All Stories

Friday 31 January 2014



  1. #include<iostream>
  2.  
  3. #include<cstdlib>
  4.  
  5. using namespace std;
  6.  
  7. int main()
  8.  
  9. {
  10.  
  11. int i=0, j=0, NUM=3;
  12.  
  13. for(i=-NUM; i<=NUM; i++)
  14.  
  15. {
  16.  
  17. for(j=-NUM; j<=NUM; j++)
  18.  
  19. {
  20.  
  21. if( abs(i)+abs(j)<=NUM)
  22.  
  23.  { cout<<"*"; }
  24.  
  25. else { cout<<" ";}
  26.  
  27. }
  28.  
  29. cout<<endl;
  30.  
  31. }
  32. return 0;
  33. }
Output:
*
***
*****
*******
*****
***
*

Printing a Diamond in C++ using Aesterics.



  1. #include<iostream>
  2.  
  3. #include<cstdlib>
  4.  
  5. using namespace std;
  6.  
  7. int main()
  8.  
  9. {
  10.  
  11. int i=0, j=0, NUM=3;
  12.  
  13. for(i=-NUM; i<=NUM; i++)
  14.  
  15. {
  16.  
  17. for(j=-NUM; j<=NUM; j++)
  18.  
  19. {
  20.  
  21. if( abs(i)+abs(j)<=NUM)
  22.  
  23.  { cout<<"*"; }
  24.  
  25. else { cout<<" ";}
  26.  
  27. }
  28.  
  29. cout<<endl;
  30.  
  31. }
  32. return 0;
  33. }
Output:
*
***
*****
*******
*****
***
*

Posted at 22:11 |  by viralnom

0 comments:


  1. #include<iostream>
  2. using namespace std;
  3. int main()
  4. {
  5.     int palindrome, reverse=0;
  6.     cout<<"Enter number:  ";
  7.     cin>>palindrome;
  8.     int num=0,key=palindrome;
  9.   for(int i=1;palindrome!=0;i++){

  10.     num=palindrome%10;
  11.     palindrome=palindrome/10;
  12.     reverse=num+(reverse*10);
  13.               }

  14.    if(reverse==key){
  15.       cout<<key<<" is a Palindrome Number";
  16.             }
  17.    else{
  18.       cout<<key<<"is NOT a Palindrome Number";
  19.             }
  20. return 0;
  21. }

Finding Palindrome C++ Code


  1. #include<iostream>
  2. using namespace std;
  3. int main()
  4. {
  5.     int palindrome, reverse=0;
  6.     cout<<"Enter number:  ";
  7.     cin>>palindrome;
  8.     int num=0,key=palindrome;
  9.   for(int i=1;palindrome!=0;i++){

  10.     num=palindrome%10;
  11.     palindrome=palindrome/10;
  12.     reverse=num+(reverse*10);
  13.               }

  14.    if(reverse==key){
  15.       cout<<key<<" is a Palindrome Number";
  16.             }
  17.    else{
  18.       cout<<key<<"is NOT a Palindrome Number";
  19.             }
  20. return 0;
  21. }

Posted at 21:46 |  by viralnom

0 comments:

Sunday 19 January 2014

Requirement Elicitation is one of the most important phases in SDLC during which all the requirements of 

users are elicited.
SDLC Process



Following are the techniques of requirement elicitation:-

  • Conversational methods

        This is the verbal communication which takes place between stakeholders. Analysts and the experienced persons conduct different interviews, workshops to gather the requirements. Brain storming is also a conversational method by which requirements are elicited through the collection of ideas.

  •  Observational method

           In this method the requirements are elicited by observing the peoples. Persons may be attached to the environment in order to elicit the requirements. Observations are made in such a way that it doesn't disturb the peoples and the staff members of the organization.

  •  Analytical method

        In this method the analyst does the analysis of the gathered information. In this method we reuse the specification of the legacy systems to elicit the requirements. In this method requirements are also elicited through the questionnaires.

