School Presentations
Transcript of School Presentations
-
8/14/2019 School Presentations
1/65
CYBER CRIME
-
8/14/2019 School Presentations
2/65
What is CybercrimeWhat is Cybercrime
Crimes committed through the
use of computer or the Internet
or in any other unfair means.e.g. Drugs, Terrorism,
Money Extortion, ChildPornography
-
8/14/2019 School Presentations
3/65
CybercrimeCybercrime
Unauthorized AccessUnauthorized Access
Software PiracySoftware Piracy
Spreading VirusSpreading Virus
Objectionable MaterialsObjectionable Materials
Anonymous MailsAnonymous Mails
SPAMSPAM
-
8/14/2019 School Presentations
4/65
HiHi--Tech CrimeTech Crime
Generally committed byGenerally committed byintelligent, computer literateintelligent, computer literate
and informed individualsand informed individualsThere is a need to amendThere is a need to amend
current laws in order tocurrent laws in order to
handle the Hihandle the Hi--Tech CrimesTech Crimes
-
8/14/2019 School Presentations
5/65
Scope of the ProblemScope of the Problem
Cyber crime is a global problemCyber crime is a global problem Statistics on such crime cannotStatistics on such crime cannot
accurately highlight itaccurately highlight its gravity .s gravity .
Criminals can route their activitiesCriminals can route their activitiesthrough countries where jurisdictionalthrough countries where jurisdictionalprocess and legal problems can makeprocess and legal problems can makeinvestigation difficult.investigation difficult.
-
8/14/2019 School Presentations
6/65
CybercrimeCybercrimeUnauthorized AccessUnauthorized Access
HackingHackingWeb sites also can be HackedWeb sites also can be Hacked
Breaking of Computer SecurityBreaking of Computer Security Breaking Passwords and Access CodesBreaking Passwords and Access Codes
Copying Important InformationCopying Important Information Secret DocumentsSecret Documents
Software and Source ProgramsSoftware and Source Programs
Bank Accounts :Bank Accounts : Money Laundering, Credit Card FraudMoney Laundering, Credit Card Fraud
-
8/14/2019 School Presentations
7/65
Unauthorized Access (contd.)Unauthorized Access (contd.)
Password Sniffers:Password Sniffers:Computer programs that monitor andComputer programs that monitor and
record the name and password ofrecord the name and password of
network users as they login, can benetwork users as they login, can beimpersonated .impersonated .
SpoofingSpoofing
Act of disguising one computerAct of disguising one computerelectronically to pretend it to beelectronically to pretend it to beanother oneanother one
-
8/14/2019 School Presentations
8/65
CybercrimeCybercrimeSoftware PiracySoftware Piracy
Illegal Use, Copy, Distribution orIllegal Use, Copy, Distribution orSell of Computer SoftwareSell of Computer Software
Prohibited by LawProhibited by Law
But few Raids has been made so farBut few Raids has been made so farin Indiain India
Software companies are interestedSoftware companies are interestedto make a large illegal user legalto make a large illegal user legalrather than taking them to therather than taking them to the
courtscourts
-
8/14/2019 School Presentations
9/65
Losses Suffered byLosses Suffered byCompaniesCompanies
Country % of Piracy Losses (M. Dollar)
Australia 45 160
Brazil 80 91
France 73 1200
Germany 62 1000India 68 40
Italy 86 550
Japan 92 3000
Korea 82 648
Mexico 85 206Singapore 41 24
Spain 86 362
United Kingdom 54 685
United States 35 1900Source : NASSCOM
-
8/14/2019 School Presentations
10/65
Remedies to PiracyRemedies to Piracy
Hardware Lock and Software Lock .Hardware Lock and Software Lock . Educating Users on Perils of PiracyEducating Users on Perils of Piracy
Sending MailsSending Mails
Stickers :Stickers : Copy Software Illegally and you could getCopy Software Illegally and you could getthis Hardware Absolutely Freethis Hardware Absolutely Free (with picture of(with picture ofhandcuffs)handcuffs)
Conducting SeminarsConducting Seminars
Surprise Raids (NASSCOM)Surprise Raids (NASSCOM) Supplying Legal Software at reasonableSupplying Legal Software at reasonable
costcost
-
8/14/2019 School Presentations
11/65
CybercrimeCybercrimeVirus AttacksVirus Attacks
Self Replicating Program orSelf Replicating Program orProgram Segment which normallyProgram Segment which normallyharm the functioning of anharm the functioning of an
otherwise wellotherwise well--behaved Computerbehaved Computer First virus : CFirst virus : C--Brain and Ashar :Brain and Ashar :
were released by two Pakistaniwere released by two Pakistanibrothers in 1987brothers in 1987
-
8/14/2019 School Presentations
12/65
Categories of Virus:Categories of Virus:
Boot Sector VirusBoot Sector Virus
Partition Table VirusPartition Table Virus
File VirusFile Virus
Email VirusEmail Virus
-
8/14/2019 School Presentations
13/65
Some Common VirusSome Common Virus
Die Hard 2Die Hard 2 Increases each Executable File size by 4000 bytesIncreases each Executable File size by 4000 bytes
Monkey VirusMonkey Virus Corrupt the Partition TableCorrupt the Partition Table
CharasCharas Corrupts the File Allocation TableCorrupts the File Allocation Table
Friday the 13thFriday the 13th
Formats the whole Hard Disk on a Friday, which is also 13thFormats the whole Hard Disk on a Friday, which is also 13thof a monthof a month
Polymorphic VirusPolymorphic Virus Changes Signature on ReplicatingChanges Signature on Replicating
-
8/14/2019 School Presentations
14/65
Email VirusEmail Virus
I Love YouI Love You(Love bug)(Love bug)
Happy 99 .Happy 99 .
