CD-KEY Win XP Sp3

Posted by Unknown Sabtu, 19 Maret 2011 0 komentar

DG8FV-B9TKY-FRT9J-6CRCC-XPQ4G

6YDH3-GPKVM-2DX3V-WDXQM-BHWGJ

3KHMJ-DW7BX-77XHM-DFCW3-J4GHW

MRX3F-47B9T-2487J-KWKMF-RPWBY

QC986-27D34-6M3TY-JJXP9-TBGMD

CM3HY-26VYW-6JRYC-X66GX-JVY2D

DP7CM-PD6MC-6BKXT-M8JJ6-RPXGJ

F4297-RCWJP-P482C-YY23Y-XH8W3

HH7VV-6P3G9-82TWK-QKJJ3-MXR96

HCQ9D-TVCWX-X9QRG-J4B2Y-GR2TT

B6Q7B-TCMBD-JHX4V-XPYM8-VH6M2

K2KB2-BDBGV-KP686-D8T7X-HDMQ8

RHKG3-8YW4W-4RHJG-83M4Y-7X9GW

QW4HD-DQCRG-HM64M-6GJRK-8K83T

PQTHM-RWBHR-3BPVW-TFB22-V8HXQ

KQC2B-X683R-2CDXT-PQ7HQ-47MPT

JFQYM-YJQFQ-VBRCY-4VV7W-QRXBY

KMTTB-68H32-8MKRK-GBHKT-RKCP6

CX7DD-4GX4Y-BTTR4-H88Y7-GQPWQ

XP8BF-F8HPF-PY6BX-K24PJ-TWT6M

8RCKG-36TH8-VWBGK-T3CB6-RHG48

7G4H4-T4XXW-BVXTH-4QP4V-9CV28

PG274-383QX-6C32H-P8RWC-48M4Q

CWY3F-JGYHJ-W6KBG-3VYK7-DGG7M

X6YWJ-M4TG2-DPGWJ-QCFR8-927M6

QCP6D-7VGVJ-JBKB4-DQMB2-9GTJ3

F7GV4-B7JGY-Q2KQW-6R8BM-FR8D6

HFVK4-TFWFG-4JKDH-H3FTT-8B23W

HRPR7-WGJFC-VPHRB-XVFRW-2KPWY

V3V63-3QW2G-JMFBY-8F4CM-PDMQW

WX736-8YJCM-2JW33-4KJGY-XCDJ6

CQKYH-GKDJC-MJTWP-FPTJX-PKK23

CHYVW-V63RT-67XVC-XJ4VC-M3YWD

XMDCV-2TJMR-7JD66-YTVMK-V7PBD

RQHFJ-X47QJ-G2XKK-WYQ8P-7W6RG

X6MYY-6BH3T-YRBT8-H8YPH-RG68T

KVXQ3-RVQFG-FW8KC-2QYC6-67WCD

KMM7J-FCXMM-WV8PG-6FQMD-CPTQD

D6T24-3FBGM-WTDG8-6Y3WP-77QRJ

V88FQ-MFFRR-8D2VY-PG87J-FG7PY

XK39D-3PDMC-JMMDK-X8T8M-77YVM

6G3J7-RQ233-FJGHD-GKYP4-QGKPG

BKRFY-XPMQP-Y8PTW-BP6JM-B76FJ

GP7DR-2T2CQ-JYW2M-DXTMG-DTQWY

YWVHF-GT3M6-3QYB2-FCYCH-X47PQ

QJ68H-G7T8R-WFR77-D8X8Y-VJ398

DP7CM-PD6MC-6BKXT-M8JJ6-RPXGJ

MRX3F-47B9T-2487J-KWKMF-RPWBY

QC986-27D34-6M3TY-JJXP9-TBGMD

DP7CM-PD6MC-6BKXT-M8JJ6-RPXGJ

F4297-RCWJP-P482C-YY23Y-XH8W3

HCQ9D-TVCWX-X9QRG-J4B2Y-GR2TT

HH7VV-6P3G9-82TWK-QKJJ3-MXR96

PQTHM-RWBHR-3BPVW-TFB22-V8HXQ

KQC2B-X683R-2CDXT-PQ7HQ-47MPT

JFQYM-YJQFQ-VBRCY-4VV7W-QRXBY

KMTTB-68H32-8MKRK-GBHKT-RKCP6

CX7DD-4GX4Y-BTTR4-H88Y7-GQPWQ

XP8BF-F8HPF-PY6BX-K24PJ-TWT6M

8RCKG-36TH8-VWBGK-T3CB6-RHG48

7G4H4-T4XXW-BVXTH-4QP4V-9CV28

PG274-383QX-6C32H-P8RWC-48M4Q

CWY3F-JGYHJ-W6KBG-3VYK7-DGG7M

X6YWJ-M4TG2-DPGWJ-QCFR8-927M6

QCP6D-7VGVJ-JBKB4-DQMB2-9GTJ3

F7GV4-B7JGY-Q2KQW-6R8BM-FR8D6

HFVK4-TFWFG-4JKDH-H3FTT-8B23W

HRPR7-WGJFC-VPHRB-XVFRW-2KPWY

V3V63-3QW2G-JMFBY-8F4CM-PDMQW

WX736-8YJCM-2JW33-4KJGY-XCDJ6

CQKYH-GKDJC-MJTWP-FPTJX-PKK23

CHYVW-V63RT-67XVC-XJ4VC-M3YWD

XMDCV-2TJMR-7JD66-YTVMK-V7PBD

RQHFJ-X47QJ-G2XKK-WYQ8P-7W6RG

X6MYY-6BH3T-YRBT8-H8YPH-RG68T

KVXQ3-RVQFG-FW8KC-2QYC6-67WCD

KMM7J-FCXMM-WV8PG-6FQMD-CPTQD

D6T24-3FBGM-WTDG8-6Y3WP-77QRJ

V88FQ-MFFRR-8D2VY-PG87J-FG7PY

XK39D-3PDMC-JMMDK-X8T8M-77YVM

6G3J7-RQ233-FJGHD-GKYP4-QGKPG

BKRFY-XPMQP-Y8PTW-BP6JM-B76FJ

GP7DR-2T2CQ-JYW2M-DXTMG-DTQWY

YWVHF-GT3M6-3QYB2-FCYCH-X47PQ

QJ68H-G7T8R-WFR77-D8X8Y-VJ398

6KYDY-JT4MB-6V3JQ-4KKFG-P6C63

6JQPJ-84CFG-JCBQP-PVRJP-9G24Q

MQ8JV-XXKVG-DB8V3-67WJB-RCB6W

J3T66-JTP72-TGT7H-PMMWH-XM4K3

DB4H8-DQJJB-KXMWP-GPJVY-H7P6W

38BXC-F2C4R-PXMXV-DBQXM-3C7V6

7FMM3-W4FMP-4WRXX-BKDRT-7HG48


Baca Selengkapnya ....

