E-MAG (7th edition)
-
Upload
fahad-farrukh -
Category
Documents
-
view
258 -
download
4
description
Transcript of E-MAG (7th edition)
III NNN DDD EEE XXX
Science and Technology
1. Google Giant Book-keeper ...................................................................................................................... .......... 8
2. H.264/MPEG-4 AVC Standard for video compression (continued) ................................................................. 11
3. Java Design Patterns ............................................................................................................................. ........... 14
4. How RAM works? ............................................................................................................................................ 16
General Articles
5. The Eid Day ..................................................................................................................................................... 18
6. A Visit to Effiel Tower ..................................................................................................... ................................ 19
Poetry and Humor
7. My Country ....................................................................................................................................... ............... 20
8. One Two Buckle My Shoe ................................................................................................................................ 21
9. Smile Please ..................................................................................................................................................... 22
Puzzles – Quizzes – Challenges
10. Big Challenges (Republished) ................................................................................................................... 24
11. Logical Puzzles ............................................................................................................................. ................... 25
12. Sudoku ........................................................................................................................................................... 26
13. Programming Challenges ............................................................................................................................. .. 28
14. Guess the Location ......................................................................................................................................... 30
Learning and Information
15. Polymorphism – In depth ............................................................................................................................. ... 32
16. Learning C++ .................................................................................................................................................... 35
17. Explore With Me .............................................................................................................................................. 37
18. Tips and Tricks ................................................................................................................................................. 38
19. Software of the Month ................................................................................................................................... 39
20. Useful Links ...................................................................................................... ............................................... 40
21. The Constitution ............................................................................................................ .................................. 41
22. MAG News ...................................................................................................................................................... 42
One click access: Simply click any topic you want to read
E-MAG Team
Editor-in-chief
Mian Zeshan Farooqi
Editor
Naveed Hamid
Co editor
Ayesha Naeem Mirza
Coordinator
Dilawer Hussain
Advertiser
Mobeen Afzal
Reporter
Majid Ali
Website:
www.emagportal.com
Submissions:
In this machine age when the misdirected
genius of man forges new engines of
destruction every day, you have to keep abreast
of the times and keep your knowledge and
equipment up-to-date not because we have any
evil designs against any of our neighbors but
because our own security demands that we
should not be caught unaware. There is nothing
that we desire more than to live in peace and
let others live in peace and develop our country
according to our own lights without outside
interference and improve the lot of the
common man.
Address to the officers and men of the 5th Heavy Ack Ack and 6th Light Ack Ack Regiments in Malir , on 21st February, 1948
Translation of
TThhee HHoollyy QQuurraann Monthly series
[2:24] And if you are unable to bring forth (one chapter) - and We declare that you can
never bring one - then fear the fire (of hell), the fuel of which is men and stones; kept
ready for the disbelievers.
[2:25] And give glad tidings to those who believe and do good deeds; that for them are
Gardens beneath which rivers flow; when they are provided with a fruit of the Gardens,
they will say, "This is the same food as what was given to us before" whereas it is in
resemblance; and in the Gardens are pure spouses for them; and they shall abide in it
forever
HHAADDIITTHH
Narrated 'Aisha:
The Prophet used to like to start from the right side on wearing shoes, combing his hair
and cleaning or washing himself and on doing anything else.
[Sahih Bukhari Volume 1, Book 4, Number 169]
Narrated Anas bin Malik:
Allah's Apostle never proceeded (for the prayer) on the Day of 'Id-ul-Fitr unless he had
eaten some dates. Anas also narrated: The Prophet used to eat odd number of dates.
[Sahih Bukhari Volume 2, Book 15, Number 73]
Narrated 'Abbas bin Tamim:
My uncle asked Allah's Apostle about a person who imagined to have passed wind during
the prayer. Allah' Apostle replied: "He should not leave his prayers unless he hears sound
or smells something." [Sahih Bukhari Volume 1, Book 4, Number 139]
Narrated Anas:
The Prophet said, "If anyone of you feels drowsy while praying, he should sleep till he
understands what he is saying (reciting)." [Sahih Bukhari Volume 1, Book 4, Number 212]
EEddiittoorriiaall
.
“In the name of Allah, the most
Beneficent, the most Merciful”
IT (Information Technology) education has grabbed the world. It is considered as the symbol of
success and power. Like all other countries Pakistan has also undergone in IT revolution. IT education
has gained the attention of the students since last decade. The majority of the students want to adopt
their future profession as IT expert.
IT is now everywhere whether it is industry, trade, accounting, graphics, games, advertisement or
even routine work. But, the fact is that the quality of IT education provided by most of the institutions
in Pakistan does not meet the international standard. So, either students, after the completion of their
degrees, remain unemployed or do not get a good job. As a result of realism IT has gained a significant
importance and demand among students and recent developments in the field of IT have opened new
doors for the students. The more and more students want to excel their career as an IT professional.
In, Pakistan IT market has also flourished. The IT institutions can be seen in every nook and corner of
the country.
The IT institutions are broadly classified into three major categories, i.e. the public or government
institutions, the private institutions either affiliated with the government or foreign universities and
totally private institutions operated on their own. The major institutions which provide IT education in
Pakistan are P.U.C.I.T(Punjab University College of Information and Technology) Lahore, FAST,
COMSATS institute of Information and Technology, Bahawalpur University, Mirpur University of
Science and Technology, Hamdard University, Balochistan University of Information Technology,
Engineering and Management Sciences and many more.
The students seeking admission in any of the IT institutions must keep in mind some of the factors
about the institution such as the affiliation with H.E.C, the faculty of the institutions, the LABS, library
and modern means of teaching equipment so that they can get the best IT education and prove
themselves a fine IT expert in the global market.
In the modern world if we want to progress then importance of IT education cannot be neglected.
Measures should be taken to ensure high technical skills in IT. The government should maintain a track
to keep the record of IT developments in the world as well as in the country.
Editor
E-MAG – A Pioneer of Knowledge and Entertainment
99% of the solar systems mass is concentrated in the sun. 8
GGooooggllee’’ss GGiiaanntt BBooookk--kkeeeeppeerr
In recent years the world's most venerable libraries have played host to some incongruous visitors. In dusty nooks and far-flung stacks, teams of workers dispatched by Google have been beveling away to make digital copies of books. So far, Google has scanned more than 10 million titles from libraries in America and Europe – including half a million volumes held by the Bodleian in Oxford. The exact method it uses is unclear; the company does not allow outsiders to observe the process.
Why is Google going for such a venture, so seemingly out-of-kilter with its snazzy, hi-tech image? Why is it even interested in all those out-of-print library books, most of which have been gathering dust on forgotten shelves for decades? The company claims its motives are essentially public-spirited. Its overall mission, after all, is to “organise the world's information", so it would be odd if that information did not include books. Like the Ancient Egyptians who attempted to build a library at Alexandria containing all the known world's scrolls, Google executives talk of constructing a universal online archive, a treasure trove of knowledge that will be freely available – or at least freely searchable – for all.