-
8/14/2019 School Presentations
15/65
Remedies to VirusRemedies to Virus
Careful Usage of FloppiesCareful Usage of FloppiesUse WriteUse Write--Protect TagsProtect Tags
Use of Legal Software onlyUse of Legal Software onlyCleaning by recent VaccinesCleaning by recent Vaccines
Live Update of AntiLive Update of Anti--virusvirusSoftwareSoftware
-
8/14/2019 School Presentations
16/65
Some wellSome well--knownknownVaccinesVaccines
Norton AntiNorton Anti--VirusVirus
NashNash--softsoft
Smart DogSmart Dog
AVGAVG
Red AlertRed Alert
-
8/14/2019 School Presentations
17/65
CybercrimeCybercrimeObjectionable MaterialsObjectionable Materials
PornographyPornography Explicit Sexual Materials (Text and/orExplicit Sexual Materials (Text and/or
Pictures)Pictures)
Enters Countries where they are prohibitedEnters Countries where they are prohibitedby Lawby Law
Hate materialsHate materials
Racist Views against some caste, creed,Racist Views against some caste, creed,country or religioncountry or religion
Remedies :Remedies : CyberCopsCyberCops ..
-
8/14/2019 School Presentations
18/65
CybercrimeCybercrimeAnonymous MailsAnonymous Mails
Here the header part of the message isHere the header part of the message isstripped offstripped off
Originally was created for deservingOriginally was created for deserving
candidatescandidates e.g. for users who wish to criticize/expose some sociale.g. for users who wish to criticize/expose some social
evil without disclosing their identityevil without disclosing their identity
victims of abuses of some powerful miscreantsvictims of abuses of some powerful miscreants
Being also used by cybercriminalsBeing also used by cybercriminals e.g. To mail copyrighted books, software programse.g. To mail copyrighted books, software programs
-
8/14/2019 School Presentations
19/65
Encrypted MessagesEncrypted Messages
Used by professionals/officers to protect theUsed by professionals/officers to protect thesecrecy of academic/official documents etc.secrecy of academic/official documents etc.
A practical equivalent of using trained secretA practical equivalent of using trained secret--agent couriersagent couriers
Being used also by criminals, terroristBeing used also by criminals, terroristorganizations !organizations !
A simple picture file or a music may beA simple picture file or a music may be
anything starting from a love letter, to aanything starting from a love letter, to ablackmail note, to a complex money launderingblackmail note, to a complex money launderinginstruction, to military secretsinstruction, to military secrets
-
8/14/2019 School Presentations
20/65
Credit Card FraudCredit Card Fraud
The U.S. secret serviceThe U.S. secret servicebelieves that half a billionbelieves that half a billion
dollars may be lost annuallydollars may be lost annuallyby consumers who haveby consumers who havecredit card numbers stolencredit card numbers stolenfrom onfrom on--line data bases.line data bases.
-
8/14/2019 School Presentations
21/65
Some Incidents:Some Incidents:
1)An engineer working in a large bank1)An engineer working in a large bankreprograms the bank account handlingreprograms the bank account handlingcomputer program, so that each day a trifle sumcomputer program, so that each day a trifle sumof money, say $ 3 is credited from some largeof money, say $ 3 is credited from some large
bank account to one kept under a false name,bank account to one kept under a false name,but actually belonging to him.but actually belonging to him.
2)The personal secretary to the president of a2)The personal secretary to the president of asuccessful multinational company decodes allsuccessful multinational company decodes all
the passwords and access codes, changes andthe passwords and access codes, changes andencrypts important money related files andencrypts important money related files andthereafter starts blackmailing the boss.thereafter starts blackmailing the boss.
