Welcome

KU 5TH SEM PRACTICAL SOLUTIONS

Set 1

//1. Open an Image. And separate background using selection tool.
Step 1: run Photoshop
Step 2: go to file menu -> open 
Step 3: select image ->click open
Step 4: click on magic wand tool from tool menu
Step 5: select on background of the image using magic wand tool
Step 6: press delete on keyboard
Step 7: go to file menu -> save as
Step 8: select JPEG format
Step 9: enter file name -> click SAVE

//2. Write a JSP page to display the number of hits to this page. (Hint: use application scope of java bean).
<%@ page session="false" %>
<HTML>
<HEAD>
<TITLE>Page Counter Using URL Rewriting</TITLE>
</HEAD>
<BODY>
<H3>Page Counter Using URL Rewriting</H3>
<%
int count = 0;
String parm = request.getParameter("count");
if (parm != null)
count = Integer.parseInt(parm);
if (count == 0) {
%> This is the first time you have accessed this page. <%
}
else if (count == 1) {
%> You have accessed the page once before.<%
}
else {
%> You have accessed the page <%= count %> times before.<%
}
%>
<P> Click
<A HREF="urlrewriting.jsp?count=<%=count + 1 %>"
>here</A> to visit the page again.
</BODY>
</HTML>

KU 5TH SEM ASSIGNMENT - BSIT (TB) - 53 (DATA WAREHOUSING & DATA MINING)

PART - A
I. Note: Answer all the questions.
a) What is Normalization? What are the different forms of Normalization ?
The usual approach in normalization in database applications is to ensure that the data is divided into two or more tables, such that when the data in one of them is updated, it does not lead to anamolies of data (The student is advised to refer any book on data base management systems for details, if interested).
The idea is to ensure that when combined, the data available is consistent. However, in data warehousing, one may even tend to break the large table into several “denormalized” smaller tables. This may lead to lots of extra space being used. But it helps in an indirect way – It avoids the overheads of joining the data during queries.

b) Define Data warehouse. What are roles of education in a data warehousing delivery process?
Data Warehouse: In it’s simplest form, a data ware house is a collection of key pieces of information used to manage and direct the business for the most profitable outcome. It would decide the amount of inventory to be held, the no. of employees to be hired, the amount to be procured on loan etc.,.
The above definition may not be precise - but that is how data ware house systems are. There are different definitions given by different authors, but we have this idea in mind and proceed. It is a large collection of data and a set of process managers that use this data to make information available. The data can be meta data, facts, dimensions and aggregations. The process managers can be load managers, ware house managers or query managers. The information made available is such that they allow the end users to make informed decisions.

HOW TO PLAY HIDDEN SNAKE GAME ON YOUTUBE

We all visit youtube and watch videos but how many of us are aware of youtube hidden Snake game. I believe only a few people know about this hidden snake game. You can play this game on youtube while streaming any video. Snake gmae is one of the most interesting and traditional game in the world of gaming. In this tutorial I will show you how you can play this game on youtube.

i). Go to youtube and open any video for streaming

ii). When the video is streaming Hold Left button of mouse + Left arrow on keyboard + Top arrow on keyboard.

iii). Now you will see that the streaming circle starting to move like a snake.

DOWNLOAD WINDOWS 7 SP1 ISO IMAGE FILES

Download Windows 7 SP1 ISO Image Files

Official Windows 7 SP1 ISO from Digital River

With the release of Windows 7 SP1, Microsoft has also updated the Windows 7 DVD media ISO image distributed by Digital River for online order fulfillment. Digital River is Microsoft’s partner for fulfillment on online distribution for downloadable Microsoft products.

The Windows 7 ISO images hosted on Digital River is genuine and official version, and the downloads from the server is legal. It’s after all one of the official channel where end-users who purchase a license (product key) for Windows 7 get the setup installation files.
Anyway, without a genuine and legally purchased product key, you can’t get Windows 7 activated, and Windows 7 will only run as evaluation copy for up to 30 days.

The latest version of Windows 7 DVD image available is of media refresh version, which commonly known as Windows 7 SP1-U (Media Refresh). Microsoft released the media refresh version of Windows 7 DVD media to fix a rare bug related to invalid computer name when small set of computer names returned error when used to install Windows 7. Otherwise, the Windows 7 with SP1 and Windows 7 with SP1-U (Media Refresh) is completely the same.

