Technical Comprehension questionStat ement What does Ksplice do? passage When a Linux kernel updates, a reboot is required to apply the changes as you have to boot with the new kernel features. And in cases when the system happens to be a server, rebooting becomes painful as it contributes to the downtime of the system. Again when you have customer SLAs where you have to stick to 5 nines or 7 nines, this small little upgrade can cause you face tremendous pressure. At the same time security updates or even for that matter any kernel update is not something you can afford to ignore.</br>Ksplice converts the updates into hot updates which are prepared at object code level instead of source code level, thus minimizing programmer's involvement. Existing practices of updating Kernel rely on programmer writing a source code files for changing certain properties or require a manual inspection of running binaries to ensure safety guarantees. Ksplice, however, updates the legacy binaries based on existing information (a source code patch) and so it doesn't require a system reboot.</br>Ksplice replaces the whole function if any part of the code in the function is to be modified by applying patch. It links the function to its newer replacement code into the Kernel by placing a jump instruction which redirects the path to replacement code. Also ksplice while applying an update the system disrupts for 0.7 milliseconds; however no network connections or any open application is affected. A small amount of memory is used in storing replacement code. The software verifies the safety of updates before installing them. An alternative to reduce downtime is Ksplice. To give it a try, you can download the 30-day trial version for your Linux distribution (if you are using Ubuntu 9.04 or Ubuntu 9.10, then a free version is also available with graphical manager). answer A Ksplice does away with the need to update the kernel answerB answerC answer D Ksplice is used to change the source code of the kernel Ksplice allows to update the kernel without rebooting the system Ksplice replace s the kernel with its own code answ erE Technical Comprehension Bing is a ________. What does the author mean by the term 'social engineering'? You will get an access key on registering with Ksplice on your email Id.</br> Unethical tactics employed by companies utilizing search engine optimization (SEO) tactics such as link farms and loading Web pages filled with irrelevant keywords, are not welcomed by search engine operators. This declaration was issued by Microsoft and Google.Asked if organizations such as content farms are outsmarting its system by flooding the Web with low-quality content to earn high-click rates, a Microsoft spokesperson said the company "prefers quality over quantity" to manage its Bing search engine."Backlinks, also known as 'inbound links', should be relevant to the page being linked to, or relevant to an SEO's domain if they are being linked to the homepage," he told ZDNet Asia in an e-mail interview. He pointed out that backlinks from sites considered to be authoritative in their field are rated to be of higher value than those from "junk sites".Bing does prevent Web sites from appearing in its search results if they use techniques such as using hidden text or links within their Web page or create link farms to artificially increase the number of links, the Microsoft spokesman added. However, he did not elaborate on how the checks were implemented and executed.Google adopts a similar stance. A Google spokesman explained that a site's ranking in its search results is automatically determined by computer algorithms that incorporate hundreds of parameters. "Our algorithms are effectively designed to prevent people from manipulating the rankings of competitors in our search results," he added. An exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated New search engine by Google Enginee ring a piece of softwar e which New search engine by Microsoft A branch of engineerin g which prevents Name of the algorithm used for SEO Using persuasive methods to get the user to help Name of the algorit hm to counte ract SEO Spreadi ng exploit s to other Technical Comprehension behavior to occur on computer software, hardware, or something electronic (usually computerised). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with social engineering method.Another classification is by the action against vulnerable system: unauthorized data access, arbitrary code execution, denial of service. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root.Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete for newer versions of the software. This is the reason why some blackhat hackers do not publish their exploits but keep them private to themselves or other crackers. Such exploits are referred to as 'zero day exploits' and to obtain access to such exploits is the primary desire of unskilled attackers, often nicknamed script kiddies. takes advanta ge of an exploit vulnerable systems from getting exploited triggering the exploit compu ters by means of the user's social networ k Technical Comprehension How does unit testing ensure effectiveness of delivered software? As a developer, testing is so important that you should be doing it all of the time. It should not be relegated to a specific stage of the development cycle. It definitely shouldn't be the last thing done before giving your system to a customer. How else are you going to know when you're done? How else are you going to know if your fix for a minor bug broke a major function of the system? How else will the system be able evolve into something more than is currently envisioned? Testing, both unit and functional, needs to be an integrated part of the development process.Unit tests should become central to how you write code, especially if the project you are working on has tight time constraints and you'd like to keep it under control. Unit tests are so important that you should write your tests before you write the code.Unit tests constitute design documentation that evolves naturally with a system. Read that again. This is the Holy Grail of software development, documentation that evolves naturally with a system. What better way to document a class than to provide a coded set of use cases. That's what these unit tests are: a set of coded use cases that document what a class does, given a controlled set of inputs. As such, this design document is always up-to-date because the unit tests always have to pass.You should write tests before you write code. Doing so provides a design for the class that the test will exercise, allowing you to focus on small chunks of code. This practice also keeps the design simple. You aren't trying to look into the future, implementing unnecessary functionality. Writing tests first additionally lets you know when the class is complete. When all the tests pass, the task is complete.Lastly, unit tests provide you with a high degree of confidence, which translates into developer satisfaction. If you run unit tests whenever you make changes to code, you'll find out immediately if your One carefull y thinks about the structur e of code before writing it One writes extensive document ation of the software being developed One creates a set of inputs to the program and expected outputs It cannot be inferre d from the passag e Technical Comprehension changes broke something. How does a webserver accesses a cookie? Which of the following is NOT a part of sixth sense? In computing, a cookie (also tracking cookie, browser cookie, and HTTP cookie) is a small piece of text stored on a user's computer by a web browser. A cookie consists of one or more name-value pairs containing bits of information such as user preferences, shopping cart contents, the identifier for a