Friday, November 21, 2014

ENG-301 Business Communication Assignment 1 solution Fall 2014





ENG-301 Business Communication Assignment 1 solution Fall 2014



1- What type of communication barrier is involved in it?


Javaria’s grandmother is hospitalized in England during her visit to her elder son’s place. She is a lady of conventional wisdom and lived her entire life in a village in Pakistan. After her checkup doctor showed her thumbs up sign and she started crying thinking her disease a fatal one.

Physical barrier
Semantic barrier
Personal barrier
Emotional barrier




2- What type of communication barrier is involved in it?

The new CEO of a soft drinks company speaks to his area managers. He is a very well qualified young man who has recently taken hold of his father’s business. He speaks in a firm and authoritative tone with the precision that his stay at a foreign university has made him learn. All area managers were very senior and thought he’s insulting them.

Personal barrier
Physical
Barriers involving Values and attitudes
None of the above


3- Choose the best suitable option.



Fear and mistrust form the root of _________.


Physical barrier
Semantic barrier
Emotional barrier
Barriers involving Values and attitudes

4- What type of quality is lacking in the message below.


Speaking to lower income business community, the minister of finance said: The problem of heavy taxes on business is ubiquitous, but different funds have been generated and we are trying our best to assuage your concerns to proceed further. We’ll make sure that the misappropriation of funds is managed at all costs.”


Courtesy
Completeness
Clarity
Consideration




5- Choose the best suitable option.


Redundant expressions should be ________ in/from to make a business message effective.

Italicized
Added
Omitted
Highlighted


Q2. Fill in the blanks with the suitable words keeping in view the area of “Business Communication.” (5 Marks)



______ are objects used to convey nonverbal messages about self-concept, image, mood, feeling or style.
________ include vocal qualities.
Proximity means ________ in terms of physical space.
Context is a ______ field that includes internal and external stimuli.
_________ barrier causes confusion in understanding the intent of a speaker when symbols used have different meaning in receiver’s mind.


ENG-301 Business Communication Assignment 1 solution and Discussion Fall 2014

Check Online CS201 Assignment No.1 Solution and Discussion Fall 2014






Check Online CS201 Assignment No.1 Solution and Discussion Fall 2014



Assignment Description



In this assignment, you are provided with a small and simple game like program attached with this assignment named as “GuessGame.cpp”. Your job is to slightly modify this code as desired in this assignment.

First, you need to understand the working of the given code and execute it in Dev-C++. This program essentially generates a random number in range [1-10] and asks the user to guess that number. Appropriate messages are displayed after user input to give game like feelings. Important part in this code is the following two lines.

srand(time(NULL));

secretNumber = rand()%10+1;







This is also called pseudo random because the same sequence of random numbers can be re-generated if we use the same seed value. In this code, we have used srand() function with parameter time(NULL) to set the seed value as system current time so that we can have a different random number in each execution. In the second line, rand() function simply generates a pseudo random number in range [0 to RAND_MAX] which is divided by 10 to get the remainder (using % operator) in range [0-9], then we simply add 1 to it to get out secrete number in range [1-10].



Your Task

Your task is to slightly modify this code in order to produce desired working as shown in “Modified_GuessGame.exe”. This is simply taking two inputs from the user as lower and upper ranges. Next, the program shall generate random number in the range specified by the user. Rest of the working remains the same.

Hint: You have to use your mathematical skills in order to shift the range of random number from [1-10] to the one specified by user input [lower - upper].

Screenshot of the desired output:

Submission

You are required to submit your solution through LMS in zip format containing two files.

Your C++ program i.e. .cpp file.
An MS Word document containing screenshot of your program output/execution. You shall type your own VU_ID and that must be visible in the screenshot.

   Check Online CS201 Assignment No.1 Solution and Discussion Fall 2014

Monday, November 3, 2014

Prize Bond Draw Result 25000 Rs Dated 5th November 2014



Prize Bond Draw Result 25000 Rs Dated 5th November 2014


Prize bond 7500 draw results were scheduled on 1st November 2014 but due to Muharram Ul Haram Vacations bond list of Rs.7500 will be showed on 5th of November 2014.


