66 Desktop tricks

Author: zerlina // Category: , ,

                                      

                    

1.Restoring A Lost Desktop

If you ever lose the Desktop but Explorer is still running with the Start Button, 

you can do this to bring back your Desktop in a Windows box.

Click Start
Click Run
Type a period " . " 
Then press Enter

2.Creating A New E-Mail Shortcut

To create a shortcut that will open your default e-mail program starting a new e-mail,

Right click on an open area of the desktop 
Select New / Shortcut 
For the Command Line, enter mailto: 
For the title enter something like New E-Mail 
When you click on this your default e-mail program should start with a new e-mail form.

3.Creating 3D Window Effect

You can create a nice 3D effect for your windows

Start Regedit 
Go to HKEY_CURRENT_USER \ Control Panel \ Colors 
Make sure the following setting are there:
ButtonHilight=128 128 128 
ButtonShadow=255 255 255

4.Creating Shutdown, Restart And Logoff Icons

To create the icons, create a shortcut on the desktop.

For Shutdown, the command is C:\WINDOWS\RUNDLL.EXE user.exe,exitwindows
For Restart, the command is C:\WINDOWS\RUNDLL.EXE user.exe,exitwindowsexec
For Logoff, the command is C:\WINDOWS\RUNDLL.EXE shell32.dll,SHExitWindowsEx 0


5.Having Your Favorites And Start Menus Sort Alphabetically

If your Start Menu Program or Favorites are not sorting alphabetically, it is easy to fix this:

Start Regedit 
Go to HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Explorer/MenuOrder 
Under here is are Favorites and Start Menu folders 
In each there is a value called Order 
Simply delete (or rename this) and restart Winodws 
Your Favorites or Start Menus should now sort alphabetically

6.Increasing The Icon Cache

Run Regedit 
Go to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer 
Create a new string called Max Cached Icons 
Give it a value of 10000 
This will increase response time in windows and give the Shellicon cache file more elbow room.

7.Make Icons 256 Color 16-Bit

Open the Registry 
Hit Ctrl+F 
Type Shell Icon BPP 
When found, right click the Shell Icon BPP icon 
Click Modify 
Change the value from 4 to 16 
Click Ok 
Close the registry 
Restart your computer

8.Removing Shortcut Arrows

An easy way to remove those irritating arrows from your desktop shortcut icons and not change their properties

Right click the Desktop / Properties / Appearance tab 
Select Item 
Scroll for Icon 
The default size is 32 
Change this to 30 
Clicking Apply

9.Adding The Control Panel To The Start Menu 

Open up the Explorer 
Go to \WINDOWS\Start Menu 
Right click in the right-hand panel 
Add a new folder 
Name it Control Panel.{21ec2020-3aea-1069-a2dd-08002b30309d} 
This makes getting to the Control Panel items a little easier


10.Making Desktop Changes Permanent

To make changes to the Desktop like window size, positon after rebooting:

Start Regedit 
Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 
Create a New Binary Value 
Name it NoSaveSettings 
Give it a value of 01 00 00 00


11.Easy Shortcuts On The Desktop

Here is an easy way to put shortcuts on the Desktop where they can easily be moved to other group icons.

Using the Explorer, create a SHORTCUT to the \Windows\Desktop directory in your \Windows\SEND TO directory. 
Now whenever you want to make a shortcut and move it to the desktop: 
Just make the shortcut you want using Explorer 
Right click on that shortcut 
In the pop up menu select the Send To and Desktop shortcut.
Submitted by Jerry Airaudi



12.Changing A Folder's Icon

To change the icon of a Folder on desktop:

Using the Explorer, move the folder from the Desktop directory to another directory on the hard drive
Right click on the new folder and select "Create Shortcut" 
Move the shortcut to the Desktop 
Right click and select a new icon
Submitted by Kim Schmidt



13.Full Window Drag (Without Plus!)

Start Regedit 
Open HKEY_CURRENT_USER /ControlPanel /Desktop /DragFullWindows 
On "DragFullWindows" properties change 0 to 1



14.Fixing Corrupted Desktop Icons

Easier way to reset icons then deleting SHELLICONCACHE.

There's no need to exit Win95 and delete the SHELLICONCACHE file in order to reset icons that you may have changed (like Network Neighborhood).

Go to Control Panel, Display, Appearance Tab. 
Select Icon from the Item drop down list. 
Change the Size up or down one and apply. 
Change the Size back to your original and apply.

If your Start Menu is slow or your icons are black for some reason, it means your Shelliconcache file is corrupt and should be deleted.
Delete the hidden file C:\WINDOWS\SHELLICONCACHE
It will be recreated the next time you start Win95



15.Getting Screen Shots

If you need to get a screen shot, and you do not have a screen capture program, try this:

Hit the Print Screen key. This copies a bitmap of the full screen into the Windows clipboard. Start up a graphics editor and paste it in. 
Alt + Print Screen will capture only the active window. 


16.Increasing The Size Of The Scroll Bar

How to adjust the width of the scroll bar:

Select Properties 
Select the Appearance tab 
Go to the item list and find scrollbar. 
Increasing the value in the Size field will increase the scrollbar width.


17.Unable To Create Shortcuts On The Desktop

If you can't create shortcuts on your Desktop, you might have a corrupted registry.

Start Regedit 
Go to HKEY_CLASSES_ROOT\.lnk\ShellNew\Command 
Make sure it has a value of: 
RunDLL32 AppWiz.Cpl,NewLinkHere %1 if you don't have IE 4 
or RunDLL32 AppWiz.Cpl,NewLinkHere %2 if you have IE 4.0 or IE 4.01


18.Removing The Inbox From The Desktop

A faster way to remove "Inbox" from the Deskop is to

Right mouse click on "Inbox" 
Select delete 
It will then tell you "you cannot store the inbox in the recycle bin. . .etc" 
Click "Yes" 
Wait 2 secs and it's gone.

19.Customizing Individual Folder Icons

To change a folder's icon:

Open Notepad and enter two lines, 
[.ShellClassInfo]
IconFile=file name,number
(e.g. IconFile=C:\Icon\CustomFolder.ico,0) 

Save the file as DESKTOP.INI in the folder you wish to change. 
Click Start -> Run, type in the command line,
ATTRIB +S "folder name"
(e.g. ATTRIB +S "C:\Custom Folder") 
Open Explorer or My Computer and refresh (press F5 key).
This tip only work Windows 95/NT 4.0 + IE 4.0 with shell integration, or Windows 98/NT 5.0.


20.Removing The Recycle Bin

To remove Recycle Bin from the desktop:

Run REGEDIT. 
Find NAMESPACE key in left pane (HKEY_Local_Macine \ Software \ Microsoft \ Windows \ Current Version \ Explorer \ Desktop \ Namespace) 
Expand NAMESPACE (click '+' box) 
Delete the value RECYCLE BIN in right pane


21.Adding Send To The Recycle Bin

Add a SHORTCUT TO THE RECYCLE BIN in your SEND TO folder.

That way you can just right click on a file you want to delete, and send it to the recycle bin without having to confirm each time.


22.Having Icons With No Name

Normally you have to have a name for an icon, just spaces are not allowed.
To create an icon with no name attached:

Make sure NumLock is on 
Highlight the Icon you want to change 
Right-Mouse click and select Rename 
While holding down the Alt key, type 0160 
Now the icon will have no name below it.
To Create Multiple Icons with No Name - From John R.

Follow directions detailed above 
With the second icon simply add one space-bar character AFTER the 0160 number. 
Each successive icon gets an additional space-bar character at the end (to prevent a duplicate naming error).


23.Moving The Start Button

How to move or close the start button!

Click on the Start button 
Press the Esc key 
Press the Alt and the - keys together 
This will give you a menu, you can move or close 
But if you move it you need to use the arrow keys and not the mouse.


24.Aligning Drop-Down Menus To The Right

All dropdown menus can be aligned to the right.
This features becomes useful when trying to access
menus with submenus that appear directly to the right.


Open the Registory editor (e.g. regedit.exe) 
Goto \\HKEY_CURRENT_USER\Control Panel\Desktop 
Create a string entry called "MenuDropAlignment" 
Set its value to 1 
Reboot
Note: Will not work under NT 4.0.


25.Repositioning A Background Bitmap

Normally, you only options for displaying a background bitmap are tiled, centered, or stretch to fit (with the Plus Pack).
You can edit the registry and have a third option which is to place the bitmap anywhere on your screen by specifying the X and Y coordinates.

Start Regedit 
Go to HKEY_CURRENT_USER / Control Panel / Desktop 
Create new Strings called WallpaperOriginX and WallpaperOriginY 
Give them values to position them around your desktop 
The bitmap must be smaller than your desktop size

26.Changing Drive Icons

To change a drive's icon when you open My Computer

Create a file called AUTORUN.INF on the root of your hard drive 
Enter the lines
[autorun]
ICON=Name of the ICON file

For the name of the icon file you can either specify the path and name (e.g. ICON=C:\WINDOWS\ICONS\MY_ICON.ICO) or
a specific icon in a library (e.g. ICON=ICONFILE.DLL,2)


27.Adding Anyfolder And Mail To Sendto

Previous examples of adding items to the SendTo usually require editing the Registry.
An easy way around this is to use the following methods.