DBMS 2marks with answer

Posted by Unknown Jumat, 18 Maret 2011 0 komentar

DATABASE MANAGEMENT SYSTEMS
(geekzlobby.com)
UNIT I
PART A

1. Define database management system?
Database management system (DBMS) is a collection of interrelated data and a
Set of programs to access those data.
2. List few applications of DBMS.
a) Banking
b) Airlines
c) Universities
d) Credit card transactions
e) Tele communication
f) Finance
g) Sales
h) Manufacturing
i) Human resources
3. What are the disadvantages of file processing system?
The disadvantages of file processing systems are
a) Data redundancy and inconsistency
b) Difficulty in accessing data
c) Data isolation
d) Integrity problems
e) Atomicity problems
f) Concurrent access anomalies
4. What are the advantages of using a DBMS?
The advantages of using a DBMS are
a) Controlling redundancy
b) Restricting unauthorized access
c) Providing multiple user interfaces
d) Enforcing integrity constraints.
e) Providing back up and recovery
5. Give the levels of data abstraction?
a) Physical level
b) logical level
c) view level
6. Define instance and schema?
Instance: Collection of data stored in the data base at a particular moment is
called an Instance of the database.
Schema: The overall design of the data base is called the data base schema.
7. Define the terms 1) physical schema 2) logical schema.
Physical schema: The physical schema describes the database design at the
physical level, which is the lowest level of abstraction describing how the data are
actually stored.
Logical schema: The logical schema describes the database design at the logical
level, which describes what data are stored in the database and what relationship exists
among the data.
8. What is conceptual schema?
The schemas at the view level are called subschemas that describe different views
of the database.
9. Define data model?
A data model is a collection of conceptual tools for describing data, data
relationships, data semantics and consistency constraints.
10. What is storage manager?
A storage manager is a program module that provides the interface between the
low level data stored in a database and the application programs and queries submitted to
the system.
11. What are the components of storage manager?
The storage manager components include
a) Authorization and integrity manager
b) Transaction manager
c) File manager
d) Buffer manager
12. What is the purpose of storage manager?
The storage manager is responsible for the following
a) Interaction with he file manager
b) Translation of DML commands in to low level file system commands
c) Storing, retrieving and updating data in the database
13. List the data structures implemented by the storage manager.
The storage manager implements the following data structure
a) Data files
b) Data dictionary
c) indices
14. What is a data dictionary?
A data dictionary is a data structure which stores meta data about the structure of
the database ie. the schema of the database.
15. What is an entity relationship model?
The entity relationship model is a collection of basic objects called entities and
relationship among those objects. An entity is a thing or object in the real world that is
distinguishable from other objects.
16. What are attributes? Give examples.
An entity is represented by a set of attributes. Attributes are descriptive properties
possessed by each member of an entity set.
Example: possible attributes of customer entity are customer name, customer id,
customer street, customer city.
17. What is relationship? Give examples
A relationship is an association among several entities.
Example: A depositor relationship associates a customer with each account that
he/she has.
18. Define the terms
i) Entity set
(geekzlobby.com)
ii) Relationship set
Entity set: The set of all entities of the same type is termed as an entity set.
Relationship set: The set of all relationships of the same type is termed as a
relationship set.
19. Define single valued and multivalued attributes.
Single valued attributes: attributes with a single value for a particular entity are
called single valued attributes.
Multivalued attributes: Attributes with a set of value for a particular entity are
called multivalued attributes.
20. What are stored and derived attributes?
Stored attributes: The attributes stored in a data base are called stored attributes.
Derived attributes: The attributes that are derived from the stored attributes are
called derived attributes.
21. What are composite attributes?
Composite attributes can be divided in to sub parts.
22. Define null values.
In some cases a particular entity may not have an applicable value for an attribute
or if we do not know the value of an attribute for a particular entity. In these cases null
value is used.
23. Define the terms
i) Entity type
ii) Entity set
Entity type: An entity type defines a collection of entities that have the same
attributes.
Entity set: The set of all entities of the same type is termed as an entity set.
24. What is meant by the degree of relationship set?
The degree of relationship type is the number of participating entity types.
25. Define the terms i) Key attribute ii) Value set
Key attribute: An entity type usually has an attribute whose values are distinct
from each individual entity in the collection. Such an attribute is called a key attribute.
Value set: Each simple attribute of an entity type is associated with a value set
that specifies the set of values that may be assigned to that attribute for each individual
entity.
26. Define weak and strong entity sets?
Weak entity set: entity set that do not have key attribute of their own are called
weak entity sets.
Strong entity set: Entity set that has a primary key is termed a strong entity set.
27. What does the cardinality ratio specify?
Mapping cardinalities or cardinality ratios express the number of entities to which
another entity can be associated. Mapping cardinalities must be one of the
following:
• One to one
• One to many
• Many to one
• Many to many
28. Explain the two types of participation constraint.
•Total: The participation of an entity set E in a relationship set R is said to
be total if every entity in E participates in at least one relationship in R.
•Partial: if only some entities in E participate in relationships in R, the
participation of entity set E in relationship R is said to be partial.
29. Define the terms
i) DDL
ii) DML
DDL: Data base schema is specified by a set of definitions expressed by a special
language called a data definition language.
DML: A data manipulation language is a language that enables users to access or
manipulate data as organized by the appropriate data model.
30. Write short notes on relational model
The relational model uses a collection of tables to represent both data and the
relationships among those data. The relational model is an example of a record
based model.
31. Define tuple and attribute
• Attributes: column headers
• Tuple: Row
32. Define the term relation.
Relation is a subset of a Cartesian product of list domains.
33. Define tuple variable
Tuple variable is a variable whose domain is the set of all tuples.


UNIT 2
PART A
1. What are the parts of SQL language?
The SQL language has several parts:

data -definitition language
Data manipulation language
View definition
Transaction control
Embedded SQL
Integrity
Authorization
2. What are the categories of SQL command?
SQL commands are divided in to the following categories:
1. data -definitition language
2. data manipulation language
3. Data Query language
4. data control language
5. data administration statements
6. transaction control statements
3. What are the three classes of SQL expression?
SQL expression consists of three clauses:
Select From where
4. Give the general form of SQL query?
Select A1, A2............., An
From R1, R2..............., Rm Where P
5. What is the use of rename operation?
Rename operation is used to rename both relations and a attributes.
It uses the as clause, taking the form:
Old-name as new-name
6. Define tuple variable?
Tuple variables are used for comparing two tuples in the same relation. The tuple
variables are defined in the from clause by way of the as clause.
7. List the string operations supported by SQL?
1) Pattern matching Operation
2) Concatenation
3) Extracting character strings
4) Converting between uppercase and lower case letters.
8. List the set operations of SQL?
1) Union
2) Intersect operation
3) The except operation
9. What is the use of Union and intersection operation?
Union: The result of this operation includes all tuples that are either in r1 or in r2
or in both r1 and r2.Duplicate tuples are automatically eliminated.
Intersection: The result of this relation includes all tuples that are in both r1 and
r2.
10. What are aggregate functions? And list the aggregate functions supported by
SQL?
Aggregate functions are functions that take a collection of values as input and
return a single value. Aggregate functions supported by SQL are
Average: avg
Minimum: min
Maximum: max
Total: sum
Count: count
11. What is the use of group by clause?
Group by clause is used to apply aggregate functions to a set of tuples.The
attributes given in the group by clause are used to form groups.Tuples with the
same value on all attributes in the group by clause are placed in one group.
12. What is the use of sub queries?
A sub query is a select-from-where expression that is nested with in another
query. A common use of sub queries is to perform tests for set membership, make
setcomparisions, and determine set cardinality.
13. What is view in SQL? How is it defined?
Any relation that is not part of the logical model, but is made visible to a user as a
virtual relation is called a view.
We define view in SQL by using the create view command. The form of the
create view command is
Create view v as <query expression>
14. What is the use of with clause in SQL?
The with clause provides a way of defining a temporary view whose definition is
available only to the query in which the with clause occurs.
15. List the table modification commands in SQL?
Deletion
Insertion
Updates
Update of a view
16. List out the statements associated with a database transaction?
Commit work
Rollback work
17. What is transaction?
Transaction is a unit of program execution that accesses and possibly updated
various data items.
18. List the SQL domain Types?
SQL supports the following domain types.
1) Char(n) 2) varchar(n) 3) int 4) numeric(p,d)
5) float(n) 6) date.
19. What is the use of integrity constraints?
Integrity constraints ensure that changes made to the database by authorized users
do not result in a loss of data consistency. Thus integrity constraints guard against
accidental damage to the database.
20. Mention the 2 forms of integrity constraints in ER model?
Key declarations
Form of a relationship
21. What is trigger?
Triggers are statements that are executed automatically by the system as the side
effect of a modification to the database.
22. What are domain constraints?
A domain is a set of values that may be assigned to an attribute .all values that
appear in a column of a relation must be taken from the same domain.
23. What are referential integrity constraints?
A value that appears in one relation for a given set of attributes also appears for a
certain set of attributes in another relation.
24. What is assertion? Mention the forms available.
An assertion is a predicate expressing a condition that we wish the database
always to satisfy.
Domain integrity constraints.
Referential integrity constraints
25. Give the syntax of assertion?
Create assertion <assertion name>check<predicate>
26. What is the need for triggers?
Triggers are useful mechanisms for alerting humans or for starting certain tasks
automatically when certain conditions are met.
27. List the requirements needed to design a trigger.
The requirements are
Specifying when a trigger is to be executed.
Specify the actions to be taken when the trigger executes.
28. Give the forms of triggers?
The triggering event can be insert or delete.
For updated the trigger can specify columns.
The referencing old row as clause
The referencing new row as clause
The triggers can be initiated before the event or after the event.
29. What does database security refer to?
Database security refers to the protection from unauthorized access and malicious
destruction or alteration.
30. List some security violations (or) name any forms of malicious access.
Unauthorized reading of data
Unauthorized modification of data
Unauthorized destruction of data.
31. List the types of authorization.
Read authorization
Write authorization
Update authorization
Drop authorization
32. What is authorization graph?
Passing of authorization from one user to another can be represented by an
authorization graph.
33. List out various user authorization to modify the database schema.
Index authorization
Resource authorization
Alteration authorization
Drop authorization
34. What are audit trails?
An audit trail is a log of all changes to the database along with information such
as which user performed the change and when the change was performed.
35. Mention the various levels in security measures.
Database system
Operating system
Network
Physical
human
36. Name the various privileges in SQL?
Delete
Select
Insert
update
37. Mention the various user privileges.
All privileges directly granted to the user or role.
All privileges granted to roles that have been granted to the user or role.
38. Give the limitations of SQL authorization.
The code for checking authorization becomes intermixed with the rest of the
application code.
Implementing authorization through application code rather than specifying it
declaratively in SQL makes it hard to ensure the absence of loopholes.
39. Define the term Domain.
For each attribute there is a set of permitted values called the domain of that
attribute.
40. What is a candidate key?
Minimal super keys are called candidate keys.
41. What is a primary key?
Primary key is chosen by the database designer as the principal means of
identifying an entity in the entity set.
42. What is a super key?
A super key is a set of one or more attributes that collectively allows us to
identify uniquely an entity in the entity set.
43. Define-relational algebra.
The relational algebra is a procedural query language. It consists of a set of
operations that take one or two relation as input and produce a new relation as
output.
44. What is a SELECT operation?
The select operation selects tuples that satisfy a given predicate. We use the
lowercase letter sssss to denote selection.
45. What is a PROJECT operation?
The project operation is a unary operation that returns its argument relation with
certain attributes left out. Projection is denoted by pie (p
pppp).
46. Write short notes on domain relational calculus
The domain relational calculus uses domain variables that take on values from an
attribute domain rather than values for entire tuple.
47. Define query language?
A query is a statement requesting the retrieval of information. The portion of
DML that involves information retrieval is called a query language.
48. Give some encryption techniques?
DES
AES
Public key encryption
49. What does authentication refer?
Authentication refers to the task of verifying the identity of a person.
50. List some authentication techniques.
Challenge response scheme
Digital signatures
Nonrepudiation


