Tuesday, November 17, 2009

Office Interior Design Ideas For Your Home Office

With the internet becoming more and more prevalent in today’s society, it comes as no surprise that many people now have the ability to work form home. You are one of those people, and have allotted a room in your house as your office space. However, the room is rather bare at the moment, and you want to liven up your work space.



The first thing that you need to think about is the primary use of your home office. For example, will it be the kind of place that you have clients come in to visit? Or, will it be the kind of place that you use just for yourself? This will make a difference in the overall theme.



If you are going to have clients in it, you will, of course, need to choose a design that is professional. Thus, you should allot a certain area of your area to a couch or a couple of plush chairs, along with a coffee table and reading materials. Ideally, leather is the most professional look for this area.



Regardless of whether or not you will be having clients , you should make the atmosphere as comfortable as possible. For example, what is one thing that you notice? If you answered fish tanks, then you have the right answer! Why are there fish tanks in so many offices? The answer is that it is relaxing to watch the fish, and it is also a stylish addition.



Thus, you should consider having a fish tank as well. If, however, you do not want to deal with the upkeep of having one, you can also consider something in the same area, such as a waterfall. However, while this office interior design is a great way to make your home office more interesting, make sure the sounds are not distracting you from your work!



The most important section of any home office is the workstation itself. You will need a desk that can comfortably accommodate your PC as well as files and other important supplies. However, make sure that the desk is not so large that it takes up the majority of the room. You can find office workstations at your local furniture store.



For more information on office interior design ideas, be sure to check out various business magazines. In those magazines are often pictures, and those pictures can give you ideas. Also, be sure to search the internet, since there are many different

Sample Resume Objective

When creating a resume, one of the most important aspects is the resume objective. Employers get hundreds of resumes whenever they place an add for a job and unless you put down your employment objective in your resume, the document that you worked so hard to produce may end up by the wayside.



There are many different sample resume objective forms that you can use,. The resume objective is simply what you wish to accomplish by sending the company your resume. In most cases, the objective is to get a certain job. This should be clearly stated on your resume.



A sample resume objective for someone who wishes to become a paralegal, for example, can include a heading stating Employment Objective and under this heading should be the type of paralegal position which you are seeking. If you are seeking to be a commercial real estate paralegal, for example, this should be stated at this point.



Another sample resume objective would be for someone who is seeking a position as receptionist. Again, the Employment Objective would be listed as receptionist.



Suppose, however, that the person who seeks to be a receptionist is also going to school for a paralegal degree. He or she may be qualified now to be a receptionist, but upon completion of their studies, will want to seek employment as a paralegal. If this person is applying for a job at a law office, in addition to the sample resume objective there should also be a career objective stated. This could read something like this:



Although I am seeking the position of receptionist, I am currently enrolled in xxx college and expect to complete my paralegal studies in xxx. My career objective is to become a paralegal.



This will let the prospective employer know that in addition to getting a receptionist, he or she may also be able to get a qualified paralegal who will have knowledge of the law firm and can remain in the employ of the law firm for years to come. This may make the candidate a bit more desirable as it costs employers thousands of dollars to train new employees.



A good sample resume objective can be found within many different software programs that assist someone in creating a resume. The wording is all there, you just need to fill in the proper information. It is essential, however, that you put down an objective in your resume. It not only denotes professionalism, but lessens the confusion on the behalf of the employer.



Employment objectives and career objectives are two different headings on most resumes. An employment objective refers to the job for which one is immediately applying., A person just out of law school may apply for a job as an associate in a law firm. This is an employment objective. A career objective for the same person, however, would probably be partner in the law firm.



Many people are hesitant about putting down career objectives on their resumes. It makes them feel foolish as if they are shooting for the stars. Nothing can be further from the truth. Most employees want to hire people with some sort of ambition. It is not foolish to say that you want to be partner of a law firm when you are an attorney, it is more foolish to say that you are content with staying an associate and never moving up the ladder.



It is important, therefore, to put employment objectives as well as career objectives, where appropriate, on your resume. If you are going to school to become a nurse and have applied for a job as a secretary, it is not necessary to put your nursing career objective on your resume as this may cost you the job. A career objective should only be included on a resume if it adds to the employment opportunity which you are seeking.



To find a good sample resume objective, take a look at some of the resume building tools online or in some resume building software. All of the information that you need to find a good sample resume objective can be right at your fingertips. Remember to be honest in what you are hoping to achieve. You do not have to get too wordy, either. A good sample resume objective can be as simple as saying that you want to be a receptionist.

Wednesday, September 30, 2009

Kerala boat tragedy , thekkady

THEKKADY - The toll in the Thekkady boat tragedy touched 37 as five more bodies were recovered Thursday morning, officials said.


The tragedy occurred Wednesday at 5.15 p.m. when the boat carrying 76 tourists capsized in a lake in the Periyar wildlife sanctuary in central Kerala.

A 24 member diving team of the Indian Navy reached the accident site Thursday morning and were searching for more bodies.

P.T. Thomas, Congress Lok Sabha member representing the area, said the exact number of people who have died is yet to be ascertained as some foreign tourists reportedly swam to safety.

“Those rescued are being treated at various hospitals and since the search is going on, we will have to wait,” said Thomas.

