Monday, August 30, 2010

DATA STRUCTURES THROUGH C -YASWANTH KANETHKAR-CD ROM VERSION




Hi Friendzzz,

This is the CD ROM VERSION OF DATA STRUCTURES THROUGH C-YASWANTH KANETHKAR..

FEATURES

-LIVE DEMOS
-REAL TIME SIMULATIONS
-EASY UNDERSTANDING
-ANIMATIONS TO EXPLAIN CONCEPTS


JUST DOWNLOAD IT & OPEN THE EXECUTABLE FILE IN INTERNET EXPLORER OR ANY BROWSERS...




Your's friendly,
[MOHANRAM.G],
ADMIN...

C & DATA STRUCTURES-BOOKS COLLECTIONS

Hi Friendzz,

Here is a rare collection of e-books on DATA STRUCTURES & ALGORITHMS IN C

ALGORITHM THEORY-SWAT 2010





C ALGORITHMS FOR REAL TIME DSP




C & DATA STRUCTURES




ALGORITHMS AND DATA STRUCTURES THE SCIENCE OF COMPUTING - DOUGLAS BALDWIN




ALGORITHMS & DATA STRCUTURES





ALGORITHMS




DOWNLOAD IT...USE IT...

Your's friendly,
[MOHANRAM.G],
ADMIN...

COMPUTER ACRONYMS COLLECTION-USEFUL

ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

--- B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

--- D ---

DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

--- F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

--- K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---
LG - LG Electronics
LAN - Local Are Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---
MAC - Media Access Control
MB - MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

--- R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

--- U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---
VCD - Video CD
VPN - Virtual Private Network

--- W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

Your's friendly,
[MOHANRAM.G],
ADMIN...

TOP 10 WAYS TO DOWNLOAD VIDEOS FROM ANY WEBSITE[FREE PORTALS]

Everyone these days is downloading, watching, and sharing videos from video-sharing sites like YouTube, Google Video, MetaCafe, DailyMotion, Veoh, Break, and a ton of other similar sites. Whether you want to watch the video on your iPod while working out, insert it into a PowerPoint presentation to add some spice, or simply download a video before it’s removed, it’s quite essential to know how to download, convert, and play these videos.

Free Web services for downloading videos from video-sharing sites


ClipNabber allows you to download videos from YouTube, Metacafe, etc by simply copying and pasting the URL. You’ll then get a link whereby you can download the file to your computer, iPod, iPhone, or any other media player. You’ll need to have an FLV player for the YouTube videos. Quick and very easy to use!

Zamzar is a free online file conversion web application that can not only convert videos off the Internet to AVI, MPEG, 3GP, MP4, MOV, etc, but also converts between audio, image, and document formats. Paste the URL into Step 1 and then convert the file to your favorite format.


VideoDownloader is a FireFox extension, but also allows you to paste in any URL from many sites such as Blip.TV, iFilm, and even social networking sites like MySpace. You can also download a free FLV player from their site to play the videos.


Vixy.net is another site that not only downloads online videos, but will also convert them AVI, MOV, MP4, 3GP, or MP3 (if you want to extract the audio from the file). Using this site, you don’t have to worry about downloading a FLV player as you can convert it to Windows format. (Same as Zamzar)

KeepVid also supports just about any video sharing site out there and the only difference about this site is that it also has a Top Videos section, so you can quickly download the most watched videos around the web.


Media Converter is similar to ZamZar and vixy.net, but requires you to create an account and log in. Also, it seems like it only supports downloading and converting videos from YouTube. You can also download their video download program, but it only supports 5 sites.

Hey! Watch is an online video encoding web service that encodes video into different formats including HD very quickly. The graphical interface is very nice and there are lots of features and options, such as the ability to transfer any video from the web directly to an FTP server or to online storage.


YoutubeX, as the name suggests, allows you to download videos from YouTube. Obviously, it only supports YouTube, but it has a couple of other features, such as the ability to play your video on the site and find popular videos quickly.


VideoRonk searches across multiple video-sharing sites such as Google Video, YouTube, MetaCafe and DailyMotion to find the most popular videos on each of them. You can either watch them on VideoRonk or download them to your computer in FLV format.

