Professional Documents
Culture Documents
Dear Readers,
This magazine is the outcome of the efforts put forth by the Students of
AIHT. The Magazine, which was started as a Supplementary to the
Department’s Symposium, grew to be a Important project, involving great
amount of enthusiasm, dedication and hard work of the students.
It was our Immediate and direct involvement that the Magazine got life
and this team effort took a mere two-week’s time to get done with. We were
able to maintain communication with the Team members through e-Mail.
The work was delegated by the Editors, and due to the co-operation and
commitment, we were able to achieve the feat. We dedicate this success to
our enterprising students, who supported us with thoughts and ideas.
Last but not the least, the articles provided by the team members apart
from the editors, proved valuable to the magazine and we thank their
commendable efforts.
Chief - Editors:
1. Nithya P
2. Hariharan B
3. Rajhariny M
1
Patron – T. Kalasalingam 3
Departments
CSE 4
IT 5
Technical Articles
Trivia Times
Aptitude Questions 20
Quiz 14
Review Time!
Software – Ubuntu 30
Websites – Pros n’ cons in cyber space 37
Fun-Entertainment – Jokes 25
2
THE FOUNDER - CHAIRMAN
3
MISSION OF THE DEPARTMENT:
The primary goal of the department is to prepare emerging
computer engineers with concept oriented subject knowledge supplemented
with practical orientation to face the challenges of modern computing industry.
LABORATORIES:
The department of CSE has an infrastructural facility that is
the envy of most other institutes. The department to its credit has state-of-art
four Laboratories with over 200 computers that occupy an area of 5400 sq.ft.
The computing centre located in the academic block is supported with special
workstation running on Unix/Linux environment, dedicated workstation for
multimedia applications, all connected by a network that bring over 150
computers together.
The department is providing high-end software
training for the students within our campus, in collaborating with leading
software –training institutions. We have Internet facility with RF connectivity,
which has a speed of 1mbps.
• Microprocessor Lab
• Hardware Lab
• PC Troubleshooting Lab
4
ACTIVITIES:
• The projects developed by students for the fulfillment of their academic
requirements are well appreciated.
• Every year the department is also conducting a State Level Technical
Symposium and regular industrial visits are arranged for the students, to
impart practical knowledge and enable them to equip themselves to meet
the professional requirements of the industry.
• Our students have presented papers in various National and International
conferences.
PROJECT:
The final year students take up the projects in the following areas:
• VLSI
• Embedded Systems
• Networking
• Artificial Intelligence
• Mobile Computing
• Image Processing
SPECIAL FEATURES:
• Our centralized computer center is open to students to update their
knowledge in their related areas by using Internet Facilities.
• We are working towards having students’ chapter in both IETE and CSI for
our institution to give more interaction to our student with other
institutions.
• In addition to the curriculum, the department offers augmentation courses
in latest techniques in the computer science field and a personality
development program.
• In addition to these, the department is very keen on arranging special
lectures on the latest topics and happenings in the fields of engineering and
technology.
R.E.Krithika
5
MISSION OF THE DEPARTMENT:
To provide quality education, to equip the students with the
advanced emerging new trends in the field of information technology, to
improve their technological skills via continues learning process and to enhance
their social responsibilities.
The department of Information Technology is established in
the year 2000 with the view to develop quality engineers to meet the current
trends in the emerging world of IT.
LABORATORIES:
The department of IT has an infrastructure facility that is the envy of most
other institutes. The department to its credit has state of the art four
laboratories with over 200 computers that occupy an area of 5400 sq.ft. The
computing center located in the academic block is supported with special
workstation running on UNIX / Linux environment, dedicated workstation for
multimedia applications, all connected by a network that bring over 150
computers together.
6
ACTIVITIES:
The students are encouraged to implement their innovative ideas in
their project work with the guidance of the faculty. The project works span
both system and application domains.
Besides our regular academic schedule, industrial visits are also arranged
periodically for the benefit of the students.