Meanwhile Chief Minister V.S. Achuthanandan told reporters at his residence in state capital Thiruvananthapuram that the state government would bear all expenses for transporting the dead bodies as well as the expenses incurred by the rescued tourists.

“We have decided to hold a judicial inquiry by a sitting judge of the Kerala High Court. We have also decided to sanction an ex-gratia of Rs.5 lakh each to the families of the deceased,” said Achuthanandan.

Achuthanandan will arrive in Thiruvalla — where the bodies of the victims are being brought for embalming — to pay his respects. The bodies will then be sent home. The state government has booked air tickets from Kochi to send the survivors as well as the bodies home.

Why we need robust consumer financial protection

This morning I testified before the House Financial Services Committee to support the creation of a robust new Consumer Financial Protection Agency. You can read my prepared testimony here.
****
Thank you, Mr. Chairman, Ranking Member Bachus and members of the Committee on Financial Services for inviting me here today. I appreciate the opportunity to share with you the views of the NAACP on the creation of a Consumer Financial Protection Agency, or CFPA. I would also like to begin by thanking you, Chairman Frank, for all you have done and continue to do to help low- and middle-income Americans, as well as racial and ethnic minority Americans attain financial security. In fact, NAACP members from across the Nation who were fortunate enough to hear your presentation at our annual convention in New York earlier this year are still talking about the new agency and its promise for our communities.

More than one hundred years old, the NAACP today is our Nation's oldest, largest and most widely recognized grassroots civil rights organization. We currently have more than 2,200 units in every state in the country, as well as in Italy, Germany, Korea and Japan.

The NAACP is very supportive of the creation of a strong and effective Consumer Financial Protection Agency with the protection of civil rights and a directive that it seek out and work to eliminate discrimination as a core part of its mandate. We need clear and concise rules, clearly and vigorously enforced, if we are to promote economic security and growth throughout our Nation. For too long, racial and ethnic minorities, the elderly and others have been targeted by unscrupulous lenders and underserved by traditional financial institutions. The result of this lack of standard rules and strict enforcement of the rules that we do have has been the financial stagnation, and in too many cases, the economic ruin, of entire communities.

Our current system of consumer protection fails to protect Americans of all races and backgrounds from the most basic exploitation and abuses that can cost individuals and families hundreds of thousands of dollars, and even their homes. Current laws and enforcement allow a range of institutions to escape supervision because responsibilityfor consumer protection is fragmented across too many regulators. Too many finance companies are not regulated at all at the Federal level.

When they have been engaged, too many regulators have spent too much time in recent years asking 'What's the effect on the financial firm?" without asking 'What's the effect on consumers?" As a result, among other problems, regulators permitted inappropriate mortgages and abusive credit card practices. And the result of these misplaced priorities, as we have seen, has been an almost complete collapse of not only our Nation's economy, but the near ruination of the global financial system as well. In the recent crisis, many of the people who were targeted by unscrupulous lenders lost their savings, their financial security, and in too many cases their homes. Sadly, many of the worst abusers consistently targeted low-income families, racial and ethnic minorities, women and the elderly.

Examples of the financial abusers targeting racial and ethnic minorities abound, and can be found throughout the mortgage arena, where predatory lenders consistently targeted African Americans and others. This was also done in credit card abuses and in payday lending, just to name a few.

For example, in the American mortgage market predatory lenders have, for decades, targeted African American borrowers and other racial and ethnic minorities as well as the elderly with their nefarious products. A study by the Center for Responsible Lending demonstrated that for most types of subprime home loans, African American and Latino borrowers are more than 30% more likely to have higher fees and interest rate loans than Caucasian borrowers, even after accounting for differences in risk.

In fact, United for a Fair Economy estimates that people of color are 2 to 5 times more likely to receive a predatory loan than white borrowers. Put in other terms, sub-prime mortgage originators have flooded minority communities with high-cost, unsustainable loans that were made to consumers without regard to their ability to repay or the value of the property. From 2000 to 2007, communities of color lost between $164 and $213 billion, and the numbers keep rising as the foreclosure crisis worsens. Fannie Mae and Freddie Mac estimate that up to half of the borrowers who received subprime loans should have qualified for "prime-rate" conventional loans, had mortgage lenders exercised proper business sense.

This is not a new trend. As far back as 2000, a study by the U.S. Department of Housing and Urban Development clearly demonstrated that many people of color could qualify for more affordable loans than they were receiving.

In 1996, a study by FannieMae and Freddie Mac reported that as many as a third of the families who receive subprime loans actually qualify for prime loans.

Sadly, mortgage lenders are not the only ones who target racial and ethnic minority communities with their wealth-stripping products. In the credit card market, one report showed that 15% of African-American and 13% of Latino card users have cards with interest rates over 20%, compared to only 7% of White card users - many of whom are responding to credit card solicitations with preset terms and conditions. Our communities were also hard hit by the exploitative ploys of some credit card companies which would hike interest rates and charge excessive fees, often without any advance notice and sometimes without the knowledge of the credit cardholder.

And payday lenders are notorious for setting up their shops, and charging incredibly exploitative rates, in abundance in African American communities. To paraphrase Julian Bond, the Chairman of our National Board of Directors, payday lenders are as common in African American communities as Starbucks Stores are in middle class communities that are predominantly White.

