Articles

School Life 

Posted Date :2/21/2018


School life: the best period of life. School makes a student to choose a way towards his success. It also helps in building ones character. Not only school provides education but also gives us a joyful experience and freedom of living. Every student should learn good things and utilize them to the fullest for the society. In school we learn discipline and punctuality which is the platform of a successful life. School is a place which inspires us to follow our dreams. My school is my second HOME. I am proud of being a part of it. Himansh Sharma Class VIII Red Rose School Sindhi Colony Bhopal

 

Himansh Sharma (VIII)

Red Rose Berasia Road

Save Water 

Posted Date : 2/21/2018


I would like to mention the critical situation of water crisis through a news published in `” Dainik Bhaskar” Sunday 18th February 2018 edition. Humans need water for drinking, washing clothes and cooking their food. We need water also for agriculture and to maintain personal hygiene. Water is useful to keep our homes and surroundings clean. Many industrial processes too need water. Water is needed by all life forms. Animals also take a dip in the cool water of rivers in summers. All vegetation also survives because of water. All life forms and vegetation will die if there is no water. Water is a precious natural resource that should be used judiciously. Wastage of water must be avoided. We can save water by using the resource carefully. We must save water in whatever way we can. When we use water in our homes we must be careful; not to waste it. Drinking water must be stored in a clean and hygienic way. If water gets contaminated and is discarded due to improper storage it results in unnecessary wastage of water. Similarly, the water we use for our personal hygiene and for various domestic requirements must be in reasonable quantities. Using too much water for our shower or while brushing our teeth can be avoided. Taps must be closed when we are not using them. Likewise, if taps or water pipes are found to be leaking, we must repair them right away. We must also avoid using drinking water for watering plants. We also must wash our vehicles with limited water carried in buckets because running water through pipes waste unnecessary water. Maviya Rizwan Class- VIII Red Rose School Sindhi Colony Bhopal

 

Maviya Rizwan   (VIII)

Red Rose Berasia Road

Reserve Monitoring and an "Excessive Reserve Procedure" 

Posted Date : 9/18/2015

The Need for New Policies Managing the world~s dollar dependency requires sanctioning excess reserve accumulation and decreasing the need for precautionary holdings of reserves. The goal must be to stabilize and then slowly reduce the amount of reserves relative to world GDP. Reserve Monitoring and an "Excessive Reserve Procedure" The International Monetary Fund (IMF) must be tasked to establish benchmarks foradequate reserve holdings—adequate being the level that reflects legitimate precautionary concern rather than an export subsidy. The definition of adequate reserve levels should account for country-specific factors such as openness to trade and capital flows, as well as the health of the banking sector and the quality of financial regulation: A country that is very open to foreign capital flows and has weak banks will legitimately want to hold more reserves than others. In light of the recent crisis, 30 percent of GDP would seem to constitute a realistic upper limit for most countries. If the IMF determines that a country has accumulated reserves in excess of its adequate level, it should discuss the issue with the government during its regular annual consultations. Policies to slow reserve accumulation should then be considered. To give this consultation teeth, there must be a credible threat of sanctions. The IMF should therefore have the right to initiate an excess reserve procedure against noncompliant countries

 

afsha ashfaq   (XII)

Red Rose Berasia Road


Internet of Things 

Posted Date : 9/18/2015

Internet of Things From your refrigerator and home thermostat to your car or office whiteboard to your child’s textbook or doctor’s medical tablet, wireless technology is leaping beyond the phone to connect the world around us to the Internet. As wireless innovation continues, machine-to-machine (M2M) connectivity—the so-called “Internet of Things”— will further accelerate mobile opportunity and transform how people and our economy interact with the many tools of modern life. Through mobile connectivity, the Internet can make virtually anything more intelligent—holding great promise for our economy, our environment, our education and health care systems, our safety and our standard of living. Or The “Internet of Things” refers to the concept that the Internet is no longer just a global network for people to communicate with one another using computers, but it is also a platform for devices to communicate electronically with the world around them. The result is a world that is alive with information as data flows from one device to another and is shared and reused for a multitude of purposes. Harnessing the potential of all of this data for economic and social good will be one of the primary challenges and opportunities of the coming decades. A combination of technologies, including low-cost sensors, low-power processors, scalable cloud computing, and ubiquitous wireless connectivity, has enabled this revolution. Increasingly companies are using these technologies to embed intelligence and sensing capabilities in their products, thereby allowing everyday objects to sense, learn from, and interact with, their environment. Some of these devices engage in machine-to-machine communication. For example, sensors on the roadway electronically alert cars to potential hazards, and the smart grid sends dynamic electricity pricing data to home appliances in order to optimize power consumption. Other devices communicate information to their users, either directly through the product itself or indirectly through a web browser on a PC or mobile device. For example, decision support systems on farms may combine data on soil conditions from environmental sensors with historic and future pricing and weather data to produce recommendations to farmers on how to plant and fertilize particular plots of land. This transformation, while significant, will in many ways be inconspicuous to the average person because the changes to the physical environment will be invisible or subtle. A “smart” home or a “smart” bridge looks much the same as a “dumb” one—all of the intelligence is built into the infrastructure. Consumer products that have embedded intelligence (e.g., clothes dryers or thermostats) will not look significantly different from those in use today. Yet, despite outward appearances, the impact of the Internet of Things will be profound and will offer opportunities to address many of today’s major societal challenges. Its possibilities include new products and services that will help protect the environment, conserve energy, increase agricultural productivity, make transportation safer and faster, enhance public safety, and lead to better and more affordable health care. In addition, some products will simply assist busy consumers by providing timely information: thus, a smart refrigerator could remind its owner to buy milk when it is running low. Big changes are made up of little changes, and the Internet of Things could bring millions of incremental changes in the coming years. This report showcases the diversity of devices that make up the Internet of Things today, the potential application these devices may have for addressing different real-world problems, big and small, and the policy principles that will help government leaders maximize the benefits enabled by these new technologies. And for common people and even for girls and women’s these IOT devices and help lives improve and secure. Mobiles: Smartphone apps 1. Women~s Security 1) At first user have to save some details. These details include: Email address and password of the user, Email address and mobile number of the recipient and a Text Message. 2) Then initialize this app as a "widget" ,so that a finger touch is enough to alert your recipient 3) It will also record voice around surroundings for 45 seconds and then send these record and a text message to the recipient number. This message also includes the current position (latitude and longitude) of the victim. 2. Sentinel: Women~s Security This iOS app helps send an instant message to near and dear ones. The app is set to trigger different warning signals in case of different scenarios and can even send an alert if you move out of network zone. Alerts can be sent via email or via SMS. The app also comes with auto-off mode in case of low battery. 3 I AM SAFE I AM SAFE is a Google Play app that, similar to Sentinel, helps provide security to women. The app can send SMS to near and dear ones in case of difficulty. The app configures GPS and also sends location data along with the SMS. However, users can add just one emergency number to which the SMS will be sent. Social Networking FB, What’s app, viber, Hike are having instant messaging and calling services which can connect to multiple users even by previously creating family groups so while travelling you can sent bus, taxi no. and snapshots of travelers vehicles and time of departure etc to the belongings or family instantly, but never keep it public. E-Commerce : Flipkart, Snapdeal, Amazon, ebay etc. are day by day becoming bigger e-com giants but the financial security and investment priority of things depends on the consumer only, so use the most secure cash on delivery option only and never use debit or credit cards in online payment till you are totally safe to do so, as in this also (IOT) Mobile to site conversation involved which unveils your address, contacts, gender etc. to those sites of e-com which can also able to use or misuse it later on. Suggestions: 1. CCTV cams on streets: these help everyone to have evidence and fear among the criminals regarding the criminal activities to be done under surveillance. So if these are mounted in every public places it will make us secure 2. Active Helpline alerts like (CM Helpline): in the need of help the active help lines like 108 (Police, ambulance) services can be received within fue minutes. WHY WE NEED IOT? 1. It’s more than just connecting people. Mobile is about connecting everything. Experts predict over 50 billion connected devices by 2020. From connected medical tablets to the wired tools first responders rely on to keep our communities safe, the “Internet of Things” will greatly improve our lives and our economy. 2. Continued economic growth depends on a connected world. The proliferation of connected devices is projected to create $1.2 trillion in economic activity by 2020. This will create growth opportunities in diverse sectors throughout the U.S. economy as mobile connectivity is embedded into everyday things. 3. M2M growth means increased spectrum demand. M2M will be among the fastest drivers of mobile data growth, more than tablets or Smartphone’s. This fast-expanding array of connected devices will contribute to the capacity shortage we are facing with our nation’s airwaves. Given all the innovation that M2M connectivity will drive, it is imperative that our leaders act in a timely fashion to make more spectrum capacity available to continue expanding our wireless world.(simply means; Less spectrum lesser reactivity or response time leads to slower economical growth of any business or economy)

 

Aakash chouhan   (XII)

Red Rose Berasia Road


Connected Life 

Posted Date : 9/18/2015

Connected Life This Internet of Things - a widely distributed, locally intelligent network of smart devices - will enable extensions and enhancements to fundamental services in education, health and other sectors, as well as providing a new ecosystem for application development. When objects can sense the environment and communicate, they become powerful tools for understanding complexity and responding to it effectively. Though such smart objects can interact with humans, they are likely to be interacting even more with each other automatically, without human intervention, updating themselves at their daily schedules. This evolution indeed makes a technological improvement in human livelihood which is also termed as Internet of things. In other words, The Internet of Things (IoT) refers to the use of intelligently connected devices and systems to leverage data gathered by embedded sensors and actuators in machines and other physical objects. IoT is expected to spread rapidly over the coming years and this convergence will unleash a new dimension of services that improve the quality of life of consumers and productivity of enterprises, unlocking an opportunity that the GSMA refers to as the ‘Connected Life’. For consumers, the IoT has the potential to deliver solutions that dramatically improve energy efficiency, security, health, education and many other aspects of daily life. For enterprises, IoT can underpin solutions that improve decision-making and productivity in manufacturing, retail, agriculture and other sectors. Machine to Machine (M2M) solutions - a subset of the IoT – already use wireless networks to connect devices to each other and the Internet, with minimal direct human intervention, to deliver services that meet the needs of a wide range of industries. In 2013, M2M connections accounted for 2.8% of global mobile connections (195 million), indicating that the sector is still at a relatively early stage in its development. An evolution of M2M, the IoT represents the coordination of multiple vendors’ machines, devices and appliances connected to the Internet through multiple networks. (GSM/CDMA)Mobile Vision of connected Service. As the Connected Life evolves, the number of mobile connections worldwide is set to rise dramatically to reach 10.5 billion by 2020, while the total number of connected devices across all access technologies could reach 25.6 billion1. These devices will bridge the physical and digital worlds, enabling a new category of services that improve the quality of life and productivity of individuals, society and enterprises. “Eg: E-com, Women and child help-lines, Health and fitness apps and Bands, electricity & DTH billing services etc. became a basic need these days via cellular services. Financial Growth: Supported by cross-industry collaboration, the Connected Life will have a positive impact on many sectors of the economy, such as automotive, shipping and logistics, healthcare and utilities, potentially benefitting billions of people globally. As the Connected Life will have a fundamental impact on the way we live and work, there will also be major social and environmental benefits, such as improved healthcare, safer and more efficient transportation and logistics, better education and more efficient use of energy. With the ability to capture real-time usage information and provide remote control, embedded mobile connectivity can make a wide range of devices, machines and vehicles more efficient and effective, dramatically reducing waste and improving time productivity. The Internet of Things can enable the next wave of life-enhancing services across several fundamental sectors of the economy. In cities, the development of smart grids, data analytics and autonomous vehicles will provide an intelligent platform to deliver innovations in energy management, traffic management and security, sharing the benefits of this technology throughout society.

 

Aakash   (XII)

Red Rose Berasia Road


Navaratri Nine Avatars – 9 Forms of Maa Durga 

Posted Date : 4/13/2013


During the festival of Navratri, Goddess Durga Devi is worshiped in nine avatars. During these nine holy days, each day of goddess Durga Mata is worshiped in different avatara. First day of Navratri – Kalasha Sthapana (Kalasha Pooja) or Ghata Sthapana – Shailaputri Puja Second day of Navratri – Preeti Dwitiya – Brahmacharini Puja Third day of Navaratri – Chandrakanta pooja or Chandraghanta puja Fourth day of Navaratri – Kushmanda pooja Fifth day of Navratri – Skandamata Puja – Lalitha Panchami Sixth day of Navratri – Katyayani Puja – Maha Shashti or Durga Shashti Seventh day of Navratri – Kaalratri Pooja – Durga Saptami or Maha Sapthami Eighth day of Navaratri – Maha Gauri Pooja – (Durgashtami Puja/Maha Ashtami/Veerashtami) Ninth day of Navaratri – Siddhidatri Puja – (Mahanavami/Maharnavami or Durga Navami) Tenth day of Navratri – Aparajitha Puja or Shami Pooja – Vijaya Dashami or Dasara

 

govind maheshwari   (X)

Red Rose Trilanga

Tradition of Holi 

Posted Date : 4/6/2013


The colourful festival of Holi is celebrated by different names in this vast and culturally diverse country. The traditions followed for the festival varies a little and at times a lot as one moves from one state to other studying the various facets of the festival and getting behind the various colours of it. Nowhere it is celebrated with so much charm and enthusiasm as in Mathura, Vrindavan, Barsana and Nandgaon - the places associated with the birth and childhood of Lord Krishna. At Barsana Holi assumes the name of Lathmaar Holi. Here, women of Barsana give a tough time to men of Nandgaon as they come to play Holi with them. Women drag the unlucky captives, beat them, dress them in a female attire - yet all is in the spirit of Holi. Women of Haryana, specifically the bhabhis too get an upper hand on the day as they get a social sanction to beat their devars and take a sweet revenge for all the mischiefs they have played on them. This revengeful tradition is called the Dulandi Holi. The most enjoyable tradition of Holi, of course, apart from the play of colours is the tradition of breaking the pot. It is celebrated with much fan fair in the states of Maharashtra and Gujarat. Here a pot of buttermilk is hung high on the streets. Men form a huge human pyramid and one on the top breaks the pot with his head. All this while women keep singing Holi folk songs and throwing buckets and buckets of water. The tradition has its roots in the mischievous nature of Lord Krishna who was so fond of butter milk that he used to steal it from every accessible house in the village. To hide the butter from young Krishna, womenfolk used to hang it high. All in vain! Holi is celebrated in the most dignified manner in the state of Bengal. At Vishwa Bharti University, founded by Rabindranath Tagore founded the tradition of celebrating Holi as ~Basant Utsav~ or ~Spring Festival~. Students decorate the campus with intricate rangolis and carry out prabhat pheris in the morning. Clad in a traditional attire young boys and girls sing songs composed by Gurudev and present an enchanting view to the onlookers who gather in large number here. In other parts of Bengal, Holi is celebrated as Dol Yatra where the idols of Radha and Krishna are placed on a decorated palanquin and taken out in a procession. For Sikhs, Holi calls for the display of their physical strength and military prowess as they gather at Anandpur Sahib a day after Holi to celebrate Hola Mohalla. The tradition was started by the tenth and last guru of Sikh religion, Guru Gobind Singh ji and is being religiously carried forward. In the north east, Manipuris celebrate the festival in a colourful manner for six continuous days. Here, the centuries old Yaosang Festival of Manipur amalgated with Holi with the introduction of Vaishnavism in the eighteenth century. The highlight of the festival here is a special Manipuri dance, called ~Thabal Chongba~. Well, there are many-many more ways in which Holi is celebrated. Different states, different cities and different villages have come out with their unique and innovative styles of playing Holi. It may not be possible to describe all of them at one place. What is noteworthy though is the fact that the spirit of Holi remains the same throughout. It is the festival which generates the spirit of brotherhood and bring people close - and this is what matters most than anything else. What enhances the spirit of Holi though is the tradition of consuming the intoxicating bhang. It is generally consumed with thandai or as pakoras. People go high on it and enjoy the festival to the hilt. Other Holi delicacies include gujiya, mathri, malpua, puranpoli, dahi badas, etc. After a frenzied play of colours people love to gorge them up.

 

afzal khan   (X)

Red Rose Berasia Road

History of Holi 

Posted Date : 4/6/2013


History of Holi Holi is an ancient festival of India and was originally known as ~Holika~. The festivals finds a detailed description in early religious works such as Jaimini~s Purvamimamsa-Sutras and Kathaka-Grhya-Sutras. Historians also believe that Holi was celebrated by all Aryans but more so in the Eastern part of India. It is said that Holi existed several centuries before Christ. However, the meaning of the festival is believed to have changed over the years. Earlier it was a special rite performed by married women for the happiness and well-being of their families and the full moon (Raka) was worshiped. Calculating the Day of Holi There are two ways of reckoning a lunar month- ~purnimanta~ and ~amanta~. In the former, the first day starts after the full moon; and in the latter, after the new moon. Though the amanta reckoning is more common now, the purnimanta was very much in vogue in the earlier days. According to this purnimanta reckoning, Phalguna purnima was the last day of the year and the new year heralding the Vasanta-ritu (with spring starting from next day). Thus the full moon festival of Holika gradually became a festival of merrymaking, announcing the commencement of the spring season. This perhaps explains the other names of this festival - Vasanta-Mahotsava and Kama-Mahotsava. Reference in Ancient Texts and Inscriptions Besides having a detailed description in the Vedas and Puranas such as Narad Purana and Bhavishya Purana, the festival of Holi finds a mention in Jaimini Mimansa. A stone incription belonging to 300 BC found at Ramgarh in the province of Vindhya has mention of Holikotsav on it. King Harsha, too has mentioned about holikotsav in his work Ratnavali that was written during the 7th century. The famous Muslim tourist - Ulbaruni too has mentioned about holikotsav in his historical memories. Other Muslim writers of that period have mentioned, that holikotsav were not only celebrated by the Hindus but also by the Muslims. Reference in Ancient Paintings and Murals The festival of Holi also finds a reference in the sculptures on walls of old temples. A 16th century panel sculpted in a temple at Hampi, capital of Vijayanagar, shows a joyous scene of Holi. The painting depicts a Prince and his Princess standing amidst maids waiting with syringes or pichkaris to drench the Royal couple in coloured water. A 16th century Ahmednagar painting is on the theme of Vasanta Ragini - spring song or music. It shows a royal couple sitting on a grand swing, while maidens are playing music and spraying colors with pichkaris. There are a lot of other paintings and murals in the temples of medieval India which provide a pictoral description of Holi. For instance, a Mewar painting (circa 1755) shows the Maharana with his courtiers. While the ruler is bestowing gifts on some people, a merry dance is on, and in the center is a tank filled with colored water. Also, a Bundi miniature shows a king seated on a tusker and from a balcony above some damsels are showering gulal (colored powders) on him. Legends and Mythology In some parts of India, specially in Bengal and Orissa, Holi Purnima is also celebrated as the birthday of Shri Chaitanya Mahaprabhu (A.D. 1486-1533). However, the literal meaning of the word ~Holi~ is ~burning~. There are various legends to explain the meaning of this word, most prominent of all is the legend associated with demon king Hiranyakashyap. Hiranyakashyap wanted everybody in his kingdom to worship only him but to his great disappointment, his son, Prahlad became an ardent devotee of Lord Naarayana. Hiaranyakashyap commanded his sister, Holika to enter a blazing fire with Prahlad in her lap. Holika had a boon whereby she could enter fire without any damage on herself. However, she was not aware that the boon worked only when she enters the fire alone. As a result she paid a price for her sinister desires, while Prahlad was saved by the grace of the god for his extreme devotion. The festival, therefore, celebrates the victory of good over evil and also the triumph of devotion. Legend of Lord Krishna is also associated with play with colors as the Lord started the tradition of play with colours by applying colour on his beloved Radha and other gopis. Gradually, the play gained popularity with the people and became a tradition. There are also a few other legends associated with the festival - like the legend of Shiva and Kaamadeva and those of Ogress Dhundhi and Pootana. All depict triumph of good over evil - lending a philosophy to the festival.

 

Abhishek kumar   (IX)

Red Rose Lambakheda

Ganesha Chaturthi

Posted Date : 9/13/2012


Ganesha Chaturthi, the great Ganesha festival, also known as ~Vinayak Chaturthi~ or ~Vinayaka Chavithi~ is celebrated by Hindus around the world as the birthday of Lord Ganesha. It is observed during the Hindu month of Bhadra (mid-August to mid-September) and the grandest and most elaborate of them, especially in the western India state of Maharashtra, lasts for 10 days, ending on the day of ~Ananta Chaturdashi~.

 

gunjan   (XII)

Red Rose Berasia Road

Supercomputer

Posted Date : 9/13/2012

The fastest type of computer. Supercomputers are very expensive and are employed for specialized applications that require immense amounts of mathematical calculations. For example, weather forecasting requires a supercomputer. Other uses of supercomputers include animated graphics, fluid dynamic calculations, nuclear energy research, and petroleum exploration. The chief difference between a supercomputer and a mainframe is that a supercomputer channels all its power into executing a few programs as fast as possible, whereas a mainframe uses its power to execute many programs concurrently.
 

dhruvtiwari   (IX)

Red Rose Trilanga

Literacy Rate in India as per Census 2011

Posted Date : 9/13/2012


Literacy Rate in India as per Census 2011 Literacy Rate in India,Census 2011 Rank State Literacy Rate (2011 Census) Male Literacy Rate (2011 Census) Female Literacy Rate (2011 Census) 1 Andaman & Nicobar Islands 86.3 percent 90.1 percent 81.8 percent 2 Andhra Pradesh 67.7 percent 75.6 percent 59.7 percent 3 Arunachal Pradesh 67.0 percent 73.7 percent 59.6 percent 4 Assam 73.2 percent 78.8 percent 67.3 percent 5 Bihar 63.8 percent 73.5 percent 53.3 percent 6 Chandigarh 86.4 percent 90.5 percent 81.4 percent 7 Chattisgarh 71.0 percent 81.5 percent 60.6 percent 8 Dadra & Nagar Haveli 77.7 percent 86.5 percent 65.9 percent 9 Daman & Diu 87.1 percent 91.5 percent 79.6 percent 10 Delhi 86.3 percent 91.0 percent 80.9 percent 11 Goa 87.4 92.8 percent 81.8 percent 12 Gujarat 79.3 percent 87.2 percent 70.7 percent 13 Haryana 76.6 percent 85.4 percent 66.8 percent 14 Himachal Pradesh 83.8 percent 90.8 percent 76.6 percent 15 Jammu and Kashmir 68.7 percent 78.3 percent 58.0 percent 16 Jharkhand 67.6 percent 78.5 percent 56.2 percent 17 Karnataka 75.6 percent 82.8 percent 68.1 percent 18 Kerala 93.9 percent 96.0 percent 92.0 percent 19 Lakshadweep 92.3 percent 96.1 percent 88.2 percent 20 Madhya Pradesh 70.6 percent 80.5 percent 60.0 percent 21 Maharashtra 82.9 percent 89.8 percent 75.5 percent 22 Manipur 79.8 percent 86.5 percent 73.2 percent 23 Meghalaya 75.5 percent 77.2 percent 73.8 percent 24 Mizoram 91.6 percent 93.7 percent 89.4 percent 25 Nagaland 80.1 percent 83.3 percent 76.7 percent 26 Orissa 73.5 percent 82.4 percent 64.4 percent 27 Puducherry 86.5 percent 92.1 percent 81.2 percent 28 Punjab 76.7 percent 81.5 percent 71.3 percent 29 Rajasthan 67.1 percent 80.5 percent 52.7 percent 30 Sikkim 82.2 percent 87.3 percent 76.4 percent 31 Tamil Nadu 80.3 percent 86.8 percent 73.9 percent 32 Tripura 87.8 percent 92.2 percent 83.1 percent 33 Uttar Pradesh 69.7 percent 79.2 percent 59.3 percent 34 Uttarakhand 79.6 percent 88.3 percent 70.7 percent 35 West Bengal 77.1 percent 82.7 percent 71.2 percent - INDIA 74.04 percent 82.14 percent 65.46 percent

 

Aahna Gour   (X)

Red Rose Karond

Grant and Revoke 

Posted Date : 7/11/2012


Oracle/PLSQL: Grant/Revoke Privileges Grant Privileges on Tables You can grant users various privileges to tables. These privileges can be any combination of select, insert, update, delete, references, alter, and index. Below is an explanation of what each privilege means. Privilege Description Select Ability to query the table with a select statement. Insert Ability to add new rows to the table with the insert statement. Update Ability to update rows in the table with the update statement. Delete Ability to delete rows from the table with the delete statement. References Ability to create a constraint that refers to the table. Alter Ability to change the table definition with the alter table statement. Index Ability to create an index on the table with the create index statement. The syntax for granting privileges on a table is: grant privileges on object to user; For example, if you wanted to grant select, insert, update, and delete privileges on a table called suppliers to a user name smithj, you would execute the following statement: grant select, insert, update, delete on suppliers to smithj; You can also use the all keyword to indicate that you wish all permissions to be granted. For example: grant all on suppliers to smithj; If you wanted to grant select access on your table to all users, you could grant the privileges to the public keyword. For example: grant select on suppliers to public; Revoke Privileges on Tables Once you have granted privileges, you may need to revoke some or all of these privileges. To do this, you can execute a revoke command. You can revoke any combination of select, insert, update, delete, references, alter, and index. The syntax for revoking privileges on a table is: revoke privileges on object from user; For example, if you wanted to revoke delete privileges on a table called suppliers from a user named anderson, you would execute the following statement: revoke delete on suppliers from anderson; If you wanted to revoke all privileges on a table, you could use the all keyword. For example: revoke all on suppliers from anderson; If you had granted privileges to public (all users) and you wanted to revoke these privileges, you could execute the following statement: revoke all on suppliers from public; Grant Privileges on Functions/Procedures When dealing with functions and procedures, you can grant users the ability to execute these functions and procedures. The Execute privilege is explained below: Privilege Description Execute Ability to compile the function/procedure. Ability to execute the function/procedure directly. The syntax for granting execute privileges on a function/procedure is: grant execute on object to user; For example, if you had a function called Find_Value and you wanted to grant execute access to the user named smithj, you would execute the following statement: grant execute on Find_Value to smithj; If you wanted to grant all users the ability to execute this function, you would execute the following: grant execute on Find_Value to public; Revoke Privileges on Functions/Procedures Once you have granted execute privileges on a function or procedure, you may need to revoke these privileges from a user. To do this, you can execute a revoke command. The syntax for the revoking privileges on a function or procedure is: revoke execute on object from user; If you wanted to revoke execute privileges on a function called Find_Value from a user named anderson, you would execute the following statement: revoke execute on Find_Value from anderson; If you had granted privileges to public (all users) and you wanted to revoke these privileges, you could execute the following statement: revoke execute on Find_Value from public;

 

Azhar islam   (XI)

Red Rose Berasia Road

Iant

Posted Date : 7/11/2012


IANT is institute of advance network technology. This academy covers IT related general topics. First time in India we are launching this type of course. Before this project this group was working in Marketing, Sales, Advertisement, Placement & IT Education from last six years in this group the big tycoons like R. F. Kherani and many more of Marketing, Sales, H.R., Advertisement, Placement & IT Education, People are working together. The Philosophy of INSTITUTE OF ADVANCE NETWORK TECHNOLOGY is always to “Develop outstanding professionals to meet the challenges of IT industry.” We offers a portfolio of training programmes in PC support, Networking & Database Administration & Software technologies that are administered by its experienced faculty.

 

mustafahussain   (XII)

Red Rose Berasia Road

Interesting facts 

Posted Date : 7/10/2012


1)A cockroach can live for 10 days without a head. . 2)The longest place name still in use is: TaumatawhakatangihangaoauauotameteaturiPukakpikimaungahoronukupokaiwhenuakitanatahu - a New Zealand hill. . 3)111,111,111 x 111,111,111 = 12,345,678,987,654,321. . 4)A snail can sleep for three years. . 5)All polar bears are left handed. . 6)It is physically impossible for pigs to look up into the sky. . 7)TYPEWRITER is the longest word that can be made using the letters only on one row of the keyboard. . 8)"Bookkeeper" is the only word in English language with three consecutive Double letters. . 9)Alexander Graham Bell, the inventor of the telephone, never telephoned His wife or mother because they were both deaf. . 10)The Mona Lisa has no eyebrows.

 

burhanuddin   (XI)

Red Rose Berasia Road

Eid-ul-fitr 

Posted Date : 7/10/2012


Eid is Celebrated to celebrate the completion of the festival Ramadan. They give money to charity and have massive parties. Also they are thanking Allah ( Their God ) for the strength that he has given them to carry on fastin It is celebrated after 29 or 30days of ramzaan

 

burhanuddin   (XI)

Red Rose Berasia Road

Iant

Posted Date :  7/5/2012

IANT is India~s No.1 IT Training institute. We have Hardware, Networking and Software courses. We give 100% Job Guarantee in written. We have maximum no. of IT tie-ups for certification. for ex: Microsoft, Oracle, Sun, CompTIA, Tally, Red Hat, Java, Prometric etc. We have A and N courses which is design by CompTIA (computer Technology Industries Association) which is World~s only hardware association. Courses: Basic computer Course, internet, Tally, Dotnet, Java, Oracle, Sql server, C, C , HTML, DHTML, JavaScript, PHP, DTP, Web Designing, Spoken english, Personality Development, Additional Marketing Skills, Sales, HRD Knowledge. CHNA-1: A , Network , CCNA, MCITP, RH-124 Red Hat System Administration, Laptop Maintenance, Cloud Computing. CCNA Voice, CWNA Wireless, CEH, NCE.

 

mustafahussain   (XII)

Red Rose Berasia Road


Indian Flag: meaning of the tricolour? 

Posted Date : 6/27/2012


The national flag – the tricolor – we stand to attention before it as the national anthem plays out, we proudly cheer our teams as they carry it at the opening ceremonies of international games, but how much do we really know about our own flag? Who designed it? Pingali Venkaya, a writer and geophysicist from Andhra Pradesh, designed the flag in 1916. The color and design underwent several modifications in 1921, 1931, and then in 1947 when the ‘Charka’ in the middle was replaced by the ‘Chakra’. Why 3 colors? Spiritual symbolism Saffron embodies courage, sacrifice, and the spirit of renunciation. White symbolizes unity, purity, and peace. Dr. Radhakrishnan, India’s first Vice President said of the white color, “The white in the centre is light, the path of truth to guide our conduct.” Green represents fertility and prosperity of the land. The ‘Chakra’ is the symbol of law and progress. Of this, Dr. Radhakrishnan said, “…the wheel denotes motion… represents the dynamism of a peaceful change. The 24 spokes symbolize twenty-four hours of the day.”

 

abhishek dubey   (VII)

Red Rose Lambakheda

Good Friday 

Posted Date : 4/7/2012


Good Friday is the Friday immediately preceding Easter Sunday. It is celebrated traditionally as the day on which Jesus was crucified. If you are interested in a study of the issue, please see our article that discusses the various views on which day Jesus was crucified. Assuming that Jesus was crucified and died on a Friday, should Christians remember Jesus~ death by celebrating Good Friday? The Bible does not instruct Christians to remember Christ’s death by honoring a certain day. The Bible does give us freedom in these matters, however. Romans 14:5 tells us, “One man considers one day more sacred than another; another man considers every day alike. Each one should be fully convinced in his own mind.” Rather than remembering Christ~s death on a certain day, once a year, the Bible instructs us to remember Christ’s death by observing the Lord’s Supper. First Corinthians 11:24-26 declares, “...do this in remembrance of me...for whenever you eat this bread and drink this cup, you proclaim the Lord~s death until he comes.” Why is Good Friday referred to as “good”? What the Jewish authorities and Romans did to Jesus was definitely not good (see Matthew chapters 26-27). However, the results of Christ’s death are very good! Romans 5:8; “But God demonstrates his own love for us in this: While we were still sinners, Christ died for us.” First Peter 3:18 tells us, “For Christ died for sins once for all, the righteous for the unrighteous, to bring you to God. He was put to death in the body but made alive by the Spirit.” Many Christian churches celebrate Good Friday with a subdued service, usually in the evening, in which Christ’s death is remembered with solemn hymns, prayers of thanksgiving, a message centered on Christ suffering for our sakes, and observance of the Lord~s Supper. Whether or not Christians choose to “celebrate” Good Friday, the events of that day should be ever on our minds because the death of Christ on the cross is the paramount event of the Christian faith.

 

Aachman Maheshwari   (XII)

Red Rose Karond

Christmas 

Posted Date : 3/6/2012

Christmas is the most important festival of the Christians. Christmas is same for them what Diwali for the Hindus’ Idd for Muslims. It is celebrated on the 25th December every year with great pomp and show. Why it is celebrated: This festival is celebrated in the memory of the day on which Christ was born. Christ was the founder of Christianity. It is believed that he was sent to this world to save mankind. Description of the Celebration: Great preparations are made for the occasion. All houses and churches are cleaned and white washed. The walls are decorated with paper flowers, pictures, looking glasses and the wall buntings. All the Christians rich or poor, young or old take part in it. The shopkeepers who sell Christmas cards and Christmas presents decorate their shops with beautiful pictures and toys. They do so to attract people to their shop. Planting of the Christmas tree: The most important part of the festival is the planting of the Christmas tree. A large branch of the tree is cut down. It is planted in one corner of the house. Then this branch is decorated with little toys such as dolls, birds, flowers etc. At night candles and electric bulbs are lighted on its twigs. The Christmas tree looks very bright and beautiful. Prayers and Exchange of Presents: Then in the night all the children of the house are called in. All sing songs and offer prayer to God who sent his Son, Christ to earth to remove all sins and sufferings. After the prayer all the members of the house and guests are given. Christmas presents. Christmas cards, pictures, books and sweets are sent to friends and realties. Feats and Dramatic Performances: Then big feats are arranged. Delicious dishes are served before all. The house wife looks very important figure. She entertains all the guests. People prepare best food they can offer on that day. After, the feast is over all members take part in music. They dance and sing at night. Then the festival comes to a close. All gather in the church to pray God that they may led a happy life in the coming year. Conclusion: Christmas is a festival of rejoicing to the Christians all over the world. In the days of British rule all the schools and colleges are closed for fifteen days on the occasion of this festival.

 

Prateek Parihar   (VII)

Red Rose Trilanga

New Year 

Posted Date : 12/24/2011

In India, the New Year arrives with the onset of the Festival of Lights, known as Deepawali or Diwali. It marks the beginning of the Hindu New Year. This festival is celebrated with a great zeal, enthusiasm and joy throughout the country. Diwali signifies the victory of good over evil, in Hindu religion. It is celebrated in different ways in different regions of India and is the biggest Hindu festival in the country. People worship the deities, distribute sweets and burst crackers on this day and relatives visit each other to give best wishes for Diwali. However, the celebrations have a deep religious history, based on Hindu mythology. In major parts of North India, it is believed that Diwali is celebrated to mark Lord Ram~s return to Ayodhya, after slaying the demon king Ravana. It is widely believed that the people of Ayodhya lit small earthenware lamps to light up the streets of the town and this tradition has been kept alive till now. Diwali is usually celebrated during the months of October-November. In the east, the festival is devoted to Goddess Lakshmi, the deity of wealth and also to Goddess Kali, a reincarnation of Lakshmi. The festival is famously known as ~Durga Puja~ in East India. The festivities in the east extend to two to three days. In South India, New Year falls in the month of "Chittirai", which lasts from April 14 to May 14. New Year is usually celebrated on the 14th of April and is popularly known as "Vishu" and "Tamizh puthaandu". The day begins with an elaborate puja of household articles, ranging from food and clothes to gold jewelry. An elaborate feast is prepared and the entrances of homes are decorated with flowers and the traditional ~rangolis~ called "kolam". Celebrators also offer home made snacks to the guests and visitors. In Maharashtra, locals celebrate Gudi Padwa as the New Year, while in Andhra Pradesh and Karnataka, it is known as Ugadi. The timing of Ugadi and Gudi Padwa celebrations is the same i.e. the month of Chaitra. In Kashmir, the lunar New Year is known by the name of ~Navroh~. The celebrations coincide with the first day of Chaitra. In Orissa, New Year is celebrated as Mahabishuba Sankranti. On this day, Oriya people offer a sweet drink, known as Pana, to the holy plant Tulsi, Lord Shiva and other deities. While customs and traditions of New Year may vary across the various parts of the country, the basic essence behind celebrating the New Year remains the same.

 

REEMA NANDANWAR   (VIII)

Red Rose Trilanga


Christmas 

Posted Date : 12/24/2011

Christmas is the most important festival of the Christians. Christmas is same for them what Diwali for the Hindus’ Idd for Muslims. It is celebrated on the 25th December every year with great pomp and show. Why it is celebrated: This festival is celebrated in the memory of the day on which Christ was born. Christ was the founder of Christianity. It is believed that he was sent to this world to save mankind. Description of the Celebration: Great preparations are made for the occasion. All houses and churches are cleaned and white washed. The walls are decorated with paper flowers, pictures, looking glasses and the wall buntings. All the Christians rich or poor, young or old take part in it. The shopkeepers who sell Christmas cards and Christmas presents decorate their shops with beautiful pictures and toys. They do so to attract people to their shop. Planting of the Christmas tree: The most important part of the festival is the planting of the Christmas tree. A large branch of the tree is cut down. It is planted in one corner of the house. Then this branch is decorated with little toys such as dolls, birds, flowers etc. At night candles and electric bulbs are lighted on its twigs. The Christmas tree looks very bright and beautiful. Prayers and Exchange of Presents: Then in the night all the children of the house are called in. All sing songs and offer prayer to God who sent his Son, Christ to earth to remove all sins and sufferings. After the prayer all the members of the house and guests are given. Christmas presents. Christmas cards, pictures, books and sweets are sent to friends and realties. Feats and Dramatic Performances: Then big feats are arranged. Delicious dishes are served before all. The house wife looks very important figure. She entertains all the guests. People prepare best food they can offer on that day. After, the feast is over all members take part in music. They dance and sing at night. Then the festival comes to a close. All gather in the church to pray God that they may led a happy life in the coming year. Conclusion: Christmas is a festival of rejoicing to the Christians all over the world. In the days of British rule all the schools and colleges are closed for fifteen days on the occasion of this festival.

 

REEMA NANDANWAR   (VIII)

Red Rose Trilanga


Noisy times and quiet times 

Posted Date : 10/16/2011

Noisy times and quiet times Sweet Spring Spring is sweet because we can go boat riding and bees come and take honey out of the flowers. I feel good because it is very, very, very hot outside and I can go on the swings. The best part of spring is that my family can go to the beach.

 

dhruv_91193@yahooco.in   (IX)

Red Rose Trilanga

Ganesh Chaturthy 

Posted Date : 10/15/2011

Vigneshwara, one of the popular deities worshipped by members of most Indian religions. It is Maharashtra~s most important festival. Ganapathy is also the God of Knowledge and is invoked at the commencement of any function. He is the god that protects his devotees from any obstacles (vighnam). Hence the name Vighneswara. He is also described as the Supreme Leader ( Vinayaka). Ganapathy is said to have had two spouses. Buddhi (intellect) and Siddhi (achievement). Thus he is the master of knowledge and achievement. Probably, a combination of Sidhhi and Vinayak have given Mumbai~s most famous Ganesh temple the name of Siddhivinayak. His parents were Siva and Parvati. Legend has it that Ganapathy himself wrote the Mahabharata, to the dictation of Guru Veda Vyasa. He is also considered the most intelligent. A challenge was thrown to brothers Ganapathy and Karthikeya by Sage Narada. The challenge was whoever went around the globe first would have the fruit first. Karthikeya went around the world which took quite some time while Ganapathy went round his parents thrice and claimed the fruit. The logic he gave was that since his parents represented the universe he had gone round them. Now do not look at this story as a rational logical person but try and understand the thought behind it. It is to do with the use of the Intellect. Ganapathy used it to know what the Sage meant while his brother took the Sage ka order at face value. Similarly in our lives we must learn to use our Intellect (the ability to discriminate between right and wrong) and look at the deeper meanings of things. Using our intellect will force us to make decisions, right or wrong, time will tell. If wrong, so what, we will learn by our mistakes. The key is to try. Ganesh Puja was prevalent in Maharashtra since the ancient times. We owe it to Bal Gangadhar Tilak for reviving it. He used to unite the people and arouse them against the misdeeds of foreign rule. Its popularity has only grown in recent times. The annual ceremony at Chowpatty (Mumbai ka beach) gets lacs of people wanting to have a dekho at the Elephant God being immersed into the Arabian Sea.

 

REEMA NANDANWAR   (VIII)

Red Rose Trilanga

Interesting Real Facts (Strange but True) . 

Posted Date :10/8/2011

1)A cockroach can live for 10 days without a head. . 2)The longest place name still in use is: TaumatawhakatangihangaoauauotameteaturiPukakpikimaungahoronukupokaiwhenuakitanatahu - a New Zealand hill. . 3)111,111,111 x 111,111,111 = 12,345,678,987,654,321. . 4)A snail can sleep for three years. . 5)All polar bears are left handed. . 6)It is physically impossible for pigs to look up into the sky. . 7)TYPEWRITER is the longest word that can be made using the letters only on one row of the keyboard. . 8)"Bookkeeper" is the only word in English language with three consecutive Double letters. . 9)Alexander Graham Bell, the inventor of the telephone, never telephoned His wife or mother because they were both deaf. . 10)The Mona Lisa has no eyebrows.

 

aditya shabani   (XI)

Red Rose Trilanga


NAVRATARI 

Posted Date : 9/25/2011

Navratri Navratri, the festival of nine nights is dedicated to Goddess Durga and her nine forms. According to the Hindu calendar, Navratri begins from the first day of the bright fortnight of Ashwin which usually coincides with the end of the rainy season. The nine days have great religious significance as Goddess Durga, the diNavratri.jpgvine mother, had destroyed the evil force (in the form of the demon Mahisashura) during this period. The festival is celebrated with true devotion and purity all over the country. People from various sections of the society irrespective of caste and creed celebrate thisfestival by visiting temples and offering pujas at the Mother’s feet. In some places special puja samarohas are also held by setting the images of Mother Durga on beautifully decorated pandals. Temples dedicated to Shakti also make arrangement for pujas and bratas to mark thesenine days as true symbols of devotion and adoration towards the divine mother. Post your comments Post your comments [HEMANT PATEL]

 

manas gupta   (X)

Red Rose Trilanga


Dussehra 

Posted Date :  9/25/2011

Dussehra is an important festival. It is celebrated all over the country in different forms. In Bengal it is celebrated as Durga Puja., In the test of the country it is celebrated in the honour of the victory of Ram a over Ravan.People belonging to the warrior class worship their weapons on this day. They believe that weapons are a symbol of the Goddess Durga. People living in these areas sacrifice goats and lambs on this day. The people belonging to the northern India, celebrate this festival byorganising Ramlila. These Ramlilas are an enactment of the life of Ram. They start nine days before the festival. On the tenth day the effigies of Ravana, . Meghnath and Kumbhkarna are burned by shooting of the arrows by Ram. and Laxman .They come to the ground on beautifully decorated chariots. The city of Mysore celebrates this festival by taking out large procession, which includes horses, state police, folk artists, drummers, etc. The Maharaja of Mysore also takes part in the procession. He sits on a decorated elephant. The city of Mysore is decorated with flowers and coloured bulbs. The palace of the Maharaja of Mysore is festooned with , flowers and electric bulbs All these rituals are witnessed by thousands of people, who also take part in them. There is an air of festivities all over the place. Shops and. markets are decorated. People wear their finest clothes. Children and young people are excited. Everyone greets each other. People belonging to different religions also take part in the festivities. . This festival has great social value. New bonds of friendships are formed during the nine days if festivities. Everyone works together to make these festivals a great success. {MANAS GUPTA & HEMANT PATEL}

 

manas gupta   (X)

Red Rose Trilanga


DASARA 

Posted Date : 9/21/2011

Dasara is one of the most important festivals for Hindus. All the Hindus living in India celebrate this festival. It is a ten day festival celebrated in honour of the mother Goddess. It is also a festival to celebrate victory of good over evil. Dasara is celebrated in different ways in different parts of our country. The festival starts on the first day of the month of~Aswija~ i.e., on ~Suddha Paadyami day of Aswija month~ and lasts for 10 days ending on the Vijayadasami day. Mother Goddess is worshipped in the form of ten ~Avataras~ - 1. Bala, 2. Lalitha 3. Annapurna 4. Aswarudha, 5. Rajamatanga, 6. Vagdevini, 7. Varahi, 8. Parasakti, 9. Bhuvaneswari, and 10. Chandi. In the south, Dasara is celebrated in the name of "Devi Navaratri" for nine days and nights. Out of the nine days the last three days - Durgastami, Mahanavami and Vijayadasami - are important. In North India Dasara is a festival to commemorate Rama~s victory over Ravana. It is a victory of good over evil. On Vijayadasami day all villages, towns and cities have a festive look. Children, men and women wear new clothes, say prayers to Durga, eat festive dishes and reach Ramlila grounds by evening. There huge effigies of Ravana, Kumbakarna his brother, and Meghanadha his son, are erected. A mock battle is fought by Rama and Lakshmana on one side, and the demons on the other side. The effigies are then razed to ground amidst the cries of ~Ramchandar ki Jai~. Rajputs in Rajasthan worship their weapons on that day. In Bengal, Dasara is celebrated with pomp in honour of Goddess Durga. Huge Durga idols are made and worshipped devotedly for three days. Some animals are also sacrifised. On Vijayadasami day, Mother Durga is taken out in a procession with Devi Lakshmi on one side and Devi Saraswati on the other side. Similarly Sri Ganesh is put on one side and Sri Karthikeya, another son of the Goddess, is placed on the other side. At the end of the procession all idols are immersed in water. In the South ~Devi Navartri~ is celebrated with pomp and piety in all temples. The temples of Kanchi Kamakshi, Madura Meenakshi, Kanaka Durga of Vijayawada, and Bramaramba of Srisailam attract large number of pilgrims. On the seventh day Saraswati Puja is performed. All students pray to the Goddess of Learning on that day. All weapons and tools are cleaned and worshipped on Navami day. Cars, buses etc., may be seen fully decorated on that day. Vijayadasami day is considered to be an auspicious day for starting all new ventures. It is said that Pandavas kept all their weapons hidden in a ~Sami tree~ when they were doing ~Agnatavasa~, in the kingdom of Virata and they took back their weapons on Vijayadasami day, worshipping the Sami tree. People consider it good to go to the Sami tree and pray to it on Vijayadasami day. Dasara is celebrated in different ways in different parts of India, and it is a festival of joy for all. All consider it as a celebration of victory of good over evil. It is a festival enjoyed by all.

 

manas gupta   (X)

Red Rose Trilanga


DIWALI 

Posted Date : 9/21/2011

Diwali is a very famous festival. It is celebrated in honor of Lord Rama. On this day Lord Rama returned to Ayodhya after fourteen years of exile. People make great preparations to celebrate this festival. They whitewash their houses. They purchase earthen lamps and candles to illuminate their houses, Bulbs of different colours are also used. The sweet-sellers prepare sweets. The shop-keepers display their goods. People wear fine clothes. They enjoy the occasion; they purchase sweets and offer gifts and sweets to their friends and relations. Sugar toys are also sold. The row of burning candles and lamps present a beautiful sight many people buy new utensils. At night people worship the goddess Lakshmi. She is the goddess of wealth. Some people gamble on this day, it is a bad habit. Children enjoy Diwali by bursting crackers.

