You are on page 1of 4

Anatomy of the Week before Exams

By Mimansa Bagri
It is a truth universally ac-
knowledged that a college
student- frenetically trying
to be in possession of class
notes- must be in his last
week of freedom before the
evil that is the end semester
strikes. This make or break
week before the exam is
the determining factor for
things of paramount impor-
tance, such as whether or
not you’ll get a chance to say
‘agle sem phod dunga’. In
lieu of the upcoming exams,
here’s a breakdown of the
final week depicting how a
person goes about doing
everything but studying.

Day 1:
The first day of the last
week before exams begins
with a lazy morning (or af-
ternoon, for some) as you
breezily wake up, stretch, ule that you already know friends have mentioned you you climb down the bed
start moving towards the you aren’t going to follow. in on Facebook, proceeding with yet another throbbing
bathroom but then make Closing the notebook, you then to procrastinate for headache, courtesy of that
a beeline for the kitchen, decide to treat yourself to half the day. all-nighter you pulled to fin-
congratulating yourself for some popular TV show for ish the remaining seasons
even thinking about taking a the rest of the day, in appre- You finally open up your of the same TV series. It is
shower. As you go through ciation of the day’s tedious notes in the evening and try when you try to walk to the
your Facebook feed, tagging work. to concentrate on the the- kitchen, expediently trying
friends in hilarious relatable orems in front of you. Two to avoid the bathroom that
memes while eating those Day 2: minutes into studying, you your mother comes out of
yummy aloo ka paranthas, You wake up the next day realise it’s tough as hell and nowhere and bashes you for
you vaguely realize that you to a pounding headache, remind yourself to complete not showering. Coming out
have exams coming up in a thanks to the binge watch- it tomorrow, moving on to of the shower, feeling invig-
week. After calmly finishing ing you did yesterday. Mov- an easy topic that you’ve orated and fresh as a daisy,
up your business you grab ing past the bathroom you already studied. Spending you open up the schedule to
a notebook, lots of coloured conveniently try to hide that two whole hours on the said see what’s set down for to-
pens and some textbooks. stinking smell by spraying topic, you close the book day. You look at the syllabus
Opening up the index page several layers of perfume and allow a satisfied grin to and the only thoughts run-
of the very first book, you over yourself. Promising take over your face. Done ning in your head are, ‘Too
write down the syllabus and yourself that you’d start for the day. tough. Will do tomorrow.
start the lengthy process studying today, you decide Will do day after tomorrow.
of concocting a convoluted that it wouldn’t hurt to re- Day 3: What is this topic? When did
and laborious weekly sched- ply to the comments your Groaning in frustration, we do this? Which subject is

1
this? I’m just going to revise est topic and begin your exam and you’re frantically day got progressed to dif-
the topic I covered yester- journey to doom. Two min- trying to recall everything ferent set of previous years’
day.’ And that’s all for day utes into this and you find that you’ve studied (or not) exam papers. As you lie on
tres. that you’re curled on the so far, simultaneously pray- the bed, surrounded by
bed, lying in a fetal position, ing to all the deities, Gods class notes and textbooks,
Day 4: cursing your life and sob- and Goddesses you’ve ever you think back to the days
Guilt is coursing through bing uncontrollably. And as known. Days 5 and 6 have when you had enough time
your nerves, your palms are has been said innumerable passed by in supersonic to study everything, but in-
clammy and there’s sweat all times by some famous poet, speed as you tried to com- stead decided to waste it
over your forehead because his singer friends, a few au- plete whatever part of the on things you can’t even re-
it’s already noon and you’ve thors and his philosopher syllabus you could (which member now. Closing your
wasted half the day playing acquaintances, “Life kicks wasn’t much). After that af- eyes, you heave a sigh and
Ludo (with the computer, you when you’re down”, frighting message by your move forward to turn off
because you are lonely) and your best friend texts you supposed best friend, you the lights, with one thought
have lost thrice. You realize and asks the one question were thrown into panic spiraling in your mind, ‘kal
that you’re screwed unless that leads to your downfall. by many such others who subah uth kar formulas hi
you seriously start studying “Kitna padh liya?” shamelessly asked doubts dekh lunga.’
now. So, that is what you and answers to different
do. You pick up a testing Day 7: questions from the book,
subject, open up the tough- It’s the night before the which by the end of the sixth

