Friday, August 31, 2007

What are three ways in which a thread can enter the waiting state?

A thread can enter the waiting state by invoking its sleep() method, by blocking on IO, by unsuccessfully attempting to acquire an object's lock, or by invoking an object's wait() method. It can also enter the waiting state by invoking its (deprecated) suspend() method.

What are synchronized methods and synchronized statements?

Synchronized methods are methods that are used to control access to a method or an object. A thread only executes a synchronized method after it has acquired the lock for the method's object or class. Synchronized statements are similar to synchronized methods. A synchronized statement can only be executed after a thread has acquired the lock for the object or class referenced in the synchronized statement.

What is synchronization and why is it important?

With respect to multithreading, synchronization is the capability to control the access of multiple threads to shared resources. Without synchronization, it is possible for one thread to modify a shared object while another thread is in the process of using or updating that object's value. This often causes dirty data and leads to significant errors

What do you understand by Synchronization?

Synchronization is a process of controlling the access of shared resources by the multiple threads in such a manner that only one thread can access one resource at a time. In non synchronized multithreaded application, it is possible for one thread to modify a shared object while another thread is in the process of using or updating the object's value.
Synchronization prevents such type of data corruption.
E.g. Synchronizing a function:
public synchronized void Method1 () {
// Appropriate method-related code.
}
E.g. Synchronizing a block of code inside a function:
public myFunction (){
synchronized (this) {
// Synchronized code here.
}
}

Name the containers which uses Border Layout as their default layout?

Containers which uses Border Layout as their default are: window, Frame and Dialog classes.

What's the difference between an interface and an abstract class?

An abstract class may contain code in method bodies, which is not allowed in an interface. With abstract classes, you have to inherit your class from it and Java does not allow multiple inheritance. On the other hand, you can implement multiple interfaces in your class.

How could Java classes direct program messages to the system console, but error messages, say to a file?

The class System has a variable out that represents the standard output, and the variable err that represents the standard error device. By default, they both point at the system console. This how the standard output could be re-directed:
Stream st = new Stream(new FileOutputStream("output.txt")); System.setErr(st); System.setOut(st);

An application needs to load a library before it starts to run, how to code?

One option is to use a static block to load a library before anything is called. For example,
class Test {
static {
System.loadLibrary("path-to-library-file");
}
....
}
When you call new Test(), the static block will be called first before any initialization happens. Note that the static block position may matter

What is NullPointerException and how to handle it?

When an object is not initialized, the default value is null. When the following things happen, the NullPointerException is thrown:
--Calling the instance method of a null object.
--Accessing or modifying the field of a null object.
--Taking the length of a null as if it were an array.
--Accessing or modifying the slots of null as if it were an array.
--Throwing null as if it were a Throwable value.
The NullPointerException is a runtime exception. The best practice is to catch such exception even if it is not required by language design.

What is more advisable to create a thread, by implementing a Runnable interface or by extending Thread class?

Strategically speaking, threads created by implementing Runnable interface are more advisable. If you create a thread by extending a thread class, you cannot extend any other class. If you create a thread by implementing Runnable interface, you save a space for your class to extend another class now or in future.

Jack developed a program by using a Map container to hold key/value pairs. He wanted to make a change to the map. He decided to make a clone of the ma

If Jack made a clone of the map, any changes to the clone or the original map would be seen on both maps, because the clone of Map is a shallow copy. So Jack made a wrong decision.

Can you have virtual functions in Java?

Yes, all functions in Java are virtual by default. This is actually a pseudo trick question because the word "virtual" is not part of the naming convention in Java (as it is in C++, C-sharp and VB.NET), so this would be a foreign concept for someone who has only coded in Java. Virtual functions or virtual methods are functions or methods that will be redefined in derived classes.

What does a well-written OO program look like?

A well-written OO program exhibits recurring structures that promote abstraction, flexibility, modularity and elegance

What is Java?

Java is an object-oriented programming language developed initially by James Gosling and colleagues at Sun Microsystems. The language, initially called Oak (named after the oak trees outside Gosling's office), was intended to replace C++, although the feature set better resembles that of Objective C. Java should not be confused with JavaScript, which shares only the name and a similar C-like syntax. Sun Microsystems currently maintains and updates Java regularly

How are Observer and Observable used?

Objects that subclass the Observable class maintain a list of observers. When an Observable object is updated, it invokes the update() method of each of its observers to notify the observers that it has changed state. The Observer interface is implemented by objects that observe Observable objects.

Which containers use a border layout as their default layout?

The Window, Frame and Dialog classes use a border layout as their default layout

What is a transient variable in Java?

A transient variable is a variable that may not be serialized. If you don't want some field to be serialized, you can mark that field transient or static.

What is the difference between Serializalble and Externalizable interface?

When you use Serializable interface, your class is serialized automatically by default. But you can override writeObject() and readObject() two methods to control more complex object serailization process. When you use Externalizable interface, you have a complete control over your class's serialization process.

How many methods in the Externalizable interface?

There are two methods in the Externalizable interface. You have to implement these two methods in order to make your class externalizable. These two methods are readExternal() and writeExternal().

How many methods in the Serializable interface?

There is no method in the Serializable interface. The Serializable interface acts as a marker, telling the object serialization tools that your class is serializable.

If a class is located in a package, what do you need to change in the OS environment to be able to use it?

You need to add a directory or a jar file that contains the package directories to the CLASSPATH environment variable. Let's say a class Employee belongs to a package com.xyz.hr; and is located in the file c:\dev\com\xyz\hr\Employee.java. In this case, you'd need to add c:\dev to the variable CLASSPATH. If this class contains the method main(), you could test it from a command prompt window as follows:
c:\>java com.xyz.hr.Employee

How to define an Interface in Java ?

In Java Interface defines the methods but does not implement them. Interface can include constants. A class that implements the interfaces is bound to implement all the methods defined in Interface.
Emaple of Interface:

public interface sampleInterface {
public void functionOne();

public long CONSTANT_ONE = 1000;
}

Java Interview Questions - How to define an Abstract class?

A class containing abstract method is called Abstract class. An Abstract class can't be instantiated.
Example of Abstract class:
abstract class testAbstractClass {
protected String myString;
public String getMyString() {
return myString;
}
public abstract string anyAbstractFunction();
}

What is similarities/difference between an Abstract class and Interface?

Differences are as follows:
Interfaces provide a form of multiple inheritance. A class can extend only one other class. Interfaces are limited to public methods and constants with no implementation. Abstract classes can have a partial implementation, protected parts, static methods, etc.
A Class may implement several interfaces. But in case of abstract class, a class may extend only one abstract class. Interfaces are slow as it requires extra indirection to to find corresponding method in in the actual class. Abstract classes are fast.
Similarities:

Neither Abstract classes or Interface can be instantiated.

Is Iterator a Class or Interface? What is its use?

Answer: Iterator is an interface which is used to step through the elements of a Collection

What is Collection API ?

The Collection API is a set of classes and interfaces that support operation on collections of objects. These classes and interfaces are more flexible, more powerful, and more regular than the vectors, arrays, and hashtables if effectively replaces.
Example of classes: HashSet, HashMap, ArrayList, LinkedList, TreeSet and TreeMap.
Example of interfaces: Collection, Set, List and Map.

Thursday, August 30, 2007

What is asp web forms?

The ASP.NET Web Forms page framework is a scalable common language runtime programming model that can be used on the server to dynamically generate Web pages.

Intended as a logical evolution of ASP (ASP.NET provides syntax compatibility with existing pages), the ASP.NET Web Forms framework has been specifically designed to address a number of key deficiencies in the previous model. In particular, it provides:

The ability to create and use reusable UI controls that can encapsulate common functionality and thus reduce the amount of code that a page developer has to write.
The ability for developers to cleanly structure their page logic in an orderly fashion (not "spaghetti code").
The ability for development tools to provide strong WYSIWYG design support for pages (existing ASP code is opaque to tools).