Dan Clancy, the chief architect of Google Books, offers an analogy with the invention of the Gutenberg press – Google's book project, he says, will have a similar democratising effect. He talks of people in far-flung parts being able to access knowledge as never before, of search queries leading them to the one, long out-of-print book they need.
And he does seem genuine in his conviction that this is primarily a philanthropic exercise. "Google's core business is search and find, so obviously what helps improve Google's search engine is good for Google," he says. “But we have never built a spreadsheet outlining the financial benefits of this, and I have never had to justify the amount I am spending to the company's founders."
It is easy, talking to Mr Clancy and his colleagues, to be swept along by their missionary zeal. But Google's book-scanning project is proving controversial. Several opponents have recently emerged, ranging from rival tech giants such as Microsoft and Amazon to small bodies representing authors and publishers across the world. In broad terms, these opponents have leveled two sets of criticisms at Google.
First, they have questioned whether the primary responsibility for digitally archiving the world's books should be allowed to fall to a commercial company. Robert Darnton, the head of Harvard University's library, argues because such books are a common resource – the possession of us all – only public, not-for-profit bodies should be given the power to control them.
The second, related criticism is that Google's scanning of books is actually illegal. This allegation has led to Google becoming mired in a legal battle whose scope and complexity makes the Jarndyce and Jarndyce case in Bleak House look straightforward.
E-MAG – A Pioneer of Knowledge and Entertainment
A cat has 32 muscles in each ear. 9
At its centre, however, is one simple issue: that of copyright. The inconvenient fact about most books, to which Google has arguably paid insufficient attention, is that they are protected by copyright. Copyright laws differ from country to country, but in general protection extends for the duration of an author's life and for a substantial period afterwards, thus allowing the author's heirs to benefit. (In Britain and America, this post-death period is 70 years.) This means, of course, that almost all of the books published in the 20th century are still under copyright – and last century saw more books published than in all previous centuries combined. Of the roughly 40 million books in American libraries, for example, an estimated 32 million are in copyright. Of these, some 27 million are out of print.
Outside America, Google has made sure only to scan books that are out of copyright and thus in the "public domain" (works such as the Bodleian's first edition of Middlemarch, which anyone can read for free on Google Books Search).
But, within America, the company has scanned both in-copyright and out-of-copyright works. In its defence, Google points out that it displays only snippets of books that are in copyright – arguing that such displays are fair use. But critics allege that by making electronic copies of these books without first seeking the permission of copyright holders, Google has committed piracy.
In 2005, the Authors Guild of America, together with a group of American publishers, launched a class action suit against Google that, after more than two years of wrangling, ended with an announcement last October that Google and the claimants had reached an out-of-court settlement. The full details are staggeringly complicated – the text alone runs to 385 pages – and trying to summarise it is no easy task. “Part of the problem is that it is basically incomprehensible," says Blofeld, one of the settlement's most vocal British critics.
Broadly, the deal provides a mechanism for Google to reimburse authors and publishers whose rights it has breached (including giving them a share of any future revenue it generates from their works). In exchange for this, the rights holders agree not to sue Google in future.
The settlement stipulates that a body known as the Books Rights Registry will represent the interests of American copyright holders. Authors and publishers with a copyright interest in a book scanned by Google who make themselves known to the registry will be entitled to receive a payment – in the region of $60 per book – as compensation.
Additionally, the settlement hands Google the power – but only with the agreement of individual rights holders – to exploit its database of out-of-print books. It can include them in subscription deals sold to libraries or sell them individually under a consumer licence. It is these commercial provisions that are proving the settlement's most controversial aspect.
E-MAG – A Pioneer of Knowledge and Entertainment
A cockroach can live several weeks with its head cut off. 10
Critics point out that, by giving Google the right to commercially exploit its database, the settlement paves the way for a subtle shift in the company's role from provider of information to seller. Interest in this aspect of the settlement has focused on "orphan" works, where there is no known copyright holder – these make up an estimated 5% to 10% of the books Google has scanned. Under the settlement, when no rights holders come forward and register their interest in a work, commercial control automatically reverts to Google. Google will be able to display up to 20% of orphan works for free, include them in its subscription deals to libraries and sell them to individual buyers under the consumer licence.
But Mr Clancy dismisses the idea that, by gaining control over out-of-print and orphan works, Google is securing for itself a significant future revenue stream. He points out that out-of-print books represent only a tiny fraction of the books market – between 1% and 2%. “This idea that we are gaining access to a vast market here – I really don't think that is true."
James Gleick, an American science writer and member of the Authors Guild, broadly agrees. He says that, although Google's initial scanning of in-copyright books made him uncomfortable, the settlement itself is a fair deal for authors.
It is by no means certain that the settlement will be enacted – it is the subject of a fairness hearing in American courts. But if it is enacted, Google will in effect be off the hook as far as copyright violations in America are concerned. Many people are seriously concerned by this – and the company is likely to face challenges in other courts around the world.
Over the coming months, we will hear a lot more about the Google settlement and its ramifications. Although it's a subject that may seem obscure and specialised, it concerns one of the biggest issues affecting publishing and, indeed, other creative industries – the control of digital rights.
No one knows the precise use Google will make of the intellectual property it has gained by scanning the world's library books, and the truth, as Mr Gleick points out, is that the company probably doesn't even know itself. But what is certain is that, in some way or another, Google's entrance into digital bookselling will have a significant impact on the book world in years to come.
Written by: Faiza Raana Freelance Journalist,
Editor Monthly Pancham
E-MAG – A Pioneer of Knowledge and Entertainment
A company in Taiwan makes dinnerware out of wheat, so you can eat your plate. 11
HH..226644//MMPPEEGG--44 AAVVCC Standard for video compression
Features of H.264/AVC
H.264/AVC contains a lot of new features that allow it to compress video much more effectively from its
predecessors.
Intra coding
o Prediction modes 4x4, 8x8, 16x16.
Motion estimation/compensation
o Multiple reference frame
o Motion blocks modes 16x16, 16x8, 8x16, 8x8, 8x4, 4x8, 4x4.
Weighted prediction
Transform modes
o 4x4 integer Transform
o Additional transform on Intra 16x16
In-Loop filter
o Deblocking
Entropy coding
o Context-based Adaptive Binary Arithmetic Coding(CABAC)
o Context-based Adaptive Variable-length Coding (CAVLC)
Flexible macroblock ordering(FMO)
o Slice groups and arbitrary slice ordering (ASO), which are techniques for restructuring the
ordering of the representation of the fundamental regions (macro blocks) in pictures.
Profiles and levels Like any comprehensive standard, the H.264 standard defines a set of profiles and levels to set points of conformance for various classes of applications and services. In each profile, specific encoding tools are permitted to best meet the needs of the intended scenario. H.264 includes six profiles: • Baseline: Intended for low-complexity applications such as video conferencing and mobile multimedia. • Main: Intended for the majority of general uses, such as the Internet, mobile multimedia, and stored
content. • Extended: Intended for streaming applications, where stream switching technologies can be beneficial. • Three High profiles (also known as Fidelity Range Extension or FRExt): Consists of three separate High profiles (High, High 10, and High 4:2:2), intended for high-end professional uses.
