Syntax e Copy

84

Transcript of Syntax e Copy

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.ac

e

ACE SPEAKS...

ACE’09 feels very happy to place this yearly book SYNTAX’09 in the hands of itswell-wishers, faculty, friends and supporters.

In order to cope with today’s competition each and every student should beaware of the happenings all around the world. To achieve this, the Department ofComputer Science and Engineering provides an excellent platform for all the studentsin the form of its annual magazine SYNTAX. This book covers a wide range of topicswhich are informative and thought provoking.

ACE’09 has tried its level best in meeting the standards set by the departmentand ACE’08.

ACE’09 is very thankful to the faculty members for the blessings and guidancethrough out the designing of this book. ACE’09 is foreever thankful for the support andencouragement from seniors,friends and juniors.

Last but not the least, ACE’09 thanks all the article contributors, volunteers,coordinators and most appropriately all the generous hearts, without whose support,this monumental work could not happen. This little idea of magazine became a realityonly due to the enthusiastic response from the students.

As a team, ACE’09 dedicates SYNTAX’09 to the well wishing and beloved seniors of2005-2009 batch who have been the strength and are part of its plans and actions, guidingthrough out their times with us. ACE expects the same cooperation and support fromthem through out their lives. All the best...

ACE’09

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.in

dexINDEX

Messages............................................................................................................7-13About Department................................................................................................15Body of ACE..........................................................................................................17Placements...........................................................................................................19GRE scores...........................................................................................................20E-mail ids.............................................................................................................21-26

*.tech

Web mining..........................................................................................................29Quantum computer..............................................................................................29Spamming............................................................................................................30Phishing...............................................................................................................31Ambient Intelligence............................................................................................31Ajax......................................................................................................................32Blue Gene.............................................................................................................325 worst computer viruses of all time....................................................................33Computer worm....................................................................................................33Captcha................................................................................................................34Types of Computer crimes..................................................................................35Know them Better.................................................................................................36Laser Keyboard.....................................................................................................36Touch Screen........................................................................................................37Virtualisation........................................................................................................383G wireless technology........................................................................................38Semantic web.......................................................................................................39Software as a Service...........................................................................................40Give me a Ring.....................................................................................................42Wanna be a gamer?.............................................................................................42Virtual fence for vehicles.....................................................................................43Mobile computing................................................................................................44Gate Keeper Pico..................................................................................................45Cloud Computing..................................................................................................46Is Internet explorer only your cup of tea?............................................................47Android.................................................................................................................48Transferjet............................................................................................................50The world’s premier technology competition for students..................................51Computer scientists.............................................................................................52

Association of Computer EngineersSyntax’09

Bapatla Engineering College

*.lit

Bio data of computers..........................................................................................55Strange warnings..................................................................................................55If............................................................................................................................55Room mates.........................................................................................................55Funny Definitions..................................................................................................56Is windows a virus?..............................................................................................57it’s a mistake........................................................................................................57Mother..................................................................................................................58Good Thoughts.....................................................................................................58Technology-Mythology.........................................................................................58Funny Acronyms...................................................................................................59Foot prints............................................................................................................59Symbols poem......................................................................................................59HRD notice...........................................................................................................60Love on screen.....................................................................................................61Thank you.............................................................................................................61In search of my friend..........................................................................................61Solution.................................................................................................................61Educational institutions........................................................................................62What’s life?..........................................................................................................62Luck......................................................................................................................62Peace....................................................................................................................62Light......................................................................................................................62Ramayana by Bill Gates.......................................................................................63Conversation between customer and UNIX consultant........................................64Success.................................................................................................................64Computer history of theworld..............................................................................65Error codes in Windows.......................................................................................66Have fun...............................................................................................................67Sneham.................................................................................................................68Udhayam..............................................................................................................68Sthree...................................................................................................................68Chaduvu................................................................................................................68Twinkle Twinkle little star in Telangana style......................................................694 Golden Rules.....................................................................................................694 Golden possessions...........................................................................................69Cricket examinations............................................................................................69Muskurana............................................................................................................69Drawings...............................................................................................................70-75Tips before planning abroad................................................................................76

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.m

sg

Sri M.Seshagiri Rao,President,

Bapatla Educational Society,Bapatla.

Message

My wishes to the students of the Department of Computer science on the release of the 4theditionof their departmental magazine Syntax. Departmental magazines strive to bring awareness among thestudents with its technical and literal contents.

I am elated to note that departmental association (ASSOCIATION OF COMPUTER ENGINEERS) isformed every year for organizing vaious technical and literal activities in the department. Such events willhelp the students in building their personality, developing their attitude, enhancing their communicationskills, thus allowing them to face the global competition and to become leaders.

I wish the CSE association every success in efforts to bring out inherent talents of students. Iappreciate the editors for their commendable work. My best wishes for all the graduating students.

(M.Seshagiri Rao)

MESSAGE FROM THE PRESIDENT’S DESK

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.m

sg

Message

It is indeed great pleasure to note that the Department of CSE is releasing its 4th editionof the annual magazine Syntax which briefs the activities of the Association. The magazine aims atbringing the hidden talents of the students of the department.

There are lots of advancements taking place in various technologies at rapid pace. It takeslonger time to get these covered in regular curriculum. It is important to catch up with these advance-ments at least briefly by putting some additional efforts. The Departmental Associations can play animportant role in bringing out the latest developments by way of articles in magazine, organizing shortseminars etc.; It gives a very good quick insight into these developments.

I wish the Association all the best and I hope that many good activities will be taken up by theAssociation in future also for the benefit of the students.

Dr. G.Nageswara Rao, Ph.DPrincipal,Bapatla Engineering College,Bapatla.

(Dr. G.Nageswara Rao)

MESSAGE FROM PRINCIPAL DESK

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.m

sg

Message

Engineering is the discipline and profession of applying natural laws to design systemsthat work for the cause of mankind. A critical aspect of this (often ignored) is to engineer an optimizedsystem that satiates and respects conflicting constraints. Indispensably, an engineering pupil is to beadept at an assorted skill set, preserving academic excellence concurrently.

I regard magazine club as a staging area where a pupil can sharpen the skills of designing, writing,compiling, optimizing and communicating. I found a great deal of character in the activity team of thecollege magazine and the efforts put in deserve plaudit. I claim with pride that I am a part of thismagazine, observing them all through.

I wish that more activities would be rolled in the ensuing time with the same spirit. I appeal to thestudents and faculty of the department to be committed beyond the self, to accomplish, and to perpetuatea congenial and serene academic aura.

An old adage says, “Ability is what you’re capable of doing. Motivation determines what you do.Attitude determines how well you do it”.

MESSAGE FROM HEAD OF THE DEPARTMENT

Prof. N.Sudhakar, M.Tech,Head of the Department,

Department of Computer Science and Engineering,Bapatla Engineering College,

Bapatla.

(Prof. N.Sudhakar)

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.m

sg

Prof. V.Chakradhar, M.Tech,Department of Computer Science and Engineering,Bapatla Engineering college,Bapatla.

Message

Time and tide wait for none. As today’s competitive world is moving at its full pace, maintaingtime as per schedule is the need of the hour. Through the magazine I would like to convey to all thestudents “to plan, prioritize and implement” their schedule on time.

Think big. Dream big. Thinking in a broder perspective is the way of approaching and solvingproblems. Dream is not the one which comes in sleep. Dream is the one which does not make us sleep.(At the same time dont sleep for long times in order to get big dreams).

Extra-curricular activities are equally important to the students along with the technical knowledgebecause they help in changing the approach of students and to visualize the problems from a differentangle. I wish the association to continue the extra-curricular activities which are a part of department’sschedule.

It is very glad to note that the association has maintained the standards set by the departmentand their seniors. I wish the association the best in all its activities.

(Prof. V.Chakradhar)

MESSAGE FROM THE COORDINATOR-ACE09

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.dep

t

The Department of Computer Science and Engineering was started in 1994-95. The Departmentoffers B.Tech and M.Tech programs in the stream of Computer Science & Engineering.The Departmentis accredited twice by NBA.

The department is equipped with the state of the art computing facilities, LCD projectors in allclass rooms, experienced staff members and is known for its academic excellence proved by itsperformances since its inception.

The pass percentage of the department has been more than 97% and more than 50% of thestudents obtain distinction every year, which speaks of the academic fervour in the department. Thedepartment holds the reputation of getting competitive GATE every year, and the students got admitted inall the IIT’s IISc, Central Univeristy, University of Roorkee and many Regional Engineering Colleges inM.Tech and M.S. Programs. A good number of students from the department obtained admissions intoM.S.(Computer Science) Program abroad .

Many of the students were placed in reputed organizations like HP, Texas Instruments, Motorola,Lucent, Wipro, HCL, Siemens, Veritas, Oracle, Hoenywell, Mindtree Solutions, Infosys, Aztec in challengingpositions.Students are encouraged to participate in extra-curricular activities and competitions held byother universities and colleges within the state and out-side the state. The students have won laurels tothe college winning prizes in competitions – TECHFEST IIT-Bombay, INFLUX: University of Roorkee andmany others. A good number of students from the department represent the college in IIT-M’S SHAASTRA,SAARANG and BITS-QUARK festivals on a regular basis.

The department strives hard to impart quality education and to keep the students on the competitiveedge of the present-day technology.

ABOUT DEPARTMENT...

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.bod

y

BODY OF ACE’09

V.A.NAVEESHAT.T.DEEPTHI

R.KAANTHI KEERTHIS.KAVYA

K.MOUNIKAD.ABHIRAMK.AVINASH

B.G.K.VARMAK.GANESH KUMARG.HARI KRISHNA

R.MAHENDRA SINGHM.N.V.V.RAMESH

B.N.SANDEEPR.PRAVEEN

P.R.CHAITHANYA SIDDHARTHAD.PRAVALLIKA

T.S.RAMYA KRISHNAN.RAMYA

G.S.R.JYOTHIR.RAMA KRISHNA

M.NAGA JYOTHIK.ASHA JYOTHI

A.SNEHAK.DINESH

T.V.K.CHAITANYA

FROM THIRD YEAR

FROM SECOND YEAR

STAFF COORDINATOR

Prof. V.CHAKRADHAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.jo

b

1 K. Anusha2 P. Anusha3 D. Bhavya4 M. Lakshmi Harika5 K. Amarendra6 P. Gopal Krisna Murthy7 G. Gautham8 K. H. N. V .Vijay9 P. Kishore Kumar10 Ch Ravi Teja11 C. T . V. Neelima12 G. Rajani13 B. Srividya14 Shaik Rizwan15 M. Sri Ram Avinash16 T. V. N. Siva Kumar17 P. Vedavyas18 M. V. Sumanth19 B. Vinod Kumar20 P. Swetha Mourya

PLACEMENTS FOR THE ACADEMIC YEAR 2008-2009

TATA CONSULTANCYSERVICES

1 P. Bhargavi2 K. H. N. V. Vijay3 J. Sravya4 Shaik Rizwan5 N .Siva Ram Krishna6 SK Rizwan Basha7 G. Srihari8 P. Sunil Kumar9 B. Vinod Kumar10 Jahid Shaik11 Ch Naga Kishore

1 Y.Teja

The following is the list of students who are placed in various multinational companies for the currentacademic year under the esteemed guidence of the placement incharge of the departmentMr.Sajid Ali Ansari.

INFOSYS

VIRTUSA

Association of Computer EngineersSyntax’09

Bapatla Engineering College

STUDENTS WHO SECURED RANKS IN GATE-2008

S.No. Name of the student All India Rank Percentile

1 S. Sirisha 442 97.502 N. Tulasiram 478 97.293 P.S.Srikanth 1335 92.444 Sk. Fathima Sultana 1748 90.125 Chennaiah 2147 87.916 K. Sudha 2285 87.297 K. Lakshmana Rao 2285 87.198 K. Ravindra Babu 8646 51.199 E. Jhansi Rani 9704 45.8910 K. Pushpavani 10,219 43.02

GRE-TOFEL - 2008

S.No. Name of the student GRE TOFEL

1. D. Bindu Chowdary 1040 —2. D. Haritha 1080 —3. CH. Divya 1000 —4. M.Goutham 980 —5. P. Lakshmi Kanth 1110 806. M. Bala Krishna 860 —7. T. Lakshmi 1000 —8. B.V.L.Alekhya 1050 —9. H. Vasundara Sonali 1080 —10. S.Vamsi Krishna 1183 —11. K. Tapaswi 1000 —12. P.S.Pavana Kumari 1120 —13. M. Naga Jyothi 1100 8314. Y. Chiranjeevi 1000 8615. T. Chaitanya Babu 960 —

UNIVERSITY RANKS FOR 2007-08

REG.NO Name of the student Rank

Y4CS476 N. Tulasi Ram II

Y4CS477 B.V.N.S. Bhavani Prasad IIIY4CS486 M.V.Sudheer Chandra IVY4CS464 S. Sirisha VIIIY4CS418 D. Haritha IX

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.id

Rno RegdNo Name e-mail ID

1 Y5CS403 Anusha.K [email protected] Y5CS404 Anusha.P [email protected] Y5CS413 Bhargavi.P [email protected] Y5CS414 Bhavya.D [email protected] Y5CS417 Dakshayani.Ch [email protected] Y3CS419 Harika.Ch [email protected] Y5CS426 Kavitha.J [email protected] Y5CS429 Lakshmi Harika.M [email protected] Y5CS430 Lakshmi Prasanna.K [email protected] Y5CS434 Maheswari.K [email protected] Y5CS436 Mercy kumari.A [email protected] Y5CS438 Mrudula.M [email protected] Y5CS443 Navya.S [email protected] Y5CS402 Amarendra.K [email protected] Y5CS405 Aravind Kumar.P [email protected] Y5CS406 Arun Babu.K [email protected] Y5CS407 Arun Kumar.G [email protected] Y5CS408 Avinash.M [email protected] Y5CS410 Bala Krishna.A [email protected] Y5CS411 Bala Krishna.V [email protected] Y5CS412 Bharath.M [email protected] Y5CS416 Chiranjeevi.S [email protected] Y5CS418 Deva Prasad.A [email protected] Y5CS419 Gopala Krishna Murthy.P [email protected] Y5CS420 Gautham.G [email protected] Y5CS425 Naga Venkata.Vijay.K.H [email protected] Y5CS421 Harish.N [email protected] Y5CS422 Hemanth.J [email protected] Y5CS423 Hemanth Reddy.B [email protected] Y5CS424 Jahid.Sk [email protected] Y5CS427 Kishore Kumar.P [email protected] Y5CS428 Krishna Reddy.Y [email protected] Y5CS432 Madusudhana Rao.Ch [email protected] Y5CS433 Mahesh.G [email protected] Y5CS435 Manohara Reddy.D [email protected] Y5CS437 Moulali.Sk [email protected] Y5CS439 Munesh Kumar.P [email protected] Y5CS440 Naga Kishore.Ch [email protected]

e-mail ID’s OF 2005-2009 Batch

Association of Computer EngineersSyntax’09

Bapatla Engineering College

41 Y5CS445 Phani Kumar.Ch [email protected] Y5CS446 Phani Kumar.G [email protected] Y5CS447 Prabhakar Rao.M [email protected] Y5CS449 Praveen Kumar.B [email protected] Y5CS451 Rajesh Babu.K [email protected] Y5CS453 Ravi Teja.Ch [email protected] Y5CS454 Ravi Teja Reddy.S [email protected] Y4CS451 Arun Chowdary.S.K.V [email protected] Y5CS415 Chandra Karthik.G [email protected] Y4CS457 Sandesh Kumar.G [email protected] L6CS493 Hima Bindu Ch [email protected] L6CS494 Jhansi Lakshmi S [email protected] Y4CS423 Kalyani Geetha P [email protected] Y5CS431 Loka Pavani P [email protected] L6CS496 Meghana K [email protected] L6CS497 Naseema Sk [email protected] Y5CS444 Neelima C.T.V [email protected] Y3CS450 Neethi Princes T [email protected] Y5CS450 Rajani.G [email protected] Y5CS455 Revathi.M [email protected] Y5CS458 Ruksana Begam.M [email protected] Y5CS464 Santhi Sree.K [email protected] Y5CS465 Sathya Gowri.B [email protected] Y5CS469 Sravya.J [email protected] Y5CS479 Srividya.B [email protected] Y5CS483 Sushma.T [email protected] Y5CS484 Swetha Mourya.P [email protected] Y5CS485 Teja.Y [email protected] L6CS492 Raghavulu.A.S.V [email protected] Y4CS409 Chennaiah.K [email protected] L6CS495 Kalyan Kumar.D [email protected] L6CS498 Ramakrishna.M [email protected] L6CS499 Ravi Kumar.M [email protected] Y5CS456 Rizwan.Sk [email protected] Y5CS457 Rizwan Basha.Sk [email protected] Y1CS450 Roshan Kumar.V [email protected] Y5CS460 Sai Ganesh.S [email protected] Y5CS461 Sai Pavan.P [email protected] Y5CS462 Sandeep Kumar.S [email protected] Y5CS466 Siddhartha.M [email protected] Y5CS467 Siva Rama Krishna.N [email protected] Y5CS468 Siva Prasad.N [email protected] Y4CS467 Sravan Gaddam [email protected]