Decrypting Cryptography
By Kamalpreet Bhatia
In a world that is slowly be- idea of cryptography re- tion ciphers. He used this by three spaces. This is the
ing enveloped by advancing mains the same though: to cipher to communicate with beauty of ciphers. They take
day to day technologies, hide information in transit his troops on the battlefield. simple information and con-
it is virtually impossible to and make it available to the Using the Caesar cipher, we vert it to seemingly gibberish
assume that our informa- intended recipients only. can encrypt all the letters in content, which always holds
tion stays entirely secure. a message by shifting the al- a special message for those
Attacks on our information Using mathematical algo- phabet by a fixed number of it is meant for. The perfect
networks by viruses and rithms, cryptography helps places. counterattack against those
hackers are becoming com- in converting plain text into who aren’t very good at
monplace. The need to pro- what is commonly known Try decoding this out: Wr keeping secrets.
tect data and ensure that it as ciphers. Plain text is the eh ru qrw wr eh, Wkdw lv
does not fall into the wrong message which needs to be wkh txhvwlrq. There are a range of differ-
hands is what led to the ad- transmitted to the intend- ent ciphers that use many
vent of what we currently ed recipient and requires Were you able to make a more complex mathemat-
call cryptography. hiding. This is done using coherent message out of it ical algorithms to conceal
ciphers. Ciphers are a way simply at first glance? Try messages such as Playfair
Cryptography is defined as of converting these messag- proving your mettle as a Cipher, Four Square Ci-
the art and science of gen- es into an unknown format cryptographer. To be or not pher and the Vigenère Ci-
erating codes to conceal using complex algorithms. to be, that is the question, pher, a little more complex
vital information. Scientifi- You can visualize this as us- dear reader. In this exam- than the Caesar Cipher but
cally, it can also be defined ing ‘code language’ to hide ple, the message was en- definitely a lot of fun decod-
as making a cryptosystem information that can only be crypted by shifting the letter ing.
that is capable of providing accessed once it is decoded
information security. It has in the correct pattern. Con-
been in existence since time version of plain texts to ci-
immemorial. Hieroglyphs, pher texts is referred to as
which were used around encryption and vice versa as
4000 years ago in Egypt, are decryption.
the oldest recorded exam-
ples of a cryptographic tech- To explain ciphers to you
nique, in which scribes used on a basic level, let’s rewind
to transmit messages on a little. The Caesar cipher,
behalf of their kings. Now, named after the famous Ro-
this technique is used virtu- man General Julius Caesar,
ally everywhere in network is one of the most widely
security. The fundamental cited examples of encryp-

2
Where is Cryptography with the WhatsApp servers In a situation where attack- ment and services. If this
being used in the Modern due to which, an encrypted ers place themselves be- article spurred an interest
World? session is created between tween the message making in you for this subject, do
The answer is simple: all the two clients conversing software and the encryption take out some time to read
around us. Let’s take the with one another. For exam- system, the attackers will further about cryptography,
social media platform ple, if client 1 wants to send get a chance to see the in- particularly the many inter-
WhatsApp as an example. a message to client 2, the formation in plain text for- esting ciphers mentioned
Available in various mo- public keys of client 2 are re- mat before the algorithms here.
bile platforms, WhatsApp trieved from the Whatsapp get a chance to scramble it
guarantees that the mes- server, and this is used to up. End-to-end encryption In a world where there is
sage that is being sent only encrypt the message and closes this gap by having the constant threat to our infor-
reaches the intended receiv- send it to client 2. Client 2 message making software mation, having a secure and
er and no other third party then decrypts the message apply the scrambling direct- well thought out system to
to ensure the privacy of per- with his own private key. ly. By doing so, the chances protect data is much need-
sonal data. This is achieved of the information to ‘leak’ ed, especially one that has
through end-to-end encryp- End-to-end encryption are highly reduced. been so heavily infused with
tion. has many benefits, not the technology of comput-
just in platforms such as As engineers who deal with ers and other devices that
End-to-end encryption in WhatsApp but in many oth- handling data, cryptography are designed to generate,
WhatsApp is implemented er fields where security is an is an area of interest that we manipulate and modify such
using asymmetric cryptog- issue. These include protec- all should be well acquaint- data. The need for having a
raphy also known as public tion of digital signatures, en- ed with, especially those thorough and a well built
key systems. During instal- suring safe online payment who want to pursue a career knowledge of the art and
lation, the public keys of through credit card and tak- in fields such as information science of cryptography is
the clients are registered ing out cash from the ATM. technology or data manage- more important than ever.

Newsflash
By Trishla Verma

T he Admin has declared a stricter check on the


attendance as well as the use of unfair means
in examinations. Depending on the severity of the
T he rules of the Girls’ Hostels are now more
stringent as birthday celebrations are no lon-
ger permitted in hostel premises. Also, with heavy
breach of examination rules, one could face con- fines being imposed for every violation in both the
sequences that can extend from getting the paper Boys’ and Girls’ Hostels, students are advised to
cancelled to receiving a year back as per the norms follow the regulations strictly to avoid the punish-
set by the University of Delhi. Keep yourself up- ment.
dated with the attendance in your IMS account,
and make sure to stray away from anything which
could be perceived as ‘unfair means’ in your exam-
inations.
Q uizzes/Surprise tests, along with assign-
ments, are to be used as the mandatory pa-
rameter for internal marking for CBCS students.

