Transmission Mode :

When two computers are in communication,data transmission may occur in one of the three modes

🔸️one way only
a) Simplex mode

🔸️Both ways but one way at a time
b) Half- duplex mode

🔸️Both ways simultaneously
c) Full-duplex mode

🌟Simplex mode🌟:

In Simplex mode,data can be transmitted in one direction as shown in below.
The device using the Simplex mode of transmission can either send or receive data, but it cannot do both. An example is the traditional television broadcast, in which the signal sent from the transmitter to the TV. There is no return signal. In order words a TV cannot send a signal to the transmitter.

🌟Half duplex mode🌟:

In Hslf duplex mode data csn be transmitted back and forth between two stations. But at any point of the time data can go in any one direction only. This arrangement resembles traffic on a one-lane bridge. When traffic moves in one direction, traffic on the opposite direction is to wait and take their turn. The common example is walky-talky, wherein one waits for his turn while the other talks.

🌟Full duplex mode🌟:

In full duplex mode a device can simultaneously send or received data. This arrangement resembles traffic on a two-way bridge, traffic moving on both directions simultaneously. An example is two people on the telephone talking and listening simultaneously. Communication in full duplex mode is faster. Full duplex transmission is used in large computer systems. Products like “MicrosoftNet Meeting” supports such two way interaction.

What is Intruders ?

One of the two most publicized threats to security is the intruder (the other is viruses), often referred to as a hacker or cracker. Significant issue for networked systems is unwanted access either via network or local.

Classification of Intruders

  1. Masquerader : An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account. The masquerader is likely to be an outsider.
  2. Misfeasor : A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges :the misfeasor generally is an insider.
  3. Clandestine user : An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection. User can be either an outsider or an insider.

Intruders : Intrusion Techniques

The objective of the intruder is to gain access to a system or to increase the range of privileges accessible on a system. Most initial attacks use system or software vulnerabilities that allow a user to execute code that opens a back door into the system. Typically, a system must maintain a file that associates a password with each authorized user. If such a file is stored with no protection, then it is an easy matter to gain access to it and learn passwords. The password file can be protected in one of two ways:

  1. One-way function : The system stores only the value of a function based on the user’s password. When the user presents a password, the system transforms that password and compares it with the stored value.
  2. Access control : Access to the password file is limited to one or a very few accounts.

On the basis of a survey of the literature and interviews with a number of password crackers, [ALVA90] reports the following techniques for learning passwords:

  1. Try default passwords used with standard accounts that are shipped with the system. Many administrators do not bother to change these defaults.
  2. Exhaustively try all short passwords (those of one to three characters).
  3. Try words in the system’s online dictionary or a list of likely passwords. Examples of the latter are readily available on hacker bulletin boards.
  4. Collect information about users, such as their full names, the names of their spouse and children, pictures in their office, and books in their office that are related to hobbies.
  5. Try users’ phone numbers, Social Security numbers, and room numbers.
  6. Try all legitimate license plate numbers for this state.
  7. Use a Trojan horse to bypass restrictions on access.

Intrusion Detection

Inevitably will have security failures, So need also to detect intrusions so can
 Block if detected quickly
 Act as deterrent
 Collect info to improve security
Assume intruder will behave differently to a legitimate user, But will have imperfect distinction between.

INTERNATIONAL SPACE STATION

ISS is a large spacecraft which can house astronauts. It goes around in low Earth orbit at approximately 400 km distance. It is also a science laboratory. Its very first part was placed in orbit in 1998 and its core construction was completed by 2011. It is the largest man-made object in space which can also be seen from the Earth through the naked eye. The first human crew went to the ISS in 2000. Ever since that, it has never been unoccupied by humans. At any given instant, at least six humans will be present in the ISS. According to the current plan, ISS will be operated until 2024, with a possible extension until 2028. After that, it could be deorbited, or recycled for future space stations.

Benefits of ISS

According to NASA, the following are some of the ways in which the ISS is already benefitting us or will benefit us in the future.

Supporting water-purification efforts

Using the technology developed for the ISS, areas having water scarcity can gain access to advanced water filtration and purification systems. The water recovery system (WRS) and the oxygen generation system (OGS) developed for the ISS have already saved a village in Iraq fry being deserted due to lack of clean water.

