Friday, 25 November 2011

CABLING


COPPER-BASED CABLES
They are quite commonly used for connecting computers. They have two main types –
coaxial and twisted pair. In twisted pair there are two further options – unshielded twisted
pair (UTP) and Shielded Twisted Pair (STP).


FIBER-OPTIC CABLES

They are used on the internet. They deliver data at a very high speed. They use glass or
plastic filaments and the pulses of light as a data transfer method.



TELEPHONE AND ELECTRICAL WIRE NETWORKS





WIRELESS OPTIONS
Wireless options include radio connectivity (wi fi, bluetooth), infrared connectivity and
Satellite microwave transmissions.




ROUTERS


Routers use a combination of hardware and software to forward data packets to their
destination on the internet. They are more efficient and sophisticated than bridges and
switches. They can divide large networks into logical segments called Subnets on the basis of
IP addressing scheme. A router can communicate with another router on the internet with
the help of Routing Information Protocol, and thus it can build a routing table. This routing
table contains information about different network addresses and different routes for
delivery of data packets to a host machine on a network. A router is a decision making
device. When a data packet arrives at a router it reads the network addresses from the IP
address on the data packet and determines the shortest possible path through which this
packet can be delivered to its destination.

SWITCHES


A switch is also a combination of hardware and software having its own operating system.
Like bridges, the switches are also used to increase the bandwidth of a network. However, in
case of a switch, a network is virtually divided into small segments called Virtual LANs or
VLANs. Similar type of users can be grouped into a VLAN despite that they have no
physical proximity or closeness. A switch would read the MAC address on a data packet and

match it with the list of MAC addresses of the user machines contained in it. It then sends
data packets only to that machine on a VLAN to which these packets relate. Packets
belonging to other VLANs are not allowed to enter into a particular VLAN, hence
bandwidth increases.


BRIDGES


A Bridge is a combination of hardware and software. It has its own operating system. It
helps to conserve the bandwidth of a network. Bandwidth is the speed of a network. It
indicates how many bits can be transmitted across a network in a given time. In case of a
bridge, the larger network is physically chopped into smaller segments. A bridge can read the
MAC (Media Access Control) or physical address of a computer on data packets. MAC
address is printed on the Network Interface Card. A bridge matches this MAC address with
the one stored in its table and judges that which particular segment does a data packet
belong to and accordingly sends that packet to such a segment. It does not allow other
packets belonging to other segments to spread to a particular segment and hence conserves
the bandwidth.


INTERNET LAYERS TCP/IP STACK


Internet communication model (TCP/IP Stack) proposes a 4 layer architecture. Following
are the names of internet layers that map with the OSI model’s layers:


- Application layer is equivalent to OSI model’s Application, Presentation and Session layers
- Host-to-Host Layer is equivalent to OSI model’s Transport layer
- Internet layer is equivalent to OSI model’s Network layer
- Network Access layer is equivalent to OSI model’s data link layer





Thursday, 24 November 2011

Proxy Server


A proxy server sits between an internal trusted network and the untrusted network.



                                                                                                      
Mainly three thing to do by Proxy Server.                
(i)              An http request from the browser goes to proxy server.
(ii)            It can also act as a firewall filtering requests for certain web pages.
(iii)          An important job it can do is to speed up the processing of http requests by caching web pages.

Firewall


Firewall:-
          A firewall is a combination of hardware and software that sits between the internet and internal network of an organization to protect the network form outside attack.


Types of firewall:-
                      There are three main types of firewall.

(i)              Packet filter firewall
(ii)            Circuit level firewall
(iii)           Application gateway firewall.


(i)              Packet filter firewall:
It is set of rules to determine whether outgoing or incoming data packets are allowed to pass through the firewall.
(ii)            Circuit level firewall:
It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality.
(iii)          Application gateway firewall:
It operates at application layer of OSI Model. It uses string user authentication to verify identity of a host attempting to connect to the network using application layer protocols such as FTP.

Friday, 18 November 2011

Cs301 1st Quiz


When an executable program run, it is loaded in the memory and becomes a_______.

