Sie sind auf Seite 1von 84

Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

ACE SPEAKS...

*.ace
ACE’09 feels very happy to place this yearly book SYNTAX’09 in the hands of its
well-wishers, faculty, friends and supporters.
In order to cope with today’s competition each and every student should be
aware of the happenings all around the world. To achieve this, the Department of
Computer Science and Engineering provides an excellent platform for all the students
in the form of its annual magazine SYNTAX. This book covers a wide range of topics
which are informative and thought provoking.
ACE’09 has tried its level best in meeting the standards set by the department
and ACE’08.
ACE’09 is very thankful to the faculty members for the blessings and guidance
through out the designing of this book. ACE’09 is foreever thankful for the support and
encouragement from seniors,friends and juniors.
Last but not the least, ACE’09 thanks all the article contributors, volunteers,
coordinators and most appropriately all the generous hearts, without whose support,
this monumental work could not happen. This little idea of magazine became a reality
only due to the enthusiastic response from the students.
As a team, ACE’09 dedicates SYNTAX’09 to the well wishing and beloved seniors of
2005-2009 batch who have been the strength and are part of its plans and actions, guiding
through out their times with us. ACE expects the same cooperation and support from
them through out their lives. All the best...

ACE’09

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

INDEX

*.index
Messages............................................................................................................7-13
About Department................................................................................................15
Body of ACE..........................................................................................................17
Placements...........................................................................................................19
GRE scores...........................................................................................................20
E-mail ids.............................................................................................................21-26

*.tech

Web mining..........................................................................................................29
Quantum computer..............................................................................................29
Spamming............................................................................................................30
Phishing...............................................................................................................31
Ambient Intelligence............................................................................................31
Ajax......................................................................................................................32
Blue Gene.............................................................................................................32
5 worst computer viruses of all time....................................................................33
Computer worm....................................................................................................33
Captcha................................................................................................................34
Types of Computer crimes..................................................................................35
Know them Better.................................................................................................36
Laser Keyboard.....................................................................................................36
Touch Screen........................................................................................................37
Virtualisation........................................................................................................38
3G wireless technology........................................................................................38
Semantic web.......................................................................................................39
Software as a Service...........................................................................................40
Give me a Ring.....................................................................................................42
Wanna be a gamer?.............................................................................................42
Virtual fence for vehicles.....................................................................................43
Mobile computing................................................................................................44
Gate Keeper Pico..................................................................................................45
Cloud Computing..................................................................................................46
Is Internet explorer only your cup of tea?............................................................47
Android.................................................................................................................48
Transferjet............................................................................................................50
The world’s premier technology competition for students..................................51
Computer scientists.............................................................................................52

Computer Science and Engineering Syntax’09


Bapatla Engineering College

*.lit

Bio data of computers..........................................................................................55


Strange warnings..................................................................................................55
If............................................................................................................................55
Room mates.........................................................................................................55
Funny Definitions..................................................................................................56
Is windows a virus?..............................................................................................57
it’s a mistake........................................................................................................57
Mother..................................................................................................................58
Good Thoughts.....................................................................................................58
Technology-Mythology.........................................................................................58
Funny Acronyms...................................................................................................59
Foot prints............................................................................................................59
Symbols poem......................................................................................................59
HRD notice...........................................................................................................60
Love on screen.....................................................................................................61
Thank you.............................................................................................................61
In search of my friend..........................................................................................61
Solution.................................................................................................................61
Educational institutions........................................................................................62
What’s life?..........................................................................................................62
Luck......................................................................................................................62
Peace....................................................................................................................62
Light......................................................................................................................62
Ramayana by Bill Gates.......................................................................................63
Conversation between customer and UNIX consultant........................................64
Success.................................................................................................................64
Computer history of theworld..............................................................................65
Error codes in Windows.......................................................................................66
Have fun...............................................................................................................67
Sneham.................................................................................................................68
Udhayam..............................................................................................................68
Sthree...................................................................................................................68
Chaduvu................................................................................................................68
Twinkle Twinkle little star in Telangana style......................................................69
4 Golden Rules.....................................................................................................69
4 Golden possessions...........................................................................................69
Cricket examinations............................................................................................69
Muskurana............................................................................................................69
Drawings...............................................................................................................70-75
Tips before planning abroad................................................................................76

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

MESSAGE FROM THE PRESIDENT’S DESK

*.msg
Sri M.Seshagiri Rao,
President,
Bapatla Educational Society,
Bapatla.

Message

My wishes to the students of the Department of Computer science on the release of the 4thedition
of their departmental magazine Syntax. Departmental magazines strive to bring awareness among the
students with its technical and literal contents.
I am elated to note that departmental association (ASSOCIATION OF COMPUTER ENGINEERS) is
formed every year for organizing vaious technical and literal activities in the department. Such events will
help the students in building their personality, developing their attitude, enhancing their communication
skills, thus allowing them to face the global competition and to become leaders.
I wish the CSE association every success in efforts to bring out inherent talents of students. I
appreciate the editors for their commendable work. My best wishes for all the graduating students.

(M.Seshagiri Rao)

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

MESSAGE FROM PRINCIPAL DESK

*.msg
Dr. G.Nageswara Rao, Ph.D
Principal,
Bapatla Engineering College,
Bapatla.

Message

It is indeed great pleasure to note that the Department of CSE is releasing its 4th edition
of the annual magazine Syntax which briefs the activities of the Association. The magazine aims at
bringing the hidden talents of the students of the department.
There are lots of advancements taking place in various technologies at rapid pace. It takes
longer time to get these covered in regular curriculum. It is important to catch up with these advance-
ments at least briefly by putting some additional efforts. The Departmental Associations can play an
important role in bringing out the latest developments by way of articles in magazine, organizing short
seminars etc.; It gives a very good quick insight into these developments.
I wish the Association all the best and I hope that many good activities will be taken up by the
Association in future also for the benefit of the students.

(Dr. G.Nageswara Rao)

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

MESSAGE FROM HEAD OF THE DEPARTMENT

*.msg
Prof. N.Sudhakar, M.Tech,
Head of the Department,
Department of Computer Science and Engineering,
Bapatla Engineering College,
Bapatla.

Message

Engineering is the discipline and profession of applying natural laws to design systems
that work for the cause of mankind. A critical aspect of this (often ignored) is to engineer an optimized
system that satiates and respects conflicting constraints. Indispensably, an engineering pupil is to be
adept at an assorted skill set, preserving academic excellence concurrently.

I regard magazine club as a staging area where a pupil can sharpen the skills of designing, writing,
compiling, optimizing and communicating. I found a great deal of character in the activity team of the
college magazine and the efforts put in deserve plaudit. I claim with pride that I am a part of this
magazine, observing them all through.

I wish that more activities would be rolled in the ensuing time with the same spirit. I appeal to the
students and faculty of the department to be committed beyond the self, to accomplish, and to perpetuate
a congenial and serene academic aura.

An old adage says, “Ability is what you’re capable of doing. Motivation determines what you do.
Attitude determines how well you do it”.

(Prof. N.Sudhakar)

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

MESSAGE FROM THE COORDINATOR-ACE09

*.msg
Prof. V.Chakradhar, M.Tech,
Department of Computer Science and Engineering,
Bapatla Engineering college,
Bapatla.

Message

Time and tide wait for none. As today’s competitive world is moving at its full pace, maintaing
time as per schedule is the need of the hour. Through the magazine I would like to convey to all the
students “to plan, prioritize and implement” their schedule on time.
Think big. Dream big. Thinking in a broder perspective is the way of approaching and solving
problems. Dream is not the one which comes in sleep. Dream is the one which does not make us sleep.
(At the same time dont sleep for long times in order to get big dreams).
Extra-curricular activities are equally important to the students along with the technical knowledge
because they help in changing the approach of students and to visualize the problems from a different
angle. I wish the association to continue the extra-curricular activities which are a part of department’s
schedule.
It is very glad to note that the association has maintained the standards set by the department
and their seniors. I wish the association the best in all its activities.

(Prof. V.Chakradhar)

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

ABOUT DEPARTMENT...

*.dept
The Department of Computer Science and Engineering was started in 1994-95. The Department
offers B.Tech and M.Tech programs in the stream of Computer Science & Engineering.The Department
is accredited twice by NBA.
The department is equipped with the state of the art computing facilities, LCD projectors in all
class rooms, experienced staff members and is known for its academic excellence proved by its
performances since its inception.
The pass percentage of the department has been more than 97% and more than 50% of the
students obtain distinction every year, which speaks of the academic fervour in the department. The
department holds the reputation of getting competitive GATE every year, and the students got admitted in
all the IIT’s IISc, Central Univeristy, University of Roorkee and many Regional Engineering Colleges in
M.Tech and M.S. Programs. A good number of students from the department obtained admissions into
M.S.(Computer Science) Program abroad .
Many of the students were placed in reputed organizations like HP, Texas Instruments, Motorola,
Lucent, Wipro, HCL, Siemens, Veritas, Oracle, Hoenywell, Mindtree Solutions, Infosys, Aztec in challenging
positions.Students are encouraged to participate in extra-curricular activities and competitions held by
other universities and colleges within the state and out-side the state. The students have won laurels to
the college winning prizes in competitions – TECHFEST IIT-Bombay, INFLUX: University of Roorkee and
many others. A good number of students from the department represent the college in IIT-M’S SHAASTRA,
SAARANG and BITS-QUARK festivals on a regular basis.
The department strives hard to impart quality education and to keep the students on the competitive
edge of the present-day technology.

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

BODY OF ACE’09

FROM THIRD YEAR

*.body
V.A.NAVEESHA
T.T.DEEPTHI
R.KAANTHI KEERTHI
S.KAVYA
K.MOUNIKA
D.ABHIRAM
K.AVINASH
B.G.K.VARMA
K.GANESH KUMAR
G.HARI KRISHNA
R.MAHENDRA SINGH
M.N.V.V.RAMESH
B.N.SANDEEP
R.PRAVEEN
P.R.CHAITHANYA SIDDHARTHA
D.PRAVALLIKA
T.S.RAMYA KRISHNA
N.RAMYA
G.S.R.JYOTHI
R.RAMA KRISHNA

FROM SECOND YEAR

M.NAGA JYOTHI
K.ASHA JYOTHI
A.SNEHA
K.DINESH
T.V.K.CHAITANYA

STAFF COORDINATOR

Prof. V.CHAKRADHAR

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

PLACEMENTS FOR THE ACADEMIC YEAR 2008-2009

*.job
The following is the list of students who are placed in various multinational companies for the current
academic year under the esteemed guidence of the placement incharge of the department
Mr.Sajid Ali Ansari.

TATA CONSULTANCY
SERVICES

1 K. Anusha
2 P. Anusha
3 D. Bhavya INFOSYS
4 M. Lakshmi Harika
5 K. Amarendra
6 P. Gopal Krisna Murthy 1 P. Bhargavi
7 G. Gautham 2 K. H. N. V. Vijay VIRTUSA
8 K. H. N. V .Vijay 3 J. Sravya
9 P. Kishore Kumar 4 Shaik Rizwan
10 Ch Ravi Teja 5 N .Siva Ram Krishna 1 Y.Teja
11 C. T . V. Neelima 6 SK Rizwan Basha
12 G. Rajani 7 G. Srihari
13 B. Srividya 8 P. Sunil Kumar
14 Shaik Rizwan 9 B. Vinod Kumar
15 M. Sri Ram Avinash 10 Jahid Shaik
16 T. V. N. Siva Kumar 11 Ch Naga Kishore
17 P. Vedavyas
18 M. V. Sumanth
19 B. Vinod Kumar
20 P. Swetha Mourya

Computer Science and Engineering Syntax’09


Bapatla Engineering College

STUDENTS WHO SECURED RANKS IN GATE-2008

S.No. Name of the student All India Rank Percentile

1 S. Sirisha 442 97.50


2 N. Tulasiram 478 97.29
3 P.S.Srikanth 1335 92.44
4 Sk. Fathima Sultana 1748 90.12
5 Chennaiah 2147 87.91
6 K. Sudha 2285 87.29
7 K. Lakshmana Rao 2285 87.19
8 K. Ravindra Babu 8646 51.19
9 E. Jhansi Rani 9704 45.89
10 K. Pushpavani 10,219 43.02

GRE-TOFEL - 2008
S.No. Name of the student GRE TOFEL

1. D. Bindu Chowdary 1040 —


2. D. Haritha 1080 —
3. CH. Divya 1000 —
4. M.Goutham 980 —
5. P. Lakshmi Kanth 1110 80
6. M. Bala Krishna 860 —
7. T. Lakshmi 1000 —
8. B.V.L.Alekhya 1050 —
9. H. Vasundara Sonali 1080 —
10. S.Vamsi Krishna 1183 —
11. K. Tapaswi 1000 —
12. P.S.Pavana Kumari 1120 —
13. M. Naga Jyothi 1100 83
14. Y. Chiranjeevi 1000 86
15. T. Chaitanya Babu 960 —

UNIVERSITY RANKS FOR 2007-08


REG.NO Name of the student Rank
Y4CS476 N. Tulasi Ram II
Y4CS477 B.V.N.S. Bhavani Prasad III
Y4CS486 M.V.Sudheer Chandra IV
Y4CS464 S. Sirisha VIII
Y4CS418 D. Haritha IX

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

e-mail ID’s OF 2005-2009 Batch

Rno RegdNo Name e-mail ID

1 Y5CS403 Anusha.K anusha.kasa@gmail.com

*.id
2 Y5CS404 Anusha.P anu.paduchuri@gmail.com
3 Y5CS413 Bhargavi.P bhargavi_p_cse@yahoo.co.in
4 Y5CS414 Bhavya.D bhavya_414@yahoo.co.in
5 Y5CS417 Dakshayani.Ch ch.dakshayani@yahoo.com
6 Y3CS419 Harika.Ch chitturiharika@gmail.com
7 Y5CS426 Kavitha.J kavithajangam@gmail.com
8 Y5CS429 Lakshmi Harika.M cse.harika@gmail.com
9 Y5CS430 Lakshmi Prasanna.K prasannakaja@gmail.com
10 Y5CS434 Maheswari.K maheswari_macharla@yahoo.com
11 Y5CS436 Mercy kumari.A a.mercykumari@gmail.com
12 Y5CS438 Mrudula.M mamillapallimrudula@gmail.com
14 Y5CS443 Navya.S navya.5257@gmail.com
16 Y5CS402 Amarendra.K amar_cse_bec@yahoo.co.in
17 Y5CS405 Aravind Kumar.P aravind_kumar_p11@yahoo.com
18 Y5CS406 Arun Babu.K arunbabu_karumanchi@yahoo.co.in
19 Y5CS407 Arun Kumar.G gaarun_407@yahoo.com
20 Y5CS408 Avinash.M avinashmandru@yahoo.com
21 Y5CS410 Bala Krishna.A alla.balakrishna@gmail.com
22 Y5CS411 Bala Krishna.V balakrishna_vallurupalli@yahoo.co.in
23 Y5CS412 Bharath.M bharathmedabalimi@gmail.com
24 Y5CS416 Chiranjeevi.S chiranjeevi416@gmail.com
25 Y5CS418 Deva Prasad.A devdaa@gmail.com
26 Y5CS419 Gopala Krishna Murthy.P cse.gopal16@gmail.com
27 Y5CS420 Gautham.G gauthamraaz@gmail.com
28 Y5CS425 Naga Venkata.Vijay.K.H vijaykhnv@gmail.com
29 Y5CS421 Harish.N harish_myedu@yahoo.com
30 Y5CS422 Hemanth.J hemanth422@gmail.com
31 Y5CS423 Hemanth Reddy.B hemanthreddy.bhavaram@yahoo.com
32 Y5CS424 Jahid.Sk jahid_424@yahoo.com
33 Y5CS427 Kishore Kumar.P kkreddy.427@gmail.com
34 Y5CS428 Krishna Reddy.Y ykreddy09@gmail.com
35 Y5CS432 Madusudhana Rao.Ch madhuram.ch@gmail.com
36 Y5CS433 Mahesh.G garapatiMahesh99@yahoo.co.in
37 Y5CS435 Manohara Reddy.D manu.duvvuru@gmail.com
38 Y5CS437 Moulali.Sk moulali.437@gmail.com
39 Y5CS439 Munesh Kumar.P muneshkumar.p@gmail.com
40 Y5CS440 Naga Kishore.Ch kishore_naga_cse@yahoo.com

