Saturday, February 11, 2012



Guidelines to prepare B.Tech project documentation


Font       :               1. Chapter Names            -              16  TNR (bold) all caps
                                2. Headings                        -              14 TNR (bold) all caps
                                3. Subheadings                 -              14 TNR (bold) Title case
                                4. Sub – sub headings    -              12 TNR (bold) Title case
                                5. Body of Project            -              12  TNR
                                6. Text in Diagrams         -              12 TNR (all lower case)
                                7. Diagrams / Table headings / Fig. Headings      -              12’ TNR Title case
                                8. If any   text                                12’ TNR (Title case)

Spacing                :1. 2 line spacing between heading and body text.
                                2. 1.5 line spacing in body text.
                                3. New paragraphs start with single tab.

Margins :             Left  1.5’                               Right    1.0’
                                Top 1.0’                                Bottom 1.0’

Page numbers:                 position          Bottom, Middle
                                1. Front Pages                   Small Roman Numbers
                                           (Excluding title page, Certificate page, Acknowledgement  page)
                                                2. Body pages                    1,2,3 ……….
                                                3. Annexure                       1,2,3………..
                                                  (Separate for each Annexure)

Pages    :               Size        :               A4 paper                                             Color:    White

Documentation :  Spiral Binding              


Front Pages        Page 1                   Title Page
                                Page 2                   Certificate
                                Page 3                   Company Certificate
                                Page 4                   Acknowledgement
                                Page 5                   Contents
                                Page 6                   Abstract
                                Page 7                   List of Figures/ tables/ screens
                                Page 8                   Symbols & Abbreviations

=========================================================================

CONTENTS
Abstract
List of Figures
List of Tables
List of Screens
Symbols & Abbreviations

1.       Introduction                                                                                     
1.1   Motivation
1.2   Problem definition
1.3   Objective of Project
1.4   Limitations of Project
1.5   Organization of Documentation

2.       LITERATURE SURVEY                                                                     
2.1   Introduction
2.2   Existing System   
2.3    Disadvantages of Existing system
2.4    Proposed System
2.5   Conclusion

3.       Analysis                                                                                           
3.1   Introduction
3.2   Software Requirement Specification
3.2.1          User requirement
3.2.2          Software requirement
3.2.3          Hardware requirement
3.3   Content diagram of Project
3.4   Algorithms ad Flowcharts
3.5   Conclusion

4.       DESIGN                                                                                                               
4.1   Introduction
4.2   DFD / ER / UML diagram (any other project diagrams)
4.3   Module design and organization
4.4   Conclusion

5.       IMPLEMENTATION & RESULTS                                                  
5.1   Introduction
5.2   Explanation of Key functions
5.3   Method of Implementation
5.2.1 Forms
5.2.2 Output Screens
5.2.3 Result Analysis
5.4   Conclusion

6.       TESTING & VALIDATION                                                              
6.1   Introduction
6.2   Design of test cases and scenarios
6.3   Validation
6.4   Conclusion

7.       CONCLUSION :  First Paragraph                                 -              Project Conclusion
Second Paragraph           -              Future enhancement

REFERENCES       :              
1.       Author Name, Title of Paper/ Book, Publisher’s Name, Year of publication
2.       Full URL Address

===========================================================================

                                                            A  Project report on
<<   Title of the project    >>
BACHELOR  OF TECHNOLOGY
IN
<< Computer Information Technology >>
Submitted By
<<  Name of the Student  >>
<<  Hall Ticket No  >>
Under the Guidance of
<<  Guide Name  >>
<<  Designation  >>   
<<  College Logo  >>
Department of  Information Technology,
<<  GURUNANAK INSTITUTE OF TECHNOLOGY  >>
(Affiliated to Jawaharlal Nehru Technological University)

2012


===========================================================



<<   GURUNANAK INSTITUTE OF TECHNOLOGY  >>
Department of Information Technology

<< college logo >> 

 

 

CERTIFICATE


This is to certify that the project report titled <<  Project Title  >> is being submitted by <<  Student Name  >>, bearing << H.T. No >>, in I B.Tech IV II semester Computer Science & Engineering is a record bonafide work carried out by them. The results embodied in this report have not been submitted to any other University for the award of any degree.



<<  Internal Guide  >>                                 <<  HOD  >>
<<  External  >>                                                                                                                         
                                                   