UNIT III

1. Define Boyce codd normal form
A relation schema R is in BCNF with respect to a set F of functional
+dependencies if, for all functional dependencies in F of the form
2. List the disadvantages of relational database system
Repetition of data
Inability to represent certain information.
3. What is first normal form?
The domain of attribute must include only atomic (simple, indivisible) values.
4. What is meant by functional dependencies?
Consider a relation schema R and a
C
R and ß
C
R. The functional dependency a
ß
holds on relational schema R if in any legal relation r(R), for all pairs of
tuples t1 and t2 in r such that t1 [] =t1 [], and also t1 [[1]] =t2 [[1]].
5. What are the uses of functional dependencies?
To test relations to see whether they are legal under a given set of functional
dependencies.
To specify constraints on the set of legal relations.
6. Explain trivial dependency?
Functional dependency of the form a
ß
is trivial if ß
C
. Trivial functional
dependencies are satisfied by all the relations.
7. What are axioms?
Axioms or rules of inference provide a simpler technique for reasoning about
functional dependencies.
8. What is meant by computing the closure of a set of functional dependency?
The closure of F denoted by F+ is the set of functional dependencies logically
implied by F.
9. What is meant by normalization of data?
It is a process of analyzing the given relation schemas based on their Functional
Dependencies (FDs) and primary key to achieve the properties
Minimizing redundancy
Minimizing insertion, deletion and updating anomalies.
10. Define canonical cover?
A canonical cover Fc for F is a set of dependencies such that F logically implies
all dependencies in FC and Fc logically implies all dependencies in F. Fc must
have the following properties.
11. List the properties of canonical cover.
Fc must have the following properties.
No functional dependency in Fc contains an extraneous attribute.
Each left side of a functional dependency in Fc is unique.
12. Explain the desirable properties of decomposition.
Lossless-join decomposition
Dependency preservation
Repetition of information
13. What is 2NF?
A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R
is fully functionally dependent on primary key.
14.Define 1NF
• Tabular format in which:
• All key attributes are defined
• There are no repeating groups in the table
• All attributes are dependent on primary key
• All relational tables must satisfy 1NF requirements
15. How to convert to First Normal Form
A table in a relational database must be in 1NF.
• Repeating groups must be eliminated
• Primary key determined
• Uniquely identify attribute values (rows)
• All attributes dependent on primary key
• In example: Combination of PROJ_NUM and EMP_NUM
16.What is Dependency diagram?
• Dependency diagram:
• Depicts all dependencies found within a given table structure
• Helpful in getting bird’s-eye view of all relationships among a table’s attributes
• Use makes it much less likely that an important dependency will be overlooked
17.What are the Desirable dependencies based on entire primary key
Partial:
Based on part of composite primary key
Transitive:
One nonprime attribute depends on another nonprime attribute
18.What are the aspects to be considered to check Table is in second normal form (2NF)?
Table is in second normal form (2NF) if:
ü It is in 1NF and
ü It includes no partial dependencies:
ü No attribute is dependent on only a portion of the primary key
19.Define Physical Data Independence:
The execution of application programs is not affected by the changes in the physical
data access and storage methods.
20.Define Logical Data Independence:
Logical changes in tables and views such as adding/deleting columns or changing field
length need not necessiatitate modifications in the programs. The database can change and
grow to reflect changes in reality without requiring the user intervention or changes in the
applications.


UNIT IV

PART A
1. What is transaction?
Collections of operations that form a single logical unit of work are called
transactions.
2. What are the two statements regarding transaction?
The two statements regarding transaction of the form:
.Begin transaction
.End transaction
3. What are the properties of transaction?
The properties of transactions are:
.Atomicity
.Consistency
.Isolation
.Durability
4. What is recovery management component?
Ensuring durability is the responsibility of a software component of the base
system called the recovery management component.
5. When is a transaction rolled back?
Any changes that the aborted transaction made to the database must be undone.
Once the changes caused by an aborted transaction have been undone, then the
transaction has been rolled back.
6. What are the states of transaction?
The states of transaction are
. Active
. Partially committed
. Failed
. Aborted
.Committed
.Terminated
7. What is a shadow copy scheme?
It is simple, but efficient, scheme called the shadow copy schemes. It is based on
making copies of the database called shadow copies that one transaction is active at a
time. The scheme also assumes that the database is simply a file on disk.
8. Give the reasons for allowing concurrency?
The reasons for allowing concurrency is if the transactions run serially, a short
transaction may have to wait for a preceding long transaction to complete, which can lead
to unpredictable delays in running a transaction.
So concurrent execution reduces the unpredictable delays in running transactions.
9. What is average response time?
The average response time is that the average time for a transaction to be
completed after it has been submitted.
10. What are the two types of serializability?
The two types of serializability is
. Conflict serializability
. View serializability
11. Define lock?
Lock is the most common used to implement the requirement is to allow a
transaction to access a data item only if it is currently holding a lock on that item.
12. What are the different modes of lock?
The modes of lock are:
.Shared
.Exclusive
13. Define deadlock?
Neither of the transaction can ever proceed with its normal execution. This
situation is called deadlock.
14. Define the phases of two phase locking protocol
. Growing phase: a transaction may obtain locks but not release any lock.
.Shrinking phase: a transaction may release locks but may not obtain any new
locks.
15. Define upgrade and downgrade?
It provides a mechanism for conversion from shared lock to exclusive lock is
known as upgrade.
It provides a mechanism for conversion from exclusive lock to shared lock is
known as downgrade.
16. What is a database graph?
The partial ordering implies that the set D may now be viewed as a directed
acyclic graph, called a database graph.
17. What are the two methods for dealing deadlock problem?
The two methods for dealing deadlock problem is deadlock detection and
deadlock recovery.
18. What is a recovery scheme?
An integral part of a database system is a recovery scheme that can restore the
database to the consistent state that existed before the failure.
19. What are the two types of errors?
The two types of errors are:
. Logical error
. System error
20. What are the storage types?
The storage types are:
. Volatile storage
. Nonvolatile storage
21. Define blocks?
The database system resides permanently on nonvolatile storage, and is
partitioned into fixed-length storage units called blocks.
22. What is meant by Physical blocks?
The input and output operations are done in block units. The blocks residing on
the disk are referred to as physical blocks.
23. What is meant by buffer blocks?
The blocks residing temporarily in main memory are referred to as buffer blocks.
24. What is meant by disk buffer?
The area of memory where blocks reside temporarily is called the disk buffer.
25. What is meant by log-based recovery?
The most widely used structures for recording database modifications is the log.
The log is a sequence of log records, recording all the update activities in the database.
There are several types of log records.
26. What are uncommitted modifications?
The immediate-modification technique allows database modifications to be output
to the database while the transaction is still in the active state. Data modifications written
by active transactions are called uncommitted modifications.
27. Define shadow paging.
An alternative to log-based crash recovery technique is shadow paging. This
technique needs fewer disk accesses than do the log-based methods.
28. Define page.
The database is partitioned into some number of fixed-length blocks, which are
referred to as pages.
29. Explain current page table and shadow page table.
The key idea behind the shadow paging technique is to maintain two page tables
during the life of the transaction: the current page table and the shadow page table. Both
the page tables are identical when the transaction starts. The current page table may be
changed when a transaction performs a write operation.
30. What are the drawbacks of shadow-paging technique?
•Commit Overhead
•Data fragmentation
•Garbage collection
30. Define garbage collection.
Garbage may be created also as a side effect of crashes. Periodically, it is
necessary to find all the garbage pages and to add them to the list of free pages. This
process is called garbage collection.
32. Differentiate strict two phase locking protocol and rigorous two phase locking
protocol.
In strict two phase locking protocol all exclusive mode locks taken by a
transaction is held until that transaction commits. Rigorous two phase locking protocol requires
that all locks be held until the transaction commits.
33. How the time stamps are implemented
•Use the value of the system clock as the time stamp. That is a transaction’s
time stamp is equal to the value of the clock when the transaction enters the
system.
•Use a logical counter that is incremented after a new timestamp has been
assigned; that is the time stamp is equal to the value of the counter.
34. What are the time stamps associated with each data item?
• W-timestamp (Q) denotes the largest time stamp if any transaction that
executed WRITE (Q) successfully.
• R-timestamp (Q) denotes the largest time stamp if any transaction that
executed READ (Q) successfully.