It is because of these targeted abuses that the NAACP strongly supports the creation of a strong Consumer Financial Protection Agency. As envisioned, the CFPA would provide the government with the tools necessary to help consumers navigate and be treated fairly by what is often a confusing and potentially ruinous environment; it would support if not require regulators to become more protective of consumers; and it would make civil rights protections more of a key element in the regulation and oversight of financial services.

It is also because of the systemic discriminatory and abusive lending practices and the resulting wealth-stripping, ruinous effects, that we feel very strongly that the newly created Consumer Financial Protection Agency must be given the mandate as well as the power to seek to prevent and remedy illegal discrimination. We were pleased to see and are supportive of the provisions in the latest draft of the CFPA legislation that creates an Office of Fair Lending and Equal Opportunity, and makes the fight against discrimination based on race or ethnic background part of the mandate of the new agency. These provisions will go a long way toward putting some teeth into the laws that are already on the books and to protecting consumers, all consumers, as they attempt to navigate our Nation's financial services.

One area that the NAACP would like to see the current CFPA proposal strengthened is that we would like to see regulation of the Community Reinvestment Act, the CRA, fall under the CFPA's jurisdiction. We need to renew, reinvigorate, modernize and expand CRA, and I appreciate the comments of the Chairman last week when he said that he, too, is serious about updating this important law. I would suggest that perhaps in thecourse of reauthorizing CRA, this committee consider putting authority for this important law under a newly created and robust CFPA. In order to fully address the needs of local communities, many of which are represented by the NAACP, the CFPA should be able to review and enforce lending laws at that level.

Mr. Chairman, members, as I have said all along, the NAACP strongly supports the creation of a robust CFPA and appreciates all the work that has gone into including civil rights protections in the draft that we are currently discussing. It is our belief that a strong CFPA will go a long way toward addressing the very real needs of enforcement and regulation in the financial services arena. However, let me make it clear that we have no illusions that this new agency will fully address all of the needs and shortcomings that continue to plague our communities, and indeed our Nation.

We still need strong laws to address many of the problems that allow unscrupulous lenders to target low- and moderate-income Americans, as well as racial and ethnic minority Americans and the elderly at all levels of the economic scale. Specifically, the NAACP will continue to fight for aggressive anti-predatory lending laws, as well as curbs on abusive payday loans and real assistance for homeowners facing foreclosure. In that vein, I look forward to continuing to work with you, Mr. Chairman, as well as all of the other members of this committee to enact strong legislation to help all Americans gain the American dream of economic security.

Thank you again for inviting me here today and I stand ready to take any or your questions.



****
Economy


Read more at: http://www.huffingtonpost.com/hilary-o-shelton/why-we-need-robust-consum_b_304243.html

Saturday, September 12, 2009

Tuesday, June 9, 2009

Crystal Growth

Crystals are the unacknowledged pillars of modern technology. Without crystals, there would be no electronic industry, no photonic industry, no fiber optic communications, which depend materials/crystals such as semiconductors, super conductors, polarizer, transducers, radiation detectors, ultrasonic amplifiers, ferrites, magnetic garnets, solid state lasers, non-linear optics, piezo-electric, electro-optic, acoustic-optic, photosensitive, refractory of different grades, crystalline films for microelectronics and computer industries.


http://www.scribd.com/doc/16247919/Kalai-Project-1

Thursday, April 9, 2009

ISRO

ஒருங்கிணைந்து செயல்பட்டால் சாதனை - மயில்சாமி


திருவண்ணாமலை, ஏப் 8,2009 அனைத்து துறைகளிலும் ஒருங்கிணைந்து பணியாற்றினால் சாதனை படைக்கலாம் என்று இந்திய விண்வெளி ஆராய்ச்சி மைய திட்ட இயக்குனர் மயில்சாமி அண்ணாதுரை கூறினார்.

திருவண்ணாமலை சண்முகா தொழிற்சாலை கலை அறிவியல் கல்லூரியின் 12-ம் ஆண்டு பட்டமளிப்பு விழா, கல்லூரி ஆண்டு விழா மற்றும் விளையாட்டு விழா, இறுதி ஆண்டு மாணவர்களை வாழ்த்தும் விழா என முக்கனி விழா நடக்கிறது.

இதில் நேற்று நடைபெற்ற பட்டமளிப்பு விழாவில் ஐஎஸ்ஆர்ஓ சந்திராயன்-1 திட்ட இயக்குனர் எம். மயில்சாமி அண்ணாதுரை கலந்து கொண்டு பட்டங்களை வழங்கி பேசினர்.

நீங்கள் பெற்ற கல்வியின் பயன் உங்கள் பெற்றோருக்கும், நாட்டுக்கும் திரும்பி செலுத்த வேண்டிய கடமை உங்களுக்கு இருக்கிறது. மூத்தோர்களுடன் இணைந்து பணியாற்றி நல்ல குடிமகன் என்ற பெயரைப்பெற வேண்டும்.