><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:115%">BACHELOR<span>  </span>OF TECHNOLOGY<o:p></o:p></span></p> <p class="MsoNormal" align="center" style="text-align:center"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:115%">IN<o:p></o:p></span></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt; line-height:115%"><<Computer Information Technology>><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:150%">Submitted By<b><o:p></o:p></b></span></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><< Name of the Student >><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:150%"><< Hall Ticket No >></span></b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p></o:p></span></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size: 11.0pt;line-height:115%">Under the Guidance of<o:p></o:p></span></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:115%"><< Guide Name >><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size: 11.0pt;line-height:115%"><< Designation >><b><span>    </span><o:p></o:p></b></span></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt;line-height:150%"><< College Logo >><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt; line-height:115%">Department of <span> </span></span></b><b><span lang="EN-US" style="font-size:16.0pt; line-height:115%">Information Technology</span></b><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt; line-height:115%">,</span></b><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:115%"><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;line-height:115%"><< GURUNANAK INSTITUTE OF TECHNOLOGY >><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt; line-height:115%">(Affiliated to Jawaharlal Nehru Technological University)<o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt; line-height:115%"><o:p> </o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:20.0pt;mso-bidi-font-size:11.0pt; line-height:115%">2012<o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p> </o:p></span></b></p><p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p><br></o:p></span></b></p><p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p>===========================================================</o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p> </o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p> </o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p> </o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;line-height:115%"><<GURUNANAK INSTITUTE OF TECHNOLOGY>><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:14.0pt;line-height:115%">D</span></b><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:115%">epartment of Information Technology<o:p></o:p></span></b></p> <h3 align="center" style="text-align:center;line-height:150%"><!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f"> <v:stroke joinstyle="miter"/> <v:formulas> <v:f eqn="if lineDrawn pixelLineWidth 0"/> <v:f eqn="sum @0 1 0"/> <v:f eqn="sum 0 0 @1"/> <v:f eqn="prod @2 1 2"/> <v:f eqn="prod @3 21600 pixelWidth"/> <v:f eqn="prod @3 21600 pixelHeight"/> <v:f eqn="sum @0 0 1"/> <v:f eqn="prod @6 1 2"/> <v:f eqn="prod @7 21600 pixelWidth"/> <v:f eqn="sum @8 21600 0"/> <v:f eqn="prod @7 21600 pixelHeight"/> <v:f eqn="sum @10 21600 0"/> </v:formulas> <v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/> <o:lock v:ext="edit" aspectratio="t"/> </v:shapetype><v:shape id="Picture_x0020_6" o:spid="_x0000_s1026" type="#_x0000_t75" alt="gni" style='position:absolute;left:0;text-align:left;margin-left:194.55pt; margin-top:3.55pt;width:76.5pt;height:51pt;z-index:251657728;visibility:visible'> <v:imagedata src="file:///F:\Users\avinash\AppData\Local\Temp\msohtmlclip1\01\clip_image001.jpg" o:title="gni"/> <w:wrap type="square"/> </v:shape><![endif]--><!--[if !vml]--><!--[endif]--><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif""><o:p></o:p></span></h3> <h3 align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif""><o:p> </o:p></span></h3> <h3 align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif""><o:p><<College logo>> </o:p></span></h3> <h3 align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif""><o:p> </o:p></span></h3> <h3 align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif"">CERTIFICATE<o:p></o:p></span></h3> <p class="MsoNormal" style="line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt; line-height:150%"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="text-indent:36.0pt;line-height:150%"><span lang="EN-US">This is to certify that the project report titled << Project Title >><b><span>                </span></b></span><span lang="EN-US" style="font-size:16.0pt; line-height:150%"> </span><span lang="EN-US">is</span><span lang="EN-US" style="font-size:16.0pt;line-height:150%"> </span><span lang="EN-US">being submitted by << Student Name >>, bearing <<<b>H.T. No>>,</b> in I B.Tech IV II semester <i>Computer</i> <i>Science & Engineering</i> is a record bonafide work carried out by them. The results embodied in this report have not been submitted to any other University for the award of any degree.</span></p> <p class="MsoNormal" style="line-height:150%"><span lang="EN-US"><o:p> </o:p></span></p> <p class="MsoNormal" style="text-indent:36.0pt;line-height:150%"><b><span lang="EN-US"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="text-align:justify;text-indent:36.0pt;line-height: 150%"><b><span lang="EN-US"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt; line-height:150%"><< Internal Guide >> <span>                                                                            </span><<HOD>><o:p></o:p></span></b></p> <p class="MsoNormal" style="line-height:150%;tab-stops:right 451.45pt"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><< External >><span>                                                                                                                          </span><o:p></o:p></span></b></p> <p class="MsoNormal"><span lang="EN-US"><o:p> </o:p></span></p><p></p></DIV>

Friday, February 10, 2012

Biometrics Bit Questions




I Choose the correct alternative:
1. Irises have how many characteristics? [ ]
a) 80 b) 5 c) 266 d) 55
2. What is the name for the places where the ridges of a fingerprint meet or split? [ ]
a) Forks b) Minutiae c) Weaves. d) Fingers
3. Each Form of Biometrics churns out a code for a person after he/she enrolled .What is the name of the code used for Irises? [ ]
a) Iris Code b) Eigenfaces c) Template. d) Eris code
4. Why isn’t retina Scanning popular? [ ]
a) There’s no vendor. b) People find it somewhat intrusive.
c) Retina is not Unique. d) Retina is unique
5. What is the strength of finger scan [ ]
a) It can be deployed in a range of environment. b) Performance can deteriorate over time.
c) It is associated with forensic Application d) Performance can deteriorate less time
6. What is an algorithm? [ ]
a) A method of analyzing the structures of the eye.
b) A program that translates raw information into a code.
c) It’s similar to an ID Card.
d) A method of designing the eye
7. Dynamic Signature verification recognizes many Characteristics .What does is not recognize?
[ ]
a) The Shape of the Signature. b) The Pressure of the pen.
c) The Penmanship of the signature. d) The shape of the pen
8. The following allow the finger scan technology to be deployed in a range of logical and physical access environment [ ]
a) Enlarged Size and less power b) Reduced size and more power
c) Less power and reduced size d) Enlarged Size and more power
9. What is the weakness of Iris Scan? [ ]
a) It Maintains Stability of Characteristics over a lifetime.
b) It has a Profensity for false recognition.
c) It has the potential for exceptionally high levels of accuracy.
d) None
10. Why Biometric technology is So Popular
a) Since it is Automated. b) Since it is Manually Verified.
c) Since it is Costlier. d) Since it is cheaper

11. Fingerprint ridges & valleys are characterized by discontinuities and irregularities Known as ___________
12. Equal error rate also referred to as the________________.
13. Finger scan template can range in size from approx______________.
14. One of the major challenges of a Large –Scale biometric system is_____________.
15. Iris Scan Weakness pertains mainly to_____________ Issues.
16. ATV stands for ______________
17. _____________ analysis most widely utilized in facial recognition technology.
18. AFP stands for ______________
19. Primary visible Characteristics of iris is known as _____________.
20. The software component of Iris scan System are the image processing and _____________.