  •  Synthetic method

        In this method we start the requirement elicitation from the documentation study. In this method we combine the conversational, observational and analytic methods to elicit the requirements. In this method the scenarios and storyboards are used to elicit the requirements. This method also include the JAD/RAD sessions, the purpose of including it in this method is to include all the stakeholders in the design phase. The analyst and stakeholders conduct contextual inquiry to elicit the requirements.

  • GSD methodology

        In this methodology the advance problems are gathered and the strategy is made to lessen that problems.

  •  Analysis of data

        Requirement elicitation I responsible for the success or failure of the project.JAD/RAD and ethnography has very much usage rate as compared to the R-group. Elicitation methods also depend on the development process.

  •  Elicitation guidelines


  1.          Interviews/Surveys are important for web based systems
  2. 2       Checklists are important for the small scale systems   
  3.          JAD/RAD is recommended when we have to deal a lot of peoples in less time and in less budget
  4.          Scenarios/Storyboards are used for the legacy system updates
  5.          Ethnography is used during the updating and we have a lot of time and budget.


View Points

Many software houses have their own ways of developing. Due to this reason sometimes they fails because their own ways of developing are not sufficient sometimes to develop the modern software project. Engineers must use proper and adequate model and method for requirement elicitation and development for the user satisfactory.

Modern Trend Towards Requirement Elicitation

Requirement Elicitation is one of the most important phases in SDLC during which all the requirements of 

users are elicited.
SDLC Process



Following are the techniques of requirement elicitation:-

  • Conversational methods

        This is the verbal communication which takes place between stakeholders. Analysts and the experienced persons conduct different interviews, workshops to gather the requirements. Brain storming is also a conversational method by which requirements are elicited through the collection of ideas.

  •  Observational method

           In this method the requirements are elicited by observing the peoples. Persons may be attached to the environment in order to elicit the requirements. Observations are made in such a way that it doesn't disturb the peoples and the staff members of the organization.

  •  Analytical method

        In this method the analyst does the analysis of the gathered information. In this method we reuse the specification of the legacy systems to elicit the requirements. In this method requirements are also elicited through the questionnaires.

  •  Synthetic method

        In this method we start the requirement elicitation from the documentation study. In this method we combine the conversational, observational and analytic methods to elicit the requirements. In this method the scenarios and storyboards are used to elicit the requirements. This method also include the JAD/RAD sessions, the purpose of including it in this method is to include all the stakeholders in the design phase. The analyst and stakeholders conduct contextual inquiry to elicit the requirements.

  • GSD methodology

        In this methodology the advance problems are gathered and the strategy is made to lessen that problems.

  •  Analysis of data

        Requirement elicitation I responsible for the success or failure of the project.JAD/RAD and ethnography has very much usage rate as compared to the R-group. Elicitation methods also depend on the development process.

  •  Elicitation guidelines


  1.          Interviews/Surveys are important for web based systems
  2. 2       Checklists are important for the small scale systems   
  3.          JAD/RAD is recommended when we have to deal a lot of peoples in less time and in less budget
  4.          Scenarios/Storyboards are used for the legacy system updates
  5.          Ethnography is used during the updating and we have a lot of time and budget.


View Points

Many software houses have their own ways of developing. Due to this reason sometimes they fails because their own ways of developing are not sufficient sometimes to develop the modern software project. Engineers must use proper and adequate model and method for requirement elicitation and development for the user satisfactory.

Posted at 02:39 |  by viralnom

0 comments:

Friday 17 January 2014


DNS(DOMAIN NAME SYSTEM)

DNS abbreviated as Domain Name System . Primary goal of DNS is to make it easy for user to remember 

simply the domain names of the websites rather than the IP addresses of every site user wanted to visit. 