UNIT V


PART A
1. Give the measures of quality of a disk.
Capacity
Access time
Seek time
Data transfer rate
Reliability
Rotational latency time.
2. Compare sequential access devices versus random access devices with an example
sequential access devices random access devices
Must be accessed from the beginning It is possible to read data from any location
Eg:-tape storage Eg:-disk storage
Access to data is much slower Access to data is faster
Cheaper than disk Expensive when compared with disk
3. What are the types of storage devices?
Primary storage
Secondary storage
Tertiary storage
4. Draw the storage device hierarchy according to their speed and their cost.
Cache
Main memory
Flash memory
Magnetic disk
Optical disk
Magnetic tapes
5. What are called jukebox systems?
Jukebox systems contain a few drives and numerous disks that can be loaded into
one of the drives automatically.
6. What is called remapping of bad sectors?
If the controller detects that a sector is damaged when the disk is initially
formatted, or when an attempt is made to write the sector, it can logically map the sector
to a different physical location.
7. Define access time.
Access time is the time from when a read or write request is issued to when data
transfer begins.
8. Define seek time.
The time for repositioning the arm is called the seek time and it increases with the
distance that the arm is called the seek time.
9. Define average seek time.
The average seek time is the average of the seek times, measured over a sequence
of random requests.
10. Define rotational latency time.
The time spent waiting for the sector to be accessed to appear under the head is
called the rotational latency time.
11. Define average latency time.
The average latency time of the disk is one-half the time for a full rotation of the
disk.
12. What is meant by data-transfer rate?
The data-transfer rate is the rate at which data can be retrieved from or stored to
the disk.
13. What is meant by mean time to failure?
The mean time to failure is the amount of time that the system could run
continuously without failure.
14. What are a block and a block number?
A block is a contiguous sequence of sectors from a single track of one platter.
Each request specifies the address on the disk to be referenced. That address is in the
form of a block number.
15. What are called journaling file systems?
File systems that support log disks are called journaling file systems.
16. What is the use of RAID?
A variety of disk-organization techniques, collectively called redundant arrays of
independent disks are used to improve the performance and reliability.
17. Explain how reliability can be improved through redundancy?
The simplest approach to introducing redundancy is to duplicate every disk. This
technique is called mirroring or shadowing. A logical disk then consists of two physical
disks, and write is carried out on both the disk. If one of the disks fails the data can be
read from the other. Data will be lost if the second disk fails before the first fail ed disk is
repaired.
18. What is called mirroring?
The simplest approach to introducing redundancy is to duplicate every disk. This
technique is called mirroring or shadowing.
19. What is called mean time to repair?
The mean time to failure is the time it takes to replace a failed disk and to restore
the data on it.
20. What is called bit-level striping?
Data striping consists of splitting the bits of each byte across multiple disks. This
is called bit-level striping.
21. What is called block-level striping?
Block level striping stripes blocks across multiple disks. It treats the array of disks
as a large disk, and gives blocks logical numbers.
22. What are the two main goals of parallelism?
Load –balance multiple small accesses, so that the throughput of such
accesses increases.
Parallelize large accesses so that the response time of large accesses is
reduced
23. What are the factors to be taken into account when choosing a RAID level?
Monetary cost of extra disk storage requirements.
Performance requirements in terms of number of I/O operations
Performance when a disk has failed.
Performances during rebuild.
24. What is meant by software and hardware RAID systems?
RAID can be implemented with no change at the hardware level, using only
software modification. Such RAID implementations are called software RAID systems
and the systems with special hardware support are called hardware RAID systems.
25. Define hot swapping?
Hot swapping permits the removal of faulty disks and replaces it by new ones
without turning power off. Hot swapping reduces the mean time to repair.
26. Which level of RAID is best? Why?
RAID level 1 is the RAID level of choice for many applications with moderate
storage requirements and high I/O requirements. RAID 1 follows mirroring and provides
best write performance.
27. Distinguish between fixed length records and variable length records?
Fixed length records
Every record has the same fields and field lengths are fixed.
Variable length records
File records are of same type but one or more of the fields are of varying size.
28. What are the ways in which the variable-length records arise in database
systems?
Storage of multiple record types in a file.
Record types that allow variable lengths for one or more fields.
Record types that allow repeating fields.
29. Explain the use of variable length records.
They are used for Storing of multiple record types in a file.
Used for storing records that has varying lengths for one or more fields.
Used for storing records that allow repeating fields
30. What is the use of a slotted-page structure and what is the information present
in the header?
The slotted-page structure is used for organizing records within a single block.
The header contains the following information.
The number of record entries in the header.
The end of free space
An array whose entries contain the location and size of each record.
31. What are the two types of blocks in the fixed –length representation? Define
them.
Anchor block: Contains the first record of a chain.
Overflow block: Contains the records other than those that are the first
record of a chain.
32. What is known as heap file organization?
In the heap file organization, any record can be placed anywhere in the file where
there is space for the record. There is no ordering of records. There is a single file for
each relation.
33. What is known as sequential file organization?
In the sequential file organization, the records are stored in sequential order,
according to the value of a “search key” of each record.
34. What is hashing file organization?
In the hashing file organization, a hash function is computed on some attribute of
each record. The result of the hash function specifies in which block of the file the record
should be placed.
35. What is known as clustering file organization?
In the clustering file organization, records of several different relations are stored
in the same file.
36. What is an index?
An index is a structure that helps to locate desired records of a relation quickly,
without examining all records.
37. What are the two types of ordered indices?
. Primary index
. Secondary index
38. What are the types of indices?
.Ordered indices
.Hash indices
39. What are the techniques to be evaluated for both ordered indexing and hashing?
.Access types
.Access time
.Insertion time
.Deletion time
.Space overhead
40. What is known as a search key?
An attribute or set of attributes used to look up records in a file is called a search
key.
41. What is a primary index?
A primary index is an index whose search key also defines the sequential order of
the file.
42. What are called index-sequential files?
The files that are ordered sequentially with a primary index on the search key are
called index-sequential files.
43. What are the two types of indices?
.Dense index
.Sparse index
44. What are called multilevel indices?
Indices with two or more levels are called multilevel indices.
45. What are called secondary indices?
Indices whose search key specifies an order different from sequential order of the
file are called secondary indices. The pointers in secondary index do not point directly to
the file. Instead each points to a bucket that contains pointers to the file.
46. What are the disadvantages of index sequential files?
The main disadvantage of the index sequential file organization is that
performance degrades as the file grows. This degradation is remedied by reorganization
of the file.
47. What is a B+-Tree index?
A B+-Tree index takes the form of a balanced tree in which every path from the
root of the root of the root of the tree to a leaf of the tree is of the same length.
P1 K1 P2 K2 ............. Pn-1 Kn-1 Pn
A node contains up to n-1 search key values and n pointers.
48. What is B-Tree?
A B-tree eliminates the redundant storage of search-key values .It allows search
key values to appear only once.
49. What is hashing?
Hashing allows us to find the address of a data item directly by computing a hash
function on the search key value of the desired record.
50. How do you create index in SQL?
We create index by he create index command.
Create index<index name>on <relation name> (<attribute list>)
51. Distinguish between static hashing and dynamic hashing?
Static hashing
Static hashing uses a hash function in which the set of bucket adders is
fixed. Such hash functions cannot easily accommodate databases that
grow larger over time.
Dynamic hashing
Dynamic hashing allows us to modify the hash function dynamically.
Dynamic hashing copes with changes in database size by splitting and
coalescing buckets as the database grows and shrinks.
52. What is a hash index?
A hash index organizes the search keys, with their associated pointers, into a hash
file structure.
53. What can be done to reduce the occurrences of bucket overflows in a hash file
organization?
.To reduce bucket overflow the number of bucket is chosen to be
(nr/fr)*(1+d).
.We handle bucket overflow by using
•Overflow chaining(closed hashing)
•Open hashing
54. Differentiate open hashing and closed hashing (overflow chaining)
Closed hashing (overflow chaining)
If a record must be inserted in to a bucket b, and b is already full, the system
provides an overflow bucket for b, and inserts the record in to the overflow bucket. If the
overflow bucket is also full, the system provides another overflow bucket, and so on. All
the overflow buckets of a given buckets are chained together in a linked list, overflow
handling using linked list is known as closed hashing.
Open hashing
The set of buckets is fixed, and there are no overflow chains. Instead, if a bucket
is full, the system inserts records in some other bucket in the initial set of buckets.
55. What is linear probing?
Linear probing is a type of open hashing. If a bucket is full the system inserts
records in to the next bucket that has space. This is known as linear probing.
56. What is called query processing?
Query processing refers to the range of activities involved in extracting data from
a database.
57. What are the steps involved in query processing?
The basic steps are:
.parsing and translation                                                                        
.optimization
.evaluation
58. What is called an evaluation primitive?
A relational algebra operation annotated with instructions on how to evaluate is
called an evaluation primitive.
59. What is called a query evaluation plan?
A sequence of primitive operations that can be used to evaluate ba query is a
query evaluation plan or a query execution plan.
60. What is called a query –execution engine?
The query execution engine takes a query evaluation plan, executes that plan, and
returns the answers to the query.
61. How do you measure the cost of query evaluation?
The cost of a query evaluation is measured in terms of a number of different
resources including disk accesses, CPU time to execute a query, and in a distributed
database system the cost of communication
62. List out the operations involved in query processing
Selection operation
Join operations.
Sorting.
Projection
Set operations
Aggregation