-
8/14/2019 School Presentations
22/65
Some Incidents (contd.):Some Incidents (contd.):
3)A nine year old internet user got3)A nine year old internet user gothypnotized by his cyberhypnotized by his cyber--friend andfriend andcajoled to divulge his fathercajoled to divulge his fathers credit cards credit card
particulars.particulars. 4)In Britain, details of the committal4)In Britain, details of the committal
proceedings in a trial in court wereproceedings in a trial in court werereleased in Febreleased in Feb95 on an Internet95 on an Internetdiscussion forum. Any newspaper doingdiscussion forum. Any newspaper doingso would be charged with contempt ofso would be charged with contempt ofcourt.court.
-
8/14/2019 School Presentations
23/65
Created By : PRAKASH AGARWAL & RAMBALAK SHARMA
-
8/14/2019 School Presentations
24/65
DATABASE MANAGEM
SYSTEM
-
8/14/2019 School Presentations
25/65
CONTENTS
INTRODUCTION ADVANTAGES OF DATABASE
EXAMPLES OF DATABASE
DATA ABSTRACTION
DATA MODELS
NORMALIZATION
-
8/14/2019 School Presentations
26/65
INTRODUCTION
A database system is basically a combased record keeping system.
It maintains information that is necess
the decision making processes involv
the management of an organization.
The intention of a database is that thecollection of data should serve as ma
applications as possible.
-
8/14/2019 School Presentations
27/65
ADVANTAGES OF DATABA
Data redundancy :In database all theare kept at one place and all the appli
that require data refer to the centrally
maintained database,thus avoidingduplication of database.
Sharing of data : In database individu
pieces of data may be shared among s
different users.
-
8/14/2019 School Presentations
28/65
Contd....
Data security : DBMS ensures data seby ensuring that the only means of ac
the database is through proper channe
Atomicity : DBMS considers all thetransactions as atoms, thus efficiently
handling power failures .
-
8/14/2019 School Presentations
29/65
EXAMPLES OF DBM
Some examples of DBMS software ar FoxPro
Microsoft Access
Sybase
Oracle
-
8/14/2019 School Presentations
30/65
DATA ABSTRACTIO
Data Abstraction : It is the mechanisextracting the essential part of the dat
suppressing the unnecessary part for t
current environment. DBMS provide the users only that mu
information that is required by them a
does not disclose all the details of the
by data abstraction.
-
8/14/2019 School Presentations
31/65
LEVELS OF DATABA
The various levels of database are : Internal Level : At this level , comple
level data structures are described in
Conceptual Level : At this level , the
database is described logically in ter
simple data structures. View Level : At this level , only selec
attributes are visible to the user.
-
8/14/2019 School Presentations
32/65
DATA MODELS
OBJECT BASED LOGICAL
MODELS
RECORD BASED LOGICAL
MODELS
PHYSI
M
DATA MODELS
-
8/14/2019 School Presentations
33/65
RECORD BASED MOD
Relational Model Network Model Hierarchic
Record Based
Models
-
8/14/2019 School Presentations
34/65
RECORD BASED MOD
The various types of record based logmodels are :
Relational Model: In this model, data
relationship among data are representa set of tables .
Network Model : In this model, the thcollection of records are connected to
another by means of links.
-
8/14/2019 School Presentations
35/65
Contd...
Hierarchical Model : In this model, threcords are organized as trees rather t
arbitrary graphs.
-
8/14/2019 School Presentations
36/65
NORMALIZATION
Normalization: It is a database designtechnique which is used to minimize
database anomalies.
1NF: A relation is said to be in 1NF ithe attributes in it are atomic.
2NF: A relation is said to be in 2NF iin 1NF and all non key attributes are
functionally dependent on key attribu
-
8/14/2019 School Presentations
37/65
Contd...
3NF: A relation is said to be in 3NF iin 2NF and every non key attribute is
transitively dependent upon the prima
key. BCNF: A relation is said to be in BC
in 3NF and every determinant in the t
a candidate key.
-
8/14/2019 School Presentations
38/65
SOME DISADVANTAG
Some disadvantages of DBMS are : Extra hardware may be required.
System is likely to be complex.
Performance overhead may be signifi
Security may be compromised withou
controls.
-
8/14/2019 School Presentations
39/65
APPLICATIONS OF DB
Some applications of DBMS are: Educational institutions
Railway Reservations
Hospitals
Offices
-
8/14/2019 School Presentations
40/65
THANK YOU
BY PRAKASH & R
-
8/14/2019 School Presentations
41/65
GENERATIOGENERATIOGENERATIOGENERATIO
OFOFOFOF
COMPUTERCOMPUTERCOMPUTERCOMPUTER
-
8/14/2019 School Presentations
42/65
ABACUSABACUSABACUSABACUS Abacus is the firstAbacus is the firstAbacus is the firstAbacus is the first
calculating device .calculating device .calculating device .calculating device .