To Add Anyfolder:
Open the Explorer 
Go to \Windows\SendTo 
Right click in the right hand panel 
Select New / Text Document 
Name it anything with a .otherfolder extension
When you want to send files to another folder:

Select The Files With Explorer 
Right Click 
Select Send to and the name you just created 
You them have the option of copying or moving the file to a folder of your choice
To add Mail:

Open The Explorer 
Go to \Windows\SendTo 
Right click in the right hand panel 
Select New / Text Document 
Name it anything with a .MapiMail extension (ignore any warnings about the file extension)
When you want to Mail files as attachments:

Select The Files With Explorer 
Right Click 
Select Send to and the Mail name you just created 
This allows you to easily mail multiple files


28.Adding Shortcuts To Desktop Without "Shortcut To" Text

Start Regedit 
Go to:HKEY_USERS \ .Default \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer 
Add binary value to Explorer:link="00,00,00,00" 
Now You can make Shortcuts to desktop without Shortcut To" text.

29.Easier User Interface

Add a menu item named "Open THIS folder!" to each of your cascading menus off of the Start menu.
This makes it easier to put items wherever you want them!

Go to Windows \ Start Menu \ Programs \ (etc.) in the Explorer 
Start right click/dragging folders to the desktop, one by one. 
Rename them and left click/drag them back to the same folder.
It takes a little while, but when you are finished you have a much easier interface to work with.

30.Removing The Start Button 

Click on the start menu button twice, so there is a dashed line around the button 
Press Alt and the minus sign 
Choose Close to make the start button disappear, or move to move it to the right!
Submitted by Justin Nachod

Note: - You have to re-boot to get it back again, or:

Press Ctrl-Alt-Delete
Highlight Explorer
Click on the End Task button
Select No to doing a full shutdown
Wait a few seconds and the click on the End Task button

31.Changing The Clock To 24-Hour Time

To change the display of the clock on the taskbar to 24-hour format: 
Open the Control Panel 
Double-click on the Regional Settings icon 
Click on the Time tab 
In the Time style section select H:mm:ss


32.Removing The Inbox And Recycle Bin Icons From The Desktop

To remove the InBox from your desktop, without needing to run the Policy Editor:

Start Regedit 
Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ explorer \ Desktop \ NameSpace 
Below that should be a few keys 
Rename the key {00020D75-0000-0000-C000-000000000046}. I usually put another character before or after the curly braces. 
Restart Windows and the InBox icon should be gone 
You can do the same for any other items you don't to show such as the Recycle Bin or The Internet icons

33.Changing Or Removing The Start Menu Icons

Download Microangelo and install it. 
Create a blank.ico file. 
Put it in a directory (C:\Windows. Then double click on the Microangelo Engineer to run it. 
When you get it up on the screen click on the "start" tab. You will see a list of all the icons in the start menu. 
Highlight the first one (programs) and select "Change". It will bring up a dialog box - select "browse". 
Go to the directory that contains the blank icon and select it. Hit OK until you get back to the main 
Engineer window and do all the rest exactly the same way. 
When you have finished changing them all to the blank icon, Hit "Apply". 
Hit your start button and look to see if all the icons are invisible. (They should be.) 
Close out Micro Engineer and you're finished.

34.Adding Drive To The Sendto List

I have recently found that if you want to send something from A: drive or from any where to any drive, you can just make a short cut of that drive in subdirectory SENDTO. 
For example I have two hard drives, a Floppy Drive, and a CDROM 
After I have make a copy of each of my drive I will be able to send a whole directory of E:\XXX from the CDROM drive to A: drive or any other drive that i have had made the short c t in the SENDTO subdir of WINDOWS.

35.Adding A Protected Briefcase

You can make your briefcase a shortcut on the on desktop so if you have multiple users on your PC and you don't want to have a password for your briefcase, you can at least protect it from inadvertent deletion by just making the briefcase a hidden file or in a different location other than \Windows\Desktop\My Briefcase, then send a copy or shortcut to the desktop.

36.Customizing The Start Button's Name And Icon

To change the name of the Start button:

Copy EXPLORER.EXE in your Windows directory to another directory 
Start a hex editor (I've been using Diskedit from Norton) 
Edit EXPLORER.EXE 
Search for the string 53 00 74 00 61 00 72 00 74 
This is the word Start with the letters separated by a null character 
The section you are in should also have the words "There was an internal error..." also separated with the null character immediately following 
Now just replace the Start letters with any of your choice (up to 5 characters only) 
Exit Windows 
Boot to DOS 
Copy your new Explorer file over the original
To change the Start button icon:

Copy USER.EXE in your \WINDOWS\SYSTEM directory to another directory 
Use an icon editor that can replace icons in executable files 
Edit USER.EXE and replace the flag icons with the icon of your choice 
Boot to DOS 
Copy the new USER.EXE
The same can be done with NT 4.0, just the offset will be different but the location to just before "There was an internal error..." is the same.

37.Adding The Device Manager To Your Desktop

This allows you to quickly see all the devices attached to your computer.
I use it a lot to select Refresh when I add new external SC SI devices that were not
powered up at startup. This way you do not need to restart the computer. To add the Device Manager Icon:

Right click on an open area of your desktop 
Select New / Shortcut 
Type in C:\WINDOWS\CONTROL SYSDM.CPL, SYSTEM, 1 
Replace C:\WINDOWS with whatever directory you installed Windows95 
Click on the Next box 
At the next dialog box type in Device Manager 
Click on the Finish when you are done
Note: Replacing the 1 with a 3 will bring up the Performance Status


38.Adding Options To The Right-Click Of The Start Menu

To add an option to the Right-Click of the Start button:

Go to Control Panel, View, Options 
Click on the File Types Tab 
Scroll down until you see File Folder 
Click on Edit 
Click on New 
Type in the Name you want to in the Action box 
Type in the Application you want to use
A good option to add is an MS-DOS Prompt:

Try this c:\command.com /k cd %1
It also puts the shortcut on a regular folder.
This command will open a DOS window with that folder as the current directory.

39.How To Make The Task Bar Autohide

Click the right button on a blank area of the task bar 
Select Properties 
Select Autohide 
Click OK
This will make the task bar slide off the screen when the cursor moves away from it,
and it will slide back on when the cursor is moved near it again.

The same can be done for the MS Office task bar. The "sliding" effect is nice, and can free up some desktop space.


40.More Removing Shortcut Arrows

'lnkfile', 'piffle' and 'internetshortcut' are the three places
that I have seen the isshortcut arrow.
The best way to deal with this is to rename the 'isshortcut' to
'isshortcutbak' by right clicking on the 'isshortcut' then
select rename and add 'bak' to the end.

41.Closing Nested Folders

If you have several nested folders (folders within folders) and want to close them all,
simply, hold the Shift key while closing the last folder
This will close all previous ones as well.


42.Changing Application Icons

To have a wider choice of application icons:

Right click on the icon shortcut 
Chose Properties 
Click on the Program tab 
Chose Change icon 
Click on Browse 
Select Files of type All Files 
Browse to the directory where your icon files are kept 
You can even use some bitmap files for you icons


43.Moving and Resizing the Taskbar

You can move the taskbar by pointing on a corner panel and dragging it
It is easier to move if you close all your windows first

You can also resize it by moving the mouse to the edge and dragging it larger or smaller.


44.Correcting Corrupted Fonts

If you have a problem with your non-true type fonts, here's what you do:

Open the Control Panel 
Double click on Fonts 
Search for the "Monotype Sorts" font 
Delete this Font

45.Changing Desktop Folders - With No Registry Changes

>From the Explorer, create a folder somewhere OTHER than the desktop, and call it something like "Desktop Folders." 
Move all your desktop folders into that folder. 
Create shortcuts to all of those folders on your desktop. 
Now, you are free to change the icons of each shortcut individually, to anything you like!


45.Updating The Desktop

If you want to update the desktop, for example after you've been changing the registry.

Right-Click anywhere on the desktop 
Press F5


46.Adding The Desktop To Your Start Menu

Create a shortcut to the Explorer on your Desktop

Right click on the Start button 
Choose Open 
Go into the Programs Folder 
Drag the Windows Explorer Icon on your Desktop using the RIGHT Mouse button 
Choose copy here
Change the command line switch

Right click on the Shortcut you created 
Choose Properties 
Choose Shortcut 
Type in following command line as target: 
C:\WINDOWS\EXPLORER.EXE /n, /root, 
The last "," is vital! 
If you want the two pane Explorer view ad the switch ,/e 
Then rename the Shortcut to "Desktop" or whatever you choose and drag the icon onto the start button.


47.Removing Shortcut Arrows

One problem when removing shortcut arrows is that
if you delete a desktop item, it will remove it.
If it is a shortcut it will just remove the icon.
If it is not a shortcut, then it will remove the program.
Having the little icon arrow is one way to tell the difference


48.Getting Rid Of Click Here To Continue

Start the Registry Editor 
Open HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer 
Create a binary value and call it NoStartBanner 
Double-click on it and give it a value of 01 00 00 00 
You will need to repeat the same steps for HKEY_USERS / .Default / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer


49.Changing The Desktop And Explorer Folder Icons

The following steps will change the icon that is displayed as the default Folder icon.

Start the Registry Editor. 
Search for "Shell Icons". 
This will bring you to HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / explorer / Shell Icons. 
Double-click on the one has the value name of "3" in the right pane. 
Type in the new icon you want to use. 
If you have a DLL file specified, you need to count for the location of the particular icon you want to use, starting at 0. 
To reset the icon cache, use a program such as Tweak with comes with the PowerToys from Microsoft.
Note: I haven't experimented with too many of the other icon changes possible.

50.Adding Control Panel Icons To The Desktop

This is an easy one..

