I, Me, Myself

My photo
Hyderabad, Hindhu/AndhraPradesh, India
CoOl,jOvial,strAight fOrward

Search

Thursday, May 27, 2010

Previous year apgenco,apspdcl,apnpdcl,cpdcl,apepdcl

Induction Machines.

1.Speed of the stator field of an induction motor is ?
a. synchoronous speed   b.  any speed   c. less than synchoronous speed  d. slip speed

2.Difference in speed between stator field and rotor field?
a. full load speed  b. no load speed  c.slip  d. regulation
3.Frequency of current in rotor?
a. supply frequency   b.supply frequency d. slip frequency 

4.Shape of the torque slip curve ?
a. Rectangular hyperbola  b. parabola  c. sine  d.cosine

5.Machine with negative slip ?
a.induction motor  b. synchoronous machine  c.induction generator  d. brake

6. When rotor is at standstill ?
a.slip is zero b.slip is one c. any slip d. infinite slip

7.when the motor runs at synchoronous speed slip is ?
a. 1    b.infinite    c.zero       d. two

8.Which torque is greater ?
a.breakdown torque  b. Full load  c. No load  d. Running Torque

9.An induction motor analogous to ?
a. DCmotor b. T/F  c. Sync.Motor  d.DC gen

10.Blocked rotor is analogous to ?
a.OC test  b. SC test  c. swibners d.load test

11.Rotor Copper loss is equal to 
a. Frictional Loss b.Stator Loss  c. Slip times rotor input d. rotational loss

12.For the purpose of Plugging?
a. N is positive w.r.t. Ns    b .N=0     c.N is Negative  w.r.t Ns    d. N is Infinity 

13.Parameter from no load test is ?
 a.Ri and Xi     b.Ro and Xo   c.Copper Loss d. Impedence

14. If Stator field is rotating in clock wise direction rotor rotates in?
a.any direction b. cannot predict c. anti clockwise d. clock wise
15.Blocked rotor test is conducted at ?
a. High voltage b.rated current  c. high current d.rated voltage

16.Speed of Rotor field in space ?
a. N    b.Any speed   c. Ns    d. Slip Speed

17.Line joining tangent and output line in a circle diagram gives?
a.copper loss  b.stator loss   c. maximum output   d. maximum torque

18.Line joining tangent and torque line in a circle diagram gives ?
a.copper loss  b.stator loss   c. maximum output   d. maximum torque

19.No load test is conducted at ?
a. High voltage   b.rated current    c. high current     d.rated voltage

****************************All the Best **********************

Monday, May 24, 2010

Protection of Electrical Systems(Relays,Fuses,switches,CB,CTs)

Relay:
The device which detects the fault and isolates the operation of CB is called relay

Protection Of Alternators

1.Sudden Loss of Prime Mover
--it causes failure of prime mover it tends to alternator runs get inverted by using
reverse power relay this effect is protect
2.Sudden loss of Field
-- this cause the machine continuous to run as induction generator
3.Over Current
--- Because of overloading or Insulation breaking this will appear in alternators
over current relays are used for this problem
4.over speed
---partial reduction of load causes over speeds
-- Mechanical Con figural Governor will take care of this situation

5. over voltages
---partial withdraw of load causes overvoltages
automatic voltage regulators and automatic excitation controls will take care of the protection

Unbalancing Conditions
For this protection we use MergePrice schema

Pole slipping
when the 3 phase fault occurs this will appear in synchronous machines
electrical power suddenly becomes zero which causes max acceleration of the machine and rotor swings by a large angel with this it may loss its pole pitch
which causes dead short circuit or dead open circuit
--- it should be protected by tripping the field switch

Over Heating
-- Overloading
--failure of pulling mechanism
--Core Faults
this is protected by syristors(silicon controlled resistor)is used this schema is developped by using bridge balance method

Protection of Transformers


1.Internal faults---Buccholz Relay
2. Excess Leakage Current--By Using CT we Can Protect
3. unsymmetrical faults--Merze Price Schema
4. over Heating---- By using CT and heating element and Hating Sensor it will protect

Protection of Lines

--over currect protection-time,current,time/Current Gradding
--distance protection--Impedence,Reactane,Admittance
--pilot Relaying--For High Frequency Signals(wire pilots-upto 1kHz, CarrierPilot-1kHZ to 100KHz,Microwave-3 MHz to 900MHz)

