School Presentations

download School Presentations

of 65

Transcript of School Presentations

  • 8/14/2019 School Presentations

    1/65

    CYBER CRIME

  • 8/14/2019 School Presentations

    2/65

    What is CybercrimeWhat is Cybercrime

    Crimes committed through the

    use of computer or the Internet

    or in any other unfair means.e.g. Drugs, Terrorism,

    Money Extortion, ChildPornography

  • 8/14/2019 School Presentations

    3/65

    CybercrimeCybercrime

    Unauthorized AccessUnauthorized Access

    Software PiracySoftware Piracy

    Spreading VirusSpreading Virus

    Objectionable MaterialsObjectionable Materials

    Anonymous MailsAnonymous Mails

    SPAMSPAM

  • 8/14/2019 School Presentations

    4/65

    HiHi--Tech CrimeTech Crime

    Generally committed byGenerally committed byintelligent, computer literateintelligent, computer literate

    and informed individualsand informed individualsThere is a need to amendThere is a need to amend

    current laws in order tocurrent laws in order to

    handle the Hihandle the Hi--Tech CrimesTech Crimes

  • 8/14/2019 School Presentations

    5/65

    Scope of the ProblemScope of the Problem

    Cyber crime is a global problemCyber crime is a global problem Statistics on such crime cannotStatistics on such crime cannot

    accurately highlight itaccurately highlight its gravity .s gravity .

    Criminals can route their activitiesCriminals can route their activitiesthrough countries where jurisdictionalthrough countries where jurisdictionalprocess and legal problems can makeprocess and legal problems can makeinvestigation difficult.investigation difficult.

  • 8/14/2019 School Presentations

    6/65

    CybercrimeCybercrimeUnauthorized AccessUnauthorized Access

    HackingHackingWeb sites also can be HackedWeb sites also can be Hacked

    Breaking of Computer SecurityBreaking of Computer Security Breaking Passwords and Access CodesBreaking Passwords and Access Codes

    Copying Important InformationCopying Important Information Secret DocumentsSecret Documents

    Software and Source ProgramsSoftware and Source Programs

    Bank Accounts :Bank Accounts : Money Laundering, Credit Card FraudMoney Laundering, Credit Card Fraud

  • 8/14/2019 School Presentations

    7/65

    Unauthorized Access (contd.)Unauthorized Access (contd.)

    Password Sniffers:Password Sniffers:Computer programs that monitor andComputer programs that monitor and

    record the name and password ofrecord the name and password of

    network users as they login, can benetwork users as they login, can beimpersonated .impersonated .

    SpoofingSpoofing

    Act of disguising one computerAct of disguising one computerelectronically to pretend it to beelectronically to pretend it to beanother oneanother one

  • 8/14/2019 School Presentations

    8/65

    CybercrimeCybercrimeSoftware PiracySoftware Piracy

    Illegal Use, Copy, Distribution orIllegal Use, Copy, Distribution orSell of Computer SoftwareSell of Computer Software

    Prohibited by LawProhibited by Law

    But few Raids has been made so farBut few Raids has been made so farin Indiain India

    Software companies are interestedSoftware companies are interestedto make a large illegal user legalto make a large illegal user legalrather than taking them to therather than taking them to the

    courtscourts

  • 8/14/2019 School Presentations

    9/65

    Losses Suffered byLosses Suffered byCompaniesCompanies

    Country % of Piracy Losses (M. Dollar)

    Australia 45 160

    Brazil 80 91

    France 73 1200

    Germany 62 1000India 68 40

    Italy 86 550

    Japan 92 3000

    Korea 82 648

    Mexico 85 206Singapore 41 24

    Spain 86 362

    United Kingdom 54 685

    United States 35 1900Source : NASSCOM

  • 8/14/2019 School Presentations

    10/65

    Remedies to PiracyRemedies to Piracy

    Hardware Lock and Software Lock .Hardware Lock and Software Lock . Educating Users on Perils of PiracyEducating Users on Perils of Piracy

    Sending MailsSending Mails

    Stickers :Stickers : Copy Software Illegally and you could getCopy Software Illegally and you could getthis Hardware Absolutely Freethis Hardware Absolutely Free (with picture of(with picture ofhandcuffs)handcuffs)

    Conducting SeminarsConducting Seminars

    Surprise Raids (NASSCOM)Surprise Raids (NASSCOM) Supplying Legal Software at reasonableSupplying Legal Software at reasonable

    costcost

  • 8/14/2019 School Presentations

    11/65

    CybercrimeCybercrimeVirus AttacksVirus Attacks

    Self Replicating Program orSelf Replicating Program orProgram Segment which normallyProgram Segment which normallyharm the functioning of anharm the functioning of an

    otherwise wellotherwise well--behaved Computerbehaved Computer First virus : CFirst virus : C--Brain and Ashar :Brain and Ashar :

    were released by two Pakistaniwere released by two Pakistanibrothers in 1987brothers in 1987