Simply open up the Control Panel. 
Right Click and Drag the icon you want to your desktop or folder. 
This will create a shortcut for that icon. 
It could come in handy if there are always certain items you need to get to quickly.


51.Create A Control Panel Menu Directly Below The Start Button

Click the Start Button once with your right mouse button. You should see a right-button menu (called a context menu because it offers different choices in different contexts). 
You should see the items Open, Explore, and Find on the context menu. Click Explore with your left mouse button. 
An Explorer file management window should open. A directory tree should appear in the left pane, with the right pane displaying the contents of the Start Menu folder. 
Right-click any empty space within the right pane. A context menu should appear. Click New and then Folder. 
The Explorer will create a highlighted icon called New Folder. Type in the following string, all on one line, replacing the words New Folder with this new line. You must type the period, the curly braces, all four hyphens, and the hexadecimal numbers exactly as shown. After the closing curly brace, press Enter. 
Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Other Folders can be added following the same instructions.

Dial-Up Networking.{992CFFA0-F557-101A-88EC-00DD010CCC48} 
Printers.{2227A280-3AEA-1069-A2DE-08002B30309D} 
Inbox.{208D2C60-3AEA-1069-A2D7-08002B30309D} 
My Computer.{20D04FE0-3AEA-1069-A2D8-08002B30309D} 
Recycle Bin.{645FF040-5081-101B-9F08-00AA002F954E} 
Network Neighborhood.{208D2C60-3AEA-1069-A2D7-08002B30309D} 
Desktop.{00021400-0000-0000-C000-000000000046} 
Briefcase.{85BBD920-42A0-1069-A2E4-08002B30309D} 
Fonts.{BD84B380-8CA2-1069-AB1D-08000948F534}


52.Minimizing All Windows

To minimize all windows:

Press Ctrl-E SC E SC to bring up the Task Bar 
Right Mouse Click on an open area of the Task Bar 
Select Minimize all Windows
This makes it a lot easier to minimize windows when all your open applications are full screen.

With the Microsoft Keyboard, you can accomplish the same thing by pressing the Window-M key.


53.Removing The Shortcut Icon Arrows

Open REGEDIT.EXE 
Open the Key HKEY_CLASSES_ROOT 
Open the Key LNKFILE 
Delete the value IsShortcut 
Open the next Key PIFFILE 
Delete the value IsShortcut 
Restart the Win95


54.Turning On Autoarrange For Folders

To make all folders keep AutoArrange turned on:

Open up an existing folder 
Select View / Arrange 
Arrange the Icons the way you would like, (e.g. Name, Size,etc.) 
Select View / Arrange again 
Select AutoArrange 
Press the Ctrl-key while you close the window. 
This folder should now have AutoArrange always selected.
This should allow you to create new folders that have AutoArrange selected by default.
You only need to specify by Name, Size, etc. if you want to change it from the default you set above.
Note: I have only tested this on a few computers. Please give me feedback regarding any problems.

 
55.Creating Document Scraps 

If you are using Microsoft Word 7.0,
you can highlight a section of the document then drag and drop the highlighted area to
your desktop. Windows will create a file for you with a name something like
"Document Scrap From..." followed by the first few words you selected


56.Quick Access To Your Desktop

How do you access your darn desktop when you have a ton of applications open?
Well you could right click on the taskbar and do a minimize all, but that can be slow.
Instead:

Open a browser window (double-click on "My Computer") 
If there is no toolbar, select View from the menu and select Toolbar. 
Then from the dropdown list-box in the toolbar select desktop. 
Now minimize it and forget about it. 
The next time you want to access your desktop just click the desktop window on the taskbar. 
As long as you don't close the window when you shutdown, it will reopen when you start windows again.

Additional Note: You can also drag the Desktop folder to the start menu.
Then you just press Ctrl-E SC and click on Desktop


57.Restoring Corrupted Icons

If you use a graphic Card and you change the resolution, sometimes the icons are bad. 
End Win95 and restart. When you see the starting message press F8 then type standard. 
After this start of Win95 exit and restart. 
Change back to your Resolution and restart. 
The icons should be corrected.


58.Turn Off Window Animation

You can shut off the animation displayed when you minimize and maximize windows.
This tip makes navigating Windows 95 a lot faster especially for those that don't have
super fast video cards.

Open Regedit 
HKEY_CURRENT_USER 
Control panel 
Desktop 
WindowMetrics 
Right Mouse Click an empty space in the right pane. 
Select new/string value. 
Name the new value MinAnimate. 
Doubleclick on the new string value (MinAnimate) and click on "Modify" 
Enter a value of 0 for Off or 1 for On then hit 
Close Regedit and all programs then reboot.


59.Renaming The Recycle Bin

start the Registry Editor 
Type Ctrl-F to bring up the Find Menu 
In the Find What box type Recycle 
Double click on the Recycle Bin in the right pane 
Type in the new name under Value Data 
Restart Win95


60.Turning Off Desktop Icons

If you want to turn off all the icons on your desktop:

Start the System Policy Editor 
Select File / Open Registry 
Select Local User 
Select Shell / Restrictions 
Select Hide all items on Desktop
All Icons will now be hidden.

Note: One side effect is the your CD will no longer automatically play when it is inserted.

61.Adding In Old Windows Groups

If you are setup to dual boot between your old Win 3.x and want to add in the old groups, just click on the *.GRP file in your old windows directory. The programs will be added to your list under Programs in the task bar.

Note: Any DLL's the programs require will need to be copied.


62.To Speed Up The Start Menu

Start the REGEDIT program 
Search for the word desktop 
This should be in HKEY_CLASSES_ROOT / CLSID / {00021400... 
Right Click on the right panel 
Pick NEW / String Value. 
Name it MenuShowDelay, all one word. 
Select a value from 1-10, 1 being the fastest. 
Exit REGEDIT 
Restart Windows


63.To Change The My Computer Or Recycle Bin Icon

Open Regedit 
Find My Computer or Recycle Bin 
Tab to the left panel 
Double click on the highlighted line 
Double click on DefaultIcon in the left panel 
Double click on DefaultIcon right panel 
Type in the value for the new icon 
Note: DLL files can be used. Specify the location of the new icon with the filename,#


64.Remove The Tildes In Short Filenames

Open Regedit 
Go to Hkey_Local_Machine\System\CurrentControlSet\Control\FileSystem 
Right Click on the Right pane 
Select New / Hex 
Add the value NameNumericTail= 0


65.To Remove The Network Neighborhood Icon

Start POLEDIT. It is on the CD in \Admin\Apptools\Poledit 
Open Registry 
Select LocalUser 
Select Shell 
Select Restrictions 
Select Hide Network Neighborhood


66.To Change The Startup And Logoff Screens

Startup Screen
Create a 320x400 bitmap in the root directory and name it LOGO.SYS 
You can use LOGOW.SYS file in the Windows directory as a starter
Logoff Screens
There are several files called LOGOX.SYS 
They are actually bitmaps 320x400 that just have a different extension 
The hidden one in the root directory LOGO.SYS is the startup logo. 
There are two files in the Windows directory. 
LOGOW.SYS is the Wait while Shutting down ... screen 
LOGOS.SYS is the You may now shut-off or Reboot screen 
To edit them, rename them with a BMP extension and use your favorite graphic editor 
You can edit these files or create you own 
They just need to be the same size











Technical stuffs and tricks

Author: zerlina // Category: , ,

                                       

1.Formatting and installing your Hard drive using the installation CD
  
Here also, it is crucial to save all important information on another drive that won’t be 
formatted as all information will be erased from this application. 
First of all, insert the installation disc in the CD drive and restart the system .. page will apear like this , press Enter key as soon as u see this page..... .........

click on Download from  the link below to know the complete details

link 1





Ebooks & Engineering study Materials

Author: zerlina // Category: , , , , ,

Distributed systems download free ebook

Component Based technology free ebook

Yashwant_Kanetkar Let Us C 5th Edition

Programming Windows - Charles Petzold

Dowload free templates for blog

Author: zerlina // Category: , , ,

Click on these links to download various XML files

Iphone_Interface

WOW2_Interface

art template

sweet cupcake

Inspired-by-Nature

GreenChristmas

GreenWorld

roses

iphone-blogger-template

slined-mod-20-dandyna

hanging

tired girl

minimizer

pad_mess

Apptitude Questions and Rs agarwal free download

Author: zerlina // Category: , , ,

                                                                     

Get a brisk break professional!!!

Free aptitude download; get updated with R.S. Aggarwal and e-books

Apptitude Question papers

click on these link to download it free

Apptitude question paper 1

RS AGARWAL

Apptitude question paper TCS part 1

Apptitude question paper TCS part 2

Apptitude question paper TCS part 3

Author: zerlina // Category:
doctorate degrees
Provided by www.onlinedegreeadvantage.com

Anna University Syllabus

Author: zerlina // Category: , ,

ANNA UNIVERSITY syllabus

B.TECH. INFORMATION TECHNOLOGY


GE1301 PROFESSIONAL ETHICS AND HUMAN VALUES 3 0 0 100

Objective
· To create an awareness on Engineering Ethics and Human Values.
· To instill Moral and Social Values and Loyalty
· To appreciate the rights of Others

1. Human Values 10
Morals, Values and Ethics – Integrity – Work Ethic – Service Learning – Civic Virtue – Respect for Others – Living Peacefully – caring – Sharing – Honesty – Courage – Valuing Time – Co-operation – Commitment – Empathy – Self-Confidence – Character – Spirituality

2. Engineering Ethics 9
Senses of 'Engineering Ethics' - variety of moral issued - types of inquiry - moral dilemmas - moral autonomy - Kohlberg's theory - Gilligan's theory - consensus and controversy – Models of Professional Roles - theories about right action - Self-interest - customs and religion - uses of ethical theories.