Part II
E-MAG – A Pioneer of Knowledge and Entertainment
A cow produces 200 times more gas a day than a person. 12
Performance comparison between H.264 and MPEG-2 –Simulation (Car phon)
Parameters MPEG-2 H.264
Video Resolution 176x144(QCIF) 176x144(QCIF)
Frame Per Second 30 30
No of Frame Encoded 90 90
GOP I-P-BB-P-BB I-P-BB-P-BB
PSNR(Y) 30.46 37.6
PSNR(U) 36.35 40.9
PSNR(V) 36.5 41.5
Bit Rates(Kbits/Second) 128 128
Original File size(.yuv) MB 3.3 3.3
Compressed file size (KB) 47.2 45.6
E-MAG – A Pioneer of Knowledge and Entertainment
A dime has 118 ridges around the edge. 13
For the same bit rate and video resolution, the PSNR (dB) values are greater for H.264 encoded videos than for
the MPEG-2 encoded videos indicating H.264 better video quality. This can be verified from the screen shots.
Conclusions
The emerging H.264/AVC video coding standard has been developed and standardized collaboratively by both the ITU-T VCEG and ISO/IEC MPEG organizations. H.264/AVC represents a number of advances in standard video coding technology, with some important differences relative to prior standards. We thus summarize some of the important differences:
Enhanced motion-prediction capability.
Use of a small block-size exact-match transforms.
Adaptive in-loop deblocking filter.
enhanced entropy coding methods. When used the features of the new design provide approximately a 50% bit rate savings for equivalent perceptual quality relative to the performance of prior standards. As well as its improved compression performance, H.264 offers greater flexibility in terms of compression options and transmission support. An H.264 encoder can select from a wide variety of compression tools, making it suitable for applications ranging from low-bitrate, low-delay mobile transmission through high definition consumer TV to professional television production. The standard provides integrated support for transmission or storage, including a packetised compressed format and features that help to minimise the effect of transmission errors. H.264/AVC is being adopted for an increasing range of applications, including:
High Definition DVDs (HD-DVD and Blu-Ray formats)
High Definition TV broadcasting in Europe
Apple products including iTunes video downloads, iPod video and MacOS
NATO and US DoD video applications
Mobile TV broadcasting
Internet video
Videoconferencing
References
Wiegand T., Sullivan G., Bjontegaard G. and Luthra A. (2003), ‘‘Overview of the H.264/AVC Video Coding Standard’’, IEEE Tansactions on Circuits and Systems for Video Technology, Special Issue in H.264.
Vcodex tutorial for H.264 [online] http://www.vcodex.com/h264overview.html.
Wikipedia, H.264/MPEG-4 AVC [online] http://en.wikipedia.org/wiki/H264.
Apple Inc. Apple's FAQ on H.264. Apple Web Site. [online] http://www.apple.com/quicktime/technologies/h264/faq.html.
H.264/AVC software coordination 2005, http://iphome.hhi.de/suehring/tml
Written by: Muhammad Zeshan Ali Ph.D (Student) Institut für Datentechnik und Kommunikationsnetze TU-Braunschweig, Germany
E-MAG – A Pioneer of Knowledge and Entertainment
A giraffe can clean its ears with its 21-inch tongue. 14
JJaavvaa DDeessiiggnn PPaatttteerrnnss
Design Patterns
Design Patterns can be treated as tools used to solve a particular type of problem (mostly a recurring
problem over the years). it also proves as a handy shared vocabulary which developers can use while
discussing a particular problem at hand.
“Each pattern describes a problem which occurs over and over again in our environment, and then
describes the core of the solution to that problem, in such a way that you can use this solution a million
times over, without ever doing it the same way twice” - Christopher Alexander
Why use a Design Pattern?
They are well tested and refined solutions discovered by software engineers over the years and
knowing them can help us disintegrate problems very quickly and efficiently. like for example if we
have a scenario where we are required to notify a certain number of class/clients whenever there is an
event or change in data of a class, we use Observer Pattern.
Types of Design Patterns
Design Patterns can be classified into three broad categories.
1) Creational - what should be the process of object creation in a particular design problem.
2) Structural - what should be the structure of classes/objects, helps you design your class compositions while addressing a particular design problem.
3) Behavioral - how classes should communicate/interact with each other in order to make a design model work.
FlyWeight Pattern (A Creational Design Pattern)
Definition
The flyweight design pattern is used to reduce the memory and resource usage for complex models
containing many hundreds, thousands or even hundreds of thousands of similar objects.In some cases,
Part I
E-MAG – A Pioneer of Knowledge and Entertainment
A giraffe can go without water longer than a camel can. 15
the objects being created may include information that is often duplicated. Where this is true, the
flyweight pattern can be used
When this pattern is applied, the properties of the objects that are shared and are reasonably
unchanging are moved into flyweight objects. For each of the main objects that use the shared data,
only a reference to the appropriate flyweight object is required. This can drastically reduce the
memory used by each of the main objects.
1. Identify shareable state (intrinsic) and non-shareable state (extrinsic)
2. Create a Factory that can return an existing object or a new object
3. The client must use the Factory instead of "new" to request objects
4. The client (or a third party) must provide/compute the extrinsic state
The flyweight design pattern often uses a variation on the factory method pattern for the generation of the shared objects. The factory receives a request for a flyweight instance. If a matching object is already in use, that particular object is returned. If not, a new flyweight is generated. Usually the full set of available flyweight objects is held within the factory in a collection that can be accessed quickly, such as a Hashtable.
Where to use & benefits
Need to instantiate a large amount of small and fine-grained classes.
Need icons to represent object.
An object extrinsic state can be shared by classes.
Reduce the number of objects created, decrease memory footprint and increase performance.
Increase runtime cost associated with transferring, finding, or computing extrinsic data.
Written by: Ali Imran Principal Software Engineer
i2c Inc. California, USA
Alumni MCSF06 PUCIT
E-MAG – A Pioneer of Knowledge and Entertainment
A goldfish has a memory span of three seconds. 16
HHooww RRAAMM wwoorrkkss??
Random access memory (RAM) is the best known form of computer memory. RAM is considered
"random access" because you can access any memory cell directly if you know the row and column
that intersect at that cell.
Similar to a microprocessor, a memory chip is an integrated circuit (IC) made of millions of transistors
and capacitors. In the most common form of computer memory, dynamic random access memory
(DRAM), a transistor and a capacitor are paired to create a memory cell, which represents a single bit
of data.
The capacitor holds the bit of information -- a 0 or a 1. The transistor acts as a switch that lets the
control circuitry on the memory chip read the capacitor or change its state.
RAM stands for Random Access Memory. This means Information can be retrieve and store by the
computer at any order. RAM gives your computer a temporary place to process electronic data.
This means that, RAM chips continue to store information only as long as computer has electrical
power. In other words, when you shut off your computer, all the data stored in RAM are lost.