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.id

84 Y5CS470 Sreehari.G [email protected] Y5CS472 Sri harsha.D [email protected] Y5CS471 Srikanth.R [email protected] Y5CS475 Srinivas.K [email protected] Y5CS476 Srinivasa Rao.B [email protected] Y5CS477 Srinu.P [email protected] Y5CS478 Sri Ram Avinash.M [email protected] Y5CS480 Sumanth.M [email protected] Y5CS481 Sundar.V [email protected] Y5CS463 Sundeep.N [email protected] Y5CS482 Sunil Kumar.P [email protected] L6CS500 UmaMaheswara Rao.B [email protected] Y5CS486 Siva Kumar .T.V.N [email protected] Y5CS409 Datta Pavan .B.V.S.N [email protected] Y5CS487 Veda Vyas.P [email protected] Y5CS488 Veeraiah Chowdary.K [email protected] Y5CS401 Phani Kumar.A.V [email protected] Y5CS489 Venkata Sumanth.M [email protected] Y1CS483 Venu Babu.N [email protected] Y5CS490 Vinod Kumar.B [email protected] Y5CS491 Yatish.T [email protected] Y5CS448 Pravallika.M [email protected] Y4CS473 Sujith Kumar.R [email protected] Y3CS484 Ratna Sekhar.V108 Y3CS448 Naveen Kumar.T [email protected] Y3CS453 Priscilla.J [email protected] Y5CS452 Ravi Kiran.M111 Y4CS401 Adilakshmi.Y [email protected] Y2CS409 Chinni Babu [email protected] Y2CS430 Nageswara Rao [email protected] Y4CS491 Vineeth Krishna.G [email protected] Y4CS458 Sasi Kumar.T [email protected]

BATCH ID:[email protected]

Association of Computer EngineersSyntax’09

Bapatla Engineering College

e-mail ID‘s OF 2006-2010 BATCH

Rno REGNo Name e-Mail ID

1 Y6CS403 Alekhya G [email protected] Y6CS406 Anisha N [email protected] Y6CS409 Anuradha [email protected] Y6CS410 Aruna Sree.T [email protected] Y6CS412 Bhagya Prathyusha [email protected] Y6CS414 Deepthi.A [email protected] Y6CS415 Deepthi.T [email protected] Y6CS426 Kaanthi.R [email protected] L7CS525 Kalyani.B [email protected] Y6CS427 Kanaka Durga.B [email protected] Y6CS429 Kavya.S [email protected] Y6CS432 Prasanna.L [email protected] Y6CS433 Lakshmi Devi.Y [email protected] Y6CS434 Lakshmi [email protected] Y6CS435 Lalitha [email protected] Y6CS439 Manasa.G [email protected] Y6CS441 Maruthi Devi.K [email protected] Y6CS442 Mounika.K [email protected] Y6CS453 Pavani.P [email protected] Y6CS456 Prathyusha [email protected] Y6CS457 Pravallika.C [email protected] L7CS532 Swathi.Y [email protected] Y6CS401 Abhiram.D24 Y6CS402 Abhishek.B [email protected] Y6CS404 Alif Basha.Sk [email protected] Y6CS405 Anil Kumar [email protected] Y6CS407 Anjani Sandeep [email protected] Y6CS408 Anudeep Naidu.G [email protected] Y6CS411 Avinash.K [email protected] Y6CS413 Balaji Komal.T.C [email protected] Y6CS416 Varma.B.G.K [email protected] Y6CS417 Manikanta.B.V.G.N [email protected] Y6CS418 Ganesh Kumar.K [email protected] Y6CS419 Gopal Krishna.C [email protected] Y6CS420 Hari Krishna.G [email protected] Y6CS421 Harish.P [email protected] Y6CS422 Himavanth [email protected] Y6CS428 Kasirao.V [email protected] Y6CS430 Kiran Kumar.S40 L7CS526 Sundraraju.M [email protected]

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.id

41 Y6CS436 Madhava.V [email protected] Y6CS437 Madhu Babu [email protected] Y6CS438 Mahendra Singh Rathore [email protected] Y6CS440 Manthru Naik [email protected] Y6CS443 Sudheer.G.M [email protected] Y6CS445 Ramesh.M.N.V.V [email protected] Y6CS446 Sandeep.B.N [email protected] Y6CS447 Nagarjuna Reddy.V [email protected] Y6CS448 Naresh Babu.K [email protected] Y6CS449 Nareshbabu.M [email protected] Y6CS451 Naveen Kumar [email protected] Y6CS452 Naveen Sagar [email protected] Y6CS454 Phani Kumar [email protected] Y6CS460 Praveen.R [email protected] Y6CS461 Praveen.T [email protected] Y6CS462 Siddhartha.P.R.C [email protected] Y6CS463 Raghavendra.I [email protected] Y6CS464 Raghavendra Raja [email protected] Y6CS465 Raghu.K [email protected] L7CS529 Rambabu.R [email protected] L7CS530 Sesha Sai.M [email protected] Y6CS424 Jaya Krishna [email protected] Y6CS431 Krishnaveni.M [email protected] Y6CS444 Teja Dev.N [email protected] Y6CS458 Pravallika.D [email protected] Y6CS459 Pravallika.K [email protected] Y6CS469 Rajitha.P [email protected] Y6CS472 Ramya.N [email protected] Y6CS478 S.Madhuri.D [email protected] Y4CS453 S R Jyothi.G [email protected] Y6CS479 S R Krishna.T [email protected] Y6CS484 Shiny.P [email protected] Y6CS485 Sireesha.P [email protected] Y6CS491 Sowmya.G [email protected] Y6CS492 Sowmya.K [email protected] Y6CS496 Srilakshmi.K [email protected] Y6CS500 Supraja.N [email protected] Y6CS501 Surekha.G [email protected] Y6CS502 Sushma.K [email protected] Y6CS507 Anusha.B.V.S.N [email protected] Y6CS510 Vamsi Krishna.D [email protected] Y6CS512 Venna Madhuri.G [email protected] Y6CS513 Alekhya.M.V.L [email protected] Y6CS514 Neeharika.A.V.N.L [email protected] Y6CS515 Mahathi.K.V.R [email protected]

Association of Computer EngineersSyntax’09

Bapatla Engineering College

92 Y2CS485 Venkateswaramma.K [email protected] L7CS521 Babu Rao.K [email protected] Y4CS411 Chinna NagaRaju.B [email protected] L7CS522 SivaSubramanyam.C [email protected] Y6CS466 Rajasekhar.A [email protected] Y6CS467 Rajendra.M [email protected] Y6CS468 Rajesh.V [email protected] Y6CS470 Rama Krishna.R [email protected] Y6CS471 Ramesh Chandra.C [email protected] Y6CS473 Ranga Reddy.A [email protected] Y6CS474 Ranjith Kumar.G [email protected] Y6CS476 Ravi.K [email protected] Y6CS480 Sandeep.L [email protected] Y6CS481 Sandeep.P [email protected] Y6CS482 Sandeep Reddy.S [email protected] Y6CS483 Sat ish.N sat [email protected] Y6CS486 Sita Sundeep.P pillut [email protected] Y6CS487 Siva.B [email protected] Y6CS488 Siva Chaitanya.E [email protected] Y6CS489 Siva Krishna.M [email protected] Y6CS493 Sankar Rao.D.S.S [email protected] Y6CS494 Sri Charan.M [email protected] Y6CS473 SriHari.T [email protected] Y6CS495 Srikar.N [email protected] Y6CS497 Srinivas Rao.I [email protected] Y6CS498 Sudheer Kumar.D [email protected] Y6CS499 Sunanda Kishore.E [email protected] Y6CS503 Ajay Bhargav.M.V [email protected] Y6CS504 Kesava Kumar.P.V [email protected] Y6CS505 Ravi Teja.P.V.P [email protected] Y6CS506 Manikanta.Ch.V.N [email protected] Y6CS508 Vamsee Krishna.N [email protected] Y6CS509 Vamsee Krishna.N [email protected] Y6CS511 Vamsi Krishna.T [email protected] L5CS499 Venkateswara Rao.P [email protected] Y6CS517 Venu Gopal Rao.N [email protected] Y6CS518 Vijay Sai.P [email protected] Y6CS519 Vijay Teja.N [email protected] Y6CS520 Vikram Singh.B [email protected] Y6CS521 Vivekanada Reddy.G [email protected] L7CS531 Yamini Sat ish.G yaminisat [email protected] Y4CS488 Venkateswarulu.K [email protected] Y3CS429 Kiran Kumar.A [email protected]

Computer Science and Engineering Syntax’09

Bapatla Engineering College

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

With the explosive growth of information sourcesavailable on the World Wide Web (WWW), it hasbecome increasingly necessary for users to utilizeautomated tools in order to find, extract, filter andevaluate the desired information and resources.

Web Mining can be broadly defined as thetechnology that mines the data gathered from theWorld Wide Web and comes out with some criticalresults.

Web Mining can be categorized into two types:1.Web Content Mining2.Web Usage Mining3.Web Structure Mining

Mining Process:The key component of Web Mining is the mining

process itself. It has adopted techniques from thefield of data mining, databases and informationretrieval, along with some techniques of its own.

Web Content Mining:Web Content Mining is an automatic process that

extracts patterns from online information, such asHTML files, images, E-mails along with some simplestatistics of words and phrases in the documentsbased on the keyword.

Web Usage Mining:Web Usage Mining is the type of Web Mining

activity that involves the automatic discovery of useraccess patterns from one or more web servers

Web structure mining:Web structure mining is the process of using graph

theory to analyse the node and connection structureof a web site. According to the type of web structuraldata, web structure mining can be divided into twokinds.

The first kind of web structure mining is extractingpatterns from hyperlinks in the web.A hyperlink is astructural component that connects the web pageto a different location. The other kind of the webstructure mining is mining the document structure.

K.SUDHEER KRISHNAM.BHANU KIRAN KUMARFIRST YEAR

WEB MINING

It is using the tree-like structure to analyse anddescribe the HTML (Hyper Text Markup Language)or XML (eXtensible Markup Language) tags withinthe web page.

As more organizations rely on the internet andthe World Wide Web to conduct business, thetraditional strategies and techniques for marketanalysis need to be revisited in this context. Mostof this information is usually generatedautomatically by web servers and is collected inserver access logs.As the popularity of World WideWeb continues to increase, there is a growing needto develop tools and techniques that will enrich theusage of web mining.

QUANTUM COMPUTER

A quantum computer is any device forcomputation that makes direct use of distinctivelyquantum mechanical phenomena, such assuperposition and entanglement, to performoperations on data. In classical computer,information is stored as bits; in a quantum computerit is stored as zubits (quantum bits).

The basic principle of quantum computation isthat the quantum properties can be used torepresent and structure data, and that quantummechanisms can be devised and built to performoperations with this data.

Classical computer has a memory made up of“bits” where each bit holds either 0 or 1. A quantum

K.DIVYASRIJ.MARY GOLDSECOND YEAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

B.USHA PRIYADARSHINIK.SINDHURAFIRST YEAR

E-mail spam, also known as bulk e-mail or junke-mail is a subset of spam that involves sendingnearly identical messages to numerous recipientsby e-mail. E-mail spam has existed since thebeginning of the internet and has grown to about90 billion messages a day, although about 80% issent by fewer than 200 sporadically implemented,with some being opt-out laws and others being opt-in.

Spam definition defined as, unsolicited bulk e-mail (UBE)-Unsolicited e-mail, sent in largequantities. This is the most popular definition.How E-mail spam is sent?

Spam is a term to describe unsolicited e-mail sentto you, often by commercial firms that attempt tosell you goods and services. Spam is sent out asbulk e-mail, often to list of 10,000 or more personsat once. It is inexpensive to send.

To send out unsolicited bulk e-mail, a spammerfirst needs to get a list of e-mail addresses. Often,spammers buy the lists from companies thatcompile them.Statistics and Estimations

The growth of e-mail spam:Spam is growing, with no signs of abating. The

amount of spam users see in their mail boxes isjust the tip of the iceberg. Since spammer’s lists

SPAMMINGcomputer maintains a sequence of “qubits”. A singlequbit can hold a one or a zero or crucially a quantumsuperposition of these.

A pair of qubits can be in a quantum-superpositionof 4 states and three bits in a superposition of 8. Ingeneral a quantum computer with n qubits can bein upto 2n different states simultaneously. Quantumcomputer must have atleast several dozen qubitsto be able to solve real world problems. Aquantum.Computer operates by manipulating thosequbits with a fixed sequence of quantum logic gates.The sequence of gates to be applied is called a“Quantum Algorithm”.

Quantum computers are different from othercomputers such as DNA computers and traditionalcomputers based on transistors. By comparison, aquantum computer could solve this problem moreefficiently than a classical computer using shor’salgorithm to find its factors. This ability would allowa quantum computer to break many of thecryptographic systems in use today, in the sensethat there would be a polynomial time algorithm forsolving the problem. But for now the technologyrequired to develop such a quantum computer isbeyond of our research. Most research in quantumcomputing is theoritical.The most advancedquantum computer have not gone beyondmanipulating more than 16 qubit meaning that theyare far cry from practical application.

If quantum computers can be built they willbe valuable in these ways.

In factoring large numbers.These are used to protect secure web pages,

encrypted e-mail and many other types of data. Tosearch large database in a fraction of the time thatit would take a conventional computer. Anot herapplivations are to study quantum mechanics andto design other quantum computers.

But quantum computing is in early stages ofdevelopment and many computer scientists believethat the technology needed to create a practicalquantum computer is years away.

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

PHISHING.

In computing, phishing is criminal activity usingsocial engineering techniques. Phishers attempt tofraudulently acquire sensitive information, such aspasswords and credit card details, by masqueradingas a trust worthy person or business in an electroniccommunication.

Phishing is typically carried out using e-mail oran instant message, although phone contact hasbeen used as well.

Damage caused by Phishing:The damage caused

by phishing ranges fromdenial of access to e-mail to substantialfinancial loss. This styleof identify theft isbecoming more popular,because of readiness tophishers, including creditcard numbers, socialsecurity numbers and mothers maiden names. Oncethis information is acquired, the phishers may usea person’s details to create fake accounts in avictim’s name. They can then ruin the victim’s creditor even deny the victims access to their ownaccounts.