According to their web site, they support more than 98 video sites including MySpace, CollegeHumor, iFilm, etc. You’ll have to rename the files you download from YouTube with the .FLV extension at the end.

Your's friendly,
[MOHANRAM.G],
ADMIN...

GREAT WEBSITE - HYPERLINKS- REDUCES URL TYPING



http://www.myeverydaypage.com/

This is a good website that reduces the url typing work...

contains hyperlinks to lots of useful websites

try it for yourself...

Your's friendly,
[MOHANRAM.G],
ADMIN...

DATA STRUCTURES- 2 MARKS Q & A-RARE COLLECTION


Hai friends,

here is a rare collection of two marks for DATA STRUCTURES ...


make use of it....



Your's friendly,
[MOHANRAM.G],
ADMIN...

DATA STRUCTURES- Q BANK

Unit -I

2 marks

1. Define ADT.
2. Give the structure of Queue model.
3. What are the basic operations of Queue ADT?
4. What is Enqueue and Dequeue?
5. Give the applications of Queue.
6. What is the use of stack pointer?
7. What is an array?
8. Define ADT (Abstract Data Type).
9. Swap two adjacent elements by adjusting only the pointers (and not the data) using singly
linked list.
10. Define a queue model.
11. What are the advantages of doubly linked list over singly linked list?
12. Define a graph
13. What is a Queue?
14. What is a circularly linked list?
15. What is linear list?
16. How will you delete a node from a linked list?
17. What is linear pattern search?
18. What is recursive data structure?
19. What is doubly linked list?

Unit 1

part B

1. Explain the implementation of stack using Linked List.
2. Explain Prefix, Infix and postfix expressions with example.
3. Explain the operations and the implementation of list ADT.
4. Give a procedure to convert an infix expression a+b*c+(d*e+f)*g to postfix notation
5. Design and implement an algorithm to search a linear ordered linked list for a given
alphabetic key or name.
6. (a) What is a stack? Write down the procedure for implementing various stack
operations(8)
(b) Explain the various application of stack? (8)
7. (a) Given two sorted lists L1 and L2 write a procedure to compute L1_L2 using only the
basic operations (8)
(b) Write a routine to insert an element in a linked list (8)
8. What is a queue? Write an algorithm to implement queue with example.

Unit 2 and 3

part a

1.Explain Tree concept?
2. What is meant by traversal?
3. What is meant by depth first order?
4. What is In order traversal?
5. What is Pre order traversal?
6. What is Post order traversal?
7. Define Binary tree.
8. What is meant by BST?
9. Define AVL trees.
10. Give example for single rotation and double rotation.
11. Define Hashing.
12. Define Double Hashing.
13. What is meant by Binary Heap?
14. Mention some applications of Priority Queues.
15. Define complete binary tree.
16. How a binary tree is represented using an array? Give an example
17. A full node is a node with two children. Prove that the number of full nodes plus one is
equal to the number of leaves in a non empty binary tree.
18. Define (i) inorder (ii) preorder (iii) postorder traversal of a binary tree.
19. Suppose that we replace the deletion function, which finds, return, and removes the
minimum element in the priority queue, with find min, can both insert and find min be
implemented in constant time?
20. What is an expression tree?

1. Explain the representation of priority queue
2. Compare the various hashing Techniques.
3. List out the steps involved in deleting a node from a binary search tree.
4. What is binary heap?
5. Define Binary search tree.
6. List out the various techniques of hashing
7. Define hash function.
8. Show that maximum number of nodes in a binary tree of height H is 2H+1 – 1.
9. Define hashing.
10. Define AVL tree.

Unit 2and 3

part B

1. Explain the operation and implementation of Binary Heap.
2. Explain the implementation of different Hashing techniques.
3. Give the prefix, infix and postfix expressions corresponding to the tree given in figure.
4. (a) How do you insert an element in a binary search tree? (8)
(b) Show that for the perfect binary tree of height h containing2h+1-1 nodes, the sum of
the heights of the nodes 2h+1 -1-1(h+1). (8)
5. Given input {4371,1323,6173,4199,4344,9679,1989} and a hash function
h(X)=X(mod10), show the resulting:
(a) Separate chaining table (4)
(b) Open addressing hash table using linear probing (4)
(c) Open addressing hash table using quadratic probing (4)
(d) Open addressing hash table with second hash function h2(X) =7-(X mod 7). (4)
6. Explain in detail (i) Single rotation (ii) double rotation of an AVL tree.
7. Explain the efficient implementation of the priority queue ADT
8. Explain how to find a maximum element and minimum element in BST? Explain detail
about Deletion in Binary Search Tree?

