Monday 29 June 2015

MBA I,II,III,IV Regular/Supple (January/February-2011) Papers
MBA-I Semester (R09,R07,R05)–Regular Exams Question Papers (February-2011)

http://www.ziddu.com/download/140876...-2011.rar.html 
MBA-III Semester (R09,R07,R05)–Regular Exams Question Papers (January/February-2011)
Code:
http://www.ziddu.com/download/140876...b2011.rar.html
 
MBA-IV Semester (R07,R05)–Supplementary Exams Question Papers (January-2011)
Code:
http://www.ziddu.com/download/140876...-2011.rar.html
 
MCA I,II,III,IV,V Regular/Supple (January/February-2011) Papers
 
 MCA-I Semester (R09,R06,NR)–Regular Exams Question Papers (February-2011)
Code:
http://www.ziddu.com/download/140878...-2011.rar.html
 
MCA-II Semester (R09,R06,NR)–Supplementary Exams Question Papers (January-2011)
Code:
http://www.ziddu.com/download/140878...-2011.rar.html
 
MCA-III Semester (R09,R06,NR)–Regular Exams Question Papers (January-2011)
Code:
http://www.ziddu.com/download/140878...-2011.rar.html
 

JNTU-HYD : B.Tech 3-1 Semester (R07) Exams-May 2011 Question Papers

Just click on the Download Link-2 to download the respective branches question papers
Civil Engineering (CE)
Download Link-2
Computer Science & Engineering (CSE)
Download Link-2
Electrical & Electronics Engineering (EEE)
Download Link-2
Electronics & Communication Engineering (ECE)
Download Link-2
Information Technology (IT)
Download Link-2
Mechanical Engineering (ME)
Download Link-2

JNTU-HYD : B.Tech 4-1 Semester (R07)Exams Question Papers-May 2011

Just click on the Download Link- 2 to download the respective branches question papers
Civil Engineering (CE)
Download Link-2
Computer Science & Engineering (CSE)
Download Link-2
Electrical & Electronics Engineering (EEE)
Download Link-2
Electronics & Communication Engineering (ECE)
Download Link-2
Information Technology (IT)
Download Link-2
Mechanical Engineering (ME)
Download Link-2

 

JNTU-HYD : B.Tech 2-1 Semester (R09) Exams-May 2011 Question Papers

 

Civil Engineering (CE)
Download Link-2
Computer Science & Engineering (CSE)
Download Link-2
Electrical & Electronics Engineering (EEE)
Download Link-2
Electronics & Communication Engineering (ECE)
Download Link-2
Information Technology (IT)
Download Link-2
Mechanical Engineering (ME)
Download Link-2

MATHEMATICS-1, 
ENGINEERING PHYSICS, 
ENGINEERING CHEMISTRY, 
MATHEMATICAL METHODS, 
ENGINEERING MECHANICS, 
FUNDAMENTALS OF BIOLOGY, 
COMPUTER PROGRAMMING & DATA STRUCTURES, 
ENGLISH

Download Link-1 Ziddu
COMPUTER PROGRAMMING AND DATA STRUCTURES -
(Unit Wise Bits) Bit Paper for Inernal

http://www.ziddu.com/download/173491...RWISE.pdf.html 

Skills for Becoming a Lecturer in Higher Education

This article will instead look at the sort of skills you need to compete in a very challenging job market. By focussing on ‘skills' you can highlight key areas in which you need to be proficient before applying for any job in academia, and if you are currently a PhD student then you should be trying to develop these early on in your career.
1. Public Speaking
It sounds obvious but much of a lecturer's work involves public speaking in front of audiences ranging from two or three people in Oxbridge tutorials through to hundreds of people in large lecture theatres.
Anyone who has been through the university system as a student has a story to tell about a lecturer who was extremely intelligent but simply could not convey ideas and information to his or her students because of poor public speaking skills. If you can perfect this skill early on then your lecturing technique will improve and it will also help you to do well in interviews.
The most important factor to master is controlling your nerves and adrenalin levels, pitch, tone and pace while speaking. The vast majority of people speak too fast and too quietly with not enough eye contact with the audience. If you listen to great orators such as Martin Luther King, it actually takes them a long time to say each sentence, but nerves mean that most of us speak too quickly.
2. Time Management
Because there are many different strands involved in a lecturing job you have to be able to be a good time manager, juggling classroom time, preparation time, administration work and research. Unless you have a particularly heavy-handed head of department, or you are on probation, you will be able to decide when and how you distribute these tasks during your week.
The advantage of this is that you can find out your strengths and play to them: if you are a ‘morning person' you can start work early and finish before you get too tired, vice versa if you prefer evening working. However, the downside of being so independent is that you have to be good at prioritising tasks and allocating them to spaces of time in your schedule. You might be juggling the requirements of several different ‘bosses', including answering queries from numerous students, so you have to remain cool and focussed under pressure.
There are many ways of handling this. You could, for example, have an A4 page-per-day diary into which everything you have to do is written. Planning and constantly assessing and reassessing progress are key here. It may have worked as a student to leave assignments to the very last minute, but in the world of work this will leave you looking unprofessional and out of control.
3. Self-motivation
  Linked with point two above is the skill of self-motivation. It is one of the joys of being in charge of your own working day that you can make it varied and tailor it to your own best working pattern. However this relies on being able to motivate yourself without the formality of having your boss standing over you.
Many people find this especially challenging when working from home. Not all lecturers work from home, but many do spend several days or parts of days per week out of their office. It is important to have a routine in which you are able to prioritise your work above more menial matters such as cleaning the house or looking after family.
This requires a good deal of discipline and time management. The advantage is that both of these skills will have been honed during your PhD, as they are integral to success in that degree. A secret to achieving self-motivation is to constantly define and assess the goals you are hoping to achieve. In the world of work this will have the added bonus of allowing you to develop your career too; if you know that you lack a particular skill or knowledge base than you can pursue it.