Eye tracking technology

The Eye Tracking Device, built for a microgravity experiment, has proved ideal to be used in many laser surgeries. Also, eye tracking technology is helping disabled people with limited movement and speech. For example, a kid who has severe disability in body movements can use his eye-movements alone and do routine tasks and lead an independent life.

Robotic arms and surgeries

Robotic arms developed for research in the ISS are providing significant help to the surgeons in removing inoperable tumours (e.g. brain tumours) and taking biopsies with great accuracies. Its inventors say that the robot could take biopsies with remarkable precision and consistency.

Apart from the above-mentioned applications, there are many other ways in which the researches that take place in the ISS are helpful. They are: development of improved vaccines, breast cancer detection and treatment, ultrasound machines for remote regions etc,.

ISS and International Cooperation

As great as the ISS’ scientific achievements are, no less in accomplishment is the international co-operation which resulted in the construction of the ISS. An international collaboration of five different space agencies of 16 countries provides, maintains and operates the ISS. They are: NASA (USA), Roskosmos (Russia), ESA (Europe), JAXA (Japan) and CSA (Canada). Belgium, Brazil, Denmark, France, Germany, Italy, Holland, Norway, Spain, Sweden, Switzerland and the UK are also part of the consortium.

INTERNATIONAL SPACE STATION

ISS is a large spacecraft which can house astronauts. It goes around in low Earth orbit at approximately 400 km distance. It is also a science laboratory. Its very first part was placed in orbit in 1998 and its core construction was completed by 2011. It is the largest man-made object in space which can also be seen from the Earth through the naked eye. The first human crew went to the ISS in 2000. Ever since that, it has never been unoccupied by humans. At any given instant, at least six humans will be present in the ISS. According to the current plan, ISS will be operated until 2024, with a possible extension until 2028. After that, it could be deorbited, or recycled for future space stations.

Benefits of ISS

According to NASA, the following are some of the ways in which the ISS is already benefitting us or will benefit us in the future.

Supporting water-purification efforts

Using the technology developed for the ISS, areas having water scarcity can gain access to advanced water filtration and purification systems. The water recovery system (WRS) and the oxygen generation system (OGS) developed for the ISS have already saved a village in Iraq fry being deserted due to lack of clean water.

Eye tracking technology

The Eye Tracking Device, built for a microgravity experiment, has proved ideal to be used in many laser surgeries. Also, eye tracking technology is helping disabled people with limited movement and speech. For example, a kid who has severe disability in body movements can use his eye-movements alone and do routine tasks and lead an independent life.

Robotic arms and surgeries

Robotic arms developed for research in the ISS are providing significant help to the surgeons in removing inoperable tumours (e.g. brain tumours) and taking biopsies with great accuracies. Its inventors say that the robot could take biopsies with remarkable precision and consistency.

Apart from the above-mentioned applications, there are many other ways in which the researches that take place in the ISS are helpful. They are: development of improved vaccines, breast cancer detection and treatment, ultrasound machines for remote regions etc,.

ISS and International Cooperation

As great as the ISS’ scientific achievements are, no less in accomplishment is the international co-operation which resulted in the construction of the ISS. An international collaboration of five different space agencies of 16 countries provides, maintains and operates the ISS. They are: NASA (USA), Roskosmos (Russia), ESA (Europe), JAXA (Japan) and CSA (Canada). Belgium, Brazil, Denmark, France, Germany, Italy, Holland, Norway, Spain, Sweden, Switzerland and the UK are also part of the consortium.

Hard Working

The hard working and the passionate people, always chase their dream and live it. Ilavazhagi is one among the many to achieve her dreams amidst all odds. Mr. A. Irudayaraj, her father, was a district level champion in carrom. His dream shattered, since his family did not encourage and support him. He was determined to achieve his dream through his daughter. He used to put his daughter on the carrom board, while she listened to the sounds of striker and coins. When she was two years old, he would carry her with him to the tournaments ; he played with his friends at local clubs. Her father began coaching her when she was around five. One day her father called her for a match, and she won that match, which gave her confidence. The confidence led her to win. Her victories included the Asia Cup and ( South Asian Association for Regional Cooperation) cup and the world championship.