Computer Science and Engineering Syntax’09


Bapatla Engineering College

41 Y5CS445 Phani Kumar.Ch phani_chilakapati@yahoo.com


42 Y5CS446 Phani Kumar.G gollapudiphanikumar@gmail.com
43 Y5CS447 Prabhakar Rao.M surya.prabhakar@yahoo.com
44 Y5CS449 Praveen Kumar.B praveenkumarboyapati@gmail.com
45 Y5CS451 Rajesh Babu.K rajeshbabu_kurra@yahoo.com
46 Y5CS453 Ravi Teja.Ch chappidiraviteja@gmail.com
47 Y5CS454 Ravi Teja Reddy.S teja.sanivarapu@gmail.com
48 Y4CS451 Arun Chowdary.S.K.V arunchowdary_Jag@yahoo.com
49 Y5CS415 Chandra Karthik.G gaddechandrakarthik@gmail.com
50 Y4CS457 Sandesh Kumar.G sandesh457@gmail.com
51 L6CS493 Hima Bindu Ch hima_chava22@yahoo.co.in
52 L6CS494 Jhansi Lakshmi S janu_stanam22@yahoo.com
53 Y4CS423 Kalyani Geetha P geetha_rainbow@gmail.com
54 Y5CS431 Loka Pavani P pavanipriya.cse@gmail.com
55 L6CS496 Meghana K kesamnenimeghana@gmail.com
56 L6CS497 Naseema Sk naseema.cse@gmail.com
57 Y5CS444 Neelima C.T.V tulasi_neelima@yahoo.co.in
58 Y3CS450 Neethi Princes T neena_tnl@yahoo.com
59 Y5CS450 Rajani.G gottipati.rajani@gmail.com
60 Y5CS455 Revathi.M myla.revathi@gmail.com
61 Y5CS458 Ruksana Begam.M ruksana.mogal@rediffmail.com
62 Y5CS464 Santhi Sree.K santhi.koganti@gmail.com
63 Y5CS465 Sathya Gowri.B satyagowri_b@yahoo.co.in
64 Y5CS469 Sravya.J sravya.sac@gmail.com
65 Y5CS479 Srividya.B bodduluri.srividya@gmail.com
66 Y5CS483 Sushma.T sushma.t@gmail.com
67 Y5CS484 Swetha Mourya.P swetha_popuri@yahoo.co.in
68 Y5CS485 Teja.Y teja_yenduri@yahoo.co.in
69 L6CS492 Raghavulu.A.S.V shanraghava@gmail.com
70 Y4CS409 Chennaiah.K chennaiah_kate@yahoo.com
71 L6CS495 Kalyan Kumar.D kalyan_many@yahoo.c
72 L6CS498 Ramakrishna.M ramakrishna_bec@yahoo.co.in
73 L6CS499 Ravi Kumar.M kumar.20072007@gmail.com
74 Y5CS456 Rizwan.Sk rizevolution@gmail.com
75 Y5CS457 Rizwan Basha.Sk superrizwan@gmail.com
76 Y1CS450 Roshan Kumar.V roshan4linux@gmail.com
77 Y5CS460 Sai Ganesh.S saiganesh.sw@gmail.com
78 Y5CS461 Sai Pavan.P saicse461@gmail.com
79 Y5CS462 Sandeep Kumar.S sandeepbeccse@gmail.com
80 Y5CS466 Siddhartha.M siddhartha_mattegunta@yahoo.com
81 Y5CS467 Siva Rama Krishna.N cvaram.cse@gmail.com
82 Y5CS468 Siva Prasad.N sivaprasad.nasika@yahoo.com
83 Y4CS467 Sravan Gaddam sravan.050686@gmail.com

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

84 Y5CS470 Sreehari.G geda_sreehari@yahoo.com


85 Y5CS472 Sri harsha.D sleepingsri@gmail.com
86 Y5CS471 Srikanth.R srikanth.raminenis@gmail.com
87 Y5CS475 Srinivas.K srinivas_korlimarla@yahoo.co.in
88 Y5CS476 Srinivasa Rao.B srinucse2009@gmail.com
89 Y5CS477 Srinu.P srinupallapati2005@gmail.com

*.id
90 Y5CS478 Sri Ram Avinash.M sriram.avinash@gmail.com
91 Y5CS480 Sumanth.M sumanthmakkapati@yahoo.com
92 Y5CS481 Sundar.V sundar.cse123@yahoo.co.in
93 Y5CS463 Sundeep.N narnesundeep@gmail.com
94 Y5CS482 Sunil Kumar.P csesunil.36@gmail.com
95 L6CS500 UmaMaheswara Rao.B umamahesh9954@yahoo.com
96 Y5CS486 Siva Kumar .T.V.N t.v.n.shivakumar@gmail.com
97 Y5CS409 Datta Pavan .B.V.S.N pavan.batte@gmail.com
98 Y5CS487 Veda Vyas.P vyas.cse@gmail.com
99 Y5CS488 Veeraiah Chowdary.K bittukvc@gmail.com
100 Y5CS401 Phani Kumar.A.V phaniav.cse@gmail.com
101 Y5CS489 Venkata Sumanth.M sumanth111@gmail.com
102 Y1CS483 Venu Babu.N nvenu8074@yahoo.co.in
103 Y5CS490 Vinod Kumar.B vinodkumar_edu@yahoo.com
104 Y5CS491 Yatish.T yatishtedla@gmail.com
105 Y5CS448 Pravallika.M pravallikadevanand@yahoo.com
106 Y4CS473 Sujith Kumar.R sujithkravuri@gmail.com
107 Y3CS484 Ratna Sekhar.V
108 Y3CS448 Naveen Kumar.T naveen.ns123@gmail.com
109 Y3CS453 Priscilla.J sunny_110586@yahoo.co.in
110 Y5CS452 Ravi Kiran.M
111 Y4CS401 Adilakshmi.Y graceatkotha07@yahoo.com
112 Y2CS409 Chinni Babu rayapudi.chinni.chinni@gmail.com
113 Y2CS430 Nageswara Rao nageswararoa@gmail.com
114 Y4CS491 Vineeth Krishna.G vinuth_gudur@rediffmail.com
115 Y4CS458 Sasi Kumar.T tumati_sasichowdary@yahoo.co.in

BATCH ID:csehub2k9@yahoo.com

Computer Science and Engineering Syntax’09


Bapatla Engineering College

e-mail ID‘s OF 2006-2010 BATCH


Rno REGNo Name e-Mail ID

1 Y6CS403 Alekhya G gantaalekhya@gmail.com


2 Y6CS406 Anisha N nagalla.anisha1989@gmail.com
3 Y6CS409 Anuradha naveesha.vanka@gmail.com
4 Y6CS410 Aruna Sree.T thorati.arunasree@gmail.com
5 Y6CS412 Bhagya Prathyusha bhagya_kattupalli@yahoo.co.in
6 Y6CS414 Deepthi.A deepthi.aremanda@yahoo.co.in
7 Y6CS415 Deepthi.T tallapaneni.deepthi@gmail.com
8 Y6CS426 Kaanthi.R kaanthikeerthi@gmail.com
9 L7CS525 Kalyani.B kalayani.boyina@gmail.com
10 Y6CS427 Kanaka Durga.B durga.bommu@gmail.com
11 Y6CS429 Kavya.S sakhamuri.kavya@gmail.com
12 Y6CS432 Prasanna.L palaparthi.prassnna@gmail.com
13 Y6CS433 Lakshmi Devi.Y yakkala.lakshmi@gmail.com
14 Y6CS434 Lakshmi lkshm+rp+hmm@gmail.com
15 Y6CS435 Lalitha lalitha_joy1234@yahoo.com
16 Y6CS439 Manasa.G guthikonda@yahoo.co.in
17 Y6CS441 Maruthi Devi.K maruthi_devi@yahoo.com
18 Y6CS442 Mounika.K mounika.kommuri@gmail.com
19 Y6CS453 Pavani.P pavanipuli@gmail.com
20 Y6CS456 Prathyusha prathyusha.456@gmail.com
21 Y6CS457 Pravallika.C chedella.pravallika@gmail.com
22 L7CS532 Swathi.Y swathi_yerramaneni@yahoo.co.in
23 Y6CS401 Abhiram.D
24 Y6CS402 Abhishek.B abhishek.b007@gmail.com
25 Y6CS404 Alif Basha.Sk anil-1109@yahoo.co.in
26 Y6CS405 Anil Kumar anil.jeeva007@gmail.com
27 Y6CS407 Anjani Sandeep anjani_sandeep@yahoo.co.in
28 Y6CS408 Anudeep Naidu.G ganueep123@gmail.com
29 Y6CS411 Avinash.K avinash.avi0610-@gmail.com
30 Y6CS413 Balaji Komal.T.C charanbalajikomal@gmail.com
31 Y6CS416 Varma.B.G.K bgkv29@gmail.com
32 Y6CS417 Manikanta.B.V.G.N ganesh_manikanta@yahoo.com
33 Y6CS418 Ganesh Kumar.K ganeshkumarkorada@gmail.com
34 Y6CS419 Gopal Krishna.C gopal.chimpudi@gmail.com
35 Y6CS420 Hari Krishna.G goli.harikrishna@gmail.com
36 Y6CS421 Harish.P harish.poranki@gmail.com
37 Y6CS422 Himavanth hima_momi@yahoo.com
38 Y6CS428 Kasirao.V kasi428@gmail.com
39 Y6CS430 Kiran Kumar.S
40 L7CS526 Sundraraju.M sundraraju@gmail.com

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

41 Y6CS436 Madhava.V vemuri_madhava@yahoo.co.in


42 Y6CS437 Madhu Babu creator437@gmail.com
43 Y6CS438 Mahendra Singh Rathore mahendra_rathore@live.com
44 Y6CS440 Manthru Naik manthru440@yahoo.com
45 Y6CS443 Sudheer.G.M gmsudheer@gmail.com
46 Y6CS445 Ramesh.M.N.V.V rameshmatamsetty@gmail.com

*.id
47 Y6CS446 Sandeep.B.N sandeepnaga2000@gmail.com
48 Y6CS447 Nagarjuna Reddy.V vnagarjunareddy_prem@yahoo.co.in
49 Y6CS448 Naresh Babu.K naresh_chinna3838@yahoo.co.in
50 Y6CS449 Nareshbabu.M nareshbabu_ongole@yahoo.com
51 Y6CS451 Naveen Kumar naveencse@yahoo.com
52 Y6CS452 Naveen Sagar naveensagar019@gmail.com
53 Y6CS454 Phani Kumar phanishines@gmail.com
54 Y6CS460 Praveen.R praveenr019@gmail.com
55 Y6CS461 Praveen.T praveencse23@yahoo.co.in
56 Y6CS462 Siddhartha.P.R.C siddu_7pasala462@yahoo.co.in
57 Y6CS463 Raghavendra.I abc_raghav@yahoo.co.in
58 Y6CS464 Raghavendra Raja raghavendra2raja@yahoo.co.in
59 Y6CS465 Raghu.K raghukandru@gmail.com
60 L7CS529 Rambabu.R rambabu.ramineni@gmail.com
61 L7CS530 Sesha Sai.M sai.seshachan@gmail.com
62 Y6CS424 Jaya Krishna manam.jayakrishna@yahoo.com
63 Y6CS431 Krishnaveni.M krishnaveni.manne@gmail.com
64 Y6CS444 Teja Dev.N teja_nag2000@yahoo.com
71 Y6CS458 Pravallika.D pravallika_dintakurthi@yahoo.co.in
72 Y6CS459 Pravallika.K pravallika.kollisetty@gmail.com
73 Y6CS469 Rajitha.P rishiraj_puli@yahoo.com
74 Y6CS472 Ramya.N nanduriramya@gmail.com
75 Y6CS478 S.Madhuri.D doppalapudi.swaroopa@yahoo.co.in
76 Y4CS453 S R Jyothi.G jyothig_cse@yahoo.co.in
77 Y6CS479 S R Krishna.T ramyakrishna.cse@gmail.com
78 Y6CS484 Shiny.P shinyabraham@gmail.com
79 Y6CS485 Sireesha.P sireesha485@gmail.com
80 Y6CS491 Sowmya.G sowmyagaddipati@gmail.com
81 Y6CS492 Sowmya.K kamireddy.sowmya@gmail.com
82 Y6CS496 Srilakshmi.K y6sreelucse@gmail.com
83 Y6CS500 Supraja.N suppu.potter@gmail.com
84 Y6CS501 Surekha.G rekhaoct9@gmail.com
85 Y6CS502 Sushma.K katta.sushma9@gmail.com
86 Y6CS507 Anusha.B.V.S.N anusha.2563@gmail.com
87 Y6CS510 Vamsi Krishna.D vami_desiboyina@yahoo.co.in
88 Y6CS512 Venna Madhuri.G oct18veenamadhu@gmail.com
89 Y6CS513 Alekhya.M.V.L lakshmi.alekhya1@gmail.com
90 Y6CS514 Neeharika.A.V.N.L niha.avnl@gmail.com
91 Y6CS515 Mahathi.K.V.R mahathi.karnam@gmail.com

Computer Science and Engineering Syntax’09


Bapatla Engineering College

92 Y2CS485 Venkateswaramma.K venkateswaramma.k@gmail.com


93 L7CS521 Babu Rao.K babuniceboy@gmail.com
94 Y4CS411 Chinna NagaRaju.B nagarajunayak@gmail.com
95 L7CS522 SivaSubramanyam.C siva_lucky2618@yahoo.co.in
96 Y6CS466 Rajasekhar.A sekhartheniceguy@yahoo.com
97 Y6CS467 Rajendra.M kumar.rajendra24@yahoo.com
98 Y6CS468 Rajesh.V rajesh.vadlamudi999@gmail.com
99 Y6CS470 Rama Krishna.R ramakrishna.rayudu@gmail.com
100 Y6CS471 Ramesh Chandra.C Rameshchandrachika@gmail.com
101 Y6CS473 Ranga Reddy.A ranga.annapareddy@gmail.com
102 Y6CS474 Ranjit h Kumar.G Licenced2bunk@gmail.com
104 Y6CS476 Ravi.K Y6ravikandru@gmail.com
105 Y6CS480 Sandeep.L sandeep.9998999@gmail.com
106 Y6CS481 Sandeep.P sandeep_smiley@yahoo.com
107 Y6CS482 Sandeep Reddy.S sandeep_KKLR@yahoo.com
108 Y6CS483 Sat ish.N sat ish.153@gmail.com
109 Y6CS486 Sita Sundeep.P pillut la.sundeep@gmail.com
110 Y6CS487 Siva.B brahmasanisiva999@gmail.com
111 Y6CS488 Siva Chait anya.E Shiva@gmail.com
112 Y6CS489 Siva Krishna.M Sivakrishna.mullapudi@gmail.com
114 Y6CS493 Sankar Rao.D.S.S sreenusiva@gmail.com
115 Y6CS494 Sri Charan.M charanmanduri@gmail.com
116 Y6CS473 SriHari.T Tagore_116@yahoo.com
117 Y6CS495 Srikar.N srikar.merugumalla@gmail.com
118 Y6CS497 Srinivas Rao.I srinu.sport y@gmail.com
119 Y6CS498 Sudheer Kumar.D sudheer4u@rocket mail.com
120 Y6CS499 Sunanda Kishore.E nandueduru@gmail.com
121 Y6CS503 Ajay Bhargav.M .V ajay619rulz@yahoo.co.in
122 Y6CS504 Kesava Kumar.P.V kesavakumarpappu@ymail.com
123 Y6CS505 Ravi Teja.P.V.P Pavanravit eja@gmail.com
124 Y6CS506 M anikanta.Ch.V.N chandmanikant a@gmail.com
125 Y6CS508 Vamsee Krishna.N nadella.vamee@gmail.com
126 Y6CS509 Vamsee Krishna.N prince_vamsee@yahoo.com
127 Y6CS511 Vamsi Krishna.T vamsikrishna.t hut upalli@gmail.com
129 L5CS499 Venkateswara Rao.P venkateswararao.p@gmail.com
130 Y6CS517 Venu Gopal Rao.N venugopalcse130@gmail.com
131 Y6CS518 Vijay Sai.P vijaysai.panchadi@yahoo.com
132 Y6CS519 Vijay Teja.N vijaytej_cse_mtm@yahoo.com
133 Y6CS520 Vikram Singh.B vikramsinghcse@gmail.com
134 Y6CS521 Vivekanada Reddy.G srivivekreddy@yahoo.com
135 L7CS531 Yamini Sat ish.G yaminisat ish2004@gmail.com
136 Y4CS488 Venkateswarulu.K lavya_e@yahoo.com
137 Y3CS429 Kiran Kumar.A chinnai.kirankumar@gmail.com

