Friday, May 29, 2020

How to Create a Professional Email Signature

How to Create a Professional Email Signature In prior blog posts I spoke about some rather sophisticated career management documents such a brag book, a networking newsletter, and a one-page biography. Today, I would like to focus on a more simple aspect of your job search toolkit but one that is many, many times overlooked: adding a professional email signature Consider the following scenario: You are a “heads down” corporate employee doing a good, no, make that a great job. Somehow, due to a perfect storm, you lose your job in a downright awful economy. After the shock wears off, you sit down at your personal computer and realize you have to start using your personal email as your “base of operation.” So, you make a list of everybody you know and you start firing off emails letting people know of your situation. Like any savvy job seeker, you begin the networking process which creates a lot more email activity. What you may not have considered are three key issues related to your newfound “base of operation” â€" your personal email account. For the time being while in full-bore job search mode, your personal email account is really your work email account. Why? Because you need to put forth the same professional image in your email signature when you are in transition (unemployed) as you do when you are employed. Let’s look carefully at each component of a professional email box: the email address itself, your display settings and the email signature. Email Address This is quite obvious but so often overlooked. “WineKook10 {at} gmail.com” is not an email address that evokes professionalism, intelligence and competence! Instead, create an email address more in line with what you would see in a work setting, for example, “Firstname_Lastname {at}yahoo.com.” Email Name Settings In a prior article I ranted about one of my pet peeves regarding LinkedIn etiquette. Well, here is a second pet peeve. Often I receive emails that read in my email program like so: from “ronjones{at}hotmail.com.” Or just as bad: from “ron” with no last name. Emails should always be sent via “First name Last name” (or vice versa). Not only is it professional, it is also the only way that recruiters and hiring managers can find your email in their overstuffed email bins â€" by sorting or searching on your name. This setting is easy to find and adjust in your email program. Email Signature It also amazes me as to how many emails I receive that have no email signature whatsoever. At best, I might see the person sign their name. For example, “Thanks, Matt.” While on the job you used a professional email signature, now, while in transition, it is more important than ever to convey a professional image. Here are instructions on how to create a highly professional and functional email signature when you are in job search mode. I bet you will keep the signature you create even after you land. After all, job search is not a one-time event during a time of need. Instead, you must incorporate a professional email signature and other strategies into your on-going career management. I am using my email signature as an example. Feel free to tailor these ideas to your own style. Name and Title Certainly lead with your name. Consider a larger point size and an attractive font and color. If you are in transition, consider starting your own consulting company. That way you can give yourself a title just like your last full time job! You may find yourself becoming a successful entrepreneur. If this strategy is not right for you, you can still add a tagline like the examples below. Email and Phone Number Include your telephone number and your email address. You want to make it extremely easy for recruiters and hiring managers to contact you. Don’t make it difficult to be reached. Believe it or not, there is some spontaneity in the corporate hiring process. Recruiters and hiring managers may call you on a whim, on a hunch, but you must make it easy for them. Having your phone and email address on every new, forward, or reply email can make the difference. Tagline Marketing is key for the viability of any business. Treat job search as a business. This means you must market yourself. When you are in job search you are not exclusively an information technology professional, sales professional, or engineer, you are also a marketer! You must market yourself because no one else will do it for you. I repeat… no one else will do it for you. All successful marketing campaigns include a tagline or catch phrase. You need one, too. Your tagline should be just a few words boiled down to your professional essence. Some examples: Tax Accountant: In taxing times, count on me. Web Designer: Visually translating your complex thoughts. Training Professional: Amy is the name, Training is my game. Even better, give the consulting company, discussed above, a logo. If you do, you can include your logo in your email signature. (Starting a consulting company when you are unemployed is a great idea: you create a brand for yourself, it shows you are motivated, you can make some interim cash, it is an insurance policy against a future layoff and you can use the business as a soft landing upon retirement.) You can consider adding your own branded logo even if you are not associating it with your new consulting company. The logo can be simply your own personal logo. Website and Blog Links Adding your website and/or blog creates a brand of a busy, successful, current, relevant and technologically-savvy professional. This is the exact image that you want to project when in job search mode! LinkedIn and Twitter Hyperlinked Icons In this section you can really demonstrate your 2011 brand. Companies need professionals that can relate to all of the generations in the workforce. You will clearly be showing your connection and adaptability to the Gen Y and Millennial generations by adding social media hyperlinks to your email signature. It goes without saying that the content you link to must be of the professional variety only! LinkedIn is perfect because of its professional focus. Twitter is also being used extensively by professionals and executives to share cutting edge business information. Twitter is no longer just for kids to tweet about their favorite mocha latte. You can find the full instructions for creating the clickable hyperlinked icons from this YouTube video. These instructions assume that you use Outlook as your email client. The time consuming part is finding the right LinkedIn and Twitter icons and resizing them so that they look appropriate for your email signature. Not to worry â€" I have already done this for you. You can download and save my LinkedIn icon here (click “download here” in upper right corner) and my Twitter icon here. Now open Outlook and follow these steps to complete the process: 1. Tools 2. Options 3. Mail Format 4. Signatures 5. New (or edit) 6. Click: Insert picture (on right hand side of screen) Insert desired picture 7. Now that picture is inserted into the signature click on the chain link icon (hyperlink) type in desired URL 8. Save Finished Product At this point, you have all the tools you need to create a professional, sophisticated, branded and technologically-savvy email signature. One last tip: don’t left-justify everything. Give it some visual appeal by using different alignment, fonts, point sizes and color. Please leave a comment below with your new professional email signature!