Irudayaraj, a fish- cart driver who transports materials like pipes to make a living for his family – a wife and three daughters. They lived in a small one – room apartment in Vyasarpadi, Chennai, is not enough to accommodate the family. The trophies, she has won over the years are too many, and her home is just not big enough to keep them. The trophies left over after filling the space under the bed, were given to the neighbours and relatives. Financing the trips has always been a big trouble, though she has been playing for the state for almost 14 years. Still she says “Victories follow me”. Ilavazhagi is a member of the Thiruvallur District Carrom Association and also represented India at the Carrom World Championship, Asian Championships.

Hard Working

The hard working and the passionate people, always chase their dream and live it. Ilavazhagi is one among the many to achieve her dreams amidst all odds. Mr. A. Irudayaraj, her father, was a district level champion in carrom. His dream shattered, since his family did not encourage and support him. He was determined to achieve his dream through his daughter. He used to put his daughter on the carrom board, while she listened to the sounds of striker and coins. When she was two years old, he would carry her with him to the tournaments ; he played with his friends at local clubs. Her father began coaching her when she was around five. One day her father called her for a match, and she won that match, which gave her confidence. The confidence led her to win. Her victories included the Asia Cup and ( South Asian Association for Regional Cooperation) cup and the world championship.

Irudayaraj, a fish- cart driver who transports materials like pipes to make a living for his family – a wife and three daughters. They lived in a small one – room apartment in Vyasarpadi, Chennai, is not enough to accommodate the family. The trophies, she has won over the years are too many, and her home is just not big enough to keep them. The trophies left over after filling the space under the bed, were given to the neighbours and relatives. Financing the trips has always been a big trouble, though she has been playing for the state for almost 14 years. Still she says “Victories follow me”. Ilavazhagi is a member of the Thiruvallur District Carrom Association and also represented India at the Carrom World Championship, Asian Championships.

LGBT COMMUNITY

BY: VAIBHAVI MENON

LGBT or GLBT is an initialism that stands for lesbian, gay, bisexual, and transgender. In use since the 1990s, the term is an adaptation of the initialism LGB, which began to replace the term gay in reference to the broader LGBT community beginning in the mid-to-late 1980s. The first widely used term, homosexual, now carries negative connotations in the United States. It was replaced by homophile in the 1950s and 1960s, and subsequently gay in the 1970s; the latter term was adopted first by the homosexual community. As lesbians forged more public identities, the phrase “gay and lesbian” became more common. A dispute as to whether the primary focus of their political aims should be feminism or gay rights led to the dissolution of some lesbian organizations, including the Daughters of Bilitis, which disbanded in 1970 following disputes over which goal should take precedence.

As equality was a priority for lesbian feminists, disparity of roles between men and women or butch and femme were viewed as patriarchal. Lesbian feminists eschewed gender role play that had been pervasive in bars as well as the perceived chauvinism of gay men; many lesbian feminists refused to work with gay men, or take up their causes. Lesbians who held the essentialist view, that they had been born homosexual and used the descriptor “lesbian” to define sexual attraction, often considered the separatist opinions of lesbian-feminists to be detrimental to the cause of gay rights. Bisexual and transgender people also sought recognition as legitimate categories within the larger minority community. After the elation of change following group action in the 1969 Stonewall riots in New York City, in the late 1970s and the early 1980s, some gays and lesbians became less accepting of bisexual or transgender people. Critics said that transgender people were acting out stereotypes and bisexuals were simply gay men or lesbian women who were afraid to come out and be honest about their identity. Each community has struggled to develop its own identity including whether, and how, to align with other gender and sexuality-based communities, at times excluding other subgroups; these conflicts continue to this day. LGBTQ activists and artists have created posters to raise consciousness about the issue since the movement began.

From about 1988, activists began to use the initialism LGBT in the United States. Not until the 1990s within the movement did gay, lesbian, bisexual, and transgender people gain equal respect. This spurred some organizations to adopt new names, as the GLBT Historical Society did in 1999. Although the LGBT community has seen much controversy regarding universal acceptance of different member groups (bisexual and transgender individuals, in particular, have sometimes been marginalized by the larger LGBT community), the term LGBT has been a positive symbol of inclusion. Despite the fact that LGBT does not nominally encompass all individuals in smaller communities (see Variants below), the term is generally accepted to include those not specifically identified in the four-letter initialism. Overall, the use of the term LGBT has, over time, largely aided in bringing otherwise marginalized individuals into the general community. Transgender actress Candis Cayne in 2009 described the LGBT community as “the last great minority”, noting that “We can still be harassed openly” and be “called out on television”.

