Anda di halaman 1dari 54

1

Message From The Chairman’s Desk

My hearty congratulations to the Department of Computer Application


for emerging successful in their National Level Technical Symposium
Heuriskein 10i. I am confident that the symposium would be a platform to
share knowledge, to learn and grow and also to bring forth technical
innovations.

It gives me immense pleasure to see the post-graduate students


successfully advancing in all aspects. My best wishes to the faculty and the
students for their contribution towards the success of the event. I also wish
the participants success in all their endeavors.

Best Wishes

Shri M. V. Muthuramalingam

2
Message From the CEO’S Desk

I am indeed delighted to note that the Department of Computer


Application is coming out with their National Level Technical Symposium,
HEURISKEIN 10i, which has been organized to show case the talents of
young software professionals. ”Nothing is too small to know and known, too
big to attempt”, is an anonymous statement that is unanimously greeted by
everyone. The innovation and technical break thought of the future are more
likely to emerge from convergence of different disciplines. So it is essential
that the students of Management science and technology adopt a multi-
discipline approach.

I would like to congratulate the HOD, Staff Members and our


industrious students for the efforts they have put in to bring out this technical
masterpiece. I hope that Heuriskein’10i will open new vistas in Computer
Science and Technology and thus set new standards for others to explore and
emulate.

Best wishes,

Shri, M.V.M. Velmurugan

3
Message From The Principal’s Desk

It is gratifying to know that the Department of Computer Applications


is launching a souvenir in the occasion of the inaugural of Heuriskein10i. I
wish that Heuriskein10i will be a meaningful opportunity to exhibit your
talents and academic excellence. The Symposium offers many opportunities
to discover new arenas and innovations among the youth of today.

I hope all the competitions, presentations and discussion in various


events will be useful to each participant. These efforts will undoubtedly
benefit all of us, enabling us to explore new fields and attain excellence in the
pursuit of our technical innovative measures.

Best Wishes,

Dr. K. Thirunavukkarasu

4
Message From The HoD’s Desk

I am personally thankful to the management of Velammal Engineering


College for having consented for “HEURIKEIN 10i”. I also congratulate the
faculty and students of the department for making this event a memorable
one and systematically planning every detail to perfection.

The expansion of technical education is evident everywhere in our


society and there are great challenges to be met in maintaining the quality of
the system. Any step taken towards facing and accomplishing these challenges
deserves apt recognition. I strongly believe that the Souvenir, which is a sign
of quality technical work, could not have been made possible without the
effective contribution and dedication of the students of the Department.

I wish every participant of this event success in their future endeavors


and I am sure they will carry with them lingering memories of the rich
knowledge and experience acquired through this talent show.

Best wishes,

Dr. E.R. Naganathan

5
ORGANIZING COMMITTEE
Chief Patron : Shri.M.V.Muthuramalingam ,Chairman

Patron : Shri.M.V.M.Velmurugan, CEO

Dr.K.Tirunavukkarasu , Principal

Shri.M.Jaganathan, Advisor

Convenor : Dr.E.R.Naganathan, Prof. & Head of the Department

Staff Co-Ordinators

Steering Chair:
Mr. Bhupathiraju Asst. Prof.
Ms. P. Usha Madhuri Asst. Prof.
Publicity Chairs:
Finance Chairs: Ms. A. Priya, Asst. Prof L2
Ms.Madhumidha, Asst. Prof L3 Mr K.M. Parthiban, Asst. Prof
Mr R.Senthil kumar, Asst. Prof Mr B. Muralidharan, Asst. Prof
Mr.Bupathiraju, Asst. Prof L1
Local Arrangements:
Program Chairs: Mr. P. Deivendran, Asst. Prof
Mr V. Jeyabalaraja, Prof Mr. R. Naranaya Swamy, Asst. Prof
Ms. M. Shanthi, Asst. Prof
Ms. V.S. Abbirami, Asst. Prof Technical Assistants :
Ms. S. Augustina Mary Asst. Prof Mr.V.Suresh
Ms. G. Malathi Asst. Prof Ms. P.Pushpa
Ms.R.M.Chamundeeswari,Asst.Prof
Ms. B. Kavitha Asst. Prof L2
Mr. R. Boopathy Asst. Prof

6
Student Co-Ordinators

President: T.N Deepak Kumar


Sakthivel
M.Sc (CT)-Vyr: M.Sc (CT)-IIyr:

K.Naresh Swathy Lakshmi


A.Praveen Periyasamy K.Balaji
K.S.Jeyakavya
V.PooranaSoundari MCA –III yr
S.Priya
S.Thenmozhi Vijayalakshmi
S.Sowmya S.Anand
K.V .Yogaraj
M.Sc (CT)-IVyr: Prabushankar
Vivekanandan
K.Vilasni D.Praveen Kumar
Sonali malthkar A.Lokesh Kumar
P. Deepika
S.Karthik MCA - II yr
S. Benin Stephen
R. Kamaleshwaran Anu priya
V.Priya B.Rajeev
M.Asha K.Ganesh
Aashlesh M. Rao D.P.Jegan Kumar
D. Sudharsan K.Paneer Selvam
K.S.Ashwin kumar R.Niranjana
R. Poongulazhi V.B.Arun Anandraj
L. Saranya

M.Sc (CT)-IIIyr:

Rajalakshmi
Dinesh And peoples behind the screen. . . . .

7
Contents

Technical

Microsoft crazy facts 9


The Amazing Facts of the Letter ‗A‘ 11
Green Computing 13
Technology Facts 15
Puzzles 16
Using Java to view System Properties 20
As Long As 23
How to Make Computer Operating System 24
Riddles 28
Quotations in White House 31
Computer Facts 33
Windows Shortcut Keys 34
Bot and Botnet 37
Dreams 39
Some Facts 40
Interesting but Little known Facts about Google 42
vl;lhtJ gpwtp 44

HEURISKEIN‘10i 8
MICROSOFT CRAZY FACTS

MAGIC #1

Nobody can create a FOLDER anywhere on the computer which can be named as
"CON".

―This is something pretty cool...and unbelievable...At Microsoft the


whole Team, couldn’t answer why this happened!”