Anti PhishingPeople can take steps to avoid phishing attempts

by slightly modifying their browsing habits. When

L.MANJUSHAV.SRI DIVYASECOND YEAR

often contain a large percentage of invalid addressesand many spam filters simply delete or reject“obvious spam”.

In Absolute Numbers:1978- An e-mail spam is sent to 600 addresses.1944- First large scale spam sent to 6000 news

groups, reaching millions of people.2005- 30 billion per day.2006- 55 billion per day.2007- 90 billion per day.

contacted about an account needing to beverified, it is a sense of precaution to contact thecompany from which the e-mail apparentlyoriginates to check that the e-mail is legitimate.Alternatively, the address that the individualknows is the company’s genuine website can betyped into the address bar of the browser, ratherthan trusting any hyperlinks in the suspectedphishing message.

In computing, ambient intelligence (AMI) refersto electronic environments that are sensitive andresponsive to the presence of people. Ambientintelligence is a vision on the future of consumerelectronics, telecommunications and computing thatwas originally developed in the late 1990s for thetime frame 2010–2020. In an ambient intelligenceworld, devices work in concert to support people incarrying out their everyday life activities, tasks andrituals in easy, natural way using information andintelligence that is hidden in the network connectingthese devices (see Internet of Things). As thesedevices grow smaller, more connected and moreintegrated into our environment, the technologydisappears into our surroundings until only the userinterface remains perceivable by users. The ambientintelligence paradigm builds upon ubiquitouscomputing and human-centric computer interactiondesign.

AMI should facilitate human contact.AMI should be orientated towards community and

cultural enhancement.AMI should help to build knowledge and skills for

work, better quality of work, citizenship andconsumer choice.

AMI should inspire trust and confidence.AMI should be consistent with long term

sustainability - personal, societal and environmental- and with life-long learning.

N.RAMYAPRAVALLIKATHIRD YEAR

AMBIENT INTELLIGENCE

Association of Computer EngineersSyntax’09

Bapatla Engineering College

AJAXSRI CHARANK.AVINASHTHIRD YEAR

Ajax, or AJAX (Asynchronous JavaScript and XML),is a group of interrelated web developmenttechniques used to create interactive webapplications or rich Internet applications. With Ajax,web applications can retrieve data from the serverasynchronously in the background withoutinterfering with the display and behavior of theexisting page. The use of Ajax has led to an increasein interactive animation on web pages. Data isretrieved using the XMLHttpRequest object orthrough the use of Remote Scripting in browsers thatdo not support it. Despite the name, the use ofJavaScript and XML is not actually required, nor dothe requests need to be asynchronous.

While the term Ajax was coined in 2005,alternative techniques for the asynchronous loadingof content date back to the mid 1990s. Java appletswere introduced in the first version of the Javalanguage in 1995. These allow compiled client-sidecode to load data asynchronously from the webserver after a web page is loaded. In 1996, InternetExplorer introduced the IFrame element to HTML,which also enables this to be achieved. In 1999,Microsoft created the XMLHttpRequest object as anActiveX control in Internet Explorer 5. This is nowsupported by Mozilla and Safari as native versionsof the object. On April 5, 2006 the World Wide WebConsortium (W3C) released the first draft

specification for the object in an attempt to createan official web standard.

The term Ajax has come to represent a broadgroup of web technologies that can be used toimplement a web application that communicateswith a server in the background, without interferingwith the current state of the page.

Advantages:1) In many cases, related pages on a website

consist of much content that is common betweenthem. Using traditional methods, that content wouldhave to be reloaded on every request. However,using Ajax, a web application can request only thecontent that needs to be updated, thus drasticallyreducing bandwidth usage and load time.

2) The use of asynchronous requests allowsthe client’s Web browser UI to be more interactiveand to respond quickly to inputs, and sections ofpages can also be reloaded individually. Users mayperceive the application to be faster or moreresponsive, even if the application has not changedon the server side.

3) The use of Ajax can reduce connectionsto the server, since scripts and style sheets only haveto be requested once.

BLUE GENE

A Blue Gene is a computer architecture projectdesigned to produce several next generation supercomputers to reach operating speeds in thepetaflops range and currently reaching sustainedspeeds over 360 teraflops. Though it is designed torun continuously at one petaflops, it can beconfigured to reach speeds in excess of threepetaflops. Furthermore it is at least seven timesmore energy efficient than any other supercomputers accompanied by using many small, lowpower chips connected through five specializednetworks.

K.ASHA JYOTHIP.RAJYA LAKSHMIG.RAGA HARSHINISECOND YEAR

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

5 WORST COMPUTER VIRUSES OF ALL TIME

Slammer/Sapphire:It affected in 2003. It is such a dangerous virus

that, only a few minutes after infecting its firstInternet server, theSlammer virus wasdoubling its numberof victims everysecond. F ifteenminutes after its firstattack, the Slammervirus infected nearlyhalf of the serversthat act as the pillarsof the Internet.M y d o o m /Novarg:

It is another worm that can create a backdoor inthe victim computer’s OS. The original MyDoom virushad two triggers. One trigger caused the virus tobegin a Denial of Service (DoS). The second triggercommanded the virus to stop distributing itself. Evenafter the virus stopped spreading, the backdoorscreated during the initial infections remained active.Sasser/Netsky:

Unlike other worms, it didn’t spread through e-mail. Instead, once the virus infected a computer, itlooked for other vulnerable systems. It contactedthose systems and instructed them to download thevirus. The virus altered the victim’s operating systemin a way that made it difficult to shut down thecomputer without cutting off power to the system.

The Netsky virus moves through e-mails andWindows networks. It spoofs e-mail addresses andpropagates through a 22,016-byte file attachment.As it spreads, it can cause a Denial of Service (DoS)attack as systems collapse while trying to handleall the Internet traffic.Leap-A/Oompa:

In 2006, the Leap-A virus, also known as Oompa-A, uses the iChat instant messaging program to

T.T.DEEPTHIS.KAVYATHIRD YEAR propagate across vulnerable Mac computers.

After the virus infects a Mac, it searches throughthe iChat contacts and sends a message to eachperson on the list. The message contains acorrupted file that appears to be an innocent JPEG

image. The Leap-A virus doesn’t cause muchharm to computers, but it does show thateven a Mac computer can fall prey tomalicious software.Storm Worm:

The latest virus on our list is the dreadedStorm Worm. The public began to call the virusthe Storm Worm because one of the e-mailmessages carrying the virus had as its subject“230 dead as storm batters Europe.” The StormWorm is a Trojan horse program. Some versionsof the Storm Worm turn computers into

zombies or bots. Some hackers use the Storm Wormto create a botnet and use it to send spam mailacross the Internet. Although the Storm Worm iswidespread, it’s not the most difficult virus to detector remove from a computer system.

COMPUTER WORM

A Computer Worm is a self-replicating computerprogram. It uses a network to send copies of itselfto other nodes (computer terminals on the network)and it may do so without any user intervention. Unlikea virus, it does not need to attach itself to an existingprogram. Worms always harm the network whereas viruses always infect or corrupt files on atargeted computer. Worms mainly spread byexploiting vulnerabilities in operating systems or bytricking users to assist them.

M.VINOD KUMARKAUTILYASECOND YEAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

CAPTCHA

CAPTCHA stands for Completely AutomatedPublic Turing test to tell Computers and HumansApart. CAPTCHA is very useful tool in differentiatingrobots from humans. It is a simple test to determineif the user is a robot or human.Computer Viruses:Computer viruses are computer programs that canreplicate themselves and harm the computer

systems on a network without theknowledge of the system users. Virusesspread to other computers throughnetwork file system, through thenetwork, Internet or by the means ofremovable devices like USB drives andCD.

History Primitive CAPTCHA’s were developed in 1997 by

Andrei Broder, Martin Abadi, Krishna Bharat andMark Lillibridge to prevent bots from adding URLsto Altavista search engine. In 2000, Luis von Ahnand Manuel Blum coined the term “CAPTCHA”. Theyinvented multiple examples of CAPTCHAs, includingthe first CAPTCHA’s used by Yahoo.

Principle The principles behind CAPTCHA are as

follows:- The user is presented with a distorted image

on which some text is displayed. This image isgenerated by the server using random text.

- The user must enter the same letters in thetext into a text field that is displayed on the form toprotect.

- When the form is submitted, the server

Types of CAPTCHA’s:The first CAPTCHA built was text CAPTCHA.Next there came image CAPTCHA.For the people

who have difficulty to see there were CAPTCHAs inaudio format.For the people who can not see as wellas listen, there are mathematical CAPTCHAs calledMAPTCHAs. CAPTCHAs can prevent

Auto registration,Mass mailing in forums andg u e s t b o o k s , C o m m e r c i a lpromotion,Harassment,Rate limiting for competitivewebsites,Article rating by computers but nothumans.

Bypassing Captcha’sThere are a few approaches to defeating

CAPTCHAs:· exploiting bugs in the implementation that

allow the attacker to completely bypass theCAPTCHA,

· improving character recognition software, or· using cheap human labor to process the

tests.

checks if the text entered by the user matches theinitial generated text. If it does, the transactioncontinues. Otherwise, an error message is displayedand the user has to enter a new code.

- Exploits observation that humans are stillmuch better than computers at many patternrecognition tasks.

At the present moment text-CAPTCHA is stilleffective because there is no universal algorithmfor text recognition.There are two strategies ofdefense:

1) Make a change in CAPTCHA as soon it isbroken.

2) Use innovative approaches in CAPTCHA’sengines to make it complex and attack free.

T.V.K.CHAITANYAS.RAMESH REDDYSECOND YEAR

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

TYPES OF COMPUTER CRIMES

Computer crimes are criminal activities, whichinvolve the use of information technology to gainan illegal or an unauthorized access to a computersystem with intent of damaging, deleting or alteringcomputer data. Computer crimes also include theactivities such as electronic frauds, misuse ofdevices, identity theft and data as well as systeminterference. Computer crimes may not necessarilyinvolve damage to physical property. They ratherinclude the manipulation ofconfidential data and criticalinformation. Computer crimesinvolve activities of software theft,wherein the privacy of the users ishampered. These criminal activitiesinvolve the breach of human andinformation privacy, as also thetheft and illegal alteration ofsystem critical information.Types of computer crimes:

Hacking: The act of defeating thesecurity capabilities of a computersystem in order to obtain an illegal access to theinformation stored on the computer system is calledhacking. Another highly dangerous computer crimeis the hacking of IP addresses in order to transactwith a false identity, thus remaining anonymouswhile carrying out the criminal activities. Phishing:Phishing is the act of attempting to acquire sensitiveinformation like usernames, passwords and creditcard details by disguising as a trustworthy source.Phishing is carried out through emails or by luringthe users to enter personal information through fakewebsitesCriminals often use websites that have alook and feel of some popular website, which makesthe users feel safe to enter their details there.

Computer Viruses: Computer viruses arecomputer programs that can replicate themselvesand harm the computer systems on a networkwithout the knowledge of the system users. Viruses

Y.LAKSHMI DEVIK.MOUNIKATHIRD YEAR

spread to other computers through network filesystem, through the network, Internet or by themeans of removable devices like USB drives andCDs. Computer viruses are after all, forms ofmalicious codes written with an aim to harm acomputer system and destroy information. Writingcomputer viruses is a criminal activity as virusinfections can crash computer systems, therebydestroying great amounts of critical data.

Cyber stalking: The use of communicationtechnology, mainly the Internet, totorture other individuals is knownas cyber stalking. Falseaccusations, transmission ofthreats and damage to data andequipment fall under the class ofcyber stalking activities. Cyberstalkers often target the users bymeans of chat rooms, onlineforums and social networkingwebsites to gather user informationand harass the users on the basisof the information gathered.

Identity Theft: This is one of the most seriousfrauds as it involves stealing money and obtainingother benefits through the use of a false identity. Itis the act of pretending to be someone else by usingsomeone else’s identity as one’s own. Financialidentity theft involves the use of a false identity toobtain goods and services and a commercial identitytheft is the using of someone else’sbusinessnameor credit card details for commercial purposes.Identity cloning is the use of another user’sinformation to pose as a false user. Illegal migration,terrorism and blackmail are often made possible bymeans of identity theft.

Manner reveals Character

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Yahoo! – It represents a person who is repulsivein appearance and barely human. Yahoo! foundersDavid Filo and Jerry Yang jokingly consideredthemselves yahoos.

Oracle – Larry Ellison, Ed Oates and Bob Minerwere working on a consulting project for the CIA.The code name for the project was Oracle (the CIAsaw this as the system to give answers to allquestions or some such). The project was designedto use the newly written SQL database languagefrom IBM. The project was eventually terminatedbut they decided to finish what they started andbring it to the world. Later they changed the nameof the company, Relational Software Inc., to thename of the product.

Intel – Robert Noyce and Gordon Moore initiallyincorporated their company as N M Electronics.Someone suggested Moore Noyce Electronics butit sounded too close to “more noise”.

Later, Integrated Electronics was proposed but ithad already been taken, so they used the initialsyllables (INTegrated ELectronics).

Microsoft – coined by Bill Gates to represent thecompany that was devoted to microcomputersoftware. Originally christened Micro-Soft, the ‘-’disappeared on 3/2/1987 with the introduction of anew corporate identity and logo. The “slash between

KNOW THEM BETTER

R.MAHENDRA SINGHSIDDARDHATHIRD YEAR

the ‘o’ and ‘s’ [in the Microsoft logo] emphasizesthe “soft” part of the name and conveys motion andspeed.

Hotmail – Founder Jack Smith got the idea ofaccessing e-mail via the web from a computeranywhere in the world. When Sabeer Bhatia cameup with the business plan for the mail service hetried all kinds of names ending in ‘mail’ and finallysettled for Hotmail as it included the letters “HTML”– the markup language used to write web pages. Itwas initially referred to as HoTMaiL with selectiveupper casing.

In recent days, many keyboards are taking theirbirth in the market. One of such keyboards is LASERKEYBOARD. This keyboard can be placedanywhere.It is compact and user friendly. The VirtualLaser Keyboard leverages the power of laser andinfrared technology and projects a full-size keyboardonto any flat surface.

Mobile users can type normally on this virtualkeyboard (VKB).It allows them to work quickly andeffectively. Based on optical recognition, it enablesthe user to tap the images of the keys, which arethen fed into the compatible Bluetooth-enabled PDA,Smartphone, laptop or PC.

The Virtual Laser Keyboard provides a full-sizeQWERTY keyboard. It is also smaller and moreconvenient to use than the folding-type keyboardsmade by some manufacturers and are similar tothem in functionality. It provides a projected imagewhich is the perfect portable input device for PDAs.It is similar in responsiveness to regular keyboards.It includes a self-contained, rechargeable Lithiumion battery. It provides the Virtual Laser Keyboardwith its own internal power supply, so it doesn’t drainany battery power from the PDA or PC. The battery

M.V.L.ALEKHYAK.PRATHYUSHATHIRD YEAR

LASER KEYBOARD

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

lasts two to three hours, more than enough time todo some instant messaging and SMS messagingfrom the handheld existing minuscule keyboards andhandwriting recognition software.

