Uttar Pradesh Bachelor of Education Joint Entrance Examination 2011 is organized by the MJP Rohilkhand University, Bareilly. UP B.Ed. JEE 2011 examination is scheduled on 2nd June 2011. Examination is being conducted every year by one of the university in Uttar Pradesh.
The admit cards for the Combined B. Ed. Entrance Exam 2011 of the state of Uttar Pradesh is expected to be sent by 20th May 2011. Those candidates who don’t receive their admit card by 30th May, they must download the information about their examination center, roll number, nodal centre etc. from the website of Mahatma Jyotiba Phule Rohilkhand University. The online information will be available on the university website www.mjpru.ac.in from 30th of May. The entrance exam is scheduled to take place on 2nd June 201
बी.एड. प्रवेश परीक्षा (2011)
अभ्यर्थी के फार्म के प्राप्ति की स्थिति जानें
Get Your Roll NO:
पति (पत्नी से) – यह शीशा तुम्हारी वजह से टूटा है।
पत्नी (पति से) – बिल्कुल नहीं, तुम्हारे कारण टूटा है। मैंने तुम्हें फूलदान फेंक कर मारा था, यदि तुम अपनी जगह से नहीं हटते तो शीशा कभी नहीं टूटता।
मारवाड़ी – डॉक्टर साहब प्लास्टिक सर्जेरी करवानी है क्या खर्चा आयेगा
डॉक्टर साहब – पाँच लाख रूपए मारवाड़ी – अगर प्लास्टिक हम दे दें तो?
पति (पत्नी से)- सोचो अगर भगवान तुम्हें पैसा और दिमाग में से एक चीज लेने को कहे तो तुम क्या लोगी?
पत्नी (पति से)- इसमें सोचने की क्या बात है मैं दिमाग ही लूंगी।
पति- हां जिसके पास जो चीज नही होती उसे वही लेनी चाहिए।
मरीज ने एक डॉक्टर से पूछा आपने दो-दो थर्मामीटर क्यों रखे हैं? डॉक्टर ने जवाब दिया, एक मुंह में लगाने के लिए और दूसरा जेब में।
मरीज- मैं आपका मतलब नही समझा!
डॉक्टर- मतलब यह कि एक थर्मामीटर मुंह में लगाने से मुझे पता चलता है कि आपका शरीर कितना गर्म है और दूसरा जेब में लगाने से पता चलेगा कि आपकी जेब कितनी गर्म है।
The Chennai Super Kings won the IPL 4 Title in 2011, after beating the Royal Challengers Bangalore by a massive 58 runs in the grand finale in Chennai tonight. The CSK played like a team and emerged victorious before the home crowd.
In the battlefield called Chepauk, Dhoni’s army ambushed the Royal Challengers to defend the citadel they had clinched in Mumbai last year. The Chennai mean machine started working from Ball One with M Vijay (95 off 52 balls) and Mike Hussey (63 off 45 balls) taking over and there was no looking back
-IPL 4 Final Match-Chennai Super Kings vs Royal Challengers Bangalore, Final
|Batting: Royal Challengers Bangalore Innings|
|Fall Of Wickets|
|1/1 (Chris Gayle, 0.4 ov.)|
|Bowling: Chennai Super Kings|
|Go to top|
|Batting: Chennai Super Kings Innings|
|Fall Of Wickets|
|1/159 (Michael Hussey, 14.5 ov.), 2/188 (Murali Vijay, 18.1 ov.), 3/188 (MS Dhoni, 18.2 ov.), 4/199 (Albie Morkel, 19.4 ov.), 5/199 (Suresh Raina, 19.5 ov.)|
|Bowling: Royal Challengers Bangalore|
|Go to top|
IPL 4 Final Live Scorecard: Chennai vs Bangalore
Hussey smashes the first ball of Zaheer’s second over deep backward square leg for a maximum over
So two sixes in two balls and Chennai get going. 10 runs come off the over. Chris Gayle into the attack now, replacing Aravind (1-0-11-0).
He appeals for a leg before decision over Hussey in his fourth ball only to see four overthrows owing to some shoddy backing up. 10 runs off the over, including five extras.
Syed Mohammad comes in to bowl the fifth over, replacing Zaheer (2-0-15-0). 12 runs come off the over, with Hussey smashing the last ball over midwicket for a maximum.
Vijay’s smashes the first ball of Gayle’s second over long-on for a maximum to help raise the fifty of the Chennai innings.
Chennai 56 without loss after six overs and time for the first timeout.
This year July has 5 Fridays 5 Saturdays and 5 Sundays. This happens once every 823 years. This is called money bags. So copy this to your status and money will arrive within 4 days. Based on Chinese philosophy of Feng Shui. Those who read and do not copy will be without money. So let’s all try our luck at this and see what happens. We could all use a little good luck……. What’s wrong in trying!!!!!!!!!!