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

WEB MINING

K.SUDHEER KRISHNA
M.BHANU KIRAN KUMAR

*.tech
FIRST YEAR
With the explosive growth of information sources
available on the World Wide Web (WWW), it has
become increasingly necessary for users to utilize
automated tools in order to find, extract, filter and
evaluate the desired information and resources. It is using the tree-like structure to analyse and
Web Mining can be broadly defined as the describe the HTML (Hyper Text Markup Language)
technology that mines the data gathered from the or XML (eXtensible Markup Language) tags within
World Wide Web and comes out with some critical the web page.
results. As more organizations rely on the internet and
Web Mining can be categorized into two types: the World Wide Web to conduct business, the
1.Web Content Mining traditional strategies and techniques for market
2.Web Usage Mining analysis need to be revisited in this context. Most
3.Web Structure Mining of this information is usually generated
Mining Process: automatically by web servers and is collected in
server access logs.As the popularity of World Wide
The key component of Web Mining is the mining
Web continues to increase, there is a growing need
process itself. It has adopted techniques from the
to develop tools and techniques that will enrich the
field of data mining, databases and information
usage of web mining.
retrieval, along with some techniques of its own.
Web Content Mining: QUANTUM COMPUTER
Web Content Mining is an automatic process that
extracts patterns from online information, such as
HTML files, images, E-mails along with some simple K.DIVYASRI
statistics of words and phrases in the documents J.MARY GOLD
based on the keyword.
SECOND YEAR
Web Usage Mining:
Web Usage Mining is the type of Web Mining A quantum computer is any device for
activity that involves the automatic discovery of user computation that makes direct use of distinctively
access patterns from one or more web servers quantum mechanical phenomena, such as
Web structure mining: superposition and entanglement, to perform
Web structure mining is the process of using graph operations on data. In classical computer,
theory to analyse the node and connection structure information is stored as bits; in a quantum computer
of a web site. According to the type of web structural it is stored as zubits (quantum bits).
data, web structure mining can be divided into two The basic principle of quantum computation is
kinds. that the quantum properties can be used to
The first kind of web structure mining is extracting represent and structure data, and that quantum
patterns from hyperlinks in the web.A hyperlink is a mechanisms can be devised and built to perform
structural component that connects the web page operations with this data.
to a different location. The other kind of the web Classical computer has a memory made up of
structure mining is mining the document structure. “bits” where each bit holds either 0 or 1. A quantum

Computer Science and Engineering Syntax’09


Bapatla Engineering College

encrypted e-mail and many other types of data. To


search large database in a fraction of the time that
it would take a conventional computer. Anot her
applivations are to study quantum mechanics and
to design other quantum computers.
But quantum computing is in early stages of
development and many computer scientists believe
that the technology needed to create a practical
quantum computer is years away.

SPAMMING
computer maintains a sequence of “qubits”. A single
B.USHA PRIYADARSHINI
qubit can hold a one or a zero or crucially a quantum
superposition of these. K.SINDHURA
A pair of qubits can be in a quantum-superposition FIRST YEAR
of 4 states and three bits in a superposition of 8. In
general a quantum computer with n qubits can be E-mail spam, also known as bulk e-mail or junk
in upt o 2n different states simultaneously. Quantum e-mail is a subset of spam that involves sending
computer must have atleast several dozen qubits nearly identical messages to numerous recipients
to be able to solve real world problems. A by e-mail. E-mail spam has existed since the
quantum.Computer operates by manipulating those beginning of the internet and has grown to about
qubits with a fixed sequence of quantum logic gates. 90 billion messages a day, although about 80% is
The sequence of gates to be applied is called a sent by fewer than 200 sporadically implemented,
“Quantum Algorithm”. with some being opt-out laws and others being opt-
Quantum computers are different from other in.
computers such as DNA computers and traditional Spam definition defined as, unsolicited bulk e-
computers based on transistors. By comparison, a mail (UBE)-Unsolicited e-mail, sent in large
quantum computer could solve this problem more quantities. This is the most popular definition.
efficiently than a classical computer using shor’s How E-mail spam is sent?
algorithm to find its factors. This ability would allow Spam is a term to describe unsolicited e-mail sent
a quantum computer to break many of the to you, often by commercial firms that attempt to
cryptographic systems in use today, in the sense sell you goods and services. Spam is sent out as
that there would be a polynomial time algorithm for bulk e-mail, often to list of 10,000 or more persons
solving the problem. But for now the technology at once. It is inexpensive to send.
required to develop such a quantum computer is To send out unsolicited bulk e-mail, a spammer
beyond of our research. Most research in quantum first needs to get a list of e-mail addresses. Often,
computing is theoritical.The most advanced spammers buy the lists from companies that
quantum computer have not gone beyond compile them.
manipulating more than 16 qubit meaning that they
Statistics and Estimations
are far cry from practical application.
If quantum computers can be built they will The growth of e-mail spam:
be valuable in these ways. Spam is growing, with no signs of abating. The
In factoring large numbers. amount of spam users see in their mail boxes is
These are used to protect secure web pages, just the tip of the iceberg. Since spammer’s lists

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

often contain a large percentage of invalid addresses contacted about an account needing to be
and many spam filters simply delete or reject verified, it is a sense of precaution to contact the
“obvious spam”. company from which the e-mail apparently
In Absolute Numbers: originates to check that the e-mail is legitimate.
1978- An e-mail spam is sent to 600 addresses. Alternatively, the address that the individual
1944- First large scale spam sent to 6000 news knows is the company’s genuine website can be

*.tech
groups, reaching millions of people. typed into the address bar of the browser, rather
2005- 30 billion per day. than trusting any hyperlinks in the suspected
2006- 55 billion per day. phishing message.
2007- 90 billion per day.

PHISHING AMBIENT INTELLIGENCE


.
L.MANJUSHA N.RAMYA
V.SRI DIVYA PRAVALLIKA
SECOND YEAR THIRD YEAR
In computing, phishing is criminal activity using In computing, ambient intelligence (AMI) refers
social engineering techniques. Phishers attempt to to electronic environments that are sensitive and
fraudulently acquire sensitive information, such as responsive to the presence of people. Ambient
passwords and credit card details, by masquerading intelligence is a vision on the future of consumer
as a trust worthy person or business in an electronic electronics, telecommunications and computing that
communication. was originally developed in the late 1990s for the
Phishing is typically carried out using e-mail or time frame 2010–2020. In an ambient intelligence
an instant message, although phone contact has world, devices work in concert to support people in
been used as well. carrying out their everyday life activities, tasks and
Damage caused by Phishing: rituals in easy, natural way using information and
The damage caused intelligence that is hidden in the network connecting
by phishing ranges from these devices (see Internet of Things). As these
denial of access to e- devices grow smaller, more connected and more
mail to substantial integrated into our environment, the technology
financial loss. This style disappears into our surroundings until only the user
of identify theft is interface remains perceivable by users. The ambient
becoming more popular, intelligence paradigm builds upon ubiquitous
because of readiness to computing and human-centric computer interaction
phishers, including credit design.
card numbers, social AMI should facilitate human contact.
security numbers and mothers maiden names. Once AMI should be orientated towards community and
this information is acquired, the phishers may use cultural enhancement.
a person’s details to create fake accounts in a AMI should help to build knowledge and skills for
victim’s name. They can then ruin the victim’s credit work, better quality of work, citizenship and
or even deny the victims access to their own consumer choice.
accounts. AMI should inspire trust and confidence.
Anti Phishing AMI should be consistent with long term
People can take steps to avoid phishing attempts sustainability - personal, societal and environmental
by slightly modifying their browsing habits. When - and with life-long learning.

Computer Science and Engineering Syntax’09


Bapatla Engineering College
AJAX
SRI CHARAN
K.AVINASH specification for the object in an attempt to create
THIRD YEAR an official web standard.
The term Ajax has come to represent a broad
Ajax, or AJAX (Asynchronous JavaScript and XML),
group of web technologies that can be used to
is a group of interrelated web development implement a web application that communicates
techniques used to create interactive web with a server in the background, without interfering
applications or rich Internet applications. With Ajax,
with the current state of the page.
web applications can retrieve data from the server
Advantages:
asynchronously in the background without 1) In many cases, related pages on a website
interfering with the display and behavior of the
consist of much content that is common between
existing page. The use of Ajax has led to an increase
them. Using traditional methods, that content would
in interactive animation on web pages. Data is
have to be reloaded on every request. However,
retrieved using the XMLHttpRequest object or
using Ajax, a web application can request only the
through the use of Remote Scripting in browsers that
content that needs to be updated, thus drastically
do not support it. Despite the name, the use of
reducing bandwidth usage and load time.
JavaScript and XML is not actually required, nor do2) The use of asynchronous requests allows
the requests need to be asynchronous. the client’s Web browser UI to be more interactive
While the term Ajax was coined in 2005, and to respond quickly to inputs, and sections of
alternative techniques for the asynchronous loading
pages can also be reloaded individually. Users may
of content date back to the mid 1990s. Java applets
perceive the application to be faster or more
were introduced in the first version of the Java
responsive, even if the application has not changed
language in 1995. These allow compiled client-side
on the server side.
code to load data asynchronously from the web 3) The use of Ajax can reduce connections
server after a web page is loaded. In 1996, Internet
to the server, since scripts and style sheets only have
Explorer introduced the IFrame element to HTML,
to be requested once.
which also enables this to be achieved. In 1999,
Microsoft created the XMLHttpRequest object as an BLUE GENE
ActiveX control in Internet Explorer 5. This is now
supported by Mozilla and Safari as native versions K.ASHA JYOTHI
of the object. On April 5, 2006 the World Wide Web P.RAJYA LAKSHMI
Consortium (W3C) released the first draft G.RAGA HARSHINI
SECOND YEAR
A Blue Gene is a computer architecture project
designed to produce several next generation super
computers to reach operating speeds in the
petaflops range and currently reaching sustained
speeds over 360 teraflops. Though it is designed to
run continuously at one petaflops, it can be
configured to reach speeds in excess of three
petaflops. Furthermore it is at least seven times
more energy efficient than any other super
computers accompanied by using many small, low
power chips connected through five specialized
networks.

Syntax’09 Association of Computer Engineers


Bapatla Engineering College
5 WORST COMPUTER VIRUSES OF ALL TIME
T.T.DEEPTHI
S.KAVYA
THIRD YEAR propagate across vulnerable Mac computers.
After the virus infects a Mac, it searches through
Slammer/Sapphire:

*.tech
the iChat contacts and sends a message to each
It affected in 2003. It is such a dangerous virus person on the list. The message contains a
that, only a few minutes after infecting its first corrupted file that appears to be an innocent JPEG
Internet server, the image. The Leap-A virus doesn’t cause much
Slammer virus was harm to computers, but it does show that
doubling its number even a Mac computer can fall prey to
of victims every malicious software.
second. F ifteen Storm Worm:
minutes after its first The latest virus on our list is the dreaded
attack, the Slammer Storm Worm. The public began to call the virus
virus infected nearly the Storm Worm because one of the e-mail
half of the servers messages carrying the virus had as its subject
that act as the pillars “230 dead as storm batters Europe.” The Storm
of the Internet. Worm is a Trojan horse program. Some versions
M y d o o m / of the Storm Worm turn computers into
Novarg: zombies or bots. Some hackers use the Storm Worm
It is another worm that can create a backdoor in to create a botnet and use it to send spam mail
the victim computer’s OS. The original MyDoom virus across the Internet. Although the Storm Worm is
had two triggers. One trigger caused the virus to widespread, it’s not the most difficult virus to detect
begin a Denial of Service (DoS). The second trigger or remove from a computer system.
commanded the virus to stop distributing itself. Even
after the virus stopped spreading, the backdoors
created during the initial infections remained active. COMPUTER WORM
Sasser/Netsky:
Unlike other worms, it didn’t spread through e-
mail. Instead, once the virus infected a computer, it M.VINOD KUMAR
looked for other vulnerable systems. It contacted KAUTILYA
those systems and instructed them to download the SECOND YEAR
virus. The virus altered the victim’s operating system
in a way that made it difficult to shut down the A Computer Worm is a self-replicating computer
computer without cutting off power to the system. program. It uses a network to send copies of itself
The Netsky virus moves through e-mails and to other nodes (computer terminals on the network)
Windows networks. It spoofs e-mail addresses and and it may do so without any user intervention. Unlike
propagates through a 22,016-byte file attachment. a virus, it does not need to attach itself to an existing
As it spreads, it can cause a Denial of Service (DoS) program. Worms always harm the network where
attack as systems collapse while trying to handle as viruses always infect or corrupt files on a
all the Internet traffic. targeted computer. Worms mainly spread by
Leap-A/Oompa: exploiting vulnerabilities in operating systems or by
In 2006, the Leap-A virus, also known as Oompa- tricking users to assist them.
A, uses the iChat instant messaging program to

Computer Science and Engineering Syntax’09


Bapatla Engineering College

CAPTCHA
T.V.K.CHAITANYA
S.RAMESH REDDY
SECOND YEAR
checks if the text entered by the user matches the
CAPTCHA stands for Completely Automated initial generated text. If it does, the transaction
Public Turing test to tell Computers and Humans continues. Otherwise, an error message is displayed
Apart. CAPTCHA is very useful tool in differentiating and the user has to enter a new code.
robots from humans. It is a simple test to determine - Exploits observation that humans are still
if the user is a robot or human.Computer Viruses: much better than computers at many pattern
Computer viruses are computer programs that can recognition tasks.
replicate themselves and harm the computer Types of CAPTCHA’s:
systems on a network without the The first CAPTCHA built was text CAPTCHA.
knowledge of the system users. Viruses Next there came image CAPTCHA.For the people
spread to other computers through who have difficulty to see there were CAPTCHAs in
network file system, through the audio format.For the people who can not see as well
network, Internet or by the means of as listen, there are mathematical CAPTCHAs called
removable devices like USB drives and MAPTCHAs.
CD. CAPTCHAs can prevent
History Auto registration,Mass mailing in forums and
Primitive CAPTCHA’s were developed in 1997 by g u e s t b o o k s , C o m m e r c i a l
Andrei Broder, Martin Abadi, Krishna Bharat and promotion,Harassment,Rate limiting for competitive
Mark Lillibridge to prevent bots from adding URLs websites,Article rating by computers but not
to Altavista search engine. In 2000, Luis von Ahn humans.
and Manuel Blum coined the term “CAPTCHA”. They
invented multiple examples of CAPTCHAs, including
Bypassing Captcha’s
the first CAPTCHA’s used by Yahoo.
There are a few approaches to defeating
CAPTCHAs:
· exploiting bugs in the implementation that
allow the attacker to completely bypass the
CAPTCHA,
· improving character recognition software, or
· using cheap human labor to process the
Principle tests.
The principles behind CAPTCHA are as At the present moment text-CAPTCHA is still
follows: effective because there is no universal algorithm
- The user is presented with a distorted image for text recognition.There are two strategies of
on which some text is displayed. This image is defense:
generated by the server using random text. 1) Make a change in CAPTCHA as soon it is
- The user must enter the same letters in the broken.
text into a text field that is displayed on the form to 2) Use innovative approaches in CAPTCHA’s
protect. engines to make it complex and attack free.
- When the form is submitted, the server

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

TYPES OF COMPUTER CRIMES


Y.LAKSHMI DEVI
K.MOUNIKA
THIRD YEAR

*.tech
spread to other computers through network file
Computer crimes are criminal activities, which system, through the network, Internet or by the
involve the use of information technology to gain means of removable devices like USB drives and
an illegal or an unauthorized access to a computer CDs. Computer viruses are after all, forms of
system with intent of damaging, deleting or altering malicious codes written with an aim to harm a
computer data. Computer crimes also include the computer system and destroy information. Writing
activities such as electronic frauds, misuse of computer viruses is a criminal activity as virus
devices, identity theft and data as well as system infections can crash computer systems, thereby
interference. Computer crimes may not necessarily destroying great amounts of critical data.
involve damage to physical property. They rather Cyber stalking: The use of communication
include the manipulation of technology, mainly the Internet, to
confidential data and critical torture other individuals is known
information. Computer crimes as cyber stalking. False
involve activities of software theft, accusations, transmission of
wherein the privacy of the users is threats and damage to data and
hampered. These criminal activities equipment fall under the class of
involve the breach of human and cyber stalking activities. Cyber
information privacy, as also the stalkers often target the users by
theft and illegal alteration of means of chat rooms, online
system critical information. forums and social networking
Types of computer crimes: websites to gather user information
Hacking: The act of defeating the and harass the users on the basis
security capabilities of a computer of the information gathered.
system in order to obtain an illegal access to the Identity Theft: This is one of the most serious
information stored on the computer system is called frauds as it involves stealing money and obtaining
hacking. Another highly dangerous computer crime other benefits through the use of a false identity. It
is the hacking of IP addresses in order to transact is the act of pretending to be someone else by using
with a false identity, thus remaining anonymous someone else’s identity as one’s own. Financial
while carrying out the criminal activities. Phishing: identity theft involves the use of a false identity to
Phishing is the act of attempting to acquire sensitive obtain goods and services and a commercial identity
information like usernames, passwords and credit theft is the using of someone else’sbusinessname
card details by disguising as a trustworthy source. or credit card details for commercial purposes.
Phishing is carried out through emails or by luring Identity cloning is the use of another user’s
the users to enter personal information through fake information to pose as a false user. Illegal migration,
websitesCriminals often use websites that have a terrorism and blackmail are often made possible by
look and feel of some popular website, which makes means of identity theft.
the users feel safe to enter their details there.
Computer Viruses: Computer viruses are
computer programs that can replicate themselves
Manner reveals Character
and harm the computer systems on a network
without the knowledge of the system users. Viruses

Computer Science and Engineering Syntax’09


Bapatla Engineering College
KNOW THEM BETTER
the ‘o’ and ‘s’ [in the Microsoft logo] emphasizes
the “soft” part of the name and conveys motion and
speed.
Hotmail – Founder Jack Smith got the idea of
accessing e-mail via the web from a computer
anywhere in the world. When Sabeer Bhatia came
up with the business plan for the mail service he
tried all kinds of names ending in ‘mail’ and finally
settled for Hotmail as it included the letters “HTML”
– the markup language used to write web pages. It
was initially referred to as HoTMaiL with selective
upper casing.