TRY IT NOW, IT WILL NOT CREATE "CON" FOLDER


Reason: In windows the folder name and the special system variables share
the same interface, so when you create a folder with a system variable name it will
consider that folder already exist!!
these special system variables are available irrespective of path
You cannot create a folder with these names also:
CON, NUL, COM1, COM2, COM3, LPT1, LPT2, LPT3,COM1 to COM9
and LPT1 to LPT9....
CON means console, COM1 means serial port 1, and LPT1 means parallel port 1

MAGIC #2
Try it out.
Open Microsoft Word and type
‖=rand (200, 99)‖
and then press ENTER
―This is something pretty cool and neat...and unbelievable...At
Microsoft the whole Team, including Bill Gates, couldn’t answer why
this happened!”

Reason: Its not just =rand(200,99), in ms word u type same command and
replace 99 with any number below 100, u will get the result. 99 stands for Column,
how many times the sentence must be repeated in each line. that‘s it.. 200 is a

HEURISKEIN‘10i 9
code, call for FONT demo sentence, specially used for testing printers.
Type =rand(200,0) u will get only 5 blank pages...

MAGIC #3
For those of you using Windows, do the following:
1. Open an empty notepad file
2. Type "Bush hid the facts" (without the quotes)
3. Save it as whatever you want.
4. Close it, and re-open it.
is it just a really weird bug?
You can try the same thing above with another sentence "this app can break.

V. Pooranasoundari
(M.Sc.CT v yr)

S.P. Chandra sekar(Charted eng M I E)


C.V. Krishna Kumar(M.S, Phd)

WCT/// WEAR COTE TECHNOLOGIES

Speciality Heat Treaters


Nitridium, Boron zing, Vandalizing, Chromizing, Antifriction Coating, Thermal
Coating

Wear coat technologies


No.60, SIDCO Industrial Estate
Kakalur, Thiruvallur- 602 103
Mobile: +91(0) 94441 76414/93813 82404
E-mail: wearcote@gmail.com

HEURISKEIN‘10i 10
THE AMAZING FACTS OF THE LETTER “A”

 You have to be at least 58.5 inches to be an astronaut.


 Unique animals. Hippopotami cannot swim, whales can't swim backwards,
tarantulas can't spin webs, crocodiles can't chew and hummingbirds can't
walk.
 Ants
Ants make up 1/10 of the total world animal tissue.
An ant can survive for up to two days underwater.
The animal with the largest brain in proportion to its size is the ant.
Ants dont sleep.
Ants taste like sweet tarts.
 Americans on average eat 18 acres of pizza every day.
 The weight of air in a milk glass is about the same as the weight of one
aspirin.
 The gases emitted from a banana or an apple can help an orange ripen.
 Adolph Hitler was a vegetarian, and had only 1, and i repeat, ONE,
testicle.
 Al Gore and Tommy Lee Jones were once roommates. Thanx Rebecca
 Australia has no native monkeys.
 Australia's box jellyfish has toxins more potent than the venom in cobras,
and is one of the most dangerous jellyfish in the world.
 Apparently 1/3 of people with alarm clocks hit the 'snooze' button every
morning, and from 25-34 age group, it is over 1/2.
 Hans Christian Anderson, creater of fairy tales, was word-blind. He never
learned to spell correctly, and his publishers always had errors.
 On average, Americans spend about 6 months of their lives waiting at red
traffic lights.

HEURISKEIN‘10i 11
 There is air in space, but very little of it. In fact, it is equivalent to a
marble in a box 5 miles wide. Most of the gas is captured by the
gravitational pull of other celestial bodies.
 Abdul Kassam Ismael, Grand Vizier of Persia in the tenth century, carried
his library with him wherever he went. Four hundred camels carried the
117,000 volumes.

N.R.KALAIVANI&
R.D.THIRIVENI
(M.Sc. CT V yr)

V. Nandakumar
(Director)

MILLENNIUM
Millennium Soft-Tech (India) Pvt. Ltd.
No. A-3, Nand Kishore Indl Estate,
Off- Mahakali Caves Road, Andheri (East), Mumbai – 4000093
Call: (+91 22) 2687 0202 mobile: (+91) 9841022773
e-mail: nandu@millenniumindia.co.in

HEURISKEIN‘10i 12
GREEN COMPUTING

Green computing or green IT, refers to environmentally sustainable


computing or IT. The field of green computing is “the study and practice of
designing, manufacturing, using, and disposing of computers, servers, and
associated subsystems—such as monitors, printers, storage devices, and
networking and communications systems—efficiently and effectively with
minimal or no impact on the environment."

OPERATING SYSTEM SUPPORT

The dominant desktop operating system, Microsoft Windows, has included


limited PC power management features since Windows 95. These initially
provided for stand-by (suspend-to-RAM) and a monitor low power state. Further
iterations of Windows added hibernate (suspend-to-disk) and support for the ACPI
standard. Windows 2000 was the first NT based operation system to include
power management. This required major changes to the underlying operating
system architecture and a new hardware driver model. Windows 2000 also
introduced Group Policy, a technology which allowed administrators to centrally
configure most Windows features. However, power management was not one of
those features. This is probably because the power management settings design
relied upon a connected set of per-user and per-machine binary registry values,
effectively leaving it up to each user to configure their own power management
settings.

This approach, which is not compatible with Windows Group Policy, was
repeated in Windows XP. The reasons for this design decision by Microsoft are
not known, and it has resulted in heavy criticism Microsoft significantly improved
this in Windows Vista by redesigning the power management system to allow
basic configuration by Group Policy. The support offered is limited to a single per-

HEURISKEIN‘10i 13
computer policy. The most recent release, Windows 7 retains these limitations but
does include refinements for more efficient user of operating system timers,
processor power management, and display panel brightness. The most significant
change in Windows 7 is in the user experience.

MATERIALS RECYCLING

Recycling computing equipment can keep harmful materials such as lead,


mercury, and hexavalent chromium out of landfills, and can also replace
equipment that otherwise would need to be manufactured, saving further energy
and emissions. Computer systems that have outlived their particular function can
be re-purposed, or donated to various charities and non-profit organizations.
Computing supplies, such as printer cartridges, paper, and batteries may be
recycled as well.

A drawback to many of these schemes is that computers gathered through


recycling drives are often shipped to developing countries where environmental
standards are less strict than in North America and Europe.