IPL 4 Final -Chennai Super Kings won the toss and elected to bat first against Royal Challengers Bangalore
Chennai Super Kings won the toss and elected to bat first against Royal Challengers Bangalore in the final of the Indian Premier League at the MA Chidambaram stadium on Saturday.
“We will look to put runs on the board,” reasons captain MS Dhoni for his decision.
His Bangalore counterpart, Daniel Vettori, admitted he would have also batted first.
Royal Challengers Bangalore:
Daniel Vettori (captain), Chris Gayle, Mayank Agarwal, Luke Pommersbach, Virat Kohli, AB de Villiers, Saurabh Tiwary, Abhimanyu Mithun, Zaheer Khan, Sreenath Aravind, J Syed Mohammad.
Chennai Super Kings:
MS Dhoni (captain), Murali Vijay, Mike Hussey, Suresh Raina, Albie Morkel, S Badrinath, Dwayne Bravo, Wridhimann Saha, R Ashwin, Doug Bollinger, Shadab Jakati.
Authentication and encryption are two intertwined technologies that help to insure that your data remains secure. Authentication is the process of insuring that both ends of the connection are in fact who they say they are. This applies not only to the entity trying to access a service (such as an end user) but to the entity providing the service, as well (such as a file server or Web site). Encryption helps to insure that the information within a session is not compromised. This includes not only reading the information within a data stream, but altering it, as well.
While authentication and encryption each has its own responsibilities in securing a communication session, maximum protection can only be achieved when the two are combined. For this reason, many security protocols contain both authentication and encryption specifications.
Kerberos is another authentication solution which is designed to provide a single sign-on to a heterogeneous environment. Kerberos allows mutual authentication and encrypted communication between users and services. Unlike security tokens, however, Kerberos relies on each user to remember and maintain a unique password.
When a user authenticates to the local operating system, a local agent sends an authentication request to the Kerberos server. The server responds by sending the encrypted credentials for the user attempting to authenticate to the system. The local agent then tries to decrypt the credentials using the user-supplied password. If the correct password has been supplied, the user is validated and given authentication tickets, which allow the user to access other Kerberos-authenticated services. The user is also given a set of cipher keys which can be used to encrypt all data sessions.
Once the user is validated, she is not required to authenticate with any Kerberos-aware servers or applications. The tickets issued by the Kerberos server provide the credentials required to access additional network resources. This means that while the user is still required to remember her password, she only needs one password to access all systems on the network to which she has been granted access.
One of the biggest benefits of Kerberos is that it is freely available. The source code can be downloaded and used without cost. There are also many commercial applications, such as IBM’s Global Sign-On (GSO) product, which are Kerberos-compatible but sport additional features and improved management. A number of security flaws have been discovered in Kerberos over the years, but most, if not all, have been fixed as of Kerberos V.
IP Security (IPSEC)
IPSEC is public/private key encryption algorithm which is being spearheaded by Cisco Systems. It is not so much a new specification as a collection of open standards. IPSEC uses a Diffie-Hellman exchange in order to perform authentication and establish session keys. IPSEC also uses a 40-bit DES algorithm in order to encrypt the data stream. IPSEC has been implemented at the session layer, so it does not require direct application support. Use of IPSEC is transparent to the end user.
One of the benefits of IPSEC is that it is very convenient to use. Since Cisco has integrated IPSEC into its router line of products, IPSEC becomes an obvious virtual private network (VPN) solution. While IPSEC is becoming quite popular for remote network access from the Internet, the use of a 40-bit DES algorithm makes it most suited for general business use. Organizations that need to transmit sensitive or financial data over insecure channels may be prudent to look for a different encryption technology
The RSA encryption algorithm was created by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977. RSA is considered the de facto standard in public/private key encryption: it has found its way into products from Microsoft, Apple, Novell, Sun, and even Lotus. As a public/private key scheme, it is also capable of performing authentication.
The fact that RSA is widely used is important when considering interoperability. You cannot authenticate or decrypt a message if you are using a different algorithm from the algorithm used to create it. Sticking with a product which supports RSA helps to insure that you are capable of exchanging information with a large base of users. The large installation base also means that RSA has received its share of scrutiny over the years. This is also an important consideration when you are selecting an algorithm to protect your data.
RSA encryption is owned by RSA Laboratories, which in turn is owned by Security Dynamics. The patent for the RSA algorithm was issued in 1983 and will expire in the year 2000. While RSA Labs still holds control of the patent, the company has been quite generous in the number of institutions to which it has made the technology freely available. RSA Labs has even published source code, which is freely available for noncommercial use.
