Saturday 28 February 2015

Maximum request length exceeded Error


If you are using IIS for hosting your application, then the default upload file size if 4MB. So, you may get this error(Maximum request length exceeded) if you try to upload a file above this size. To increase it, please use this below section in your web.config -

<configuration>
    <system.web>
        <httpRuntime maxRequestLength="1048576" />
    </system.web>
</configuration>

For IIS7 and above, you also need to add the lines below:

 <system.webServer>
   <security>
      <requestFiltering>
         <requestLimits maxAllowedContentLength="1073741824" />
      </requestFiltering>
   </security>
 </system.webServer>


Note: maxAllowedContentLength is measured in bytes while maxRequestLength is measured in kilobytes, which is why the values differ in this config example. (Both are equivalent to 1 GB.)


Friday 27 February 2015

Css Notification Boxes

Today we are going to look at the design of CSS Notification Boxes. Notification or Alert Boxes are a great way to inform the user of a variety of messages, such as: error messages, success messages, warning messages and general notification. A great example for using these notification boxes would be for user registrations for a website, if for example the user made an error during registration, you could use an alert box to inform the user of the particular error. If however everything was correct, you could alert the user that registration has succeeded and that they can now login.
In this tutorial, we are going to look at how to create a range of the most popular notification boxes, today we are going to focus on the following:
1. Error Box
2. Success Box
3. Warning Box
4. Notice Box
CSS Notification Boxes

Step 1:

First we will create the basic layout for each box.

.alert-box {
    color:#555;
    border-radius:10px;
    font-family:Tahoma,Geneva,Arial,sans-serif;font-size:11px;
    padding:10px 10px 10px 36px;
    margin:10px;
}

Lets take a look at each line:
color:#555; – This is used for the text color.
border-radius:10px; – We will give the borders a radius of 10px.
font-family:… – Is the name of the font that we will be using.
padding:10px 10px 10px 36px; – Padding inside the box, 10px for Top, Right and Bottom, 36px for Left.
margin:10px; – The margin around the box will be 10px.

Step 2:

In each box there will be a span property notifying the user of the alert.

.alert-box span {
    font-weight:bold;
    text-transform:uppercase;
}

Lets take a look at each line:
font-weight:bold; – All the text inside the span property will be bold.
text-transform:uppercase; – This will transform the text to uppercase.

Step 3:

Now lets add some color and icons to each box.

.error {
    background:#ffecec url('images/error.png') no-repeat 10px 50%;
    border:1px solid #f5aca6;
}
.success {
    background:#e9ffd9 url('images/success.png') no-repeat 10px 50%;
    border:1px solid #a6ca8a;
}
.warning {
    background:#fff8c4 url('images/warning.png') no-repeat 10px 50%;
    border:1px solid #f2c779;
}
.notice {
    background:#e3f7fc url('images/notice.png') no-repeat 10px 50%;
    border:1px solid #8ed9f6;
}

Lets take a look at each line:
background:… – Specifies the background color and the icon used for the alert
border:… – Specifies the border width, style and color.

Step 4:

Lastly we need some HTML code to display the alert boxes.


<div class="alert-box error"><span>error: </span>Write your error message here.</div>
<div class="alert-box success"><span>success: </span>Write your success message here.</div>
<div class="alert-box warning"><span>warning: </span>Write your warning message here.</div>
<div class="alert-box notice"><span>notice: </span>Write your notice message here.</div>

Wednesday 25 February 2015

Types of Cloud


Based on deployment model

The deployment model tells you where the cloud is located and for what purpose. On the basis of deployment model following are the types of cloud:
  • Public 
  • Private
  • Community 
  • Hybrid

Based on Service Model

Service model describe the type of service that the service provider is offering. The best-known service models are:
  • Software as a Service
  • Platform as a Service
  • Infrastructure as a Service
This is also known as SPI model


What is cloud computing?


Cloud Computing refers to applications and services that run on distributed network using visualized resources and accessed by common Internet protocols and networking standards. In cloud computing, resources are virtual and limitless and details of the physical systems on which software runs are abstracted(hidden) from the user.


Sunday 15 February 2015

Program that self replicates!

for (int i = 1; i <= 5; i++)
{
    string path= Application.ExecutablePath;
    exec = path.Insert(path.IndexOf("."), i.ToString());
    File.Copy(Application.ExecutablePath, path);
    Process.Start(path);
}

Write this code in Form_Load event , and it will replicate itself infinely.....