கடும் முயற்சியால் சாதனை படைக்க முடியும் என்பதை உலகத்துக்கு உணர்த்தியது சந்திராயன்-1 இந்த வெற்றி எதிர்காலத்தில் இன்னும் திறன் மிகுந்த செயற்கைக்கோளை உருவாக்க துணையாக இருக்கும்.

ஒருங்கிணைந்து பணியாற்றும் போது நம்மால் சாதனை படைக்க முடியும் என்பது எல்லா துறைக்கும் பொருந்தும் என்றார் அவர். விழாவில் கல்லூரி தலைவர் அமராவதி முருகையன் தலைமை வகித்தார் மற்றும் செயலர், தாளாளர் எல்.என். சௌந்தர்ராஜன் முன்னிலை வகித்து பேசினார் மற்றும் அறக்கட்டளை உறுப்பினர் அழஉடையப்பன், சீனி கார்த்திகேயன் உள்ளிட்டோ ர் கலந்து கொண்டனர்.

Tuesday, March 31, 2009

Presence of surplus carbon dioxide in the atmosphere has taken center stage in the environmental science. All over the world people are worried about the excess amount of carbon dioxide in the atmosphere because it’s causing undesirable changes in the surroundings such as green house effect, global warming, melting of ice caps on the glaciers etc. So most of the environmental scientists are trying to minimize the amount of atmospheric carbon dioxide.

Researchers at Pennsylvania State University are working towards the same goal with the help of sunlight and titanium oxide nanotubes. These two elements, sunlight and titanium oxide nanotubes can transform carbon dioxide into methane. Methane can be utilized as energy source. It seems like double benefit. At one hand, we are reducing the quantity of carbon dioxide into the atmosphere and we would be less dependent on fossil fuels.

Craig Grimes of Pennsylvania State University is working on this project with Oomman Varghese, Maggie Paulose and Thomas LaTempa. Craig Grimes shares his views, “Right now there is lots of talk about burying carbon dioxide, which is ridiculous. Instead we can collect the waste out of the smoke stack, put it though a converter, and presto, use sunlight to change [CO2] back into fuel.”

The team of researchers arranged the nanotubes vertically somewhat on the lines of empty honeycomb. The top of the nanotubes is covered with a thin, reddish-brown layer of copper oxide. Here the copper and titanium oxide operate as catalysts. They increase the pace of chemical reactions that happen naturally.

How does the whole process work? When sunlight strikes the copper oxide, carbon dioxide is transformed into carbon monoxide. When sunlight comes into contact with titanium oxide, water molecules split apart. In this reaction hydrogen is freed from the water and the carbon released from CO2 , unite again to create burnable methane. Here oxygen is released as byproduct. If we adjoin more carbon dioxide and sunlight, we will obtain more methane. Craig Grimes calculates that focusing the light collected from 1,100 square feet onto one of the membranes would generate more than 132 gallons of methane on a sunny day. Grimes is of the opinion that formation of methane by this process is the solar power by another name. Instead of storing electrons in batteries, Grimes’ initiative would store energy chemically.

We can use the methane in many ways. In cooking gas cylinders, we can utilize methane instead of propane. Coal-burning power plants could utilize the methane to heat water and generate more electricity. Kyoung-Shin Choi, a chemistry professor at Purdue University, points out another important benefit of the methane. He says we don’t have to invest money in infrastructure as it already exists. “If you want to use hydrogen as a energy source in the future, you have to convert all the existing infrastructure,” said Choi. “But we’ve been using methane for years, and can utilize all the infrastructure we already have.”

“It’s a clean and sustainable cycle as long as you have sun and water,” said Choi.

But we have to wait for its commercial use. Only future can provide an answer to us regarding this.

Blue Tooth Technology

Bluetooth technology is a type of the wireless technology that eliminates the need for the number of inconvenient cables and devices that are used to connect the computers, mobile phones, digital cameras, handheld devices and new digital appliances. Bluetooth enables the users to connect to a wide variety of telecommunication and computing devices easily, without cables.

It makes rapid ad hoc connections, automatic unconscious connections between two or more digital devices. Bluetooth provides the opportunity of using the mobile data in different applications. Bluetooth makes wireless communication between the two devices in a localized area of a room of office or home very easily. Bluetooth technology uses radio-based links and all the connections between the devices and invisible and instantaneous.

By Bluetooth technology your laptop can send print request to a printer in your next room. Bluetooth is actually a standard for wireless communication between the devices in a relatively small area and it is therefore works fine in the personal area network (PAN) using radio frequency.

Any two devices that follow the Bluetooth standard can communicate with each other. A number of the Bluetooth devices like digital camera, mobile phone and handheld pc can form a network. You can send emails to your mobile phones from your laptop without any physical connect between your laptop and your mobile phones.

Features of Bluetooth technology

• Bluetooth technology uses radio waves for communication in 2.4 GHz

• It supports multipoint communication not just point to point.

• Bluetooth works in a small area of 10-15 meters.

• Bluetooth offers speed of 1-2 Mbps.

• Bluetooth chipsets are less expensive though more expensive than IrDA.

How Bluetooth Technology Works

Bluetooth is a high speed wireless link technology that uses the radio waves. It is designed to connect the mobile phones, laptops, hand held devices and portable equipments with almost no work by the end users. Unlike infrared Bluetooth does not require line of sight between the connecting units. Bluetooth technology is a modified form of the current Wireless LAN technology and it’s more acceptable for its relative small size and low cost.