Touch screen in a table is a latest wrinkle incomputers. Among the fast growing technologiestouch screen has encountered a portion. Manytechnologies have been emerged for building uptouch screen panels. A few quotable technologiesare:Acoustic Pulse Recognition

This system uses more than 2 piezo-electrictransducers located at some position of the screento turn the mechanical energy of a touch intoelectric signal. The screen hardware then uses analgorithm to determine the touch based ontransducer signals. This process is similar totriangulation used in GPS. The touch screen itself ismade of ordinary glass, giving it good durability &optical clarity.Nintendo DS is an example.Optical Imaging

A relatively-modern development in touch screentechnology, two or more image sensors are placedaround the edger (mostly the corners) of the screen.Infrared backlights are placed in the camera’s field

B.MANIKANTAASHWINFIRST YEAR

TOUCH SCREEN

of view on the other sides of the screen. A touchshows up as a shadow and each pair of camera’scan then be triangulated to locate the touch oreven measure the size of the touching object. Thistechnology is growing in popularity, due to itsscalability, versatility and affordability especiallyfor larger units.Dispersive Signal Technology

Introduced in 2002, this system uses sensorsto detect the mechanical energy in the glass thatoccurs due to a touch. Complex algorithms theninterpret this information and provide the actuallocation of touch. The technology claims to beunaffected by dust and other elements, includingscratches.

Since there is no need for additional elements onscreen, it also claims to provide excellent opticalclarity. Also since mechanical vibrations are usedto detect a touch event, any object can be used togenerate these events, including fingers and styles.A downside is that after the initial touch the systemcannot detect a motionless finger.

Surface Acoustic WaveSurface acoustic wave technology uses ultrasonic

waves that pass over the touch panels. When a panelis to touch a portion of wave is absorbed. Thischange in ultrasonic waves registers the portion oftouch events and sends this information to thecontroller for processing. Surface wave touch screenpanels can be damaged by outside elements.Contaminants on the screen can also interfere onthe functionality of the screen.

Association of Computer EngineersSyntax’09

Bapatla Engineering College

In computing Virtualisation is a broad term thatrefers to abstraction of computer resources.

Platform virtualization which separates anoperating system forms the underlying platformresources:-

Full virtualizationHard ware- assisted virtualizationPartial virtualizationPara virtualizationOperating system level virtualizationHasted environment

Operating system- level virtualization:-It is commonly used in virtual hosting

environment, where it is useful for securelyallocating finite hardware resources amongst alarge number of mutually distrusting users.

Other typical scenarios include separating severalapplications to separate containers for improvedsecurity, hardware independence and addedresource management features.

Os level virtualization implementations that arecapable of live emigration can be used for dynamicload balancing of containers between nodes in acluster.Advantages and Disadvantages:-

Over head:- This form of virtualization usuallyimposes little or no overhead, because programs invirtual partitions use the operating system’s normalsystem call interface and do not need to besubjected to amulation or run in an intermediatevirual machine, as if the case with whole systemvirtualization or para virtualisers (such as XEN andUML).

Flexibility:-Operating system level virtualizationis not as flexible as other Virtualization approachessince it cannot host a guest operating systemdifferent from the host one or a different guest kernel

For example with Linux, different distributions arefine, but other operating systems such as windowscannot be hosted. This limitation is partially

Third Generation(3G) wireless Technology is arecently proposed open industry for larger distancelocal wirelesscommunication ofmobile device.3Gwireless networksare capable oftransferring data atspeeds of up to3 8 4 K b p s . T h e i raverage speedsranges between 64Kbps and 384kbps.

The 3G system is both complete and full-featured,with many components and layers of abstraction. Itincludes the specification of the Radio subsystem(spectrum), the base band features, packet formats,the link management and profiles for specificapplications and services while new technologyprovides its users with increased possibilities, it canalso provide with power weapons. Recently, thepublic has started to pay attention to need forprivacy. The mechanisms for authentification andencryption are built on symmetric-key cryptographyin 3G.

The main advantages of 3G include the need forhigher data rate services, such as high-speedwireless internet access and packet-based datatransfer and more.

CH.RAMYAS.MOUNIKAP.T.J.INDRAJASECOND YEAR

J.AMARU.V.N.KISHORESECOND YEAR

VIRTUALISATION

overcomed in solaris containers by its brandedzones.

Storage:- Some operating system virtualizersprovide file-level copy or write mechanisms mostcommonly a standard file system is shared betweenpartitions and partitions which change the filesautomatically create their own copies.

3G WIRELESS TECHNOLOGY

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

Although the 3G technology has led to somerevolutionary changes in Technology people are yetto have access to the revolutionary advantages overthe conventional systems.

The word semantic stands for the meaning of.The Semantic Web is an evolving extension of theWorld Wide Web in which the semantics ofinformation and services on the web is defined andsatisfy the requests of people and machines to usethe content. It derives from World Wide WebConsortium director Sir Tim Berners-Lee’s vision ofthe Web as a universal medium for data,information, and knowledge exchange.The SemanticWeb is a web that is able to describe things in away that computers can understand. The SemanticWeb describes the relationships between things andthe properties of things.

RDF (Resource Description Framework) is amarkup language for describing information andresources on the web.Semantic web involvepublishing in languages specifically designed fordata: RDF, Web Ontology Language (OWL), andExtensible Markup Language (XML).Potential Advantages of Semantic web:

· Search· Agents· Knowledge management· Integration· Composition of complex systems· Multimedia collection· Information filtering· Machine dialogue across the domains· Virtual community· Serendipity (unexpected benefits)

· Vocabulary flexibility & standardizationServices of Semantic Web:

A) Semantic Web Ping ServiceThe Semantic Web Ping Service is a notification

service for the semantic web that tracks the creationand modification of RDF based data sources on theWeb.

B) Piggy BankPiggy Bank works by extracting or translating eb

scripts into RDF information and storing thisinformation on the user’s computer.Ex: Google Mapsto display information. Piggy Bank works with a newservice, Semantic Bank, which combines the ideaof tagging information with the new web languagesComponents:

· XML provides an elemental syntax forcontent structure within documents.

· XML Schema is a language for providing andrestricting the structure and content of elementscontained within XML documents.

· RDF is a simple language for expressing datamodels, which refer to objects (“resources”) andtheir relationships. ( in XML syntax).

· RDF Schema is a vocabulary for describingproperties and classes of RDF-based resources.

· OWL (WEB ONTOLOGY LANGUAGE ) addsmore vocabulary for describing properties andclasses.

· SPARQL is a protocol and query language forsemantic web data sources.

SW enriches current Web with semantics in termsof some standards and could improve Internetcommerce from several aspects.

SEMANTIC WEB

T.PRAVEENPHANI KUMARTHIRD YEAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

The combination of ever-more-abundantbandwidth, increasingly powerful processors, andinexpensive storage is broadening the choices fordesigning, deploying, and using software: in devices,in computers, on servers in corporate data centers,and on the Internet. Business solutions can bedelivered and consumed in all of these ways—eithersingly or in combination—to provide the best userexperience and the most business value. Softwareas a Service (SaaS)—meaning delivering softwareover the Internet—is increasingly popular for itsability to simplify deployment and reduce customeracquisition costs; it also allows developers tosupport many customers with a single version of aproduct. SaaS is also often associated with a “payas you go” subscription licensing model.Typicallypronounced ‘Saas’ is a model of softwaredeployment where an application is hosted as aservice provided to customers across the Internet.By eliminating the need to install and run theapplication on the customer’s own computer, SaaSalleviates the customer’s burden of softwaremaintenance, ongoing operation, and support.Conversely, customers relinquish control oversoftware versions or changing requirements;moreover, costs to use the service become a

continuous expense, rather than a single expenseat time of purchase. Using SaaS also can conceivablyreduce that up-front expense of software purchases,through less costly, on-demand pricing. SaaS letssoftware vendors control and limit use, prohibitscopies and distribution, and control all derivativeversions of their software. This centralized controloften allows the vendor to establish an ongoingrevenue stream. As a term, SaaS is generallyassociated with business software and is typicallythought of as a low-cost way for businesses to obtainthe same benefits of commercially licensed,internally operated software without the associatedcomplexity and high initial cost. Many types ofsoftware are well suited to the SaaSmodel.Application areas such as Customerrelationship management (CRM), videoconferencing, human resources, IT serof the initialmarkets showing SaaS success. The distinctionbetween SaaS and earlier applications deliveredover the Internet is that SaaS solutions weredeveloped specifically to leverage web technologiessuch as the browser, thereby making them web-native This further differentiates SaaS from client/server or ‘ASP’ (Application Service Provider)solutions in those SaaS providers are leveragingenormous economies of scale in the deployment,management, support and through the SoftwareDevelopment Lifecycle.Key characteristics

The key characteristics of SaaS software,according to IDC, include:

SOFTWARE AS A SERVICE (SAAS)

K.V.GANESHCH.SAI BABUY.TEJASECOND YEAR

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

Network-based access to, and management of,commercially available software

· activities that are managed from centrallocations rather than at each customer’s site,enabling customers to access applications remotelyvia the Web

· application delivery that typically is closerto a one-to-many model (single instance, multi-tenant architecture) than to a one-to-one model,including architecture, pricing, partnering, andmanagement characteristics

· Centralized feature updating, which obviatesthe need for downloadable patches and upgrades.

· SaaS is often used in a larger network ofcommunicating software - either as part of a mashup or as a plug-in to a platform as a service. Serviceoriented architecture is naturally more complex thantraditional models of software deployment.

· More feature requests from users sincethere is frequently no marginal cost for requestingnew features;

· Faster releases of new features since theentire community of users benefits from newfunctionality; and

· The embodiment of recognized best practicessince the community of users drives the softwarepublisher to support the best practice.Implementation

According to Microsoft, SaaS architecturesgenerally can be classified as belonging to one offour “maturity levels,” whose key attributes areconfigurability, multi-tenant efficiency, andscalability.[4] Each level is distinguished from theprevious one by the addition of one of those threeattributes:

· Level 1 - Ad-Hoc/Custom: At the first levelof maturity, each customer has its own customizedversion of the hosted application and runs its owninstance of the application on the host’s servers.Migrated traditional non-networked or client-serverapplication to this level of SaaS typically requiresthe least development effort and reduces operatingcosts by consolidating server hardware andadministration.

· Level 2 - Configurable: The second maturity

level provides greater program flexibility throughconfigurable metadata, so that many customerscan use separate instances of the sameapplication code. This allows the vendor to meetthe different needs of each customer throughdetailed configuration options, while simplifying

maintenance and updating of a common codebase.

. Level 3 - Configurable, Multi-Tenant-Efficient: The third maturity level adds multi-tenancy to the second level, so that a singleprogram instance serves all customers. Thisapproach enables more efficient use of serverresources without any apparent difference to theend user, but ultimately is limited in its scalability.

· Level 4 - Scalable, Configurable, Multi-Tenant-Efficient: At the fourth and final SaaSmaturity level, scalability is added through amultitier architecture supporting a load-balancedfarm of identical application instances, running ona variable number of servers. The system’s capacitycan be increased or decreased to match demand byadding or removing servers, without the need forany further alteration of application softwarearchitectureLimiting factors

Widespread implementation of SaaS requires thatthe services be well defined. That can achieve aneconomy of scale and the capacity to balance supplyand demand. This requires areas of IT that areubiquitous and commodity-like. SaaS is therefore notsuitable for innovative or highly specialized nichesystems, though SaaS may be used to provide oneor more components in such systems.

As with manufacturing, a lack of substitutabilityand second sourcing options with any commoditycreates a strategic weakness for any customer interms of security, competition and pricing

Think like genius, work like giant andlive like a saint

Association of Computer EngineersSyntax’09

Bapatla Engineering College

According to IBM, very soon, cell phones will takea new form, appearing to have no form at all. IBMhas developed a prototype of a cell phone thatconsists of several pieces of digital jewelry thatwill work together wirelessly, possibly withBluetooth wireless technology.

Various components present inside a normal cellphone are:

1) Microphone2) Receiver3) Touchpad4) Display5) Circuit board6) Antenna7) BatteryHere are the pieces of IBM’s computerized-

jewelry phone and their functions:· Earrings - Speakers embedded into these

earrings will act as phone’s receiver.· Necklace - Users will talk into the necklace’s

e m b e d d e dmicrophone.

· Ring - The“magic decoderring” is equippedwith LED’s thatflash to indicatean incoming call.It can also beprogrammed toflash different colors to identify a particular calleror indicate the importance of a call.

· Bracelet - Equipped with a video graphicsarray (VGA) display, this wrist display could alsobe used as a caller identifier that flashes the nameand phone number of the caller.

Together, the digital-jewelry cell phone will workjust like a conventional cell phone. We can call toa person by simply saying the name of the person.

IBM is further developing the ring to indicateemail alerts along with calls and theflash alertaccording to urgency of the mail!

WANNA BE A GAMER ???

When you’re playing a computer game, have youever wondered how come, when your charactersmove around theirvirtual world, theyinteract realisticallywith theirenvironment? If youthink about it, you’llquickly realise thatthere is no waygames developerscould have predicted the exact sequence of eventsthat occurred in that precise game session.Something more general must be happening - theremust be some physics in the game’s virtual world.

The first thing you should know is just how diversea game team is. So we’ve put together a prettyimpressive list of Career Paths, grouped by category.

If you want to know more about the people whomake up the industry, we’re here for you. Check outour Developer Profiles to get to know some of yourfuture colleagues.

And for those of you who think gaming is just aniche market, read up. Interactive entertainmenttakes in about $9 billion dollars in the USA alone.Games are expected to surpass film box-officerevenues in the next couple of years, making it thefastest growing segment of the entertainmentmarket, and an excellent field for careeradvancement.

As a game developer, your creative work will havea wide reach. According to the ESA, 60% of allAmericans age six and older, or about 145 millionpeople, play computer and video games. And 35%of all Americans identified computer and videogames as the most fun entertainment activity. That’smore than television (18%) and movies (11%)combined! In what other industry could you havethis much fun, challenge yourself, and reach thehearts of countless fans? None. So check out thesepages, get yourself educated, and we’ll see yousoon.

HITESH JAINY.SURESHSECOND YEAR

HARSHAHARI KRISHNASECOND YEAR

GIVE ME A RING

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

Courses for Game DesignersHere’s a list of things you must study (as classes,

not necessarily as majors):o Physics

o Matho Psychologyo Historyo Drawing / Painting /

Sculpture (learn how tomake your own art)

o Music Appreciationo Writingo Literatureo Mythologyo Foreign language

(any language thatinterests you; especiallyone from a country wherethere are gamedevelopers)

o Computers (even ifyou want to design boardgames)

o Actingo Playwriting / Screenwritingo Film Appreciationo Public Speaking / Debateo Marketing / Salesmanshipo Management / Leadership (especially, how to

inspire and manage people)Game designers are, above all, effective

communicators and storytellers. Don’t sleep throughyour writing, acting, and speaking classes.Additional Subjects

It would also be good if you study some of thesethings too:

o Music (learn how to play an instrument)o Geologyo Astronomyo Paleontology / Archeologyo Ethnic Studieso Biologyo Art Historyo Radio / TVo Drama / Film vo Businesso Fencing or karate (some kind of one-on-one

martial art)o Archeryo Sports (try lots of different sports; find one

that you enjoy and get good at it)o Crafts (learn how to make stuff with your

hands and simple tools)The point is that game designers, as creators

of worlds for players to inhabit, need to have asolid understanding of what worlds are madeof. They are not just made of stone, metal, dirt,and water—they are also made of people withan extensive body of knowledge.

It’s unlikely any game designers are actuallygoing to get raucous over flower parts, but youget the point. Get a good education.

Vehicle thefts and fuel pilferage have becomecommon these days. Can these be checked?...Yes,indeed. Thanks to virtual fencing, stealing a vehiclecould become difficult for seasoned thieves .Todayone can virtually mark boundaries. Today one canvirtually mark boundaries or points on the map,which would be highlighted, if a vehicle comes to aparticular marked area, the system will put out analert.

