Famous Quotes From the Legendary Robin Williams

Robin McLaurin Williams (July 21, 1951 – August 11, 2014) was an American actor and comedian. Rising to fame with his role as the alien Mork in the TV series Mork & Mindy (1978–82), Williams went on to establish a successful career in both stand-up comedy and feature film acting.

The death of Robin Williams silenced one of Hollywood’s most famous voices.

Robin Williams Famous Quotes :

  • No matter what people tell you, words and ideas can change the world.
  • You’re only given a little spark of madness. You mustn’t lose it.
  • You’re only given one little spark of madness. You mustn’t lose it.
  • God gave men both a penis and a brain, but unfortunately not enough blood supply to run both at the same time.
  • If women ran the world we wouldn’t have wars, just intense negotiations every 28 days.
  • I left school and couldn’t find acting work, so I started going to clubs where you could do stand-up. I’ve always improvised, and stand-up was this great release. All of a sudden, it was just me and the audience.
  • You have this idea that you’d better keep working otherwise people will forget. And that was dangerous.
  • Reality is just a crutch for people who can’t cope with drugs.
  • You’re only given a little spark of madness. You mustn’t lose it.
  • Never pick a fight with an ugly person, they’ve got nothing to lose.
  • I’m sorry, if you were right, I’d agree with you.

Rest In Peace Robin Williams!

Explain the importance of IP addressing and how can you classify it to represent IP address.

An IP address is an address used to uniquely identify a device on an IP network. The address is made up of 32 binary bits which can be divisible into a network portion and host portion with the help of a subnet mask. The 32 binary bits are broken into four octets (1 octet = 8 bits). Each octet is converted to decimal and separated by a period (dot). For this reason, an IP address is said to be expressed in dotted decimal format (for example, 172.16.81.100). The value in each octet ranges from 0 to 255 decimal, or 00000000 – 11111111 binary.

Classification of IP Address

In a Class A address, the first octet is the network portion, so the Class A has a major network address of 1.0.0.0 – 127.255.255.255. Octets 2, 3, and 4 (the next 24 bits) are for the network manager to divide into subnets and hosts as he/she sees fit. Class A addresses are used for networks that have more than 65,536 hosts (actually, up to 16777214 hosts!).

In a Class B address, the first two octets are the network portion, so the Class B has a major network address of 128.0.0.0 – 191.255.255.255. Octets 3 and 4 (16 bits) are for local subnets and hosts. Class B addresses is used for networks that have between 256 and 65534 hosts.

In a Class C address, the first three octets are the network portion.
The Class C has a major network address of 192.0.0.0 – 233.255.255.255. Octet 4 (8 bits) is for local subnets and hosts – perfect for networks with less than 254 hosts.

Network Masks:
A network mask helps you know which portion of the address identifies the network and which portion of the address identifies thenode. Class A, B, and C networks have default masks, also known as natural masks, as shown here:
Class A: 255.0.0.0 —–/8
Class B: 255.255.0.0 —/16
Class C: 255.255.255.0–/24

What are the different types of disasters? Explain in brief how can you develop disaster recovery plan?

The different types of disasters can be classified into two categories. They are:

Natural disasters
A natural disaster is a major adverse event resulting from the earth’s
natural hazards. Examples of natural disasters are floods,
tsunamis, tornadoes, hurricanes/cyclones, volcanic
eruptions, earthquakes, heat waves, and landslides.

Man-made disasters
Man-made disasters are the consequence of technological or human
hazards. Examples include stampedes, urban fires, industrial
accidents, oil spills, nuclear explosions/nuclear radiation and acts
of war.

Develop disaster recovery plan

Step1: Risk Analysis
The first step in drafting a disaster recovery plan is conducting a
thorough risk analysis of our computer systems. List all the possible
risks that threaten system uptime and evaluate how imminent they are in our particular IT shop.

Step 2: Establish the Budget
Once you’ve figured out your risks, ask ‘what can we do to suppress them, and how much will it cost?’

Step 3: Develop the Plan 
The feedback from the business units will begin to shape your DRP procedures. The recovery procedure should be written in a detailed plan or “script.” Establish a Recovery Team from among the IT staff and assign specific recovery duties to each member and Define how to deal with the loss of various aspects of the network and specify who arranges for repairs or reconstruction and how the data recovery process occurs.

