an

unconditionally secure protocol for

performing so-called oblivious transfer.

Oblivious transfer, on the other hand,

had been shown by Kilian to allow to

implement almost any distributed

computation in a secure way (so-called

secure multi-party computation

Bounded- and noisy-quantum-

storage model

One possibility to construct

unconditionally secure quantum

commitment and quantum oblivious

transfer (OT) protocols is to use the

bounded quantum storage model

(BQSM). In this model, we assume that

the amount of quantum data that an

adversary can store is limited by some

known constant Q. We do not, however,

impose any limit on the amount of

classical (i.e., non-quantum) data the

adversary may store.

In the BQSM, one can construct

commitment and oblivious transfer

protocols. The underlying idea is the

following: The protocol parties exchange

more than Q quantum bits (qubits).

Since even a dishonest party cannot store

all that information (the quantum

18

memory of the adversary is limited to Q

qubits), a large part of the data will have

to be either measured or discarded.

Forcing dishonest parties to measure a

large part of the data allows to

circumvent the impossibility result by

Mayers;[10] commitment and oblivious

transfer protocols can now be

implemented.

The protocols in the BQSM

presented by Damgård, Fehr, Salvail,

and Schaffner do not assume that honest

protocol participants store any quantum

information; the technical requirements

are similar to those in QKD protocols.

These protocols can thus, at least in

principle, be realized with today's

technology. The communication

complexity is only a constant factor

larger than the bound Q on the

adversary's quantum memory.

The advantage of the BQSM is

that the assumption that the adversary's

quantum memory is limited is quite

realistic. With today's technology,

storing even a single qubit reliably over

a sufficiently long time is difficult.

(What "sufficiently long" means depends

on the protocol details. By introducing

an artificial pause in the protocol, the

amount of time over which the adversary

needs to store quantum data can be made

arbitrarily large.)

Position-based quantum

cryptography

The goal of position-based

quantum cryptography is to use the

geographical location of a player as its

(only) credential. For example, one

wants to send a message to a player at a

specified position with the guarantee that

it can only be read if the receiving party

is located at that particular position.

In the basic task of position-

verification, a player Alice wants to

convince the (honest) verifiers that she is

located at a particular point. It has been

shown by Chandran et al. that position-

verification using classical protocols is

impossible against colluding adversaries

(who control all positions except the

prover's claimed position). Under

various restrictions on the adversaries,

schemes are possible.

Under the name of 'quantum

tagging', the first position-based

quantum schemes have been investigated

in 2002 by Kent. A US-patent was

19

granted in 2006, but the results have

only appeared in the scientific literature

in 2010. After several other quantum

protocols for position verification have

been suggested in 2010, Buhrman et al.

were able to show a general

impossibility result: using an enormous

amount of quantum entanglement,

colluding adversaries are always able to

make it look to the verifiers as if they

were at the claimed position. However,

this result does not exclude the

possibility of practical schemes in the

bounded- or noisy-quantum-storage

model (see above).

Post-quantum cryptography

In a predictive sense, quantum

computers may become a technological

reality; it is therefore important to study

cryptographic schemes that are

(supposedly) secure even against

adversaries with access to a quantum

computer. The study of such schemes is

often referred to as post-quantum

cryptography.

The need for post-quantum

cryptography arises from the fact that

many popular encryption and signature

schemes (such as RSA and its variants,

and schemes based on elliptic curves)

can be broken using Shor's algorithm for

factoring and computing discrete

logarithms on a quantum computer.

Examples for schemes that are, as of

today's knowledge, secure against

quantum adversaries are McEliece and

lattice-based schemes. Surveys of post-

quantum cryptography are available.

There is also research into how

existing cryptographic techniques have

to be modified to be able to cope with

quantum adversaries. For example, when

trying to develop zero-knowledge proof

systems that are secure against quantum

adversaries, new techniques need to be

used: In a classical setting, the analysis

of a zero-knowledge proof system

usually involves "rewinding", a

technique that makes it necessary to

copy the internal state of the adversary.

L.RAMESH

II-MCA

20

INTELLECT EXPLORE

SYNONYMS

1. ANALEPTIC

2. EFFACE

3. HYPOGRAM

4. ONTOLOGY

5. AGON

PUZZLES:

21

ANSWER

SYNONYMS

1. Restorative or stimulating.

2. To erase or to make one unaware of a thing.

3. A semantic or other pattern which calls attention to itself.

4. The study of ultimate being and universal truths.

5. Contestatory or conflictual

PUZZLES:

1. M

Working in rows, add together the numerical values of the left and right hand letters to give the numerical value of the central letter.