The current circuits are contained on a circuit board of 0.9 cm square and a much smaller single chip version is in development and soon it will be in use. The cost of the Bluetooth device is expected to fall rapidly. Bluetooth chip has to be equipped in many devices. In Bluetooth technology, small and inexpensive transceivers have been placed in the digital devices. The radio waves operate at 2.45 Ghz band on the Bluetooth devices. Bluetooth supports the data speed up to 721 Kbps and 3 voice channels. The Bluetooth chip can either be built into the devices or it can be uses as an adapter. In computer it can be used with the USB port. Each Bluetooth device has a 48 bit address from the IEEE 802 standards and the Bluetooth connections can be either point to point or multipoint. Bluetooth range is 10 meter but it can be extended up to 100 meters by increasing the power.

Bluetooth devices are protected from the external interference because they change their frequency up to 1600 times in a second. Bluetooth radio technology provides the bridge between the existing data network. Bluetooth guarantees security at the bit level and the authentication is controlled by the end user by using 128 bit key. An important face of the Bluetooth technology is that it instantly forms a network when two or more devices come closer in the range of each other.

Bluetooth Technology Benefits

Bluetooth technology is a convenient choice of communication in a wire free, short range environment. Bluetooth is a globally available standard for connecting the devices like mobile phones, digital cameras, laptops, MP3 Players, cars, stereo headsets etc. Bluetooth enable devices do not need to install any drivers. The key benefits of the Bluetooth wireless technology are its built-in-security, low cost, easy of use, robustness, and ad hoc networking capabilities.

The Bluetooth wireless technology is available globally. Many manufactures from the different companies are busy to implement the technology in their products. Bluetooth technology operates in the 2.4 Ghz, one of the unlicensed, industrial and scientific radio band. Bluetooth technology is a free of charge service but your mobile phones set should support the GSM and CDMA technology.

Today mobile phones have built in capabilities and Bluetooth functionalities in them. Bluetooth technology is available in the different range of the devices like mobile phones, automobiles, medical devices, industries and enterprises etc.

Due to the key features of the Bluetooth technology like low power consumption, low cost and wireless features make it more popular. Bluetooth technology does not require any fixed infrastructure and it is very simple to install and setup.

No wires are required to connect the Bluetooth devices. You can connect to other Bluetooth enabled devices anytime if they come in your range. Bluetooth wireless technology is widely supported and is secure wireless standard today. Bluetooth devices has built-in security features such as 128 bit encryption and pin code authentication when Bluetooth devices identify themselves they use the pin code when they first time connect.

Blue Tooth Technology

Bluetooth technology is a type of the wireless technology that eliminates the need for the number of inconvenient cables and devices that are used to connect the computers, mobile phones, digital cameras, handheld devices and new digital appliances. Bluetooth enables the users to connect to a wide variety of telecommunication and computing devices easily, without cables.

It makes rapid ad hoc connections, automatic unconscious connections between two or more digital devices. Bluetooth provides the opportunity of using the mobile data in different applications. Bluetooth makes wireless communication between the two devices in a localized area of a room of office or home very easily. Bluetooth technology uses radio-based links and all the connections between the devices and invisible and instantaneous.

By Bluetooth technology your laptop can send print request to a printer in your next room. Bluetooth is actually a standard for wireless communication between the devices in a relatively small area and it is therefore works fine in the personal area network (PAN) using radio frequency.

Any two devices that follow the Bluetooth standard can communicate with each other. A number of the Bluetooth devices like digital camera, mobile phone and handheld pc can form a network. You can send emails to your mobile phones from your laptop without any physical connect between your laptop and your mobile phones.

Features of Bluetooth technology

• Bluetooth technology uses radio waves for communication in 2.4 GHz

• It supports multipoint communication not just point to point.

• Bluetooth works in a small area of 10-15 meters.

• Bluetooth offers speed of 1-2 Mbps.

• Bluetooth chipsets are less expensive though more expensive than IrDA.

How Bluetooth Technology Works

Bluetooth is a high speed wireless link technology that uses the radio waves. It is designed to connect the mobile phones, laptops, hand held devices and portable equipments with almost no work by the end users. Unlike infrared Bluetooth does not require line of sight between the connecting units. Bluetooth technology is a modified form of the current Wireless LAN technology and it’s more acceptable for its relative small size and low cost.

The current circuits are contained on a circuit board of 0.9 cm square and a much smaller single chip version is in development and soon it will be in use. The cost of the Bluetooth device is expected to fall rapidly. Bluetooth chip has to be equipped in many devices. In Bluetooth technology, small and inexpensive transceivers have been placed in the digital devices. The radio waves operate at 2.45 Ghz band on the Bluetooth devices. Bluetooth supports the data speed up to 721 Kbps and 3 voice channels. The Bluetooth chip can either be built into the devices or it can be uses as an adapter. In computer it can be used with the USB port. Each Bluetooth device has a 48 bit address from the IEEE 802 standards and the Bluetooth connections can be either point to point or multipoint. Bluetooth range is 10 meter but it can be extended up to 100 meters by increasing the power.