KU 5TH SEM ASSIGNMENT - BSIT (TB) - 52 (WEB PROGRAMMING)

Assignment: TB (Compulsory)

Part - A
a) What is the difference between Internet and Intranet?
Internet: Internet is global network of networks.Internet is a tool for collaborating academic research,and it has become a medium for exchanging anddistributing information of all kinds. It is aninterconnection between several computers of different types belongingto various networks all over global.
Intranet: Intranet is not global. It is a mini web that islimited to user machines and software program of  particulars organization or company

b) List any five HTML tags.
Five HTML tags are:-
i). UL (unordered list): The UL tags displays a bulleted list. You can use the tag’s TYPE attribute to change the bullet style.
ii). TYPE: defines the type of bullet used of each list item. The value can be one of the following-CIRCLE, DISC, SQUARE
iii). LI (list item): The LI tag indicates an itemized element, which is usually preceded by bullet, a number, or a letter. The LI is used inside list elements such as OL (ordered list) and UL (unordered list).
iv). TABLES (table): The TABLE tag defines a table. Inside the TABLE tag, use the TR tag to define rows in the table, use the TH tag to define row or column headings, and the TD tag to define table cells.
v). HTML (outermost tag): The HTML identifies a document as an HTML document. All HTML documents should start with the and end with the tags.

KU 5TH SEM ASSIGNMENT - BSIT (TB) - 51 (GRAPHICS & MULTIMEDIA)

Assignment: TB (Compulsory)

1. What is the need for computer graphics?Computers have become a powerful tool for the rapid and economical production of pictures. Computer Graphics remains one of the most exciting and rapidly growing fields. Old Chinese saying “ One picture is worth of thousand words” can be modified in this computer era into “ One picture is worth of many kilobytes of data”. It is natural to expect that graphical communication, which is an older and more popular method of exchanging information than verbal communication, will often be more convenient when computers are utilized for this purpose. This is true because one must represent objects in two-dimensional and three-dimensional spaces. Computer Graphics has revolutionized almost every computer-based application in science and technology.

KU 5TH SEM ASSIGNMENT - BSIT (TA) - 53 (DATA WAREHOUSING & DATA MINING)

Assignment: TA (Compulsory)

1. With neat diagram explain the main parts of the computer
A Computer will have 3 basic main parts –
i). A central processing unit that does all the arithmetic and logical operations. This can be
thought of as the heart of any computer and computers are identified by the type of CPU
that they use.
ii). The memory is supposed to hold the programs and data. All the computers that we came
across these days are what are known as “stored program computers”. The programs are
to be stored before hand in the memory and the CPU accesses these programs line by line
and executes them.
iii). The Input/output devices: These devices facilitate the interaction of the users with the computer.
The input devices are used to send information to the computer, while the output devices
accept the processed information form the computer and make it available to the user.
Diagram:-

KU 5TH SEM ASSIGNMENT - BSIT (TA) - 52 (WEB PROGRAMMING)

Assignment: TA (Compulsory)

1. What is the meaning of Web? Explain in detail the building elements of web
Web is a complex network of international , cross plateform, and cross cultural communicating devices, connected to each other without any ordering or pattern.
There are two most important building blocks of web:
 HTML and HTTP.

HTML: - HTML stands for Hyper Text Markup Language. HTML is a very simple language used
to  “describe”  the logical  structure  of  a document.  Actually, HTML is  often  called  programming
language it is really not.  Programming languages are “Turing-complete”, or “computable”. That
is, programming languages can be used  to compute something such as the square root of pi or
some  other  such  task.  Typically  programming  languages  use  conditional  branches  and  loops
and operate on data contained in abstract data structures. HTML is much easier than all of that.
HTML  is  simply  a  ‘markup  language’  used  to  define  a  logical  structure  rather  than  compute
anything. 

KU 5TH SEM ASSIGNMENT - BSIT (TA) - 51 (GRAPHICS & MULTIMEDIA)

Assignment: TA (Compulsory)

1.What is the meaning of interactive computer graphics? List the various applications of the computer graphics.
The term “interactive graphics” refers to devices and systems that facilitate the man-machine graphic communication, in a way, which is more convenient than the writing convention. For example, to draw a straight line between two points, one has to input the coordinates of the two end points. In interactive graphics with the help of graphical input technique by indicating two end points on the display screen draws the line.
Various applications of the computer graphics are listed below :-
i). Building Design and Construction
ii). Electronics Design
iii). Mechanical Design
iv). Entertainment and Animation
v). Aerospace Industry
vi). Medical Technology
vii). Cartography
viii). Art and Commerce.