All actual computing starts with the the CPU (Central Processing Unit). The chipset supports the CPU
and contains several controllers that control how information travels between the CPU and other
components in the PC.
The memory controller is part of the chipset and establishes the information flow between memory
and the CPU.
A bus is a data path that consists of parallel wires and connects the CPU, memory and other devices.
The bus architecture determines how much and how fast data can move around the
motherboard.
The memory bus goes from the memory controller to the computer's memory
sockets. Newer systems have a front side bus (FSB) from the CPU to main
memory and a backside bus (BSB) from the memory controller to L2
cache.
The CPU sends a request to the memory controller to memory and gets
E-MAG – A Pioneer of Knowledge and Entertainment
A hummingbird weighs less than a penny. 17
a report back of when the information will be available. This cycle can vary in length according to
memory speed as well as other factors, such as bus speed.
Residing on the motherboard, the system clock sends a signal to all components, just like a metronome
ticking. Each click of the clock represents a clock cycle. A clock running at 100Mhz represents 100
million clock cycles per second. Every action is timed by the clock where different actions require a
different number of clock cycles.
Many people assume that the speed of the processor is the speed of the computer. Most of the time,
the system bus and other components run at different speeds.
Because all information processed by the CPU is written or read from memory, the performance of a
system is dramatically affected by how fast information can travel between the CPU and memory.
Therefore, faster memory technology contributes greatly to the overall system performance.
Cache memory is a relatively small amount (normally less than 1 MB) of high speed memory and
resides very close to the CPU.
It is designed to supply the CPU with the most frequently requested data. It takes a fraction of the
time, compared to normal memory, to access cache memory.
The concept is that 20% of the time, what is needed is in cache. The cache memory tracks instructions,
putting the most frequent used instruction at the top of the list. Once the cache is full, the lowest need
is dropped.
Today, most cache memory is incorporated in the CPU. It can also be located just outside of the CPU.
Cache that is closest to the CPU is labeled Level 1, the next closest Lever 2, etc.
Interleaving is a process in which the CPU alternates between two or more memory banks. Every time
the CPU addresses a memory bank, the bank needs about one clock cycle to reset. The CPU can save
processing time by addressing a second bank while the first bank is resetting.
Submitted By: Umair Anjum BS Software Engineering
BSEF07A, PUCIT
Reference: http://computer.howstuffworks.com/ram.htm; http://www.ddrsdrammemory.com http://www.computermemoryupgrade.net/how-computer-memory-works.html
E-MAG – A Pioneer of Knowledge and Entertainment
A jellyfish is 95 percent water. 18
TTHHEE EEIIDD DDAAYY
Eid Day is a day of happiness and celebration for Muslims. Muslims celebrate three Eid Days in a year i.e.
Eid-ul-Fitr, Eid-ul-Adha and Eid Milad-un-Nabi (PBUH). The upcoming Eid Day is known as Eid-ul-Fitr.
Eid-Ul-Fitr (the eid day) is a festival that follows the blessed month of Ramadan and falls on the 1st day of
Shawwal, the 10th month in the Hijri (Islamic) calendar. As with all months in the Hijri calendar, it begins
with the sighting of the new moon. It commemorates both a joyous holiday and some sadness due to the
end of the blessed month of Ramadan.
The word Eid is Arabic word which means ‘festivity’ while Fitr means ‘to break the fast’. Fasting is forbidden
on this day, as it marks the end of the month long fast of Ramadan. Muslims all around the world celebrate
this day in almost a same way. They wake up early; dress up nicely with their best cloths; go to the mosques
and offer the special Eid Prayers. After the Eid prayer they greet and embrace each other and exchange the
well wishes.
At the time of this celebration, Muslims never forget their poor fellows. Prior the Eid Prayers, every able
Muslim (who is able to donate) pays Zakat-ul-Fitr to the poor Muslims. Zakat-ul-Fitr is a form of charity
which is given by able Muslims to the poor Muslims to involve then in the celebrations of The Eid Day.
Children are given some special gifts on the Eid Day by their elders and loved ones. These gifts are
commonly known as Eidi. Children are very excited to take their gifts. They enjoy this event with a great
zeal.
Women celebrate this event in a unique way. They start the preparations of Eid Day a night before the Eid
Day, known as Chaand Raat. Chaand Raat (the moon night) is a time of celebration when families and
friends gather in open areas at the end of the last day of Ramadan to spot the new moon, which signals the
arrival of the Islamic month of Shawwal and the day of Eid. Once the moon is sighted, people wish each
other; women and girls decorate their hands and do the last round of shopping.
Eid Day is a God’s gift to the Muslims. It lets the Muslims all around the world to thank God. Eid Day is
celebrated after the most pious month of Islamic calendar i.e. Ramadan. As fasts are observed, in the
month of Ramadan, to purify the souls and experience the feelings of our poor fellows, so we should not
forget our poor fellows at the time of celebrations of Eid Day.
On the behalf of our team, I wish all the Muslim community a
Very Happy Eid Day!
Written By: Ayesha Naeem Mirza Co-editor, E-MAG
E-MAG – A Pioneer of Knowledge and Entertainment
A "jiffy" is an actual unit of time for 1/100th of a second. 19
AA VViissiitt ttoo EEiiffffeell TToowweerr
The Eiffel Tower is an iron tower built during 1887-1889 on the Champ de Mars
beside the Seine River in Paris. The tower has become a global icon of France and is
one of the most recognizable structures in the world. Eiffel Tower is the tallest
building in Paris. More than 200,000,000 people have visited the tower since its
construction in 1889 including 6,719,200 in 2006 making it the most visited paid
monument in the world. Including the 24 m (79 ft) antenna, the structure is 324 m
(1,063 ft) high (since 2000), which is equivalent to about 81 levels in a conventional
building.
Eiffel tower is a land mark of France. Visiting tower is a strange and exciting experience. There are beautiful
grassy garden all around the tower. when I decided to go inside there is a long line to buy entry ticket which is
20 Euro .I have to wait for 30 min to get to the ticketing counter finally I got the ticket and I m inside the tower
.As I enter inside I was amazed to see that there was another line for the lift but
there was another way to the stairs but you have to be enough strong to climb the
stairs I preferred lift .After waiting some time I entered in to the lift and it has a
capacity of 30 peoples lift stared and started to go upwards slowly and I can’t
explain the views from the lift its amazing.
Eiffel tower consist of 2 flours finally I reached the top floor lift opened and we
were all out there was a coffee shop ,a restaurant and a gift shop there was a rush of people in the gift shop to
buy gifts to someone they love. There was a map place there indicating the buildings around the tower.
The upper view was very beautiful. I feel cold there and in a mean while rain started and the atmosphere
becomes very romantic. I also saw a indication board “BEWARE OF THE POCKET THEFT “.
Government of France has placed a board
which indicated the distance of Paris to
other countries like Pakistan (Islamabad) is
5944 Km away.
I spent a long time at the top I have some
coffee and cake there I saw a binoculars
there to view the city it requires 1 Euro to
activate I cativated it and view the city . Finally i decided to leave but I was
again amazed to see that there was again line to the lift and I finally reached the ground floor .it was a really
good experience for me to the Eiffel tower .