Bluetooth devices are protected from the external interference because they change their frequency up to 1600 times in a second. Bluetooth radio technology provides the bridge between the existing data network. Bluetooth guarantees security at the bit level and the authentication is controlled by the end user by using 128 bit key. An important face of the Bluetooth technology is that it instantly forms a network when two or more devices come closer in the range of each other.

Bluetooth Technology Benefits

Bluetooth technology is a convenient choice of communication in a wire free, short range environment. Bluetooth is a globally available standard for connecting the devices like mobile phones, digital cameras, laptops, MP3 Players, cars, stereo headsets etc. Bluetooth enable devices do not need to install any drivers. The key benefits of the Bluetooth wireless technology are its built-in-security, low cost, easy of use, robustness, and ad hoc networking capabilities.

The Bluetooth wireless technology is available globally. Many manufactures from the different companies are busy to implement the technology in their products. Bluetooth technology operates in the 2.4 Ghz, one of the unlicensed, industrial and scientific radio band. Bluetooth technology is a free of charge service but your mobile phones set should support the GSM and CDMA technology.

Today mobile phones have built in capabilities and Bluetooth functionalities in them. Bluetooth technology is available in the different range of the devices like mobile phones, automobiles, medical devices, industries and enterprises etc.

Due to the key features of the Bluetooth technology like low power consumption, low cost and wireless features make it more popular. Bluetooth technology does not require any fixed infrastructure and it is very simple to install and setup.

No wires are required to connect the Bluetooth devices. You can connect to other Bluetooth enabled devices anytime if they come in your range. Bluetooth wireless technology is widely supported and is secure wireless standard today. Bluetooth devices has built-in security features such as 128 bit encryption and pin code authentication when Bluetooth devices identify themselves they use the pin code when they first time connect.

Thursday, March 26, 2009

Rdbms

DBMS CONCEPTS


1. Database
A database is a logically coherent collection of data with some inherent meaning, representing some aspect of real world and which is designed, built and populated with data for a specific purpose
2. DBMS
It is a collection of programs that enables user to create and maintain a database. In other words it is general-purpose software that provides the users with the processes of defining, constructing and manipulating the database for various applications.

3. Database system
The database and DBMS software together is called as Database system.


4. Advantages of DBMS?

Redundancy is controlled.
Unauthorized access is restricted.
Ø providing multiple user interfaces.
Ø Enforcing integrity constraints.
Ø Providing backup and recovery.


5. Disadvantage in File Processing System

Ø Data redundancy & inconsistency.
Ø Difficult in accessing data.
Ø Data isolation.
Ø Data integrity.
Ø Concurrent access is not possible.
Ø Security Problems.


6.The three levels of data abstraction


Ø Physical level: The lowest level of abstraction describes how data are stored.

Ø Logical level: The next higher level of abstraction, describes what data are stored in database and what relationship among those data.

Ø View level: The highest level of abstraction describes only part of entire database.


11. Data Independence


Data independence means that “the application is independent of the storage structure and access strategy of data”. In other words, The ability to modify the schema definition in one level should not affect the schema definition in the next higher level.

Two types of Data Independence:

Ø Physical Data Independence: Modification in physical level should not affect the logical level.
Ø Logical Data Independence: Modification in logical level should affect the view level.
NOTE: Logical Data Independence is more difficult to achieve


12. View & How is it related to data independence?

A view may be thought of as a virtual table, that is, a table that does not really exist in its own right but is instead derived from one or more underlying base table. In other words, there is no stored file that direct represents the view instead a definition of view is stored in data dictionary.
Growth and restructuring of base tables is not reflected in views. Thus the view can insulate users from the effects of restructuring and growth in the database. Hence accounts for logical data independence.


13 Data Model
A collection of conceptual tools for describing data, data relationships data semantics and constraints.


14. E-R model
This data model is based on real world that consists of basic objects called entities and of relationship among these objects. Entities are described in a database by a set of attributes.

15. Object Oriented model
This model is based on collection of objects. An object contains values stored in instance variables with in the object. An object also contains bodies of code that operate on the object. These bodies of code are called methods. Objects that contain same types of values and the same methods are grouped together into classes.

16 Entity
It is a 'thing' in the real world with an independent existence.


17. Entity type
It is a collection (set) of entities that have same attributes.


18. Entity set
It is a collection of all entities of particular entity type in the database.

19. Extension of entity type
The collections of entities of a particular entity type are grouped together into an entity set.

20.Weak Entity set
An entity set may not have sufficient attributes to form a primary key, and its primary key compromises of its partial key and primary key of its parent entity, then it is said to be Weak Entity set.

21.Attribute
It is a particular property, which describes the entity.

22 Relation Schema & Relation

A relation Schema denoted by R(A1, A2, …, An) is made up of the relation name R and the list of attributes Ai that it contains. A relation is defined as a set of tuples. Let r be the relation which contains set tuples (t1, t2, t3, ..., tn). Each tuple is an ordered list of n-values t=(v1,v2, ..., vn).

23. Degree of a Relation
It is the number of attribute of its relation schema.


24. Relationship
It is an association among two or more entities.


25 Relationship set
The collection (or set) of similar relationships.

26. Relationship type
Relationship type defines a set of associations or a relationship set among a given set of entity types.

