e-mag (7th edition)

44

Upload: fahad-farrukh

Post on 30-Mar-2016

258 views

Category:

Documents


4 download

DESCRIPTION

E-MAG (7th edition)

TRANSCRIPT

III NNN DDD EEE XXX

Science and Technology

1. Google Giant Book-keeper ...................................................................................................................... .......... 8

2. H.264/MPEG-4 AVC Standard for video compression (continued) ................................................................. 11

3. Java Design Patterns ............................................................................................................................. ........... 14

4. How RAM works? ............................................................................................................................................ 16

General Articles

5. The Eid Day ..................................................................................................................................................... 18

6. A Visit to Effiel Tower ..................................................................................................... ................................ 19

Poetry and Humor

7. My Country ....................................................................................................................................... ............... 20

8. One Two Buckle My Shoe ................................................................................................................................ 21

9. Smile Please ..................................................................................................................................................... 22

Puzzles – Quizzes – Challenges

10. Big Challenges (Republished) ................................................................................................................... 24

11. Logical Puzzles ............................................................................................................................. ................... 25

12. Sudoku ........................................................................................................................................................... 26

13. Programming Challenges ............................................................................................................................. .. 28

14. Guess the Location ......................................................................................................................................... 30

Learning and Information

15. Polymorphism – In depth ............................................................................................................................. ... 32

16. Learning C++ .................................................................................................................................................... 35

17. Explore With Me .............................................................................................................................................. 37

18. Tips and Tricks ................................................................................................................................................. 38

19. Software of the Month ................................................................................................................................... 39

20. Useful Links ...................................................................................................... ............................................... 40

21. The Constitution ............................................................................................................ .................................. 41

22. MAG News ...................................................................................................................................................... 42

One click access: Simply click any topic you want to read

E-MAG Team

Editor-in-chief

Mian Zeshan Farooqi

Editor

Naveed Hamid

Co editor

Ayesha Naeem Mirza

Coordinator

Dilawer Hussain

Advertiser

Mobeen Afzal

Reporter

Majid Ali

Website:

www.emagportal.com

Submissions:

[email protected]

In this machine age when the misdirected

genius of man forges new engines of

destruction every day, you have to keep abreast

of the times and keep your knowledge and

equipment up-to-date not because we have any

evil designs against any of our neighbors but

because our own security demands that we

should not be caught unaware. There is nothing

that we desire more than to live in peace and

let others live in peace and develop our country

according to our own lights without outside

interference and improve the lot of the

common man.

Address to the officers and men of the 5th Heavy Ack Ack and 6th Light Ack Ack Regiments in Malir , on 21st February, 1948

Translation of

TThhee HHoollyy QQuurraann Monthly series

[2:24] And if you are unable to bring forth (one chapter) - and We declare that you can

never bring one - then fear the fire (of hell), the fuel of which is men and stones; kept

ready for the disbelievers.

[2:25] And give glad tidings to those who believe and do good deeds; that for them are

Gardens beneath which rivers flow; when they are provided with a fruit of the Gardens,

they will say, "This is the same food as what was given to us before" whereas it is in

resemblance; and in the Gardens are pure spouses for them; and they shall abide in it

forever

HHAADDIITTHH

Narrated 'Aisha:

The Prophet used to like to start from the right side on wearing shoes, combing his hair

and cleaning or washing himself and on doing anything else.

[Sahih Bukhari Volume 1, Book 4, Number 169]

Narrated Anas bin Malik:

Allah's Apostle never proceeded (for the prayer) on the Day of 'Id-ul-Fitr unless he had

eaten some dates. Anas also narrated: The Prophet used to eat odd number of dates.

[Sahih Bukhari Volume 2, Book 15, Number 73]

Narrated 'Abbas bin Tamim:

My uncle asked Allah's Apostle about a person who imagined to have passed wind during

the prayer. Allah' Apostle replied: "He should not leave his prayers unless he hears sound

or smells something." [Sahih Bukhari Volume 1, Book 4, Number 139]

Narrated Anas:

The Prophet said, "If anyone of you feels drowsy while praying, he should sleep till he

understands what he is saying (reciting)." [Sahih Bukhari Volume 1, Book 4, Number 212]

EEddiittoorriiaall

.

“In the name of Allah, the most

Beneficent, the most Merciful”

IT (Information Technology) education has grabbed the world. It is considered as the symbol of

success and power. Like all other countries Pakistan has also undergone in IT revolution. IT education

has gained the attention of the students since last decade. The majority of the students want to adopt

their future profession as IT expert.

IT is now everywhere whether it is industry, trade, accounting, graphics, games, advertisement or

even routine work. But, the fact is that the quality of IT education provided by most of the institutions

in Pakistan does not meet the international standard. So, either students, after the completion of their

degrees, remain unemployed or do not get a good job. As a result of realism IT has gained a significant

importance and demand among students and recent developments in the field of IT have opened new

doors for the students. The more and more students want to excel their career as an IT professional.

In, Pakistan IT market has also flourished. The IT institutions can be seen in every nook and corner of

the country.

The IT institutions are broadly classified into three major categories, i.e. the public or government

institutions, the private institutions either affiliated with the government or foreign universities and

totally private institutions operated on their own. The major institutions which provide IT education in

Pakistan are P.U.C.I.T(Punjab University College of Information and Technology) Lahore, FAST,

COMSATS institute of Information and Technology, Bahawalpur University, Mirpur University of

Science and Technology, Hamdard University, Balochistan University of Information Technology,

Engineering and Management Sciences and many more.

The students seeking admission in any of the IT institutions must keep in mind some of the factors

about the institution such as the affiliation with H.E.C, the faculty of the institutions, the LABS, library

and modern means of teaching equipment so that they can get the best IT education and prove

themselves a fine IT expert in the global market.

In the modern world if we want to progress then importance of IT education cannot be neglected.

Measures should be taken to ensure high technical skills in IT. The government should maintain a track

to keep the record of IT developments in the world as well as in the country.

Editor

E-MAG – A Pioneer of Knowledge and Entertainment

99% of the solar systems mass is concentrated in the sun. 8

GGooooggllee’’ss GGiiaanntt BBooookk--kkeeeeppeerr

In recent years the world's most venerable libraries have played host to some incongruous visitors. In dusty nooks and far-flung stacks, teams of workers dispatched by Google have been beveling away to make digital copies of books. So far, Google has scanned more than 10 million titles from libraries in America and Europe – including half a million volumes held by the Bodleian in Oxford. The exact method it uses is unclear; the company does not allow outsiders to observe the process.

Why is Google going for such a venture, so seemingly out-of-kilter with its snazzy, hi-tech image? Why is it even interested in all those out-of-print library books, most of which have been gathering dust on forgotten shelves for decades? The company claims its motives are essentially public-spirited. Its overall mission, after all, is to “organise the world's information", so it would be odd if that information did not include books. Like the Ancient Egyptians who attempted to build a library at Alexandria containing all the known world's scrolls, Google executives talk of constructing a universal online archive, a treasure trove of knowledge that will be freely available – or at least freely searchable – for all.