  • 8/14/2019 School Presentations

    12/65

    Categories of Virus:Categories of Virus:

    Boot Sector VirusBoot Sector Virus

    Partition Table VirusPartition Table Virus

    File VirusFile Virus

    Email VirusEmail Virus

  • 8/14/2019 School Presentations

    13/65

    Some Common VirusSome Common Virus

    Die Hard 2Die Hard 2 Increases each Executable File size by 4000 bytesIncreases each Executable File size by 4000 bytes

    Monkey VirusMonkey Virus Corrupt the Partition TableCorrupt the Partition Table

    CharasCharas Corrupts the File Allocation TableCorrupts the File Allocation Table

    Friday the 13thFriday the 13th

    Formats the whole Hard Disk on a Friday, which is also 13thFormats the whole Hard Disk on a Friday, which is also 13thof a monthof a month

    Polymorphic VirusPolymorphic Virus Changes Signature on ReplicatingChanges Signature on Replicating

  • 8/14/2019 School Presentations

    14/65

    Email VirusEmail Virus

    I Love YouI Love You(Love bug)(Love bug)

    Happy 99 .Happy 99 .

  • 8/14/2019 School Presentations

    15/65

    Remedies to VirusRemedies to Virus

    Careful Usage of FloppiesCareful Usage of FloppiesUse WriteUse Write--Protect TagsProtect Tags

    Use of Legal Software onlyUse of Legal Software onlyCleaning by recent VaccinesCleaning by recent Vaccines

    Live Update of AntiLive Update of Anti--virusvirusSoftwareSoftware

  • 8/14/2019 School Presentations

    16/65

    Some wellSome well--knownknownVaccinesVaccines

    Norton AntiNorton Anti--VirusVirus

    NashNash--softsoft

    Smart DogSmart Dog

    AVGAVG

    Red AlertRed Alert

  • 8/14/2019 School Presentations

    17/65

    CybercrimeCybercrimeObjectionable MaterialsObjectionable Materials

    PornographyPornography Explicit Sexual Materials (Text and/orExplicit Sexual Materials (Text and/or

    Pictures)Pictures)

    Enters Countries where they are prohibitedEnters Countries where they are prohibitedby Lawby Law

    Hate materialsHate materials

    Racist Views against some caste, creed,Racist Views against some caste, creed,country or religioncountry or religion

    Remedies :Remedies : CyberCopsCyberCops ..

  • 8/14/2019 School Presentations

    18/65

    CybercrimeCybercrimeAnonymous MailsAnonymous Mails

    Here the header part of the message isHere the header part of the message isstripped offstripped off

    Originally was created for deservingOriginally was created for deserving

    candidatescandidates e.g. for users who wish to criticize/expose some sociale.g. for users who wish to criticize/expose some social

    evil without disclosing their identityevil without disclosing their identity

    victims of abuses of some powerful miscreantsvictims of abuses of some powerful miscreants

    Being also used by cybercriminalsBeing also used by cybercriminals e.g. To mail copyrighted books, software programse.g. To mail copyrighted books, software programs

  • 8/14/2019 School Presentations

    19/65

    Encrypted MessagesEncrypted Messages

    Used by professionals/officers to protect theUsed by professionals/officers to protect thesecrecy of academic/official documents etc.secrecy of academic/official documents etc.

    A practical equivalent of using trained secretA practical equivalent of using trained secret--agent couriersagent couriers

    Being used also by criminals, terroristBeing used also by criminals, terroristorganizations !organizations !

    A simple picture file or a music may beA simple picture file or a music may be

    anything starting from a love letter, to aanything starting from a love letter, to ablackmail note, to a complex money launderingblackmail note, to a complex money launderinginstruction, to military secretsinstruction, to military secrets

  • 8/14/2019 School Presentations

    20/65

    Credit Card FraudCredit Card Fraud

    The U.S. secret serviceThe U.S. secret servicebelieves that half a billionbelieves that half a billion

    dollars may be lost annuallydollars may be lost annuallyby consumers who haveby consumers who havecredit card numbers stolencredit card numbers stolenfrom onfrom on--line data bases.line data bases.

  • 8/14/2019 School Presentations

    21/65

    Some Incidents:Some Incidents:

    1)An engineer working in a large bank1)An engineer working in a large bankreprograms the bank account handlingreprograms the bank account handlingcomputer program, so that each day a trifle sumcomputer program, so that each day a trifle sumof money, say $ 3 is credited from some largeof money, say $ 3 is credited from some large

    bank account to one kept under a false name,bank account to one kept under a false name,but actually belonging to him.but actually belonging to him.

    2)The personal secretary to the president of a2)The personal secretary to the president of asuccessful multinational company decodes allsuccessful multinational company decodes all

    the passwords and access codes, changes andthe passwords and access codes, changes andencrypts important money related files andencrypts important money related files andthereafter starts blackmailing the boss.thereafter starts blackmailing the boss.