Without DNS it’s very difficult for user to remember IP address of every site. For example a user want to 

visit a site, it will harder to remember 17.254.3.183 instead of  just domain name of the site aaple.com.

Domain Name System used because Web sites are essentially positioned by their IP addresses. For 

instance, when a user want to access a site, computer sends a request for that site to adjacent DNS server, 

which find the IP address for that site.  Then user’s computer will connect to the server with that IP number.


DNS  Working

DNS Architecture:

In early days of internet when It was a small network, host names of the computers were achieved through a 

single server. As the number hosts increases load also increased. At that time new system was needed 

which reduce load on server also allow many data types. Domain Name Service presented in 1984 became 

this new system. Using DNS, to reduce the load on any one server, all the host names stored in database 

which can be scattered between the multiple servers. The potential size of DNS database is unlimited 

because its database is scattered also not decrease performance when multiple computers approach it. 
DNS Architecture

Domain Namespace:

DNS namespace define a hierarchical arrangement of domains that are combined to make a complete 

domain name. For instance, sub.secondary.com is a domain name where "com" is top-level domain, 

"secondary" is secondary domain name, and "sub" is a sub-domain. The names make a hierarchical tree in 

DNS database to form a complete domain name is called Domain namespace

Many organizations use their private domain namespace to create their own networks which are not visible 

on internet.

Recursive query:Iterative query/ non recursive query:

In recursive query , DNS server receive the user’s query then perform all the jobs to achieve the answer 

and give it back to the user. In this process, the DNS server can also query the other DNS server's in the 

internet on user’s behalf, for the answer.If DNS server does not have the information that is required it will 

query to other servers until it get the required information or until query fails.

Iterative query/ non recursive query:

In an iterative query, the DNS server gives the best answer which based on cache or zone data. If the DNS 

server does not have the required information of user then it will return a referral. DNS client send query to 

the referral DNS server until it met to a DNS server which will be authoritative for that query or until an 

error condition. All DNS servers must follow non recursive query.




Domain Name System


DNS(DOMAIN NAME SYSTEM)

DNS abbreviated as Domain Name System . Primary goal of DNS is to make it easy for user to remember 

simply the domain names of the websites rather than the IP addresses of every site user wanted to visit. 

Without DNS it’s very difficult for user to remember IP address of every site. For example a user want to 

visit a site, it will harder to remember 17.254.3.183 instead of  just domain name of the site aaple.com.

Domain Name System used because Web sites are essentially positioned by their IP addresses. For 

instance, when a user want to access a site, computer sends a request for that site to adjacent DNS server, 

which find the IP address for that site.  Then user’s computer will connect to the server with that IP number.


DNS  Working

DNS Architecture:

In early days of internet when It was a small network, host names of the computers were achieved through a 

single server. As the number hosts increases load also increased. At that time new system was needed 

which reduce load on server also allow many data types. Domain Name Service presented in 1984 became 

this new system. Using DNS, to reduce the load on any one server, all the host names stored in database 

which can be scattered between the multiple servers. The potential size of DNS database is unlimited 

because its database is scattered also not decrease performance when multiple computers approach it. 
DNS Architecture

Domain Namespace:

DNS namespace define a hierarchical arrangement of domains that are combined to make a complete 

domain name. For instance, sub.secondary.com is a domain name where "com" is top-level domain, 

"secondary" is secondary domain name, and "sub" is a sub-domain. The names make a hierarchical tree in 

DNS database to form a complete domain name is called Domain namespace

Many organizations use their private domain namespace to create their own networks which are not visible 

on internet.

Recursive query:Iterative query/ non recursive query:

In recursive query , DNS server receive the user’s query then perform all the jobs to achieve the answer 

and give it back to the user. In this process, the DNS server can also query the other DNS server's in the 

internet on user’s behalf, for the answer.If DNS server does not have the information that is required it will 

query to other servers until it get the required information or until query fails.