The recycling of old computers raises an important privacy issue. The old
storage devices still hold private information, such as emails, passwords and credit
card numbers, which can be recovered simply by someone using software that is
available freely on the Internet. Deletion of a file does not actually remove the file
from the hard drive. Before recycling a computer, users should remove the hard
drive,and physically destroy it or store it somewhere safe. There are some
authorized hardware recycling companies to whom the computer may be given for
recycling, and they typically sign a non-disclosure agreement.

- S.THENMOZHI,
S.SOWMYA
(MSc CT V yr)

HEURISKEIN‘10i 14
TECHNOLOGY FACTS

A small airplane can fly backwards.


A car operates at maximum economy, gas-wise, at speeds between 25 and
35 miles per hour.
About 39,000 gallons of water are used to produce the average car.
Any modern jet is capable of breaking the sound barrier.
Castor oil is used as a lubricant in jet planes.
Contrary to popular belief, putting sugar in a car's gas tank will NOT ruin
its engine.
It takes six months to build a Rolls Royce and 13 hours to build a Toyota.
Kleenex tissues were originally used as filters in gas masks.
More steel in the United States is used to make bottle caps than to
manufacture automobile bodies.
Originally, BMW was an airplane engine manufacturer.
The average car produces a pound of pollution every 25 miles.
The cigarette lighter was invented before the match.
The electric chair was invented by a dentist.
The first alarm clock could only ring at 4 a.m.
To have your picture taken by the very first camera you would have had to
sit still for 8 hours.
Windmills always turn anti-clockwise. Except for the windmills in Ireland.

B.RAJEEV
(IIMCA)

HEURISKEIN‘10i 15
PUZZLES

1. THE OLDEST PLAYS THE PIANO:

Two MIT math grads bump into each other while shopping at Fry‘s. They
haven't seen each other in over 20 years.

First grad to the second: "How have you been?"

Second: "Great! I got married and I have three daughters now."


First: "Really? How old are they?"
Second: "Well, the product of their ages is 72, and the sum of their ages is the
same as the number on that building over there..."
First: "Right, ok... Oh wait... Hmm, I still don't know."
Second: "Oh sorry, the oldest one just started to play the piano."
First: "Wonderful! My oldest is the same age!"

How old was the first grad‘s daughter?

2. THE ROPE BRIDGE:

Four people need to cross a rickety rope bridge to get back to their camp at
night. Unfortunately, they only have one flashlight and it only has enough light
left for seventeen minutes. The bridge is too dangerous to cross without a
flashlight, and it‘s only strong enough to support two people at any given time.
Each of the camper‘s walks at a different speed. One can cross the bridge in 1
minute, another in 2 minutes, the third in 5 minutes, and the slow poke takes 10
minutes to cross. How do the campers make it across in 17 minutes?

3. ANTS ON A TRIANGLE:

There are three ants on a triangle, one at each corner. At a given moment in
time, they all set off for a different corner at random. What is the probability that
they don't collide

4. 100 DOORS IN A ROW:

You have 100 doors in a row that are all initially closed. you make 100
passes by the doors starting with the first door every time. the first time through
you visit every door and toggle the door (if the door is closed, you open it, if its
open, you close it). The second time you only visit every 2nd door (door #2, #4,

HEURISKEIN‘10i 16
#6). The third time, every 3rd door (door #3, #6, #9), etc, until you only visit the
100th door. What state are the doors in after the last pass? Which are open which
are closed?

ANSWERS:

SOLUTION 1:

The possible ages (factors of 72) and their sums are shown below:

Ages: Sum of ages:


1 1 72 74
1 2 36 39
1 3 24 28
1 4 18 23
1 6 12 19
189 18
2 2 18 22
2 3 12 17
249 15
266 14
338 14
346 13

We can deduce from the man‘s confusion over the building number that
this wasn‘t enough information to solve the problem. The chart shows the sum 14
twice for two different age possibilities, which would explain how knowing the
building number alone would not have given him the answer. The clue that the
―oldest one‖ started to play the piano rules out ―2 6 6‖ as an answer, because there
is no ―oldest‖. Since the first grad was certain with the piano clue, the first grad‘s
oldest daughter is 8. I‘ll leave it up to the reader to figure out why this doesn‘t
necessarily mean the second grad‘s oldest daughter was also 8.

SOLUTION 2:

To get everyone across in 17 minutes, we need get the two slowest people
across together; otherwise we are wasting too much time. Once we get them
across, how do we not make one of them walk back with the flashlight? Just have
one of the faster people already there waiting to sprint the flashlight back across.

HEURISKEIN‘10i 17
person A: 1 minute
person B: 2 minutes
person C: 5 minutes
person D:10 minutes

1. A & B cross. total time: 2 minutes.

C |==========================| A
D| |B
|==========================| flashlight

2. B comes back. total time: 4 minutes.

C |==========================| A
D| |
B |==========================| flashlight

3. C & D cross. total time: 14 minutes.

B |==========================| A
| |C
|==========================| D flashlight

4. A comes back. total time: 15 minutes.

A |==========================| C
B| |D
|==========================| flashlight

5. A & B cross. total time: 17 minutes.

|==========================| A
| |B
|==========================| C D flashlight

HEURISKEIN‘10i 18
SOLUTION 3:

Consider the triangle ABC. We assume that the ants move towards different
corners along the edges of the triangle.

Total no. of movements: 8 A->B, B->C, C->A A->B, B->A, C->A A->B, B->A,
C->B A->B, B->C, C->B A->C, B->C, C->A A->C, B->A, C->A A->C, B->A, C-
>B A->C, B->C, C->B .Non-colliding movements: 2 A->B, B->C, C->A A->C,
B->A, C->B (i.e. the all ants move either in the clockwise or anti-clockwise
direction at the same time) P(not colliding) = 2/8 = 0.25

SOLUTION 4:

You can figure out that for any given door, say door #42, you will visit it
for every divisor it has. So 42 have 1 & 42, 2 & 21, 3 & 14, 6 & 7. so on pass 1 i
will open the door, pass 2 I will close it, pass 3 open, pass 6 close, pass 7 open,
pass 14 close, pass 21 open, pass 42 close. For every pair of divisors the door will
just end up back in its initial state. So you might think that every door will end up
closed? Well what about door #9. 9 have the divisors 1 & 9, 3 & 3. but 3 is
repeated because 9 is a perfect square, so you will only visit door #9, on pass 1, 3,
and 9... leaving it open at the end. Only perfect square doors will be open at the
end.

