1. The hexadecimal equivalent of a decimal number would produce a larger number than the original decimal number.



Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->Decimal equivalent of the signed binary number 11110101 in 1’s complement form is :....
QA->A is taller than B; B is taller than C; D is taller than E and E is taller than B. Who is the shortest?....
QA->Which region of India has a larger female population than the male population?....
QA->A virtual image larger than the object can be formed by which mirror?....
QA->A program Graph has ‘start’ and ‘end’ nodes. The total number of paths from start to end is equivalent to the -----------set of test data required to test the software.....
MCQ->The hexadecimal equivalent of a decimal number would produce a larger number than the original decimal number.....
MCQ-> My aim is to present a conception of justice which generalizes and carries to a higher level of abstraction the familiar theory of the social contract. In order to do this we are not to think of the original contract as one to enter a particular society or to set up a particular form of government. Rather, the idea is that the principles of justice for the basic structure of society are the object of the original agreement. They are the principles that free and rational persons concerned to further their own interests would accept in an initial position of equality. These principles are to regulate all further agreements; they specify the kinds of social cooperation that can be entered into and the forms of government that can be established. This way of regarding the principles of justice, I shall call justice as fairness. Thus, we are to imagine that those who engage in social cooperation choose together, in one joint act, the principles which are to assign basic rights and duties and to determine the division of social benefits. Just as each person must decide by rational reflection what constitutes his good, that is, the system of ends which it is rational for him to pursue, so a group of persons must decide once and for all what is to count among them as just and unjust. The choice which rational men would make in this hypothetical situation of equal liberty determines the principles of justice.In ‘justice as fairness’, the original position is not an actual historical state of affairs. It is understood as a purely hypothetical situation characterized so as to lead to a certain conception of justice. Among the essential features of this situation is that no one knows his place in society, his class position or social status, nor does anyone know his fortune in the distribution of natural assets and abilities, his intelligence, strength, and the like. I shall even assume that the parties do not know their conceptions of the good or their special psychological propensities. The principles of justice are chosen behind a veil of ignorance. This ensures that no one is advantaged or disadvantaged in the choice of principles by the outcome of natural chance or the contingency of social circumstances. Since all are similarly situated and no one is able to design principles to favor his particular condition, the principles of justice are the result of a fair agreement or bargain.Justice as fairness begins with one of the most general of all choices which persons might make together, namely, with the choice of the first principles of a conception of justice which is to regulate all subsequent criticism and reform of institutions. Then, having chosen a conception of justice, we can suppose that they are to choose a constitution and a legislature to enact laws, and so on, all in accordance with the principles of justice initially agreed upon. Our social situation is just if it is such that by this sequence of hypothetical agreements we would have contracted into the general system of rules which defines it. Moreover, assuming that the original position does determine a set of principles, it will then be true that whenever social institutions satisfy these principles, those engaged in them can say to one another that they are cooperating on terms to which they would agree if they were free and equal persons whose relations with respect to one another were fair. They could all view their arrangements as meeting the stipulations which they would acknowledge in an initial situation that embodies widely accepted and reasonable constraints on the choice of principles. The general recognition of this fact would provide the basis for a public acceptance of the corresponding principles of justice. No society can, of course, be a scheme of cooperation which men enter voluntarily in a literal sense; each person finds himself placed at birth in some particular position in some particular society, and the nature of this position materially affects his life prospects. Yet a society satisfying the principles of justice as fairness comes as close as a society can to being a voluntary scheme, for it meets the principles which free and equal persons would assent to under circumstances that are fair.A just society, as conceptualized in the passage, can be best described as:
 ....