I Choose the correct alternative:
1. Why isn’t retina Scanning popular? [ ]
a) There’s no vendor. b) People find it somewhat intrusive.
c) Retina is not Unique. d) Retina is unique
2. What is the strength of finger scan [ ]
a) It can be deployed in a range of environment. b) Performance can deteriorate over time.
c) It is associated with forensic Application d) Performance can deteriorate less time
3. What is an algorithm? [ ]
a) A method of analyzing the structures of the eye.
b) A program that translates raw information into a code.
c) It’s similar to an ID Card.
d) A method of designing the eye
4. Dynamic Signature verification recognizes many Characteristics .What does is not recognize?
[ ]
a) The Shape of the Signature. b) The Pressure of the pen.
c) The Penmanship of the signature. d) The shape of the pen
5. The following allow the finger scan technology to be deployed in a range of logical and physical access environment [ ]
a) Enlarged Size and less power b) Reduced size and more power
c) Less power and reduced size d) Enlarged Size and more power
6. What is the weakness of Iris Scan? [ ]
a) It Maintains Stability of Characteristics over a lifetime.
b) It has a Profensity for false recognition.
c) It has the potential for exceptionally high levels of accuracy.
d) None
7. Why Biometric technology is So Popular
a) Since it is Automated. b) Since it is Manually Verified.
c) Since it is Costlier. d) Since it is cheaper
8. Irises have how many characteristics? [ ]
a) 80 b) 5 c) 266 d) 55
9. What is the name for the places where the ridges of a fingerprint meet or split? [ ]
a) Forks b) Minutiae c) Weaves. d) Fingers
10. Each Form of Biometrics churns out a code for a person after he/she enrolled .What is the name of the code used for Irises? [ ]
a) Iris Code b) Eigenfaces c) Template. d) Eris code

II Fill in the blanks
11. One of the major challenges of a Large –Scale biometric system is_____________.
12. Iris Scan Weakness pertains mainly to_____________ Issues.
13. ATV stands for ______________
14. _____________ analysis most widely utilized in facial recognition technology.
15. AFP stands for ______________
16. Primary visible Characteristics of iris is known as _____________.
17. The software component of Iris scan System are the image processing and _____________.
18. Fingerprint ridges & valleys are characterized by discontinuities and irregularities Known as ___________
19. Equal error rate also referred to as the________________.
20. Finger scan template can range in size from approx______________.

Objective Exam
Name: ______________________________ Hall Ticket No.
Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.
A
I Choose the correct alternative:
1. What is an algorithm? [ ]
a) A method of analyzing the structures of the eye.
b) A program that translates raw information into a code.
c) It’s similar to an ID Card.
d) A method of designing the eye
2. Dynamic Signature verification recognizes many Characteristics .What does is not recognize?
[ ]
a) The Shape of the Signature. b) The Pressure of the pen.
c) The Penmanship of the signature. d) The shape of the pen
3. The following allow the finger scan technology to be deployed in a range of logical and physical access environment [ ]
a) Enlarged Size and less power b) Reduced size and more power
c) Less power and reduced size d) Enlarged Size and more power
4. What is the weakness of Iris Scan? [ ]
a) It Maintains Stability of Characteristics over a lifetime.
b) It has a Profensity for false recognition.
c) It has the potential for exceptionally high levels of accuracy.
d) None
5. Why Biometric technology is So Popular
a) Since it is Automated. b) Since it is Manually Verified.
c) Since it is Costlier. d) Since it is cheaper
6. Irises have how many characteristics? [ ]
a) 80 b) 5 c) 266 d) 55
7. What is the name for the places where the ridges of a fingerprint meet or split? [ ]
a) Forks b) Minutiae c) Weaves. d) Fingers
8. Each Form of Biometrics churns out a code for a person after he/she enrolled .What is the name of the code used for Irises? [ ]
a) Iris Code b) Eigenfaces c) Template. d) Eris code
9. Why isn’t retina Scanning popular? [ ]
a) There’s no vendor. b) People find it somewhat intrusive.
c) Retina is not Unique. d) Retina is unique
10. What is the strength of finger scan [ ]
a) It can be deployed in a range of environment. b) Performance can deteriorate over time.
c) It is associated with forensic Application d) Performance can deteriorate less time

II Fill in the blanks
11. ATV stands for ______________
12. _____________ analysis most widely utilized in facial recognition technology.
13. AFP stands for ______________
14. Primary visible Characteristics of iris is known as _____________.
15. The software component of Iris scan System are the image processing and _____________.
16. Fingerprint ridges & valleys are characterized by discontinuities and irregularities Known as ___________
17. Equal error rate also referred to as the________________.
18. Finger scan template can range in size from approx______________.
19. One of the major challenges of a Large –Scale biometric system is_____________.
20. Iris Scan Weakness pertains mainly to_____________ Issues.

I Choose the correct alternative:
1. The following allow the finger scan technology to be deployed in a range of logical and physical access environment [ ]
a) Enlarged Size and less power b) Reduced size and more power
c) Less power and reduced size d) Enlarged Size and more power
2. What is the weakness of Iris Scan? [ ]
a) It Maintains Stability of Characteristics over a lifetime.
b) It has a Profensity for false recognition.
c) It has the potential for exceptionally high levels of accuracy.
d) None
3. Why Biometric technology is So Popular
a) Since it is Automated. b) Since it is Manually Verified.
c) Since it is Costlier. d) Since it is cheaper
4. Irises have how many characteristics? [ ]
a) 80 b) 5 c) 266 d) 55
5. What is the name for the places where the ridges of a fingerprint meet or split? [ ]
a) Forks b) Minutiae c) Weaves. d) Fingers
6. Each Form of Biometrics churns out a code for a person after he/she enrolled .What is the name of the code used for Irises? [ ]
a) Iris Code b) Eigenfaces c) Template. d) Eris code
7. Why isn’t retina Scanning popular? [ ]
a) There’s no vendor. b) People find it somewhat intrusive.
c) Retina is not Unique. d) Retina is unique
8. What is the strength of finger scan [ ]
a) It can be deployed in a range of environment. b) Performance can deteriorate over time.
c) It is associated with forensic Application d) Performance can deteriorate less time
9. What is an algorithm? [ ]
a) A method of analyzing the structures of the eye.
b) A program that translates raw information into a code.
c) It’s similar to an ID Card.
d) A method of designing the eye
10. Dynamic Signature verification recognizes many Characteristics .What does is not recognize?
[ ]
a) The Shape of the Signature. b) The Pressure of the pen.
c) The Penmanship of the signature. d) The shape of the pen