2. O

In each segment of the diagram are a pair of letters, one of which is the same distance from the start of the alphabet as the other is from the end.

3. K

The numerical values of the letters in opposite segments of the circle always add up to 17.

4. K

As you move down, the numerical value of the letters follows the sequence of Prime Numbers.

5. G

The numerical values of the letters in each row add up to 26 each time.

6. V

Starting at the top left, and moving anti-clockwise around the figure, letters advance through the alphabet 5 letters at a time.

7. U

Starting on the left, and moving along the line to the right, letters follow the alphabetic sequence, in steps of 1,2,3 and then 4, before repeating the sequence.

8. Y

Starting in the top left circle, and following a W pattern through the others, letters in corresponding segments of the circles follow the alphabetical sequence in steps of 4 letters.

K.KARTHIKA

II-MCA

22

CAREER OBJECTIVES

Tips for facing HR interview

1. Be well dressed, well maintained from

top to bottom.

2. Enter the interview room with positive

frame of mind.

3. Never try to bluff the interviewer. If

you do so then you will definitely be

trapped, because they have a vast

experience of testing the psychology of a

person.

4. First impression is the lasting (not

last) impression. It is very much

applicable for interview. So, when you

enter the room your body language must

be like a gentleman.

5. be confident & reply the answers.

Don't hesitate to accept your faults, if so.

6. Generally they ask your merits &

demerits. Here you have to be intelligent

while telling them about your demerits.

Represent your demerits like your

merits.

e.g., Demerit: I don’t want to sit ideal, I

always want to be busy in working. Etc.

7. Always believe that they are more

needy than you. Because companies

spend a huge amount in hiring the

candidates. By rejecting any good

resource like you, they are not going to

be benefited. They would be on looser

side.

The main things that you have to keep

in your mind are:

1)Have confidence in yourself.

2) Don’t get irritated.

3) Never say "i think....." because it

shows negative attitude

4) Always say the truth

5) Try to keep your positive points in

front of the HR

Some Interview Questions for Fresher’s

23

1. Tell me about yourself.

2. Why should I hire you?

3. What are your strengths and weaknesses?

4. Why do you want to work at our company?

5. What is the difference between confidence and over confidence?

6. What is the difference between hard work and smart work?

7. How do you feel about working nights and weekends?

8. Can you work under pressure?

9. Are you willing to relocate or travel?

10. What are your goals?

11. What motivates you to do good job?

12. What makes you angry?

13. Give me an example of your creativity.

14. How long would you expect to work for us if hired?

15. Are not you overqualified for this position?

16. Describe your ideal company, location and job.

17. What are your career options right now?

18. Explain how would be an asset to this organization?

19. What are your outside interests?

20. Would you lie for the company?

21. Who has inspired you in your life and why?

22. What was the toughest decision you ever had to make?

23. Have you considered starting your own business?

24. How do you define success and how do you measure up to your own definition?

25. If you won $10 million lottery, would you still work?

M.JAGADEESH

II-MCA

24

WINDOWS 8

Windows 8 is the codename for

the next version of the Microsoft

Windows computer operating

following Windows 7. It has many

changes from previous versions. In

particular it adds support for ARM

microprocessors in addition to the

previously supported x86

microprocessors from Intel and AMD.

A new Start Screen interface has

been added that was designed for

touchscreen input in addition to mouse,

keyboard, and pen input. It is said to be

released sometime around 2012

Microsoft has yet to announce the

release date.

NEW FEATURES

Windows 8 will contain a new

user interface based on Microsoft's

design language named Metro. With the

new change, the Start Menu was

replaced in favor for the new Start

Screen, where there are tiles that contain

shortcuts to applications, Metro style

applications, and updating tiles, similar

to Program Manager and Windows

Phone.

A new authentication method

allows users to sketch in three different

places over the picture to login, instead

of typing a password.

Windows Explorer now uses

a ribbon interface, similar to those used

in Microsoft Office applications.

Another feature expected to be

introduced in Windows 8 is native USB

3.0 support, without the need to load

drivers.

Windows 8 will come

with Windows Store, an online

marketplace for buying, selling, and

advertising applications.

Windows 8 can be run from a

USB-connected drive, such as a flash

drive. This feature is called Windows to

Go. It is intended for enterprise

administrators to provide users with a

Windows 8 image that reflects the

corporate desktop; pricing and licensing

details were not discussed when the

feature was announced.WTG is not

included in Windows 8 previews.