For more question papers and question bank visit geekzlobby.com or click here


Baca Selengkapnya ....

Hijacking social networking Dengan Firesheep

Posted by Unknown Rabu, 09 Maret 2011 0 komentar
Oke kali ini kita akan coba menjahili teman kita yg sedang online bersamaan dalam 1 network, atau dalam 1 warnet. Kita akan menggunakan teknik Hijacking social networking Dengan Firesheep, Hijacking adalah satu metode yang digunakan para hacker untuk melakukan penetrasi dengan cara melakukan pencurian cookie, dengan menggunakan Add-ons nya mozila firefox . . .
nggak usah pangjang lebar yuk kita lakukan praktek . . .

siapkan alat-alatnya dahulu:
- WinPcap
- Firesheep <-- Add-ons Firefox
- dan browser mozzila firefox

Cara pertama instal winpcap yang telah anda download tadi, setelah itu download dan instalkan pada addons mozzila. Cara instal firesheep bisa anda tarik file Firesheepnya ke dalam mozilla firefox, atau file Firesheepnya di open dengan mozila firefox, klick instal dan restar mozzila anda, akan muncul di tab kiri mozzila anda firesheep dan start capture . . .
maka komputer satu network anda yang membuka facebook akan terlihat oleh anda dan anda bebas melihat-lihat dan merubah isi facebook tersebut . . . :)

cara kerja firesheep dengan membaca cookies yang ada pada komputer yang membuka social networking . . .

sekian . . .
klo ada salah-salah kata dan ada yang kurang berkenan di hati anda semua, mohon di maafkan . . . :)
saya juga masih newbie . . :)
semoga bermanfaat . . .


Baca Selengkapnya ....

Garmin City Navigator Europe 2011.20 (2010)

Posted by Unknown Selasa, 08 Maret 2011 0 komentar
Garmin City Navigator Europe 2011.20 (2010) | 2.8 Gb

Map of City Navigator Europe NT, with about 3 million objects and more than 9.3 million kilometers of roads, provides all the data necessary for traveling in Europe. Now to the mapping City Navigator Europe NT added coverage of Iceland, a new detailed coverage of the Azores, as well as expanded coverage of Croatia and address information for France and Italy. City Navigator provides the most detailed street maps for precise navigation "from point to point" to any address or intersection. You can also plot a route to restaurants, petrol stations, hotels, entertainment centers, etc. Information supplied by NAVTEQ.

Year: 2010
Version: 2011.20
Developer: Garmin
System Requirements: flash-card Nuvi Garmin any generation, of not less than 4 GB
Language: English
Tablet: Not required (Map unlocked)

Features:
* Includes full coverage for Western Europe and many countries in Eastern Europe for more information, see the coverage map.
* Includes detailed coverage of Croatia;
* Contains extensive detailed coverage of Romania and Ukraine;
* Indication of about 3 million objects - restaurants, hotels, border crossings, entertainment centers, campgrounds, shops,
* Offers more than 9.3 million kilometers of roads, including highways, national and regional highways and local roads;
* Includes detailed information such as: loss of rotation, the instructions for the passage of the circular road junctions, speed categories and other navigation data;
* Gets the navigation instructions to move from turn to turn to your compatible device;
* Includes traffic data for compatible devices using a traffic receiver;
* Improved pronunciation data for compatible devices, which pronounces the street names.

Britain and Ireland:
* Great Britain: Full Coverage
* Isle of Man: Full Coverage
* Northern Ireland: Full coverage
* Ireland: Full coverage
* Channel Islands: Full Coverage

Denmark, Finland, Iceland, Norway and Sweden:
* Denmark: Full coverage
* Finland: Full Coverage
* Iceland: full coverage
* Norway: full coverage
* Sweden: Full coverage

France and the Benelux countries:
* France: Full coverage
* Andorra: Full coverage
* Belgium: full coverage
* Netherlands: Full Coverage
* Luxembourg: full coverage

Italy, Austria, Switzerland and Liechtenstein:
* Italy: full coverage
* Austria: Full Coverage
* Switzerland: Full Coverage
* Liechtenstein: full coverage

Spain and Portugal:
* Spain: Full coverage
* Portugal: Full coverage
* Gibraltar: Full coverage
* Azores: full coverage

Germany:
* Germany: full coverage

Czech Republic:
* Czech Republic: full coverage

Greece:
* Greece: full coverage

Eastern Europe:
* Latvia: full coverage
* Lithuania: full coverage
* Poland: full coverage
* Slovakia: full coverage
* Hungary: full coverage
* Slovenia: full coverage
* Croatia: full coverage
* Bulgaria: Detailed coverage of Sofia
* Romania: Covering the major urban areas, detailed coverage of Bucharest, Timisoara and Voluntari
* Turkey: Detailed coverage of cities Akyurt, Alt?nda?, ?ankaya, Elmada?, Etimesgut, G?lba??, Ke?i?ren, Mamak, Sincan, Yenimahalle, Adalar, Avc?lar, Ba?c?lar, Bah?elievler, Bak?rk?y, Bayrampa?a, Be?ikta?, Beykoz, Beyo?lu, B?y?k?ekmece, Emin?n?, Esenler, Ey?p, Fatih, Gaziosmanpa?a, G?ng?ren, Kad?k?y, Ka??thane, Kartal, K???k?ekmece, Maltepe, Pendik, Sar?yer, ?i?li, Sultanbeyli, Tuzla, ?mraniye, ?sk?dar, Zeytinburnu, Bal?ova, Bornova, Buca, ?i?li, Gaziemir, G?zelbah?e, Kar??yaka, Konak, Narl?dere.
* Moldova: Major Roads Only
* Serbia and Montenegro: Major Roads Only
* Albania: Major Roads Only
* Macedonia: Major Roads Only
* Ukraine: covering the main urban areas

Additional Information:
* FID: 2266;
* Unzip the file Garmin, unpacked folder to put the flash drive navigator. To place the device you want to rename the map files, in addition to the navigator of the latest generation of cards in the System folder, will conflict 3D maps, so I do not recommend the device, it is better to stick;
* Maps (including 3D) are unlocked and do not require further action. Fid reference data, unlocking is not necessary;
* Map is suitable for devices using the card in 1281, 1734, CN, device displaying 3D. On devices without displaying the 3D map will work without a 3D building course;
* In the folder JCV is a file that provides information on traffic lanes.


http://www.filesonic.com/file/173153491/Ga-rm-in_Eu-ro-pe.part01.rar
http://www.filesonic.com/file/173153501/Ga-rm-in_Eu-ro-pe.part02.rar
http://www.filesonic.com/file/173153511/Ga-rm-in_Eu-ro-pe.part03.rar
http://www.filesonic.com/file/173153521/Ga-rm-in_Eu-ro-pe.part04.rar
http://www.filesonic.com/file/173153531/Ga-rm-in_Eu-ro-pe.part05.rar
http://www.filesonic.com/file/173153541/Ga-rm-in_Eu-ro-pe.part06.rar
http://www.filesonic.com/file/173153551/Ga-rm-in_Eu-ro-pe.part07.rar
http://www.filesonic.com/file/173153561/Ga-rm-in_Eu-ro-pe.part08.rar
http://www.filesonic.com/file/173153571/Ga-rm-in_Eu-ro-pe.part09.rar
http://www.filesonic.com/file/173153581/Ga-rm-in_Eu-ro-pe.part10.rar
http://www.filesonic.com/file/173153591/Ga-rm-in_Eu-ro-pe.part11.rar
http://www.filesonic.com/file/173153601/Ga-rm-in_Eu-ro-pe.part12.rar


Baca Selengkapnya ....