II Fill in the blanks
11. AFP stands for ______________
12. Primary visible Characteristics of iris is known as _____________.
13. The software component of Iris scan System are the image processing and _____________.
14. Fingerprint ridges & valleys are characterized by discontinuities and irregularities Known as ___________
15. Equal error rate also referred to as the________________.
16. Finger scan template can range in size from approx______________.
17. One of the major challenges of a Large –Scale biometric system is_____________.
18. Iris Scan Weakness pertains mainly to_____________ Issues.
19. ATV stands for ______________
20. _____________ analysis most widely utilized in facial recognition technology




KEY
I Choose the correct alternative:
1. C
2. B
3. A
4. B
5. A
6. B
7. C
8. C
9. B
10. A
II Fill in the blanks
11. Minutiae
12. Crossover rate
13. 200 bytes to 1000 bytes
14. Initial enrollment
15. Operational issues
16. Ability to verify
17. Feature analysis
18. Automatic Face Processing
19. Trabecular mesh work
20. Matching engine


Thursday, February 9, 2012

Management Sciences Notes.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
..
..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
















Monday, November 28, 2011

2nd mid exam imp questions......

Internal time table 

1/12 MC,ES 
2/12 MAD,HCI 
3/12 NP,SPM


HCI QUESTIONS:

Read all questions

1. List various kinds of keyboard layouts and explain them.
2. What are the typical problems associated with website navigation.
3. Give detailed note about the following.
Transition diagram
State diagram
4. What are the common message types and explain them.
5. What is function key? List various function keys
6. Write about different types of display devices.
7. What are the characteristics of an icon?
8. What are the possible problems with colors?
9. What are the characteristics of various screen based controls?






mad questions
Set-1
1.write short notes on media-on-demand(MOD)?
2.Explain TCP/IP protocols of multimedia networks?
3.Explain about
1.arithmetic coding encoder
2. Arithmetic coding decoder
4.What is idea behind embedded zerothree of wavelet coeffient?
5.Explain about what is the important properties of Human Coding?
6.Explain about Hybrid Excitation Vocoders?

Set-2
1.Explain about Broadcasting?
2.Compare dictionary based coding with lossless image compression?
3.Explain about Hybid Excitation Vencoder?
4.Explain broad cast schemes for vedio on demand in detail?
5.Explain the layers of OSI reference model?
6.Explain about MOD?







MC Imp questions:

U 5:
1.a Explain hoarding techniques
1.b What is data caching?
2. Explain in detail client/server computing with adaption

U 6:
1. Explain in detail
a. Push Based Mechanism
b. Pull Based Mechanism
2. Explain in detail about the selective tuning techniques

U 7:
1. What is MANET? Describe it's properties.
2. Explain with diagram dynamic source routing

U 8:
1. Briefly discuss about
a. WTP (Wireless Transaction Protocol)
b. WAE (Wireless Application Environment)
c. WAP (Wireless Application Protocol)
2. Describe blue tooth with user scenario







Es: mid questions
unit 5:1. a/d conversions, 2.serial data communication

u 6: 3.task and task states,4.semaphores,5.mesg queue,mailboxes,pipes,6.memorymanagement

u 7: 8.semaphore nd queues ,9.hard real tym scheduling considerations,10.linker/locators for embeded 11.debuggng techniques

u 8: 12.ARM, 13.I2c bus and CAN bus







 NP Questions:



1.Explain the role of resolver with neat diagram that depicts the typical arrangements of application resolvers and name servers?
2.Write the functions of echo lines(UDP) on datagram and datagram socket. Explain and discuss how UDP not having flow control?
3.With neat diagram, explain the RPC execution and describe numerous versions of discipline modules?
4.Explain the following:
(a)gethostbyname
(b)uname
(c)getseverbyname
5.What is semaphore? Explain how locking can be achieved with semaphores?











 SPM questions





1.WBS,PLANING GUIDELINES
2.EXPLAIN LINE OF BUSINESS ORGANISATION AND PROJECT ORGANIZATION
3.EXPLAIN 7 CORE METRICS
4.HOW CONTINUOUS INTEGRATION ,EARLY RISK RESOLUTION OF EVOLUTIONARY REQUIREMENTS ARE PERFORMED IN MODEL PEOJECTS
5.EXPLAIN CHECK POINTS OF PROCESS
6.EXPLAIN COST & SCHEDULE ESTIMATING PROCESS