Windows 8 will support multiple

monitors with the new ability to natively

25

display different background images on

each display and customized taskbar(s)

on each of the connected displays.

The Developer Preview comes

with two new recovery functions.

Refresh and Reset,which both make a

complete restore easier than a re-

installation. The former keeps all the

settings and files of the user intact and

only reverses all changes to Windows

files to its original state while removing

all installed programs and apps. The

latter deletes all files and effectively re-

installs Windows, but without any

additional user input such as agreeing to

license agreements or selecting a hard

disk required. After a reset completes,

the user will be asked for the product

key and will then proceed to account

creation.

One big change is that user

accounts do not have to be local-only (or

from an Active Directory domain)

anymore but can be linked up to one's

Windows Live ID. This has the

advantage that users will not lose their

settings and files as they move from

their home computer to their work laptop

or to any other computer also using

Windows 8.

Other new features include a new

Welcome screen, a new packaged

application model called AppX that is

based on Silverlight, and Open, as well

as a setting to automatically adjust

window color to fit the wallpaper.

There is also a stripped down

"Immersive" version of Internet

Explorer, using the similar Metro-based

user interface of the mobile version of

Internet. The Immersive Version of

Internet Explorer 10 does not

support ActiveX plugins, in order to be

an HTML5-only browser. The Desktop

version of IE10 does support ActiveX

plugins.

A new "Hybrid Boot" option that

uses "advanced hibernation

functionality" on shutdown to allow

faster startup times.

A new version of Task

Manager with a redesigned user

interface is also present in pre-release

versions of Windows 8.

The text on the title bar of a

dialog box or a program's window is

centered.

26

Compatibility

Windows 8 for x86 processors

will run much software compatible with

previous x86 versions of Windows, with

the usual restrictions: 64-bit Windows

will run also 32-bit software but not 16-

bit ones; 32-bit Windows will optionally

run 16-bit software if installed to do so,

but will not run 64-bit software. Either

32- or 64-bit Windows can be installed

on x86-64 processors. Some expertise in

manipulating compatibility settings may

be required to run, for example, 16-bit

software for Windows 3.x under 32-bit

Windows 8, in cases where it is possible.

In particular, applications compatible

with 32- and 64-bit Windows 7 will run

in the same way on Windows 8.

Windows 8 for ARM processors

will not run software created for x86;

software will have to be ported by its

developers to create ARM

executable from source code.

Windows 8 Developer Preview is

incompatible with some virtualization

platforms, such as Virtual PC. A blog

post by Microsoft notes that the setup

process is error-prone when installing in

a virtual machine, and installing

without hardware virtualization support

can be particularly problematic.

It is reported to work

under VMware Workstation, VMware

Player, and Virtual Box — detailed

instructions for installing in these

environments have been published.

G.ARUNKUMAAR

II-MCA

27

COMPANY PROFILE

Cognizant Technology Solutions

Cognizant is a global leader in

business and technology services that

helps clients bring the future of work to

life-today-in a business environment that

is being transformed by accelerating

globalization, virtualization, and the shift

toward cloud technologies.

Founded in 1994

Company Highlights

1994: Started as the technology arm of

The Dun & Bradstreet Corporation

1996: Began adding third-party clients

and servicing the best across industry

segments

1998: Became first IT company

leveraging India to be listed on the

NASDAQ

2002: Became the first company to be

assessed enterprise-wide against mature

industry-process certifications, such as

P-CMM level 5, BS 7799, SEI-CMMi

Level 5

2004: Acknowledged as a leading

provider of IT services by industry

analysts such as Gartner, Forrester,

AMR and IDC; added to the prestigious

NASDAQ 100 Index

2006: Became the fastest global IT

services company to reach a $1 billion

run-rate (under 12 years)

2007: Acquired MarketRx, Inc., a

leading provider of analytics and related

software services to global life sciences

companies; crossed $2 billion revenue

threshold

2008: Entered Fortune 1000; established

global systems-integration relationship

with T-Systems; formally inaugurated

nearshore delivery centers in Argentina

and Hungary; exceeded $2.8 billion

revenue mark

2009: Joined Fortune's "Most Admired

Companies" list; named to

BusinessWeek 50 list of the top-

performing U.S. companies for third

consecutive year; named to Forbes "25

Fastest Growing Technology Companies

In America" list for sixth straight year

2010: Selected for Fortune’s “Most

Admired Companies” list for the second

28

year in a row; placed in Top 5 for IT

services

Services

Cognizant provides a range of

information technology, consulting and

Business Processing Outsourcing (BPO)

services, including Business and

Technology Consulting, Complex

Systems Integration, Application

Development and aintenance, Business

Process Outsourcing, IT Infrastructure

Services, Analytics, Web Analytics,

Business Intelligence, Data

Warehousing, CRM and social

CRM,Supply Chain Management,

Engineering Management

Solutions, ERP, R&D Outsourcing,

and Testing solutions.

