Top 19 Weird Place Names in the World

Some place names are really strange and some are funny too. Also there are some stupid place names. For the sake of decency, i won't mention those indecent place names. But i will tell you about some weird but decent place names. Some of those bizarre place names are listed below. You may also watch the video.





  1. Pooh
    Pooh or Poo (also spelled as Puh) is a small town in Kinnaur district, Himachal Pradesh, India. The name of this place have same spelling as the exclamatory word used to express used to express disgust, impatience or contempt.

    funny, weird, strange, bizarre place names pooh in India
    Pooh Milestone
  2. Husband
    This funny named place is from Somerset township in Pennsylvania state of united states of america.
    Weird and funny place names in USA, Husband Pennsylvania, Somerset township
    Husband from Pennsylvania
  3. Lonelyville
    Lonelyville is a small beach community located in the western end of Fire Island in the Town of Islip in Suffolk County, New York, United States. It seems the people in Lonelyville are feeling lonely.
    weird and bizarre place name lonelyville
    Lonely Lonelyville from Fire Island
  4. Condemned Bar
  5. Condemned Bar is a former settlement in Yuba County, California. It lay at the confluence of Dobbins Creek and the Yuba River 3 miles south-southeast of Dobbins, at an elevation of 548 feet.
    Condemned bar weird and funny place name
    Condemned Bar
  6. HellHell, or Hiland Lake, is an unincorporated community in Putnam Township of Livingston County in the U.S. state of Michigan. I don't understand what made them name the place so.

    Hell - weird and funny place name
    Hell in America
  7. Oatmeal
    Oatmeal is an unincorporated community in Burnet County, Texas, United States. Do the inhabitants eat only oats?
    Unusual bizarre place name in US
    Oatmeal from USA
  8. SandwichSandwich is a town in Barnstable County, Massachusetts, United States having about 20,000 population. Who is so fond of sandwich there?

    Strange weird place names sandwich
    Sandwich !
  9. BoringBoring? Yes it is really boring. Boring is an unincorporated community located in Clackamas County, Oregon state, United States. If you are boring, it is the right place to go.

    weird unusual place names.
    Boring
  10. Bird in HandBird-in-Hand, Pennsylvania is a census-designated place in Lancaster County, Pennsylvania, United States. The place is named for a picture on an old hotel's swinging sign.

    funny place name bird in hand bizarre place name bird in hand
    Bird in Hand
  11. Happy Land
    If you are done with boring, you may go straight to Happy Land. Happy Land is also in United States. Happyland is an unincorporated community in Pontotoc County, Oklahoma, in the United States.

    Happy Land weird bizarre place names
    Happy Land from the same country with Boring

  12. Nowhere Else
    Nowhere else you can see such a place except in Australia. I am talking about Nowhere Else, not nowhere else. It is Nowhere Else, a place in Australia.

    Nowhere else strange place name weird place names
    Wanna go Nowhere Else?
  13. Erode
    We are not talking about erosion. Our concern is about Erode. Yeah, the proper noun Eorde, not the verb. Erode is a place in Tamil Nadu state of India.

    Erode weird place names, funny place names, bizarre place names
    Erode Junction
  14. Accident
    It may not be an accident to name the place so. Actually, it is heard that it was an accident which made people name the place so. Whatever, isn't it funny to hear, 'Welcome to Accident'?
    weird place name Accident name board
    Accident
    Accident weird unusual place names
    Hearty welcome to Accident!

  15. Pity Me
    What a pity! Pity Me is a suburban village of Durham, England.
    Pity Me unusual funny place names bizarre place name
    Pity Me, England
  16. Kala Bakra
    Kala Bakra means black goat in Hindi. There is a place named Kala Bakra in India. Kala Bakra village comes under the Bhogpur development block of Jalandhar. Jalandhar is a district in the Indian state of Punjab.

    Kala Bakra

    Kala Bakra
  17. Why
    I am wondering Why they named Why? Why Why is named so? Why is a tiny unincorporated rural community in Pima County, Arizona, United States.

    why unusual place name funny place names
    Why goto Why?
  18. Disco
    Disco is also a place name. Disco is another unincorporated community in Blount County, Tennessee, United States.