LASER KEYBOARD
R.MAHENDRA SINGH
SIDDARDHA
THIRD YEAR M.V.L.ALEKHYA
K.PRATHYUSHA
Yahoo! – It represents a person who is repulsive THIRD YEAR
in appearance and barely human. Yahoo! founders
David Filo and Jerry Yang jokingly considered
themselves yahoos. In recent days, many keyboards are taking their
Oracle – Larry Ellison, Ed Oates and Bob Miner birth in the market. One of such keyboards is LASER
were working on a consulting project for the CIA. KEYBOARD. This keyboard can be placed
The code name for the project was Oracle (the CIA anywhere.It is compact and user friendly. The Virtual
saw this as the system to give answers to all Laser Keyboard leverages the power of laser and
questions or some such). The project was designed infrared technology and projects a full-size keyboard
to use the newly written SQL database language onto any flat surface.
from IBM. The project was eventually terminated Mobile users can type normally on this virtual
but they decided to finish what they started and keyboard (VKB).It allows them to work quickly and
bring it to the world. Later they changed the name effectively. Based on optical recognition, it enables
of the company, Relational Software Inc., to the the user to tap the images of the keys, which are
name of the product. then fed into the compatible Bluetooth-enabled PDA,
Intel – Robert Noyce and Gordon Moore initially Smartphone, laptop or PC.
incorporated their company as N M Electronics. The Virtual Laser Keyboard provides a full-size
Someone suggested Moore Noyce Electronics but QWERTY keyboard. It is also smaller and more
it sounded too close to “more noise”. convenient to use than the folding-type keyboards
Later, Integrated Electronics was proposed but it made by some manufacturers and are similar to
had already been taken, so they used the initial them in functionality. It provides a projected image
syllables (INTegrated ELectronics). which is the perfect portable input device for PDAs.
Microsoft – coined by Bill Gates to represent the It is similar in responsiveness to regular keyboards.
company that was devoted to microcomputer It includes a self-contained, rechargeable Lithium
software. Originally christened Micro-Soft, the ‘-’ ion battery. It provides the Virtual Laser Keyboard
disappeared on 3/2/1987 with the introduction of a with its own internal power supply, so it doesn’t drain
new corporate identity and logo. The “slash between any battery power from the PDA or PC. The battery

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

of view on the other sides of the screen. A touch


shows up as a shadow and each pair of camera’s
can then be triangulated to locate the touch or
even measure the size of the touching object. This
technology is growing in popularity, due to its

*.tech
scalability, versatility and affordability especially
for larger units.
Dispersive Signal Technology
Introduced in 2002, this system uses sensors
to detect the mechanical energy in the glass that
occurs due to a touch. Complex algorithms then
interpret this information and provide the actual
location of touch. The technology claims to be
lasts two to three hours, more than enough time to unaffected by dust and other elements, including
do some instant messaging and SMS messaging scratches.
from the handheld existing minuscule keyboards and Since there is no need for additional elements on
handwriting recognition software. screen, it also claims to provide excellent optical
clarity. Also since mechanical vibrations are used
TOUCH SCREEN to detect a touch event, any object can be used to
generate these events, including fingers and styles.
B.MANIKANTA A downside is that after the initial touch the system
ASHWIN cannot detect a motionless finger.
FIRST YEAR

Touch screen in a table is a latest wrinkle in


computers. Among the fast growing technologies
touch screen has encountered a portion. Many
technologies have been emerged for building up
touch screen panels. A few quotable technologies
are:
Acoustic Pulse Recognition
This system uses more than 2 piezo-electric
transducers located at some position of the screen
to turn the mechanical energy of a touch into
electric signal. The screen hardware then uses an
algorithm to determine the touch based on Surface Acoustic Wave
transducer signals. This process is similar to Surface acoustic wave technology uses ultrasonic
triangulation used in GPS. The touch screen itself is waves that pass over the touch panels. When a panel
made of ordinary glass, giving it good durability & is to touch a portion of wave is absorbed. This
optical clarity.Nintendo DS is an example. change in ultrasonic waves registers the portion of
Optical Imaging touch events and sends this information to the
A relatively-modern development in touch screen controller for processing. Surface wave touch screen
technology, two or more image sensors are placed panels can be damaged by outside elements.
around the edger (mostly the corners) of the screen. Contaminants on the screen can also interfere on
Infrared backlights are placed in the camera’s field the functionality of the screen.

Computer Science and Engineering Syntax’09


Bapatla Engineering College
VIRTUALISATION
CH.RAMYA
S.MOUNIKA overcomed in solaris containers by its branded
P.T.J.INDRAJA zones.
Storage:- Some operating system virtualizers
SECOND YEAR
provide file-level copy or write mechanisms most
In computing Virtualisation is a broad term that commonly a standard file system is shared between
refers to abstraction of computer resources. partitions and partitions which change the files
Platform virtualization which separates an automatically create their own copies.
operating system forms the underlying platform
resources:-
Full virtualization 3G WIRELESS TECHNOLOGY
Hard ware- assisted virtualization
Partial virtualization
Para virtualization J.AMAR
Operating system level virtualization U.V.N.KISHORE
Hasted environment SECOND YEAR
Operating system- level virtualization:-
It is commonly used in virtual hosting Third Generation(3G) wireless Technology is a
environment, where it is useful for securely recently proposed open industry for larger distance
allocating finite hardware resources amongst a local wireless
large number of mutually distrusting users. communication of
Other typical scenarios include separating several mobile device.3G
applications to separate containers for improved wireless networks
security, hardware independence and added are capable of
resource management features. transferring data at
Os level virtualization implementations that are speeds of up to
capable of live emigration can be used for dynamic 3 8 4 K b p s .T h e i r
load balancing of containers between nodes in a average speeds
cluster. ranges between 64Kbps and 384kbps.
Advantages and Disadvantages:- The 3G system is both complete and full-featured,
Over head:- This form of virtualization usually with many components and layers of abstraction. It
imposes little or no overhead, because programs in includes the specification of the Radio subsystem
virtual partitions use the operating system’s normal (spectrum), the base band features, packet formats,
system call interface and do not need to be the link management and profiles for specific
subjected to amulation or run in an intermediate applications and services while new technology
virual machine, as if the case with whole system provides its users with increased possibilities, it can
virtualization or para virtualisers (such as XEN and also provide with power weapons. Recently, the
UML). public has started to pay attention to need for
Flexibility:-Operating system level virtualization privacy. The mechanisms for authentification and
is not as flexible as other Virtualization approaches encryption are built on symmetric-key cryptography
since it cannot host a guest operating system in 3G.
different from the host one or a different guest kernel The main advantages of 3G include the need for
For example with Linux, different distributions are higher data rate services, such as high-speed
fine, but other operating systems such as windows wireless internet access and packet-based data
cannot be hosted. This limitation is partially transfer and more.

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

Although the 3G technology has led to some


revolutionary changes in Technology people are yet
to have access to the revolutionary advantages over
the conventional systems.

*.tech
SEMANTIC WEB

T.PRAVEEN
PHANI KUMAR
THIRD YEAR
· Vocabulary flexibility & standardization
Services of Semantic Web:
The word semantic stands for the meaning of. A) Semantic Web Ping Service
The Semantic Web is an evolving extension of the The Semantic Web Ping Service is a notification
World Wide Web in which the semantics of service for the semantic web that tracks the creation
information and services on the web is defined and and modification of RDF based data sources on the
satisfy the requests of people and machines to use Web.
the content. It derives from World Wide Web B) Piggy Bank
Consortium director Sir Tim Berners-Lee’s vision of Piggy Bank works by extracting or translating eb
the Web as a universal medium for data, scripts into RDF information and storing this
information, and knowledge exchange.The Semantic information on the user’s computer.Ex: Google Maps
Web is a web that is able to describe things in a to display information. Piggy Bank works with a new
way that computers can understand. The Semantic service, Semantic Bank, which combines the idea
Web describes the relationships between things and of tagging information with the new web languages
the properties of things. Components:
RDF (Resource Description Framework) is a
· XML provides an elemental syntax for
markup language for describing information and
content structure within documents.
resources on the web.Semantic web involve
· XML Schema is a language for providing and
publishing in languages specifically designed for
restricting the structure and content of elements
data: RDF, Web Ontology Language (OWL), and
contained within XML documents.
Extensible Markup Language (XML).
· RDF is a simple language for expressing data
Potential Advantages of Semantic web: models, which refer to objects (“resources”) and
· Search their relationships. ( in XML syntax).
· Agents · RDF Schema is a vocabulary for describing
· Knowledge management properties and classes of RDF-based resources.
· Integration · OWL (WEB ONTOLOGY LANGUAGE ) adds
· Composition of complex systems more vocabulary for describing properties and
· Multimedia collection classes.
· Information filtering · SPARQL is a protocol and query language for
· Machine dialogue across the domains semantic web data sources.
· Virtual community SW enriches current Web with semantics in terms
· Serendipity (unexpected benefits) of some standards and could improve Internet
commerce from several aspects.

Computer Science and Engineering Syntax’09


Bapatla Engineering College
SOFTWARE AS A SERVICE (SAAS)
K.V.GANESH continuous expense, rather than a single expense
CH.SAI BABU at time of purchase. Using SaaS also can conceivably
Y.TEJA reduce that up-front expense of software purchases,
SECOND YEAR through less costly, on-demand pricing. SaaS lets
software vendors control and limit use, prohibits
copies and distribution, and control all derivative
The combination of ever-more-abundant versions of their software. This centralized control
bandwidth, increasingly powerful processors, and often allows the vendor to establish an ongoing
inexpensive storage is broadening the choices for revenue stream. As a term, SaaS is generally
designing, deploying, and using software: in devices, associated with business software and is typically
in computers, on servers in corporate data centers, thought of as a low-cost way for businesses to obtain
and on the Internet. Business solutions can be the same benefits of commercially licensed,
delivered and consumed in all of these ways—either internally operated software without the associated
singly or in combination—to provide the best user complexity and high initial cost. Many types of
experience and the most business value. Software software are well suited to the SaaS
as a Service (SaaS)—meaning delivering software model.Application areas such as Customer
over the Internet—is increasingly popular for its relationship management (CRM), video
ability to simplify deployment and reduce customer conferencing, human resources, IT serof the initial
acquisition costs; it also allows developers to markets showing SaaS success. The distinction
support many customers with a single version of a between SaaS and earlier applications delivered
product. SaaS is also often associated with a “pay over the Internet is that SaaS solutions were
as you go” subscription licensing model.Typically developed specifically to leverage web technologies
pronounced ‘Saas’ is a model of software such as the browser, thereby making them web-
deployment where an application is hosted as a native This further differentiates SaaS from client/
service provided to customers across the Internet. server or ‘ASP’ (Application Service Provider)
By eliminating the need to install and run the solutions in those SaaS providers are leveraging
application on the customer’s own computer, SaaS enormous economies of scale in the deployment,
alleviates the customer’s burden of software management, support and through the Software
maintenance, ongoing operation, and support. Development Lifecycle.
Conversely, customers relinquish control over Key characteristics
software versions or changing requirements; The key characteristics of SaaS software,
moreover, costs to use the service become a according to IDC, include:

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

Network-based access to, and management of, level provides greater program flexibility through
commercially available software configurable metadata, so that many customers
· activities that are managed from central can use separate instances of the same
locations rather than at each customer’s site, application code. This allows the vendor to meet
enabling customers to access applications remotely the different needs of each customer through

*.tech
via the Web detailed configuration options, while simplifying
· application delivery that typically is closer maintenance and updating of a common code
to a one-to-many model (single instance, multi- base.
tenant architecture) than to a one-to-one model, . Level 3 - Configurable, Multi-Tenant-
including architecture, pricing, partnering, and Efficient: The third maturity level adds multi-
management characteristics tenancy to the second level, so that a single
· Centralized feature updating, which obviates program instance serves all customers. This
the need for downloadable patches and upgrades. approach enables more efficient use of server
· SaaS is often used in a larger network of resources without any apparent difference to the
communicating software - either as part of a mash end user, but ultimately is limited in its scalability.
up or as a plug-in to a platform as a service. Service · Level 4 - Scalable, Configurable, Multi-
oriented architecture is naturally more complex than Tenant-Efficient: At the fourth and final SaaS
traditional models of software deployment. maturity level, scalability is added through a
· More feature requests from users since multitier architecture supporting a load-balanced
there is frequently no marginal cost for requesting farm of identical application instances, running on
new features; a variable number of servers. The system’s capacity
· Faster releases of new features since the can be increased or decreased to match demand by
entire community of users benefits from new adding or removing servers, without the need for
functionality; and any further alteration of application software
· The embodiment of recognized best practices architecture
since the community of users drives the software Limiting factors
publisher to support the best practice. Widespread implementation of SaaS requires that
Implementation the services be well defined. That can achieve an
According to Microsoft, SaaS architectures economy of scale and the capacity to balance supply
generally can be classified as belonging to one of and demand. This requires areas of IT that are
four “maturity levels,” whose key attributes are ubiquitous and commodity-like. SaaS is therefore not
configurability, multi-tenant efficiency, and suitable for innovative or highly specialized niche
scalability.[4] Each level is distinguished from the systems, though SaaS may be used to provide one
previous one by the addition of one of those three or more components in such systems.
attributes: As with manufacturing, a lack of substitutability
· Level 1 - Ad-Hoc/Custom: At the first level and second sourcing options with any commodity
of maturity, each customer has its own customized creates a strategic weakness for any customer in
version of the hosted application and runs its own terms of security, competition and pricing
instance of the application on the host’s servers.
Migrated traditional non-networked or client-server
application to this level of SaaS typically requires
the least development effort and reduces operating Think like genius, work like giant and
costs by consolidating server hardware and live like a saint
administration.
· Level 2 - Configurable: The second maturity

Computer Science and Engineering Syntax’09


Bapatla Engineering College
GIVE ME A RING WANNA BE A GAMER ???
HITESH JAIN HARSHA
Y.SURESH HARI KRISHNA
SECOND YEAR SECOND YEAR
According to IBM, very soon, cell phones will take When you’re playing a computer game, have you
a new form, appearing to have no form at all. IBM ever wondered how come, when your characters
has developed a prototype of a cell phone that move around their
consists of several pieces of digital jewelry that virtual world, they
will work together wirelessly, possibly with interact realistically
Bluetooth wireless technology. with their
Various components present inside a normal cell environment? If you
phone are: think about it, you’ll
1) Microphone quickly realise that
2) Receiver there is no way
3) Touchpad games developers
4) Display could have predicted the exact sequence of events
5) Circuit board that occurred in that precise game session.
6) Antenna Something more general must be happening - there
7) Battery must be some physics in the game’s virtual world.
Here are the pieces of IBM’s computerized- The first thing you should know is just how diverse
jewelry phone and their functions: a game team is. So we’ve put together a pretty
· Earrings - Speakers embedded into these impressive list of Career Paths, grouped by category.
earrings will act as phone’s receiver. If you want to know more about the people who
· Necklace - Users will talk into the necklace’s make up the industry, we’re here for you. Check out
e m be dd e d our Developer Profiles to get to know some of your
microphone. future colleagues.
· Ring - The And for those of you who think gaming is just a
“magic decoder niche market, read up. Interactive entertainment
ring” is equipped takes in about $9 billion dollars in the USA alone.
with LED’s that Games are expected to surpass film box-office
flash to indicate revenues in the next couple of years, making it the
an incoming call. fastest growing segment of the entertainment
It can also be market, and an excellent field for career
programmed to advancement.
flash different colors to identify a particular caller As a game developer, your creative work will have
or indicate the importance of a call. a wide reach. According to the ESA, 60% of all
· Bracelet - Equipped with a video graphics Americans age six and older, or about 145 million
array (VGA) display, this wrist display could also people, play computer and video games. And 35%
be used as a caller identifier that flashes the name of all Americans identified computer and video
and phone number of the caller. games as the most fun entertainment activity. That’s
Together, the digital-jewelry cell phone will work more than television (18%) and movies (11%)
just like a conventional cell phone. We can call to combined! In what other industry could you have
a person by simply saying the name of the person. this much fun, challenge yourself, and reach the
IBM is further developing the ring to indicate hearts of countless fans? None. So check out these
email alerts along with calls and theflash alert pages, get yourself educated, and we’ll see you
according to urgency of the mail! soon.