Saturday 14 February 2015

General Knowledge Questions- Set 20


153. A microprogram written as string of 0's and 1's is a
symbolic microinstruction
binary microinstruction
symbolic microprogram
binary microprogram
154. Which command lists the contents of current directory of a disk
Copy
Tree
Cd
Dir
155. Which of the following file organization is most effieient for a file with a high degree of file activity?
sequential
ISAM
VSAM
B-Tree
156. A communications device that combines transmissions from several I/O devices into one line is a
concentrator
modifier
multiplexer
full-duplex line
157. Which command displays all the files having the same name but different extensions?
Dir filename.*
Dir filename.ext
Dir *.sys
Dir *.ext
158. Most data communications involving telegraph lines use:
simplex lines
wideband channel
narrowband channel
dialed service
159. Which of the following is not a transmission medium?
telephone lines
coaxial cables
modem
microwave systems

General Knowledge Questions- Set 19


145. RESTORE command is used to

Restore files from disks made using the BACKUP command
Restore files which are deleted
Restore files from recycle bin
Restore files which are deleted recently

146. How many OSI layers are covered in the X.25 standard?

Two
Three
Seven
Six

147. What is the minimum number of wires needed to send data over a serial communication link layer?

1
2
4
6

148. Sequential file organization is most appropriate for which of following applications?

Grocery store checkout
bank checking account
payroll
airline reservations

149. Which command creates a directory or subdirectory?

Dir
Mkdir
Md
Both b and c

150. The maximum length in DOS commands is

80 chars
127 chars
100 chars
8 chars

151. Where does a computer add and compare data?

Hard disk
Floppy disk
CPU chip
Memory chip

152. Layer one of the OSI model is

physical layer
link layer
transport layer
network layer

General Knowledge Questions- Set 18


137. Which of the following extensions suggest that the file is a backup copy

Bak
Bas
Com
Txt

138. How much power (roughly) a light emitting diode can couple into an optical fiber?

100 microwatts
440 microwatts
100 picowatts
10 miliwatts

139. The two basic types of record access methods are

sequential and randon
direct and immediate
sequential and indexed
on-line and real-time

140. Which command is used to change the file name?

Ren
Rename
Both of above
None of above

141. Which of the following might be used by a company to satisfy its growing communications needs?

front end processor
multiplexer
controller
all of the above

142. Which of the following signal is not standard RS-232-C signal?

VDR
RTS
CTS
DSR

143. Which command is used to backup in DOS 6+ Version

BACKUP
MSBACKUP
MSBACKEDUP
All of the above

144. Memory access in RISC architecture is limited to instructions

CALL and RET
PUSH and POP
STA and LDA
MOV and JMP

General Knowledge Questions- Set 17


129. In Ms-Dos what command you will use to display system date?

Date command
Ver command
Disk command
Format command

130. Generally, the DATE is entered in the form

DD-YY-MM
YY-DD-MM
MM-YY-DD
MM-DD-YY

131. Format command is used to

Prepare a blank disk
Create a new blank disk from a used one
Both of above
None of above

132. In which version of DOS. CHKDSK command has been changed to SCANDISK?

5.0
6.2
6.0
6.2

133. What is meant by a dedicated computer?

which is used by one person only
which is assigned to one and only one task
which does one kind of software
which is meant for application software only

134. Which of the following statement is incorrect?

The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission.
Half duplex line is a communication line in which data can move in two directions, but not at the same time.
Teleprocessing combines telecommunications and DP techniques in online activities
Batch processing is the prefered processing mode for telecommunication operation.

135. A remote batch-processing operation in which data is solely input to a central computer would require

telegraphp line
simplex lines
mixed bad channel
all of above

136. Which command displays only file and directory names without size, date and time information?

Dir/w
Dir a:
Dir /b
Dir /s

General Knowledge Questions- Set 16


121. Which of hte following is not characteristic of COBOL

it is a very standardized language
it is a very efficient in terms of coding and execution
it has limited facilities for mathematical notation
it is very readable language