Down View of Tower
A View from the top of Tower
Written By: Abdul Salam BS Software Engineering, PUCIT
E-MAG – A Pioneer of Knowledge and Entertainment
A jumbo jet uses 4,000 gallons of fuel to take off. 20
MMyy CCoouunnttrryy
A rich cultured place,
Is the state we live in,
With glorious cool sights,
And wonderful scenes,
A vast range of minerals,
And reflections of heaven,
The open hearted people,
All good and loving,
Our army is the best,
Of all in this reign,
The navy of our country,
Keeps our land sovereign,
The air force full of eagles,
Alert and honoring,
The brave and bright souls,
Whom whole world is saluting,
Braver are their parents,
Who bring up such children?
Eager to serve always,
Their lovely homeland..!
Written By: Qurat ul ain Akram University of the Punjab
E-MAG – A Pioneer of Knowledge and Entertainment
A shark is the only fish that can blink with both eyes. 21
OOnnee TTwwoo BBuucckkllee MMyy SShhooee
One two buckle my shoe
Three, four, knock at the door
Five, six, pickup sticks
Seven, eight, lay them straight
Nine, ten, a big fat hen
Eleven, twelve, dig and delve
Thirteen, fourteen, maids a-courting
Fifteen, sixteen, maids in the kitchen
Seventeen, eighteen, maids in waiting
Nineteen, twenty, my plate's empty
The rhyme is one of many counting-out rhymes. It was first recorded in Songs for the Nursery, published in
London in 1805. This version differed beyond the number twelve, with the lyrics:
Thirteen, fourteen, draw the curtain,
Fifteen sixteen, the maids in the kitchen,
Seventeen, eighteen, she's in waiting,
Nineteen, twenty, my stomach's empty.
A version published five years later in Gammer Gurton's Garland (1810) had the different lines:
Three, four, Lay down lower ...
Eleven twelve, Who will delve...
Fifteen, sixten, Maidsa-kissing...
Nineteen, twenty, My Belly's empty.
According to Henry Bolton, collector of counting rhymes in the 1880s, the rhyme was used in Wrentham,
Massachusetts as early as 1780.
E-MAG – A Pioneer of Knowledge and Entertainment
A sneeze travels out your mouth at over 100 m.p.h. 22
A little girl asked her mother, "How did the human race appear?"
The mother answered, "God made Adam and Eve and they had children, and so was all mankind made.."
Two days later the girl asked her father the same question. The father answered, "Many years ago there were
monkeys from which the human race evolved."
The confused girl returned to her mother and said, "Mom, how is it possible that you told me the human race
was created by God, and Dad said they developed from monkeys?"
The mother answered, "Well, dear, it is very simple. I told you about my side of the family and your father told
you about his."
Marriage is a three ring circus ...
engagement ring, wedding ring and
suffering...
Let’s see how many times you could read the
following text loud and fast?
Pete's pa pete poked to the pea
patch to pick a peck of peas
for the poor pink p ig in the pine
hole p ig-pen. I used to hate weddings; all the
old ladies would prod me and
say “you'll be next!”
They soon stopped that, when I
started saying it to them at
funerals!
The best time to start thinking about
your retirement is before the boss
does. Doctor! I have a serious problem; I can never remember what I just said.
When did you first notice this problem?
What problem?
E-MAG – A Pioneer of Knowledge and Entertainment
Baby robins eat 14 feet of earthworms every day. 23
Scientists have found water on Mars
A woman is walking along a beach when she finds an old oil lamp.
She picks it up and rubs it, and out comes a genie.
The genie says to the woman, "Thank you for freeing me from the oil lamp.
I will grant you three wishes, but whatever you wish for, your horrible ex-husband will get twice as much. What is your first wish?"
The woman says, "I'd like a million dollars in my bank account, please!"
The genie says, "You now have a million dollars in your bank account, and your ex-husband now has two million dollars. What is your second wish?"
The woman says, "I've always wanted a nice car. I'd like a brand new Rolls-Royce, please!"
The genie says, "You now have a new Rolls-Royce in your garage at home, and your ex-husband now has two new Rolls-Royces.
What is your third wish?"
The woman thought for a while and then said, "I'd like you to remove one of my kidneys, please!"
Teacher: Could you please pay a little
attention?
Student: I'm paying as little
attention as I can.
Teacher: Did you father help your
with your homework?
Student: No, he did it all by himself.
E-MAG – A Pioneer of Knowledge and Entertainment
Camel's milk does not curdle. 24
Challenge A:
We’ve an array of integers with name numbers and size 100. We take input from user in this array for all 100
elements. You’ve to simply add logical line of code in the given code such that the given code should display the
sum of all user given numbers. Isn’t it simple? (For full details, see 6th edition of E-MAG)
Challenge B:
You’ve to write a header file magix.h containing a single function named as sum. Your function should receive
some integers as parameters; add them and return their sum. A programmer would simply include your header
file magix.h and call the function sum with as many (integer) parameters as he wants with the given constrains. (For full details, see 6th edition of E-MAG)
Challenge C:
See the given image on the right hand side (BCP.C.1).
This is not only an image, actually there’s something written here with some logic. You’ve
to find out that logic and also guess that what is actually written here with that logic.
You’ve to tell us both the logic and the actual text.
Challenge D:
Three masters of logic (persons with really strong logic) wanted to find out, who is the wisest one.
So they invited the grand master, who took them into a dark room and said: “I will paint each one of you a red
or a blue dot on forehead. When you walk out and you will see at least one red point, hands-up. Who says what
color is the dot on his own forehead as first, wins.” Then he painted only red dots on every one. When they went
out everybody had their hands up and after a while of killing thinking one of them said: “I have a red dot on my
head.” He is correct but how could he be so sure?
For C/C++ Programmers
For C/C++ Programmers
Logic
BCP.C.1
Logic
Submit the Solutions:
Dear Readers!
This is the first package of BIG CHALLENGES which was originally published in the sixth edition of E-MAG. Download the 6th
edition by clicking here.
The solutions will be published in November’s edition of E-MAG with the name of those people who submitted the correct
solutions. You can send your solutions till October 31, 2009 at [email protected]
E-MAG – A Pioneer of Knowledge and Entertainment
Camels have three eyelids to protect themselves from blowing sand. 25
LLooggiiccaall PPuuzzzzlleess
By Saad Ahmed
FLY
Two trains 200 km from each other are moving at the speed of 50 km/hour to encounter. From one
train a fly takes off, flying straight (upon the rails) to the other train at the speed of 75 m/hour,
bounces away from it and flies back to the first train. This is repeated till the trains crash to each other
and the fly is smashed. What distance is the fly able to fly until its judgments moment? (There is a
complicated and an easy way to solve this math brain teaser.)
WIRED EQUATOR
Perimeter of the globe is approximately 40 000 km. If we made a circle of wire around the globe, that is
only 10 metres (so 0,01 km) longer than the perimeter of earth, could a flea, a rabbit or even a man
creep under it?