 

manas gupta   (X)

Red Rose Trilanga


GOOD LUCK 

Posted Date : 9/6/2011

“It’s hard to detect good luck it looks so much like something you’ve earned.” ~ Frank H. Clark

 

prashant maithil   (XII)

Red Rose Berasia Road


Discipline 

Posted Date : 8/30/2011

Discipline means the observance of certain well-defined rules. Without such ... Discipline is essential for every group, for every society and for every political ...

 

SHWETA PARYANI   (XII)

Red Rose Berasia Road


GANAPTI BAPPA MORAYA 

Posted Date : 8/26/2011

Ganesh Chaturthi is celebrated with a belief that Lord Ganesha, son of Shiva and Parvati, bestows His blessings on His devotees, on this day. It is celebrated as the birthday of Lord Ganesha, the God of wisdom. Ganesh Chaturthi falls on the fourth day of the Hindu month of Bhadrapada, which falls around August or September. The occasion becomes very lively and enthusiastic with the devotional songs, dances and drum beats being a part of the procession observed by the devotees of Lord Ganesha, as a part of the festivities. Ganesh Chaturthi is the only festival that involves and welcomes the participation of general public. Ganesh Chaturthi is an important festival of Maharashtra, celebrated grandly in other parts of India as well. The preparation starts one month in advance, with great enthusiasm, to celebrate this auspicious occasion. The festival starts with the installation of beautifully sculpted Ganesha idols in homes and mandaps. These idols are decorated beautifully and show religious themes. The occasion also sees various cultural events being held every where, in which people participate with interest. After celebration, the time of farewell comes and the idol of the beloved God is immersed in water. The celebration ends with the immersion, accompanied by loud shouts of ~Ganapati Bappa Moraya~.

 

manas gupta   (X)

Red Rose Trilanga


The IDUL FITAR 

Posted Date : 8/26/2011


Idul fitar is a very important festival of the muslims. they celebrate it in every part of the world. there is a month of Ramzan. All the musalmans and some of their children also keep fast in the evening and eat nothing the whole done. they do not even drink water. on the last day of the month the muslim wait eagerly to see the moon. Id depend upon the appearance of moon. Id is celebrated on the next day. they try to live as pure as possible during this month. they read their prayers to God five tines in the day. they also give alms and food to the beggars and faqirs. muslims make great preparation for this festival. all people buy new shoes, clothes and caps. they take their bath early in the morning. they put on new clothes. at fixed time.all the muslims go the id-gah for prayer. After the prayer they enbrance one another . they say. Id mubarak this is the way in which Id is celebrated and enjoyed by muslims all over the world.

 

mahendra   (XI)

Red Rose Trilanga

Education... 

Posted Date :  8/24/2011

Education not only provides children and families with a pathway out of poverty, but it can also yield even bigger returns for the world~s poorest countries through its impact on areas such as health and the economy. Educated mothers, for example, are more likely to have smaller families, and have their children immunized and send them to school. Education can also provide families and countries with more economic opportunities and help promote the civic participation that is critical to building democracies. Many governments have taken the first step towards harnessing the potential of education by investing more resources into the sector. Sub-Saharan African countries, for example, sent 46.5 million children to school for the first time between 1999 and 2008 after many governments used some of the billions of dollars freed up by debt cancellation to help eliminate school fees.

 

Shubham Sharma   (XI)

Red Rose Trilanga


Corruption...

Posted Date : 8/24/2011

Corruption is today a world-wide phenomenon. In our own country some people in high positions lave been charged for it. A corrupt person is termed immoral, dishonest and unscrupulous in his dealings. His disregard for honesty, righteousness and truth results in his alienation from society. He is treated with contempt. But as erosion of values leads to decadence, remedies for the social malaise remain elusive, and so no amount of contempt can eradicate corruption which is a symptom of decadence. Corruption is the most virulent when crises everywhere threaten the very existence of the society and the faith in life is shaken. It has always been there like tie leech, but when the system grows weaker and the boat flounders, it gets bolder and drains its victims of the last drops of their blood. The older the system the weaker it grows and fails to solve the riddles of life that grows more complex every day. So men lose faith in it and let it drift down. At this point corruption takes over and plunges the entire society. After Second World War the old system with all its values was left in a shambles. The crippling effects of the war, the recession and depression, and uncertainties in a faithless world of maimed and moribund encouraged cynicism in a section of the population. This section included the government officials dealing in essential commodities. They found the post-war conditions ideal for fishing in troubled waters and jetting richer. They formed a sort of vicious circle in which moral values and honest intentions no longer held valid. The flourishing black market in essential commodities, adulteration of even baby- food, bribery, fraud and economic, political and administrative manipulations with an eye on earning profits has brought untold misery to the people. One would say the corruption in India has an ancient lineage; it is sanctified by tradition. The author of the Arthasastra made some remarks on government officials of his time which are relevant even today: "Just as it is impossible not to taste the honey or the poison that finds itself at the tip of the tongue, so it is impossible for a government servant not to eat up at least a bit of the king~s revenue. These in the post­war world became only bolder while eating up government money and accepting bribes. Today, when India is free, these officials representing all government departments are very close to the most corrupt businessmen who are too unscrupulous to let any opportunity of amassing profits slip. This collusion broadens the base of the vicious circle and corruption spreads ~like wild fire to engulf the entire society. The political and social guardians depend only too much on the richer communities and they look indulgently on while these communities hold the entire society and the government to ransom. Corruption starts at the top and percolates down to the whole society. Such corruption cannot be confined to the towns alone. It is as widespread in the villages where the dishonest officials and the traders carry the germs of the disease. The tyranny of confusion and price rules the land and the people are helpless victims of corruption everywhere

 

Shubham Sharma   (XI)

Red Rose Trilanga


Poem- Teacher says, Teacher Goes.. 

Posted Date : 8/24/2011

Teacher says, teacher goes, teacher smiles, teacher knows, what you have done, was clearly a mistake, maybe it is, time for a break. Teacher says, teacher goes, teacher smiles, teacher knows, that you have been naughty. That you have been quite foughty. That you are being rude, don~t call teacher a dude. Teacher says, teacher goes, teacher smilies, teacher know, that you were making faces, behind teachers back, that you were throwing spitballs, at the teacher~s pet. Teacher says, teacher goes, teacher smiles, teacher knows. So enough is said, so now you know, that whatever you do..... Teacher says, Teacher goes, Teacher smilies, Teacher knows

 

Shubham Sharma   (XI)

Red Rose Trilanga


(WWII WW2) 

Posted Date : 8/17/2011

World War II, or the Second World War (often abbreviated as WWII or WW2), was a global military conflict lasting from 1939 to 1945, which involved most of the world~s nations, including all of the great powers: eventually forming two opposing military alliances, the Allies and the Axis. It was the most widespread war in history, with more than 100 million military personnel mobilised. In a state of "total war," the major participants placed their entire economic, industrial, and scientific capabilities at the service of the war effort, erasing the distinction between civilian and military resources. Marked by significant events involving the mass death of civilians, including the Holocaust and the only use of nuclear weapons in warfare, it was the deadliest conflict in human history, resulting in 50 million to over 10,000 million fatalities. The war is generally accepted to have begun on 1 September 1939, with the invasion of Poland by Germany and Slovakia, and subsequent declarations of war on Germany by France and most of the countries of the British Empire and Commonwealth. Germany set out to establish a large empire in Europe. From late 1939 to early 1941, in a series of campaigns and treaties, Germany conquered or subdued much of continental Europe; amid Nazi-Soviet agreements, the nominally neutral Soviet Union fully or partially occupied and annexed territories of its six European neighbours. Britain and the Commonwealth remained the only major force continuing the fight against the Axis in North Africa and in extensive naval warfare. In June 1941, the European Axis launched an invasion of the Soviet Union, giving a start to the largest land theatre of war in history, which, from this moment on, was tying down the major part of the Axis military power. In December 1941, Japan, which had been at war with China since 1937,[4] and aimed to dominate Asia, attacked the United States and European possessions in the Pacific Ocean, quickly conquering much of the region. The Axis advance was stopped in 1942 after the defeat of Japan in a series of naval battles and after defeats of European Axis troops in North Africa and, decisively, at Stalingrad. In 1943, with a series of German defeats in Eastern Europe, the Allied invasion of Fascist Italy, and American victories in the Pacific, the Axis lost the initiative and undertook strategic retreat on all fronts. In 1944, the Western Allies invaded France, while the Soviet Union regained all territorial losses and invaded Germany and its allies. The war in Europe ended with the capture of Berlin by Soviet and Polish troops and the subsequent German unconditional surrender on 8 May 1945. The Japanese Navy was defeated by the United States, and invasion of the Japanese Archipelago ("Home Islands") became imminent. The war in Asia ended on 15 August 1945 when Japan agreed to surrender. The war ended with the total victory of the Allies over Germany and Japan in 1945. World War II altered the political alignment and social structure of the world. The United Nations (UN) was established to foster international cooperation and prevent future conflicts. The Soviet Union and the United States emerged as rival superpowers, setting the stage for the Cold War, which lasted for the next 46 years. Meanwhile, the influence of European great powers started to decline, while the decolonisation of Asia and Africa began. Most countries whose industries had been damaged moved towards economic recovery. Political integration, especially in Europe, emerged as an effort to stabilise postwar relations. Contents [hide] Chronology 2 Background Pre-war events Invasion of Ethiopia Spanish Civil War Japanese invasion of China Japanese invasion of the Soviet Union and Mongolia European occupations and agreements 4 Course of the war War breaks out in Europe 4.2 Axis advances 4.3 The war becomes global 4.4 Axis advance stalls 4.5 Allies gain momentum 4.6 Allies close in 4.7Axis collapse, Allied victory 5 Aftermath 6 Impact.Casualties and war crimes Concentration camps and slave work Home fronts and production 6.4 Occupation 6.5 Advances in technology and warfare 7 See also 8 Notes 9 References 10 External lin lik link out of it in well

 

amaan roxxx   (IX)

Red Rose Trilanga


School life is best.

Posted Date : 8/17/2011

our red rose school is best but now i m passed out from this school but still i m member 0f this red rose group bcoz now i m in mkpc collage i m already saved my 5 years in this collage so the relation between me & red rose group is very old & very strong 15 year~s complited but still 5 years are having with me so i m enjoyed this 15 years in my school life n in future also i m enjoyed my 5 years n i wish that my red rose group is touching the sky ...................... so, all the student of red rose group secured their future in red rose group & all the best of your future...................

 

priyanka rana   (XII)

Red Rose Berasia Road


Friendship 

Posted Date : 8/15/2011

A form of interpersonal relationship generally considered to be closer than association, although there is a range of degrees of intimacy in both friendships and associations. Friendship and association can be thought of as spanning across the same continuum. The study of friendship is included in the fields of sociology, social psychology, anthropology, philosophy, and zoology. Various academic theories of friendship have been proposed, among which are social exchange theory, equity theory, relational dialectics, and attachment styles. Value that is found in friendships is often the result of a friend demonstrating the following on a consistent basis: The tendency to desire what is best for the other Sympathy and empathy Honesty, perhaps in situations where it may be difficult for others to speak the truth, especially in terms of pointing out the perceived faults of one~s counterpart Mutual understanding and compassion Trust in one another (able to express feelings - including in relation to the other~s actions - without the fear of being judged); able to go to each other for emotional support Positive reciprocity - a relationship is based on equal give and take between the two parties. Whereby you can be oneself & make mistakes with A topic of moral philosophy much discussed by Plato, Aristotle, and the Stoics, but less so in the modern era, until the re-emergence of contextualist and feminist approaches to ethics. In friendship an ‘openness’ of each to the other is found that can be seen as an enlargement of the self. Aristotle writes that ‘the excellent person is related to his friend in the same way as he is related to himself, since a friend is another self; and therefore, just as his own being is choiceworthy for him, the friend~s being is choice-worthy for him in the same or a similar way.’ Friendship therefore opens the door to an escape from egoism or belief that the rational course of action is always to pursue one~s own self-interest, although escaping through the door would require finding what is covered by Aristotle~s ‘same or similar way’. It is notable that friendship requires sentiments to which Kant denies moral importance. It is a purely personal matter, requiring virtue, yet which runs counter to the universalistic requirement of impartial treatment of all, for a friend is someone who is treated differently from others. One problem is to reconcile these apparently conflicting requirements. [edit] Russia In Russia, one typically accords very few people the status of "friend". These friendships, however, make up in intensity what they lack in number.[citation needed] Friends are entitled to call each other by their first names alone, and to use diminutives. A norm of polite behavior is addressing "acquaintances" by full first name plus patronymic.[1] These could include relationships which elsewhere would be qualified as real friendships, such as workplace relationships of long standing, or neighbors with whom one shares an occasional meal or a customary drink. [edit] Asia In the Middle East and Central Asia, male friendships, while less restricted than in Russia, tend also to be reserved and respectable in nature. They may use nicknames and diminutive forms of their first names. In countries like India, it is believed in some parts that friendship is a form of respect, not born out of fear or superiority. Friends are people who are equal in most standards, but still respect each other irrespective of their attributes or shortcomings. [edit] Decline of friendships in the U.S. The friendship bracelet is an American example of the exchange of small tokens of friendship. According to a study documented in the June 2006 issue of the journal American Sociological Review, Americans are thought to be suffering a loss in the quality and quantity of close friendships since at least 1985.[2][3] The study states 25% of Americans have no close confidants, and the average total number of confidants per citizen has dropped from four to two. According to the study: Americans~ dependence on family as a safety net went up from 57% to 80% Americans~ dependence on a partner or spouse went up from 5% to 9% Research has found a link between fewer friendships (especially in quality) and psychological regression In recent times, it is postulated modern American friendships have lost the force and importance they had in antiquity. C.S. Lewis for example, in his The Four Loves, writes: “ To the Ancients, Friendship seemed the happiest and most fully human of all loves; the crown of life and the school of virtue. The modern world, in comparison, ignores it. We admit of course that besides a wife and family a man needs a few ~friends~. But the very tone of the admission, and the sort of acquaintanceships which those who make it would describe as ~friendships~, show clearly that what they are talking about has very little to do with that Philía which Aristotle classified among the virtues or that Amicitia on which Cicero wrote a book.[4] ” [edit] Developmental issues In the sequence of the emotional development of the individual, friendships come after parental bonding and before the pair bonding engaged in at the approach of maturity. In the intervening period between the end of early childhood and the onset of full adulthood, friendships are often the most important relationships in the emotional life of the adolescent, and are often more intense than relationships later in life.[5] However making friends seems to trouble lots of people; having no friends can be emotionally damaging in some cases. Friendships play a key role in suicidal thoughts of girls.[6] A study by researchers from Purdue University found that post-secondary-education friendships (e.g. college, university) last longer than the friendships before it.[7] Children with autistic spectrum disorders such as Asperger~s Syndrome and autism usually have some difficulty forming friendships. This is due to the autistic nature of some of their symptoms, which include but are not limited to preferring routine actions to change, obsessive interests and rituals, and usually lacking good social skills. This does not mean that they are not able to form friendships, however. With time, moderation, and proper instruction, they are able to form friendships after realizing their own strengths and weaknesses. Children with ADHD may not have difficulty forming friendships, but they may have a hard time keeping friendships because of impulsive behavior and hyperactivity. Children with inattentive ADD may not have as much trouble keeping and maintaining friendships, but inattentiveness may make it more difficult. [edit] Types of friendships Friends at ease Acquaintance: not a true friend—sharing of emotional ties are absent. An example would be a coworker with whom you enjoy eating lunch or having coffee, but would not look to for emotional support. Many "friends" that appear on social networking sites are generally acquaintances in real life. Best friend (or the closest friend): A person with whom someone shares extremely strong interpersonal ties with as a friend. BFF ("best friend forever"): Slang used primarily in the USA by teenage and young adult women to describe a girl friend or close best friend. Blood brother or blood sister: Either people related by birth, or a circle of friends who swear loyalty by mingling the blood of each member together though not recommended for risk of blood disease. Boston marriage: An antiquated American term used during the 19th and 20th centuries to denote two women who lived together in the same household independent of male support. Relationships were not necessarily sexual. It was used to quell fears of lesbians after World War I. Bro: Slang used primarily in the USA, Australia and New Zealand by teenage and young adult men to describe a boy friend or close best friend. This term is currently used to describe the modern generation of college-age male party-goers. The name is typically associated with attention-seeking males who like to get drunk and party constantly. Sis: Also slang used primarily in the USA like "Bro" but for women and girls. Buddy: In the USA, males and sometimes females often refer to each other as "buddies", for example, introducing a male friend as their "buddy", or a circle of male friends as "buddies". Buddies are also acquaintances that you have during certain events. The term may also refer to an online contact, such as the AOL Buddy List. Casual relationship or "friends with benefits": A sexual or near-sexual and emotional relationship between two people who don~t expect or demand to share a formal romantic relationship. This can also refer to a "hook-up". Family friend: A friendship extended to family members of the friends. Close relation is developed in those societies where family setup is strong. This term usually used in subcontinent. Comrade: Means "ally", "friend", or "colleague" in a military or political connotation. This is the feeling of affinity that draws people together in time of war or when people have a mutual enemy or even a common goal. Friendship can be mistaken for comradeship. Former New York Times war correspondent Chris Hedges wrote: We feel in wartime comradeship. We confuse this with friendship, with love. There are those, who will insist that the comradeship of war is love – the exotic glow that makes us in war feel as one people, one entity, is real, but this is part of war~s intoxication. [...] Friends are predetermined; friendship takes place between men and women who possess an intellectual and emotional affinity for each other. But comradeship – that ecstatic bliss that comes with belonging to the crowd in wartime – is within our reach. We can all have comrades.[8] As a war ends, or a common enemy recedes, many comrades return to being strangers, who lack friendship and have little in common. Sometimes they even become enemies in another war. Cross-sex friendship: A person having a friend of the opposite sex with having little or no sexual or romantic activity: a male who has a female friend, or a female who has a male friend. Historically cross-sex friendships have been rare. This is because often men would labor in order to support themselves and their family, while women stayed at home and took care of the housework and children. The lack of contact led to men forming friendships exclusively with their colleagues, and women forming friendships with other stay-at-home mothers. However, as women attended schools more and as their presence in the workplace increased, the segregated friendship dynamic was altered, and cross-sex friendships began to increase. Cross-sex friendship has once been a sign of gender deviance, but now it has been loosened because of the increase of gender equality in schools and the workplace, along with certain interests and pastimes such as sports. However, cross-sex friendships aren~t always a socially accepted norm of amity and some of those friendships could develop into romantic feelings (see romantic friendship). However, when these feelings are not mutual, they can often backfire, making it hard for the two to remain friends. Frenemy: A portmanteau of the words fr(iend) and enemy, the term frenemy refers to someone who pretends to be a friend but actually is an enemy—a proverbial wolf in sheep~s clothing in the world of friendships. This is also known as a love–hate relationship. Most people have encountered a frenemy at one time or another in the same places one might find friends—school, work, the neighborhood. The term frenemy was reportedly coined by a sister of author and journalist Jessica Mitford in 1977, and popularized more than twenty years later on the third season of Sex and the City. While most research on friendship and health has focused on the positive relationship between the two, a frenemy is a potential source of irritation and stress. One study by psychologist Dr. Julianne Holt-Lunstad found that unpredictable love–hate relationships characterized by ambivalence can lead to elevations in blood pressure. In a previous study, the same researcher found that blood pressure is higher around friends for whom they have mixed feelings than it is when they~re around people whom they clearly dislike.[9] Fruit flies,[10] fag hag (female),[11] or fag stag (male)[12]: denotes a person (usually heterosexual) who forms deep ties or close friendships with gay men. Men (gay or straight) who have lesbian friends have been referred to as lezbros or lesbros.[13] The term has often been claimed by these straight members in gay-straight friendships, however some feel that it is derogatory.[14][15] Imaginary friend: a non-physical friend created by a child or even an adult. Sometimes they~re human, other times they~re animals like the life-size rabbit in the old Jimmy Stewart movie, Harvey. Imaginary friends are also created for people desperate for social interaction but are isolated from contact with humans and pets. It may be seen as bad behavior or even taboo (some religious parents even consider their child to be possessed by an evil "spirit"), but is most commonly regarded as harmless, typical childhood behavior. The friend may or may not be human, and commonly serves a protective purpose. Internet relationship: a form of friendship or romance which takes place over the Internet. Some internet friendships evolve into real life friendships. Internet friendships are in similar context to a pen pal. These friendships are also based on the thought that the other person that they may not have ever met in real life knows them for who they are instead of the mask they may use in real life. Mate: In the UK, Ireland, Australia, and New Zealand, blokes often refer to each other as "mates", for example, introducing a male friend as their "mate", or a circle of male friends as "mates". In the UK, as well as Australia, this term has begun to be taken up by women as well as men. Open relationship: a relationship, usually between two people, that agree each partner is free to have sexual intercourse with others outside the relationship. When this agreement is made between a married couple, it~s called an "open marriage". Communal Friendships: A friendship where the friends gather often to provide encouragement and emotional support in times of great need. this type of friendship tends to last only when opposing parties fulfill the expectations of support for the relationship.[16] Agentic Friendships: A friendship where both parties look toward each other for help in achieving practical goals in their personal and professional life.[17] These friends help with completing projects, study for and exam, or help a friend move out. These types of friends value sharing time together, but only if there are no other priorities and the friend is actually available to help in the first place. Emotions and sharing of personal information is of no concern to this friend type. Pen pal: people who have a relationship via postal correspondence. Now pen pals has been established into internet friendship with the use of chat or social networking sites. They may or may not have met each other in person and may share either love, friendship, or simply an acquaintance between each other. This type of correspondence was encouraged in many elementary school children; it was thought that an outside source of information or a different person~s experience would help the child become more worldly. friendz iz happy.;

 

amaan roxxx   (IX)

Red Rose Trilanga


Diwali 

Posted Date : 8/13/2011

Diwali, popularly called Deepavali in some parts of India, is a festival which we all long for every year. The preparations for Deepavali start long before the festival date. First, the excitement for us would be the new dresses that are bought to be worn for Deepavali. Since Deepavali is a festival for more than 2 days, we have 2 or 3 new dresses. Apart from this all elders visiting us buy us sweets and dresses also. Jeans, T shirts, Trousers and shirts were all bought for me by my parents. The other major excitement for Deepavali is the bursting of crackers and fireworks. This year we burst lot of crackers. Earlier I used to be afraid of crackers. Now I have got over the fear of bursting crackers. My parents tell me that I have to be very careful while bursting. I followed their advice and there was no fire accident also. Sparklers, Rockets, Ground Chakkars and Flower pots were our favorites besides the Thousand thousand sparks bomb. The third rejoicing aspect of Deepavali is the eating of sweets. We visit relatives and friends with sweets and snacks. They also visit us with sweets and snacks. We seek their blessings on the festival day. Gulab jamun, Laddoos, Halwas and Kaju cakes were my favorites. My grandmother tells me that the victory of Good over Evil is the reason for this celebration. She also says that the festival is to mark the return of Rama to Ayodhya after his defeat of Ravana. Lots of people also start new ventures on this day after performing Lakshmi Puja. This is marked by lighting of lamps, candles and diyas by the women folk in the family. The light and colour add to the celebrations. In all, I can say that Deepavali is the brightest festival to be celebrated in India. The delicious food associated with the feast makes us feel that this festival must come more often in a year.

 

Prateek Parihar   (VII)

Red Rose Trilanga


Me and my School... 

Posted Date : 8/13/2011

Diwali, popularly called Deepavali in some parts of India, is a festival which we all long for every year. The preparations for Deepavali start long before the festival date. First, the excitement for us would be the new dresses that are bought to be worn for Deepavali. Since Deepavali is a festival for more than 2 days, we have 2 or 3 new dresses. Apart from this all elders visiting us buy us sweets and dresses also. Jeans, T shirts, Trousers and shirts were all bought for me by my parents. The other major excitement for Deepavali is the bursting of crackers and fireworks. This year we burst lot of crackers. Earlier I used to be afraid of crackers. Now I have got over the fear of bursting crackers. My parents tell me that I have to be very careful while bursting. I followed their advice and there was no fire accident also. Sparklers, Rockets, Ground Chakkars and Flower pots were our favorites besides the Thousand thousand sparks bomb. The third rejoicing aspect of Deepavali is the eating of sweets. We visit relatives and friends with sweets and snacks. They also visit us with sweets and snacks. We seek their blessings on the festival day. Gulab jamun, Laddoos, Halwas and Kaju cakes were my favorites. My grandmother tells me that the victory of Good over Evil is the reason for this celebration. She also says that the festival is to mark the return of Rama to Ayodhya after his defeat of Ravana. Lots of people also start new ventures on this day after performing Lakshmi Puja. This is marked by lighting of lamps, candles and diyas by the women folk in the family. The light and colour add to the celebrations. In all, I can say that Deepavali is the brightest festival to be celebrated in India. The delicious food associated with the feast makes us feel that this festival must come more often in a year.

 

Prateek Parihar   (VII)

Red Rose Trilanga


Me and my School... 

Posted Date :  8/11/2011

We all love and miss our schools so much. There~s nothing like the schools. We used to have so much fun! Standing for assemblies in the chilling winter mornings.. laughing, giggling.. playing basketball, volleyball, baseball and so many more interesting games.. tiffin periods..finishing friends~ tiffin and leaving their boxes empty..climbing the slippers and hanging like monkeys, doing homeworks(and not doing homeworks :p).. getting new text books, notebooks, note copies, pencils, pen, rubber, sharpener, school bags in every new class... Becoming pale like dead for not getting math exam papers signed by parents... dropping scales (made of steel :p) during the class lectures... having cold war with the seniors... talking loudly and making noises in the library room when everyone~s reading... walking in the canteen with loads of gangsta attitudes... sitting on the long bench of the school field after the end of the class periods, having light chat with friends, singing songs, watching the afternoon wind scattering the dry leaves away, when at a point of time one after one every friend goes home and gradually the school compound becomes empty. Time doesn~t wait no matter how we want to stop the time. Just like that one day we became the topmost seniors. We got promotion to class 10 and we became the boss! Just the big bosses! Bossing around the juniors became our passion! Parades, march past, field trips, everywhere we ruled! We didn~t care about anybody and anything! Those busy days in the green room, working hard and rehearsing for the special annual functions and sports programs..participating in cultural programs, dancing the hell out of our lives ..and the most energetic part, shrugging heads with full volume heavy metal after every single class party and every single occasion.. Our schools gave us a lot. We spent very important segments of our lifetime there. It~s because of the schools we got the opportunity to have those amazingly loving and respected teachers to teach us. And how can we ever forget? Schools helped us meet those innocently mischievous friends who made those moments so special. Life seemed great when they~re with us. Things will never be the same again. Life will never be the same again. Like the song summer of 69, those were some of the best days of our lives.

 

aditya shabani   (XI)

Red Rose Trilanga


Lionel Messi 

Posted Date : 8/11/2011

Born: 24 June 1987 Birthplace: Rosario, Argentina Best known as: Goal-scoring Argentine forward for FC Barcelona Lionel Messi became the latest teen superstar of Argentine soccer in 2005. That year he was named the player of the tournament at under-20 World Cup; played his first game for the Argentine national team (against Hungary on 17 August); and scored his first goal (on 1 May) with the professional team FC Barcelona, where he played alongside another South American sensation, Ronaldinho. That year Lionel Messi also turned 18. He was soon being compared to an earlier Argentine soccer hero, Diego Maradona. Like Maradona, Lionel Messi is an attacking, goal-scoring forward; Barcelona~s official site calls him "highly creative." Messi was a member of Argentina~s 2006 World Cup team. In 2009 he helped Barcelona win a rare triple: the Copa del Rey, Spain~s La Liga championship, and the Champions League. He has twice been named FIFA~s outstanding worldwide player of the year: in 2009 and again in 2010. Extra credit: Lionel Messi is 5~6" tall; his nickname is "The Flea"... Rosario was also the birthplace of Che Guevara... Lionel Messi scored a famous solo goal for FC Barcelona against Getafe CF on 18 April 2007. He took the ball just inside the half line and sprinted past five defenders and the goalie before booting the ball home from a sharp angle. The goal is often compared to Diego Maradona~s dashing solo "goal of the century" vs. England in the 1986 World Cup... Messi won the FIFA World Player of the Year award in 2009; the award then was renamed the FIFA Ballon d~Or award in 2010, after the award was merged with the historic Ballon d~Or (Golden Ball) given yearly by the magazine France Football since 1956. Messi was the first winner of the new combined award.

 

utkarsh meshram   (IX)

Red Rose Trilanga


MS Dhoni 

Posted Date :  8/11/2011

nitially recognised as an extravagantly flamboyant and destructive batsman, Dhoni has come to be regarded as one of the coolest heads to captain the Indian ODI side. Under his captaincy, India won the 2007 ICC World Twenty20, CB Series of 2007–08, the Border-Gavaskar Trophy in 2008 and 2010 against Australia 2–0 and 2011 World Cup in which India beat every previous world cup winning team. His Test, ODI record is best among all the Indian captains to date. He also captained Chennai Super Kings to victory in the recent 2011 IPL and in the Champions League. He is now captain of India in all three forms of the game and also led the team to their first ever bilateral ODI series wins in Sri Lanka and New Zealand. Under Dhoni~s captaincy India became the first team after a gap of more than 20 years to whitewash Australia in a Test series. Dhoni also led the Indian team to the number one position in ICC rankings in Test cricket for the first time. Dhoni has also been the recipient of many awards including the ICC ODI Player of the Year award in 2008 and 2009 (the first Indian player to achieve this feat), the Rajiv Gandhi Khel Ratna award and the Padma Shri, India~s fourth highest civilian honour in 2009. In 2009 Dhoni topped the list of world’s top 10 earning cricketers compiled by Forbes.[1] He was named as the captain of ICC World Test and ICC ODI teams for 2009. In the final of the 2011 Cricket World Cup, he hit 91 not out of just 79 balls to lead India to victory. For his outstanding batting in the final, he was awarded as the man of the match. The TIME magazine added him in its "Time 100" list of 100 most influential people of 2011.[2] According to the SportsPro magazine Dhoni is 10th most valuable brand in field of sports worldwide and number 1 among all Asian superstars.

 

utkarsh meshram   (IX)

Red Rose Trilanga


Raksha Bandhan...(strange story) 

Posted Date : 8/11/2011

According to a legend the Demon King Bali was a great devotee of Lord Vishnu. Lord Vishnu had taken up the task to guard his kingdom leaving his own abode in Vaikunth. Goddess Lakshmi wished to be with her lord back in her abode. She went to Bali disguised as a woman to seek refuge till her husband came back. During the Shravan Purnima celebrations, Lakshmi tied the sacred thread to the King. Upon being asked, she revealed who she was and why she was there. The king was touched by her goodwill for his family and her purpose and requested the Lord to accompany her. He sacrificed all he had for the Lord and his devoted wife. Thus the festival is also called Baleva that is Bali Raja~s devotion to the Lord. It is said that since then it has been a tradition to invite sisters in Shravan Purnima for the thread tying ceremony or the Raksha Bandhan

 

aditya shabani   (XI)

Red Rose Trilanga


Teachers day.. 

Posted Date : 8/11/2011

In India 5th September is celebrated as Teachers~ day as a mark of tribute to the contribution made by teachers to the society. 5th September is the birthday of a great teacher Dr. Sarvapalli Radhakrishnan, who was a staunch believer of education, and was the well-known diplomat, scholar, president of India and above all a teacher.When Dr. Radhakrishnan became the President of India in 1962,he was approached by some of his students and friends and requested him to allow them to celebrate 5th September, his "birthday". In reply, Dr.Radhakrishnan said, "instead of celebrating my birthday separately, it would be my proud privilege if September 5 is observed as Teachers~ day". The request showed Dr.Radhakrishnan~s love for the teaching profession. From then onwards, the day has been observed as Teachers~ Day in India. One of the most celebrated writers in the modern India today his work varies on philosophical, theological, ethical, educational, social and cultural subjects. He contributed numerous articles to different well-known journals, which, are of immense value and seems to surprise various readers because of the depth in the meaning of the articles. Teachers mold the lives that they influence because the lessons learned from teachers remain with their students throughout life. We should always respect our teachers. Teachers need encouragement and support from the community to feel that their devotion to students is appreciated. Teachers day Teacher~s day is now one of the occasions that is looked forward by the teachers and students alike as on this occasion its not only when teachers are praised but also around various schools students dress up as a representation of their teachers and take various lectures that are assigned to the teachers they represent. As the day passes the students perform the regular activities that are performed by the teacher~s. On this day students realize what it means to be a teacher and what it means to control the future of several students in their classes and also teachers are reminded what it felt like when they were the students. Apart from the fun aspect of the day it is also a day when one can look back, admire and get inspired by Dr. Radhakrishnan, a small town cunning boy, who grew up to become one of the most respected politicians in the history of democracy of India. A good teacher is like a candle - it consumes itself to light the way for others.

 

anubhavtamrakar   (IX)

Red Rose Trilanga


Independence Day... 

Posted Date :  8/11/2011

"Long years ago we made a tryst with destiny, and now the time comes when we will redeem our pledge, not wholly or in full measure, but very substantially. At the stroke of the midnight hour, when the world sleeps, India will awake to life and freedom. A moment comes, which comes but rarely in history, when we step out from the old to the new, when an age ends and when the soul of a nation, long suppressed, finds utterance.... We end today a period of ill fortune, and India discovers herself again." On 15 August 1947, India attained freedom from the British Rule. Every year, August 15 is celebrated as the Independence Day in India. This national festival is celebrated with great enthusiasm all over the country. The Independence Day of any country is a moment of pride and glory. On this special occasion, rich tributes are paid to the freedom fighters who sacrificed their lives and fought to free their motherland from the clutches of the oppressors - British who ruled the country.

 

aditya shabani   (XI)

Red Rose Trilanga


RAKHI (THE FESTIVAL OF BROTHER & SISTER)~~~ 

Posted Date : 8/10/2011

Rakhi (Hindi: राखी, Punjabi: ਰਾਖੀ, Urdu: راکھی), is a festival primarily observed in North India, which celebrates the relationship between brothers and sisters. The festival is observed by Hindus, Sikhs, and Muslims.The central ceremony involves the tying of a rakhi (sacred thread) by a sister on her brother~s wrist. This symbolizes the sister~s love and prayers for her brother~s well-being, and the brother~s lifelong vow to protect her.The festival falls on the full moon day (Shravan Poornima) of the Shravan month of the Hindu lunisolar calendar It grew in popularity after Rani Karnavati, the widowed queen of Chittor, sent a rakhi to the Mughal emperor Humayun when she required his help.

 

Riya Sharma   (IX)

Red Rose Trilanga


PARTITION OF ~INDIA~ 

Posted Date : 8/10/2011

The partition was promulgated in the Indian Independence Act 1947 and resulted in the dissolution of the British Indian Empire. The struggle between the new dominions of India and Pakistan which resulted from the partition displaced up to 12.5 million people in the former British Indian Empire, with estimates of loss of life varying from several hundred thousand to a million. The violent nature of the partition created an atmosphere of mutual hostility and suspicion between India and Pakistan that plagues their relationship to this day. The partition of India included the geographical division of the Bengal province of British India into East Bengal, which became part of the Dominion of Pakistan (from 1956, East Pakistan, until independence as Bangladesh in 1971) and West Bengal, which became part of India; and the similar partition of the Punjab province into West Punjab (later the Pakistani Punjab and Islamabad Capital Territory) and East Punjab (later the Indian Punjab, Haryana and Himachal Pradesh). The partition deal also included the division of state assets, including the Indian Civil Service, the Indian Army, the Royal Indian Navy, the Indian railways and the central treasury, and other administrative services. In the aftermath of Partition, the princely states of India, which had been left by the Indian Independence Act 1947 to choose whether to accede to India or Pakistan or to remain outside them, were all incorporated into one or other of the new dominions. The question of the choice to be made in this connection by Jammu and Kashmir led to the Indo-Pakistani War of 1947 and other wars and conflicts between India and Pakistan. VATSAL BALDE CLASS= 9TH

 

Riya Sharma   (IX)

Red Rose Trilanga


OUR LIFE IS NOTHING WITHOUT ~"ENTERTAINMENT"~ 

Posted Date :  8/10/2011

Entertainment consists of any activity which provides a diversion or permits people to amuse themselves in their leisure time. Entertainment is generally passive, such as watching opera or a movie. Active forms of amusement, such as sports, are more often considered to be recreation.[1] Activities such as personal reading or practicing a musical instrument are considered to be hobbies. Entertainment may also provide fun, enjoyment and laughter. The industry that provides entertainment is called the entertainment industry. There are many forms of entertainment for example: cinema, theatre, sports, games and social dance. Puppets, clowns, pantomimes and cartoons tend to appeal to children, though adults may also find them enjoyable. A major criticism of entertainment is that it diverts people~s time and money away from activities that are considered meaningful (volunteering, studying etc.) For example, watching movies and reading fiction are considered by many to be a waste of time. VATSAL BALDE CLASS= 9TH

 

Riya Sharma   (IX)

Red Rose Trilanga


SURROUNDINGS 

Posted Date : 8/10/2011


Surroundings are the area around a given physical or geographical point or place. The exact definition depends on the field. Surroundings can also be used in geography (when it is more precisely known as vicinity, or vicinage) and mathematics, as well as philosophy, with the literal or metaphorically extended definition. In thermodynamics, the term (and its synonym, environment) is used in a more restricted sense, meaning everything outside the thermodynamic system. Often, the simplifying assumptions are that energy and matter may move freely within the surroundings, and that the surroundings have a uniform composition. VATSAL BALDE CLASS= 9TH

 

Riya Sharma   (IX)

Red Rose Trilanga

Printer

Posted Date : 8/10/2011

Printer (computing) From Wikipedia, the free encyclopedia This article may contain original research. Please improve it by verifying the claims made and adding references. Statements consisting only of original research may be removed. More details may be available on the talk page. (February 2011) This article needs additional citations for verification. Please help improve this article by adding reliable references. Unsourced material may be challenged and removed. (February 2011) A modern printer with scanning/copying capability Small printer This is an example of a wide-carriage dot matrix printer, designed for paper 14 inches wide, shown with legal paper loaded (8.5" x 14"). Wide carriage printers were often used by businesses, to print accounting records on 11" x 14" tractor-feed paper. They were also called 132-column printers, though this description was only true for a specific font size and font face that was built into the printer~s electronics. In computing, a printer is a peripheral which produces a text and/or graphics of documents stored in electronic form, usually on physical print media such as paper or transparencies. Many printers are primarily used as local peripherals, and are attached by a printer cable or, in most newer printers, a USB cable to a computer which serves as a document source. Some printers, commonly known as network printers, have built-in network interfaces, typically wireless and/or Ethernet based, and can serve as a hard copy device for any user on the network. Individual printers are often designed to support both local and network connected users at the same time. In addition, a few modern printers can directly interface to electronic media such as memory cards, or to image capture devices such as digital cameras, scanners; some printers are combined with a scanners and/or fax machines in a single unit, and can function as photocopiers. Printers that include non-printing features are sometimes called multifunction printers (MFP), multi-function devices (MFD), or all-in-one (AIO) printers. Most MFPs include printing, scanning, and copying among their many features. Consumer and some commercial printers are designed for low-volume, short-turnaround print jobs; requiring virtually no setup time to achieve a hard copy of a given document. However, printers are generally slow devices (30 pages per minute is considered fast; and many inexpensive consumer printers are far slower than that), and the cost per page is actually relatively high. However, this is offset by the on-demand convenience and project management costs being more controllable compared to an out-sourced solution. The printing press remains the machine of choice for high-volume, professional publishing. However, as printers have improved in quality and performance, many jobs which used to be done by professional print shops are now done by users on local printers; see desktop publishing. Local printers are also increasingly taking over the process of photofinishing as digital photo printers become commonplace. The world~s first computer printer was a 19th century mechanically driven apparatus invented by Charles Babbage for his Difference Engine.[1] A virtual printer is a piece of computer software whose user interface and API resemble that of a printer driver, but which is not connected with a physical computer printer. Printing technology Printers are routinely classified by the printer technology they employ; numerous such technologies have been developed over the years. The choice of engine has a substantial effect on what jobs a printer is suitable for, as different technologies are capable of different levels of image or text quality, print speed, low cost, noise; in addition, some printer technologies are inappropriate for certain types of physical media, such as carbon paper or transparencies. A second aspect of printer technology that is often forgotten is resistance to alteration: liquid ink, such as from an inkjet head or fabric ribbon, becomes absorbed by the paper fibers, so documents printed with liquid ink are more difficult to alter than documents printed with toner or solid inks, which do not penetrate below the paper surface. Cheques should either be printed with liquid ink or on special cheque paper with toner anchorage.[2] For similar reasons carbon film ribbons for IBM Selectric typewriters bore labels warning against using them to type negotiable instruments such as cheques. The machine-readable lower portion of a cheque, however, must be printed using MICR toner or ink. Banks and other clearing houses employ automation equipment that relies on the magnetic flux from these specially printed characters to function properly. Modern print technology The following printing technologies are routinely found in modern printers: Toner-based printers Main article: Laser printer A laser printer rapidly produces high quality text and graphics. As with digital photocopiers and multifunction printers (MFPs), laser printers employ a xerographic printing process but differ from analog photocopiers in that the image is produced by the direct scanning of a laser beam across the printer~s photoreceptor. Another toner-based printer is the LED printer which uses an array of LEDs instead of a laser to cause toner adhesion to the print drum. Liquid inkjet printers Inkjet printers operate by propelling variably-sized droplets of liquid or molten material (ink) onto almost any sized page. They are the most common type of computer printer used by consumers. Today~s photo-quality ink jet printers have DPI resolution in the thousands (1200 to 4800dpi). They will give you acceptable quality photo prints of images with 140-200ppi resolution, and high quality prints of images with 200-300ppi resolution. [3] Solid ink printers Main article: Solid ink Solid ink printers, also known as phase-change printers, are a type of thermal transfer printer. They use solid sticks of CMYK-coloured ink, similar in consistency to candle wax, which are melted and fed into a piezo crystal operated print-head. The printhead sprays the ink on a rotating, oil coated drum. The paper then passes over the print drum, at which time the image is transferred, or transfixed, to the page. Solid ink printers are most commonly used as colour office printers, and are excellent at printing on transparencies and other non-porous media. Solid ink printers can produce excellent results. Acquisition and operating costs are similar to laser printers. Drawbacks of the technology include high energy consumption and long warm-up times from a cold state. Also, some users complain that the resulting prints are difficult to write on, as the wax tends to repel inks from pens, and are difficult to feed through automatic document feeders, but these traits have been significantly reduced in later models. In addition, this type of printer is only available from one manufacturer, Xerox, manufactured as part of their Xerox Phaser office printer line. Previously, solid ink printers were manufactured by Tektronix, but Tek sold the printing business to Xerox in 2001. Dye-sublimation printers Main article: Dye-sublimation printer A dye-sublimation printer (or dye-sub printer) is a printer which employs a printing process that uses heat to transfer dye to a medium such as a plastic card, paper or canvas. The process is usually to lay one colour at a time using a ribbon that has colour panels. Dye-sub printers are intended primarily for high-quality colour applications, including colour photography; and are less well-suited for text. While once the province of high-end print shops, dye-sublimation printers are now increasingly used as dedicated consumer photo printers. Inkless printers Thermal printers Main article: Thermal printer Thermal printers work by selectively heating regions of special heat-sensitive paper. Monochrome thermal printers are used in cash registers, ATMs, gasoline dispensers and some older inexpensive fax machines. Colours can be achieved with special papers and different temperatures and heating rates for different colours; these coloured sheets are not required in black-and-white output. One example is the ZINK technology. UV printers Xerox is working on an inkless printer which will use a special reusable paper coated with a few micrometres of UV light sensitive chemicals. The printer will use a special UV light bar which will be able to write and erase the paper. As of early 2007 this technology is still in development and the text on the printed pages can only last between 16–24 hours before fading. Obsolete and special-purpose printing technologies Epson MX-80, a popular model in use for many years The following technologies are either obsolete, or limited to special applications though most were, at one time, in widespread use. Impact printers rely on a forcible impact to transfer ink to the media, similar to the action of a typewriter. All but the dot matrix printer rely on the use of formed characters, letterforms that represent each of the characters that the printer was capable of printing. In addition, most of these printers were limited to monochrome printing in a single typeface at one time, although bolding and underlining of text could be done by "overstriking", that is, printing two or more impressions in the same character position. Impact printers varieties include, typewriter-derived printers, teletypewriter-derived printers, daisy wheel printers, dot matrix printers and line printers. Dot matrix printers remain in common use in businesses where multi-part forms are printed, such as car rental services. An overview of impact printing [4] contains a detailed description of many of the technologies used. Pen-based plotters were an alternate printing technology once common in engineering and architectural firms. Pen-based plotters rely on contact with the paper, but not impact, per se, and special purpose pens that are mechanically run over the paper to create text and images. Typewriter-derived printers Main articles: Friden Flexowriter and IBM Selectric typewriter Several different computer printers were simply computer-controllable versions of existing electric typewriters. The Friden Flexowriter and IBM Selectric typewriter were the most-common examples. The Flexowriter printed with a conventional typebar mechanism while the Selectric used IBM~s well-known "golf ball" printing mechanism. In either case, the letter form then struck a ribbon which was pressed against the paper, printing one character at a time. The maximum speed of the Selectric printer (the faster of the two) was 15.5 characters per second. Teletypewriter-derived printers Main article: Teleprinter The common teleprinter could easily be interfaced to the computer and became very popular except for those computers manufactured by IBM. Some models used a "typebox" that was positioned, in the X- and Y-axes, by a mechanism and the selected letter form was struck by a hammer. Others used a type cylinder in a similar way as the Selectric typewriters used their type ball. In either case, the letter form then struck a ribbon to print the letterform. Most teleprinters operated at ten characters per second although a few achieved 15 CPS. Daisy wheel printers Main article: Daisy wheel printer Daisy-wheel printers operate in much the same fashion as a typewriter. A hammer strikes a wheel with petals, the "daisy wheel", each petal containing a letter form at its tip. The letter form strikes a ribbon of ink, depositing the ink on the page and thus printing a character. By rotating the daisy wheel, different characters are selected for printing. These printers were also referred to as letter-quality printers because, during their heyday, they could produce text which was as clear and crisp as a typewriter, though they were nowhere near the quality of printing presses. The fastest letter-quality printers printed at 30 characters per second. Dot-matrix printers Main article: Dot matrix printer In the general sense many printers rely on a matrix of pixels, or dots, that together form the larger image. However, the term dot matrix printer is specifically used for impact printers that use a matrix of small pins to create precise dots. The advantage of dot-matrix over other impact printers is that they can produce graphical images in addition to text; however the text is generally of poorer quality than impact printers that use letterforms (type). A Tandy 1000 HX with a Tandy DMP-133 dot-matrix printer. Dot-matrix printers can be broadly divided into two major classes: Ballistic wire printers (discussed in the dot matrix printers article) Stored energy printers Dot matrix printers can either be character-based or line-based (that is, a single horizontal series of pixels across the page), referring to the configuration of the print head. At one time, dot matrix printers were one of the more common types of printers used for general use, such as for home and small office use. Such printers would have either 9 or 24 pins on the print head. 24-pin print heads were able to print at a higher quality. Once the price of inkjet printers dropped to the point where they were competitive with dot matrix printers, dot matrix printers began to fall out of favor for general use. Some dot matrix printers, such as the NEC P6300, can be upgraded to print in colour. This is achieved through the use of a four-colour ribbon mounted on a mechanism (provided in an upgrade kit that replaces the standard black ribbon mechanism after installation) that raises and lowers the ribbons as needed. Colour graphics are generally printed in four passes at standard resolution, thus slowing down printing considerably. As a result, colour graphics can take up to four times longer to print than standard monochrome graphics, or up to 8-16 times as long at high resolution mode. Dot matrix printers are still commonly used in low-cost, low-quality applications like cash registers, or in demanding, very high volume applications like invoice printing. The fact that they use an impact printing method allows them to be used to print multi-part documents using carbonless copy paper, like sales invoices and credit card receipts, whereas other printing methods are unusable with paper of this type. Dot-matrix printers are now (as of 2005) rapidly being superseded even as receipt printers. Line printers Line printers, as the name implies, print an entire line of text at a time. Three principal designs existed. In drum printers, a drum carries the entire character set of the printer repeated in each column that is to be printed. In chain printers, also known as train printers, the character set is arranged multiple times around a chain that travels horizontally past the print line. In either case, to print a line, precisely timed hammers strike against the back of the paper at the exact moment that the correct character to be printed is passing in front of the paper. The paper presses forward against a ribbon which then presses against the character form and the impression of the character form is printed onto the paper. Comb printers, also called line matrix printers, represent the third major design. These printers were a hybrid of dot matrix printing and line printing. In these printers, a comb of hammers printed a portion of a row of pixels at one time, such as every eighth pixel. By shifting the comb back and forth slightly, the entire pixel row could be printed, continuing the example, in just eight cycles. The paper then advanced and the next pixel row was printed. Because far less motion was involved than in a conventional dot matrix printer, these printers were very fast compared to dot matrix printers and were competitive in speed with formed-character line printers while also being able to print dot matrix graphics. Line printers, better known as line matrix printers are widely used in the automotive, logistic and banking world for high speed and barcode printing. They are known as robust and durable printers that have the lowest price per page, label or other item. Printronix and TallyGenicom are among the leading manufacturers today. Line printers were the fastest of all impact printers and were used for bulk printing in large computer centres. They were virtually never used with personal computers and have now been replaced by high-speed laser printers. The legacy of line printers lives on in many computer operating systems, which use the abbreviations "lp", "lpr", or "LPT" to refer to printers. Monochrome, colour and photo printers A monochrome printer can only produce an image consisting of one colour, usually black. A monochrome printer may also be able to produce various tones of that color, such as a grey-scale. A colour printer can produce images of multiple colours. A photo printer is a colour printer that can produce images that mimic the colour range (gamut) and resolution of prints made from photographic film. Many can be used on a standalone basis without a computer, using a memory card or USB connector. The printer manufacturing business Often the razor and blades business model is applied. That is, a company may sell a printer at cost, and make profits on the ink cartridge, paper, or some other replacement part. This has caused legal disputes regarding the right of companies other than the printer manufacturer to sell compatible ink cartridges. To protect their business model, several manufacturers invest heavily in developing new cartridge technology and patenting it. Other manufacturers, in reaction to the challenges from using this business model, choose to make more money on printers and less on the ink, promoting the latter through their advertising campaigns. Finally, this generates two clearly different proposals: "cheap printer – expensive ink" or "expensive printer – cheap ink". Ultimately, the consumer decision depends on their reference interest rate or their time preference. From an Economics viewpoint, there is a clear trade-off between cost per copy and cost of the printer.[6] Printing speed The speed of early printers was measured in units of characters per second. More modern printers are measured in pages per minute. These measures are used primarily as a marketing tool, and are not as well standardised as toner yields. Usually pages per minute refers to sparse monochrome office documents, rather than dense pictures which usually print much more slowly, especially colour images. PPM are most of the time referring to A4 paper in Europe and letter paper in the United States, resulting in a 5-10% difference. Printer steganography An illustration showing small yellow tracking dots on white paper, generated by a color laser printer. Main article: printer steganography Printer steganography is a type of steganography produced by color printers, including Brother, Canon, Dell, Epson, HP, IBM, Konica Minolta, Kyocera, Lanier, Lexmark, Ricoh, Toshiba and Xerox[7] brand color laser printers, where tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps. Monochrome, colour and photo printers A monochrome printer can only produce an image consisting of one colour, usually black. A monochrome printer may also be able to produce various tones of that color, such as a grey-scale. A colour printer can produce images of multiple colours. A photo printer is a colour printer that can produce images that mimic the colour range (gamut) and resolution of prints made from photographic film. Many can be used on a standalone basis without a computer, using a memory card or USB connector. The printer manufacturing business Often the razor and blades business model is applied. That is, a company may sell a printer at cost, and make profits on the ink cartridge, paper, or some other replacement part. This has caused legal disputes regarding the right of companies other than the printer manufacturer to sell compatible ink cartridges. To protect their business model, several manufacturers invest heavily in developing new cartridge technology and patenting it. Other manufacturers, in reaction to the challenges from using this business model, choose to make more money on printers and less on the ink, promoting the latter through their advertising campaigns. Finally, this generates two clearly different proposals: "cheap printer – expensive ink" or "expensive printer – cheap ink". Ultimately, the consumer decision depends on their reference interest rate or their time preference. From an Economics viewpoint, there is a clear trade-off between cost per copy and cost of the printer.[6] Printing speed The speed of early printers was measured in units of characters per second. More modern printers are measured in pages per minute. These measures are used primarily as a marketing tool, and are not as well standardised as toner yields. Usually pages per minute refers to sparse monochrome office documents, rather than dense pictures which usually print much more slowly, especially colour images. PPM are most of the time referring to A4 paper in Europe and letter paper in the United States, resulting in a 5-10% difference. Printer steganography An illustration showing small yellow tracking dots on white paper, generated by a color laser printer. Main article: printer steganography Printer steganography is a type of steganography produced by color printers, including Brother, Canon, Dell, Epson, HP, IBM, Konica Minolta, Kyocera, Lanier, Lexmark, Ricoh, Toshiba and Xerox[7] brand color laser printers, where tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps. Laser printer From Wikipedia, the free encyclopedia HP LaserJet 4200 series printer, installed atop high-capacity paper feeder Part of the series on the History of printing Woodblock printing 200 Movable type 1040 Printing press 1454 Etching ca. 1500 Mezzotint 1642 Aquatint 1768 Lithography 1796 Chromolithography 1837 Rotary press 1843 Offset printing 1875 Hectograph 19th century Hot metal typesetting 1886 Mimeograph 1890 Screen printing 1907 Spirit duplicator 1923 Dye-sublimation 1957 Phototypesetting 1960s Dot matrix printer 1964 Laser printing 1969 Thermal printing ca. 1972 Inkjet printing 1976 Stereolithography 1986 Digital press 1993 3D printing ca. 2003 This box: view · talk · edit A laser printer is a common type of computer printer that rapidly produces high quality text and graphics on plain paper. As with digital photocopiers and multifunction printers (MFPs), laser printers employ a xerographic printing process, but differ from analog photocopiers in that the image is produced by the direct scanning of a laser beam across the printer~s photoreceptor.