Declare and use enumeration in j#

// Declare the Enumeration
public enum MessageSize {

Small = 0,
Medium = 1,
Large = 2
}

// Create a Field or Property
public var msgsize:MessageSize;

// Assign to the property using the Enumeration values
msgsize = Small;

Declare and enumeration in vb

// Declare the Enumeration
public enum MessageSize {

Small = 0,
Medium = 1,
Large = 2
}

// Create a Field or Property
public var msgsize:MessageSize;

// Assign to the property using the Enumeration values
msgsize = Small;

Declare and use an enumeration in c#

// Declare the Enumeration
public enum MessageSize {

Small = 0,
Medium = 1,
Large = 2
}

// Create a Field or Property
public MessageSize msgsize;

// Assign to the property using the Enumeration values
msgsize = Small;

Declaring simple properties in j#

function get name() : String {
...
return ...;
}

function set name(value : String) {
... = value;
}

Declaring simple properties in vb

Public Property Name As String

Get
...
Return ...
End Get

Set
... = Value
End Set

End Property

Declaring simple properties in c#

public String name {

get {
...
return ...;
}

set {
... = value;
}

}

Declaring indexed properties in j#

JScript does not support the creation of indexed or default indexed properties.

To emulate these properties in JScript, use function
declarations instead. Even though you cannot access the functions using indexed property syntax in C#, it will provide the illusion for VB.

public function Item(name:String) : String {
return String(lookuptable(name));
}

Declaring indexed properties in vb

' Default Indexed Property
Public Default ReadOnly Property DefaultProperty(Name As String) As String
Get
Return CStr(lookuptable(name))
End Get
End Property

Declaring indexed properties in c#

// Default Indexed Property
public String this[String name] {
get {
return (String) lookuptable[name];
}
}

Accessing indexed properties in j#

var s : String = Request.QueryString("Name");
var value : String = Request.Cookies("key");

Accessing indexed properties in vb

Dim s, value As String
s = Request.QueryString("Name")
value = Request.Cookies("Key").Value

'Note that default non-indexed properties
'must be explicitly named in VB


var s : String = Request.QueryString("Name");
var value : String = Request.Cookies("key");

Accessing indexed properties in c#

String s = Request.QueryString["Name"];
String value = Request.Cookies["key"];

statements in c#?

Response.Write("foo");

variable declaration in j#?

var x : int;
var s : String;
var s1 : String, s2 : String;
var o;
var obj : Object = new Object();
var name : String;

variable declaration in c#?

int x;
String s;
String s1, s2;
Object o;
Object obj = new Object();
public String name;

variable declaration in vb.net?

Dim x As Integer
Dim s As String
Dim s1, s2 As String
Dim o 'Implicitly Object
Dim obj As New Object()
Public name As String

Language support in asp.net?

The Microsoft .NET Platform currently offers built-in support for three languages: C#, Visual Basic, and JScript.
The exercises and code samples in this tutorial demonstrate how to use C#, Visual Basic, and JScript to build .NET applications. For information regarding the syntax of the other languages, refer to the complete documentation for the .NET Framework SDK.

What is Asp.net?

ASP.NET is a programming framework built on the common language runtime that can be used on a server to build powerful Web applications. ASP.NET offers several important advantages over previous Web development models:

Enhanced Performance. ASP.NET is compiled common language runtime code running on the server. Unlike its interpreted predecessors, ASP.NET can take advantage of early binding, just-in-time compilation, native optimization, and caching services right out of the box. This amounts to dramatically better performance before you ever write a line of code.


World-Class Tool Support. The ASP.NET framework is complemented by a rich toolbox and designer in the Visual Studio integrated development environment. WYSIWYG editing, drag-and-drop server controls, and automatic deployment are just a few of the features this powerful tool provides.


Power and Flexibility. Because ASP.NET is based on the common language runtime, the power and flexibility of that entire platform is available to Web application developers. The .NET Framework class library, Messaging, and Data Access solutions are all seamlessly accessible from the Web. ASP.NET is also language-independent, so you can choose the language that best applies to your application or partition your application across many languages. Further, common language runtime interoperability guarantees that your existing investment in COM-based development is preserved when migrating to ASP.NET.


Simplicity. ASP.NET makes it easy to perform common tasks, from simple form submission and client authentication to deployment and site configuration. For example, the ASP.NET page framework allows you to build user interfaces that cleanly separate application logic from presentation code and to handle events in a simple, Visual Basic - like forms processing model. Additionally, the common language runtime simplifies development, with managed code services such as automatic reference counting and garbage collection.


Manageability. ASP.NET employs a text-based, hierarchical configuration system, which simplifies applying settings to your server environment and Web applications. Because configuration information is stored as plain text, new settings may be applied without the aid of local administration tools. This "zero local administration" philosophy extends to deploying ASP.NET Framework applications as well. An ASP.NET Framework application is deployed to a server simply by copying the necessary files to the server. No server restart is required, even to deploy or replace running compiled code.


Scalability and Availability. ASP.NET has been designed with scalability in mind, with features specifically tailored to improve performance in clustered and multiprocessor environments. Further, processes are closely monitored and managed by the ASP.NET runtime, so that if one misbehaves (leaks, deadlocks), a new process can be created in its place, which helps keep your application constantly available to handle requests.


Customizability and Extensibility. ASP.NET delivers a well-factored architecture that allows developers to "plug-in" their code at the appropriate level. In fact, it is possible to extend or replace any subcomponent of the ASP.NET runtime with your own custom-written component. Implementing custom authentication or state services has never been easier.


Security. With built in Windows authentication and per-application configuration, you can be assured that your applications are secure.

Tree view declaration in Asp.net?

TreeView Declaration











Grid view?

As a result of not setting the DataSourceID property of the GridView to a DataSourceControl DataSource, you have to add event handlers for sorting and paging.



private string ConvertSortDirectionToSql(SortDirection sortDireciton)
{
string newSortDirection = String.Empty;

switch (sortDirection)
{
case SortDirection.Ascending:
newSortDirection = "ASC";
break;

case SortDirection.Descending:
newSortDirection = "DESC";
break;
}

return newSortDirection
}

protected void gridView_PageIndexChanging(object sender, GridViewPageEventArgs e)
{
gridView.PageIndex = e.NewPageIndex;
gridView.DataBind();
}

protected void gridView_Sorting(object sender, GridViewSortEventArgs e)
{
DataTable dataTable = gridView.DataSource as DataTable;

if (dataTable != null)
{
DataView dataView = new DataView(dataTable);
dataView.Sort = e.SortExpression + " " + ConvertSortDirectionToSql(e.SortDirection);

gridView.DataSource = dataView;
gridView.DataBind();
}
}

Tuesday, August 28, 2007

Sruthi Kamal's new endeavour

Kamal Haasan's daughter Sruthi Haasan is all geared up top come out with music albums. Her father has been constructing a state-of-the-art recording studio for his daughter in Chennai.

The studio will be utilized by Sruthi Haasan to pursue her career in music. Having learnt both Western and Carnatic music, Sruthi Haasan is keen on turning a music composer, though she has been getting a lot of offers to act.

She has even sung a song in Dasavatharam, set to tunes by Himesh Reshmaiyya. Search is on to find a suitable name for the recording studio.

Kamal bravura show

Kamal Haasan appeared at a court in Chennai on Thursday over a complaint lodged in regard to his up and coming Dasavatharam.

An assistant director Senthil Kumar had filed a complaint alleging that Dasavatharam was his own story and that the producers, actor and director of the movie had cheated him.

Dasavatharam is a big budgeted films produced by Oscar films Ravichandran. Kamal Hassan is playing 10 different roles in this film. The script is written by Kamal and director K S Ravikumar is directing the film. According to the producer, this film is nearing its final stage of shooting and slated for Diwali release.

Kamal Haasan appeared before the judge on Thursday and contended that no plagiarism was involved in it. He stated that it was his own story. Kamal Haasan and his Counsel appeared before the Judge and explained to him in detail. Also they agreed to submit an English version of the script of Dasavatharam.

Kamal Haasan had stated that he had been in the industry for the past few decades and won several awards and acclaims and that there is no need to lift the stories of others.

Avid Kamal fans and media men gathered in large numbers at the High Court to catch a glimpse of Kamal Haasan.

Dasavatharam for Pongal

Kamal Haasan's much-talked about Dasavatharam was expected for a Deepavali release. But the latest rumors doing rounds is that its release would be postponed and the movie may hit the screens only for Pongal.

With the shooting for the talkies portion of the film and a couple of song sequences completed, two songs remain to be shot. The crew is expected to wind up shooting soon.