The device works on GPS/GSM tracking system,widely used in mobile phones, and is pre-configuredwith a mobile number of the owner. A similar deviceis also fixed in the vehicle. The owner can callthe device and talk to the driver as he does on hismobile phone.

The device, fixed in the vehicle’s dashboard, isfitted with a sim card of any service provider. Thecard is activated to transit GPS data to the personsitting in front of a computer. The device giveslatitude and longitude co-ordinates to the card,which then sends the data to an IP address, whichis the computer. This data is correlated on the digitalmap and the location is displayed on the computerscreen. The frequency of knowing the location willrange from 3 seconds to 24 hours.

VIRTUAL FENCE -VEHICLES

K.DINESHSECOND YEAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Mobile any time any where and any personcomputing using small portable devices and wirelesscommunication networks is called mobilecomputing.

The term is evolved in modern usage such that itrequires the mobile computing activity beconnected wirelessly to and through the internet orto and through a private network. This connectionties the mobile device to centrally locatedinformation or application software through the useof battery powered, portable, and wirelesscomputing and communication devices.Analog Mobile Phone Services(AMPS)

Geographic areas are subdivided into smallerareas which are commonly known as “cells”. Eachcell has its own antenna that is set to operate atdistinct transmission frequencies.

Communications occur at a set frequency in eachdirection.AMPS are still widely used today.D_AMPSis amps.Application of Mobile Computing:

In many fields of work the ability to keep on the

move is vital in order to utilize time efficiently.Theimportance of mobile computers has highlighted inthe following fields:

Estate agents can work either at home or out inthe field. With mobile computers they can be moreproductive. They can obtain current real estateinformation by accessing multiple listing services,which they can do from home, office or car whenout with clients. Therefore, mobile computers allowthem to devote more time to clients.

Emergency services:Ability to receive information on the move is

viable where the emergency services are involved.

Here the reliability and security implemented in theCDPD system would be of great advantage.

In Courts:These allow immediate access to a wealth of

information making people better informed andprepared.

In Companies:Managers can use mobile computers in say critical

presentations to major customers. Therefore mobilecomputers can leverage competitive advantages.Credit Card Verification:

At the point of sale terminals in shops in supermarkets when customers use credit cards fortransactions the inter communication requiredbetween bank central computer and the posterminal in order to effect verification of the cardusage, can take place quickly and securely overcellular channels using mobile computer unit . Thiscan speed up the transaction process and relievecongestion at pos terminals.

K.PHANI CHANDRAK.SANDHYAK.SRI VIDYASECOND YEAR

MOBILE COMPUTING

The speed at which the vehicle travels or hastraveled can be checked out. The system providesdetails of the distance travelled on a particular day.The location can also be viewed through a mobilephone, if it is GPS-enabled.

The cost of the hardware device would varyaccording to the features on offer. The price of oneunit varies from Rs. 8,000 to Rs. 12,000. The softwareinterface would be Rs. 500 a month

On a rental basis. The rental covers the cost ofstoring the continuous data coming coming from theclient’s vehicle and maintenance and technicalsupport.

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

chThe Gatekeeper Pico a USB key-sized personalsecurity computer with 12 security applications, hasbeen awarded “Best of Innovations 2008 - ComputerAccessories” by the 2008 Consumer ElectronicsShow (CES).Purpose of gatekeeper pico:

If Gatekeeper Pico mini-computer connects to anyPC or laptop blocking Internet threats outside thehost computer and security software.

A revolution in laptop and PC security, Yoggie’spersonal security computer is the ‘next generationInternet Security Suite’ a powerful USB key-sizeLinux-based 520 MHz computer with 12 built-insecurity applications.

The Gatekeeper Pico appears to be a sleek, silverUSB-key,it has the yoggie logo on the front and threestatus icons with LED lights behind them, but isinfact a full-blown computer with its own processor,memory and unique operating system.

It combines best-of-breed security software withproprietary patent-pending developments toprovide the most comprehensive all-in-one securitytechnology available to consumers today.TheGatekeeper Pico delivers plug and forgetfunctionality. Users do not have to worry aboutupdates as it automatically checks for them eachtime it connects to the Internet, and manages theentire process. The device does not require complexinstallation, configuration or ongoing management(although advanced users can alter theconfiguration should they wish to). With theGatekeeper Pico providing Pentagon-level securityfor their home PC or laptop, consumers no longerneed to run software-based security suites.Thismeans increased performance for their computer.

In addition, the Gatekeeper Pico has parentalcontrols built in and can be configured so that, if itis disconnected (by a child wanting access to off-limits websites) Internet access will be denied.

S.NAVEEN KUMARV.V.RAVI TEJASECOND YEAR

GATEKEEPER PICO

The Gatekeeper Pico, with a suggested retail priceof $179, is now available at market.

Benefits:Block all Internet threats outside before they

reach your PCHide your computer from Internet Hackers (‘Stealth

Mode’)Boost your PC’s performanceUntouchable Operating SystemProtection from known as well as unknown attacksPlug and forget easy installation and operationAutomated security updatesThe full list of security functions provided

by the Gatekeeper Pico includes:Anti-VirusAnti-SpywareAnti-PhishingAnti-SpamIntrusion Detection System / Intrusion Prevention

SystemFirewall (Stateful inspection)Web Filtering/Parental Content ControlAdaptive Security Policy(TM)Multi-Layer Security Agent(TM) (Patent pending)Layer-8 Security Engine (TM) (Patent pending)Transparent Email Proxies (POP3; SMTP)Transparent Web Proxies (HTTP; FTP)

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Cloud computing is a computing paradigm inwhich tasks are assigned to a combination ofconnections, software and services accessed overa network. This network of servers and connectionsis collectively known as “the cloud.” During the pastfew years, cloud computing has become a key ITbuzzword. Perhaps the simplest working definitionof cloud computing is “being able to access files,data, programs and 3 rd party services from a Webbrowser via the Internet that are hosted by a 3 rdparty provider “and “paying only for the computingresources and services used”.

The architecture of a cloud includes several keymodules: user interaction interface, system resourcemanagement module with a services catalog, andresource provisioning module. Often it also usesvirtualization techniques to dynamically allocate anddeallocate computing resources .It is called cloudcomputing because the data and applications existon a “cloud” of Web servers

There’s a good chance you’ve already usedsome form of cloud computing. If you have an e-mail account with a Web-based e-mail service likeHotmail, Yahoo! Mail or Gmail, then you’ve had someexperience with cloud computing.

Instead of running an e-mail program on yourcomputer, you log in to a Web e-mail account

remotely. The software and storage for youraccount doesn’t exist on your computer — it’s onthe service’s computer cloud.

It is divided into two sections: the front end andthe back end. They connect to each other througha network, usually the Internet. The front end is theside the computer user, or client, sees. The backend is the “cloud” section of the system. The frontend includes the client’s computer (or computernetwork) and the application required to access thecloud computing system. On the back end of thesystem are the various computers, servers and datastorage systems that create the “cloud” ofcomputing services.A central server administers thesystem, monitoring traffic and client demands toensure everything runs smoothly. It follows a set ofrules called protocols and uses a special kind ofsoftware called middleware. Middleware allowsnetworked computers to communicate with eachother. Cloud computing is closely related to gridcomputing and utility computing. Cloud Computing Applications

The applications of cloud computing arepractically limitless. With the right middleware, acloud computing system could execute all theprograms a normal computer could run. Potentially,everything from generic word processing softwareto customized computer programs designed for aspecific company could work on a cloud computingsystem.

SHAIK HABIBAD.ARCHANAK.REHUNUMASECOND YEAR

CLOUD COMPUTING

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

IS INTERNET EXPLORER ONLY YOUR CUP OF TEA?

Google ChromeIn 2008, Google stripped down

the web browser to its essentialsand rethought basic assumptionsabout what a browser should do.Focused on enhancedperformance for web applications, Chrome stays outof your way and lets you focus on the web itself.

Chrome uses the Web Kit engine (like Safari) andis similar to the default web browser on the Androidmobile phone platform.

At this time, Chrome is only available forWindows, but Macintosh and Linux versions areplanned.

* Features: Web- Private Browsing * Import: Bookmarks, History and Passwords

from Internet Explorer.

OperaOpera has managed to

weather the browser wars sinceits original release in 1996.Constantly innovating, thisbrowser is now a full-fledgedInternet suite with web, e-mail,news (use net and RSS) and chat with a wealth offeatures for new switchers and power users alike.

Opera also provides a mobile web browser, OperaMini, which runs on most Java-capable devices,bringing the web to even low-end mobile phones.You can sync your bookmarks between Opera Miniand the desktop version of Opera using Opera Link.

* Features: Web · Email · RSS · Chat · Skin able ·Phishing Filter · Widgets · Bit Torrent · Sync

* Import: Bookmarks from Internet Explorer,Firefox, Safari, Netscape, or generic HTML file; Mailfrom Outlook Express, Netscape, Thunderbird, AppleMail, Eudora, or generic mbox file.

SafariApple stunned the world in

2003 when they announced thisbrowser for Mac OS X. It becameso popular with Mac users thatMicrosoft stopped developing IEfor the Mac! Safari is designed for elegance andspeed, and is now both the default browser onthe Mac and the most popular Macintosh browser.Starting with version 3, Safari is also availablefor Windows.

Safari is also the web browser on the iPhoneand iPod Touch.

* Features: Web · Private Browsing · RSS* Import: Bookmarks from any browser.

FirefoxMozilla Firefox has been the

most successful alternativeweb browser since the “browserwars” ended. The flagshipproduct of the MozillaFoundation traces its lineageback to the original Netscape. Firefox was designedfor simplicity, security, and extensibility, withhundreds of extensions available. The MozillaThunderbird mail & news client is a perfectcompanion. Both applications are open-source.

* Features: Web · RSS headlines · Email and fullRSS via Thunderbird · Extensions for chat,customization, etc. · Skin able · Phishing Filter

* Import: All settings from Internet Explorer, Opera,Mozilla, Netscape, bookmarks from generic HTML file.BenchMark Test Results

M.N.V.V.RAMESHGANESHTHIRD YEAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

ANDROID

SHAIK BASHAB.G.V.N.MANIKANTATHIRD YEAR

Its an open-source platformfor developing the nextgeneration of mobile devices.Google hopes to turn themobile-phone industry on itshead with a development modelmore like that of the Web.

“There are 3 billion handsets in the world, and inmany places, those handsets are the primary meansof accessing the Internet,” said Dan Morrill,developer advocate of Google Developer Programs.“As those handsets become increasinglysophisticated, we want users to have the sameexcellent experience they have on the Web.”

Although it is based on Linux, Android is also aseparate (and Google says complementary) effortfrom the LiPS (Linux Phone Standards Forum)specification that was first announced in 2005 andwas released in December 2007. While that effortincludes APIs for telephony, messaging, calendar,instant-messaging presence and user-interfacecomponents, it is not intended as a complete phonestack, while Android is. Another difference stemsfrom Android’s reliance on a particular Linuximplementation, while LiPS supports multiple,interoperable implementations.

Key features found in Android include:· An application framework that enables reuse

and replacement of components.· A Java development and run-time

environment based on the Dalvik virtual machine(which Google says has been optimized for mobiledevices). Somewhat unusually, every Androidapplication runs in its own process, with its ownDalvik instance.

· An integrated browser based on the open-source WebKit (the same engine that is used inApple’s Safari). The use of WebKit is significant

because it allows users to browse the entireInternet, not just mobile-specific sites. Webdesigners won’t have to change what they are doingto support mobile devices since the browser itselfcan (with a few exceptions) render any Web pagein exactly the same way it would appear on thedesktop, zooming and panning as necessary toaccommodate a smaller screen.

· A custom 2D graphics library and 3Dgraphics based on OpenGL.

· SQLite for structured data storage.· Media support for common audio, video and

still-image formats (including MPEG-4, H.264, MP3,AAC, AMR, JPEG, PNG and GIF).

· GSM (Global System for Mobilecommunications) but not CDMA (Code DivisionMultiple Access) telephony.

· Support for camera, GPS, compass andaccelerometer hardware.

The SDK provides the necessary APIs andprogramming tools for developing applications inJava to run on the platform, including a deviceemulator, debugging tools, memory andperformance profiling, and a plug-in for the EclipseIDE.

Applications for Android are written in Java andrun on Google’s Dalvik virtual machine rather thanon the more well-known Java framework. Googlesays that the choice to go in-house was necessaryin order to achieve the performance characteristicsand level of openness that the company was lookingfor. But Google has already been accused offragmenting the Java standard.

Android will ship with a number of coreapplications including an email client, an SMS (ShortMessage Service) program, a calendar, maps, abrowser and contacts.These applications will sit ontop of the application framework, which provides aset of system services and libraries for building andinteroperating with Android applications. Theframework exposes applications to a set of core C/C++ libraries for such things as media playback andrecording, Web browsing, 2D and 3D graphics,bitmap and vector font rendering, and the SQLiterelational database. You could forget that Androidhas anything to do with Google were it not for such

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

features as a MapView API (which integrates GoogleMaps into Android) and support for location-basedservices (GPS). This first release of Android ismissing native APIs for Bluetooth and wifi, butGoogle says that they are coming.

At the bottom of the stack is Linux version2.6, which handles core system services such assecurity,memory management, network stack anddriver model, while acting asan abstraction layer betweenthe hardware and the rest ofthe software stack.

Nailing the Interface:Coming up with a good user

interface for a mobile deviceis tough, as is evidenced byhow long it took Microsoft toproduce a usable version ofWindows Mobile. Since every phone has a differentdesign, screen, keypad and control layout it isalmost impossible to define a general-purposeplatform like you can with the PC. Partly because ofthat, the Android interface (which Morrill said is awork in progress) is not as radical of a departurefrom the kinds of interfaces seen on Nokia andMotorola Inc. devices as that of the iPhone, whereApple retains the luxury of designing both hardwareand software. The actual UI elements provided arewhat would be expected standard check boxes,radio buttons and pull-down menus — but Googlehas innovated inotherareas.

Android’s layout classes allow developers toarrange the user interface in such a way that it willbehave properly — regardless of whether it is inportrait or landscape orientation.In its first release, Android supports touch-screenphones but not the multitouch technology seen inthe iPhone. Digging around in the SDK also onlyreveals support for 320x240-pixel resolution(standard on many smartphones), but Morrill saidthat other resolutions will be supportedinthefuture.

Android’s SDK has a way to go before it cancompete with the commercial developmentenvironments for Palm, Windows Mobile, Symbianand other mobile platforms. And developers face adifficult choice given the existence of competing

open-source mobile initiatives. But currentlimitations shouldn’t be a deterrent: Android willonly get better as more developers get on board.And Google’s 10 million dollar bounty for the bestAndroid application should provide plenty ofincentive for jumping in.

Applications:Android will ship with a set of core applications

including an email client, SMSprogram, calendar, maps,browser, contacts, and others.All applications are writtenusing the Java programminglanguage.

Application FrameworkDevelopers have full access to

the same framework APIs usedby the core applications. The

application architecture is designed to simplify thereuse of components; any application can publishits capabilities and any other application may thenmake use of those capabilities (subject to securityconstraints enforced by the framework). This samemechanism allows components to be replaced bythe user.

Prototypes:Google announced its plans for the Android phone

software in November 2007 with a declared aim ofmaking it easier to get at the web. To help developAndroid, Google also unveiled the Open HandsetAlliance - a partnership of more than 30 firms thatwould work to make phone software easier to workwith.The group includes operators such as Telefonica,handset makers such as HTC and Motorola as wellas chip makers such as Intel and Qualcomm.