1. (a) Construct an expression tree for the expression A+(B-C)*D+(E*F) (8)
(b) Write a function to delete the minimum element from a binary heap (8)
2. Write a program in C to create an empty binary search tree & search for an element X in
it. (16)
3. Explain in detail about Open Addressing (16)
4. Explain in detail insertion into AVL Trees (16)
5. Write a recursive algorithm for binary tree traversal with an example. (16)
6. Write an algorithm for initializing the hash table and insertion in a separate chaining (16)

Unit 4

part A

Define Graph.
2. What is meant by directed graph?
3. Give a diagrammatic representation of an adjacency list representation of a graph.
4. What is meant by topological sort?
5. What is meant by acyclic graph?
6. What is meant by Shortest Path Algorithm?
7. What is meant by Single-Source Shortest path problem?
8. What is meant by Dijkstra’s Algorithm?
9. What is minimum spanning tree?
10. Mention the types of algorithm.
11. Define NP- complete problems
12. What is space requirement of an adjacency list representation of a graph
13. What is topological sort?
14. What is breadth-first search?
15. Define minimum spanning tree
16. Define undirected graph
17. What is depth-first spanning tree
18. What is Bio connectivity?
19. What is Euler Circuit?
20. What is a directed graph?
21. What is meant by ‘Hamiltonian Cycle’?
22. Define (i)indegree (ii)outdegree
1. Explain the topological sort.
2. Define NP hard & NP complete problem.
3. Prove that the number of odd degree vertices in a connected graph should be even.
4. What is an adjacency list? When it is used?
5. What is an activity node of a graph?
6. Define Breadth First Search.
7. Define Depth First Search.
8. Define Minimum Spanning Tree.
9. Define Shortest Path of a graph.
10. Define Biconnectivity.
1. Define Graph.
2. What is meant by directed graph?
3. Give a diagrammatic representation of an adjacency list representation of a graph.
4. What is meant by topological sort?
5. What is meant by acyclic graph?
6. What is meant by Shortest Path Algorithm?
7. What is meant by Single-Source Shortest path problem?
8. What is meant by Dijkstra’s Algorithm?
9. What is minimum spanning tree?
10. Mention the types of algorithm.
11. Define NP- complete problems
12. What is space requirement of an adjacency list representation of a graph
13. What is topological sort?
14. What is breadth-first search?
15. Define minimum spanning tree
16. Define undirected graph
17. What is depth-first spanning tree
18. What is Bi connectivity?
19. What is Euler Circuit?
20. What is a directed graph?
21. What is meant by ‘Hamiltonian Cycle’?
22. Define (i)indegree (ii)outdegree

Unit 4

part B

1. Explain Prim’s & Kruskal‘s Algorithm with am example.
2. Describe Dijkstra’s algorithm with an example.
3. Explain how to find shortest path using Dijkstra’s algorithm with an example.
4. Explain the application of DFS.
5.Find a minimum spanning tree for the graph
using both Prim’s and Kruskal’s algorithms.
6. Explain in detail the simple topological sort pseudo code
7. Write notes on NP-complete problems

1. Formulate an algorithm to find the shortest path using Dijkstra’s algorithm and explain
with example. (16)
2. Explain the minimum spanning tree algorithms with an example. (16)
3. (a) Write short notes on Biconnectivity. (8)
(b) Write an algorithm for Topological Sort of a graph. (8)
4. Write and explain weighted and unweighted shortest path algorithm (16)
5. Explain the various applications of Depth First Search. (16)

1. Explain Prim’s & Kruskal‘s Algorithm with am example.
2. Describe Dijkstra’s algorithm with an example.
3. Explain how to find shortest path using Dijkstra’s algorithm with an example.
4. Explain the application of DFS.
5. Find a minimum spanning tree for the graph

using both Prim’s and Kruskal’s algorithms.
6. Explain in detail the simple topological sort pseudo code
7. Write notes on NP-complete problems