The post-production work, including graphics, is likely to stretch out for the next three months. Being the top-notch perfectionist, Kamal said to have insisted on high-quality graphics work and fans could be in for a visual treat.

Featuring Kamal Haasan in ten different roles, the movie features Asin, Mallika Sherawat and Nelpolean in prominent roles. Music is by Himseh Reshmaiyya and direction by K S Ravi Kumar.

Kamal’s plans for Dasavatharam

Kamal Haasan is now fully immersed in the post-production works of Dasavatharam.

One of the much-expected films of Tamil Cinema, the shooting for Dasavatharam is almost completed and the dubbing works have commenced.

Kamal Haasan is keen to ensure that he try novel methods in post-production especially in dubbing and getting the computer graphics works right.

Dasavatharam features Kamal Haasan in ten roles and directed by K S Ravikumar. The movie was shot for almost a year and the cast and crew have expressed confidence that the movie would bring laurels to Tamil cinema.

Plans are on to release the movie this Deepavali. Asin, Mallika Sherwat, Jayapradha, Nepolean among others are in the cast.

Monday, August 27, 2007

css

External stylesheets contain cascading stylesheet, or CSS, information used by a browser to display your web page with the styles you intended to use. These styles can be as simple as defining the font and font color, to as complex as layouts with three column without using tables.
There are four different ways CSS information can be supplied. See cascading order of CSS for more information.
The most efficient way to supply a browser with CSS information is by using an external css stylesheet.
What is an external CSS stylesheet?
An external CSS stylesheet is a separate file containing all the style information for a web site. These files have a .css extension and are commonly named style.css. The name of the file is irrelevant.
Why use an external CSS stylesheet
The benefits of an external stylesheet are:
Reduced bandwidth. Browsers typically only request one copy of your external CSS stylesheet, then caches that copy and won’t request your server for another copy for a certain period of time. The cache can be over written by refreshing the page. If this doesn’t work, try refreshing the external stylesheet itself.
External CSS stylesheets also reduces bandwidth by enabling your html code to be a clearer and contain less redundant style information. The smaller your file size, the less bandwidth is required to send the file out to the browser. For example, if wanted all tags of your web site to be vertically aligned in the center, instead of using for every single tag in your html document, simply define the vertical alignment in the external stylesheet and in your html document, all you will need to use is and all will be vertically aligned.
Easier to maintain. Instead of defining a style for a particular element over and over again, you only need to define it once in external stylesheet. External stylesheets also enable altering the whole look of a web site by changing one file, the .css file.
How do I create an external CSS stylesheet
External CSS stylesheets can be created using a simple text editor. Most PC’s have Text Pad which is the standard text editor, Mac’s have TextEdit which is the standard text editor. I recommend BBEdit on Macs as a text editor as it has many features a standard text editor doesn’t usually have.
To create an external CSS stylesheet, open up a new file and enter in the style information for that site. For example (as taken from Zann Marketing’s Developer blog styles):

Saturday, August 25, 2007

measles

Measles is an infection caused by a virus (a viral infection). The virus is called Pramyxovirus. In the developed world it used to be very common. However, thanks to extensive immunisation programmes the number of children infected has gone down considerably. Many health care professionals are concerned that the numbers of infected children has recently started to rise. The main reason being that some parents are scared of immunizing their children as they are worried about the vaccine's safety. How do you catch measles? If you have never had measles before and were never immunised you can catch it. It is a very contagious virus. If you live in a house with someone who has measles you run a 90% chance of becoming infected. The infected person transmits the virus through the nose and mouth - the virus is carried in tiny droplets in the air. Infected saliva and nasal secretions are also a source of transmission. Measles and PregnancyIf you have measles you should stay well away from pregnant women as the disease is especially dangerous for the unborn child. If you know of any pregnant woman who has been in contact with an adult or child infected with measles you should advise her to see her doctor immediately. What are the symptoms of measles? The patient will have a general feeling of being unwell (initial symptom). He/she will have a runny nose, a hacking cough and red eyes. His/her temperture will rise to over 40C and he/she will complain of body aches. Some children will suddenly become sensitive to bright lights. The patient will have small, red, irregularly-shaped spots with blue or white centres (Koplik's spots). These usually start inside the mouth a couple of days before the person comes out with a measles skin rash, which normally starts around the head and neck - gradually covering the whole body. Within three days the person has a rash which covers from head to toe. This rash starts off with small red spots, later on they join up and the patient has large blotchy red areas on the skin. The blotches can also be brownish in colour, but are more often red. The rash lasts just under a week. Measles is easy to diagnoseA measles rash is quite unique and easy for a doctor to identify. In the UK every case of measles must be reported to the HPA (Health Protection Agency). When you take your child (or adult or yourself) to your GP (Primary Health Physician, Family Doctor) you should phone first so that they can arrange for you to sit in a separate waiting area from other patients. How do you treat measles? There is no treatment for the virus, you have to let it run its course. However, there is treatment for some of the symptoms. Antibiotics will not treat the virus (antibiotics are for bacteria). However, if the patient develops an eye or ear infection an antibiotic may then be indicated. Make sure the infected person, especially children, take plenty of fluids (measles patients become dehydrated quickly). Drinking plenty of fluids is much more important than eating solids. If your child is not hungry for a couple of day, don't worry - but make sure he/she drinks a lot. OutlookMost people recover completely. A small number may go on to develop complications, such as encephalitis (inflammation of the brain), pneumonia, croup, bronchiolitis and hepatitis. 5% of measles patients may develop otitis media or pneumonia. One in 1000 develops encephalitis. How to protect yourself and your children? There is a vaccine, called MMR (Measles, Mumps Rubella). In the UK most children are immunized with the MMR vaccine. The first shot is given when the child is 14 months old, then a booster is given at the age of 4 or 5. Some people fear the MMR vaccine may cause their child to become autistic and decide it is not worth the risk. Nearly all health care professionals throughout the world believe the MMR vaccine is completely safe.