Our students bagged first prices in sports quiz, entertainment quiz and
general quiz by Anna University and many more.
PROJECTS:
IT students take up the projects in the following areas:
JINI Environment
.NET
Implementation to real time streaming protocol
Wireless routing protocols
By P. Deepika
7
Placement Cell
Anand Institute of Higher Technology has an independent Placement Cell
devoted to cater to the needs of organizations in conducting campus interviews
for placements. It is headed by an industry experienced Professor A. Rajagopal
Director-Placement and also supported by a placement officer. Faculty co-
coordinators from various courses of study also assist the cell.
The placement cell ensures and takes care to provide the best arrangement
and hospitality for the visiting company’s officials. It plays a very important
and key role in counselling and guiding the students in the stages of completion
of academic programme of studies and entry into a suitable employment. The
office also co-ordinates various activities related to the career of the students
along with the industrial training. During every academic year our students are
placed in well-reputed multinational companies like
Wipro Caritor
Satyam Accenture
Polaris Syntel
8
PLACED CANDIDATES
Syntel
Ranjani Soundarya
Wipro
TOPPERS:
1. Ranjani - 81%
2. Soundarya G - 79.7%
3. Ashwini S - 79.2%
9
Impetus2k6, a technical symposium jointly conducted by the CSE and IT
department of our college, Anand Institute of Higher Technology, is the result
of the enthusiasm of the students, combined with hard work.
The plans for the symposium were finalized merely a month ago. After the
initial difficulties were ironed out, work for the symposium and the task of
acquiring sponsors started in full swing.
Committees for the events and other tasks such as refreshments and resources
were created and the final years students worked hard to involve all the
students in the planning and the execution of the symposium.
The final years did a commendable job in planning and executing many new
and innovative things such as using computers for most of the preliminary
events and distributing CDs and magazines about the symposium.
Posters for our symposium were distributed to over 250 engineering colleges in
and around Tamilnadu and we received a tremendous response in the form of
over 40 papers for the Paper Presentation event.
The support of the management and the staff was also helpful in planning and
conducting the symposium successfully and we could not have organized such a
large event without them.
Finally, we hope that our hard work pays off and Impetus2K6 becomes a grand
success and we hope that the participants have a great time.
10
“Treat your password like your toothbrush. Don't let anybody else use it,
and get a new one every six months.” - Clifford Stoll
In the networking sense, a hacker is one who specializes in work with the access
control mechanisms for computer and network systems. This includes individuals who
work toward maintaining and improving the integrity of such mechanisms.
However, the most common usage of hacker in this respect refers to someone who
exploits systems or gains unauthorized access by means of clever tactics and detailed
knowledge, while taking advantage of any carelessness or ignorance on the part of
system operators. This use of hacker as intruder (frequent in the media) generally has
a strong negative connotation, and is disparaged and discouraged within the computer
community, resulting in the modern Hacker definition controversy.
For such hackers specializing in intrusion, the highly derogatory term “Script kiddie”
or “Cracker” is often used to indicate those who either claim to have far more skill
than they actually have, or who exclusively use programs developed by others to
achieve a successful security exploit.
Hacker species
§ Security Experts
§ Students
§ Underemployed Adults
§ Criminal Hackers
§ Corporate Spies
§ Disgruntled Employees
Hacking Techniques
v Target Selection : A Hacker identifies a specific computer to attack
v Target Identification :The Hacker probes the target to glean information
v Method Selection : The Hacker selects the attack methods to be used
v Attack Progression : The Hacker proceeds with the actual attack
11
Some of the Hacking Techniques are listed below
The first and easiest things a hacker can do to gain information about your
network is to listen, and then to ask your network computers information about
themselves. Hackers will attempt to exploit any data or network service that is
exposed to them.
Common practices employed:
v Password Capture
v Traffic analysis
v Network Address scanning
v Port Scanning
v Finger, WhoIS, NSLookup and DNS Grabbing
v SNMP Data Gathering
Denial Of Service
This is commonly known as DoS attack. This easy attack can either bring your
network down or disable some aspect of it, depends on the sinister purpose of the
hacker.