S.PRIYA

(M.Sc.CT V yr)

HEURISKEIN‘10i 19
USING JAVA TO VIEW SYSTEM PROPERTIES.

import java.io.*;
class sample
{
public static void main(String arp[])
{
System.out.println("Getting the system properties using JAVA code");
System.out.println("---------------------------------------------");
String ss=System.getProperty("user.dir");
System.out.println("\nCurrent User Directory\t\t"+ss);
ss=System.getProperty("user.home");
System.out.println("\nCurrent User Home Directory\t\t"+ss);
ss=System.getProperty("awt.toolkit");
System.out.println("\nJava awt tool kit Details\t\t"+ss);
ss=System.getProperty("file.encoding");
System.out.println("\nJava Encoding Details\t\t"+ss);
ss=System.getProperty("file.encoding.pkg");
System.out.println("\nJava File Encoding Packages\t\t"+ss);
ss=System.getProperty("java.class.path");
System.out.println("\nJava Class Path Environment\n"+ss);
}
}

HEURISKEIN‘10i 20
OUTPUT

Other System Properties:

The following table lists the Java system properties for the supported versions of
the Java 2 Software Development Kit (J2SDK), Standard Edition:

J2SDK, version 1.3


J2SDK, version 1.4

Character that separates components of


"file.separator" a file path. This is "/" on UNIX and
"\" on Windows.

Path used to find directories and JAR


archives containing class files.
"java.class.path" Elements of the class path are
separated by a platform-specific
character specified in the

HEURISKEIN‘10i 21
path.separator property.

Installation directory for Java Runtime


"java.home"
Environment (JRE)

"java.vendor" JRE vendor name

"java.vendor.url" JRE vender URL

"java.version" JRE version number

Sequence used by operating system to


"line.separator"
separate lines in text files

"os.arch" Operating system architecture

"os.name" Operating system name

"os.version" Operating system version

Path separator character used in


"path.separator"
java.class.path

"user.dir" User working directory

"user.home" User home directory

"user.name" User account name

YOGARAJ
(III MCA)

HEURISKEIN‘10i 22
AS LONG AS
Words are long as long as
dictionaries are known.....
God is long as long as
faith persist......
Age is long as long as
we count.....
Dreams are long as long as
we sleep....
Womb is strong as long as
the fetus grows.......
Earth is strong as long as
calamities occurs.....
Life is long as long as
we breathe.....
Love is long as long as
we feel......
Tears are strong as long as
the heart melts.....
Rivers are long as long as
they merge into ocean........
Thorns are long as long as
flowers are blossomed.....
Day is long as long as
sun shines.......
Night is long as long as
moon is visible.......
Every wishes are long as long as

HEURISKEIN‘10i 23
they are satisfied......
Journeys are long as long as
destination is known......
Problems are long as long as
solutions are found.....
Emotions are long as long as
weak heart persist.......
Heart is strong as long as
they are particle.......
Conscious is meaningful as long as
they are truthful.....
Soul is potentialised as long as
they know the stuff of life......
Death is long as long as
the soul rest........
This page is long as long as
you read ...............

R.G.SARANYA
(M.Sc.CT V yr)

HOW TO MAKE A COMPUTER OPERATING SYSTEM

An Operating System tells the computer what to do. Whether the ones you have
found don't measure up, or if you are a hobbyist wanting to have a creation to call
your own, it can be a daunting task and it may take years to get your own
operating system to be of any use. Remastering an existing Linux distro can also
be straight forward and easy. An operating system is a piece of software to

HEURISKEIN‘10i 24
manage and interact with the hardware effectively and provides a shell for other
programs to run on.

STEPS:
STEP 1: Decide what you want your OS to do: Whether it is a fully capable OS
with a GUI or something a bit more minimalistic, you'll need to know what
direction you are taking it before beginning.

STEP 2: Target what processor platform your operating system will support. If
you are not sure, your best bet is to target the X 86 (32 bit) processor platforms as
most computers use X86 platform processors.

STEP 3: Decide if you would rather do it all yourself from the ground up, or if
there is an existing kernel you would like to build on top of. Linux from Scratch is
a project for those that would like to build their own Linux distro.

STEP 4: Decide if you're going to create your own bootloader or a pre-created one
such as GRUB. While coding your own bootloader will give a lot of knowledge of
the hardware and the BIOS, it may set you back on the programming of the actual
kernel.

STEP 5: While it is possible to create an operating system in a language such as


Pascal or BASIC you will be better off using C or Assembly. Assembly is
absolutely necessary as some vital parts of an operating system require it. C++
contains keywords that need another fully built OS to run. Don't use it.

STEP 6: Start small. Begin with small things such as displaying text and
interrupts before moving on to things such as memory management and
multitasking.

HEURISKEIN‘10i 25
STEP 7: Decide on your API. While this is a long way off it is a good idea to plan
ahead. A good API to choose is POSIX, which is well documented. All Unices
have at least partial support for POSIX, so it would be trivial to port Unix
programs to your OS.

STEP 8: Decide on your design. There are monolithic kernels and microkernels.
Monolithic kernels implement all the services in the kernel, while microkernels
have a small kernel combined with user daemons implementing services. In
general, monolithic kernels are faster, but microkernels have better fault isolation
and reliability.

STEP 9: If you want an easy way. Consider Ubuntu remastersys, Fedora Revisor,
Custom NimbleX, Puppy Remaster, PCLinuxOS mklivecd, SuSE Studio[1] and
SuSE KIWI. However, the operating system you create belongs to the company
who started the service first. Although you have rights to distribute it freely,
change it and run it however you like (under the GPL).

Warnings
• Having your operating system carelessly written to the hard drive can
corrupt it completely. Be careful.
• Be sure to implement security features as your top priority if you ever want
to use it for anything.
• If you do something really stupid, like write random bytes to random I/O
ports, you *will* crash your OS, and (in theory) can fry your hardware. For
a demonstration, execute 'cat /dev/port' on Linux as root. Your computer
*will* crash.