  • 8/14/2019 School Presentations

    22/65

    Some Incidents (contd.):Some Incidents (contd.):

    3)A nine year old internet user got3)A nine year old internet user gothypnotized by his cyberhypnotized by his cyber--friend andfriend andcajoled to divulge his fathercajoled to divulge his fathers credit cards credit card

    particulars.particulars. 4)In Britain, details of the committal4)In Britain, details of the committal

    proceedings in a trial in court wereproceedings in a trial in court werereleased in Febreleased in Feb95 on an Internet95 on an Internetdiscussion forum. Any newspaper doingdiscussion forum. Any newspaper doingso would be charged with contempt ofso would be charged with contempt ofcourt.court.

  • 8/14/2019 School Presentations

    23/65

    Created By : PRAKASH AGARWAL & RAMBALAK SHARMA

  • 8/14/2019 School Presentations

    24/65

    DATABASE MANAGEM

    SYSTEM

  • 8/14/2019 School Presentations

    25/65

    CONTENTS

    INTRODUCTION ADVANTAGES OF DATABASE

    EXAMPLES OF DATABASE

    DATA ABSTRACTION

    DATA MODELS

    NORMALIZATION

  • 8/14/2019 School Presentations

    26/65

    INTRODUCTION

    A database system is basically a combased record keeping system.

    It maintains information that is necess

    the decision making processes involv

    the management of an organization.

    The intention of a database is that thecollection of data should serve as ma

    applications as possible.

  • 8/14/2019 School Presentations

    27/65

    ADVANTAGES OF DATABA

    Data redundancy :In database all theare kept at one place and all the appli

    that require data refer to the centrally

    maintained database,thus avoidingduplication of database.

    Sharing of data : In database individu

    pieces of data may be shared among s

    different users.

  • 8/14/2019 School Presentations

    28/65

    Contd....

    Data security : DBMS ensures data seby ensuring that the only means of ac

    the database is through proper channe

    Atomicity : DBMS considers all thetransactions as atoms, thus efficiently

    handling power failures .

  • 8/14/2019 School Presentations

    29/65

    EXAMPLES OF DBM

    Some examples of DBMS software ar FoxPro

    Microsoft Access

    Sybase

    Oracle

  • 8/14/2019 School Presentations

    30/65

    DATA ABSTRACTIO

    Data Abstraction : It is the mechanisextracting the essential part of the dat

    suppressing the unnecessary part for t

    current environment. DBMS provide the users only that mu

    information that is required by them a

    does not disclose all the details of the

    by data abstraction.

  • 8/14/2019 School Presentations

    31/65

    LEVELS OF DATABA

    The various levels of database are : Internal Level : At this level , comple

    level data structures are described in

    Conceptual Level : At this level , the

    database is described logically in ter

    simple data structures. View Level : At this level , only selec

    attributes are visible to the user.

  • 8/14/2019 School Presentations

    32/65

    DATA MODELS

    OBJECT BASED LOGICAL

    MODELS

    RECORD BASED LOGICAL

    MODELS

    PHYSI

    M

    DATA MODELS

  • 8/14/2019 School Presentations

    33/65

    RECORD BASED MOD

    Relational Model Network Model Hierarchic

    Record Based

    Models

  • 8/14/2019 School Presentations

    34/65

    RECORD BASED MOD

    The various types of record based logmodels are :

    Relational Model: In this model, data

    relationship among data are representa set of tables .

    Network Model : In this model, the thcollection of records are connected to

    another by means of links.

  • 8/14/2019 School Presentations

    35/65

    Contd...

    Hierarchical Model : In this model, threcords are organized as trees rather t

    arbitrary graphs.

  • 8/14/2019 School Presentations

    36/65

    NORMALIZATION

    Normalization: It is a database designtechnique which is used to minimize

    database anomalies.

    1NF: A relation is said to be in 1NF ithe attributes in it are atomic.

    2NF: A relation is said to be in 2NF iin 1NF and all non key attributes are

    functionally dependent on key attribu

  • 8/14/2019 School Presentations

    37/65

    Contd...

    3NF: A relation is said to be in 3NF iin 2NF and every non key attribute is

    transitively dependent upon the prima

    key. BCNF: A relation is said to be in BC

    in 3NF and every determinant in the t

    a candidate key.

  • 8/14/2019 School Presentations

    38/65

    SOME DISADVANTAG

    Some disadvantages of DBMS are : Extra hardware may be required.

    System is likely to be complex.

    Performance overhead may be signifi

    Security may be compromised withou

    controls.