Distance
Basic Equation
Torque-T
Gain Constants-K1,K2,K3,K4
T=K1 Isqure+K2 Vsqure+K3 VI cos(@-t)+K4
where K4 correction Factor

--Impedence-NonDirectional
K3=0,K4=0
used for protection of Distribution Lines and Short Transmission lines

Reactance Relay
--Change reactance due to
1. Frequency
2.Reactive power
3. Change of Sequence Operation
---NonDirectional Relay
for protection of Medium T/M lines
Negative Sequence Relay
Admittance Relay
--Directional Relay
For Long T/M Lines

PlugSettingMultiplier
PSM=Fault current/CurrentSetting*CT ratio

Bacterial Cell With a Synthetic Genome

Scientists 'Boot Up' a Bacterial Cell With a Synthetic Genome

ScienceDaily (May 20, 2010) — Scientists have developed the first cell controlled by a synthetic genome. They now hope to use this method to probe the basic machinery of life and to engineer bacteria specially designed to solve environmental or energy problems.

The study will be published online by the journal Science, at the Science Express website, on May 20.
The research team, led by Craig Venter of the J. Craig Venter Institute, has already chemically synthesized a bacterial genome, and it has transplanted the genome of one bacterium to another. Now, the scientists have put both methods together, to create what they call a "synthetic cell," although only its genome is synthetic.
"This is the first synthetic cell that's been made, and we call it synthetic because the cell is totally derived from a synthetic chromosome, made with four bottles of chemicals on a chemical synthesizer, starting with information in a computer," said Venter.
"This becomes a very powerful tool for trying to design what we want biology to do. We have a wide range of applications [in mind]," he said.
For example, the researchers are planning to design algae that can capture carbon dioxide and make new hydrocarbons that could go into refineries. They are also working on ways to speed up vaccine production. Making new chemicals or food ingredients and cleaning up water are other possible benefits, according to Venter.
In the Science study, the researchers synthesized the genome of the bacterium M. mycoides and added DNA sequences that "watermark" the genome to distinguish it from a natural one.
Because current machines can only assemble relatively short strings of DNA letters at a time, the researchers inserted the shorter sequences into yeast, whose DNA-repair enzymes linked the strings together. They then transferred the medium-sized strings into E. coli and back into yeast. After three rounds of assembly, the researchers had produced a genome over a million base pairs long.
The scientists then transplanted the synthetic M. mycoides genome into another type of bacteria, Mycoplasm capricolum. The new genome "booted up" the recipient cells. Although fourteen genes were deleted or disrupted in the transplant bacteria, they still looked like normal M. mycoides bacteria and produced only M. mycoides proteins, the authors report.
"This is an important step we think, both scientifically and philosophically. It's certainly changed my views of the definitions of life and how life works," Venter said.
Acknowledging the ethical discussion about synthetic biology research, Venter explained that his team asked for a bioethical review in the late 1990s and has participated in variety of discussions on the topic.
"I think this is the first incidence in science where the extensive bioethical review took place before the experiments were done. It's part of an ongoing process that we've been driving, trying to make sure that the science proceeds in an ethical fashion, that we're being thoughtful about what we do and looking forward to the implications to the future," he said.
This research was funded by Synthetic Genomics, Inc. Three of the authors and the J. Craig Venter Institute hold Synthetic Genomics, Inc. stock. The J. Craig Venter Institute has filed patent applications on some of the techniques described in this paper.

CPDCL,NPDCL,SPDCL,EPDCL Notifications for AE"s For EEE Degree Holders

CPDCL,NPDCL,EPDCL,SPDCL notifications are released from APgovt

For ASSITANT ENGINEERS

qulification : Engg in Electrical and Electronics.....


CPDCL- total 64 posts

NPDCL-34 posts

EPDCL-30

SPDCL-30 posts.......


no interviews only on the basis of merit list...candidates will select for AE posts........

All the best friends.........

ELECTRICAL SHOCKS............


UMAMAHESWAR
Hyderabad

Thursday, May 20, 2010

APGENCO Syllabus For EEE Notification not Released

Ap Genco syllabus

1.ELECTRICAL CIRCUITS AND NETWORKS

Kirchhoff laws, mes and node analysis, network theorems, sinusoidal steady state analysis of single phase and three phase circuits,
resonance, transient response of RL,RC,RLC circuits for different inputs, two-port networks, two element network synthesis.