Agile Web Solutions 1Password v3.5.8 MacOSX Incl. Keymaker-CORE

Posted by Unknown 0 komentar


All your confidential information, including passwords, identities, and credit cards, is kept secure in one secure place using a highly encrypted keychain. 1Password fully supports most web browsers, including Safari, Camino, OmniWeb, DEVONagent, Firefox, Flock, Fluid, and NetNewsWire. All browser extensions share the data stored in the keychain which means you never need to manually copy your passwords between browsers or from the password manager to a browser ever again! 1Password has received numerous awards, including 4.5 mice from Macworld magazine, MacLife Editors pick, and was the Pick of Week on MacBreak Weekly by both Leo Laporte and Merlin Mann. 1Password also has a companion iPhone/iPod touch application available in iTunes App Store.

* Go & Fill: 1 Click, That’s It.
Selecting one of your saved logins from 1Password’s Go & Fill menu takes you to the site, securely fills your username and password, and logs you in, all with a single click or a few keystrokes.
* Online Shopping Made Even Easier
Once you’ve created your identities, select one in your web browser to quickly fill out a contact form. Store multiple credit cards to simplify and speed up your online shopping, filling checkout forms with ease.
* Always By Your Side
Now you can take your information with you so that it’s always on hand. Mobile versions of 1Password are available for iPhone OS and Palm OS and more data portability options are coming.

Requirements:

* PPC / Intel
* Mac OS X 10.5 or later
* Most major browsers supported

Release name: Agile.Web.Solutions.1Password.v3.5.8.MacOSX.Incl.Keymaker-CORE
Size: 19.15 MB


http://www.fileserve.com/file/4fQBjhJ/Agile.Web.Solutions.1Password.v3.5.8.MacOSX.Incl.Keymaker-CORE.rar

or

http://www.filesonic.com/file/168915061/Agile.Web.Solutions.1Password.v3.5.8.MacOSX.Incl.Keymaker-CORE.rar


Baca Selengkapnya ....

AVG Internet Security 2011 10.0.1204 (x64/x86)

Posted by Unknown 0 komentar
Release Group: 3152
Release Name: AVG Internet Security 2011 11 20 Build
Release Date: October 14, 2010
Filename:
Size: 139.59 MB (146,375,472 bytes)
Type: Util

Protection: Crack (keys)Release DescriptionAVG Internet Security 2011
– a set of programs to protect your PC from dangerous objects and network
threats. program blocks viruses, trojans, worms, spyware, and firewall to protect
against network attacks. When using AVG Internet Security 2011 you will not have

to worry about identity theft, spam and viruses.
Advantages of products AVG:
• The necessary level of protection
• Our specialists are always looking for new challenges, so we can quickly develop
new ways of protection.
• AVG products protect more than 80 million PC users around the world.
• Easy to use security
• AVG products are easy to download, install and use, have minimal impact on
system performance.
• Technology, the award-winning


http://www.fileserve.com/file/77U9hb4


http://www.duckload.com/download/3307293/AVG_I_S_2011_10.0.1120_DirectDDL.Ws.rar


http://www.filesonic.com/file/134874291/AVG_I_S_2011_10.0.1120_DirectDDL.Ws.rar


http://oron.com/n4kf9rowjiaa/AVG_I_S_2011_10.0.1120_DirectDDL.Ws.rar.html


http://www.usershare.net/desidownloads/kajc9r3od0er


Baca Selengkapnya ....

AutoPlay Menu Builder 6.1

Posted by Unknown 0 komentar
AutoPlay Menu Builder v6.1 Incl. Keymaker-EMBRACE

Here is new version of AutoPlay Menu Builder, useful tool for creating CD/DVD autoruns.

Description: AutoPlay Menu Builder is one of the best tools for creating an automatic playing menu to launch your cd or dvd. No programming experience is necessary! Just click and drag your mouse a few times, and like magic you can build a menu which will pop up when your disc is inserted into the drive. From the menu you can launch applications, open documents, play movies, and do much, much more. This is the simple, elegant solution to your disc creation needs.


http://www.fileserve.com/file/AAHV6kJ/apmb.v6.1.rar
OR :
http://www.filesonic.com/file/170912802/apmb.v6.1.rar


Baca Selengkapnya ....

Bootable USB Windows XP Vista Win 7 Maker

Posted by Unknown Jumat, 04 Maret 2011 0 komentar
Bootable USB Windows XP/ Vista/ Win 7 Maker

Introducing the tool for Installing Windows For Your Netbooks, Notebooks, or Desktop from USB Flash Drive.
- 3 Options and 3 Folders enclosed
- (1 for Win 7) (1 for Vista/ XP) (1 for XP only)
Full & Very detailed instructions included.

Filesonic
http://www.filesonic.com/file/151329821/B00tabl3.USB.N3w.rar

Fileserve
http://www.fileserve.com/file/k6DTZY4/B00tabl3.USB.N3w.rar


Baca Selengkapnya ....

Kaspersky Small Office Security 2 DEURUS

Posted by Unknown 0 komentar
Kaspersky Small Office Security 2 (ENG/DEU/RUS) | 685 MB

This safety kit includes Kaspersky Small Office Security Build 9.1.0.59 2 yazykaovymi different packages and updates on 04.03.2011, as well as medicines, skins and tutorials
With Kaspersky Small Office Security will not have to spend much time and effort to learn and configuration information to protect your enterprise. Easy to install, the optimal default settings and automatic updates make it possible to ensure the security of your computer network and the protection of confidential information. Now you can concentrate fully on the activities of your company that is focused on issues of computer security.

Kaspersky Updater 3.5.0.34 with GUI 2.2.1.99 - update utility designed to download and save to a separate directory update databases and application modules of Kaspersky Lab. C it means you can download updates for selected Kaspersky Lab applications installed on your network or home computer. The utility has the ability to save downloaded avtopatchi base and a local folder to a network directory, which is connected to a disk file system on your computer, or on flash-drive. Utility updates and articles in this section are provided in test mode! In distributing the program added GUI-interface (a screenshot) - very handy thing!

The composition of Publication

Downloads:
Kaspersky Small Office Security 2 Build 9.1.0.59 English
Kaspersky Small Office Security 2 Build 9.1.0.59 Russian
Kaspersky Small Office Security 2 Build 9.1.0.59 German

Medicine:
Always working keys
Skin, which adds the possibility to activate the key file

Extras:
User Manuals for all distributions in English, German and Russian
Video - Install Guide Key Exploit

http://uploading.com/files/adm4f1c2/AntiPR2.part1.rar/
http://uploading.com/files/3e9c481m/AntiPR2.part2.rar/
http://uploading.com/files/584fecfc/AntiPR2.part3.rar/

http://www.fileserve.com/file/YjbW9G6
http://www.fileserve.com/file/tKpy9Uw
http://www.fileserve.com/file/SvzddDr

http://www.filesonic.com/file/151935972/AntiPR2.part1.rar
http://www.filesonic.com/file/151954352/AntiPR2.part2.rar
http://www.filesonic.com/file/151941091/AntiPR2.part3.rar

http://ul.to/lpsk43
http://ul.to/ewm9bi
http://ul.to/sxnnpt

http://www.filefactory.com/file/cadc64f/n/AntiPR2_part1_rar
http://www.filefactory.com/file/cadc605/n/AntiPR2_part2_rar
http://www.filefactory.com/file/cadc6fe/n/AntiPR2_part3_rar


Baca Selengkapnya ....