Common practices employed:
v Ping of Death
v Synchronize connection establishment, ICMP (Internet
Control Message Protocol) Flooding
v Service specific Attacks
v DNS Redirection
v Route Redirection : RIP(Router Information Protocol) and
BGP (Border Gateway Protocol)
v SNMP Reconfiguration
Explaining the concepts would unnecessarily bore the interests of the reader.
So we just skip the explanation part and continue on with Hacking Techniques
Impersonation
This is the next step employed by the Hackers if they couldn’t access your
network computers. The Goal of the hacker is to penetrate your network security and
sabotage the resources on the computers in the network.
12
By impersonating another computer that your network trusts, the hacker’s computer
may be able to trick your computers into revealing enough information to breach past
your security or weaken your security.
For that, he/she may use the following impersonation techniques
v Source Routed attacks
v DHCP, WINS and DNS Service Impersonation
v Password playback, Server Impersonation & Password
capture
A special case of Impersonation attack is the man in the middle attack, where
the hacker operates between two computers on your network, or between a client
computer on the Internet or other WAN network.
When the client computer opens a connection to the server computer, the
hacker’s computer intercepts it (perhaps via a DNS Service impersonation attack). The
hacker’s computer opens a connection on behalf of the client computer to the server.
Ideally, the client thinks he is communicating with the server and vice versa. The
Hacker is the Man in the middle to observe and alter the communications between
them.
Hijacking
One last trick in the book. It is hijacking the already established and
authenticated network connection. This can occur at two layers of the networking
protocol- at the TCP Layer and at the SMB or NFS Session layer. The hacker will have
to hijack both the layers in this case.
While an exploit of this nature is theoretically possible, tools for hijacking SMB
Connections are not readily available
13
1) Which is the fastest computer today?
15) Name the vowel in the standard keyboard, which is not in the top line.
17) Which country in the world sends the most letters abroad?
rd
18) George Bush is the ____ President of USA. Fill the Blank
14
ANSWERS:
By Thileepan
TIP/ TRICK:
15
Glorious fingerprints of angel's thumb, or
Mysterious footprints of devil's feet,
Dilemmas existing between the two!
No doubt, a computer is a mirror;
Reflecting man's amazing power!!
Madan Kumar
2nd year, CSE
TIP/ TRICK
To Log in to your Administrator’s Account in WinXP: In the login screen Press
Ctrl+Alt+Del two times. You will get a Classic Login Box. Type Administrator as
username and Press enter. 95% chances are there that this trick will work
16
“The Internet is just a world passing around notes in a classroom” ~Jon
CYBER CRIMINALS:
The cyber criminals constitute of various category. The
following are some of the category of cyber criminals
• Organised hackers:
These kinds of hackers are mostly
organised together to fulfil certain objective.
The reason may be to fulfil their political bias,
fundamentalism, etc.
17
MODE AND MANNER OF COMMITING CYBER CRIME:
• Email bombing:
This kind of activity refers to sending large
numbers of mail to the victim, which may be an
individual or a company or even mail servers there by
ultimately resulting into crashing.
CERTAIN OFFENCES:
• Cyber-stalking:
Cyber stalking involves following
a person's movements across the Internet by
posting messages (sometimes threatening) on the
bulletin boards frequented by the victim,
entering the chat-rooms frequented by the
victim, constantly bombarding the victim with
emails etc.
18
• Unauthorized control / access over computer system:
This activity is commonly referred to as hacking. The Indian law has
however given a different connotation to the term hacking, so we will
not use the term "unauthorized access" interchangeably with the term
"hacking" to prevent confusion as the term used in the Act of 2000 is
much wider than hacking.
E-mail spoofing:
A spoofed e-mail may be said to be one, which misrepresents
its origin. It shows it's origin to be different from which it actually originates.