Wednesday, November 2, 2011

NAC Tech Sample Test Part B



Information Technology
1. In a graph G there are 2n vertices which correspond to ‘n’ bit strings. Two nodes are connected iff the
first 3 bits are similar. What are the number of connected components?
1. 1
2. 3
3. 8
4. 2n-3
2. Let x, y and z denote the first vertex visited in post-order, in-order and pre-order traversals respectively
of a complete binary tree. Which of the following is always true?
1. x = y
2. x = z
3. y = z
4. None of these
3. Consider the following functions: f(n)=
n 3n ; g(n) = n n log 3 3 ; h(n) = n!
Which of the following is true?
1. h(n) is O (f(n))
2. h(n) is O (g(n))
3. f(n) is O (g(n))
4. g(n) is not O (f(n))
4. Consider the following program
n = b1b2b3….bm
int n, rev;
rev = 0;
while (n > 0) {
rev = rev * 10 + n %10;
n = n/10;
}
Which of the following is true at the end of the ith iteration?
1. n = b1b2…bm–i and rev = bmbm–1….bm–i+1
2. n= bm–i+1….bm–1bm and rev = bm–i…b2b1
3. n= b1b2…bm and rev = bm…b2b1
4. none of these
5. A program ‘c’ with 200 integers in the range 0 – 50 represents the scores of 200 students. It then prints
the frequency of each score above 25. What would be the best way for ‘c’ to store the frequency?
1. an array of 25 numbers
2. an array of 50 numbers
3. an array of 200 numbers
4. a dynamically allocated array of 250 numbers

MAJOR COMPANIES MODEL PAPERS

Tuesday, November 1, 2011

TCS APTITUDE



No. of Questions: 32                                                                                      Time allowed: 40 min


1. There are 150 weights. Some are 1 kg weights and some are 2 kg weights. The sum of the weights
is 260.What is the number of 1kg weights?
1] 20 2] 30 3] 40 4] 50
2. A is driving on a highway, when the police fines him for over speeding and exceeding the limit by
10 km/hr.At the same time B is fined for over speeding by twice the amount by which A exceeded
the limit. If B was driving at 35 km/hr, what is the speed limit for the road?
1] 15 kmph 2] 45 kmph 3] 75 kmph 4] 5 kmph
3. A moves 4 kms east from his starting point . He then travels 5 kms north. From that point he moves
8 kms to the east. How far is A from his starting point?
1] 13 kms 2] 19 kmph 3] 5 kmph 4] 10 kmph
4. A car travels 12 kms with a 4/5th filled tank. How far will the car travel with 1/3rd filled tank?
1] 10kms 2] 15 kms 3] 5 kms 4] 20 kms
5. The sum of the digits of a two digit number is 8. When 18 is added to the number, the digits are
reversed. Find the number.
1] 15 2] 55 3] 25 4] 35
6. The cost of one pencil, two pens and four erasers is Rs.22 while the cost of five pencils, four pens
and two erasers is Rs.32. How much will three pencils, three pens and three erasers cost?
1] 16 2] 9 3] 27 4] 28
7. Father’s age is 5 times his son’s age. 4 years back, the father was 9 times as old as his son. Find
the fathers’ present age.
1] 40 years 2] 42 years 3] 38 years 4] 50 years
8.         Mohan and Geeta are approaching each other. They were initially separated by a distance of 18
km. If they meet at a distance of 12 km from where Geeta started, what is the ratio of their speeds?
1] 4 : 3 2] 1 : 2 3] 2 : 1 4] 3 : 4
9.             A group of labourers do a piece of work in 10 days, but five of them are absent and so the rest
do the work in 12 days. Find the original number of labourers.
1] 30 2] 40 3] 50 4] 60
10. If 20 men take 15 days to complete a job, in how many days can 25 men finish that work?
1] 10 days 2] 14 days 3] 12 days 4] 8 days
11. In a fraction, if 1 is added to both the numerator and the denominator, the fraction becomes 1/2. If
numerator is subtracted from the denominator, the fraction becomes 3/4. Find the fraction.1] 5/8 2] 3/7 3] 2/3 4] 1/8
12. If Rs.1260 is divided amongst A, B and C in the ratio 2 : 3 : 4, what is C’s share?
1] Rs. 850 2] Rs. 560 3] Rs. 270 4] Rs. 625
13. A shopkeeper bought a watch for Rs.400 and sold it for Rs.500. What is his profit percentage?
1] 35% 2] 10% 3] 25% 4] 16%
14. What percent of 60 is 12?
1] 42% 2] 8% 3] 20% 4] 5%
15. Hansie made the following amounts in seven games of cricket in India: Rs.10, Rs.15, Rs.21, Rs.12,
Rs.18, Rs.19 and Rs.17(all figures in crores). Find his average earnings.
1] Rs. 8 crore 2] Rs. 16 crore 3] Rs. 20 crore 4] Rs. 56 crore
16.      The average age of the family just before a child was born was 28. What will be the average age of
the family 10 years hence?
1] 28 years 2] 38 years 3] 34 years 4] Data insufficient
17. What number must be added to each term of the ratio 5 : 37 to make it equal to 1 : 3?
1] 22 2] 11 3] 13 4] 20
18. In a mixture of 28 litres, the ratio of milk and water is 5 : 2. If 2 litres of water is added to the
mixture, find the ratio of milk and water in the new mixture.
1] 4 : 3 2] 2 : 1 3] 1 : 7 4] 3 : 1
19. In what proportion must rice at Rs. 3.10 per kg,be mixed with rice at Rs. 3.60 per kg, so that the
mixture be worth Rs. 3.25 a kg ?
1] 8 : 5 2] 7 : 3 3] 1 : 6 4] 4 : 3
20. The average of 8 numbers is 9. What number must be added to increase the average to 10?
1] 18 2] 12 3] 16 4] 17
Directions for Questions 21 to 23 : Study the following sequence carefully and answer the questions
given below it.
S T U  ? J  P Q 8 L 1 @ C 3 S  A $ 6 2 B R £ 7 9
21. Fill in the blank based on the above sequence.
, 7, 2, 3,  £, __
1]1                                               2] 8                                                   3]7
4] 9
22. What would come in the place of the blank based on the given sequence?
TJ, QL, 1CS, ____, B£9
1] 5 $ 2] $ 2 3] $ B 9 4] $ 2 B
23. How many such symbols are there in the above sequence of elements which are immediately
preceded by a letter and immediately followed by a digit?1] One 2] Zero 3] Two 4] None of
these
24. If C  D = C2
+ CD + D2
- ( C + D) then 7  8 =
1] 169 2] 154 3] 133 4] 172
Directions for Questions 25 to 28 : These questions are based on the following diagram.