HEURISKEIN‘10i 26
• Using your computer's physical drive is a BAD idea especially if you got 1
hard disk! You may damage your hard disk or destroy data that may be
valuable to you.

Things You'll Need


• A good computer
• A CPU for the Architecture you will be developing
• Enough memory (RAM) for a Virtual Machine
• A 'Host' OS, used to develop the Assembler (and others) source code, also
to build and package
it, while it is in its early stages, eventually your own OS can be its host.
• Syntax coloring code editor (use if you got no IDE)
• Most importantly, you need a compiler.

K.GANESH
(II MCA)

EAGLE EARTH MOVERS


(Class I P.W.D., Railway &Pipe Line Contractor)

No.14 S.C.S. Complex,


South Car Street,
TIRUCHENGODU-637 211.
Namakkal District. Tamilnadu.
Ph:04288-253944.
E-mail: urseagle@yahoo.com.

HEURISKEIN‘10i 27
RIDDLES
1. I am the beginning of the end, and the end of time and space. I am essential
to creation, and I surround every place. What am I?

2. I have as many brothers as sisters, but my brothers have twice the number
of sisters as brothers. How many of us are there?

3. Two friends were leaving the restaurant and as they passed the cashier, one
of them paid his bill but the other handed the cashier a slip of paper with
the number 1004180 written on it. The cashier studied the number for a
moment, and then let the friend pass by without paying. Why?

4. I give you a group of three. One is sitting down, and will never get up. The
second eats as much as is given to him, yet is always hungry. The third
goes away and never returns.

5. I am a box that holds keys without locks, yet they can unlock your soul.
What am I?

6. What lives in the corner but travels the world?

7. Can you think of a word that changes both number and gender when you
add the letter 'S'?

8. What do the numbers 11, 69, and 88 all have in common?

9. What word in the English language uses all five vowels plus Y in
alphabetical order and uses each one only once?

10. What is significant about the order of these numbers:


236719458

11. How many times can you subtract the number two from the number fifty?

12. What do you get if you add 2 to 200 four times?

13. I have as many brothers as sisters, but my brothers have twice the number
of sisters as brothers. How many of us are there?

14. After the autumn harvest there were nine ears of corn left in the farmer's
field. Each night a hungry rabbit sneaked into the field and took three ears
home with him. How many nights did it take to get all the corn?

HEURISKEIN‘10i 28
15. I drive at an average speed of 30 miles per hour to the railroad station each
morning and just catch my train. On a particular morning there was a lot of
traffic and at the halfway point I found I had averaged only 15 miles per
hour. How fast must I drive for the rest of the way to catch my train?

ANSWERS

1. The letter e. End, timE, spacE, Every place


2. Seven. The only possible solution is that the person talking is a woman and
there are four woman and three men.
3. The number 1004180: I owe nothing, for I ate nothing.
4. Stove, fire, smoke.
5. A piano
6. A postage stamp
7. Princes to Princess
8. They read the same backwards and forward.
9. Facetiously
10. They are in reverse alphabetical order.
11. You can subtract the number two from the number fifty only ONCE.
Because after that, the fifty becomes forty eight.
12. 202, 202, 202, 202
13. Seven. The only possible solution is that the person talking is a woman and
there are four woman and three men.
14. Nine nights. Two of the ears belonged to the rabbit.
15. The train is just about to leave the station and there is no way I will be able
to catch it this time.

K.S.JEYAKAVYA
(M. Sc. CT V yr)

HEURISKEIN‘10i 29
K. LOGANATHAN

NO.39, Perumalagaram,
Thiruverkadu,
Chennai- 600077

HEURISKEIN‘10i 30
QUOTATIONS IN WHITE HOUSE
– selected by BARACK HUSSEIN OBAMA.

“The Only Thing We Have to Fear Is Fear Itself”

– President Franklin D. Roosevelt.

“The Arc of the Moral Universe Is Long, But It Bends Towards


Justice”

– Martin Luther King Jr.

“Government of the People, By the People, For the People”

– President Abraham Lincoln.

“No Problem of Human Destiny Is Beyond Human Beings”

– President John F. Kennedy.

“The Welfare of Each of Us Is Dependent Fundamentally Upon the


Welfare of All of Us”

– President Theodore Roosevelt.

Chandra Kala. D

( III MCA)

HEURISKEIN‘10i 31
HEURISKEIN‘10i 32
COMPUTER FACTS
 Bill Gates' house was designed using a Macintosh computer.
 "Stewardesses" is the longest word that is typed with only the left hand.
 Another name for a Microsoft Windows tutorial is 'Crash Course'!
 The first computer mouse was invented by Doug Engelbart in around
1964 and was made of wood.
 The world's first computer, called the Z1, was invented by Konrad Zuse
in 1936. His next invention, the Z2 was finished in 1939 and was the
first fully functioning electro-mechanical computer.
 The average computer user blinks 7 times a minute, less than half the
normal rate of 20.
 The first domain name ever registered was Symbolics.com.
 On eBay, there is an average of $680 worth of transactions each second.
 Domain names are being registered at a rate of more than one million
names every month.
 The first banner advertising was used in 1994.
 By the year 2012 there will be approximately 17 billion devices
connected to the Internet.
 There are approximately 1,319,872,109 people on the Internet.
 There are approximately 1.06 billion instant messaging accounts
worldwide.
 While it took the radio 38 years and the television a short 13 years, it
took the World Wide Web only 4 years to reach 50 million users.
 The first hard drive available for the Apple II had a capacity of only 5
megabytes.
B.RAJEEV
(II MCA)

HEURISKEIN‘10i 33
WINDOWS SHORTCUT KEY

How do I create a Windows shortcut key?

Create a shortcut

1. Open the folder or directory that contains the program you wish to create a
shortcut for.
2. Right-click on the program and click Create Shortcut.
3. This will create a shortcut named "Shortcut to <your program>" in the
directory you are in. If you wish to rename this shortcut, right-click the file
and click rename.
4. Once the above steps have been completed, you can copy or cut this
shortcut and paste it anywhere to execute this program.

Assign shortcut key to that Windows shortcut

Once the shortcut has been created to assign a shortcut key to that Windows
shortcut follow the below steps.