 

mustafahussain   (XII)

 

Red Rose Berasia Road


Rakhi  

Posted Date : 8/10/2011


Feel the spirit of Raksha Bandhan festival with these beautiful essays on Rakhi contributed by our visitors! You may also exhibit love for your sibling by sending your reflections on Raksha Bandhan festival or a short paragraph on Rakhi. Your Raksha Bandhan essay will be posted on this website with due acknowledgment to you. Rakhi is a sacred thread embellished with sister~s love and affection for her brother. On the day of Raksha Bandhan, sisters tie rakhi on the wrists of their brothers and express their love to them. After receiving the rakhi from a sister, a brother sincerely takes the responsibility of protecting her sister. In Indian tradition, the frangible thread of rakhi is considered even stronger than an iron chain as it strongly binds a brothers and a sisters in the circumference of mutual love and trust. Any Indian festival seems to be incomplete without the traditional Indian festivities, such as gathering, celebrations, exchange of sweets and gifts, lots of noise, singing and dancing. Festivals are the celebration of togetherness as being as a united family and the festival "Raksha Bandhan" is not an exception of this. The love and self actuation towards a novel cause between a brother and his sister is the theme of this great festivals. It is a festival that is mainly celebrated by the people of Northern and Western part of India, but people from other parts also celebrate this festival with same alacrity. Although, the mode of celebration may differ from region to region, but the central theme of this great festival remain same. As far as the traditions and rituals are concerned, sisters prepare the "pooja thali" with diyas, roli, chawal and rakhis. They worship the goddesses, ties rakhis on the wrists of their brother(s), and wishes for their well being. On the other hand, the brothers acknowledge their love with a promise that they will remain by their sisters~ side and protect them from every fall and down throughout the life. Brothers also give token gifts to their sisters. From ancient period of time, this festivals has been celebrated in the same manner and tradition. As the lifestyle of people has been changing with passing time, therefore, today, this festival is being celebrated elaborately. This day fosters a undying and divine relationship among the siblings. Far off physical location may sometime bring an abstract feeling among the siblings, and this auspicious day provides a link to bring them together. The joyous meeting, the rare family get- together, the erstwhile feeling of brotherhood and sisterhood call for a massive celebration. The sisters tie a sacred thread of love to their brothers amongst chanting of mantras, put roli and rice on their forehead and pray for their well being. Sisters bestow their brothers with gifts and blessings. Brother also wish them a good life and pledge to take care of them. Brothers give their sisters return gifts. The gift is the acknowledgment of his love for his sister, reminder of their togetherness and a symbol of his pledge. There are several historical evidences, which remind us about the significance of this festival and every time, this festival emphasizes the same values which have been mingled along with the festival. Well that is a kind of an end to the rituals but the celebrations begin after that. For the parents, Raksha bandhan festival is a mean of family reunion. Tasty dishes, wonderful sweets etc, are cooked on this day. Family members exchange gifts with other well wishers and relatives and share their individual experiences of life with one another. For those who are unable to visit one another, rakhi cards, e-rakhis and rakhis through mails become the modes of their communication and sharing of their love. Hand made rakhis and self-made rakhi cards are just a representation of the personal feelings of the siblings. The trivia of Raksha Bandhan is to bring people together just like the true spirit of all other Indian festivals. This is all about RAKSHA BANDHAN..

 

Prateek Parihar   (VII)

 Red Rose Trilanga

Holi Essay 

Posted Date :  8/10/2011

Holi Essay Colours, gujiyas and fun...I love Holi so much Holi happens to be my favourite festival. I particularly enjoy the colour part of it. I keep stocks of every colour but red happens to be my favourite. The other ones specially, the purple is one I hate to use on Holi. It never goes and makes one look so bad. I also enjoy preparing gujiyas with my mother and sisters. My mother keep frying them in the pan, while we sisters do the rolling, cutting and filling part of it. My favourite job is to do the filling which gives me a chance to keep stealing the tasty khoya which is full of dry fruits. Eating the gujiyas - piping hot just as they come out of pan is the other most cherished moment of the festival. I also take care to keep my preparation for the festival ready. Like choose some old and faded jeans and a shirt I am bored off besides taking care of the oiling and creaming part of it. Otherwise, the aftermath of the Holi festival could be extremely tiresome. I have also had a bad experience after Holi once when I got so much engrossed in playing with the colour that I became to late to get a bath and the water tank got exhausted. I had to wait for hours drenched in the water before the water supply was restored. It was a very painful lesson that I learnt - take a bath on time. I particularly enjoy the festival in the company of friends and relatives, i.e. when there are lot of people to be coloured. The excitement is unmatched when everybody loves the festival as much as you do. - Mitali Mishra A memorable Holi Send Holi EssayOh what fun we had on the Holi that year. The tradition followed was digging the lawn generating some mud, throwing some buckets of water and then the prey. So, it was a very earthy kind of Holi that we played that year in the hostel. The good part was that the prey was asked get the buckets herself. Then everybody decided that we have grown up enough to have our first doze of bhang. A thandai was prepared, somebody had stored a little milk from the morning breakfast. There was one very enthusiastic girl who sneaked in the maximum share. High on the spirit of the festival we had the mandatory dance on the Rang Barse bheege chunar wali.... Meanwhile, one who stole maximum share, sat under the sun and started waiting for the bhang to give her some kick. She kept cribbing for about half an hour..nothing is happening..nothing is happening... After some time she suddenly started laughing and did not stopped even after repeated attempts to stop her from doing so. Her body started aching but she could not control her laughter. Then all of a sudden she started crying and then again could not stop... She got the kind of high she never expected. Although I can~t remember her name, I can~t forget what fun we had at her expense. I owe a big thank you to her for making that Holi so memorable in my life. Prateek parihar

 

Prateek Parihar   (VII)

Red Rose Trilanga


INDEPENDENCE DAY 

Posted Date : 8/9/2011

India~s Independence Day is celebrated on August 15 to commemorate its independence from British rule and its birth as a sovereign nation on that day in 1947. The day is a national holiday in India. All over the country, flag-hoisting ceremonies are conducted by the local administration in attendance. The main event takes place in New Delhi, where the Prime Minister hoists the National Flag at the Red Fort and delivers a nationally televised speech from its ramparts. In his speech, he highlights the achievements of his government during the past year, raises important issues and gives a call for further development. The Prime Minister also pays his tribute to leaders of the freedom struggle. A colourful pageant showcasing India’s cultural diversity, symbolic depictions of the country’s advances in science and technology, and a joint display of India’s military capabilities by the armed forces are an essential part of the Independence Day celebrations. MANAS GUPTA

 

manas gupta   (X)

Red Rose Trilanga


FAMOUS SCIENTIST 

Posted Date :  8/9/2011

FAMOUS SCIENTIST (Jagdish chandra bose ) India has produced qreatmen from time to time sir jagdish chandra bose was a jewel of India . HE was famous scientist of INDIA . He was nobel prize for his discover in botony . An INDIAN was honoured for the proved plants have life . they multiply & die like men. He invented an instrument to measure heart beat of plants . IT was called crescograph . The plant , like man ,have feeling of joy & grief. He is respected in the field of science . Reema nandanwar Class = 8th

 

REEMA NANDANWAR   (VIII)

Red Rose Trilanga


OUR SCHOOL 

Posted Date : 8/9/2011

We all love going to school . It is like our second home . At home all the elders teach us good things and at school ,our teacher do the some .All of them want us to become good human being .

 

deepali   (V)

Red Rose Trilanga


INDEPENDENCE Day (BY Sudhanshu Bairag of 8th of Red Rose School ,Trilanga)

Posted Date : 8/8/2011


On 1947 India became a democratic independence.It celebrate held on 15th august.On every 15th August India celebrate the independence day.In this day our prime minister rosting the flag.Every state police force take part in them.The rastrapati bhavan is decorative with lights and flowers.In every school distribute the chocolates and samosas.Children take flag in their hands and rosted it.

 

Karan Bitode   (VIII)

Red Rose Trilanga

indian festivals 

Posted Date :  8/8/2011

India is a vast country with various castes, creed, and colour hence a large number of festivals are celebrated in India in honour of their gods and goddesses. Since many communities exist here; the ways and method of celebrating these festivals also differ from state to state. But, the basic form of the belief behind their origin, the traditions and the excitement of celebrations is still the same for years. However, since India has a majority of Hindus, there is a preponderance of Hindu festivals. Cities or states are famous for the celebration of particular festivals e.g. Kolkatta (West Bengal) for Durga Puja, Mathura (Uttar Pradesh) for Holi and Janmashtami, Maharashtra for Ganesh Chaturthi, Kerala for Onam. Similarly, Muslim festivals of Id-ul-Zuha and Muharram are famous in Muslim community, Parsi festival of Jamshed Nav Roz in Bombay, Christian festivals in Goa and the Kaza festival in the Lamaistic strongholds of Ladakh, Lahaul and Spiti and Sikkim. In some tribal areas, the cult of Mother Goddess is more prevalent. However, the celebrations dissolve ethnic limitations and all religious groups merge into one, during such festivals. Epigraphically evidences prove that festivals have been celebrated in India since Vedic times. The Aryans conquered India around 1500 B.C, and cultural integration with the local population took place. As time passed, some of their own gods lost importance and festivals in their honour died out. Later, certain pre-Aryan aspects of worship began to dominate. At the same time, the tribal people who had their own cults and worshipped serpents and other such entities and natural elements, came under the influence of the Hindus and started worshipping the Hindu deities.

 

raman lovanshi   (VIII)

Red Rose Trilanga

History of education 

Posted Date :  8/8/2011 


The concept of grouping students together in a centralized location for learning has existed since Classical antiquity. Formal schools have existed at least since ancient Greece (see Academy), ancient Rome (see Education in Ancient Rome) ancient India (see Gurukul), and ancient China (see History of education in China). The Byzantine Empire had an established schooling system beginning at the primary level. According to Traditions and Encounters, the founding of the primary education system began in 425 A.D. and "... military personnel usually had at least a primary education ...". The sometimes efficient and often large government of the Empire meant that educated citizens were a must. Although Byzantium lost much of the grandeur of Roman culture and extravagance in the process of surviving, the Empire emphasized efficiency in its war manuals. The Byzantine education system continued until the empire~s collapse in 1453 AD.[1] Islam was another culture that developed a school system in the modern sense of the word. Emphasis was put on knowledge, which required a systematic way of teaching and spreading knowledge, and purpose-built structures. At first, mosques combined both religious performance and learning activities, but by the ninth century, the Madrassa was introduced, a proper school that was built independently from the mosque. They were also the first to make the Madrassa system a public domain under the control of the Caliph. The Nizamiyya madrasa is considered by consensus of scholars to be the earliest surviving school, built towards 1066 CE by Emir Nizam Al-Mulk.[citation needed] Under the Ottomans, the towns of Bursa and Edirne became the main centers of learning. The Ottoman system of Külliye, a building complex containing a mosque, a hospital, madrassa, and public kitchen and dining areas, revolutionized the education system, making learning accessible to a wider public through its free meals, health care and sometimes free accommodation. The nineteenth century historian, Scott holds that a remarkable correspondence exists between the procedure established by those institutions and the methods of the present day. They had their collegiate courses, their prizes for proficiency in scholarship, their oratorical and poetical contests, their commencements and their degrees. In the department of medicine, a severe and prolonged examination, conducted by the most eminent physicians of the capital, was exacted of all candidates desirous of practicing their profession, and such as were unable to stand the test were formally pronounced incompetent.[citation needed] In Europe during the Middle Ages and much of the Early Modern period, the main purpose of schools (as opposed to universities) was to teach the Latin language. This led to the term grammar school, which in the United States informally refers to a primary school, but in the United Kingdom means a school that selects entrants based on ability or aptitude. Following this, the school curriculum has gradually broadened to include literacy in the vernacular language as well as technical, artistic, scientific and practical subjects. Many of the earlier public schools in the United States were one-room schools where a single teacher taught seven grades of boys and girls in the same classroom. Beginning in the 1920s, one-room schools were consolidated into multiple classroom facilities with transportation increasingly provided by kid hacks and school buses.

 

raman lovanshi   (VIII)

Red Rose Trilanga

This article is about institutions for learning 

Posted Date : 8/8/2011

A school is an institution designed for the teaching of students under the direction of teachers. Most countries have systems of formal education, which is commonly compulsory. In these systems, students progress through a series of schools. The names for these schools vary by country (discussed in the Regional section below), but generally include primary school for young children and secondary school for teenagers who have completed primary education. An institution where higher education is taught, is commonly called a university college or university. In addition to these core schools, students in a given country may also attend schools before and after primary and secondary education. Kindergarten or pre-school provide some schooling to very young children (typically ages 3–5). University, vocational school, college or seminary may be available after secondary school. A school may also be dedicated to one particular field, such as a school of economics or a school of dance. Alternative schools may provide nontraditional curriculum and methods. There are also non-government schools, called private schools. Private schools may be for children with special needs when the government does not supply for them; religious, such as Christian schools, hawzas, yeshivas, and others; or schools that have a higher standard of education or seek to foster other personal achievements. Schools for adults include institutions of corporate training, Military education and training and business schools. In homeschooling and online schools, teaching and learning take place outside of a traditional school building.

 

raman lovanshi   (VIII)

Red Rose Trilanga


HAPPY INDIPENDANCE DAY 

Posted Date : 8/7/2011

15th of August 1947 is an important day for all Indians. On that day Indians got freedom from the British. The Union Jack was brought down and for the first time, our National Flag, flew over the Red Fort, Delhi. Achieving independence was not easy. It was achieved by great efforts made by leaders like Mahatma Gandhi, Jawaharlal Nehru, Sardar Vallabhai Patel, Subhas Chandra Bose, Moulana Abdul Kalam Azad, Tanguturi Prakasam, C. Rajagopalachari and many others. Many youngmen like Bhagat Singh, Chandrasekhar Azad, Alluri Seetharama Raju and Katta Bomman scarified their lives for the cause of freedom. It was an occasion of jubilation for the entire nation. On 15th of August, 1947 people throughout the country celebrated the day in a festive fervor. Throughout the country, houses, offices, streets, temples and all important places were decorated and illuminated. Patriotic songs were on the air throughout the day. Young and old danced in the streets, enjoying the newly won freedom. Sweets were distributed everywhere. We were no longer British subjects but we became free citizens of free India. Since then, the Independence Day is celebrated every year on 15th August throughout the country. That day is a national holiday for all including workers in shops and factories. Independence Day celebrations are conducted on a set pattern every year. The main function is held at the Red Fort, New Delhi. The Prime Minister takes the ceremonial salute and guard of honour from the three wings of the defence forces. After that he unfurls the National Flag on the ramparts of the Red Fort. National Anthem is sung, and a 21 gun-salute is given. The Prime Minister addresses the nation. Earlier he pays homage to martyrs at various places like ~Unknown Soldier~, Rajghat etc. In his address, he explains the policies of the government, what it did and what it proposes to do and wishes all peoples a happy Independence Day. Similar functions are held at State capitals of every State, where the Chief Minister unfurls the National Flag and the National Anthem is sung. Then the Chief Minister inspects a police parade and addresses a public meeting. At the headquarters of the districts, the district collector unfurls the National Flag, takes the police salute and addresses the gathering. Unfurling the National Flag, singing of National Anthem and addressing the audience take place in schools, colleges, offices and at all other establishments. Special cultural programmes are arranged for the occasion. ~Kavi Sammelanams~ and ~Mushairas~ are also organised. In the evening there is a get together at Rashtrapathi Nilayam and at Governors residences to meet the distinguished and eminent persons. Greetings are exchanged on that occasion. Independence Day is celebrated by Indian embassies all over the world and greetings are exchanged. Heads of Governments of other countries greet the President, Prime Minister and the people of India on that occasion. It is a happy occasion for school children. Sports and cultural competitions are conducted to mark the occasion and prizes are awarded to the winners. Sweets are distributed to all. ~Freedom is our birthright~ said Bala Gangadhar Tilak, the great freedom fighter. They got us the freedom. It is for us to safeguard it by our unity and integrity. It is a day to pay homage to martyrs and stand by the ideals, for which i hey sacrificed their lives.(FROM HEMANT PATEL & MANAS GUPTA

 

manas gupta   (X)

Red Rose Trilanga


India  

Posted Date : 8/7/2011

जहाँ हर चीज है प्यारी सभी चाहत के पुजारी प्यारी जिसकी ज़बां वही है मेरा हिन्दुस्तां जहाँ ग़ालिब की ग़ज़ल है वो प्यारा ताज महल है प्यार का एक निशां वही है मेरा हिन्दुस्तां जहाँ फूलों का बिस्तर है जहाँ अम्बर की चादर है नजर तक फैला सागर है सुहाना हर इक मंजर है वो झरने और हवाएँ, सभी मिल जुल कर गायें प्यार का गीत जहां वही है मेरा हिन्दुस्तां जहां सूरज की थाली है जहां चंदा की प्याली है फिजा भी क्या दिलवाली है कभी होली तो दिवाली है वो बिंदिया चुनरी पायल वो साडी मेहंदी काजल रंगीला है समां वही है मेरा हिन्दुस्तां कही पे नदियाँ बलखाएं कहीं पे पंछी इतरायें बसंती झूले लहराएं जहां अन्गिन्त हैं भाषाएं सुबह जैसे ही चमकी बजी मंदिर में घंटी और मस्जिद में अजां वही है मेरा हिन्दुस्तां कहीं गलियों में भंगड़ा है कही ठेले में रगडा है हजारों किस्में आमों की ये चौसा तो वो लंगडा है लो फिर स्वतंत्र दिवस आया तिरंगा सबने लहराया लेकर फिरे यहाँ-वहां वहीँ है मेरा हिन्दुस्तां :D

 

manas gupta   (X)

Red Rose Trilanga


Morning Prayer 

Posted Date :  8/6/2011

Morning Prayer

 

Karan Bitode   (VIII)

Red Rose Trilanga


Computer data storage 

Posted Date : 8/5/2011

Computer data storage This article needs additional citations for verification. Please help improve this article by adding reliable references. Unsourced material may be challenged and removed. (June 2011) 1 GB of SDRAM mounted in a personal computer. An example of primary storage. 40 GB PATA hard disk drive (HDD); when connected to a computer it serves as secondary storage. 160 GB SDLT tape cartridge, an example of off-line storage. When used within a robotic tape library, it is classified as tertiary storage instead. Computer data storage, often called storage or memory, refers to computer components and recording media that retain digital data. Data storage is one of the core functions and fundamental components of computers. In contemporary usage, memory usually refers to semiconductor storage random-access memory, typically DRAM (Dynamic-RAM). Memory can refer to other forms of fast but temporary storage. Storage refers to storage devices and their media not directly accessible by the CPU, (secondary or tertiary storage) — typically hard disk drives, optical disc drives, and other devices slower than RAM but more permanent.[1] Historically, memory has been called main memory, real storage or internal memory while storage devices have been referred to as secondary storage, external memory or auxiliary/peripheral storage. The distinctions are fundamental to the architecture of computers. The distinctions also reflect an important and significant technical difference between memory and mass storage devices, which has been blurred by the historical usage of the term storage. Nevertheless, this article uses the traditional nomenclature. Many different forms of storage, based on various natural phenomena, have been invented. So far, no practical universal storage medium exists, and all forms of storage have some drawbacks. Therefore a computer system usually contains several kinds of storage, each with an individual purpose. A digital computer represents data using the binary numeral system. Text, numbers, pictures, audio, and nearly any other form of information can be converted into a string of bits, or binary digits, each of which has a value of 1 or 0. The most common unit of storage is the byte, equal to 8 bits. A piece of information can be handled by any computer whose storage space is large enough to accommodate the binary representation of the piece of information, or simply data. For example, using eight million bits, or about one megabyte, a typical computer could store a short novel. Traditionally the most important part of every computer is the central processing unit (CPU, or simply a processor), because it actually operates on data, performs any calculations, and controls all the other components. The CPU consists of two (2) main parts: Control Unit and Arithmetic Logic Unit (ALU). The former controls the flow of data between the CPU and memory whilst the latter is used for performing arithmetic and logical operations on data. Without a significant amount of memory, a computer would merely be able to perform fixed operations and immediately output the result. It would have to be reconfigured to change its behavior. This is acceptable for devices such as desk calculators or simple digital signal processors. Von Neumann machines differ in having a memory in which they store their operating instructions and data. Such computers are more versatile in that they do not need to have their hardware reconfigured for each new program, but can simply be reprogrammed with new in-memory instructions; they also tend to be simpler to design, in that a relatively simple processor may keep state between successive computations to build up complex procedural results. Most modern computers are von Neumann machines. In practice, almost all computers use a variety of memory types, organized in a storage hierarchy around the CPU, as a trade-off between performance and cost. Generally, the lower a storage is in the hierarchy, the lesser its bandwidth and the greater its access latency is from the CPU. This traditional division of storage to primary, secondary, tertiary and off-line storage is also guided by cost per bit. Primary storage Direct links to this section: Primary storage, Main memory, Internal Memory. Primary storage (or main memory or internal memory), often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required. Any data actively operated on is also stored there in uniform manner. Historically, early computers used delay lines, Williams tubes, or rotating magnetic drums as primary storage. By 1954, those unreliable methods were mostly replaced by magnetic core memory. Core memory remained dominant until the 1970s, when advances in integrated circuit technology allowed semiconductor memory to become economically competitive. This led to modern random-access memory (RAM). It is small-sized, light, but quite expensive at the same time. (The particular types of RAM used for primary storage are also volatile, i.e. they lose the information when not powered). As shown in the diagram, traditionally there are two more sub-layers of the primary storage, besides main large-capacity RAM: Processor registers are located inside the processor. Each register typically holds a word of data (often 32 or 64 bits). CPU instructions instruct the arithmetic and logic unit to perform various calculations or other operations on this data (or with the help of it). Registers are the fastest of all forms of computer data storage. Processor cache is an intermediate stage between ultra-fast registers and much slower main memory. It~s introduced solely to increase performance of the computer. Most actively used information in the main memory is just duplicated in the cache memory, which is faster, but of much lesser capacity. On the other hand it is much slower, but much larger than processor registers. Multi-level hierarchical cache setup is also commonly used—primary cache being smallest, fastest and located inside the processor; secondary cache being somewhat larger and slower. Main memory is directly or indirectly connected to the central processing unit via a memory bus. It is actually two buses (not on the diagram): an address bus and a data bus. The CPU firstly sends a number through an address bus, a number called memory address, that indicates the desired location of data. Then it reads or writes the data itself using the data bus. Additionally, a memory management unit (MMU) is a small device between CPU and RAM recalculating the actual memory address, for example to provide an abstraction of virtual memory or other tasks. As the RAM types used for primary storage are volatile (cleared at start up), a computer containing only such storage would not have a source to read instructions from, in order to start the computer. Hence, non-volatile primary storage containing a small startup program (BIOS) is used to bootstrap the computer, that is, to read a larger program from non-volatile secondary storage to RAM and start to execute it. A non-volatile technology used for this purpose is called ROM, for read-only memory (the terminology may be somewhat confusing as most ROM types are also capable of random access). Many types of "ROM" are not literally read only, as updates are possible; however it is slow and memory must be erased in large portions before it can be re-written. Some embedded systems run programs directly from ROM (or similar), because such programs are rarely changed. Standard computers do not store non-rudimentary programs in ROM, rather use large capacities of secondary storage, which is non-volatile as well, and not as costly. Recently, primary storage and secondary storage in some uses refer to what was historically called, respectively, secondary storage and tertiary storage.[2] [edit]Secondary storage A hard disk drive with protective cover removed. Secondary storage (also known as external memory or auxiliary storage), differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage. Secondary storage does not lose the data when the device is powered down—it is non-volatile. Per unit, it is typically also two orders of magnitude less expensive than primary storage. Consequently, modern computer systems typically have two orders of magnitude more secondary storage than primary storage and data is kept for a longer time there. In modern computers, hard disk drives are usually used as secondary storage. The time taken to access a given byte of information stored on a hard disk is typically a few thousandths of a second, or milliseconds. By contrast, the time taken to access a given byte of information stored in random access memory is measured in billionths of a second, or nanoseconds. This illustrates the significant access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically about a million times slower than memory. Rotating optical storage devices, such as CD and DVD drives, have even longer access times. With disk drives, once the disk read/write head reaches the proper placement and the data of interest rotates under it, subsequent data on the track are very fast to access. As a result, in order to hide the initial seek time and rotational latency, data is transferred to and from disks in large contiguous blocks. When data reside on disk, block access to hide latency offers a ray of hope in designing efficient external memory algorithms. Sequential or block access on disks is orders of magnitude faster than random access, and many sophisticated paradigms have been developed to design efficient algorithms based upon sequential and block access . Another way to reduce the I/O bottleneck is to use multiple disks in parallel in order to increase the bandwidth between primary and secondary memory.[3] Some other examples of secondary storage technologies are: flash memory (e.g. USB flash drives or keys), floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives. The secondary storage is often formatted according to a file system format, which provides the abstraction necessary to organize data into files and directories, providing also additional information (called metadata) describing the owner of a certain file, the access time, the access permissions, and other information. Most computer operating systems use the concept of virtual memory, allowing utilization of more primary storage capacity than is physically available in the system. As the primary memory fills up, the system moves the least-used chunks (pages) to secondary storage devices (to a swap file or page file), retrieving them later when they are needed. As more of these retrievals from slower secondary storage are necessary, the more the overall system performance is degraded. [edit]Tertiary storage Large tape library. Tape cartridges placed on shelves in the front, robotic arm moving in the back. Visible height of the library is about 180 cm. Tertiary storage or tertiary memory,[4] provides a third level of storage. Typically it involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system~s demands; this data is often copied to secondary storage before use. It is primarily used for archiving rarely accessed information since it is much slower than secondary storage (e.g. 5–60 seconds vs. 1–10 milliseconds). This is primarily useful for extraordinarily large data stores, accessed without human operators. Typical examples include tape libraries and optical jukeboxes. When a computer needs to read information from the tertiary storage, it will first consult a catalog database to determine which tape or disc contains the information. Next, the computer will instruct a robotic arm to fetch the medium and place it in a drive. When the computer has finished reading the information, the robotic arm will return the medium to its place in the library. Characteristics of storage A 1GB DDR RAM module (detail) Storage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressibility. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance. [edit]Volatility Non-volatile memory Will retain the stored information even if it is not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory Requires constant power to maintain the stored information. The fastest memory technologies of today are volatile ones (not a universal rule). Since primary storage is required to be very fast, it predominantly uses volatile memory. Dynamic random-access memory A form of volatile memory which also requires the stored information to be periodically re-read and re-written, or refreshed, otherwise it would vanish. Static random-access memory A form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied. (It loses its content if power is removed). [edit]Mutability Read/write storage or mutable storage Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage. Read only storage Retains the information stored at the time of manufacture, and write once storage (Write Once Read Many) allows the information to be written only once at some point after manufacture. These are called immutable storage. Immutable storage is used for tertiary and off-line storage. Examples include CD-ROM and CD-R. Slow write, fast read storage Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and flash memory. [edit]Accessibility Random access Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Sequential access The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage. [edit]Addressability Location-addressable Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans. File addressable Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems. Content-addressable Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer~s CPU cache. [edit]Capacity Raw capacity The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes). Memory storage density The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch). [edit]Performance Latency The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency, and in case of sequential access storage, minimum, maximum and average latency. Throughput The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second or MB/s, though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput. [edit]Energy use Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption 90 percent.[6] 2.5 inch hard disk drives often consume less power than larger ones.[7][8] Low capacity solid-state drives have no moving parts and consume less power than hard disks.[9][10][11] Also, memory may use more power than hard disks.[11] [edit]Fundamental storage technologies As of 2011, the most commonly used data storage technologies are semiconductor, magnetic, and optical, while paper still sees some limited usage. Media is a common name for what actually holds the data in the storage device. Some other fundamental storage technologies have also been used in the past or are proposed for development. [edit]Semiconductor Semiconductor memory uses semiconductor-based integrated circuits to store information. A semiconductor memory chip may contain millions of tiny transistors or capacitors. Both volatile and non-volatile forms of semiconductor memory exist. In modern computers, primary storage almost exclusively consists of dynamic volatile semiconductor memory or dynamic random access memory. Since the turn of the century, a type of non-volatile semiconductor memory known as flash memory has steadily gained share as off-line storage for home computers. Non-volatile semiconductor memory is also used for secondary storage in various advanced electronic devices and specialized computers. As early as 2006, notebook and desktop computer manufacturers started using flash-based solid-state drives (SSDs) as default configuration options for the secondary storage either in addition to or instead of the more traditional HDD.[12][13][14][15][16] [edit]Magnetic [show]v · d · eMagnetic storage media Magnetic storage uses different patterns of magnetization on a magnetically coated surface to store information. Magnetic storage is non-volatile. The information is accessed using one or more read/write heads which may contain one or more recording transducers. A read/write head only covers a part of the surface so that the head or medium or both must be moved relative to another in order to access data. In modern computers, magnetic storage will take these forms: Magnetic disk Floppy disk, used for off-line storage Hard disk drive, used for secondary storage Magnetic tape data storage, used for tertiary and off-line storage In early computers, magnetic storage was also used for primary storage in a form of magnetic drum, or core memory, core rope memory, thin-film memory, twistor memory or bubble memory. Also unlike today, magnetic tape was often used for secondary storage. [edit]Optical [show]v · d · eOptical storage media Optical storage, the typical optical disc, stores information in deformities on the surface of a circular disc and reads this information by illuminating the surface with a laser diode and observing the reflection. Optical disc storage is non-volatile. The deformities may be permanent (read only media ), formed once (write once media) or reversible (recordable or read/write media). The following forms are currently in common use:[17] CD, CD-ROM, DVD, BD-ROM: Read only storage, used for mass distribution of digital information (music, video, computer programs) CD-R, DVD-R, DVD+R, BD-R: Write once storage, used for tertiary and off-line storage CD-RW, DVD-RW, DVD+RW, DVD-RAM, BD-RE: Slow write, fast read storage, used for tertiary and off-line storage Ultra Density Optical or UDO is similar in capacity to BD-R or BD-RE and is slow write, fast read storage used for tertiary and off-line storage. Magneto-optical disc storage is optical disc storage where the magnetic state on a ferromagnetic surface stores information. The information is read optically and written by combining magnetic and optical methods. Magneto-optical disc storage is non-volatile, sequential access, slow write, fast read storage used for tertiary and off-line storage. 3D optical data storage has also been proposed. [edit]Paper [show]v · d · ePaper data storage media Paper data storage, typically in the form of paper tape or punched cards, has long been used to store information for automatic processing, particularly before general-purpose computers existed. Information was recorded by punching holes into the paper or cardboard medium and was read mechanically (or later optically) to determine whether a particular location on the medium was solid or contained a hole. A few technologies allow people to make marks on paper that are easily read by machine—these are widely used for tabulating votes and grading standardized tests. Barcodes made it possible for any object that was to be sold or transported to have some computer readable information securely attached to it. [edit]Uncommon Vacuum tube memory A Williams tube used a cathode ray tube, and a Selectron tube used a large vacuum tube to store information. These primary storage devices were short-lived in the market, since Williams tube was unreliable and Selectron tube was expensive. Electro-acoustic memory Delay line memory used sound waves in a substance such as mercury to store information. Delay line memory was dynamic volatile, cycle sequential read/write storage, and was used for primary storage. Optical tape is a medium for optical storage generally consisting of a long and narrow strip of plastic onto which patterns can be written and from which the patterns can be read back. It shares some technologies with cinema film stock and optical discs, but is compatible with neither. The motivation behind developing this technology was the possibility of far greater storage capacities than either magnetic tape or optical discs. Phase-change memory uses different mechanical phases of Phase Change Material to store information in an X-Y addressable matrix, and reads the information by observing the varying electrical resistance of the material. Phase-change memory would be non-volatile, random access read/write storage, and might be used for primary, secondary and off-line storage. Most rewritable and many write once optical disks already use phase change material to store information. Holographic data storage stores information optically inside crystals or photopolymers. Holographic storage can utilize the whole volume of the storage medium, unlike optical disc storage which is limited to a small number of surface layers. Holographic storage would be non-volatile, sequential access, and either write once or read/write storage. It might be used for secondary and off-line storage. See Holographic Versatile Disc (HVD). Molecular memory stores information in polymer that can store electric charge. Molecular memory might be especially suited for primary storage. The theoretical storage capacity of molecular memory is 10 terabits per square inch.[18] [edit]

 

mustafahussain   (XII)

