Thursday, August 30, 2012

How to speed up your PC.


sometime our PC become too slow to respond any command, there are several reason of being slow, like not enough space, ram issue, virtual memory issue,indexing, and many other. The frequent issue is space issue. Our window keep history of open program, indexing ,cookies information, many more.There are several way to optimize your system, privacy and cleaning. To removes unused files from your system and allowing Windows to run faster and freeing up hard disk space and  makes your computer faster.You can clean by manually or you can use  available most popular cleaner "cleaners",you can download it from here LINK.

To speed up your PC than past, follow the below processes:
  • Go to run --> type recent  --> Ctrl A --> Ctrl D  --> ok
  • Go to run --> type temp  -->Ctrl A-->Ctrl D  --> ok
  • Go to run --> type %temp%  -->  Ctrl A --> Ctrl D --> ok
  • Go to run --> type prefetch -->  Ctrl A -->  Ctrl D --> ok
  • Go to run --> type tree --> ok
  • Go to run --> type cookies -->Ctrl A --> Ctrl D --> ok

Speed/Boostup up your internet speed up to 20%


Microsoft reserves 20% of your available bandwidth for their own purpose like Windows Update and interrogating your PC etc.But you can get it back easily by following procedures.

First go to Start/Run and type gpedit.msc.Then press enter and you will see the Group policy editor.

Now follow these steps.
 
 Local Computer Policy --> Computer Configuration --> Administrative Templates -- > Network --> QOS Pocket Scheduler --> Limit Reservable Bandwidth.
 
internet-speed
 
Double click in Limit Reservable Bandwidth.It will say that it is not configured,but the truth is under the Explain tab that is by default the Pocket Scheduler limits the system to 20%  of the bandwidth of a connection. But you can use this setting by override the default.
So the trick is to Enable
reservable bandwidth ,then set it to 0.This will allow the system to reserve nothing,rather than the default 20%.
After doing all of this,Restart computer.It works on Windows 7.

Wednesday, August 29, 2012

How to remove window is not genuine water mark and make window as genuine.



Remove Windows Not Genuine Watermark:

Here is an simple way u can make your windows 7 genuine. No need to use and third party patches or cracks. Just a simple way. But you can use this method for a maximum period of 3 times.
"If you have exceeded the maximum allowed rearm, please read the last section of this post on how to modify the registry to rearm again."
Well, lets see how to Remove Windows Not Genuine Watermark. Before  you continue , please make sure you have administration rights on the Windows 7 machine which you want to make genuine.

The following steps will help you to the Remove Windows Not Genuine Watermark .
  1. Click Start and type cmd in start menu search box 
  2. Right click the cmd.exe and choose run as administrator
  3. Now Now in the command prompt window, type slmgr -rearm and press enter Restart your system.
  4. Try to restart your system twice.

What you have to realize is that if you apply this fix to Remove Windows Not Genuine Watermark, it will rearm the system for another 30 days, up to a maximum of 3 times.
"If you apply the fix after you lose your background (ie your desktop wallpaper background goes black, and you get the notification at the bottom right of the screen), you need to first uninstall the kb971033 update, then apply the fix. It will then be a PERMANENT fix. If you’re running a Remove WAT program, WAT needs to be restored first. Never mind WAT, if you have no idea about that. You can still Remove Windows Not Genuine Watermark using this fix."

Exceeded the maximum allowed rearm?

Chances are there that in case if you have exceeded the maximum (3) allowed rearm when trying to Remove Windows Not Genuine Watermark, the following method will help you to fix.
If you have exceeded the maximum allowed rearm, you will get an error message just like this,
” Error: 0xC004D307 The maximum allowed number of re-arms has been exceeded. You must re-install the OS before trying to re-arm again “
Well, here is a fix for that, Just do:
Locate the following in your Windows Registry,
  • [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionSoftwareProtectionPlatform]
  • “SkipRearm”=dword:00000000
After your 3rd reset this key will be 00000000 – simply change it to 00000001

If you have any problem, please leave your query as comment below. Hope you can able to Remove Windows Not Genuine Watermark on your PC.

 

 

 

How to increase speed of copy-paste in Pen-drive


So time we found the copy/ paste to external drive is too slow in windows.To increase the speed of data transfer between computer to external drive we use various software to increase the speed of copy paste.But you can do that without using any software.Just you have to follow the below steps.
So Follow the below instructions:


 My computer --> Properties --> Hardware --> Device manager -->double click to Communication Port(COM1) from ports --> Port settings --> Bits per second:128000 --> select Flow Control -->Hardware --> OK
com setting






My computer --> Properties --> Device manager -->double click to Communication Port(COM1) from ports --> Port settings --> Bits per second:128000 --> select Flow Control -->Hardware --> OK

com port

Now check the speed of copy-paste.

Sunday, August 26, 2012

How to lock your folder in window.



Some times we need to lock ours folder in window to have privacy/security with our folder.Window xp haven't  such functionality, but in window 7 you can lock your whole drive.Most of us used to hide folder in window.But if you need to lock your particular folder which you don't want to be access by other person, here is the very simple way to lock your folder in window.It will ask the given password at time of access..You don't have to download any software to lock your folder.