mums

What is Mum to you?
Thursday, 22. March 2007, 08:54:55
Dear Mother:It's Thursday. It's raining hard. It's dreary outside. I woke up this morning with a sense of dread. You've been gone for 18 years. I last wrote to you 17 years ago. After we seperated, I wrote to you every day for a year, then I stopped. Today will be the day I write again.The beauty I find in a graphic designer is something I like about myself. It's the deeper part of who I am, and maybe this has something to do with you. I wasn't always like this. There is written proof in my diary, my 14-year-old mind was soaked with thoughts of teenage boys:Wednesday, April 29, 1997. I had so much fun at school. Tonight, A called again, and so did this guy named B. We talked for over an hour. He's an A+ doll. A's been mean lately. I don't know what's wrong, but I like him muchly.Friday, May 8, 1997. Tonight I had a party. There were 16 kids. It was really blasty except for the fact that C kept bothering us. One of the guys, is named D, and now I have a crush on him--he's so darling. I like A, too, but after 16 months I can't help my crushes on other guys.Reading my diary entries written, I see a picture of a self-absorbed adolescent. I read page after page hoping for some modicum of self-examination. Of course, back then, my somewhat steady boyfriend A would try to read my diary, and I do remember writing only good things in case he got his hands on it. Because I was so self-conscious that someone might find my unhappy thoughts, I occasionally wrote them on separate pieces of paper then clipped them to the diary. They were my removable truths. If A ever said, "If you love me, you'll let me read the diary," I could easily unclip these private entries.So I wonder now how much of my diary is what novelist Tim O'Brien calls "happening truth" (the indisputable reality of what happened) and how much of it is "story truth" (the personal colorized version of what happened)? Memories, with or without diaries, that supposedly record the past, are generally colorized versions of the past. That's something I've learned in spades through my work. But there I go, digressing, trying to busy myself with work matters.It's hardest for me to reread the diary entries written before you left.Nothing much happened today. Just usual stuff. Tonight my dad called and we were very happy. My mother and I had a long talk until midnight about her childhood and other things. I was really happy because we'd never been too close before, and now we were talking like we really were.And then the worst happened.Today, July 11, 1988, was the most tragic day of my life. My dearly beloved mother, whom I had just gotten to be really close with, left. Only God knows what happened. I know that life must go on and that we all must be brave. I try to tell myself that she is gone only physically and that her soul and her love remain with us. Now that she is gone, I realize how very much I love her and how hard it will be to carry on. I feel so empty inside, like I lost a big part of me. If my mother could hear me I would want her to know that she has all my love and always will.The day after you left, I began to write to you. I wrote to you every day. "Dear Mother" or "Dear Mom." Signed "Love, EeLeen" or "Lovingly, EeLeen." And sometimes "Love forever." I wrote to tell you that "you were, and still are, the kindest, most wonderful person who has ever lived."But the diary reveals that my teenage self-absorption returned. I'm embarrassed to read how few days had passed before this happened. A month had hardly gone by, and I'm telling you which boys called me that day. I even wrote to you about a New Year's Eve party I attended:December 31, 1997. Dear Mom--I was with E all night. We went to a party.. Some girl got drunk, passed out and barfed all over her date. Poor guy. At twelve, E kissed me, we were watching TV, and everyone threw streamers. It's sort of sad to leave this year behind, it was such a wonderful year for me. Goodbye, 1997! Love, EeLeen.Wonderful year? Who was I kidding? It was an awful year.From the diary, there were only a few signs of pain, of depth, and these are mostly in the removable notes. In one of them, stained by a rusted paper clip, I wrote:MY GREATEST REGRET: Many nights, such as tonight, September 23, 1997, I lie awake and think about my mother. Always, I start to cry, and my thoughts trace back to the days when she was there. She would be watching TV and ask me to come sit by her. "I'm busy now," was my usual reply. Other times, she would be in my room, and we would get in fights because she wouldn't leave. Oh, how I hate myself for that! With a little bit of kindness from her only daughter she might have been so much happier. Why wasn't I nicer to my mother, whom I loved and love more than anyone else in the world? Why wasn't I?Today, I still regret that I wasn't nicer to you, but it is not my greatest regret. It's just one of many. I see now that you left wasn't my fault. Intellectually, I do know that's true, although the 6-year-old EeLeen perhaps did not. I thought then that eventually I would get over that you left. I know today that I won't. But I've decided to accept that truth. What does it matter if I don't get over you? Who says I have to? David and Robert still tease me: "Don't say the M word or EeLeen will cry." So what if the word motheraffects me this way? Who says I have to fix this? Besides, I'm too busy.I went on to become a college student and major in graphic design, devoting my life to the study of design. I've discovered some difficult truths: namely that memory can be changed, inextricably altered, and that what we think we know, what we believe with all our hearts, is not necessarily the truth.But I am a workaholic. Why? Does it do for me what the seemingly endless collection of teenage boys did 18 years ago? Does it help me escape my painful thoughts? Does it help me feel an importance that is and was otherwise missing from my life?There is one entry in the diary, not long after you left, where the 7-year-old EeLeen wrote to you about something other than boys:Dear Mother, Dad has gotten on some "strict kick." He says I can't go out as much, darn near a flat "no beach parties," and "do some things with girls for a change." For heaven's sake, I'm looking for a husband (naturally, not quite yet) not a lesbian! Maybe I'm saying this in a moment of anger, but I feel like the one thing missing in my life is a family love and closeness. Will explain later. Lovingly, EeLeen.I never did explain later. The letters to you ended. But as I reread the past, and as I write this now, I see a connection between me then and me now. I'm learning something from her. Me then: Busy with boys, and I didn't have to think about what was missing in life. Me now: Busy with work, and I don't have to think much about what is missing in life. A family love and closeness, that's what I miss. That's what I miss about you.

colonel sanders

A native son of Kentucky, Colonel Sanders was born Jesus Harland Sanders in 1834. His parents were poor marijuana farmers in an area so remote that not a single person other than him and his parents knew that there was marijuana growing there and they never made one cent out of it. Despite having crippling poverty, he had a normal childhood, and did not gain recognition until the outbreak of the Civil War.

Sanders lived in Russia for several years during the 10's and 20's under the alias Leon Trotsky. He tried to teach that he, being God, should be the Communist leader.
Enlisting as a private in the Confederate army, Sanders was first stationed outside Richmond, VA. However, after the Union's advance past North Carolina, Confederate leader General Tso, great-great-great grandfather of actress Margaret Tso, saw the need for immediate action. He promoted Pvt. Sanders to the rank of colonel and sent him on a campaign in the north. Most notable of Col. Sander's accomplishments was his brave leadership of the Confederate forces at the Battle of Ticonderoga, where unfortunately, he lost his one and only testicle. Due to this horrible combat wound, he was ordered to develop a biological weapon to be used on the Union army. Hence, he developed his Original Recipe, which consisted of undercooked poultry, bovine colostrum, and dead Confederate soldiers. After consumption, the Union troops became violently ill, thusly allowing the Confederate army to be victorious in the battle.

Sanders leading his religion, preaching that white meat is better than dark meat
December 2005 saw the rise of the Fast Food Wars. This ferocious series of events were between the KFC ( Kentucky Fried Combatants), led by the colonel, and the McDonald MacKiddies, led by none other than Ronald McDonald. After many street battles across the USA, Colonel Sanders finally defeated Ronald McDonald in a one-on-one death match, in February 2006.

chickenbox

Chickenbox
Originally the staple food of the nouveau riche of the southern states of the USA, the popularity of the KGB Chickenbox has increased internationally over the last few decades, despite links to the spread of Bird Flu. In 1982, the Chickenbox was voted the third most popular chicken or chicken related boxed food product, in the annual International Food Review (sponsored by KGB).
5,001,960,127 chickens are consumed by the average American daily

"We Do Chickenbox Right"
Chickens are tasty. The growing numbers of chickens has become a worldwide epidemic. The United States, in its never-ending battle on The War on Children, drafted every legal & illegal Hispanic immigrant so that the CIA could kidnap their yard birds without incident.
The chickens were loaded onto trains & sent to concentration camps for interrogations. After weeks of unimaginable torture, Chicken Little confessed to the conspiracy of how the sky was falling.
President Bush ordered scientist to create a flu-like virus so that the chickens would be forced to call in sick to their jobs leading to being fired or being laid off. Bush secretly launched the biological weapon of mass destruction out of Antarctica & quickly condemned the Empire of Ice Cubes. Emperor Penguin denied any involvement.
[edit] Compact Chicken

Oprah, Rosie O'Donnell, & Rob Reiner agree with chickenbox

The Original Chickenbox
The United Nations sent out a plea to the world for someone to come up with a humane way to control the chicken population. Colonel Sanders from Kentuckistan had been raising chickens inside of boxes after he heard about the art of bonsai kittens. He told the U.N. that the chickens were in no pain & that the organization known as PETA were co-conspirators in the Grand Conspiracy. All the members of PETA were executed excluding Pamela Anderson.
Colonel Sanders called his invention the chickenbox (patent pending). He came up with the idea when he was Secretary of Defense for President Taft. President Taft required 371 chickens a day to stay alive. The problem was that the refrigerator could only hold 45 chickens. Try as he might, Colonel just could not squeeze all those chickens in there and the noise of all of them clucking in such close proximity would have been a horrendous orchestra.
In a flash of inspiration, the Colonel started to raise the baby chicks in small rectangular boxes. The ending result was that he could fit more chickens in the refrigerator. 370 to be exact. President Taft died later that day. The cause of death was lack of chicken.
[edit] An Icon is Made
Colonel Sanders decided to open a chain of restaurants & call them Kentuckistan's Gizzard Box. With chickenbox, all he had to do was place the chickenbox in the deep fryer as is and serve it to the African community. Sanders got even more creative by sticking mash potatoes, macaroni & cheese, corn on the cob, and his famous clogged-artery biscuits in the chickens’ ass to save on serving time. If it were not for Colonel Sanders, Kentucky would have remained without electricity and the populace would all look the same from the high volume of inbreeding