WHAT REALLY ARE VACCINES?

BY: VAIBHAVI MENON

A vaccine is a biological preparation that provides active acquired immunity to a particular infectious disease. A vaccine typically contains an agent that resembles a disease-causing microorganism and is often made from weakened or killed forms of the microbe, its toxins, or one of its surface proteins. The agent stimulates the body’s immune system to recognize the agent as a threat, destroy it, and to further recognize and destroy any of the microorganisms associated with that agent that it may encounter in the future. Vaccines can be prophylactic (to prevent or ameliorate the effects of a future infection by a natural or “wild” pathogen), or therapeutic (to fight a disease that has already occurred, such as cancer).

The administration of vaccines is called vaccination. Vaccination is the most effective method of preventing infectious diseases; widespread immunity due to vaccination is largely responsible for the worldwide eradication of smallpox and the restriction of diseases such as polio, measles, and tetanus from much of the world. The effectiveness of vaccination has been widely studied and verified; for example, vaccines that have proven effective include the influenza vaccine, the HPV vaccine, and the chicken pox vaccine. The World Health Organization (WHO) reports that licensed vaccines are currently available for twenty-five different preventable infections. The terms vaccine and vaccination are derived from Variolae vaccinae (smallpox of the cow), the term devised by Edward Jenner (who both developed the concept of vaccines and created the first vaccine) to denote cowpox. He used the phrase in 1798 for the long title of his Inquiry into the Variolae vaccinae Known as the Cow Pox, in which he described the protective effect of cowpox against smallpox. In 1881, to honor Jenner, Louis Pasteur proposed that the terms should be extended to cover the new protective inoculations then being developed. The science of vaccine development and production is termed vaccinology. There is overwhelming scientific consensus that vaccines are a very safe and effective way to fight and eradicate infectious diseases. The immune system recognizes vaccine agents as foreign, destroys them, and “remembers” them. When the virulent version of an agent is encountered, the body recognizes the protein coat on the virus, and thus is prepared to respond, by first neutralizing the target agent before it can enter cells, and secondly by recognizing and destroying infected cells before that agent can multiply to vast numbers. Limitations to their effectiveness, nevertheless, exist. Sometimes, protection fails because of vaccine-related failure such as failures in vaccine attenuation, vaccination regimes or administration or host-related failure due to host’s immune system simply does not respond adequately or at all. Lack of response commonly results from genetics, immune status, age, health or nutritional status. It also might fail for genetic reasons if the host’s immune system includes no strains of B cells that can generate antibodies suited to reacting effectively and binding to the antigens associated with the pathogen.

Even if the host does develop antibodies, protection might not be adequate; immunity might develop too slowly to be effective in time, the antibodies might not disable the pathogen completely, or there might be multiple strains of the pathogen, not all of which are equally susceptible to the immune reaction. However, even a partial, late, or weak immunity, such as a one resulting from cross-immunity to a strain other than the target strain, may mitigate an infection, resulting in a lower mortality rate, lower morbidity, and faster recovery. Adjuvants commonly are used to boost immune response, particularly for older people whose immune response to a simple vaccine may have weakened.

Management of hazardous and non-hazardous wastes

Management of hazardous wastes

Hazardous wastes may remain dangerous for thousands of years.Tye hazardous waste include radioactive refuse, metallic compounds, organic solvents, acid asbestos, organic cyanide’s, hospital wastes, disposable medical equipments and tools.

The hazardous methods are adopted for the disposal of hazardous wastes.

⭐Landfills:There are permanent storage facilities for military related liquid and radioactive waste materials in secured lands.High level radio active wastes are stored in deep underground storage.

⭐Deep well injection:It involves drilling a well into dry,porous material below ground water.Hazardous waste liquids are pumped into the well.They are soaked into the porous material and made to remain isolated indefinitely.However fractures in the impermeable layer may permit the injected wastes to escape and contaminate ground water.

⭐ Surface impoundments:This method is used to dispose large amounts of water carrying relatively small amounts of chemical wastes.Surface impoundments are simple excavated depressions(ponds)into which liquid wastes are drained.Solid wastes settle and accumulate which water evaporates.If the pond bottom is well sealed and if evaporation equals input,wastes may be stored in the impoundment indefinitely.