    Disco, Tennessee

  19. Loafers Glory
    If you are really a loafer, it may be the right place for you. It seems that being idle makes you glorious there. Loafers Glory is an unincorporated community in Mitchell County, North Carolina, United States.
    loafers glory, weird place names unusual place names
    Loafers rejoice, Loafers Glory welcomes you
  20. Handsome Eddy
    They don't mind to shout Eddy is really handsome. Handsome Eddy is a hamlet in Sullivan County, New York, in the United States.

    Handsome Eddy funny place name strange place name

Place Names that Sound Funny in Malayalam

In this post we will see some place name that sounds funny for malayalees. Some are from Kerala while some others are in places speaking different languages. Whatever, if you hear those names you will feel funny (only if you are a malayali (Keralite).

I am adding photos of boards placed on roadsides displaying the place name.

funny place name aliya vada in Gujarat sounds funny in malayalam
Alia vada or Aliya bada is a place in Gujarat state.

Ammayi Appan funny place name in malayalam tamil
Ammaiyappan is a place in Tamil Nadu state. The name sounds just like the Malayalam word for father-in-law.

Arada funny place name arabic malayalam
It is a place in in Makkah of Saudi Arabia. Actually the first letter in the Arabic of the place name is different from the Malayalam letter അ.

Marannodai maranaodai funny place name tamil malayalam

This is also a place from Tamil Nadu.

piles place name funny

I don't know where this place is. But the name is awesome!

funny place name UK english

The place ha ha or road with name ha ha is from UK.

funny place name Vellamadi place funny place name kerala malayalam

Vellamadi is a place in Kerala in Kannur or Kasargod district

funny place name Manthuka place funny place name kerala malayalam

Manthuka is place near Pathanamthitta.

How to Block Ads and Popups on Mozilla Firefox Browser

Tired of annoying ads on your Mozilla Firefox? Get rid of the ads yourself. But remember that, for almost all websites, ads are the only source of income. If everyone removes ads from websites, nothing will be available for free in internet anymore. You can simply block all ads in your Firefox browser yourself. To block ads on firefox browser, click on the menu button remove ads from mozilla firefox, ad blocker, block ads on firefox,block ads and popups on firefox in the top left corner of browser. Then select Add-ons in the menu. Then click Extensions. Then search adblock in the webpages that loads next. Click Install to the right of Adblock Plus in the results. Wait for a while, until the extension is downloaded. When download is complete, adblocker will get installed soon. Thus ad blocker is now installed on your firefox browser. If you still see any ads displayed, right click on it and select AdBlock plus-> Block this ad.  For details watch the following video.





How to Block Advertisements on Opera Browser

Tired of annoying ads on your opera browser? Get rid of the ads yourself. But remember that, for almost all websites, ads are the only source of income. If everyone removes ads from websites, nothing will be available for free in internet anymore. You can simply block all ads in your Opera browser yourself. To block ads on Opera browser, click on the Opera buttonremove ads from opera browser, ad blocker, block ads on opera in the top left corner of browser. Then select Get extensions in menu. Then click Extensions. Then search adblock in the webpages that loads next. Click AdBlock plus in the results. Then click Add to Opera button on the page that loads. Wait for a while until the extension is installed. Thus ad blocker is now installed on your Opera browser. If you still see any ads displayed, right click on it and select AdBlock plus-> Block this ad.  For details watch the following video.




How to Block Ads in Google Chrome Browser

Tired of annoying ads in Google Chrome? Get rid of the ads yourself. But remember that, for almost all websites, ads are the only source of income. If everyone removes ads from websites, nothing will be available for free in internet anymore. You can simply block all ads in your Google Chrome browser yourself. To block ads on Google Chrome browser, click on the button remove ads from google chrome, ad blocker, block ads on chrome in the top right corner of browser. Then select settings. Then click Extensions. Now, click Get more extensions. Then search adblock in the webpages that loads. Click Extensions on the left. Then click Add to chrome button on the right side of AdBlock. Wait for a while until a small file is downloaded. The chrome browser will open the file itself and install ad blocker. Thus ad blocker is installed in your google chrome browser. If you still see any ads displayed, right click on it and select AdBlock -> Block this ad.