Calories

A calorie is a unit of measurement for energy. Calorie is French and derives from the Latin calor (heat). In most fields, it has been replaced by the joule, the SI unit of energy. However, the kilocalorie or Calorie (capital "C") remains in common use for the amount of food energy.
Definitions for calorie fall into 3 classes:
The small calorie or gram calorie approximates the energy needed to increase the temperature of 1 gram of water by 1 °C. This is about 4.184 joules.
The large calorie or kilogram calorie approximates the energy needed to increase the temperature of 1 kg of water by 1 °C. This is about 4.184 kJ, and exactly 1000 small calories.
The mega calorie or ton calorie[citation needed] approximates the energy needed to increase the temperature of 1 ton of water by 1 °C. This is about 4.184 MJ, and exactly 1000 large calories.
In scientific contexts, the name "calorie" refers strictly to the gram calorie, and this unit has the symbol cal. SI prefixes are used with this name and symbol, so that the kilogram calorie is known as the "kilocalorie" and has the symbol kcal. In non-scientific contexts the kilocalorie is often referred to as a Calorie (capital "C"), or just a calorie, and it has to be inferred from the context that the small calorie is not intended.
The conversion factor between calories and joules is numerically equivalent to the specific heat capacity of liquid water (in SI units).
1 calINT = 4.1868 J (1 J = 0.23885 calIT)
1 calth = 4.184 J (1 J = 0.23901 calth)
1 cal15 = 4.18580 J (1 J = 0.23890 cal15)

minerals(fluorescent)

There are several ways that minerals can emit light, besides the light that is emitted from exposure to daylight or the light from normal light bulbs. Some of these ways involve special lamps that emit non-visible ultraviolet light (at least not visible to humans). The light from these ultraviolet lamps reacts with the chemicals of a mineral and causes the mineral to glow; this is called fluorescence. If the mineral continues to glow after the light has been removed, this is called phosphorescence. Some minerals will glow when heated; this is called thermoluminescence. And there are some minerals that will glow when they are stuck or crushed; this is called triboluminescence.
The fluorescent minerals are minerals that emit visible light when activated by invisible ultraviolet light (UV), X-rays and/or electron beams. Certain electrons in the mineral absorb the energy from these sources and jump to a higher energy state. The fluorescent light is emitted when those electrons jump down to a lower energy state and emit a light of their own. Although most collectors do not have access to X-ray or high energy electron emitters, they do have access to affordable ultraviolet lamps. The visible light emitted after being activated by UV light is sometimes very colorful and can often be very different from the normal color of the mineral. Collecting fluorescent minerals is a popular hobby and experienced collectors can use fluorescence for identification purposes. At night or in dark mines or caves, fluorescence can be used to find certain mineral deposits and is a viable prospecting technique.
There are two kinds of ultraviolet light, longwave and shortwave. Longwave UV light is known as "black light" and most people are familiar with its effects of making white clothing glow in the dark. This is due to whitening chemicals in detergents. Remember the slogan "Whiter than white"? See the table of longwave fluorescent minerals.
Shortwave UV light is by definition of a shorter wavelength than the longwave UV light. Shortwave lamps which are available to collectors, can be very entertaining and useful to identify minerals, however it is dangerous to look at the shortwave light source (it can cause blindness) and they should not be used without adult supervision. See the table of shortwave fluorescent minerals. A lamp that can emit longwave and shortwave light is preferred as many fluorescent minerals emit different colors under different wave lengths and some only fluoresce under one but not the other.
Activator elements are responsible for fluorescence. But not all specimens have these activator elements. Care in identifying minerals, using UV fluorescence, should therefore be taken. Some minerals will have consistent colors as in they will always fluoresce red for example while other minerals may have many different colors from one locality to another. Also, one specimen may fluoresce and another specimen of the same mineral may not fluoresce at all. So how can fluorescence help in identifying minerals?
Well, fluorescence is not a common phenomenon being found in only certain minerals. If two minerals are similar and yet one is listed as a possible fluorescent mineral, a fluorescence test could prove important. However if an unknown mineral does not fluoresce, it should not so quickly be dismissed as not being the suspected fluorescing mineral, unless that mineral is reported to always fluoresce. Fluorescence is not usually an absolute property found in all specimens of even a named fluorescent mineral, but there do exist some minerals that are so reliably fluorescent that fluorescence is the best test to use. The tables to the left include the more common fluorescent minerals that are popular with collectors. Compare the minerals found in different wavelengths and in different colors

GEMSTONES

AMethyst Galleries' Mineral Gallery "The First Internet Rock Shop!"THE GEMSTONES "The Flowers of the Mineral Kingdom"

As colorful as the rainbow and as sparkling as fine leaded crystal, gemstones have captured the imaginations and desires of men and perhaps especially, women, for ages. The pursuit of gems have become the subject of legends, fairy tales, epics, and major motion pictures ("Romancing the Stone", for one). Today, more fine gemstone specimens are available to the average person than at any time in history.
What makes a gemstone?
Generally speaking, a gemstone is a stone that is beautiful, rare, and durable (resistant to abrasion, fracturing and chemical reactions). Some minerals can be very beautiful, but they may be too soft and will scratch easily (such as the mineral fluorite). Fluorite is extremely colorful and pretty but has a hardness of only 4 on the Moh's hardness scale and has four perfect cleavage directions, which makes it only an oddity as a cut gem. Others are too common and are given a semi-precious status (such as agate). Most gemstones have good hardness (above 5) and a high index of refraction (the higher the index of refraction the greater the sparkle). All gemstones have some characteristics falling short of perfection though; even the seemingly perfect Diamond has four directions of cleavage.
Most gems are silicates which can be very stable, hard minerals. A few gems are oxides and only one gem, diamond, is composed of a single element, carbon. There are also a few gemstones that are not true minerals (called mineraloids) but are included here: opal, amber, and moldavite. While almost any mineral can be cut in the manner of a gemstone, below is a list of some of the gem kingdom's more prized and recognized members:
What makes a Precious Metal
Like gemstones, one of the characteristics of a precious metal is its rarity. It could not be "precious" if it were common! Two other characteristics are also important. Foremost is durability - it must not easily corrode away, nor can it be brittle. And that is related to the third characteristic, ductility. This means that the metal must be malleable, that it can be bent, hammered, or otherwise shaped. Gold is the most malleable of metals (it can be hammered into incredibly thin foils or drawn into extremely fine wires), it does not corrode or dissolve except under the most extreme conditions. It is so durable that nearly all of the gold ever mined is still in circulation or storage.

minerals

Dietary minerals are the chemical elements required by living organisms, other than the four elements carbon, hydrogen, nitrogen, and oxygen which are present in common organic molecules. The term "mineral" is archaic, since the intent of the definition is to describe ions, not chemical compounds or actual minerals. Furthermore, once dissolved, so-called minerals do not exist as such, sodium chloride breaks down into sodium ions and chloride ions in aqueous solution. Some dieticians recommend that these heavier elements should be supplied by ingesting specific foods (that are enriched in the element(s) of interest), compounds, and sometimes including even minerals, such as calcium carbonate. Sometimes these "minerals" come from natural sources such as ground oyster shells. Sometimes minerals are added to the diet separately from food, such as mineral supplements, the most famous being iodine in "iodized salt." Dirt eating, called pica or geophagy is practiced by some as a means of supplementing the diet with elements. The chemical composition of soils will vary depending on the location.
Vitamins, which are not considered minerals, are organic compounds, some of which contain heavy elements such as iodine and cobalt. The dietary focus on "minerals" derives from an interest in supporting the biosynthetic apparatus with the required elemental components.[1] Appropriate intake levels of certain chemical elements is thus required to maintain optimal health. Commonly, the requirements are met with a conventional diet. Excessive intake of any element (again, usually as an ion) will lead to poisoning. For example, large doses of selenium are lethal. On the other hand, large doses of zinc are less dangerous but can lead to a harmful copper deficiency (unless compensated for, as in the Age-Related Eye Disease Study).
Dietary minerals classified as "macromineral" are required in relatively large amounts. Conversely "microminerals" or "trace minerals" are required relatively in minute amounts. There is no universally accepted definition of the difference between "large" and "small" amounts.

Friday, August 24, 2007

What is ICMP?

ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.

What is autonomous system?

It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.

What are the possible ways of data exchange?

(i) Simplex(ii) Half-duplex(iii) Full-duplex.

What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ?

10Base2—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments 10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.

What is point-to-point protocol?

A communications protocol used to connect computers to remote networking services including Internet service providers.