This device wasThis device wasThis device wasThis device was
developed in Chinadeveloped in Chinadeveloped in Chinadeveloped in China
during 5000 B.C.during 5000 B.C.during 5000 B.C.during 5000 B.C.
Abacus has a frameAbacus has a frameAbacus has a frameAbacus has a frame
with beads strung onwith beads strung onwith beads strung onwith beads strung on
wire rods .wire rods .wire rods .wire rods .
ArithmeticArithmeticArithmeticArithmetic
calculations arecalculations arecalculations arecalculations are
performed byperformed byperformed byperformed by
manipulating themanipulating themanipulating themanipulating the
beads .beads .beads .beads .
-
8/14/2019 School Presentations
43/65
NAPIERNAPIERNAPIERNAPIERS BONESS BONESS BONESS BONES
It was devised by JohnIt was devised by JohnIt was devised by JohnIt was devised by JohnNapier in 1617 .Napier in 1617 .Napier in 1617 .Napier in 1617 .
It consist of a set ofIt consist of a set ofIt consist of a set ofIt consist of a set of
eleven bones , eacheleven bones , eacheleven bones , eacheleven bones , eachbone has four facesbone has four facesbone has four facesbone has four faces
with numberswith numberswith numberswith numbers
inscribed on them .inscribed on them .inscribed on them .inscribed on them .
It could calculateIt could calculateIt could calculateIt could calculate
products andproducts andproducts andproducts and
quotients of largequotients of largequotients of largequotients of large
numbers .numbers .numbers .numbers .
-
8/14/2019 School Presentations
44/65
PASCALPASCALPASCALPASCALS ARITHMETICS ARITHMETICS ARITHMETICS ARITHMETICENGINEENGINEENGINEENGINE
It was devised by Blaise Pascal inIt was devised by Blaise Pascal inIt was devised by Blaise Pascal inIt was devised by Blaise Pascal in It had a complex arrangement ofIt had a complex arrangement ofIt had a complex arrangement ofIt had a complex arrangement of
and gears and windows for displaand gears and windows for displaand gears and windows for displaand gears and windows for displa
numbers .numbers .numbers .numbers . It was the first successful mechaIt was the first successful mechaIt was the first successful mechaIt was the first successful mecha
calculatorcalculatorcalculatorcalculator ....
-
8/14/2019 School Presentations
45/65
BABBAGEBABBAGEBABBAGEBABBAGES ANALYTICALS ANALYTICALS ANALYTICALS ANALYTICALENGINEENGINEENGINEENGINE
It was designed by CharlesIt was designed by CharlesIt was designed by CharlesIt was designed by CharlesBabbage its design all theBabbage its design all theBabbage its design all theBabbage its design all the
fundamental concepts of digitalfundamental concepts of digitalfundamental concepts of digitalfundamental concepts of digital
computers .computers .computers .computers .
It had a great significance in theIt had a great significance in theIt had a great significance in theIt had a great significance in the
history of computer because it hadhistory of computer because it hadhistory of computer because it hadhistory of computer because it had
in its design all the fundamentalin its design all the fundamentalin its design all the fundamentalin its design all the fundamental
concepts of digital computers .concepts of digital computers .concepts of digital computers .concepts of digital computers .
This made Babbage earn the nameThis made Babbage earn the nameThis made Babbage earn the nameThis made Babbage earn the name
Father Of Modern ComputerFather Of Modern ComputerFather Of Modern ComputerFather Of Modern Computer ....
-
8/14/2019 School Presentations
46/65
FIRST GENERATION ( 1945FIRST GENERATION ( 1945FIRST GENERATION ( 1945FIRST GENERATION ( 1945----1111
Characteristics of FirstCharacteristics of FirstCharacteristics of FirstCharacteristics of First
Generation of computers :Generation of computers :Generation of computers :Generation of computers : ----
VacuumVacuumVacuumVacuum----tube circuits .tube circuits .tube circuits .tube circuits .
Punched cards .Punched cards .Punched cards .Punched cards .
Required machine languageRequired machine languageRequired machine languageRequired machine language
programmingprogrammingprogrammingprogramming
Generated considerable heat .Generated considerable heat .Generated considerable heat .Generated considerable heat . Limited internal storage capacity .Limited internal storage capacity .Limited internal storage capacity .Limited internal storage capacity .