ESET NOD32 Antivirus 4.0.314 Spanish-English + Patch Users-Password LIFETIME NOD32 4

Posted by Unknown 0 komentar

With the lowest consumption of system resources, ESET NOD32 Antivirus is the ideal solution for you and your family get the most out of your PC without compromising speed or performance. With ESET's antivirus can be studied, surf, play games, watch movies or work from home without even noticing that your computer is protected at all times, against the latest threats.

Recognized by leading independent laboratories worldwide, the award-winning ESET NOD32 Antivirus offers the best level of detection of the most diverse threats as viruses, worms, Trojans, spyware, adware, phishing and other malicious code, in constant evolution. © ThreatSense engine of NOD32 Antivirus ensures high levels of proactive protection for both known and unknown malware.

ESET NOD32 Antivirus runs in the background, allowing the team to use for daily tasks in a safe and protected. Among its qualities are:

Faster scan: ESET NOD32 Antivirus does not slow your computer while browsing files ensures maximum protection for your computer. Thus, you are free to perform everyday tasks while NOD32 running in the background with minimal impact on the system and keeping your system safe.
The quick and easy installation of the product along with a friendly graphical interface and automatic updates make it even less familiar with the user computing environment, to ensure that your system is properly protected, with minimum effort required.

System Requirements

Supported Processors: Intel or AMD x86/x64
Operating Systems:
Microsoft Windows NT 4.0 SP6 (or higher)
Microsoft Windows 2000
Microsoft Windows XP (32 and 64 bit)
Microsoft Windows Vista (32 and 64 bit)
Microsoft Windows 7 (32-bit editions)

Well folks here I leave the nod 32 patch brings updates ..
PROGRAM SEARCH USERS AND PASSWORDS NOD32 4 (ANY VERSION)
And automatically installs NOD32 ANTIVIRUS IN, NO NEED
SET USER AND PASSWORD NEVER AGAIN DOING THE PATCH
AUTOMATICALLY. SO DO NOT WORRY NO MORE FOR USERS
AND PASSWORDS ..

Easy to install ..

http://www.fileserve.com/file/x6MRGye


Baca Selengkapnya ....

Need For Speed Worlds Updated (2010) - DARK SLASH

Posted by Unknown 0 komentar
Need For Speed Worlds Updated (2010) DARK SLASH
English | Platform: PC | Release: 2010 | Publisher: Electronic Arts Inc | Developer: EA Games
Size: | 2.7 GB
Genre: Sports / Racing

This is a Play 4 Free racing game designed exclusively for the PC. The game will give Need for Speed fans the most licensed cars, parts and game modes ever in Need for Speeds history. Players will prove their racing supremacy through the sophisticated online matchmaking features and the more flamboyant gamers will get the chance to show off their skills through customizable rides and user profiles.

System requirements:
Core 2 Duo 1.8 GHz
1 GB RAM,
Graphic card 512 MB (GeForce 6800 or better
2 GB HDD
Windows XP/Vista/7

Install:
WARNING : RECOMMENDED FOR WINDOWS 7 ONLY (this might work with vista, but not tested), NOT RECOMMENDED FOR XP

1. unrar
2. 1st install nfssetup 1.8.2.11.exe to default folder (C:\Program Files\Electronic Arts\Need For Speed World)
3. then install Need For Speed World Installer.exe to default folder (C:\ProgramData\Electronic Arts\Need For Speed World)

WARNING : INSTALL THE GAME TO DEFAULT C:\ProgramData\Electronic Arts AS THE INSTALLER SAYS, IF U CHANGE THE DESTINATION FOLDER, IT WILL NOT WORK !!!

4. now start the gamelauncher with the desktop shortcut and update if available
5. play

Use acount premium to get direct link and max speed download

Download (FileSonic)
http://www.filesonic.com/file/149474141/NFS.W.DARK_SLASH.part01.rar
http://www.filesonic.com/file/149488041/NFS.W.DARK_SLASH.part02.rar
http://www.filesonic.com/file/149474671/NFS.W.DARK_SLASH.part03.rar
http://www.filesonic.com/file/149479721/NFS.W.DARK_SLASH.part04.rar
http://www.filesonic.com/file/149477091/NFS.W.DARK_SLASH.part05.rar
http://www.filesonic.com/file/149501191/NFS.W.DARK_SLASH.part06.rar
http://www.filesonic.com/file/149482751/NFS.W.DARK_SLASH.part07.rar
http://www.filesonic.com/file/149514671/NFS.W.DARK_SLASH.part08.rar

Download (FileServe)
http://www.fileserve.com/file/gU6GUce/NFS.W.DARK_SLASH.part01.rar
http://www.fileserve.com/file/A8qX4DY/NFS.W.DARK_SLASH.part02.rar
http://www.fileserve.com/file/3AN8RaX/NFS.W.DARK_SLASH.part03.rar
http://www.fileserve.com/file/dVztCgP/NFS.W.DARK_SLASH.part04.rar
http://www.fileserve.com/file/udkjMtC/NFS.W.DARK_SLASH.part05.rar
http://www.fileserve.com/file/4P9G2y2/NFS.W.DARK_SLASH.part06.rar
http://www.fileserve.com/file/C45EaRG/NFS.W.DARK_SLASH.part07.rar
http://www.fileserve.com/file/HKqUWC9/NFS.W.DARK_SLASH.part08.rar


Baca Selengkapnya ....

Street Fighter Alpha 3 (Portable)

Posted by Unknown Kamis, 03 Maret 2011 0 komentar
Street Fighter Alpha 3 (Portable)
PC game | Publisher: Capcom | English | 105 MB
Genre: 2D Fighting  

The most robust entry in the prequel entry of Capcom's fighting franchise, Street Fighter Alpha 3, includes an unprecedented 25 characters and offers players the choice of three "isms" fighting styles.

Game Features

* Big character roster
* A World Tour mode
* Three "ism"s for each character (Y-ism, A-ism and X-ism)
* 3 unlockable characters (Guile, Evil Ryu and Shin Akuma)

Screenshots
 

1.) Run "Street Fighter Alpha 3.exe"
2.) Type "OK" to continue

* Player 1 Keys

So if you're playing by yourself, all you need to worry about is pressing "5" to insert coins and then pressing "1" to start the game.

Fileserve.com
http://www.fileserve.com/file/czFPXyh/Street.Fighter.Alpha.3.rar

Filesonic.com
http://www.filesonic.com/file/119617781/Street.Fighter.Alpha.3.rar


Baca Selengkapnya ....

Grand Theft Auto: Shinobi World (2011)

Posted by Unknown 0 komentar
Grand Theft Auto: Shinobi World (2011/RUS/ENG/PCDVD/RePack)
Year: 2011 | Language: RUS, ENG | PC |
Developer: Rockstar Games & naruto-play | Publisher: naruto-play |
Genre: Action | File Size: 3GB Introducing a new version of the game GTA Shinobi World, where you can play with your favorite characters of anime.

Control in the game:
When clicking on the G appears cobblestone LMB we throw;
When you click on TAB + Q or TAB + E - change the skins (TOBI, Madara and Kakuzu);
When clicking on the N + and turns back to Toby, but in this mode can do:
Shadow clone - key J Image;
Substitution - the keys J +2;
To exit - key J + C;
When you click on O - Katon Goukakyuu No Jutsu;
When you click on F7 - lightning;
When you log into the water squeeze on Y - now walk on water, to exit press N;
When clicking on the K + T - call for a sword;
If you come right up to the passer or Kopu and press P, then we do HENGE NO Jutsu (Technique of Rebirth);
If you hold down the RMB and click on F, then we can fight at once 3 wrestling - boxing, kung fu, Teykvando;
When you click on NUM 5 + NUM X Sutemi do, but they die at the same time;
When pressing the SHIFT in the car is slowing;
And finally in the game you are in God, but to die, you can:
When you explode a car and Sutemi. Running the game on the net!:
After successful installation of the game go to the desktop and click on the shortcut the game on the network run box: at the top of a socket and click on the Tools button, then settings specify the path to be so MULTIPLAYER X: / Program Files / GTA Shinobi World / MULTIPLAYER / X-drive on which you installed the game are doing everything and voila game on the network works!