2. CONTROL SYSTEMS

modeling of physical systems, Block diagrams and signal flow graphs, tiem and frequency domain analysis, steady state errors, Rouths' criterion,nyquist and bode plots, compensation, root loci,elementary ideas of state variable analysis, control system components

3.MEASUREMENTS AND INSTRUMENTATION

SI units, measurement of current, voltage , power, power -factor and energy, Measurement of resistance, inductance , capacitance and frequency-bridge methods, transducers and their applications to the measurement of non electrical quantities like temperature , pressure, strain, displacement etc.., cathode ray oscilloscope.

4. ANALOG AND DIGITAL ELECTRONICS

characteristics of diodes, BJT, FET,SCR, Amplifier biasing, equivalent circuits , frequency response, feedback amplifiers,power amplifiers ,oscillators, operational amplifiers and applications, wave shaping circuits, multi vibrators, flip-flops, universal gates, combinational circuits, A/D and D/A converters

5.ELECTRICAL MACHINES AND POWER ELECTRONIC DRIVES :

Single phase transformer, equivalent circuit, tests, regulation and efficiency, three phase transformer connections parallel operation, auot transformer, principle of energy conversion, windings of rotation machines, DC generators and motors, characteristics, starting and speed control, single phase induction motors, synchronous generations, performance, regulation, parallel operation,synchronous motors, starting characteristics and applications, synchronous condensers, fractional horse power motors, permanent magnet and stepper motors, characteristics of power electronic devices, phase control, bridge converters, choppers and inverters, basic concepts of adjustable speed drives.

6.POWER SYSTEMS :

Electrical power generation thermal, hydro, nuclear : transmission line parameters, steady state performance of overhead transmission lines and cables, surge propagation , distribution systems, insulators, bundle conductors, corona, and radio interference effects, per-unit quantities, bus admittance and impedance matrices, load flow, voltage control and power factor correction, economic operation symmetrical components, analysis of symmetrical and unsymmetrical faults, principles of over current, differential and distance protections, circuit breakers, concept of system stability, swing curves and equal area criterion

DotNet Interview Questions


DOTNET QUESTIONS AND ANSWERS
1.       What is .Net Framework?
The .NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services. The .NET Framework is designed to fulfill the following objectives
The .NET Framework has two main components: the common language runtime and the .NET Framework class library. The common language runtime is the foundation of the .NET Framework. You can think of the runtime as an agent that manages code at execution time, providing core services such as memory management, thread management, and remoting, while also enforcing strict type safety and other forms of code accuracy that promote security and robustness. In fact, the concept of code management is a fundamental principle of the runtime. Code that targets the runtime is known as managed code, while code that does not target the runtime is known as unmanaged code. The class library, the other main component of the .NET Framework, is a comprehensive, object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP.NET, such as Web Forms and XML Web services

2.       ASP.Net life Cycle?
The Life Cycle of a page when requested for the first time:
Initializing: During this phase, the server creates an instance of the server control
Loading: During this phase, the instance of the control is loaded onto the page object in which it is defined.
PreRendering: During this phase, the control is updated with the changes made to it. This prepares the control for rendering.
Saving: During this phase, the state information of the control is saved. For example, if a value is set for the control during the Load event, it is embedded in the HTML tag that will be returned to the browser.
Rendering: During this phase, the server creates the corresponding HTML tag for the control.
Disposing: During this phase, all cleanup tasks, such as closing files and database connections opened by the control are performed.
Unloading: During this phase, all cleanup tasks, such as destroying the instances of server control are performed. This is the final event in the life cycle of a server control

3.       Assembly’s
Assemblies are the building blocks of .NET Framework applications; they form the fundamental unit of deployment, version control, reuse, activation scoping, and security permissions. An assembly is a collection of types and resources that are built to work together and form a logical unit of functionality. An assembly provides the common language runtime with the information it needs to be aware of type implementations. To the runtime, a type does not exist outside the context of an assembly.
Assemblies are a fundamental part of programming with the .NET Framework. An assembly performs the following functions:
·         It contains code that the common language runtime executes. Microsoft intermediate language (MSIL) code in a portable executable (PE) file will not be executed if it does not have an associated assembly manifest. Note that each assembly can have only one entry point (that is, DllMain, WinMain, or Main).
It forms a reference scope boundary. The assembly's manifest contains assembly metadata that is used for resolving types and satisfying resource requests. It specifies the types and resources that are exposed outside the assembly. The manifest also enumerates other assemblies on which it depends.
Assemblies can be static or dynamic. Static assemblies can include .NET Framework types (interfaces and classes), as well as resources for the assembly (bitmaps, JPEG files, resource files, and so on). Static assemblies are stored on disk in portable executable (PE) files. You can also use the .NET Framework to create dynamic assemblies, which are run directly from memory and are not saved to disk before execution. You can save dynamic assemblies to disk after they have executed.
There are several ways to create assemblies. You can use development tools, such as Visual Studio 2005, that you have used in the past to create .dll or .exe files. You can use tools provided in the Windows Software Development Kit (SDK) to create assemblies with modules created in other development environments. You can also use common language runtime APIs, such as to Refelection.emit  create dynamic assemblies.
GAC & installation Files
Each computer where the common language runtime is installed has a machine-wide code cache called the global assembly cache. The global assembly cache stores assemblies specifically designated to be shared by several applications on the computer.
You should share assemblies by installing them into the global assembly cache only when you need to. As a general guideline, keep assembly dependencies private, and locate assemblies in the application directory unless sharing an assembly is explicitly required. In addition, it is not necessary to install assemblies into the global assembly cache to make them accessible to COM interop or unmanaged code.
Ex : gacutil [options] [assemblyName | assemblyPath | assemblyListFile]