⭐Incineration:The hazardous biomedical wastes are usually disposed off by means of Incineration.Human anatomical wastes,discarded medicines,toxic drugs,blood,pus, animal wastes,microbiological and biotechnological wastes etc are called Bio medical wastes.

⭐ Bioremediation:This is another rapidly developing clean up technology.Cleaning environment with biological options such as microbes and plants is called Bioremediation.Some naturally occurring bacteria and other microorganisms have the capability to degrade or absorb or detoxify the wastes such as heavy metals.

Management of non hazardous wastes

⭐ Sanitary land fills:The refuse is spread in a hollow land or in a trench and compacted with a layer of clear sand fill.The sanitary land fills are far more desirable than open dumps but the ground water contaminated is always a potential problem.Once a land fill operation has been completed the site must be inspected periodically.This land fill is suitable for recreational activities such as parks and play ground.

⭐Incineration:Municipal incinerators burn combustible solid waste and melt certain non combustible materials.Since the high temperature destroys pathogens and their vectors,it is a good method of disposal from health point of view.

⭐Reuse and recycling techniques: Resource recovery is a broad term that is used for the retrieval of valuable materials or energy from a waste.The separating out of materials such as rubber,glass,paper and scrap metal from refuse and reprocessing them for reuse is named as reclamation of waste or recycling.

Paper(54% recovery) can be repulped and reprocessed into recycled paper, cardboard,and other paper products.

Glass(20% recovery)can be crushed, remelted and made into new containers or crushes used as a substitute for gravel or sand in construction materials such as concrete and asphalt.

Some forms of plastics(2.2% recovery) can be remelted and fabricated into carpet fibre,fill for insulated apparel, irrigation drainage,tiles and sheet plastics.

Metals can be melted and fabricated (39% recovery).

Food wastes and yard wastes(leaves,grass etc.) can be composted to produce humus soil conditioner.

Textiles can be shredded and used to strengthen recycled paper products.

Management of hazardous and non-hazardous wastes

Management of hazardous wastes

Hazardous wastes may remain dangerous for thousands of years.Tye hazardous waste include radioactive refuse, metallic compounds, organic solvents, acid asbestos, organic cyanide’s, hospital wastes, disposable medical equipments and tools.

The hazardous methods are adopted for the disposal of hazardous wastes.

⭐Landfills:There are permanent storage facilities for military related liquid and radioactive waste materials in secured lands.High level radio active wastes are stored in deep underground storage.

⭐Deep well injection:It involves drilling a well into dry,porous material below ground water.Hazardous waste liquids are pumped into the well.They are soaked into the porous material and made to remain isolated indefinitely.However fractures in the impermeable layer may permit the injected wastes to escape and contaminate ground water.

⭐ Surface impoundments:This method is used to dispose large amounts of water carrying relatively small amounts of chemical wastes.Surface impoundments are simple excavated depressions(ponds)into which liquid wastes are drained.Solid wastes settle and accumulate which water evaporates.If the pond bottom is well sealed and if evaporation equals input,wastes may be stored in the impoundment indefinitely.

⭐Incineration:The hazardous biomedical wastes are usually disposed off by means of Incineration.Human anatomical wastes,discarded medicines,toxic drugs,blood,pus, animal wastes,microbiological and biotechnological wastes etc are called Bio medical wastes.

⭐ Bioremediation:This is another rapidly developing clean up technology.Cleaning environment with biological options such as microbes and plants is called Bioremediation.Some naturally occurring bacteria and other microorganisms have the capability to degrade or absorb or detoxify the wastes such as heavy metals.

Management of non hazardous wastes

⭐ Sanitary land fills:The refuse is spread in a hollow land or in a trench and compacted with a layer of clear sand fill.The sanitary land fills are far more desirable than open dumps but the ground water contaminated is always a potential problem.Once a land fill operation has been completed the site must be inspected periodically.This land fill is suitable for recreational activities such as parks and play ground.

⭐Incineration:Municipal incinerators burn combustible solid waste and melt certain non combustible materials.Since the high temperature destroys pathogens and their vectors,it is a good method of disposal from health point of view.