Friday, October 31, 2014

9th and 10th Muharram All Pakistan Cites Procession routes 2014-15




9th and 10th Muharram All Pakistan Cites Procession routes 2014-15


The main procession of 9th Muharram will be taken out from Nisar Havaily and after passing through its traditional route will culminate at the Karbala Game Shah before Maghrib prayers. - Rangers and police have been deployed outside Mosques and Imam Bargahs and other sensitive areas and the route of main procession has been sealed. -



9th and 10th Muharram Lahore Procession routes Map November 2014

Dawn Newspaper Sunday Jobs Ads 2nd November 2014 online


Dawn Newspaper Sunday Jobs Ads 2nd November 2014 online



Dawn Newspaper Sunday Jobs Ads 2nd November 2014 online Dawn Newspaper Sunday Job advertisement 2nd November  2014 online new jobs in govt 2nd November 2014 
Sub Station Operators, Laboratory Assistant and others required at National Transmission & Despatch Company Limited



Dawn Newspaper Sunday Jobs Ads 2nd November 2014 online

Prize Bond Draw Result 25000 Rs Dated 3rd November 2014



 Prize Bond Draw Result 25000 Rs Dated 3rd November 2014


Draw Prize Bond 25000 Rs live update Complete List 3rd November 2014 on Monday.Prize Bond 25000 Rs live update Complete List 3rd November 2014 Held at Hyderabad.online live check Prize Bond Draw result list 25000rs held at Hyderabad 03-11-2014



Thursday, October 30, 2014

Authentication Technique with OTP cs619 vu final project




Authentication Technique with OTP cs619 vu final project





Authentication Technique with OTP



One time password (OTP) is just what the name gives you an idea about a password that is only applicable for one login. The advantage of OTPs is that it proposes much higher security than static password also called conventional way of authentication. OTPs is protected against password sniffing attacks, if an hacker use software to collect your data traffic, video  records when you type on your keyboard, or use social engineering, it doesn’t matter since the password that the attacker gets hold on will not be valid to use. An OTP can be generated using different methods and is often used in combination with a device that is synchronized with an authentication server.



Time-Based OTPs In the time-based method, a device with an internal clock generates passwords that are depending on the current time. For example, every minute a new password is generated in the device, and the same password is generated at the authentication server. When the user wants to login to a service or system, the current OTP that is displayed on the device is used.



The user’s mobile phone will work as the authentication device, in which the user have to enter a 4-digit PIN code to generate an OTP that can be used for login. This is done by any mobile supported application running on the phone.

The OTP that is generated on the mobile phone is based on three components which will be hashed together with MD5 or any well known encryption algorithm.



Functional Requirements:

1. 4-digit PIN code that the user enters.



2. A secret random number that was created during device-initialization (Init-secret) that only exists on the user’s mobile device.



3. The OTP algorithm simultaneously executes the code at mobile as well as Server and generates one time password that will be valid defined session /time stamp.



4. Make log file (Data base) manage all record of specific user id.



5. After the login application operates any other operation.



Application Type:



It will be a native mobile application; you can use any modern mobile OS platform (e.g. Android, Apple, Windows Mobile etc) for mobile application and PHP/Dot net frame for server side languages.



The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity.



http://www.miraclesalad.com/webtools/md5.php

http://en.wikipedia.org/wiki/MD5







Figure 1. One MD5 operation. MD5 consists of 64 of these operations, grouped in four rounds of 16 operations. F is a nonlinear function; one function is used in each round. Mi denotes a 32-bit block of the message input, and Ki denotes a 32-bit constant, different for each operation. s denotes a left bit rotation by s places; s varies for each operation.  denotes addition modulo 232.



MD5 processes a variable-length message into a fixed-length output of 128 bits. The input message is broken up into chunks of 512-bit blocks (sixteen 32-bit words); the message is padded so that its length is divisible by 512. The padding works as follows: first a single bit, 1, is appended to the end of the message. This is followed by as many zeros as are required to bring the length of the message up to 64 bits fewer than a multiple of 512. The remaining bits are filled up with 64 bits representing the length of the original message, modulo 264.



The main MD5 algorithm operates on a 128-bit state, divided into four 32-bit words, denoted A, B, C, and D. These are initialized to certain fixed constants. The main algorithm then uses each 512-bit message block in turn to modify the state. The processing of a message block consists of four similar stages, termed rounds; each round is composed of 16 similar operations based on a non-linear function F, modular addition, and left rotation. Figure 1 illustrates one operation within a round. There are four possible functions F; a different one is used in each round:

denote the XOR, AND, OR and NOT operations respectively.
Scratch the card and insert 14 digit number for card loading is normal and regular activity for mobile users. In this project user will just take picture for mobile card and it will be automatically recharged.