  • 8/14/2019 School Presentations

    39/65

    APPLICATIONS OF DB

    Some applications of DBMS are: Educational institutions

    Railway Reservations

    Hospitals

    Offices

  • 8/14/2019 School Presentations

    40/65

    THANK YOU

    BY PRAKASH & R

  • 8/14/2019 School Presentations

    41/65

    GENERATIOGENERATIOGENERATIOGENERATIO

    OFOFOFOF

    COMPUTERCOMPUTERCOMPUTERCOMPUTER

  • 8/14/2019 School Presentations

    42/65

    ABACUSABACUSABACUSABACUS Abacus is the firstAbacus is the firstAbacus is the firstAbacus is the first

    calculating device .calculating device .calculating device .calculating device .

    This device wasThis device wasThis device wasThis device was

    developed in Chinadeveloped in Chinadeveloped in Chinadeveloped in China

    during 5000 B.C.during 5000 B.C.during 5000 B.C.during 5000 B.C.

    Abacus has a frameAbacus has a frameAbacus has a frameAbacus has a frame

    with beads strung onwith beads strung onwith beads strung onwith beads strung on

    wire rods .wire rods .wire rods .wire rods .

    ArithmeticArithmeticArithmeticArithmetic

    calculations arecalculations arecalculations arecalculations are

    performed byperformed byperformed byperformed by

    manipulating themanipulating themanipulating themanipulating the

    beads .beads .beads .beads .

  • 8/14/2019 School Presentations

    43/65

    NAPIERNAPIERNAPIERNAPIERS BONESS BONESS BONESS BONES

    It was devised by JohnIt was devised by JohnIt was devised by JohnIt was devised by JohnNapier in 1617 .Napier in 1617 .Napier in 1617 .Napier in 1617 .

    It consist of a set ofIt consist of a set ofIt consist of a set ofIt consist of a set of

    eleven bones , eacheleven bones , eacheleven bones , eacheleven bones , eachbone has four facesbone has four facesbone has four facesbone has four faces

    with numberswith numberswith numberswith numbers

    inscribed on them .inscribed on them .inscribed on them .inscribed on them .

    It could calculateIt could calculateIt could calculateIt could calculate

    products andproducts andproducts andproducts and

    quotients of largequotients of largequotients of largequotients of large

    numbers .numbers .numbers .numbers .

  • 8/14/2019 School Presentations

    44/65

    PASCALPASCALPASCALPASCALS ARITHMETICS ARITHMETICS ARITHMETICS ARITHMETICENGINEENGINEENGINEENGINE

    It was devised by Blaise Pascal inIt was devised by Blaise Pascal inIt was devised by Blaise Pascal inIt was devised by Blaise Pascal in It had a complex arrangement ofIt had a complex arrangement ofIt had a complex arrangement ofIt had a complex arrangement of

    and gears and windows for displaand gears and windows for displaand gears and windows for displaand gears and windows for displa

    numbers .numbers .numbers .numbers . It was the first successful mechaIt was the first successful mechaIt was the first successful mechaIt was the first successful mecha

    calculatorcalculatorcalculatorcalculator ....

  • 8/14/2019 School Presentations

    45/65

    BABBAGEBABBAGEBABBAGEBABBAGES ANALYTICALS ANALYTICALS ANALYTICALS ANALYTICALENGINEENGINEENGINEENGINE

    It was designed by CharlesIt was designed by CharlesIt was designed by CharlesIt was designed by CharlesBabbage its design all theBabbage its design all theBabbage its design all theBabbage its design all the

    fundamental concepts of digitalfundamental concepts of digitalfundamental concepts of digitalfundamental concepts of digital

    computers .computers .computers .computers .

    It had a great significance in theIt had a great significance in theIt had a great significance in theIt had a great significance in the

    history of computer because it hadhistory of computer because it hadhistory of computer because it hadhistory of computer because it had

    in its design all the fundamentalin its design all the fundamentalin its design all the fundamentalin its design all the fundamental

    concepts of digital computers .concepts of digital computers .concepts of digital computers .concepts of digital computers .

    This made Babbage earn the nameThis made Babbage earn the nameThis made Babbage earn the nameThis made Babbage earn the name

    Father Of Modern ComputerFather Of Modern ComputerFather Of Modern ComputerFather Of Modern Computer ....

  • 8/14/2019 School Presentations

    46/65

    FIRST GENERATION ( 1945FIRST GENERATION ( 1945FIRST GENERATION ( 1945FIRST GENERATION ( 1945----1111

    Characteristics of FirstCharacteristics of FirstCharacteristics of FirstCharacteristics of First

    Generation of computers :Generation of computers :Generation of computers :Generation of computers : ----

    VacuumVacuumVacuumVacuum----tube circuits .tube circuits .tube circuits .tube circuits .

    Punched cards .Punched cards .Punched cards .Punched cards .

    Required machine languageRequired machine languageRequired machine languageRequired machine language

    programmingprogrammingprogrammingprogramming

    Generated considerable heat .Generated considerable heat .Generated considerable heat .Generated considerable heat . Limited internal storage capacity .Limited internal storage capacity .Limited internal storage capacity .Limited internal storage capacity .