Unit V

part A

1. Define Program
2. Define Algorithm
3. Define Problem Definition Phase
4. What are the problem solving strategies?
5. Define Top Down Design.
6. What is the basic idea behind Divide & Conquer Strategy?
7. Define Program Verification.
8. Define Input & Output Assertion.
9. Define Symbolic Execution
10. Define Verification Condition
11. Define the qualities of good algorithm.
12. Define Computational Complexity.
13. What is O – notation?
14. What is Recursion? Explain with an example.
15. List out the performance measures of an algorithm.
1. Define Algorithm & Notion of algorithm.
2. What is analysis framework?
3. What are the algorithm design techniques?
4. How is an algorithm’s time efficiency measured?
5. Mention any four classes of algorithm efficiency.
6. Define Order of Growth.
7. State the following Terms.
(i) Time Complexity
(ii) Space Complexity
8. What are the various asymptotic Notations?
9. What are the important problem types?
10. Define algorithmic Strategy (or) Algorithmic Technique.
11. What are the various algorithm strategies (or) algorithm Techniques?
12. What are the ways to specify an algorithm?
13. Define Best case Time Complexity .
14. Define Worst case Time Complexity.
15. Define Average case time complexity.
16. What are the Basic Efficiency Classes.
17. Define Asymptotic Notation.
18. How to calculate the GCD value?
1. What is meant by algorithm? What are its measures?
2. Give any four algorithmic techniques.
3. Write an algorithm to find the factorial of a given number?
4. Define the worst case & average case complexities of an algorithm
5. What is divide & conquer strategy?
6. What is dynamic programming?
7. Write at least five qualities & capabilities of a good algorithm
8. Write an algorithm to exchange the values of two variables
9 Write an algorithm to find N factorial (written as n!) where n>=0.

Unit V

part B

1. (a) Explain in detail the types on analysis that can be performed on an algorithm (8)
(b) Write an algorithm to perform matrix multiplication algorithm and analyze the
same (8)
2. Design an algorithm to evaluate the function sin(x) as defined by the infinite series
expansion sin(x) = x/1!-x3/3! +x5/5!-x7/7! +……
3. Write an algorithm to generate and print the first n terms of the Fibonacci series where
n>=1 the first few terms are 0, 1, 1, 2, 3, 5, 8, 13.
4. Design an algorithm that accepts a positive integer and reverse the order of its digits.
5. Explain the Base conversion algorithm to convert a decimal integer to its
corresponding octal representation.
6. Explain in detail about Greedy algorithm with an example(16).
7. Explain in detail about Divide and conquer algorithm with an example also mark the difference between Greedy and divide and conquer algorithm.(16).
8. Describe the backtracking problem using knapsack problem .(16).

Your's friendly,
[MOHANRAM.G],
ADMIN...

EPIC-THE BROWSER DESIGNED BY INDIANS




Epic is a web browser based on Mozilla Firefox developed by Hidden Reflex specifically customized to the taste of Indian users, which was released in July 2010. Similar to Flock, the browser has several preinstalled widgets such as social networking, chat clients and email facilities integrated into the browser. It is dubbed as the first web browser from India and also features the first integrated virus protection in a browser powered by ESET.

Epic is available as a free download which currently supports Microsoft Windows platform.

History

Epic was released on 15th July 2010. It is developed by Hidden Reflex, a software company founded by Alok Bharadwaj in 2008 which is based on Bangalore, India.

Features

Epic was designed specifically for Indian users. It is bundled with lots of apps like a transliterator for Indian scripts, a web snippet tool, timer, to do list, a full featured text editor, games, Google maps, clients for chatting, social networking such as Orkut, Facebook and Twitter, email apps, and several other installable web apps. It features a huge collection of themes and wall papers featuring subjects related to India. Epic is claimed to be the first web browser featuring built in antivirus and anti phishing protection. Epic is currently available for Windows, though Linux and Mac versions are also expected.

Epic claims there are over 1500 free applications that will work with the browser,as well as many themes and wallpapers.