Monday, May 25, 2020

GO Wales Graduate Academy University of Manchester Careers Blog

GO Wales Graduate Academy University of Manchester Careers Blog Calling all unemployed or underemployed graduates living in Wales did you know you are eligible to apply a free training programme? The Go Wales Graduate Academy aims to provide recent graduates like yourself with the skills and experience to gain graduate employment. The programme lasts 6 weeks and consists of a 2 week residential course followed by a period of work experience. So how will the programme help you? 2 week training programme Teaches you and helps you to develop key personal, transferable and managerial skills required for the work place. Gives you the chance to work on case studies, team projects, presentations and reports- therefore developing skills many employers will be looking for. You’ll gain a qualification accredited by the Institute of Leadership Management. Work Experience Develops you employability and confidence. Enables you to build up your skills and experiences to enhance your CV. You’ll be in a better position to market yourself to employers. Helps you develop employer contacts which may come in useful throughout your career. The next Graduate Academy is being held in July and you have until 27th May to apply. There are limited places so if you are interested I would advise that you get you application in ASAP! To find out more and to apply to attend the Graduate Academy check out the Go Wales website. All Graduate

Friday, May 22, 2020

100+ Best Computer Science Interview Questions For Hiring - Algrim.co

100+ Best Computer Science Interview Questions For Hiring - Algrim.co 9. Compare method and constructor? Answer: Constructor: Used to initialize the instance of a class. Method: Used to perform some function or operation. Constructor: Doesn’t have a return type. Method: Has a return type. 10. What is a singleton class? Answer: Singleton class limits the number of objects created for a class to one but gives the flexibility of creating more objects if the situation changes. 11. What are the steps for creating the object? Answer: An object is first declared then instantiated and at last declared. For example Abc a= new Abc(); 12. What is the different type of access modifiers? Answer: There are four type of access modifiers as given below: • Visible to the overall package. No modifier needed. • Private â€" Visible to class only. • Public â€" Visible to the world. • Protected â€" Visible to package and subclass. 13. Which is the highest operator precedence in Java? Answer: The operator with the highest preference is Postfix operators i.e () []. 4. What is an array? Answer: The array is a container which holds the fixed number of similar data types. 15. What is the difference between equals() and method and == operator? Answer: The equals() is a method and it matches the content of the strings whereas == is an operator and matches object or reference of the strings. 16. Is string class final? Answer: Yes 17. What is a wrapper class? Answer: To access the primitive data type as an object we use wrapper class. They are following: Primitive Type Wrapper class boolean Boolean char Character byte Byte short Short int Integer long Long float Float double Double 18. Difference between overloading and overriding? Answer: Overloading is when two or more methods in the same class have the same method name but different parameters(i.e different method signatures). Overriding is when two methods having the same method name and parameters (i.e., method signature) but one of the methods is in the parent class and the other is in the child class. 19. What are multiple inheritances in Java? Answer: Java supports multiple inheritances i.e. the ability of a class to implement more than one interface. A class can implement multiple Interfaces but cannot extends multiple classes. 20. What is a stream? Answer: A stream can be defined as the sequence of data. There is two type of streams. InputStream: Used to read a data from a source. OutPut Stream: Used to write a data into a destination. 21. What is a Character stream? Answer: Java Character stream is basically used to perform input and output for 16 bit Unicode. The main classes users are FileReader and FileWriter which internally uses FileInputStream and FileOutputStream so the basic difference is that FileReader and FileWriter read and writes two bites at a time respectively. 22. What is a Byte stream? Answer: Java Byte stream is basically used to perform input and output for 8 bit Unicode. The main classes related to byte streams are FileInputStream and FileOutputStream. 23. What is an Interface? Answer: The interface is a reference type in Java, similar to the class but its collection of abstract methods. A class can implement multiple interfaces. 24. Difference between class and interface? Answer: Below are the difference between Interface and class: • The interface cannot be instantiated. • An interface doesn’t have any constructors. • Interface only have abstract methods. • A class implements an interface and extends a class. • An interface can extend multiple interfaces. 