    Eg. ENIAC , EDVAC , EDSAC , UNIVAC IEg. ENIAC , EDVAC , EDSAC , UNIVAC IEg. ENIAC , EDVAC , EDSAC , UNIVAC IEg. ENIAC , EDVAC , EDSAC , UNIVAC I

    SECOND GENERATION ( 195SECOND GENERATION ( 195SECOND GENERATION ( 195SECOND GENERATION ( 195

  • 8/14/2019 School Presentations

    47/65

    SECOND GENERATION ( 195SECOND GENERATION ( 195SECOND GENERATION ( 195SECOND GENERATION ( 195

    Characteristics of SecondCharacteristics of SecondCharacteristics of SecondCharacteristics of Second

    Generation of Computers:Generation of Computers:Generation of Computers:Generation of Computers:----

    Transistor circuits .Transistor circuits .Transistor circuits .Transistor circuits . MagneticMagneticMagneticMagnetic----core primarycore primarycore primarycore primary

    storage .storage .storage .storage .

    HighHighHighHigh----level procedurallevel procedurallevel procedurallevel procedurallanguages .languages .languages .languages .

    Less heat generated .Less heat generated .Less heat generated .Less heat generated .

    Development of magnetic diskDevelopment of magnetic diskDevelopment of magnetic diskDevelopment of magnetic diskstorage .storage .storage .storage .

    Eg. IBMEg. IBMEg. IBMEg. IBM----700 , IBM700 , IBM700 , IBM700 , IBM----1401 , ICL 19011401 , ICL 19011401 , ICL 19011401 , ICL 1901

  • 8/14/2019 School Presentations

    48/65

    THIRD GENERATION ( 1966THIRD GENERATION ( 1966THIRD GENERATION ( 1966THIRD GENERATION ( 1966---- Characteristics of ThirdCharacteristics of ThirdCharacteristics of ThirdCharacteristics of Third

    Generation of Computers :Generation of Computers :Generation of Computers :Generation of Computers :----

    Integrated circuits .Integrated circuits .Integrated circuits .Integrated circuits .

    Better storage devices (tapes) .Better storage devices (tapes) .Better storage devices (tapes) .Better storage devices (tapes) .

    Faster than previousFaster than previousFaster than previousFaster than previous

    generations .generations .generations .generations .

    Multi programming operatingMulti programming operatingMulti programming operatingMulti programming operating

    system .system .system .system .

    Development of mini computers .Development of mini computers .Development of mini computers .Development of mini computers .

    Eg. IBM 360 , IBM 370 , NCR 395 .Eg. IBM 360 , IBM 370 , NCR 395 .Eg. IBM 360 , IBM 370 , NCR 395 .Eg. IBM 360 , IBM 370 , NCR 395 .

  • 8/14/2019 School Presentations

    49/65

    FOURTH GENERATION ( 1981FOURTH GENERATION ( 1981FOURTH GENERATION ( 1981FOURTH GENERATION ( 1981

    Characteristics of FourthCharacteristics of FourthCharacteristics of FourthCharacteristics of Fourth

    Generation of Computers :Generation of Computers :Generation of Computers :Generation of Computers :----

    SSI/LSI/VLSI .SSI/LSI/VLSI .SSI/LSI/VLSI .SSI/LSI/VLSI .

    SemiSemiSemiSemi----conductor primaryconductor primaryconductor primaryconductor primarystorage .storage .storage .storage .

    Development of electronicDevelopment of electronicDevelopment of electronicDevelopment of electronic

    spreadsheets .spreadsheets .spreadsheets .spreadsheets . Microprocessors used .Microprocessors used .Microprocessors used .Microprocessors used .

    Faster speed of processing .Faster speed of processing .Faster speed of processing .Faster speed of processing .

    EgEgEgEg. PENTIUM , POWER PC .. PENTIUM , POWER PC .. PENTIUM , POWER PC .. PENTIUM , POWER PC .

  • 8/14/2019 School Presentations

    50/65

    FUTURE GENERATIONFUTURE GENERATIONFUTURE GENERATIONFUTURE GENERATION

    Characteristics of Future GeneratCharacteristics of Future GeneratCharacteristics of Future GeneratCharacteristics of Future GeneratComputers :Computers :Computers :Computers :----

    Use of semiUse of semiUse of semiUse of semi----conductors .conductors .conductors .conductors .

    Parallel processing .Parallel processing .Parallel processing .Parallel processing .

  • 8/14/2019 School Presentations

    51/65

  • 8/14/2019 School Presentations

    52/65

    INTRODUCTION

    MANY OF US DO NOT KNOW OUR OWNMANY OF US DO NOT KNOW OUR OWNMANY OF US DO NOT KNOW OUR OWNMANY OF US DO NOT KNOW OUR OWNBIRTHDAY & OTHER IMPORTANTBIRTHDAY & OTHER IMPORTANTBIRTHDAY & OTHER IMPORTANTBIRTHDAY & OTHER IMPORTANT

    DAYS .DAYS .DAYS .DAYS .