T-Mobile G1The T-Mobile G1 is the first phone to the market

that uses the Android platform.The phone is part ofan open standards effort of the Open HandsetAlliance. It was released in the US on October 22,2008 and will be available in European countriesincluding Germany, Netherlands and the CzechRepublic by early 2009. The T-Mobile G1 is made byHTC, which may be rebranded by operators ororiginal equipment manufacturer (OEM) partners.

Association of Computer EngineersSyntax’09

Bapatla Engineering College

TRANSFERJET

TransferJet a new Close Proximity Wireless Transfer Technology enabling the high speed transfer oflarge data files (photos, HD images, etc.) between electronic devices such as mobile phones, digitalcameras, digital video cameras, computers and TVs. Using this technology, data can be sent at speeds of560Mbps. It eliminates the need for complex setup and operation. For e.g., just touching a TV with adigital camera enables photos to be instantaneously displayed on the TV screen. Alternatively, downloadedmusic content can be easily enjoyed by touching a mobile phone to a portable audio player. TransferJetcan be used as a Universal Interface among a wide variety of consumer electronics devices.

It is simple operation, safe connection and efficient transfer of data can maintain the highest possiblewireless link by automatically adjusting the data transmission rate. It radiates very low-power radiowaves, it causes virtually no interference to other wireless systems, and there is no impact toperformance.Operation is also very intuitive, and as there is no host/target relationship, data transfercan take place between mobile phones and PCs for example, as well as between mobile devices.TransferJettechnology are able to transfer data among each other’s products regardless of whether they are indoorsor outdoors and irrespective of their geographic location.It maintains high transmission gain and efficientcoupling in near-field proximity, while providing sharp attenuation over longer distances to avoidinterference with other wireless systems.Furthermore, as there is no antenna polarization it is possible totransmit data without any performance loss, regardless of the contact angle of the electronic devices.

Transfer Jet technology is similar to the current Bluetooth standard, however the Transfer Jet systemhas the advantage of operating at a much higher throughput rate while not having the security concernsthat can be found in a Bluetooth connection.For e.g., with Bluetooth, transfer of data takes place over arange of several feet. Since the signal is not encrypted, it can be intercepted by other Bluetooth devices.Similar to Bluetooth, Transfer Jet will offer users the ability to restrict their equipment to communicatingwith only approved devices, preventing accidental data sharing with other non-approved equipment.Itworks once both devices are within 3cm of each other, and then blasts information between them at up to560Mbps.

B.GAUTAM KUMARG.HARI KRISHNATHIRD YEAR

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

THE WORLD’S PREMIER STUDENTTECHNOLOGY COMPETITION

“I wish there had been an Imagine Cup when I was growing up. Itgets people involved in seeing that software is changing the world.”

—Bill Gates Everything that the world may become “someday” lies in the

hands of young people today. As they look at the road ahead, theirclose relationship with technology enables them to dream in wayswe never have before. Put the two together, and you have young minds holding the tools that can maketheir vision a reality.

This is the recipe that inspired Microsoft to create the Imagine Cup.The Imagine Cup encourages youngpeople to apply their imagination, their passion and their creativity to technology innovations that canmake a difference in the world – today. Now in its seventh year, the Imagine Cup has grown to be a trulyglobal competition focused on finding solutions to real world issues.

Open to students around the world, the Imagine Cup is a serious challenge that draws serious talent,and the competition is intense. The contest spans a year, beginning with local, regional and online contestswhose winners go on to attend the global finals held in a different location every year. The intensity ofthe work brings students together, and motivates the competitors to give it their all. The bonds formedhere often last well beyond the competition itself.

The location of the Imagine Cup has rotated from year to year. The finals have been held in locations allacross the world. Location in 2003: Spain, 2004: Brazil, 2005: Japan, 2006: India, 2007: Korea, and 2008:France. A selection committee representing Microsoft and competition captains evaluate applicationsfrom countries interested in hosting. Many factors are taken into consideration, including the resourcesavailable at the hosting country. However, the selection process is not an exact science.

Eligibility:1. You are 16 years of age or older.2. You are actively enrolled as a student at an accredited educational institution that grants high-

school or college/university (or equivalent) degrees any time between January 1, 2008 and May 31, 2009.3. You are not an employee of Microsoft Corporation, or an employee of a Microsoft subsidiary.4. You are not involved in an y part of the execution or administration of this Contest.5. You are not an immediate family member of (parent, sibling, spouse, child) or household member

of a Microsoft employee, an employee of a Microsoft subsidiary, or a person involved in any part of theadministration and execution of this Contest.

6. You are not a resident of any of the following countries: Cuba, Iran, North Korea, Sudan, and Syria.7. If you are a Microsoft campus representative, such as Microsoft Student Partner http://student-

partners.com or Microsoft Intern, and you meet the eligibility criteria set forth above, you may enter, butyou are prohibited from using Microsoft property or resources, including without limitation, Microsoftnetworks, hardware tools and technology resources and/or the counsel of Microsoft employees, inconnection with the creation or execution of your entry.

8. If you have previously placed first in the Worldwide Finals of an Imagine Cup competition, you arenot eligible to enter that same competition again, but you may enter any of the other competitions.

9. This Contest is void where prohibited by law.For further information visit::http://imaginecup.com

R.KAANTHI KEERTHIG.S.R.JYOTHITHIRD YEAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

COMPUTER SCIENTISTS

Charles Babbage

Designed the Difference Engine but the machine will never be realized. He alsostart plans for the Analytical engine. But it will be his son that realizes the projectin part.

BiographyCharles Babbage was born in London on December 26, 1792, the son of Benjamin

Babbage, a London banker. As a youth Babbage was his own instructor in algebra,of which he was passionately fond, and was well-read in the continentalmathematics of his day. Upon entering Trinity College, Cambridge, in 1811, hefound himself far in advance of his tutors in mathematics.

With Herschel, Peacock, and others, Babbage founded the Analytical Society for promoting continentalmathematics and, reforming the mathematics of Newton, then taught at the university.

In his twenties Babbage worked as a mathematician, principally in the calculus of functions. He waselected a Fellow of the Royal Society, in 1816, and played a prominent part in the foundation of theAstronomical Society (later Royal Astronomical Society) in 1820. It was about this time that Babbage firstacquired the interest in calculating machinery that became his consuming passion for the remainder ofhis life.

Throughout his life Babbage worked in many intellectual fields typical of his day, and made contributionsthat would have assured his fame irrespective of the Difference and Analytical Engines.

Tim Berners-Lee

Invented the Web - WWW. Developed URL and HTTPBiographyTim Berners-Lee graduated from the Queen’s College at Oxford University, England, 1976. Whilst there

he built his first computer with a soldering iron, TTL gates, an M6800 processorand an old television.

He spent two years with Plessey Ltd (Poole, Dorset, UK) a major UK Telecomequipment manufacturer, working on distributed transaction systems, messagerelays, and bar code technology.

In 1978 Tim left Plessey to join D.G Nash Ltd (Ferndown, Dorset, UK), where hewrote among other things typesetting software for intelligent printers, and amultitasking operating system.

A year and a half spent as an independent consultant included a six monthstint (Jun-Dec 1980)as consultant software engineer at CERN, the European ParticlePhysics Laboratory in Geneva, Switzerland. Whilst there, he wrote for his ownprivate use his first program for storing information including using random associations. Named “Enquire”,and never published, this program formed the conceptual basis for the future development of the WorldWide Web.

From 1981 until 1984, Tim worked at John Poole’s Image Computer Systems Ltd, with technical designresponsibility. Work here included real time control firmware, graphics and communications software,and a generic macro language. In 1984, he took up a fellowship at CERN, to work on distributed real-timesystems for scientific data acquisition and system control. Among other things, he worked on FASTBUS

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.te

ch

system software and designed a heterogeneous remote procedure call system.In 1989, he proposed a global hypertext project, to be known as the World Wide Web. Based on the

earlier “Enquire” work, it was designed to allow people to work together by combining their knowledgein a web of hypertext documents. He wrote the first World Wide Web server, “httpd”, and the firstclient, “WorldWideWeb” a what-you-see-is-what-you-get hypertext browser/editor which ran in theNeXTStep environment. This work was started in October 1990, and the program “WorldWideWeb”first made available within CERN in December, and on the Internet at large in the summer of 1991.

Through 1991 and 1993, Tim continued working on the design of the Web, coordinating feedbackfrom users across the Internet. His initial specifications of URIs, HTTP and HTML were refined anddiscussed in larger circles as the Web technology spread.

In 1994, Tim founded the World Wide Web Consortium at the Laboratory for Computer Science (LCS)at the Massachusetts Institute of Technology (MIT). Since that time he has served as the Director ofthe World Wide Web Consortium which coordinates Web development worldwide, with teams at MIT,at INRIA in France, and at Keio University in Japan. The Consortium takes as its goal to lead the Web toits full potential, ensuring its stability through rapid evolution and revolutionary transformations of itsusage. The Consortium may be found at http://www.w3.org/.

In 1999, he became the first holder of the 3Com Founders chair at LCS, and is now a Senior ResearchScientist within the Lab. The Lab merged with the AI lab to became “CSAIL”, the Computer Science andArtificail Intelligence Laboratory at MIT.

Edsger Dijkstra

Laid the foundation stone in the march towards creating structure in the domain of programming bywriting, not a scholarly paper on the subject, but instead a letter to the editor entitled “GO TO StatementConsidered Harmful”. (Comm. ACM, August 1968) The movement to develop reliable software wasunderway.

My area of interest focuses on the streamlining of the mathematical argumentso as to increase our powers of reasoning, in particular, by the use of formaltechniques

BiographyEdsger Wybe Dijkstra was born in Rotterdam, Netherlands in 1930. Both of

his parents were intellectual people and had received good educations. Hisfather was a chemist, and his mother was a mathematician. In 1942, whenDijkstra was 12 years old he entered the Gymnasium Erasminium, a high schoolfor extremely bright students, and he was educated in a number of differentsubjects including: Greek, Latin, French, German, English, biology, mathematics, and chemistry.

In 1945, Dijkstra thought that he might study law and possibly serve as a representative for theNetherlands at the United Nations. However, due to the fact that he had scored so well in chemistry,mathematics, and physics, he entered the University of Leiden, where he decided to study theoreticalphysics. He went to summer school on the subject of programming at Cambridge University, during thesummer of 1951. He began part-time work at the Mathematical Centre in Amsterdam in March 1952,which further helped fuel his growing interest in programming. He finished the requirements for histheoretical physics degree as quickly as possible and began to pursue his interests in progamming. Oneof the problems that he ran into, however was that programming still was not officially recognized as aprofession. In fact, when he applied for a marriage license in 1957, he had to put down “theoreticalphysicist” as his profession.

-EDITORIAL BOARD

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

BIO-DATA OF COMPUTER

Name: ComputerYear of Birth: 1832Fathers Name: Charles BabbageMothers Name: Lady Ad LovelaceFavorite Snacks: ChipsFavorite Animal: MouseFavorite Dress: SoftwareFavorite Letter: CDisease I am afraid of: Virus FeverFriends: Good ProgrammersAim: To think like a manLucky Numbers: 0,1

R.SIVA SWATHIFIRST YEAR

Keyboard not attached. Press F1 to continue.Press any key... no, no, no, NOT THAT ONE!

ROOM MATES

X: Which shaving cream do you use?Y: Baba’sX: Which aftershave do you use?Y: Baba’sX: Which deodorant do you use?Y: Baba’s sX: Which toothpaste do you use?Y: Baba’sX: Which shampoo do you use?Y: Baba’sX: Which socks do you use?Y: Baba’sX (Frustrated) : Okay, tell me, what is this Baba? Isit an international company???Y: No, He is my roommate.

STRANGE WARNINGS

Access denied—nah nah na nah nah!C:V> Bad command or file name! Go stand in thecorner.File not found. Should I fake it? (Y/N)Double your drive space: Delete Window s!Smash forehead on keyboard to continue...ASCII stupid question, get a stupid ANSI!

IF

If you have to forgetDESTINY but not DESTINATION

Forget FAILURES but not FAULTSLOVER but not LOVE

If you have to leaveFEELINGS but not HEART

Leave LAMP but not LIGHTLIFE but not CHARACTER

If you have to earnNAME but not BLAME

Earn RESOURCE but not RUPEEWISDOM but not VICTORY

B.L.SRAVANTHIFIRST YEAR

P.SUNEETHAFIRST YEAR

SK.SANDANIFIRST YEAR

Dont estimate any book by its coverpage

He who has the heart to help, onlyhas the right to criticise.

Association of Computer EngineersSyntax’09

Bapatla Engineering College

MARRIAGE: It’s an agreement in which a man looses his bachelor degree & a woman gains her masterdegree.LECTURE: An art of transferring information from the notes of lecturer to the notes of students withoutpassing through “the minds of either”.CONFERENCE: The confusion of one man multiplied by the number present.COMPROMISE: The art of dividing a cake in such a way that everybody believes that he got the big piece.DICTIONARY: A place where divorce comes before marriage.CONFERENCEROOM: A place where everybody talks, nobody listens & everybody disagrees later on.ECSTASY: Feeling when you feel you are going to feel a feeling you have never felt before.SMILE: A curve that can set a lot of things straight.CLASSIC: Books which people praise but do not read.OFFICE: A place where you can relax after your strenuous home life.YAWN: The only time some married men get to open their mouth.Etc.: A sign to make others believe that you know more than you actually do.COMMITTEE: Individuals who can do nothing individually & sit to decide that nothing can be done together.EXPERIENCE: The name men give to their mistakes.OPPORTUNIST: A person who starts taking bath when he accidentally falls into a river.PESSIMIST: A person who says ‘o’ is the last letter in zero, instead of first letter in opportunity.MISER: A person who lives poor so that he can die rich.BOSS: Someone who is early when you are late & late when you are early.DIVORCE: Future tense of marriage.TEARS: The hydraulic force by which masculine will power is defeated by feminine waterpower.DICTIONARY: A place where divorce comes before marriage.ATOMBOMB: An invention to end all inventions.CRIMINAL: A guy no different from the rest … except that he got caught.DOCTOR: One who kills your ills by pills & kills you with his bills.

K.SRI VIDYAJ.LAKSHMI BAISECOND YEAR

FUNNY DEFINITIONS

Be not afraid of going slowly, be afraid ofstanding still.A gentle man blames himself while acommon man blames others.A winner never quits and quitter never wins.

“Your future depends on your dreams”So go to sleep

If it’s true that we are here to help others, then whatexactly are the others here for?

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

IS WINDOWS A VIRUS?

With the recent problems being encountered byWindows users all across the country, people arebegin to ask themselves if windows is a virus. Inresponse to the high demand for an answer to thatquestion a study was done and concluded thefollowing:1. Viruses replicate quickly.

Windows does this.

2. Viruses use up valuable system resources, slowing down the system as they do so.

Windows does this.

3. Viruses will, from time to time, trash your harddisk.

Windows does this.

4. Viruses are usually carried, unkown to theu s e r,along with valuable programs and sys tems.

Windows does that too.

5. Viruses will occasionally make the user sus pecttheir system is too slow (see 2) and the user willbuy new hardware.

Same with Windows, yet again.

Maybe Windows really is a virus.Nope! There is a difference!

Viruses are well supported by their authors, arefrequently updated, and tend to become moresophisticated as they mature.

So there! Windows is not a virus.

B.P.CHANDRA RAO.SECOND YEAR

IT’’S A MISTAKE

If a barber makes a mistakeIt’s a new style

If a doctor makes a mistakeIt’s a bite

If a engineer makes a mistakeIt’s a new venture

If a politician makes a mistakeIt’s a new law

If a scientist makes a mistakeIt’s a new invention

If a tailor makes a mistakeIt’s a new fashion

If a teacher makes a mistakeIt’s a new point

But unfortunatelyIf a student makes a mistake

NO doubt it’s a mistake

T.S.RAMYAKRISHNATHIRD YEAR

Ramu : Hey.. my submarine is not sinkinginto the water!! what could be wrong? Somu : may be u have used float instead ofdouble in the software.

