Thursday, 20 April 2017

I don't know why my Redmi 3s phone switch phone automatically? | Redmi 3s Prime not switching on

Solution 1:

Follow the steps to enter Recovery Mode XIAOMI Redmi Note 3
  1. Start by holding down the Power key for a short while in order to turn off the device.
  2. in the next step press and hold the Volume Up + Power button for a couple of seconds.
  3. As soon as the Mi Logo appears on your screen release you can release both keys.
  4. Well done! You are in the expected mode.
  5. You can navigate here by using the Volume buttons and confirm options by pressing the Power key.
  6. Once in recovery mode please select wipe and reset.



Solution 2:

First you enter sim card on your smart phone.
Then after power button press for 10-15 second,and your problem is solve.




Tuesday, 18 April 2017

DRDO Tier-II quesions with answer CSE | DRDO solved papers

Hi guys I have attended the DRDO Ceptam 08 tier-II exam ( Computer Science ) held on 16th April 2017 and below are some of questions i remembered from the exam:



Which OSI layer is responsible for routing  - Network layer 

Output high when bits are even numbers -Xnor

no partial dependency - 2nf

Uniquely identify rows and can be used with more then 1 columns in table - Candidate key

Address of next instruction - Program counter

Function within function Excel - nested function

Access of variables only within class - Private

Measure of capacity of channels - Throughput

Resources are willingly released - no Preemption 

Code is put in place of function - In line functions

SQL command to add new column to table - alter table student add column attendance

Wait() waits for a specific period of time or till thread completes?

Which city is closest to equator - quito

add r1, (r2)+ indexed, auto increment, auto decrement, register defereed addressing mode

Buffered, peripheral interface- pci,scsi, bus or ?

Law of heredity by -  mendel (Gregor Mendel)

First chairperson of national commission for women? aruna asaf ali, patnaik?

WHO established in ?  - 1948

Trump is 45 th president of US ( 44 Male )

Reptile having four layered heart - crocodile

int n1=10, n2=20, int sum=n1+ n2++; cout<<sum ??

Bistable multivbrator - flip flop, latch, toggle, all of these

Default value of float in java - 0.0f

Sort perl hashes - sort()

Php method to convert string  into array - explode

Pointer illegal operation - multiplication.division/comparison?

Relational operator in C - '=='

Crystal dynamics founder - David Shannon Morse

Dynasty incorrect match pallavas,chaulakya, pandyas

Allocates equal partitions and returns pointer to first element - malloc()

Cipher block to stream blcok cipher?

Bus active connect and initiates bus transfer = master, slaves, bus interface device or transceiver

One or more types of inheritance in a problem - hybrid inheritance

Scheduling algorithm in time sharing system - round robin

Both front and rear of data structure - deque

Postorder binary tree traversal of a a tree

Stores info about file like permission , descriprot , last access - FAT or FCB

Way to express data or something on internet - MIME, URL, CSS, XSL

Covers all branches in code which coverage? - condition coverage, statement or path coverage?

Not a metric of software testing - defect density, pesticide paradox, estimated budget or estiamated effort?

Winrunner testing tool for ? -  regression or performance

Chief Justice of India - Jagdish Singh Khehar

Code run on servicing interrupt - interrupt service routine

convert binary to octal (136)8

ICMP messages for ping and traceroute

constructor has no return type 

Function having no return type and argument - void display(void);

Variable accessed from source program and out - global or extern

No function declaration and variables are defined in Java - interface


Please correct me via comment section  if anything is wrong above.



Thursday, 13 April 2017

Right age for Startup ??? | India’s youngest app developers Shravan & Sanjay Kumaran | Youngest CEO

We ever heard their is no age for creativity and these two youngster,  16-year old Shravan Kumaran and his 15-year old brother Sanjay Kumaran, are prefect example for this.

Shravan and Sanjay Kumaran, hailing from Chennai, founded the software firm GoDimensions in 2012 – when they were just 12-year-old and 10-year-old respectively - making them the youngest CEOs of India. They have also been recognised as the youngest Mobile Application Programmers in India by Apple.

In the last four years, the brothers have developed 11 applications with over 70,000 downloads!
Their fist app is Catch Me Cop.