**********************************************************************************

cls

@ECHO OFF

title Folder Locker

if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK

if NOT EXIST Locker goto MDLOCKER

:CONFIRM

echo Are you sure u want to Lock the folder(Y/N)

set/p "cho=>"

if %cho%==Y goto LOCK

if %cho%==y goto LOCK

if %cho%==n goto END

if %cho%==N goto END

echo Invalid choice.

goto CONFIRM

:LOCK

ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

echo Folder locked

goto End

:UNLOCK

echo Enter password to Unlock folder

set/p "pass=>"

if NOT %pass%== type your password here goto FAIL

attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker

echo Folder Unlocked successfully

goto End

:FAIL

echo Invalid password

goto end

:MDLOCKER

md Locker

echo Locker created successfully

goto End

:End



**********************************************************************************

1. Firstly open a notepad and then put code in notepad.
2. You will find “type your password here” in that code (Without quotes) so just write your password in place of “type your password here” (Without quotes)
3. Save this notepad as Locker.bat anywhere you wish
4. Then double click on Locker.bat.
5. When you double click on this it will create ‘Locker’ folder automatically, After creating of this folder place the contents you want to lock inside the Locker Folder and run locker.bat again, So it will ask to lock this folder… So just type “y” (without quotes) then press enter. Your folder get disappeared that means you locked your folder. No one can see your files of your locked folder.
6. Now if you want to unlock folder then again double click on Locker.bat, It will ask your password so just enter password and then press enter, your folder get appeared.
7. If you have any problems with this then write your problem in comments. I will try to solve your problem.



Saturday, August 25, 2012

Most frequently asked data structure interview question.

                                            

                                             PART-2                                                  

 21.  In the given binary tree, using array you can store the node 4 at which location?



 















At location 6

                       
1
2
3
-
-
4
-
-
5
                       
Root
LC1
RC1
LC2
RC2
LC3
RC3
LC4
RC4

where LCn means Left Child of node n and RCn means Right Child  of node n

22. Sort the given values using Quick Sort?

           
65
70
75
80
85
60
55
50
45

            Sorting takes place from the pivot value, which is the first value of the given elements, this is marked bold. The values at the left pointer and right pointer are indicated using L and R respectively.    

65
70L
75
80
85
60
55
50
45R

Since pivot is not yet changed the same process is continued after interchanging the values at L and R positions

65
45
75 L
80
85
60
55
50 R
70
                       
65
45
50
80 L
85
60
55 R
75
70

65
45
50
55
85 L
60 R
80
75
70


65
45
50
55
60 R
85 L
80
75
70
                       
When the L and R pointers cross each other the pivot value is interchanged with the value at right pointer. If the pivot is changed it means that the pivot has occupied its original position in the sorted order (shown in bold italics) and hence two different arrays are formed, one from start of the original array to the pivot position-1 and the other from pivot position+1 to end.

60 L
45
50
55 R
65
85 L
80
75
70 R

55 L
45
50 R
60
65
70 R
80 L
75
85

50 L
45 R
55
60
65
70
80 L
75 R
85

In the next pass we get the sorted form of the array.

45
50
55
60
65
70
75
80
85


23. For the given graph, draw the DFS and BFS?
           


 














BFS:     A X G H P E M Y J

DFS:    A X H P E Y M J G

24. Classify the Hashing Functions based on the various methods by which the key value is found.
Direct method,
·         Subtraction method,
·         Modulo-Division method,
·         Digit-Extraction method,
·         Mid-Square method,
·         Folding method,
·         Pseudo-random method.         

25. What are the types of Collision Resolution Techniques and the methods used in each of the type?
·         Open addressing (closed hashing),
·         The methods used include:
·         Overflow block,
·         Closed addressing (open hashing)
·         The methods used include:
·         Linked list,
·         Binary tree…

25. In RDBMS, what is the efficient data structure used in the internal storage representation?
            B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching easier. This corresponds to the records that shall be stored in leaf nodes.   

26. Draw the B-tree of order 3 created by inserting the following data arriving in sequence – 92  24  6  7  11  8  22  4  5  16  19  20  78


 













27. Of the following tree structure, which is, efficient considering space and time complexities?
·         Incomplete Binary Tree
·         Complete Binary Tree     
·         Full Binary Tree

ANSWER:

            (b) Complete Binary Tree.

Explanation:

By the method of elimination:
Full binary tree loses its nature when operations of insertions and deletions are done. For incomplete binary trees, extra storage is required and overhead of NULL node checking takes place. So complete binary tree is the better one since the property of complete binary tree is maintained even after operations like additions and deletions are done on it. 


28. What is a spanning Tree?
            A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree once. A minimum spanning tree is a spanning tree organized so that the total edge weight between nodes is minimized.

29. Does the minimum spanning tree of a graph give the shortest distance between any 2 specified nodes?
ANSWER:      
No.
 Minimal spanning tree assures that the total weight of the tree is kept at its minimum. But it doesn’t mean that the distance between any two nodes involved in the minimum-spanning tree is minimum.

30. Convert the given graph with weighted edges to minimal spanning tree.
           



 

           








the equivalent minimal spanning tree is:
31. Which is the simplest file structure?
·         Sequential
·         Indexed
·         Random

ANSWER:

 Sequential

32. Whether Linked List is linear or Non-linear data structure?
            According to Access strategies Linked list is a linear one.
            According to Storage Linked List is a Non-linear one.

33. Draw a binary Tree for the expression:

            A * B - (C + D) * (P / Q)


 



















34. For the following COBOL code, draw the Binary tree?

01 STUDENT_REC.
     02 NAME.
          03 FIRST_NAME PIC X(10).
                03 LAST_NAME PIC X(10).
           
            02 YEAR_OF_STUDY.
                03 FIRST_SEM PIC XX.
                03 SECOND_SEM PIC XX.