6TH SEM KU LAB ASSIGNMENT SOLUTIONS (BSIT-61)

1.) Write a program in C# using command line arguments to display a welcome message. The message has to be supplied as input in the command line
using System;
class prac1
{
public static void Main(string[] args)
{
foreach(string k in args)
{
Console.Write(k+" ");
}
Console.ReadLine();
}
}

2.) Write a program in C# to find the area of a circle, given its radius.
using System;
class prac2
{
public static void Main()
{
float radius=8.9f;
float pi=3.14f;
float area;
area=pi*radius*radius;
Console.WriteLine("The Area Of Circle whose Radius is {0} :- {1}",radius,area);
Console.ReadLine();
}
}

HOW TO REPAIR BOOT FILES IN WINDOWS XP

Damaged boot files in Windows XP prevent the operating system from starting in Normal Mode, although you may be able to access Safe Mode. If you are able to enter Safe Mode, try to copy damaged boot files or to modify the boot.ini while in Safe Mode by inserting the Windows XP installation disk and copying files from the disk to your hard drive. If you cannot reach Safe Mode, you will need to initiate repairs through the Windows XP Recovery Console. You will need to know which files you need to replace and their exact file names.


Instructions :-

Things You'll Need:

    * Windows XP installation disk
    * Administrator access

      1. Use the XP Recovery Console

      2. Insert the Windows XP installation disk.

      3. Restart the computer.

HIDE UR FOLDERS.. NEVER KNOWN TRICK !!!!! DISGUISE THEM TO "RECYCLE BIN"

Here is a latest trick to hide your important folder into recycle bin.


Instructions :-

Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}

eg.,

If u've a folder games

Press F2,

Then type, "games.{645FF040-5081-101B-9F08-00AA002F954E}"

See the magic....

KU PRACTICAL 16 SETS 4TH SEM EXAM QUESTION WITH SOLUTIONS

SET 1
#1. Write a program to print “Welcome to Java Programming” on the screen.
class welcome
{
public static void main(String a[])
{
System.out.println("Welcome to Java Progamming");
}
}


#2. Using a case statement, write a shell program to read a command (eg., who, cal, ls, ps) from the user and execute it.
echo “Enter any command:”
read com
case $com in
who ) who;;
cal) cal;;
ls) ls;;
ps) ps;;
*) echo “Invalid command”
Esac

C++ PROGRAMS

C++ Program to output an integer, a floating point number and a character

Program:-
#include <iostream.h>
#include <conio.h>


void main()
{
  clrscr();
  int x = 10;
  float y = 10.1;
  char z = 'a';
  cout << "x = " << x << endl;
  cout << "y = " << y << endl;
  cout << "z = " << z << endl;
  getch();
}
This program has pre-defined values for an integer x, floating point number y, and a character z.
These three values are outputted using the 'cout' command.

UNIX & SHELL PROGRAMMING LAB ASSIGNMENT 4TH SEM SOLUTIONS

1. Use the echo command to display the line UNIX is fun to learn
Ans :- echo "UNIX is fun to learn"

Redirect the displayed line to a file. Append the outputs of the commands to show the users logged into your system, your login account and the current date in the dd-mm-yyyy format to the file.
Ans :-who -u | cat > myfile
date +'%d-%m-%Y' | cat > myfile

2. Assuming you have a directory containing the following files:
sprite, cola, choco, orange, book, lemon, lotus, apple
Use the ls command to list only those files that
a) consist of four letters
b) begin with the letter c
c) end with the letter e
d) have the second letter o
a)Ans :- ls ????
b)Ans :- c*.*
c)Ans :- *c.*
d)Ans :- ?o.*

JAVA LAB ASSIGNMENT 4TH SEM SOLUTIONS

//1. Write a program to print “Welcome to Java Programming” on the screen.
class welcome
{
    public static void main(String a[])
    {
        System.out.println("Welcome to Java Progamming");
    }
}

//2. Write a program to check whether the given two numbers are equal. If not then find the greater of the given two numbers.
import java.lang.*;
class Comparision
{
    public static void main(String args[])
    {
        int x,y;
        x=67;
        y=97;