25. What is an abstract class? Answer: A class which contains the abstract keyword in a declaration is called abstract class. The properties of the abstract class are as follows: • Abstract classes may or may not contain abstract methods but, if a class has at least one abstract method, then it must be declared abstract. • The abstract class cannot be instantiated. • To use an abstract class, we have to inherit it from another class. • If we inherit an abstract class, then we have to provide implementations to all the abstract methods in it. 26. What is multiple inheritance? What are its advantages and disadvantages? Answer: Multiple inheritance is the process where a subclass can be derived from more than one super-class. Its advantage is that a class can inherit the functionality of more than one base class, but its disadvantage is that it can lead to a lot of confusion when two base classes implement a method with the same name. 27. Briefly describe the correct usage of the following HTML5 semantic elements Answer: • “The header element contains the introductory section of a page. It can also include the section heading, the author’s name, table of contents, or any other important navigational content.” • “The article element is used to house a piece of work that can be reused outside of the page without losing its intended meaning. News stories or blog posts are good examples of this.” • “The section tag is a versatile container meant for holding information that shares a common theme or purpose.” • “The footer element is designed to hold content that should appear at the bottom of a section or at the end of a page. This information might include the author’s name, related links, or copyright notices.” 28. What were some of the key goals and motivations for the HTML5 specification? Answer: HTML5 was designed to be able to replace HTML4, XHTML, and the HTML DOM Level 2. This new design provides better support for the web page structure through additional tags, ensures more consistent behavior across browsers, provides better cross-platform support, and delivers rich content like movies and graphics without the need for additional plug-ins. All of this not only makes design easier for the programmer, but it makes the end design more functional for the user. 29. What are some of the key new features in HTML5? Answer: Again, the interviewer will be looking to see not only if you’re aware of new versions of software, but also if you’re able to recognize the benefits and needs for them. By being familiar with the various features of HTML5, you’re showing that you stay current with industry trends and that you’re highly adaptable in the ever-changing tech scene. Some features you could mention include: • Improved support for embedding rich content like graphics, audio, and video • The introduction of web workers • New semantic tags including main, nav, article, section, header, footer, and aside • Extensions to the JavaScript API • Additional form controls like calendar, dates, time, email, url, and search 30. What are some advantages of using Python over other programming languages? Answer: Python has a wide variety of advantages over other programming languages, including: a. Its syntax is both easy to learn and easy to understand, reading more like a human language. b. It has large, standard libraries containing all areas like operating system interfaces, web service tools, and string operations. c. It also has extensive support libraries that drastically decrease time spent on coding, which in turn increases productivity, utilizing other languages like Java, C, C++, and C#. d. It has clean, object-oriented design and features strong integration processing capabilities. 31. Explain the difference between compile-time and runtime, then discuss how Python uses them during code checking. Answer: Both compile-time and runtime are programming terms that refer to various stages of software program development. Compile-time is the instance where the entered code is converted to executable, while runtime is the instance where the executable is running. Python performs some amount of compile-time code checking, although most of the checks don’t occur until code execution. 32. What is a view and what are some advantages of it? Answer: A view is a virtual table that contains rows and columns similar to a real table, yet does not contain data of its own. Some advantages of views are that they take up no space, they can be used to restrict access to the database, and they offer a simple way to retrieve complicated query results that need to be executed frequently. 33. Is it possible to find a loop in a Linked list? a. Possible at O(n) b. Not possible c. Possible at O(n^2) only d. Depends on the position of loop Answer: a. Possible at O(n) Have two pointers say P1 and P2 pointing to the first node of the list. Start a loop and Increment P1 once and P2 twice in each iteration. At any point of time if P1==P2 then there is a loop in that linked list. If P2 reaches NULL (end of linked list) then no loop exists. 34. Two linked lists L1 and L2 intersects at a particular node N1 and from there all other nodes till the end are common. The length of the lists are not same. What are the possibilities to find N1? a. Solution exist for certain cases only b. No linear solution exist c. Linear solution is possible d Only Non-linear solution exist. Answer: c. Linear solution is possible Have two pointers say P1 pointing to the first node of L1 and P2 to that of L2. Traverse through both the lists. If P1 reaches L1’s last node, point it to the first node of L2 and continue traversing. Do the same thing for P2 when it reaches L2’s last node. (By doing this, we are balancing the difference in the length between the linked lists. The shorter one will get over soon and by redirecting to longer list’s head, it will traverse the extra nodes also.) Finally, they will meet at the Intersection node. 35. Given a Binary Search Tree (BST), print its values in ascending order. a. Perform Depth first traversal b. Perform Breadth first traversal c. Perform Postorder traversal d. Perform Inorder traversal Answer: d. Perform Inorder traversal. It is the properfy of BST and Inorder traversal. 