Eg. ENIAC , EDVAC , EDSAC , UNIVAC IEg. ENIAC , EDVAC , EDSAC , UNIVAC IEg. ENIAC , EDVAC , EDSAC , UNIVAC IEg. ENIAC , EDVAC , EDSAC , UNIVAC I
SECOND GENERATION ( 195SECOND GENERATION ( 195SECOND GENERATION ( 195SECOND GENERATION ( 195
-
8/14/2019 School Presentations
47/65
SECOND GENERATION ( 195SECOND GENERATION ( 195SECOND GENERATION ( 195SECOND GENERATION ( 195
Characteristics of SecondCharacteristics of SecondCharacteristics of SecondCharacteristics of Second
Generation of Computers:Generation of Computers:Generation of Computers:Generation of Computers:----
Transistor circuits .Transistor circuits .Transistor circuits .Transistor circuits . MagneticMagneticMagneticMagnetic----core primarycore primarycore primarycore primary
storage .storage .storage .storage .
HighHighHighHigh----level procedurallevel procedurallevel procedurallevel procedurallanguages .languages .languages .languages .
Less heat generated .Less heat generated .Less heat generated .Less heat generated .
Development of magnetic diskDevelopment of magnetic diskDevelopment of magnetic diskDevelopment of magnetic diskstorage .storage .storage .storage .
Eg. IBMEg. IBMEg. IBMEg. IBM----700 , IBM700 , IBM700 , IBM700 , IBM----1401 , ICL 19011401 , ICL 19011401 , ICL 19011401 , ICL 1901
-
8/14/2019 School Presentations
48/65
THIRD GENERATION ( 1966THIRD GENERATION ( 1966THIRD GENERATION ( 1966THIRD GENERATION ( 1966---- Characteristics of ThirdCharacteristics of ThirdCharacteristics of ThirdCharacteristics of Third
Generation of Computers :Generation of Computers :Generation of Computers :Generation of Computers :----
Integrated circuits .Integrated circuits .Integrated circuits .Integrated circuits .
Better storage devices (tapes) .Better storage devices (tapes) .Better storage devices (tapes) .Better storage devices (tapes) .
Faster than previousFaster than previousFaster than previousFaster than previous
generations .generations .generations .generations .
Multi programming operatingMulti programming operatingMulti programming operatingMulti programming operating
system .system .system .system .
Development of mini computers .Development of mini computers .Development of mini computers .Development of mini computers .
Eg. IBM 360 , IBM 370 , NCR 395 .Eg. IBM 360 , IBM 370 , NCR 395 .Eg. IBM 360 , IBM 370 , NCR 395 .Eg. IBM 360 , IBM 370 , NCR 395 .
-
8/14/2019 School Presentations
49/65
FOURTH GENERATION ( 1981FOURTH GENERATION ( 1981FOURTH GENERATION ( 1981FOURTH GENERATION ( 1981
Characteristics of FourthCharacteristics of FourthCharacteristics of FourthCharacteristics of Fourth
Generation of Computers :Generation of Computers :Generation of Computers :Generation of Computers :----
SSI/LSI/VLSI .SSI/LSI/VLSI .SSI/LSI/VLSI .SSI/LSI/VLSI .
SemiSemiSemiSemi----conductor primaryconductor primaryconductor primaryconductor primarystorage .storage .storage .storage .
Development of electronicDevelopment of electronicDevelopment of electronicDevelopment of electronic
spreadsheets .spreadsheets .spreadsheets .spreadsheets . Microprocessors used .Microprocessors used .Microprocessors used .Microprocessors used .
Faster speed of processing .Faster speed of processing .Faster speed of processing .Faster speed of processing .
EgEgEgEg. PENTIUM , POWER PC .. PENTIUM , POWER PC .. PENTIUM , POWER PC .. PENTIUM , POWER PC .
-
8/14/2019 School Presentations
50/65
FUTURE GENERATIONFUTURE GENERATIONFUTURE GENERATIONFUTURE GENERATION
Characteristics of Future GeneratCharacteristics of Future GeneratCharacteristics of Future GeneratCharacteristics of Future GeneratComputers :Computers :Computers :Computers :----
Use of semiUse of semiUse of semiUse of semi----conductors .conductors .conductors .conductors .
Parallel processing .Parallel processing .Parallel processing .Parallel processing .
-
8/14/2019 School Presentations
51/65
-
8/14/2019 School Presentations
52/65
INTRODUCTION
MANY OF US DO NOT KNOW OUR OWNMANY OF US DO NOT KNOW OUR OWNMANY OF US DO NOT KNOW OUR OWNMANY OF US DO NOT KNOW OUR OWNBIRTHDAY & OTHER IMPORTANTBIRTHDAY & OTHER IMPORTANTBIRTHDAY & OTHER IMPORTANTBIRTHDAY & OTHER IMPORTANT
DAYS .DAYS .DAYS .DAYS .