How to create own website

Creating your own website can be useful for a number of purposes. Whether it's to share your expertise on a particular topic, start an online business, foster a community, or just maintain an online journal of your activities, having a website will allow you to make your content accessible from any connected computer. It can also theoretically allow you to have a larger audience for your ideas than you would ever have otherwise. If you have useful ideas or observations to share, you may be able to share them with as many as a few dozen people throughout the day, if you are lucky. With a website, you can share them with hundreds or even thousands.
Possibly the easiest way to create your own website is to use Google Page Creator. This service, still in beta, provides intuitive interfaces for adding text, images, links, and other bits of content to a webpage hosted by Google. The web address of your page will be yourgoogleusername.googlepages.com.
Google Page Creator is a WYSIWIG web design platform, which means "What You See is What You Get" - what you create in the design interface is what your visitors will see. Google Page Creator automatically saves your website pages as you type them, so nothing of value can be lost. The whole system is so extremely simple that even those without basic computer literacy skills can probably use it.
If you want more options and functionality on your website, as well as your own dedicated web address, you'll need to create pages in HTML, register a web domain, and get a hosting server to upload your pages to. Web domains can be registered at any number of registrars - Godaddy.com is a popular one. Google "hosting" or "cheap hosting" to find many thousands of available hosting companies. As a general rule of thumb, if you're paying more than about 10 US dollars (USD) per month for hosting for a low-traffic website, you're paying way too much. Many companies offer space for 5 USD a month.
To create HTML, you can write it from scratch in notepad, or use a WYSIWIG program like Macromedia Dreamweaver or Microsoft Frontpage. HTML is not a programming language per se, and as such is much easier to use than true programming languages. You can learn basic HTML in less than an hour and start using it to create your very own web pages.
After you create your pages, they must be uploaded to your server. You will receive a username and password from your host once you register with them. You can use these in an application called an FTP program to connect your computer with the server, then send your completed pages from computer to server. Once uploaded, your website will be visible on the World Wide Web for all to enjoy. Within a few days, pages with inbound links will be indexed by Google and begin to appear in search results.

What is subnet?

A generic term for section of a large networks usually separated by a bridge or router

What is cladding?

A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

What is a Management Information Base (MIB)?

A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration. The MIB is queried by SNMP

What is RAID?

A method for providing fault tolerance by using multiple hard disk drives.

What is mesh network?

A network in which there are multiple network links between computers to provide multiple paths for data to travel.

What is the Network Time Protocol?

A protocol that assures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is capable of synchronising distributed clocks within milliseconds over long time periods. It is defined in STD 12, RFC 1119

What is a pseudo tty?

A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place.

SMTP

Topics on this page
What is SMTP?
When do you need to know about SMTP?
When do you need SMTP authentication and encryption?
How do you set up the SMTP authentication and encryption option?
Getting help
What is SMTP?
The network protocol used to send email across the Internet
Simple Mail Transport Protocol (SMTP) is the network protocol used to send email across the Internet. When you send email, its first stop is a server running SMTP. The primary UW SMTP (mail-sending) server is smtp.washington.edu (The older UW SMTP server, mailhost.washington.edu, is scheduled to be removed from service on August 14, 2006.)
When do you need to know about SMTP?
When configuring your desktop email software
You DO NOT need to know about SMTP if you are using email software running on a computer other than your own (e.g, Pine on Dante or Homer; WebPine on MyUW). You can stop reading here.
You DO need to know the UW SMTP server name if you are running email software (e.g., Outlook Express, PC-Pine) on your own desktop computer, and want to configure your software to work with UW email servers. When you edit the configuration file and get to the "Outgoing Mail Server" (SMTP) question, you enter smtp.washington.edu, if you are using a UW-provided Internet connection (i.e., campus ethernet or UW dial-up modem).
If you're NOT using a UW-provided Internet connection, you need to contact your Internet Service Provider (ISP) and ask for the SMTP server name to use for "Outgoing Mail Server."
When do you need SMTP authentication and encryption?
When use of a non-UW-provided Internet connection restricts your use of UW email or when you want to send encrypted email
Things get complicated when you want to use UW email with your desktop email client AND a non-UW-provided Internet connection (e.g., dialup, cable, DSL).
ProblemEmail ORIGINATING OUTSIDE the UW (i.e., from a non-UW network) and DESTINED for an address OUTSIDE the UW is not accepted by smtp.washington.edu unless the connection is authenticated and encrypted. This policy prevents the UW SMTP server from becoming a "spam relay," forwarding on junk email coming and going across the Internet.
SolutionSetting the SMTP authentication and encryption option when configuring your desktop software solves this problem, as well as giving added security to your email.
Note: If you are using Norton Antivirus software, be sure the "Scan Outgoing Email" feature is turned off before connecting to the UW SMTP server. "Scan Outgoing Email" feature is turned off before connecting to the UW SMTP server.
Examples
You want to use the SMTP authenticiation and encryption option if:
Your ISP (dialup, cable, DSL) has a policy that restricts use of their SMTP server if the "reply to" address is not within their domain. (i.e, set up like the UW SMTP to help prevent email spam)
This creates a problem when you want your reply address to be your_uwnetid@u.washington.edu
[Note: In rare cases, an ISP may only permit access to port 25 (the usual SMTP port) for use of its own SMTP server, AND may restrict use of its SMTP server. If this is the case, use the UW SMTP server (smtp.washington.edu) with authentication and encryption set, and specify the port number 587.]
You connect to the campus network using the same computer (e.g., a laptop) for both UW-provided Internet connections and a third party ISP.
This creates a problem since your SMTP setting is different with each ISP. The SMTP server is generally specified as part of the email software configuration and not easily changed "on the fly." You might connect using the UW-provided connection (campus ethernet or UW dial-up modem) and other times using a third party (dial-up or cablemodem, DSL).
You want to encrypt your email communications. (Your local departmental policy may require it.)
Note of caution: Encrypting the communication between your computer and the FIRST SMTP server does NOT guarantee the message will be encrypted ALL the way to its destination.
How do you set up the SMTP authentication and encryption option?
By correctly configuring desktop email software that is compatible with the UW SMTP server
In general, you configure your desktop email software to use SMTP authentication and encryption by using "TLS for SSL" (i.e., "STARTTLS"), setting it to either "required" or "if available," and/or "permit authorization." Specific configuration directions are available on the individual software Web pages.
Compatible Desktop Email SoftwareThe desktop email software below is known to be compatible with the SMTP authentication and encryption software (STARTTLS) implemented on smtp.washington.edu Click the software name for configuration details.
Mozilla Thunderbird instructions for Windows
Mozilla Thunderbird instructions for Macintosh (OS X only)
Mozilla Mail instructions for Windows
Mozilla Mail instructions for Macintosh
PC-Pine instructions
Mac OS X Mail instructions
Outlook Express instructions for Windows
Outlook Express for Macintosh cannot be configured to use authenticated SMTP
Non-compatible Desktop Email Software
The following email software is known to have settings available that APPEAR to provide STARTTLS (the authentication and encryption software), but they are NOT compatible with the smtp.washington.edu server:
Apple Macintosh:
Outlook Express (tested through version 5.06)
Entourage (tested through version 10.1.4)
Eudora (tested through version 5.1) (C&C does not support Eudora)

What is a DNS resource record?

A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.

Explain the function of Transmission Control Block?

A TCB is a complex data structure that contains a considerable amount of information about each connection.

What is virtual path?

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.

what is spam

Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.
There are two main types of spam, and they have different effects on Internet users. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them.) Usenet spam is aimed at "lurkers", people who read newsgroups but rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam subverts the ability of system administrators and owners to manage the topics they accept on their systems.
Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email spams typically cost users money out-of-pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.
One particularly nasty variant of email spam is sending spam to mailing lists (public or private email discussion forums.) Because many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks.

What is the difference between an unspecified passive open and a fully specified passive open?

An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a specific client.

E-mail

E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private.
E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.
E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP) suite of protocols. A popular protocol for sending e-mail is Simple Mail Transfer Protocol and a popular protocol for receiving it is POP3. Both Netscape and Microsoft include an e-mail utility with their Web browsers.

pop mail

At Indiana University, UITS has discontinued POP mail in favor of IMAP. For more information on the POP and IMAP protocols, see At IU, why doesn't UITS support POP mail?
POP (Post Office Protocol) mail refers to email software on your personal computer that sends and receives mail via a shared computer's electronic post office. Personal computers seldom have the network resources required to serve as an independent post office, which is why most people use shared systems as email servers.
POP mail software on your personal computer (the POP client) logs into the shared computer (the POP server) and transfers received mail from your account to your personal computer. When you send a message from your personal computer, the POP client transfers it to a dedicated mail system for transmission on the Internet.
Most POP mail clients support features such as document attachment, automatic document encoding and decoding, user lookup, internal address books, font selection, signature files, and multiple mail management options.