1. Right-click the shortcut and click Properties.


2. Click the Shortcut tab.
3. Click in the Shortcut key box and press a letter. For example, if you press
"p" the shortcut key will automatically be made Ctrl + Alt + P. Which
means if saved when pressing Ctrl and Alt and "P" all at the same time will
run that shortcut.

Windows key keyboard shortcuts

Below is a listing of Windows keys that can be used on computers running a


Microsoft Windows operating system and using a keyboard with a Windows

HEURISKEIN‘10i 34
key. In the below list of shortcuts, the Windows key is represented by
"WINKEY".

Shortcut Keys Description

WINKEY Pressing the Windows key alone will open Start.

WINKEY + F1 Opens the Microsoft Windows help and support center.

WINKEY + F3 Opens the Advanced find window in Microsoft Outlook.

WINKEY + D Brings the desktop to the top of all other windows.

WINKEY + M Minimizes all windows.

WINKEY + Undo the minimize done by WINKEY + M and WINKEY +


SHIFT + M D.

WINKEY + E Open Microsoft Explorer.

WINKEY + Tab Cycle through open programs through the taskbar.

WINKEY + F Display the Windows Search / Find feature.

WINKEY+ CTRL
Display the search for computers window.
+F

WINKEY + F1 Display the Microsoft Windows help.

WINKEY + R Open the run window.

WINKEY + Pause
Open the system properties window.
/ Break key

WINKEY + U Open Utility Manager.

WINKEY + L Lock the computer (Windows XP and above only).

WINKEY + P Quickly change between monitor display types. (Windows 7)

HEURISKEIN‘10i 35
WINKEY+ LEFT Shrinks the window to 1/2 screen on the left side for side by
ARROW side viewing. (Windows 7 only)

WINKEY+ Shrinks the window to 1/2 screen on the right side for side by
RIGHT ARROW side viewing. (Windows 7 only)

WINKEY+ UP When in the side by side viewing mode, this shortcut takes
ARROW the screen back to full size. (Windows 7 only)

Minimizes the screen. Also, when in the side by side


WINKEY+
viewing mode, this shortcut takes the screen back to a
DOWN ARROW
minimized size. (Windows 7 only)

M.REKHA
(MSc. CT V Year)

A.ARUMUGAM

COMPUTER OPERATOR
Government data centre
Guindy
Chennai-25

HEURISKEIN‘10i 36
BOTS AND BOTNET: A DISTRIBUTED THREAT

Introduction:
Bots are one of the most sophisticated and popular types of cybercrime
today. They allow hackers to take control of many computers at a time, and turn
them into "zombie" computers, which operate as part of a powerful "botnet" to
spread viruses, generate spam, and commit other types of online crime and fraud.
What is a BOT?
A "bot" is a type of malware that allows an attacker to take control over an
affected computer. Also known as ―Web robots‖, bots are usually part of a
network of infected machines, known as a “botnet‖, which is typically made up of
victim machines that stretch across the globe Since a bot infected computer does
the bidding of its master, many people refer to these victim machines as
―zombies.‖ The cybercriminals that control these bots are called botherders or
botmasters. Some botnets might have a few hundred or a couple thousand
computers, but others have tens and even hundreds of thousands of zombies at
their disposal. Many of these computers are infected without their owners'
knowledge. Some possible warning signs? A bot might cause your computer to
slow down, display mysterious messages, or even crash.
How Bots Work
Bots sneak onto a person‘s computer in many ways. Bots often spread
themselves across the Internet by searching for vulnerable, unprotected computers
to infect. When they find an exposed computer, they quickly infect the machine
and then report back to their master. Their goal is then to stay hidden until they are
instructed to carry out a task. After a computer is taken over by a bot, it can be
used to carry out a variety of automated tasks, including the following:
 Sending ( spam, virus, software)

HEURISKEIN‘10i 37
 Stealing (Credit card numbers, Bank credentials, other sensitive personal
information)
 Denial of Service
 Click Fraud

Protect Against Bots


To safeguard against malicious bots, security experts at Symantec offer the
following advice:

1. Install top-rated security software (such as Norton 360) and Norton


Internet Security.
2. Configure your software's settings to update automatically.
3. Increase the security settings on your browser.
4. Limit your user rights when online.
5. Never click on attachments unless you can verify the source.
6. Ensure that your system is patched with the most current Microsoft
Windows Update.
7. Set your computer‘s security settings to update automatically, to ensure
you always have the most current system patches.

Saranya. R
(III MCA)

HEURISKEIN‘10i 38
DREAMS
A dream is a succession of images, sounds or emotions that the mind experiences
during sleep. The content and purpose of dreams are not fully understood, though
they have been a topic of speculation and interest throughout recorded history. The
scientific study of dreams is known as oneirology.

We Only Dream of What We Know

Our dreams are frequently full of strangers who play out certain parts – did you
know that your mind is not inventing those faces – they are real faces of real
people that you have seen during your life but may not know or remember? The
evil killer in your latest dream may be the guy who pumped petrol in to your
Dad‘s car.when you were just a little kid. We have all seen hundreds of thousands
of faces through our lives, so we have an endless supply of characters for our brain
to utilize during our dreams.

Dreams Prevent Psychosis

In a recent sleep study, students who were awakened at the beginning of each
dream, but still allowed their 8 hours of sleep, all experienced difficulty in
concentration, irritability, hallucinations, and signs of psychosis after only 3 days.
When finally allowed their REM sleep the student‘s brains made up for lost time
by greatly increasing the percentage of sleep spent in the REM stage.

You Forget 90% of your Dreams

Within 5 minutes of waking, half of your dream if forgotten. Within 10, 90% is
gone. The famous poet, Samuel Taylor Coleridge, woke one morning having had a
fantastic dream (likely opium induced) – he put pen to paper and began to
describe his ―vision in a dream‖ in what has become one of English‘s most famous
poems: Kubla Khan. Part way through (54 lines in fact) he was interrupted by a

HEURISKEIN‘10i 39
―Person from Porlock―. Coleridge returned to his poem but could not remember
the rest of his dream. The poem was never completed.