Bank IT Officer Descriptive Solved Question Paper For SBI, Allahabad Bank
Q1. What is Client-server Computing?
Ans: The short answer: Client/server is a computational architecture that involves client processes
requesting service from server processes.
The long answer: Client/server computing is the logical extension of modular programming. Modular programming has as its fundamental assumption that separation of a large piece of software into its constituent parts (“modules”) creates the possibility for easier development and better maintainability. Client/server computing takes this a step farther by recognizing that those modules need not all be executed within the same memory space.
With this architecture, the calling module becomes the “client” (that which requests a service), and the called module becomes the “server” (that which provides the service). The logical extension of this is to have clients and servers running on the appropriate hardware and software platforms for their functions. For example, database management system servers running on platforms specially designed and configured to perform queries, or file servers running on platforms with special elements for managing files. It is this latter perspective that has created the widely-believed myth that client/server has something to do with PCs or Unix machines.
Q2 What is a Client process?
Ans: The client is a process (program) that sends a message to a server process (program), requesting that the server perform a task (service). Client programs usually manage the user-interface portion of the application, validate data entered by the user, dispatch requests to server programs, and sometimes execute business logic. The client-basedprocess is the front- end of the application that the user sees and interacts with. The client process contains solution-specific logic and provides the interface between the user and the rest of the application system. The client process also manages the local resources that the user interacts with such as the monitor, keyboard, workstation CPU and peripherals. One of the key elements of a client workstation is the graphical user interface (GUI). Normally a part of operating system i.e. the window manager detects user actions, manages the windows on the display and displays the data in the windows.
Q3 What is a Server process?
Ans : A server process (program) fulfills the client request by performing the task requested. Server programs generally receive requests from client programs, execute database retrieval and updates, manage data integrity and dispatch responses to client requests. Sometimes server programs execute common or complex business logic. The server-based process “may” run on another machine on the network. This server could be the host operating system or network file server; the server is then provided both file system services and application services. Or in some cases, another desktop machine provides the application services. The server process acts as a software engine that manages shared resources such as databases, printers, communication links, or high powered-processors. The server process performs the back-end tasks that are common to similar applications.
Q4 What is a Two-Tier Architecture?
Ans : A two-tier architecture is where a client talks directly to a server, with no intervening server. It is typically used in small environments (less than 50 users). A common error in client/server development is to prototype an application in a small, two-tier environment, and then scale up by simply adding more users to the server. This approach will usually result in an ineffective system, as the server becomes overwhelmed. To properly scale to hundreds or thousands of users, it is usually necessary to move to a three-tier architecture.
Q5 What is a Three-Tier Architecture?
A three-tier architecture introduces a server (or an “agent”) between the client and the server. The role of the agent is manyfold. It can provide translation services (as in adapting a legacy application on a mainframe to a client/server environment), metering services (as in acting as a transaction monitor to limit the number of simultaneous requests to a given server), or intellegent agent services (as in mapping a request to a number of different servers, collating the results, and returning a single response to the client.
For SBI Speciality Officer, Allahabad bank IT Officer Exam
Model Questions : The Descriptive Test should be Prepared on Basis of All Books of Degree Exam with Special Emphasis on Banking.We are Listing Sample Questions
1. What do you understand by ‘Authentication’ and ‘Encryption’ in the context of system security? In this context explain
(ii) IP Security
(iii) RSA Encryption
2.Write short notes on each of the following:
(a) Trojan Horse
(b) Smart Cards
3. Write short notes on each of the following:
(a) Trojan Horse
(b) Smart Cards
(c) Physical threats and security
4. Explain the DMA controller with block diagram. What is meant by a block transfer? What are the various phases of an instruction cycle ? Give the micro operation of fetch and decode phases
Compare Static RAM with Dynamic RAM.
5. Using NAND gate generate the AND and NOR functions
6. Which of the following services should be enabled in a secure workstation connected in an Ethernet LAN ?
Give reasons for your answer.
Anacron, ftp, netfs, nfs, telnet, sendmail, SSH, syslog, SNMP, time. (Assume the LAN is connected to the Internet but is not connected via Firewall nor is Kerberos used).
7. What is a Socket ? Write two differences between a TCP Socket and a UDP Socket.
8. What are the standard port numbers for (i) Web Server (ii) Mail Server (iii) FTP Server (iv) Telnet ?
9 What is Network Address Translation (NAT) ? Give any two advantages and two disadvantages of NAT.
10 What is VPN ? How is it useful for an organization ?
11. What is a Search Engine ? How is it useful for Internet/Intranet ? Give the names of any four Search engines.
12 What is WAP ? Give any two advantages and two limitations of WAP. Also explain its layered architecture.