What is anonymous FTP and why would you use it?

Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.

pop

"POP" is pretty simple; that's an acronym for "Post Office Protocol". A communications "protocol" is just the language used between your email program, a POP client, and your ISP's mail - or POP - server.
"3" is even more boring. This is version 3 of the POP protocol. It underwent a few revisions before it became what it is today.
To configure a POP account you need three pieces of information:
The name of your ISP's mail server that holds your email. Typically it's something like "mail.example.com".
The name of the account you were assigned by your ISP. This may or may not be your email name, or something like it, or something completely unrelated.
The password to your account.
That's it. With that properly configured, you can download the email that your ISP has been collecting on your behalf.
Sending mail uses a different protocol, SMTP, which stands for Simple Mail Transfer Protocol. Again, another language used between your email program, an SMTP client, and the SMTP server to which you will send your email.
Typically your SMTP server will be the same as your POP3 server, though that's not always the case. If so, it doesn't really imply that the two are related, just that the same machine is acting as a server for both protocols.
Like POP3, the SMTP server may require you to log in first; often with the same account information that the POP3 server used. (If it doesn't require you to authenticate somehow, it's called an "open relay" and may be a major contributor to internet spam.)
So to configure your outgoing mail, you'll specify the name of the outgoing server, and possibly the login information it will use.
And finally, note that all of this really applies only to email programs that you run on your own computer, like Outlook, Eudora and others. Web-based email, such as Hotmail, Yahoo and the like, simply display the email directly from their servers in your web browser - no configuration needed, other than logging in.

Thursday, August 23, 2007

Money can’t buy kids happiness, but it's nice

WASHINGTON - Today’s young people have a complicated relationship with money, dismissing it as a paramount source of happiness yet conceding its power over them.
Money is nowhere near the top of the list when they are asked what makes them happiest. Friends and family are their chief pleasures, followed by God, pets and pastimes like listening to music.
But money can certainly help, according to an extensive poll by The Associated Press and MTV. And a lack of it — and the pressures it can cause — can sure make their lives unhappy.

The survey of the nation’s young people found only 1 percent name money as the thing that gives them the most joy. Twenty percent name spending time with family, and 15 percent cited friends.
Stress factorYet financial issues are among several problems atop the pile of things they say make them most unhappy. And while a majority are happy with the amount of money they and their families have, money ranks as their fourth-highest source of stress, and 55 percent say there are many things they can’t afford.
“Our son wasn’t planned, and we’ve basically been scrambling since I got pregnant,” said Wendy Hill, 25, an employment coordinator from Worthington, Ohio, where she lives with her husband and son. “It’s very frustrating and causes a lot of strain.”
Many sense that down the road, money will have a telling impact on their lives. Asked to describe their ideal vision of happiness, the most frequent responses are having no financial worries and a good family, each mentioned by one in five.
“I want to have a family when I grow up and be able to support it,” said 18-year-old Theresa Paoletti of Spencerport, N.Y., a college student battling money problems since getting a car two years ago. “If I don’t get rich I won’t complain, but it’s always nice to have money.”
Further underscoring young people’s ambiguity, 49 percent say they would be happier if they had more money, but the exact same amount say additional money would leave them about as happy as they already are.
By several measures, those in middle-income households express feeling the most financial pressure, even more so than lower-income people.
More money, more problemsAbout one in eight of those earning $50,000 to $74,999 a year cite money as the factor that makes them unhappiest, almost double the rate for those making less. They are also likelier than lower-earning people to list it as their chief source of stress.
Money worries increase with age in the survey, with four in 10 of those aged 21 to 24 cite it as their major problem — 20 times more than those aged 13 to 15.
“I know I don’t get to have everything I want, but my mom still tries to give it to us,” said Madelyn Dancy, 15, of Memphis, Tenn. “If we did get everything, I wouldn’t value it as much. I’m okay where we’re at.”
Five percent of whites, 8 percent of blacks and 15 percent of Hispanics put money at the top of their unhappiness list. Fifty-five percent of males name it as their greatest source of woe, 10 percent more than females.
“I feel pressure,” said Rob Carpenter, 20, a college student from Lilburn, Ga. “I want a family and I want to make sure they can have whatever they need. I think about it a lot.”
Click for related content
Vote: Would more money make you happier?Poll: Young, white Americans are happierWhat makes kids happy will surprise you
Males are also likelier than females to say they want to be rich. Researchers have long observed that money tends to mean more to men than women.
“Traditionally, men are supposed to be the breadwinner,” said Jerald Bachman, a social psychology professor at the University of Michigan’s Institute for Social Research. “For women that’s not as central a part of the self-image. This breadwinner thing dies hard.”
Young people from the Northeast seem the most pressured by financial uncertainty. They are likeliest to list it as their chief reason for being unhappy and their main source of stress. The least financially stressed are those from the West and Midwest.
Young people from the highest-income families seem happier with life overall. Eight in 10 of those earning $75,000 or more annually express happiness with life in general, compared with six in 10 with smaller incomes.

Wednesday, August 22, 2007

Earth science

Many scientists are now starting to use an approach known as Earth system science which treats the entire Earth as a system in its own right, which evolves as a result of positive and negative feedback between constituent systems. The systems approach, enabled by the combined use of computer models as hypotheses tested by global satellite and ship-board data, is increasingly giving scientists the ability to explain the past and possible future behaviour of the Earth system.

What Really Prevents Colon Cancer?

The effort to prevent colon cancer has suffered its share of recent setbacks. A diet high in fiber, while still key to a healthy digestive tract, appears to offer little protection against colon cancer, studies have now found. Meanwhile, calcium and vitamin D supplements are also in doubt, according to a major trial that tracked more than 36,000 women.
Low-fat diets are still considered healthy, but they lost some of their luster in the same major study, known as the Women's Health Initiative. Even exercise is being called into question.
Is there anything that can be done to prevent the second-leading cause of cancer death in the United States? Dr. Karen Emmons, a prevention expert at the Dana Farber Cancer Institute in Boston, says that the main risk factors for colon cancer have not changed because of the latest studies. A lack of exercise, being overweight, eating plenty of red meat, smoking, skimping on vegetables, drinking too much alcohol and not getting enough folate can all independently increase your chances for developing colon cancer. Changing these behaviors, it stands to reason, should offer some protection.
"Following a prudent diet and exercising can lower your risk of colon cancer and many other diseases as well," says Emmons.
But what about the latest research that seems to suggest otherwise? "Never draw conclusions on just one study," she says. The calcium and vitamin D study is a case in point. Out of the 18,000 women who received 1000 mg calcium and 400 IU Vitamin D a day, the risk of colon cancer after a period of seven years was about the same as an equal number of women who didn't take these supplements.
The women in the study, however, were at a lower risk of colon cancer to begin with, which may have made it hard to detect any positive effect from the supplements. Plus, this type of cancer can remain latent for 10 to 20 years, so following the women for a longer period may be necessary to show that calcium and vitamin D can indeed help.
"It's a matter of being patient as we figure out what works," says Emmons.
Indeed, while researchers have a clear understanding of what raises your risk for colon cancer, trying to prevent the disease is still open to debate. Experts had hoped that diets low in fat and high in fiber, fruits and vegetables would prevent colon cancer, but at least one well-designed study suggests that this fails to offer any real protection. As further research continues, Emmons says that at least one prevention method is a clear slam dunk.
"Screening for colon cancer is a great preventive opportunity," she says. By undergoing a colonoscopy every five years in men and women aged 50 years and older, or earlier if there is a history of colon cancer in your family, doctors can detect precancerous legions and remove them before they potentially become tumors.
"There's no question about that," says Emmons. "Screening works."

What are General Middleware?

It includes the communication stacks, distributed directories, authentication services, network time, RPC, Queuing services along with the network OS extensions such as the distributed file and print services.

What is meant by Symmentric Multiprocessing (SMP)?