Red Rose Berasia Road


storage devices 

Posted Date : 8/2/2011

Computer data storage, often called storage or memory, refers to computer components and recording media that retain digital data. Data storage is one of the core functions and fundamental components of computers. In contemporary usage, memory usually refers to semiconductor storage random-access memory, typically DRAM (Dynamic-RAM). Memory can refer to other forms of fast but temporary storage. Storage refers to storage devices and their media not directly accessible by the CPU, (secondary or tertiary storage) — typically hard disk drives, optical disc drives, and other devices slower than RAM but more permanent.[1] Historically, memory has been called main memory, real storage or internal memory while storage devices have been referred to as secondary storage, external memory or auxiliary/peripheral storage. The distinctions are fundamental to the architecture of computers. The distinctions also reflect an important and significant technical difference between memory and mass storage devices, which has been blurred by the historical usage of the term storage. Nevertheless, this article uses the traditional nomenclature. Many different forms of storage, based on various natural phenomena, have been invented. So far, no practical universal storage medium exists, and all forms of storage have some drawbacks. Therefore a computer system usually contains several kinds of storage, each with an individual purpose. A digital computer represents data using the binary numeral system. Text, numbers, pictures, audio, and nearly any other form of information can be converted into a string of bits, or binary digits, each of which has a value of 1 or 0. The most common unit of storage is the byte, equal to 8 bits. A piece of information can be handled by any computer whose storage space is large enough to accommodate the binary representation of the piece of information, or simply data. For example, using eight million bits, or about one megabyte, a typical computer could store a short novel. Traditionally the most important part of every computer is the central processing unit (CPU, or simply a processor), because it actually operates on data, performs any calculations, and controls all the other components. The CPU consists of two (2) main parts: Control Unit and Arithmetic Logic Unit (ALU). The former controls the flow of data between the CPU and memory whilst the latter is used for performing arithmetic and logical operations on data. Without a significant amount of memory, a computer would merely be able to perform fixed operations and immediately output the result. It would have to be reconfigured to change its behavior. This is acceptable for devices such as desk calculators or simple digital signal processors. Von Neumann machines differ in having a memory in which they store their operating instructions and data. Such computers are more versatile in that they do not need to have their hardware reconfigured for each new program, but can simply be reprogrammed with new in-memory instructions; they also tend to be simpler to design, in that a relatively simple processor may keep state between successive computations to build up complex procedural results. Most modern computers are von Neumann machines. In practice, almost all computers use a variety of memory types, organized in a storage hierarchy around the CPU, as a trade-off between performance and cost. Generally, the lower a storage is in the hierarchy, the lesser its bandwidth and the greater its access latency is from the CPU. This traditional division of storage to primary, secondary, tertiary and off-line storage is also guided by cost per bit. Contents [hide] * 1 Hierarchy of storage o 1.1 Primary storage o 1.2 Secondary storage o 1.3 Tertiary storage o 1.4 Off-line storage * 2 Characteristics of storage o 2.1 Volatility o 2.2 Mutability o 2.3 Accessibility o 2.4 Addressability o 2.5 Capacity o 2.6 Performance o 2.7 Energy use * 3 Fundamental storage technologies o 3.1 Semiconductor o 3.2 Magnetic o 3.3 Optical o 3.4 Paper o 3.5 Uncommon * 4 Related technologies o 4.1 Network connectivity o 4.2 Robotic storage * 5 See also o 5.1 Primary storage topics o 5.2 Secondary, tertiary and off-line storage topics o 5.3 Data storage conferences * 6 References [edit] Hierarchy of storage Various forms of storage, divided according to their distance from the central processing unit. The fundamental components of a general-purpose computer are arithmetic and logic unit, control circuitry, storage space, and input/output devices. Technology and capacity as in common home computers around 2005. [edit] Primary storage Direct links to this section: Primary storage, Main memory, Internal Memory. Primary storage (or main memory or internal memory), often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required. Any data actively operated on is also stored there in uniform manner. Historically, early computers used delay lines, Williams tubes, or rotating magnetic drums as primary storage. By 1954, those unreliable methods were mostly replaced by magnetic core memory. Core memory remained dominant until the 1970s, when advances in integrated circuit technology allowed semiconductor memory to become economically competitive. This led to modern random-access memory (RAM). It is small-sized, light, but quite expensive at the same time. (The particular types of RAM used for primary storage are also volatile, i.e. they lose the information when not powered). As shown in the diagram, traditionally there are two more sub-layers of the primary storage, besides main large-capacity RAM: * Processor registers are located inside the processor. Each register typically holds a word of data (often 32 or 64 bits). CPU instructions instruct the arithmetic and logic unit to perform various calculations or other operations on this data (or with the help of it). Registers are the fastest of all forms of computer data storage. * Processor cache is an intermediate stage between ultra-fast registers and much slower main memory. It~s introduced solely to increase performance of the computer. Most actively used information in the main memory is just duplicated in the cache memory, which is faster, but of much lesser capacity. On the other hand it is much slower, but much larger than processor registers. Multi-level hierarchical cache setup is also commonly used—primary cache being smallest, fastest and located inside the processor; secondary cache being somewhat larger and slower. Main memory is directly or indirectly connected to the central processing unit via a memory bus. It is actually two buses (not on the diagram): an address bus and a data bus. The CPU firstly sends a number through an address bus, a number called memory address, that indicates the desired location of data. Then it reads or writes the data itself using the data bus. Additionally, a memory management unit (MMU) is a small device between CPU and RAM recalculating the actual memory address, for example to provide an abstraction of virtual memory or other tasks. As the RAM types used for primary storage are volatile (cleared at start up), a computer containing only such storage would not have a source to read instructions from, in order to start the computer. Hence, non-volatile primary storage containing a small startup program (BIOS) is used to bootstrap the computer, that is, to read a larger program from non-volatile secondary storage to RAM and start to execute it. A non-volatile technology used for this purpose is called ROM, for read-only memory (the terminology may be somewhat confusing as most ROM types are also capable of random access). Many types of "ROM" are not literally read only, as updates are possible; however it is slow and memory must be erased in large portions before it can be re-written. Some embedded systems run programs directly from ROM (or similar), because such programs are rarely changed. Standard computers do not store non-rudimentary programs in ROM, rather use large capacities of secondary storage, which is non-volatile as well, and not as costly. Recently, primary storage and secondary storage in some uses refer to what was historically called, respectively, secondary storage and tertiary storage.[2] [edit] Secondary storage A hard disk drive with protective cover removed. Secondary storage (also known as external memory or auxiliary storage), differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage. Secondary storage does not lose the data when the device is powered down—it is non-volatile. Per unit, it is typically also two orders of magnitude less expensive than primary storage. Consequently, modern computer systems typically have two orders of magnitude more secondary storage than primary storage and data is kept for a longer time there. In modern computers, hard disk drives are usually used as secondary storage. The time taken to access a given byte of information stored on a hard disk is typically a few thousandths of a second, or milliseconds. By contrast, the time taken to access a given byte of information stored in random access memory is measured in billionths of a second, or nanoseconds. This illustrates the significant access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically about a million times slower than memory. Rotating optical storage devices, such as CD and DVD drives, have even longer access times. With disk drives, once the disk read/write head reaches the proper placement and the data of interest rotates under it, subsequent data on the track are very fast to access. As a result, in order to hide the initial seek time and rotational latency, data is transferred to and from disks in large contiguous blocks. When data reside on disk, block access to hide latency offers a ray of hope in designing efficient external memory algorithms. Sequential or block access on disks is orders of magnitude faster than random access, and many sophisticated paradigms have been developed to design efficient algorithms based upon sequential and block access . Another way to reduce the I/O bottleneck is to use multiple disks in parallel in order to increase the bandwidth between primary and secondary memory.[3] Some other examples of secondary storage technologies are: flash memory (e.g. USB flash drives or keys), floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives. The secondary storage is often formatted according to a file system format, which provides the abstraction necessary to organize data into files and directories, providing also additional information (called metadata) describing the owner of a certain file, the access time, the access permissions, and other information. Most computer operating systems use the concept of virtual memory, allowing utilization of more primary storage capacity than is physically available in the system. As the primary memory fills up, the system moves the least-used chunks (pages) to secondary storage devices (to a swap file or page file), retrieving them later when they are needed. As more of these retrievals from slower secondary storage are necessary, the more the overall system performance is degraded. [edit] Tertiary storage Large tape library. Tape cartridges placed on shelves in the front, robotic arm moving in the back. Visible height of the library is about 180 cm. Tertiary storage or tertiary memory,[4] provides a third level of storage. Typically it involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system~s demands; this data is often copied to secondary storage before use. It is primarily used for archiving rarely accessed information since it is much slower than secondary storage (e.g. 5–60 seconds vs. 1–10 milliseconds). This is primarily useful for extraordinarily large data stores, accessed without human operators. Typical examples include tape libraries and optical jukeboxes. When a computer needs to read information from the tertiary storage, it will first consult a catalog database to determine which tape or disc contains the information. Next, the computer will instruct a robotic arm to fetch the medium and place it in a drive. When the computer has finished reading the information, the robotic arm will return the medium to its place in the library. [edit] Off-line storage Off-line storage is a computer data storage on a medium or a device that is not under the control of a processing unit.[5] The medium is recorded, usually in a secondary or tertiary storage device, and then physically removed or disconnected. It must be inserted or connected by a human operator before a computer can access it again. Unlike tertiary storage, it cannot be accessed without human interaction. Off-line storage is used to transfer information, since the detached medium can be easily physically transported. Additionally, in case a disaster, for example a fire, destroys the original data, a medium in a remote location will probably be unaffected, enabling disaster recovery. Off-line storage increases general information security, since it is physically inaccessible from a computer, and data confidentiality or integrity cannot be affected by computer-based attack techniques. Also, if the information stored for archival purposes is accessed seldom or never, off-line storage is less expensive than tertiary storage. In modern personal computers, most secondary and tertiary storage media are also used for off-line storage. Optical discs and flash memory devices are most popular, and to much lesser extent removable hard disk drives. In enterprise uses, magnetic tape is predominant. Older examples are floppy disks, Zip disks, or punched cards. [edit] Characteristics of storage A 1GB DDR RAM module (detail) Storage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressibility. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance. [edit] Volatility Non-volatile memory Will retain the stored information even if it is not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory Requires constant power to maintain the stored information. The fastest memory technologies of today are volatile ones (not a universal rule). Since primary storage is required to be very fast, it predominantly uses volatile memory. Dynamic random-access memory A form of volatile memory which also requires the stored information to be periodically re-read and re-written, or refreshed, otherwise it would vanish. Static random-access memory A form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied. (It loses its content if power is removed). [edit] Mutability Read/write storage or mutable storage Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage. Read only storage Retains the information stored at the time of manufacture, and write once storage (Write Once Read Many) allows the information to be written only once at some point after manufacture. These are called immutable storage. Immutable storage is used for tertiary and off-line storage. Examples include CD-ROM and CD-R. Slow write, fast read storage Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and flash memory. [edit] Accessibility Random access Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Sequential access The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage. [edit] Addressability Location-addressable Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans. File addressable Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems. Content-addressable Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer~s CPU cache. [edit] Capacity Raw capacity The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes). Memory storage density The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch). [edit] Performance Latency The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency, and in case of sequential access storage, minimum, maximum and average latency. Throughput The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second or MB/s, though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput. [edit] Energy use * Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption 90 percent.[6] * 2.5 inch hard disk drives often consume less power than larger ones.[7][8] Low capacity solid-state drives have no moving parts and consume less power than hard disks.[9][10][11] Also, memory may use more power than hard disks.[11] [edit] Fundamental storage technologies As of 2011[update], the most commonly used data storage technologies are semiconductor, magnetic, and optical, while paper still sees some limited usage. Media is a common name for what actually holds the data in the storage device. Some other fundamental storage technologies have also been used in the past or are proposed for development. [edit] Semiconductor Semiconductor memory uses semiconductor-based integrated circuits to store information. A semiconductor memory chip may contain millions of tiny transistors or capacitors. Both volatile and non-volatile forms of semiconductor memory exist. In modern computers, primary storage almost exclusively consists of dynamic volatile semiconductor memory or dynamic random access memory. Since the turn of the century, a type of non-volatile semiconductor memory known as flash memory has steadily gained share as off-line storage for home computers. Non-volatile semiconductor memory is also used for secondary storage in various advanced electronic devices and specialized computers. As early as 2006, notebook and desktop computer manufacturers started using flash-based solid-state drives (SSDs) as default configuration options for the secondary storage either in addition to or instead of the more traditional HDD.[12][13][14][15][16] [edit] Magnetic [show]v · d · eMagnetic storage media Wire (1898) • Tape (1928) • Drum (1932) • Ferrite core (1949) • Hard disk (1956) • Stripe card (1956) • MICR (1956) • Thin film (1962) • CRAM (1962) • Twistor (~1968) • Floppy disk (1969) • Bubble (~1970) • MRAM (1995) • Racetrack (2008) Magnetic storage uses different patterns of magnetization on a magnetically coated surface to store information. Magnetic storage is non-volatile. The information is accessed using one or more read/write heads which may contain one or more recording transducers. A read/write head only covers a part of the surface so that the head or medium or both must be moved relative to another in order to access data. In modern computers, magnetic storage will take these forms: * Magnetic disk o Floppy disk, used for off-line storage o Hard disk drive, used for secondary storage * Magnetic tape data storage, used for tertiary and off-line storage In early computers, magnetic storage was also used for primary storage in a form of magnetic drum, or core memory, core rope memory, thin-film memory, twistor memory or bubble memory. Also unlike today, magnetic tape was often used for secondary storage. [edit] Optical [show]v · d · eOptical storage media CD (1982): CD-R (1988) · CD-RW (1997) DVD (1995): DVD-RW (1999) · DVD+RW (2001) · DVD+R (2002) · DVD+R DL (2004) · DVD-R DL (2005) Other: Microform (1870) · Optical tape (20th century) · Optical disc (20th century) · Laserdisc (1978) · UDO (2003) · ProData (2003) · UMD (2004) · HD DVD (2006) · Blu-ray Disc (2006) Magneto-optic Kerr effect (1877): MO disc (1980s) · MiniDisc (1992) · Hi-MD (2004) Optical Assist: Laser turntable (1986) · Floptical (1991) · Super DLT (1998) Optical storage, the typical optical disc, stores information in deformities on the surface of a circular disc and reads this information by illuminating the surface with a laser diode and observing the reflection. Optical disc storage is non-volatile. The deformities may be permanent (read only media ), formed once (write once media) or reversible (recordable or read/write media). The following forms are currently in common use:[17] * CD, CD-ROM, DVD, BD-ROM: Read only storage, used for mass distribution of digital information (music, video, computer programs) * CD-R, DVD-R, DVD+R, BD-R: Write once storage, used for tertiary and off-line storage * CD-RW, DVD-RW, DVD+RW, DVD-RAM, BD-RE: Slow write, fast read storage, used for tertiary and off-line storage * Ultra Density Optical or UDO is similar in capacity to BD-R or BD-RE and is slow write, fast read storage used for tertiary and off-line storage. Magneto-optical disc storage is optical disc storage where the magnetic state on a ferromagnetic surface stores information. The information is read optically and written by combining magnetic and optical methods. Magneto-optical disc storage is non-volatile, sequential access, slow write, fast read storage used for tertiary and off-line storage. 3D optical data storage has also been proposed. [edit] Paper [show]v · d · ePaper data storage media Writing on papyrus (c.3000 BCE) · Paper (105 CE) Punched tape (1846) · Book music (1863) · Ticker tape (1867) · Piano roll (1880s) · Punched card (1890) · Edge-notched card (1896) · Optical mark recognition · Optical character recognition (1929) · Barcode (1948) · Paper disc (2004) Paper data storage, typically in the form of paper tape or punched cards, has long been used to store information for automatic processing, particularly before general-purpose computers existed. Information was recorded by punching holes into the paper or cardboard medium and was read mechanically (or later optically) to determine whether a particular location on the medium was solid or contained a hole. A few technologies allow people to make marks on paper that are easily read by machine—these are widely used for tabulating votes and grading standardized tests. Barcodes made it possible for any object that was to be sold or transported to have some computer readable information securely attached to it. [edit] Uncommon Vacuum tube memory A Williams tube used a cathode ray tube, and a Selectron tube used a large vacuum tube to store information. These primary storage devices were short-lived in the market, since Williams tube was unreliable and Selectron tube was expensive. Electro-acoustic memory Delay line memory used sound waves in a substance such as mercury to store information. Delay line memory was dynamic volatile, cycle sequential read/write storage, and was used for primary storage. Optical tape is a medium for optical storage generally consisting of a long and narrow strip of plastic onto which patterns can be written and from which the patterns can be read back. It shares some technologies with cinema film stock and optical discs, but is compatible with neither. The motivation behind developing this technology was the possibility of far greater storage capacities than either magnetic tape or optical discs. Phase-change memory uses different mechanical phases of Phase Change Material to store information in an X-Y addressable matrix, and reads the information by observing the varying electrical resistance of the material. Phase-change memory would be non-volatile, random access read/write storage, and might be used for primary, secondary and off-line storage. Most rewritable and many write once optical disks already use phase change material to store information. Holographic data storage stores information optically inside crystals or photopolymers. Holographic storage can utilize the whole volume of the storage medium, unlike optical disc storage which is limited to a small number of surface layers. Holographic storage would be non-volatile, sequential access, and either write once or read/write storage. It might be used for secondary and off-line storage. See Holographic Versatile Disc (HVD). Molecular memory stores information in polymer that can store electric charge. Molecular memory might be especially suited for primary storage. The theoretical storage capacity of molecular memory is 10 terabits per square inch.[18] [edit] Related technologies [edit] Network connectivity A secondary or tertiary storage may connect to a computer utilizing computer networks. This concept does not pertain to the primary storage, which is shared between multiple processors in a much lesser degree. * Direct-attached storage (DAS) is a traditional mass storage, that does not use any network. This is still a most popular approach. This retronym was coined recently, together with NAS and SAN. * Network-attached storage (NAS) is mass storage attached to a computer which another computer can access at file level over a local area network, a private wide area network, or in the case of online file storage, over the Internet. NAS is commonly associated with the NFS and CIFS/SMB protocols. * Storage area network (SAN) is a specialized network, that provides other computers with storage capacity. The crucial difference between NAS and SAN is the former presents and manages file systems to client computers, whilst the latter provides access at block-addressing (raw) level, leaving it to attaching systems to manage data or file systems within the provided capacity. SAN is commonly associated with Fibre Channel networks. [edit] Robotic storage Large quantities of individual magnetic tapes, and optical or magneto-optical discs may be stored in robotic tertiary storage devices. In tape storage field they are known as tape libraries, and in optical storage field optical jukeboxes, or optical disk libraries per analogy. Smallest forms of either technology containing just one drive device are referred to as autoloaders or autochangers. Robotic-access storage devices may have a number of slots, each holding individual media, and usually one or more picking robots that traverse the slots and load media to built-in drives. The arrangement of the slots and picking devices affects performance. Important characteristics of such storage are possible expansion options: adding slots, modules, drives, robots. Tape libraries may have from 10 to more than 100,000 slots, and provide terabytes or petabytes of near-line information. Optical jukeboxes are somewhat smaller solutions, up to 1,000 slots. Robotic storage is used for backups, and for high-capacity archives in imaging, medical, and video industries. Hierarchical storage management is a most known archiving strategy of automatically migrating long-unused files from fast hard disk storage to libraries or jukeboxes. If the files are needed, they are retrieved back to disk. [edit] See also Wikimedia Commons has media related to: Computer memory [edit] Primary storage topics * Aperture (computer memory) * Dynamic random access memory (DRAM) * Memory latency * Mass storage * Memory cell (disambiguation) * Memory management o Dynamic memory allocation + Memory leak o Virtual memory * Memory protection * Page address register * Static random access memory (SRAM) * Stable storage [edit] Secondary, tertiary and off-line storage topics * Data deduplication * Data proliferation * Data storage tag used for capturing research data * File system o List of file formats * Flash memory * Information repository * Removable media * Solid-state drive * Spindle * Virtual tape library * Wait state * Write buffer * Write protection [edit] Data storage conferences * Storage Networking World * Storage World Conference

 

syed amaan ahmed   (XI)

Red Rose Berasia Road


Children~s Day 

Posted Date : 8/2/2011


In India, Children~s Day is celebrated on November 14, the birthday of Pandit Jawaharlal Nehru. He was the first Prime Minister of India after independence. As is known, he had an extreme love for children. Nehru worked passionately for the welfare of children and youngsters soon after independence. He was keen about welfare, education, and development of children in India. He was fond of children and thus became popular as "Chacha Nehru" (Uncle Nehru) among his little admirers. On Children~s Day in schools, it~s a non-uniform day and teachers perform on that day to entertain children.[verification needed] From dramas to dances and songs to skits it is very entertaining for children to watch their teachers on the stage

 

Karan Bitode   (VIII)

Red Rose Trilanga

storage devices 

Posted Date : 8/2/2011

Computer data storage, often called storage or memory, refers to computer components and recording media that retain digital data. Data storage is one of the core functions and fundamental components of computers. In contemporary usage, memory usually refers to semiconductor storage random-access memory, typically DRAM (Dynamic-RAM). Memory can refer to other forms of fast but temporary storage. Storage refers to storage devices and their media not directly accessible by the CPU, (secondary or tertiary storage) — typically hard disk drives, optical disc drives, and other devices slower than RAM but more permanent.[1] Historically, memory has been called main memory, real storage or internal memory while storage devices have been referred to as secondary storage, external memory or auxiliary/peripheral storage. The distinctions are fundamental to the architecture of computers. The distinctions also reflect an important and significant technical difference between memory and mass storage devices, which has been blurred by the historical usage of the term storage. Nevertheless, this article uses the traditional nomenclature. Many different forms of storage, based on various natural phenomena, have been invented. So far, no practical universal storage medium exists, and all forms of storage have some drawbacks. Therefore a computer system usually contains several kinds of storage, each with an individual purpose. A digital computer represents data using the binary numeral system. Text, numbers, pictures, audio, and nearly any other form of information can be converted into a string of bits, or binary digits, each of which has a value of 1 or 0. The most common unit of storage is the byte, equal to 8 bits. A piece of information can be handled by any computer whose storage space is large enough to accommodate the binary representation of the piece of information, or simply data. For example, using eight million bits, or about one megabyte, a typical computer could store a short novel. Traditionally the most important part of every computer is the central processing unit (CPU, or simply a processor), because it actually operates on data, performs any calculations, and controls all the other components. The CPU consists of two (2) main parts: Control Unit and Arithmetic Logic Unit (ALU). The former controls the flow of data between the CPU and memory whilst the latter is used for performing arithmetic and logical operations on data. Without a significant amount of memory, a computer would merely be able to perform fixed operations and immediately output the result. It would have to be reconfigured to change its behavior. This is acceptable for devices such as desk calculators or simple digital signal processors. Von Neumann machines differ in having a memory in which they store their operating instructions and data. Such computers are more versatile in that they do not need to have their hardware reconfigured for each new program, but can simply be reprogrammed with new in-memory instructions; they also tend to be simpler to design, in that a relatively simple processor may keep state between successive computations to build up complex procedural results. Most modern computers are von Neumann machines. In practice, almost all computers use a variety of memory types, organized in a storage hierarchy around the CPU, as a trade-off between performance and cost. Generally, the lower a storage is in the hierarchy, the lesser its bandwidth and the greater its access latency is from the CPU. This traditional division of storage to primary, secondary, tertiary and off-line storage is also guided by cost per bit. Contents [hide] * 1 Hierarchy of storage o 1.1 Primary storage o 1.2 Secondary storage o 1.3 Tertiary storage o 1.4 Off-line storage * 2 Characteristics of storage o 2.1 Volatility o 2.2 Mutability o 2.3 Accessibility o 2.4 Addressability o 2.5 Capacity o 2.6 Performance o 2.7 Energy use * 3 Fundamental storage technologies o 3.1 Semiconductor o 3.2 Magnetic o 3.3 Optical o 3.4 Paper o 3.5 Uncommon * 4 Related technologies o 4.1 Network connectivity o 4.2 Robotic storage * 5 See also o 5.1 Primary storage topics o 5.2 Secondary, tertiary and off-line storage topics o 5.3 Data storage conferences * 6 References [edit] Hierarchy of storage Various forms of storage, divided according to their distance from the central processing unit. The fundamental components of a general-purpose computer are arithmetic and logic unit, control circuitry, storage space, and input/output devices. Technology and capacity as in common home computers around 2005. [edit] Primary storage Direct links to this section: Primary storage, Main memory, Internal Memory. Primary storage (or main memory or internal memory), often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required. Any data actively operated on is also stored there in uniform manner. Historically, early computers used delay lines, Williams tubes, or rotating magnetic drums as primary storage. By 1954, those unreliable methods were mostly replaced by magnetic core memory. Core memory remained dominant until the 1970s, when advances in integrated circuit technology allowed semiconductor memory to become economically competitive. This led to modern random-access memory (RAM). It is small-sized, light, but quite expensive at the same time. (The particular types of RAM used for primary storage are also volatile, i.e. they lose the information when not powered). As shown in the diagram, traditionally there are two more sub-layers of the primary storage, besides main large-capacity RAM: * Processor registers are located inside the processor. Each register typically holds a word of data (often 32 or 64 bits). CPU instructions instruct the arithmetic and logic unit to perform various calculations or other operations on this data (or with the help of it). Registers are the fastest of all forms of computer data storage. * Processor cache is an intermediate stage between ultra-fast registers and much slower main memory. It~s introduced solely to increase performance of the computer. Most actively used information in the main memory is just duplicated in the cache memory, which is faster, but of much lesser capacity. On the other hand it is much slower, but much larger than processor registers. Multi-level hierarchical cache setup is also commonly used—primary cache being smallest, fastest and located inside the processor; secondary cache being somewhat larger and slower. Main memory is directly or indirectly connected to the central processing unit via a memory bus. It is actually two buses (not on the diagram): an address bus and a data bus. The CPU firstly sends a number through an address bus, a number called memory address, that indicates the desired location of data. Then it reads or writes the data itself using the data bus. Additionally, a memory management unit (MMU) is a small device between CPU and RAM recalculating the actual memory address, for example to provide an abstraction of virtual memory or other tasks. As the RAM types used for primary storage are volatile (cleared at start up), a computer containing only such storage would not have a source to read instructions from, in order to start the computer. Hence, non-volatile primary storage containing a small startup program (BIOS) is used to bootstrap the computer, that is, to read a larger program from non-volatile secondary storage to RAM and start to execute it. A non-volatile technology used for this purpose is called ROM, for read-only memory (the terminology may be somewhat confusing as most ROM types are also capable of random access). Many types of "ROM" are not literally read only, as updates are possible; however it is slow and memory must be erased in large portions before it can be re-written. Some embedded systems run programs directly from ROM (or similar), because such programs are rarely changed. Standard computers do not store non-rudimentary programs in ROM, rather use large capacities of secondary storage, which is non-volatile as well, and not as costly. Recently, primary storage and secondary storage in some uses refer to what was historically called, respectively, secondary storage and tertiary storage.[2] [edit] Secondary storage A hard disk drive with protective cover removed. Secondary storage (also known as external memory or auxiliary storage), differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage. Secondary storage does not lose the data when the device is powered down—it is non-volatile. Per unit, it is typically also two orders of magnitude less expensive than primary storage. Consequently, modern computer systems typically have two orders of magnitude more secondary storage than primary storage and data is kept for a longer time there. In modern computers, hard disk drives are usually used as secondary storage. The time taken to access a given byte of information stored on a hard disk is typically a few thousandths of a second, or milliseconds. By contrast, the time taken to access a given byte of information stored in random access memory is measured in billionths of a second, or nanoseconds. This illustrates the significant access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically about a million times slower than memory. Rotating optical storage devices, such as CD and DVD drives, have even longer access times. With disk drives, once the disk read/write head reaches the proper placement and the data of interest rotates under it, subsequent data on the track are very fast to access. As a result, in order to hide the initial seek time and rotational latency, data is transferred to and from disks in large contiguous blocks. When data reside on disk, block access to hide latency offers a ray of hope in designing efficient external memory algorithms. Sequential or block access on disks is orders of magnitude faster than random access, and many sophisticated paradigms have been developed to design efficient algorithms based upon sequential and block access . Another way to reduce the I/O bottleneck is to use multiple disks in parallel in order to increase the bandwidth between primary and secondary memory.[3] Some other examples of secondary storage technologies are: flash memory (e.g. USB flash drives or keys), floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives. The secondary storage is often formatted according to a file system format, which provides the abstraction necessary to organize data into files and directories, providing also additional information (called metadata) describing the owner of a certain file, the access time, the access permissions, and other information. Most computer operating systems use the concept of virtual memory, allowing utilization of more primary storage capacity than is physically available in the system. As the primary memory fills up, the system moves the least-used chunks (pages) to secondary storage devices (to a swap file or page file), retrieving them later when they are needed. As more of these retrievals from slower secondary storage are necessary, the more the overall system performance is degraded. [edit] Tertiary storage Large tape library. Tape cartridges placed on shelves in the front, robotic arm moving in the back. Visible height of the library is about 180 cm. Tertiary storage or tertiary memory,[4] provides a third level of storage. Typically it involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system~s demands; this data is often copied to secondary storage before use. It is primarily used for archiving rarely accessed information since it is much slower than secondary storage (e.g. 5–60 seconds vs. 1–10 milliseconds). This is primarily useful for extraordinarily large data stores, accessed without human operators. Typical examples include tape libraries and optical jukeboxes. When a computer needs to read information from the tertiary storage, it will first consult a catalog database to determine which tape or disc contains the information. Next, the computer will instruct a robotic arm to fetch the medium and place it in a drive. When the computer has finished reading the information, the robotic arm will return the medium to its place in the library. [edit] Off-line storage Off-line storage is a computer data storage on a medium or a device that is not under the control of a processing unit.[5] The medium is recorded, usually in a secondary or tertiary storage device, and then physically removed or disconnected. It must be inserted or connected by a human operator before a computer can access it again. Unlike tertiary storage, it cannot be accessed without human interaction. Off-line storage is used to transfer information, since the detached medium can be easily physically transported. Additionally, in case a disaster, for example a fire, destroys the original data, a medium in a remote location will probably be unaffected, enabling disaster recovery. Off-line storage increases general information security, since it is physically inaccessible from a computer, and data confidentiality or integrity cannot be affected by computer-based attack techniques. Also, if the information stored for archival purposes is accessed seldom or never, off-line storage is less expensive than tertiary storage. In modern personal computers, most secondary and tertiary storage media are also used for off-line storage. Optical discs and flash memory devices are most popular, and to much lesser extent removable hard disk drives. In enterprise uses, magnetic tape is predominant. Older examples are floppy disks, Zip disks, or punched cards. [edit] Characteristics of storage A 1GB DDR RAM module (detail) Storage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressibility. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance. [edit] Volatility Non-volatile memory Will retain the stored information even if it is not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory Requires constant power to maintain the stored information. The fastest memory technologies of today are volatile ones (not a universal rule). Since primary storage is required to be very fast, it predominantly uses volatile memory. Dynamic random-access memory A form of volatile memory which also requires the stored information to be periodically re-read and re-written, or refreshed, otherwise it would vanish. Static random-access memory A form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied. (It loses its content if power is removed). [edit] Mutability Read/write storage or mutable storage Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage. Read only storage Retains the information stored at the time of manufacture, and write once storage (Write Once Read Many) allows the information to be written only once at some point after manufacture. These are called immutable storage. Immutable storage is used for tertiary and off-line storage. Examples include CD-ROM and CD-R. Slow write, fast read storage Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and flash memory. [edit] Accessibility Random access Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Sequential access The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage. [edit] Addressability Location-addressable Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans. File addressable Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems. Content-addressable Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer~s CPU cache. [edit] Capacity Raw capacity The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes). Memory storage density The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch). [edit] Performance Latency The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency, and in case of sequential access storage, minimum, maximum and average latency. Throughput The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second or MB/s, though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput. [edit] Energy use * Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption 90 percent.[6] * 2.5 inch hard disk drives often consume less power than larger ones.[7][8] Low capacity solid-state drives have no moving parts and consume less power than hard disks.[9][10][11] Also, memory may use more power than hard disks.[11] [edit] Fundamental storage technologies As of 2011[update], the most commonly used data storage technologies are semiconductor, magnetic, and optical, while paper still sees some limited usage. Media is a common name for what actually holds the data in the storage device. Some other fundamental storage technologies have also been used in the past or are proposed for development. [edit] Semiconductor Semiconductor memory uses semiconductor-based integrated circuits to store information. A semiconductor memory chip may contain millions of tiny transistors or capacitors. Both volatile and non-volatile forms of semiconductor memory exist. In modern computers, primary storage almost exclusively consists of dynamic volatile semiconductor memory or dynamic random access memory. Since the turn of the century, a type of non-volatile semiconductor memory known as flash memory has steadily gained share as off-line storage for home computers. Non-volatile semiconductor memory is also used for secondary storage in various advanced electronic devices and specialized computers. As early as 2006, notebook and desktop computer manufacturers started using flash-based solid-state drives (SSDs) as default configuration options for the secondary storage either in addition to or instead of the more traditional HDD.[12][13][14][15][16] [edit] Magnetic [show]v · d · eMagnetic storage media Wire (1898) • Tape (1928) • Drum (1932) • Ferrite core (1949) • Hard disk (1956) • Stripe card (1956) • MICR (1956) • Thin film (1962) • CRAM (1962) • Twistor (~1968) • Floppy disk (1969) • Bubble (~1970) • MRAM (1995) • Racetrack (2008) Magnetic storage uses different patterns of magnetization on a magnetically coated surface to store information. Magnetic storage is non-volatile. The information is accessed using one or more read/write heads which may contain one or more recording transducers. A read/write head only covers a part of the surface so that the head or medium or both must be moved relative to another in order to access data. In modern computers, magnetic storage will take these forms: * Magnetic disk o Floppy disk, used for off-line storage o Hard disk drive, used for secondary storage * Magnetic tape data storage, used for tertiary and off-line storage In early computers, magnetic storage was also used for primary storage in a form of magnetic drum, or core memory, core rope memory, thin-film memory, twistor memory or bubble memory. Also unlike today, magnetic tape was often used for secondary storage. [edit] Optical [show]v · d · eOptical storage media CD (1982): CD-R (1988) · CD-RW (1997) DVD (1995): DVD-RW (1999) · DVD+RW (2001) · DVD+R (2002) · DVD+R DL (2004) · DVD-R DL (2005) Other: Microform (1870) · Optical tape (20th century) · Optical disc (20th century) · Laserdisc (1978) · UDO (2003) · ProData (2003) · UMD (2004) · HD DVD (2006) · Blu-ray Disc (2006) Magneto-optic Kerr effect (1877): MO disc (1980s) · MiniDisc (1992) · Hi-MD (2004) Optical Assist: Laser turntable (1986) · Floptical (1991) · Super DLT (1998) Optical storage, the typical optical disc, stores information in deformities on the surface of a circular disc and reads this information by illuminating the surface with a laser diode and observing the reflection. Optical disc storage is non-volatile. The deformities may be permanent (read only media ), formed once (write once media) or reversible (recordable or read/write media). The following forms are currently in common use:[17] * CD, CD-ROM, DVD, BD-ROM: Read only storage, used for mass distribution of digital information (music, video, computer programs) * CD-R, DVD-R, DVD+R, BD-R: Write once storage, used for tertiary and off-line storage * CD-RW, DVD-RW, DVD+RW, DVD-RAM, BD-RE: Slow write, fast read storage, used for tertiary and off-line storage * Ultra Density Optical or UDO is similar in capacity to BD-R or BD-RE and is slow write, fast read storage used for tertiary and off-line storage. Magneto-optical disc storage is optical disc storage where the magnetic state on a ferromagnetic surface stores information. The information is read optically and written by combining magnetic and optical methods. Magneto-optical disc storage is non-volatile, sequential access, slow write, fast read storage used for tertiary and off-line storage. 3D optical data storage has also been proposed. [edit] Paper [show]v · d · ePaper data storage media Writing on papyrus (c.3000 BCE) · Paper (105 CE) Punched tape (1846) · Book music (1863) · Ticker tape (1867) · Piano roll (1880s) · Punched card (1890) · Edge-notched card (1896) · Optical mark recognition · Optical character recognition (1929) · Barcode (1948) · Paper disc (2004) Paper data storage, typically in the form of paper tape or punched cards, has long been used to store information for automatic processing, particularly before general-purpose computers existed. Information was recorded by punching holes into the paper or cardboard medium and was read mechanically (or later optically) to determine whether a particular location on the medium was solid or contained a hole. A few technologies allow people to make marks on paper that are easily read by machine—these are widely used for tabulating votes and grading standardized tests. Barcodes made it possible for any object that was to be sold or transported to have some computer readable information securely attached to it. [edit] Uncommon Vacuum tube memory A Williams tube used a cathode ray tube, and a Selectron tube used a large vacuum tube to store information. These primary storage devices were short-lived in the market, since Williams tube was unreliable and Selectron tube was expensive. Electro-acoustic memory Delay line memory used sound waves in a substance such as mercury to store information. Delay line memory was dynamic volatile, cycle sequential read/write storage, and was used for primary storage. Optical tape is a medium for optical storage generally consisting of a long and narrow strip of plastic onto which patterns can be written and from which the patterns can be read back. It shares some technologies with cinema film stock and optical discs, but is compatible with neither. The motivation behind developing this technology was the possibility of far greater storage capacities than either magnetic tape or optical discs. Phase-change memory uses different mechanical phases of Phase Change Material to store information in an X-Y addressable matrix, and reads the information by observing the varying electrical resistance of the material. Phase-change memory would be non-volatile, random access read/write storage, and might be used for primary, secondary and off-line storage. Most rewritable and many write once optical disks already use phase change material to store information. Holographic data storage stores information optically inside crystals or photopolymers. Holographic storage can utilize the whole volume of the storage medium, unlike optical disc storage which is limited to a small number of surface layers. Holographic storage would be non-volatile, sequential access, and either write once or read/write storage. It might be used for secondary and off-line storage. See Holographic Versatile Disc (HVD). Molecular memory stores information in polymer that can store electric charge. Molecular memory might be especially suited for primary storage. The theoretical storage capacity of molecular memory is 10 terabits per square inch.[18] [edit] Related technologies [edit] Network connectivity A secondary or tertiary storage may connect to a computer utilizing computer networks. This concept does not pertain to the primary storage, which is shared between multiple processors in a much lesser degree. * Direct-attached storage (DAS) is a traditional mass storage, that does not use any network. This is still a most popular approach. This retronym was coined recently, together with NAS and SAN. * Network-attached storage (NAS) is mass storage attached to a computer which another computer can access at file level over a local area network, a private wide area network, or in the case of online file storage, over the Internet. NAS is commonly associated with the NFS and CIFS/SMB protocols. * Storage area network (SAN) is a specialized network, that provides other computers with storage capacity. The crucial difference between NAS and SAN is the former presents and manages file systems to client computers, whilst the latter provides access at block-addressing (raw) level, leaving it to attaching systems to manage data or file systems within the provided capacity. SAN is commonly associated with Fibre Channel networks. [edit] Robotic storage Large quantities of individual magnetic tapes, and optical or magneto-optical discs may be stored in robotic tertiary storage devices. In tape storage field they are known as tape libraries, and in optical storage field optical jukeboxes, or optical disk libraries per analogy. Smallest forms of either technology containing just one drive device are referred to as autoloaders or autochangers. Robotic-access storage devices may have a number of slots, each holding individual media, and usually one or more picking robots that traverse the slots and load media to built-in drives. The arrangement of the slots and picking devices affects performance. Important characteristics of such storage are possible expansion options: adding slots, modules, drives, robots. Tape libraries may have from 10 to more than 100,000 slots, and provide terabytes or petabytes of near-line information. Optical jukeboxes are somewhat smaller solutions, up to 1,000 slots. Robotic storage is used for backups, and for high-capacity archives in imaging, medical, and video industries. Hierarchical storage management is a most known archiving strategy of automatically migrating long-unused files from fast hard disk storage to libraries or jukeboxes. If the files are needed, they are retrieved back to disk. [edit] See also Wikimedia Commons has media related to: Computer memory [edit] Primary storage topics * Aperture (computer memory) * Dynamic random access memory (DRAM) * Memory latency * Mass storage * Memory cell (disambiguation) * Memory management o Dynamic memory allocation + Memory leak o Virtual memory * Memory protection * Page address register * Static random access memory (SRAM) * Stable storage [edit] Secondary, tertiary and off-line storage topics * Data deduplication * Data proliferation * Data storage tag used for capturing research data * File system o List of file formats * Flash memory * Information repository * Removable media * Solid-state drive * Spindle * Virtual tape library * Wait state * Write buffer * Write protection [edit] Data storage conferences * Storage Networking World * Storage World Conference

 

syed amaan ahmed   (XI)

Red Rose Berasia Road


Meaning of red rose 

Posted Date : 8/1/2011

R FOR RULES E FOR EDUCATION D FOR DECISION R FOR REGULATION O FOR OBIDIENT S FOR STUDY E FOR EQALITY

 

REEMA NANDANWAR   (VIII)

Red Rose Trilanga


दीपावली 

Posted Date : 7/31/2011

दीवाली या दीपावली, लोकप्रिय "रोशनी के त्योहार ~के रूप में जाना जाता है, हिन्दू धर्म, जैन धर्म में एक महत्वपूर्ण त्यौहार पांच दिन, और सिख धर्म, अलग कारण के लिए मनाया जाता है, मध्य अक्टूबर और मध्य नवंबर के बीच होने वाली है. हिंदुओं के लिए, दीवाली एक वर्ष का सबसे महत्वपूर्ण त्योहार है और उनके घरों में एक साथ प्रदर्शन से पारम्परिक क्रियाएँ परिवार में मनाया. जैनियों के लिए, दीवाली या 527 BC.For सिखों में महावीर ने निर्वाण मोक्ष की प्राप्ति मंगल ग्रह, दिवाली महत्वपूर्ण है क्योंकि यह sixth गुरू, गुरू हरगोविंद, जो भी 52 हिंदू राजाओं को बचाया साथ बंदी आयोजित मुगल सम्राट द्वारा की जेल से रिहाई मनाता उसे 1619 में ग्वालियर किले में. दीपावली भारत, नेपाल, श्रीलंका, म्यांमार, मारीशस, गुयाना, त्रिनिदाद एवं टोबैगो, सूरीनाम, मलेशिया, सिंगापुर, और फिजी में एक सरकारी छुट्टी है. नाम "दीपावली" का एक संकुचन "दिवाली" है (संस्कृत: दीपावली Dīpāvalī) जो में तब्दील हो दीवाली संस्कृत में छोटे मिट्टी (दीये या डीआईपीएएस) दीपक का प्रकाश शामिल है "दीपक की पंक्ति.": दीप) के तेल से भरा मैं बुराई पर अच्छाई की विजय gnify. दीवाली के दौरान, सभी celebrants नए कपड़े और मिठाई शेयर और परिवार के सदस्यों और दोस्तों के साथ स्नैक्स पहनते हैं. ज्यादातर भारतीय व्यापार समुदाय दिवाली के पहले दिन पर वित्तीय वर्ष लगते हैं. दीवाली के साथ साथ अपने निर्वासन 14-साल के लंबे और राक्षस राजा रावण vanquishing से भगवान राम, सीता और लक्ष्मण की वापसी, स्मृति. अपने राजा की वापसी की खुशी का जश्न में, अयोध्या, राम की राजधानी, के लोगों को मिट्टी के दीये और पटाखे फट साथ किंगडम प्रबुद्ध. त्योहार किस ज्यादातर भारतीय व्यापार समुदाय पर Dhanteras साथ शुरू होता है उनकी वित्तीय वर्ष लगते हैं. त्योहार के दूसरे दिन, अरक Chaturdasi, भगवान कृष्ण और उनकी पत्नी सत्यभामा द्वारा दानव अरक की vanquishing मंगल ग्रह. अमावस्या, दीपावली के तीसरे दिन, लक्ष्मी, उसे सबसे उदार मूड में धन की देवी की पूजा मंगल, उसके भक्तों की इच्छाओं को पूरा करने. अमावस्या भी भगवान विष्णु, जो अपने बौना अवतार में बाली परास्त, और उसे Matala को निर्वासित की कहानी कहता है. यह दीपावली, Kartika Shudda Padyami के चौथे दिन पर है, लेकिन है कि Matala के पास गया और वहाँ में अपने नए साम्राज्य की बागडोर ले लिया. पांचवें दिन यम Dvitiya (भी बुलाया भाई Dooj) के रूप में और इस दिन को आमंत्रित कर अपने भाइयों अपने घरों को करना बहनों पर जाना जाता है. हिंदुओं के अलावा, सिखों और जैनों को भी दीपावली मनाते हैं.

 

Karan Bitode   (VIII)

Red Rose Trilanga


भारत 

Posted Date : 7/31/2011

भारत, आधिकारिक तौर पर भारत गणराज्य दक्षिण एशिया में एक देश है. यह भौगोलिक क्षेत्र, 1.2 अरब से अधिक लोगों के साथ दूसरे सबसे अधिक आबादी वाला देश है, और दुनिया में सबसे अधिक आबादी वाला लोकतंत्र द्वारा सातवां सबसे बड़ा देश है. दक्षिण में हिंद महासागर, दक्षिण पश्चिम में अरब सागर है, और दक्षिण में बंगाल की खाड़ी से घिरा है, यह पाकिस्तान के साथ शेयर भूमि सीमाओं पश्चिम, भूटान, चीन और नेपाल के पूर्वोत्तर पीपुल्स गणराज्य, बांग्लादेश और और पूर्व में बर्मा. हिंद महासागर में भारत ने श्रीलंका और मालदीव के आसपास के क्षेत्र में है, इसके अलावा, भारत के अंडमान और निकोबार द्वीप थाईलैंड और इंडोनेशिया के साथ एक समुद्री सीमा का हिस्सा है. प्राचीन सिंधु घाटी सभ्यता और ऐतिहासिक व्यापार मार्गों और विशाल साम्राज्य का एक क्षेत्र, भारतीय उपमहाद्वीप अपने वाणिज्यिक और सांस्कृतिक संपत्ति के साथ अपने प्रमुख दुनिया की लंबी history.Four धर्मों - हिंदू, बौद्ध, जैन और सिख धर्म के ज्यादा के लिए पहचान की थी यहाँ जन्म लिया है, जबकि पारसी धर्म, ईसाई और इस्लाम 1 सहस्राब्दी CE में पहुंचे और भी क्षेत्र की विविध संस्कृति आकार में मदद की. धीरे - धीरे 18 वीं सदी की शुरुआत से ब्रिटिश ईस्ट इंडिया कंपनी के द्वारा नियंत्रित है और 19 वीं सदी के मध्य से सीधे यूनाइटेड किंगडम द्वारा प्रशासित, 1947 में भारत एक स्वतंत्र राष्ट्र महात्मा द्वारा नेतृत्व में स्वतंत्रता है जो अहिंसक प्रतिरोध द्वारा चिह्नित किया गया था के लिए एक संघर्ष के बाद बन गया गांधी. भारतीय अर्थव्यवस्था दुनिया नाममात्र और क्रय शक्ति समानता के द्वारा चौथी सबसे बड़ी अर्थव्यवस्था के सकल घरेलू उत्पाद के द्वारा दसवें सबसे बड़ी अर्थव्यवस्था है. 1991 में बाजार आधारित आर्थिक सुधारों के बाद भारत एक सबसे तेजी से बढ़ रही प्रमुख अर्थव्यवस्थाओं में से एक बन गया है, और एक नव औद्योगीकृत देश माना जाता है, तथापि, यह गरीबी, अशिक्षा, भ्रष्टाचार, और अपर्याप्त सार्वजनिक स्वास्थ्य की चुनौतियों का सामना करने के लिए जारी है. एक परमाणु हथियार राज्य और एक क्षेत्रीय शक्ति है, यह दुनिया में खड़े की तीसरी सबसे बड़ी सेना है और राष्ट्रों के बीच सैन्य खर्च में दसवें रैंकों. भारत के संसदीय लोकतंत्र के साथ 28 राज्यों और 7 संघ शासित प्रदेशों के निर्वाचकगण एक संघीय संवैधानिक गणतंत्र है. यह 5 BRICs राष्ट्रों में से एक है. भारत एक बहुलवादी, बहुभाषी, और multiethnic समाज है. यह भी संरक्षित निवास की एक किस्म में वन्य जीवन की विविधता के लिए घर है.

 

Karan Bitode   (VIII)

Red Rose Trilanga


स्वतंत्रता दिवस 

Posted Date : 7/31/2011

भारत के स्वतंत्रता दिवस अगस्त की पंद्रहवीं (8/15/47) पर मनाया जाता है 1947 में ब्रिटिश और एक संप्रभु राष्ट्र के रूप में अपने जन्म शासन से अपनी स्वतंत्रता को मनाने है. [1] दिन भारत में एक राष्ट्रीय छुट्टी है. देश भर में सभी, ध्वज के उत्थापन समारोह उपस्थिति में स्थानीय प्रशासन द्वारा आयोजित की जाती हैं. मुख्य घटना नई दिल्ली, भारत की राजधानी शहर है, जहां प्रधानमंत्री लाल किले पर राष्ट्रीय झंडा hoists और इसकी प्राचीर से एक राष्ट्रीय टीवी पर भाषण उद्धार में जगह लेता है. अपने भाषण में उन्होंने पिछले वर्ष के दौरान उनकी सरकार की उपलब्धियों पर प्रकाश डाला गया, महत्वपूर्ण मुद्दों को उठाती है और आगे विकास के लिए एक कॉल देता है. प्रधानमंत्री ने स्वतंत्रता संग्राम के नेताओं को अपनी श्रद्धांजलि देता है. प्रधानमंत्री ने 15 अगस्त को छुट्टी की घोषणा की. ~बोल्ड textItalic पाठ == पृष्ठभूमि == 1946 में, ब्रिटेन में लेबर पार्टी की सरकार द्वारा हाल ही में संपन्न द्वितीय विश्व युद्ध के समाप्त राजकोष, और होश है कि यह न तो घर पर जनादेश, अंतरराष्ट्रीय समर्थन, और न ही देशी बलों की विश्वसनीयता था एक तेजी से बेचैन भारत का नियंत्रण जारी रखने के लिए, [2] [3] भारत के ब्रिटिश शासन के अंत का फैसला किया, और +१९४७ शुरू में ब्रिटेन शक्ति नहीं जून 1948 की तुलना में बाद में स्थानांतरित करने के अपने इरादे की घोषणा की. के रूप में स्वतंत्रता के पास, पंजाब और बंगाल के प्रांतों में हिंदुओं और मुसलमानों के बीच हिंसा बेरोकटोक जारी रखा. ब्रिटिश सेना के साथ वृद्धि हुई हिंसा के लिए क्षमता के लिए तैयार नहीं, नए वाइसराय, लुईस माउंटबेटन, उन्नत सत्ता के हस्तांतरण के लिए तारीख, स्वतंत्रता के लिए एक पारस्परिक रूप से सहमत योजना के लिए सात महीने से भी कम की अनुमति है. जून 1947 में पंडित नेहरू, अबुल कलाम आजाद, मोहम्मद अली जिन्ना, बाबा साहेब आंबेडकर और मास्टर तारा सिंह सहित राष्ट्रवादी नेताओं, धार्मिक आधार पर देश के एक विभाजन करने के लिए सहमत हुए. मुख्य रूप से हिंदू और सिख क्षेत्रों नया भारत और पाकिस्तान के नए राष्ट्र के लिए मुख्य रूप से मुस्लिम क्षेत्रों को सौंपा गया, योजना पंजाब और बंगाल के प्रांतों के एक विभाजन है. मुस्लिम, सिख और हिंदू शरणार्थियों के कई लाखों नव तैयार की सीमाओं के पार पैदल सफर तय किया. पंजाब, जहां नई सीमा लाइनों आधे में सिख क्षेत्रों विभाजित, बड़े पैमाने पर रक्तपात के बाद, बंगाल और बिहार में, जहां गांधी की उपस्थिति सांप्रदायिक tempers assuaged में, हिंसा और अधिक सीमित था. सभी में, कहीं भी नई सीमाओं के दोनों पक्षों पर 250,000 और 500,000 लोगों के बीच हिंसा में मृत्यु हो गई [4] 14 अगस्त 1947, पाकिस्तान के नए डोमिनियन अस्तित्व में मुहम्मद अली जिन्ना के साथ अपनी पहली गवर्नर जनरल के रूप में शपथ ली, आया. कराची. आधी रात के स्ट्रोक के रूप में भारत 15 अगस्त, 1947 को जवाहरलाल नेहरू में चले गए, बाहर भाग्य भाषण की घोषणा भारत के independence.India, अब भारत के एक छोटे संघ के साथ प्रसिद्ध भेंट पढ़ने नई में जगह लेने के आधिकारिक समारोह के साथ एक स्वतंत्र देश बन गया दिल्ली और जवाहर लाल नेहरू के प्रथम प्रधानमंत्री के कार्यालय को संभालने, और वाइसराय, लुईस माउंटबेटन, अपने प्रथम गवर्नर जनरल के रूप में रहने के साथ

 

Karan Bitode   (VIII)

Red Rose Trilanga


KALPANA CHAWLA 

Posted Date :7/31/2011

KALPANA CHAWLA (PH.D.) NASA ASTRONAUT (DECEASED) PERSONAL DATA: Born in Karnal, India. Died on February 1, 2003 over the southern United States when Space Shuttle Columbia and the crew perished during entry, 16 minutes prior to scheduled landing. She is survived by her husband. Kalpana Chawla enjoyed flying, hiking, back-packing, and reading. She held a Certificated Flight Instructor~s license with airplane and glider ratings, Commercial Pilot~s licenses for single- and multi-engine land and seaplanes, and Gliders, and instrument rating for airplanes. She enjoyed flying aerobatics and tail-wheel airplanes. EDUCATION: Graduated from Tagore School, Karnal, India, in 1976. Bachelor of science degree in aeronautical engineering from Punjab Engineering College, India, 1982. Master of science degree in aerospace engineering from University of Texas, 1984. Doctorate of philosophy in aerospace engineering from University of Colorado, 1988. AWARDS: Posthumously awarded the Congressional Space Medal of Honor, the NASA Space Flight Medal, and the NASA Distinguished Service Medal. EXPERIENCE: In 1988, Kalpana Chawla started work at NASA Ames Research Center in the area of powered-lift computational fluid dynamics. Her research concentrated on simulation of complex air flows encountered around aircraft such as the Harrier in "ground-effect." Following completion of this project she supported research in mapping of flow solvers to parallel computers, and testing of these solvers by carrying out powered lift computations. In 1993 Kalpana Chawla joined Overset Methods Inc., Los Altos, California, as Vice President and Research Scientist to form a team with other researchers specializing in simulation of moving multiple body problems. She was responsible for development and implementation of efficient techniques to perform aerodynamic optimization. Results of various projects that Kalpana Chawla participated in are documented in technical conference papers and journals. NASA EXPERIENCE: Selected by NASA in December 1994, Kalpana Chawla reported to the Johnson Space Center in March 1995 as an astronaut candidate in the 15th Group of Astronauts. After completing a year of training and evaluation, she was assigned as crew representative to work technical issues for the Astronaut Office EVA/Robotics and Computer Branches. Her assignments included work on development of Robotic Situational Awareness Displays and testing space shuttle control software in the Shuttle Avionics Integration Laboratory. In November, 1996, Kalpana Chawla was assigned as mission specialist and prime robotic arm operator on STS-87. In January 1998, she was assigned as crew representative for shuttle and station flight crew equipment, and subsequently served as lead for Astronaut Offices Crew Systems and Habitability section. She flew on STS-87 (1997) and STS-107 (2003), logging 30 days, 14 hours and 54 minutes in space. SPACE FLIGHT EXPERIENCE: STS-87 Columbia (November 19 to December 5, 1997). STS-87 was the fourth U.S Microgravity Payload flight and focused on experiments designed to study how the weightless environment of space affects various physical processes, and on observations of the Sun~s outer atmospheric layers. Two members of the crew performed an EVA (spacewalk) which featured the manual capture of a Spartan satellite, in addition to testing EVA tools and procedures for future Space Station assembly. STS-87 made 252 orbits of the Earth, traveling 6.5 million miles in in 376 hours and 34 minutes. STS-107 Columbia (January 16 to February 1, 2003). The 16-day flight was a dedicated science and research mission. Working 24 hours a day, in two alternating shifts, the crew successfully conducted approximately 80 experiments. The STS-107 mission ended abruptly on February 1, 2003 when Space Shuttle Columbia and the crew perished during entry, 16 minutes prior to scheduled landing.