CLOCK
On every clock we can see that at noon the hour, minute and second hand correctly overlay. In about
one hour and five minutes the minute and hour hand will overlay again. Can you calculate the exact
time (to a millisecond), when it will occur and what angle they will contain with second hand?
MARINE
Captain of a big ship was telling this interesting story: "Once a saw two marines standing on the
opposite sides of the ship. One was looking to the west and the other one to the east. And they saw
each other very well." How can be that possible?
Submit your solutions before September 30, 2009 at [email protected]
Your name would be published in next edition of E-MAG if you submit correct solution.
E-MAG – A Pioneer of Knowledge and Entertainment
Canada is an Indian word meaning "Big Village". 26
Solutions SSUUDDOOKKUU
5 7 2 8 9 1 3 4 6
6 3 1 7 5 4 2 9 8
4 8 9 3 2 6 5 7 1
3 2 4 5 1 8 9 6 7
1 5 7 4 6 9 8 3 2
9 6 8 2 7 3 1 5 4
8 1 3 6 4 5 7 2 9
2 4 5 9 8 7 6 1 3
7 9 6 1 3 2 4 8 5
Correct Solutions Submitted by:
Asma Kaleem - BITS06M023 - PUCIT
M Shuaib Imran - BITF06M004 - PUCIT
Muhammad Irshad Mughal - BS-F07-CSIT-030 - University of Gujrat
Taymoor Khan - BITF06A027 – PUCIT
Well
Done!
E-MAG – A Pioneer of Knowledge and Entertainment
Cats can produce over one hundred vocal sounds, while dogs can only produce about ten. 27
Sudoku is a number placement puzzle. The objective is to place digits in 9 x 9
grids such that digits from 1 to 9 occur once in each row, each column and
each 3 x 3 boxes (blocks). Some numbers are already given at random places.
Player has to fill the remaining boxes according to above constrain.
SSUUDDOOKKUU
7 1 5
2 4
4 8 6 5
6 2 9
3 9 6
2 1 3
7 5 1 9
1 3
3 5 8
Download the preformatted solution file for this Sudoku by clicking here (optional).
Submit your solutions before September 30, 2009 at [email protected]
Your name would be published in next edition of E-MAG if you submit correct solution.
E-MAG – A Pioneer of Knowledge and Entertainment
Honeybees have hair on their eyes. 28
#include <iostream.h>
#include <dos.h>
void main()
{
cout<< “This text will remain on screen until you don’t press some key”;
system(“pause”);
}
#include <iostream.h>
void main()
{
char *ptr[2] = {"Very Good!", "Don't you know the difference between Evens and Odds?"};
int number=0;
cout<<"Enter an even number: ";
cin>>number;
cout<<ptr[ (number & 1) ];
}
PPrrooggrraammmmiinngg CChhaalllleennggeess
By Mian Zeshan Farooqi
1. Prompt the user to enter an even number. If user enters an even number then display “Very Good!”
otherwise display “Don’t you know the difference between Evens and Odds?” There is a restriction in this
problem. You’re not allowed to use if-else statements or a trinary operator. The rest of the problem is quite
simple and clear.
2. You might be aware of the function getch(). getch() and getche() gets a character as an input. Usually we use
these functions to pause the execution of our program. For example we usually use getch() as the last
statement in our program so that user can read the text on output screen and presses some key to
terminate the program. Pause the output without getch() and getche().
Correct Solutions Submitted by:
Taymoor Khan - BITF06A027 – PUCIT
Samia Amjad - BITF08M036 - PUCIT
Well
Done!
Solutions
E-MAG – A Pioneer of Knowledge and Entertainment
Put interesting information here! 1
E-MAG – A Pioneer of Knowledge and Entertainment
Human teeth are almost as hard as rocks. 29
PPrrooggrraammmmiinngg CChhaalllleennggeess
By Mian Zeshan Farooqi
1. Write a function countEvens with the following prototype. The function should take a positive integer
number and return the total number of even numbers between 1 and number (inclusive). You’re not
allowed to use any loop, goto statement or helper function. The following function should fulfil the
requirement alone. See the following examples for more understanding.
Prototype:
int countEvens( int number );
Examples:
Parameter Passed Return Value
2 1
4 2
9 4
10 5
2. You’ve a character array of 256 characters. Prompt the user to enter his Full Name. Without using
cin.getline() or cin.get() take the full name as input in the given array. After that you should display the name
on screen. Its very simple!
void main ()
{
char name[ 256 ];
cout<<”Type your name and press Enter:\t”;
// Write the code to take input here:
cout<<”Welcome ”<<name;
}
Note: Solution will be published in next edition.
Submit your solutions at [email protected] before September 30, 2009.
Your name would be published in next edition of E-MAG if you submit correct solution.
E-MAG – A Pioneer of Knowledge and Entertainment
Human thigh bones are stronger than concrete. 30
Answer GGuueessss tthhee LLooccaattiioonn
Guessed Correctly By:
Abbas Ali Butt - Uraan Software Solutions
Asma Kaleem - BITS06M023 - PUCIT
Asma Wakeel - BCSF06M051 - PUCIT
Khadija Arshad - BITF06M052 - PUCIT
M Ahmed Javed - UET - Lahore
M Shafiq Azam - MCSS07A015 - PUCIT
Sami ur Rehman, University of the Punjab
Quiad-e-Azam Library, Jinnah Garden, Lahore
E-MAG – A Pioneer of Knowledge and Entertainment
"I am." is the shortest complete sentence in the English language. 31
GGuueessss tthhee LLooccaattiioonn
Note: Answer will be published in next edition.
Submit your answer at [email protected] before September 30, 2009.
Your name would be published in next edition of E-MAG if you submit correct answer.
E-MAG – A Pioneer of Knowledge and Entertainment
In England, the Speaker of the House is not allowed to speak. 32
PPoollyymmoorrpphhiissmm –– IInn ddeepptthh
A different perspective on polymorphism
Run Time Polymorphism
Some points to ponder (continued):
11. What happens when we call virtual function inside constructor or destructor? Example:
class base
{
public:
virtual void f()
{
wow(); //if class to f() is from constructor/destructor of //base class then base::wow() Otherwise //derive::wow()
}
virtual void wow() {}
virtual void hi() {}
base()
{
hi(); //base::hi() }
virtual ~base()
{
hi(); //base::hi() }
int bdata;
};
Episode # 4
E-MAG – A Pioneer of Knowledge and Entertainment
Mosquitoes have teeth. 33
class derive : public base
{
public:
virtual void wow() {}
virtual void hi() {}
derive()
{
hi(); //derive::hi() f(); //base::f()
}
virtual ~derive()
{
hi(); //derive::hi()
f(); //base::f() }
int ddata;
};
NOTE Strange let’s look at the layout of v-table construction
When the derive object d2 is created the following layout in memory was constructed (i.e; the base class v-table
part along with derive class v-table part. So, the interesting thing about this figure is that the d2 vptr is pointing to
two different location. Certainly not at a time. Actually when d2 object was being constructed, in
constructor/destructor of base class the d2 vptr was pointing to base class v-table part and other than this vptr
value of d2 object will remain same: pointing to its own derive class v-table part) …….. derive d;
See the table on next page.