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

Courses for Game Designers martial art)


Here’s a list of things you must study (as classes, o Archery
not necessarily as majors): o Sports (try lots of different sports; find one
o Physics that you enjoy and get good at it)
o Math o Crafts (learn how to make stuff with your
o Psychology hands and simple tools)

*.tech
o History The point is that game designers, as creators
o Drawing / Painting / of worlds for players to inhabit, need to have a
Sculpture (learn how to solid understanding of what worlds are made
make your own art) of. They are not just made of stone, metal, dirt,
o Music Appreciation and water—they are also made of people with
o Writing an extensive body of knowledge.
o Literature It’s unlikely any game designers are actually
o Mythology going to get raucous over flower parts, but you
o Foreign language get the point. Get a good education.
(any language that
interests you; especially VIRTUAL FENCE -VEHICLES
one from a country where
there are game
developers) K.DINESH
o Computers (even if SECOND YEAR
you want to design board
games) Vehicle thefts and fuel pilferage have become
o Acting common these days. Can these be checked?...Yes,
o Playwriting / Screenwriting indeed. Thanks to virtual fencing, stealing a vehicle
o Film Appreciation could become difficult for seasoned thieves .Today
o Public Speaking / Debate one can virtually mark boundaries. Today one can
o Marketing / Salesmanship virtually mark boundaries or points on the map,
o Management / Leadership (especially, how to which would be highlighted, if a vehicle comes to a
inspire and manage people) particular marked area, the system will put out an
Game designers are, above all, effective alert.
communicators and storytellers. Don’t sleep through The device works on GPS/GSM tracking system,
your writing, acting, and speaking classes. widely used in mobile phones, and is pre-configured
Additional Subjects with a mobile number of the owner. A similar device
It would also be good if you study some of these is also fixed in the vehicle. The owner can call
things too: the device and talk to the driver as he does on his
o Music (learn how to play an instrument) mobile phone.
o Geology The device, fixed in the vehicle’s dashboard, is
o Astronomy fitted with a sim card of any service provider. The
o Paleontology / Archeology card is activated to transit GPS data to the person
o Ethnic Studies sitting in front of a computer. The device gives
o Biology latitude and longitude co-ordinates to the card,
o Art History which then sends the data to an IP address, which
o Radio / TV is the computer. This data is correlated on the digital
o Drama / Film v map and the location is displayed on the computer
o Business screen. The frequency of knowing the location will
o Fencing or karate (some kind of one-on-one range from 3 seconds to 24 hours.

Computer Science and Engineering Syntax’09


Bapatla Engineering College

The speed at which the vehicle travels or has move is vital in order to utilize time efficiently.The
traveled can be checked out. The system provides importance of mobile computers has highlighted in
details of the distance travelled on a particular day. the following fields:
The location can also be viewed through a mobile Estate agents can work either at home or out in
phone, if it is GPS-enabled. the field. With mobile computers they can be more
The cost of the hardware device would vary productive. They can obtain current real estate
according to the features on offer. The price of one information by accessing multiple listing services,
unit varies from Rs. 8,000 to Rs. 12,000. The software which they can do from home, office or car when
interface would be Rs. 500 a month out with clients. Therefore, mobile computers allow
On a rental basis. The rental covers the cost of them to devote more time to clients.
storing the continuous data coming coming from the Emergency services:
client’s vehicle and maintenance and technical Ability to receive information on the move is
support. viable where the emergency services are involved.

MOBILE COMPUTING

K.PHANI CHANDRA
K.SANDHYA
K.SRI VIDYA
SECOND YEAR

Mobile any time any where and any person


computing using small portable devices and wireless Here the reliability and security implemented in the
communication networks is called mobile CDPD system would be of great advantage.
computing. In Courts:
The term is evolved in modern usage such that it These allow immediate access to a wealth of
requires the mobile computing activity be information making people better informed and
connected wirelessly to and through the internet or prepared.
to and through a private network. This connection
In Companies:
ties the mobile device to centrally located
Managers can use mobile computers in say critical
information or application software through the use
presentations to major customers. Therefore mobile
of battery powered, portable, and wireless
computers can leverage competitive advantages.
computing and communication devices.
Analog Mobile Phone Services(AMPS) Credit Card Verification:
At the point of sale terminals in shops in super
Geographic areas are subdivided into smaller
markets when customers use credit cards for
areas which are commonly known as “cells”. Each
transactions the inter communication required
cell has its own antenna that is set to operate at
between bank central computer and the pos
distinct transmission frequencies.
terminal in order to effect verification of the card
Communications occur at a set frequency in each
usage, can take place quickly and securely over
direction.AMPS are still widely used today.D_AMPS
cellular channels using mobile computer unit . This
is amps.
can speed up the transaction process and relieve
Application of Mobile Computing: congestion at pos terminals.
In many fields of work the ability to keep on the

Syntax’09 Association of Computer Engineers


Bapatla Engineering College
GATEKEEPER PICO

S.NAVEEN KUMAR
V.V.RAVI TEJA
SECOND YEAR

*.tech
The Gatekeeper Pico a USB key-sized personal
security computer with 12 security applications, has
been awarded “Best of Innovations 2008 - Computer
Accessories” by the 2008 Consumer Electronics
Show (CES).
Purpose of gatekeeper pico:
If Gatekeeper Pico mini-computer connects to any
PC or laptop blocking Internet threats outside the
host computer and security software.
A revolution in laptop and PC security, Yoggie’s
personal security computer is the ‘next generation The Gatekeeper Pico, with a suggested retail price
Internet Security Suite’ a powerful USB key-size of $179, is now available at market.
Linux-based 520 MHz computer with 12 built-in
Benefits:
security applications.
Block all Internet threats outside before they
The Gatekeeper Pico appears to be a sleek, silver
reach your PC
USB-key,it has the yoggie logo on the front and three
Hide your computer from Internet Hackers (‘Stealth
status icons with LED lights behind them, but is
Mode’)
infact a full-blown computer with its own processor,
Boost your PC’s performance
memory and unique operating system.
Untouchable Operating System
It combines best-of-breed security software with
Protection from known as well as unknown attacks
proprietary patent-pending developments to
Plug and forget easy installation and operation
provide the most comprehensive all-in-one security
Automated security updates
technology available to consumers today.The
Gatekeeper Pico delivers plug and forget The full list of security functions provided
functionality. Users do not have to worry about by the Gatekeeper Pico includes:
updates as it automatically checks for them each Anti-Virus
time it connects to the Internet, and manages the Anti-Spyware
entire process. The device does not require complex Anti-Phishing
installation, configuration or ongoing management Anti-Spam
(although advanced users can alter the Intrusion Detection System / Intrusion Prevention
configuration should they wish to). With the System
Gatekeeper Pico providing Pentagon-level security Firewall (Stateful inspection)
for their home PC or laptop, consumers no longer Web Filtering/Parental Content Control
need to run software-based security suites.This Adaptive Security Policy(TM)
means increased performance for their computer. Multi-Layer Security Agent(TM) (Patent pending)
In addition, the Gatekeeper Pico has parental Layer-8 Security Engine (TM) (Patent pending)
controls built in and can be configured so that, if it Transparent Email Proxies (POP3; SMTP)
is disconnected (by a child wanting access to off- Transparent Web Proxies (HTTP; FTP)
limits websites) Internet access will be denied.

Computer Science and Engineering Syntax’09


Bapatla Engineering College
CLOUD COMPUTING
SHAIK HABIBA
D.ARCHANA
K.REHUNUMA remotely. The software and storage for your
SECOND YEAR account doesn’t exist on your computer — it’s on
the service’s computer cloud.
Cloud computing is a computing paradigm in It is divided into two sections: the front end and
which tasks are assigned to a combination of the back end. They connect to each other through
connections, software and services accessed over a network, usually the Internet. The front end is the
a network. This network of servers and connections side the computer user, or client, sees. The back
is collectively known as “the cloud.” During the past end is the “cloud” section of the system. The front
few years, cloud computing has become a key IT end includes the client’s computer (or computer
buzzword. Perhaps the simplest working definition network) and the application required to access the
of cloud computing is “being able to access files, cloud computing system. On the back end of the
data, programs and 3 rd party services from a Web system are the various computers, servers and data
browser via the Internet that are hosted by a 3 rd storage systems that create the “cloud” of
party provider “and “paying only for the computing computing services.A central server administers the
resources and services used”. system, monitoring traffic and client demands to
The architecture of a cloud includes several key ensure everything runs smoothly. It follows a set of
modules: user interaction interface, system resource rules called protocols and uses a special kind of
management module with a services catalog, and software called middleware. Middleware allows
resource provisioning module. Often it also uses networked computers to communicate with each
virtualization techniques to dynamically allocate and other. Cloud computing is closely related to grid
deallocate computing resources .It is called cloud computing and utility computing.
computing because the data and applications exist Cloud Computing Applications
on a “cloud” of Web servers The applications of cloud computing are
There’s a good chance you’ve already used practically limitless. With the right middleware, a
some form of cloud computing. If you have an e- cloud computing system could execute all the
mail account with a Web-based e-mail service like programs a normal computer could run. Potentially,
Hotmail, Yahoo! Mail or Gmail, then you’ve had some everything from generic word processing software
experience with cloud computing. to customized computer programs designed for a
Instead of running an e-mail program on your specific company could work on a cloud computing
computer, you log in to a Web e-mail account system.

Syntax’09 Association of Computer Engineers


Bapatla Engineering College
IS INTERNET EXPLORER ONLY YOUR CUP OF TEA?

M.N.V.V.RAMESH Safari
GANESH Apple stunned the world in
THIRD YEAR 2003 when they announced this

*.tech
browser for Mac OS X. It became
so popular with Mac users that
Google Chrome Microsoft stopped developing IE
In 2008, Google stripped down for the Mac! Safari is designed for elegance and
the web browser to its essentials speed, and is now both the default browser on
and rethought basic assumptions the Mac and the most popular Macintosh browser.
about what a browser should do. Starting with version 3, Safari is also available
Focused on enhanced for Windows.
performance for web applications, Chrome stays out Safari is also the web browser on the iPhone
of your way and lets you focus on the web itself. and iPod Touch.
Chrome uses the Web Kit engine (like Safari) and * Features: Web · Private Browsing · RSS
is similar to the default web browser on the Android * Import: Bookmarks from any browser.
mobile phone platform.
At this time, Chrome is only available for Firefox
Windows, but Macintosh and Linux versions are Mozilla Firefox has been the
planned. most successful alternative
* Features: Web- Private Browsing web browser since the “browser
* Import: Bookmarks, History and Passwords wars” ended. The flagship
from Internet Explorer. product of the Mozilla
Foundation traces its lineage
Opera back to the original Netscape. Firefox was designed
Opera has managed to for simplicity, security, and extensibility, with
weather the browser wars since hundreds of extensions available. The Mozilla
its original release in 1996. Thunderbird mail & news client is a perfect
Constantly innovating, this companion. Both applications are open-source.
browser is now a full-fledged * Features: Web · RSS headlines · Email and full
Internet suite with web, e-mail, RSS via Thunderbird · Extensions for chat,
news (use net and RSS) and chat with a wealth of customization, etc. · Skin able · Phishing Filter
features for new switchers and power users alike. * Import: All settings from Internet Explorer, Opera,
Opera also provides a mobile web browser, Opera Mozilla, Netscape, bookmarks from generic HTML file.
Mini, which runs on most Java-capable devices, BenchMark Test Results
bringing the web to even low-end mobile phones.
You can sync your bookmarks between Opera Mini
and the desktop version of Opera using Opera Link.
* Features: Web · Email · RSS · Chat · Skin able ·
Phishing Filter · Widgets · Bit Torrent · Sync
* Import: Bookmarks from Internet Explorer,
Firefox, Safari, Netscape, or generic HTML file; Mail
from Outlook Express, Netscape, Thunderbird, Apple
Mail, Eudora, or generic mbox file.

Computer Science and Engineering Syntax’09


Bapatla Engineering College

ANDROID because it allows users to browse the entire


Internet, not just mobile-specific sites. Web
designers won’t have to change what they are doing
SHAIK BASHA to support mobile devices since the browser itself
B.G.V.N.MANIKANTA can (with a few exceptions) render any Web page
THIRD YEAR in exactly the same way it would appear on the
desktop, zooming and panning as necessary to
accommodate a smaller screen.
Its an open-source platform · A custom 2D graphics library and 3D
for developing the next graphics based on OpenGL.
generation of mobile devices. · SQLite for structured data storage.
Google hopes to turn the · Media support for common audio, video and
mobile-phone industry on its still-image formats (including MPEG-4, H.264, MP3,
head with a development model AAC, AMR, JPEG, PNG and GIF).
more like that of the Web. · GSM (Global System for Mobile
“There are 3 billion handsets in the world, and in communications) but not CDMA (Code Division
many places, those handsets are the primary means Multiple Access) telephony.
of accessing the Internet,” said Dan Morrill, · Support for camera, GPS, compass and
developer advocate of Google Developer Programs. accelerometer hardware.
“As those handsets become increasingly The SDK provides the necessary APIs and
sophisticated, we want users to have the same programming tools for developing applications in
excellent experience they have on the Web.” Java to run on the platform, including a device
Although it is based on Linux, Android is also a emulator, debugging tools, memory and
separate (and Google says complementary) effort performance profiling, and a plug-in for the Eclipse
from the LiPS (Linux Phone Standards Forum) IDE.
specification that was first announced in 2005 and Applications for Android are written in Java and
was released in December 2007. While that effort run on Google’s Dalvik virtual machine rather than
includes APIs for telephony, messaging, calendar, on the more well-known Java framework. Google
instant-messaging presence and user-interface says that the choice to go in-house was necessary
components, it is not intended as a complete phone in order to achieve the performance characteristics
stack, while Android is. Another difference stems and level of openness that the company was looking
from Android’s reliance on a particular Linux for. But Google has already been accused of
implementation, while LiPS supports multiple, fragmenting the Java standard.
interoperable implementations. Android will ship with a number of core
Key features found in Android include: applications including an email client, an SMS (Short
· An application framework that enables reuse Message Service) program, a calendar, maps, a
and replacement of components. browser and contacts.These applications will sit on
· A Java development and run-time top of the application framework, which provides a
environment based on the Dalvik virtual machine set of system services and libraries for building and
(which Google says has been optimized for mobile interoperating with Android applications. The
devices). Somewhat unusually, every Android framework exposes applications to a set of core C/
application runs in its own process, with its own C++ libraries for such things as media playback and
Dalvik instance. recording, Web browsing, 2D and 3D graphics,
· An integrated browser based on the open- bitmap and vector font rendering, and the SQLite
source WebKit (the same engine that is used in relational database. You could forget that Android
Apple’s Safari). The use of WebKit is significant has anything to do with Google were it not for such

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

features as a MapView API (which integrates Google open-source mobile initiatives. But current
Maps into Android) and support for location-based limitations shouldn’t be a deterrent: Android will
services (GPS). This first release of Android is only get better as more developers get on board.
missing native APIs for Bluetooth and wifi, but And Google’s 10 million dollar bounty for the best
Google says that they are coming. Android application should provide plenty of