THIS METHOD ENABLES US TO FINDTHIS METHOD ENABLES US TO FINDTHIS METHOD ENABLES US TO FINDTHIS METHOD ENABLES US TO FIND
THE DAY OF ANY DESIRED DATE BYTHE DAY OF ANY DESIRED DATE BYTHE DAY OF ANY DESIRED DATE BYTHE DAY OF ANY DESIRED DATE BY
USING YEAR, MONTH, & WEEK CODES.USING YEAR, MONTH, & WEEK CODES.USING YEAR, MONTH, & WEEK CODES.USING YEAR, MONTH, & WEEK CODES.
-
8/14/2019 School Presentations
53/65
PERIODICITY
ALL CALENDARS ARE PERIODIC INALL CALENDARS ARE PERIODIC INALL CALENDARS ARE PERIODIC INALL CALENDARS ARE PERIODIC INNATURE .NATURE .NATURE .NATURE .
EVERY 29EVERY 29EVERY 29EVERY 29ththththYEAR REPEATS 1YEAR REPEATS 1YEAR REPEATS 1YEAR REPEATS 1ststststYEARYEARYEARYEAR
-
8/14/2019 School Presentations
54/65
BASIC FORMULA
THE BASIC FORMULA FOR IT IS :THE BASIC FORMULA FOR IT IS :THE BASIC FORMULA FOR IT IS :THE BASIC FORMULA FOR IT IS : STEP ISTEP ISTEP ISTEP I ---- MATCH THE YEAR CODEMATCH THE YEAR CODEMATCH THE YEAR CODEMATCH THE YEAR CODE
STEP IISTEP IISTEP IISTEP II ---- MATCH MONTH CODE AND DIVIDE ITMATCH MONTH CODE AND DIVIDE ITMATCH MONTH CODE AND DIVIDE ITMATCH MONTH CODE AND DIVIDE IT
BY 7 (Constant) .BY 7 (Constant) .BY 7 (Constant) .BY 7 (Constant) .
THE DAY IS DETERMINED ACCORDING TO THETHE DAY IS DETERMINED ACCORDING TO THETHE DAY IS DETERMINED ACCORDING TO THETHE DAY IS DETERMINED ACCORDING TO THE
REMAINDER .REMAINDER .REMAINDER .REMAINDER .
210 CALENDARS
-
8/14/2019 School Presentations
55/65
210 CALENDARS
YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C
1801 5 1831 7 1861 3 1891 5 1921 7 1951 2 1981 5
1802 6 1832 1 1862 4 1892 6 1922 1 1952 3 1982 6
1803 7 1833 3 1863 5 1893 1 1923 2 1953 5 1983 7
1804 1 1834 4 1864 6 1894 2 1924 3 1954 6 1984 1
1805 3 1835 5 1865 1 1895 3 1925 5 1955 7 1985 3
1806 4 1836 6 1866 2 1896 4 1926 6 1956 1 1986 4
1807 5 1837 1 1867 3 1897 6 1927 7 1957 3 1987 5
1808 6 1838 2 1868 4 1898 7 1928 1 1958 4 1988 6
1809 1 1839 3 1869 6 1899 1 1929 3 1959 5 1989 1
1810 2 1840 4 1870 7 1900 2 1930 4 1960 6 1990 2
1811 3 1841 6 1871 1 1901 3 1931 5 1961 1 1991 3
1812 4 1842 7 1872 2 1902 4 1932 6 1962 2 1992 4
1813 6 1843 1 1873 4 1903 5 1933 1 1963 3 1993 6
1814 7 1844 2 1874 5 1904 6 1934 2 1964 4 1994 7
1815 1 1845 4 1875 6 1905 1 1935 3 1965 6 1995 1
1816 2 1846 5 1876 7 1906 2 1936 4 1966 7 1996 2
1817 4 1847 6 1877 2 1907 3 1937 6 1967 1 1997 4
1818 5 1848 7 1875 3 1908 4 1938 7 1968 2 1998 5
1819 6 1849 2 1879 4 1909 6 1939 1 1969 4 1999 6
1820 7 1850 3 1880 5 1910 7 1940 2 1970 5 2000 7
1821 2 1851 4 1881 7 1911 1 1941 4 1971 6 2001 2
1822 3 1852 5 1882 1 1912 2 1942 5 1972 7 2002 3
1823 4 1853 7 1883 2 1913 4 1943 6 1973 2 2003 4
1824 5 1854 1 1884 3 1914 5 1944 7 1974 3 2004 5
1825 7 1855 2 1885 5 1915 6 1945 2 1975 4 2005 7
1826 1 1856 3 1886 6 1916 7 1946 3 1976 5 2006 1
1827 2 1857 5 1887 7 1917 2 1947 4 1977 7 2007 2