Operating System: m!cr0 Microsoftft ® Windows ® 2000 (SP3) / XP
Processor: Pentium April 2400 MHz +
Memory: 512 MB (1024 MB for Windows Vista)
Video: 64 MB & 128 MB
Sound card: compatible with DirectX ® 9.0 (No she did not start the game!)
Free hard drive space: 5.86 GB Features RePack's:
Installation time ~ 10-20 minutes, depending on the power of the PC
Cut introductory videos and radio
Exclusive installers on an "install and play"
In multiplayer access to all the characters
Sewn FIX tepre texture is not lost!

http://www.duckload.com/download/3376855/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part1.rar
http://www.duckload.com/download/3376857/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part2.rar
http://www.duckload.com/download/3376859/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part3.rar
http://www.duckload.com/download/3376862/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part4.rar
http://www.duckload.com/download/3376860/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part5.rar
http://www.duckload.com/download/3376865/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part6.rar
http://www.duckload.com/download/3376863/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part7.rar
http://www.duckload.com/download/3376864/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part8.rar

OR :
http://www.fileserve.com/file/DEYA2DC/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part1.rar
http://www.fileserve.com/file/5EbAvuX/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part2.rar
http://www.fileserve.com/file/55reemc/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part3.rar
http://www.fileserve.com/file/cMhn9gr/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part4.rar
http://www.fileserve.com/file/4spjDRv/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part5.rar
http://www.fileserve.com/file/aWXJ6Hf/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part6.rar
http://www.fileserve.com/file/sBCv83H/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part7.rar
http://www.fileserve.com/file/WnmgRnn/Grand-Theft-Auto-Shinobi-World.WorldLife.Dhi-Forumerz.com.part8.rar


Baca Selengkapnya ....

Roxio 3D Photo Creator 1.0

Posted by Unknown 0 komentar
 Roxio 3D Photo Creator 1.0 | 63.31 MB

Create stunning 3D images even from photos taken with a standard camera. Or transform your 2D photos into 3D works of art. Using Roxio’s 3D Photo Creator you can turn a single 2D photo into a 3D image or, for more dramatic results, combine two 2D photos taken of a single scene and turn them into one amazing looking 3D image. View your 3D creations on your PC and share them through email – all that is needed is a pair of red and blue 3D glasses.

Roxio 3D Photo Creator allows you to easily create 3D photos from multiple sources:
* Any 2D digital photo
* Digital photos of the left and right of a place or object
* 3D MPO files from a Fujifilm FinePix REAL 3D W1

http://www.fileserve.com/file/ZjjbP3D/Roxio.3D.Photo.Creator.v1.0.rar


Baca Selengkapnya ....

PhotoFlash 2.0.08

Posted by Unknown 0 komentar

AquaSoft PhotoFlash is a multimedia-browser for your PC that brings order into chaos. Multimedia files like images, sounds, MP3s and videos like to hide deep in the system. Sometimes they are hard to find in different folders. This software will prove to be a highly intuitive application, but it is also a very professional workaround.


http://www.fileserve.com/file/caJzqUu/photoflash.rar



Baca Selengkapnya ....

Paint .NET 3.5.7 (Portable)

Posted by Unknown 0 komentar
Paint .NET 3.5.7 (Portable)17.13 MB


Paint.NET is image and photo editing software for computers that run Windows. It features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools. An active and growing online community provides friendly help, tutorials, and plugins. It started development as an undergraduate college senior design project mentored by Microsoft, and is currently being maintained by some of the alumni that originally worked on it. Originally intended as a free replacement for the Microsoft Paint software that comes with Windows, it has grown into a powerful yet simple image and photo editor tool. It has been compared to other digital photo editing software packages such as Adobe Photoshop, Corel Paint Shop Pro, Microsoft Photo Editor, and The GIMP.

Paint.NET is image and photo editing software for computers that run Windows. It features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools. An active and growing online community provides friendly help, tutorials, and plugins. It started development as an undergraduate college senior design project mentored by Microsoft, and is currently being maintained by some of the alumni that originally worked on it. Originally intended as a free replacement for the Microsoft Paint software that comes with Windows, it has grown into a powerful yet simple image and photo editor tool. It has been compared to other digital photo editing software packages such as Adobe Photoshop, Corel Paint Shop Pro, Microsoft Photo Editor, and The GIMP.

Simple, intuitive, and innovative user interface
Every feature and user interface element was designed to be immediately intuitive and quickly learnable without assistance. In order to handle multipleimages easily, Paint.NET uses a tabbed document interface. The tabs display a live thumbnail of the image instead of a text description. This makes navigation very simple and fast.

Layers
Usually only found on expensive or complicated professional software, layers form the basis for a rich image composition experience. You may think of them as a stack of transparency slides that, when viewed together at the same time, form one image.

Active Online Community
Paint.NET has an online forum with a friendly, passionate, and ever-expanding community. Be sure to check out the constantly growing list of tutorials and plugins!

Frequently Updated
Updates usually come about every 4 to 6 weeks, and contain new features, performance improvements, and bug fixes. Upgrading to the latest version is very simple, requiring only two clicks of the mouse.

Special Effects
Many special effects are included for enhancing and perfecting your images. Everything from blurring, sharpening, red-eye removal, distortion, noise, and embossing are included. Also included is our unique 3D Rotate/Zoom effect that makes it very easy to add perspective and tilting.

Adjustments are also included which help you tweak an image's brightness, contrast, hue, saturation, curves, and levels. You can also convert an image to black and white, or sepia-toned.

Powerful Tools
Paint.NET includes simple tools for drawing shapes, including an easy-to-use curve tool for drawing splines or Bezier curves. The Gradient tool, new for 3.0, has been cited as an innovative improvement over similar tools provided by other software. The facilities for creating and working with selections is powerful, yet still simple enough to be picked up quickly. Other powerful tools include the Magic Wand for selecting regions of similar color, and the Clone Stamp for copying or erasing portions of an image. There is also a simple text editor, a tool for zooming, and a Recolor tool.

http://www.fileserve.com/file/EuDqj3G/Paint.NET.v3.5.7.Portable.rar



Baca Selengkapnya ....

Micro XP Pro New Edition 2011

Posted by Unknown 0 komentar
Micro XP Pro New Edition 2011 | 233 MB


Installation time: ...15 min
Speed:.......................As fast as it gets
Functionality:..........No errors, Fully functional
Iso Size:....................233 MB
HD Space: .............. 460 MB (after swap deletion)
Required Ram: ...... 64MB
Customizability:.....Features, Programs & Services
Security: ..................Improved (Tweaks + Updates)
Automatic: .............Setup & speed enhancements

This release is inspired by microXP but is otherwise it's own copy.
Pre-Activated, and updated February 2011.
No Korean/Japanese language; Chinese is included
Includes default XP drivers for Display/Ethernet/Sound/SCSI/RAID
It has all keyboard layout choices kept.

http://www.duckload.com/download/3376999/WinLite.WorldLife.Dhi-Forumerz.com.iso
OR :
http://www.fileserve.com/file/qcqJquG/WinLite.WorldLife.Dhi-Forumerz.com.iso


Baca Selengkapnya ....

Google Earth 6.0.1.2036

Posted by Unknown 0 komentar
INFO:
Google Earth combines the power of Google search with satellite photos, maps, landscapes and three-dimensional buildings, so you can get a geographical information about the world with just one click.

Options:
-Go to your home. Just enter your address, click "Search" and you find yourself in the correct location.
-Search for schools, parks, restaurants and hotels. Plan your driving directions.
-Tilt and rotate the view to see three-dimensional landscapes and buildings.
-Saving and sharing search results and selected elements.






Baca Selengkapnya ....

Image-Line FL Studio ASSiGN Edition v9.9.9.1-ASSiGN

Posted by Unknown 0 komentar
ASSiGN group released cracked version of newest FL Studio 9.9.9.1 BETA.

Description: FL Studio is the most complete virtual studio currently available. It will play any sample file (wav), generator (softsynth), VSTi & DXi) or midi instrument you feed it. You will be creating wav, mp3 or midi songs or loops only minutes after launching it. FL Studio 9 is a complete software music production environment, representing the culmination of more than 10 years of sustained & focused development. FL9 is the fastest way from your brain to your speakers. FL Studio is a full-featured, open architecture, music production environment capable of audio recording, composing, sequencing and mixing, for the creation of professional quality music. The FL Studio philosophy is creative freedom.

Notable changes include in v9.9.9.1:

* The Project Picker.
* Chainer, Instrument & Effect plugin chainer.
* ZgeViz visualization effect plugin.

iNSTALLATiON
1.Uninstall previous versions.
2.Install FL Studio.
3.Install our cracked update.
4.Enjoy!


http://www.fileserve.com/file/4qJF7Jp/9991fae.rar


Baca Selengkapnya ....

Microsoft Activation Pack 2011

Posted by Unknown 0 komentar
INFO:
Microsoft Activation Pack 2011 | 21 MB

Activation for Microsoft Products:
OS: Windows XP SP1, SP2, SP3/ Vista SP1,SP2/ Windows 7 (All Versions)
Suites: Office 2007 SP1, SP2 (All Versions), Office 2010



Baca Selengkapnya ....
Trik SEO Terbaru support Online Shop Baju Wanita - Original design by Bamz | Copyright of android jones.