122. In a synchronous modem, the digital-to-analog converter transmits signal to the

equilizer
modulator
demodulator
terminal

123. Communiction circuits that transmit data in both directions but not at the same time are operating in

a simplex mode
a half duplex mode
a full duplex mode
an asynchronous mode

124. Which command be used to ask you to confirm that you want to delete the directory?

Deltree
Deltree/f
Del *.*/p
Erase *.*

125. CPU does not perform the operation

data transfer
logic operation
arithmetic operation
all of above

126. Which of the following does not allow multiple uses or devices to share one communication line?

doubleplexer
multiplexer
concentrator
controller

127. Operating System is like a

Parliament
Secretary
Government
None of the above

128. An entire path name, consisting of several sub-directory names can contain upto

13 character
36 character
63 character
53 character

General Knowledge Questions- Set 15


113. Which of the following is not true of FORTRAN?
it was developed for scientific and mathematical applications
it is one of the oldest high-level languages
it is a problem oriented language
it requires extensive internal documentation
114. A protocol is a set of rules governing a time sequence of events that must take place
etween peers
etween an interface
etween modems
cross an interface
115. Which data communication method is used to transmit the data over a serial communication link?
simplex
half-duplex
full-duplex
b and c
116. If you don’t know the current time, which command will you use to display
Copy
Ver
Time
Format
117. Interrupts which are initiated by an instruction are
internal
external
hardware
software
118. The command used to copy a file named temp.doc from drive C: to drive A: is
Copy temp.doc to a:
Copy c:\temp.doc a:
Copy c: a:
Copy temp a: c:
119. In OSI network architecture, the routing is performed by
network layer
data link layer
transport layer
session layer
120. Which command displays current directory name or change from one to another?
Chdir
Cd
Mkdir
Both a and b

General Knowledge Questions- Set 14


105. The time command is used to display _____ time.
US time
Greenwich Mean Time
Julian Time
System Time
106. Which command is used to get the current date only?
Date
Time
Second
All of the above
107. The ascending order or a data Hierarchy is
bit - bytes - fields - record - file - database
bit - bytes - record - field - file - database
bytes - bit- field - record - file - database
bytes -bit - record - field - file - database
108. Which of the following is required to communicate between two computers?
communications software
protocol
communication hardware
all of above including access to transmission medium
109. While working with MS-DOS which key is used to get the p[revious command used:
F3
F1
F6
F9
110. Which command is used to clear the screen
Cls
Clear
Clscreen
All of above
111. A stack is
an 8-bit register in the microprocessor
a 16-bit register in the microprocessor
a set of memory locations in R/WM reserved for storing information temporarily during the execution of computer
a 16-bit memory address stored in the program counter
112. Which of the following communication modes support two-way traffic but in only one direction at a time?
simplex
half duplex
three-quarters duplex
all of the above

General Knowledge Questions- Set 13


97. internal command in Dos are
Cls, rd label
Dir, ren, sys
Time, type, dir
Del, disk copy, label
98. A factor in the selection of a source language is
programmer skill
language availability
program compatibility with other software
all of athe above
99. FAT stands for
File Accomodation Table
File Access Tape
File Allocation Table
File Activity Table
100. Which of the following generations of language will likely include the languages of the featuer?
first generation
second dgeneration or third generation
fourth generation
fifth generation

101. In a COBOL program, the input output section is within the .... division

identification
procedure
configuration
environment
102. Full form of MS-DOS is
Micro System Disk Operating System
Micro Simple Disk Operating System
Micro Soft Disk Operating System
Micro Sort Disk Operating System
103. Interrupts which are initiated by an I/O drive are
internal
external
software
all of above
104. Which command is used to delete the directory that is empty?
Del *.*
RD
Erase
MD

General Knowledge Questions- Set 12


89. The most common addressing techiniques employed by a CPU is

immediate
direct
indirect
all of the above

90. The following command set is correct according to their function

RD can MD
DEL and ERASE
CD and RD
COPY and RENAME

91. A computer generated output that lets programmer follow the execution of their programs line by line is a

core dump
trace routine
detail listing
source listing

92. When the RET instruction at the end of subroutine is executed,

the information where the stack is iniatialized is transferred to the stack pointer
the memory address of the RET instruction is transferred to the program counter
two data bytes stored in the top two locations of the stack are transferred to the program counter
two data bytes stored in the top two locations of the stack are transferred to the stack pointer

93. When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the

stack pointer
accumulator
program counter
stack

94. A time sharing system imply

more than one processor in the system
more than one program in memory
more than one memory in the system
None of above

95. The x.25 standard specifies a

technique for start-stop data
technique for dial access
DTE/DCE interface
data bit rate

96. How many address lines are needed to address each memory locations in a 2048 x 4 memory chip?

10
11
8
12

General Knowledge Questions- Set 11


81. Which command is used to copy files?

Copy
Diskcopy
Type
All of the above

82. Copy and Xcopy are same in the sense

Both are internal command of DOS
Both are external commands of DOS
Both can be used to copy file or group of files
Both a and b