3. Engineering as Social Experimentation 9
Engineering as experimentation - engineers as responsible experimenters - codes of ethics - a balanced outlook on law - the challenger case study

4. Safety, Responsibilities and Rights 9
Safety and risk - assessment of safety and risk - risk benefit analysis and reducing risk - the three mile island and chernobyl case studies.
Collegiality and loyalty - respect for authority - collective bargaining - confidentiality - conflicts of interest - occupational crime - professional rights - employee rights - Intellectual Property Rights (IPR) - discrimination.

5. Global Issues 8
Multinational corporations - Environmental ethics - computer ethics - weapons development - engineers as managers-consulting engineers-engineers as expert witnesses and advisors -moral leadership-sample code of Ethics like ASME, ASCE, IEEE, Institution of Engineers(India), Indian Institute of Materials Management, Institution of electronics and telecommunication engineers(IETE),India, etc.

TUTORIAL 15
TOTAL : 60
TEXT BOOKS
1. Mike Martin and Roland Schinzinger, “Ethics in Engineering”, McGraw-Hill, New York 1996.
2. Govindarajan M, Natarajan S, Senthil Kumar V. S, “Engineering Ethics”, Prentice Hall of India, New Delhi, 2004.

REFERENCES
1. Charles D. Fleddermann, “Engineering Ethics”, Pearson Education / Prentice Hall, New Jersey, 2004 (Indian Reprint)
2. Charles E Harris, Michael S. Protchard and Michael J Rabins, “Engineering Ethics – Concepts and Cases”, Wadsworth Thompson Learning, United States, 2000 (Indian Reprint now available)
3. John R Boatright, “Ethics and the Conduct of Business”, Pearson Education, New Delhi, 2003.
4. Edmund G Seebauer and Robert L Barry, “Fundamentals of Ethics for Scientists and Engineers”, Oxford University Press, Oxford, 2001.
CS1402 OBJECT ORIENTED ANALYSIS AND DESIGN 3 1 0 100

AIM
To understand the concepts of object oriented analysis and design.

OBJECTIVES
· To understand the object oriented life cycle.
· To know how to identify objects, relationships, services and attributes through UML.
· To understand the use-case diagrams.
· To know the Object Oriented Design process.
· To know about software quality and usability.

UNIT I INTRODUCTION 8
An Overview of Object Oriented Systems Development - Object Basics – Object Oriented Systems Development Life Cycle.

UNIT II OBJECT ORIENTED METHODOLOGIES 12
Rumbaugh Methodology - Booch Methodology - Jacobson Methodology - Patterns – Frameworks – Unified Approach – Unified Modeling Language – Use case - class diagram - Interactive Diagram - Package Diagram - Collaboration Diagram - State Diagram - Activity Diagram.

UNIT III OBJECT ORIENTED ANALYSIS 9
Identifying use cases - Object Analysis - Classification – Identifying Object relationships - Attributes and Methods.

UNIT IV OBJECT ORIENTED DESIGN 8
Design axioms - Designing Classes – Access Layer - Object Storage - Object Interoperability.

UNIT V SOFTWARE QUALITY AND USABILITY 8
Designing Interface Objects – Software Quality Assurance – System Usability - Measuring User Satisfaction

TOTAL : 45+15 HRS
TEXT BOOKS
1. Ali Bahrami, “Object Oriented Systems Development”, Tata McGraw-Hill, 1999 (Unit I, III, IV, V).
2. Martin Fowler, “UML Distilled”, Second Edition, PHI/Pearson Education, 2002. (UNIT II)

REFERENCE BOOKS
1. Stephen R. Schach, “Introduction to Object Oriented Analysis and Design”, Tata McGraw-Hill, 2003.
2. James Rumbaugh, Ivar Jacobson, Grady Booch “The Unified Modeling Language Reference Manual”, Addison Wesley, 1999.
3. Hans-Erik Eriksson, Magnus Penker, Brain Lyons, David Fado, “UML Toolkit”, OMG Press Wiley Publishing Inc., 2004.

CS1252 OPERATING SYSTEMS 3 0 0 100

AIM
To have a thorough knowledge of processes, scheduling concepts, memory management, I/O and file systems in an operating system.

OBJECTIVES
· To have an overview of different types of operating systems
· To know the components of an operating system.
· To have a thorough knowledge of process management
· To have a thorough knowledge of storage management
· To know the concepts of I/O and file systems.

UNIT I 9
Introduction - Mainframe systems – Desktop Systems – Multiprocessor Systems – Distributed Systems – Clustered Systems – Real Time Systems – Handheld Systems - Hardware Protection - System Components – Operating System Services – System Calls – System Programs - Process Concept – Process Scheduling – Operations on Processes – Cooperating Processes – Inter-process Communication.

UNIT II 9
Threads – Overview – Threading issues - CPU Scheduling – Basic Concepts – Scheduling Criteria – Scheduling Algorithms – Multiple-Processor Scheduling – Real Time Scheduling - The Critical-Section Problem – Synchronization Hardware – Semaphores – Classic problems of Synchronization – Critical regions – Monitors.

UNIT III 9
System Model – Deadlock Characterization – Methods for handling Deadlocks -Deadlock Prevention – Deadlock avoidance – Deadlock detection – Recovery from Deadlocks - Storage Management – Swapping – Contiguous Memory allocation – Paging – Segmentation – Segmentation with Paging.

UNIT IV 9
Virtual Memory – Demand Paging – Process creation – Page Replacement – Allocation of frames – Thrashing - File Concept – Access Methods – Directory Structure – File System Mounting – File Sharing – Protection

UNIT V 9
File System Structure – File System Implementation – Directory Implementation – Allocation Methods – Free-space Management. Kernel I/O Subsystems - Disk Structure – Disk Scheduling – Disk Management – Swap-Space Management. Case Study: The Linux System, Windows

TOTAL : 45
TEXT BOOK
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, Sixth Edition, John Wiley & Sons (ASIA) Pvt. Ltd, 2003.

REFERENCES
Harvey M. Deitel, “Operating Systems”, Second Edition, Pearson Education Pvt. Ltd, 2002.
Andrew S. Tanenbaum, “Modern Operating Systems”, Prentice Hall of India Pvt. Ltd, 2003.
William Stallings, “Operating System”, Prentice Hall of India, 4th Edition, 2003.
Pramod Chandra P. Bhatt – “An Introduction to Operating Systems, Concepts and Practice”, PHI, 2003.

CS1302 COMPUTER NETWORKS 3 0 0 100

AIM
To introduce the concepts, terminologies and technologies used in modern days data communication and computer networking.

OBJECTIVES
To understand the concepts of data communications.
To study the functions of different layers.
To introduce IEEE standards employed in computer networking.
To make the students to get familiarized with different protocols and network components.

UNIT I DATA COMMUNICATIONS 8
Components – Direction of Data flow – networks – Components and Categories – types of Connections – Topologies –Protocols and Standards – ISO / OSI model – Transmission Media – Coaxial Cable – Fiber Optics – Line Coding – Modems – RS232 Interfacing sequences.

UNIT II DATA LINK LAYER 10
Error – detection and correction – Parity – LRC – CRC – Hamming code – low Control and Error control - stop and wait – go back-N ARQ – selective repeat ARQ- sliding window – HDLC. - LAN - Ethernet IEEE 802.3 - IEEE 802.4 - IEEE 802.5 - IEEE 802.11 – FDDI - SONET – Bridges.

UNIT III NETWORK LAYER 10
Internetworks – Packet Switching and Datagram approach – IP addressing methods – Subnetting – Routing – Distance Vector Routing – Link State Routing – Routers.

UNIT IV TRANSPORT LAYER 9
Duties of transport layer – Multiplexing – Demultiplexing – Sockets – User Datagram Protocol (UDP) – Transmission Control Protocol (TCP) – Congestion Control – Quality of services (QOS) – Integrated Services.

UNIT V APPLICATION LAYER 8
Domain Name Space (DNS) – SMTP – FTP – HTTP - WWW – Security – Cryptography.

TOTAL: 45
TEXT BOOKS
1. Behrouz A. Forouzan, “Data communication and Networking”, Tata McGraw-Hill, 2004.

REFERENCES
James F. Kurose and Keith W. Ross, “Computer Networking: A Top-Down Approach Featuring the Internet”, Pearson Education, 2003.
Larry L.Peterson and Peter S. Davie, “Computer Networks”, Harcourt Asia Pvt. Ltd., Second Edition.
Andrew S. Tanenbaum, “Computer Networks”, PHI, Fourth Edition, 2003.
William Stallings, “Data and Computer Communication”, Sixth Edition, Pearson Education, 2000.

EC1391 TELECOMMUNICATION SYSTEMS 3 0 0 100

AIM
To gain knowledge about microwave, satellite, optical, telephone and cellular communication systems.

OBJECTIVES
To have knowledge about characteristics of Transmission and microwave devices.
To study about the fundamentals of satellite communication
To gain brief knowledge about optical communication
To gain knowledge about optical communication
To gain knowledge about advances in Telephone systems
To understand the essentials of cellular communication systems.

UNIT I METHODS OF COMMUNICATION 9
Transmission lines – Types and Characteristics, Antenna Fundamentals – Different types of antennas & their Characteristics, Radio Frequency wave propagation- Microwave –Principles, Devices (Reflex Klystron, Magnetron, TWT)-(Principles Only) Radar - Pulsed Radar - CW Radar (Principles and Block Diagram Only).