*.tech
At the bottom of the stack is Linux version incentive for jumping in.
2.6, which handles core system services such as Applications:
security,memory management, network stack and Android will ship with a set of core applications
driver model, while acting as including an email client, SMS
an abstraction layer between program, calendar, maps,
the hardware and the rest of browser, contacts, and others.
the software stack. All applications are written
Nailing the Interface: using the Java programming
Coming up with a good user language.
interface for a mobile device Application Framework
is tough, as is evidenced by Developers have full access to
how long it took Microsoft to the same framework APIs used
produce a usable version of by the core applications. The
Windows Mobile. Since every phone has a different application architecture is designed to simplify the
design, screen, keypad and control layout it is reuse of components; any application can publish
almost impossible to define a general-purpose its capabilities and any other application may then
platform like you can with the PC. Partly because of make use of those capabilities (subject to security
that, the Android interface (which Morrill said is a constraints enforced by the framework). This same
work in progress) is not as radical of a departure mechanism allows components to be replaced by
from the kinds of interfaces seen on Nokia and the user.
Motorola Inc. devices as that of the iPhone, where Prototypes:
Apple retains the luxury of designing both hardware Google announced its plans for the Android phone
and software. The actual UI elements provided are software in November 2007 with a declared aim of
what would be expected standard check boxes, making it easier to get at the web. To help develop
radio buttons and pull-down menus — but Google Android, Google also unveiled the Open Handset
has innovated inotherareas. Alliance - a partnership of more than 30 firms that
Android’s layout classes allow developers to would work to make phone software easier to work
arrange the user interface in such a way that it will with.The group includes operators such as Telefonica,
behave properly — regardless of whether it is in handset makers such as HTC and Motorola as well
portrait or landscape orientation. as chip makers such as Intel and Qualcomm.
In its first release, Android supports touch-screen T-Mobile G1
phones but not the multitouch technology seen in
The T-Mobile G1 is the first phone to the market
the iPhone. Digging around in the SDK also only
that uses the Android platform.The phone is part of
reveals support for 320x240-pixel resolution
an open standards effort of the Open Handset
(standard on many smartphones), but Morrill said
Alliance. It was released in the US on October 22,
that other resolutions will be supportedinthefuture.
2008 and will be available in European countries
Android’s SDK has a way to go before it can
including Germany, Netherlands and the Czech
compete with the commercial development
Republic by early 2009. The T-Mobile G1 is made by
environments for Palm, Windows Mobile, Symbian
HTC, which may be rebranded by operators or
and other mobile platforms. And developers face a
original equipment manufacturer (OEM) partners.
difficult choice given the existence of competing

Computer Science and Engineering Syntax’09


Bapatla Engineering College

TRANSFERJET
B.GAUTAM KUMAR
G.HARI KRISHNA
THIRD YEAR
TransferJet a new Close Proximity Wireless Transfer Technology enabling the high speed transfer of
large data files (photos, HD images, etc.) between electronic devices such as mobile phones, digital
cameras, digital video cameras, computers and TVs. Using this technology, data can be sent at speeds of
560Mbps. It eliminates the need for complex setup and operation. For e.g., just touching a TV with a
digital camera enables photos to be instantaneously displayed on the TV screen. Alternatively, downloaded
music content can be easily enjoyed by touching a mobile phone to a portable audio player. TransferJet
can be used as a Universal Interface among a wide variety of consumer electronics devices.
It is simple operation, safe connection and efficient transfer of data can maintain the highest possible
wireless link by automatically adjusting the data transmission rate. It radiates very low-power radio
waves, it causes virtually no interference to other wireless systems, and there is no impact to
performance.Operation is also very intuitive, and as there is no host/target relationship, data transfer
can take place between mobile phones and PCs for example, as well as between mobile devices.TransferJet
technology are able to transfer data among each other’s products regardless of whether they are indoors
or outdoors and irrespective of their geographic location.It maintains high transmission gain and efficient
coupling in near-field proximity, while providing sharp attenuation over longer distances to avoid
interference with other wireless systems.Furthermore, as there is no antenna polarization it is possible to
transmit data without any performance loss, regardless of the contact angle of the electronic devices.
Transfer Jet technology is similar to the current Bluetooth standard, however the Transfer Jet system
has the advantage of operating at a much higher throughput rate while not having the security concerns
that can be found in a Bluetooth connection.For e.g., with Bluetooth, transfer of data takes place over a
range of several feet. Since the signal is not encrypted, it can be intercepted by other Bluetooth devices.
Similar to Bluetooth, Transfer Jet will offer users the ability to restrict their equipment to communicating
with only approved devices, preventing accidental data sharing with other non-approved equipment.It
works once both devices are within 3cm of each other, and then blasts information between them at up to
560Mbps.

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

THE WORLD’S PREMIER STUDENT


TECHNOLOGY COMPETITION
R.KAANTHI KEERTHI
G.S.R.JYOTHI
THIRD YEAR

*.tech
“I wish there had been an Imagine Cup when I was growing up. It
gets people involved in seeing that software is changing the world.”
—Bill Gates
Everything that the world may become “someday” lies in the
hands of young people today. As they look at the road ahead, their
close relationship with technology enables them to dream in ways
we never have before. Put the two together, and you have young minds holding the tools that can make
their vision a reality.
This is the recipe that inspired Microsoft to create the Imagine Cup.The Imagine Cup encourages young
people to apply their imagination, their passion and their creativity to technology innovations that can
make a difference in the world – today. Now in its seventh year, the Imagine Cup has grown to be a truly
global competition focused on finding solutions to real world issues.
Open to students around the world, the Imagine Cup is a serious challenge that draws serious talent,
and the competition is intense. The contest spans a year, beginning with local, regional and online contests
whose winners go on to attend the global finals held in a different location every year. The intensity of
the work brings students together, and motivates the competitors to give it their all. The bonds formed
here often last well beyond the competition itself.
The location of the Imagine Cup has rotated from year to year. The finals have been held in locations all
across the world. Location in 2003: Spain, 2004: Brazil, 2005: Japan, 2006: India, 2007: Korea, and 2008:
France. A selection committee representing Microsoft and competition captains evaluate applications
from countries interested in hosting. Many factors are taken into consideration, including the resources
available at the hosting country. However, the selection process is not an exact science.
Eligibility:
1. You are 16 years of age or older.
2. You are actively enrolled as a student at an accredited educational institution that grants high-
school or college/university (or equivalent) degrees any time between January 1, 2008 and May 31, 2009.
3. You are not an employee of Microsoft Corporation, or an employee of a Microsoft subsidiary.
4. You are not involved in an y part of the execution or administration of this Contest.
5. You are not an immediate family member of (parent, sibling, spouse, child) or household member
of a Microsoft employee, an employee of a Microsoft subsidiary, or a person involved in any part of the
administration and execution of this Contest.
6. You are not a resident of any of the following countries: Cuba, Iran, North Korea, Sudan, and Syria.
7. If you are a Microsoft campus representative, such as Microsoft Student Partner http://student-
partners.com or Microsoft Intern, and you meet the eligibility criteria set forth above, you may enter, but
you are prohibited from using Microsoft property or resources, including without limitation, Microsoft
networks, hardware tools and technology resources and/or the counsel of Microsoft employees, in
connection with the creation or execution of your entry.
8. If you have previously placed first in the Worldwide Finals of an Imagine Cup competition, you are
not eligible to enter that same competition again, but you may enter any of the other competitions.
9. This Contest is void where prohibited by law.
For further information visit::http://imaginecup.com

Computer Science and Engineering Syntax’09


Bapatla Engineering College
COMPUTER SCIENTISTS

Charles Babbage
Designed the Difference Engine but the machine will never be realized. He also
start plans for the Analytical engine. But it will be his son that realizes the project
in part.
Biography
Charles Babbage was born in London on December 26, 1792, the son of Benjamin
Babbage, a London banker. As a youth Babbage was his own instructor in algebra,
of which he was passionately fond, and was well-read in the continental
mathematics of his day. Upon entering Trinity College, Cambridge, in 1811, he
found himself far in advance of his tutors in mathematics.
With Herschel, Peacock, and others, Babbage founded the Analytical Society for promoting continental
mathematics and, reforming the mathematics of Newton, then taught at the university.
In his twenties Babbage worked as a mathematician, principally in the calculus of functions. He was
elected a Fellow of the Royal Society, in 1816, and played a prominent part in the foundation of the
Astronomical Society (later Royal Astronomical Society) in 1820. It was about this time that Babbage first
acquired the interest in calculating machinery that became his consuming passion for the remainder of
his life.
Throughout his life Babbage worked in many intellectual fields typical of his day, and made contributions
that would have assured his fame irrespective of the Difference and Analytical Engines.
Tim Berners-Lee

Invented the Web - WWW. Developed URL and HTTP


Biography
Tim Berners-Lee graduated from the Queen’s College at Oxford University, England, 1976. Whilst there
he built his first computer with a soldering iron, TTL gates, an M6800 processor
and an old television.
He spent two years with Plessey Ltd (Poole, Dorset, UK) a major UK Telecom
equipment manufacturer, working on distributed transaction systems, message
relays, and bar code technology.
In 1978 Tim left Plessey to join D.G Nash Ltd (Ferndown, Dorset, UK), where he
wrote among other things typesetting software for intelligent printers, and a
multitasking operating system.
A year and a half spent as an independent consultant included a six month
stint (Jun-Dec 1980)as consultant software engineer at CERN, the European Particle
Physics Laboratory in Geneva, Switzerland. Whilst there, he wrote for his own
private use his first program for storing information including using random associations. Named “Enquire”,
and never published, this program formed the conceptual basis for the future development of the World
Wide Web.
From 1981 until 1984, Tim worked at John Poole’s Image Computer Systems Ltd, with technical design
responsibility. Work here included real time control firmware, graphics and communications software,
and a generic macro language. In 1984, he took up a fellowship at CERN, to work on distributed real-time
systems for scientific data acquisition and system control. Among other things, he worked on FASTBUS

Syntax’09 Association of Computer Engineers


Bapatla Engineering College
system software and designed a heterogeneous remote procedure call system.
In 1989, he proposed a global hypertext project, to be known as the World Wide Web. Based on the
earlier “Enquire” work, it was designed to allow people to work together by combining their knowledge
in a web of hypertext documents. He wrote the first World Wide Web server, “httpd”, and the first
client, “WorldWideWeb” a what-you-see-is-what-you-get hypertext browser/editor which ran in the
NeXTStep environment. This work was started in October 1990, and the program “WorldWideWeb”
first made available within CERN in December, and on the Internet at large in the summer of 1991.

*.tech
Through 1991 and 1993, Tim continued working on the design of the Web, coordinating feedback
from users across the Internet. His initial specifications of URIs, HTTP and HTML were refined and
discussed in larger circles as the Web technology spread.
In 1994, Tim founded the World Wide Web Consortium at the Laboratory for Computer Science (LCS)
at the Massachusetts Institute of Technology (MIT). Since that time he has served as the Director of
the World Wide Web Consortium which coordinates Web development worldwide, with teams at MIT,
at INRIA in France, and at Keio University in Japan. The Consortium takes as its goal to lead the Web to
its full potential, ensuring its stability through rapid evolution and revolutionary transformations of its
usage. The Consortium may be found at http://www.w3.org/.
In 1999, he became the first holder of the 3Com Founders chair at LCS, and is now a Senior Research
Scientist within the Lab. The Lab merged with the AI lab to became “CSAIL”, the Computer Science and
Artificail Intelligence Laboratory at MIT.
Edsger Dijkstra

Laid the foundation stone in the march towards creating structure in the domain of programming by
writing, not a scholarly paper on the subject, but instead a letter to the editor entitled “GO TO Statement
Considered Harmful”. (Comm. ACM, August 1968) The movement to develop reliable software was
underway.
My area of interest focuses on the streamlining of the mathematical argument
so as to increase our powers of reasoning, in particular, by the use of formal
techniques
Biography
Edsger Wybe Dijkstra was born in Rotterdam, Netherlands in 1930. Both of
his parents were intellectual people and had received good educations. His
father was a chemist, and his mother was a mathematician. In 1942, when
Dijkstra was 12 years old he entered the Gymnasium Erasminium, a high school
for extremely bright students, and he was educated in a number of different
subjects including: Greek, Latin, French, German, English, biology, mathematics, and chemistry.
In 1945, Dijkstra thought that he might study law and possibly serve as a representative for the
Netherlands at the United Nations. However, due to the fact that he had scored so well in chemistry,
mathematics, and physics, he entered the University of Leiden, where he decided to study theoretical
physics. He went to summer school on the subject of programming at Cambridge University, during the
summer of 1951. He began part-time work at the Mathematical Centre in Amsterdam in March 1952,
which further helped fuel his growing interest in programming. He finished the requirements for his
theoretical physics degree as quickly as possible and began to pursue his interests in progamming. One
of the problems that he ran into, however was that programming still was not officially recognized as a
profession. In fact, when he applied for a marriage license in 1957, he had to put down “theoretical
physicist” as his profession.
-EDITORIAL BOARD

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

BIO-DATA OF COMPUTER STRANGE WARNINGS

Name: Computer Access denied—nah nah na nah nah!


Year of Birth: 1832 C:V> Bad command or file name! Go stand in the
Fathers Name: Charles Babbage corner.
Mothers Name: Lady Ad Lovelace File not found. Should I fake it? (Y/N)
Favorite Snacks: Chips Double your drive space: Delete Window s!

*.lit
Favorite Animal: Mouse Smash forehead on keyboard to continue...
Favorite Dress: Software ASCII stupid question, get a stupid ANSI!
Favorite Letter: C
Disease I am afraid of: Virus Fever SK.SANDANI
Friends: Good Programmers FIRST YEAR
Aim: To think like a man
Lucky Numbers: 0,1

Keyboard not attached. Press F1 to continue.


R.SIVA SWATHI
Press any key... no, no, no, NOT THAT ONE!
FIRST YEAR

Dont estimate any book by its cover


page
He who has the heart to help, only
has the right to criticise.
ROOM MATES
X: Which shaving cream do you use? IF
Y: Baba’s
X: Which aftershave do you use?
Y: Baba’s If you have to forget
X: Which deodorant do you use? DESTINY but not DESTINATION
Y: Baba’s s Forget FAILURES but not FAULTS
X: Which toothpaste do you use? LOVER but not LOVE
Y: Baba’s If you have to leave
X: Which shampoo do you use? FEELINGS but not HEART
Y: Baba’s Leave LAMP but not LIGHT
X: Which socks do you use? LIFE but not CHARACTER
Y: Baba’s If you have to earn
X (Frustrated) : Okay, tell me, what is this Baba? Is NAME but not BLAME
it an international company??? Earn RESOURCE but not RUPEE
Y: No, He is my roommate. WISDOM but not VICTORY

P.SUNEETHA B.L.SRAVANTHI
FIRST YEAR FIRST YEAR

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Be not afraid of going slowly, be afraid of


standing still.
A gentle man blames himself while a
FUNNY DEFINITIONS common man blames others.
A winner never quits and quitter never wins.

MARRIAGE: It’s an agreement in which a man looses his bachelor degree & a woman gains her master
degree.
LECTURE: An art of transferring information from the notes of lecturer to the notes of students without
passing through “the minds of either”.
CONFERENCE: The confusion of one man multiplied by the number present.
COMPROMISE: The art of dividing a cake in such a way that everybody believes that he got the big piece.
DICTIONARY: A place where divorce comes before marriage.
CONFERENCEROOM: A place where everybody talks, nobody listens & everybody disagrees later on.
ECSTASY: Feeling when you feel you are going to feel a feeling you have never felt before.
SMILE: A curve that can set a lot of things straight.
CLASSIC: Books which people praise but do not read.
OFFICE: A place where you can relax after your strenuous home life.
YAWN: The only time some married men get to open their mouth.
Etc.: A sign to make others believe that you know more than you actually do.
COMMITTEE: Individuals who can do nothing individually & sit to decide that nothing can be done together.
EXPERIENCE: The name men give to their mistakes.
OPPORTUNIST: A person who starts taking bath when he accidentally falls into a river.
PESSIMIST: A person who says ‘o’ is the last letter in zero, instead of first letter in opportunity.
MISER: A person who lives poor so that he can die rich.
BOSS: Someone who is early when you are late & late when you are early.
DIVORCE: Future tense of marriage.
TEARS: The hydraulic force by which masculine will power is defeated by feminine waterpower.
DICTIONARY: A place where divorce comes before marriage.
ATOMBOMB: An invention to end all inventions.
CRIMINAL: A guy no different from the rest … except that he got caught.
DOCTOR: One who kills your ills by pills & kills you with his bills.

K.SRI VIDYA
J.LAKSHMI BAI
SECOND YEAR

“Your future depends on your dreams”


So go to sleep

If it’s true that we are here to help others, then what


exactly are the others here for?