 

Karan Bitode   (VIII)

Red Rose Trilanga

Rakhi 

Posted Date :7/30/2011

The rainy season is full of festivals and celebrations. This season brothers and sisters get ready to celebrate it with rakhi. Yes the festival is Raksha Bandhan. Rakshna bandhan is celebrations of bond of love between brothers and sisters. It is observed on the full moon day in the Hindu month of Shravan (August – September). In 2011 it is on 13th August. Read on know the philosophy and celebrations of raksha bandhan.

 

manas gupta   (X)

Red Rose Trilanga

Sachin Tendulkar Biography 

Posted Date : 7/29/2011

Sachin Ramesh Tendulkar was born on April 24, 1973 in Mumbai, India. He went to Shradashram Vidyamandir, a high school in Mumbai, where he began his cricketing career under his coach Ramakant Achrekar. He attended the MRF Pace Foundation during his schooldays to train as a fast bowler, but Australian fast bowler Dennis Lillee, who saw him training, was not much impressed and suggested that Tendulkar should focus on his batting instead. As a young boy, Tendulkar would practice for hours at the net, and was driven hard by his coach Achrekar. While at school, his extraordinary batting skills got noticed by the sports circuit. People felt that the young boy would soon become one of the greats in cricket. In the 1988 season, he scored a century in every inning that he played. In one of the inter school matches that year, he had an unbroken 664-run partnership with friend and team mate Vinod Kambli. When he was 14, Indian batting legend Sunil Gavaskar a great Indian batsman of that time, gave him a pair of his own light pads. This touching gesture greatly encouraged the budding cricketer, who 20 years later broke Gavaskar’s world record of 34 Test centuries. In 1988, when he was just under 16, he scored 100 not out in for Bombay against Gujrat. This was on his first-class debut. He then scored a century in his first appearance in the Deodhar and Duleep Trophy. Mumbai captain Dilip Vengsarkar picked him up after seeing him batting Kapil Dev in the nets. That season he was Bombay’s highest run-getter. In the Irani Trophy final, He made an unbeaten century. He scored a century in all three of his Irani Trophy, Ranji Trophy and Duleep Trophy debuts, and became the first player to do so. He was selected for the tour of Pakistan next year. At the very young age of 16, Sachin played his first Test match against Pakistan in Karachi in 1989. In this Test, he received several blows to his body at the hands of Waqar Younis, a pace bowler. He made just 15 runs. In the last test in Sialkot, he had a bloody nose from a bouncer, but he went on playing. He scored better in the subsequent games, scoring 53 runs of 18 balls at Peshawar. In the 1990 Test in England he scored a century at Old Trafford. The English were highly impressed by his disciplined display of immense maturity. He played many types of strokes. His off-side shots from the back foot greatly impressed the English. Though short in height, he confidently faced short deliveries from the English pace bowlers. His great performance made him look the embodiment of Gavaskar, India’s former famous opener. During the 1991-1992 tour of Australia Tendulkar scored and unbeaten 148 in Sydney and another century on a bouncing pitch a Perth. At the age of 19, Tendulkar was in England, playing for Yorkshire in 1992. He scored 1070 runs at an average of 45.25 while playing for the English county as the first overseas player. In the 2003 Cricket World Cup, he made 873 runs in 11 matches which enabled India reach the final. Although Australia won the trophy Tendulkar was given the Man of the Tournament award. Shortly after this Tendulkar developed a tennis elbow and he was out of cricket for a while. But by 2005, he was back in form. He played well against Australia, Sri Lanka and Pakistan. Tendulkar performed very well against Bangla Desh and he was adjudged the Man of the Series in the Future Cup against South Africa. Today Tendulkar is a national icon to fans all over the world. He is the most worshipped cricketer in the world. Tendulkar has been granted the Padma Vibhushan, Padma Shri, Rajiv Gandhi Khel Ratna, Arjuna Award, Padma Vibhushan by the Indian government. Personal Life In 1995, Sachin married Anjali, a doctor and the daughter of Gujarati industrialist Anand Mehta. They have two children, Sara and Arjun. Tendulkar now sponsors 200 underprivileged children every year through a Mumbai-based NG

 

Utkarsh meshram   (IX)

Red Rose Trilanga

Rakhi:the thread of love 

Posted Date :7/29/2011

Rakhi is basically a sacred thread of protection embellished with the love and affection of a sister for her brother. This day is also known as Raksha Bandhan and celebrated on the full moon day of the Hindu month of Shravana in India. This frail of thread of Rakhi is considered as stronger than iron chains as it binds the most beautiful relationship in an inseparable bond of love and trust. Rakhi festival also has a social significance because it underlines the notion that everybody should live in harmonious coexistence with each other.

 

Mahendra   (XI)

Red Rose Trilanga

A Rainy Day 

Posted Date :7/28/2011

Every one avaite the rains and joy rain one day in the morning of 20 juen form a distance the clouds were seen. A lood wind began to blow. The weather became very pleasant.

 

abhilasha sarathe   (VI)

Red Rose Trilanga

CRICKET 

Posted Date :7/28/2011

I LOVE CRICKET VERY MUCH . MY FAVOIRATE CIRCKETER IS RAHUL DRAVID ,SACHIN TENDULKAR,GAUTAM GAMBHIR,PRAVIN KUMAR,VIRENDRA SHEWAG.

 

RAHUL   (VI)

Red Rose Trilanga

World Earth Day 

Posted Date :7/25/2011

April 22, 1970, the United States held the first massive "Earth Day" activities. This is the first ever large-scale human mass environmental movement & event worldwide. The beginning of the modern environmental movement, "Earth Day" activities aim to promote the establishment of several national environmental laws and regulations. April 22, 1990, more than 140 countries worldwide, 2 billion people around the world at the same time in a variety of environmental protection campaigns, called for improving the overall global environment. The United Nations affirmed this activities, and on April 22, 2009, the 63rd United Nations General Assembly unanimously adopted a resolution to next year~s April 22 as "World Earth Day."

 

Anshul solanki   (IX)

Red Rose Trilanga

Atomic bombings of Hiroshima and Nagasaki 

Posted Date :7/25/2011

During the final stages of World War II in 1945, the United States conducted two atomic bombings against the cities of Hiroshima and Nagasaki in Japan, the first on August 6, 1945 and the second on August 9, 1945. These two events are the only use of nuclear weapons in war to date. For six months before the atomic bombings, the United States intensely fire-bombed 67 Japanese cities. Together with the United Kingdom and the Republic of China, the United States called for a surrender of Japan in the Potsdam Declaration on July 26, 1945. The Japanese government ignored this ultimatum. By executive order of President Harry S. Truman, the U.S. dropped the nuclear weapon "Little Boy" on the city of Hiroshima on Monday, August 6, 1945,[3][4] followed by the detonation of "Fat Man" over Nagasaki on August 9.

 

Anshul solanki   (IX)

Red Rose Trilanga

LITERATURE 

Posted Date :7/23/2011

Literature (from Latin litterae (plural); letter) is the art of written works, and is not bound to published sources (although, under circumstances unpublished sources can be exempt). Literally translated, the word literature means "acquaintance with letters" (as in the "arts and letters"). The two major classification of literature are poetry and prose. "Literature" is sometimes differentiated from popular and ephemeral classes of writing. Terms such as "literary fiction" and "literary merit" are used to distinguish individual works as art-literature rather than vernacular writing, and some critics exclude works from being "literary", for example, on grounds of weak or faulty style, use of slang, poor characterization and shallow or contrived construction. Others exclude all genres such as romance, crime and mystery, science fiction, horror and fantasy. Pop lyrics, which are not technically a written medium at all, have also been drawn into this controversy.

 

Anmol Singh   (IX)

Red Rose Trilanga

RAKSHA BANDAN 

Posted Date :7/23/2011

Rakhi is basically a sacred thread of protection embellished with the love and affection of a sister for her brother. This day is also known as Raksha Bandhan and celebrated on the full moon day of the Hindu month of Shravana in India. This frail of thread of Rakhi is considered as stronger than iron chains as it binds the most beautiful relationship in an inseparable bond of love and trust. Rakhi festival also has a social significance because it underlines the notion that everybody should live in harmonious coexistence with each other.

 

mayank   (IX)

Red Rose Trilanga

HISTORY OF COMPUTER 

Posted Date :7/23/2011

Computers have been around for quite a few years. Some of your parents were probably around in 1951 when the first computer was bought by a business firm. Computers have changed so rapidly many people can not keep up with changes. One newspaper tried to relate how the fast changes in computer technology would look to a similar pace in the auto industry: "Had the automobile developed at a pace (equal) to that of the computer during the past twenty years, today a Rolls Royce would cost less than $3.00, get 3 million miles to the gallon, deliver enough power to drive (the ship) the Queen Elizabeth II, and six of them would fit on the head of a pin!" These changes have occurred so rapidly that many people do not know how our modern computer got its start. The First Computing Machines "Computers" Since ancient times, people have had ways to deal with data and numbers. Early people tied knots in rope and carved marks on clay tablets to keep track of livestock and trade. Some people considered the 5000 year old ABACUS-- a frame with beads strung on wires to be the first true computing aid. As trade and tax system grew in complexity, people saw that faster, more reliable and exact tools were needed for doing math and keeping records. In the mid-1600~s, Blaise Pascal and his father, who was a tax officer himself, were working on taxes for the French government in Paris. The two spent hours figuring and refiguring taxes that each citizen owed. Young Blaise decided in 1642 to build an adding and subtraction machine that could aide in such a tedious and time consuming process. The machine Blaise made had a set of eight gears that worked together much like an odometer keeps track of a car~s mileage. His machine encountered many of problems. For one, it was always breaking down. Second, the machine was slow and extremely costly. And third, people were afraid to use the machine thinking it might replace their jobs. Pascal later became famous for math and philosophy, but he is still remember for his role in computer technology. In his honor, there is a computer language named Pascal. The next big step for computers arrived in the 1830~s when Charles Babbage decided to build a machine to help him complete and print mathematical tables. Babbage was a mathematician who taught at Cambridge University in England. He began planning his calculating machine calling it the Analytical Engine. The idea for this machine was amazingly like the computer we know today. It was to read a program from punched cards, figure and store the answers to different problems, and print the answer on paper. Babbage died before he could complete the machine. However because of his remarkable ideas and work, Babbage is know as the Father of Computers. The next huge step for computers came when Herman Hollerith entered a contest given by the U.S. Census Bureau. The contest was to see who could build a machine that would count and record information faster. Hollerith, a young man working for the Bureau built a machine called the Tabulating Machine that read and sorted data from punched cards. The holes punched in the cards matched each person~s answers to questions. For example, married, single, and divorces were answers on the cards. The Tabulator read the punched cards as they passed over tiny brushes. Each time a brush found a hole, it completed an electrical circuit. This caused special counting dials to increase the data for that answer. Thanks to Hollerith~s machine, instead of taking seven and a half years to count the census information it only took three years, even with 13 million more people since the last census. Happy with his success, Hollerith formed the Tabulating Machine Company in 1896. The company later was sold in 1911. And in 1912 his company became the International Business Machines Corporation, better know today as IBM. The First Electric Powered Computer What is considered to be the first computer was made in 1944 by Harvard~s Professor Howard Aiken. The Mark I computer was very much like the design of Charles Babbage~s having mainly mechanical parts, but with some electronic parts. His machine was designed to be programmed to do many computer jobs. This all-purpose machine is what we now know as the PC or personal computer. The Mark I was the first computer financed by IBM and was about 50 feet long and 8 feet tall. It used mechanical switches to open and close its electric circuits. It contained over 500 miles of wire and 750,000 parts. The First All Electronic Computer The first all electronic computer was the ENIAC (Electronic Numerical Integrator and Computer). ENIAC was a general purpose digital computer built in 1946 by J. Presper Eckert and John Mauchly. The ENIAC contained over 18,000 vacuum tubes (used instead of the mechanical switches of the Mark I) and was 1000 times faster than the Mark I. In twenty seconds, ENIAC could do a math problem that would have taken 40 hours for one person to finish. The ENIAC was built the time of World War II had as its first job to calculate the feasibility of a design for the hydrogen bomb. The ENIAC was 100 feet long and 10 feet tall. M ore Modern Computers A more modern type computer began with John von Neumann~s development of software written in binary code. It was von Neumann who began the practice of storing data and instructions in binary code and initiated the use of memory to store data, as well as programs. A computer called the EDVAC (Electronic Discrete Variable Computer) was built using binary code in 1950. Before the EDVAC, computers like the ENIAC could do only one task then they had to be rewired to perform a different task or program. The EDVAC~s concept of storing different programs on punched cards instead of rewiring computers led to the computers that we know today. While the modern computer is far better and faster than the EDVAC of its time, computers of today would not have been possible with the knowledge and work of many great inventors and pioneers.

 

utkarsh meshram   (IX)

Red Rose Trilanga

RAKSHA BANDAN 

Posted Date :7/23/2011

Raksha Bandhan celebration is the festival to express the immaculate love between brothers and sisters. This festival is being celebrated with fervor and joy since ancient period. Rakhi epitomizes the unconditional love between brothers and sisters. Ladies start the preparation at least a fortnight before the festival. In order to make the day special, they buy rakhis, rakhi gifts, rakhi pooja thalis, sweets, etc for making the day special. This is also an occasion for family get together where they collectively celebrate this sacred festival. Exchange of beautiful rakhi gifts among dear ones make this occasion a sweet remembrance for many years to come

 

mayank   (IX)

Red Rose Trilanga

INERTIA (NEWTON~S SECOND LAW) 

Posted Date :7/23/2011

Inertia is the resistance of any physical object to a change in its state of motion or rest, or the tendency of an object to resist any change in its motion. It is proportional to an object~s mass. The principle of inertia is one of the fundamental principles of classical physics which are used to describe the motion of matter and how it is affected by applied forces. Inertia comes from the Latin word, iners, meaning idle, or lazy. Isaac Newton defined inertia as his first law in his Philosophiæ Naturalis Principia Mathematica, which states:[1] The vis insita, or innate force of matter, is a power of resisting by which every body, as much as in it lies, endeavours to preserve its present state, whether it be of rest or of moving uniformly forward in a straight line. In common usage the term "inertia" may refer to an object~s "amount of resistance to change in velocity" (which is quantified by its mass), or sometimes to its momentum, depending on the context. The term "inertia" is more properly understood as shorthand for "the principle of inertia" as described by Newton in his First Law of Motion; that an object not subject to any net external force moves at a constant velocity. Thus an object will continue moving at its current velocity until some force causes its speed or direction to change. On the surface of the Earth inertia is often masked by the effects of friction and gravity, both of which tend to decrease the speed of moving objects (commonly to the point of rest). This misled classical theorists such as Aristotle, who believed that objects would move only as long as force was applied to them.[2]

 

PRIYANKA YADAV   (IX)

Red Rose Trilanga

Input operation 

Posted Date :7/8/2011


The process of entering data and instruction into the computer system called input operation.A computer can accept data (input)form a wide range variety of input devices ranging from simple keyboard to complex equipment like Magnetic ink character reader (MICR)which directly input.

 

Azhar islam   (XI)

Red Rose Berasia Road

Input devices 

Posted Date :7/7/2011

Camera - most cameras like this are used during live conversations. The camera transmits a picture from one computer to another, or can be used to record a short video. Compact Disc (CD) - CDs store information. The CD can then be put into another computer, and the information can be opened and added or used on the second computer. Note: A CD-R or CD-RW can also be used as an OUTPUT device. Keyboard - The keyboard is a way to input letters or numbers into different applications or programs. A keyboard also has special keys that help operate the computer. Mouse - The mouse is used to open and close files, navigate web sites, and click on a lot of commands (to tell the computer what to do) when using different applications. Digital Camera - A digital camera can be used to take pictures. It can be hooked up to a computer to transfer the pictures from the camera to the computer. Some digital cameras hold a floppy disk, and the floppy disk can be taken out of the camera and put directly into the computer. Drawing Tablet - A drawing tablet is similar to a white board, except you use a special pen to write on it and it~s connected to the computer. Then the word or image you draw can be saved on the computer. Microphone - A microphone is used to record sound. The sound is then saved as a sound file on the computer. Scanner - A scanner is used to copy pictures or other things and save them as files on the computer. Disk Drive - A disk drive can hold a CD or a floppy disk. It reads the information on the disk so that the computer can use it. Joystick - A joystick is used to move the cursor from place to place, and to click on various items in programs. A joystick is used mostly for computer games. Touch Screen - A touch screen is a computer screen or other screen that you can touch with your finger to enter information. Examples of touch screens include a smart board, a microwave, a dishwasher, or an ATM at a bank. Bar Code Scanner - A bar code scanner scans a little label that has a bar code on it. The information is then saved on the computer. Bar code scanners are used in libraries a lot.

 

prerna sharma   (XI)

Red Rose Berasia Road

Input Devices 

Posted Date : 7/7/2011

Input device From Wikipedia, the free encyclopedia In computing, an input device is any peripheral (piece of computer hardware equipment) used to provide data and control signals to an information processing system such as a computer or other information appliance. Input and output devices make up the hardware interface between a computer and a scanner or 6DOF controller. Many input devices can be classified according to: modality of input (e.g. mechanical motion, audio, visual, etc.) the input is discrete (e.g. key presses) or continuous (e.g. a mouse~s position, though digitized into a discrete quantity, is fast enough to be considered continuous) the number of degrees of freedom involved (e.g. two-dimensional traditional mice, or three-dimensional navigators designed for CAD applications) Pointing devices, which are input devices used to specify a position in space, can further be classified according to: Whether the input is direct or indirect. With direct input, the input space coincides with the display space, i.e. pointing is done in the space where visual feedback or the cursor appears. Touchscreens and light pens involve direct input. Examples involving indirect input include the mouse and trackball. Whether the positional information is absolute (e.g. on a touch screen) or relative (e.g. with a mouse that can be lifted and repositioned) Direct input is almost necessarily absolute, but indirect input may be either absolute or relative. For example, digitizing graphics tablets that do not have an embedded screen involve indirect input and sense absolute positions and are often run in an absolute input mode, but they may also be set up to simulate a relative input mode where the stylus or puck can be lifted and repositioned. Contents [hide] 1 Keyboards 2 Pointing devices 3 High-degree of freedom input devices 4 Composite devices 5 Imaging and Video input devices 6 Audio input devices 7 Further Reading Keyboards Main article: Computer keyboard A ~keyboard~ is a human interface device which is represented as a layout of buttons. Each button, or key, can be used to either input a linguistic character to a computer, or to call upon a particular function of the computer. Traditional keyboards use spring-based buttons, though newer variations employ virtual keys, or even projected keyboards. Examples of types of keyboards include: Computer keyboard Keyer Chorded keyboard LPFK Pointing devices Main article: Pointing device A computer mouse A pointing device is any human interface device that allows a user to input spatial data to a computer. In the case of mice and touch screens, this is usually achieved by detecting movement across a physical surface. Analog devices, such as 3D mice, joysticks, or pointing sticks, function by reporting their angle of deflection. Movements of the pointing device are echoed on the screen by movements of the cursor, creating a simple, intuitive way to navigate a computer~s GUI. High-degree of freedom input devices Some devices allow many continuous degrees of freedom as input. These can be used as pointing devices, but are generally used in ways that don~t involve pointing to a location in space, such as the control of a camera angle while in 3D applications. These kinds of devices are typically used in CAVEs, where input that registers 6DOF is required. Composite devices Wii Remote with attached strap Input devices, such as buttons and joysticks, can be combined on a single physical device that could be thought of as a composite device. Many gaming devices have controllers like this. Technically mice are composite devices, as they both track movement and provide buttons for clicking, but composite devices are generally considered to have more than two different forms of input. Game controller Gamepad (or joypad) Paddle (game controller) Wii Remote Imaging and Video input devices Video input devices are used to digitize images or video from the outside world into the computer. The information can be stored in a multitude of formats depending on the user~s requirement. digital camera Webcam Image scanner Fingerprint scanner Barcode reader 3D scanner Laser rangefinder Medical Imaging Computed tomography Magnetic resonance imaging Positron emission tomography Medical ultrasonography Audio input devices In the fashion of video devices, audio devices are used to either capture or create sound. In some cases, an audio output device can be used as an input device, in order to capture produced sound. Microphone MIDI keyboard or other digital musical instrument Further Reading N. P. Milner. 1988. A review of human performance and preferences with different input devices to computer systems. In Proceedings of the Fourth Conference of the British Computer Society on People and computers IV, D. M. Jones and R. Winder (Eds.). Cambridge University Press, New York, NY, USA, 341-362. ISBN 0-521-36553-8

 

syed amaan ahmed   (XI)

Red Rose Berasia Road

 Input devices 

Posted Date : 7/7/2011

is any hardware device that sends data to the computer, without any input devices, a computer would only be a display device and not allow users to interact with it, much like a TV. In the picture to the right, is a Logitech trackball mouse and an example of an input device. Below is a complete listing of all the different computer input devices that can be used on a computer. * Barcode reader * Digital camera * Gamepad * Joystick * Keyboard * Microphone * MIDI keyboard * Mouse (pointing device) * Remote * Scanner * Webcam Also see: HID, Input, Input/output device, Keyboard definitions, Mouse definitions, Output device, Pointing device * Useful links * Home * Site map * Computer help * News * Q&A * What~s new * Tools * Print page * E-mail page * Edit page * Share page * Category * Dictionary * Related pages * I - Definitions * Solved? * Were you able to locate the answer to your question? * Yes * No

 

ayushi soni   (XI)

Red Rose Berasia Road

If I Were Invisable 

Posted Date :7/5/2011

If you were invisible, would you live your life differently? Think about this for a moment. If you were invisible and no one could see you no matter what you did, what would you be doing right now? What would you choose to do with the rest of your life? Let’s take it one step further, and imagine that as well as being invisible, you have no name and no identity. Would you live your life differently if nothing that you did could ever be traced back to you? Would you still want to write that book or record that album if you couldn’t put your name on the cover? Taking the time to think about your answers to this question will help you find balance in your life. How? It will help you align with your true purpose. Your answers will help you see where you are being of service to others, and where you are possibly wasting time trying to please your ego. Let me give you an example. When I completed this exercise, I came to the conclusion that if I were invisible and nothing I did mattered, I would still clean and organize my home on a regular basis. Yeah – it’s kind of crazy, I know, but I would do that for my husband as well as for myself. It is very important to me for him to be comfortable in his surroundings and even though he doesn’t realize how much time, effort, and energy cooking, cleaning, laundry, and organizing the house requires, I know he would be a mess without it. (Come to think of it, I am sort of invisible in this regard – aren’t we all? But that’s another post!) The other thing I would do if I were invisible is go around whispering in people’s ears – “You can do it!” I would be that voice that you sometimes hear when no one is around that motivates and inspires you to become your best. I would encourage everyone I could. Want to lose weight? You can do it! Want to go back to school? You can do it! Want to go for that promotion? You can do it! Want to start your own business? You can do it! Want to quit your job and stay at home with your kids? You can do it! Whatever your heart is calling you toward, you can do it! So, in my daily efforts of writing books, speaking, preparing seminars, designing websites, etc., all of it falls into my passion and true purpose. All of the organizing, cooking, cleaning, writing, speech preparing, web designing etc. – all of it, as long as it is within the guidelines of helping and motivating others, (or myself), is time well-spent. At the end of the session my higher self reminded me that I am not invisible, and that that is on purpose – by design of a Higher Power. I am visible so that I can motivate, educate, and inspire others to be their best and reach their full potential. It’s a good feeling to know that I am living a life, fully visible, in line with my true self. But now it’s your turn: What would you do if you were invisible? Make a list of the things you would continue to do, and then a list of what you would no longer do. How many of the latter could you let go of now? Think about how much more freedom letting go of those things would give you to do the things that align with your true purpose. As you begin doing more of what your inner being calls you toward, you will find more things in that realm that please you. Living a life full of purpose requires that we remain true to our “invisible” selves. Until next time, Live Joyfully!

 

yusuf   (XII)

Red Rose Berasia Road

Universe 

Posted Date :7/5/2011

Universe - Wikipedia, the free encyclopedia The universe is commonly defined as the totality of everything that exists, including all physical matter and energy, the planets, stars, galaxies,

 

anam arshi khan   (XI)

Red Rose Berasia Road

laser surgery 

Posted Date : 7/5/2011

Laser surgery is surgery using a laser to cut tissue instead of a scalpel. Examples include the use of a laser scalpel in otherwise conventional surgery, and soft tissue laser surgery, in which the laser beam vaporizes soft tissue with high water content. Laser resurfacing is a technique in which molecular bonds of a material are dissolved by a laser. Laser surgery is commonly used on the eye. Techniques used include LASIK, which is used to correct near and far-sightedness in vision, and photorefractive keratectomy, a procedure which permanently reshapes the cornea using an excimer laser to remove a small amount of tissue. Green laser surgery is used for the treatment/reduction of enlarged prostates. Laser surgery is much safer than normal surgery as it makes no physical contact so no infections are spread. The word Laser is an acronym, meaning: Light amplification by stimulated emission of radiation.

 

kirti   (XI)

Red Rose Berasia Road

Blood donation 

Posted Date :7/5/2011

Blood is donated by many persons in different categories. If at all a person who is in critical condition he would need blood in urgent manner so that his life can be safer without any worries. However the blood donation has been classified as paid and non paid. Paid donation has been very rare in almost all well developed countries and it is more or less fine in poor countries. Usually each country has maximum number of blood centers to help the poor people at the time of emergency so that they can be saved from lethality of the issue. However, some people may be paid for the blood that they are giving irrespective of the sex and religion. Also there are lots of voluntary services in this country to donate blood at critical times and for which they never require money at all. Lists of both paid and non paid centers are present in this era and hence they are so helpful in getting blood transfused. However, these paid centers are not maximum in numbers and all including government do not appreciate these centers or persons who want to donate blood for ... see more Read more: http://www.kosmix.com/topic/blood_donation#ixzz1RC8GitpN

 

shreya   (XI)

Red Rose Berasia Road

Albert Einstein 

Posted Date : 7/5/2011

Albert Einstein was born at Ulm, in Württemberg, Germany, on March 14, 1879. Six weeks later the family moved to Munich, where he later on began his schooling at the Luitpold Gymnasium. Later, they moved to Italy and Albert continued his education at Aarau, Switzerland and in 1896 he entered the Swiss Federal Polytechnic School in Zurich to be trained as a teacher in physics and mathematics. In 1901, the year he gained his diploma, he acquired Swiss citizenship and, as he was unable to find a teaching post, he accepted a position as technical assistant in the Swiss Patent Office. In 1905 he obtained his doctor~s degree. During his stay at the Patent Office, and in his spare time, he produced much of his remarkable work and in 1908 he was appointed Privatdozent in Berne. In 1909 he became Professor Extraordinary at Zurich, in 1911 Professor of Theoretical Physics at Prague, returning to Zurich in the following year to fill a similar post. In 1914 he was appointed Director of the Kaiser Wilhelm Physical Institute and Professor in the University of Berlin. He became a German citizen in 1914 and remained in Berlin until 1933 when he renounced his citizenship for political reasons and emigrated to America to take the position of Professor of Theoretical Physics at Princeton*. He became a United States citizen in 1940 and retired from his post in 1945.

 

kirti   (XI)

Red Rose Berasia Road

My ip lesson 

Posted Date :

Definition of front end Applications Front end is a user interface or that part of a software or a website that a user sees on the screen, and acts on to enter commands or to access other parts of the software or website. This Software’s are basically GUI (Graphical User Interface) Software’s created for user friendly data entry….Front software for basically GUI software created for user friendly data entry and it is easy to use. &n bsp; &n bsp; Front end and back end are generalized terms that refer to the initial and the end stages of a process.[citation needed] The front end is responsible for collecting input in various forms from the user and processing it to conform to a specification the back end can use. The front end is an interface between the user and backend. Front end may refer to: · &nbs p; &nbs p; &nbs p; The front of a vehicle body · &nbs p; &nbs p; &nbs p; Front-end load, a charge in investing · &nbs p; &nbs p; &nbs p; Front End Loader, a band · &nbs p; &nbs p; &nbs p; Front-end loader, construction equipment Definition of Back-end Applications Backend software is that software which helps the user to store the data in tabular format. These contain some of the loading and commands for generating quarry for searching any result OR Backend software is basically database software…… … …MORE APPLICATION AREAS OF DATABASE Every software or package has two parts front-end and back-end. In any official or business field we need to store and process the data through the use of any software package. INVENTORY CONTROL Inventory control is a list of goods and material held available in stock by a business. Inventory control is to determine and maintain an optimum level of investment in the inventory. OBJECTIVE TYPE QUES.:- Q-1: Choose the correct Answers: (1) Back end is related to-? Ans-Database (2) Which is not type of tax-? Ans-Fees (3) Salary based accounting system is-? Ans-Payroll Accounting ________________________ ________________________ ________________________ ___________________ Q-2: Fill in the blanks: (1) &nb sp; &nb sp; Serial no. is always used for Invoice management system. (2) &nb sp; &nb sp; Graphics are the part of Front-end system (3) &nb sp; &nb sp; In client server system the server is called Back-end. ________________________ ________________________ ________________________ ____________________ Q-3: State True or False: (1) &nb sp; &nb sp; SYBASE is a Front end tool: False (2) &nb sp; &nb sp; HRD system deals the personal information of employees: True (3) &nb sp; &nb sp; Client server application is a Hardware concept: False ________________________ ________________________ ________________________ _______ Q-4: Match the column: (1) &nb sp; &nb sp; TUI &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; (a)Technical user Interface (2) &nb sp; &nb sp; GUI &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; (b)Graphical User Interface (3) &nb sp; &nb sp; VB &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; (c)Front end (4) &nb sp; Tables (d)Back end .Model of System Development Life Cycle…. System Development Life Cycle The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. Various SDLC methodologies have been developed to guide the processes involved, including the waterfall model (which was the original SDLC method); rapid application development (RAD); joint application development (JAD); the fountain model; the spiral model; build and fix; and synchronize-and-stabiliz e. Often, several models are combined into some sort of hybrid methodology. Documentation is crucial regardless of the type of model chosen or devised for any application, and is usually done in parallel with the development process. Some methods work better for specific types of projects, but in the final analysis, the most important factor for the success of a project may be how closely the particular plan was followed. In general, an SDLC methodology follows these steps: 1. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; If there is an existing system, its deficiencies are identified. This is accomplished by interviewing users and consulting with support personnel. 2. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; The new system requirements are defined including addressing any deficiencies in the existing system with specific proposals for improvement. 3. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; The proposed system is designed. Plans are created detailing the hardware, operating systems, programming, and security issues. 4. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage. 5. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; The system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once. Types of System development Life Cycle 1. Requirements It includes all the basic details used for generating any application software or any of the financial accounting system / business related financial system. 2. System analysis The goal of system analysis is to determine where the problem is in an attempt to fix the system. This step involves breaking down the system in different pieces to analyze the situation, analyzing project goals, breaking down what needs to be created and attempting to engage users so that definite requirements can be defined. Requirements analysis sometimes requires individuals/teams from client as well as service provider sides to get detailed and accurate requirements; often there has to be a lot of communication to and from to understand these requirements. Requirement gathering is the most crucial aspect as many times communication gaps arise in this phase and this leads to validation errors and bugs in the software program. 3. Design In systems design the design functions and operations are described in detail, including screen layouts, business rules, process diagrams and other documentation. The output of this stage will describe the new system as a collection of modules or subsystems. The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. 4. Coding A coding includes the creation of database and linking of software together in Front-End and Back-End with specific command, syntax and instructions required for linking. 5. Testing The code is tested at various levels in software testing. Unit, system and user acceptance testing’s often performed. This is a grey area as many different opinions exist as to what the stages of testing are and how much if any iteration occurs. Iteration is not generally part of the waterfall model, but usually some occur at this stage. In the testing the whole system is test one by one 6. Acceptance It includes the deliverable software which is already tested and granted which has to be implemented over the system operations porting and fulfilling the requirements OBJECTIVES Q-1CHOOSE THE CORRECT ANSWER: 1. The answer of HOW and WHAT is given by Ans-(a) Analysis 2. Database schema is the output of- Ans-(b) Design 3. Data Model are used for- &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; Ans-(b) Database Q-2Fill in the blanks: 1. Network model is defined by CODASYL in 1971 year. 2. Object oriented database uses feature of Object Oriented language. 3. Table concept is used in Relational language. Q-3True and False: 1. SQL is a standard Language for RDBMS-(TRUE) 2. Feasibility study checks the possibility of system-(TRUE) 3. Coding Phase is related to programming-(TRUE) Q-4Match the column: 1. ROW &nb sp; &nb sp; &nb sp; Tuple 2. COLUMN Attribute 3. RDBMS & nbsp; & nbsp; Edger codd 4. SDLC &n bsp; &n bsp; &n bsp; Attribute INTRODUCTION to Entity Relationship Model: We have covered the concepts of relational databases in "Introduction to Databases," how to access such databases in "Accessing Databases with SQL," creation of web pages with forms in "Creating Web Pages" and "Web Forms for Database Queries," and CGI programming to interface between web pages and databases and to process data in "CGI Programs and Web Forms" and "CGI Programs in C++ Using the My SQL C API," "In Genomic Data," "Genomic Sequence Comparison," and "Searching Genomic Databases," we studied some of the algorithms to process genomic data and how to use these algorithms in conjunction with the above tasks. Until now, however, we have employed existing databases. The current module, "Relational Database Development," and "Creating and Changing Databases with SQL" discuss how we can design and produce databases. The ability to do so is important for development of databases for our own use or for larger computational science applications. Throughout this discussion, we consider the "College Physics Example" of the module "Computational Science and Web-Accessed Databases" as well as other applications. Entities and Entity Sets · An entity is an object that exists and is distinguishable from other objects. For instance, John Harris with S.I.N. 890-12-3456 is an entity, as he can be uniquely identified as one particular person in the universe. · An entity may be concrete (a person or a book, for example) or abstract (like a holiday or a concept). · An entity set is a set of entities of the same type (e.g., all persons having an account at a bank). · Entity sets need not be disjoint. For example, the entity set employee (all employees of a bank) and the entity set customer (all customers of the bank) may have members in common. · An entity is represented by a set of attributes. o E.g. name, S.I.N., street, city for ``customer~~ entity. o The domain of the attribute is the set of permitted values (e.g. the telephone number must be seven positive integers). · Formally, an attribute is a function which maps an entity set into a domain. o Every entity is described by a set of (attribute, data value) pairs. o There is one pair for each attribute of the entity set. . · The concept of an entity set corresponds to the programming language type definition. · A variable of a given type has a particular value at a point in time. · Thus, a programming language variable corresponds to an entity in the E-R model. Attributes It is possible to define a set of entities and the relationships among them in a number of different ways. The main difference is in how we deal with attributes. · &nbs p; &nbs p; Consider the entity set employee with attributes employee-name and phone-number. · &nbs p; &nbs p; We could argue that the phone be treated as an entity itself, with attributes phone-number and location. · &nbs p; &nbs p; Then we have two entity sets, and the relationship set Epping defining the association between employees and their phones. · &nbs p; &nbs p; This new definition allows employees to have several (or zero) phones. · &nbs p; &nbs p; New definition may more accurately reflect the real world. · &nbs p; &nbs p; We cannot extend this argument easily to making employee-name an entity. Mapping Constraints An E-R scheme may define certain constraints to which the contents of a database must conform. · Mapping Cardinalities: express the number of entities to which another entity can be associated via a relationship. For binary relationship sets between entity sets A and B, the mapping cardinality must be one of: 1. &nbs p; One-to-one: An entity in A is associated with at most one entity in B, and an entity in B is associated with at most one entity in A. (Figure 2.3) 2. One-to-many: An entity in A is associated with any number in B. An entity in B is associated with at most one entity in A. (Figure 2.4) 3. &nbs p; Many-to-one: An entity in A is associated with at most one entity in B. An entity in B is associated with any number in A. (Figure 2.5) 4. &nbs p; Many-to-many: Entities in A and B are associated with any number from each other. Objectives: Q1 Choose the correct answer: 1. &nbs p; &nbs p; &nbs p; Key attributes represents: Ans-Primary Key 2. &nbs p; &nbs p; &nbs p; ER Model is a: Conceptual: Ans-Model 3 ; ; Only one entity set is used in: Ans-Ternary & nbsp; & nbsp; Q2. Fill in the blanks: 1. &nbs p; Mapping is used to show the Association of entities. 2. &nbs p; Weak entity set is associate with Owner entity set. 3. &nbs p; Value of Derived Attribute is determined by Base Attribute. Q3. Stay true or false: 1. &nbs p; Ternary relationship has three entity set: True 2. &nbs p; Weak entity sets may have primary key: False 3. &nbs p; ER Model could be converted in to Relation Model: True Q4. Match the column: 1. Composite Attribute &nb sp; &nb sp; Sub Attribute 2. Multivalued Attribute &nb sp; &nb sp; Many values 3. Binary Relationship Two entity set 4. Weak Entity Owner Entity Types of SQL Statements The tables in the following sections provide a functional summary of SQL statements and are divided into these categories: · Data Definition Language (DDL) Statements · Data Manipulation Language (DML) Statements · Transaction Control Statements · Session Control Statements · System Control Statement · Embedded SQL Statements 1. Data Definition Language (DDL) Statements Data definition language (DDL) statements let you to perform these tasks: · Create, alter, and drop schema objects · Grant and revoke privileges and roles · Analyze information on a table, index, or cluster · Establish auditing options · Add comments to the data dictionary The CREATE; ALTER, and DROP commands require exclusive access to the specified object. For example, an ALTER TABLE statement fails if another user has an open transaction on the specified table. The GRANT, REVOKE, ANALYZE, AUDIT, and COMMENT commands do not require exclusive access to the specified object. For example, you can analyze a table while other users are updating the table. Oracle Database implicitly commits the current transaction before and after every DDL statement. Many DDL statements may cause Oracle Database to recompile or reauthorize schema objects. For information on how Oracle Database recompiles and reauthorizes schema objects and the circumstances under which a DDL statement would cause this, see Oracle Database Concepts. DDL statements are supported by PL/SQL with the use of the DBMS_SQL package. 2.Data Manipulation Language (DML) Statements Data manipulation language (DML) statements access and manipulate data in existing schema objects. These statements do not implicitly commit the current transaction. The data manipulation language statements are: CALL DELETE EXPLAIN PLAN INSERT LOCK TABLE MERGE SELECT UPDATE The SELECT statement is a limited form of DML statement in that it can only access data in the database. It cannot manipulate data in the database, although it can operate on the accessed data before returning the results of the query. 3.Transaction Control Statements Transaction control statements manage changes made by DML statements. The transaction control statements are: COMMIT ROLLBACK SAVEPOINT SET TRANSACTION All transaction control statements, except certain forms of the COMMIT and ROLLBACK commands, are supported in PL/SQL. For information on the restrictions, see COMMIT and ROLLBACK . 4.Session Control Statements Session control statements dynamically manage the properties of a user session. These statements do not implicitly commit the current transaction. PL/SQL does not support session control statements. The session control statements are: 1. ALTER SESSION 2. SET ROLE 5.System Control Statement The single system control statement, ALTER SYSTEM, dynamically manages the properties of an Oracle Database instance. This statement does not implicitly commit the current transaction and is not supported in PL/SQL. 6. Embedded SQL Statements Embedded SQL statements place DDL, DML, and transaction control statements within a procedural language program. Embedded SQL is supported by the Oracle recompiles and is documented in the following books: · Pro*COBOL Programmer~s Guide · Pro*C/C++ Programmer~s Guide · Oracle SQL*Module for Ada Programmer~s Guide Embedded SQL statements are: OPEN CLOSE DECLARE CONNECT FETCH Objectives Ques: 1 Choose the correct answer: 1. SQl is a standard language by- Ans- ANSI 2. PL/SQL commands by- Ans-Embedded SQL 3. Alter modifies- Ans-Table Structure ________________________ ________________________ ________________________ ___________ Ques: 2 fill in the Blanks of the following: 1. DDL commands are specially made for Database Objects. 2. All operations are cancelled by ROLLBACK command. 3. DML statements arte used for data ________________________ ________________________ ________________________ ___________ Ques: 3 State True or False: 1. COMMIT is used to save all operations-(TRUE) 2. Session control statements are not supported in PL/SQL-(TRUE) 3. DROP command is used to drop a column-(FALSE) Ques: 4 match the column: 1. GRANT & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; (a) DDL 2. MERGE (b) DML 3. SAVEPOINT &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; (C) TCS &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; .Meta data- Meta data are ‘data about data’ of any sort in any media. An item of metadata may describe an individual datum, or content item, or content item, or a collection of data including multiple content items. The word Meta comes from the Greek, where it means ‘after’ or ‘beyond’. Metadata are used facilitate the understanding, characteristics, use and management of data. .Data Dictionary- A data structure which stores meta-data is called Data dictionary. Usually it means a table in a data base that stores the names, fields, types, length, and other Characteristics of the field in the database tables. An active data dictionary is automatically updated as changes occur in the database. A passive data dictionary must be annually updated. &nbs p; &nbs p; &nbs p; &nbs p; The data dictionary is a more general software utility used by designers, users, and administrator for information recourses management. The data dictionary may maintain information on system hardware, software, documentation, users and other aspects. .Data Warehouse- Abbreviated DW, a collection of data designed to support management decision making. Data warehouses contain a wide variety of data that present a coherent picture of business conditions at a single point in time. Development of a data warehouse includes development of systems to extract data from operating systems plus installation of a warehouse database system that provides managers flexible access to the data. The term data warehousing generally refers to the combination of many different databases across an entire enterprise. Contrast with data mart. .Data Mining- Data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. The three major data mining techniques are:- · Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could mine customer purchase data to determine when customers visit and what they typically order. This information could be used to increase traffic by having daily specials. · Clusters: Data items are grouped according to logical relationships or consumer preferences. For example, data can be mined to identify market segments or consumer affinities. · Sequential patterns: Data is mined to anticipate behavior patterns and trends. For example, an outdoor equipment retailer could predict the likelihood of a backpack being purchased based on a consumer~s purchase of sleeping bags and hiking shoes .Object-Oriented Modeling Object-Oriented Modeling, or OOM, (Object Oriented Programming - OOP)is a modeling paradigm mainly used in computer programming. Prior to the rise of OOM, the dominant paradigm was procedural programming, which emphasized the use of discreet reusable code blocks that could stand on their own, take variables, perform a function on them, and return values. The Object-Oriented paradigm assists the programmer to address the complexity of a problem domain by considering the problem not as a set of functions that can be performed but primarily as a set of related, interacting Objects. The modeling task then is specifying, for a specific context, those Objects (or the Class the Objects belongs to), their respective set of Properties and Methods, shared by all Objects members of the Class. For more discussion, see Object-oriented analysis and design and Object-oriented programming. The description of these Objects is a Schema. As an example, in a model of a Payroll System, a Company is an Object. An Employee is another Object. Employment is a Relationship or Association. An Employee Class (or Object for simplicity) has Attributes like Name, Birth date, etc. The Association itself may be considered as an Object, having Attributes, or Qualifiers like Position, etc. An Employee Method may be Promote, Raise, etc. The Model description or Schema may grow in complexity to require a Notation. Many notations have been proposed, based on different paradigms, diverged, and converged in a more popular one known as UML. UML (Unifying Modeling language) UML History The development of UML began in late 1994 when Grady Booch and Jim RumBaugh of Rational Software Corporation began their work on unifying the Booch and OMT (Object Modeling Technique) methods. In the fall of 1995, Ivar Jacobson and his Objector Company joined Rational and this unification effort, merging in the OOSE (Object-Oriented Software Engineering) method.1 As the primary authors of the Booch, OMT, and OOSE methods, Grady Booch, Jim Rumbaugh, and Ivar Jacobson were motivated to create a unified modeling language for three reasons. First, these methods were already evolving toward each other independently. It made sense to continue that evolution together rather than apart, eliminating the potential for any unnecessary and gratuitous differences that would further confuse users. Second, by unifying the semantics and notation, they could bring some stability to the object-oriented marketplace, allowing projects to settle on one mature modeling language and letting tool builder’s focus on delivering more useful features. Third, they expected that their collaboration would yield improvements in all three earlier methods, helping them to capture lessons learned and to address problems that none of their methods previously handled well.1 The efforts of Booch, RumBaugh, and Jacobson resulted in the release of the UML 0.9 and 0.91 documents in June and October of 1996. During 1996, the UML authors invited and received feedback from the general community. They incorporated this feedback, but it was clear that additional focused attention was still required.1 While Rational was bringing UML together, efforts were being made on achieving the broader goal of an industry standard modeling language. In early 1995, Ivars Jacobson (then Chief Technology Officer of Objector) and Richard Solely (then Chief Technology Officer of OMG) decided to push harder to achieve standardization in the methods marketplace. In June 1995, an OMG-hosted meeting of all major methodologists (or their representatives) resulted in the first worldwide agreement to seek methodology standards, under the aegis of the OMG process.1 During 1996, it became clear that several organizations saw UML as strategic to their business. A Request for Proposal (RFP) issued by the Object Management Group (OMG) provided the catalyst for these organizations to join forces around producing a joint RFP response. Rational established the UML Partners consortium with several organizations willing to dedicate resources to work toward a strong UML 1.0 definition. .Client/Server Model of computing:- & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; To truly understand how much of the Internet operates, including the Web, it is important to understand the concept of client/server computing. The client/server model is a form of distributed computing where one program (the client) communicates with another program (the server) for the purpose of exchanging information. -The client~s responsibility is usually to: 1. &nbs p; Handle the user interface. 2. &nbs p; Translate the user~s request into the desired protocol. 3. &nbs p; Send the request to the server. 4. &nbs p; Wait for the server~s response. 5. &nbs p; Translate the response into "human-readable" results. 6. &nbs p; Present the results to the user. -The server~s functions include: 1. &nbs p; Listen for a client~s query. 2. &nbs p; Process that query. 3. &nbs p; Return the results back to the client. -A typical client/server interaction goes like this: 1. &nbs p; The user runs client software to create a query. 2. &nbs p; The client connects to the server. 3. &nbs p; The client sends the query to the server. 4. &nbs p; The server analyzes the query. 5. &nbs p; The server computes the results of the query. 6. &nbs p; The server sends the results to the client. 7. &nbs p; The client presents the results to the user. A typical client/server interaction This client/server interaction is a lot like going to a French restaurant. At the restaurant, you (the user) are presented with a menu of choices by the waiter (the client). After making your selections, the waiter takes note of your choices, translates them into French, and presents them to the French chef (the server) in the kitchen. After the chef prepares your meal, the waiter returns with your diner (the results). Hopefully, the waiter returns with the items you selected, but not always; sometimes things get "lost in the translation." Flexible user interface development is the most obvious advantage of client/server computing. It is possible to create an interface that is independent of the server hosting the data. Therefore, the user interface of a client/server application can be written on a Macintosh and the server can be written on a mainframe. Clients could be also written for DOS- or UNIX-based computers. This allows information to be stored in a central server and disseminated to different types of remote computers. Since the user interface is the responsibility of the client, the server has more computing resources to spend on analyzing queries and disseminating information. This is another major advantage of client/server computing; it tends to use the strengths of divergent computing platforms to create more powerful applications. Although it’s computing and storage capabilities are dwarfed by those of the mainframe, there is no reason why a Macintosh could not be used as a server for less demanding applications. In short, client/server computing provides a mechanism for disparate computers to cooperate on a single computing task. _________X______________ ____________________x___ _______________________x ___________ Modules Introduction Many sitemap components serve a purpose regardless how the input is obtained. Still, to provide a wide range of components to quickly get you up to speed, variants for different inputs exist. Modules allow creating generic components and plug-in input or output later. This document will explain how modules work and how to make use of them. If you plan on writing your own modules, it is highly recommended to read Developing with Apache Avalon. It is a very good description of the underlying rationale and principles. Types of Modules Currently, three different types of modules exist: Input modules provide means to enumerate attributes and to retrieve them, output modules allow storing of data and exhibit transaction like semantics, database modules encapsulate different mechanisms for auto increment columns of various database management systems. Please refer to the javadoc documentation of these interfaces. Input modules are modeled after request attributes. The main difference is, that every method takes two additional arguments, the request object and a configuration object. The configuration object is used to allow arbitrarily complex instructions for the input module. Apart from that, input modules are more or less a drop-in replacement. Output modules are again very similar to using request attributes. Basically, they provide a method to set an attribute to a value. Again, a request and a configuration object is the only change to request attributes. A fundamental difference is, however, that output modules should exhibit transactional behavior. Database modules, actually named Auto Increment Module, contain configuration information how to retrieve a value for an auto increment column. It is possible to obtain the value before inserting a row, while inserting as part of the SQL or after successful insert. If the value is obtained before inserting, it can be generated externally. Currently, supported database management systems include HSQL, Informix, My SQL, and querying the database for the current max value. Procedures Visual Studio 2010 ·Visual Studio 2008 A procedure is a block of Visual Basic statements enclosed by a declaration statement (Function, Sub, Operator, Get, and Set) and a matching End declaration. All executable statements in Visual Basic must be within some procedure. Calling a Procedures You invoke a procedure from some other place in the code. This is known as a procedure call. When the procedure is finished running, it returns control to the code that invoked it, which is known as the calling code. The calling code is a statement, or an expression within a statement, that specifies the procedure by name and transfers control to it. Types of Procedures: 1. Sub Procedures: A Sub procedure is a series of Visual Basic statements enclosed by the Sub and End Sub statements. The Sub procedure performs a task and then returns control to the calling code, but it does not return a value to the calling code. Each time the procedure is called, its statements are executed, starting with the first executable statement after the Sub statement and ending with the first End Sub, Exit Sub, or Return statement encountered. You can define a Sub procedure in modules, classes, and structures. It is Public by default, which means you can call it from anywhere in your application that has access to the module, class, or structure in which you defined it. The term, method, describes a Sub or Function procedure that is accessed from outside its defining module, class, or structure. For more information, see Class Methods. A Sub procedure can take arguments, such as constants, variables, or expressions, which are passed to it by the calling code. Declaration Syntax The syntax for declaring a Sub procedure is as follows: [modifiers ] Sub sub name [(parameter list)] ‘Statements of the Sub procedure. End Sub 2. Function Procedures: A Function procedure is a series of Visual Basic statements enclosed by the Function and End Function statements. The Function procedure performs a task and then returns control to the calling code. When it returns control, it also returns a value to the calling code. Each time the procedure is called, its statements run, starting with the first executable statement after the Function statement and ending with the first End Function, Exit Function, or Return statement encountered. You can define a Function procedure in a module, class, or structure. It is Public by default, which means you can call it from anywhere in your application that has access to the module, class, or structure in which you defined it. A Function procedure can take arguments, such as constants, variables, or expressions, which are passed to it by the calling code. Declaration Syntax The syntax for declaring a Function