The duo was deeply inspired by Steve Jobs, "for innovation and never say die attitude even in tough adversity. It is this story that we like to hear multiple times from our Dad," they said in an interview with nextbigwhat.com

“We code our apps and learnt by getting a lot of books, reading them thoroughly and trying and solve all the problems in the books. That is how we learnt programming," says Sanjay Kumaran was quoted as saying by a website.

For the Kumaran's the only cost in their venture is to buy gadgets and that is where their father steps in. "We are a dad-funded company, which means we do not go to a VC to pitch our ideas, but instead approach our dad. He in turn accepts our ideas and buys the gadgets," says Shravan Kumaran. They add that their father, Kumaran Surendran, who is the Associate Vice President at Cognizant Technology Solutions, has been a huge pillar of support.


Friday, 7 April 2017

National Awards 2017 : Full winners' list | 64th National Film Awards

Here is the list of all National Awards 2017 :

Source : Google


Uttar Pradesh is selected ' Most Film Friendly State' Special mention Award to Jharkand

G Dhananjayan selected for Best writing on Films

Best book On cinema goes to Lata Surgatha- a book that narrates the story of legendary singer Lata Mangeshkar

Best Music goes to Leeches, 

Best Short fiction goes to Aba

Best Animation: Hum Chitra Banate Hain

Best Educational Film: The Waterfalls

Best Environment Film: The Tiger Who Crossed the Line 

Best Investigative Film: Placebo

Best Biographical/Historical reconstruction: Zikr Uss Parivash Ka

Best Non-Feature Film: Fireflies in the Abyss

Special Mention (Feature Film): Kadwi Hawa, Mukti Bhavan, Adil Hussain for Mukti Bhavan and Sonam Kapoor for Neerja

Best Tamil Film: Joker

Best Gujarati Film: Wrong Side Raju

Best Marathi Film: Dashakriya

Best Hindi Film: Neerja

Best Bengali Film: Bisarjan

Best Kannada Film: Reservation

Best Malayalam film: Maheshinite Pratikaram

Best Visual Effects: Shivaay

Best Female Playback Singer: Iman Chakraborty

Best Male Playback Singer: Sunder Iyer

Special Jury Mention (acting): Mohanlal (Munthiri Vallikal Thalirkkumbol)

Best Actor: Akshay Kumar for Rustom

Best Children's Film: Dhanak, Hindi

Best Supporting Actress: Zaira Wasim for Dangal

Best Film On Social Issues: Pink

Best Action Choreography: Peter Hein for Pulimurugan

Best Feature Film: Kasav, Marathi film

Best Director: Rajesh Mapuskar, for Ventilator

Special Mention Award: The Eyes of Darkness

Best Actress: Surabhi

Best Sound Recording: Kaadu Pookkunna Neram

Best Screenplay: Maheshinite Pratikaram

Best Non-feature Film: Malayalam documentary Chembai: My Discovery of a Legend

Best Child Artiste: Adish Praveen


Thursday, 6 April 2017

Youtube URL Hacks | Awesome YOUTUBE URL's

Below is the list of TOP 4  Youtube URL's for making your life easy.

1. Download MP3 songs from Youtube :

Open youtube URL like this  " https://www.youtube.com/watch?v=sm_aDtuvfX0 "
Now replace  https://www with listentoyoutube and you will to able to download mp3.

2. Save Youtube videos Offline :

add ss to URL like this ssyoutube.com/watch?v=sm_aDtuvfX0 , you can save your video.

Source : Google


3. Avoid Age Restriction on Youtube :

Add nsfw to your link like this " nsfwyoutube.com/watch?v=sm_aDtuvfX0 " .

4. Create GIF from Youtube :

Just add gif like this " gifyoutube.com/watch?v=sm_aDtuvfX0 ".

Enjoy................!!!!!!!!!!!!!!!!!!!!!!!!!!


Login to Wi-Fi without password | WiFi Hacking

Login to any WiFi network is very easy just follow below steps:


  1. Click on start.
  2. Type cmd and run as administrator.
  3. Type "netsh wlan show profiles" ( It will list all active networks)

C:\WINDOWS\system32>netsh wlan show profiles
    Profiles on interface Wi-Fi:
      Group policy profiles (read only)
        ---------------------------------
              <None>
              User profiles
                -------------
                      All User Profile     : 1
                        All User Profile     : 2
                      Source : ggogle


                        4. Select Active network.
                         5. Type "netsh wlan show profile  name key=clear" (replace name with network id).
                         6.  Finaly you will see screen with Setting , Goto Security section :

                      Security settings
                      -----------------
                          Authentication         : WPA2-Personal
                          Cipher                 : CCMP
                          Authentication         : WPA2-Personal
                          Cipher                 : Unknown
                          Security key           : Present
                          Key Content            : 123456
                        
                        7. Copy Key Content and  login to network and Enjoy !!!!!

                      If you have any issues please comment below .......!!!!!