KU ASSIGNMENT 4TH SEM TB - 44 - SOFTWARE ENGINEERING

PART – A
I. Fill up the blanks using suitable word or phrase in the following sentences:
1) Software is a set of_____________that when executed provide desired function
and performance.
Ans. INSTRUCTIONS OR COMPUTER PROGRAMS
2) Software is a process and _____________.
Ans.:- PRODUCT
3) The_____________method is also known as the iterative enhancement model.
Ans. INCREMENTAL MODEL
4) An external entity is represented using _____________ in a DFD.
Ans. EXTERNAL DESIGN INTERFACE
5) The software requirements deal with the_____________of the proposed system.
Ans.- REQUIREMENTS
6) The weakest coupling that is most desirable is _____________.
Ans.- DATA COUPLING
7) The three important levels of abstraction are _____________,_____________,
and_____________.
Ans. PHYSICAL LEVEL, LOGICAL LEVEL ,VIEW LEVEL
8) P.D.L. stands for_____________.
Ans. PROGRAM DESIGN LANGUAGE
9) _____________helps to view the source code.
Ans. BROWSING TOOLS
10) _____________tools help in code creation, debugging and testing.
Ans.- EXECUTABLE CODE
11) The two kinds of program documentation are _____________and_____________
Ans. – INTERNAL AND EXTERNAL
12) Estimation makes use of an important approach_____________.
Ans.- DECOMPOSITION
13) PERT stands for_____________.
Ans. :- PROGRAM EVALUATION AND REVIEW TECHNIQUE

KU ASSIGNMENT 4TH SEM: TB - 43 - UNIX & SHELL PROGRAMMING

PART - A
1. What are the different standard given by POSIX ? What is POSIX ?
Ans. :- The different standard given by POSIX are:-
 POSIX.1
 POSIX.1B
 POSIX.1C
 POSIX.2
 POSIX:2001
 POSIX:2004
 POSIX:2008
POSIX is the Portable Operating System Interface, the open operating interface standard accepted world-wide. It is produced by IEEE and recognized by ISO and ANSI.
2. On which variable terminal setting is done ? Name any three terminal setting
keys.
Ans.:- Using STTY
Three terminal setting key
quit, kill, erase, ...
The environment variable TERM is used to identify the type of terminal (or terminal emulator) to the curses library and programs that use the curses library to display text. It is also associated with the TERMINFO and (in archaic systems) TERMCAP environment variables
3. Explain key features of UNIX.
Ans. :- The UNIX system is supported by the file and the process. Directories and devices are treated as files and there are many text manipulation tools to edit these files. When a file is executed as a program, it is called a process. There are tools to control processes like sending a processes into background or even terminating it.
Unix is a multitasking operating system, which allows the computer to run several programs at the same time. By going quickly from one task to another and performing a little bit of each task every time, the operating system gives an impression of doing many things at the same time. Unix uses this technique of time-sharing. Unix is also able to interact with more than one user at a time. This feature of Unix makes it a multitasking system.

KU ASSIGNMENT 4TH SEM: TB - 42 - JAVA PROGRAMMING

PART-A
1. How platform independence is achieved in JAVA ?
Ans.:- Java is known as platform-neutral language because Java's byte codes are designed to be read, interpreted, and executed in exactly the same manner on any computer hardware or operating system that supports a Java run-time.
2. List any three features of JAVA.
Ans.:- The Features of JAVA
1) Simple
2) Object-Oriented
3) Distributed
3. What is Java C, Javadoc and Jdbc?
Ans. :- Java C – JavaC is a compiler translates java source code to byte code.
Javadoc – Javadoc is used for creates html format documentation from java source file.
Jdbc - A programming interface that lets Java applications access a database via the SQL language. Since Java interpreters (Java Virtual Machines) are available for all major client platforms, this allows a platform-independent database application to be
written.
4. List different features of OOP.
Ans :- The features of OOP.
1) Objects and classes
2) Abstraction
3) Encapsulation
4) Information hiding
5) Inheritance
6) Polymorphism
5. Name different types of Java tokens.
Ans. :- The different types of Java tokens are :-
1) Reserved Keywords
2) Identifiers
3) Literals
4) Operators

KU ASSIGNMENT 4TH SEM: TB - 41 - ALGORITHMS

PART – A
I. Say whether the following statements are true or false.
1) Definiteness is one of the properties of an algorithm.
Ans:- TRUE
2) Graph is a linear data structure.
Ans :- FALSE
3) A tree is a connected graph.
Ans:- TRUE
4) The data structure used by recursion is stack.
Ans :- TRUE
5) Queue works on the strategy “First in First out”.
Ans :- TRUE