4. Inter-personal communication
  The cliche of an academic stuck in his or her ivory tower is now a distant myth; in order to get on in higher education in the twenty-first century it is important to be able to discuss your ideas on a one-to-one basis with students and your peers. Disseminating your work at a high level is an important skill to develop for interviews and conferences, but this involves not just being familiar with your topic and field (this will probably come automatically as you delve deeper into it).
Communicating ideas to other individuals also requires skills similar to public speaking including being able to maintain eye contact or reacting quickly to signals given off by your audience.
You will also find that the lecturer's job requires you to communicate with students on a one-to-one basis. Despite their familiarity with technology, many students still prefer to meet with the lecturers face to face, especially if they need to discuss problems with their work or their personal life. While not being a trained counselor, you need to be able to put the students at their ease and encourage them to discuss personal issues with you. Your mannerisms need to convey an ‘open door' policy, encouraging them to trust you as a mentor and in loco parentis. This is very important if you are given the role of personal tutor. If you feel you lack confidence or skill in this area, many departments will be keen to provide training for you so that you can provide support to your students.

5. Record keeping
One of the most important skills for an academic to develop right from the start of his or her career is that of being a good record keeper. Vast amounts of time can be wasted trying to retrieve misplaced information. It is important to be well-organized in both your physical office and in your email and electronic filing systems.

 

Google Chromium

Following the recent complaints from software developers and privacy campaigners, the tech giant has pulled its listening software from the open-source Chromium browser. It turned out that the instrument using microphone on the device to listen out for the “OK, Google” hotword was downloaded and activated with Chromium updates without users’ knowledge.

google-chrome.th.png

Open-source developers claimed that Google was downloading a “black box” on to their computers, which was not open source. As a result, they couldn’t check whether this “black box” is doing what it claimed to be doing. In response to many concerns, Google has made it an optional download that will be installed only if a user adds it from the Chrome Web Store and expressly opts into the voice-search functionality. The latter can be activated on Google’s search pages.

Google announced that the newly issued r335874 Chromium builds wouldn’t download this module by default at all. The company emphasized that open source browser is very important to Google, including the part where it doesn’t ship with closed-source components for any reason.

If you don’t know, Chromium is the open-source base for the popular Chrome browser, which now accounts for a 49.2% share of the global browser market, followed by Microsoft’s IE (18.3%) and Firefox (16.4%).

In the meantime, the controversial always-listening feature is still being installed by default within Google’s Chrome browser, but it is not automatically enabled. However, the earlier reports mentioned the complaints of some Chromium users, who claimed that tool was activated and started listening to their conversations without asking for permission.

News

Sim card db hacked

According to documents newly released by Edward Snowden, US and UK spies hacked into the world’s largest SIM-card manufacturer. This gave them unfettered access to billions of cellphones all over the world. Apparently, this news can spark another international row into overreach by surveillance agencies.
screenshot_22.png

It turned out that the National Security Agency (NSA) and its UK peer GCHQ hacked into Gemalto, a Netherlands SIM-card manufacturer, by stealing encryption keys – this allowed the agencies to secretly monitor voice calls and data. In other words, this hack enabled the agencies to monitor a large portion of the world’s cellular communications. This, of course, violates international laws.

The Electronic Frontier Foundation (EFF) claimed there was no doubt that NSA and GCHQ had violated Dutch law and are likely to violate laws in many other countries where they used the hacked keys. The consumer privacy outfits also point out that the scale of the hack and its international reach will once again reopen wounds in the diplomatic community. As you know, the US government faced intense criticism from Germany, Brazil, other nations and its own citizens over information disclosed by Snowden.

It became known, for example, that Angela Merkel, the German chancellor, was the target of an NSA spying campaign, and this soured US-German relations. Brazil’s president Dilma Rousseff has also accused the US agency of violating international law.

As for the SIM-card manufacture hack, the attacks could still be ongoing. The Netherlands company produces 2bn SIM-cards each year for major clients: AT&T, Sprint, T-Mobile and Verizon. Gemalto operates in 85 countries and provides SIM-cards to about 450 wireless network providers all over the world.

Encryption keys stolen by NSA and GCHQ would allow them to monitor mobile communications without the consent or knowledge of telecom companies or foreign governments. As you know, calls made on 3G and 4G mobile networks are encrypted, but with the encryption keys any communication made on a device can be accessed (unless you use an extra layer of encryption).

The recent news means that it is difficult for anyone to trust the security of a cellphone, and the situation is unlikely to change anytime soon. Apparently, there is no reason for people to trust their network providers at this point, because their systems remain insecure. So, the stolen keys would allow the spy agencies to target whoever they wanted, even in countries where the government will not cooperate.

As for Gemalto, the company was totally oblivious to the penetration of its systems and promised to do its best to ensure that it doesn’t happen again. It turned out that the company was targeted by the Mobile Handset Exploitation Team (MHET), a unit formed by the surveillance agencies 5 years ago to target vulnerabilities in cell phones. The encryption keys were stolen in a clandestine operation targeting the email and Facebook accounts of Gemalto employees.