UNIT II INTRODUCTION TO SATELLITE COMMUNICATIONS 9
Satellite orbits- Satellite communication systems –Earth stations- Applications: Surveillance, Navigation, Mobile Communication, TV Broadcast, Satellite Radio, Satellite Telephone-The Internet.

UNIT III INTRODUCTION TO FIBER OPTIC COMMUNICATION 9
Light wave communication systems – Fiber structure and function types of Fiber – Optical Transmitter & Receiver –Fiber optic Data communication systems
UNIT IV TELEPHONE SYSTEM AND ITS APPLICATION 9
Telephones –Telephone system- Facsimile- Cellular telephone system-Paging system –Integrated services Digital Networks (ISDN)

UNIT V CELLULAR RADIO 9
Citizen’s band Radio, Cordless Telephone, Improved Mobile Telephone service (IMTS), Introduction to Advanced Mobile Phone Service (AMPS), GSM – RF channels and time slots – Voice transmission – Frequency Hopping - Subscriber ID module – GSM Privacy and Security – IS-95 CDMA PCS – Channels – Forward Channel – Reverse Channel – Voice Coding – Power Control – Hand-off and CDMA Security.

TOTAL : 45
TEXT BOOKS
1. Louis.E.Frenzel, Communication Electronics – Principles and Application”, 3rd Editions, Tata McGraw-Hill, 2002 (Units I to IV)
2. Roy Blake, “Wireless Communication Technology”, Thomson Delmar Learning, Second Reprint 2002. (UNIT V Chapters: 10, 11)

REFERENCES
1. Wayne Tomasi,”Electronic Communication systems” 4th Edition, Pearson Education, 2001.
Marin Cole, “Introduction to Telecommunications –Voice, Data and Internet”, Pearson Education, 2001.

CS1301 DATABASE MANAGEMENT SYSTEMS 3 1 0 100

AIM
To provide a strong foundation in database technology and an introduction to the current trends in this field.

OBJECTIVES
To learn the fundamentals of data models and to conceptualize and depict a database system using ER diagram.
To make a study of SQL and relational database design.
To understand the internal storage structures using different file and indexing techniques which will help in physical DB design.
To know the fundamental concepts of transaction processing- concurrency control techniques and recovery procedure.
To have an introductory knowledge about the emerging trends in the area of distributed DB- OO DB- Data mining and Data Warehousing and XML.

UNIT I INTRODUCTION AND CONCEPTUAL MODELING 9
Introduction to File and Database systems- Database system structure – Data Models – Introduction to Network and Hierarchical Models – ER model – Relational Model – Relational Algebra and Calculus.

UNIT II RELATIONAL MODEL 9
SQL – Data definition- Queries in SQL- Updates- Views – Integrity and Security – Relational Database design – Functional dependences and Normalization for Relational Databases (up to BCNF).

UNIT III DATA STORAGE AND QUERY PROCESSING 9
Record storage and Primary file organization- Secondary storage Devices- Operations on Files- Heap File- Sorted Files- Hashing Techniques – Index Structure for files –Different types of Indexes- B-Tree - B+Tree – Query Processing.

UNIT IV TRANSACTION MANAGEMENT 9
Transaction Processing – Introduction- Need for Concurrency control- Desirable properties of Transaction- Schedule and Recoverability- Serializability and Schedules – Concurrency Control – Types of Locks- Two Phases locking- Deadlock- Time stamp based concurrency control – Recovery Techniques – Concepts- Immediate Update- Deferred Update - Shadow Paging.

UNIT V CURRENT TRENDS 9
Object Oriented Databases – Need for Complex Data types - OO data Model- Nested relations - Complex Types- Inheritance Reference Types - Distributed databases- Homogenous and Heterogenous- Distributed data Storage – XML – Structure of XML- Data- XML Document- Schema- Querying and Transformation. – Data Mining and Data Warehousing.

TUTORIAL 15
TOTAL : 60
TEXT BOOKS
1. Abraham Silberschatz, Henry F. Korth and S. Sudarshan - “Database System Concepts”, Fourth Edition, McGraw-Hill, 2002.

REFERENCES
Ramez Elmasri and Shamkant B. Navathe, “Fundamental Database Systems”, Third Edition, Pearson Education, 2003.
Raghu Ramakrishnan, “Database Management System”, Tata McGraw-Hill Publishing Company, 2003.
Hector Garcia–Molina, Jeffrey D.Ullman and Jennifer Widom- “Database System Implementation”- Pearson Education- 2000.
Peter Rob and Corlos Coronel- “Database System, Design, Implementation and Management”, Thompson Learning Course Technology- Fifth edition, 2003.

CS1403 CASE TOOLS LAB 0 0 3 100

Prepare the following documents for two or three of the experiments listed below and develop the software engineering methodology.

1. Program Analysis and Project Planning.
Thorough study of the problem – Identify project scope, Objectives, Infrastructure.

2. Software requirement Analysis
Describe the individual Phases / Modules of the project, Identify deliverables.

3. Data Modeling
Use work products – Data dictionary, Use diagrams and activity diagrams, build and test lass diagrams, Sequence diagrams and add interface to class diagrams.

4. Software Development and Debugging

5. Software Testing
Prepare test plan, perform validation testing, Coverage analysis, memory leaks, develop test case hierarchy, Site check and Site monitor.

Suggested List of Applications:
1. Student Marks Analyzing System
2. Quiz System
3. Online Ticket Reservation System
4. Payroll System
5. Course Registration System
6. Expert Systems
7. ATM Systems
8. Stock Maintenance
9. Real-Time Scheduler
10. Remote Procedure Call Implementation

CS1254 OPERATING SYSTEM LAB (Linux based) 0 0 3 100
(Implement the following on LINUX platform. Use C for high level language implementation)

1. Shell programming
- command syntax
- write simple functions
- basic tests
2. Shell programming
- loops
- patterns
- expansions
- substitutions
3. Write programs using the following system calls of UNIX operating system:
fork, exec, getpid, exit, wait, close, stat, opendir, readdir
4. Write programs using the I/O system calls of UNIX operating system (open, read, write, etc)
5. Write C programs to simulate UNIX commands like ls, grep, etc.
6. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt chart for FCFS and SJF. For each of the scheduling policies, compute and print the average waiting time and average turnaround time
7. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt chart for Priority and Round robin. For each of the scheduling policies, compute and print the average waiting time and average turnaround time
8. Implement the Producer – Consumer problem using semaphores.
9. Implement some memory management schemes – I for eg
Free space is maintained as a linked list of nodes with each node having the starting byte address and the ending byte address of a free block. Each memory request consists of the process-id and the amount of storage space required in bytes. Allocated memory space is again maintained as a linked list of nodes with each node having the process-id, starting byte address and the ending byte address of the allocated space.
10. Implement some memory management schemes – II for eg
When a process finishes (taken as input) the appropriate node from the allocated list should be deleted and this free disk space should be added to the free space list. [Care should be taken to merge contiguous free blocks into one single block. This results in deleting more than one node from the free space list and changing the start and end address in the appropriate node]. For allocation use first fit, worst fit and best fit.

CS1307 DATABASE MANAGEMENT SYSTEMS LAB 0 0 3 100

LIST OF EXPERIMENTS
1. Data Definition Language (DDL) commands in RDBMS.
2. Data Manipulation Language (DML) and Data Control Language (DCL) commands in RDBMS.
3. High-level language extension with Cursors.
4. High level language extension with Triggers
5. Procedures and Functions.
6. Embedded SQL.
7. Database design using E-R model and Normalization.
8. Design and implementation of Payroll Processing System.
9. Design and implementation of Banking System.
10. Design and implementation of Library Information System.

MG1351 PRINCIPLES OF MANAGEMENT 3 0 0 100

Objective
Knowledge on the principles of management is essential for all kinds of people in all kinds of organizations. After studying this course, students will be able to have a clear understanding of the managerial functions like planning, organizing, staffing, leading and controlling. Students will also gain some basic knowledge on international aspect of management.

1. Historical Development 9
Definition of Management – Science or Art – Management and Administration – Development of Management Thought – Contribution of Taylor and Fayol – Functions of Management – Types of Business Organisation.

2. Planning 9
Nature & Purpose – Steps involved in Planning – Objectives – Setting Objectives – Process of Managing by Objectives – Strategies, Policies & Planning Premises- Forecasting – Decision-making.

3. Organising 9
Nature and Purpose – Formal and informal organization – Organization Chart – Structure and Process – Departmentation by difference strategies – Line and Staff authority – Benefits and Limitations – De-Centralization and Delegation of Authority – Staffing – Selection Process - Techniques – HRD – Managerial Effectiveness.

4. Directing 9
Scope – Human Factors – Creativity and Innovation – Harmonizing Objectives – Leadership – Types of Leadership Motivation – Hierarchy of needs – Motivation theories – Motivational Techniques – Job Enrichment – Communication – Process of Communication – Barriers and Breakdown – Effective Communication – Electronic media in Communication.

5. Controlling 9
System and process of Controlling – Requirements for effective control – The Budget as Control Technique – Information Technology in Controlling – Use of computers in handling the information – Productivity – Problems and Management – Control of Overall Performance – Direct and Preventive Control – Reporting – The Global Environment – Globalization and Liberalization – International Management and Global theory of Management.
TOTAL : 45
TEXT BOOKS
1. Harold Kooritz & Heinz Weihrich “Essentials of Management”, Tata McGraw-Hill, 1998.
2. Joseph L Massie “Essentials of Management”, Prentice Hall of India, (Pearson) Fourth Edition, 2003.