Step 4: Test
Once your DRP is set, test it frequently. Eventually you’ll need to
perform a component-level restoration of your largest databases to get a realistic assessment of your recovery procedure, but a periodic
walk-through of the procedure with the Recovery Team will assure
that everyone knows their roles.

Why to choose symfony

I never gone too much deep over the symfony. However, I experienced it for one of my project. Adhering to an MVC pattern and strict object oriented language Symfony framework allows creating more testable code which can be reused in future and accordingly saves the time.

Choosing Symfony means having a long-term vision of application assets. It also means knowing how to make the day-to-day life of developers much easier.

The advantages of using symfony framework and the answers for the question why to choose symfony are:

1. Empowers Developers :

By taking features that would have previously have taken 100’s of lines of code and compressing them into one simple function call empowers developers to integrate more complex features into their Web Sites.
2. Allow for Quicker development of applications :

This is very relevant for people that need websites created in a very small window .

3. Lower Costs :

Allows programmers to pass cost savings onto the customer, a whole new range of customers generated that wanted a website but previously could not afford the higher development costs.

4.  Symfony tries to bring innovation to PHP:

It was one of the first major frameworks to embrace PHP 5.3, to introduce the usage of a Dependency Injection container, and to use a templating engine for its templates by default, Twig, which is now also adopted by major CMSes like Drupal and eZpublish. Symfony also has some unique features like its gorgeous debug toolbar and its great built-in profiler.

 

A very first program in c++ with the concept of class

include<iostream.h>
using namespace std;

class person
{
private:
char name[20];
int age;

public:
void getdata(void);
void dislpay(void);
};
void person :: getdata(void)
{
cout<<"Enter name:";
cin>>name;
cout<<"Enter age:";
cin>>age;
}
void person :: display(void)
{
cout<<"\nName: "<
cout<<"\nAge: "<
}
int main()
{
person p;

p.getdata();
p.display();

return 0;
}

Difference between object-oriented programming (OOP) and procedure-oriented programming (POP)

Difference between object-oriented programming (OOP) and procedure-oriented programming (POP) :

OOP POP
Emphasis on doing things (procedure). Emphasis on data rather than procedure.
Programs are divided into what are known as functions. Programs are divided into what are known as objects.
Data move openly around the system from function to function. Data is hidden and cannot be access by external functions.
Employs top down approach in the program design. Employs bottom up approach in program design.

Doctrine 2 Single Class Inheritance (SCI)

Single Class Inheritance is an inheritance mapping strategy where all classes of a hierarchy are mapped to a single database table. In order to distinguish which row represents which type in the hierarchy a so-called discriminator column is used.

Things to note:

  • The @InheritanceType, @DiscriminatorColumn and @DiscriminatorMap must be specified on the topmost class that is part of the mapped entity hierarchy.
  • The names of the classes in the discriminator map do not need to be fully qualified if the classes are contained in the same namespace as the entity class on which the discriminator map is applied.

<?php

namespace Entities;

/**
* @Entity
* @Table(name=”pets”)
* @InheritanceType(“SINGLE_TABLE”)
* @DiscriminatorColumn(name=”pet_type”, type=”string”)
* @DiscriminatorMap({“cat” = “Cat”, “dog” = “Dog”})
*/
class Pet
{
/** @Id @Column(type=”integer”) @generatedValue */
private $id;

/** @Column(type=”string”, length=300) */
private $name;

/** @ManyToOne(targetEntity=”User”, inversedBy=”id”) */
private $owner;
}

/** @Entity */
class Dog extends Pet
{
/** @Column(type=”string”, length=50) */
private $kennels;
}

/** @Entity */
class Cat extends Pet
{
/** @Column(type=”string”, length=50) */
private $cattery;
}

/**
* @Entity
* @Table(name=”users”)
*/
class User
{
/** @Id @Column(type=”integer”) @generatedValue */
private $id;

/** @Column(length=255, nullable=false) */
private $name;

/** @OneToMany(targetEntity=”Pet”, mappedBy=”owner”) */
private $pets;
}