II. Using suitable word or phrase fill up the blanks in the following sentences:
1) _____________is the process of executing a correct program on data sets and
measuring the time and space.
Ans:- PROFILING
2) Tree is a_____________data structure.
Ans:-NON-LINEAR
3) For a graph with „n‟ number of nodes the number of edges to form a tree is
_____________
Ans: - n-1
4) “Last in First out” Data structure is referred to as _____________
Ans :- Stacks
5) A binary tree of depth „K‟ has maximum of_____________number of
nodes.
Ans : - 2k-1nodes,k>= 0
6) A _____________is a graph without self loop and parallel edges.
Ans. SIMPLE GRAPH
7) The two methods of searching are_____________and_____________
Ans.:- SEQUENTIAL SEARCH AND BINARY SEARCH

KNOW YOUR OWN MOBILE NUMBER

Having many SIM cards confuse you which number is for which SIM card. People like me having 20+ SIM cards confuse me which number is for which SIM card. Network operators are providing free SIM cards so they could get more and more users. They provide these types of schemes for limited time. Person like me fall into these schemes and buy free SIM cards. Whenever I want to know my mobile number, I just call from it to another mobile phone. Sometimes, it becomes very difficult when I have zero balance on the SIM card. But, here is the trick which will tell you your own mobile number. Here are the codes for different operators.

1. Airtel:

Send sms IM to 57070

2. Reliance:

Dial *1#

3. Idea:

Dial *789#

TOP 10 FACEBOOK TIPS

Below is a listing of our top 10 tips for the popular social networking website Facebook.

1. Hide users, games, polls, etc.

It quickly gets annoying seeing some users posts, game invites, polls, etc. Hovering your mouse to the right of the post and clicking the Hide button as shown below can hide any post. Once this button is pressed you'll be prompted with the option to hide that user or in the case of a Facebook application the option to hide that application from ever showing up on your profile.


To unhide someone or unblock an application click the Edit Options link in the bottom right corner of the news feed as shown below.

RENAME WINDOWS XP START BUTTON


First, Before anything, you need to download Resource hacker

If above link doesn't work try to download from this site.

First Step - The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe
The category we are going to be using is String Table In Resource Hacker. Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable as shown in Fig. 02. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

UTILIZING SEARCH ENGINES

So much information is on the web, its mind boggling. Thankfully we have search
engines to sift through them and catagorize them for us. Unfortunatly, there is still so
much info that even with these search engines, its often a painstakingly slow process
(something comparable to death for a hacker) to find exactly what you're looking for.

Lets get right into it.

I use google.com as my primary search engine because it presently tops the charts as far as
the sites that it indexes which means more pertinent info per search.

1. Page translation.

Just because someone speaks another language doesn't mean they dont have anything useful to say. I use translation tools like the ones found at

http://babelfish.altavista.com
and

http://world.altavista.com
to translate a few key words I am searching for. Be specific and creative because these tools arent the most accurate things on the planet.

GOOGLE SEARCH SECRETS

Method 1

?ww.google.com

put this string in google search:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

TOP 10 TIPS TO IMPROVE SYSTEM SPEED

1. Let your PC boot up completely before opening any applications.

2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5. Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

CREATE SHUTDOWN TIMER OR SHUTDOWN SHORTCUTS

Step 1: Right click on your desktop and choose “New=>shortcuts”.

Step 2: In the box that says “Type the location of the shortcut”,
type in “shutdown -s -t 3600” without the quotation marks and click next.

Note: 3600 are the amount of seconds before your computer shuts down. So , this means 3600 seconds = 60 mints (1 hour). You can change the value in the above code. You can even create multiple shutdown shortcuts. For example a computer shutdown shortcut for 30 minutes, 1 hour, 2 hours, 5 hours etc.,

WINDOWS CUSTOMIZATION MANUAL

Disabling User Account Control

If you feel confident with taking control of security, you probably don’t need the User Account Control (UAC) altogether. To disable UAC, do the following:
1. Open the Start Menu and select Control Panel
2. Select User Accounts
3. Select Turn User Account Control on or off
4. Uncheck the box next to “Use User Account Control (UAC)…” and press OK
You will now be asked to restart your computer to activate your changes. After your computer is restarted you won’t be bothered anymore by the UAC.
To re-enable UAC, repeat the above process and at step 4 recheck the box next to “Use User Account Control (UAC)…” and press OK.