The company's revenue from IT

services is split roughly evenly between

application development (which is

considered discretionary spend and

hence arguably more susceptible to the

economic climate) and application

maintenance.

Management

Executive Team

Lakshmi Narayanan - Vice Chairman

Francisco D'Souza - President & Chief

Executive Officer

Gordon Coburn - Chief Financial &

Operating Officer

Chandra Sekaran - President &

Managing Director, Global Delivery

Rajeev Mehta - Chief Operating

Officer, Global Client Services

VINOTH

II-MCA

29

TIPS AND TRICKS

NOTEPAD TRICKS

You can make the notepad open

continuously with non-stop...

@ECHO off

:top

START

%SystemRoot%\system32\notepad.exe

GOTO top

Save the file as “non-stop.bat”

Just do it in your friend’s computer

& make them frustrate

Note: – This may even lead to hanging

of some computers..!!

Repeated messages in the notepad, by

following this simple notepad tricks

@ECHO off

:Begin

msg * Hai

msg * How are you dear….

msg * I am fine ya!

msg * Lets have fun together!

msg * Because you have been o-w-n-e-d

GOTO BEGIN

And Save it as “Anything.BAT”

A simple notepad tricks to download

unlimited from Rapidshare,

Megaupload file sharing websites.

@echo off

echo ipconfig /flushdns

ipconfig /flushdns

echo ipconfig /release

ipconfig /release

echo ipconfig /renew

ipconfig /renew

And save it as “technoskillonline.bat”

Now click on this file every time you

download a file from Rapidshare and

Megaupload

How to create fake virus in your

computer

@echo off

C:

cls

echo hello

pause

echo im a virus

pause

echo hurray !! im become a hacker

pause

30

Save the file as “.bat” extension

For example if your file name is “virus”

save it as “virus.bat”

You can make your cd-drive to open

& close repeatedly by using a

simple notepad tricks

Set oWMP =

CreateObject(“WMPlayer.OCX.7″)

Set colCDROMs =

oWMP.cdromCollection

do

if colCDROMs.Count >= 1 then

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

End If

wscript.sleep 5000

loop

Save it as “im mad.VBS”.

Now watch that your cd-drive has

become MAD…!

Make your keyboard keys to type

continuously (non-stop)

Just type this code in notepad

MsgBox “stop me..! if you can”

Set wshShell

=wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{bs}”

loop

Save it as “ghostrider.VBS”

Toogle capslock continiously

Set wshShell

=wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{CAPSLOCK}”

loop

Save it as “blink.VBS”.

Now watch that capslock led will blink

continuously…

31

Convey your friend a message and shut down his/ her computer.

@echo off msg * I don’t like you shutdown -c “Hahahah You are Doomed” –s

Notepad Trick - BUSH HID THE FACTS

Open notepad.

Type BUSH HID THE FACTS

Save that file.

Close it

Open It Again See…

Notepad Trick to Format Hard disk

Open Notepad and type:

a) Code: 01001011000111110010010101010101010000011111100000

b) Save as it as anything.EXE

c) Run it. Beware that the entire HDD will be erased

Notepad trick to use it as a Diary

Open notepad

Type .LOG

Save the file as LOG.txt

Write anything in it and it will be saved with the time when you edit it.

Notepad Trick to Lock Folders

Let’s lock a folder using notepad trick which is named as PICS in your D: drive, whose path is D: PICS

Then the code should be something like this: ren pics pics.{21EC2020-3AEA-1069-A2DD-08002B30309D}

Pics are your folder name. Use the name of the folder in place for pics. Save the text file as lock.bat in the same drive.

To unlock this locked folder:

Open another new notepad text file and type the following: ren pics.{21EC2020-3AEA-1069-A2DD-08002B30309D} pics

Save the text file as key.bat in the same drive. Here again, pics is the name of the folder. Change it to the folder name you want to lock it.

K.PREMALATHA

II-MCA

32

MONTHLY EVENT GIST

News Bulletin

Current Bulletin in IT is displayed at Notice Board Daily and Uploaded in the

www.kasc.ac.in website at the end of every Semester.

Events

Placement Assessment Test for II-MCA assessed by Indiacan Education Private

Limited, Erode on 05-12-2011.