27. Degree of Relationship type
It is the number of entity type participating.

25. DDL (Data Definition Language)
A data base schema is specifies by a set of definitions expressed by a special language called DDL.

26. VDL (View Definition Language)
It specifies user views and their mappings to the conceptual schema.

29. DML (Data Manipulation Language)
This language that enable user to access or manipulate data as organised by appropriate data model.
Ø Procedural DML or Low level: DML requires a user to specify what data are needed and how to get those data.
Ø Non-Procedural DML or High level: DML requires a user to specify what data are needed without specifying how to get those data


30 Relational Algebra
It is procedural query language. It consists of a set of operations that take one or two relations as input and produce a new relation.

37. Relational Calculus
It is an applied predicate calculus specifically tailored for relational databases proposed by E.F. Codd.
E.g. of languages based on it are DSL ALPHA, QUEL.

38. Difference between Tuple-oriented relational calculus & domain-oriented relational calculus
The tuple-oriented calculus uses a tuple variables i.e., variable whose only permitted values are tuples of that relation. E.g. QUEL
The domain-oriented calculus has domain variables i.e., variables that range over the underlying domains instead of over relation. E.g. ILL, DEDUCE.

39. Normalization
It is a process of analysing the given relation schemas based on their Functional Dependencies (FDs) and primary key to achieve the properties
Ø Minimizing redundancy
Ø Minimizing insertion, deletion and update anomalies.

40. Functional Dependency
A Functional dependency is denoted by X Y between two sets of attributes X and Y that are subsets of R specifies a constraint on the possible tuple that can form a relation state r of R. The constraint is for any two tuples t1 and t2 in r if t1[X] = t2[X] then they have t1[Y] = t2[Y]. This means the value of X component of a tuple uniquely determines the value of component Y.

41. When is a functional dependency F said to be minimal?
Ø Every dependency in F has a single attribute for its right hand side.
Ø We cannot replace any dependency X A in F with a dependency Y A where Y is a proper subset of X and still have a set of dependency that is equivalent to F.
Ø We cannot remove any dependency from F and still have set of dependency that is equivalent to F.








42. Multivalued dependency

Multivalued dependency denoted by X Y specified on relation schema R, where X and Y are both subsets of R, specifies the following constraint on any relation r of R: if two tuples t1 and t2 exist in r such that t1[X] = t2[X] then t3 and t4 should also exist in r with the following properties
Ø t3

§ = t4[X] = t1[X] = t2[X]

Ø t3[Y] = t1[Y] and t4[Y] = t2[Y]
Ø t3[Z] = t2[Z] and t4[Z] = t1[Z]
where [Z = (R-(X U Y)) ]

42 Lossless join property
It guarantees that the spurious tuple generation does not occur with respect to relation schemas after decomposition.

44. 1 NF (Normal Form)
The domain of attribute must include only atomic (simple, indivisible) values.

45. Fully Functional dependency
It is based on concept of full functional dependency. A functional dependency X Y is full functional dependency if removal of any attribute A from X means that the dependency does not hold any more.

46. 2NF
A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully functionally dependent on primary key.

47. 3NF

A relation schema R is in 3NF if it is in 2NF and for every FD X A either of the following is true
Ø X is a Super-key of R.
Ø A is a prime attribute of R.
In other words, if every non prime attribute is non-transitively dependent on primary key.

48. BCNF (Boyce-Codd Normal Form)
A relation schema R is in BCNF if it is in 3NF and satisfies an additional constraint that for every FD X A, X must be a candidate key.

49. 4NF
A relation schema R is said to be in 4NF if for every Multivalued dependency X Y that holds over R, one of following is true
Ø X is subset or equal to (or) XY = R.
Ø X is a super key.

50. 5NF
A Relation schema R is said to be 5NF if for every join dependency {R1, R2, ..., Rn} that holds R, one the following is true
Ø Ri = R for some i.
Ø The join dependency is implied by the set of FD, over R in which the left side is key of R.


51. Atomicity and Aggregation
Atomicity:
Either all actions are carried out or none are. Users should not have to worry about the effect of incomplete transactions. DBMS ensures this by undoing the actions of incomplete transactions.
Aggregation:
A concept which is used to model a relationship between a collection of entities and relationships. It is used when we need to express a relationship among relationships.

Logged



Concept of DBMS

A database management system (DBMS) is a program that lets one or more computer users create and access data in a database. A DBMS can be thought of as a file manager that manages data in databases rather than files in file systems. The DBMS provides integrity of the data, i.e., making sure data continues to be accessible and is consistently organized as intended and security making sure only those who have privileges can access the data. The DBMS manages user requests and requests from other programs so that users and other programs are free from having to understand where the data is physically located on storage media and, in a multi-user system, who else may also be accessing the data.

Major functions of a database are:

1. Creating records of various data types such as integer, real, character, etc.
2. Query will be made by a standardized language such as SQL (Standard Query Language).
3. Operation such as sort, delete, modify, select, etc.
4. Manipulation such as input, output, analysis, reformatting, etc.
5. Documentation such as metadata or description of the contents of the database should be compiled.