⭐Reuse and recycling techniques: Resource recovery is a broad term that is used for the retrieval of valuable materials or energy from a waste.The separating out of materials such as rubber,glass,paper and scrap metal from refuse and reprocessing them for reuse is named as reclamation of waste or recycling.

Paper(54% recovery) can be repulped and reprocessed into recycled paper, cardboard,and other paper products.

Glass(20% recovery)can be crushed, remelted and made into new containers or crushes used as a substitute for gravel or sand in construction materials such as concrete and asphalt.

Some forms of plastics(2.2% recovery) can be remelted and fabricated into carpet fibre,fill for insulated apparel, irrigation drainage,tiles and sheet plastics.

Metals can be melted and fabricated (39% recovery).

Food wastes and yard wastes(leaves,grass etc.) can be composted to produce humus soil conditioner.

Textiles can be shredded and used to strengthen recycled paper products.

ARRANGED MARRIAGES

BY: VAIBHAVI MENON

Arranged marriage is a type of marital union where the bride and groom are primarily selected by individuals other than the couple themselves, particularly by family members such as the parents. In some cultures a professional matchmaker may be used to find a spouse for a young person. Arranged marriages have historically been prominent in many cultures. The practice remains common in many regions, notably South Asia, though in many other parts of the world, the practice has declined substantially during the 19th and 20th centuries. Forced marriages, practiced in some families, are condemned by the United Nations, and is not an arranged marriage. The specific sub-category of forced child marriage is especially condemned. In other cultures people mostly choose their own partner.

Arranged marriages were very common throughout the world until the 18th century. Typically, marriages were arranged by parents, grandparents or other relatives. Some historical exceptions are known, such as courtship and betrothal rituals during the Renaissance period of Italy and Gandharva Vivah in the Vedic period of India. In China, arranged marriages sometimes called blind marriages were the norm before the mid-20th century. A marriage was a negotiation and decision between parents and other older members of two families. The boy and girl were typically told to get married, without a right to demur, even if they had never met each other until the wedding day. Arranged marriages were the norm in Russia before the early 20th century, most of which were endogamous. Until the first half of the 20th century, arranged marriages were common in migrant families in the United States. They were sometimes called “picture-bride marriages” among Japanese-American immigrants because the bride and groom knew each other only through the exchange of photographs before the day of their marriage. These marriages among immigrants were typically arranged by parents, or relatives from the country of their origin. As immigrants settled in and melded into a new culture, arranged marriages shifted first to quasi-arranged marriages where parents or friends made introductions and the couple met before the marriage; over time, the marriages among the descendants of these immigrants shifted to autonomous marriages driven by individual’s choice, dating and courtship preferences, along with an increase in interracial marriages. Similar historical dynamics are claimed in other parts of the world. Arranged marriages have declined in prosperous countries with social mobility and increasing individualism; nevertheless, arranged marriages are still seen in countries of Europe and North America, among royal families, aristocrats and minority religious groups such as in placement marriage among Fundamentalist Mormon groups of the United States. In most other parts of the world, arranged marriages continue to varying degrees and increasingly in quasi-arranged form, along with autonomous marriages.

A woman who refuses to go through with an arranged marriage, tries to leave an arranged marriage via divorce or is suspected of any kind of immoral behaviour, may be considered to have dishonored her entire family. This being the case, her male relatives may be ridiculed or harassed and any of her siblings may find it impossible to enter into a marriage. In these cases, killing the woman is a way for the family to enforce the institution of arranged marriages. Unlike cases of domestic violence, honor killings are often done publicly for all to see and there are frequently family members involved in the act.

BIG ENDIAN AND LITTLE ENDIAN

– There are two ways that byte addresses can be assigned across words.

→ computer store data in Memory 

→Formating at the byte level of the data which is called endianness which refer to ordering of bytes.

→The name big-endian is used when lower byte addresses are used for the more Significant bytes (Left most)

→The little-endian is used for the opposite ordering where lower byte address are used for the less significant bytes (Right most)

Endianness refers to the way bytes are ordered when a data item with a site bigger than 1 Byte is placed in memory / transferred over a communication interface.

Two type of endianness:-

  1. Little endian- The bytes are ordered with the LSB placed at the low and address. 
  2. Big endian- The bytes are ordered with the MSB placed at the lowest address.