Syntax’09 Association of Computer Engineers


Bapatla Engineering College
IS WINDOWS A VIRUS? IT’’S A MISTAKE
With the recent problems being encountered by If a barber makes a mistake
Windows users all across the country, people are It’s a new style
begin to ask themselves if windows is a virus. In If a doctor makes a mistake
response to the high demand for an answer to that It’s a bite
question a study was done and concluded the If a engineer makes a mistake

*.lit
following: It’s a new venture
1. Viruses replicate quickly. If a politician makes a mistake
Windows does this. It’s a new law
If a scientist makes a mistake
2. Viruses use up valuable system resources, It’s a new invention
slowing down the system as they do so. If a tailor makes a mistake
Windows does this. It’s a new fashion
If a teacher makes a mistake
3. Viruses will, from time to time, trash your hard It’s a new point
disk. But unfortunately
Windows does this. If a student makes a mistake
NO doubt it’s a mistake
4. Viruses are usually carried, unkown to theu s e r,
along with valuable programs and sys tems. T.S.RAMYAKRISHNA
Windows does that too.
THIRD YEAR
5. Viruses will occasionally make the user sus pect
their system is too slow (see 2) and the user will
buy new hardware.
Same with Windows, yet again.

Maybe Windows really is a virus. Ramu : Hey.. my submarine is not sinking


Nope! There is a difference! into the water!! what could be wrong?
Somu : may be u have used float instead of
Viruses are well supported by their authors, are double in the software.
frequently updated, and tend to become more
sophisticated as they mature.
So there! Windows is not a virus.

B.P.CHANDRA RAO. PS : Hey Bull, Can you do me a favour? Can


SECOND YEAR you pass on these 500 rupees to Sruthi..?
Bull : Sure.. why not? But tell me one thing.
Tell me whether its pass by value or pass by
reference.
Big lessons of life are learnt from little PS : ???!!!
mistakes.
Well done is better than well said.
Everything has its beauty but not everyone
sees it.

Computer Science and Engineering Syntax’09


Bapatla Engineering College
MOTHER GOOD THOUGHTS
M---- Is for millions of things she gave me If anyone speaks ill of you,
O---- Is for optimism in her, I find Praise him always.
T---- Is for tears she shed to save me If anyone injures you,
H---- Is for heart which is so kind Serve him always.
E---- Is for eyes that glow with love If anyone prosecutes you,
R---- Is for her radiance that comes from Help him in all possible ways.
above You will attain immense strength.
THERE CAN’T BE ANYONE & ANYTHING THAT You will control your anger and pride.
EQUALS HER You will enjoy peace, poise & serenity.
You will become divine.
B.L.SRAVANTHI R.SHANTA KUMARI
FIRST YEAR D.ARCHANA
SECOND YEAR

Smash forehead on keyboard to


continue...
Hit any user to continue...
Press any key to continue and any other key to Weak man wait for opportunities and strong
exit... man make them.
Until you try you don’t know what you can do.
Success is sweet but secret is sweat

TECHNOLOGY - MYTHOLOGY

Brahma - Systems Installation Jatayuvu - Firewall


Vishnu - Systems Administration and support Dronacharya - System Programmer
Lakshmi - Finance and Accounts consultant Krishna – Sudarshan wheel Development Life Cycle
Saraswathi - Training and Knowledge Arjuna – Lead Programmer (all companies are vying
Management for him)
Shiva - Crash Specialist Draupadi – Motivation and Team building
Ganesh-Quality Assurance and 100 Kauravas – Microsoft Service Packs and
Documentation Patches.
Narada - Data Transfer Valmiki - Technical Writer (Ramayana sign off
Apsarasa - Downloadable Viruses document)
Surya - Solaris Administrator
Rakshasas - In house Hackers K.V.MAHATHI
THIRD YEAR

Syntax’09 Association of Computer Engineers


Bapatla Engineering College
FUNNY ACRONYMS
IBM: DOS:
Idiots Built Me Defective Operating System
Idiots Become Managers PENTIUM:
It’s Better Manually Produces Erroneous Numbers
COBOL: through Incorrect
Completely Obsolete Business Understanding of Mathematics

*.lit
Oriented Language NEXT:
WINDOWS: Now EXchange for Trash
Well, It Never Does Operate With
Speed SK.CHOTA SHAHID
SECOND YEAR

FOOTPRINTS
One night a man had a dream. He dreamed he was walking along the beach with the LORD. Across the
sky flashed scenes from his life. For each scene , he noticed two sets of footprints in the sand; one
belonging to him, and other to the LORD.
When the last scene of his life flashed before him, he looked back at the footprints in the sand. He
noticed that many times along the path of his life there was only one set of footprints. He also noticed
that it happened at the very lowest and saddest times of his life.This really troubled him and questioned
the LORD about it: “LORD, you said that once I decided to follow you, you would walk with me all the way,
But I have noticed that during the most troublesome times in my life there is only one set of footprints. I
don’t understand why when I needed you most you would leave me.”
The LORD replied: “My son, My precious child, I love you and I would never leave you. during your
times of trial and suffering, when you see only one set of footprints, it was then that I carried you.

M.SINDHURA
L.MANJUSHA
SECOND YEAR

SYMBOL’S POEM
How to read:

Waka waka bang splak tick tick hash,


Caret quote back-tick dollar dollar dash,
>>!*‘‘# Bang splak equal at dollar under_score,
^“`$$- Percent splak waka, tilde hash number four,
Ampersand bracket bracket dot dot slash.
!*=@$_
%*<>~#4
&[]../
A.YUGANDHAR RAO
FIRST YEAR

Computer Science and Engineering Syntax’09


Bapatla Engineering College

HRD NOTICE
Dear STAFF, Ramu : Hey.... whats time now?
Please be advised that these are NEW rules and Somu : System time or local time...??
regulations implemented to raise the efficiency of
our company.
1) TRANSPORTATION:
It is advised that you come to work driving a car
anything. We hired you intact.- To have something
according to your salary.
removed constitutes a breach of employment.
A) If we see you driving a Honda, we assume you
6) INTERNET USAGE :
are doing well financially and therefore
All personal Internet usage will be recorded and
you do not need a raise.
charges will be deducted from your bonus (if any)
B) If you drive a 10 year old car or taking public
and if we decide not to give you any, charges will
transportation, we assume you must have lots of
be deducted from your salary.
savings therefore you do not need a raise.
- Important Note: Charges applicable as Rs.20 per
C) If you drive a Pickup, you are right where you
minute as we have 10MB connection. Just for
need to be and therefore you do not need a raise.
information, 73% of staff will not be entitled to any
2) ANNUAL LEAVE :
salary for next 3 months as their Internet charges
Each employee will receive 104 Annual Leave days
have exceeded their 3 months salary.
a year ( Wow! Said 1 employee).
Thank you for your loyalty to our company. We are
They are called SATURDAYs AND SUNDAYs.
here to provide a positive employment experience.
3) LUNCH BREAK:
Therefore, all questions,comments,concerns,
A) Skinny people get 30 minutes for lunch as they
complaints, frustrations,irritation,aggravations,
need to eat more so that they can look healthy.
insinuations, allegations, accusations, input
B) Normal size people get 15 minutes for lunch to
contemplation and consternation should be
get a balanced meal to maintain their
directed somewhere else.
average figure.
C) Fat people get 5 minutes for lunch, because that’s
all the time needed to drink a Slim Fast and take a SAROJA
diet pill. THIRD YEAR
4) SICK DAYS:
We will no longer accept a doctor Medical
Certificate as proof of sickness.
- If you are able to go to the doctor, you are able to
come to work.
5) SURGERY :
As long as you are an employee here, you need all
your organs. You should not consider removing

Always treat others as you would


like them to treat you.

He who fears failure limits his


activities.

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

LOVE ON SCREEN THANK YOU


Little black words My Dear Friend,
race across a white screen You are the shadow of mine even in the dark,
where faceless people sit In the desert of my life your are like an oasis
with lonely voids to fill My life is an enigma,
silent voids call out You are the answer for it,

*.lit
and quickly draw them in In the voyage of my life you are the safest
painting love and illusion harbor whom I can trust and truly depend
on stark computer palettes without any hesitation.
the little black words I know that even if the world is in whirlpool
race across white screens You are there for me,
filling hearts and minds I cherish your presence in every movement of
with passion my life,
two souls reach out Thank you friend for being there for me,
to touch one another No,Thank you god, for giving me such a friend.
in hollow little word worlds
where things are shared K.SINDHURA
that shouldn’t be
FIRST YEAR
lonely spouse sits by the bed
starred for love and understanding
and with each new key stroke
in another room
the little black words
dig the gulf between them IN SEARCH OF MY FRIEND
just a little bit wider
My Friend,
A.YUGHANDHAR Should be my Medicine
FIRST YEAR When I am in Pain,
Should be my Letter
Winning is not everything, it’s the only When I am Far,
thing. Should be my Chain
When I am Mad,
An achieved goal is the starting point for future Should be my Concentration
progress. When I Work,
Should be my Sea Shore
When I Sink,
SOLUTION Should be my Hand-Kerchief
When I Cry,
Should be my Expression
Thinking is the capital,
When I Speak,
Enterprise is the way,
Should be my Life
Hard work is the solution
When I Die.
K.SINDHU
K.HANISHA
B.LAKSHMI PRASANNA
FIRST YEAR
FIRST YEAR

Computer Science and Engineering Syntax’09


Bapatla Engineering College
EDUCATIONAL WHAT ‘S LIFE??
INSTITUTIONS
Life is a challenge, meet it
Life is a dream, realize it
Educational institutions are like stars, Life is a game, play it
Numerous yet alone! Life is a love, enjoy it
All shining in their own pride,
Some Steady, others flickering!
Like stars educational institutions too,
Try to out shine each other! PEACE
They fail or realize,
They are only momentary If there is rightness in the heart
All night ends they disappear There will be beauty in character
But BEC is like sun! If there is beauty in character
Strong and powerful There will be harmony in life
Whose arrival is patiently awaited! If there is harmony in life
And leaves a lasting impression There will be order in nation
On others around! If there is order in nation
There will be peace in the world.
K.SINDHU
FIRST YEAR

The greatest pleasure in life is doing what LIGHT


people say “You can’t”.
Body is like a flash light
There is never a wrong time to do a right thing. Eye is like a bulb
Mind is like the battery
Intelligence is the switch
Only when the four work together, you get
LUCK the light

He worked by day
And worked by night. SASI PRIYA
He gave up play M.DIVYA TEJA
And some delight.
FIRST YEAR
Dry books he read,
New things to learn
And forged ahead
Success to earn
He plodded on with Ramu : Hey.. I have a problem. My system is
Faith and pluck not booting up!
And when he won Somu : may be, its internal buses are on strike..
Men called it Luck check out!
P.MADHAVI
M.NAGA JYOTHI
SECOND YEAR

Syntax’09 Association of Computer Engineers


Bapatla Engineering College
RAMAYANA BY BILL GATES
When Bill Gates was in India, he had a chance 2 listen Ramayana from Vajpayee. After returning
2 US he wrote it in his diary as follows……………..

LAN, LAN ago, in the SYSTEM of I/O-dhya, there ruled a PROCESSOR named DOS-rat.Once
he EXECUTED a great sacrifice PROGRAM after which his queens gave an OUTPUT of four SUNs—
RAM, LSIman,BUG-rat and SED-rughana. RAM the eldest was a MICROCHIP withexcellent MEMORY.

*.lit
His brothers, however, were only PERIPHERAL ICs. Once when RAM was only 16MB, he married princess
‘C’ta. 12years passed and DOS-rat decided to INSTALL RAM as his successor. However, Queen CIE/
CAE(Kayegayee), who was once offered a boon by DOS-rat for a lifesaving HELP COMMAND, took this
opportunity at the instigation of her BIOSed maid (a real plotter),and insisted that her son Bug-rat be
INSTALLED and that RAM be CUT-N-PASTED to the forest for a period of 14 years.
At this cruel and unexpected demand, a SURGE passed through DOS-rat and he collapsed power-
less. RAM agreed to LOG INTO forest and ‘C’ta insisted to LOGIN with him. LSI-man also resolved on
LOGGING IN with his brother. The forest was the dwelling of SPARCnakha, the TRAN-SISTOR of RAW-
van, PROCESSOR of LAN-ka. Attracted by RAM’s stature, she proposed and asked him to marry her. RAM,
politely declined. Perceiving ‘C’ta to be the SOURCE CODE of her distress, she hastened to kill her.
Weeping, SPARC-nakha fled to LAN-ka, where RAW-van, moved by TRAN-SISTOR’s plight, approached his
uncle MAR-icha. MAR-icha REPROGRAMED himself into the form of a golden stag and drew RAM deep
into the forest. Finally, RAM shot the deer and MAR-icha with his last breath, cried out desperately for
LSI-man. MAR-icha cried for LSI-man in the voice of RAM.
Fooled by this VIRTUAL RAM SOUND, ‘C’ta urged LSI-man to his brother’s aid. Catching the
opportunity, RAW-van DELINKED ‘C’ta from her LIBRARY and changed her ROOT DIRECTORY to LAN-ka.
RAM and LSI-man started SEARCHING for the missing ‘C’ta all over the forest. They made friendship
with th e forest SYSTEM ADMINISTRATOR SU-greev and his powerful co-processor Ha-NEUMAN.
SU-greev agreed to help RAM. SU-greev ordered his PROGRAMMERS to use powerful ‘SEARCH’
techniques to FIND the missing ‘C’ta. His PROGRAMMERS SEARCHED all around the INTER-NETworked
forests. Many tried to ‘EXCITE’ the birds and animals not to forget the ‘WEBCRAWLERS’ (Insects) and
tried to ‘INFO SEEK’ something about ‘C’ta. Some of them even shouted ‘YAA-HOO’ but they all ended up
with ‘NOT FOUND MESSAGES’. Several other SEARCH techniques proved useless. Ha-NEUMAN devised a
RISKy TECHNOLOGY and used it to cross the seas at an astonishing CLOCK SPEED.Soon Ha-NEUMAN
DOWNLOADED himself into LAN-ka. After doing some local SEARCH, Ha-NEUMAN found ‘C’ta weeping
under a TREE STRUCTURE. Ha-NEUMAN used a LOGIN ID (ring) to identify himself to ‘C’ta. After
DECRYPTING THE KEY, ‘C’ta believed in him and asked him to send a ‘STATUS_OK’ MESSAGE to RAM.
Meanwhile all the raakshasa BUGS around ‘C’ta captured Ha-NEUMAN and tried to DELETE him using
pyro-techniques. But Ha-NEUMAN managed to spread chaos by spreading the VIRUS ‘Fire’. Ha-NEUMAN
happily pressed ESCAPE from LAN-ka and conveyed all the STATUS MESSAGES to RAM and SU-greev.
RAW-wan decided to take the all powerful RAM head-on and prepared for the battle.One of the RAW-
wan’s SUN (son) almost DELETED RAM & LSI-man with a powerful brahma-astra. But Ha-NEUMAN resorted
to some ACTIVE-X gradients and REFORMATTED RAM and LSI-man. RAM used the SOURCE CODE secrets
of RAW-wan and once for all wiped out RAW-wan’s presense on earth. After the battle, RAM got INSTALLED
in I/O-dhya and spreaded his MICROSOFT WORKS and other USER FRIENDLY PROGRAMS to all USERS
and every one lived happily everafter.