Iterative query/ non recursive query:

In an iterative query, the DNS server gives the best answer which based on cache or zone data. If the DNS 

server does not have the required information of user then it will return a referral. DNS client send query to 

the referral DNS server until it met to a DNS server which will be authoritative for that query or until an 

error condition. All DNS servers must follow non recursive query.




Posted at 08:47 |  by viralnom

0 comments:


There are three main components of 3 tier architecture based on c# following are:

·         Data tier
·         Logic tier
·         Presentation tier


Where data tier has no proper direction to the presentation tier here logic tier is an intermediate tier which 

transfers data from data tier to presentation tier also responsible for to add defined business logic to data.
3-Tier Architecture Overview



Presentation tier:

It is the top most tier in which the users interrelate an application with the help of interface. Presentation Tier 

subjects Shared UI code, Code Behind and Designers used to symbolize information to the user. The main 

purpose of this tier is to translate the function into something that a user can easily understand

Logic tier:                                                             

Logic Tier works as the channel among Data Tier and Presentation Tier. This tier organizes the applications, 

processes instructions, makes logical choices, estimations, alsomakes calculations. It moves the processes 

data around further two layers.  Data passes over the Logic Tier before passing to the presentation Tier.
3-Tier Architecture


Data tier:


Data Tier is server which stores all the application’s data in the database.  Data tier contents include the 

Database tables, XML Files and other ways of storing Application Data.  From this tier the information is 

deposited or retrieved from the database. This information then moved back  to the logic tier for further 

processing and then back to user.

Components of C# based 3 Tier Architecture


There are three main components of 3 tier architecture based on c# following are:

·         Data tier
·         Logic tier
·         Presentation tier


Where data tier has no proper direction to the presentation tier here logic tier is an intermediate tier which 

transfers data from data tier to presentation tier also responsible for to add defined business logic to data.
3-Tier Architecture Overview



Presentation tier:

It is the top most tier in which the users interrelate an application with the help of interface. Presentation Tier 

subjects Shared UI code, Code Behind and Designers used to symbolize information to the user. The main 

purpose of this tier is to translate the function into something that a user can easily understand

Logic tier:                                                             

Logic Tier works as the channel among Data Tier and Presentation Tier. This tier organizes the applications, 

processes instructions, makes logical choices, estimations, alsomakes calculations. It moves the processes 

data around further two layers.  Data passes over the Logic Tier before passing to the presentation Tier.
3-Tier Architecture


Data tier:


Data Tier is server which stores all the application’s data in the database.  Data tier contents include the 

Database tables, XML Files and other ways of storing Application Data.  From this tier the information is 

deposited or retrieved from the database. This information then moved back  to the logic tier for further 

processing and then back to user.

Posted at 08:30 |  by viralnom

0 comments:

Saturday 4 January 2014

Requirement Engineering is in fact a process or gathering the requirements, documenting them and using the documented requirements for maintaining the software. Here we are providing a RE process in an image.

Requirement Engineering Process

Requirement Engineering is in fact a process or gathering the requirements, documenting them and using the documented requirements for maintaining the software. Here we are providing a RE process in an image.

Posted at 21:48 |  by viralnom

0 comments:

Friday 3 January 2014

 Well Hybrid Software re-engineering is process of combinations of abstract as well as alternative methods of transition of old system to new target system. Those projects which are following the method of hybrid re-engineering, are using combinations of abstract conditions for introducing innovation in the legacy system. Here is figure for Hybrid Software Re-engineering process.


Hybrid Software Reengineering

 Well Hybrid Software re-engineering is process of combinations of abstract as well as alternative methods of transition of old system to new target system. Those projects which are following the method of hybrid re-engineering, are using combinations of abstract conditions for introducing innovation in the legacy system. Here is figure for Hybrid Software Re-engineering process.


Posted at 00:38 |  by viralnom

0 comments:

ExactSeek Approved !!

Blogger templates. Proudly Powered by Blogger.
back to top