    THIS METHOD ENABLES US TO FINDTHIS METHOD ENABLES US TO FINDTHIS METHOD ENABLES US TO FINDTHIS METHOD ENABLES US TO FIND

    THE DAY OF ANY DESIRED DATE BYTHE DAY OF ANY DESIRED DATE BYTHE DAY OF ANY DESIRED DATE BYTHE DAY OF ANY DESIRED DATE BY

    USING YEAR, MONTH, & WEEK CODES.USING YEAR, MONTH, & WEEK CODES.USING YEAR, MONTH, & WEEK CODES.USING YEAR, MONTH, & WEEK CODES.

  • 8/14/2019 School Presentations

    53/65

    PERIODICITY

    ALL CALENDARS ARE PERIODIC INALL CALENDARS ARE PERIODIC INALL CALENDARS ARE PERIODIC INALL CALENDARS ARE PERIODIC INNATURE .NATURE .NATURE .NATURE .

    EVERY 29EVERY 29EVERY 29EVERY 29ththththYEAR REPEATS 1YEAR REPEATS 1YEAR REPEATS 1YEAR REPEATS 1ststststYEARYEARYEARYEAR

  • 8/14/2019 School Presentations

    54/65

    BASIC FORMULA

    THE BASIC FORMULA FOR IT IS :THE BASIC FORMULA FOR IT IS :THE BASIC FORMULA FOR IT IS :THE BASIC FORMULA FOR IT IS : STEP ISTEP ISTEP ISTEP I ---- MATCH THE YEAR CODEMATCH THE YEAR CODEMATCH THE YEAR CODEMATCH THE YEAR CODE

    STEP IISTEP IISTEP IISTEP II ---- MATCH MONTH CODE AND DIVIDE ITMATCH MONTH CODE AND DIVIDE ITMATCH MONTH CODE AND DIVIDE ITMATCH MONTH CODE AND DIVIDE IT

    BY 7 (Constant) .BY 7 (Constant) .BY 7 (Constant) .BY 7 (Constant) .

    THE DAY IS DETERMINED ACCORDING TO THETHE DAY IS DETERMINED ACCORDING TO THETHE DAY IS DETERMINED ACCORDING TO THETHE DAY IS DETERMINED ACCORDING TO THE

    REMAINDER .REMAINDER .REMAINDER .REMAINDER .