Dan Clancy, the chief architect of Google Books, offers an analogy with the invention of the Gutenberg press – Google's book project, he says, will have a similar democratising effect. He talks of people in far-flung parts being able to access knowledge as never before, of search queries leading them to the one, long out-of-print book they need.

And he does seem genuine in his conviction that this is primarily a philanthropic exercise. "Google's core business is search and find, so obviously what helps improve Google's search engine is good for Google," he says. “But we have never built a spreadsheet outlining the financial benefits of this, and I have never had to justify the amount I am spending to the company's founders."

It is easy, talking to Mr Clancy and his colleagues, to be swept along by their missionary zeal. But Google's book-scanning project is proving controversial. Several opponents have recently emerged, ranging from rival tech giants such as Microsoft and Amazon to small bodies representing authors and publishers across the world. In broad terms, these opponents have leveled two sets of criticisms at Google.

First, they have questioned whether the primary responsibility for digitally archiving the world's books should be allowed to fall to a commercial company. Robert Darnton, the head of Harvard University's library, argues because such books are a common resource – the possession of us all – only public, not-for-profit bodies should be given the power to control them.

The second, related criticism is that Google's scanning of books is actually illegal. This allegation has led to Google becoming mired in a legal battle whose scope and complexity makes the Jarndyce and Jarndyce case in Bleak House look straightforward.

E-MAG – A Pioneer of Knowledge and Entertainment

A cat has 32 muscles in each ear. 9

At its centre, however, is one simple issue: that of copyright. The inconvenient fact about most books, to which Google has arguably paid insufficient attention, is that they are protected by copyright. Copyright laws differ from country to country, but in general protection extends for the duration of an author's life and for a substantial period afterwards, thus allowing the author's heirs to benefit. (In Britain and America, this post-death period is 70 years.) This means, of course, that almost all of the books published in the 20th century are still under copyright – and last century saw more books published than in all previous centuries combined. Of the roughly 40 million books in American libraries, for example, an estimated 32 million are in copyright. Of these, some 27 million are out of print.

Outside America, Google has made sure only to scan books that are out of copyright and thus in the "public domain" (works such as the Bodleian's first edition of Middlemarch, which anyone can read for free on Google Books Search).

But, within America, the company has scanned both in-copyright and out-of-copyright works. In its defence, Google points out that it displays only snippets of books that are in copyright – arguing that such displays are fair use. But critics allege that by making electronic copies of these books without first seeking the permission of copyright holders, Google has committed piracy.

In 2005, the Authors Guild of America, together with a group of American publishers, launched a class action suit against Google that, after more than two years of wrangling, ended with an announcement last October that Google and the claimants had reached an out-of-court settlement. The full details are staggeringly complicated – the text alone runs to 385 pages – and trying to summarise it is no easy task. “Part of the problem is that it is basically incomprehensible," says Blofeld, one of the settlement's most vocal British critics.

Broadly, the deal provides a mechanism for Google to reimburse authors and publishers whose rights it has breached (including giving them a share of any future revenue it generates from their works). In exchange for this, the rights holders agree not to sue Google in future.

The settlement stipulates that a body known as the Books Rights Registry will represent the interests of American copyright holders. Authors and publishers with a copyright interest in a book scanned by Google who make themselves known to the registry will be entitled to receive a payment – in the region of $60 per book – as compensation.

Additionally, the settlement hands Google the power – but only with the agreement of individual rights holders – to exploit its database of out-of-print books. It can include them in subscription deals sold to libraries or sell them individually under a consumer licence. It is these commercial provisions that are proving the settlement's most controversial aspect.

E-MAG – A Pioneer of Knowledge and Entertainment

A cockroach can live several weeks with its head cut off. 10

Critics point out that, by giving Google the right to commercially exploit its database, the settlement paves the way for a subtle shift in the company's role from provider of information to seller. Interest in this aspect of the settlement has focused on "orphan" works, where there is no known copyright holder – these make up an estimated 5% to 10% of the books Google has scanned. Under the settlement, when no rights holders come forward and register their interest in a work, commercial control automatically reverts to Google. Google will be able to display up to 20% of orphan works for free, include them in its subscription deals to libraries and sell them to individual buyers under the consumer licence.

But Mr Clancy dismisses the idea that, by gaining control over out-of-print and orphan works, Google is securing for itself a significant future revenue stream. He points out that out-of-print books represent only a tiny fraction of the books market – between 1% and 2%. “This idea that we are gaining access to a vast market here – I really don't think that is true."

James Gleick, an American science writer and member of the Authors Guild, broadly agrees. He says that, although Google's initial scanning of in-copyright books made him uncomfortable, the settlement itself is a fair deal for authors.

It is by no means certain that the settlement will be enacted – it is the subject of a fairness hearing in American courts. But if it is enacted, Google will in effect be off the hook as far as copyright violations in America are concerned. Many people are seriously concerned by this – and the company is likely to face challenges in other courts around the world.

Over the coming months, we will hear a lot more about the Google settlement and its ramifications. Although it's a subject that may seem obscure and specialised, it concerns one of the biggest issues affecting publishing and, indeed, other creative industries – the control of digital rights.

No one knows the precise use Google will make of the intellectual property it has gained by scanning the world's library books, and the truth, as Mr Gleick points out, is that the company probably doesn't even know itself. But what is certain is that, in some way or another, Google's entrance into digital bookselling will have a significant impact on the book world in years to come.

Written by: Faiza Raana Freelance Journalist,

Editor Monthly Pancham

E-MAG – A Pioneer of Knowledge and Entertainment

A company in Taiwan makes dinnerware out of wheat, so you can eat your plate. 11

HH..226644//MMPPEEGG--44 AAVVCC Standard for video compression

Features of H.264/AVC

H.264/AVC contains a lot of new features that allow it to compress video much more effectively from its

predecessors.

Intra coding

o Prediction modes 4x4, 8x8, 16x16.

Motion estimation/compensation

o Multiple reference frame

o Motion blocks modes 16x16, 16x8, 8x16, 8x8, 8x4, 4x8, 4x4.

Weighted prediction

Transform modes

o 4x4 integer Transform

o Additional transform on Intra 16x16

In-Loop filter

o Deblocking

Entropy coding

o Context-based Adaptive Binary Arithmetic Coding(CABAC)

o Context-based Adaptive Variable-length Coding (CAVLC)

Flexible macroblock ordering(FMO)

o Slice groups and arbitrary slice ordering (ASO), which are techniques for restructuring the

ordering of the representation of the fundamental regions (macro blocks) in pictures.

Profiles and levels Like any comprehensive standard, the H.264 standard defines a set of profiles and levels to set points of conformance for various classes of applications and services. In each profile, specific encoding tools are permitted to best meet the needs of the intended scenario. H.264 includes six profiles: • Baseline: Intended for low-complexity applications such as video conferencing and mobile multimedia. • Main: Intended for the majority of general uses, such as the Internet, mobile multimedia, and stored

content. • Extended: Intended for streaming applications, where stream switching technologies can be beneficial. • Three High profiles (also known as Fidelity Range Extension or FRExt): Consists of three separate High profiles (High, High 10, and High 4:2:2), intended for high-end professional uses.