Epic currently supports 12 Indian languages including Hindi, Bengali, Telugu, Punjabi, Marathi, Gujarati, Sanskrit, Nepali, Tamil, Malayalam, Kannada, and Urdu. There's additional transliteration support for Arabic, Persian, Russian, and Greek. The Epic browser is expected to be a big hit among the Indian users.

The logo of Epic browser denotes the Indian tricolor flag (Saffron, White and Green) enveloping a sphere (the earth) in a tree like fashion. The browser also emcompasses numerous Indian wallpapers and themes.

Your's friendly,
[MOHANRAM.G],
ADMIN...

WHAT IS ANDROID??



Android is an operating system for mobile devices such as cellular phones, tablet computers and netbooks. Android is developed by Google and is based upon the Linux kernel and GNU software. It was initially developed by Android Inc. (a firm later purchased by Google) and lately broadened to the Open Handset Alliance. According to NPD Group, unit sales for Android OS smartphones ranked first among all smartphone OS handsets sold in the U.S. in the second quarter of 2010, at 33%.BlackBerry OS is second at 28%, and iOS is ranked third with 22%.

Android has a large community of developers writing application programs ("apps") that extend the functionality of the devices. There are currently over 70,000 apps available for Android with some estimates saying 100,000 have been submitted,which makes it the second most popular mobile development environment. Developers write managed code in the Java language, controlling the device via Google-developed Java libraries.

The unveiling of the Android distribution on 5 November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 71 hardware, software, and telecom companies devoted to advancing open standards for mobile devices. Google released most of the Android code under the Apache License, a free software and open source license.

The Android operating system software stack consists of Java applications running on a Java based object oriented application framework on top of Java core libraries running on a Dalvik virtual machine featuring JIT compilation. Libraries written in C include the surface manager, OpenCore media framework, SQLite relational database management system, OpenGL ES 2.0 3D graphics API, WebKit layout engine, SGL graphics engine, SSL, and Bionic libc. The Android operating system consists of 12 million lines of code including 3 million lines of XML, 2.8 million lines of C, 2.1 million lines of Java, and 1.75 million lines of C++.

Your's friendly,
[MOHANRAM.G],
ADMIN...

ANALOG & DIGITAL COMMUNICATION-TUTORIAL VIDEOS

Hai friendzz,

HERA ARE SEQUENCE OF TUTORIALS OF MODULATION..WATCH IT...LEARN IT...

AMPLITUDE MODULATION



IIT TUTORIAL-1-AMPLITUDE MODULATION



IIT TUTORIAL-2-AMPLITUDE MODULATION



IIT TUTORIAL-3-ANGLE MODULATION




IIT TUTORIAL-4-ANGLE MODULATION




IIT TUTORIAL-5-FM GENERATION & DETECTION



Your's friendly,
[MOHANRAM.G],
ADMIN...

Friday, August 20, 2010

CHAPTER-III [DATA STRUCTURES-LINKED LISTS & QUEUES]

INDIAN INSTITUTE OF TECHNOLOGY- Tutorial

An introduction to LINKED LISTS & QUEUES- very good video tutorial..



Your's friendly,
[MOHANRAM.G],
ADMIN...

CHAPTER-II [DATA STRUCTURES - STACK]

INDIAN INSTITUTE OF TECHNOLOGY- Tutorial

An introduction to stack very good video tutorial..




Your's friendly,
[MOHANRAM.G],
ADMIN...

CHAPTER-I [DATA STRUCTURES & ALOGRITHMS]

INDIAN INSTITUTE OF TECHNOLOGY- Tutorial

An introduction to data structures and algorithm very good video tutorial...




Your's friendly,
[MOHANRAM.G],
ADMIN...

Thursday, August 19, 2010

TIPS TO CREATE A PROFESSIONAL E-MAIL ID


THIS WILL BE VERY USEFUL DURING PLACEMENT & JOB SEARCH..SO READ IT

A professional e-mail address is defined as one that, in its entirety, represents and reflects the professional interests of the user or owner of the e-mail address itself. A professional e-mail address forms a constituent part of how individuals or organisations actively market their products, services, skills, or professional objectives. A professional e-mail address also therefore communicates factual, useful, and meaningful information about the owner or user of the address.