It is not possible to eliminate cyber crime from the cyber space. It is quite
possible to check them. The only possible step is to make people aware of their
rights and duties and further making the application of the laws more stringent
to check crime.
TIP/ TRICK
Messenger – To chat between clients in LAN
@echo off
: A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
19
“Getting information off the Internet is like taking a drink from a fire
hydrant”
Q. A stranger wants to go to south Newtown ,there are two roads and two guides
One road will leads to the town another road leads to a deadly forest ,one of the
guide always speaks the truth and other guide always lies. The stranger comes to
know about them but didn’t knew who speaks the truth .The stranger has to ask
only one guide for the road to the town, so he asks the guide for guidance for
which the latter responded promptly. Then he concluded that the road guided by
guide was wrong and so he took the other one and reached the town.
Now, what question he must have asked to either of the guides, not knowing which
one spoke the truth?
___________________________________________________________________
d) Empty the 7L mug, pour the remaining 2L water in 3L mug, into the 7L mug.
Ans: abcde
___________________________________________________________________
Q. Square of sum of two numbers is ‘130’ more than the twice of the product of
the two nos. Find the sum of the squares of the two numbers.
Ans: 130 [Hints: (x+y)2 - 2xy =130. Find x2+y2 ]
20
Q. There is a 4 inch cube painted on all sides. This
is cut down into of 1 inch cubes. What is the no of
cubes which have no pointed sides?
Ans: 8
___________________________________________________________________
Ans: The clock strikes for the first time at the start and takes 7 seconds for 6
intervals-thus for one interval time taken=7/6. Therefore, for 10 seconds there are
9 intervals and time taken is 9*7/6=10 and 1/2 seconds.
___________________________________________________________________
TIP/ TRICK
* To Send a message over LAN, Goto Run and Type:
* To Shutdown: right click and select New > Shortcut and type
C:\windows\rundll.exe user.exe,exitwindowsexec
21
“The Internet is becoming the town square for the global village of
Tomorrow” ~ Bill Gates
AVERT first discovered this virus family in August of 2000. Our advanced
technology and detection techniques provided customers with accurate protection
from this new variant prior to its release, starting more than six months ago with
the 4092 DAT release. Users are reminded to regularly update to the current
engine and DATs to ensure maximum protection against today's threats.
Bubbleboy Virus
22
Nimda Virus
The mass mailing Internet worm. Its main goal is simply to spread over the
Internet and Intranet, infecting as many users as possible
Its main goal is to infect as many computers as possible and on a given date
have those computers launch a Denial of Service attack on a specific website. This
worm is ranked as a high risk. From McAfee Online.
Sasser Virus
This worm, unlike many others, does NOT spread by e-mail. Rather, this
worm works by instructing infected computers to stealthy download and
execute the real virus payload. Its creator, an 18 year old from Germany,
has since been arrested. This worm is ranked as a medium risk.
23
“The problem with troubleshooting is that trouble shoots back” ~ Unknown
24
“A journey of a thousand sites begins with a single click”~Unknown
RIGHT CLICK
• Tech Support: "I need you to right-click on the Desktop."
• Customer: "Ok."
• Tech Support: "Did you get a pop-up menu?"
• Customer: "No."
• Tech Support: "Ok, sir. Can you tell me what you have done up until this
point?"
• Customer: "Sure, you told me to write 'click' and I wrote click'."
25
“Never let a computer know you're in a hurry” ~Author Unknown
CIPHERS – CATEGORIES:
Ciphers are broken into two main categories, substitution
ciphers and transposition ciphers.
Substitution ciphers replace letters in the
plaintext with other letters or symbols, keeping
the order in which the symbols fall the same.
Transposition ciphers keep all of
the original letters intact, but mix up their
order. The resulting text of either enciphering
method is called the ‘cipher text’.
26
SUBSTITUTION CIPHERS:
We use substitution ciphers all the time.