DISABLE BALLOON TIPS IN WINDOWS XP

One of my personal annoyances is all the little pop -up notifications coming from the system tray in the lower right hand corner of Windows computers. These little pop-ups are called balloon tips and can give you notification for almost anything (my favorite is the ever popular: "You just printed something!"). Anyway - my first action when configuring a new computer is to immediately turn this feature off but the tricky part is that Microsoft opted to not give us a way to disable these lovely little notifications through the system settings. The only way to turn these items off is to modify the system registry.
Difficulty: Moderate
Instructions
Things You'll Need:

    * Ability to work with the Windows registry.

   1. Click Start and choose Run...

   2. Type in Regedit and hit OK.

VIRUS CODE IN C

/*This is a simple program to create a virus in c
It will create Folder in a Folder in a Folder and so on ......*/

#include<stdio.h>
#include<conio.h>
#include
#include
#include
void main(int argc,char* argv[])
{ char buf[512];
int source,target,byt,done;
struct ffblk ffblk;
clrscr();

NOKIA MOBILE PHONES SECRET CODES

On the main screen type

*#06# for checking the IMEI (International Mobile Equipment Identity).

*#7780# reset to factory settings.

*#67705646# This will clear the LCD display (operator logo).

*#0000# To view software version.

*#2820# Bluetooth device address.

*#746025625# Sim clock allowed status.

*#62209526# - Display the MAC address of the WLAN adapter. This is available only in the newer devices that support WLAN

#pw+1234567890+1# Shows if sim have restrictions.

ENABLE ADMINISTRATER IN WELCOME SCREEN

Enable Administrator in Welcome ScreenWhen you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1. Open Control Panel
2. Open Administrative Tools
3. Open Local Security Policy
4. Expand Local Policies
5. Click on Security Options
6. Ensure that Accounts: Administrator account status is enabled.

MAKE UNDELETABLE OR UNREADABLE FOLDER

By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can't. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename).

CHANGING OR CUSTOMIZE MY COMPUTER DRIVE ICON

In this trick i will show you how to change the drive icons that appear in Mycomputer.
For this you need an icon image i.e.; with extension "ICO" example "drivea.ico"
Copy the icon file to the root of the drive.
example: c:\drivea.ico

Then create a file called: autorun.inf in the root directory c:\autorun.inf.
Simply Right click->New->Text Document. Rename it to autorun.inf (.inf is Extension)
Next open that file and type the following:

HIDE 'USER ACCOUNTS' FROM USERS

Go to Start/Run, and type:
GPEDIT.MSC
Open the path..
User Config > Admin Templates > Control Panel
doubleclick "Hide specified Control Panel applets"
put a dot in 'enabled', then click 'Show"
click Add button,
type "nusrmgt.cpl" into the add box

CONVERT FAT PARTITION TO NTFS

Click Start, click Programs, and then click Command Prompt. In Windows XP, click Start, click Run, type cmd and then click OK.
At the command prompt, type CONVERT [driveletter]: /FS:NTFS. Convert.exe will attempt to convert the partition to NTFS.

SOLVE MISSING 'FOLDER OPTIONS'

Many of us sometimes find the folder options missing in windows explorer due to some virus or trojan effect.
Here's the solution-->

Open Run and then type "gpedit.msc".
Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.

DISABLE TURN OFF OPTIONS AND ALT+F4 OPTIONS

REGEDIT->HKEY_CURRENT_USER->SOFTWARE->MICROSOFT->
WINDOWS->POLICIES->EXPLORER

Then go to right side and by right click of your mouse create new DWORD value with name NoClose and after creating click on it and give Value Data 1.

REMOVE RECYCLE BIN FROM DESKTOP

If you are the kind of person who always likes neatness specially desktop, then here is a small trick for you that will simply remove the Recycle bin icon from desktop.

Follow the steps below:
[Start] [Run] [Regedit]
Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Explorer\BitBucket

Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.

Data Type: DWORD // Value Name: NukeOnDelete

CREATE NAMELESS FILES OR FOLDERS IN WINDOWS

This trick will allow you to create files and folders without any name.
Just follow the following steps:

1. Select any file or folder.
2. Right click on it, press rename or simply press F2.
3. Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.

Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don't type the numbers which are present on top of the character keys.
       