REFERENCES
1 Tripathy PC And Reddy PN, “ Principles of Management”, Tata McGraw-Hill, 1999.
2. Decenzo David, Robbin Stephen A, ”Personnel and Human Reasons Management”, Prentice Hall of India, 1996
3. JAF Stomer, Freeman R. E and Daniel R Gilbert Management, Pearson Education, Sixth Edition, 2004.
4. Fraidoon Mazda, “Engineering Management”, Addison Wesley,-2000.

IT1351 NETWORK PROGRAMMING AND MANAGEMENT 3 0 0 100

AIM
To enable the students to develop the necessary skills for developing robust & scalable network applications and to build necessary basic knowledge for managing networks.

OBJECTIVES
· To learn the basics of socket programming using TCP Sockets.
· To learn basics of UDP sockets.
· To develop knowledge of threads for developing high performance scalable applications.
· To learn about raw sockets.
· To understand simple network management protocols & practical issues.

UNIT I ELEMENTARY TCP SOCKETS 9
Introduction to Socket Programming – Overview of TCP/IP Protocols –Introduction to Sockets – Socket address Structures – Byte ordering functions – address conversion functions – Elementary TCP Sockets – socket, connect, bind, listen, accept, read, write, close functions – Iterative Server – Concurrent Server.

UNIT II APPLICATION DEVELOPMENT 9
TCP Echo Server – TCP Echo Client – Posix Signal handling – Server with multiple clients – boundary conditions: Server process Crashes, Server host Crashes, Server Crashes and reboots, Server Shutdown – I/O multiplexing – I/O Models – select function – shutdown function – TCP echo Server (with multiplexing) – poll function – TCP echo Client (with Multiplexing)
UNIT III SOCKET OPTIONS, ELEMENTRY UDP SOCKETS 9
Socket options – getsocket and setsocket functions – generic socket options – IP socket options – ICMP socket options – TCP socket options – Elementary UDP sockets – UDP echo Server – UDP echo Client – Multiplexing TCP and UDP sockets – Domain name system – gethostbyname function – Ipv6 support in DNS – gethostbyadr function – getservbyname and getservbyport functions.

UNIT IV ADVANCED SOCKETS 9
Ipv4 and Ipv6 interoperability – threaded servers – thread creation and termination – TCP echo server using threads – Mutexes – condition variables – raw sockets – raw socket creation – raw socket output – raw socket input – ping program – trace route program.

UNIT V SIMPLE NETWORK MANAGEMENT 9
SNMP network management concepts – SNMP management information – standard MIB’s – SNMPv1 protocol and Practical issues – introduction to RMON, SNMPv2 and SNMPv3.

TOTAL : 45 HRS
TEXT BOOKS
1. W. Richard Stevens, “UNIX NETWORK PROGRAMMING Vol-I” Second Edition, PHI / Pearson Education, 1998. (Units – I, II, III & IV.) (Chapter – 1-10, 23, 25)
2. William Stallings, “SNMP, SNMPv2, SNMPv3 and RMON 1 and 2”, Third Edition, Addison Wesley, 1999. (Unit - V) (Chapter – 4-7)

REFERENCE
1. D.E. Comer, “Intrenetworking with TCP/IP Vol- III”, (BSD Sockets Version), second Edition, PHI, 2003.
IT1352 CRYPTOGRAPHY AND NETWORK SECURITY 3 1 0 100

AIM
To understand the principles of encryption algorithms; conventional and public key cryptography. To have a detailed knowledge about authentication, hash functions and application level security mechanisms.

OBJECTIVES
To know the methods of conventional encryption.
To understand the concepts of public key encryption and number theory
To understand authentication and Hash functions.
To know the network security tools and applications.
To understand the system level security used.

UNIT I INTRODUCTION 10
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption Function – Traffic Confidentiality

UNIT II PUBLIC KEY CRYPTOGRAPHY 10
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and Cryptography - Introduction to Number Theory – Confidentiality using Symmetric Encryption – Public Key Cryptography and RSA.

UNIT III AUTHENTICATION AND HASH FUNCTION 9
Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard
UNIT IV NETWORK SECURITY 8
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP – S/MIME - IP Security – Web Security.

UNIT V SYSTEM LEVEL SECURITY 8
Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems.

TUTORIAL 15
TOTAL : 60
TEXT BOOK
1. William Stallings, “Cryptography And Network Security – Principles and Practices”, Prentice Hall of India, Third Edition, 2003.

REFERENCES
1. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
2. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
3. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition, Pearson Education, 2003.

CS1253 VISUAL PROGRAMMING 3 0 0 100

AIM
To make the students to understand the windows programming concepts including Microsoft Foundation Classes.

OBJECTIVES
To introduce the concepts of windows programming
To introduce GUI programming using Microsoft Foundation Classes
To enable the students to develop programs and simple applications using Visual C++

UNIT I WINDOWS PROGRAMMING 9
Windows environment – a simple windows program – windows and messages – creating the window – displaying the window – message loop – the window procedure – message processing – text output – painting and repainting – introduction to GDI – device context – basic drawing – child window controls

UNIT II VISUAL C++ PROGRAMMING – INTRODUCTION 9
Application Framework – MFC library – Visual C++ Components – Event Handling – Mapping modes – colors – fonts – modal and modeless dialog – windows common controls – bitmaps

UNIT III THE DOCUMENT AND VIEW ARCHITECTURE 9
Menus – Keyboard accelerators – rich edit control – toolbars – status bars – reusable frame window base class – separating document from its view – reading and writing SDI and MDI documents – splitter window and multiple views – creating DLLs – dialog based applications

UNIT IV ACTIVEX AND OBJECT LINKING AND EMBEDDING (OLE) 9
ActiveX controls Vs. Ordinary Windows Controls – Installing ActiveX controls – Calendar Control – ActiveX control container programming – create ActiveX control at runtime – Component Object Model (COM) – containment and aggregation Vs. inheritance – OLE drag and drop – OLE embedded component and containers – sample applications

UNIT-V ADVANCED CONCEPTS 9
Database Management with Microsoft ODBC – Structured Query Language – MFC ODBC classes – sample database applications – filter and sort strings – DAO concepts – displaying database records in scrolling view – Threading – VC++ Networking issues – Winsock – WinInet – building a web client – Internet Information Server – ISAPI server extension – chat application – playing and multimedia (sound and video) files

TOTAL : 45
TEXT BOOKS
1.Charles Petzold, “Windows Programming”, Microsoft press, 1996 (Unit I – Chapter 1-9)
2. David J.Kruglinski, George Shepherd and Scot Wingo, “Programming Visual C++”, Microsoft press, 1999 (Unit II – V)

REFERENCES
1. Steve Holtzner, “Visual C++ 6 Programming”, Wiley Dreamtech India Pvt. Ltd., 2003.

IT1353 EMBEDDED SYSTEMS 3 0 0 100

AIM
To give sufficient background for undertaking embedded systems design.

OBJECTIVES
To introduce students to the embedded systems, its hardware and software.
To introduce devices and buses used for embedded networking.
To explain programming concepts and embedded programming in C and C++.
To explain real time operating systems, inter-task communication and an exemplary case of MUCOS – IIRTOS.

UNIT I INTRODUCTION TO EMBEDDED SYSTEMS 9
Definition and Classification – Overview of Processors and hardware units in an embedded system – Software embedded into the system – Exemplary Embedded Systems – Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits

UNIT II DEVICES AND BUSES FOR DEVICES NETWORK 9
I/O Devices - Device I/O Types and Examples – Synchronous - Iso-synchronous and Asynchronous Communications from Serial Devices - Examples of Internal Serial-Communication Devices - UART and HDLC - Parallel Port Devices - Sophisticated interfacing features in Devices/Ports- Timer and Counting Devices - ‘12C’, ‘USB’, ‘CAN’ and advanced I/O Serial high speed buses- ISA, PCI, PCI-X, cPCI and advanced buses.

UNIT III PROGRAMMING CONCEPTS AND EMBEDDED PROGRAMMING IN C, C++ 9
Programming in assembly language (ALP) vs. High Level Language - C Program Elements, Macros and functions -Use of Pointers - NULL Pointers - Use of Function Calls – Multiple function calls in a Cyclic Order in the Main Function Pointers – Function Queues and Interrupt Service Routines Queues Pointers – Concepts of EMBEDDED PROGRAMMING in C++ - Objected Oriented Programming – Embedded Programming in C++, ‘C’ Program compilers – Cross compiler – Optimization of memory codes.

UNIT IV REAL TIME OPERATING SYSTEMS – PART - 1 9
Definitions of process, tasks and threads – Clear cut distinction between functions – ISRs and tasks by their characteristics – Operating System Services- Goals – Structures- Kernel - Process Management – Memory Management – Device Management – File System Organisation and Implementation – I/O Subsystems – Interrupt Routines Handling in RTOS, REAL TIME OPERATING SYSTEMS : RTOS Task scheduling models - Handling of task scheduling and latency and deadlines as performance metrics – Co-operative Round Robin Scheduling – Cyclic Scheduling with Time Slicing (Rate Monotonics Co-operative Scheduling) – Preemptive Scheduling Model strategy by a Scheduler – Critical Section Service by a Preemptive Scheduler – Fixed (Static) Real time scheduling of tasks - INTER PROCESS COMMUNICATION AND SYNCHRONISATION – Shared data problem – Use of Semaphore(s) – Priority Inversion Problem and Deadlock Situations – Inter Process Communications using Signals – Semaphore Flag or mutex as Resource key – Message Queues – Mailboxes – Pipes – Virtual (Logical) Sockets – Remote Procedure Calls (RPCs).