Design and Analysis of Algorithms - Lecture Notes and Slides Free Download

Lecture notes as doc files and ppt slides for design and analysis of algorithms for free download.

Module I 

Introduction and Complexity
What is an algorithm – Properties of an Algorithm, Development of an algorithm, Pseudo-code Conventions, Recursive Algorithms – Performance Analysis - Space and Time Complexity –Asymptotic Notations – ‘Oh’, ‘Omega’, ‘Theta’, Worst, Best and Average Case Complexity, Running Time Comparison, Common Complexity Functions -Recurrence Relations – Solving Recurrences using Iteration and Recurrence Trees – Example Problems – Profiling - Amortized Complexity.

 Module II 

Divide and Conquer - Control Abstraction, Finding Maximum and Minimum, Costs associated element comparisons and index comparisons, Binary Search, Divide and Conquer Matrix Multiplication, Stressen’s Matrix Multiplication, Quick Sort, Merge Sort. – Refinements.

Module III 

Greedy Strategy - Control Abstraction, General Knapsack Problem, Minimum Cost Spanning Trees – PRIM’s Algorithm, Kruskal’s Algorithm, Job sequencing with deadlines.
Dynamic Programming - Principle of Optimality, Multistage Graph Problem, Forward Approach, Backward Approach, All-Pairs Shortest Paths, Traveling Salesman Problem.

Module IV

 Backtracking – State Space Tree - Fixed Tuple and Variable Tuple Formulation - Control Abstraction – Generating Function and Bounding Function - Efficiency of the method - Monte Carlo Method – N-Queens Problem, Sum of Subsets.
Branch and Bound Techniques – FIFO, LIFO, and LC Control Abstractions, 15-puzzle.

Module V

Sophisticated Algorithms - Approximation Algorithms – Planar Graph Coloring, Vertex cover - String Matching Algorithms – Rabin Karp algorithm - Topological Sort - Deterministic and Non-Deterministic Algorithms.

Lower Bound Theory - Comparison Trees for Searching and Sorting, lower bound on comparison based algorithms, Sorting, Selection  & Merging; Oracles and Adversary Arguments –Merging,Basic concepts of randomized algorithm-Las Vagas algorithm for search.

Module 5 - Lowerbound slides ppt

Free Light Weight (22KB) Sound Recorder Software

Free sound recorder software to record from microphone, stereo mix etc. Audio recording, Sound recording
Free light weight sound recorder
Looking for a light weight audio recording software? Here is one. It is a really small (about 22 KB) sized application. But it lets you record audio from different audio sources including your built-in microphone, external microphone, stereo mix and system audio. This simple lightweight free sound recorder just lists all the sound mixers available in your computer. You can select any one of them. The application allows you to record audio (including system audio) at various sample rates from 8000 onward and different sample size. You can record either both channels (stereo) or as single channel (mono). This audio recording application allows you to record audio in different audio file formats including wave (.wav), sun audio (.au), AIFF-C (.aifc), AIFF (.aiff or.aif) or SND (.snd).

Download Audio Recorder Program

NB: You may require JRE (Java Runtime Environment) 1.8 or later if you don't have it installed

Awesome Freeware Application

Have a try! An awesome freeware application for computers..
Download here.

Mad Mouse Prank Application Software - Trick Your Friends

mad mouse computer prankMad Mouse! Mouse goes mad? Not literally. What would you think if your mouse pointer is moving You can either download the app and give it to your friends. Or you can use the share buttons below to share the app with friends.
on its own? And what if not responding to your mouse's motion? Normally, one would assume that there is some problem with the mouse, especially some hardware problem. Right? You can trick your friends with an application which when opened, takes control of the mouse pointer. Just use the share buttons provided below to trick your friends. After running the mouse pointer mad on the screen for 2 or 3 minutes, the app will deliver a message, "you are pranked".

Click to download the app.

This app is based on java 1.8 jre. Therefore, the computer should have jre 1.8 or later. To get java 1.8 or later. Click here.