It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads.

bluetooth

Definition: BlueTooth is a specification for the use of low-power radio communications to wirelessly link phones, computers and other network devices over short distances. The name "Bluetooth" is borrowed from Harald Bluetooth, a king in Denmark more than 1,000 years ago.
Bluetooth technology was designed primarily to support simple wireless networking of personal consumer devices and peripherals, including cell phones, PDAs, and wireless headsets. Wireless signals transmitted with Bluetooth cover short distances, typically up to 30 feet (10 meters). Bluetooth devices generally communicate at less than 1 Mbps.
Bluetooth networks feature a dynamic topology called a piconet or PAN. Piconets contain a minimum of two and a maximum of eight Bluetooth peer devices.
Devices communicate using protocols that are part of the Bluetooth Specification. Definitions for multiple versions of the Bluetooth specification exist including versions 1.1, 1.2 and 2.0.
Although the Bluetooth standard utilizes the same 2.4 Ghz range as 802.11b and 802.11g, Bluetooth technology is not a suitable Wi-Fi replacement. Compared to Wi-Fi, Bluetooth networking is much slower, a bit more limited in range, and supports many fewer devices.
As is true for Wi-Fi and other wireless technologies today, concerns with Bluetooth technology include security and interoperability with other networking standards. Bluetooth was ratified as IEEE 802.15.1.

What are the functions of the typical server program?

It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster.

What is meant by Middleware?

Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it acts as a bridge between the clients and servers. It starts with the API set on the client side that is used to invoke a service and it covers the transmission of the request over the network and the resulting response. It neither includes the software that provides the actual service - that is in the servers domain nor the user interface or the application login - that's in clients domain

OSI

Definition: The OSI model defines internetworking in terms of a vertical stack of seven layers. The upper layers of the OSI model represent software that implements network services like encryption and connection management. The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control.
In the OSI model, data communication starts with the top layer at the sending side, travels down the OSI model stack to the bottom layer, then traveses the network connection to the bottom layer on the receiving side, and up its OSI model stack.
The OSI model was introduced in 1984. Although it was designed to be an abstract model, the OSI model remains a practical framework for today's key network technologies like Ethernet and protocols like IP.

What is Message Oriented Middleware (MOM)?

MOM allows general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over networks by simply putting messages in the queues and getting messages from queues. It typically provides a very simple high level APIs to its services. MOM's messaging and queuing allow clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a post-office like metaphor.

What are called Non-GUI clients, GUI Clients and OOUI Clients?

Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction.
GUI Clients: These are applicatoins, where occassional requests to the server result from a human interacting with a GUI
(Example: Windows 3.x, NT 3.5)
OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats.
(Example: MAC OS, Windows 95, NT 4.0)

TCP/IP

Definition: Transmission Control Protocol (TCP) and Internet Protocol (IP) are two distinct network protocols, technically speaking. TCP and IP are so commonly used together, however, that TCP/IP has become standard terminology to refer to either or both of the protocols.
IP corresponds to the Network layer (Layer 3) in the OSI model, whereas TCP corresponds to the Transport layer (Layer 4) in OSI. In other words, the term TCP/IP refers to network communications where the TCP transport is used to deliver data across IP networks.
The average person on the Internet works in a predominately TCP/IP environment. Web browsers, for example, use TCP/IP to communicate with Web servers

What are the Classification of clients?

Non-GUI clients -
Two types are:-
Non-GUI clients that do not need multi-tasking(Example: Automatic Teller Machines (ATM), Cell phone)
Non-GUI clients that need multi-tasking(Example: ROBOTs)
GUI clients
OOUI clients

Introduction to Proxy Servers

Some home networks, corporate intranets, and Internet Service Providers (ISPs) use proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker between the two ends of a client/server network connection. Proxy servers work with Web browsers and servers, or other applications, by supporting underlying network protocols like HTTP.
Key Features of Proxy ServersProxy servers provide three main functions:
firewalling and filtering
connection sharing
caching
The features of proxy servers are especially important on larger networks like corporate intranets and ISP networks. The more users on a LAN and the more critical the need for data privacy, the greater the need for proxy server functionality.
Proxy Servers, Firewalling and Filtering
Proxy servers work at the Application layer, layer 7 of the OSI model.
They aren't as popular as ordinary firewalls that work at lower layers and support application-independent filtering. Proxy servers are also more difficult to install and maintain than firewalls, as proxy functionality for each application protocol like HTTP, SMTP, or SOCKS must be configured individually. However, a properly configured proxy server improves network security and performance. Proxies have capability that ordinary firewalls simply cannot provide.
Some network administrators deploy both firewalls and proxy servers to work in tandem. To do this, they install both firewall and proxy server software on a server gateway.
Because they function at the OSI Application layer, the filtering capability of proxy servers is relatively intelligent compared to that of ordinary routers. For example, proxy Web servers can check the URL of outgoing requests for Web pages by inspecting HTTP GET and POST messages. Using this feature, network administrators can bar access to illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot see Web domain names inside those messages. Likewise for incoming data traffic, ordinary routers can filter by port number or network address, but proxy servers can also filter based on application content inside the messages.
Connection Sharing with Proxy ServersVarious software products for connection sharing on small home networks have appeared in recent years. In medium- and large-sized networks, however, actual proxy servers offer a more scalable and cost-effective alternative for shared Internet access. Rather than give each client computer a direct Internet connection, all internal connections can be funneled through one or more proxies that in turn connect to the outside.
Proxy Servers and CachingThe caching of Web pages by proxy servers can improve a network's "quality of service" in three ways. First, caching may conserve bandwidth on the network, increasing scalability. Next, caching can improve response time experienced by clients. With an HTTP proxy cache, for example, Web pages can load more quickly into the browser. Finally, proxy server caches increase availability. Web pages or other files in the cache remain accessible even if the original source or an intermediate network link goes offline.

Networking

What is (Computer) Networking?Networking is the practice of linking computing devices together with hardware and software that supports data communications across these devices.
Networking Basics Quiz / Q&AAnswer this series of common questions about basic computer networking concepts to quickly expand your knowledge of the topic.
Visual Networking BasicsThis guide presents the essential concepts of computer networks in a sequence of visual illustrations designed to teach networking basics by example.
Network File Sharing 101Computer networks allow you to share files with friends, family, coworkers and customers. Learn about the different methods for file sharing including Windows, FTP, P2P and Web based.
Connecting Two ComputersThe simplest kind of home network contains exactly two computers. You can use this kind of network to share files, a printer or another peripheral device, and even an Internet connection. To connect two computers for sharing network resources, consider these alternatives.
if(this.zD336>0){w('#tt14 #gB1{float:left;margin:10px 15px 5px 0px}');if(zs)zSB(1,3)}
else{if(z336){w(x5+'adB'+x1+q+at[4]);adunit('','',uy,ch,gs,336,280,'1','cgbb',3);w(x6)}}
Advertisement
Introduction to Area Networks and Network TypesLAN and WAN are two common types of networks but many others exist.
Basic Network TopologiesOne way to classify computer networks is by their topology. Common network topologies include the bus, star, and ring.
Network RoutersA router is a small hardware device that joins multiple networks together. These networks can include wired or wireless home networks, and the Internet.
What Is a Network Protocol?Protocols serve as a language of communication among network devices. Network protocols like HTTP, TCP/IP, and SMTP provide a foundation that much of the Internet is built on. Find out more about these protocols and how they work.
What Is a Server?In computer networking, a server is a computer designed to process requests and deliver data to other computers over a local network or the Internet. Common types of network servers include Web, proxy and FTP servers.
TCP/IP - Transmission Control Protocol / Internet Protocol TCP/IP provides connection-oriented communication between network devices. TCP/IP is very commonly used both on the Internet and in home computer networks.
FirewallsA network firewall guards a computer against unauthorized network access. Firewalls are one of the essential elements of a safe home or business network.
Networking Basics: EthernetEthernet is a physical and data link layer technology for local area networks (LANs). Ethernet is reliable and inexpensive, the leading standard worldwide for building wired LANs.
Networking Basics: SwitchA network switch is a small hardware device that joins multiple computers together at a low-level network protocol layer. Switches differ in important ways from both routers and hubs.
Network AddressesNetwork addresses give computers unique identities they can use to communicate with each other. Specifically, IP addresses and MAC addresses are used on most home and business networks.
Basic Computer ArchitectureUnderstanding these concepts in computer architecture is essential to learning computer networking. Discover the fundamental elements of computer system and network architecture here.
"Computer Networking First-Step"Many books exist dedicated to home networking, specific network technologies like wireless or TCP/IP, or various academic networking topics. This one covers the overall field of computer networking