UNIT V REAL TIME OPERATING SYSTEMS – PART - 2 9
Study of Micro C/OS-II or Vx Works or Any other popular RTOS – RTOS System Level Functions – Task Service Functions – Time Delay Functions – Memory Allocation Related Functions – Semaphore Related Functions – Mailbox Related Functions – Queue Related Functions – Case Studies of Programming with RTOS – Understanding Case Definition – Multiple Tasks and their functions – Creating a list of tasks – Functions and IPCs – Exemplary Coding Steps.

TOTAL : 45
TEXTBOOKS
1. Rajkamal, Embedded Systems Architecture, Programming and Design, TATA McGraw-Hill, First reprint Oct. 2003

REFERENCES
1. Steve Heath, Embedded Systems Design, Second Edition-2003, Newnes,
2. David E.Simon, An Embedded Software Primer, Pearson Education Asia, First Indian Reprint 2000.
3. Wayne Wolf, Computers as Components; Principles of Embedded Computing System Design – Harcourt India, Morgan Kaufman Publishers, First Indian Reprint 2001
4. Frank Vahid and Tony Givargis, Embedded Systems Design – A unified Hardware /Software Introduction, John Wiley, 2002.

MA1251 NUMERICAL METHODS 3 1 0 100

AIM
With the present development of the computer technology, it is necessary to develop efficient algorithms for solving problems in science, engineering and technology. This course gives a complete procedure for solving different kinds of problems occur in engineering numerically.

OBJECTIVES
At the end of the course, the students would be acquainted with the basic concepts in numerical methods and their uses are summarized as follows:

· The roots of nonlinear (algebraic or transcendental) equations, solutions of large system of linear equations and eigenvalue problem of a matrix can be obtained numerically where analytical methods fail to give solution.
· When huge amounts of experimental data are involved, the methods discussed on interpolation will be useful in constructing approximate polynomial to represent the data and to find the intermediate values.
· The numerical differentiation and integration find application when the function in the analytical form is too complicated or the huge amounts of data are given such as series of measurements, observations or some other empirical information.
· Since many physical laws are couched in terms of rate of change of one/two or more independent variables, most of the engineering problems are characterized in the form of either nonlinear ordinary differential equations or partial differential equations. The methods introduced in the solution of ordinary differential equations and partial differential equations will be useful in attempting any engineering problem.

UNIT I SOLUTION OF EQUATIONS AND EIGENVALUE PROBLEMS 9+3

Linear interpolation methods (method of false position) – Newton’s method – Statement of Fixed Point Theorem – Fixed point iteration: x=g(x) method – Solution of linear system by Gaussian elimination and Gauss-Jordon methods- Iterative methods: Gauss Jacobi and Gauss-Seidel methods- Inverse of a matrix by Gauss Jordon method – Eigenvalue of a matrix by power method.

UNIT II INTERPOLATION AND APPROXIMATION 9+ 3
Lagrangian Polynomials – Divided differences – Interpolating with a cubic spline – Newton’s forward and backward difference formulas.

UNIT III NUMERICAL DIFFERENTIATION AND INTEGRATION 9+ 3
Derivatives from difference tables – Divided differences and finite differences –Numerical integration by trapezoidal and Simpson’s 1/3 and 3/8 rules – Romberg’s method – Two and Three point Gaussian quadrature formulas – Double integrals using trapezoidal and Simpson’s rules.


UNIT IV INITIAL VALUE PROBLEMS FOR ORDINARY DIFFERENTIAL EQUATIONS 9+ 3
Single step methods: Taylor series method – Euler and modified Euler methods – Fourth order Runge – Kutta method for solving first and second order equations – Multistep methods: Milne’s and Adam’s predictor and corrector methods.

UNIT V BOUNDARY VALUE PROBLEMS IN ordinary AND PARTIAL DIFFERENTIAL EQUATIONS 9+ 3
Finite difference solution of second order ordinary differential equation – Finite difference solution of one dimensional heat equation by explicit and implicit methods – One dimensional wave equation and two dimensional Laplace and Poisson equations.

TUTORIAL 15
TOTAL : 60
TEXT BOOKS
1. Gerald, C.F, and Wheatley, P.O, “Applied Numerical Analysis”, Sixth Edition, Pearson Education Asia, New Delhi, 2002.
2. Balagurusamy, E., “Numerical Methods”, Tata McGraw-Hill Pub. Co. Ltd., New Delhi, 1999.

REFERENCES

Kandasamy, P., Thilagavathy, K. and Gunavathy, K., “Numerical Methods”, S.Chand Co. Ltd., New Delhi, 2003.
Burden, R.L and Faires, T.D., “Numerical Analysis”, Seventh Edition, Thomson Asia Pvt. Ltd., Singapore, 2002.

CS1255 VISUAL PROGRAMMING LAB 0 0 3 100

LIST OF EXPERIMENTS
Windows SDK / Visual C++
Writing code for keyboard and mouse events.
Dialog Based applications
Creating MDI applications

Visual C++
Threads
Document view Architecture, Serialization
Dynamic controls
Menu, Accelerator, Tool tip, Tool bar
Creating DLLs and using them
Data access through ODBC
10. Creating ActiveX control and using it

CS1305 NETWORK LAB 0 0 3 100
(all the programs are to be written using C)

Simulation of ARP / RARP.
Write a program that takes a binary file as input and performs bit stuffing and CRC Computation.
Develop an application for transferring files over RS232.
Simulation of Sliding-Window protocol.
Simulation of BGP / OSPF routing protocol.
Develop a Client – Server application for chat.
Develop a Client that contacts a given DNS Server to resolve a given host name.
Write a Client to download a file from a HTTP Server.
Study of NS2.
Study of Glomosim / OPNET.

MG1401 TOTAL QUALITY MANAGEMENT 3 0 0 100

OBJECTIVE
· To understand the Total Quality Management concept and principles and the various tools available to achieve Total Quality Management.
· To understand the statistical approach for quality control.
· To create an awareness about the ISO and QS certification process and its need for the industries.

INTRODUCTION 9
Definition of Quality, Dimensions of Quality, Quality Planning, Quality costs - Analysis Techniques for Quality Costs, Basic concepts of Total Quality Management, Historical Review, Principles of TQM, Leadership – Concepts, Role of Senior Management, Quality Council, Quality Statements, Strategic Planning, Deming Philosophy, Barriers to TQM Implementation.

TQM PRINCIPLES 9
Customer satisfaction – Customer Perception of Quality, Customer Complaints, Service Quality, Customer Retention, Employee Involvement – Motivation, Empowerment, Teams, Recognition and Reward, Performance Appraisal, Benefits, Continuous Process Improvement – Juran Trilogy, PDSA Cycle, 5S, Kaizen, Supplier Partnership – Partnering, sourcing, Supplier Selection, Supplier Rating, Relationship Development, Performance Measures – Basic Concepts, Strategy, Performance Measure.

STATISTICAL PROCESS CONTROL (SPC) 9
The seven tools of quality, Statistical Fundamentals – Measures of central Tendency and Dispersion, Population and Sample, Normal Curve, Control Charts for variables and attributes, Process capability, Concept of six sigma, New seven Management tools.

TQM TOOLS 9
Benchmarking – Reasons to Benchmark, Benchmarking Process, Quality Function Deployment (QFD) – House of Quality, QFD Process, Benefits, Taguchi Quality Loss Function, Total Productive Maintenance (TPM) – Concept, Improvement Needs, FMEA – Stages of FMEA.

QUALITY SYSTEMS 9
Need for ISO 9000 and Other Quality Systems, ISO 9000:2000 Quality System – Elements, Implementation of Quality System, Documentation, Quality Auditing, TS 16949, ISO 14000 – Concept, Requirements and Benefits.
Total : 45
TEXT BOOK
1. Dale H.Besterfiled, et al., Total Quality Management, Pearson Education, Inc. 2003. (Indian reprint 2004). ISBN 81-297-0260-6.

REFERENCES
1. James R.Evans & William M.Lidsay, The Management and Control of Quality, (5th Edition), South-Western (Thomson Learning), 2002 (ISBN 0-324-06680-5).
2. Feigenbaum.A.V. “Total Quality Management, McGraw-Hill, 1991.
3. Oakland.J.S. “Total Quality Management Butterworth – Hcinemann Ltd., Oxford. 1989.
4. Narayana V. and Sreenivasan, N.S. Quality Management – Concepts and Tasks, New Age International 1996.
5. Zeiri. “Total Quality Management for Engineers Wood Head Publishers, 1991.

IT1401 COMPONENT BASED TECHNOLOGY 3 0 0 100

AIM
To introduce different software components and their application.

OBJECTIVE
· Introduces in depth JAVA, Corba and .Net Components
· Deals with Fundamental properties of components, technology and architecture and middleware.
· Component Frameworks and Development are covered indepth.