36. Is it possible to implement a queue using Linked List ? Enqueue & Dequeue should be O(1). a. Not possible to implement. b Only Enqueue is possible at O(1). c. Only Dequeue is possible at O(1). d. Both Enqueue and Dequeue is possible at O(1) Answer: d. Both Enqueue and Dequeue is possible at O(1) Have two pointers H pointing to the Head and T pointing to the Tail of the linked list. Perform enqueue at T and perform dequeue at H. Update the pointers after each operation accordingly. 37. Given a Tree, is it possible to find the greatest and least among leaves in linear time? a. Solution depends on the tree structure b. Linear solution exist c. Only Non-linear solution exist d. No linear solution exists Answer: b. Linear solution exist Have two variables Min and Max. Perform any tree traversal. Assign the first traversed leaf element to Min and Max for all other leaf elements check with these variables and update it accordingly. If a current element is Min then check with Max. Note: If you want to find the greatest and least among all nodes perform the checks for each node traversed. 38. Is it possible to find the greatest and least value among the nodes in a given BST without using any extra variables? a. No solution exists. b. Solution need 2 extra variables c. Solution exist without any extra variables d Solution need 1 extra variable Answer: c. Solution exist without any extra variables As per BST property, the left most node should be the least one and the rightmost node should be the greatest. In other words, the first and last node of an Inorder traversal are the least and greatest among the nodes respectively. 39. Is it possible to implement 2 stack in an array? Condition: None of the stack should indicate an overflow until every slot of an array is used. a. Only 1 stack can be implemented for the given condition b. Stacks cannot be implemented in array c. 2 stacks can be implemented for the given condition d. 2 stacks can be implemented if the given condition is applied only for 1 stack Answer: c. 2 stacks can be implemented for the given condition Start 1st stack from left (1st position of an array) and 2nd from right (last position say n).Move 1st stack towards right (i.e. 1, 2, 3 ...n) and 2nd towards left (i.e. n, n-1, n-2...1). 40. Given two keys K1 & K2, write an algorithm to print all the elements between them with K1 a. Solution need 2 extra spaces b. Linear solution is possible without using any extra space c. No linear solution exist d. Solution need 1 extra space Answer: b. Linear solution is possible without using any extra space Perform an inorder traversal. Once you find K1 print it and continue traversal now, print all other traversed elements until you reach K2. Note: If K1 == K2 stop once you find K1. 41. How many numbers of addresses are usable for addressing in a Class C network? Answer: c. 254 The number of addresses usable for addressing specific hosts in each network is always 2 power N - 2 (where N is the number of rest field bits, and the subtraction of 2 adjusts for the use of the all-bits-zero host portion for network address and the all-bits-one host portion as a broadcast address. Thus, for a Class C address with 8 bits available in the host field, the number of hosts is 254 • Class A 0.0.0.0 - 127.255.255.255 • Class B 128.0.0.0 - 191.255.255.255 • Class C 192.0.0.0 - 223.255.255.255 • Class D 224.0.0.0 - 239.255.255.255 • Class E 240.0.0.0 - 247.255.255.255 42. How are the data units at Application layer is called? Answer: The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or a user datagram, at the network layer the data unit created, is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media. 43. What protocol is used by DNS name servers? Justify. Answer: DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP 44. Which of the following is used to direct a packet inside an internal network? a. Routers b. Modem c. Gateway d. None of the above Answer: a. Routers Routers are machines that direct a packet through the maze of networks that stand between its source and destination. Normally a router is used for internal networks while a gateway acts a door for the packet to reach the ‘outside’ of the internal network. 45. What’s the Software Testing? Answer: A set of activities conducted with the intent of finding errors in software. 46. What is Acceptance Testing? Answer: Testing conducted to enable a user/customer to determine whether to accept a software product. Normally performed to validate the software meets a set of agreed acceptance criteria. 47. What is Accessibility Testing? Answer: Verifying a product is accessible to the people having disabilities (deaf, blind, mentally disabled etc.). 48. What is Ad Hoc Testing? Answer: A testing phase where the tester tries to 'break' the system by randomly trying the system's functionality. 49. What is Application Programming Interface (API)? Answer: A formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services. 50. What is Backus-Naur Form? Answer: A metalanguage used to formally describe the syntax of a language. 51. What is Beta Testing? Answer: Testing of a release of a software product conducted by customers. 52. What is Application Binary Interface (ABI)? Answer: A specification defining requirements for portability of applications in binary forms across different system platforms and environments. 53. What is Binary Portability Testing? Answer: Testing an executable application for portability across system platforms and environments, usually for conformity to an ABI specification. 54. What is the difference between verification and validation? Answer: Verification is a review without actually executing the process while validation is checking the product with actual execution. For instance, code review and syntax check is verification while actually running the product and checking the results is validation. 