(Actually, substitution ciphers could properly be called
codes in most cases.) Morse code, shorthand, semaphore,
and the ASCII code (American Standard Code for
Information Interchange) with which these characters are
being stored in, are all examples. The only difference
between these and the spy codes is that the above
examples are standardized so that everybody knows them.
DECODER RINGS:
The Captain Midnight decoder ring (which is an
"encoder" ring as well) allows you to do a simple substitution
cipher. It usually has two concentric wheels of letters, A through
Z. You rotate the outside ring and substitute the letters in your
message found on the outside ring with the letters directly
below on the inside ring.
Captain Midnight Decoder Ring
ENCRYPTION IN HISTORY:
Julius Caesar needed a way of communicating his battle
plans and tactics to everyone on his side without the enemy finding out
. He used this simple scheme of offsetting by 3 characters (He would
have put the "A" on the outer ring of letters over the "D" on the inner
ring if he had owned a Captain Midnight decoder ring.)
TRANSPOSITION CIPHER:
In 5th century B.C., the Spartans used an
interesting transposition cipher called a ‘scytale’.
The scytale utilized a cylinder with a ribbon wrapped
helically around it from one end to the other. The
message was written across the ribbons, and then
unwrapped from the cylinder. Only someone with an
identical diameter cylinder could re-wrap and read the message.
27
THE ENIGMA:
the Enigma was a portable cipher machine
to encrypt and decrypt secret messages. It was a
family of related electro-mechanical ‘rotor
machines’ — comprising a variety of different models.
The Enigma code was first broken by the Poles, under the leadership
of mathematician Marian Rejewski, in the early 1930s. In 1939, with the
growing likelihood of a German invasion, the Poles turned their information
over to the British, who set up a secret code-breaking group, known as Ultra,
under mathematician Alan M. Turing.
By Nithya
CODE BREAKING
Cipher text
1. Xszinh hvwfxv gsv hrtsg yfg nvirg drmh gsv hlfo.
2. vploh lv d fxuyh wkdw fhw orw ri wklqjv vwudljkw.
3. gsrmp dszg blf hkvzp yfg mlg hkvzp zoo blf gsrmp.
4. kybbigi xvyhiuuyv eu yzi qfy tmbcu nz ytfiv xiyxbi’u ubiix.
5. ipxiveizki eu tfi qyvut timkfiv et geriu tfi tiut lihyvi timkfezg tfi biuuyz.
6. zlqqhuv gr qrw gr gliihuhqw wklqjv wkhb gr wklqjv gliihuhqwob.
7. uvzi zodzbh hkirmth uiln rtmlizmxv.
8. mzo yzi qfy kmz tfezc yh yzbo yzi qmo ty uxibb m qyvj ylreysubo
bmkcu eamgezmteyz .
9. wr dfkhlyh wkh pduyhorxx lw lv mohflvhob wkh xqqklqnaeoh qkdq pxvw eh
qkrxjkw.
10. hmebsvi eu zyt tfi hmbbezg jyqz lst utixxezg jyqz..
11. zodzbh xlmwvnm gsv xirnv mlg zodzbh gsv xirnmrmzo.
12. mrb lv pruh lqihfwlrxv wkdq glvhdvh.
13. qfmt beiu lifezj su mzj qfmt beiu lihyvi su mvi tezo amttivu tfmz qfmt beiu
qetfez su.
14. rmtizgrgfwv rh gsv wzftsgvi lu kirwv.
15. krqhvwb lv wkh ehvw srolfb.
28
Plain Text
Caesar’s code:
This code can be broken by simply applying Caesar’s code, which is to
replace any letter by another letter that comes three places further on in the
alphabet. Thus the letter ‘a’ will be substituted by letter ‘d’ , letter ‘b’ by
letter ‘e’ …and so on..