This MD5 hash generator is useful for encoding passwords, credit cards numbers and other sensitive date into MySQL, Postgress or other databases. PHP programmers, ASP programmers and anyone developing on MySQL, SQL, Postgress or similar should find this online tool an especially handy resource.



What is an MD5 hash?

An MD5 hash is created by taking a string of an any length and encoding it into a 128-bit fingerprint. Encoding the same string using the MD5 algorithm will always result in the same 128-bit hash output. MD5 hashes are commonly used with smaller strings when storing passwords, credit card numbers or other sensitive data in databases such as the popular MySQL. This tool provides a quick and easy way to encode an MD5 hash from a simple string of up to 256 characters in length.



MD5 hashes are also used to ensure the data integrity of files. Because the MD5 hash algorithm always produces the same output for the same given input, users can compare a hash of the source file with a newly created hash of the destination file to check that it is intact and unmodified.



An MD5 hash is NOT encryption. It is simply a fingerprint of the given input. However, it is a one-way transaction and as such it is almost impossible to reverse engineer an MD5 hash to retrieve the original string.



Time-Based OTPs In the time-based method, a device with an internal clock generates passwords that are depending on the current time. For example, every minute a new password is generated in the device, and the same password is generated at the authentication server. When the user wants to login to a service or system, the current OTP that is displayed on the device is used.

Project: Authentication Technique with OTP cs619 vu final project For Sale please contact 03009520262

Wednesday, October 29, 2014

VU MS(CS) Fall 2014 Course Selection




All MS(CS) students are required to select courses for Fall 2014 semester from the following list of offered courses and email their selected courses till November 05, 2014. Students may add/drop course(s) on or before November 12, 2014.

Fall 2014 Semester Courses
Course Code
Course Title
Pre-requisite
Credit Hours
Specialization
CS701
Theory of Computation
CS402
MTH202
3
Core
CS702
Advanced Algorithms Analysis and Design
CS301
CS502
3
Core
CS710
Mobile and Pervasive Computing
CS610
3
Computer Networks
CS718
Wireless Networks
CS610
3
Computer Networks
CS723
Probability and Stochastic Process
MTH101
STA301
3
Computer Networks
CS706
Software Quality Assurance
CS504
3
Software Engineering
CS709
Formal Methods for Software Engineering
CS504
MTH202
3
Software Engineering
CS712
Distributed DBMS
CS403
CS610
3
Databases
CS713
Object Oriented DBMS
CS403
CS304
3
Databases
CS720
Thesis

6
Optional

General Rules 
  1. In order to fulfill MS(CS) degree requirements, a student is required to pass all the four core/requisite courses, at least three courses from his/her selected area of specialization, and
    1. With-thesis option: complete his/her research thesis (six credit hours) and possibly one course from any specialization area.
    2. Course-work-only option: remaining courses from any specialization area(s).
2.      A student can enroll in an MS level course only if he/she has passed all pre-requisites for that particular course.
1.      The credit hour limits are as below:
                                i.            For each of the first three semesters, maximum three MS level courses (nine credit hours) are allowed.
                              ii.            For the fourth and any subsequent semester(s), maximum four MS level courses (12 credit hours) are allowed.
                            iii.            There is no limit on the maximum pre-requisite courses in a semester.
4.      A student may attempt to improve a 'C' or 'D' grade in a course at most once.
5.      A student is eligible for the merit list of thesis if he/she has completed seven MS level courses (21 credit hours) with CGPA ≥ 2.75.

Commencement of Classes
Please note that MS(CS) Fall 2014 semester will start from November 05, 2014.


Draw Result of Prize Bond 7500 Rs Dated 3rd November 2014





Draw Result of Prize Bond 7500 Rs Dated 3rd November 2014


Draw Prize Bond 7500 Rs live update Complete List 3rd November 2014 on Monday.
Prize bond List Rs 7500 Dated 3rd November 2014 Rawalpindi 

Read More and Download Result Updates 


Check Prize Bond Rawalpindi list of 7500rs on Monday 3rd November 2014

Pu Revised First and Second Year, M.Sc. I.T, Annual Examination, 2014







Pu Revised First and Second Year, M.Sc. I.T, Annual Examination, 2014

In continuation of notification No. 408/Cond.D.S dated 17-10-2014, it is hereby notified that the Admission Forms and Fee for First and Second Year, M.Sc. I.T, Annual Examination, 2014 will be received according to the following revised programme:-
With Single Fee: 29-10-2014
With Double Fee: 31-10-2014
Commencement date of Examination will be announced later.