There are a few things that are part and parcel of the resume and your email address is one of them. But there are a few points that you have to keep in mind before typing your email address in the resume. In this recession period when situations are few and far between you cannot afford a single glitch in your resume.
  1. Your email has to be a very professional one. It should not turn your future employer off. Many recruiters prefer a normal email like roger.freedman@gmail.com. This is sufficient enough to get the notice of the recruiter.
  2. Please avoid so-called ‘funny’ email addresses like iamtheboss@gmail.com, because though they may look funny to you they might appear irritating to the employer.
  3. It is believed that your email address too is a reflection of your personality. A too funny email may appear like an announcement that undermines your serious, and professional nature. So, keep your email simple, and businesslike.
  4. If you are feeling tempted to keep a funky personal email address then you can go ahead but make sure that you have a separate one as well to add in the resume. This will help you keep your personal and professional identities separate.
  5. A businesslike email at the top of the resume also helps the employer know that you have the common sense of keeping your personal beliefs separate from your business demands.
  6. It is your image that will create the first impression so, try to appear a responsible and levelheaded person through your resume, and your resume can help you a lot in this regard. Do not forget that this is the time of downsizing.
  7. It is better to keep the personal email id for your friends and families and find a different id that would go with the professional look of the resume. Make sure that typed at the top of the resume your email id is not looking out of place.
  8. If you are feeling confused and do not know how to create a professional email id the n you can ask your friends to help you out. There are also some professional sites available on the Internet that can help you create a business email.
  9. Recruiters also dislike ambiguous email addresses. That is why do not make your email id a combination of fun and professionalism.

10. Remember employers these days are paying even more attention to the resumes. Due to the recession period they want to hire the best but after enough checking. Any silly mistake in your resume may spell doom to your chances to get the job.


To determine whether an e-mail address is professional, ambiguous, or unprofessional, both parts of the address, i.e. the local element before the ‘@’ sign and the domain name that follows have to be considered. Furthermore both elements have to be judged singularly and jointly to determine whose interests the e-mail address best represents.

To clarify further it is worth looking at examples and classifying them accordingly. For the purpose of examination the examples are based on the premise that the owner is using the e-mail address in a professional context.

Examples and classification

john.doe@companyABC.com
Context: John Doe has a professional relationship with the domain name owner.
In this example the local element before the ‘@’ sign adopts a conventional, informative and factual format, and the domain name represents and promotes the interests of an entity that John Doe has a professional relationship with (namely companyABC).
Class: Professional.

sales@companyABC.com
Context: ‘sales’ has a professional relationship with the domain name owner.
In this example the local element before the ‘@’ sign adopts a conventional, informative and factual format, and the domain name represents and promotes the interests of an entity that ‘sales’ has a professional relationship with (i.e. companyABC).
Class: Professional.

jane.doe@mortgagebrokers-sonline.com
Context: The domain owner has a professional relationship with Jane Doe and others who operate in the mortgage broker industry.
From Jane Doe’s perspective the domain name represents three separate entities: Jane herself, others that use mortgagebrokers-online to market their services, and the entity that operates mortgagebrokers-online itself. In this case separate parties are operating in consensus to share a domain name for mutual advantage The domain name identifies and communicates the industry that Jane is operating in, and the local element before the ‘@’ sign, (i.e. her name), is conventional, informative, and factual.
Class: Professional.

john.doe@it-consultant.com
Context: john.doe is an IT consultant but has no professional relationship with the domain owner.
In this example the local element before the ‘@’ sign is conventional, informative, and factual, and the domain name acts to identify and therefore market John Doe’s skills or services.
Class: Professional.

teddy.bears@myunusual-domain.com
Context: the term ‘teddy.bears’ has a professional relationship with myunusual-domain.com and is relevant to a service, product, or other element associated with the owners’ professional interests.
This e-mail address can initially appear to be unprofessional however the owner may be providing a niche service. From the owner’s perspective the entire e-mail address may accurately reflect their business interests in a meaningful and professional sense.
Class: Professional.