1828 3 1858 6 1888 1 1918 3 1948 5 1978 1 2008 3
1829 5 1859 7 1889 3 1919 4 1949 7 1979 2 2009 5
1830 6 1860 1 1890 4 1920 5 1950 1 1980 3 2010 6
YEARS ALONG WITH YEAR CODE
CODES FOR EVERY MONTH AND WEEK
-
8/14/2019 School Presentations
56/65
MONTH CODES
1 6 2 2 5 0 3 5 1 4 6 2 4
2 0 3 3 6 1 4 6 2 5 0 3 5
3 1 4 4 0 2 5 0 3 6 1 4 6
4 2 5 5 1 3 6 1 4 0 2 5 0
5 3 6 6 2 4 0 2 5 1 3 6 1
6 4 0 0 3 5 1 3 6 2 4 0 27 5 1 1 4 6 2 4 0 3 5 1 3
WEEK CODES
SUNDAY : 0
MONDAY : 1
TUESDAY : 2
WEDNESDAY : 3
THURSDAY : 4
FRIDAY : 5
SATURDAY : 6
CALENDAR JAN FEB MA APR MAY JUNE JULY AUG SEP OCT NOV DEC
-
8/14/2019 School Presentations
57/65
CALCULATIONS WITH EXAMPLESCALCULATIONS WITH EXAMPLESCALCULATIONS WITH EXAMPLESCALCULATIONS WITH EXAMPLES
EXAMPLE 1EXAMPLE 1EXAMPLE 1EXAMPLE 1 15151515ththththAUGUST 1947AUGUST 1947AUGUST 1947AUGUST 1947
YEAR CODE=4YEAR CODE=4YEAR CODE=4YEAR CODE=4
MONTH CODE=4MONTH CODE=4MONTH CODE=4MONTH CODE=4
SO, (SO, (SO, (SO, ( 15+415+415+415+4 ) / 7) / 7) / 7) / 7
REMAINDERREMAINDERREMAINDERREMAINDER= 5= 5= 5= 5 THEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT IS FRIDAY .FRIDAY .FRIDAY .FRIDAY . (Contd.)(Contd.)(Contd.)(Contd.)
-
8/14/2019 School Presentations
58/65
(Contd.)
EXAMPLE 2EXAMPLE 2EXAMPLE 2EXAMPLE 2 23/01/1897 (NETAJI23/01/1897 (NETAJI23/01/1897 (NETAJI23/01/1897 (NETAJIS DATE OF BIRTH)S DATE OF BIRTH)S DATE OF BIRTH)S DATE OF BIRTH)
YEAR CODE=06YEAR CODE=06YEAR CODE=06YEAR CODE=06 MONTH CODE=04MONTH CODE=04MONTH CODE=04MONTH CODE=04
SO ( 23+04)/ 7SO ( 23+04)/ 7SO ( 23+04)/ 7SO ( 23+04)/ 7
REMAINDERREMAINDERREMAINDERREMAINDER=06060606
THEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT IS SATURDAYSATURDAYSATURDAYSATURDAY ....
-
8/14/2019 School Presentations
59/65
(Contd.)
EXAMPLE 3EXAMPLE 3EXAMPLE 3EXAMPLE 3
24/04/1973 ( BIRTHDAY OF24/04/1973 ( BIRTHDAY OF24/04/1973 ( BIRTHDAY OF24/04/1973 ( BIRTHDAY OF
LITTLE MASTER , SACHINLITTLE MASTER , SACHINLITTLE MASTER , SACHINLITTLE MASTER , SACHIN
TENDULKAR )TENDULKAR )TENDULKAR )TENDULKAR )
YEAR CODE=02YEAR CODE=02YEAR CODE=02YEAR CODE=02
MONTH CODE=06MONTH CODE=06MONTH CODE=06MONTH CODE=06
SO, (24+6)/ 7SO, (24+6)/ 7SO, (24+6)/ 7SO, (24+6)/ 7 REMAINDERREMAINDERREMAINDERREMAINDER=2=2=2=2
THEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT IS TUESDAYTUESDAYTUESDAYTUESDAY ....
-
8/14/2019 School Presentations
60/65
(Contd.)
EXAMPLE 4EXAMPLE 4EXAMPLE 4EXAMPLE 4
14/11/1889 ( BIRTHDAY14/11/1889 ( BIRTHDAY14/11/1889 ( BIRTHDAY14/11/1889 ( BIRTHDAY
OF CHACHAJI )OF CHACHAJI )OF CHACHAJI )OF CHACHAJI )
YEAR CODE = 03YEAR CODE = 03YEAR CODE = 03YEAR CODE = 03 MONTH CODE=04MONTH CODE=04MONTH CODE=04MONTH CODE=04
SO, (14+04)/ 7SO, (14+04)/ 7SO, (14+04)/ 7SO, (14+04)/ 7
REMAINDERREMAINDERREMAINDERREMAINDER=4=4=4=4 THEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT ISTHEREFORE, IT IS
THURSDAYTHURSDAYTHURSDAYTHURSDAY ....