BIG ENDIAN AND LITTLE ENDIAN

– There are two ways that byte addresses can be assigned across words.

→ computer store data in Memory 

→Formating at the byte level of the data which is called endianness which refer to ordering of bytes.

→The name big-endian is used when lower byte addresses are used for the more Significant bytes (Left most)

→The little-endian is used for the opposite ordering where lower byte address are used for the less significant bytes (Right most)

Endianness refers to the way bytes are ordered when a data item with a site bigger than 1 Byte is placed in memory / transferred over a communication interface.

Two type of endianness:-

  1. Little endian- The bytes are ordered with the LSB placed at the low and address. 
  2. Big endian- The bytes are ordered with the MSB placed at the lowest address.

EFFECT OF MASS MEDIA ON MILLENIALS

BY: VAIBHAVI MENON

Individuals that fall into this generation known as “millennials” are particularly interesting to look into the effects of increased media presence, because they are the generation that is constantly surrounded with updated technology. These individuals are the group of people that are regularly online, taking full advantage of these resources; it has become not just a part of their life but their life in its entirety. Everything this generation does is centered on the Internet, whereas someone from an older generation grew up in a different kind of life, so the effects aren’t nearly as drastic or as meaningful. Millenials are the ones that have grown up with the presence of mass digital media in their lives and were the ones constantly subjected to the consequences of this presence while also adapting to new and improved technologies every day.

The existence of the smartphone has completely altered how this group of individuals interacts and participates in society, because they are the ones who stay constant with the progressions in technology and getting the new “iPhone” every time it is released. “The arrival of the smartphone has radically changed every aspect of teenagers’ lives, from the nature of their social interactions to their mental health. These changes have affected young people in every corner of the nation and in every type of household. The trends appear among teens poor and rich; of every ethnic background; in cities, suburbs, and small towns. Where there are cell towers, there are teens living their lives on their smartphone.” (Twenge). This age group is subjected to a life filled with mass media and technology every day, which results in different circumstances and different lives in comparison to older generations. There is a fundamental difference in how this generation and older generations process, analyze and understand information while they function in society. Comparing those who weren’t raised on the power of a smartphone and in the age of media constantly in your face to those who were, the contrast becomes quite clear.

Media messages can have a negative or unhealthy influence on teenage behavior and attitudes in certain areas, including body image, health and citizenship. Body image :- Your child’s body image is influenced by social media, other media and advertising. If teenagers see unrealistic ‘thin’ or ‘muscly’ body types often enough in the media they follow, it can have an impact on their body image and dieting behavior. This is especially true when there’s no-one to disagree with messages like ‘thin is beautiful’. Health and lifestyle :- Social media and other media can influence the decisions that teenagers make about their health and lifestyle. For example, media messages and content can make it look ‘normal’, cool or grown-up to eat junk food, smoke, drink alcohol and take other drugs. Citizenship:-To be responsible citizens, teenagers need reliable and good-quality information. But social media and other media are sometimes used in negative ways during elections and at other times. For example, ‘fake news’ might influence teenagers to believe false information about a politician, public figure or celebrity. Or sometimes online forums promote biased or hateful attitudes towards groups of people.

CHINTPURNI :- INCREDIBLE INDIA

One of the shaktipeethas (places of worship where the body parts of the goddess Sati fell), is the Chintpurni Temple located about 50 miles [80 km] from Dharamsala. The supreme deity is Goddess Chintpurni, who is said to remove troubles, and is represented by the pindi (circular goddess). Legend has it that when Lord Vishnu cut the body of Maa Sati in 51 parts to end King Shiva’s dance of the destruction of the earth, the pieces were scattered in different parts of India. Considered one of the most important of the 51 shaktipeethas, it is believed that the head of the goddess Shakti fell to Chintpurni.

The Chintpurni Devi Temple is visited by devotees from all over India, who come to pray at the Lotus feet of Mata Chhinnamastika Devi. Puranic traditions say that Chinnamnamastika Devi is protected by Rudra Mahadev or Lord Shiva on all four sides. At the same distance from Chintpurni stands four Shiva temples, Muchkund Mahadev in the north, Shiva Bari in the south, Kaleshwar Mahadev in the east and Narayna Mahadev in the west. The temple remains open between 4 a.m. and 11 p.m.