55. What is Bug? Answer: A fault in a program which causes the program to perform in an unintended or unanticipated manner. 56. What is Defect? Answer: If software misses some feature or function from what is there in requirement it is called a defect. 57. What is Branch Testing? Answer: Testing in which all branches in the program source code are tested at least once. 58. What is Breadth Testing? Answer: A test suite that exercises the full functionality of a product but does not test features in detail. 59. What's the Alpha Testing? Answer: The Alpha Testing is conducted at the developer sites and in a controlled environment by the end user of the software 60. What's the Beta Testing? Answer: Testing the application after the installation at the client place. 61. What is Component Testing? Answer: Testing of individual software components (Unit Testing). 62. What is End-to-End testing? Answer: Testing a complete application environment in a situation that mimics real-world use, such as interacting with a database, using network communications, or interacting with other hardware, applications, or systems if appropriate. 63. What is CAST? Answer: Computer Aided Software Testing. 64. What is CMM? Answer: The Capability Maturity Model for Software (CMM or SW-CMM) is a model for judging the maturity of the software processes of an organization and for identifying the key practices that are required to increase the maturity of these processes. 65. What is Compatibility Testing? Answer: Testing whether software is compatible with other elements of a system with which it should operate, e.g. browsers, Operating Systems, or hardware. 66. What is Debugging? Answer: The process of finding and removing the causes of software failures. 67. What is Dependency Testing? Answer: Examines an application's requirements for pre-existing software, initial states and configuration in order to maintain proper functionality. 68. What’s the Database testing? Answer: In database testing, we can check the integrity of database field values. 69. What is the difference between interoperability and compatibility testing with some examples? Answer: Interoperability: To check if the software can co-exist with other supporting software in the system Compatibility: To check if the software runs on different types of operating systems according to customer requirements. 70. What’s the Test Case? Answer: A set of test inputs, execution, and expected result developed for a particular objective. 71. What’s the Traceability Matrix? Answer: A document that showing the relationship between Test Requirements and Test Cases. 72. How many types of approaches are used in Integration Testing? Answer: There are two types of approaches used: Bottom-Up Top-Down 73. What is Emulator? Answer: A device, computer program, or system that accepts the same inputs and produces the same outputs as a given system. 74. What is Functional Decomposition? Answer: A technique used during planning, analysis, and design; creates a functional hierarchy for the software. 75. What is Integration Testing? Answer: Testing of combined parts of an application to determine if they function together correctly. Usually performed after unit and functional testing. This type of testing is especially relevant to client/server and distributed systems. 76. What is Metric? Answer: A standard of measurement. Software metrics are the statistics describing the structure or content of a program. A metric should be a real objective measurement of something such as a number of bugs per lines of code. 77. What is Quality Assurance? Answer: All those planned or systematic actions necessary to provide adequate confidence that a product or service is of the type and quality needed and expected by the customer. 78. What is Race Condition? Answer: A cause of concurrency problems. Multiple accesses to a shared resource, at least one of which is a write, with no mechanism used by either to moderate simultaneous access. 79. What is Scalability Testing? Answer: Performance testing focused on ensuring the application under test gracefully handles increases in workload. 80. What is Software Requirements Specification? Answer: A deliverable that describes all data, functional and behavioral requirements, all constraints, and all validation requirements for software. 81. What is an operating system? Answer: An operating system is a program that acts as an intermediary between the user and the computer hardware. The purpose of an OS is to provide a convenient environment in which a user can execute programs in a convenient and efficient manner. 82. What are the different operating systems? Answer: 1. Batched operating systems 2. Multi-programmed operating systems 3. timesharing operating systems 4. Distributed operating systems 5. Real-time operating systems 83. What are the basic functions of an operating system? Answer: Operating system controls and coordinates the use of the hardware among the various applications programs for various uses. Operating system acts as resource allocator and manager. Also operating system is control program which controls the user programs to prevent errors and improper use of the computer. It is especially concerned with the operation and control of I/O devices. 84. What is a kernel? Answer: The kernel is the core and essential part of a computer operating system that provides basic services for all parts of OS. 85. What is the difference between microkernel and macro kernel? Answer: The microkernel is a kernel which run services those are minimal for operating system performance. In this kernel, all other operations are performed by the processor. Macro Kernel is a combination of micro and monolithic kernel. In monolithic kernel, all operating system code is in the single executable image. 