UNIT I INTRODUCTION 9
Software Components – objects – fundamental properties of Component technology – modules – interfaces – callbacks – directory services – component architecture – components and middleware

UNIT II JAVA BASED COMPONENT TECHNOLOGIES 9
Threads – Java Beans – Events and connections – properties – introspection – JAR files – reflection – object serialization – Enterprise Java Beans – Distributed Object models – RMI and RMI-IIOP

UNIT III CORBA COMPONENT TECHNOLOGIES 9
Java and CORBA – Interface Definition language – Object Request Broker – system object model – portable object adapter – CORBA services – CORBA component model – containers – application server – model driven architecture

UNIT IV . NET BASED COMPONENT TECHNOLOGIES 9
COM – Distributed COM – object reuse – interfaces and versioning – dispatch interfaces – connectable objects – OLE containers and servers – Active X controls – .NET components - assemblies – appdomains – contexts – reflection – remoting

UNIT V COMPONENT FRAMEWORKS AND DEVELOPMENT 9
Connectors – contexts – EJB containers – CLR contexts and channels – Black Box component framework – directory objects – cross-development environment – component-oriented programming – Component design and implementation tools – testing tools - assembly tools

TOTAL : 45
TEXT BOOK
1. Clemens Szyperski, “Component Software: Beyond Object-Oriented Programming”, Pearson Education publishers, 2003

REFERENCES
1. Ed Roman, “Mastering Enterprise Java Beans”, John Wiley & Sons Inc., 1999.
2. Mowbray, “Inside CORBA”, Pearson Education, 2003.
3. Freeze, “Visual Basic Development Guide for COM & COM+”, BPB Publication, 2001.
4. Hortsamann, Cornell, “CORE JAVA Vol-II” Sun Press, 2002.

IT1402 MOBILE COMPUTING 3 0 0 100

AIM
To provide basics for various techniques in Mobile Communications and Mobile Content services.

OBJECTIVES
· To learn the basics of Wireless voice and data communications technologies.
· To build working knowledge on various telephone and satellite networks.
· To study the working principles of wireless LAN and its standards.
· To build knowledge on various Mobile Computing algorithms.
· To build skills in working with Wireless application Protocols to develop mobile content applications.

UNIT I WIRELESS COMMUNICATION FUNDAMENTALS 9
Introduction – Wireless transmission – Frequencies for radio transmission – Signals – Antennas – Signal Propagation – Multiplexing – Modulations – Spread spectrum – MAC – SDMA – FDMA – TDMA – CDMA – Cellular Wireless Networks.

UNIT II TELECOMMUNICATION NETWORKS 11
Telecommunication systems – GSM – GPRS – DECT – UMTS – IMT-2000 – Satellite Networks - Basics – Parameters and Configurations – Capacity Allocation – FAMA and DAMA – Broadcast Systems – DAB - DVB.

UNIT III WIRLESS LAN 9
Wireless LAN – IEEE 802.11 - Architecture – services – MAC – Physical layer – IEEE 802.11a - 802.11b standards – HIPERLAN – Blue Tooth.

UNIT IV MOBILE NETWORK LAYER 9
Mobile IP – Dynamic Host Configuration Protocol - Routing – DSDV – DSR – Alternative Metrics.

UNIT V TRANSPORT AND APPLICATION LAYERS 7
Traditional TCP – Classical TCP improvements – WAP, WAP 2.0.

TOTAL : 45
TEXT BOOKS
1. Jochen Schiller, “Mobile Communications”, PHI/Pearson Education, Second Edition, 2003. (Unit I Chap 1,2 &3- Unit II chap 4,5 &6-Unit III Chap 7.Unit IV Chap 8- Unit V Chap 9&10.)
2. William Stallings, “Wireless Communications and Networks”, PHI/Pearson Education, 2002. (Unit I Chapter – 7&10-Unit II Chap 9)

REFERENCES
1. Kaveh Pahlavan, Prasanth Krishnamoorthy, “Principles of Wireless Networks”, PHI/Pearson Education, 2003.
2. Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, “Principles of Mobile Computing”, Springer, New York, 2003.
3. Hazysztof Wesolowshi, “Mobile Communication Systems”, John Wiley and Sons Ltd, 2002.

CS1354 GRAPHICS AND MULTIMEDIA 3 0 0 100

AIM
To impart the fundamental concepts of Computer Graphics and Multimedia.

OBJECTIVES
· To study the graphics techniques and algorithms.
· To study the multimedia concepts and various I/O technologies.
· To enable the students to develop their creativity

UNIT I OUTPUT PRIMITIVES 9
Introduction - Line - Curve and Ellipse Algorithms – Attributes – Two-Dimensional Geometric Transformations – Two-Dimensional Viewing.

UNIT II THREE-DIMENSIONAL CONCEPTS 9
Three-Dimensional Object Representations – Three-Dimensional Geometric and Modeling Transformations – Three-Dimensional Viewing – Color models – Animation

UNIT III MULTIMEDIA SYSTEMS DESIGN 9
An Introduction – Multimedia applications – Multimedia System Architecture – Evolving technologies for Multimedia – Defining objects for Multimedia systems – Multimedia Data interface standards – Multimedia Databases.

UNIT IV MULTIMEDIA FILE HANDLING 9
Compression & Decompression – Data & File Format standards – Multimedia I/O technologies - Digital voice and audio – video image and animation – Full motion video – Storage and retrieval Technologies.

UNIT V Hypermedia 9
Multimedia Authoring & User Interface – Hypermedia messaging - Mobile Messaging – Hypermedia message component – creating Hypermedia message – Integrated multimedia message standards – Integrated Document management – Distributed Multimedia Systems.

TOTAL: 45
TEXT BOOKS
1. Donald Hearn and M.Pauline Baker, “Computer Graphics C Version”, Pearson Education, 2003.
(UNIT I : Chapters 1 to 6; UNIT 2: Chapter 9 – 12, 15, 16)
2. Prabat K Andleigh and Kiran Thakrar, “Multimedia Systems and Design”, PHI, 2003. (UNIT 3 to 5)


REFERENCES
1. Judith Jeffcoate, “Multimedia in practice technology and Applications”, PHI,1998.
2. Foley, Vandam, Feiner, Huges, “Computer Graphics: Principles & Practice”, Pearson Education, second edition 2003.

IT1403 SOFTWARE COMPONENTS LABORATORY 0 0 3 100

LIST OF EXPERIMENTS
1. COM COMPONENT: Development of simple com components in VB and use them in applications. [2 example].
2. ENTERPRISE JAVA BEANS: Deploying EJB for simple arithmetic operator.
3. RMI: Deploying RMI for client server applications. [2 Experiments].
4. Creation Of DLL Using VB And Deploy it in Java [2 Experiments]
5. Naming Services In CORBA
6. DSI, DII IN CORBA.
7. INTER ORB IN COMMUNICATION [IIOP, IOR] Jac ORB & Visi broker ORB
8. STUDYING J2EE SERVER.
9. SIMPLE APPLICATION USING CORBA.

CS1355 GRAPHICS AND MULTIMEDIA LAB 0 0 3 100

1. To implement Bresenham’s algorithms for line, circle and ellipse drawing
2. To perform 2D Transformations such as translation, rotation, scaling, reflection and sharing.
3. To implement Cohen-Sutherland 2D clipping and window-viewport mapping
4. To perform 3D Transformations such as translation, rotation and scaling.
5. To visualize projections of 3D images.
6. To convert between color models.
7. To implement text compression algorithm
8. To implement image compression algorithm
9. To perform animation using any Animation software
10. To perform basic operations on image using any image editing software

IT1451 WEB TECHNOLOGY 3 1 0 100

AIM
To highlight the features of different technologies involved in Web Technology and various Scripting Languages.

OBJECTIVES
Students will get an introduction about various Scripting Languages.
Students will be provided with an up-to-date survey of developments in. Web Technologies.
Enable the students to know techniques involved to support real-time Software development.

UNIT I INTRODUCTION 8
History of the Internet and World Wide Web – HTML 4 protocols – HTTP, SMTP, POP3, MIME, IMAP. Introduction to JAVA Scripts – Object Based Scripting for the web. Structures – Functions – Arrays – Objects.

UNIT II DYNAMIC HTML 9
Introduction – Object refers, Collectors all and Children. Dynamic style, Dynamic position, frames, navigator, Event Model – On check – On load – Onenor – Mouse rel – Form process – Event Bubblers – Filters – Transport with the Filter – Creating Images – Adding shadows – Creating Gradients – Creating Motion with Blur – Data Binding – Simple Data Binding – Moving with a record set – Sorting table data – Binding of an Image and table.
UNIT III MULTIMEDIA 9
Audio and video speech synthesis and recognition - Electronic Commerce – E-Business Model – E- Marketing – Online Payments and Security – Web Servers – HTTP request types – System Architecture – Client Side Scripting and Server side Scripting – Accessing Web servers – IIS – Apache web server.

UNIT IV DATABASE- ASP – XML 10
Database, Relational Database model – Overview, SQL – ASP – Working of ASP – Objects – File System Objects – Session tracking and cookies – ADO – Access a Database from ASP – Server side Active-X Components – Web Resources – XML – Structure in Data – Name spaces – DTD – Vocabularies – DOM methods.

UNIT V SERVLETS AND JSP 9
Introduction – Servlet Overview Architecture – Handling HTTP Request – Get and post request – redirecting request – multi-tier applications – JSP – Overview – Objects – scripting – Standard Actions – Directives.

TUTORIAL 15
TOTAL : 60
TEXT BOOK
1. Deitel & Deitel, Goldberg, “Internet and world wide web – How to Program”, Pearson Education Asia, 2001.

REFERENCES
1. Eric Ladd, Jim O’ Donnel, “Using HTML 4, XML and JAVA”, Prentice Hall of India – QUE, 1999.
2. Aferganatel, “Web Programming: Desktop Management”, PHI, 2004.
3. Rajkamal, “Web Technology”, Tata McGraw-Hill, 2001.

Followers