MCQ-> In a modern computer, electronic and magnetic storage technologies play complementary roles. Electronic memory chips are fast but volatile (their contents are lost when the computer is unplugged). Magnetic tapes and hard disks are slower, but have the advantage that they are non-volatile, so that they can be used to store software and documents even when the power is off.In laboratories around the world, however, researchers are hoping to achieve the best of both worlds. They are trying to build magnetic memory chips that could be used in place of today’s electronics. These magnetic memories would be nonvolatile; but they would also he faster, would consume less power, and would be able to stand up to hazardous environments more easily. Such chips would have obvious applications in storage cards for digital cameras and music- players; they would enable handheld and laptop computers to boot up more quickly and to operate for longer; they would allow desktop computers to run faster; they would doubtless have military and space-faring advantages too. But although the theory behind them looks solid, there are tricky practical problems and need to be overcome.Two different approaches, based on different magnetic phenomena, are being pursued. The first, being investigated by Gary Prinz and his colleagues at the Naval Research Laboratory (NRL) in Washington, D.c), exploits the fact that the electrical resistance of some materials changes in the presence of magnetic field— a phenomenon known as magneto- resistance. For some multi-layered materials this effect is particularly powerful and is, accordingly, called “giant” magneto-resistance (GMR). Since 1997, the exploitation of GMR has made cheap multi-gigabyte hard disks commonplace. The magnetic orientations of the magnetised spots on the surface of a spinning disk are detected by measuring the changes they induce in the resistance of a tiny sensor. This technique is so sensitive that it means the spots can be made smaller and packed closer together than was previously possible, thus increasing the capacity and reducing the size and cost of a disk drive. Dr. Prinz and his colleagues are now exploiting the same phenomenon on the surface of memory chips, rather spinning disks. In a conventional memory chip, each binary digit (bit) of data is represented using a capacitor-reservoir of electrical charge that is either empty or fill -to represent a zero or a one. In the NRL’s magnetic design, by contrast, each bit is stored in a magnetic element in the form of a vertical pillar of magnetisable material. A matrix of wires passing above and below the elements allows each to be magnetised, either clockwise or anti-clockwise, to represent zero or one. Another set of wires allows current to pass through any particular element. By measuring an element’s resistance you can determine its magnetic orientation, and hence whether it is storing a zero or a one. Since the elements retain their magnetic orientation even when the power is off, the result is non-volatile memory. Unlike the elements of an electronic memory, a magnetic memory’s elements are not easily disrupted by radiation. And compared with electronic memories, whose capacitors need constant topping up, magnetic memories are simpler and consume less power. The NRL researchers plan to commercialise their device through a company called Non-V olatile Electronics, which recently began work on the necessary processing and fabrication techniques. But it will be some years before the first chips roll off the production line.Most attention in the field in focused on an alternative approach based on magnetic tunnel-junctions (MTJs), which are being investigated by researchers at chipmakers such as IBM, Motorola, Siemens and Hewlett-Packard. IBM’s research team, led by Stuart Parkin, has already created a 500-element working prototype that operates at 20 times the speed of conventional memory chips and consumes 1% of the power. Each element consists of a sandwich of two layers of magnetisable material separated by a barrier of aluminium oxide just four or five atoms thick. The polarisation of lower magnetisable layer is fixed in one direction, but that of the upper layer can be set (again, by passing a current through a matrix of control wires) either to the left or to the right, to store a zero or a one. The polarisations of the two layers are then either the same or opposite directions.Although the aluminum-oxide barrier is an electrical insulator, it is so thin that electrons are able to jump across it via a quantum-mechanical effect called tunnelling. It turns out that such tunnelling is easier when the two magnetic layers are polarised in the same direction than when they are polarised in opposite directions. So, by measuring the current that flows through the sandwich, it is possible to determine the alignment of the topmost layer, and hence whether it is storing a zero or a one.To build a full-scale memory chip based on MTJs is, however, no easy matter. According to Paulo Freitas, an expert on chip manufacturing at the Technical University of Lisbon, magnetic memory elements will have to become far smaller and more reliable than current prototypes if they are to compete with electronic memory. At the same time, they will have to be sensitive enough to respond when the appropriate wires in the control matrix are switched on, but not so sensitive that they respond when a neighbouring elements is changed. Despite these difficulties, the general consensus is that MTJs are the more