E-MAG – A Pioneer of Knowledge and Entertainment
One quarter of the bones in your body, are in your feet. 34
Written by: Fareed ul Hassan Baig Assistant Professor
Punjab University College of Information Technology
University of the Punjab, Lahore
E-MAG – A Pioneer of Knowledge and Entertainment
Only one person in two billion will live to be 116 or older. 35
LLeeaarrnniinngg CC++++ By Mian Zeshan Farooqi
In the last episode we learnt about the for loop. There are two more iteration structures available in C++ i.e.
while loop and do-while loop. Let’s see the while loop first.
The general form of a while loop is as follow:
while( expression ) statement;
The statement may be a single statement or a block of statements. The expression may be any valid expression
as we saw in case of for loop. The control first checks the expression, if it is true then it will execute the loop
statement(s) ; again checks the conditions and so on. If the expression evaluates to false then the loop
statements(s) will not execute. See the following example which prints counting from 1 to 10.
You might have noticed that unlike the for loop, increment is not the part of a while loop.
Now let’s see the last loop structure i.e. do-while loop. The difference between while and do while loop is that
the condition is checked in while loop prior to the execution of loop’s body, in do while loop the loop’s body is
executed first then the condition is checked. This means that the body of do-while loop executes at least once.
The general form of a do-while loop is as follow:
do{ statements } while( expression );
The expression again is any valid expression. The control will first execute the statements immediate after the
do statement; then check the expression, if it evaluates to true then it will again execute the statements (written
before the while statement) check the while expression again and so on.
#include <iostream.h>
void main ()
{
int i = 1;
while( i <= 10 )
{
cout<<i;
i++;
}
}
Episode # 7
E-MAG – A Pioneer of Knowledge and Entertainment
Over 1000 birds a year die from smashing into windows. 36
See the following example:
The above program will prompt the user to enter a negative number. It would must prompt and take the input
at least once . After that if the user enters a negative number then it will move outside the loop and display
“Good Bye” otherwise it will keep on prompting for input of a negative number until the user enters a negative
number.
As we’ve finished with all three loop structures. Now a question arises that which loop should we use, which one
is better than other. The answer is that it is totally depends upon your problem and scenario. Every loop has its
own use, however usually the loops are utilized in the following ways:
for loop is used whenever the number of iterations are known.
while loop is used when the number of iterations are not known (at the time of coding).
do-while loop is used whenever we need to execute the statements at least once.
However these are not the hard and fast rules. You must analyze the scenario and choose the loops which fulfills
your requirements.
#include <iostream.h>
void main ()
{
int number = 0;
do
{
cout<<“Enter a negative number to exit:”;
cin>>number;
}
while( number >= 0 );
cout<<”Good Bye”;
}
Author’s Note: If you need any kind of help regarding C++ then feel
free to contact me at [email protected]
E-MAG – A Pioneer of Knowledge and Entertainment
Owls are one of the only birds who can see the color blue. 37
EExxpplloorree WWiitthh MMee By Mian Zeshan Farooqi
Continue Statement
What:
continue is a keyword of C/C++
Where:
continue statement is used inside the blocks of statements of for, while and do-while loops.
Why:
continue statement is used to force the next iteration of for, while and do-while loops.
How:
continue statement skips all the instruction after it and takes the control back to the conditional expression of
loop in which this statement is written.
Examples:
The above code will print all the odd numbers between 1 and 10. In the above code, the display of variable’s
value is skipped if the value is even. The continue statement is used to skip the successive statement so that no
even number should print in this case.
int i = 0;
while( i <= 10 )
{
i++;
if( i%2 == 0 )
continue;
cout<<i<<endl;
}
E-MAG – A Pioneer of Knowledge and Entertainment
Peanuts are one of the ingredients of dynamite. 38
TTiippss nn TTrriicckkss
Place an image on a folder
1. Right-click the folder you want to add a picture to, and then click Properties.
2. In the Properties dialog box, click the Customize tab.
3. On the Customize tab, click Choose Picture.
4. In the Browse dialog box, click the picture you want to use, and then click Open.
5. Click OK.
When you view the folder using Thumbnails view, Windows displays a thumbnail of the picture you selected.
Add a Location to Send to Menu
When you right-click a file name or a thumbnail in Microsoft Windows XP, you see a shortcut menu for that file.
One of the items on the menu is Send To, which enables you to quickly e-mail a file, copy it to your desktop, or
copy it to a floppy disk.
Sometimes what you really want to do is to save a copy of the file to a specific folder on your computer. If you
have a folder where you frequently place files, you can add that folder’s name to the list of locations on the
Send To menu. This can save you the time of opening another Windows Explorer window and copying the file
from one folder to another. For example, you could create a My Pictures folder and then use the Send To menu
to copy your best pictures to that folder.
1. Click Start. Then, click My Computer.
2. In the My Computer window, click the Tools menu, and then click Folder Options.
3. Click the View tab. Under Hidden files and folders, click Show hidden files and folders, and then click OK.
4. In the My Computer window, double-click Local Disk (C:), double-click Documents and Settings, double-click
your user name, and then double-click SendTo.
5. Click the File menu, click New, and then click Shortcut.
6. The Create Shortcut Wizard appears. Click the Browse button.
7. In the Browse for Folder dialog box, click the folder you want to add to your Send To menu, and then click
OK.
8. Click Next and then Finish.
Now when you right-click a file and click Send To, the destination you selected will be an option on the Send To
menu. You can create shortcuts to local or network programs, files, folders, computers, or Internet addresses.
Courtesy to: Microsoft
E-MAG – A Pioneer of Knowledge and Entertainment
Penguins can jump as high as 6 feet in the air. 39
SSooffttwwaarree ooff tthhee MMoonntthh
Opera Web Browser 10
Opera software has released the third beta of its Opera 10 web browser. Opera 10
introduces a major visual change for Opera fans and brings quite a few new features
to the table, including a visual tab switcher, improved JavaScript performance and a
faster Opera Turbo feature.
The latest beta release adds some more options to what Opera calls “visual tabs.”
Visual tabs show up in the expandable bar just below your browser tabs. Either pull
down the tab bar or double-click the handle to reveal visual thumbnails of all your
open tabs. Previous betas lacked the new visual tab switcher and beta 3 adds a new option to have your tab bar
on either the left or right side of the window. To get to the new options, just right-click the tab bars and chooses
“Customize.”
Opera is also claiming some performance enhancements for the third beta, specifically in JavaScript
performance. While Opera 10 beta 3 felt pretty snappy in our
casual testing, pitting it against Firefox in the SunSpider Javascript
test revealed a considerable performance gap. Firefox 3.5 blazed
through the tests in 1250.6ms, while Opera 10 took 4794.8ms.