Add links for sharing using below buttons


Share to trick your friends



Share the trick with your friends

Computer Networks Modulewise Short Notes Free PDF and Doc Download

Welcome. I have uploaded some short notes (lecture notes) and slides for CN (Computer networks). Computer Networks is a subject taught for Computer Science and Engineering Branches and Information technology Branches. The notes for Computer networks are available for download. There are different notes from different sources. We have also included slideshows (slides). The note full set is complete. You can compare and study. Computer networks slides are specially mentioned as slides. MGU (MG university) Computer networks syllabus is available here.

Module 1:

Network requirements, Network Architecture, Layering and Protocols, OSI Architecture, Internet Architecture, Performance - bandwidth and latency, Delay bandwdith product, high speed networks.

Note Full Set


Other notes:


Module 2:

Direct Link network, hardware Building Block, Framing - Byte Oriented protocol, Bit oriented protocol, Clock based framing, Reliable transmission- stop and wait, sliding windows, Ethernet (802.3)- physical properties, Access protocol, wireless-bluetooth, wifi, Wimax


Other notes:

Module 3:

Packet switching-switching and forwarding-Datagram,  virtual circuit switching, source routing bridges and LAN switches - Learning bridges, Spanning tree algorithms, Broadcast and multicast, Limitations of bridges, simple internetworking - service model, global address, datagram forwarding in IP, address translation, Routing - network as graph, distance vector, link state, matrix.

Other notes:


Module 4

End to End protocol, simple de-multiplexer, reliable byte stream, TCP - Issues, segment format,connection establishment and termination, sliding window revisited, triggering transmission,, adaptive retransmission, RPC- fundamentals, TCP congestion control, - additive increase, slow start, fast retransmit and fast recovery, congestion avoidance mechanism, DEC bit, Randomearly detection bit, source based congestion avoidance.

Other notes:


Module 5

Applications -WWW, Email, name service, network management, web services custom application protocol, generic application protocol, overlay networks - peer to peer networks.


Other notes:


How Block Websites on a Windows Computer

We will see how to block websites on a computer. There is a fine trick to block websites on any computer. This is done by editing the hosts file. The 'hosts' file is used to map host names to given IP addresses. The 'hosts' file is a plain text file that can be edited using text editors. Each line is a redirection entry. Each line should be an IP address followed by a space followed by a host name. When any application software (including browsers) try to connect to a host name (or website) which has an entry in the 'hosts' file, instead of using the domain name service, the IP address is taken from the corresponding entry in 'hosts' file. Then the connection goes to that IP address.

So, if we want to block any website, we only need add an entry for that website in the hosts file with a different IP address. By 'different IP address', i mean any IP other than the original IP of the website. The IP 127.0.0.1 is IP of your own computer. It is called loop back address. You can use this IP to block any website. If you use this IP, the application will try to connect to your own computer on its attempt to access the blocked website and thereby will fail to load the website.

hosts File in Windows

In Windows 7, Windows 8 or 8.1 and Windows 10, the hosts file can be found in the folder:
C:\Windows\System32\drivers\etc\
Here, C: is Windows installation drive.

How to Edit 'hosts' File in Windows - Why to Edit It?

default contents of hosts file shown in screenshot of hosts file
Windows host file screenshot
There is a file named 'hosts' located in the following path: C:\Windows\System32\drivers\etc. For me, C is the Windows installation drive. Replace it with your Windows installation drive. The file can be found in the same path in Windows 7, Windows 8 and Windows 10. This file is used to map host names to IP addresses.

Why use hosts file

As said earlier, the hosts file is used to map domain name (actually host names) to IP some address. The file contains many lines starting with # symbol. Those lines are comments. Within the comments you can see some examples showing how to use the hosts file. Each line (not comments) should contain an IP address followed by a space and a host name. The format is:

IP_address<space>Host_name

When you access the host with given host name using your browser or any other application, before looking for the host name in your Internet Domain Name Service (DNS), your computer looks in the hosts file first. If there is an entry for the hostname the IP address provided in its line is used to access the website.

In the example given by Microsoft, rhino.acme.com is redirected to 102.54.95.97. Similarly x.acme.com is redirected to some other IP.