Select correct option:
Thread
.h file
Process
None of the above

A kind of expressions where the operator is present between two operands called ________expressions.
Select correct option:
Infix
Postfix
Prefix
None of the above

Which of the following operations returns top value of the stack?
Select correct option:
push
pop
top
first

To create a _________ we link the last node with the first node in the list.
Select correct option:
Double linked list
Circularly-linked list
Linked list
None of the above

In the calling function, after the execution of the function called, the program continues its execution form the _______after the function call.
Select correct option:
Previous line
Next line
Beginning
None of the above

Doubly Linked List always has one NULL pointer.
Select correct option:
True
False




 ________ only removes items in reverse order as they were entered.
Select correct option:
Queue
Stack
Both of these
None of these

In the linked list implementation of the stack class, where does the push member function places the new entry on the linked list?
Select correct option:
After all other entries that are greater than the new entry.
At the head
After all other entries that are smaller than the new entry.
At the tail

Which of the following is known as "Last-In, First-Out" or LIFO Data Structure?
Select correct option:
Linked List
Stack
Queue
Tree

Which boolean expression indicates whether the numbers in two nodes (p and q) are the same. Assume that neither p nor q is null.
Select correct option:
p == q
p.data == q.data
p.nextNode == q. nextNode
p.data == q


We can not remove items randomly from _________
Select correct option:
Stack
Queue
Both of these
None of these

 _____ is the stack characteristic but _______was implemented because of the size limitation of the array.
Select correct option:
isFull(),isEmpty()
pop(), push()
isEmpty() , isFull() (Page 62)
push(),pop()
“+” is a _________operator.
Select correct option:

Unary
Binary
Ternary
None of the above

Local variables of a function are stored in,
Select correct option:
Binary Search Tree
Stack
Queue
AVL Tree

Doubly Linked List always has one NULL pointer.
Select correct option:

True
False

Which of the following is known as "Last-In, First-Out" or LIFO Data Structure?
Select correct option:

Linked List
Stack
Queue
Tree

The _____ method of list will position the currentNode and lastCurrentNode at the start of the list.
Select correct option:

Remove
Next
Start  (Page 38)
Back

A queue is a ________data structure, whereas a stack is a ________data structure.
Select correct option:

FIFO, LIFO
LIFO,FIFO
both of these
none of these
A kind of expressions where the operator is present between two operands called ________expressions.
Select correct option:

Infix
Postfix
Prefix
None of the above

The tree data structure is a
Select correct option:

Linear data structure
Non-linear data structure
Graphical data structure
Data structure like queue

IT-430 QUIZE # 1 FALL 2011


1.         --------- is used to transfer data at very high speed in telecommunication and networks.

            Stp
            Optical Fiber
            Coaxial
            UTP

2.         Meta Data is important for easier ----------------.
            Web page creation
            Web site upload
            Web page search through search engine
            None of the above

3.         ----------- is a subnet mask for Class B IP addresses.
            255.0.0.0
            255.255.0.0
            255.255.255.0
            255.255.255.255

4.         <MARQUEE BEHAVIOR=ALTERNATE> makes the content----------
            Bounce back and forth and invisible
            Visible all the time
            Scroll off the edge of area
            Bounce back and forth and visible

5.         ---------- address is a 12  digit address.
            IP
            RIP
            MAC
            None of the given

6.         --------- are normally used to get yes/no or ure/false information from a reader.
            Check Boxes  
            Radio buttons
            Submit buttons
            Selection List

7.         which CSS property controls the text size?
            Font-style
            Font-size
            Text-style
            Text-size

8.         Which attribute can be used to make a region non-clickable?
            Alt
            Target
            Nonhref
            None of the given

9.         when a vistor clicks a--------- the entries in form are set to the default values.
            Button
            Radio button
            Submit button
            Reset button



Thursday, 17 November 2011

CS 402_2nd Assignment Solution


Question # 1:
Using the FA’s corresponding to r1  and r2, Build an FA corresponding to

a r1+ r2  (Union of r1  and  r2).
b)   r1r2  (Concatenation of r1  and r2).
c r1* (Closure of r1).




Solution:
r1+ r2  (Union of r1  and  r2).


New States
Old States


A
B
Z1-  º (x1,x1)
(x2,x2)  º Z2
(x3,x1)  º Z3
Z2  º (x2,x2)
(x3.x2)  º Z4
(x4,x3)  º Z5
Z3  º (x3,x1)
(x3,x2)  º Z4
(x3,x1)  º Z3
Z4  º (x3,x2)
(x3,x2)  º Z4
(x3,x3)  º Z6
Z5+  º (x4,x3)
(x4,x2)  º Z7
(x4,x1)  º Z8
Z6+  º (x3,x3)
(x3,x2)  º Z4
(x3,x1)  º Z3
Z7+  º (x4,x2)
(x4,x2)  º Z7
(x4,x3)  º Z5
Z8+  º (x4,x1)
(x4,x2)  º Z7
(x4,x1)  º Z8

Tuesday, 15 November 2011

MGT 301-GDB SOLUTION


Here are few points for guidance.