                      Delete Online Accounts | Delete Facebook Account | Delete Skype Account | Delete Twitter Account


                      In order to Delete your account please read term and condition on website first , Login to respective websites and use below links to delete account.

                      Links to delete all your accounts :

                      1. Delete Facebook Account.
                      2. Delete Skype Account : No direct link need to login.
                      3. Delete  Twitter  Account
                      4. Delete  Yahoo Account
                      5. Delete  Hotmail/Live Account
                      6. Delete  Google Account
                      7. Delete  Pinterest Account
                      8. Delete Whatsapp Account : In WhatsApp, go to the main menu, Settings, Account, and choose the last option (Delete my account). This will remove everything. You will probably want to delete the app from your phone too.
                      9. Delete Gmail Account
                      10. Delete NetFlix Account
                      11. Delete Instagram Account
                      12. Delete  OLX  Account
                      13. Delete  Indeed  Account
                      14. Delete  Wordpress  Account
                      15. Delete TripAdvisor  Account
                      16. Delete Yelp Account
                      For more details on account deletion and policy please visit AccountKiller.




                      Every Engineer Story | इंजीनियरिंग के बाद किसी फंक्शन में नहीं जाता क्योंकि मेरे पास जॉब नहीं है

                      मैंने बहुत मेहनत की. सपनों और उम्मीद से भरे 22 साल पूरे कर लिए हैं. हमारे मां-बाप ने हमारी पढ़ाई पर लाखों खर्च किए हैं. लेकिन इसका क्या फायदा? यहां तक कि चार साल मेहनत करने के बाद भी हम अब बेरोजगार हैं. मेरे कॉलेज ने किसी कंपनी को कैंपस सलेक्शन के लिए बुलाया तक नहीं. मेरे सीनियर्स जॉब के लिए नौकरी डॉट कॉम पर अकाउंट बनाने की सलाह देते हैं. लेकिन कोई फायदा नहीं.
                      मुझे सिर्फ बीपीओ और टेक सपोर्ट्स के अपडेट मिलते हैं. बीपीओ में काम करने के लिए स्कूल की पढ़ाई काफी होती है. तब सीनियर्स मुझे खुद से जॉब ढूंढ लेने के लिए कहते हैं. मैंने वो भी किया. लेकिन आजकल की कंपनियां फ्रेशर्स को नहीं रखना चाहती हैं. वो सिर्फ अनुभवी लोगों को रखना चाहती हैं. कंपनियां फ्रेशर्स को तभी रखती हैं, जब उनके पास कोई अच्छा रेफरेंस हो. लेकिन मेरे पास कोई रेफरेंस नहीं है. यहीं पर मैं हार गया.
                      कुछ लोगों ने मुझे सलाह दी कि कुछ कंपनियों तक पहुंच बनाओ. वहां के वॉचमैन को अपनी सी.वी. दे दो. मैंने ये भी किया. लेकिन वॉचमैन ने मुझसे कहा कि हमारी कंपनी में सिर्फ आईटीआई और डिप्लोमा के लिए वैकेंसी है. इंजीनियरों के लिए नहीं. मैं फिर से हार गया.
                      Source : TheLALLANTOP

                      कुछ लोग मुझे सलाह देते हैं कि कंसल्टेंसी ज्वॉइन कर लो. मैंने ये भी किया. मुझे इसमें ही उम्मीद की किरण दिखी. उन्होंने मेरे लिए इंटरव्यू अरेंज कराया. जब मैं गया तो एचआर का पहला सवाल था कि सुबह से शाम तक तुम क्या करते हो? मैंने कहा जॉब ढूंढता हूं. वो मुझे पर हंसा और सलाह दी कि कोई कोर्स ज्वॉइन कर लो. ठीक है. मैंने ये भी किया.