25. If the number of elements in B is twice the number of elements in C, then what is the value of y?
1] 11 2] 31 3] 51 4] 61
26. What should be the value of x, if the number of elements in A is equal to the number of elements in
C?
1] 15 2] 11 3] 17 4] 13
27. If the number of elements in all the sets are equal, then what is the value of (A U B U C)?
1] 120 2] 72 3] 64 4] 86
28. If the number of elements which belong to neither A nor B nor C is equal to r, then what is the
number of elements in A’ (complement of A)?
1] 21 + y + r 2] y + r + 23 3] 25 + y + r 4] r + y+  19
29. If VXUPLVH is written as SURMISE, what is SHDVD?
1] AEPSA 2] PEASA 3] PESAA 4] PASEA
30. If DDMUQZM is coded as CENTRAL then RBDJK can be coded as?
1] QCEIL 2] QILCE 3] QECIL 4] QLECI
31. Find the missing number in the series: 2, 5, __, 19, 37, 75
1] 10 2] 9 3] 18 4] 7
32. Match the following:
a. Brother-Sister 1] Part of
b. Alsatian-Dog 2] Sibling
c. Sentence-Paragraph 3] Type of
d. Car-Steering 4] Not a type of
1] a-4, b-1, c-3, d-2 2] a-1, b-4, c-3, d-2 3] a-2, b-3, c-1, d-4 4] a-2, b-4, c-3,
d-1TCS
VERBAL
No. Of Questions : 40 Time : 20 minutes
Questions 1 to 10 : Find the synonyms of the following words
1. Depreciation
1] Inflation 2] To become lower in 3] Deflation 4] Deprivation
2. Deprecate
1] Feel and express disapproval of 2] Deportment
3] To look up to someone 4] Galore
3. Incentive
1] Profit 2] Thing which encourages a person to do something
3] An applause 4] Incant
4. Echelon
1] Level of authority or responsibility 2] To be extremely successful
3] Highest peak of a mountain 4] haven
5. Innovation
1] Invention 2] To make changes
3] Discovery 4] To make less severe
6. Intermittant
1] Continual 2] Externally stopping and then starting
3] existing in between periods of war 4] continuous
7. Detrimental
1] Harmful 2] Beneficial 3] Benefactor 4] Malediction
8. Aberration
1] Deviation 2] Substitution 3] Correction
4] Marginalisation
9. Conciliation
1] Disputed 2] To espouse 3] To make less angry 4] To enrage
10. Orthodox
1] Heterodox 2] Superstitious 3] Egregious 4]Conventional
Questions 11 to 20 : Find the Antonyms of the following words
11. IRRADIATE
1] agreement 2] distance 3] murky 4] clarity
12. ANOMALY
1] desperation 2] requisition 3] registry 4] regularity13. DANGLE
1] hanging 2] loose 3] secure 4] mingle
14. INDIGENOUS
1] native 2] exotic 3] aboriginal 4] vernacular
15. AUGMENT
1] keep away 2] be distributed 3] to increase 4] to mitigate
16. COMPLIANCE
1] light 2] fresh 3] take away 4] energize
17. BENIGN
1] peaceful 2] blessed 3] wavering 4] malignant
18. ANALOGUE
1] same 2] different 3] lengthy 4] dull
19. CENSURE
1] process 2] enclose 3] praise 4] penetrate
20. CRYPTIC
1] futile 2] famous 3] candid 4] indifferent
Directions for question 21 to 25 : Choose the right meaning for the underlined idioms from among the
given choices :
21. We are going to be in deep waters if the bad weather doesn’t clear. The flight schedules will
continue to run amuck.
1] to be bankrupt
2] to be in a difficult situation which is ahead to deal with
3] to be at the point of drowning
4] to be in a state of indecision
22. The economy will continue to be in the doldrums owing to the global trade recession
1] not very successful
2] noisy, in a state of uproar
3] in the initial stages of development
4] characterized by a great level of activity and energy
23. Politicians often find themselves in the line of fire.
1] always be firefighting or trouble-shooting.
2] a situation where others are ungrateful in spite of your good deeds towards them.
3] likely to be criticized, attacked or got rid off
4] high probabliity of being fired or sacked from the job
24. In spite of the breakdown of WTO negotiation talks at Cancum, the Commerce Ministry continues
to assure us that there is light at the end of the tunnel.
1] making much ado about nothing
2] belief that a difficult situation will end
3] a situation of ambiguity
4] a problem which has many solutions
25. In a nutshell, the new consulting assignment will double our profits this financial year.
1]  to be candid and direct
2] to lay down in very strict terms
3] to describe something concisely4] to falsify facts for achieving dubious ends.
Directions for Questions 26 to 30 : In each of the sentences, a part of the sentence is left blank.
Beneath each sentence, four different ways of completing the sentence are indicated. Choose the word
for each blank that best fits the meaning of the sentence as a whole.
26. Despite _____________ evidence of tobacco’s harmful effects and pressure from anti-smoking
advocates, current surveys show that about one quarter of all adults in the United States are
smokers.
1] tricky 2] overwhelming 3] buoyant 4] full
27. _____________ into the increased demand for highly specialised holidays, the PIS group offers
five unique destinations.
1] Carving 2] Tapping 3] Getting 4] Seeking
28. Another fascinating aspect of the newly recognised psychosomatic network is the discovery that
peptides are the biochemical ____________ of emotions.
1] destination 2] receptacle 3] allegories 4]
manifestations
29. The crisis ____________ from the fact that we subscribe to the concepts of an outdated world
view.
1] bases 2] derives 3] encroaches 4] causes
30. When she came out, he noted the peculiar combination of ____________ and her head held high.
1] arrogance 2] diffidence 3] rancour 4] innocence
Directions for Quuestions 31 to 34 : In each of following sentences, a part of the sentence or the entire
sentence is underlined. Beneath each sentence, four different ways of phrasing the underlined part are
indicated. Choose the best alternative from among the four.
31. Inequality of wealth is a great hindrance with economic development.
1] hindrance with economic development 2] hindrance of economic development
3] hindrance for economic development 4] hindrance to economic development
32. The dancing troupe was disqualified for participating in the dance competition.
1] disqualified for participating in the dance competition.
2] disqualified from participating in the dance competition.