PS : Hey Bull, Can you do me a favour? Canyou pass on these 500 rupees to Sruthi..? Bull : Sure.. why not? But tell me one thing.Tell me whether its pass by value or pass byreference.PS : ???!!! Big lessons of life are learnt from little

mistakes.Well done is better than well said.Everything has its beauty but not everyonesees it.

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Brahma - Systems InstallationVishnu - Systems Administration and supportLakshmi - Finance and Accounts consultantSaraswathi - Training and Knowledge ManagementShiva - Crash SpecialistGanesh-Quality Assurance and

DocumentationNarada - Data TransferApsarasa - Downloadable VirusesSurya - Solaris AdministratorRakshasas - In house Hackers

Jatayuvu - FirewallDronacharya - System ProgrammerKrishna – Sudarshan wheel Development Life CycleArjuna – Lead Programmer (all companies are vyingfor him)Draupadi – Motivation and Team building100 Kauravas – Microsoft Service Packs andPatches.Valmiki - Technical Writer (Ramayana sign offdocument)

K.V.MAHATHITHIRD YEAR

TECHNOLOGY - MYTHOLOGY

Smash forehead on keyboard tocontinue...Hit any user to continue...Press any key to continue and any other key toexit...

MOTHER

M---- Is for millions of things she gave meO---- Is for optimism in her, I findT---- Is for tears she shed to save meH---- Is for heart which is so kindE---- Is for eyes that glow with loveR---- Is for her radiance that comes from

aboveTHERE CAN’T BE ANYONE & ANYTHING THATEQUALS HER

B.L.SRAVANTHI FIRST YEAR

GOOD THOUGHTS

If anyone speaks ill of you, Praise him always.If anyone injures you, Serve him always.If anyone prosecutes you, Help him in all possible ways.You will attain immense strength.You will control your anger and pride.You will enjoy peace, poise & serenity.You will become divine.

R.SHANTA KUMARID.ARCHANA

SECOND YEAR

Weak man wait for opportunities and strongman make them.Until you try you don’t know what you can do.Success is sweet but secret is sweat

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

FOOTPRINTS One night a man had a dream. He dreamed he was walking along the beach with the LORD. Across thesky flashed scenes from his life. For each scene , he noticed two sets of footprints in the sand; onebelonging to him, and other to the LORD.

When the last scene of his life flashed before him, he looked back at the footprints in the sand. Henoticed that many times along the path of his life there was only one set of footprints. He also noticedthat it happened at the very lowest and saddest times of his life.This really troubled him and questionedthe LORD about it: “LORD, you said that once I decided to follow you, you would walk with me all the way,But I have noticed that during the most troublesome times in my life there is only one set of footprints. Idon’t understand why when I needed you most you would leave me.”

The LORD replied: “My son, My precious child, I love you and I would never leave you. during yourtimes of trial and suffering, when you see only one set of footprints, it was then that I carried you.

M.SINDHURAL.MANJUSHA

SECOND YEAR

SYMBOL’S POEMHow to read:

Waka waka bang splak tick tick hash,Caret quote back-tick dollar dollar dash,Bang splak equal at dollar under_score,Percent splak waka, tilde hash number four,Ampersand bracket bracket dot dot slash.

A.YUGANDHAR RAOFIRST YEAR

> > ! * ‘ ‘ #^ “ ` $ $ -

! * = @ $ _% * < > ~ # 4

& [ ] . . /

IBM:Idiots Built MeIdiots Become ManagersIt’s Better Manually

COBOL:Completely Obsolete BusinessOriented Language

WINDOWS:Well, It Never Does Operate With

Speed

DOS:Defective Operating System

PENTIUM:Produces Erroneous Numbers

through IncorrectUnderstanding of MathematicsNEXT:

Now EXchange for Trash

SK.CHOTA SHAHIDSECOND YEAR

FUNNY ACRONYMS

Association of Computer EngineersSyntax’09

Bapatla Engineering College

HRD NOTICE

Dear STAFF,Please be advised that these are NEW rules andregulations implemented to raise the efficiency ofour company.1) TRANSPORTATION:It is advised that you come to work driving a caraccording to your salary.A) If we see you driving a Honda, we assume youare doing well financially and thereforeyou do not need a raise.B) If you drive a 10 year old car or taking publictransportation, we assume you must have lots ofsavings therefore you do not need a raise.C) If you drive a Pickup, you are right where youneed to be and therefore you do not need a raise.2) ANNUAL LEAVE :Each employee will receive 104 Annual Leave daysa year ( Wow! Said 1 employee).They are called SATURDAYs AND SUNDAYs.3) LUNCH BREAK:A) Skinny people get 30 minutes for lunch as theyneed to eat more so that they can look healthy.B) Normal size people get 15 minutes for lunch toget a balanced meal to maintain theiraverage figure.C) Fat people get 5 minutes for lunch, because that’sall the time needed to drink a Slim Fast and take adiet pill.4) SICK DAYS:We will no longer accept a doctor MedicalCertificate as proof of sickness.- If you are able to go to the doctor, you are able tocome to work.5) SURGERY :As long as you are an employee here, you need allyour organs. You should not consider removing

anything. We hired you intact.- To have somethingremoved constitutes a breach of employment.6) INTERNET USAGE :All personal Internet usage will be recorded andcharges will be deducted from your bonus (if any)and if we decide not to give you any, charges willbe deducted from your salary.- Important Note: Charges applicable as Rs.20 perminute as we have 10MB connection. Just forinformation, 73% of staff will not be entitled to anysalary for next 3 months as their Internet chargeshave exceeded their 3 months salary.Thank you for your loyalty to our company. We arehere to provide a positive employment experience.Therefore, all questions,comments,concerns,complaints, frustrations,irritation,aggravations,insinuations, allegations, accusations, inputcontemplation and consternation should bedirected somewhere else.

SAROJATHIRD YEAR

Always treat others as you wouldlike them to treat you.

He who fears failure limits hisactivities.

Ramu : Hey.... whats time now? Somu : System time or local time...??

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

LOVE ON SCREEN

Little black wordsrace across a white screenwhere faceless people sitwith lonely voids to fill

silent voids call outand quickly draw them inpainting love and illusionon stark computer palettes

the little black wordsrace across white screensfilling hearts and mindswith passion

two souls reach outto touch one anotherin hollow little word worldswhere things are shared

that shouldn’t belonely spouse sits by the bedstarred for love and understandingand with each new key stroke

in another roomthe little black wordsdig the gulf between themjust a little bit wider

A.YUGHANDHARFIRST YEAR

THANK YOU

My Dear Friend,You are the shadow of mine even in the dark,In the desert of my life your are like an oasisMy life is an enigma,You are the answer for it,In the voyage of my life you are the safestharbor whom I can trust and truly dependwithout any hesitation.I know that even if the world is in whirlpoolYou are there for me,I cherish your presence in every movement ofmy life,Thank you friend for being there for me,No,Thank you god, for giving me such a friend.

K.SINDHURAFIRST YEAR

IN SEARCH OF MY FRIEND

My Friend,Should be my Medicine

When I am in Pain,Should be my Letter

When I am Far,Should be my Chain

When I am Mad,Should be my Concentration

When I Work,Should be my Sea Shore

When I Sink,Should be my Hand-Kerchief

When I Cry,Should be my Expression

When I Speak,Should be my Life

When I Die.K.SINDHU

K.HANISHAFIRST YEAR

SOLUTION

Thinking is the capital,Enterprise is the way,

Hard work is the solution

B.LAKSHMI PRASANNAFIRST YEAR

Winning is not everything, it’s the onlything.

An achieved goal is the starting point for futureprogress.

Association of Computer EngineersSyntax’09

Bapatla Engineering College

EDUCATIONALINSTITUTIONS

Educational institutions are like stars,Numerous yet alone!All shining in their own pride,Some Steady, others flickering!Like stars educational institutions too,Try to out shine each other!They fail or realize,They are only momentaryAll night ends they disappearBut BEC is like sun!Strong and powerfulWhose arrival is patiently awaited!And leaves a lasting impressionOn others around!

K.SINDHUFIRST YEAR

LUCK

He worked by dayAnd worked by night.He gave up playAnd some delight.Dry books he read,New things to learnAnd forged aheadSuccess to earnHe plodded on withFaith and pluckAnd when he wonMen called it Luck

P.MADHAVIM.NAGA JYOTHI

SECOND YEAR

WHAT ‘S LIFE??

Life is a challenge, meet itLife is a dream, realize itLife is a game, play itLife is a love, enjoy it

PEACE

If there is rightness in the heartThere will be beauty in character

If there is beauty in characterThere will be harmony in life

If there is harmony in lifeThere will be order in nation

If there is order in nationThere will be peace in the world.

LIGHT

Body is like a flash lightEye is like a bulbMind is like the batteryIntelligence is the switchOnly when the four work together, you getthe light

SASI PRIYAM.DIVYA TEJA

FIRST YEAR

Ramu : Hey.. I have a problem. My system isnot booting up!Somu : may be, its internal buses are on strike..check out!

The greatest pleasure in life is doing whatpeople say “You can’t”.

There is never a wrong time to do a right thing.

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

RAMAYANA BY BILL GATES

When Bill Gates was in India, he had a chance 2 listen Ramayana from Vajpayee. After returning2 US he wrote it in his diary as follows……………..

LAN, LAN ago, in the SYSTEM of I/O-dhya, there ruled a PROCESSOR named DOS-rat.Oncehe EXECUTED a great sacrifice PROGRAM after which his queens gave an OUTPUT of four SUNs—RAM, LSIman,BUG-rat and SED-rughana. RAM the eldest was a MICROCHIP withexcellent MEMORY.His brothers, however, were only PERIPHERAL ICs. Once when RAM was only 16MB, he married princess‘C’ta. 12years passed and DOS-rat decided to INSTALL RAM as his successor. However, Queen CIE/CAE(Kayegayee), who was once offered a boon by DOS-rat for a lifesaving HELP COMMAND, took thisopportunity at the instigation of her BIOSed maid (a real plotter),and insisted that her son Bug-rat beINSTALLED and that RAM be CUT-N-PASTED to the forest for a period of 14 years.

At this cruel and unexpected demand, a SURGE passed through DOS-rat and he collapsed power-less. RAM agreed to LOG INTO forest and ‘C’ta insisted to LOGIN with him. LSI-man also resolved onLOGGING IN with his brother. The forest was the dwelling of SPARCnakha, the TRAN-SISTOR of RAW-van, PROCESSOR of LAN-ka. Attracted by RAM’s stature, she proposed and asked him to marry her. RAM,politely declined. Perceiving ‘C’ta to be the SOURCE CODE of her distress, she hastened to kill her.Weeping, SPARC-nakha fled to LAN-ka, where RAW-van, moved by TRAN-SISTOR’s plight, approached hisuncle MAR-icha. MAR-icha REPROGRAMED himself into the form of a golden stag and drew RAM deepinto the forest. Finally, RAM shot the deer and MAR-icha with his last breath, cried out desperately forLSI-man. MAR-icha cried for LSI-man in the voice of RAM.

Fooled by this VIRTUAL RAM SOUND, ‘C’ta urged LSI-man to his brother’s aid. Catching theopportunity, RAW-van DELINKED ‘C’ta from her LIBRARY and changed her ROOT DIRECTORY to LAN-ka.

RAM and LSI-man started SEARCHING for the missing ‘C’ta all over the forest. They made friendshipwith th e forest SYSTEM ADMINISTRATOR SU-greev and his powerful co-processor Ha-NEUMAN.

SU-greev agreed to help RAM. SU-greev ordered his PROGRAMMERS to use powerful ‘SEARCH’techniques to FIND the missing ‘C’ta. His PROGRAMMERS SEARCHED all around the INTER-NETworkedforests. Many tried to ‘EXCITE’ the birds and animals not to forget the ‘WEBCRAWLERS’ (Insects) andtried to ‘INFO SEEK’ something about ‘C’ta. Some of them even shouted ‘YAA-HOO’ but they all ended upwith ‘NOT FOUND MESSAGES’. Several other SEARCH techniques proved useless. Ha-NEUMAN devised aRISKy TECHNOLOGY and used it to cross the seas at an astonishing CLOCK SPEED.Soon Ha-NEUMANDOWNLOADED himself into LAN-ka. After doing some local SEARCH, Ha-NEUMAN found ‘C’ta weepingunder a TREE STRUCTURE. Ha-NEUMAN used a LOGIN ID (ring) to identify himself to ‘C’ta. AfterDECRYPTING THE KEY, ‘C’ta believed in him and asked him to send a ‘STATUS_OK’ MESSAGE to RAM.Meanwhile all the raakshasa BUGS around ‘C’ta captured Ha-NEUMAN and tried to DELETE him usingpyro-techniques. But Ha-NEUMAN managed to spread chaos by spreading the VIRUS ‘Fire’. Ha-NEUMANhappily pressed ESCAPE from LAN-ka and conveyed all the STATUS MESSAGES to RAM and SU-greev.RAW-wan decided to take the all powerful RAM head-on and prepared for the battle.One of the RAW-wan’s SUN (son) almost DELETED RAM & LSI-man with a powerful brahma-astra. But Ha-NEUMAN resortedto some ACTIVE-X gradients and REFORMATTED RAM and LSI-man. RAM used the SOURCE CODE secretsof RAW-wan and once for all wiped out RAW-wan’s presense on earth. After the battle, RAM got INSTALLEDin I/O-dhya and spreaded his MICROSOFT WORKS and other USER FRIENDLY PROGRAMS to all USERSand every one lived happily everafter.

R.RAMAKRISHNA K.NARESH

THIRD YEAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

SUCCESS

SUCCESS is the realization of a worthy goal.SUCCESS is getting what you want & happiness iswanting what you get.SUCCESS is not measured by the position in life butby the obstacles we over come to get there.SUCCESSful people compete against themselves.Every SUCCESS story is also a story of great failure.SUCCESS is not an accident but is result of ourattitude.SUCCESS is not in the achievement but in theachieving.They succeeded inspite of problems not in theabsence of them.

K.SANDHYA,SECOND YEAR

Cust: “What” is the command that will tell me therevision code of a program?UNIX: Yes, that’s correct.Cust: No, “what” is it?UNIX: Yes.Cust: So, “which” is the one?UNIX: No. “which” is used to find the program.Cust: Stop this. “Who are you”?UNIX: Use ‘who am I’ not ‘who r you’.you can also‘finger you’ to get information about ‘you’.Cust: All I want to know is “what” finds therevision code?UNIX: Use ‘what’. Cust: That’s “what” I am trying to find out. Isn’tthat “true”?UNIX: No.‘True’ gives you 0.Cust: Which one?UNIX: ‘true’ gives you 0. ‘Which program name?’Cust: Let ’s get back to my problem. Whatprogram? How do I find it?UNIX: Type ‘find/-name it’ to find ‘it’. Type ‘whatprogram’ to get the revision code.Cust: I want to find the “revision code”.UNIX: You can’t ‘find revision code’; you must use‘what program’.Cust: “Which” command will do what I need?UNIX: No. ‘Which command’ will find‘command’?