4.       MSIL
When compiling to managed code, the compiler translates your source code intoMicrosoft intermediate language (MSIL),which is a CPU-independent set of instructions that can be efficiently converted to native code. MSIL includes instructions for loading, storing, initializing, and calling methods on objects, as well as instructions for arithmetic and logical operations, control flow, direct memory access, exception handling, and other operations. Microsoft intermediate language (MSIL) is a language used as the output of a number of compilers and as the input to a just-in-time (JIT) compiler. The common language runtime includes a JIT compiler for converting MSIL to native code.
5.       Compilers
6.       JIT
7.       Runtime Compilers and debug compilers
8.       Web.config & Machine .config
9.       Authentication a & authorization
10.   Events ,event bubbling
11.   String and string builder
12.   WCF and WCF overloading
13.   Linq to Sql
14.   SharePoint server overview
15.   WSS and Moss
16.   Sqlconnection flow
17.   Cursors,triggers,indexes

Cursor is a database object used by applications to manipulate data in a set on a row-by-row basis, instead of the typical SQL commands that operate on all the rows in the set at one time. For example, you can use cursor to include a list of all user databases and make multiple operations against each database by passing each database name as a variable
SQL Server is very good at handling sets of data. For example, you can use a single UPDATE statement to update many rows of data. There are times when you want to loop through a series of rows a perform processing for each row. In this case you can use a cursor.



Creates a DML, DDL, or logon trigger. A trigger is a special kind of stored procedure that automatically executes when an event occurs in the database server. DML triggers execute when a user tries to modify data through a data manipulation language (DML) event. DML events are INSERT, UPDATE, or DELETE statements on a table or view.

18.   CCW & RCW
19.   Delegate
A delegate can hold reference/s to one more more functions and invoke them as and when needed.
A delegate needs the method's name and its parameters (input and output variables) when we create a delegate. But delegate is not a standalone construction. it's a class. Any delegate is inherited from base delegate class of .NET class library when it is declared. This can be from either of the two classes
from System.Delegate or System.MulticastDelegate.
If the delegate contains a return type of void, then it is automatically aliased to the type of System.MulticastDelegate. This can support multiple functions with a += operator. If the delegate contains a non-void return type then it is aliased to System.Delegate class and it cannot support multiple methods.

20.   Reversing string in C#

using System;
 
static class StringHelper
{
    /// 
    /// Receives string and returns the string with its letters reversed.
    /// 
    public static string ReverseString(string s)
    {
        char[] arr = s.ToCharArray();
        Array.Reverse(arr);
        return new string(arr);
    }
}
21.   Magic Tables
There are 2 Magic Tables in SQL server Inserted and Deleted.
These are mantained by SQL server for Internal processing whenever an update, insert of delete occur on a table. However, we can refere these tables in a Trigger.
Whenever an update table statement is fired SQL server mantains the original row before updation in a deleted table and New (updated )row in a Inserted Table.