3] disqualified against participating in the dance competition.
4] disqualified of participating in the dance competition.
33. Abhishek is quite infatuated with her.
1] infatuated with her. 2] infatuated of her
3] infatuated for her 4] infatuated about her.
34. Manak failed to seize upon the golden opportunity of his life.
1] failed to seize upon 2] failed to seize from
3] failed to seize of 4] failed to seize through
Direction for Questions 35 to 40 : Read the following passage and answer the questions that follow.
Most parents worry about how best to bring up their children. In their anxiety, some of them turn to
psychologists or psychiatrists, or even psychoanalysts. This may not be a wise move; professionals and
so-called experts have a poor track record in advising worried parents. J.B. Watson, the father of the
behaviorist movement, wrote the first of the best-sellers on bringing up children; his influential
“Psychological Care of the Infant and Child” sold more than 100,000 copies within a few months. Bertrand
Russell, a man not easily duped, became a strong supporter of Watson’s beliefs. But professionalpsychologists were decidedly critical; some felt that the book damaged his status as a serious scientist.
Watson’s message was a simple one; children should be brought up on a scientific, rather than an
emotional or traditional basis. He advocated that one should not mollycoddle one’s offspring, show them
too much affection, or even kiss and cuddle them, for to do so encourages a dependent mentality; feeding
should be on schedule, not on demand. Watson tried this regime on his two sons; one committed suicide,
and the other, to  Watson’s intense annoyance, became a psychoanalyst. In the end, Watson regretted
writing his book, not, he said, ‘because of its sketchy form but because I did not know enough to write the
book I wanted to write”.
After the tough, anti-loving, no-permissive Watson the pendulum swung back, as pendulums do, and we
got his very opposite, the psychoanalytic Dr. Spock with his extremely permissive, feeding-on-demand
not on schedule, hugging and kissing prescription. “Baby and Child Care” was outsold only by the Bible.
Mothers everywhere gratefully relapsed into a more emotional relationship with their children, something
Watson had warned explicitly against. But both the permissive and scientific child-rearing models were
based on too narrow a view. Spock finally acknowledged that his recommendations had been wrong.
Bringing up children his way failed to bring the results he had hoped for.
Both Watson and Spock, in their different ways, illustrate the evil of giving advice, supposedly scientific in
nature, on the basis of preconceived opinions instead of firmly established scientific theories grounded in
fact. The truth is that psychologists simply do not know enough about the upbringing of children to
assume the role of omniscient advisers.
Watson relied on the narrow basis of a fundamentalist behaviorism, Spock on the narrow and
insubstantial basis of the Freudian credo. Neither of their systems is supported by sufficient facts to bear
the weight of the superstructure they and other writers erected on top of them. We know very little about
the upbringing of children, but we do know enough by now to realize that Watson and Spock both gave
advice that was wrong for most children – the one being too tough, authoritarian, and unemotional, and
the other too soft, permissive and lovey-dovey. Most mothers would have brought up their children more
successfully if they had never read either. Beware of psychologists bearing advice – this is one gift horse
into whose mouth it would pay parents to look most carefully!
Can we then offer nothing to parents who ask our advice? In fact, we can a little. Interesting and
important studies have been carried out in recent years which do suggest a few guidelines. The first –
and most obvious, since few mothers need reminding of it is that children are all different, and that there
is no one way of bringing them up. Each child should be treated as an individual. The second is that
heredity is very important, both for intelligence and personality; parents are not presented at birth, as
Watson maintained with some shapeless mass of putty or plasticine which they can mould into any shape
they like.
35. A suitable title for the passage would be :
1] How to Care for the Young. 2] How not to bring up children
3] Heredity and your children 4] Every child is
unique
36. The fact that one of his sons became a psychoanalyst pained Watson greatly because:
1] Watson was the founder of rival school of thought.
2] Watson had brought him up to be a behaviourist.
3] the fact demonstrated to Watson the utter futility of his ideas about rearing up children
4] the son had chosen the particular career just to defy his father.
37. Which one of the following approaches to child upbringing was not the one suggested by Watson?
1] Stern 2] Unscientific 3] Unemotional 4]
Nontraditional
38. By saying that ‘pendulum swung back, as pendulums do’, the author suggests that:
1] life is full of contradictions. 2] ideas generate their opposites.3] life is full of ups and downs. 4] there is a tide in human affairs.
39. It can be inferred that one of the reasons why Dr. Spock’s book became more popular than
Watson’s was that :
1] people were reluctant to adopt the sterner approach advocated by the latter.
2] mothers were all too eager to be lovely-dovey to their childeren.
3] being emotional with childeren is more natural than being stiff with them.
4] the line of upbringing the psychoanalysts suggest has been more popular among people than
other approaches.
40. The main accusation against Watson and Spock is that:
1] their advice lacked a firm factual basis.
2] both of them suggested extreme approaches.
3] both of them had to recent their opinions.
4] the scope of their opinions was severely limited by the narrow confines of the individual beliefs
of the different schools of thought to which they belonged.
CRITICAL REASONING
No. of Questions: 12
Time : 30 minutes