companyABC@yahoo.com
Context: companyABC and yahoo.com have no professional relationship.
In this example the elements before and after the ‘@’ sign adopt a conventional, informative and factual format. Use of this e-mail address virally markets the name of companyABC, however it also endorses the services of the webmail service / domain owner. CompanyABC is using an address that in its’ entirety, does not represent or promote its professional interests. Given the relative ease of acquiring a professional domain name, and the fact that companyABC is claiming an Internet presence, use of this email address is not considered professional.
Class: Ambiguous / unprofessional.

jane.doe@gmail.com
Context: jane.doe and gmail.com have no professional relationship.
As with the previous example this address acts to serve the interests of the domain owner / service provider. Whilst jane.doe has elected to use a standard format for the local element before the ‘@’ sign, the overall e-mail address does not actively market or promote her professional interests.
Class: Unprofessional.

johndoe.superguy06@hotmail.com
Context: johndoe.superguy06 and hotmail.com have no professional relationship. Assuming Johndoe has no professional interest associated with the term ‘superguy06’ this e-mail address does not actively promote or market johndoe in a professional context. Furthermore, the format used before the ‘@’ sign is, for argument purposes, neither factual nor informative and will not be respected professionally. The address does however actively promote the e-mail service provider. Johndoe has endorsed their service and is performing viral marketing on their behalf. From the service providers perspective their professional interests have been represented in a positive manner by the fact that Johndoe is using their product.
Class: Unprofessional.

Conclusion
In order for an e-mail address to be classified as professional, ambiguous, or unprofessional, it needs to be considered in context, format, and in terms of factual and informative content. The local and domain name elements of the address need to be considered in their relationship to each other, and the intended audience of the e-mail address needs to be understood.

Tuesday, August 17, 2010

GADWIN PRINT SCREEN

Capture the screen easily!

Screen capture software

What is Gadwin PrintScreen?

Who needs Gadwin PrintScreen?

Why Gadwin PrintScreen?



What is Gadwin PrintScreen?

Want to create a screenshot suitable for saving or printing? Then just hit a key on your keyboard. Oh yeah, you'll have to download this program first.

There are several hotkey combos to choose from (PrintScreen is the default). Once you've chosen your favorite combo, head to the Destination tab and have the screen print out instantly, copy the capture to the clipboard, save it to a specific folder, or even send it through e-mail. You can perform full screen captures, or only capture a specific window.

Gadwin PrintScreen is an easy to use freeware utility that allows you to capture any portion of the screen, save it to a file, copy it to Windows clipboard, print it or e-mail it to a recipient of your choice.

There are also six different image formats to choose from, and each one can be resized. With all the customization capabilities, what more could you ask for?

Gadwin PrintScreen Professional combines the power of a first-class screen capture application with an advanced image editing and annotation utility - wrapped into one easy-to-use tool. Gadwin PrintScreen Professional is versatile and extremely easy-to-use.

Who needs Gadwin PrintScreen?

Screen captures can be used for many reasons. Use captured images from Gadwin PrintScreen to show off your product on the web. Enhance technical or sales documents and embed captures into presentations. Gadwin PrintScreen can help you capture and print or save computer screen data.

Why Gadwin PrintScreen?

On most Windows computers a full screen of data can be put on the clipboard by pressing the PrintScreen key. This sends whatever you see on screen to the clipboard, which you must then edit in a different graphics program to cut to the right size and image format. Here are some other reasons not to use the prefabricated PrintScreen function of Windows:

Full screen of data can be put only on the clipboard.

It is either difficult or impossible to capture some elements of a Windows screen, such as different shaped cursors.

You spend too much time making image captures.

Use Gadwin PrintScreen to save time and enhance your screen shots! Download Gadwin PrintScreen now and try it out! This is the best way to learn what it can do.

System Requirement.

Gadwin PrintScreen requires Microsoft ® Windows 98/Me/2000/2003/XP/Vista, or Windows NT 4.0SP6. If you are running any of these operating systems and have a Windows-compatible mouse or pointing device, your system has already met all the requirements necessary to run Gadwin PrintScreen. A full installation of Gadwin PrintScreen requires 5 megabyte of hard drive space.

http://www.gadwin.com/printscreen/


Your's friendly,
[MOHANRAM.G],
ADMIN...