86. What is deadlock? Answer: Deadlock is a situation or condition where the two processes are waiting for each other to complete so that they can start. This result both the processes to hang. 87. What is a computer process? Answer: A program in execution is called a process. Processes are of two types: 1. Operating system processes 2. User processes 88. What are the states of a process? Answer: 1. New 2. Running 3. Waiting 4. Ready 5. Terminated 89. What are starvation and aging? Answer: Starvation is Resource management problem where a process does not get the resources it needs for a long time because the resources are being allocated to other processes. Aging is a technique to avoid starvation in a scheduling system. 90. What is semaphore? Answer: Semaphore is a variable, whose status reports common resource, Semaphore is of two types one is Binary semaphore and other is Counting semaphore. 91. What is context switching? Answer: Transferring control from one process to other process requires saving the state of the old process and loading the saved state for a new process. This task is known as context switching. 92. What is a thread? Answer: A thread is a program line under execution. Thread sometimes called a light-weight process, is a basic unit of CPU utilization; it comprises a thread id, a program counter, a register set, and a stack. 93. What is process synchronization? Answer: A situation, where several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which the access takes place, is called a race condition. To guard against the race condition we need to ensure that only one process at a time can be manipulating the same data. The technique we use for this is called process synchronization. 94. What is virtual memory? Answer: Virtual memory is a hardware technique where the system appears to have more memory than it actually does. This is done by time-sharing, the physical memory and storage parts of the memory one disk when they are not actively being used. 95. What is thrashing? Answer: It is a phenomenon in virtual memory schemes when the processor spends most of its time swapping pages, rather than executing instructions. This is due to an inordinate number of page faults. 96. What is fragmentation? Tell about different types of fragmentation? Answer: When many of free blocks are too small to satisfy any request then fragmentation occurs. External fragmentation and internal fragmentation are two types of fragmentation. External Fragmentation happens when a dynamic memory allocation algorithm allocates some memory and a small piece is left over that cannot be effectively used. Internal fragmentation is the space wasted inside of allocated memory blocks because of restriction on the allowed sizes of allocated blocks. 97. What is cache memory? Answer: Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory. 98. What is Throughput, Turnaround time, Waiting time and Response time? Answer: Throughput â€" number of processes that complete their execution per time unit Turnaround time â€" amount of time to execute a particular process Waiting time â€" amount of time a process has been waiting in the ready queue Response time â€" amount of time it takes from when a request was submitted until the first response is produced, not output (for time-sharing environment) 99. What are the sub-components of I/O manager in Windows NT? Answer: • Network redirector/ Server • Cache manager • File systems • Network driver • Device driver 100. What is a dual-mode operation? Answer: In order to protect the operating systems and the system programs from the malfunctioning programs the two-mode operations were evolved: System mode, User mode. 101. What is a relative path and absolute path? Answer: Absolute path-- The exact path from a root directory Relative path-- Relative to the current path 102. What are the disadvantages of context switching? Answer: Time taken for switching from one process to other is pure overhead. Because the system does no useful work while switching. So one of the solutions is to go for threading whenever possible. 103. What is a data register and address register? Answer: Data registers - can be assigned to a variety of functions by the programmer. They can be used with any machine instruction that performs operations on data. Address registers - contain main memory addresses of data and instructions or they contain a portion of the address that is used in the calculation of the complete addresses. 104. What is DRAM? Answer: Dynamic Ram stores the data in the form of Capacitance, and Static RAM stores the data in Voltages. 105. What are local and global page replacements? Answer: Local replacement means that an incoming page is brought in only to the relevant process' address space. Global replacement policy allows any page frame from any process to be replaced. The latter is applicable to variable partitions model only. 106. Explain the concept of batched operating systems? Answer: In a batched operating system the users give their jobs to the operator who sorts the programs according to their requirements and executes them. This is time-consuming but makes the CPU busy all the time. 107. What is SCSI? Answer: SCSI - Small computer systems interface is a type of interface used for computer components such as hard drives, optical drives, scanners, and tape drives. It is a competing technology to standard IDE (Integrated Drive Electronics). These were some of the probable questions for anyone who aims for a job in the CS sector.