Part II

E-MAG – A Pioneer of Knowledge and Entertainment

A cow produces 200 times more gas a day than a person. 12

Performance comparison between H.264 and MPEG-2 –Simulation (Car phon)

Parameters MPEG-2 H.264

Video Resolution 176x144(QCIF) 176x144(QCIF)

Frame Per Second 30 30

No of Frame Encoded 90 90

GOP I-P-BB-P-BB I-P-BB-P-BB

PSNR(Y) 30.46 37.6

PSNR(U) 36.35 40.9

PSNR(V) 36.5 41.5

Bit Rates(Kbits/Second) 128 128

Original File size(.yuv) MB 3.3 3.3

Compressed file size (KB) 47.2 45.6

E-MAG – A Pioneer of Knowledge and Entertainment

A dime has 118 ridges around the edge. 13

For the same bit rate and video resolution, the PSNR (dB) values are greater for H.264 encoded videos than for

the MPEG-2 encoded videos indicating H.264 better video quality. This can be verified from the screen shots.

Conclusions

The emerging H.264/AVC video coding standard has been developed and standardized collaboratively by both the ITU-T VCEG and ISO/IEC MPEG organizations. H.264/AVC represents a number of advances in standard video coding technology, with some important differences relative to prior standards. We thus summarize some of the important differences:

Enhanced motion-prediction capability.

Use of a small block-size exact-match transforms.

Adaptive in-loop deblocking filter.

enhanced entropy coding methods. When used the features of the new design provide approximately a 50% bit rate savings for equivalent perceptual quality relative to the performance of prior standards. As well as its improved compression performance, H.264 offers greater flexibility in terms of compression options and transmission support. An H.264 encoder can select from a wide variety of compression tools, making it suitable for applications ranging from low-bitrate, low-delay mobile transmission through high definition consumer TV to professional television production. The standard provides integrated support for transmission or storage, including a packetised compressed format and features that help to minimise the effect of transmission errors. H.264/AVC is being adopted for an increasing range of applications, including:

High Definition DVDs (HD-DVD and Blu-Ray formats)

High Definition TV broadcasting in Europe

Apple products including iTunes video downloads, iPod video and MacOS

NATO and US DoD video applications

Mobile TV broadcasting

Internet video

Videoconferencing

References

Wiegand T., Sullivan G., Bjontegaard G. and Luthra A. (2003), ‘‘Overview of the H.264/AVC Video Coding Standard’’, IEEE Tansactions on Circuits and Systems for Video Technology, Special Issue in H.264.

Vcodex tutorial for H.264 [online] http://www.vcodex.com/h264overview.html.

Wikipedia, H.264/MPEG-4 AVC [online] http://en.wikipedia.org/wiki/H264.

Apple Inc. Apple's FAQ on H.264. Apple Web Site. [online] http://www.apple.com/quicktime/technologies/h264/faq.html.

H.264/AVC software coordination 2005, http://iphome.hhi.de/suehring/tml

Written by: Muhammad Zeshan Ali Ph.D (Student) Institut für Datentechnik und Kommunikationsnetze TU-Braunschweig, Germany

E-MAG – A Pioneer of Knowledge and Entertainment

A giraffe can clean its ears with its 21-inch tongue. 14

JJaavvaa DDeessiiggnn PPaatttteerrnnss

Design Patterns

Design Patterns can be treated as tools used to solve a particular type of problem (mostly a recurring

problem over the years). it also proves as a handy shared vocabulary which developers can use while

discussing a particular problem at hand.

“Each pattern describes a problem which occurs over and over again in our environment, and then

describes the core of the solution to that problem, in such a way that you can use this solution a million

times over, without ever doing it the same way twice” - Christopher Alexander

Why use a Design Pattern?

They are well tested and refined solutions discovered by software engineers over the years and

knowing them can help us disintegrate problems very quickly and efficiently. like for example if we

have a scenario where we are required to notify a certain number of class/clients whenever there is an

event or change in data of a class, we use Observer Pattern.

Types of Design Patterns

Design Patterns can be classified into three broad categories.

1) Creational - what should be the process of object creation in a particular design problem.

2) Structural - what should be the structure of classes/objects, helps you design your class compositions while addressing a particular design problem.

3) Behavioral - how classes should communicate/interact with each other in order to make a design model work.

FlyWeight Pattern (A Creational Design Pattern)

Definition

The flyweight design pattern is used to reduce the memory and resource usage for complex models

containing many hundreds, thousands or even hundreds of thousands of similar objects.In some cases,

Part I

E-MAG – A Pioneer of Knowledge and Entertainment

A giraffe can go without water longer than a camel can. 15

the objects being created may include information that is often duplicated. Where this is true, the

flyweight pattern can be used

When this pattern is applied, the properties of the objects that are shared and are reasonably

unchanging are moved into flyweight objects. For each of the main objects that use the shared data,

only a reference to the appropriate flyweight object is required. This can drastically reduce the

memory used by each of the main objects.

1. Identify shareable state (intrinsic) and non-shareable state (extrinsic)

2. Create a Factory that can return an existing object or a new object

3. The client must use the Factory instead of "new" to request objects

4. The client (or a third party) must provide/compute the extrinsic state

The flyweight design pattern often uses a variation on the factory method pattern for the generation of the shared objects. The factory receives a request for a flyweight instance. If a matching object is already in use, that particular object is returned. If not, a new flyweight is generated. Usually the full set of available flyweight objects is held within the factory in a collection that can be accessed quickly, such as a Hashtable.

Where to use & benefits

Need to instantiate a large amount of small and fine-grained classes.

Need icons to represent object.

An object extrinsic state can be shared by classes.

Reduce the number of objects created, decrease memory footprint and increase performance.

Increase runtime cost associated with transferring, finding, or computing extrinsic data.

Written by: Ali Imran Principal Software Engineer

i2c Inc. California, USA

Alumni MCSF06 PUCIT

E-MAG – A Pioneer of Knowledge and Entertainment

A goldfish has a memory span of three seconds. 16

HHooww RRAAMM wwoorrkkss??

Random access memory (RAM) is the best known form of computer memory. RAM is considered

"random access" because you can access any memory cell directly if you know the row and column

that intersect at that cell.

Similar to a microprocessor, a memory chip is an integrated circuit (IC) made of millions of transistors

and capacitors. In the most common form of computer memory, dynamic random access memory

(DRAM), a transistor and a capacitor are paired to create a memory cell, which represents a single bit

of data.

The capacitor holds the bit of information -- a 0 or a 1. The transistor acts as a switch that lets the

control circuitry on the memory chip read the capacitor or change its state.

RAM stands for Random Access Memory. This means Information can be retrieve and store by the

computer at any order. RAM gives your computer a temporary place to process electronic data.

This means that, RAM chips continue to store information only as long as computer has electrical

power. In other words, when you shut off your computer, all the data stored in RAM are lost.