Why 127.0.0.1 ?

127.0.0.1 is the loop back address. It is the IP of your own computer. It is corresponding IP for localhost. localhost is the host name used to represent the computer from which we are accessing network (means our own computer). It is same to use 127.0.0.1 or localhost. But you cannot redirect a host name to another host name in hosts file. You should use an IP. When you redirect some host name to 127.0.0.1, actually you are redirecting the access to your own computer, which means blocking access to that host name

Uses of hosts file

As we have seen, the uses of hosts file are:
  • Redirecting one host (or website) to another using an IP
  • Blocking websites completely (by redirecting to 127.0.0.1)
Some people use hosts file to prevent pirate software accessing the vendors website to avoid auto update. We won't recommend piracy. Find a free software alternative if you cannot afford buying it.

Torrent or BitTorrent - What is it, How it Works, All about Torrents

Difference between Torrent and BitTorrent

Actually, there is no difference between BitTorrent and torrent. The name of this technology is BitTorrent. Later it became popularly known as torrent. People often use both torrent and BitTorrent interchangeably.

What is Torrent and How it Works

Now, we see what is torrent or BitTorrent. If you are not well versed with network terminologies, the simplest answer is,
Torrent or BitTorrent is a way of file sharing over internet, especially for large files.
And if you think you know something about networking, it can be defined this way:
BitTorrent is a protocol that enables of peer-to-peer file sharing that is used to distribute large amounts of data over the Internet.

How to Root Your Samsung Galaxy S4 Android Phone

Root Samsung Galaxy S4:

Everyone roots their Android phones. Samsung, Sony, HTC, every android phones are now being rooted. And you want to root your Samsung Galaxy S4 phone? Yeah, that is why you are in search of tutorial on how to root Samsung Galaxy S4. Okay, but there are some requirements.

Things to remember before you root your phone:
  • Rooting will nullify the warranty of your phone
  • If your phone bricks, we are not responsible for it.

Requirements to root Samsung Galaxy S4

The main requirements to do rooting of your Samsung S4 phone i9500 or i9505 are:
  • USB Data Cable 
  • Download Odin flashing software
  • Download USB Driver file
  • Download Root File

C Programming Previous Year Question Paper for Automobile, Mechanical, Production or Metallurgy

Here i have uploaded the previous year (2014 November) question paper of Programming in C for Third semester for Automobile Engineering, Mechanical Engineering, Production Engineering or Metallurgy branches under MG university BTech course.

Course : B.Tech Engineering (degree)
University: MG university (Mahatma Gandhi university) Kottayam, Kerala
Department or branch: Automobile Engineering, Mechanical Engineering, Production Engineering or Metallurgy

C Program to Simulate Round Robin CPU Sceduling Algorithm

The round robin CPU scheduling algorithm is simulated using C program. The time slice or time quantum is read from the user.

Program:

#include<stdio.h>
struct process{

C Program to Simulate Priority Scheduling CPU scheduling Algorithm

The following C program implements Simulation of  priority scheduling (CPU Scheduling algorithm). Each process or job is given a priority. The priority is represented using a positive integer. The priority increases as the value of the integer decreases.

Program:

#include<stdio.h>
struct process{

Simulation of Shortest Job First (SJF) CPU scheduling algorithm in C Language

This is a C program to simulate Shortest Job First (SJF) CPU scheduling algorithm. In Shortest Job first CPU scheduling algorithm, the process with  shortest CPU burst time is executed first. The following program is to simulate non preemptive SJF scheduling. Preemptive SJF CPU scheduling algorithm will be discussed in another post.

Program:

#include<stdio.h>
struct process{
int burst,wait,no;
}p[20]={0,0};

Simulation of FCFS CPU Scheduling Algorithm in C

This is a C program to simulate First come first served (FCFS) CPU scheduling algorithm. First come first served algorithm serves each processes (or jobs) in the order of arrival. The process with lowest arrival time is executed first.