Same is the case when an insert is fired Only Inserted table is populated with inserted Row.
and when Delete table statement is fired Deleted table is populated with the deleted row.
1. Inserted
     Insert
     Update
2. Deleted

22. Views
23.   State management
A new instance of the Web page class is created each time the page is posted to the server. In traditional Web programming, this would typically mean that all information associated with the page and the controls on the page would be lost with each round trip. For example, if a user enters information into a text box, that information would be lost in the round trip from the browser or client device to the server.
To overcome this inherent limitation of traditional Web programming, ASP.NET includes several options that help you preserve data on both a per-page basis and an application-wide basis. These features are as follows:
·         View state
·         Control state
·         Hidden fields
·         Cookies
·         Query strings
·         Application state
·         Session state
·         Profile Properties
View state, control state, hidden fields, cookies, and query strings all involve storing data on the client in various ways. However, application state, session state, and profile properties all store data in memory on the server. Each option has distinct advantages and disadvantages, depending on the scenario.
View State
The view state  property provides a dictionary object for retaining values between multiple requests for the same page. This is the default method that the page uses to preserve page and control property values between round trips.
When the page is processed, the current state of the page and controls is hashed into a string and saved in the page as a hidden field, or multiple hidden fields if the amount of data stored in the view state property exceeds the specified value in the Max pagestate field length property. When the page is posted back to the server, the page parses the view-state string at page initialization and restores property information in the page.
ViewState["color"] = "red";
b. Control State – If you create a custom control that requires view state to work properly, you should use control state to ensure other developers don’t break your control by disabling view state. 



c. Hidden fields – Like view state, hidden fields store data in an HTML form without displaying it in the user's browser. The data is available only when the form is processed. 



d. Cookies – Cookies store a value in the user's browser that the browser sends with every page request to the same server. Cookies are the best way to store state data that must be available for multiple Web pages on a web site. 



e. Query Strings - Query strings store values in the URL that are visible to the user. Use query strings when you want a user to be able to e-mail or instant message state data with a URL. 



2. Server – Side State Management 

a. Application State - Application State information is available to all pages, regardless of which user requests a page. 



b. Session State – Session State information is available to all pages opened by a user during a single visit. 



Both application state and session state information is lost when the application restarts. To persist user data between application restarts, you can store it using profile properties. 

24.   How to call JavaScript function in code behind?
 Clientmanager.registerstartupscript();
25.    Static class and static methods
A static constructor is only called one time, and a static class remains in memory for the lifetime of the application domain in which your program resides. 


What is Polymorphism?
Polymorphism means same operation may behave differently on different classes.
Example of Compile Time Polymorphism: Method Overloading
Example of Run Time Polymorphism: Method Overriding

Example of Compile Time Polymorphism

Method Overloading
- Method with same name but with different arguments is called method overloading.
- Method Overloading forms compile-time polymorphism.
- Example of Method Overloading:
class A1
{
void hello()
{ Console.WriteLine(“Hello”); }

void hello(string s)
{ Console.WriteLine(“Hello {0}”,s); }
}


Example of Run Time Polymorphism

Method Overriding
- Method overriding occurs when child class declares a method that has the same type arguments as a method declared by one of its superclass.
- Method overriding forms Run-time polymorphism.
- Note: By default functions are not virtual in C# and so you need to write “virtual” explicitly. While by default in Java each function are virtual.
- Example of Method Overriding:
Class parent
{
virtual void hello()
{ Console.WriteLine(“Hello from Parent”); }
}

Class child : parent
{
override void hello()
{ Console.WriteLine(“Hello from Child”); }
}

static void main()
{
parent objParent = new child();
objParent.hello();
}
//Output
Hello from Child.



Value type and reference type
Get and Post Method
Get Vs Post Method

Get Vs Post Method to send data to the server

Get and Post are methods used to send data to the server:
With the Get method, the browser appends the data onto
the URL. With the Post method, the data is sent
as "standard input."

Use GET:
- during development for debugging purposes (although in ASP.NET it's
   also easy to see what has been sent through POST).
- if you want your visitors to be able to bookmark the submitted pages
- if you want to refer to submitted pages using hyperlinks

Use POST:
- for forms with password fields
- for large forms or forms with large text fields

Please note that web forms in ASP.NET use POST by default.

It can be changed into GET, but only for small forms. Web forms can post a lot
of data, especially when ViewState is involved.
Access modifiers
Classes
and structs can be restricted so that only the program or namespace they are declared in may use them. Class members can be restricted so that only derived classes can use them, or restricted so that only classes within the current namespace or program can use them. Access modifiers are keywords added to the class, struct, or member declaration to specify these restrictions. So in a nutshell access modifiers are keywords which control the visibility of class members and other code constructs.

The access modifiers in .NET are
1. public

2. private

3. protected

4. internal

5. protected internal
public

Public means visible to everyone and everywhere.