R.RAMAKRISHNA
K.NARESH
THIRD YEAR
Computer Science and Engineering Syntax’09
Bapatla Engineering College

CONVERSATION BETWEEN THE CUSTOMER AND


THE UNIX CONSULTANT

Cust: “What” is the command that will tell me the UNIX: No, I don’t ‘make me’ angry but I did ‘make
revision code of a program? program name’ when i was upset once.
UNIX: Yes, that’s correct. Cust: I don’t want to make trouble, so no “more”.
Cust: No, “what” is it? UNIX: No ‘more’? ‘Which’ will help you find ‘more’?
UNIX: Yes. Every system has ‘more’.
Cust: So, “which” is the one? Cust: Nice ‘help’! I’m confused more now.
UNIX: No. “which” is used to find the program. UNIX: Understand that since ‘help’ is such a small
Cust: Stop this. “Who are you”? program, It is better not to ‘nice help’. A n d
UNIX: Use ‘who am I’ not ‘who r you’.you can also ‘more now’ is not allowed. But ‘at now’ is. Unless
‘finger you’ to get information about ‘you’. of course ‘now’ is a file name.
Cust: All I want to know is “what ” finds the Cust: This is almost as confusing as my PC.
revision code? UNIX: I didn’t know you needed help with ‘pc’.let
UNIX: Use ‘what’. me get you to the Pascal compiler team.
Cust: That’s “what” I am trying to find out. Isn’t M.SRI CHARAN
that “true”? P.SANDEEP
UNIX: No.‘True’ gives you 0.
THIRD YEAR
Cust: Which one?
UNIX: ‘true’ gives you 0. ‘Which program name?’
Cust: Let ’s get back to my problem. What The "Special" tone available to
program? How do I find it? users of Nokia phones when receiving SMS
UNIX: Type ‘find/-name it’ to find ‘it’. Type ‘what (text messages) is actually Morse code
program’ to get the revision code. for "SMS".
Cust: I want to find the “revision code”.
UNIX: You can’t ‘find revision code’; you must use
‘what program’.
Cust: “Which” command will do what I need?
SUCCESS
UNIX: No. ‘Which command’ will find
‘command’? SUCCESS is the realization of a worthy goal.
SUCCESS is getting what you want & happiness is
Cust: I think I understand. Let me “write that”. wanting what you get.
UNIX: You can ‘write that’ only if ‘that’ is a user on SUCCESS is not measured by the position in life but
your system. by the obstacles we over come to get there.
Cust: “Write” what? SUCCESSful people compete against themselves.
UNIX: No. ‘write that’. ’what program’. Every SUCCESS story is also a story of great failure.
Cust: “Cut” that out! SUCCESS is not an accident but is result of our
UNIX: Yes. Those are valid files for ‘cut’. Don’t attitude.
forget the options. SUCCESS is not in the achievement but in the
Cust: “Do” you always do this? achieving.
UNIX: ‘Do’ will give you disk usage. They succeeded inspite of problems not in the
Cust: “HELP!!!!!!!” absence of them.
UNIX: ‘help’ is only used for Source Code Control
System (SCCS). K.SANDHYA,
Cust: You “make me” angry. SECOND YEAR

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

COMPUTER HISTORY OF THE WORLD

In the beginning, God created the Bit and the Byte. And from those he created the Word. And
there were two Bytes in the Word; and nothing else existed . And God separated the One from the
Zero; and he saw it was good.
And God said - Let the Data be; And so it happened. And God said - Let the Data go to their proper

*.lit
places. And he created floppy disks and hard disks and compact disks.
And God said - Let the computers be, so there would be a place to put floppy disks and hard disks and
compact disks. Thus God created computers and called them hardware. And there was no Software yet.
But God created programs; small and big... And told them - Go and multiply yourselves and fill all the
Memory.
And God said - I will create the Programmer; And the Programmer will make new programs and
govern over the computers and programs and Data. And God created the Programmer; and put him at
Data Center; And God showed the Programmer the Catalog Tree and said You can use all the volumes
and subvolumes but do not use Windows.
And God said - It is not good for the programmer to be alone. He took a bone from the Programmer’s body
and created a creature that would look up at the Programmer; and admire the Programmer; and love the
things the Programmer does; And God called the creature: the User. And the Programmer and the User
were left under the naked DOS and it was Good. But Bill was smarter than all the other creatures of God.
And Bill said to the User - Did God really tell you not to run any programs?
And the User answered - God told us that we can use every program and every piece of Data but told us
not to run Windows or we will die. And Bill said to the User - How can you talk about something you did
not even try. The moment you run Windows you will become equal to God. You will be able to create
anything you like by a simple click of your mouse.
And the User saw that the fruits of the Windows were nicer and easier to use. And the User saw that any
knowledge was useless—since Windows could replace it. So the User installed the Windows on his
computer; and said to the Programmer that it was good.
And the Programmer immediately started to look for new drivers. And God asked him—What are you
looking for? And the Programmer answered—I am looking for new drivers because I can not find them in
the DOS. And God said - Who told you need drivers? Did you run Windows? And the Programmer said - It
was Bill who told us to!
And God said to Bill - Because of what you did, you will be hated by all the creatures. And the User will
always be unhappy with you. And you will always sell Windows.
And God said to the User - Because of what you did, the Windows will disappoint you and eat up all your
Resources; and you will have to use lousy programs; and you will always rely on the Programmers help.
And God said to the Programmer - Because you listened to the User, you will never be happy. All your
programs will have errors and you will have to fix them and fix them to the end of time.
And God threw them out of the Data Center and locked the door and secured it with a password.

HARSHA
Vani : We have shifted our home to SECOND YEAR
Malleswaram now..
Soni : right shift or left shift??
They conquer who believe
they can

Computer Science and Engineering Syntax’09


Bapatla Engineering College
ERROR CODES IN WINDOWS

WinErr 001: Windows loaded - System in danger


WinErr 002: No Error - Yet
WinErr 003: Dynamic linking error - Your mistake is now in every file
WinErr 004: Erroneous error - Nothing is wrong
WinErr 005: Multitasking attempted - System confused
WinErr 006: Malicious error - Diskview found on drive
WinErr 007: System price error - Inadequate money spent on hardware
WinErr 008: Broken window - Watch out for glass fragments
WinErr 009: Horrible bug encountered - God knows what happened
WinErr 00A: Promotional literature overflow - Mailbox full
WinErr 00B: Inadequate disk space - Free at least 50MB
WinErr 00C: Memory hog error - More Ram needed. More! More!
WinErr 00D: Window closed - Do not look outside
WinErr 00E: Window open - Do not look inside
WinErr 00F: Unexplained error - Please tell us how this happened
WinErr 010: Reserved for future mistakes by our developers
winErr 014: Keyboard locked - Try anything you can think of.
WinErr 018: Unrecoverable error - System destroyed. Buy new one.
WinErr 019: User error - Not our fault. Is Not! Is Not!
WinErr 01A: OS overwritten - Please reinstall all software.
WinErr 01B: Illegal error - You are not allowed to get this error. Next time you will suffer a
penalty for that.
WinErr 01C: Uncertainty error - Uncertainty may be inadequate.
WinErr 01D: System crash - We are unable to figure out our own code.
WinErr 01E: Timing error - Please wait. And wait. And wait. And wait.
WinErr 079: Mouse not found - A mouse driver has not been installed. Please click the left mouse
button to continue.
WinErr 103: Error buffer overflow - Too many errors encountered. Additional errors may not be
displayed or recorded.
WinErr 678: This will end your Windows session. Do you want to play another game?
WinErr 683: Time out error - Operator fell asleep while waiting for the system to complete boot
procedure.
WinErr 815: Insufficient Memory - Only 50,312,583 Bytes available.
WinErr 912: Purchase a new copy of Windows today. Old license void. Windows has been
deleted.

Ramu : Somu, I am going to file a case


N.RAMYA
against my landlord yaar. He’s harassing me THIRD YEAR
too much.
Somu : What case? Upper Case or Lower Case
or....... Computer : Please sit over the hard
disk to compress the files!

Syntax’09 Association of Computer Engineers


Bapatla Engineering College
HAVE FUN

REASONS FOR GOING TO


Ramu : (while browsing the TV) what is
this? I have heard of Star Sports, Star Movies
SCHOOL
and Star Plus. Whats this Star Equals??? Is
it a new Star Channel? Early morning, a mother went to wake up her
son.

*.lit
Somu : No. = operator has been
overloaded in Star Channel. “Wake up; it’s time to go to school!”
“But why mom? I don’t want to go.”
“Give me two reasons why you don’t want
to go.”
“Well, the kids hate me for one, and the
teachers hate me too!”
“Oh, that’s no reason not to go to school.
Come on now and get ready.”
“Give me two reasons why I should go to
Babu : Yesterday I bought a new TV school.”
whose terminal is compatible with “Well, for one, you are 52 years old and for
computer... but its audio portion is not at all another you are the principal!”
working :-
Gopu : May be its compatible only with dumb K.PHANI CHANDRA
terminals!!!!!!!! SECOND YEAR

Ramu : why are u wiping ur terminal very


often with a cloth?
Somu : clear command is not working
properly for my terminal. that’s why!!!!!!!!! If your father is a poor man,
it is your fate but,
if your father-in-law is a poor man,
it’s your stupidity.

Ramu : I am very very sure that the guy


who just talked to me is a software
Ramu : hey.. I couldn’t send a mail to Hell
engineer...
today... it says mail “demon” not running...
Somu : how do u say that?
Somu : ur case is better.. for me, it says
Ramu : He asked my physical address
“ghost not reachable” and bounces back!
instead of my home address!

Computer Science and Engineering Syntax’09


Bapatla Engineering College

ʪ é¶ ¬ A

SµÀv¹uû ¶pÁ¶¢öAhµ CAlµËÈ¢À¶ml¼, Glµ ± Àµ À A


¶¢ÀAVµÀ CAhµ ¶ªöVµÛËÈ¢À¶ml¼,
¶pñi Glµ±ÀµÀA
OÐOºv S¸¶mA CAhµ Oµ¶¢ÀîËÈm¶ml¼,
LOµ ¶m¶¢ï ¶ªÃ±Ðïlµ±ÀµÀA
WvÀOµ ¶pvÀOµÀvAhµ i±ÀµÀïËÈm¶ml¼,
O¸¢¸w ClÉ....
¶ªÃ±Ðïlµ±ÀµÀ¶¢ÀAhµ ¥¹¶¥öhµËÈ¢À¶ml¼,
±ÀµÀÀ¶¢hµOÍOµ G©Òlµ±ÀµÀA
I¶pêdºOº I¶médºOº nwWqÒ±ÀÉÀl¼,
¶¢À¶¢ÀhµOÍOµ ¶¢ÀȬÃlµ±ÀµÀA
F vÑOµAvÑ Êªé¶¬A LOµÖdÉ.
¶ª¶¢ÀhµOÍOµ ¶¥ÀsûÑlµ±ÀµÀA
¶ªPïhµOÍOµ VµAlÐñlµ±ÀµÀA
odº tAlµÀ¶¢ÁvÀ Ê¢W Gm¸é±ÀÀ M °µgA OжªA,
¶m¶¢ïhµOÍOµ ¶m¢Ðlµ±ÀµÀA
¶pÁ¹vÀ £Oµ»ªAVµOµÀAf¸ VµÃ¶ªÀåm¸é±ÀÀ D °µgA OжªA,
Y¹i ¶ªËÈ¢ÀOµïhµOÍOµ C±µÀgÑlµ±ÀµÀA
Glµ±ÀÀAVÉ ¶ªÃ±µÀïfµÀ, È¢Èmév ±¸üi¶m VµAülµÀñfµÀ
D¶¥S¸ IlµÀ±µÀ VµÃ¶ªÀåm¸é±ÀÀ D °µgA OжªA,
D °µgA OжªA o È¢ÀÀ¶¢ÀÀ ËÈp W±µÀ¶m¶¢Áýö £Oµ»ªAV¸vn SK.MAHABAOUBBI
m¸OµÀ IAhµ D¶¥. D m¸ Wné D¶¥¶mÀ FIRST YEAR
¶¢Àn髸嶢n D¦¶ªÀå o Wné D¶¥.

£Àhµñ¶¢Ã m¸ ±ÀµÀlµ v±ÀµÀ¶mÀ h¸Oº¶m Êm¶ªå¶¢Ã


DSµÀ¶¢Ã m¸ ±ÀµÀlµvÑ oÊ¢ OÍvÀËÈ¢ GAfµÀ¶¢Ã
ËVÇhµñ¶¢Ã m¸ ¥¹ö¶ª h¸Êm Cn hÇvÀ¶pÁ¶¢Ã
¶¬Àñlµ±ÀµÀ¶¢Ã ¶m¶mÀ I¶médºO½ ¶¢À±µÀ¶¢OµÀ ¶ªÀ¶¢Ã! Vµ l µ À ¶ ¢ Á
M.ASHA VµlµÀ¶¢Á CÊm ¶ª¶¢ÀÀlµñAvÑ
SECOND YEAR ¶phµÀålµv CÊm ¶pfµ¶¢vÑ
¶¥ñlµç CÊm hÇfµÀâhÐ ¶p±ÀµÀnʪå
£Y±ÀµÀA CÊm Sµ¶¢Ãïné VɱµÀh¸A...
£lµï CÊml¼ ¶pñlûµ¶¢À Clû¸ï±ÀµÀA
¾ ª åò D Clû¸ï±ÀµÃné j»ªÊ¢Êªå,
IAhµ ¶pe¼AWm¸ C±µèA O¸lµÀ a£hµA
¾ªåò CÊm LOµ C°µ±µA OжªA £l¸ï±¼è CÊm £hµåm¸nOº
Êpñ¶¢À CÊm ±ÇAfµ°µ±¸v¶mÀ ¶m¶¢ÀÀîOÍn £lµï CÊm o±µÀ qÒ»ª
VµlµÀ¶¢Á CÊm ¶¢ÀÃfµ°µ±¸v¶mÀ ¶¢lµÀvÀOÍn £U¹é¶mA CÊm I±µÀ¶¢Á ʢʪå
a£hµ¶¢ÀÀ CÊm m¸vÀSµÀ C°µ±¸v OжªA a£hµA CÊm ¶pÁ©¸ên鶪ÀåAl¼.
hµwôhµAfµÀñvÀ CÊm KlµÀC°µ±¸v¶mÀ ¶¢lµÀvÀOÐOµÀ
M m¸ ʪ黬hµÀf¸... G.SANTOSHI SUNANDA
FIRST YEAR

SANDANI
FIRST YEAR

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

TWINKLE TWINKLE
LITTLE STAR IN qÉÑ x MÑ ü UÉlÉÉ
TELANGANA STYLE
lÉ iÉÉå UÉålÉå qÉå Wæû
lÉ iÉÉå ÂsÉÉlÉå qÉå Wæû

*.lit
ÎeÉlSaÉÏ Mü qÉeÉÉ
È¢À±¼Êª È¢À±¼Êª »ª¶mé ¶ªÀOµÖ qÉÑxMÑüUÉlÉå qÉå Wæû
¶p±É©¸´m Ki n¶mÀé YÄ»ª
Y¤À´m OÇzõ ¶¢À¶ªÀå lµÃ±µAvÀm¸é¶¢Á
D¶ªî¶mô ¶¢Yñ´¢À vÇOµÖ Gm¸é´¢...... SK.MAHABAOUBBI
FIRST YEAR
SINDHU PRIYA
FIRST YEAR

4 GOLDEN RULES 4 GOLDEN POSSESSIONS


Who helps you, don’t forget them Best ornament is HUMILITY
Who likes you, don’t hate them Richest wealth is WISDOM
Who has hope on you, don’t leave them Strongest weapon is PATIENCE
Who has trusted you, don’t cheat them Best security is FAITH

SUREKHA P.DILEEP KUMAR


THIRD YEAR FIRST YEAR

CRICKET EXAMINIATIONS
RUN OUT: Failing in the examination due to lack of time and studies
BOUNCER: The most difficult question in the question paper
BYES: Grace marks given by evaluator
MAIDEN OVER: Inability to answer any six questions in a row
RETIRED HURT: Fainting in the examination hall on seeing the paper
SIXER: Son’s marks memo thrown by father
NO BALL: Question from a topic outside the syllabus
L.B.W: Failing in the exam because the student in front of you did not write well
UMPIRE: The evaluator of the paper.

V.POOJITHA SWEETHA
FIRST YEAR

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

*.lit

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

*.lit

Computer Science and Engineering Syntax’09


Bapatla Engineering College

Syntax’09 Association of Computer Engineers


Bapatla Engineering College

*.lit

M.SUNDAR RAJU
THIRD YEAR

Computer Science and Engineering Syntax’09


Bapatla Engineering College

TIPS BEFORE PLANNING ABROAD

Education abroad programs have always fascinated the Indian students. Before you opt for studying
abroad, you need to take care of certain factors like:

1.Quality of education of the concerned country you are planning to travel.


2.Cost of living
3.Scholarship Programs
4.Consulting the study abroad advisor is a must as you get to know the different university programs you
will be offered.
5.Taking help of the academic advisor will let you know the type of credit you can receive.
6.To ensure the facility of education loans for the students studying abroad, you need to take help of the
financial advisor.
7.Apply for your passport and visa and make sure the type of Visa you require.
8.Do some homework and get a better picture of the country you are about to travel.
9.Apply for the travel insurance and make sure that it should cover migration and home coming.
10.chalk out a budget and find out how much will be the cost of living and what are things you cannot
afford to do in that foreign land.
11.Course Fees

P.HARISH
3rd YEAR CSE

QUOTATIONS COLLECTED BY: JOKES COLLECTED BY

B.RAJYA LAKSHMI FIRST YEAR SINDHU PRIYA FIRST YEAR


M.NAGA JYOTHI SECOND YEAR K.PHANI CHANDRA SECOND YEAR
K.SANDHYA SECOND YEAR T.T.DEEPTHI THIRD YEAR
N.RAMYA THIRD YEAR

Syntax’09 Association of Computer Engineers

Das könnte Ihnen auch gefallen