All actual computing starts with the the CPU (Central Processing Unit). The chipset supports the CPU

and contains several controllers that control how information travels between the CPU and other

components in the PC.

The memory controller is part of the chipset and establishes the information flow between memory

and the CPU.

A bus is a data path that consists of parallel wires and connects the CPU, memory and other devices.

The bus architecture determines how much and how fast data can move around the

motherboard.

The memory bus goes from the memory controller to the computer's memory

sockets. Newer systems have a front side bus (FSB) from the CPU to main

memory and a backside bus (BSB) from the memory controller to L2

cache.

The CPU sends a request to the memory controller to memory and gets

E-MAG – A Pioneer of Knowledge and Entertainment

A hummingbird weighs less than a penny. 17

a report back of when the information will be available. This cycle can vary in length according to

memory speed as well as other factors, such as bus speed.

Residing on the motherboard, the system clock sends a signal to all components, just like a metronome

ticking. Each click of the clock represents a clock cycle. A clock running at 100Mhz represents 100

million clock cycles per second. Every action is timed by the clock where different actions require a

different number of clock cycles.

Many people assume that the speed of the processor is the speed of the computer. Most of the time,

the system bus and other components run at different speeds.

Because all information processed by the CPU is written or read from memory, the performance of a

system is dramatically affected by how fast information can travel between the CPU and memory.

Therefore, faster memory technology contributes greatly to the overall system performance.

Cache memory is a relatively small amount (normally less than 1 MB) of high speed memory and

resides very close to the CPU.

It is designed to supply the CPU with the most frequently requested data. It takes a fraction of the

time, compared to normal memory, to access cache memory.

The concept is that 20% of the time, what is needed is in cache. The cache memory tracks instructions,

putting the most frequent used instruction at the top of the list. Once the cache is full, the lowest need

is dropped.

Today, most cache memory is incorporated in the CPU. It can also be located just outside of the CPU.

Cache that is closest to the CPU is labeled Level 1, the next closest Lever 2, etc.

Interleaving is a process in which the CPU alternates between two or more memory banks. Every time

the CPU addresses a memory bank, the bank needs about one clock cycle to reset. The CPU can save

processing time by addressing a second bank while the first bank is resetting.

Submitted By: Umair Anjum BS Software Engineering

BSEF07A, PUCIT

Reference: http://computer.howstuffworks.com/ram.htm; http://www.ddrsdrammemory.com http://www.computermemoryupgrade.net/how-computer-memory-works.html

E-MAG – A Pioneer of Knowledge and Entertainment

A jellyfish is 95 percent water. 18

TTHHEE EEIIDD DDAAYY

Eid Day is a day of happiness and celebration for Muslims. Muslims celebrate three Eid Days in a year i.e.

Eid-ul-Fitr, Eid-ul-Adha and Eid Milad-un-Nabi (PBUH). The upcoming Eid Day is known as Eid-ul-Fitr.

Eid-Ul-Fitr (the eid day) is a festival that follows the blessed month of Ramadan and falls on the 1st day of

Shawwal, the 10th month in the Hijri (Islamic) calendar. As with all months in the Hijri calendar, it begins

with the sighting of the new moon. It commemorates both a joyous holiday and some sadness due to the

end of the blessed month of Ramadan.

The word Eid is Arabic word which means ‘festivity’ while Fitr means ‘to break the fast’. Fasting is forbidden

on this day, as it marks the end of the month long fast of Ramadan. Muslims all around the world celebrate

this day in almost a same way. They wake up early; dress up nicely with their best cloths; go to the mosques

and offer the special Eid Prayers. After the Eid prayer they greet and embrace each other and exchange the

well wishes.

At the time of this celebration, Muslims never forget their poor fellows. Prior the Eid Prayers, every able

Muslim (who is able to donate) pays Zakat-ul-Fitr to the poor Muslims. Zakat-ul-Fitr is a form of charity

which is given by able Muslims to the poor Muslims to involve then in the celebrations of The Eid Day.

Children are given some special gifts on the Eid Day by their elders and loved ones. These gifts are

commonly known as Eidi. Children are very excited to take their gifts. They enjoy this event with a great

zeal.

Women celebrate this event in a unique way. They start the preparations of Eid Day a night before the Eid

Day, known as Chaand Raat. Chaand Raat (the moon night) is a time of celebration when families and

friends gather in open areas at the end of the last day of Ramadan to spot the new moon, which signals the

arrival of the Islamic month of Shawwal and the day of Eid. Once the moon is sighted, people wish each

other; women and girls decorate their hands and do the last round of shopping.

Eid Day is a God’s gift to the Muslims. It lets the Muslims all around the world to thank God. Eid Day is

celebrated after the most pious month of Islamic calendar i.e. Ramadan. As fasts are observed, in the

month of Ramadan, to purify the souls and experience the feelings of our poor fellows, so we should not

forget our poor fellows at the time of celebrations of Eid Day.

On the behalf of our team, I wish all the Muslim community a

Very Happy Eid Day!

Written By: Ayesha Naeem Mirza Co-editor, E-MAG

E-MAG – A Pioneer of Knowledge and Entertainment

A "jiffy" is an actual unit of time for 1/100th of a second. 19

AA VViissiitt ttoo EEiiffffeell TToowweerr

The Eiffel Tower is an iron tower built during 1887-1889 on the Champ de Mars

beside the Seine River in Paris. The tower has become a global icon of France and is

one of the most recognizable structures in the world. Eiffel Tower is the tallest

building in Paris. More than 200,000,000 people have visited the tower since its

construction in 1889 including 6,719,200 in 2006 making it the most visited paid

monument in the world. Including the 24 m (79 ft) antenna, the structure is 324 m

(1,063 ft) high (since 2000), which is equivalent to about 81 levels in a conventional

building.

Eiffel tower is a land mark of France. Visiting tower is a strange and exciting experience. There are beautiful

grassy garden all around the tower. when I decided to go inside there is a long line to buy entry ticket which is

20 Euro .I have to wait for 30 min to get to the ticketing counter finally I got the ticket and I m inside the tower

.As I enter inside I was amazed to see that there was another line for the lift but

there was another way to the stairs but you have to be enough strong to climb the

stairs I preferred lift .After waiting some time I entered in to the lift and it has a

capacity of 30 peoples lift stared and started to go upwards slowly and I can’t

explain the views from the lift its amazing.

Eiffel tower consist of 2 flours finally I reached the top floor lift opened and we

were all out there was a coffee shop ,a restaurant and a gift shop there was a rush of people in the gift shop to

buy gifts to someone they love. There was a map place there indicating the buildings around the tower.

The upper view was very beautiful. I feel cold there and in a mean while rain started and the atmosphere

becomes very romantic. I also saw a indication board “BEWARE OF THE POCKET THEFT “.

Government of France has placed a board

which indicated the distance of Paris to

other countries like Pakistan (Islamabad) is

5944 Km away.

I spent a long time at the top I have some

coffee and cake there I saw a binoculars

there to view the city it requires 1 Euro to

activate I cativated it and view the city . Finally i decided to leave but I was

again amazed to see that there was again line to the lift and I finally reached the ground floor .it was a really

good experience for me to the Eiffel tower .

Down View of Tower

A View from the top of Tower

Written By: Abdul Salam BS Software Engineering, PUCIT

E-MAG – A Pioneer of Knowledge and Entertainment

A jumbo jet uses 4,000 gallons of fuel to take off. 20

MMyy CCoouunnttrryy

A rich cultured place,

Is the state we live in,

With glorious cool sights,

And wonderful scenes,

A vast range of minerals,

And reflections of heaven,

The open hearted people,

All good and loving,

Our army is the best,

Of all in this reign,

The navy of our country,

Keeps our land sovereign,

The air force full of eagles,

Alert and honoring,

The brave and bright souls,

Whom whole world is saluting,

Braver are their parents,

Who bring up such children?

Eager to serve always,

Their lovely homeland..!

Written By: Qurat ul ain Akram University of the Punjab

E-MAG – A Pioneer of Knowledge and Entertainment

A shark is the only fish that can blink with both eyes. 21

OOnnee TTwwoo BBuucckkllee MMyy SShhooee

One two buckle my shoe

Three, four, knock at the door

Five, six, pickup sticks

Seven, eight, lay them straight

Nine, ten, a big fat hen

Eleven, twelve, dig and delve

Thirteen, fourteen, maids a-courting

Fifteen, sixteen, maids in the kitchen

Seventeen, eighteen, maids in waiting

Nineteen, twenty, my plate's empty

The rhyme is one of many counting-out rhymes. It was first recorded in Songs for the Nursery, published in

London in 1805. This version differed beyond the number twelve, with the lyrics:

Thirteen, fourteen, draw the curtain,

Fifteen sixteen, the maids in the kitchen,

Seventeen, eighteen, she's in waiting,

Nineteen, twenty, my stomach's empty.

A version published five years later in Gammer Gurton's Garland (1810) had the different lines:

Three, four, Lay down lower ...

Eleven twelve, Who will delve...

Fifteen, sixten, Maidsa-kissing...

Nineteen, twenty, My Belly's empty.

According to Henry Bolton, collector of counting rhymes in the 1880s, the rhyme was used in Wrentham,

Massachusetts as early as 1780.

E-MAG – A Pioneer of Knowledge and Entertainment

A sneeze travels out your mouth at over 100 m.p.h. 22

A little girl asked her mother, "How did the human race appear?"

The mother answered, "God made Adam and Eve and they had children, and so was all mankind made.."

Two days later the girl asked her father the same question. The father answered, "Many years ago there were

monkeys from which the human race evolved."

The confused girl returned to her mother and said, "Mom, how is it possible that you told me the human race

was created by God, and Dad said they developed from monkeys?"

The mother answered, "Well, dear, it is very simple. I told you about my side of the family and your father told

you about his."

Marriage is a three ring circus ...

engagement ring, wedding ring and

suffering...

Let’s see how many times you could read the

following text loud and fast?

Pete's pa pete poked to the pea

patch to pick a peck of peas

for the poor pink p ig in the pine

hole p ig-pen. I used to hate weddings; all the

old ladies would prod me and

say “you'll be next!”

They soon stopped that, when I

started saying it to them at

funerals!

The best time to start thinking about

your retirement is before the boss

does. Doctor! I have a serious problem; I can never remember what I just said.

When did you first notice this problem?

What problem?

E-MAG – A Pioneer of Knowledge and Entertainment

Baby robins eat 14 feet of earthworms every day. 23

Scientists have found water on Mars

A woman is walking along a beach when she finds an old oil lamp.

She picks it up and rubs it, and out comes a genie.

The genie says to the woman, "Thank you for freeing me from the oil lamp.

I will grant you three wishes, but whatever you wish for, your horrible ex-husband will get twice as much. What is your first wish?"

The woman says, "I'd like a million dollars in my bank account, please!"

The genie says, "You now have a million dollars in your bank account, and your ex-husband now has two million dollars. What is your second wish?"

The woman says, "I've always wanted a nice car. I'd like a brand new Rolls-Royce, please!"

The genie says, "You now have a new Rolls-Royce in your garage at home, and your ex-husband now has two new Rolls-Royces.

What is your third wish?"

The woman thought for a while and then said, "I'd like you to remove one of my kidneys, please!"

Teacher: Could you please pay a little

attention?

Student: I'm paying as little

attention as I can.

Teacher: Did you father help your

with your homework?

Student: No, he did it all by himself.

E-MAG – A Pioneer of Knowledge and Entertainment

Camel's milk does not curdle. 24

Challenge A:

We’ve an array of integers with name numbers and size 100. We take input from user in this array for all 100

elements. You’ve to simply add logical line of code in the given code such that the given code should display the

sum of all user given numbers. Isn’t it simple? (For full details, see 6th edition of E-MAG)

Challenge B:

You’ve to write a header file magix.h containing a single function named as sum. Your function should receive

some integers as parameters; add them and return their sum. A programmer would simply include your header

file magix.h and call the function sum with as many (integer) parameters as he wants with the given constrains. (For full details, see 6th edition of E-MAG)

Challenge C:

See the given image on the right hand side (BCP.C.1).

This is not only an image, actually there’s something written here with some logic. You’ve

to find out that logic and also guess that what is actually written here with that logic.

You’ve to tell us both the logic and the actual text.

Challenge D:

Three masters of logic (persons with really strong logic) wanted to find out, who is the wisest one.

So they invited the grand master, who took them into a dark room and said: “I will paint each one of you a red

or a blue dot on forehead. When you walk out and you will see at least one red point, hands-up. Who says what

color is the dot on his own forehead as first, wins.” Then he painted only red dots on every one. When they went

out everybody had their hands up and after a while of killing thinking one of them said: “I have a red dot on my

head.” He is correct but how could he be so sure?

For C/C++ Programmers

For C/C++ Programmers

Logic

BCP.C.1

Logic

Submit the Solutions:

Dear Readers!

This is the first package of BIG CHALLENGES which was originally published in the sixth edition of E-MAG. Download the 6th

edition by clicking here.

The solutions will be published in November’s edition of E-MAG with the name of those people who submitted the correct

solutions. You can send your solutions till October 31, 2009 at [email protected]

E-MAG – A Pioneer of Knowledge and Entertainment

Camels have three eyelids to protect themselves from blowing sand. 25

LLooggiiccaall PPuuzzzzlleess

By Saad Ahmed

FLY

Two trains 200 km from each other are moving at the speed of 50 km/hour to encounter. From one

train a fly takes off, flying straight (upon the rails) to the other train at the speed of 75 m/hour,

bounces away from it and flies back to the first train. This is repeated till the trains crash to each other

and the fly is smashed. What distance is the fly able to fly until its judgments moment? (There is a

complicated and an easy way to solve this math brain teaser.)

WIRED EQUATOR

Perimeter of the globe is approximately 40 000 km. If we made a circle of wire around the globe, that is

only 10 metres (so 0,01 km) longer than the perimeter of earth, could a flea, a rabbit or even a man

creep under it?

CLOCK

On every clock we can see that at noon the hour, minute and second hand correctly overlay. In about

one hour and five minutes the minute and hour hand will overlay again. Can you calculate the exact

time (to a millisecond), when it will occur and what angle they will contain with second hand?

MARINE

Captain of a big ship was telling this interesting story: "Once a saw two marines standing on the

opposite sides of the ship. One was looking to the west and the other one to the east. And they saw

each other very well." How can be that possible?

Submit your solutions before September 30, 2009 at [email protected]

Your name would be published in next edition of E-MAG if you submit correct solution.

E-MAG – A Pioneer of Knowledge and Entertainment

Canada is an Indian word meaning "Big Village". 26

Solutions SSUUDDOOKKUU

5 7 2 8 9 1 3 4 6

6 3 1 7 5 4 2 9 8

4 8 9 3 2 6 5 7 1

3 2 4 5 1 8 9 6 7

1 5 7 4 6 9 8 3 2

9 6 8 2 7 3 1 5 4

8 1 3 6 4 5 7 2 9

2 4 5 9 8 7 6 1 3

7 9 6 1 3 2 4 8 5

Correct Solutions Submitted by:

Asma Kaleem - BITS06M023 - PUCIT

M Shuaib Imran - BITF06M004 - PUCIT

Muhammad Irshad Mughal - BS-F07-CSIT-030 - University of Gujrat

Taymoor Khan - BITF06A027 – PUCIT

Well

Done!

E-MAG – A Pioneer of Knowledge and Entertainment

Cats can produce over one hundred vocal sounds, while dogs can only produce about ten. 27

Sudoku is a number placement puzzle. The objective is to place digits in 9 x 9

grids such that digits from 1 to 9 occur once in each row, each column and

each 3 x 3 boxes (blocks). Some numbers are already given at random places.

Player has to fill the remaining boxes according to above constrain.

SSUUDDOOKKUU

7 1 5

2 4

4 8 6 5

6 2 9

3 9 6

2 1 3

7 5 1 9

1 3

3 5 8

Download the preformatted solution file for this Sudoku by clicking here (optional).

Submit your solutions before September 30, 2009 at [email protected]

Your name would be published in next edition of E-MAG if you submit correct solution.

E-MAG – A Pioneer of Knowledge and Entertainment

Honeybees have hair on their eyes. 28

#include <iostream.h>

#include <dos.h>

void main()

{

cout<< “This text will remain on screen until you don’t press some key”;

system(“pause”);

}

#include <iostream.h>

void main()

{

char *ptr[2] = {"Very Good!", "Don't you know the difference between Evens and Odds?"};

int number=0;

cout<<"Enter an even number: ";

cin>>number;

cout<<ptr[ (number & 1) ];

}

PPrrooggrraammmmiinngg CChhaalllleennggeess

By Mian Zeshan Farooqi

1. Prompt the user to enter an even number. If user enters an even number then display “Very Good!”

otherwise display “Don’t you know the difference between Evens and Odds?” There is a restriction in this

problem. You’re not allowed to use if-else statements or a trinary operator. The rest of the problem is quite

simple and clear.

2. You might be aware of the function getch(). getch() and getche() gets a character as an input. Usually we use

these functions to pause the execution of our program. For example we usually use getch() as the last

statement in our program so that user can read the text on output screen and presses some key to

terminate the program. Pause the output without getch() and getche().

Correct Solutions Submitted by:

Taymoor Khan - BITF06A027 – PUCIT

Samia Amjad - BITF08M036 - PUCIT

Well

Done!

Solutions

E-MAG – A Pioneer of Knowledge and Entertainment

Put interesting information here! 1

E-MAG – A Pioneer of Knowledge and Entertainment

Human teeth are almost as hard as rocks. 29

PPrrooggrraammmmiinngg CChhaalllleennggeess

By Mian Zeshan Farooqi

1. Write a function countEvens with the following prototype. The function should take a positive integer

number and return the total number of even numbers between 1 and number (inclusive). You’re not

allowed to use any loop, goto statement or helper function. The following function should fulfil the

requirement alone. See the following examples for more understanding.

Prototype:

int countEvens( int number );

Examples:

Parameter Passed Return Value

2 1

4 2

9 4

10 5

2. You’ve a character array of 256 characters. Prompt the user to enter his Full Name. Without using

cin.getline() or cin.get() take the full name as input in the given array. After that you should display the name

on screen. Its very simple!

void main ()

{

char name[ 256 ];

cout<<”Type your name and press Enter:\t”;

// Write the code to take input here:

cout<<”Welcome ”<<name;

}

Note: Solution will be published in next edition.

Submit your solutions at [email protected] before September 30, 2009.

Your name would be published in next edition of E-MAG if you submit correct solution.

E-MAG – A Pioneer of Knowledge and Entertainment

Human thigh bones are stronger than concrete. 30

Answer GGuueessss tthhee LLooccaattiioonn

Guessed Correctly By:

Abbas Ali Butt - Uraan Software Solutions

Asma Kaleem - BITS06M023 - PUCIT

Asma Wakeel - BCSF06M051 - PUCIT

Khadija Arshad - BITF06M052 - PUCIT

M Ahmed Javed - UET - Lahore

M Shafiq Azam - MCSS07A015 - PUCIT

Sami ur Rehman, University of the Punjab

Quiad-e-Azam Library, Jinnah Garden, Lahore

E-MAG – A Pioneer of Knowledge and Entertainment

"I am." is the shortest complete sentence in the English language. 31

GGuueessss tthhee LLooccaattiioonn

Note: Answer will be published in next edition.

Submit your answer at [email protected] before September 30, 2009.

Your name would be published in next edition of E-MAG if you submit correct answer.

E-MAG – A Pioneer of Knowledge and Entertainment

In England, the Speaker of the House is not allowed to speak. 32

PPoollyymmoorrpphhiissmm –– IInn ddeepptthh

A different perspective on polymorphism

Run Time Polymorphism

Some points to ponder (continued):

11. What happens when we call virtual function inside constructor or destructor? Example:

class base

{

public:

virtual void f()

{

wow(); //if class to f() is from constructor/destructor of //base class then base::wow() Otherwise //derive::wow()

}

virtual void wow() {}

virtual void hi() {}

base()

{

hi(); //base::hi() }

virtual ~base()

{

hi(); //base::hi() }

int bdata;

};

Episode # 4

E-MAG – A Pioneer of Knowledge and Entertainment

Mosquitoes have teeth. 33

class derive : public base

{

public:

virtual void wow() {}

virtual void hi() {}

derive()

{

hi(); //derive::hi() f(); //base::f()

}

virtual ~derive()

{

hi(); //derive::hi()

f(); //base::f() }

int ddata;

};

NOTE Strange let’s look at the layout of v-table construction

When the derive object d2 is created the following layout in memory was constructed (i.e; the base class v-table

part along with derive class v-table part. So, the interesting thing about this figure is that the d2 vptr is pointing to

two different location. Certainly not at a time. Actually when d2 object was being constructed, in

constructor/destructor of base class the d2 vptr was pointing to base class v-table part and other than this vptr

value of d2 object will remain same: pointing to its own derive class v-table part) …….. derive d;

See the table on next page.

E-MAG – A Pioneer of Knowledge and Entertainment

One quarter of the bones in your body, are in your feet. 34

Written by: Fareed ul Hassan Baig Assistant Professor

Punjab University College of Information Technology

University of the Punjab, Lahore

E-MAG – A Pioneer of Knowledge and Entertainment

Only one person in two billion will live to be 116 or older. 35

LLeeaarrnniinngg CC++++ By Mian Zeshan Farooqi

In the last episode we learnt about the for loop. There are two more iteration structures available in C++ i.e.

while loop and do-while loop. Let’s see the while loop first.

The general form of a while loop is as follow:

while( expression ) statement;

The statement may be a single statement or a block of statements. The expression may be any valid expression

as we saw in case of for loop. The control first checks the expression, if it is true then it will execute the loop

statement(s) ; again checks the conditions and so on. If the expression evaluates to false then the loop

statements(s) will not execute. See the following example which prints counting from 1 to 10.

You might have noticed that unlike the for loop, increment is not the part of a while loop.

Now let’s see the last loop structure i.e. do-while loop. The difference between while and do while loop is that

the condition is checked in while loop prior to the execution of loop’s body, in do while loop the loop’s body is

executed first then the condition is checked. This means that the body of do-while loop executes at least once.

The general form of a do-while loop is as follow:

do{ statements } while( expression );

The expression again is any valid expression. The control will first execute the statements immediate after the

do statement; then check the expression, if it evaluates to true then it will again execute the statements (written

before the while statement) check the while expression again and so on.

#include <iostream.h>

void main ()

{

int i = 1;

while( i <= 10 )

{

cout<<i;

i++;

}

}

Episode # 7

E-MAG – A Pioneer of Knowledge and Entertainment

Over 1000 birds a year die from smashing into windows. 36

See the following example:

The above program will prompt the user to enter a negative number. It would must prompt and take the input

at least once . After that if the user enters a negative number then it will move outside the loop and display

“Good Bye” otherwise it will keep on prompting for input of a negative number until the user enters a negative

number.

As we’ve finished with all three loop structures. Now a question arises that which loop should we use, which one

is better than other. The answer is that it is totally depends upon your problem and scenario. Every loop has its

own use, however usually the loops are utilized in the following ways:

for loop is used whenever the number of iterations are known.

while loop is used when the number of iterations are not known (at the time of coding).

do-while loop is used whenever we need to execute the statements at least once.

However these are not the hard and fast rules. You must analyze the scenario and choose the loops which fulfills

your requirements.

#include <iostream.h>

void main ()

{

int number = 0;

do

{

cout<<“Enter a negative number to exit:”;

cin>>number;

}

while( number >= 0 );

cout<<”Good Bye”;

}

Author’s Note: If you need any kind of help regarding C++ then feel

free to contact me at [email protected]

E-MAG – A Pioneer of Knowledge and Entertainment

Owls are one of the only birds who can see the color blue. 37

EExxpplloorree WWiitthh MMee By Mian Zeshan Farooqi

Continue Statement

What:

continue is a keyword of C/C++

Where:

continue statement is used inside the blocks of statements of for, while and do-while loops.

Why:

continue statement is used to force the next iteration of for, while and do-while loops.

How:

continue statement skips all the instruction after it and takes the control back to the conditional expression of

loop in which this statement is written.

Examples:

The above code will print all the odd numbers between 1 and 10. In the above code, the display of variable’s

value is skipped if the value is even. The continue statement is used to skip the successive statement so that no

even number should print in this case.

int i = 0;

while( i <= 10 )

{

i++;

if( i%2 == 0 )

continue;

cout<<i<<endl;

}

E-MAG – A Pioneer of Knowledge and Entertainment

Peanuts are one of the ingredients of dynamite. 38

TTiippss nn TTrriicckkss

Place an image on a folder

1. Right-click the folder you want to add a picture to, and then click Properties.

2. In the Properties dialog box, click the Customize tab.

3. On the Customize tab, click Choose Picture.

4. In the Browse dialog box, click the picture you want to use, and then click Open.

5. Click OK.

When you view the folder using Thumbnails view, Windows displays a thumbnail of the picture you selected.

Add a Location to Send to Menu

When you right-click a file name or a thumbnail in Microsoft Windows XP, you see a shortcut menu for that file.

One of the items on the menu is Send To, which enables you to quickly e-mail a file, copy it to your desktop, or

copy it to a floppy disk.

Sometimes what you really want to do is to save a copy of the file to a specific folder on your computer. If you

have a folder where you frequently place files, you can add that folder’s name to the list of locations on the

Send To menu. This can save you the time of opening another Windows Explorer window and copying the file

from one folder to another. For example, you could create a My Pictures folder and then use the Send To menu

to copy your best pictures to that folder.

1. Click Start. Then, click My Computer.

2. In the My Computer window, click the Tools menu, and then click Folder Options.

3. Click the View tab. Under Hidden files and folders, click Show hidden files and folders, and then click OK.

4. In the My Computer window, double-click Local Disk (C:), double-click Documents and Settings, double-click

your user name, and then double-click SendTo.

5. Click the File menu, click New, and then click Shortcut.

6. The Create Shortcut Wizard appears. Click the Browse button.

7. In the Browse for Folder dialog box, click the folder you want to add to your Send To menu, and then click

OK.

8. Click Next and then Finish.

Now when you right-click a file and click Send To, the destination you selected will be an option on the Send To

menu. You can create shortcuts to local or network programs, files, folders, computers, or Internet addresses.

Courtesy to: Microsoft

E-MAG – A Pioneer of Knowledge and Entertainment

Penguins can jump as high as 6 feet in the air. 39

SSooffttwwaarree ooff tthhee MMoonntthh

Opera Web Browser 10

Opera software has released the third beta of its Opera 10 web browser. Opera 10

introduces a major visual change for Opera fans and brings quite a few new features

to the table, including a visual tab switcher, improved JavaScript performance and a

faster Opera Turbo feature.

The latest beta release adds some more options to what Opera calls “visual tabs.”

Visual tabs show up in the expandable bar just below your browser tabs. Either pull

down the tab bar or double-click the handle to reveal visual thumbnails of all your

open tabs. Previous betas lacked the new visual tab switcher and beta 3 adds a new option to have your tab bar

on either the left or right side of the window. To get to the new options, just right-click the tab bars and chooses

“Customize.”

Opera is also claiming some performance enhancements for the third beta, specifically in JavaScript

performance. While Opera 10 beta 3 felt pretty snappy in our

casual testing, pitting it against Firefox in the SunSpider Javascript

test revealed a considerable performance gap. Firefox 3.5 blazed

through the tests in 1250.6ms, while Opera 10 took 4794.8ms.

While Opera 10 may not have the best JavaScript engine on the

block, it does offer something most other browsers don’t the so-

called Opera Turbo feature which optimizes webpages for slow

connections. Turbo speeds up page loads by routing your requests

through a proxy server, compressing the images and the page code

before serving the pages to you. It was made for mobile users, but

regular desktop users requested it as well, so Opera built it into its flagship desktop browser. Opera 10

reportedly has a much improved version of Turbo, though without a slow connection to test it on, it’s hard to

say how much faster it is in this release.

Opera also continues its pioneering support for web standards. Opera 10 beta 3 scores 100/100 on the Acid3

test and adds support for CSS 3 features like web fonts, RGBA/HSLA color definitions and some SVG rendering

improvements.

Download Link: http://www.opera.com/browser/download

By: Dilawer Hussain

E-MAG – A Pioneer of Knowledge and Entertainment

Q is the only letter in the alphabet that does not appear in the name of any of the United States. 40

UUsseeffuull LLiinnkkss

3dmekanlar

360x180 degrees panoramic photographs of mosques, tombs, inns,

palaces, musea and other buildings, with the screensaver option. You

can visit these unique places: Just download and run the programs.

Once inside the program, move the mouse to the direction you want

to look at. You can use the scroll wheel to zoom in and out. If there is

no intervention for five seconds, the program will start showing you

around automatically. To use the program as your screensaver press

the F5 key. Press F9 to get a list of the 3D sites you downloaded

(residing in the same directory) and load the one you like by moving

the selection with the direction keys and pressing Enter. Click the left

mouse button to jump to the closest (visible) site.

NADRA

NADRA is one of the leading System Integrators in the global

identification sector and boasts extensive experience in designing,

implementing, and operating solutions for corporate and public sector

clients. NADRA offers its clients a portfolio of customizable solutions

for identification, e- governance and secure documents. NADRA has

successfully implemented the Multi- Biometric National Identity Card &

Multi-Biometric e-Passport solutions for Pakistan, Passport Issuing

System for Kenya, Bangladesh High Security Driver’s License, and Civil

Registration Management System for Sudan amongst other projects.

Download.com

Find the software you're looking for at CNET Download.com, the most

comprehensive source for free-to-try software downloads on the Web.

There are reviews and news on the latest softwares.

By: Dilawer Hussain

E-MAG – A Pioneer of Knowledge and Entertainment

Research indicates that mosquitoes are attracted to people who have recently eaten bananas. 41

TThhee CCoonnssttiittuuttiioonn ooff

The Islamic Republic of Pakistan

Article 11: Slavery, forced labour, etc., prohibited

11. Slavery, forced labour, etc., prohibited:

(1) Slavery is non-existent and forbidden and no law shall permit or facilitate its introduction into

Pakistan in any form.

(2) All forms of forced labour and traffic in human beings are prohibited.

(3) No child below the age of Fourteen years shall be engaged in any factory or mine or any other

hazardous employment.

(4) Nothing in this Article shall be deemed to affect compulsory service-

(a) By any person undergoing punishment for an offence against any law; or

(b) required by any law for public purpose:

Provided that no compulsory service shall be of a cruel nature or incompatible with human dignity.

Article 12: Protection against retrospective punishment

12. Protection against retrospective punishment:

(1) No law shall authorize the punishment of a person.

(a) for an act or omission that was not punishable by law at the time of the act or omission; or

(b) for an offence by a penalty greater than, or of a kind different from, the penalty prescribed

by law for that offence at the time the offence was committed.

(2) Nothing in clause (1) or in Article 270 shall apply to any law making acts of abrogation or subversion

of a Constitution in force in Pakistan at any time since the twenty-third day of March, one thousand nine

hundred and fifty-six, an offence.

Episode # 6

E-MAG – A Pioneer of Knowledge and Entertainment

Rubber bands last longer when refrigerated. 42

MMAAGG NNeewwss

August 18, 2009: (PU News) Punjab University College of Information Technology (PUCIT)

Principal Dr Syed Mansoor Sarwar has been appointed as Member Board of Directors of the

National Information & Communication Technology Research & Development (ICT R&D)

Fund Company. He will represent academia in this important national body. The Prime

Minister Yousaf Raza Gillani made the appointment at the recommendation of the Ministry

of IT.

The National ICT R&D Fund Company was established with the vision to transform the country into a knowledge-

based economy by funding efficient and sustainable ICT based research and development initiatives by

academia, preferably in collaboration with the IT industry. The company runs through funds from the Federal

Government, collected from the telecommunication companies in the country.

Dr Sarwar received his BSEE degree from UET, Lahore, and MS as well as PhD degrees in Computer Engineering

from the Iowa State University, US.

Dr Sarwar joined Punjab University in April, 2006 as Principal College of Information Technology. He started his

academic career in April 1982 as a Lecturer Department of Electrical Engineering, University of Engineering and

Technology (UET), Lahore. He has also served at UMT as Professor of Computer Science, Lahore University of

Management Sciences (LUMS), University of Portland’s Electrical Engineering and Computer Science

Department, Department of Electrical and Computer Engineering Kuwait University and Pak-American Institute

of Management Sciences, Lahore.

Dr Sarwar has 19 scholarly publications to his credit and has co-authored four books in the area of operating

systems. His most recent book, UNIX: The Textbook, 2nd Ed., was published on July 22, 2004. Dr. Sarwar's other

books included UNIX: The Textbook, 1st Ed.; LINUX: The Textbook and LINUX and UNIX Programming Tools: A

Primer for Software Developers. All of his books were published by Addison Wesley, Boston, USA. His books are

being used as textbooks in over 100 universities and colleges in the US, including University of Texas at Austin,

University of North Carolina at Chapel Hill, University of Arizona , Stevens Tech, University of California at Santa

Barbara and Syracuse University . His books have also been translated into the Chinese and Spanish languages

and are being used as textbooks in various universities in China, Spain and Mexico.

Dr Sarwar is also member of Electrical and Electronics Engineers (IEEE), Punjab IT Board (PITB), Higher Education

Commission's (HEC) National Committee for Standardization of Science Labs and HEC 's National Committee for

Review of the Computer Science Curriculum.

PUCIT: Classes of Fall 2009 semester will start on September 7, 2009.

Dr Syed Mansoor Sarwar

NNoottiicceess

If you are a good writer or a good poet and want to write for E-MAG then

you can send us your stuff at [email protected] If you like to share

some article or other stuff from your collection then you must mention

the name of original writer or poet.

Send us your feed backs at [email protected] or fill the online

feedback form at http://www.emagportal.com

If you want to communicate with any of the writers then send us your

message at same address and we’ll forward your message to the

respective person.

You can download E-MAG from http://www.emagportal.com or you can

also subscribe to our mailing list to receive a copy of E-MAG every month.

Some supporting files like WinRAR, Adobe Acrobat Reader, and other

supporting files which are discussed in articles are available at

http://www.emagportal.com

Website: http://www.emagportal.com

Email: [email protected]

This is the last page of E-MAG and has been left blank intentionally.

E-MAG is designed by: Mian Zeshan Farooqi

[email protected]