Monday, May 18, 2020

Do Digital Tools Make us More or Less Productive at Work

Do Digital Tools Make us More or Less Productive at Work More technology means more efficiency right? There’s no doubt that technology has allowed us to accomplish more in our jobs. But within this realm of technology exists a grey area of digital tools that may or may not lead to the same kind of vocational accomplishment we have historically seen. This grey area, composed of tools like social media and a smorgasbord of apps, is highly multi-faceted; each tool has the potential to increase or decrease productivity. Communication adheres to a 24-hour cycle More communication can be both good and bad. Arguably, one could say that more communication inherently means more productivity. But it’s not so simple. Today’s plentiful communication options means that employees increasingly have to contend with interruptions to their workflow and with being ‘on standby’ as the result of checking work email around the clock. Some countries even think that the latter is of such importance that it must be addressed at a federal level. On the other hand, a constant access to phone and email also means that should any problems arise, you and/or your team will be there to address them immediately. A ‘too many cooks’ situation arises With all the apps available to us, it’s easy to suddenly find yourself with 20 different apps for 10 different tasks. All the ‘cooks in the kitchen’ might sound like a positive thing (more help, right?), but will ultimately end up hindering your productivity. Not only will you need to constantly switch between apps and recall where you put something, but so too will anyone you are collaborating with, thereby compounding the negative effects and wasting heaps of valuable time. But with a few choice apps that promote collaborative efforts and perhaps have a central depository of information (like Google Drive), you can easily avoid this situation. Not all digital tools are used efficiently This is especially true of the social tools. Companies that rely heavily on social media channels to conduct communication, file sharing, payment transfers, and the like, risk derailing their employees’ productivity even more. Given that employees need to log in to their personal accounts, it is easy to get sucked into perusing friends’ updates, photos, and following up on personal communications. Before you know it, an hour can disappear from your workday. For the sake of productivity, social media may not be the best platform to conduct such daily (or even hourly) tasks. Instead, save the social media for informal group announcements and general content sharing that is less job-specific. If it’s the inter-office chat function that you like, consider another program like Zoom or Google Hangouts, both of which have less social bells and whistles. Worst-case scenarios are inevitable As with many digital tools, electricity and internet connectivity will make or break productivity. But sometimes the power goes out or the Internet goes down. Such technical errors can have calamitous effects on the employee who has failed to save their progress or the manager about to deliver a presentation. Short of investing in a generator, these problems may not always be easily solved. The best thing you can do to limit the fallout is to have back ups when possible. For example, you can save an offline version of your slide show to a thumb drive or you can use a web program that saves your work as you go. As with any other part of your company, it’s important to make sure that current practices and procedures with digital tools are working as effectively as they can be. If a tool isn’t working, take a step back to evaluate why. If necessary, phase out the use of the tool. Just be sure that the task that was (or was not) being handled with the help of said tool doesn’t fall through the cracks. About the author: Michelle Arios works as Marketing Assistant for BizDb.co.nz.

Friday, May 15, 2020

Looking at Your Career from a Turkeys Perspective - Career Pivot

Looking at Your Career from a Turkey's Perspective - Career Pivot Careers and Turkey? The turkey metaphor comes from the book, End of Jobs by Taylor Pearson. I reviewed this book a couple of months ago in the post, The End of Jobs â€" A Book Every Boomer Should Read. Taylor compares our careers to turkeys. Taylor wrote in his book: A turkey is fed for a thousand days by a butcher; every day confirms to its staff of analysts that butchers love turkeys ‘with increased statistical confidence.’ The butcher will keep feeding the turkey until a few days before Thanksgiving…[The] turkey will have a revision of beliefâ€"right when its confidence in the statement that the butcher loves turkeys is maximal and ‘it is very quiet’ and soothingly predictable in the life of the turkey.” N.N. Taleb From the day a Thanksgiving turkey is born, everything about its lifeindicatethatthings are only going to get better. It’s hatched in a safe, sterile environment. It’s cared for and fed daily. Every single day, this pattern happens again. It wakes up to find plenty of food and a place to live. It is at themomentwhen the turkey has the mosthistoricaldata to show that its life is likely tokeepimproving, on the 4th Wednesday of November, that it realizes â€" It’s not so good to be a turkey. Since writing the review, I have been asked multiple times to talk about being a turkey. Last week, I was on Thom Singer’s Cool Things Entrepreneurs Do podcast and thetitle of the session isMarc Miller â€" Career Pivot…..Don’t be a Turkey. On Friday of this week, I will be speaking to the IIBA Austin chapteron the topic “Looking at Your Career from a Turkey’s Perspective and What To Do Instead.” I’ve never seen a metaphor resonate with people so quickly. Thank You, Taylor!! A Turkey’s Perspective In 1978, when I was right out of Northwestern, I went to work for IBM. I was a turkey. Listen to the most recent episode No worries. I would always have a job. Well, until January of 1993 when IBM nearly filed for bankruptcy. I then realizedit was not so good to be a turkey at IBM. IBM discontinued the full employment policy. They had their first layoffs in history and closed multiple locations. A lot of my colleagues were blindsided by what happened. They were not prepared financially or emotionally. Prior to October of 2001, Enron was a great place to work. Their stock was soaring. The company executives encouraged everyone to invest in Enron stock. Of course, October of 2001 came, and the rest is history. Many Enron employees lost everything, as they had all of their retirement savings in Enron stock. One year ago, if you worked in the oil industry, it would have been easy to be a turkey. Oil prices were over $100/barrel. Frackinghad revolutionized the industry. All things were great. When prices dipped below $30/barrel early this year, it was not so great to be in the oil industry. It is easy to be lulled into being a turkey when things are good. Have you been a turkey? My guess is that many of you will say yes. Gig Economy We are rapidly moving to a “gig” economy. There are many projections that, by 2020, almost half of the people in the United States will be contractors, freelancers or consultants. You can not afford to be a turkey. You always have to be looking for your next gig. I know this is not fun for most of you. You want to get into a position, do a good job and stay there for a while. For some, that will be possible. Today, the average job lasts a little under 5 years. If you think you will be in a job for the next 10 years, it may be possible…but not likely. You have to be prepared to move on at any time, or you will be a turkey. I developed the Targeted Job Search process so that you are always looking for your next gig, whether you are an employee of a company or a free agent. My next post will be How not to be a Turkey in the Gig Economy. Marc Miller Like what you just read? Share it with your friends using the buttons above. Like What You Read? Get Career Pivot Insights! Check out the Repurpose Your Career Podcast Do You Need Help With ...