    210 CALENDARS

  • 8/14/2019 School Presentations

    55/65

    210 CALENDARS

    YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C

    1801 5 1831 7 1861 3 1891 5 1921 7 1951 2 1981 5

    1802 6 1832 1 1862 4 1892 6 1922 1 1952 3 1982 6

    1803 7 1833 3 1863 5 1893 1 1923 2 1953 5 1983 7

    1804 1 1834 4 1864 6 1894 2 1924 3 1954 6 1984 1

    1805 3 1835 5 1865 1 1895 3 1925 5 1955 7 1985 3

    1806 4 1836 6 1866 2 1896 4 1926 6 1956 1 1986 4

    1807 5 1837 1 1867 3 1897 6 1927 7 1957 3 1987 5

    1808 6 1838 2 1868 4 1898 7 1928 1 1958 4 1988 6

    1809 1 1839 3 1869 6 1899 1 1929 3 1959 5 1989 1

    1810 2 1840 4 1870 7 1900 2 1930 4 1960 6 1990 2

    1811 3 1841 6 1871 1 1901 3 1931 5 1961 1 1991 3

    1812 4 1842 7 1872 2 1902 4 1932 6 1962 2 1992 4

    1813 6 1843 1 1873 4 1903 5 1933 1 1963 3 1993 6

    1814 7 1844 2 1874 5 1904 6 1934 2 1964 4 1994 7

    1815 1 1845 4 1875 6 1905 1 1935 3 1965 6 1995 1

    1816 2 1846 5 1876 7 1906 2 1936 4 1966 7 1996 2

    1817 4 1847 6 1877 2 1907 3 1937 6 1967 1 1997 4

    1818 5 1848 7 1875 3 1908 4 1938 7 1968 2 1998 5

    1819 6 1849 2 1879 4 1909 6 1939 1 1969 4 1999 6

    1820 7 1850 3 1880 5 1910 7 1940 2 1970 5 2000 7

    1821 2 1851 4 1881 7 1911 1 1941 4 1971 6 2001 2

    1822 3 1852 5 1882 1 1912 2 1942 5 1972 7 2002 3

    1823 4 1853 7 1883 2 1913 4 1943 6 1973 2 2003 4

    1824 5 1854 1 1884 3 1914 5 1944 7 1974 3 2004 5

    1825 7 1855 2 1885 5 1915 6 1945 2 1975 4 2005 7

    1826 1 1856 3 1886 6 1916 7 1946 3 1976 5 2006 1

    1827 2 1857 5 1887 7 1917 2 1947 4 1977 7 2007 2

    1828 3 1858 6 1888 1 1918 3 1948 5 1978 1 2008 3

    1829 5 1859 7 1889 3 1919 4 1949 7 1979 2 2009 5

    1830 6 1860 1 1890 4 1920 5 1950 1 1980 3 2010 6

    YEARS ALONG WITH YEAR CODE

    CODES FOR EVERY MONTH AND WEEK

  • 8/14/2019 School Presentations

    56/65

    MONTH CODES

    1 6 2 2 5 0 3 5 1 4 6 2 4

    2 0 3 3 6 1 4 6 2 5 0 3 5

    3 1 4 4 0 2 5 0 3 6 1 4 6

    4 2 5 5 1 3 6 1 4 0 2 5 0

    5 3 6 6 2 4 0 2 5 1 3 6 1

    6 4 0 0 3 5 1 3 6 2 4 0 27 5 1 1 4 6 2 4 0 3 5 1 3

    WEEK CODES

    SUNDAY : 0

    MONDAY : 1

    TUESDAY : 2

    WEDNESDAY : 3

    THURSDAY : 4

    FRIDAY : 5

    SATURDAY : 6

    CALENDAR JAN FEB MA APR MAY JUNE JULY AUG SEP OCT NOV DEC

  • 8/14/2019 School Presentations

    57/65

    CALCULATIONS WITH EXAMPLESCALCULATIONS WITH EXAMPLESCALCULATIONS WITH EXAMPLESCALCULATIONS WITH EXAMPLES

    EXAMPLE 1EXAMPLE 1EXAMPLE 1EXAMPLE 1 15151515ththththAUGUST 1947AUGUST 1947AUGUST 1947AUGUST 1947

    YEAR CODE=4YEAR CODE=4YEAR CODE=4YEAR CODE=4

    MONTH CODE=4MONTH CODE=4MONTH CODE=4MONTH CODE=4

    SO, (SO, (SO, (SO, ( 15+415+415+415+4 ) / 7) / 7) / 7) / 7

    REMAINDERREMAINDERREMAINDERREMAINDER= 5= 5= 5= 5 THEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT IS FRIDAY .FRIDAY .FRIDAY .FRIDAY . (Contd.)(Contd.)(Contd.)(Contd.)

  • 8/14/2019 School Presentations

    58/65

    (Contd.)

    EXAMPLE 2EXAMPLE 2EXAMPLE 2EXAMPLE 2 23/01/1897 (NETAJI23/01/1897 (NETAJI23/01/1897 (NETAJI23/01/1897 (NETAJIS DATE OF BIRTH)S DATE OF BIRTH)S DATE OF BIRTH)S DATE OF BIRTH)

    YEAR CODE=06YEAR CODE=06YEAR CODE=06YEAR CODE=06 MONTH CODE=04MONTH CODE=04MONTH CODE=04MONTH CODE=04

    SO ( 23+04)/ 7SO ( 23+04)/ 7SO ( 23+04)/ 7SO ( 23+04)/ 7

    REMAINDERREMAINDERREMAINDERREMAINDER=06060606

    THEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT IS SATURDAYSATURDAYSATURDAYSATURDAY ....

  • 8/14/2019 School Presentations

    59/65

    (Contd.)

    EXAMPLE 3EXAMPLE 3EXAMPLE 3EXAMPLE 3

    24/04/1973 ( BIRTHDAY OF24/04/1973 ( BIRTHDAY OF24/04/1973 ( BIRTHDAY OF24/04/1973 ( BIRTHDAY OF

    LITTLE MASTER , SACHINLITTLE MASTER , SACHINLITTLE MASTER , SACHINLITTLE MASTER , SACHIN

    TENDULKAR )TENDULKAR )TENDULKAR )TENDULKAR )

    YEAR CODE=02YEAR CODE=02YEAR CODE=02YEAR CODE=02

    MONTH CODE=06MONTH CODE=06MONTH CODE=06MONTH CODE=06

    SO, (24+6)/ 7SO, (24+6)/ 7SO, (24+6)/ 7SO, (24+6)/ 7 REMAINDERREMAINDERREMAINDERREMAINDER=2=2=2=2

    THEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT IS TUESDAYTUESDAYTUESDAYTUESDAY ....

  • 8/14/2019 School Presentations

    60/65

    (Contd.)

    EXAMPLE 4EXAMPLE 4EXAMPLE 4EXAMPLE 4

    14/11/1889 ( BIRTHDAY14/11/1889 ( BIRTHDAY14/11/1889 ( BIRTHDAY14/11/1889 ( BIRTHDAY

    OF CHACHAJI )OF CHACHAJI )OF CHACHAJI )OF CHACHAJI )

    YEAR CODE = 03YEAR CODE = 03YEAR CODE = 03YEAR CODE = 03 MONTH CODE=04MONTH CODE=04MONTH CODE=04MONTH CODE=04

    SO, (14+04)/ 7SO, (14+04)/ 7SO, (14+04)/ 7SO, (14+04)/ 7

    REMAINDERREMAINDERREMAINDERREMAINDER=4=4=4=4 THEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT IS

    THURSDAYTHURSDAYTHURSDAYTHURSDAY ....