There are four types of database models:

1. Hierarchical model.
2. Network model.
3. Relational model.
4. Object oriented model.

A DBMS is usually an inherent part of a database product. Microsoft’s SQL Server is an example of a DBMS that serves database requests from multiple clients (users). On PCs, Microsoft Access is a popular example of a single- or small-group user DBMS. Other popular DBMSs are IBM’s DB2, Oracle’s line of database management products and Sybase’s products.



DBMS Questions

1. What is DBMS?

It is a collection of programs that enables user to create & maintain a database.
In other words it is general-purpose software that provides the users with the processes of
defining, constructing & manipulating the database for various applications.

2. What is Database?

A database is a logically coherent collection of data with some inherent meaning,
representing some aspect of real world & which is designed, built & populated with
data for a specific purpose.

3. What is a Database system?

The database & DBMS software together is called as Database system.

4. Advantages of DBMS?

Redundancy is controlled. Unauthorised access is restricted. Providing multiple user interfaces. Enforcing integrity constraints. Providing backup & recovery.

5. Disadvantage in File Processing System?

Data redundancy & inconsistency. Difficult in accessing data. Data isolation. Data integrity. Concurrent access is not possible. Security Problems.

6. Describe the three levels of data abstraction?

The are three levels of abstraction: Physical level: The lowest level of abstraction describes how data are stored. Logical level: The next higher level of abstraction, describes what data are stored in
database & what relationship among those data. View level: The highest level of abstraction describes only part of entire database.

7. Define the "integrity rules"

135

There are two Integrity rules. Entity Integrity: States that "Primary key cannot have NULL value" Referential Integrity: States that "Foreign Key can be either a NULL value
or should be Primary Key value of other relation.


8. What is extension & intension in DBMS?

Extension - It is the number of tuples present in a table at any instance. This is time dependent.

Intension - It is a constant value that gives the name, structure of table & the constraints laid on it.


9. What is System R? What are its two major subsystems?

System R was designed & developed over a period of 1974-79 at IBM San Jose
Research Center. It is a prototype & its purpose was to demonstrate that it is possible to
build a Relational System that can be used in a real life environment to solve real life
problems, with performance at least comparable to that of existing system.
Its two subsystems are Research Storage System Relational Data System.


10. How is the data structure of System R different from the relational DBMS structure?

Unlike Relational systems in System R Domains are not supported Enforcement of candidate key uniqueness is optional Enforcement of entity integrity is optional Referential integrity is not enforced





DBMS aptitude Questions

1. What is Data Independence in DBMS?

Data independence means that "the application is independent of the storage structure & access strategy of data". In other words, The ability to modify the schema definition in one level should not affect the schema definition in the next higher level.

Two types of Data Independence:

Physical Data Independence: Modification in physical level should not affect the logical level.

Logical Data Independence: Modification in logical level should affect the view level.

NOTE: Logical Data Independence is more difficult to achieve

2. What is a view in DBMS? How it is related to data independence?

A view may be thought of as a virtual table, that is, a table that does not really exist in its own right but is instead derived from one or more underlying base table. In other words, there is no stored file that direct represents the view instead a definition of view is stored in data dictionary. Growth & restructuring of base tables is not reflected in views. Thus the view 136 can insulate users from the effects of restructuring & growth in the database. Hence accounts for logical data independence.

3. What is Data Model in DBMS?

A collection of conceptual tools for describing data, data relationships data semantics & constraints.


4. What is E-R model?

This data model is based on real world that consists of basic objects called entities & of relationship among these objects. Entities are described in a database by a set of attributes.


5. What is Object Oriented model?

This model is based on collection of objects. An object contains values stored in instance variables with in the object. An object also contains bodies of code that operate on the object. These bodies of code are called methods. Objects that contain same types of values & the same methods are grouped together into classes.

6. What is an Entity?
It is a 'thing' in the real world with an independent existence.

7. What is an Entity type?
It is a collection (set) of entities that have same attributes.

8. What is an Entity set?
It is a collection of all entities of particular entity type in the database.

9. What is an Extension of entity type?
The collections of entities of a particular entity type are grouped together into an
entity set.

10. What is Weak Entity set?
An entity set may not have sufficient attributes to form a primary key, and its
primary key compromises of its partial key and primary key of its parent entity, then it is
said to be Weak Entity set.



Basic Difference between DBMS and RDBMS
« on: July 11, 2008, 01:51:57 PM »

Database has to be persistent, meaning that the information stored in a database has to continue to exist even after the application(s) that saved and manipulated the data have ceased to run. A database also has to provide some uniform methods that are not dependent on a specific application for accessing the information that is stored inside the database.

This is a pretty liberal definition of a database. Lotus Notes calls its message stores "databases", and by this definition they qualify. MUMPS calls its associative storage a database, and while it takes a bit of a stretch, even that meets this definition. There are a number of new database technologies that include object-oriented databases and associative databases, and they seem to qualify as databases under this definition too.

Basic Characteristics of DBMS

• Represents complex relationship between data
• Controls data redundancy.
• Enforces user defined rules.
• Ensures data sharing.
• It has automatic and intelligent backup and recovery procedures.
• It has central dictionary to store information.
• Pertaining to data and its manipulation.
• It has different interfaces via which user can manipulate the data.
• Enforces data access authorization.