promising ideas. Dr. Parkin says his group evaluated the GMR approach and decided not to pursue it, despite the fact that IBM pioneered GMR in hard disks. Dr. Prinz, however, contends that his plan will eventually offer higher storage densities and lower production costs.Not content with shaking up the multi-billion-dollar market for computer memory, some researchers have even more ambitious plans for magnetic computing. In a paper published last month in Science, Russell Cowburn and Mark Well and of Cambridge University outlined research that could form the basis of a magnetic microprocessor — a chip capable of manipulating (rather than merely storing) information magnetically. In place of conducting wires, a magnetic processor would have rows of magnetic dots, each of which could be polarised in one of two directions. Individual bits of information would travel down the rows as magnetic pulses, changing the orientation of the dots as they went. Dr. Cowbum and Dr. Welland have demonstrated how a logic gate (the basic element of a microprocessor) could work in such a scheme. In their experiment, they fed a signal in at one end of the chain of dots and used a second signal to control whether it propagated along the chain.It is, admittedly, a long way from a single logic gate to a full microprocessor, but this was true also when the transistor was first invented. Dr. Cowburn, who is now searching for backers to help commercialise the technology, says he believes it will be at least ten years before the first magnetic microprocessor is constructed. But other researchers in the field agree that such a chip, is the next logical step. Dr. Prinz says that once magnetic memory is sorted out “the target is to go after the logic circuits.” Whether all-magnetic computers will ever be able to compete with other contenders that are jostling to knock electronics off its perch — such as optical, biological and quantum computing — remains to be seen. Dr. Cowburn suggests that the future lies with hybrid machines that use different technologies. But computing with magnetism evidently has an attraction all its own.In developing magnetic memory chips to replace the electronic ones, two alternative research paths are being pursued. These are approaches based on:
 ....
MCQ-> The persistent patterns in the way nations fight reflect their cultural and historical traditions and deeply rooted attitudes that collectively make up their strategic culture. These patterns provide insights that go beyond what can be learnt just by comparing armaments and divisions. In the Vietnam War, the strategic tradition of the United States called for forcing the enemy to fight a massed battle in an open area, where superior American weapons would prevail. The United States was trying to re-fight World War II in the jungles of Southeast Asia, against an enemy with no intention of doing so. Some British military historians describe the Asian way of war as one of indirect attacks, avoiding frontal attacks meant to overpower an opponent. This traces back to Asian history and geography: the great distances and harsh terrain have often made it difficult to execute the sort of open-field clashes allowed by the flat terrain and relatively compact size of Europe. A very different strategic tradition arose in Asia. The bow and arrow were metaphors for an Eastern way of war. By its nature, the arrow is an indirect weapon. Fired from a distance of hundreds of yards, it does not necessitate immediate physical contact with the enemy. Thus, it can be fired from hidden positions. When fired from behind a ridge, the barrage seems to come out of nowhere, taking the enemy by surprise. The tradition of this kind of fighting is captured in the classical strategic writings of the East. The 2,000 years' worth of Chinese writings on war constitutes the most subtle writings on the subject in any language. Not until Clausewitz, did the West produce a strategic theorist to match the sophistication of Sun-tzu, whose Art of War was written 2,300 years earlier. In Sun-tzu and other Chinese writings, the highest achievement of arms is to defeat an adversary without fighting. He wrote: "To win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the supreme excellence." Actual combat is just one among many means towards the goal of subduing an adversary. War contains too many surprises to be a first resort. It can lead to ruinous losses, as has been seen time and again. It can have the unwanted effect of inspiring heroic efforts in an enemy, as the United States learned in Vietnam, and as the Japanese found out after Pearl Harbor. Aware of the uncertainties of a military campaign, Sun-tzu advocated war only after the most thorough preparations. Even then it should be quick and clean. Ideally, the army is just an instrument to deal the final blow to an enemy already weakened by isolation, poor morale, and disunity. Ever since Sun-tzu, the Chinese have been seen as masters of subtlety who take measured actions to manipulate an adversary without his knowledge. The dividing line between war and peace can be obscure. Low-level violence often is the backdrop to a larger strategic campaign. The unwitting victim, focused on the day-to-day events, never realizes what's happening to him until it's too late. History holds many examples. The Viet Cong lured French and U.S. infantry deep into the jungle, weakening their morale over several years. The mobile army of the United States was designed to fight on the plains of Europe, where it could quickly move