Access cases
1. By objects of the class

2. By derived classes
private

Private means hidden and usable only by the class itself. No code using a class instance can access a private member and neither can a derived class. Information or functionality that will not be needed or has no meaning outside of the context of a specific class should be made private.

Access cases
1. Cannot be accessed by object

2. Cannot be accessed by derived classes
protected

Protected members are similar to private ones in that they are accessible only by the containing class. However, protected members also may be used by a descendant class. So members that are likely to be needed by a descendant class should be marked protected.

Access cases
1. Cannot be accessed by object

2. By derived classes
internal

Internal are public to the entire assembly but private to any outside assemblies. Internal is useful when you don't want to allow other assemblies to have the functionality.

Access cases

In same assembly (public).
1. By objects of the class

2. By derived classes
In other assembly (internal)
1. Cannot be accessed by object

2. Cannot be accessed by derived classes
protected internal

Finally, we have the only compound access modifier allowed in .NET. Members marked as protected internal may be accessed only by a descendant class that's contained in the same assembly as its base class. You use protected internal in situations where you want to deny access to parts of a class' functionality to any descendant classes found in other
applications.

Note: that it's illegal to combine two access modifiers for a class but can only be applied to the members.

Access cases

In same assembly (protected).
1. Cannot be accessed by object

2. Can be accessed by a derived classes
In other assembly (internal)
1. Cannot be accessed by object

2. Cannot be accessed by derived classes


SqlServer Reporting Services (SSRS)
SSRS 2005 is the latest version of SQL Reporting Services, and ships with all versions of SQL Server 2005. SSRS allows you to quickly and easily create reports from multiple database sources. The finished reports can be presented directly from the reporting services website, or they can be displayed in your web- or Windows-based applications. Reports can be exported to multiple formats, including comma delimited text, XML, portable document format (pdf) and Microsoft Excel.
Crystal Reports:


Formula Fields
Parameter Fields
GroupName Fields
Running Total Fields
Special Fields
Unbound Fields

What is Global. asax
Global.asax is a file used to declare application-level events and objects. Global.asax is the ASP.NET extension of the ASP Global.asa file. Code to handle application events (such as the start and end of an application) reside in Global.asax. Such event code cannot reside in the ASP.NET page or web service code itself, since during the start or end of the application, its code has not yet been loaded (or unloaded). Global.asax is also used to declare data that is available across different application requests or across different browser sessions. This process is known as application and session state management.

The Global.asax file must reside in the IIS virtual root. Remember that a virtual root can be thought of as the container of a web application. Events and state specified in the global file are then applied to all resources housed within the web application. If, for example, Global.asax defines a state application variable, all .aspx files within the virtual root will be able to access the variable.

Like an ASP.NET page, the Global.asax file is compiled upon the arrival of the first request for any resource in the application. The similarity continues when changes are made to the Global.asax file: ASP.NET automatically notices the changes, recompiles the file, and directs all new requests to the newest compilation.
Validation Controls
RequiredFieldValidator
RangeValidator
RegularExpression validator
ComapareValidator
Custom Validator
validation Summary
Differences Between Varchar and Nvarchar
Varchar means Variable-length Character string.
Nvarchar will store Unicode characters.Both will be used all most for the same purpose but with little difference.
Varchar will store the 8-bit data in database where as Nvarchar will be stored as 16-bit data in Database.
In Sql server 2005
nvarchar stores unicode data while varchar stores ascii data. They function identically but nvarchar takes up twice as much space.
An nvarchar column can store any Unicode data. A varchar column is restricted to an 8-bit codepage. Some people think that varchar should be used because it takes up less space. I believe this is not the correct answer. Codepage incompatabilities are a pain, and Unicode is the cure for codepage problems. With cheap disk and memory nowadays, there is really no reason to waste time mucking around with code pages anymore.
All modern operating systems and development platforms use Unicode internally. By using nvarchar rather than varchar, you can avoid doing encoding conversions every time you read from or write to the database. Conversions take time, and are prone to errors. And recovery from conversion errors is a non-trivial problem.
If you are interfacing with an application that uses only ASCII, I would still recommend using Unicode in the database. The OS and database collation algorithms will work better with Unicode. Unicode avoids conversion problems when interfacing with other systems. And you will be preparing for the future. And you can always validate that your data is restricted to 7-bit ASCII for whatever legacy system you're having to maintain, even while enjoying some of the benifits of full Unicode storage.
nvarchar stores data as unicode, so, if you're going to store multilingual data (more than one language) in a data column you need the N variant.

Followers