Program:
#include<stdio.h>
struct process
{
int burst,wait;
}p[20]={0,0};

C Program to Simulate grep Command in Linux

This post contains C program to simulate grep command in Linux or Unix operating systems

Simulation of  grep command in Linux

#include<stdio.h>
#include<string.h>
main()
{

C Program to Simulate the ls Command in Linux Operating system

This is a c program to do Simulation of ls Command in linux. The ls command lists all the contents of the directory including filse and sub-directories. The following program in C language will simulate the ls command.

#include<stdio.h>
#include<dirent.h>
main()
{

C Program to Remove (Delete) a Directory using LINUX System Calls

This is a C program to delete  or remove a directory using the system calls in Linux or Unix operating systems. The program make use of the remove() system call in Linux.

#include<stdio.h>
#include<fcntl.h>
main()
{

C Program to open, read and write files and perform file copy operation usingSystem Calls in UNIX

Write a program to open, read and write files and perform file copy operation. This program show how to open, read, write and copy files using Linux or Unix system calls like open(), read() and write().

#include<stdio.h>
#include<fcntl.h>
main()
{

C Program to Open, Read and Write a file using System Calls

This is a C program to open , read and write files using system calls in Linux (UNIX) operating systems. The system calls open(), read() and write() are used in the C program to open, read and write files in Unix/Linux operating systems.

#include<stdio.h>
#include<fcntl.h>
main()
{

Using System calls in C Program to rename a Directory in Linux

C Program to rename a directory in Unix or Linux operating systems using system call rename().

#include<stdio.h>
main()
{

How to Create process and display Process ID (pid) of Both Parent and Child

This program shows how to create process and display Process ID (pid) of Both Parent and Child processes. The process is created using the fork system call in UNIX (Linux) operating systems.

#include<stdio.h>
#include<dirent.h>
main(int argc,char **argv)
{

How to use fork and exec System Call

Using fork and exec System calls in Linux (UNIX) operating systems. Fork system call is used to create a child process from a parent process.
#include<stdio.h>
main()
{

How to use exit() System call

C program to show how to use exit system call. The function exit() is used to exit from a process (or to terminate a process). This works both in Linux or UNIX and Windows operating systems.

#include<stdio.h>
main()
{

How to make parent process wait till Completion of Child Process (Joining parent with child process)

How to make the parent process wait till the completion of execution of child process. The following C program makes the parent process to wait till the completion of its child process.

#include<stdio.h>
main()
{

How to make Child process an Orphan Process

C program in Linux or Unix to make a child process orphan:

Making child as orphan

#include<stdio.h>
main()
{

C Program to Show Process ID in Linux

This program is to show the process id (pid) in UNIX or Linx
The system call getpid() returns the process id of current process.

#include<stdio.h>
int main()
{
printf("\n Parent Process ID %d",getppid());
}

Inter Process Communication using Named Pipes - Chat Program in C

In this post, we will see a chat program using named pipes (fifo). Pipes are used for communication between processes. The named pipes are fifos. They enable two way communication unlike ordinary pipes. But they are half duplex, i.e. communication can take place only in one direction at a time. The program is in 3 parts: pipe_creation.c, leftTerminal.c and rightTerminal.c.

pipe_creation.c

#include<stdio.h>
void main()

Creating A Process in Linux (UNIX) - fork() Example Program

The system call fork() is used to  create a new process in UNIX based operating systems and Linux systems. The fork() system call creates a child process when called from a parent process. Unix will make an exact copy of the parent's address space and give it to the child. Therefore, the parent and child processes have separate address spaces. Here is a C program which uses the fork() system call to create a process during execution. The program is commented well for better understanding.

Program

/*The program (parent process) reads an array from the user.
It sorts it in descending order.

TATA DocoMo Balance theft - Balance deduction for no reason

TATA Docomo is one of the telecom operators in India which steals customers' money by activating unwanted (and unknown) services automatically. I just had heard some such news from Internet forums. But when i bought a TATA DoCoMo Sim and began to use it, i experienced it.

 On 09/02/2015, i got an SMS. the message was as follows:
Unlimited at 49 is activated at Rs29.41 for 10days.Bal:Rs1.01 at 09-Feb-15 09:02.To stop, Dial or SMS STOP to 155223(Free)