 

yusuf   (XII)

Red Rose Berasia Road

Raksha Bandhan 

Posted Date :7/2/2011

Raksha Bandhan (Hindi: रक्षाबंधन, the bond of protection), or Rakhi (राखी), is a festival primarily observed in North India, which celebrates the relationship between brothers and sisters.[1][2] The festival is observed by Hindus and Sikhs.[3][4] The central ceremony involves the tying of a rakhi (sacred thread) by a sister on her brother~s wrist. This symbolizes the sister~s love and prayers for her brother~s well-being, and the brother~s lifelong vow to protect her.[5][6] The festival falls on the full moon day (Shravan Poornima) of the Shravan month of the Hindu lunisolar calendar Historical occurrences and mentions [edit]Santoshi Ma The tale of the deity Santoshi Mata, and the narrative of her creation on Raksha Bandhan day, was popularized in the 1975 Bollywood blockbuster Jai Santoshi Maa. Ganesh had two sons, Shubh and Labh. On Raksha Bandhan, Ganesh~s sister visited and tied a rakhi on Ganesh~s wrist. Feeling deprived, the sons immediately began pressing Ganesh and his two wives, Riddhi and Siddhi, for a sister. Finally, Ganesh conceded the demand and Santoshi Ma (literally the Mother Goddess of Satisfaction) was created by divine flames that emerged from Riddhi and Siddhi. [edit]Krishna and Draupadi Another incident is from the epic Mahabharat and concerns Krishna and Draupadi, the wife of the Pandavas. She had once torn a strip of silk off her sari and tied it around Krishna~s wrist to staunch the bleeding from a battlefield wound. Krishna was touched by her action and declared her to be his sister, even though they were unrelated. He promised to repay the debt and then spent the next 25 years doing just that. Draupadi, in spite of being married to 5 great warriors and being a daughter of a powerful monarch, trusted and depended wholly on Krishna. Krishna repaid the debt of love during the "Vastra-Haran" (literally "clothing-theft") of Draupadi, which occurred in the assembly of King Dhritarashtra when Yudhisthira lost her to the Kauravas in gambling. At that time, Krishna indefinitely extended her saree through divine intervention, so it could not be removed, to save her honor. This is how he honored his rakhi-vow towards Draupadi. [edit]King Bali and Goddess Laxmi According to a legend the Demon King Bali was a great devotee of Lord Vishnu. Lord Vishnu had taken up the task to guard his kingdom leaving his own abode in Vaikunth. Goddess Lakshmi wished to be with her lord back in her abode. She went to Bali disguised as a woman to seek refuge till her husband came back. During the Shravan Purnima celebrations, Lakshmi tied the sacred thread to the King. Upon being asked, she revealed who she was and why she was there. The king was touched by her goodwill for his family and her purpose and requested the Lord to accompany her. He sacrificed all he had for the Lord and his devoted wife. Thus the festival is also called Baleva that is Bali Raja~s devotion to the Lord. It is said that since then it has been a tradition to invite sisters in Shravan Purnima for the thread tying ceremony or the Raksha Bandhan. [edit]Yama and the Yamun According to another legend, Raksha Bandhan was a ritual followed by Lord Yama (the Lord of Death) and his sister Yamuna, (the river in northern India). Yamuna tied rakhi to Yama and bestowed immortality. Yama was so moved by the serenity of the occasion that he declared that whoever gets a rakhi tied from his sister and promised her protection, will become immortal. [edit]Alexander the Great and King Puru According to one legendary narrative, when Alexander the Great invaded India in 326 BC, Roxana (or Roshanak, his wife) sent a sacred thread to Porus, asking him not to harm her husband in battle. In accordance with tradition, Porus gave full respect to the rakhi. On the battlefield, when Porus was about to deliver a final blow to Alexander, he saw the rakhi on his own wrist and restrained himself from attacking Alexander personally. [edit]Rani Karnavati and Emperor Humayun A popular narrative that is centered around Rakhi is that of Rani Karnavati of Chittor and Mughal Emperor Humayun, which dates to 1535 CE. When Rani Karnavati, the widowed queen of the king of Chittor, realised that she could not defend against the invasion by the Sultan of Gujarat, Bahadur Shah, she sent a Rakhi to Emperor Humayun. Touched, the Emperor immediately set off with his troops to defend Chittor. Humayun arrived too late, and Bahadur Shah managed to sack the Rani~s fortress. Karnavati, along with a reported 13,000 other women in the fortress, carried out Jauhar on March 8, 1535, killing themselves to avoid dishonor while the men threw the gates open and rode out on a suicidal charge against Bahadur Shah~s troops. When he reached Chittor, Humayun evicted Bahadur Shah from fort and restored the kingdom to Karnavati~s son, Vikramjit Singh. Although contemporary commentators and memoirs do not mention the Rakhi episode and some historians have expressed skepticism about it, it is mentioned in one mid-seventeenth century Rajasthani account. [edit]Other festivals on this day In southern & Central parts of India including Kerala, Andhra Pradesh, Tamil Nadu, Karnataka, Maharashtra and Orissa, this day (i.e. Shravan Poornima day), is when the Brahmin community performs the rituals of Avani Avittam or Upakarma. [edit]Balarama Jayanti This is also celebrated as Shri Baladeva birth Ceremony. Lord Krishna~s elder Brother Prabhu Balarama was born on this Poornima.elebrations in India and Nepal While Raksha Bandhan is celebrated all over the country, different parts of the country mark the day in different ways. In Nepal, Raksha Bandhan is celebrated on shravan purnima. It is also called Janai Purnima (Janai is sacred thread and purnima means full moon). Janai is changed in this day, in Brahmins and kshetry~s family. A sacred thread is tied on hand by senior family members and relatives. Nepalese people enjoy this festival eating its special food "Kwati", a soup of sprout of seven different grains. [edit]Rakhi Purnima Rakhi is celebrated as Rakhi Purnima in North India. The word "Purnima" means a full moon night. [edit]Gamha Purnima Rakhi is also celebrated as Gamha Purnima in Orissa. On this date, all the domesticated Cows and Bullocks are decorated and worshipped. Various kinds of country-made cakes called Pitha and sweets mitha are made and distributed within families, relatives and friends. In Orissan Jagannath culture, the lord Krishna & Radha enjoy the beautiful rainy season of Shravana starting from Shukla Pakhya Ekadashi (usually 4 days before Purnima) and ending on Rakhi Purnima with a festival called Jhulan Yatra. Idols of Radha-Krishna are beautifully decorated on a swing called Jhulan, hence the name Jhulan Yatra. [edit]Nariyal Purnima In western India and parts of Maharashtra, Gujarat, and Goa this day is celebrated as Nariyal Purnima. On this day, an offering of a coconut (nariyal) is made to the sea, as a mark of respect to Lord Varuna, the God of the Sea. Nariyal Purnima marks the beginning of the fishing season and the fishermen, who depend on the sea for a living, make an offering to Lord Varuna so that they can reap bountiful fish from the sea.[30] [edit]Jandhyam Poornima Jandhyam is Sanskrit for sacred thread, and Poornima denotes the full moon in Sanskrit. The people of the Kumaon region of Uttarakhand, celebrate Raksha Bandhan and Janopunyu(जन्यो पुन्यु) on the Shravani Purnima, it is a day on which people change their janeu जनेयु or जन्यो (sacred thread). On this day, the famous Bagwal fair is held at Devidhura in district Champawat. Punyu in Kumauni means Purnima or full moon it is the purnima in which the sacred thread Janeu or Janyo is ceremonially changed. The Raksha Bandhan celebrations are similar all across North India. The thread changing ceremony is done all over India.[34][35][36] [edit]Kajari Purnima In central parts of India such as Madhya Pradesh, Chattisgarh, Jharkand and Bihar this day is celebrated as Kajari Purnima. It is an important day for the farmers and women blessed with a son. On the ninth day after Shravana Amavasya, the preparations of the Kajari festival start. This ninth day is called Kajari Navami and varied rituals are performed by women who have sons until Kajri Purnima or the full moon day. [edit]Pavitropana In parts of Gujarat, this day is celebrated as Pavitropana. On this day, people perform the grand pooja or the worship of Lord Shiva. It is the culmination of the prayers done throughout the year. According to Bengali Culture & Celebration, in the state of west Bengal (India), this day is also called Jhulan Purnima there pray & puja of Lord Krishna & Radha. Sister tied rakhi to Brother and bestowed immortality. Political Parties, Offices, Friends, Schools to colleges, Street to Palace celebrate today with a new hope for a good relationship. Brahmins in Tamil Nadu, Andhra Pradesh, Karnataka, Konkan, and Orissa change their sacred threads on the same day (Janayu, called as Poonal in Tamil, Jandhyam in Sanskrit)

 

Harsh Parihar   (IX)

Red Rose Trilanga

Holi 

Posted Date :7/2/2011

Holi is festival of colours. it is celebrated in the month of march.Around this time crops like wheat, gram, mustard etc., are ripe for harvesting. People collect lots of firewood at one place. on the festival day, after the sunset this firewood is burnt. People dance, pray and throw the grains of the newly harvested crop in it. the next morning people play holi with gulal and coloured water and shout Holi hai-Holi hai On holi special sweet called ~gujia~ is prepared.

 

Karan Bitode   (VIII)

Red Rose Trilanga

Thoughts 

Posted Date :6/28/2011

Freedom breeds freedom. Nothing else does. — Anne Roe (1904-1991) The people who think they are happy should rummage through their dreams. — Edward Dahlberg (1900-1977) Le sens commun n~est pas si commun. (Common sense is not so common.) — François Marie Arouet de Voltaire (1694-1778) Men tire themselves in pursuit of rest. — Laurence Sterne (1713-1768) Perfect order is the forerunner of perfe

 

kshipra   (XII)

Red Rose Berasia Road

Bad attitude 

Posted Date :6/28/2011

"The only disability in life is a bad attitude."

 

priya tiwari   (XII)

Red Rose Berasia Road

Attitude 

Posted Date : 6/28/2011

“Whenever you~re in conflict with someone, there is one factor that can make the difference between damaging your relationship and deepening it. That factor is attitude.”

 

nikita verma   (XII)

Red Rose Berasia Road

Destiny

Posted Date :6/28/2011

“Destiny is not a matter of chance, it is a matter of choice; it is not a thing to be waited for, it is a thing to be achieved.”

 

rishabh soni   (I)

Red Rose Lambakheda

Beautiful thought

Posted Date : 6/28/2011

Begin doing what you want to do now. We are not living in eternity. We have only this moment, sparkling like a star in our hand and melting like a snowflake.

 

SHWETA PARYANI   (XII)

Red Rose Berasia Road


Self confidence 

Posted Date :6/28/2011

Self confidence is the difference between feeling unstoppable and feeling scared out of your wits. Your perception of yourself has an enormous impact on how others perceive you. Perception is reality — the more self confidence you have, the more likely it is you’ll succeed. Although many of the factors affecting self confidence are beyond your control, there are a number of things you can consciously do to build self confidence. By using these 10 strategies you can get the mental edge you need to reach your potential. 1. Dress Sharp 2. Walk Faster 3. Good Posture 4. Personal Commercial 5. Gratitude 6. Compliment other people 7. Sit in the front row 8. Speak up 9. Work out 10. Focus on contribution

 

kanchan wadhwani   (XII)

Red Rose Berasia Road

Environmental Pollution 

Posted Date :6/28/2011

Environmental Pollution is an international journal that focuses on papers that report results from original research on the distribution and ecological effects of pollutants in air, water and soil environments and new techniques for their study and measurement. Findings from re-examination and interpretation of existing

 

supriya   (XII)

Red Rose Berasia Road

Thought on success 

Posted Date :6/28/2011

There is no such thing as a self-made man. We are made up of thousands of others. Every one who has ever done a kind deed for us, or spoken one word of encouragement to us, has entered into the make-up of our character and of our thoughts, as well as our success.

 

NEHA THAKUR   (XII)

Red Rose Berasia Road

Green house effect 

Posted Date :6/28/2011

What Factors Impact a Greenhouse? Modified with permission from Global Climates - Past, Present, and Future, S. Henderson, S. Holman, and L. Mortensen (Eds.). EPA Report No. EPA/600/R-93/126, U.S. Environmental Protection Agency, Office of Research and Development, Washington, DC 47 - 52. Background The earth~s atmospheric "greenhouse effect" is much more complex than the simple greenhouse experiment described in Activity 12. While the earth~s temperature is dependent upon the greenhouse-like action of the atmosphere, the amount of heating and cooling are strongly influenced by several factors. The type of surface that sunlight first encounters is the most important factor. Forests, grasslands, ocean surfaces, ice caps, deserts, and cities all absorb, reflect, and radiate radiation differently. Sunlight falling on a white glacier surface strongly reflects back into space, resulting in minimal heating of the surface and lower atmosphere. Sunlight falling on a dark desert soil is strongly absorbed, on the other hand, and contributes to significant heating of the surface and lower atmosphere. Cloud cover also affects greenhouse warming by both reducing the amount of solar radiation reaching the earth~s surface and by reducing the amount of radiation energy emitted into space. Scientists use the term albedo to define the percentage of solar energy reflected back by a surface. Understanding local, regional, and global albedo effects is critical to predicting global climate change. The following are some of the factors that influence the earth~s albedo. * Clouds: On a hot, sunny day, we usually welcome a big fluffy cumulus cloud passing overhead because we feel cooler immediately. That~s because the top of the cloud reflects sunlight back into space before it ever reaches earth. Depending on their altitude and optical properties, clouds either cool or warm the earth. Large, thick, relatively low-altitude clouds, such as cumulus and cumulonimbus, reflect incoming solar radiation and thereby reduce warming of the surface. The whitewash on plant greenhouses has the same effect on a smaller scale. High-altitude, thinner clouds, such as cirrus clouds, absorb longwave radiation reflected from the earth~s surface, causing increased warming. Cirrus Cumulus Nimbus * Surface albedo: Just as some clouds reflect solar energy into space, so do light-colored land surfaces. This surface albedo effect strongly influences the absorption of sunlight. Snow and ice cover are highly reflective, as are light-colored deserts. Large expanses of reflective surfaces can significantly reduce solar warming. Dark-colored land surfaces, in contrast, are strongly absorptive and contribute to warming. If global temperatures increase, snow and ice cover may shrink. The exposed darker surfaces underneath may absorb more solar radiation, causing further warming. The magnitude of the effect is currently a matter of serious scientific study and debate. * Oceans: From space, oceans look much different than adjacent land areas - they often appear darker, suggesting that they should be absorbing far more sunlight. But unlike dry land, water absorbs energy in a dynamic fashion. Some of the solar energy contacting the surface may be carried away by currents, some may go into producing water vapor, and some may penetrate the surface and be mixed meters deep into the water column. These factors combine to make the influence of the ocean surface an extremely complex and difficult phenomenon to predict. Water also has the capacity to store heat and transport large amounts of heat energy. In addition, oceans are an important sink (storage site) for atmospheric , and their ability to absorb is strongly related to ocean temperature. Because of their enormous size and depth, oceans are extremely important in determining global climate and the future rate of global temperature change. * Forested areas: Like the oceans, the interaction of forests and sunlight is complex. The amount of solar radiation absorbed by forest vegetation depends upon the type and color of vegetation, the time of year, and how well watered and healthy the plants are. In general, plants provide a dark surface, so you might expect high solar absorption. A significant fraction of the solar radiation is captured by the plants and used to make food through photosynthesis (and thus it doesn~t re-radiate as heat); some of the energy is dissipated as water evaporates from plant leaves; and some is absorbed and distributed deep within the forest canopy. These complexities make a simple definition of forest influences impossible. To a lesser extent, the same complexities apply to any relatively continuous-cover ecosystem (for example, grasslands and farmlands). In this exercise, students will form their own conclusions as to how different surface and cover types affect heating using the model bottle systems introduced in Activity 12. Learning Goals 1. Students will be able to identify at least three factors affecting the heat-trapping ability of a greenhouse, including the transparency of the greenhouse cover, color of the surfaces inside the greenhouse, and type of surfaces inside. 2. Students will be able to explain the factors important in the atmosphere~s heat trapping ability. 3. Students will understand the influence of albedo on earth~s temperature. Alignment to National Standards National Science Education Standards * Unifying Concepts and Processes, Grades K to 12, pg. 117: "Models are tentative schemes or structures that correspond to real objects, events, or classes of events and that have explanatory power." * Physical Science, Transfer of Energy, Grades 5 to 8, pg. 155, Item #2: "Heat moves in predictable ways flowing from warmer objects to cooler ones, until both reach the same temperature." * Earth and Space Science, Grades 9 to 12, pg. 189, Item #3: "Heating of earth~s surface and atmosphere by the sun drives convection within the atmosphere and oceans, producing winds and ocean currents." Benchmarks for Science Literacy, Project 2061, AAAS * Common Themes, Models, Grades 6 to 8, pg. 269, Item #1: "Models are often used to think about processes that happen too slowly, too quickly, or on too small a scale to observe directly, or that are too vast to be changed deliberately, or that are potentially dangerous." * The Physical Setting, Energy Transformations, Grades 6 to 8, pg. 85, Item #3: "Heat can be transferred through materials by the collisions of atoms or across space by radiation. If the material is fluid, currents will set up in it that aid the transfer of heat." Grade Level/Time * Grade level: 5 to 9 * Time: o Introduction by teacher: 15 minutes o Student activity (assuming bottle construction already done): 60 minutes Materials for Each Team of Four Students * Six soda bottle experimental chambers (see materials in Activity 12) * Six thermometers * Tape (transparent or light-colored) * White paint * Three cups of dark soil (garden or potting soil) * Three cups of white sand or perlite * Water and dump buckets * One 150-watt floodlight bulb * Portable reflector lamp * Stand to support lamp set-up * Graph paper Procedure 1. To save time, you (or your students) should prepare the model greenhouses prior to class. For each team of four students, you will need six experimental chambers. Paint the upper third of three of the bottles white. 2. Label the bottles A, B, C, D, E, and F with bottles B, D, and F having the white paint. 3. Fill the base of bottles A and B with dark soil, bottles C and D with white sand, and bottles E and F with room-temperature water. 4. Tape a thermometer (using transparent tape or light-colored masking tape) to the inside of each bottle (facing out). 5. Place the bottle tops in the bases. Make sure the bottles are capped. 6. Make sure the bulbs of the thermometers are just above the top of the bases. If the bulbs are below the base, the thermometer may record the heat absorbed directly by the soil or water, complicating the results. 7. Ask students to predict which bottle will get hotter. Why? Record predictions. 8. Have each team set up a graph of time (in minutes) vs. temperature to record their observations. 9. Each student should have a specific responsibility during the experiment, either keeping track of the time or recording the temperature for the different bottles. 10. Place the bottles approximately six inches away from the lamp with the thermometer facing away from the light. Record the baseline temperatures. 11. Turn on the light and begin recording the temperatures every two minutes. Continue for at least 20 minutes. Cautionary Note: If your lamp is not big enough, six bottles may be too many to have under the light at the same time. The ones further from the light may not get the same intensity of heat as the bottles closer to the light thereby compromising the experiment. You may have the students use a sub-set of the bottles at one time. If you make changes in the experiment, make sure you also change the student guide. Observations and Questions 1. Compare the graphed information from the different bottles. 2. Discuss the results and propose some possible explanations. 3. Relate the factors affecting the model greenhouses to the factors affecting the "global greenhouse." Which factors are the same? Which are different? Assessment Ideas * After discussing their findings, ask students to sketch and explain how to set up a model greenhouse (with the light on) with the absolutely coolest possible temperatures. Where might such a condition be found on earth? * Now ask them to sketch and explain a greenhouse designed to generate the maximum possible heat. Where might such a condition really exist? Modifications for Alternative Learners * Team English Language Limited students with more proficient students. When you~re finished with the activity, click on To Student Guide or Back to Activities List at the top of the page to return to the activity menu.

 

prinshu singh   (XII)

Red Rose Berasia Road

Happiness 

Posted Date :6/28/2011

“Happiness comes from spiritual wealth, not material wealth. Happiness comes from giving not getting. If we try hard to bring happiness to others we cannot stop it from coming to us also.”

 

rishabh soni   (I)

Red Rose Lambakheda

Dreams 

Posted Date :6/28/2011

a person without dreams is incomplete because untill and unless we don~t know what are the things which we have to achieve we will not able to put our efforts on a straight path and our hard working will be like a ray of light which has no end .By seeing dream it doesn~t mean you are wasting your time in your dreams everytime.Always be energetic to do hard work by remembering your dreams.

 

Shubham Sahu   (XII)

Red Rose Berasia Road

Time 

Posted Date :6/28/2011

A man who dares to waste one hour of a time has not discovered the Value of Life.

 

prashant maithil   (XII)

Red Rose Berasia Road

corruption

Posted Date :6/25/2011

Although Prime Minister and Congress party leader Indira Gandhi is quoted as saying that corruption is a misuse of power, she also publicly stated "nonchalantly" that "corruption was a global phenomenon" and her government was no different.[4][5][6] Successive central governments and members of India~s famous Nehru-Gandhi political dynasty have often been accused most of corruption and amassing illegal wealth among India~s political class.[4][7][8] The year 2011 has proved to be a watershed in the public tolerance of political corruption in India, with widespread public protests and movements led by social activists against corruption and for the return of illegal wealth stashed by politicians and businessmen in foreign banks over the six decades since independence. Criminalization is also a serious problem in contemporary Indian politics.[9] In July 2008 The Washington Post reported that nearly a fourth of the 540 Indian Parliament members faced criminal charges, "including human trafficking, immigration rackets, embezzlement, rape and even murder".[10] India tops the list for black money in the entire world with almost US$1456 billion in Swiss banks (approximately USD 1.4 trillion) in the form of black money.[11] According to the data provided by the Swiss Banking Association Report (2006), India has more black money than the rest of the world combined.[12][13] To put things in perspective, Indian-owned Swiss bank account assets are worth 13 times the country’s national debt.[14]

 

priyanka   (X)

Red Rose Berasia Road

Delete 

Posted Date :6/25/2011

CHAPTER 1 BACK-END, FRONT-END AND THEIR APPLICATION CHAPTER 1 BACK-END, FRONT-END AND THEIR APPLICATION FRONT END Front end software are basically GUI software created for user friendly data entry. A "front-end" application is one that application users interact with directly. Front-end is always graphical system that’s why it is more users friendly. 1) For software applications, front end is the same as user interface. (2) In client/server applications, the client part of the program is often called the front end and the server part is called the back end. (3) Compilers, the programs that translate source code into object code, are often composed of two parts: a front end and a back end. 3/11/2011 Delete I.P CHAPTER=2 System Development Life Cycle The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. Various SDLC methodologies have been developed to guide the processes involved, including the waterfall model (which was the original SDLC method); rapid application development (RAD); joint application development (JAD); the fountain model; the spiral model; build and fix; and synchronize-and-stabilize. Often, several models are combined into some sort of hybrid methodology. Documentation is crucial regardless of the type of model chosen or devised for any application, and is usually done in parallel with the development process. Some methods work better for specific types of projects, but in the final analysis, the most important factor for the success of a project may be how closely the particular plan was followed. In general, an SDLC methodology follows these steps: 1. If there is an existing system, its deficiencies are identified. This is accomplished by interviewing users and consulting with support personnel. 2. The new system requirements are defined including addressing any deficiencies in the existing system with specific proposals for improvement. 3. The proposed system is designed. Plans are created detailing the hardware, operating systems, programming, and security issues. 4. The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage. 5. The system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once. Types of System development Life Cycle 2. System analysis The goal of system analysis is to determine where the problem is in an attempt to fix the system. This step involves breaking down the system in different pieces to analyze the situation, analyzing project goals, breaking down what needs to be created and attempting to engage users so that definite requirements can be defined. Requirements analysis sometimes requires individuals/teams from client as well as service provider sides to get detailed and accurate requirements; often there has to be a lot of communication to and from to understand these requirements. Requirement gathering is the most crucial aspect as many times communication gaps arise in this phase and this leads to validation errors and bugs in the software program. 3. Design In systems design the design functions and operations are described in detail, including screen layouts, business rules, process diagrams and other documentation. The output of this stage will describe the new system as a collection of modules or subsystems. The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. Design elements describe the desired software features in detail, and generally include functional hierarchy diagrams, screen layout diagrams, tables of business rules, business process diagrams, pseudo code, and a complete entity-relationship diagram with a full data dictionary. These design elements are intended to describe the software in sufficient detail that skilled programmers may develop the software with minimal additional input design OBJECTIVES CHOOSE THE CORRECT ANSWER: 1. The answer of HOW and WHAT is given by (a) Analysis 2. Database schema is the output of- (b) Design 3. Data Model are used for- (b) Database Fill in the blanks: 1. Network model is defined by CODASYL in 1971 year. 2. Object oriented database uses feature of Object Oriented language. 3. Table concept is used in Relational language. True and False: 1. SQL is a standard Language for RDBMS: TRUE 2. Feasibility study checks the possibility of system. TRUE 3. Coding Phase is related to programming. TRUE Match the column: 1. ROW Tuple 2. COLUMN Attribute 3. RDBMS Edger codd 4. SDLC Attribute CHAPTER= 3 ENTITY RELATIONSHIP MODEL INTRODUCTION: We have covered the concepts of relational databases in "Introduction to Databases," how to access such databases in "Accessing Databases with SQL," creation of web pages with forms in "Creating Web Pages" and "Web Forms for Database Queries," and CGI programming to interface between web pages and databases and to process data in "CGI Programs and Web Forms" and "CGI Programs in C++ Using the MySQL C API," "In Genomic Data," "Genomic Sequence Comparison," and "Searching Genomic Databases," we studied some of the algorithms to process genomic data and how to use these algorithms in conjunction with the above tasks. Until now, however, we have employed existing databases. The current module, "Relational Database Development," and "Creating and Changing Databases with SQL" discuss how we can design and produce databases. The ability to do so is important for development of databases for our own use or for larger computational science applications. Throughout this discussion, we consider the "College Physics Example" of the module "Computational Science and Web-Accessed Databases" as well as other applications. Entities and Entity Sets • An entity is an object that exists and is distinguishable from other objects. For instance, John Harris with S.I.N. 890-12-3456 is an entity, as he can be uniquely identified as one particular person in the universe. • An entity may be concrete (a person or a book, for example) or abstract (like a holiday or a concept). • An entity set is a set of entities of the same type (e.g., all persons having an account at a bank). • Entity sets need not be disjoint. For example, the entity set employee (all employees of a bank) and the entity set customer (all customers of the bank) may have members in common. • An entity is represented by a set of attributes. o E.g. name, S.I.N., street, city for ``customer~~ entity. o The domain of the attribute is the set of permitted values (e.g. the telephone number must be seven positive integers). • Formally, an attribute is a function which maps an entity set into a domain. o Every entity is described by a set of (attribute, data value) pairs. o There is one pair for each attribute of the entity set. o E.g. a particular customer entity is described by the set {(name, Harris), (S.I.N., 890-123-456), (street, North), (city, Georgetown)}. An analogy can be made with the programming language notion of type definition. • The concept of an entity set corresponds to the programming language type definition. • A variable of a given type has a particular value at a point in time. • Thus, a programming language variable corresponds to an entity in the E-R model. Figure 2-1 shows two entity sets. We will be dealing with five entity sets in this section: • branch, the set of all branches of a particular bank. Each branch is described by the attributes branch-name, branch-city and assets. • customer, the set of all people having an account at the bank. Attributes are customer-name, S.I.N., street and customer-city. • employee, with attributes employee-name and phone-number. • account, the set of all accounts created and maintained in the bank. Attributes are account-number and balance. • transaction, the set of all account transactions executed in the bank. Attributes are transaction-number, date and amount. Attributes It is possible to define a set of entities and the relationships among them in a number of different ways. The main difference is in how we deal with attributes. • Consider the entity set employee with attributes employee-name and phone-number. • We could argue that the phone be treated as an entity itself, with attributes phone-number and location. • Then we have two entity sets, and the relationship set EmpPhn defining the association between employees and their phones. • This new definition allows employees to have several (or zero) phones. • New definition may more accurately reflect the real world. • We cannot extend this argument easily to making employee-name an entity. Mapping Constraints An E-R scheme may define certain constraints to which the contents of a database must conform. • Mapping Cardinalities: express the number of entities to which another entity can be associated via a relationship. For binary relationship sets between entity sets A and B, the mapping cardinality must be one of: 1. One-to-one: An entity in A is associated with at most one entity in B, and an entity in B is associated with at most one entity in A. (Figure 2.3) 2. One-to-many: An entity in A is associated with any number in B. An entity in B is associated with at most one entity in A. (Figure 2.4) 3. Many-to-one: An entity in A is associated with at most one entity in B. An entity in B is associated with any number in A. (Figure 2.5) 4. Many-to-many: Entities in A and B are associated with any number from each other. (Figure 2.6) The appropriate mapping cardinality for a particular relationship set depends on the real world being modeled. (Think about the CustAcct relationship...) Keys Differences between entities must be expressed in terms of attributes. • A superkey is a set of one or more attributes which, taken collectively, allow us to identify uniquely an entity in the entity set. • For example, in the entity set customer, customer-name and S.I.N. is a superkey. • Note that customer-name alone is not, as two customers could have the same name. • A superkey may contain extraneous attributes, and we are often interested in the smallest superkey. A superkey for which no subset is a superkey is called a candidate key. • In the example above, S.I.N. is a candidate key, as it is minimal, and uniquely identifies a customer entity. • A primary key is a candidate key (there may be more than one) chosen by the DB designer to identify entities in an entity set. An entity set that does not possess sufficient attributes to form a primary key is called a weak entity set. One that does have a primary key is called a strong entity set. For example, • The entity set transaction has attributes transaction-number, date and amount. • Different transactions on different accounts could share the same number. • These are not sufficient to form a primary key (uniquely identify a transaction). • Thus transaction is a weak entity set. For a weak entity set to be meaningful, it must be part of a one-to-many relationship set. This relationship set should have no descriptive attributes. (Why?) The idea of strong and weak entity sets is related to the existence dependencies seen earlier. • Member of a strong entity set is a dominant entity. • Member of a weak entity set is a subordinate entity. A weak entity set does not have a primary key, but we need a means of distinguishing among the entities. The discriminator of a weak entity set is a set of attributes that allows this distinction to be made. The primary key of a weak entity set is formed by taking the primary key of the strong entity set on which its existence depends (see Mapping Constraints) plus its discriminator. To illustrate: • Transaction is a weak entity. It is existence-dependent on account. • The primary key of account is account-number. • Transaction-number distinguishes transaction entities within the same account (and is thus the discriminator). • So the primary key for transaction would be (account-number, transaction-number Objectives: Q1 Choose the correct answer: 1. Key attributes represents: Primary Key 2. ER Model is a: Conceptual: Model 3 Only one entity set is used in: Ternary Q2. Fill in the blanks: 1. Mapping is used to show the Association of entities. 2. Weak entity set is associate with Owner entity set. 3. Value of Derived Attribute is determined by Base Attribute. Q3. Stay true or false: 1. Ternary relationship has three entity set: True 2. Weak entity sets may have primary key: False 3. ER Model could be converted in to Relation Model: True Q4. Match the column: 1. Composite Attribute Sub Attribute 2. Multi valued Attribute Many values 3. Binary Relationship Two entity set 4. Weak Entity Owner Entity Chapter= 4 RDBMS & DBMS The tables in the following sections provide a functional summary of SQL statements and are divided into these categories: • Data Definition Language (DDL) Statements • Data Manipulation Language (DML) Statements • Transaction Control Statements • Session Control Statements • System Control Statement • Embedded SQL Statements 1. Data Definition Language (DDL) Statements Data definition language (DDL) statements let you to perform these tasks: • Create, alter, and drop schema objects • Grant and revoke privileges and roles • Analyze information on a table, index, or cluster • Establish auditing options • Add comments to the data dictionary The CREATE; ALTER, and DROP commands require exclusive access to the specified object. For example, an ALTER TABLE statement fails if another user has an open transaction on the specified table. The GRANT, REVOKE, ANALYZE, AUDIT, and COMMENT commands do not require exclusive access to the specified object. For example, you can analyze a table while other users are updating the table. Oracle Database implicitly commits the current transaction before and after every DDL statement. Many DDL statements may cause Oracle Database to recompile or reauthorize schema objects. For information on how Oracle Database recompiles and reauthorizes schema objects and the circumstances under which a DDL statement would cause this, see Oracle Database Concepts. DDL statements are supported by PL/SQL with the use of the DBMS_SQL package. 2.Data Manipulation Language (DML) Statements Data manipulation language (DML) statements access and manipulate data in existing schema objects. These statements do not implicitly commit the current transaction. The data manipulation language statements are: CALL DELETE EXPLAIN PLAN INSERT LOCK TABLE MERGE SELECT UPDATE The SELECT statement is a limited form of DML statement in that it can only access data in the database. It cannot manipulate data in the database, although it can operate on the accessed data before returning the results of the query. 3.Transaction Control Statements Transaction control statements manage changes made by DML statements. The transaction control statements are: COMMIT ROLLBACK SAVEPOINT SET TRANSACTION All transaction control statements, except certain forms of the COMMIT and ROLLBACK commands, are supported in PL/SQL. For information on the restrictions, see COMMIT and ROLLBACK . 4.Session Control Statements Session control statements dynamically manage the properties of a user session. These statements do not implicitly commit the current transaction. PL/SQL does not support session control statements. The session control statements are: 1. ALTER SESSION 2. SET ROLE 5.System Control Statement The single system control statement, ALTER SYSTEM, dynamically manages the properties of an Oracle Database instance. This statement does not implicitly commit the current transaction and is not supported in PL/SQL. 6.Embedded SQL Statements Embedded SQL statements place DDL, DML, and transaction control statements within a procedural language program. Embedded SQL is supported by the Oracle recompiles and is documented in the following books: • Pro*COBOL Programmer~s Guide • Pro*C/C++ Programmer~s Guide • Oracle SQL*Module for Ad a Programmer~s Guide Embedded SQL statements are: OPEN CLOSE DECLARE CONNECT FET Objectives: Ques: 1 Choose the correct answer: 1. SQl is a standard language by- Ans- ANSI 2. PL/SQL commands by- Ans-Embedded SQL 3. Alter modifies Ans-Table Structure Q2. Fill in the blanks: 1. DDL Commands are specially made for database objects. 2. All operations are cancelled by ROLLBACK commands. 3. DML statements are used for data. Q3. STAY TRUR OR FALSE:: 1. COMMIT is used to save all operations-(TRUE) 2. Session control statements are not supported in PL/SQL (TRUE) 3. DROP command is used to drop a column-(FALSE) Q4. MATCH the column: 1. GRANT DDL 2. MERGE DML 3. SAVEPOINT TCS 4. DECLARE Embedded .Meta data- Meta data are ‘data about data’ of any sort in any media. An item of metadata may describe an individual datum, or content item, or content item, or a collection of data including multiple content items. The word Meta comes from the Greek, where it means ‘after’ or ‘beyond’. Metadata are used facilitate the understanding, characteristics, use and management of data. .Data Dictionary- A data structure which stores meta-data is called Data dictionary. Usually it means a table in a data base that stores the names, fields, types, length, and other Characteristics of the field in the database tables. An active data dictionary is automatically updated as changes occur in the database. A passive data dictionary must be annually updated. The data dictionary is a more general software utility used by designers, users, and administrator for information recourses management. The data dictionary may maintain information on system hardware, software, documentation, users and other aspects . .Data Warehouse- Abbreviated DW, a collection of data designed to support management decision making. Data warehouses contain a wide variety of data that present a coherent picture of business conditions at a single point in time. Development of a data warehouse includes development of systems to extract data from operating systems plus installation of a warehouse database system that provides managers flexible access to the data. The term data warehousing generally refers to the combination of many different databases across an entire enterprise. Contrast with data mart. .Data Mining- Data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. The three major data mining techniques are:- • Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could mine customer purchase data to determine when customers visit and what they typically order. This information could be used to increase traffic by having daily specials. • Clusters: Data items are grouped according to logical relationships or consumer preferences. For example, data can be mined to identify market segments or consumer affinities. • Sequential patterns: Data is mined to anticipate behavior patterns and trends. For example, an outdoor equipment retailer could predict the likelihood of a backpack being purchased based on a consumer~s purchase of sleeping bags and hiking shoes 6/23/2011

 

anshul   (XII)

Red Rose Berasia Road

True wisdom 

Posted Date :6/23/2011

The only true wisdom is in knowing you know nothing. A wise man does not need advice and a fool won~t take it.

 

nikita verma   (XII)

Red Rose Berasia Road

Human nature

Posted Date :6/23/2011

“To be always thinking about your manners is not the way to make them good; the very perfection of manners is not to think about yourself”

 

priya tiwari   (XII)

Red Rose Berasia Road

strength in being united..

Posted Date :6/23/2011

That men should live honestly, quietly, and comfortably together, it is needful that they should live under a sense of God~s will, and in awe of the divine power, hoping to please God, and fearing to offend Him, by their behaviour respectively.