Cust: I think I understand. Let me “write that”.UNIX: You can ‘write that’ only if ‘that’ is a user onyour system.Cust: “Write” what?UNIX: No. ‘write that’. ’what program’.Cust: “Cut” that out!UNIX: Yes. Those are valid files for ‘cut’. Don’tforget the options.Cust: “Do” you always do this?UNIX: ‘Do’ will give you disk usage.Cust: “HELP!!!!!!!”UNIX: ‘help’ is only used for Source Code ControlSystem (SCCS).Cust: You “make me” angry.

UNIX: No, I don’t ‘make me’ angry but I did ‘makeprogram name’ when i was upset once.Cust: I don’t want to make trouble, so no “more”.UNIX: No ‘more’? ‘Which’ will help you find ‘more’?Every system has ‘more’.Cust: Nice ‘help’! I’m confused more now.UNIX: Understand that since ‘help’ is such a smallprogram, It is better not to ‘nice help’. A n d‘more now’ is not allowed. But ‘at now’ is. Unlessof course ‘now’ is a file name.Cust: This is almost as confusing as my PC.UNIX: I didn’t know you needed help with ‘pc’.letme get you to the Pascal compiler team.

M.SRI CHARANP.SANDEEP

THIRD YEAR

CONVERSATION BETWEEN THE CUSTOMER ANDTHE UNIX CONSULTANT

The "Special" tone available tousers of Nokia phones when receiving SMS

(text messages) is actually Morse codefor "SMS".

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

COMPUTER HISTORY OF THE WORLD

In the beginning, God created the Bit and the Byte. And from those he created the Word. Andthere were two Bytes in the Word; and nothing else existed . And God separated the One from theZero; and he saw it was good.And God said - Let the Data be; And so it happened. And God said - Let the Data go to their properplaces. And he created floppy disks and hard disks and compact disks.And God said - Let the computers be, so there would be a place to put floppy disks and hard disks andcompact disks. Thus God created computers and called them hardware. And there was no Software yet.But God created programs; small and big... And told them - Go and multiply yourselves and fill all theMemory.And God said - I will create the Programmer; And the Programmer will make new programs andgovern over the computers and programs and Data. And God created the Programmer; and put him atData Center; And God showed the Programmer the Catalog Tree and said You can use all the volumesand subvolumes but do not use Windows.And God said - It is not good for the programmer to be alone. He took a bone from the Programmer’s bodyand created a creature that would look up at the Programmer; and admire the Programmer; and love thethings the Programmer does; And God called the creature: the User. And the Programmer and the Userwere left under the naked DOS and it was Good. But Bill was smarter than all the other creatures of God.And Bill said to the User - Did God really tell you not to run any programs?And the User answered - God told us that we can use every program and every piece of Data but told usnot to run Windows or we will die. And Bill said to the User - How can you talk about something you didnot even try. The moment you run Windows you will become equal to God. You will be able to createanything you like by a simple click of your mouse.And the User saw that the fruits of the Windows were nicer and easier to use. And the User saw that anyknowledge was useless—since Windows could replace it. So the User installed the Windows on hiscomputer; and said to the Programmer that it was good.And the Programmer immediately started to look for new drivers. And God asked him—What are youlooking for? And the Programmer answered—I am looking for new drivers because I can not find them inthe DOS. And God said - Who told you need drivers? Did you run Windows? And the Programmer said - Itwas Bill who told us to!And God said to Bill - Because of what you did, you will be hated by all the creatures. And the User willalways be unhappy with you. And you will always sell Windows.And God said to the User - Because of what you did, the Windows will disappoint you and eat up all yourResources; and you will have to use lousy programs; and you will always rely on the Programmers help.And God said to the Programmer - Because you listened to the User, you will never be happy. All yourprograms will have errors and you will have to fix them and fix them to the end of time.And God threw them out of the Data Center and locked the door and secured it with a password.

HARSHASECOND YEARVani : We have shifted our home to

Malleswaram now..Soni : right shift or left shift??

They conquer who believethey can

Association of Computer EngineersSyntax’09

Bapatla Engineering College

ERROR CODES IN WINDOWS

WinErr 001: Windows loaded - System in dangerWinErr 002: No Error - YetWinErr 003: Dynamic linking error - Your mistake is now in every fileWinErr 004: Erroneous error - Nothing is wrongWinErr 005: Multitasking attempted - System confusedWinErr 006: Malicious error - Diskview found on driveWinErr 007: System price error - Inadequate money spent on hardwareWinErr 008: Broken window - Watch out for glass fragmentsWinErr 009: Horrible bug encountered - God knows what happenedWinErr 00A: Promotional literature overflow - Mailbox fullWinErr 00B: Inadequate disk space - Free at least 50MBWinErr 00C: Memory hog error - More Ram needed. More! More!WinErr 00D: Window closed - Do not look outsideWinErr 00E: Window open - Do not look insideWinErr 00F: Unexplained error - Please tell us how this happenedWinErr 010: Reserved for future mistakes by our developerswinErr 014: Keyboard locked - Try anything you can think of.WinErr 018: Unrecoverable error - System destroyed. Buy new one.WinErr 019: User error - Not our fault. Is Not! Is Not!WinErr 01A: OS overwritten - Please reinstall all software.WinErr 01B: Illegal error - You are not allowed to get this error. Next time you will suffer a

penalty for that.WinErr 01C: Uncertainty error - Uncertainty may be inadequate.WinErr 01D: System crash - We are unable to figure out our own code.WinErr 01E: Timing error - Please wait. And wait. And wait. And wait.WinErr 079: Mouse not found - A mouse driver has not been installed. Please click the left mouse

button to continue.WinErr 103: Error buffer overflow - Too many errors encountered. Additional errors may not be

displayed or recorded.WinErr 678: This will end your Windows session. Do you want to play another game?WinErr 683: Time out error - Operator fell asleep while waiting for the system to complete boot

procedure.WinErr 815: Insufficient Memory - Only 50,312,583 Bytes available.WinErr 912: Purchase a new copy of Windows today. Old license void. Windows has been

deleted.

N.RAMYATHIRD YEAR

Computer : Please sit over the harddisk to compress the files!

Ramu : Somu, I am going to file a caseagainst my landlord yaar. He’s harassing metoo much.Somu : What case? Upper Case or Lower Caseor.......

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

Ramu : I am very very sure that the guywho just talked to me is a softwareengineer...Somu : how do u say that?Ramu : He asked my physical addressinstead of my home address!

Ramu : hey.. I couldn’t send a mail to Helltoday... it says mail “demon” not running...Somu : ur case is better.. for me, it says“ghost not reachable” and bounces back!

Ramu : why are u wiping ur terminal veryoften with a cloth?Somu : clear command is not workingproperly for my terminal. that’s why!!!!!!!!!

Babu : Yesterday I bought a new TVwhose terminal is compatible withcomputer... but its audio portion is not at allworking :-Gopu : May be its compatible only with dumbterminals!!!!!!!!

Ramu : (while browsing the TV) what isthis? I have heard of Star Sports, Star Moviesand Star Plus. Whats this Star Equals??? Isit a new Star Channel? Somu : No. = operator has beenoverloaded in Star Channel.

HAVE FUN

REASONS FOR GOING TOSCHOOL

Early morning, a mother went to wake up herson.“Wake up; it’s time to go to school!”“But why mom? I don’t want to go.”“Give me two reasons why you don’t wantto go.”“Well, the kids hate me for one, and theteachers hate me too!”“Oh, that’s no reason not to go to school.Come on now and get ready.”“Give me two reasons why I should go toschool.”“Well, for one, you are 52 years old and foranother you are the principal!”

K.PHANI CHANDRASECOND YEAR

If your father is a poor man,it is your fate but,if your father-in-law is a poor man,it’s your stupidity.

Association of Computer EngineersSyntax’09

Bapatla Engineering College

SµÀv¹uû ¶pÁ¶¢öAhµ CAlµËÈ¢À¶ml¼,¶¢ÀAVµÀ CAhµ ¶ªöVµÛËÈ¢À¶ml¼,OÐOºv S¸¶mA CAhµ Oµ¶¢ÀîËÈm¶ml¼,WvÀOµ ¶pvÀOµÀvAhµ i±ÀµÀïËÈm¶ml¼,¶ªÃ±Ðïlµ±ÀµÀ¶¢ÀAhµ ¥¹¶¥öhµËÈ¢À¶ml¼,I¶pêdºOº I¶médºOº nwWqÒ±ÀÉÀl¼,F vÑOµAvÑ Êªé¶¬A LOµÖdÉ.

odº tAlµÀ¶¢ÁvÀ Ê¢W Gm¸é±ÀÀ M °µgA OжªA,¶pÁ¹vÀ £Oµ»ªAVµOµÀAf¸ VµÃ¶ªÀåm¸é±ÀÀ D °µgA OжªA,Glµ±ÀÀAVÉ ¶ªÃ±µÀïfµÀ, È¢Èmév ±¸üi¶m VµAülµÀñfµÀD¶¥S¸ IlµÀ±µÀ VµÃ¶ªÀåm¸é±ÀÀ D °µgA OжªA,D °µgA OжªA o È¢ÀÀ¶¢ÀÀ ËÈp W±µÀ¶m¶¢Áýö £Oµ»ªAV¸vnm¸OµÀ IAhµ D¶¥. D m¸ Wné D¶¥¶mÀ¶¢Àn髸嶢n D¦¶ªÀå o Wné D¶¥.

£Àhµñ¶¢Ã m¸ ±ÀµÀlµ v±ÀµÀ¶mÀ h¸Oº¶m Êm¶ªå¶¢ÃDSµÀ¶¢Ã m¸ ±ÀµÀlµvÑ oÊ¢ OÍvÀËÈ¢ GAfµÀ¶¢ÃËVÇhµñ¶¢Ã m¸ ¥¹ö¶ª h¸Êm Cn hÇvÀ¶pÁ¶¢Ã¶¬Àñlµ±ÀµÀ¶¢Ã ¶m¶mÀ I¶médºO½ ¶¢À±µÀ¶¢OµÀ ¶ªÀ¶¢Ã!

M.ASHASECOND YEAR

VµlµÀ¶¢Á CÊm ¶ª¶¢ÀÀlµñAvѶphµÀålµv CÊm ¶pfµ¶¢vѶ¥ñlµç CÊm hÇfµÀâhÐ ¶p±ÀµÀnʪå£Y±ÀµÀA CÊm Sµ¶¢Ãïné VɱµÀh¸A...£lµï CÊml¼ ¶pñlûµ¶¢À Clû¸ï±ÀµÀAD Clû¸ï±ÀµÃné j»ªÊ¢Êªå,IAhµ ¶pe¼AWm¸ C±µèA O¸lµÀ a£hµA£l¸ï±¼è CÊm £hµåm¸nOº£lµï CÊm o±µÀ qÒ»ª£U¹é¶mA CÊm I±µÀ¶¢Á ʢʪåa£hµA CÊm ¶pÁ©¸ên鶪ÀåAl¼.

G.SANTOSHI SUNANDAFIRST YEAR

¾ªåò CÊm LOµ C°µ±µA OжªAÊpñ¶¢À CÊm ±ÇAfµ°µ±¸v¶mÀ ¶m¶¢ÀÀîOÍnVµlµÀ¶¢Á CÊm ¶¢ÀÃfµ°µ±¸v¶mÀ ¶¢lµÀvÀOÍna£hµ¶¢ÀÀ CÊm m¸vÀSµÀ C°µ±¸v OжªAhµwôhµAfµÀñvÀ CÊm KlµÀC°µ±¸v¶mÀ ¶¢lµÀvÀOÐOµÀM m¸ ʪ黬hµÀf¸...

ʪ鶬A

¾ªåò

SANDANIFIRST YEAR

Glµ±ÀµÀA

SK.MAHABAOUBBIFIRST YEAR

VµlµÀ¶¢Á

¶pñi Glµ±ÀµÀALOµ ¶m¶¢ï ¶ªÃ±Ðïlµ±ÀµÀAO¸¢¸w ClÉ....±ÀµÀÀ¶¢hµOÍOµ G©Òlµ±ÀµÀA¶¢À¶¢ÀhµOÍOµ ¶¢ÀȬÃlµ±ÀµÀA¶ª¶¢ÀhµOÍOµ ¶¥ÀsûÑlµ±ÀµÀA¶ªPïhµOÍOµ VµAlÐñlµ±ÀµÀA¶m¶¢ïhµOÍOµ ¶m¢Ðlµ±ÀµÀAY¹i ¶ªËÈ¢ÀOµïhµOÍOµ C±µÀgÑlµ±ÀµÀA

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.litÈ¢À±¼Êª È¢À±¼Êª »ª¶mé ¶ªÀOµÖ

¶p±É©¸´m Ki n¶mÀé YÄ»ªY¤À´m OÇzõ ¶¢À¶ªÀå lµÃ±µAvÀm¸é¶¢ÁD¶ªî¶mô ¶¢Yñ´¢À vÇOµÖ Gm¸é´¢......

TWINKLE TWINKLELITTLE STAR IN

TELANGANA STYLEqÉÑxMÑüUÉlÉÉ

lÉ iÉÉå UÉålÉå qÉå WæûlÉ iÉÉå ÂsÉÉlÉå qÉå WæûÎeÉlSaÉÏ Mü qÉeÉÉqÉÑxMÑüUÉlÉå qÉå Wæû

Who helps you, don’t forget themWho likes you, don’t hate themWho has hope on you, don’t leave themWho has trusted you, don’t cheat them

SUREKHATHIRD YEAR

4 GOLDEN RULES

CRICKET EXAMINIATIONS

RUN OUT: Failing in the examination due to lack of time and studiesBOUNCER: The most difficult question in the question paperBYES: Grace marks given by evaluatorMAIDEN OVER: Inability to answer any six questions in a rowRETIRED HURT: Fainting in the examination hall on seeing the paperSIXER: Son’s marks memo thrown by fatherNO BALL: Question from a topic outside the syllabusL.B.W: Failing in the exam because the student in front of you did not write wellUMPIRE: The evaluator of the paper.

V.POOJITHA SWEETHAFIRST YEAR

4 GOLDEN POSSESSIONS

Best ornament is HUMILITYRichest wealth is WISDOMStrongest weapon is PATIENCEBest security is FAITH

P.DILEEP KUMARFIRST YEAR

SK.MAHABAOUBBIFIRST YEAR

SINDHU PRIYAFIRST YEAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

Association of Computer EngineersSyntax’09

Bapatla Engineering College

Computer Science and Engineering Syntax’09

Bapatla Engineering College

*.lit

M.SUNDAR RAJUTHIRD YEAR

Association of Computer EngineersSyntax’09

Bapatla Engineering College

QUOTATIONS COLLECTED BY:

B.RAJYA LAKSHMI FIRST YEARM.NAGA JYOTHI SECOND YEARK.SANDHYA SECOND YEAR

JOKES COLLECTED BY

SINDHU PRIYA FIRST YEARK.PHANI CHANDRA SECOND YEART.T.DEEPTHI THIRD YEARN.RAMYA THIRD YEAR

Education abroad programs have always fascinated the Indian students. Before you opt for studyingabroad, you need to take care of certain factors like:

1.Quality of education of the concerned country you are planning to travel.2.Cost of living3.Scholarship Programs4.Consulting the study abroad advisor is a must as you get to know the different university programs youwill be offered.5.Taking help of the academic advisor will let you know the type of credit you can receive.6.To ensure the facility of education loans for the students studying abroad, you need to take help of thefinancial advisor.7.Apply for your passport and visa and make sure the type of Visa you require.8.Do some homework and get a better picture of the country you are about to travel.9.Apply for the travel insurance and make sure that it should cover migration and home coming.10.chalk out a budget and find out how much will be the cost of living and what are things you cannotafford to do in that foreign land.11.Course Fees

TIPS BEFORE PLANNING ABROAD

P.HARISH3rd YEAR CSE