Directions for Questions 1 to 3 : Answer the following questions based on the paragraph:
A student applying at a college should take three courses. There are altogether four courses, namely
Science, Maths, Social Studies and Economics. (The names may vary, but the pattern is the same)
- One can take a Science course only if he has taken a Maths course.
- One can take a Maths course only if he has taken a Science course.
- One can take an Economics course only if he has taken a Social Studies courses.
1. Which of the following is a possible course?
1] Two Science courses and a Social Studies Course.
2] Two Maths courses and an Economics course.
3] One Maths course, one Science course and a Social Studies course.
4] One Maths course, one Science course and an Economics course.
2. Which of the following courses a student can take?
I. One Science, one Social Studies, one Economics
II. Two Science, one Social Studies
III. Two Science, one Maths
1] I only 2] III only 3] I and II only 4] II and III
only
3. Which of the following is not a possible course?
1] Two science courses and a Maths course.
2] Two Maths courses and a Science course.
3] One Maths course, one Science course and a Social Studies Course.
4] One Maths course, one Science course and an Economics Course.
Directions for Questions 4 and 5 : Choose the set of three statenents where the third statement can be
logically derived from the preceding two.
4. a] Some caves are dungeons. b] Some dens are not dungeons.
c] All lairs are caves. d] Some lairs are dungeons.
e] No dungeons are lairs. f] All lairs are dens.
1] cad 2] eca 3] feb 4] deb
5. a] Wood is liquid b] Wood is not a metalc] Iron is a metal d] All metals except mercury are solids.
e] Iron is solid f] Iron is not mercury.
1] efc 2] cde 3] eda 4] bcf
Directions for Questions 6 to 8 : Each question has a main statement followed by four statements
labelled A, B, C and D. Choose the ordered pair of statements where the first statement implies the
second, and the two statements are logically consistent with the main statement.
6. You can take a ride only if you have a ticket.
a] you took a ride b] you did not take a ride
c] you had a ticket d] you did not have a ticket.
1] ca 2] ac 3] da 4] bc
7. If there is smoke there is fire.
a] I saw smoke in the room. b] Nobody saw smoke in the room.
c] There was a fire in the room d] There was no fire in the room.
1] cb 2] bc 3] ca 4] ac
8. When Madame X conspires she confides in three stupid people.
a] Madame X confided in three stupid people.
b] Madame X did not confide in three stupid people.
c] Madame X conspired
d] Madame X did not conspire.
1] ac 2] db 3] cb 4] none of
these
Directions for Questions 9 and 10 : Read each of the short passages and answer the questions that
follow.
9. REPORTER: Reverend Joss, do you think the failure of the machine is God’s rebuke to science?
REVEREND JOSS: As a person of faith... I am bound by a different covenant than Dr. Arroway-but
I believe our goal is one and the same: the pursuit of the truth. I think today Dr. Arroway continued
that pursuit under the most trying of conditions.
What can be inferred about Reverend Joss from the above dialogue?
1] He is a man of principles who would rather die defending what he believes than surrender to a
person with conflicting principles.
2] He is a man of integrity who does not impose his beliefs on others and will concede his position
when amiss.
3] He is an unbeliever who gives credit where it is due even though he may not support the ideals.
4] He stubbornly holds onto his beliefs and camouflages his obstinance as pursuit for truth.
10. ANYA : I wanted to come home, Grandmama - and I did. I came back to my home with you
TATIANA: You can’t go back to find your home. Your home is in your heart, in the future that you
make for yourself.
ANYA: And this is my future. This is who I am!
TATIANA: This is who you were. Exactly who you are is up to you.
Which of the following proverbs best summarizes the above dialogue?
1] He that forecast all perils will never sail the sea.
2] It’s choice-not chance-that determines your fate.
3] Life is a bridge. Cross over it, but build no house on it.
4] We are but the instrument of Heaven. Our work is not design, but destiny.
Directions for Questions 11 and 12 : Read the arguments and answer the Questions that follow.
11. Donors are almost never offended by being asked for too much (in fact, they are usually flattered).
And if you ask for too much, a donor can always suggest a smaller amount. On the other hand,donors are frequently offended by being asked for too little. A common reaction is, “So, that’s all
they think I’m worth!”
The above statement assumes that
1] donors are usually never asked for enough
2] a good fund-raiser will value the worth of the donor
3] it is worth the gamble to ask for large donations
4] fund-raisers often think that donors are incapable of giving much
12. A recent communique noted that China’s foreign minister told officials in Italy that Beijing intends to
maintain and extend its open-door policy to West. The minister also said that China would continue
with its programme of political and economic changes despite a recent campaign against Western
ideas and foreign aid.
Which of the following can be inferred from the above statement?
1] China’s foreign minister asserts that internal change is a matter for only the Chinese to decide.
2] Internal political and economic changes will not be tolerated.
3] China’s external relations with the West will continue despite turmoil at home.
4] Internal changes in China may not follow Western models although foreign trade between them
may continue


Solutions:
Aptitude
1.3 2.1 3.1 4.3 5.4 6.3 7.1 8.1 9.1 10.3
11.2 12.2 13.3 14.3 15.2 16.3 17.2 18.1 19.4 20.1
21.1 22.2 23.3 24.2 25.3 26.4 27.2 28.1 29.2 30.1
31.2 32.3
Verbal Ability
1.2 2.1 3.2 4.1 5.2 6.2 7.1 8.1 9.3 10.4
11.3 12.4 133 14.2 15.4 16.3 17.4 18.2 19.3 20.3
21.2 22.1 23.3 24.2 25.3 26.2 27.2 28.4 29.2 30 .2
31.4 32.2 33.1 34.1 35.2 36.1 37.2 38.2 39.2 40.1
Critical Reasoning
1.3 2.2 3.4 4.3 5.2 6.2 7.4 8.4 9.2 10.2
11.3 12.4.