Convert ‘a, b…. m’ to ‘m, l…a ‘ and ‘n, o…. z’ to’ z, y…n’
These codes are just a little modified version of the second
one…The first 13 alphabets, from ‘a’ to ‘m’, are reversed and substituted for
the same... ‘a’ replaced by ‘m’, ‘b’ replaced by ‘l’....Like wise, the last 13
alphabets , from ‘n’ to ‘z’ are reversed and substituted for the same…which
would be, ‘n’ replaced by ‘z’, ‘o’ replaced by ‘y’ and so on…
29
“Computers are useless. They can only give you answers.” ~Pablo Picasso
Ubuntu
The actual installation was smooth, easy and provided an excellent desktop for
a user who is new to Linux, Someone who wanted only basic options.
Simplicity - I work with complicated systems and management all day, and
most nights, it was very refreshing to find a distribution that has a focus on
simplicity. Give the user what they need, no more unless they want to add that
themselves. Good idea!
The panel provides system configuration and applications using the Applications
Option and personal preferences using the Computer Option. Well thought out
and intuitive. The whole system seems designed to aid in the transition from
Windows to Linux.
Easy Install - Ok a distribution has to be easy for the user to install and one CD
is about as easy as it gets. The steps of installation are quick effective and to
the point. Again, it is nice to have options of thousands of programs but really
1 CD can contain everything you need. The install will allow you to setup your
network with a static IP during the install just like any other system.
30
USB Detection - When I shoved in a Thumb Disk...nothing. Well, I had to
modify the fstab file to try to get it to work, no luck. So...I tried a different
Thumb Drive...suddenly auto detection. My conclusion is that some of the
cheap, USB1 drives will not work without some configuration changes, but the
better USB2 drives will auto detect.
Network Tools - Gnome now offers a handy tool to use for networks. It is
actually 8 tools in one interface. The tools are Devices, Ping,
Netstat,Traceroute, Port Scan, Lookup, Finger and WhoIS.
My Dislike
Summary:
If you are looking for a simple distribution, you are a new user with modest
requirements and you will make sure you load a simple firewall...take a look at
Ubuntu. For a home user that needs basics it is a good choice.
31
"Internet: absolute communication, absolute isolation” ~Paul Carvel
APPLICATIONS OF A I:
GAME PLAYING:
Machines that can play master level chess have some AI in them, but
they play well against people mainly through brute force computation--
looking at hundreds of thousands of positions.
Android
SPEECH RECOGNITION: In the 1990s, computer speech recognition reached a Head AI
practical level for limited purposes. Thus United Airlines has replaced its keyboard Project
tree for flight information by a system using speech recognition of flight numbers and
city names. It is quite convenient
32
UNDERSTANDING A NATURAL LANGUAGE:
Just getting a sequence of words into a computer is not enough. The
computer has to be provided with an understanding of the domain the text is about,
and this is presently possible only for very limited domains, because of AI.
COMPUTER VISION:
The inputs to the human eye and computers' TV cameras are
two dimensional. A few programs works efficiently only with three
dimensions. At present there are only limited ways of representing three-
dimensional information directly, mainly due to A I.
EXPERT SYSTEMS:
One of the first expert systems was MYCIN in 1974, which diagnosed
bacterial infections of the blood and suggested treatments.
MEDICAL APPLICATION:
One important application is homodynamic analysis the evaluation of blood
pressure, heart rate and blood flow to the heart. The A.I
computer system produces three-dimensional maps, or graphs,
on a computer screen which illustrates each patient's
homodynamic status over designated periods of time.
.
ROBOTS MOVING A BALL
“Instead of trying to produce a programme to simulate the adult mind, why not
rather try to produce one which simulates the child's? If this were then subjected
to an appropriate course of education one would obtain the adult brain.”
Alan Turing, 1950
BALLBOT – DESIGNED BY
UNIVERSITY OF ESSEX
33
SUMMIT ON ARTIFICIAL INTELLIGENCE:
Recently, 50 Th anniversary summit on artificial intelligence
was held at University of Zurich-Switzerland on July 9-14.it was organized by
ASAI50.The main objectives of their celebration are celebrating AI, coming together
and broadening views of intelligence.