Monday, May 11, 2020

Global Statistics Shaping Recruitment Trends [Infographic] - Margaret Buj - Interview Coach

Global Statistics Shaping Recruitment Trends [Infographic] In the past few years, the tech recruitment landscape has been bringing relevant changes in the HR industry such as artificial intelligence (AI) and the active presence of the internet and social media. Both of which have given major effects in hiring volume, as it is set to increase across the globe. With that, job seekers are taking a different path in finding the right job and career for them. In fact, 79% of job seekers are more likely to do their job search using social media. This, then, can be a contributing factor that drove HR to step up their game and use social media and other technological advancements with recruitment as well. Social recruiting enables HR professionals to engage with employees on a more personal and human level. However, only 33% of employers in 15 global markets are engaging their employees in social media platforms. One long-term effect of this is that such positive atmosphere in the workplace converts to an impeccable overall performance for the companyâ€"greatly affecting your workplace culture. It all boils down to how HR professionals take advantage of social media and various advancements to reap its benefits. As the industry is moving forward, you should too. It’s about time you assess your existing recruitment process and make necessary improvements so that your team can focus more on people and less on tasks. Take a look at these important takeaways on global trends statistics that could help your business in this recruitment infographic from ThisWay Global. If your goal is to retain best talents in the company, better focus on these figures and align them well with your strategies and take your recruitment process to the next level. About the Author Edward Page With an eye for detail and attitude towards excellence, Edward Page has proven himself to be ThisWay Global’s guide in recruitment technology. As a Business Development head, he leads a team to keep on pushing the envelope when it comes to using technology for recruitmentâ€"a hiring process that focuses on diversity and less on the bias.

Friday, May 8, 2020

What To Look For In An Online Resume Writing Service

What To Look For In An Online Resume Writing ServiceThe best resume writing service will provide the most thorough and detailed analysis of your professional experience and skills. They will review your qualifications, skill sets, education, and past work experiences to determine what the needs are for a particular position and how it will fit into your future plans. They will also assist you in drafting a compelling cover letter.Resume writing services are also trained in evaluating job applicants for employment. By working with several companies and different agencies, they are able to identify areas that need improvement, weaknesses, and current job openings. By making these recommendations, they can direct you to make changes that will ensure that you get hired.The best resume writing service will not only determine what areas you should improve upon, but also what areas you should focus on. The majority of employers base their decisions on experience and qualifications when hiri ng, not just on a short list of applications. It is important to be completely prepared when submitting your resume because in most cases, the resume that is sent out is an edited version of the original resume.Resume writing services must work with each resume to ensure that it meets the specific criteria of the company. When submitting your resume, your personal information must be safe and confidential. All spelling and grammatical errors are automatically corrected before the resume is sent out.At this stage, the resume has been read by the hiring manager, if any. The hiring manager may ask you a number of questions regarding your skills, qualifications, and career goals, which will aid in determining whether or not you are a good candidate for the position. As a result, the best resume writing service will provide you with a customized resume to meet the needs of the company and the position.Resume writing services are also skilled at editing resumes to keep it relevant. Many e mployees simply submit the resume as is without even checking the formatting to ensure that it is acceptable. If an employer is searching through several resumes, he or she will want to check the information presented in each resume, not just the first one.In addition to editing resumes, the best resume writing service also provides quality employee referrals. You may need the help of someone that already works for the company to ensure that you do not waste time or effort. The company will be able to locate a qualified and reliable employee that can successfully fill the position.The process of submitting your resume is similar to the job interview process. The resume writing service will take the time to read your resume and assess whether or not it is a good fit for the position. By developing a strong resume, your ability to secure the position is greatly increased. Since so many positions are filled via the Internet, it is vital that you submit a quality resume that will aid in securing the position.