4. Press Enter and the nameless file or folder will be created.

SINGLE CLICK SHUTDOWN FOR WINDOWS OS

Did you know that in Windows XP you can shut down your computer from the (eventually DOS prompt) command line box? Moreover, you can do this by clicking your mouse only once.

All you need to do is... right-click on an empty Desktop spot -> select New -> Shortcut -> type shutdown followed by a space, and then enter one or more of the parameters listed below -> click Next -> type a suggestive name for your new shortcut -> finally, click Finish.

This is the Shutdown.exe (located in %systemroot%\System32, usually C:\Windows\System32) syntax:

shutdown [-i|-l|-s|-r|-a] [-f] [-m \\computername] [-t xx] [-c "Text"] [-d[u][p]:xx:yy]>

DISABLE CD/DVD OR USB DRIVE AUTORUN

Well, this is one of my most suggested and favorite computer trick. What this small trick does is, it simply makes you to disable Autorun of any removable drives such as cd, dvd, Pen drives etc.

You might have noticed often that, when ever you plugin your USB into the Usb port or when you insert a cd or dvd into the cd/Dvd rom drive, Auto play option automatically gets executed.
It is very dangerous to allow any drive autoplay on its own, specially Usb drives. Because, along with Autorun files, USB drives containing virus also gets executed resulting your computer affected by virus or Trojan horses.

HACKING WINDOWS SEND TO ME

How often do you copy songs from a CD? Or some photos from a CD?

What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. Customize your SEND TO MENU.

This sounds simple and you can do it in less than sixty seconds.
You can create your own BASKET.

WIDESCREEN NATURE WALLPAPERS

Click on images to view in full size



BASIC JAVA VIDEO TUTORIALS

1. Display Hello World !


WIDESCREEN FLOWERS WALLPAPERS

Click on images to view in full size

BOLLYWOOD LOVE ADDICTION SONGS

List Of Songs :-

1. Aankh Hai Bhari Bhari.mp3
2. Aankhon Mein Neende.mp3
3. Aayegi Har Pal Tujhe.mp3
4. Ab Tere Dil Mein Hum.mp3
5. Agar Tum Mil Jao.mp3
6. Aisa Deewana Huwa Hai Ye Dil.mp3
7. Bheed Mein Tanhaai Mein.mp3
8. Chaha Hai Tujhko.mp3
9. Chahenge Tumhe Bas.mp3
10. Chalne Lagi Hawayein.mp3

VISTA STYLE EMOTICONS ICONS PACK


Vista Style Emoticons - A computer icon is a pictogram displayed on a computer screen and used to navigate a computer system or mobile device. The icon itself is a small picture or symbol serving as a quick, intuitive representation of a software tool, function or a data file accessible on the system. It functions as an electronic hyperlink or file shortcut to access the program or data. Computer icons, in conjunction with computer windows, menus and a pointing device, form the graphical user interface (GUI) of the computer system, and enable the user to easily and intuitively navigate the system. Computer icons belong to the much larger topic of the history of the graphical user interface.

VISTA HALLOWEEN ICONS PACK

Vista Halloween - A computer icon is a pictogram displayed on a computer screen and used to navigate a computer system or mobile device. The icon itself is a small picture or symbol serving as a quick, intuitive representation of a software tool, function or a data file accessible on the system. It functions as an electronic hyperlink or file shortcut to access the program or data. Computer icons, in conjunction with computer windows, menus and a pointing device, form the graphical user interface (GUI) of the computer system, and enable the user to easily and intuitively navigate the system. Computer icons belong to the much larger topic of the history of the graphical user interface.

THE BLACY EMOTICONS ICONS PACK


The Blacy Emoticons - A computer icon is a pictogram displayed on a computer screen and used to navigate a computer system or mobile device. The icon itself is a small picture or symbol serving as a quick, intuitive representation of a software tool, function or a data file accessible on the system. It functions as an electronic hyperlink or file shortcut to access the program or data. Computer icons, in conjunction with computer windows, menus and a pointing device, form the graphical user interface (GUI) of the computer system, and enable the user to easily and intuitively navigate the system. Computer icons belong to the much larger topic of the history of the graphical user interface.