server-based session, or other data used by websites.It is sent as an HTTP header by a web server to a web browser and then sent back unchanged by the browser each time it accesses that server. A cookie can be used for authenticating, session tracking (state maintenance), and remembering specific information about users, such as site preferences or the contents of their electronic shopping carts. The term "cookie" is derived from "magic cookie", a well-known concept in UNIX computing which inspired both the idea and the name of browser cookies. Some alternatives to cookies exist; each has its own uses, advantages, and drawbacks.Being simple pieces of text, cookies are not executable. They are neither spyware nor viruses, although cookies from certain sites are detected by many anti-spyware products because they can allow users to be tracked when they visit various sites.Most modern browsers allow users to decide whether to accept cookies, and the time frame to keep them, but rejecting cookies makes some websites unusable. For example, shopping carts or login systems implemented using cookies do not work if cookies are disabled. Basically, Sixth Sense is a miniprojector coupled with a camera and a cellphone-which acts as the computer and your connection to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures, like in the infamous Minority Report. However, instead of requiring you to be in front of a big screen like Tom Cruise, Sixth Sense can do its The server itself stores the cookie Cookie data is sent to the server with each page request A screen A projector The server requests the cookie from the browser None of the above A camera A cellpho ne Technical Comprehension magic-and a lot more-everywhere, even while you are jumping hysteric over Oprah's sofa.The camera recognizes objects around you instantly, with the micro-projector overlaying the information on any surface, including the object itself or your hand. Then, you can access or manipulate the information using your fingers. Need to make a call? Extend your hand on front of the projector and numbers will appear for you to click. Need to know the time? Draw a circle on your wrist and a watch will appear. Want to take a photo? Just make a square with your fingers, highlighting what you want to frame, and the system will make the photowhich you can later organize with the others using your own hands over the air.But those are just novelty applications. The true power of Sixth Sense lies on its potential to connect the real world with the Internet, and overlaying the information on the world itself. Imagine you are at the supermarket, thinking about what brand of soap is better. Or maybe what wine you should get for tonight's dinner. Just look at objects, hold them on your hands, and Sixth Sense will show you if it's good or bad, or if it fits your preferences or not.Now take this to every aspect of your everyday life. You can be in a taxi going to the airport, and just by taking out your boarding pass, Sixth Sense will grab real time information about your flight and display it over the ticket. You won't need to do any action. Just hold it in front of your and it will work. The key here is that Sixth Sense recognizes the objects around you, displaying information automatically and letting you access it in any way you want, in the simplest way possible.Clearly, this has the potential of becoming the ultimate "transparent" user interface for accessing information about everything around us. If they can get rid of the colored finger caps and it ever goes beyond the initial development phase, that is. But as it is Technical Comprehension What is the use of annotations in 'Simple'? now, it may change the way we interact with the real world and truly give everyone complete awareness of the environment around us. Simple is a Java framework used to simplify the process of serializing and deserializing Extensible Markup Language(XML) objects. Using Simple, developers can simplify (hence the name) the process of translating plain old Java objects (POJOs) into XML documents-a process known as serialization. Simple also facilitates the reverse: Developers can translate XML documents into POJOs-a process known as deserialization.Simple lives up to its by name using annotations to enable the serialization or deserialization process. POJOs are annotated according to how the corresponding XML document should appear. Some fields are annotated as attributes. Other fields are annotated as elements. The class is usually annotated as the root element. The framework handles the tedious process of interpreting the annotations and producing a corresponding XML document during the serialization process. Not surprisingly, the annotations are also interpreted during the deserialization process when an XML document is translated into a POJO.The use of Simple has several advantages. First, it facilitates rapid application development. Because Simple is so simple, it enables developers to quickly implement robust applications that use XML serialization and deserialization without committing to an excessive learning curve or development overhead. Next, Simple requires no configuration. As mentioned previously, Simple uses annotations. These annotations are in lieu of the XML-based configuration files that typically accompany frameworks of this nature.Finally, Simple adds only minimally to the footprint of applications that use it. The Java Archive (JAR) file is only 239 kilobytes. Simple is also not To annotat e the XML objects To convert the root classes into root elements It reduces the overhead to configure 'Simple' None of the above Technical Comprehension Which field of study is used to study models and theories of brain? dependent upon a series of other JAR files, as is frequently the case with competing frameworks. In general a biological neural network is composed of a group or groups of chemically connected or functionally associated neurons. A single neuron may be connected to many other neurons and the total number of neurons and connections in a network may be extensive. Connections, called synapses, are usually formed from axons to dendrites, though dendrodendritic microcircuits and other connections are possible. Apart from the electrical signaling, there are other forms of signaling that arise from neurotransmitter diffusion, which have an effect on electrical signaling. As such, neural networks are extremely complex.Artificial intelligence and cognitive modeling try to simulate some properties of neural networks. While similar in their techniques, the former has the aim of solving particular tasks, while the latter aims to build mathematical models of biological neural systems.In the artificial intelligence field, artificial neural networks have been applied successfully to speech recognition, image analysis and adaptive control, in order to construct software agents (in computer and video games) or autonomous robots. Most of the currently employed artificial neural networks for artificial intelligence are based on statistical estimation, optimization and control theory.The cognitive modelling field involves the physical or mathematical modeling of the behaviour of neural systems; ranging from the individual neural level (e.g. modelling the spike response curves of neurons to a stimulus), through the neural cluster level (e.g. modelling the release and effects of dopamine in the basal ganglia) to the complete organism (e.g. behavioural modelling of the organism's response to stimuli). Artificial intelligence, cognitive modelling, and neural networks are Cognitiv e modelin g Artificial Neural Networks Neurotrans mitter Diffusion Electric al Signali ng Technical Comprehension information processing paradigms inspired by the way biological neural systems process data.