ADAPTIVE A.I.’S:
Adaptive A.I. Inc was formed in
December 2001 to develop and
commercialize the world's first general
intelligence software engine. The complete
AGI engine plus associated support programs
are implemented in (Object Oriented) C#
under Microsoft's .NET framework.
FUTURE OF AI:
According to BRUCE DARNER the future of AI lies in, the
so-called Tiny A.I.Bots and agents-micro intelligent prostheses –will argument
reality. They’ll extend the capacity and reach of the human mind and
community communications. His vision is that a person will exist in cyberspace
as avatar embodying their real-time presence. They will be surrounded by Tiny
AI’s that proxy them into many processes and aspects of virtual community.
34
Acia Hog
It is an integrated circuit that can be Refers to a program that makes
used in data communication use of a vast quantity or the
interfaces. exclusive use of some available
resource like main memory.
Babble
Refers to the phenomenon of cross Infonet
talk among a number of It is an international network
communication channels. system that can hook subscribers
into a range of data bases world
Cook-Book wide.
It is a step by step directory issued by
manufacturers which gives all Journal
instructions about installing and using It is a chronological record of
a program. entry made in a file or block of
data.
Dinosaurs
It is software for use on commodore- Kludge
64 home computer that uses a lot of Refers to any hardware or
colour, sound and movement to software system obtained by
sustain child’s interest. temporarily improvising any
mismatched parts.
Emulate
To imitate one hardware system with Lex
another with the help of electronic It is data conversion software
attachment. used for converting data in one
language format to another
Mancos
Fail Safe It is a powerful, comprehensive,
It is a system designed to avoid management control system.
catastrophes, possibly at the expense
of convenience. Number Cruncher
Refers to a computer with a high
Genera degree of computational power.
A data conversion software used to
convert data in one language
format to another
35
Oasis
It is a multiuser program system that Warm Boat
is used for operating a number of It is the process of fooling the
micro computer system. computer through the program
to realize that its power has
Parsing been turned off though the
power is still on.
Quad density
It is used for specifying data storage
capacity versus space of the
computer disk.
Tag Sort
It is a sort of tag file but not a full
file used for quick retrieval of record
from the original file.
Unicorn
It is a home micro computer used for
education and home computing.
Zeroise
Video Digitizer Set storage location to zero
It is an input device which digitizes
the signals received from a video
camera and stores the information in
the computer memory
36
1. CLUSTY Search engine
URL: www.clusty.com
This is one of the popular search engines, far more better than Google. It collects the
Search results by content and displays them in a Tree-Like View
2. DIGG
URL: www.digg.com
Digg.com is a unique experiment in social book marking. What this means is that
members get to choose what news is displayed on the main page.
37
3. BOING BOING
URL: www.boingboing.net
4. Warez-BB
URL: www.warez-bb.org
This is a Discussion forum. E-books, Software, Movies and Music are collected and
reviewed. You can make friends, hang out etc.
By Marc V Zephyrin
38
We would like to Thank
v Pothys
v Farm Group
v Five Star Exports
v British Education
v SSI
v Bohara Metal Products
v Sriram
v Sathya
v Rajalakshmi Associates
v Image Infotainment Ltd
v Vasanth & Co
v Kamakshi Lamipack Ltd
v Parvathy Ortho Hospital
SOFTWARE
PWED constructor
supplier
HARDWARE Surathur Other available material
NETWORKING • Bonemill
ENGINEERING Pandruthi • Humic acid
• Aulphuric acid
Cuddalore
TALLY, AUTOCAD, PRO E, J2EE, .NET
TECHNOLOGIES (District) • Organic manure
Contact
THIRUVANMIYUR Arun farm product
PH 24455038 25 Krishna Samy Nagar
koothapakkam
SDB PLAZA, 1ST FLOOR
cuddalore – 2
NEAR SIGNAL Ph-9344434867
Off-04142324548
39