For improving your customer services, following points need to be considered :

Customer education is key to managing customer expectations.
Know how to say no.
Exceeding customer expectations for customers who have problems improves loyalty.
Make it easy to complain.
Understand what customers want.
Maintain a one-on-one relationship with customers
Choose a simple, single message, e.g. reflective listening
Communicate the Customer Service Message
Set clear boundaries of what each department is responsible for with regards to its customer interactions.
Under Promise and Over Deliver
Develop a greater insight into where you are now and where you can get to, by inviting Customers and Staff opinion.

Monday, 14 November 2011

STA 630 - GDB FALL 2011

Topic/Area for Discussion
Types of variables

Discussion Question
Both, the Moderating and Extraneous variables have an influence on the relationship between the dependent and independent variable. Discuss the basis on which we can differentiate moderating and extraneous variables?

STA630_GDB IDEA SOLUTION FALL 2011
Solution here:



Moderating variable

1- strong contingent effect
on the independent
variable-dependent
variable relationship.


2-presence of a third
variable modifies the
original relationship

3-a moderator is a
qualitative or quantitative
in nature

4-Effect the direction and
strength of relationship
between predictor and
criterian variable


5-Moderator effects zero
order correlation between
two variables

6-they don’t add error to
experiment.


Extraneous Variables


1-conceivably affect on the
independent variable –
dependent variable
relationship

2-To identify the true
relationship effect of the
extraneous variables may
have to be controlled

3-Confounding factors is
another name
used for extraneous
variables

4-Extraneous Variables
are undesirable variables

5-They influence the
outcome of an experiment
6- they add error to an
Experiment       

MKT 501 - GDB FALL 2011



Topic/Area for Discussion:
 “Product Life Cycle”

Case:
            GloAim is a software house in Pakistan; they developed a video game (Glodoll) for kids in 2001.  The prototype of the game was developed and tested in various play stations in Pakistan. At the testing stage, it had been seen that the video game had the longest “play value”. The product was introduced in the market; after only six months, GloAim sold 30 million copies of the video game. Soon after such a huge response, sales were almost completely stopped. However, they made sales of $50 millions.

          The product life cycle of the video game was not long as basic products have typical long product life cycle. GloAim developed and tested the prototype during the product development stage, but they sidestepped the introduction stage. As it is mentioned above there were rapid sales, and the video game quickly approached the growth stage. Here again, they skipped the maturity stage and directly went into the decline stage.


Discussion Question:

            GloAim’s video game (Glodoll) did not follow the traditional product life cycle. Do you think products can be successful if they do not follow the typical product life cycle?

MGT502 - GDB FALL 2011



Topic/Area for Discussion:
 “Motivational Theories

Discussion Question:
            Suppose you are a manager of an organization. Almost 15 people are working under your supervision. All are performing above expectations except one of your line managers. After discussion with him you realized that the reason of his low performance is his view towards his abilities. He thinks that he would not be able to complete difficult tasks efficiently.

Requirement:
  • Which motivation theory can best be applied in this situation?
  • As a supervisor what measures you can take to increase his self-confidence?
Important Instructions:

1.   Your discussion must be based on logical facts.
2.   Your comments on the topic should not exceed 250 words.
3.   The GDB will remain open for 3 working days/ 72 hours.
4.   Do not copy or exchange your answer with other students.  Two identical / copied comments will be marked Zero (0) and may damage your grade in the course.
5.   Obnoxious or ignoble answer should be strictly avoided.
6.   Questions / queries related to the content of the GDB, which may be posted by the students on MDB or via e-mail, will not be replied till the due date of GDB is over.

IT 430 ASGT # 2 FALL 2011 SOLUTION


Q # 1

<html>
<head><title></title></head>
<body>
<img id="Image-Maps_6201111051643064" src="image.jpg" usemap="#Image-Maps_6201111051643064" border="0" width="150" height="100" alt="" / target="_blank">
<map id="_Image-Maps_6201111051643064" name="Image-Maps_6201111051643064">
<area shape="rect" coords="10,10,60,60" href="http://www.google.com/" >
</map>
</body>
</html>

Q # 2
<html>
<body>
    <embed src= "yourname.mp3" quality="high" width="300" height="52" allowScriptAccess="always" wmode="transparent"  type="application/x-shockwave-flash" flashvars= "valid_sample_rate=true&external_url=[MP3 file address]" pluginspage="http://www.macromedia.com/go/getflashplayer"> </embed>
</body>
</html>