-
8/14/2019 School Presentations
61/65
NOTE
THE DAYS FROM 1THE DAYS FROM 1THE DAYS FROM 1THE DAYS FROM 1----5 OF THE FIRST5 OF THE FIRST5 OF THE FIRST5 OF THE FIRSTWEEK OF A MONTH CANNOT BEWEEK OF A MONTH CANNOT BEWEEK OF A MONTH CANNOT BEWEEK OF A MONTH CANNOT BE
FOUND OUT BY THIS METHOD,FOUND OUT BY THIS METHOD,FOUND OUT BY THIS METHOD,FOUND OUT BY THIS METHOD,HOWEVER IT CAN BE CALCULATEDHOWEVER IT CAN BE CALCULATEDHOWEVER IT CAN BE CALCULATEDHOWEVER IT CAN BE CALCULATED
BY USING THE LAST DAY OFBY USING THE LAST DAY OFBY USING THE LAST DAY OFBY USING THE LAST DAY OFPREVIOUS MONTH .PREVIOUS MONTH .PREVIOUS MONTH .PREVIOUS MONTH .
-
8/14/2019 School Presentations
62/65
AN EXAMPLE
02/10/1869 ( BAPUJI02/10/1869 ( BAPUJI02/10/1869 ( BAPUJI02/10/1869 ( BAPUJIS DATE OF BIRTH )S DATE OF BIRTH )S DATE OF BIRTH )S DATE OF BIRTH )
HERE WE HAVE TO FIRST FIND OUT 30th SEPTEMBERHERE WE HAVE TO FIRST FIND OUT 30th SEPTEMBERHERE WE HAVE TO FIRST FIND OUT 30th SEPTEMBERHERE WE HAVE TO FIRST FIND OUT 30th SEPTEMBER
YEAR CODE=06YEAR CODE=06YEAR CODE=06YEAR CODE=06
MONTH CODE=02MONTH CODE=02MONTH CODE=02MONTH CODE=02 SO, (30+2)/ 7SO, (30+2)/ 7SO, (30+2)/ 7SO, (30+2)/ 7
REMAINDERREMAINDERREMAINDERREMAINDER=4=4=4=4
THEREFORE,30th SEPTEMBER ISTHEREFORE,30th SEPTEMBER ISTHEREFORE,30th SEPTEMBER ISTHEREFORE,30th SEPTEMBER IS THURSDAYTHURSDAYTHURSDAYTHURSDAY
AND 2nd OCTOBER ISAND 2nd OCTOBER ISAND 2nd OCTOBER ISAND 2nd OCTOBER IS SATURDAYSATURDAYSATURDAYSATURDAY ....
-
8/14/2019 School Presentations
63/65
FOR LEAP YEARS
IN THIS CASE 1 WILL BE ADDED TO THE MONTH CODEIN THIS CASE 1 WILL BE ADDED TO THE MONTH CODEIN THIS CASE 1 WILL BE ADDED TO THE MONTH CODEIN THIS CASE 1 WILL BE ADDED TO THE MONTH CODE
FROM THE MONTH OF MARCH .FROM THE MONTH OF MARCH .FROM THE MONTH OF MARCH .FROM THE MONTH OF MARCH .
EXAMPLEEXAMPLEEXAMPLEEXAMPLE
16th DECEMBER 200416th DECEMBER 200416th DECEMBER 200416th DECEMBER 2004 YEAR CODE=05YEAR CODE=05YEAR CODE=05YEAR CODE=05
MONTH CODE=1+1 ( LEAP YEAR )MONTH CODE=1+1 ( LEAP YEAR )MONTH CODE=1+1 ( LEAP YEAR )MONTH CODE=1+1 ( LEAP YEAR )
SO, (16+2)/ 7SO, (16+2)/ 7SO, (16+2)/ 7SO, (16+2)/ 7 REMAINDERREMAINDERREMAINDERREMAINDER=4=4=4=4
THEREFORE IT ISTHEREFORE IT ISTHEREFORE IT ISTHEREFORE IT IS THURSDAYTHURSDAYTHURSDAYTHURSDAY ....
-
8/14/2019 School Presentations
64/65
NOW TRY YOURSELF
YOUR DATE =
YEAR CODE =
MONTH CODE =
SO, ( + ) / 7
REMAINDER =
THEREFORE ,IT IS . .
-
8/14/2019 School Presentations
65/65