unhindered from one spot to the next. The jungle did more than make quick movement impossible; broken down into smaller units and scattered in isolated bases, US forces were deprived of the feeling of support and protection that ordinarily comes from being part of a big army. The isolation of U.S. troops in Vietnam was not just a logistical detail, something that could be overcome by, for instance, bringing in reinforcements by helicopter. In a big army reinforcements are readily available. It was Napoleon who realized the extraordinary effects on morale that come from being part of a larger formation. Just the knowledge of it lowers the soldier's fear and increases his aggressiveness. In the jungle and on isolated bases, this feeling was removed. The thick vegetation slowed down the reinforcements and made it difficult to find stranded units. Soldiers felt they were on their own. More important, by altering the way the war was fought, the Viet Cong stripped the United States of its belief in the inevitability of victory, as it had done to the French before them. Morale was high when these armies first went to Vietnam. Only after many years of debilitating and demoralizing fighting did Hanoi launch its decisive attacks, at Dienbienphu in 1954 and against Saigon in 1975. It should be recalled that in the final push to victory the North Vietnamese abandoned their jungle guerrilla tactics completely, committing their entire army of twenty divisions to pushing the South Vietnamese into collapse. This final battle, with the enemy's army all in one place, was the one that the United States had desperately wanted to fight in 1965. When it did come out into the open in 1975, Washington had already withdrawn its forces and there was no possibility of re-intervention. The Japanese early in World War II used a modern form of the indirect attack, one that relied on stealth and surprise for its effect. At Pearl Harbor, in the Philippines, and in Southeast Asia, stealth and surprise were attained by sailing under radio silence so that the navy's movements could not be tracked. Moving troops aboard ships into Southeast Asia made it appear that the Japanese army was also "invisible." Attacks against Hawaii and Singapore seemed, to the American and British defenders, to come from nowhere. In Indonesia and the Philippines the Japanese attack was even faster than the German blitz against France in the West. The greatest military surprises in American history have all been in Asia. Surely there is something going on here beyond the purely technical difficulties of detecting enemy movements. Pearl Harbor, the Chinese intervention in Korea, and the Tet offensive in Vietnam all came out of a tradition of surprise and stealth. U.S. technical intelligence – the location of enemy units and their movements was greatly improved after each surprise, but with no noticeable improvement in the American ability to foresee or prepare what would happen next. There is a cultural divide here, not just a technical one. Even when it was possible to track an army with intelligence satellites, as when Iraq invaded Kuwait or when Syria and Egypt attacked Israel, surprise was achieved. The United States was stunned by Iraq's attack on Kuwait even though it had satellite pictures of Iraqi troops massing at the border. The exception that proves the point that cultural differences obscure the West's understanding of Asian behavior was the Soviet Union's 1979 invasion of Afghanistan. This was fully anticipated and understood in advance. There was no surprise because the United States understood Moscow's worldview and thinking. It could anticipate Soviet action almost as well as the Soviets themselves, because the Soviet Union was really a Western country. The difference between the Eastern and the Western way of war is striking. The West's great strategic writer, Clausewitz, linked war to politics, as did Sun-tzu. Both were opponents of militarism, of turning war over to the generals. But there all similarity ends. Clausewitz wrote that the way to achieve a larger political purpose is through destruction of the enemy's army. After observing Napoleon conquer Europe by smashing enemy armies to bits, Clausewitz made his famous remark in On War (1932) that combat is the continuation of politics by violent means. Morale and unity are important, but they should be harnessed for the ultimate battle. If the Eastern way of war is embodied by the stealthy archer, the metaphorical Western counterpart is the swordsman charging forward, seeking a decisive showdown, eager to administer the blow that will obliterate the enemy once and for all. In this view, war proceeds along a fixed course and occupies a finite extent of time, like a play in three acts with a beginning, a middle, and an end. The end, the final scene, decides the issue for good. When things don't work out quite this way, the Western military mind feels tremendous frustration. Sun-tzu's great disciples, Mao Zedong and Ho Chi Minh, are respected in Asia for their clever use of indirection and deception to achieve an advantage over stronger adversaries. But in the West their approach is seen as underhanded and devious. To the American strategic mind, the Viet Cong guerrilla did not fight fairly. He should have come out into the open and fought like a man, instead of hiding in the jungle and sneaking around like a cat in the night. According to the author, the main reason for the U.S. losing the Vietnam war was
 ....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions