Your Ad Here

Most Read Articles of Buddunan

Oracle IMP & EXP Command Line Tools

Oracle prvides these very important tools IMP and EXP, which we can use to import and export schemas, tables or whole database from remote database to our local database respectively. We can use this tool to schedule the import/exports.

To do schedule the import/export jobs, just write a batch file and schedule it using AT command available in WINDOWS. Similarly in LINUX/UNIX also we can do similarly by writing a shell script and schedule using any of the scheduler available in Linux/Unix.

IMP and EXP are used in four ways.
  1. Tables: To import/export perticular table we specify
  2. Owner: To import/Export all the objects owned by given user
  3. Tablespaces: To export/import tablespace
  4. Full: To import/export full database
Note: Using EXP command we cannot export the objectsc owned by SYS user.

Parameters for IMP:
  • fromuser: to import objects of given user
  • touser: to which user objects should import
  • show: this parameter makes the command to show which are imported and does not perform actual import. This may used for testing purpose.
Note: the structure of touser and fromuser schemas should be same in order to import command perform successfully without errors.

Parameters for EXP:

  • full: to specify the full export of database should be made
  • tablespaces: specifies the tablespaces are to be export
  • tables: this is for table export
  • owner: to export shema of the user
  • query: to restrict the exported rows using where clause

Most Dangerous Computer Viruses of the Century

"Computer Virus". The term which is known to any user of computers. It makes a lot of destruction to your computer. The worst part is some viruses not only affect to your computer but also all the computers connected to your computer. This will be a chain reaction. That means the virus will affect computers that connected to your computer and all the computers that connected to the computers connected to your computer and so on.


Confused??? See below.

Let us take for example, Computer A is connected over the network to Computer B.

Now another Computer C is connected over the network to Computer B.

So when the computer A is affected, B will be affected and in turn C will get affected. Network here does not mean a local network, but also Internet. How you connected may differ. It could be a direct connection, through emails etc.

The most dangerous viruses of the century are listed below:

Jerusalem
This is a DOS(Disc Operating System) based computer virus which was detected during 1988. Jerusalem University is the first place that the virus attacked. This is the reason for the name of the virus. It affected many parts of the world including US etc.
Internet Worm
Internet worm is termed with the code name Morris. It was first detected in November 1988. This virus does nothing but transmit files from one computer to another and their by eats the entire bandwidth. So the computers connected to the network stops responding.
This virus affected more than 5000 computers including NASA computer center. This virus is so intelligent that it can pickup the passwords of the users if requires. This is one of the major security threat during the 20th century.
Melissa
This is one of the most toughest viruses detected. This virus sends the emails to all the users in the address book of the affected computer. The virus loads with the file namely "List.DiC" which is loaded with the passwords of the pornographic sites.
This virus starts affected on March 26, 1999. It was developed by a New Jersey based computer engineer, David L. Smith.
The virus will mail to all the contacts stored in the Microsoft Outlook 97/98 address book. It can also send the passwords of the users back to the creator of the virus.

I Love You
This virus is much similar to the Melisa virus in its functionalities. It was created in May 2000 by a Philippines based student. Though he caught by the Police, they could not sentence him to the prison as there were no law supporting the cyber crime in the country. It made the people to create a common organization which define the law for cyber crime cases called European Union's Global Cyber Crime Treaty.
This virus will affect from a mail with the subject "I Love You" which gave the name to the virus. It affected millions of computers in a single day which tells us the importance of the word "Love" :)

The Code Red Worm
This is one of the strange virus developed by some of the unhappy people of US system. It is developed to attack "White House" website on a predetermined date. It uses many computers across the world to flood with the requests and their by crash the website.
This virus was detected in July 2001.

Downadup The latest and most dangerous virus started affecting in this year. It uses a flaw in the Microsoft Windows OS. Microsoft had given a patch to a flaw in October 2008. This virus uses this flaw and affects all computers that do not have the patch installed.
It is detected that about 3 million computers have affected with this virus. The other name for this virus is Conficker.

Mutual Funds

Types of mutual funds are based on investment objectives are

1. Growth or equity fund: These are funds that predominantly invested in equity and equity related schemes. Although these schemes have risk associated with the equity market, they also have a high growth potential while also having a high risk Investors must understand that these types of scheme must be entered keeping the long time period say for more than two years.

2. Sector specific funds: The investment objective of these funds is to invest in securities of a specific sector. The choice of the sector could vary depending on the investor preference and the return risk attributes of the sector. Sectoral funds are not well diversified as simple equity funds.

3. Equity linked saving scheme: This is a diversified equity scheme, which gives an investors benefit from tax point of view. On investing in this scheme, the investor gets return from taxable income to the extent of amount invested. This deduction is subjected to a maximum of Rs 1,00,000 .The investment is subjected to a lock in period 3 years.

4. Index fund: This is an approach based on passive style of fund mamangement. The fund manager does not take a call on individual stocks; the focus is on creating a portfolio that replicates an existing market index. An index fund provides an ideal exposure to equity market, without the investor having to bear the risk and cost arising from the market view that fund manager may take.

5. Income fund: This type of scheme invests in debt securities and government bonds. The risk is low and so the return,

6. Monthly income fund: As the name goes, these schemes have options for investors to choose monthly dividends. These schemes generally invest a small portion in equity and major portion in debt fund.

7. Fixed maturity plan: Fixed maturity plan (FMP) have a fixed maturity date. It could be a month, a quarter, or a year. Some have 3-4 year tenure. It is similar to a debt fund, but since the fund manager knows the tenure of scheme, it is easier to invest.

 

Advantages of Mutual Funds:

1. Diversification: since, a mutual fund scheme invest in a number of stocks, it helps the investors reduce his risk, as all his money is not in a single basket. Even if the stock price of one of the companies goes down, it does not result in a substantial loss to the investor as the other holdings can compensate for the loss.

2. Professional management: Fund managers in mutual fund are professionals who track the market on the regular and continue basis. With their mix of professional qualification and market knowledge, they are better equipped to understand the market and the normal investor.

3. Liquidity: Investment in mutual funds is completely liquid and can be redeemed at NAV related price at any working day.

4. Flexibility: Mutual funds offer a lot of flexibility to the investors in terms of the ability to switch smoothly between scheme of the same fund family, switching between dividend and growth options, systematic investment and withdrawal plans.

5. Choice of funds: A wide choice of fund schemes is available to the investors across the asset classes (equity/debt) industries, indices, and open ended/close ended schemes.

6. Transparency: An investor gets up-to –date information on the scheme, value of his investment, the various cost and charges and the number of units he has all detail.

7. Relatively inexpensive: With compared to other direct investment in capital markets, mutual costs less as they save the brokerage charge, demat, and depository costs.

8. Convenient administration: The process of investing, redeeming or switching is simple in mutual funds. Moreover the fund manager as actively managing the portfolio, the investor is not required to take the buy/sell decision to track daily movements.

9.Tax benefits: Investors in the mutual fund also enjoy the tax benefit, such as tax free dividends (subject to distribution tax) and concessional rates on short term and long tem capital gains.

10. Well regulated: Mutual fund industry is one of the highly regulated industry in terms of adherence to prescribed norms for valuation, disclosure to the investors and transaction processing.

 

Some common transaction in MFs are-

1. Investment Investing in a scheme.

2. Redemption Withdrawal of money from the scheme

3. Switch moving from one scheme of the fund house to another scheme of the same fund house. You need to redeem the money and reinvest again.

4. Systematic investment plan (SIP) Investment of the specified amount is done on a particular day of every month, irrespective of the market condition. Instructions for the number of months for the SIP have to be given in advance.

5. Systematic transfer plan (STP) Systematic transfer plan is a combination of switch and SIP. We can instruct a particular amount to be switched from one scheme to other on a particular day of every month.

6. Systematic withdrawal plan (SWP) Systematic withdrawal plan is helpful when one has lump sum to be invested and requires periodic payment. You could specify the date when you require the money at a particular amount is automatically redeemed every month from the scheme mentioned by you for the specified period.

Unlocking a locked table/object in Oracle

Oracle put locks on tables when any DML/DDL operations performing. Generally, some internal processes accesses the data and locks the table. So if you want to forcibly unlock the table you can follow the below steps.

  1. Get the Object ID from the dba_objects table. All of your tables will be assigned a unique id and stores a reference in dba_objects table. This table is useful in finding the basic information about each object stored on your Oracle instance, and not only tables.
    Here is the SQL statement to get the object id of the locked table.

    SELECT object_id FROM dba_objects WHERE object_name='YOUR TABLE NAME';

  2. Get the SID for the corresponding Object ID we have obtained from the step 1. You can get the SID from v$lock table. Here is the query.

    SELECT sid FROM v$lock WHERE id1=OBJECT ID FROM STEP1

  3. Note down all sid values from step 2. Get the sid, serial number pairs from the v$session table using the SID obtained from the step 2. Here is the query.

    SELECT sid, serial# from v$session where sid in (COMMA SEPARATED LIST OF SIDs FROM STEP2.)

  4. Note down the information from step 3. Now we have to kill the sessions that locked the object we require. Below is the query to do that.

    ALTER SYSTEM KILL SESSION (SID,SERIAL#) pair values from step 3
    e.g. ALTER SYSTEM KILL SESSION '231','23454'

Recession Proof Your Career

Nowadays, most common problem in any industry is JOB LOSS. Most of the employees in the subordinate or lower levels are scared of the news that are coming out everyday. Especially the people who are working in the export sector like IT, Jewelery etc., are most worried as one by one of their colleagues are loosing jobs and bad news are coming out everyday.

What's happening? Why people in all countries have to suffer when one country made mistakes? The answer - We Are Working In Globalist Country.
This is not only limited to the export sector jobs but it applies to everyone. This is because the effect on the economy growth is cyclically dependent. What does that mean and why?

Take for example, you are visiting a Multiplex. If you observe the situation there a few days back, you would have found huge crowd in all the shops buying different items, watching movies, spending a lot on eatables etc. From where these crowd came and where they get this money? They are the people who enjoying the fruits of globalism. They may be engineers, doctors or any person whose income levels grown over the time. If you see now or after some days, you will not find the same situation. Because the downturn started and people are fearing of their future.

When privatization started in India, it produced huge number of job opportunities and at the same time the spending power of people has increased. When global companies entered, the economy saw multi-folded growth and the purchasing power increased in the same way. This produced many more jobs in all the industries like Retail, Consumer Durables etc. So when the down turn started, the same companies start cutting the expenses and removing the employees. No country will be shielded from this until and unless it is self sustainable. How many such countries can you show me?

So what we cannot do is stopping all these in this recession time and what we can do is making our-self recession proof. How? Read on.

  1. Save Money: Money makes wonders and at the same time blunders. It can do anything. Handle with care. Thats all we can say. If you make money to good use, and save it, it will save you in the future. If you show the way to go away from your pocket, you will scare when it is not reachable to you. How to save money? Start controlling expenses. Minimize the movies you watch in a month, going to restaurants etc. Best use of your home as entertainment hub will give much better results.
  2. Shred Credit Cards: Credit cards are the best way to go into the unrecoverable disaster. How many times you find an item which you buys is out of reach of budget and still you bought just because you can make payment on credit card?

    Break the Credit Card into pieces, throw away in the dust bin and call your bank's customer care and ask them to close your account. Now start using your Debit Card. Find the difference in few days/weeks.
  3. Get away from the loans: Loans are the most easily available tool for the high earning people to spend and enjoy. But are the harder elements of life to pay back. Why not using the money that you have and avoid taking loans. The benefits: Mental relax, financially soundness. Don't you agree?
  4. Buy all the goods you use at a time and if possible buy them at once for more than one month or for an entire year. Benefits - You will get discounts, save money, sustain to the future surges of prices. Do you remember the inflation levels a few weeks back?

    Debatable question: How do I know that the prices are low and what if the prices dropped after I bought the goods? See next point.
  5. Keep track of your budget: Most of the people don't mind spending without any track on their spending. But if you write all your spending on daily basis starting from the chackobar you bought to the TV, you will notice the difference in your spending month by month and you can answer the question where I have to cut down my spending? For the previous point's question, you will find how the prices of goods are going if you categorize your spending.

    For example you write your spending by category like Provisions, Entertainment etc. Now see the difference month by month or even granular level. If the prices are stable over the time, it is the time to buy in bulk. If they are increasing/or in peak state, wait for some time.

Using command line argument in Shell Script

#!/bin/sh
#Shell script to demonstrate Command Line Arguments

# define variables to be used
i=1
fact=1

# simple loop to use the command line arguments
# Finding the factorial of a number supplied with the
# command line argument $1
while test $1 -ge $i
do
fact=`expr $fact \* $i`
i=`expr $i + 1`
echo $fact
done

echo "The Factorial Of $1 Is: $fact"
Command line arguments can be accessed by using the notation $0, $1, $2 and so on up to $9. Where $0 refers to the command/program name itself while other arguments refer to the command line arguments. To find count of arguments use $* or $@.
To handle more than 9 command line arguments, use shift operator. See an example below. while [ #1 -ge 1 ];
do
echo $1
shift
done



shift will shift $2 value to $1, $3 value to $2 and so on. If you want to use all command line arguments in more than one place, store them in an array before calling shift, as the arguments which shifted will not be retrieved again.
$# gives you the positional parameters where as $* will give you all parameters as a single word.

Closing the browser window using javascript

While I was working on some HTML files which requires closing the main window when I clicked on the close button which my application provided. I used window.close() javascript to close the browser window. It works perfectly fine under Internet Explorer 6 or lesser versions (<=IE6). However the problem comes when I tested it on the IE7 and Netscape 7.0 and Netscape 7.1. IE7 gives me a prompt which is asking whether to close the window or not. The script is not at all functioning in the Netscape browser.

After a lot of research I came to know that the problem is that we are closing the window using the script which was not opened by the script. So I made changes to the code which opens some new file in the same window using the javascript.

The new file contains the window.close() method in its onload() method of BODY tag.So the code looks like this..



function closeWindow(){
var agt=navigator.userAgent.toLowerCase();
var pos = agt.indexOf('msie');
version = navigator.userAgent.substring(pos + 5).substring(0, 1);
if((agt.indexOf("msie") != -1) && (version 7)
top.opener=top;top.close();
}else{
window.top.open("w2Close.html","_self");
}
}




This will works fine for the Internet Explorer v6 and above and Netscape v7 and above. The idea here is the browsers IE7 and Netscape support tabbed browsing so we cannot close them using window.close(). So we close the browser by opening a new file in the same window using script.