  • 8/14/2019 School Presentations

    61/65

    NOTE

    THE DAYS FROM 1THE DAYS FROM 1THE DAYS FROM 1THE DAYS FROM 1----5 OF THE FIRST5 OF THE FIRST5 OF THE FIRST5 OF THE FIRSTWEEK OF A MONTH CANNOT BEWEEK OF A MONTH CANNOT BEWEEK OF A MONTH CANNOT BEWEEK OF A MONTH CANNOT BE

    FOUND OUT BY THIS METHOD,FOUND OUT BY THIS METHOD,FOUND OUT BY THIS METHOD,FOUND OUT BY THIS METHOD,HOWEVER IT CAN BE CALCULATEDHOWEVER IT CAN BE CALCULATEDHOWEVER IT CAN BE CALCULATEDHOWEVER IT CAN BE CALCULATED

    BY USING THE LAST DAY OFBY USING THE LAST DAY OFBY USING THE LAST DAY OFBY USING THE LAST DAY OFPREVIOUS MONTH .PREVIOUS MONTH .PREVIOUS MONTH .PREVIOUS MONTH .

  • 8/14/2019 School Presentations

    62/65

    AN EXAMPLE

    02/10/1869 ( BAPUJI02/10/1869 ( BAPUJI02/10/1869 ( BAPUJI02/10/1869 ( BAPUJIS DATE OF BIRTH )S DATE OF BIRTH )S DATE OF BIRTH )S DATE OF BIRTH )

    HERE WE HAVE TO FIRST FIND OUT 30th SEPTEMBERHERE WE HAVE TO FIRST FIND OUT 30th SEPTEMBERHERE WE HAVE TO FIRST FIND OUT 30th SEPTEMBERHERE WE HAVE TO FIRST FIND OUT 30th SEPTEMBER

    YEAR CODE=06YEAR CODE=06YEAR CODE=06YEAR CODE=06

    MONTH CODE=02MONTH CODE=02MONTH CODE=02MONTH CODE=02 SO, (30+2)/ 7SO, (30+2)/ 7SO, (30+2)/ 7SO, (30+2)/ 7

    REMAINDERREMAINDERREMAINDERREMAINDER=4=4=4=4

    THEREFORE,30th SEPTEMBER ISTHEREFORE,30th SEPTEMBER ISTHEREFORE,30th SEPTEMBER ISTHEREFORE,30th SEPTEMBER IS THURSDAYTHURSDAYTHURSDAYTHURSDAY

    AND 2nd OCTOBER ISAND 2nd OCTOBER ISAND 2nd OCTOBER ISAND 2nd OCTOBER IS SATURDAYSATURDAYSATURDAYSATURDAY ....

  • 8/14/2019 School Presentations

    63/65

    FOR LEAP YEARS

    IN THIS CASE 1 WILL BE ADDED TO THE MONTH CODEIN THIS CASE 1 WILL BE ADDED TO THE MONTH CODEIN THIS CASE 1 WILL BE ADDED TO THE MONTH CODEIN THIS CASE 1 WILL BE ADDED TO THE MONTH CODE

    FROM THE MONTH OF MARCH .FROM THE MONTH OF MARCH .FROM THE MONTH OF MARCH .FROM THE MONTH OF MARCH .

    EXAMPLEEXAMPLEEXAMPLEEXAMPLE

    16th DECEMBER 200416th DECEMBER 200416th DECEMBER 200416th DECEMBER 2004 YEAR CODE=05YEAR CODE=05YEAR CODE=05YEAR CODE=05

    MONTH CODE=1+1 ( LEAP YEAR )MONTH CODE=1+1 ( LEAP YEAR )MONTH CODE=1+1 ( LEAP YEAR )MONTH CODE=1+1 ( LEAP YEAR )

    SO, (16+2)/ 7SO, (16+2)/ 7SO, (16+2)/ 7SO, (16+2)/ 7 REMAINDERREMAINDERREMAINDERREMAINDER=4=4=4=4

    THEREFORE IT ISTHEREFORE IT ISTHEREFORE IT ISTHEREFORE IT IS THURSDAYTHURSDAYTHURSDAYTHURSDAY ....

  • 8/14/2019 School Presentations

    64/65

    NOW TRY YOURSELF

    YOUR DATE =

    YEAR CODE =

    MONTH CODE =

    SO, ( + ) / 7

    REMAINDER =

    THEREFORE ,IT IS . .

  • 8/14/2019 School Presentations

    65/65