While Opera 10 may not have the best JavaScript engine on the
block, it does offer something most other browsers don’t the so-
called Opera Turbo feature which optimizes webpages for slow
connections. Turbo speeds up page loads by routing your requests
through a proxy server, compressing the images and the page code
before serving the pages to you. It was made for mobile users, but
regular desktop users requested it as well, so Opera built it into its flagship desktop browser. Opera 10
reportedly has a much improved version of Turbo, though without a slow connection to test it on, it’s hard to
say how much faster it is in this release.
Opera also continues its pioneering support for web standards. Opera 10 beta 3 scores 100/100 on the Acid3
test and adds support for CSS 3 features like web fonts, RGBA/HSLA color definitions and some SVG rendering
improvements.
Download Link: http://www.opera.com/browser/download
By: Dilawer Hussain
E-MAG – A Pioneer of Knowledge and Entertainment
Q is the only letter in the alphabet that does not appear in the name of any of the United States. 40
UUsseeffuull LLiinnkkss
3dmekanlar
360x180 degrees panoramic photographs of mosques, tombs, inns,
palaces, musea and other buildings, with the screensaver option. You
can visit these unique places: Just download and run the programs.
Once inside the program, move the mouse to the direction you want
to look at. You can use the scroll wheel to zoom in and out. If there is
no intervention for five seconds, the program will start showing you
around automatically. To use the program as your screensaver press
the F5 key. Press F9 to get a list of the 3D sites you downloaded
(residing in the same directory) and load the one you like by moving
the selection with the direction keys and pressing Enter. Click the left
mouse button to jump to the closest (visible) site.
NADRA
NADRA is one of the leading System Integrators in the global
identification sector and boasts extensive experience in designing,
implementing, and operating solutions for corporate and public sector
clients. NADRA offers its clients a portfolio of customizable solutions
for identification, e- governance and secure documents. NADRA has
successfully implemented the Multi- Biometric National Identity Card &
Multi-Biometric e-Passport solutions for Pakistan, Passport Issuing
System for Kenya, Bangladesh High Security Driver’s License, and Civil
Registration Management System for Sudan amongst other projects.
Download.com
Find the software you're looking for at CNET Download.com, the most
comprehensive source for free-to-try software downloads on the Web.
There are reviews and news on the latest softwares.
By: Dilawer Hussain
E-MAG – A Pioneer of Knowledge and Entertainment
Research indicates that mosquitoes are attracted to people who have recently eaten bananas. 41
TThhee CCoonnssttiittuuttiioonn ooff
The Islamic Republic of Pakistan
Article 11: Slavery, forced labour, etc., prohibited
11. Slavery, forced labour, etc., prohibited:
(1) Slavery is non-existent and forbidden and no law shall permit or facilitate its introduction into
Pakistan in any form.
(2) All forms of forced labour and traffic in human beings are prohibited.
(3) No child below the age of Fourteen years shall be engaged in any factory or mine or any other
hazardous employment.
(4) Nothing in this Article shall be deemed to affect compulsory service-
(a) By any person undergoing punishment for an offence against any law; or
(b) required by any law for public purpose:
Provided that no compulsory service shall be of a cruel nature or incompatible with human dignity.
Article 12: Protection against retrospective punishment
12. Protection against retrospective punishment:
(1) No law shall authorize the punishment of a person.
(a) for an act or omission that was not punishable by law at the time of the act or omission; or
(b) for an offence by a penalty greater than, or of a kind different from, the penalty prescribed
by law for that offence at the time the offence was committed.
(2) Nothing in clause (1) or in Article 270 shall apply to any law making acts of abrogation or subversion
of a Constitution in force in Pakistan at any time since the twenty-third day of March, one thousand nine
hundred and fifty-six, an offence.
Episode # 6
E-MAG – A Pioneer of Knowledge and Entertainment
Rubber bands last longer when refrigerated. 42
MMAAGG NNeewwss
August 18, 2009: (PU News) Punjab University College of Information Technology (PUCIT)
Principal Dr Syed Mansoor Sarwar has been appointed as Member Board of Directors of the
National Information & Communication Technology Research & Development (ICT R&D)
Fund Company. He will represent academia in this important national body. The Prime
Minister Yousaf Raza Gillani made the appointment at the recommendation of the Ministry
of IT.
The National ICT R&D Fund Company was established with the vision to transform the country into a knowledge-
based economy by funding efficient and sustainable ICT based research and development initiatives by
academia, preferably in collaboration with the IT industry. The company runs through funds from the Federal
Government, collected from the telecommunication companies in the country.
Dr Sarwar received his BSEE degree from UET, Lahore, and MS as well as PhD degrees in Computer Engineering
from the Iowa State University, US.
Dr Sarwar joined Punjab University in April, 2006 as Principal College of Information Technology. He started his
academic career in April 1982 as a Lecturer Department of Electrical Engineering, University of Engineering and
Technology (UET), Lahore. He has also served at UMT as Professor of Computer Science, Lahore University of
Management Sciences (LUMS), University of Portland’s Electrical Engineering and Computer Science
Department, Department of Electrical and Computer Engineering Kuwait University and Pak-American Institute
of Management Sciences, Lahore.
Dr Sarwar has 19 scholarly publications to his credit and has co-authored four books in the area of operating
systems. His most recent book, UNIX: The Textbook, 2nd Ed., was published on July 22, 2004. Dr. Sarwar's other
books included UNIX: The Textbook, 1st Ed.; LINUX: The Textbook and LINUX and UNIX Programming Tools: A
Primer for Software Developers. All of his books were published by Addison Wesley, Boston, USA. His books are
being used as textbooks in over 100 universities and colleges in the US, including University of Texas at Austin,
University of North Carolina at Chapel Hill, University of Arizona , Stevens Tech, University of California at Santa
Barbara and Syracuse University . His books have also been translated into the Chinese and Spanish languages
and are being used as textbooks in various universities in China, Spain and Mexico.
Dr Sarwar is also member of Electrical and Electronics Engineers (IEEE), Punjab IT Board (PITB), Higher Education
Commission's (HEC) National Committee for Standardization of Science Labs and HEC 's National Committee for
Review of the Computer Science Curriculum.
PUCIT: Classes of Fall 2009 semester will start on September 7, 2009.
Dr Syed Mansoor Sarwar
NNoottiicceess
If you are a good writer or a good poet and want to write for E-MAG then
you can send us your stuff at [email protected] If you like to share
some article or other stuff from your collection then you must mention
the name of original writer or poet.
Send us your feed backs at [email protected] or fill the online
feedback form at http://www.emagportal.com
If you want to communicate with any of the writers then send us your
message at same address and we’ll forward your message to the
respective person.
You can download E-MAG from http://www.emagportal.com or you can
also subscribe to our mailing list to receive a copy of E-MAG every month.
Some supporting files like WinRAR, Adobe Acrobat Reader, and other
supporting files which are discussed in articles are available at
http://www.emagportal.com
Website: http://www.emagportal.com
Email: [email protected]
This is the last page of E-MAG and has been left blank intentionally.
E-MAG is designed by: Mian Zeshan Farooqi