Blind People Dream

People who become blind after birth can see images in their dreams. People who
are born blind do not see any images, but have dreams equally vivid involving
their other senses of sound, smell, touch and emotion. It is hard for a seeing person
to imagine, but the body‘s need for sleep is so strong that it is able to handle
virtually all physical situations to make it happen.

A.SIVAGAMI
(M.Sc.CT V yr)

SOME FACTS
No piece of normal-size paper can be folded in half more than 7 times.
When cats are happy or pleased, they squeeze their eyes shut.
The elephant is the only animal with 4 knees.
Each year, about 500,000 detectable earthquakes occur in the world. About
100,000 of those can be felt and about 100 of them cause damage.
The tongue is the only body muscle that is attached from one end only.
We, as humans, forget 90% of our dreams.
The percentage of people dreaming in black and white started decreasing
after the spread of color TV.
Just days before the World Cup of 1966 in England, the trophy was stolen
and then later retrieved by a dog.
The city of Portland in Oregon was named after a coin toss in 1844. Heads
for Portland and tails for Boston.
The African cicada fly spends 17 years sleeping, then wakes up for two
weeks, mates and then die.

HEURISKEIN‘10i 40
Pumice is the only rock that floats in water.
The shrimp's heart is in its head.
It is impossible to sneeze with your eyes open.
Your foot is the same length as your forearm.
India never invaded any country in her history.
111,111,111 x 111,111,111 = 12,345,678,987,654,321.
Natural pearls melt in vinegar.
The earth is about 6,588,000,000,000,000,000 tons in weight.
A goldfish has a memory span of about 3 months.
There are 86,400 seconds in day.
Ants never sleep.
The human brain is 80% water.
If you keep a Goldfish in the dark room, it will eventually turn white.
Chewing gum while peeling onions will reduce your tears.
There are 318,979,564,000 possible combinations of the first four moves in
Chess.
If you are right handed, you will tend to chew food on your right side. If
you are left handed, you likely to chew food on your left side.
A snail can slide over a razor blade without being hurt by producing slime
that helps it slide harmlessly.
2,520 can be divided by 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10 without having a
fractional leftover.
The world record for time without sleep is 264 hours ( ~11 days) by Randy
Gardner in 1965.
February 1865 is the only month in recorded history not to have a full
moon.

B.RAJEEV
( MCA II yr)

HEURISKEIN‘10i 41
INTERESTING BUT LITTLE KNOWN FACTS
ABOUT GOOGLE

1. In 1997, Google’s prototype was named ―BackRub‖.

2. The name ‗Google‘ was an accident. A spelling mistake made by the original
founders who thought they were going for ‗Googol‘.

3. Google.com – The domain was registered on 15 September 1997.

4. The first ever review of the Google Search Engine was done by Danny
Sullivan of Search Engine Watch on August 4, 1998.

5. The prime reason the Google home page is so bare is due to the fact that the
founders didn’t know HTML and just wanted a quick interface. In fact it was
noted that the submit button was a long time coming and hitting the RETURN key
was the only way to burst Google into life.

6. Due to the sparseness of the homepage, in early user tests they noted people just
sitting looking at the screen. After a minute of nothingness, the tester intervened
and asked ‗What’s up?‘ to which they replied ―We are waiting for the rest of it‖.
To solve that particular problem the Google Copyright message was inserted to
act as a crude end of page marker.

7. One of the biggest leap in search usage came about when Google introduced
their much improved spell checker giving birth to the ―Did you mean…‖
feature. This instantly doubled their traffic, but they had some interesting
discussions on how best to place that information, as most people simply tuned
that out. But they discovered the placement at the bottom of the results was the
most effective area.

8. The infamous ―I feel lucky‖ is nearly never used. However, in trials it was
found that removing it would somehow reduce the Google experience. Users
wanted it kept. It was a comfort button. I’m Feeling Lucky Costs Google $110
Million a Year.

9. There are no restrictions on Googler’s dress code in the office, in which


pajama, ugly sweater and even super hero costume were on the records.

HEURISKEIN‘10i 42
10. Google started off its first operations in a rented Garage.

11. Google publishes variety of logos commemorating holidays and events.


The first one on the books being a self-made ―Burning Man‖ logo by the founders
themselves.

12. Google products appear in 117 type of languages, including 5 “fake”


languages like Elmer Fudd and Swedish Chef. Spanish, German, French and
Japanese are the most used search language besides English.

13. Google won the prestigious award for Technical Achievement in 2000. In
the nominees list there were no search engines at all.

14. The Google logo was never centered (as it appears today). It only appeared
centered in March 2001. It was aligned to the left earlier. (And there were a lot
more distractions then).

15. In 1999, when Google moved to their Paolo Alto office, there were only 19
employees in the company. Today there are 0ver 2,700 Googlers.

16. It will take Google 300 years to put the entire world’s information online.

17. Google reckons only 10% of the world’s information is online.

18. Google believes up to 20% of the online content changes every month.

19. According to Google, 20-25% of the search queries are unique.

20. The index of Google is 3 times larger than Yahoo’s index or MSN’s index.

21. In Google, thousands of computers are involved in processing a single


search query.

JEGANKUMAR

(MCA II YR)

HEURISKEIN‘10i 43
vl;lhtJ gpwtp

vLj;Jr; nry;y VJk; ,y;iy ,t;Tyfpy;


nfhLj;Jr; nry;y vy;yhk; cs;sJ ek; clypy;
,!q;F tho;e;njd;d nra;Jtpl;Nlhk;
,q;Nf tPo;e;Jk; gadha; khwpLNthk;
VO gpwtp cz;ikahdhy; gilj;jpLNthk;
GJik vl;lhtJ gpwtp

ehk; kz; kPJ Mir nfhs;s


kz; ek; kPJ Mir nfhs;s
,Wjpapy; kz;Nz ntw;wp nfhs;s
mk;kz;Zk; ek;kplk; Njhy;tp nfhs;s
kUj;Jtj;jpw;F gadha; ek; nghd;Dly;
nra;jpLNthk; cly; jhdk;.

gh. uh[Pt;
,uz;lhk; Mz;L vk;.rp.V

?
!
?....

HEURISKEIN‘10i 44
?...

??....

??

??
!

! ??....
!
!
!!
??...
!
!
!....
! !
!
!