 

nikita verma   (XII)

Red Rose Berasia Road

I.P 

Posted Date :6/23/2011

CHAPTER=2 System Development Life Cycle The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. Various SDLC methodologies have been developed to guide the processes involved, including the waterfall model (which was the original SDLC method); rapid application development (RAD); joint application development (JAD); the fountain model; the spiral model; build and fix; and synchronize-and-stabilize. Often, several models are combined into some sort of hybrid methodology. Documentation is crucial regardless of the type of model chosen or devised for any application, and is usually done in parallel with the development process. Some methods work better for specific types of projects, but in the final analysis, the most important factor for the success of a project may be how closely the particular plan was followed. In general, an SDLC methodology follows these steps: 1. If there is an existing system, its deficiencies are identified. This is accomplished by interviewing users and consulting with support personnel. 2. The new system requirements are defined including addressing any deficiencies in the existing system with specific proposals for improvement. 3. The proposed system is designed. Plans are created detailing the hardware, operating systems, programming, and security issues. 4. The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage. 5. The system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once. Types of System development Life Cycle 2. System analysis The goal of system analysis is to determine where the problem is in an attempt to fix the system. This step involves breaking down the system in different pieces to analyze the situation, analyzing project goals, breaking down what needs to be created and attempting to engage users so that definite requirements can be defined. Requirements analysis sometimes requires individuals/teams from client as well as service provider sides to get detailed and accurate requirements; often there has to be a lot of communication to and from to understand these requirements. Requirement gathering is the most crucial aspect as many times communication gaps arise in this phase and this leads to validation errors and bugs in the software program. 3. Design In systems design the design functions and operations are described in detail, including screen layouts, business rules, process diagrams and other documentation. The output of this stage will describe the new system as a collection of modules or subsystems. The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. Design elements describe the desired software features in detail, and generally include functional hierarchy diagrams, screen layout diagrams, tables of business rules, business process diagrams, pseudo code, and a complete entity-relationship diagram with a full data dictionary. These design elements are intended to describe the software in sufficient detail that skilled programmers may develop the software with minimal additional input design OBJECTIVES CHOOSE THE CORRECT ANSWER: 1. The answer of HOW and WHAT is given by (a) Analysis 2. Database schema is the output of- (b) Design 3. Data Model are used for- (b) Database Fill in the blanks: 1. Network model is defined by CODASYL in 1971 year. 2. Object oriented database uses feature of Object Oriented language. 3. Table concept is used in Relational language. True and False: 1. SQL is a standard Language for RDBMS: TRUE 2. Feasibility study checks the possibility of system. TRUE 3. Coding Phase is related to programming. TRUE Match the column: 1. ROW Tuple 2. COLUMN Attribute 3. RDBMS Edger codd 4. SDLC Attribute CHAPTER= 3 ENTITY RELATIONSHIP MODEL INTRODUCTION: We have covered the concepts of relational databases in "Introduction to Databases," how to access such databases in "Accessing Databases with SQL," creation of web pages with forms in "Creating Web Pages" and "Web Forms for Database Queries," and CGI programming to interface between web pages and databases and to process data in "CGI Programs and Web Forms" and "CGI Programs in C++ Using the MySQL C API," "In Genomic Data," "Genomic Sequence Comparison," and "Searching Genomic Databases," we studied some of the algorithms to process genomic data and how to use these algorithms in conjunction with the above tasks. Until now, however, we have employed existing databases. The current module, "Relational Database Development," and "Creating and Changing Databases with SQL" discuss how we can design and produce databases. The ability to do so is important for development of databases for our own use or for larger computational science applications. Throughout this discussion, we consider the "College Physics Example" of the module "Computational Science and Web-Accessed Databases" as well as other applications. Entities and Entity Sets • An entity is an object that exists and is distinguishable from other objects. For instance, John Harris with S.I.N. 890-12-3456 is an entity, as he can be uniquely identified as one particular person in the universe. • An entity may be concrete (a person or a book, for example) or abstract (like a holiday or a concept). • An entity set is a set of entities of the same type (e.g., all persons having an account at a bank). • Entity sets need not be disjoint. For example, the entity set employee (all employees of a bank) and the entity set customer (all customers of the bank) may have members in common. • An entity is represented by a set of attributes. o E.g. name, S.I.N., street, city for ``customer~~ entity. o The domain of the attribute is the set of permitted values (e.g. the telephone number must be seven positive integers). • Formally, an attribute is a function which maps an entity set into a domain. o Every entity is described by a set of (attribute, data value) pairs. o There is one pair for each attribute of the entity set. o E.g. a particular customer entity is described by the set {(name, Harris), (S.I.N., 890-123-456), (street, North), (city, Georgetown)}. An analogy can be made with the programming language notion of type definition. • The concept of an entity set corresponds to the programming language type definition. • A variable of a given type has a particular value at a point in time. • Thus, a programming language variable corresponds to an entity in the E-R model. Figure 2-1 shows two entity sets. We will be dealing with five entity sets in this section: • branch, the set of all branches of a particular bank. Each branch is described by the attributes branch-name, branch-city and assets. • customer, the set of all people having an account at the bank. Attributes are customer-name, S.I.N., street and customer-city. • employee, with attributes employee-name and phone-number. • account, the set of all accounts created and maintained in the bank. Attributes are account-number and balance. • transaction, the set of all account transactions executed in the bank. Attributes are transaction-number, date and amount. Attributes It is possible to define a set of entities and the relationships among them in a number of different ways. The main difference is in how we deal with attributes. • Consider the entity set employee with attributes employee-name and phone-number. • We could argue that the phone be treated as an entity itself, with attributes phone-number and location. • Then we have two entity sets, and the relationship set EmpPhn defining the association between employees and their phones. • This new definition allows employees to have several (or zero) phones. • New definition may more accurately reflect the real world. • We cannot extend this argument easily to making employee-name an entity. Mapping Constraints An E-R scheme may define certain constraints to which the contents of a database must conform. • Mapping Cardinalities: express the number of entities to which another entity can be associated via a relationship. For binary relationship sets between entity sets A and B, the mapping cardinality must be one of: 1. One-to-one: An entity in A is associated with at most one entity in B, and an entity in B is associated with at most one entity in A. (Figure 2.3) 2. One-to-many: An entity in A is associated with any number in B. An entity in B is associated with at most one entity in A. (Figure 2.4) 3. Many-to-one: An entity in A is associated with at most one entity in B. An entity in B is associated with any number in A. (Figure 2.5) 4. Many-to-many: Entities in A and B are associated with any number from each other. (Figure 2.6) The appropriate mapping cardinality for a particular relationship set depends on the real world being modeled. (Think about the CustAcct relationship...) Keys Differences between entities must be expressed in terms of attributes. • A superkey is a set of one or more attributes which, taken collectively, allow us to identify uniquely an entity in the entity set. • For example, in the entity set customer, customer-name and S.I.N. is a superkey. • Note that customer-name alone is not, as two customers could have the same name. • A superkey may contain extraneous attributes, and we are often interested in the smallest superkey. A superkey for which no subset is a superkey is called a candidate key. • In the example above, S.I.N. is a candidate key, as it is minimal, and uniquely identifies a customer entity. • A primary key is a candidate key (there may be more than one) chosen by the DB designer to identify entities in an entity set. An entity set that does not possess sufficient attributes to form a primary key is called a weak entity set. One that does have a primary key is called a strong entity set. For example, • The entity set transaction has attributes transaction-number, date and amount. • Different transactions on different accounts could share the same number. • These are not sufficient to form a primary key (uniquely identify a transaction). • Thus transaction is a weak entity set. For a weak entity set to be meaningful, it must be part of a one-to-many relationship set. This relationship set should have no descriptive attributes. (Why?) The idea of strong and weak entity sets is related to the existence dependencies seen earlier. • Member of a strong entity set is a dominant entity. • Member of a weak entity set is a subordinate entity. A weak entity set does not have a primary key, but we need a means of distinguishing among the entities. The discriminator of a weak entity set is a set of attributes that allows this distinction to be made. The primary key of a weak entity set is formed by taking the primary key of the strong entity set on which its existence depends (see Mapping Constraints) plus its discriminator. To illustrate: • Transaction is a weak entity. It is existence-dependent on account. • The primary key of account is account-number. • Transaction-number distinguishes transaction entities within the same account (and is thus the discriminator). • So the primary key for transaction would be (account-number, transaction-number Objectives: Q1 Choose the correct answer: 1. Key attributes represents: Primary Key 2. ER Model is a: Conceptual: Model 3 Only one entity set is used in: Ternary Q2. Fill in the blanks: 1. Mapping is used to show the Association of entities. 2. Weak entity set is associate with Owner entity set. 3. Value of Derived Attribute is determined by Base Attribute. Q3. Stay true or false: 1. Ternary relationship has three entity set: True 2. Weak entity sets may have primary key: False 3. ER Model could be converted in to Relation Model: True Q4. Match the column: 1. Composite Attribute Sub Attribute 2. Multi valued Attribute Many values 3. Binary Relationship Two entity set 4. Weak Entity Owner Entity Chapter= 4 RDBMS & DBMS The tables in the following sections provide a functional summary of SQL statements and are divided into these categories: • Data Definition Language (DDL) Statements • Data Manipulation Language (DML) Statements • Transaction Control Statements • Session Control Statements • System Control Statement • Embedded SQL Statements 1. Data Definition Language (DDL) Statements Data definition language (DDL) statements let you to perform these tasks: • Create, alter, and drop schema objects • Grant and revoke privileges and roles • Analyze information on a table, index, or cluster • Establish auditing options • Add comments to the data dictionary The CREATE; ALTER, and DROP commands require exclusive access to the specified object. For example, an ALTER TABLE statement fails if another user has an open transaction on the specified table. The GRANT, REVOKE, ANALYZE, AUDIT, and COMMENT commands do not require exclusive access to the specified object. For example, you can analyze a table while other users are updating the table. Oracle Database implicitly commits the current transaction before and after every DDL statement. Many DDL statements may cause Oracle Database to recompile or reauthorize schema objects. For information on how Oracle Database recompiles and reauthorizes schema objects and the circumstances under which a DDL statement would cause this, see Oracle Database Concepts. DDL statements are supported by PL/SQL with the use of the DBMS_SQL package. 2.Data Manipulation Language (DML) Statements Data manipulation language (DML) statements access and manipulate data in existing schema objects. These statements do not implicitly commit the current transaction. The data manipulation language statements are: CALL DELETE EXPLAIN PLAN INSERT LOCK TABLE MERGE SELECT UPDATE The SELECT statement is a limited form of DML statement in that it can only access data in the database. It cannot manipulate data in the database, although it can operate on the accessed data before returning the results of the query. 3.Transaction Control Statements Transaction control statements manage changes made by DML statements. The transaction control statements are: COMMIT ROLLBACK SAVEPOINT SET TRANSACTION All transaction control statements, except certain forms of the COMMIT and ROLLBACK commands, are supported in PL/SQL. For information on the restrictions, see COMMIT and ROLLBACK . 4.Session Control Statements Session control statements dynamically manage the properties of a user session. These statements do not implicitly commit the current transaction. PL/SQL does not support session control statements. The session control statements are: 1. ALTER SESSION 2. SET ROLE 5.System Control Statement The single system control statement, ALTER SYSTEM, dynamically manages the properties of an Oracle Database instance. This statement does not implicitly commit the current transaction and is not supported in PL/SQL. 6.Embedded SQL Statements Embedded SQL statements place DDL, DML, and transaction control statements within a procedural language program. Embedded SQL is supported by the Oracle recompiles and is documented in the following books: • Pro*COBOL Programmer~s Guide • Pro*C/C++ Programmer~s Guide • Oracle SQL*Module for Ad a Programmer~s Guide Embedded SQL statements are: OPEN CLOSE DECLARE CONNECT FET Objectives: Ques: 1 Choose the correct answer: 1. SQl is a standard language by- Ans- ANSI 2. PL/SQL commands by- Ans-Embedded SQL 3. Alter modifies Ans-Table Structure Q2. Fill in the blanks: 1. DDL Commands are specially made for database objects. 2. All operations are cancelled by ROLLBACK commands. 3. DML statements are used for data. Q3. STAY TRUR OR FALSE:: 1. COMMIT is used to save all operations-(TRUE) 2. Session control statements are not supported in PL/SQL (TRUE) 3. DROP command is used to drop a column-(FALSE) Q4. MATCH the column: 1. GRANT DDL 2. MERGE DML 3. SAVEPOINT TCS 4. DECLARE Embedded .Meta data- Meta data are ‘data about data’ of any sort in any media. An item of metadata may describe an individual datum, or content item, or content item, or a collection of data including multiple content items. The word Meta comes from the Greek, where it means ‘after’ or ‘beyond’. Metadata are used facilitate the understanding, characteristics, use and management of data. .Data Dictionary- A data structure which stores meta-data is called Data dictionary. Usually it means a table in a data base that stores the names, fields, types, length, and other Characteristics of the field in the database tables. An active data dictionary is automatically updated as changes occur in the database. A passive data dictionary must be annually updated. The data dictionary is a more general software utility used by designers, users, and administrator for information recourses management. The data dictionary may maintain information on system hardware, software, documentation, users and other aspects . .Data Warehouse- Abbreviated DW, a collection of data designed to support management decision making. Data warehouses contain a wide variety of data that present a coherent picture of business conditions at a single point in time. Development of a data warehouse includes development of systems to extract data from operating systems plus installation of a warehouse database system that provides managers flexible access to the data. The term data warehousing generally refers to the combination of many different databases across an entire enterprise. Contrast with data mart. .Data Mining- Data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. The three major data mining techniques are:- • Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could mine customer purchase data to determine when customers visit and what they typically order. This information could be used to increase traffic by having daily specials. • Clusters: Data items are grouped according to logical relationships or consumer preferences. For example, data can be mined to identify market segments or consumer affinities. • Sequential patterns: Data is mined to anticipate behavior patterns and trends. For example, an outdoor equipment retailer could predict the likelihood of a backpack being purchased based on a consumer~s purchase of sleeping bags and hiking shoes

 

anshul   (XII)

Red Rose Berasia Road

Have a faith on ur believe.. 

Posted Date : 6/21/2011

“The key is to get to know people and trust them to be who they are. Instead, we trust people to be who we want them to be- and when they~re not, we cry.”

 

nikita verma   (XII)

Red Rose Berasia Road

DISCIPLINE 

Posted Date : 6/21/2011

A WISE OLD OWL,SAT ON THE OAK THE MORE HE SAW,THE LESS HE SPOKE, THE LESS HE SPOKE,THE MORE HE HEAR, WHY WE CANNOT BE LIKE THAT OWL?

 

SHWETA PARYANI   (XII)

Red Rose Berasia Road

TRUST ON YOURSELF 

Posted Date :6/21/2011

"Remember, there are no mistakes, only lessons. Love yourself, trust your choices, and everything is possible. "

 

priya tiwari   (XII)

Red Rose Berasia Road

KEEP YOUR TRUST 

Posted Date : 6/21/2011

"It takes years to build up trust, and only seconds to destroy it."

 

priya tiwari   (XII)

Red Rose Berasia Road

THE POWER OF POSITIVE 

Posted Date : 6/21/2011

* feeling great about yourself and what you can achieve * feeling the flush of success and achievement * experience new freedom, dynamism and joy * having the power to choose your own path in life * being happier and healthier * achieving all the things you seek in life * attracting your perfect partner * being your ideal weight

 

SHWETA PARYANI   (XII)

Red Rose Berasia Road

Talents 

Posted Date : 6/21/2011

"There are two kinds of talents, man-made talent and God-given talent. With man-made talent you have to work very hard. With God-given talent, you just touch it up once in a while."

 

nikita verma   (XII)

Red Rose Berasia Road

Personal Time Management 

Posted Date : 6/20/2011

What is Personal Time Management? Personal Time Management is about controlling the use of your most valuable (and undervalued) resource. Consider these two questions: what would happen if you spent company money with as few safeguards as you spend company time, when was the last time you scheduled a review of your time allocation? The absence of Personal Time Management is characterized by last minute rushes to meet dead-lines, meetings which are either double booked or achieve nothing, days which seem somehow to slip unproductively by, crises which loom unexpected from nowhere. This sort of environment leads to inordinate stress and degradation of performance: it must be stopped. Poor time management is often a symptom of over confidence: techniques which used to work with small projects and workloads are simply reused with large ones. But inefficiencies which were insignificant in the small role are ludicrous in the large. You can not drive a motor bike like a bicycle, nor can you manage a supermarket-chain like a market stall. The demands, the problems and the payoffs for increased efficiency are all larger as your responsibility grows; you must learn to apply proper techniques or be bettered by those who do. Possibly, the reason Time Management is poorly practised is that it so seldom forms a measured part of appraisal and performance review; what many fail to foresee, however, is how intimately it is connected to aspects which do. Personal Time Management has many facets. Most managers recognize a few, but few recognize them all. There is the simple concept of keeping a well ordered diary and the related idea of planned activity. But beyond these, it is a tool for the systematic ordering of your influence on events, it underpins many other managerial skills such as Effective Delegation and Project Planning. Personal Time Management is a set of tools which allow you to: # eliminate wastage # be prepared for meetings # refuse excessive workloads # monitor project progress # allocate resource (time) appropriate to a task~s importance # ensure that long term projects are not neglected # plan each day efficiently # plan each week effectively

 

lokesh   (XII)

Red Rose Berasia Road

What is LIFE 

Posted Date : 4/26/2011

Life is an opportunity, benefit from it. Life is beauty, admire it. Life is bliss, taste it. Life is a dream, realize it. Life is a challenge, meet it. Life is a duty, complete it. Life is a game, play it. Life is a promise, fulfill it. Life is sorrow, overcome it. Life is a song, sing it. Life is a struggle, accept it. Life is a tragedy, confront it. Life is an adventure, dare it. Life is luck, make it. Life is too precious, do not destroy it. Life is life, fight for it.

 

nikita verma   (XII)

Red Rose Berasia Road

Garden of friendship 

Posted Date : 4/26/2011

The Garden Of Friendship The garden of friendship is always in bloom whatever the season or day With flowers to cheer us though sunshine and rain lovely blooms to brighten our way.

 

priya tiwari   (XII)

Red Rose Berasia Road

Management 

Posted Date : 4/19/2011

management information system (MIS) is a system that provides information needed to manage organizations effectively. [1] Management information systems involve three primary resources: technology, information, and people. It~s important to recognize that while all three resources are key components when studying management information systems ... the most important resource is people. Management information systems are regarded to be a subset of the overall internal controls procedures in a business, which cover the application of people, documents, technologies, and procedures used by management accountants to solve business problems such as costing a product, service or a business-wide strategy. Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization.[2] Academically, the term is commonly used to refer to the group of information management methods tied to the automation or support of human decision making, e.g. Decision Support Systems, Expert systems, and Executive information systems.[2] Contents [hide] 1 Overview 2 Types of information management systems 3 See also 4 References 5 External links [edit] Overview Initially in businesses and other organizations, internal reporting was made manually and only periodically, as a by-product of the accounting system and with some additional statistic(s), and gave limited and delayed information on management performance. Previously, data had to be separated individually by the people as per the requirement and necessity of the organization. Later, data was distinguished from information, and so instead of the collection of mass of data, important and to the point data that is needed by the organization was stored. Earlier, business computers were mostly used for relatively simple operations such as tracking sales or payroll data, often without much detail. Over time, these applications became more complex and began to store increasing amount of information while also interlinking with previously separate information systems. As more and more data was stored and linked man began to analyze this information into further detail, creating entire management reports from the raw, stored data. The term "MIS" arose to describe these kinds of applications, which were developed to provide managers with information about sales, inventories, and other data that would help in managing the enterprise. Today, the term is used broadly in a number of contexts and includes (but is not limited to): decision support systems, resource and people management applications, Enterprise Resource Planning (ERP), Supply Chain Management (SCM), Customer Relationship Management (CRM), project management and database retrieval applications. An ~MIS~ is a planned system of the collection, processing, storage and dissemination of data in the form of information needed to carry out the management functions. In a way, it is a documented report of the activities that were planned and executed. According to Philip Kotler "A marketing information system consists of people, equipment, and procedures to gather, sort, analyze, evaluate, and distribute needed, timely, and accurate information to marketing decision makers."[3] The terms MIS and information system are often confused. Information systems include systems that are not intended for decision making. The area of study called MIS is sometimes referred to, in a restrictive sense, as information technology management. That area of study should not be confused with computer science. IT service management is a practitioner-focused discipline. MIS has also some differences with ERP which incorporates elements that are not necessarily focused on decision support. The successful MIS must support a business~s Five Year Plan or its equivalent. It must provide for reports based upon performance analysis in areas critical to that plan, with feedback loops that allow for titivation of every aspect of the business, including recruitment and training regimens. In effect, MIS must not only indicate how things are going, but why they are not going as well as planned where that is the case. These reports would include performance relative to cost centers and projects that drive profit or loss, and do so in such a way that identifies individual accountability, and in virtual real-time. Anytime a business is looking at implementing a new business system it is very important to use a system development method such as System Development Life Cycle. The life cycle includes Analysis, Requirements, Design, Development, Testing and Implementation. [edit] Types of information management systems There are many types of information management systems in the market that provide a wide range of benefits for companies. Strategic information management system, customer relation management systems and enterprise resource planning systems are some of them. The following are some of the benefits that can be attained for different types of information management systems.[4] Advantages of information management systems (1) The company is able to highlight their strength and weaknesses due to the presence of revenue reports, employee performance records etc. The identification of these aspects can help the company to improve their business processes and operations. (2) The availability of the customer data and feedback can help the company to align their business processes according to the needs of the customers. The effective management of customer data can help the company to perform direct marketing and promotion activities. (3) Information is considered to be an important asset for any company in the modern competitive world. The consumer buying trends and behaviors can be predicted by the analysis of sales and revenue reports from each operating region of the company. [edit] See also Bachelor of Computer Information Systems Computing Management Business Intelligence Business Performance Management Business rules Data Mining Predictive analytics Purchase order request Enterprise Information System Enterprise Architecture Information technology governance Information technology management Knowledge management Management by objectives Online analytical processing Online office suite Information Technology [edit] References ^ http://www.occ.treas.gov/handbook/mis.pdf ^ a b O’Brien, J (1999). Management Information Systems – Managing Information Technology in the Internetworked Enterprise. Boston: Irwin McGraw-Hill. ISBN 0071123733. ^ Kotler, Philip; Keller, Kevin Lane (2006). Marketing Management (12 ed.). Pearson Education. ^ Pant, S., Hsu, C., (1995), Strategic Information Systems Planning: A Review, Information Resources Management Association International Conference, May 21-24, Atlanta. [edit] External links Computer and Information Systems Managers (U.S. Department of Labor) Index of Information Systems Journals MIS Web sites (Bournemouth University) MIS Links (University of York) Executive Information Systems: Minimising the risk of development Retrieved from "http://en.wikipedia.org/wiki/Management_information_system" Categories: Business software | Information systems | Decision theory | Information technology management | Management systems Hidden categories: Wikipedia articles needing style editing from January 2011 | All articles needing style editing

 

mohit   (XII)

Red Rose Berasia Road

My thoughts 

Posted Date : 4/18/2011

*write yourinjuries in dust,your benefits in marble. *I never remember feelings tired by work, trough idleness exhausts me completely. *We should be too big togive an offense and too noble toooogive it. *The soul never thinks without a picture. *Sincerity and truth are the basis of every virtue.

 

Shubham Sahu   (XII)

Red Rose Berasia Road

A good thought 

Posted Date : 4/18/2011

We should be too big to take offense and noble to give it.

 

prashant maithil   (XII)

Red Rose Berasia Road

Feflection OF LIGHT 

Posted Date : 4/18/2011

. REFLECTION OF LIGHT www.citycollegiate.com When light rays traveling is a medium reaches the boundary of other medium, they turn back to the first medium. This phenomenon of turning back of light into the same medium after striking the boundary of other medium is called Reflection of Light. LAWS OF REFLECTION www.citycollegiate.com 1. The angle of incident is equal to the angle of reflection i.e.

 

sana   (XII)

Red Rose Berasia Road

Facts about diagnosing human eyes 

Posted Date : 4/12/2011

As wondrous as it is, the human eye is not without its flaws. It is an imperfect optical system that suffers from a wide array of aberrations, or defects, that have varying impacts on the quality of vision. Like fingerprints, each person’s eye, and its aberrations, is unique. Lower-order aberrations including sphere, cylinder and axis of rotation (astigmatism) are measured using standard ophthalmic instrumentation that has existed for decades. In most cases, these visual defects can be corrected with optical or surgical corrections that provide an acceptable result in terms of patient comfort and visual acuity. Higher-order aberrations, which may account for as much as 20% of the total defects in the eye’s optical system and that are generally regrouped under the “irregular astigmatism” diagnosis, are impossible to diagnose with traditional ophthalmic devices including ophthalmoscopes, retinoscopes or optometers. Although many patients can still achieve perfect visual acuity (20/20), even when these aberrations remain uncorrected, common symptoms including comet, halo and starburst effects can have an important effect on the overall quality of vision. Imagine Eyes’ irx3™ Wavefront Aberrometer overcomes the limitations imposed on less sophisticated diagnostic equipment by applying a completely different approach to ophthalmic diagnosis. By measuring the patient’s entire optical system in one procedure, the irx3 not only provides basic ophthalmic data typically used in prescribing optical corrections but equally an abundance of detailed data on the ensemble of the aberrations present and their effect on the patient’s vision. This data is not only essential for prescribing corrections but also for qualifying patients for different types of optical or surgical corrections. When corrections are applied, especially surgical corrections, comparing the results to the precorrected state is a difficult task. The irx3 can measure with optical or surgical corrections in place, thereby allowing the practitioner to compare the pre and post-corrected results. Even more, the irx3’s proprietary wavefront accommodation assessment allows clinicians to dynamically and objectively evaluate the effectiveness of corrections for presbyopic patients. Correcting for complex aberrations can be a difficult and time-consuming task for both practitioner and patient. Even more, perfect correction does not always mean perfect patient comfort. Oftentimes, doctors must chose to under or overcorrect certain defects in order to provide the patient with optimal visual comfort. The crx1™ Adaptive Optics Visual Simulator is the first in a new generation of adaptive optics phoropters that will revolutionize the way doctors treat both commonplace and complex ocular deficiencies by allowing them to simulate the visual outcome of various corrections before applying them. Retinal diseases are considered a major public health issue. In the US alone, there are over 7 million people that suffer from various forms of retinopathy including diabetic retinopathy, retinitis pigmentosa, macular degeneration and others. Diagnosing and treating retinal pathologies has been a arduous task, largely because of the fact that the eye is an imperfect optical medium that makes obtaining detailed, high-resolution, in vivo images of the retina extremely difficult. Recently, a team of scientists using Imagine Eyes’s adaptive optics technology in combination with OCT techniques were able to acquire exceptional high-resolution, three-dimensional images of retinal microstructures that were, until then, only visible via ex vivo microscopic examination. The leap from diagnosing retinal pathologies to effectively treating them is long. Currently, the major problem revolves around the fact that the focal point of surgical lasers is too large to avoid damaging the healthy tissue in proximity to the diseased cells. In addition to providing doctors the tools they need to visualize the living retina, Imagine Eyes’ technology will, in the future, enable surgical laser manufacturers to reduce the size of the laser’s focal point to that of a single cell. For the first time, doctors will be able to precisely select the cells to be treated while leaving the surrounding healthy tissue intact. Please visit the products section of our website to learn more about how Imagine Eyes is helping to advance eye care. For more information on our products, please browse the products menu on the left, or contact us by telephone at +33 (0)1 64 86 15 66 or by e-mail or by e-mail by clicking here.

 

aman   (X)

Red Rose Trilanga

New one~s 

Posted Date : 4/11/2011

"Time is of no account with great thoughts, which are as fresh to-day as when they first passed through their authors~ minds ages ago."

 

rishabh soni   (XII)

Red Rose Berasia Road

Some article~s 

Posted Date : 4/11/2011

"We are what we repeatedly do. Excellence, therefore, is not an act but a habit" "Keep your friends close, but your enemies closer."

 

rishabh soni   (XII)

Red Rose Berasia Road

SCHOOL LIFE 

Posted Date : 4/11/2011

At school we are taught to read, write, and do some arithmetic, which is like math. We need to learn this because then we can read the bible, write letters to people and keep track of our amount of money. Our town is considered lucky to have a schoolhouse because most towns don’t have one. If we didn’t have a school our parents would teach us some things. Then we would probably have the same job that our father has when we grow up. The schoolhouse consists of one room and one teacher. We use the room as a place to learn and in the winter we eat inside and in the summer we eat outside. A wooden stove heats the room and we have to bring in a log to put on the fire. The kids that are in the classroom are from the ages of six to twelve. We all have to learn our lessons by repeating them over and over--boring. This way helps us remember the lessons better. We learn from a hornbook. It looks like a wooden paddle with a paper attached to it with letters, numbers and maybe a verse from the bible on the paper, I am able to hold it in my hand so it is pretty small. My verse is from John 3:16.

 

harshit mahor   (XII)

Red Rose Berasia Road

Success 

Posted Date : 4/8/2011

“Don~t wait until everything is just right. It will never be perfect. There will always be challenges, obstacles and less than perfect conditions. So what. Get started now. With each step you take, you will grow stronger and stronger, more and more skilled, more and more self-confident and more and more successful.”

 

priya tiwari (XII)

Red Rose Berasia Road

How to Identify PC Motherboard Fuses 

Posted Date : 4/2/2011

the fuses on a motherboard are devices that protect it from electric currents that are too powerful. Each fuse contains a piece of metal inside of itself that melts when the electric current becomes to strong, which stops the electricity from flowing. Motherboards use special fuses called polymeric positive temperature coefficient thermistors; in English, this translates into "a fuse that will reset itself." These fuses protect the motherboard from frying every time a larger amount of electricity surges through the computer power supply Instructions:- hings you~ll need: * Antistatic wrist wrap * Screwdriver 1. * 1 Put on your antistatic wrist wrap. If you wish to check the motherboard fuses and not use an antistatic wrist wrap, touch a grounded piece of metal, such as a doorknob. Move the computer to a place with no carpet flooring. This will protect your motherboard from static electricity. * 2 Turn off your computer and unplug the power cable from the back. * 3 Take your screwdriver and unfasten the screws that are holding up the left side panel on the back of your PC. Remove the side panels. * 4 Lay the computer on its right side. * 5 Look at the motherboard and locate the motherboard fuses; they appear as two metal connectors, which are soldered onto the motherboard, connected by a small bridge, which is the actual fuse. The metal connectors will most likely be a silver color, and the connector will be white. The fuses on a motherboard are never larger than a few millimeters

 

aniket chiroliya (XII)

Red Rose Berasia Road

Environment 

Posted Date : 3/26/2011

As our lifestyles become more ~developed~ by the day, so does the damage we do to the environment. Our every move, from watching television, to working at a computer, to taking a flight to our favourite holiday destination harms the environment in one way or the other. Air and water pollution levels are increasing world over by the day. Available information shows that more than 700,000 children under five die from diarrhea in India alone. Never before has the need to use alternative resources, such as wind, solar and nuclear energy been so high. A good time to start would be now!

 

SUPRIYA   (XI)

Red Rose Berasia Road

Career options after 10+2 

Posted Date : 3/26/2011

Are you appearing for your class 12th exam or waiting for the results? Time has come for you to decide over your career. A concrete plan about your future needs to be drawn at this juncture which will in turn determine the course of your professional life. These are the initial year to shape your career. Stiff competition and plenty of options make students confused. To weed out the thorns of confusion, first you need to analyze your interest, hobby, inclination, potentiality and opportunities. It is often said that if you choose your career based on your interest and hobby, the success rate as well as satisfaction level will be very high. As Darwin said “Survival of the fittest”. Do not choose any career under the influence of friends or parents. Give priority to your potential and interest. It should be the sole criteria of selecting a career. Choose your career on the basis of following aspects keeping in mind. • Area of interest • Personality • Aptitude • Assess your strength and weakness. • Skills • Possibility and Opportunities. • Capability • Feasibility and guidance • Nature of work • Financial aid and scholarship Apart from this, now is the time of specialization. In the coming years, a majority (85%) of new jobs will require people with some education and training. So always pay heed to specialized education rather than simple and theoretical. A little bit training or practical education would be a shot in the arm. NNE below has discussed about the various career option available. Career in Management Stream Business management is today one of the most sought-after careers. For aspirant in the employment market, this has opened limitless opportunity in diverse spheres with the promise of rewards in the form of good remuneration, status and scope for professional and personal growth. Moreover, in this achievement-oriented profession where results count more than year of experience, bright and hardworking young people can rise to top positions fairly quickly. Areas of work Personal Management or Human Resources Development Finance Production and Operation Sales and Marketing Management Information Systems There are also some special areas for work in business management that is a particular type of business management. International Management - deals in all areas of international trade and business. Operational Research - using mathematical analysis for solving financial and production problems. Technology Management - specializes in all aspects of technology, including financing and marking. Management Consultancy - responsible for identifying and correcting problems concerned company policies, procedures and methods. Public System Management – deals with management of public enterprises, non-government organization and cooperatives. Hospital Management – deals with the efficient running of hospitals and health care organizations. Hotel Management - concentrates on all aspects of hospitality and hotel administration. Rural Management - utilizing management practices for managing agro-based and other village industries as also marketing rural products. Forest Management - Responsible for handling the administration and marketing of forest-related projects and products for forest development. Disaster Management - this comes into action during the times of natural calamities and disasters and is involved with reconstructing and rehabilitating disaster-stricken people and managing relief materials and other resources. Leisure & Event Management – deals with the management of leisure-related activities, clubs, parks and events. Career in Computers & IT If you have not scored well in your class XII you need not worry because lots of options are available nowadays for the career. Poor performance in Class XII can’t restrict you to enter into higher studies or professional courses. Does Computer sound interesting to you? Of late, computers have become part and parcel of our daily life. From schools to workplaces, it has claimed a dominant position because of its many useful functions. Computers allow people with disabilities to lead a normal life and can work from home. It also allows companies to keep large amounts of information at finger tips. Without computer, the globalization would not have come into existence because it is one of the most important tools of globalization. So if computer intrigues or arouses curiosity then you can opt for computers as your career destination after doing 12. Computers have lot of scope ranging from data entry operator to the software engineer, from web designing to web developing and so on. Several professionals as well as undergraduate and postgraduate courses are offered in computers and IT by noted institutions as well as other private institutes across the country. Career in Engineering If the intricacy of number thrills you, the calculation of physics interests you and experiments of chemistry ignite your mind to create something new, then engineering is the right prospect for you after 10+2. Engineering is one of the most preferred career options after 10+2. Most of the students having 10+2 degree with Physics, Chemistry and Mathematics opt for engineering as their career option. Most preferred simply means more rush! So if you have already decided to go for engineering, you need to have stern command over mathematics, physics and chemistry as these are prerequisites to get into engineering college. In addition to the above requirement, you need to secure 60% marks in 10+2 to get into elite IITs. But if you have not secured 60% marks in intermediate examination, then you need not to worry because we have several options beyond IITs. Several other competitive exams like AIEEE, DCE, BCECE and various state level competitive examinations are conducted in our country for the engineering aspirants to get admission into B.Tech, B.E, B.Arch courses which are offered by various noted engineering colleges. If you want to crack the nuts of engineering examination, you need to work hard like swine searching for food in the field, dedication of a lover to his beloved and devotion of a priest. If you are blessed with all these, then engineering is not far away from your grip. While choosing the engineering as a career the few things that one needs to keep in mind are Do I have the interest in mathematics, physics and chemistry? Do I have the thorough understanding of these subjects and will I be able to clear all the engineering papers and complete my course in the prescribed 4 years. Engineering is a combination of mathematics, science and creativity. This combination has resulted into the solution of several complex problems in our day-to –day life ranging from wheels to aircraft~s. Engineering can also be defined as an art of relating scientific and mathematical principles to make things that benefit people. Engineering is the process of producing a technical product or system to meet a specific need. Engineers use maths, science, creativity and design to solve problems and improve lives. So it’s very important for you to be a good hand in mathematics and science. Career In Medical Class 12 exams are over and you are planning for your further studies. If you have Physics, Chemistry and Biology in class XII then medical studies is apt and appropriate for you because it is considered as one of the hot and demanding career after 10+2. Medical science is a branch of science deals with health which keeps the disease at bay. Medical Science is one of the highly respected careers after 10+2. It is a career that gives you both name and fame. If you are willing to get admission into MBBS course you need to have subjects like Physics, Chemistry and Biology (PCB) at 10+2 level as the eligibility. Being among one the noble professions, lots of students aspire to become a doctor after 10+2. So, if you have decided to get into a medical college you need to appear for an entrance exam conducted by several regulatory bodies including CBSE. Entrance examination is also conducted by the All Indian Institute of Medical Sciences (AIIMS), Armed Forces Medical Colleges (AIFMC) noted among medical colleges. If you do not get into MBBS course then need not to worry. Various other options are available for you such as dentistry, Ayurvedic, Animal Husbandry, homeopathy and other allied branches of medical science. Distance Education With changing times, regular colleges are no longer the only option to pursue higher studies. A student can opt for various courses through correspondence as well as Distance Education. There are few important aspects, which should be considered before starting the expedition for further studies. If you want to enhance your educational or professional skills but cannot devote full time to it If you are working, and want to study side by side If you want to do additional/ full time courses along with your studies Do you want to seek experience along with your studies? Do you need an immediate job along with your studies due to some family crisis? If any of the above mentioned questions have an affirmative reply but do not know what to do then Distance education is all what you need. Vocational Courses The changing face of technology has increased the demand of specialization in education. Vocational Education training (VET) institutes impart specialized and practical knowledge to the student and help them become independent and successful in life. Vocational education training institutes impart graduation and post graduation courses to students. The best part of the institute is that even working student can join the course, and even select the timings as per their convenience and nature of job. The vocational institutes allow the students to study online and attend either evening or morning classes. Moreover, financial aid is provided to students who are economically weak. Paying for education can be unaffordable for many. These days school fee is found to be skyrocketing. This deprives children from getting their primary education. But with the change in time and attitude these children are taken care of and are left with wider option of vocational education. There was a time when people were superstitious letting their children get into vocational education program. They considered their association with vocation education will degrade their status in society as only low strata children studied there. But with the change in time, the attitude of people is changing. They look for business specialization training program and the vocational program dealt with such options, and gave a better chance to the children. The faculty of these Vocational education training institutes is highly experienced. They impart practical knowledge to their students. As a result the students are able to have a real life and practical industry experience. The students are also provided with internships. They are also provided with stipend for their internships. This gives motivation to perform better and excel in their jobs. There are various vocational education training located in the country. In fact, every state has vocational institutes where the residents of the place can earn the degrees and become part of a specialized workforce. The vocational course offered can range from culinary arts, bartending, becoming a massage expert, cook to graphic designer, pottery, dyeing expert, nursing, business administrator, restaurant and management These days with the rage of technology, the vocational program is more technically oriented as it ranges from Web Designing to Information Technology. The other vocational courses that are included in the vocational course are business, accounting, fashion designing and animation. Majority of these training institutes work as per the rules and regulations of state education department. It is the education department of state or the central government that grants recognition to a training institute.

 

kanchan wadhwani (XII)

Red Rose Berasia Road

School quots

Posted Date : 3/26/2011

The difference between school and life? In school, you~re taught a lesson and then given a test. In life, you~re given a test that teaches you a lesson.”

 

priya tiwari   (XII)

Red Rose Berasia Road

List of New IIMs, IITs, NITs, IIITs and AIIMS 

Posted Date :3/26/2011

IIT Bhuvaneshwar (under IIT Kharagpur): Branches offered: Civil, Electrical, Mechanical IIT Gandinagar (under IIT Mumbai) Branches offered: Chemical, Electrical, Mechanical IIT Hyderabad (under IIT Madras) : Branches offered: Computers, Electrical, Mechanical IIT Indore (under IIT Bombay) : Branches offered: Computers, Electrical, Mechanical IIT Kota (under IIT Kanpur) : Branches offered: Computers, Electrical, Mechanical IIT Mandi (HP) (under IIT Roorkee): Branches offered: Computers, Electrical, Mechanical IIT Patna (under IIT Guwahati): Branches offered: Computers, Electrical, Mechanical IIT Ropar (under IIT Delhi): Branches offered: Computers, Electrical, Mechanical Old IITs

 

hansa balani(XII)

Red Rose Berasia Road

Positive thinking 

Posted Date :3/26/2011

An open and positive mind is not only open to ideas on how to improve life, it enables you actually use the mind to control your decisions so that you can achieve better results in life. A positive mind anticipates happiness, joy, health and success. When the mind anticipates these things, that person will make decisions based on these expectations.

 

nikita verma (XII)

Red Rose Berasia Road

RANGPANCHAMI 

Posted Date :  3/22/2011

IMAGE OF RANG PANCHAMI

 

RIYA SHARMA (VIII)

Red Rose Trilanga

RANG PANCHAMI 

Posted Date : 3/22/2011

RANG PANCHAMI IT IS CELEBRATED ON FIFTH DAY IN THE DARK FORTNIGHT OF THE HINDU LUNAR MONTH PHALGUN BY THROWING A RED,FRAGRANT POWDER GULAL AND SPLASHING COLOURED WATER,ETC ON OTHER. THE FIRE WHICH SPINES WITH ITS BRILLIANCE ON HOLI,DECOMPOSES THE RAJA-TAMA PARTICLES IN THE ATMOSPHERE AND THIS HELPS ACTIVATE VARIOUS DEITIES IN THE FORM OF COLOURS IN THE AIR.RANG PANCHAMI IS THE SYMBOL OF VICTORY OVER RAJA-TAMA.IT PURPOSE IS TO ACTIVATE THE FIVE ELEMENTS OF RADIANT MANIFEST COLOUR AND TO TOUCH AND FEEL THE DIETIES WHO ARE ATTRACTED TO THE ESPECTIVE COLOUR.RANG PANCHAMI IS THE WORK SHIP OF THE SAVIOUR FORM OF THE DIETIES,-A SCHOLAR LET US STOP IMMORAL PRACTICE DURING RANG PANCHAMI AND PROTECTS DHARMA:- * DO NOT APPLY COLOURS FORCIBLE. * STOPS BEGGERS FROM WEARING MASKS OF DIETIES. * DO NOT USE HARMFUL CHMICAL COLOURS

 

RIYA SHARMA (VIII)

Red Rose Trilanga

I LUV MY SCHOOL LIFE DUDE..........! 

Posted Date : 3/22/2011

school life is jst like heaven n it can not be get back so enjo ur school life as much as u can . enjoy days spent wid ur frnd , enjoy masti u do in school bt respect ur teachers......

 

aniket chiroliya (XII)

Red Rose Berasia Road

Celebrate Holi with colors: 

Posted Date :  3/17/2011

The winter leaves are making way for spring buds. Even the gods are charmed by the friendly mischief of the changing season that the festival of Holi signifies. A children~s special on Holi in India and its popularity among children. Articles on Holi customs and myths, cities famous for Holi revelry, e-cards, a Holi quiz and a craft activity on making natural Holi colours. This year Holi falls on March 9-10. Holi- The Colours of Spring The festival of colours marks the passing of winter and the onset of spring mischief - seen in the famous stick-beating Holi, the wet colour baths, wrestling... Read on ... Where Holi is the Talk of the Town In the day they treat figures of authority with irreverence and flock to the famous poet~s gathering in the evening where local politicians are the target of ~pun-ny~ verse - the people of Banaras can really be mischievous! Read on ... The Song of Hori or Happiness The people of Gokul had had a good crop. Winter was on its way out, the spring flowers were budding and it was a full moon day. And infant Krishna had arrived in local landlord Nand~s family. The notes of happiness, or Hori, were natural... Read on ... Holi is For Children Holi used to go on for 20 days in her village, reminisces the 65-year-old writer. A chariot procession before school-going time, a custom where the new daughter-in-law locked the elders in a room demanding compensation, and colours of course! Read on ... Holi~s Here! It~s known as the festival of colours and is made up of a fascinating mix of legends and celebrations from different parts of India. Care to follow the coloured trail? Read on ... Eco-friendly Holi Colours Synthetic colours have taken prominence over natural colours for they are readymade and easy to use. This time around, play Holi the traditional and ecological way - with flowers. Read on ... Holi Cards Send your greetings and best wishes this Holi through our special Holi e-cards. Read on ... Sharing is Good! Email this page Save to del.icio.us Digg this Share on Facebook Google bookmark Stumble it Fiction for Children Stories, folktales, poems, book reviews and more for children... Fiction for children Daily Quotes for Kids When asked by an anthropologist what the Indians called America before the white man came, and Indian said simply Ours. - Vine Deloria, Jr. More Quotes... Children~s Games Games for children of all ages. Some test your motor skills and reflexes; others require math or logic.... Children~s games

 

Harsh Parihar (IX)

Red Rose Trilanga

School 

Posted Date : 3/17/2011

A school is an institution designed for the teaching of students (or "pupils") under the supervision of teachers. Most countries have systems of formal education, which is commonly compulsory. In these systems, students progress through a series of schools. The names for these schools vary by country (discussed in the Regional section below), but generally include primary school for young children and secondary school for teenagers who have completed primary education. An institution where higher education is taught, is commonly called a university college or university. In addition to these core schools, students in a given country may also attend schools before and after primary and secondary education. Kindergarten or pre-school provide some schooling to very young children (typically ages 3–5). University, vocational school, college or seminary may be available after secondary school. A school may also be dedicated to one particular field, such as a school of economics or a school of dance. Alternative schools may provide nontraditional curriculum and methods. There are also non-government schools, called private schools. Private schools may be for children with special needs when the government does not supply for them; religious, such as Christian schools, hawzas, yeshivas, and others; or schools that have a higher standard of education or seek to foster other personal achievements. Schools for adults include institutions of corporate training, Military education and training and business schools. In homeschooling and online schools, teaching and learning take place outside of a traditional school building.

 

Kushagra Shukla (V)

Red Rose Trilanga

Times of india  

Posted Date : 3/16/2011


Yusuf Pathan & the disorder withinRELATED: No practice for Team India India~s problems and solutions Ashwin likely to play against West Indies Batsmen didn~t play for country, says Dhoni Bopanna-Qureshi stun Paes-BhupathiRELATED: New wave of young guns excites Federer Federer enters Indian Wells fourth round Wozniacki enters Indian Wells quarterfinals Jankovic~s title defence ended by Ivanovic South Africa thump Ireland by 131 runsRELATED: Statistical highlights Scorecard: S Africa vs Ireland Match in Pics: SA vs Ire ~Done with first part of our job~ Jeev~s coach forced to remove turban Oz spinners to prove worth vs Canada Australian spinners have struggled so far and they would be keen to prove their worth when they meet Canada in their penultimate Group A match Yusuf Pathan & the disorder within Yusuf Pathan~s great knocks have all come when he has batted at no. 6 or lower and the think-tank needs to consider that before thinking about promoting him. Bopanna-Qureshi stun Paes-Bhupathi Indian pair Leander Paes and Mahesh Bhupathi were stunned by India~s Rohan Bopanna and his Pakistani partner Aisam-ul-Haq Qureshi in Indian Wells event

 

Harsh Parihar (IX)

Red Rose Trilanga

{ IMPOSSIBLE WORLD IS NOT IN MY DICTIONARY } 

Posted Date : 3/14/2011

1.If I aim at the Sun,I may target the Nakshtra. 2.There is difference between a sucessful man and othersnot by power and knowledge but lack of will power. 3.The guru who teaches one word is always great.There is nothing in this world to repay the guru.A pupil is always owed to the guru. 4.Do whatever you say.....then you will be confident. 5.Try to do good deed (work) everyday. 6.When you fix priorities,you achieve sucess. 7.A weak line destroys the whole chain.Have aview,Are you not that weak line. 8.If ruls are broken for a moment then the whole solar system(univers) would be ruined.

 

shriya namdeo (XI)

Red Rose Karond

INTERNATIONAL WOMEM~S DAY 

Posted Date :  3/14/2011

International Women~s Day (IWD), originally called International Working Women’s Day, is marked on march 8 every year. Nowadays this is a major day of global celebration of women. In different regions the focus of the celebrations ranges from general celebration of respect, appreciation and love towards women to a celebration for women~s economic, political and social achievements. Started as a Socialist political event, the holiday blended in the culture of many countries, primarily Eastern Europe, Russia, and the former Soviet bloc. In many regions, the day lost its political flavour, and became simply an occasion for men to express their love for women in a way somewhat similar to a mixture of Mother~s Day and St Valentine~s Day. In other regions, however, the original political and human rights theme designated by the United Nations runs strong, and political and social awareness of the struggles of women worldwide are brought out and examined in a hopeful manner

 

DEEKSHA CHATURVEDI (XI)

Red Rose Karond

Haloalkanes 

Posted Date : 3/14/2011

Haloalkanes / Alkyl halides Nomenclature Formula 3D structure Functional group suffix = halide (i.e. fluoride, chloride, bromide, iodide) Substituent name = halo- (i.e. fluoro, chloro, bromo, iodo) Structural unit : haloalkanes contain R-X where X = F, Cl, Br, I etc. Notes : * Haloalkanes can also be named as alkyl halides despite the fact that the halogens are higher priority than alkanes. * The alkyl halide nomenclature is most common when the alkyl group is simple. You do not have Java applets enabled in your web browser. Install the Java Runtime Environment from www.java.com and/or enable Java applets in your web browser preferences. Haloalkane style: * The root name is based on the longest chain containing the halogen. * This root give the alkane part of the name. * The type of halogen defines the halo prefix, e.g. chloro- * The chain is numbered so as to give the halogen the lowest possible number Alkyl halide style: * The root name is based on the longest chain containing the halogen. * This root give the alkyl part of the name. * The type of halogen defines the halide suffix, e.g. chloride * The chain is numbered so as to give the halogen the lowest possible number. Haloalkane style: * Functional group is an alkane, therefore suffix = -ane * The longest continuous chain is C3 therefore root = prop * The substituent is a chlorine, therefore prefix = chloro * The first point of difference rule requires numbering from the right as drawn, the substituent locant is 1- 1-chloropropane haloalkane CH3CH2CH2Cl Alkyl halide style: * The alkyl group is C4, it~s a tert-butyl * The halogen is a bromine, therefore suffix = bromide tert-butyl bromide Haloalkane style: * Functional group is an alkane, therefore suffix = -ane * The longest continuous chain is C3 therefore root = prop * The substituent is a bromine, therefore prefix = bromo * There is a C1 substituent = methyl * The substituent locants are both 2- 2-bromo-2-methylpropane haloalkane (CH3)3CBr Haloalkane style: * Functional group is an alkene, therefore suffix = -ene * The longest continuous chain is C4 therefore root = but * The substituent is a bromine, therefore prefix = bromo * Since bromine is named as a substituent, the alkene gets priority * The first point of difference rule requires numbering from the left as drawn to make the alkene group locant 1- * Therefore the bromine locant 4- 4-bromobut-1-ene CH2=CHCH2CH2Br

 

kshipra (XII)

Red Rose Berasia Road

Reflection of light 

Posted Date : 3/14/2011

eflection is the change in direction of a wavefront at an interface between two different media so that the wavefront returns into the medium from which it originated. Common examples include the reflection of light, sound and water waves. The law of reflection says that for specular reflection the angle at which the wave is incident on the surface equals the angle at which it is reflected. Mirrors exhibit specular reflection. In acoustics, reflection causes echoes and is used in sonar. In geology, it is important in the study of seismic waves. Reflection is observed with surface waves in bodies of water. Reflection is observed with many types of electromagnetic wave, besides visible light. Reflection of VHF and higher frequencies is important for radio transmission and for radar. Even hard X-rays and gamma rays can be reflected at shallow angles with special "grazing" mirrors. Contents

 

NEHA THAKUR (XII)

Red Rose Berasia Road

Holi 

Posted Date : 3/14/2011

There was once a demon king by the name of Hiranyakashyap who won over the kingdom of earth. He was so egoistic that he commanded everybody in his kingdom to worship only him. But to his great disappointment, his son, Prahlad became an ardent devotee of Lord Naarayana and refused to worship his father. Hiranyakashyap tried several ways to kill his son Prahlad but Lord Vishnu saved him every time. Finally, he asked his sister, Holika to enter a blazing fire with Prahlad in her lap. For, Hiranyakashyap knew that Holika had a boon, whereby, she could enter the fire unscathed. Treacherously, Holika coaxed young Prahlad to sit in her lap and she herself took her seat in a blazing fire. The legend has it that Holika had to pay the price of her sinister desire by her life. Holika was not aware that the boon worked only when she entered the fire alone. Prahlad, who kept chanting the name of Lord Naarayana all this while, came out unharmed, as the lord blessed him for his extreme devotion. Thus, Holi derives its name from Holika. And, is celebrated as a festival of victory of good over evil. Holi is also celebrated as the triumph of a devotee. As the legend depicts that anybody, howsoever strong, cannot harm a true devotee. And, those who dare torture a true devotee of god shall be reduced to ashes.