                      Read Complete story here : thelallantop.com


                      Tuesday, 4 April 2017

                      MCQ on Computer Security

                      1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
                      A) Confidentiality
                      B) Integrity
                      C) Availability
                      D) Authenticity

                      2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
                      A) Confidentiality
                      B) Integrity
                      C) Availability
                      D) Authenticity


                      3. The type of threats on the security of a computer system or network are ……………………..
                      i) Interruption                   ii) Interception                  iii) Modification
                      iv) Creation                         v) Fabrication
                      A) i, ii, iii and iv only
                      B) ii, iii, iv and v only
                      C) i, ii, iii and v only
                      D) All i, ii, iii, iv and v



                      4. Which of the following is independent malicious program that need not any host program?
                      A) Trap doors
                      B) Trojan horse
                      C) Virus
                      D) Worm

                      5. The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events.
                      A) Trap doors
                      B) Trojan horse
                      C) Logic Bomb
                      D) Virus

                      6. The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met.
                      A) Trap doors
                      B) Trojan horse
                      C) Logic Bomb
                      D) Virus

                      7. Which of the following malicious program do not replicate automatically?
                      A) Trojan Horse
                      B) Virus
                      C) Worm
                      D) Zombie

                      8. …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.
                      A) Zombie
                      B) Worm
                      C) Trojan Horses
                      D) Logic Bomb

                      9. State whether true of false.
                      i) A worm mails a copy of itself to other systems.
                      ii) A worm executes a copy of itself on another system.
                      A) True, False
                      B) False, True
                      C) True, True
                      D) False, False

                      10. A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
                      A) Worm
                      B) Virus
                      C) Zombie
                      D) Trap doors

                      11. …………….. are used in denial of service attacks, typically against targeted web sites.
                      A) Worm
                      B) Zombie
                      C) Virus
                      D) Trojan horse

                      12. Select the correct order for the different phases of virus execution.
                      i) Propagation phase                      ii) Dormant phase
                      iii) Execution phase                         iv) Triggering phase
                      A) i, ii, iii, and iv
                      B) i, iii, ii and iv
                      C) ii, i, iv an iii
                      D) ii, iii, iv and i


                      13. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
                      A) Stealth virus
                      B) Polymorphic Virus
                      C) Parasitic Virus
                      D) Macro Virus



                      14. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.
                      A) Stealth virus
                      B) Polymorphic Virus
                      C) Parasitic Virus
                      D) Macro Virus

                      15. A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
                      A) Boot Sector Virus
                      B) Polymorphic Virus
                      C) Parasitic Virus
                      D) Macro Virus

                      16. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.
                      A) mutual engine
                      B) mutation engine    
                      C) multiple engine
                      D) polymorphic engine

                      17. State whether the following statement is true.
                      i) A macro virus is platform independent.
                      ii) Macro viruses infect documents, not executable portions of code.
                      A) i-only
                      B) ii-only
                      C) Both i and ii
                      D) Non i and ii

                      18. The type(s) of auto executing macros, in Microsoft word is/are
                      A) Auto execute
                      B) Auto macro
                      C) Command macro
                      D) All of the above

                      19. In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk.
                      A) Dormant phase
                      B) Propagation phase
                      C) Triggering phase
                      D) Execution phase

                      20. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks.
                      A) Worm
                      B) Zombie
                      C) Virus
                      D) Trap doors

                      Monday, 3 April 2017

                      What is SAR value? Does it matter ????? | Specific absorption rate

                      SAR stands for Specific Absorption Rate which is the unit of measurement for the amount of RF energy absorbed by the body when using a mobile phone. Although the SAR is determined at the highest certified power level in laboratory conditions, the actual SAR level of the phone while operating can be well below this value. This is because the phone is designed to use the minimum power required to reach the network. Therefore, the closer you are to a base station, the more likely it is that the actual SAR level will be lower.

                      Sar value standard in India is 1.6 watts.

                      Source : Google images


                      In short term we can say lower the SAR value the better is. Sar radiation basically comes in contact with human body when we talk over the cell phone. We should avoid talking over the phone without using Headphones or Bluetooth.

                      You can check your cellphone SAR value using link below :

                      http://sarvalues.com/what-is-sar-and-what-is-all-the-fuss-about/

                      Read more :

                      https://www.quora.com/How-dangerous-is-a-high-SAR-value-in-mobile-phones

                      https://en.wikipedia.org/wiki/Specific_absorption_rate