!
!! –

HEURISKEIN‘10i 45
PAPERS FROM PARTICIPANTS

AUDIO STEGANOGRAPHY BY MODIFIED LSB ALGORITHM AND


STRONG ENCRYPTION KEY

POOSHPARAJ. P, IFET COLLEGE OF ENGINEERING

In the current internet community, secure data transfer is limited due to its
attack made on data communication. So more robust methods are chosen so
that they ensure secured data transfer. One of the solutions which came to the
rescue is the audio Steganography. But existing audio steganographic systems
have poor interface, very low level implementation, difficult to understand and
valid only for certain audio formats with restricted message size. Enhanced
Audio Steganography (EAS) is one proposed system which is based on audio
Steganography and cryptography, ensures secure data transfer between the
source and destination. EAS uses most powerful encryption algorithm
in the first level of security, which is very complex to break. In the second
level it uses a more powerful modified LSB (Least Significant Bit) Algorithm
to encode the message into audio. It performs bit level manipulation to encode
the message. The basic idea behind this paper is to provide a good, efficient
method for hiding the data from hackers and sent to the destination in a safer
manner. Though it is well modulated software it has been limited to certain
restrictions. The quality of sound depends on the size of the audio which the
user selects and length of the message. Though it shows bit level deviations in
the frequency chart, as a whole the change in the audio cannot be determined.

3G TECHNOLOGIES

A.Krithika S.Karunya Bannari Amman Institute of Technology

3G or the third-generation wireless refers to near future developments in


personal & business wireless technology, especially relating to mobile
communications. 3G or The Third Generation will usher in many benefits as
roaming capability, broad bandwidth and high speed communication (upwards
of 2Mbps).

Network operators & telecommunications service providers are embracing the


recently adopted global third generation (3G) wireless standards in order to

HEURISKEIN‘10i 46
cater to emerging user demands and to offer new services to their customers.3G
wireless technology represents a shift from voice-centricservices to
multimedia-oriented like video, voice, data, fax services.

As the telecommunication industry moves forward, the International


Telecommunication Union (ITU) has proposed 3G telecommunication
standards to ensure the cost-effective availability of high-bandwidth, high-
quality, wireless multimedia applications and the mobile communications.
Based on the International Telecommunication Union, 3G is a third generation
mobile phone technology and it is also referred UMTS (Universal Mobile
Telecommunications System). 3G offers more great features, services and
more capacity to the mobile phone operators. Today, approximately 200 3G
networks are operating in more than 40 countries of the world and there are
millions of the 3G subscribers in the world.

CLOUD COMPUTING

SHANMUGA PRABHU.J, VIVEKANANTHAN.V


MADURAI KAMARAJ UNIVERSITY,

Cloud computing is a computing paradigm in which task are assigned to a


combination of connections, software‘s and services accessed over a network. The
term ―cloud‖ is the large collection of ATM Networks.
Cloud computing enables user to access super computing level using a
client or other access point like an iphone, laptops etc. user can reach in to the
cloud when they are in need of resources. For this reason cloud computing is also
called as ―on-demand computing‖.

HEURISKEIN‘10i 47
BRAIN CONTROLLED ARTIFICIAL LEGS

K.Jamunadevi,T.Lavanya, SENGUNTHAR ENGINEERING COLLEGE,

This paper describes a brain controlled robotic leg which is designed to


perform the normal operations of a human leg. After implanting this leg in a
human, the leg can be controlled with the help of user‘s brain signals alone.
This leg behaves similar to a normal human leg and it can perform operation
like walking, running, climbing stairs etc. The entire system is controlled with
the help of advanced digital signal processors. The signals are taken out from
the human brain with the help of electroencephalography technique.The person
can perform operations like walking, running etc just by their thought.
This system will be very much suitable for those who lost their legs in
accidents and the proposed system is hundred percent feasible in the real time
environment with the currently available technology. The Brain Controlled
Artificial Legs are very much cost effective when compared to the normal
Artificial legs which is available in the market. The reduction in cost of the
proposed system is found to be very high when compared to the existing
system. Moreover, the user can have full control over the artificial legs which is
not possible in the existing system.

HEURISKEIN‘10i 48
RAUNAQ STEELS TRADING PVT.LTD.

New No.45(24),Venkata maistry Street,


1st floor,Mannady,
Chennai-600001

KAPIL AGENCIES
NO.72,Sembudoss street,Chennai-600001

Specialists In: Structurals like Angels, Channels, Beams, Rebars Etc.

KAPIL METAL PROCESSING INDUSTRIES PVT LTD


UNIT I:126,MANALI,PONNERI ROAD
UNIT II:VELLIVAYAL CHAVADI

H.O:044-25225443/42163020.FAX:25224666
E-Mail:kapilgroups@airtelmail.in

HEURISKEIN‘10i 49
WITH BEST COMPLIMENTS
FROM
P.S.KRISHNAMURTHY STEELS PVT LTD

DEALERS IN SAIL,VIZAK STEEL(RINL),JSW&ESSAR


TMT BARS|ANGELS|CHANNELS|JOIST|CR SHEETS |HR SHEETS

MS PLATES|MS ROUNDS|SPL.STEEL ROUNDS

PSK TMT STRONG . . .

OUR STEEL MANUFACTURING COMPANIES


THANGAM STEELS LTD, Gummidipoondi
VAIBHAV MERCANTILE LTD, Gummidipoondi
PARAMESWARA MANGALAM STEELS PVT LTD, Trichy

Manufactures of PSK TMT ISI Roads &MS Rounds

#C 36, 3rd Floor, 2nd Avenue,


Anna Nagar,
Chennai - 600040.
E mail : sales@psksteels.com
Phone: 044 - 4289 9200 (59 lines)
Fax : 044 - 4289 9232
Mobile No: 98410 43851

HEURISKEIN‘10i 50
WITH BEST COMPLIMENTS
FROM

Y-213,
2nd Avenue,
Anna Nagar,
Chennai - 600 040.

Phone : + 91-044 42171512


Email : info@coremindtechnologies

HEURISKEIN‘10i 51
HEURISKEIN‘10i 52
HEURISKEIN‘10i 53
The strength of the team
is each individual member...
The strength of each member
is the team.

-Phil Jackson

HEURISKEIN‘10i 54

Anda mungkin juga menyukai