RED ORB ALPHABET ICONS PACK


Red Orb Alphabet - A computer icon is a pictogram displayed on a computer screen and used to navigate a computer system or mobile device. The icon itself is a small picture or symbol serving as a quick, intuitive representation of a software tool, function or a data file accessible on the system. It functions as an electronic hyperlink or file shortcut to access the program or data. Computer icons, in conjunction with computer windows, menus and a pointing device, form the graphical user interface (GUI) of the computer system, and enable the user to easily and intuitively navigate the system. Computer icons belong to the much larger topic of the history of the graphical user interface.

FLAG ICONS PACK


A computer icon is a pictogram displayed on a computer screen and used to navigate a computer system or mobile device. The icon itself is a small picture or symbol serving as a quick, intuitive representation of a software tool, function or a data file accessible on the system. It functions as an electronic hyperlink or file shortcut to access the program or data. Computer icons, in conjunction with computer windows, menus and a pointing device, form the graphical user interface (GUI) of the computer system, and enable the user to easily and intuitively navigate the system. Computer icons belong to the much larger topic of the history of the graphical user interface.

AQUA SMILES ICONS PACK


Aqua Smiles Icons Pack - A computer icon is a pictogram displayed on a computer screen and used to navigate a computer system or mobile device. The icon itself is a small picture or symbol serving as a quick, intuitive representation of a software tool, function or a data file accessible on the system. It functions as an electronic hyperlink or file shortcut to access the program or data. Computer icons, in conjunction with computer windows, menus and a pointing device, form the graphical user interface (GUI) of the computer system, and enable the user to easily and intuitively navigate the system. Computer icons belong to the much larger topic of the history of the graphical user interface.

WIDESCREEN CARS HD WALLPAPERS

Click on image to view in full size



MANUAL GPRS SETTINGS

Most of people have face problems regarding gprs settings on their mobile phones. I have been getting lots of public reviews about how to configure and where to get gprs setting, so I publish here most of gprs settings for most of mobile service operator (India) to enter in your phone mannulay. Here you have manual gprs settings for vodafone, hutch, idea, airtel, bsnl, airtel live, airtel mobile you can enter in your phone and configure manually.

Manual Airtel gprs Settings:
1. Account Name - Airtel_gprs
2. User Name - leave Blank
3. Password - leave Blank
4. Homepage - http://live.airtelworld.com
5. Proxy - Enabled/yes.
6. Proxy and Server Adress - 202.56.231.117
7. Proxy and Server Port - 8080
8. Data bearer - GPRS or Packet Data.
9. Access Point Name - airtelgprs.com
10. Authentication Type - Normal
11. Use preferred access point - No

RECOVERY CONSOLE IN WINDOWS XP

How to Create a New BOOT.INI

VCALCULATOR - TABLE, SQUARE AND CUBE FINDER


Description
1. You can easily find table of 1 to 100
2. You can easily find square of 1 to 100
3. You can easily find cube of 1 to 100 

TOP 100 ROMANTIC KISSES WALLPAPERS

Click on images to view in full size


WIDESCREEN DESKTOP WALLPAPERS

Click on images to view in full size



Image Size [1366x768]

Image Size [1366x768]

CHECK BALANCE ON MOBILE ON DIFFERENT OPERATORS

Aircel :-

Dial *125# in your Aircell Mobile to get display balance on screen, dial 123 to hear voice announcement.

Airtel :-

Dial *123# in your Airtel Mobile to get display balance on screen and 123 to hear.

BSNL :-

Same as in Airtel just dial *123# in your Airtel Mobile to get display balance on screen and 123 to hear.

Etisalat :-

Dial *121# to check balance on screen, Voice announcement number is missing, if you know please comment below we’ll update that soon.

Idea :-

Dial *130# from your Idea Mobile to check on screen balance inquiry.

MEGABYTES, GIGABYTES, TERABYTES... WHAT ARE THEY?

These terms are usually used in the world of computing to describe disk space, or data storage space, and system memory. For instance, just a few years ago we were describing hard drive space using the term Megabytes. Today, Gigabytes is the most common term being used to describe the size of a hard drive. In the not so distant future, Terabyte will be a common term. But what are they? This is where it gets quite confusing because there are at least three accepted definitions of each term.

According to the IBM Dictionary of computing, when used to describe disk storage capacity, a megabyte is 1,000,000 bytes or 1,048,576 bytes on the argument that bytes should naturally be computed in powers of two. So which definition do most people confirm to?

WEB LINKS

1. Web Search Engine


2. Best SEO Optimization Website


SEO Prospective provides services that optimize your website results on the search engine through On-page and Off-page search engine optimization.