C BCS students cannot appear for improvement


examinations. If a student fails in a course, he
or she would need to re-register and go through
S ecurity rules for entry into the college have
tightened and owner of vehicles (including
e-rickshaws, cars) now need to enter their details
the entire course again. The improvement exams while students need to show their ID cards at the
were a widely used tool until now for students to gate for entering into the campus. Also, rickshaws
increase their scores, and the scrapping of it for are no longer allowed to stay inside the campus,
the new batches may prove to be unfavourable. causing a great deal of inconvenience among the
students.

3
Professor Profile: Mrs. Sujata Sengar
By Anuja Sharma
After several attempts, the a city like Delhi. Hence, the
members of team Alliance difference in the hostel tim-
finally got the chance to in- ings are justified as there
terview Prof. Sujata Sengar, are workmen who reside in
who had welcomed us in the campus and the walls
spite of her busy schedule. behind the Girls’ Hostels can
Clearing the clutter over her be easily breached. Hence,
table, she kept aside her file rules are the same but due
to prepare for the interview. to our concern for girls, they
seem biased.
Q. Please tell us a bit
about your profession- Q. What are the chang-
al background. How has es that should be imple-
your journey as a teacher pline in NSIT? What has freedom should they be mented in this college?
been so far? changed over time? granted during the same? SS: The curriculum should
SS: I received my Bache- SS: More or less, statistically SS: They are extremely be more inclined towards
lors and Masters in ECE it has been the same since important as they all con- the technical aspects of
from Aligarh  Muslim Uni- forever. The root cause of tribute to the overall de- Engineering. The quality
versity and a Doctoral De- indiscipline amongst stu- velopment of students and of projects has gone down
gree from  the IIT, Delhi. I dents is their social envi- provide as a source of en- over the years probably due
have  worked as a Scientist ronments outside of college tertainment. However, this to the inappropriate ratio
Fellow at C.E.E.R.I., Pilani. and at home. Students’ ac- should not be tainted by of teachers to the students.
Coming from a family full of tivities need stricter moni- other activities like drinking Interest of a few students in
teachers, I always aspired to toring in the first two years or smoking, that this gen- research work should not
be one and so, I enjoy my of their college as they tend eration easily indulges in. It be subdued by the place-
work. to mature with age. is also imperative that we ment oriented approach of
spend more time with stu- the majority.
Teaching as a profession Q. What, according to you dents to understand their
gives you a lot of freedom impacts a student’s psy- likes and dislikes for they Q. Any piece of advice for
and helps you be in touch chology the most while are the future of this nation the students of NSIT?
with the young generation. ensuring proper regula- and have a lot to teach us SS: Since you are training to
tion of all the rules? too. In my opinion, the em- be an engineer, you should
In the technical field, I have SS: Teachers, including me, phasis on technical fests has be technically sound. Sec-
incorporated new topics usually punish students for also dwindled over time. ondly, being socially respon-
for practical learning and their wrongdoings. Howev- sible marks one’s character.
organised workshops to er, it is often not the best Q. Should the rules be Hence, discipline can nev-
enhance the understanding way to deal with students different for the two gen- er be neglected. We often
of students. I have also con- as they should always be ders? ignore the silent voice of
tributed in different cultural explained the repercussions SS: No, not at all. Howev- conscience within us every
activities and encouraged of what they do, though er, sometimes equal stan- time we cheat, mark prox-
my students for the same. practically, corrective pun- dards are not permissible ies or manipulate results of
For instance, I have helped ishments cannot be totally practically. For instance, a training and placement cell.
the students at ‘Prayas’ to replaced. boy found in an intoxicated These little, ‘ignorable’ ges-
operate. state is a bad image but a tures only add up to result
Q. How important are the girl in a similar state is even in corruption and scams at
Q. How would you com- cultural fests and other worse for other than the larger scales. The need of
pare the current and the co-curricular activities for common perils, she might the hour is to address such
past standards of disci- a student? What kind of face even greater risks in issues at the basic levels.

The Team
Mentors
Archita Goyal Asmita Goyanka Gautam Sharma Jatin Mahajan Rohit Gohri Soumya Gupta Yashna Paliya
Editors
Deepika Naryani Divye Girotra Ipshita Chatterjee Nishtha Jain Pritish Chatterjee Swati Hans
Journalists
Arushee Sharma Kshitij Mathur Perez Yeptho Simratpal Singh Satia Sharanya Swain Soumya Bisht Tanmay Singh Vandana Miglani
Anuja Sharma Ashwani Senapati Harshita Pasricha Kamalpreet Bhatia Kritika Anuragi Mimansa Bagri Trishla Verm a

Connect with us o n fb.com/nsitalliance


Follow us on Instagram @alliance_nsit
Netaji Subhas Institute of Technology, Azad Hind Fauz Marg, Sec. - 3, Dwarka, New Delhi 4

You might also like