83. A band is always equivalent to

a byte
a bit
100 bits
none of above

84. The receive equilizer reduces delay distortions using a

apped delay lines
earshift
escrambler
ifference engine

85. An example of an analog communication method is

laser beam
microwave
voice grade telephone line
all of the above

86. Which keys can be pressed quit without saving in DOS

Ctrl + A
Ctrl + B
Ctrl + C
Ctrl + D

87. All of the following are disadvantage of RPG except:

it is a very machine dependent language
it is very limited in scope
is not suited for complex problems requiring extensive programming logic
it has larger storage requierments

88. A stack pointer is

a 16-bit register in the microprocessor that indicate the beginning of the stack memory.
a register that decodes and executes 16-bit arithmetic expression.
The first memory location where a subroutine address is stored.
a register in which flag bits are stored

General Knowledge Questions- Set 10


73. Which file is the batch file that is read while booting a computer?
Autoexec.bat
Auto-batch
Autoexecutive.bat
Auto.bat
74. Which of the following is an example of problem oriented language?
BASIC
PL/1
FORTRAN
All of above
75. Which statement is correct?
Directories can be kept inside a file
Files can not be kept inside a directory
1 millisec = 10 ^ 3 sec
None of above
76. An example of a medium speed, switched communications service is
series 1000
data phone 50
DDD
All of the above
77. Which command will be used to display a file within the specified directory of pathname?
Dir \pathname
Dir \pathname\pathname
Dir/ch
Dir \pathname\filename
78. A microporgram is sequencer perform the operation
read
write
execute
read and execute
79. In MS-Dos 6.22, which part identifies the product uniquely
MS
DOS
Ms-DOS
6.22
80. SYS command is used to
Copy DOS system files to new disk
Copy DOS configuration files to a new disk
Update the DOS system files
None of above

General Knowledge Questions- Set 9


65. DIR command is used to

Display a list of files in a directory
Display contents of files in directory
Display type of files in a sub directory
All of above

66. A computer program that converts an entire program into machine language at one time is called a/an

interpreter
simulator
compiler
commander

67. Which command displays comma for thousand separating on file size while listing?

Dir/w
Dir/s
Dir/b
Dir/c

68. Only filenames and extensions are to be displayed in wide format, which command you’ll use?

Dir/w
Dir a:
Dir/s
Dir/b

69. Which of the following transmission systems provide the highest data rate to in individual device?

omputer bus
elephone lines
oice and mode
ease lines

70. While transmitting odd-parity coded symbols, the number of zeros in each symbol is

odd
even
a and b both
unknown

71. While working with MS-DOS, which command is used to copying the files to transfer from one PC to another one?

Rename
Path
Dir
Copy

72. In the evaluation of a computer language, all of the following characteristics should be considered except?

application oriented features
efficiency
readability
hardware maintainance costs

General Knowledge Questions- Set 8


57. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?

Memory Address Register
Memory Data Register
Instruction Register
Program Register

58. Data communications monitors available on the software marked include

ENVIRON/1
TOTAL
BPL
Telnet

59. Which of the following statement is correct?

terminal section of a synchronous modem contains the scrambler
receiver section of a synchronous modem contains the scrambler
transmission section of a synchronous modem contains the scrambler
control section of a synchronous modem contains the scrambler

60. The loss in signal power as light travels down the fiber is called

attenuation
progragation
scattering
interruption

61. In immediate addressing the operand is placed

in the CPU register
after OP code in the instruction
in memory
in stack

62. Microprocessor 8085 can address location upto

32K
128K
64K
1M

63. The transmission signal coding method of TI carrier is called

Bipolar
NRZ
Manchester
Binary

64. DEL command is used to

Delete files
Delete directory
Delete labels
Delete contents of file

General Knowledge Questions- Set 7


49. Which of the following communications lines is best suited to interactive processing applications?

narrow band channel
simplex lines
full duplex lines
mixed band channels

50. In a synchronous modem, the receive equilizer is known as

daptive equilizer
mpariment equilizer
tatistical equilizer
ompromise equilizer

51. Maximum length of DOS command using any optional parameter is

26 characters
87 characters
127 characters
None of above

52. xcopy command can copy

individual files or group of files
directories including subdirectories
to diskette of a different capacity
all of above

53. What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?

4
2
6
3

54. CHKDSK can be used to find

Disk’s bad portion
Occupied space
Free space
All of above

55. One disadvantage of a direct access file is:

the delay in computiong the storage address
duplication of address locations
unsued, but available, storage locations
all of above

56. What is the main difference between DDCMP and SDLC?

DCMP does not need special hardware to final the beginning of a message
DCMP has a message header
DLC has a IP address
DLC does not use CRC