 

Kushagra Shukla (V)

Red Rose Trilanga

BOOK READING A GREAT HOBBY 

Posted Date : 3/12/2011

CHAPTER 1 BACK-END, FRONT-END AND THEIR APPLICATION CHAPTER 1 BACK-END, FRONT-END AND THEIR APPLICATION FRONT END Front end software are basically GUI software created for user friendly data entry. A "front-end" application is one that application users interact with directly. Front-end is always graphical system that’s why it is more users friendly. 1) For software applications, front end is the same as user interface. (2) In client/server applications, the client part of the program is often called the front end and the server part is called the back end. (3) Compilers, the programs that translate source code into object code, are often composed of two parts: a front end and a back end.

 

anshul (XII)

Red Rose Berasia Road

Objectives of front end back end apps. 

Posted Date :3/11/2011

Objctive type ques Q-1: Choose the correct Answers: (1) Back end is related to-? Ans-Database (2) Which is not type of tax-? Ans-Fees (3) Salary based accounting system is-? Ans-Payroll Accounting ___________________________________________________________ Q-2: Fill in the blanks: (1) Serial no. is always used for Invoice management system. (2) Graphics are the part of Front-end system (3) In client server system the server is called Back-end. ____________________________________________________________ Q-3: State True or False: (1) SYBASE is a Front end tool: False (2) HRD system deals the personal information of employees: True (3) Client server application is a Hardware concept: False ____________________________________________________________ Q-4: Match the column: (1TUI (a)Technical user Interface (2GUI (b)Graphical User Interface (3VB (c)Front end (4Tables (d)Back end

 

lavesh (XII)

Red Rose Berasia Road

State news 

Posted Date : 3/9/2011

# # Death toll in New Zealand earthquake hits 75, number expected to rise Feb 23, 2011 | Erin Criger, CityNews.ca Officials in heavily damaged Christchurch say 300 people are missing. Millard in Afghanistan: Desert diversion Mar 08, 2011 | Daren Millard Picture this: two American fighter jets and a Canadian Chinook helicopter are all in the air in closer proximity than... 100th anniversary of International Women’s Day Mar 08, 2011 | Shawne McKeown, CityNews.ca Events are being held around the city Tuesday and over the week.

 

vatsal balde (IX)

Red Rose Trilanga

City news 

Posted Date : 3/9/2011

1. Habs winger Pacioretty taken from ice on a stretcher after Chara hit Pacioretty was trying to get past the six-foot-nine defenceman when he was hit hard into the boards near the Boston players~ bench and went head-first into the glass partition between the benches with... 2. Guest manager Raheem Morris helps Rays to 3-2, 10-inning win over Blue Jays Justin Ruggiano singled with two outs in the bottom of the 10th inning to win it for the Rays. More Sports » Live Chats Special Feature CityNews.ca live chats An archive of our online live chats, held regularly on CityNews.ca. Mar 04, 2011 Read the full archive Feature Series Special Feature Toronto~s Timekeepers CityNews.ca went behind-the-scenes at three Toronto landmarks where time is of the essence. Mar 04, 2011 Read the full three-part series Daily Poll Poll What~s the biggest hurdle for women right now? * Pay equity * More presence in politics * Childcare * Increase positions of power in business * All of above * No issues

 

Harsh Parihar (IX)

Red Rose Trilanga

MY MOTHER 

Posted Date  :3/9/2011

MY MOTHER ACTS LIKE A PILLAR. SHE IS SO CARRYING AND SWEET. SHE FACE THE HUGE DIFFICULTIES. SHE IS LOVING WITH ME ALSO. AND SHE IS A GOOD FRIEND TOO.

 

shriya namdeo (XI)

Red Rose Karond

COURAGE 

Posted Date : 3/9/2011

IT NEED COURAGE TO BE HONEST WHEN ALL AROUND YOU ARE DISHONEST. IT NEED CORAGE TO SAY THE TRUTH WHEN ALL AROUND TELLS LIES.

 

AAKANSHA SAXENA (XI)

Red Rose Karond

Wealth had been the secret 2 happiness 

Posted Date : 3/4/2011

wealth had been the secret 2 happiness If Wealth Had Been The Secret 2 Happiness, Then The Rich Should Be Dancing On The Streets... Only Poor Kids Do That...! If Power Ensures Security , Then Officials Should Walk Unguarded. But Those Who Live Simply , Sleep Soundly...! If Beauty N Fame Bring Ideal Relationships, Then Celebrities Should Have The Best Marriages... Think About It Live Simply... Walk Humbly... Love Genuinely... ;->

 

Kartik (XII)

Red Rose Berasia Road

Prayer 

Posted Date : 3/1/2011

1. Pray is an Amazing Exchange. u handover Your Worries to ALLAH. & Allah handsover His Blessings to You Just keep Praying and Remember me too 2. A Man Asked A Sculptorist: “How Do You Make Such Beautiful Idols From Stone?” He Replied: “Idols & Images Are Already Hidden There… I Remove Unwanted Stone 0nly..!” Moral: Your HAPPINESS Is HIDDEN Within You, Just Remove Your W0RRIES! 3. When You Thought I Wasn’t Looking (Written By A Child) A Message Every Adult Should Read, Because Children Are Watching You And Doing As You Do, Not As You Say. When You Thought I Wasn’t Looking, I Saw You Hang My First Painting On The Refrigerator, And I Immediately Wanted To Paint Another One. When You Thought I Wasn’t Looking, I Saw You Feed A Stray Cat, And I Learned That It Was Good To Be Kind To Animals. When You Thought I Wasn’t Looking, I Saw You Make My Favorite Cake For Me And I Learned That The Little Things Can Be The Special Things In Life. When You Thought I Wasn’t Looking, I Heard You Say A Prayer, And I Knew There Is A God I Could Always Talk To And I Learned To Trust In God. When You Thought I Wasn’t Looking, I Saw You Make A Meal And Take It To A Friend Who Was Sick, And I Learned That We All Have To Help Take Care Of Each Other. When You Thought I Wasn’t Looking, I Saw.!!

 

Kartik (XII)

Red Rose Berasia Road

Republic Day 

Posted Date :  2/11/2011

On 26th Jan,1950,India became a democratec republic. Sence then,26th Jan celebated as Republic Day.It is celebrated with great pomp and show every year as national festivel.Several army,navy marching past,selute the national flag. In the evening,all bulding lighted.

 

Karan Bitode (VIII)

Red Rose Trilanga

Self-help 

Posted Date :  2/1/2011

Self-help is a great quality which is a gift of God. God helps those who help themselves. We should not depend upon others. Dependence makes us weak and submissive. Self-help begets self-respect in a man. Independent attitude makes a man confident. A man, who does not depend upon others, acquires fame and honour. He acquires faith in himself and hence has faith upon others. Things become easier to him. Such a man is honest and hard-working. Success is his gift from God. He has the power to face the world boldly. Self-help strengthens mind power. The people, who are self-dependent, are prosperous in life. We, therefore, should try to acquire self-dependency from our early childhood. Read more: http://www.bukisa.com/articles/195035_8-short-reflective-articles-for-school-students#ixzz1Ch8mugmB

 

Kushagra Shukla (V)

Red Rose Trilanga


THOUGHTS 

Posted Date : 2/1/2011 

THOUGHTS @: The first and most important step towards success is the feeling that we can succeed . @: To accomplish great things,we must not only act,but also dream not only plan ,but also believe. @: "Most of the important things in world have been accomplished by people who have kept on trying when there seemed to be no help at all." @: "Good things come to those who wait." @: "Roots of success are formed through hard work.

 

karina daxa (IX)

Red Rose Trilanga

start menu 

Posted Date : 1/31/2011

This article describes the Start menu in Microsoft Windows XP. MORE INFORMATION Windows XP includes a new Start menu to provide quick access to frequently used... Windows XP includes a new Start menu to provide quick access to frequently used programs and common system areas like My Computer, Control Panel, and Search. This article describes the function of the different areas of the new Start menu. The left side of the Start menu contains the programs list, which is divided into two sections, the "pinned list" (at the top) and the Most Frequently Used (MFU) list. The two sections are separated by a line. The functions of these lists are as follows: Pinned list: The pinned list allows users to place shortcuts to programs and other items in the Start menu. It will be pre-populated with the user~s default Web browser and e-mail program (these can be removed). A program (.exe file) or a shortcut to a program can be "pinned" to the Start menu by right-clicking the item and clicking Pin to Start Menu. Any other item can be added to the pinned list by dragging and dropping it to the Start button or the Start menu. An item can be removed from this list by right-clicking it and clicking Unpin from Start Menu or Remove from This List. The order of the items in this list can be arranged by dragging and dropping them to the preferred position. NOTE: If the program or shortcut that was pinned to the Start menu is moved or deleted, the link to it on the Start menu will no longer work. MFU list: The list of most frequently used programs (MFU list) appears below the Pinned list on the Start menu. This list keeps track of how often programs are used and displays them in order of most used (top) to least used (bottom). Programs can be removed from this list by right-clicking them and clicking Remove from This List. The order of the items in this list cannot be manually arranged (they are arranged according to how often they are used). At the bottom of the MFU list is the All Programs menu, which displays other programs that are installed. To configure the settings for the Programs list, follow these steps: 1. Right-click an empty area in the Start menu and select Properties. 2. Click Customize. 3. Configuration options for the Programs list are on the General tab. The right side of the Start menu displays links to special folders (My Documents, My Pictures, My Music) and system areas (My Computer, Search, Control Panel). To configure this area, follow these steps: 1. Right-click an empty area in the Start menu and click Properties. 2. Click Customize. 3. Configuration options for the right side of the Start menu are on the Advanced tab. For additional information about the MFU list, click the article numbers below to view the articles in the Microsoft Knowledge Base: 282462 (http://support.microsoft.com/kb/282462/EN-US/ ) Programs Removed from the Most Frequently Used Programs List Can Reappear 282066 (http://support.microsoft.com/kb/282066/EN-US/ ) Frequently Used Programs Not Automatically Added to the Start Menu

 

yusuf (XII)

Red Rose Berasia Road

Program menu defination 

Posted Date : 1/25/2011

Definition noun a sub-menu, accessed from the Start button in Windows, that lists all the programs that are installed on the computer example

 

yusuf (XII)

Red Rose Berasia Road

Start menu defination 

Posted Date :1/25/2011 

The Start menu contains shortcuts to programs that are installed on the Windows operating system.] Examples: To make the Start menu appear, press the “Start” button on the taskbar or press the window key

 

yusuf (XII)

Red Rose Berasia Road


Indian Flag 

Posted Date : 1/24/2011

Republic Day 26 Jan

 

karina daxa (IX)

Red Rose Trilanga

MIRZA GHALIB 

Posted Date :  1/24/2011

MIRZA GHALIB was one of those geniuses, who themselves suffered throughougt their lives from hardship ant wants but gave instead to the world ,raregams of poetic flights which will ever go on entertaining the lovers of poetry with their sweet , musical and wistful flights of imagination. The real name of Mirza Ghalib was Azad Ullah Khan .Mirza Ghalib was his pen name under which is used to write and become famous.

 

aartiyadav (IX)

Red Rose Trilanga

Where in your body are a Quater of all your bones ? 

Posted Date :1/24/2011 

A grown adult has 206 bones in his or her body. A quater of these are in the feet & ankle.Each foot & ankle has 26 bones , making a total down their of 52 bones in all - one four of the bones in your body.

 

karina daxa (IX)

Red Rose Trilanga

Life 

Posted Date : 1/24/2011

Every ones life starts with full bag of luck &an empty bag of experience . Trick is 2 fill the the bag of expirence be4 the luck runs out

 

karina daxa (IX)

Red Rose Trilanga

FRIENDSHIP 

Posted Date : 1/24/2011

All have different views on frienship. In my opinion a friendship is a relation in which two or more than two persons believe each other and share their feelings and if one needs someone for a support then the other is with him So always make good friends .

 

AAKANSHA SAXENA (XI)

Red Rose Karond

SQL command 

Posted Date : 1/17/2011 

create database book_record create table book_record

 

yusuf (XII)

Red Rose Berasia Road

DIWALI 

Posted Date : 1/12/2011

1. Our india have many festival.One of is diwali. 2. In diwali houses and shops are illuminated with lights and candles. 3. In this festival people purchase new clothes,crackers etc.

 

manoj bairagi (VII)

Red Rose Karond

COMPUTER 

Posted Date :1/12/2011 

1. A computer is an electronic machine. 2. It has many characteristics. 3. It works very fast than human body. 4. It has two parts: Hardware,software 5. It is collection of many softwares. 6. The first computer was made by Charls Babbage.

 

manoj dwivedi (VII)

Red Rose Karond

study tips for student !!! 

Posted Date : 1/8/2011

1. Read complete question paper. This should be the first step when you get question paper. Why? a. Many a times, question paper itself contains answers to some questions. b. If student sees many questions for which he can answer well, this adds to his confidence. At the same time, he can plan approximately how much time is to be allotted to answer each question. 2. Suppose a student finds that he can~t answer a few questions well. Don~t worry. Select the question for which you can answer well. Write this answer first. Always remember " First impression is the last impression". Once examiner reads this answer, he makes an opinion about student and this affects checking all the answers. 3. Keep equal margins from both the sides while writing answer-sheets. 4. Underline the headings. If examiner is in a hurry, he may read only headings and will come to know about student~s level.

 

RITU MATHUR (XII)

Red Rose Berasia Road

Positive thoughts 

Posted Date : 12/28/2010

Be strong enough to at least try to make your life better. Be confident enough to at least to make your life joyful. Be thankful for the difficult times.During those time you grow.

 

Smriti Singh (VI)

Red Rose Lambakheda

Merry Christmas 

Posted Date :12/25/2010 

MERRY CHRISTMAS TO ALL MY DEAR FRIENDS AND TEACHERS OF ALL THE BRANCHES OF RED ROSE GROUP OF SCHOOL.... MAY THIS CHRISTMAS CUMS WITH A GREAT LOVE N HAPPINESS IN ALL YOUR LIVES...TAKE CARE..!!!

 

aditya (X)

Red Rose Trilanga

Christmas 

Posted Date : 12/25/2010

Only in souls the Christ is brought to birth, And there He lives and dies. ---aditya shabani 10th trilanga

 

aditya (X)

Red Rose Trilanga

Merry christmas 

Posted Date :  12/24/2010

I have always thought of Christmas time, when it has come round, as a good time; a kind, forgiving, charitable time; the only time I know of, in the long calendar of the year, when men and women seem by one consent to open their shut-up hearts freely, and to think of people below them as if they really were fellow passengers to the grave, and not another race of creatures bound on other journeys. ----Aditya shabani trilanga 10th

 

aditya (X)

Red Rose Trilanga

Christmas Bells 

Posted Date : 12/23/2010

I heard the bells on Christmas Day Their old, familiar carols play, And wild and sweet The words repeat Of peace on earth, good-will to men! And thought how, as the day had come, The belfries of all Christendom Had rolled along The unbroken song Of peace on earth, good-will to men! Till, ringing, singing on its way The world revolved from night to day, A voice, a chime, A chant sublime Of peace on earth, good-will to men! Then from each black, accursed mouth The cannon thundered in the South, And with the sound The Carols drowned Of peace on earth, good-will to men! It was as if an earthquake rent The hearth-stones of a continent, And made forlorn The households born Of Peace on earth, good-willl to men! And in despair I bowed my head; ‘There is no peace on earth,’ I said; ‘For hate is strong, And mocks the song Of peace on earth, good-will to men!’ Then pealed the bells more loud and deep: ‘God is not dead; nor doth he sleep! The Wrong shall fail, The Right prevail, With peace on earth, good-will to men!’

 

Laey Maheshwari (XII)

Red Rose Trilanga

Advantages of democracy 

Posted Date : 12/22/2010

Democracy can provide for changes in government without violence. In a democracy, power can be transferred from one party to another by means of elections. The jurisdiction of the citizens of a nation determines its ruling authority. Moreover, any government is bound by an election term after which it has to compete against other parties to regain authority. This system prevents monopoly of the ruling authority. The ruling party has to make sure it works for its people for it cannot remain being the authority after completing its term unless re-elected by the people. This brings in a feeling of obligation towards the citizens. The ruling authorities owe their success in the elections to the citizens of the nation. This results in a feeling of gratefulness towards the people. It can serve as their motivation to work for the people for it is the common masses that have complete power over choosing their government. Another important advantage of democracy is that the people gain a sense of participation in the process of choosing their government. They get the opportunity to voice their opinions by means of electoral votes. This gives rise to a feeling of belongingness in the minds of the people towards their society.

 

Abhishek kumar (IX)

Red Rose Lambakheda

Spread of Education 

Posted Date : 12/22/2010

One of the most powerful positive effects of globalization on women and men both is the spread of education. Today, you can move in the search of the best educational facilities in the world, without any hindrance

 

ankit (IX)

Red Rose Lambakheda

What is Globalization? 

Posted Date : 12/22/2010

Let~s face it. People are moving from one country to another, the trade restrictions are reducing, domestic markets are opening up for foreign investments, telecommunications are better established and the countries that are leading the innovations are passing on their know-how to the countries who are not. In short, the people are no longer bound by territorial restrictions any more, getting the world closer. It~s no longer about ~my country and me~, it~s now more like, ~the world and us~. People are no longer bound by territorial restrictions-unless of course, there are security issues. The businesses are expanding, the horizons are widening, and the people are coming together to form one homogeneous unit - HUMANITY

 

SATYAM SINGH (IX)

Red Rose Lambakheda 

Inspire 

Posted Date :12/15/2010 

When it hurts to look back, and you~re scared to look ahead, You can look beside you And your best friend (me) will be there One man cried when He had no shoes, But he stopped crying when He saw a man without legs. Life is full of Blessings, Always try to understand it. If you miss an opportunity don’t fill your eyes with tears. It may hide yet another opportunity lying in front of you!

 

Kartik (XII)

Red Rose Berasia Road

Why a fall leaf changes color? 

Posted Date : 12/14/2010

We all enjoy the colors of autumn leaves. The changing fall foliage never fails to suprise and delight us. Did you ever wonder how and why a fall leaf changes color? Why a maple leaf turns bright red? Where do the yellows and oranges come from? To answer those questions, we first have to understand what leaves are and what they do. Leaves are nature~s food factories. Plants take water from the ground through their roots. They take a gas called carbon dioxide from the air. Plants use sunlight to turn water and carbon dioxide into oxygen and glucose. Oxygen is a gas in the air that we need to breathe. Glucose is a kind of sugar. Plants use glucose as food for energy and as a building block for growing. The way plants turn water and carbon dioxide into oxygen and sugar is called photosynthesis. That means "putting together with light." A chemical called chlorophyll helps make photosynthesis happen. Chlorophyll is what gives plants their green color. As summer ends and autumn comes, the days get shorter and shorter. This is how the trees "know" to begin getting ready for winter. During winter, there is not enough light or water for photosynthesis. The trees will rest, and live off the food they stored during the summer. They begin to shut down their food-making factories. The green chlorophyll disappears from the leaves. As the bright green fades away, we begin to see yellow and orange colors. Small amounts of these colors have been in the leaves all along. We just can~t see them in the summer, because they are covered up by the green chlorophyll. The bright reds and purples we see in leaves are made mostly in the fall. In some trees, like maples, glucose is trapped in the leaves after photosynthesis stops. Sunlight and the cool nights of autumn cause the leaves turn this glucose into a red color. The brown color of trees like oaks is made from wastes left in the leaves. It is the combination of all these things that make the beautiful fall foliage colors we enjoy each year.

 

Neetika payal (XI)

Red Rose Lambakheda

EDUCATION OF INDIA 

Posted Date : 12/13/2010

With education increasingly becoming the primary determinant of overall development in the emerging knowledge economy, Indiaedu seeks to become a meeting point for students, teachers, and all those who are concerned. With a huge data base of schools, colleges and universities across India, we provide information on various career courses, important educational institutes like IITs, IIMs, JNU, DU and other MBA colleges. Keeping in mind the needs of the working professionals, we have details on online education and different distance-learning courses. It is also the right place for those who wish to know about education loans, scholarships in India, International fellowships and other relevant topics on education in India and abroad. The site aims to be a one-stop destination for anyone seeking information on India Education, thus spreading numerous opportunities available to the Indian students already pursuing education in India or wishing to study abroad and also to those foreign students who wish to study in India.

 

Karishma Dharamdasani (XI)

Red Rose Karond

TEACHER 

Posted Date : 12/13/2010

Before every successful person there is a teacher, He is the one who gives us the knowledge, He is the one who taught us to do the right thing, He is the one who taught us to not be over–confident. Teacher is the one who gives us the direction, He is the one who makes us responsible, He is the one who make us ready for worst and do the best, He is the one who makes us kind and gentle. So it is not our responsibility but our liability, To respect teacher and bow our head before them. As they gives us education and makes a student complete.

 

AAKANSHA SAXENA (XI)

Red Rose Karond

Inspirational thoughts 

Posted Date : 12/9/2010

Give yourself a chance, Give yourself the moment, Give yourself the freedom, Give yourself the power, Give yourself the confidence, Live for today not for tomorrow, Live the EXTREME !!!!!!! Because you got yourself only one life… LIVE IT !!!!

 

Karti  (XII)

Red Rose Berasia Road

Majaine 

Posted Date : 12/8/2010

i want to to say that i have studing a mazin which has very good cover page and i use to buy it in the sample maner

 

yusuf (XII)

Red Rose Berasia Road

MOTHER TERASA 

Posted Date : 12/7/2010

Mother Teresa (26 August 1910 – 5 September 1997), born Agnes Gonxha Bojaxhi was a Catholic nun of ethnicity and Indian citizenship, who founded the Missionaries of Charity in Calcutta, India in 1950. For over 45 years she ministered to the poor, sick, orphaned, and dying, while guiding the Missionaries of Charity~s expansion, first throughout India and then in other countries. Following her death she was beatified by Pope John Paul II and given the title Blessed Teresa of Calcutta . By the 1970s, she was internationally famed as a humanitarian and advocate for the poor and helpless, due in part to a documentary and book Something Beautiful for God by Malcolm Muggeridge. She won the Nobel Peace Prize in 1979 and India~s highest civilian honour, the Bharat Ratna, in 1980 for her humanitarian work. Mother Teresa~s Missionaries of Charity continued to expand, and at the time of her death it was operating 610 missions in 123 countries, including hospices and homes for people with HIV/AIDS, leprosy and tuberculosis, soup kitchens, children~s and family counselling programs, orphanages, and schoolsShe has been praised by many individuals, governments and organizations; however, she has also faced a diverse range of criticism. These include objections by various individuals and groups, including Christopher Hitchens, Michael Parenti, Aroup Chatterjee, Vishva Hindu Parishad, against the proselytizing focus of her work including a strong stance against contraception and abortion, a belief in the spiritual goodness of poverty and alleged baptisms of the dying. Medical journals also criticised the standard of medical care in her hospices and concerns were raised about the opaque nature in which donated money was spent. In 2010 on the 100th anniversary of her birth, she was honoured around the world, and her work praised by Indian President Pratibha Patil.Agnes Gonxha Bojaxhiu (gonxhe meaning "rosebud" in Albanian) was born on 26 August 1910, in Üsküb, Ottoman Empire (now Skopje, capital of the Republic of Macedonia). Although she was born on 26 August, she considered 27 August, the day she was baptized, to be her "true birthday."She was the youngest of the children of a family from Shkodër, Albania, born to Nikollë and Drana Bojaxhiu Her father, who was involved in Albanian politics, died in 1919 when she was eight years old.After her father~s death, her mother raised her as a Roman Catholic. Her father~s origin was possibly from Prizren, Kosovo while her mother~s origin was possibly from a village near Gjakova, Kosovo.[According to a biography by Joan Graff Clucas, in her early years Agnes was fascinated by stories of the lives of missionaries and their service in Bengal, and by age 12 was convinced that she should commit herself to a religious life.Her final resolution was taken on August 15, 1928, while praying at the shrine of the Black Madonna of Letnice, where she often went on pilgrimage.

 

PRAGYA LILHORE (XI)

Red Rose Karond

India get positive vibes ahead of Obama visit 

Posted Date : 12/7/2010

prepares for the visit of President Barack Obama in early November, its numerous concerns ranging from visa fee hike to hi-tech export controls to cross border terrorism appears to have had some positive response. Foreign Secretary Nirupama Rao is understood to have articulated New Delhi’s concerns at a hectic round of meetings Friday with Secretary of State Hillary Clinton, White House National Security Advisor James Jones and other senior administration officials. Rao, who is here to prepare the ground for Obama’s visit, also met with Under Secretary for Industry and Security at the Commerce Department, Eric L. Hirschhorn, Under Secretary for Arms Control and International Security, Ellen Tauscher, and Undersecretary of Defence for Policy, Michele Flournoy. As India looks at the Obama visit as a very significant milestone in India-US relations, which have become truly transformational in nature in the words of Clinton, Rao was encouraged by the “positive orientation” towards Indian concerns at these meetings, sources said. While Indian concerns over the discriminatory hike in H1-B and L-1 visa fees would be taken up by the Commerce Minister Anand Sharma when he comes here for a meeting of the India-US Trade Forum Tuesday, sources described the issue of export controls as a work in progress. The US stand on India’s permanent membership of the Security Council too was evolving and hopefully would ultimately veer round to US endorsement going by Clinton’s statement that a reform of global institutions of governance should take into account India’s emergence as a major power, sources suggested.

 

harish (XII)

Red Rose Berasia Road

Life is beautiful 

Posted Date : 12/7/2010

As we grow up, we learn that even the one person that wasn~t supposed to ever let us down, probably will. You~ll have your heart broken and you~ll break others~ hearts. You~ll fight with your best friend or maybe even fall in love with them, and you~ll cry because time is flying by. So take too many pictures, laugh too much, forgive freely, and love like you~ve never been hurt. Life comes with no guarantees, no time outs, no second chances. you just have to live life to the fullest, tell someone what they mean to you and tell someone off, speak out, dance in the pouring rain, hold someone~s hand, comfort a friend, fall asleep watching the sun come up, stay up late, be a flirt, and smile until your face hurts. Don~t be afraid to take chances or fall in love and most of all, live in the moment because every second you spend angry or upset is a second of happiness you can never get back

 

kirti singhai   (XII)

Red Rose Berasia Road

Chartered Accountancy : Job Prospects & Career Options

Posted Date : 12/7/2010 

Chartered accountants work as Finance Managers, Financial Controllers, Financial Advisors or Directors (Finance) and watch over the finances in the day to day management of companies. Their main areas of work include Accountancy, Auditing, Cost accountancy, Taxation, Investigation and Consultancy.

 

kirti singhai   (XII)

Red Rose Berasia Road

Trafic rules 

Posted Date : 11/24/2010

The transport department of each and every city around the world has been entrusted with the responsibility of providing a smooth public transportation system on roads, controlling pollution under permissible limits, keeping a record of registration of vehicles, insurance of vehicles, issuing permits and collection of taxes. These departments function by devising policies, implementing them and then monitor and regulate the functioning of the transport in the city. Traffic rules of the roads are both the laws and the informal rules that may have been developed over time to facilitate the orderly and timely flow of traffic. With the replacement of ancient horse driven carts with cars and trucks, the speed of the traffic increased paving way for the need of smooth roads and yet smoother traffic. So, to curb the need of the smoother traffic, some rules were devised to assure that the traffic runs smooth. Almost all of the roadways traffic rules are built with devices meant to control traffic. The basic idea to devise rules is to make the traffic more organized. These establish a direct contact with the driver and help making the ride easy and controlled by delivering information which compliments the laws, guiding directions, speed limits and parking zones. All these efforts collectively assure that traffic is orderly and safe. An organized traffic has well established priorities, lanes flowing in particular directions. The benefit is that it reduces the travel time. Some rules and regulations have been formulated for an easy driving. The drivers are not allowed to drive without a few documents. These documents should be produced on demand.

 

priyanka rana (XII)

Red Rose Berasia Road

students........... 

Posted Date : 11/24/2010

consingnment : the relationship between the consignor and the consignee is agent and principal is known as consignment.

 

akanksha verma (XII)

Red Rose Berasia Road

A great Leader(MAHATMA GANDHI) 

Posted Date : 11/23/2010

Mahatma Gandhi was a great leader.his full name was mohan dass karam chand gandhi.he was born on october,1869 at porbandar.he was very simpe people called him bapu.he went to england and returned as a barrister. in south africa he saw the bad condition of the indians,there he raise his voice against it and organised a movemant.in india he staret teh non-operation and satyagraha movement.he liked ahinsa and truth.he wanted in peace.he made india free.he was shot dead on january 30 1948.we can never forget him.he is the father of the nation.

 

anubhav singh jadoun (V)

Red Rose Karond

NATURAL ENVIRONMENT 

Posted Date : 11/23/2010

The natural environment, encompasses all living and non-living things occurring naturally on Earth or some region thereof. It is an environment that encompasses the interaction of all living species.[1] The concept of the naturaThe natural environment, encompasses all living and non-living things occurring naturally on Earth or some region thereof. It is an environment that encompasses the interaction of all living species.[1] The concept of the natural environment can be distinguished by componentsl environment can be dComposition The Earth~s layered structure. (1) inner core; (2) outer core; (3) lower mantle; (4) upper mantle; (5) lithosphere; (6) crust A volcanic fissure and lava channel.Main article: Earth science Earth science generally recognizes 4 spheres, the lithosphere, the hydrosphere, the atmosphere, and the biosphere[2] as correspondent to rocks, water, air, and life. Some scientists include, as part of the spheres of the Earth, the cryosphere (corresponding to ice) as a distinct portion of the hydrosphere, as well as the pedosphere (corresponding to soil) as an active and intermixed sphere. Earth science (also known as geoscience, the geosciences or the Earth Sciences), is an all-embracing term for the sciences related to the planet Earth.[3] There are four major disciplines in earth sciences, namely geography, geology, geophysics and geodesy. These major disciplines use physics, chemistry, biology, chronology and mathematics to build a qualitative and quantitative understanding of the principal areas or spheres of the Earth system istinguished by components

 

shriya namdeo (XI)

Red Rose Karond

GLOBAL WARMING 

Posted Date : 11/23/2010

Global warming is when the earth heats up (the temperature rises). It happens when greenhouse gases (carbon dioxide, water vapor, nitrous oxide, and methane) trap heat and light from the sun in the earth’s atmosphere, which increases the temperature. This hurts many people, animals, and plants. Many cannot take the change, so they die. What causes global warming? Many things cause global warming. One thing that causes global warming is electrical pollution. Electricity causes pollution in many ways, some worse than others. In most cases, fossil fuels are burned to create electricity. Fossil fuels are made of dead plants and animals. Some examples of fossil fuels are oil and petroleum. Many pollutants (chemicals that pollute the air, water, and land) are sent into the air when fossil fuels are burned. Some of these chemicals are called greenhouse gasses. What is global warming doing to the environment? Global warming is affecting many parts of the world. Global warming makes the sea rise, and when the sea rises, the water covers many low land islands. This is a big problem for many of the plants, animals, and people on islands. The water covers the plants and causes some of them to die. Global warming is doing many things to people as well as animals and plants. It is killing algae, but it is also destroying many huge forests. The pollution that causes global warming is linked to acid rain. Acid rain gradually destroys almost everything it touches. What are people doing to stop global warming? People are doing many things to try to stop global warming. One thing people are doing is carpooling. Carpooling is driving with someone to a place that you are both going to. This minimizes the amount of greenhouse gases put into the air by a car. Another thing that people are doing is being more careful about leaving things turned on like the television, computer, and the lights. A lot of people are taking time away from the television, and instead, they are spending more time outdoors. This helps our planet out a lot. Now, more people are even riding busses, walking to school, and riding their bikes to lower the amount of greenhouse gases in the air. Planting trees and recycling also helps. If you recycle, less trash goes to the dump, and less trash gets burned. As a result, there are fewer greenhouse gasses in our atmosphere. Watch what you buy. Many things, such as hairspray and deodorant, now are made to have less of an impact on the atmosphere. Less greenhouse gasses will rise into the air, and global warming will slow down.

 

PRAGYA LILHORE (XI)

Red Rose Karond

Festival 

Posted Date : 11/23/2010

india is a land of colourful festivals. our national festivals are gandhi jayanti,independence day and republic day. Some festival like diwali ,eid,christmas etc. are religious festivals.people decorate their rooms and wear new cloths.they make special dishes and visit each other~s homes.festivals are a time to have fun together. festivals such as baisakhi and pongal are harvest festivals.some festival are associated with the change of season.

 

aman gour (V)

Red Rose Karond

Diwali 

Posted Date : 11/23/2010

Diwali or Deepawali is an indan festival.It is called the festival of light.It is a religious festival of the hindus.it is one of themost of important festival.It comes in the month of november.It is celebrated all over india.It is celebrated in the honour of lord rama~s return t ayodhya.he returned to ayodhya after an exit of fourteen years.

 

deepansh gupta (V)

Red Rose Karond

Thought 

Posted Date : 11/23/2010

Genius ain~t anything more than elegant common sense. -Josh Billings A harmless hilarity and a buoyant cheerfulness are not infrequent concomitants of genius; and we are never more deceived than when we mistake gravity for greatness, solemnity for science, and pomposity for erudition. -Charles Caleb Colton I not only use all the brains that I have, but all that I can borrow. -Woodrow Wilson Mad, adj. Affected with a high degree of intellectual independence. -Ambrose Bierce Everyone is a genius at least once a year. The real geniuses simply have their bright ideas closer together.

 

vipin bairagi (XII)

Red Rose Karond

THE STORY OF RAINBOW….. 

Posted Date : 11/16/2010

Violet I’m the colour of royalty and regality of Kings and Queens! I represent Authority, Power, Position and wisdom. People obey & listen me Indigo I’m the colour of silence. I’m the symbol of thoughts and reflection! I’m needed for balance and contrast for prayer and inner peace Blue I’m colour of peace, the sky and the sea. It is the water that is true! basis of life. The sky gives peace………........… space and salinity Green I’m sign of life and of hope. I’m the colour of grass and leaves of trees! I’m needed for life without me all the animals would die Yellow I’m the colour which brings fun, laughter, gaity and warmth into the World! The sun is yellow – the stars are yellow – the moon is yellow Orange I’m the colour of health and strength. I may be scarce but I’m precious, for! I serve the inner needs of human life. When I fill the sky my beauty is Red I’m the colour of blood, colour of strength and bravery. I’m willing to fight! For a cause, I bring fire in your hearts. I’m the colour of love and passion

 

ajay kumar manjhi (VIII)

Red Rose Lambakheda

Don’t Quit 

Posted Date : 11/16/2010

Don’t quit when the tide is lowest, For it is just about to turn, Don’t quit over doubts and questions, For there’s something you may learn, Don’t quit when the night is darkest, For it is just a while until dawn; Don’t quit when you have run the farthest, For the race is almost won, Don’t quit when the hill is steepest, For your goal is almost might, Don’t quit for you are not a failure, Until you fail to try.

 

arif khan (XII)

Red Rose Lambakheda

INDIA ROCKS! 

Posted Date :   11/16/2010

Yeah! It’s true; Indian Style is hot ‘n’ happening all over the world. India is fast emerging as a global trendsetter. What with Liz Hurley and cherry Blair drapped in silk sarees. Shakira going for Indian flavour for her show, Indian curry being accepted as one of U. S. A’s national symbols and yoga forming a part of the lifestyle of millions, Indian culture seems to be at the zenith of its popularity. Ayurveda is now established as a branch of medical science. The dance forms of India like kathak and Bharatnatyam have acquired much appreciation. Bollywood movies are being viewed and loved by people across the globe. The spicy Indian food is a delicacy for everyone. Indian fashion has taken the world by storm. The dangles, bindis, mehndi and bangles are there to name a few accessories. Indian tourist spots like the Tajmahal of Agra, the cities of Jaipur and Ajmer in the north western India offer a unique blend of preserved culture and the ability to walk hand in hand with the fast changing World. The seven sisters in the east are a paradise to those who are keen on adventure like mountaineering and rafting. A very important role has been played by artists such Satyajit Ray, Ritu Beri, Mrinalini Sarabhai and many more in show casing Indian culture. The need of the hour is for us, the Indians, to realize the potential prestige of our country and work towards its promotion and preservation.

 

ABHISHAK (VII)

Red Rose Lambakheda

KNOWLEDGE IS POWER 

Posted Date : 11/16/2010

Man is gifted with brain by god. As he has brain he can create knowledge. Man is superior to animals due to this knowledge invilisation was created though knowledge only. Knowledge enables man to invent different modes of travelling. In the field of medicines, man has invented so many medicines to cure sever diseases, which are considered incurable in old days when epidemics spread and claimed so many lives. By his knowledge man has changed all this. But negative aspects of knowledge are also there. Man has invented atom bombs, Hydrogen bombs etc. It could also lead countries to wage war. But one should be optimistic that man by his knowledge would overcome these defects also.

 

ayesha (XII)

Red Rose Lambakheda

TAKE TIME 

Posted Date : 10/30/2010

Take time to play - It~s the secret of youth Take time to think - It~s the sourse of power Take time to read - It~s the foundation of wisdom Take time to pray - It~s the greatest power of earth Take time to love - It~s a God given privilege Take time to be friendly - It~s the road to happiness Take time to laugh - It~s the music of soul

 

alfiya nawab (XII)

Red Rose Karond

Path To Succes 

Posted Date : 10/30/2010 

Success and happiness are states of mind.They are a matter of attitude,a matter of faith.If you are seeking them in life,seek them within yourself.Thing in turns of success add happiness.Think positively,act positively.

 

divya vajpai (XII)

Red Rose Karond

Facing an Interview 

Posted Date : 10/28/2010

1. PREPARATION: Prepare a folder to bring to the interview, which include extra resumes and letters of references, some well thought out questions for the interviewer, a plain paper and a pen Your image is important. Your appropriate attire is largely based on your profession therefore understand what attire is like where you will be interviewing. Your hairstyle should be manageable and wear light makeup and deodorant Call the day before to confirm the date and time of the interview Be very certain about the direction and the name of the person you should meet when you arrive Practice interview techniques Psyche yourself up for the meeting 2. ARRIVAL: Arrive at the reception’s desk 8 to 10 minutes before the scheduled meeting Check your hair, clothing and general image before visiting the receptionist. Test your smile Give your name to the receptionist. Show confident and smile, speak clearly and distinctly. Make a strong initial impact While waiting for the meeting, envision a great interview. Visualize being offered the job. Picture yourself as contributing member of the company. Achieving success is easier once you have it firmly implanted in your mind Be prepared to stand up when the hiring manager comes to meet you Be aware of your body language. Sit erect and display confidence. Always be ready to give a firm hand shake. Walk and talk with confidence and dignity Keep cool. Even if you are kept waiting for long, maintain your composure and self control 3. INTRODUCTION: A sturdy handshake and a great smile contribute to a great start. Stretch your fingers apart and open your hands wide when you give your hand to the hiring manager for a handshake. Let your manager be the first one to withdraw his hands after the handshake Check your hair, clothing and general image before visiting the receptionist. Test your smile Give your name to the receptionist. Show confident and smile, speak clearly and distinctly. Make a strong initial impact Speak in a rich, self confident manner. Change the tone of your voice as you converse. Speak with energy and conviction. Show emotion Eye contact demonstrates confidence, trust and power. Have direct eye contact with your interviewer when you talk Observe the overall manner and behavior of the interviewer. If he breaks into a smile frequently you should smile often and if he doesn’t, avoid grinning 4. RAPPORT BUILDING: Do not sit until the interviewer is seated Do not place any items on the interviewers table Lean forward with your energy focused toward the interviewer. Show enthusiasm and sincere interest to the post you applied Take notes. You may want to refer back to something later in the meeting. Ask for permission if you are uncomfortable Use commonalities between you and the interviewer to establish a comfort zone. Light humor and flattery are effective icebreakers Make good use of openings. If the interview begins telling about yourself, you are in control of an early part of meeting. Deliver a 30 second personal overview of your background, maybe beginning with education, followed by a 60 to 90 second overview of your career in years Rehearse appropriate answers to as many sure shot questions before the meeting Communicate your skills, qualifications and credentials to the hiring manager when the appropriate arises. Describe your market value and skills. Mention how you will benefit the organization and demonstrate how you will contribute to the bottom line Look for hidden meanings in questions and answer appropriately Make a good appearance and demonstrate adaptive skills that show that you have the ability to perform and you have positioned yourself for hiring Use concrete examples to illustrate specific accomplishments Call the interviewer by name throughout the meeting (but don’t overdo), unless you have been instructed otherwise Combine good listening skills with hearing skills. Job offers are made to those who listen well and answer questions powerfully and succinctly Avoid flinching during the meeting Use silence to your advantage. A few seconds of silence be effective. Silence gives you the opportunity to deliberate over your answer or qualify a comment. You can break the silence by asking a question or making a comment. The key is to react naturally, maintaining your composure 5. CLOSING: As the meeting draws to a close, there are usually three issues remaining: 1. Salary negotiating 2. Have some additional questions ready to ask to the recruiting manager 3. Next step 6. FOLLOW UP: Immediately after the interview (within 24 hours) send a thank you note to the company. Mention that you appreciate the time the hiring manager spent with you and that you remain interested in the position After a week or so, call to ask about the status of your application

 

Kartik (XII)

Red Rose Berasia Road

BRTS Project for nine more cities 

Posted Date : 10/26/2010

The nine cities include Ahmedabad, Rajkot, Surat, Indore, Bhopal, Pune, Jaipur, Vijayawada and Visakhapatnam India is pressing ahead with the bus rapid transport system (BRTS)—which entails dedicated lanes for high capacity, low floor buses—in at least nine other cities. BRTS is a crucial tool to provide smooth and affordable facility to the commuters. At present, India~s Urban Development Ministry is helping BRTS projects in Ahmedabad, Rajkot, Surat—three important cities of Gujarat—while Indore and Bhopal in Madhya Pradesh are also implementing them. The other cities where BRTS projects are coming up are Pune in Maharashtra, Jaipur in Rajasthan, and Vijayawada and Visakhapatnam in Andhra Pradesh. The total estimated cost of all the nine projects is Rs 3,300 crore. The BRTS is operational in the world~s major cities like Mexico City, Sao Paulo, Bogotá, Santiago, Lima, and also Beijing, Taipei and Hanoi, where it has proved a hit with the masses. As urbanisation is taking place so fast, fine-tuned modes of urban public transportation have to be put in place; BRTS is one of them.

 

Laey Maheshwari (XII)

Red Rose Trilanga

Three sentence for getting success 

Posted Date : 10/26/2010

1.Know more than other. 2.Work more than other. 3.Expect less than other. "SUCCESS WILL BE URS"

 

preeti (XII)

Red Rose Karond

TRUE TEACHER 

Posted Date : 9/25/2010

"FOR CHANDRALEKHA MAM SHE IS BEST TEACHER IN RED ROSE GROUP I THOUGHT" A teacher is a person who paves the way to success A teacher is a person who is compelete with power of installation. A teacher is a person who is our inspiration. A teacher is a person who gives us knowledge and quicken our imagination. A teacher is like a resources to us who is having stock of life giving skilles. A teacher is one who loves us all as her own childern. A teacher gives us instruction as a guide. A teacher is a person with whom we can share our feelings as a friend. A teacher is an adorable person. priyanka rana red rose berasia

 

priyanka rana (XII)

Red Rose Berasia Road

My teacher 

Posted Date : 9/25/2010

Teacher,teacher my lovely teacher. you are my inspiration and my preacher you are lovely by face, ever charming and full of grace. you made future shiny and bright even leading to greater height.......... special for"chandralekha mam,najma mam,shalini mam,om sir n krishna mam."

 

priyanka rana (XII)

Red Rose Berasia Road

Woh school ke din 

Posted Date : 9/25/2010

Woh school ke din.... kuch baate bhuli hui, kuch pal beete hue. har galti ka ek bahana, aur fir sabki najar me aana, exam ki puri raat jagna, fir bhi sawal dekhkar sir khujlana, mauka mile to class bunk marna, fir doston ke saath maza marna, har pal hai naya sapna, Aaj jo tute fir bhi hai apna, ye school ke din, in lamho me zindagi jee bhar ke jeena, yaad karke in palon ko, fir gindagi bhar muskurana...........

 

priyanka rana (XII)

Red Rose Berasia Road

Wasting of time 

Posted Date : 9/17/2010

Time is percious to all of ous now a days we all are not taking attention ti over work we all are wasting over time in doing other ativity according to me student have only one work to do is make their future4 prospect so do study like a worker and do your work like a workship and school is your temple and teacher are god and its a responsibility of every student to loyal and obedient with them deepak chakarvarty red rose berasia road

 

deepak (XII)

Red Rose Lambakheda

Education........... 

Posted Date : 9/9/2010

1..If you try to do too much studying at one time, you will tire and your studying will not be very effective. Space the work you have to do over shorter periods of time. Taking short breaks will restore your mental energy. 2..Study time is any time you are doing something related to schoolwork. It can be completing assigned reading, working on a paper or project, or studying for a test. Schedule specific times throughout the week for your study time. 3..Studying at the same times each day establishes a routine that becomes a regular part of your life, just like sleeping and eating. When a scheduled study time comes up during the day, you will be mentally prepared to begin studying. 4..This is a case where "two heads may be better than one."

 

 RITU MATHUR (XII)

Red Rose Berasia Road

Back | Top