Friday 8 December 2023

Object oriented programming in C++

 In this article we will tell you about object oriented programming in C++.


By Yash vashistha 

                   Object oriented programming in C++ :-

Object-oriented programming (OOP) is a programming paradigm that organizes code into objects, which are instances of classes representing real-world entities. It emphasizes encapsulation, inheritance, and polymorphism to structure code in a modular and reusable way.

Types Of object oriented programming in C++ :-

In C++, object-oriented programming is facilitated through several key concepts:

1. **Class:** The fundamental building block, defining a blueprint for objects.

2. **Object:** An instance of a class, representing a tangible entity with properties and behaviors.

3. **Encapsulation:** Bundling data and methods that operate on that data within a single unit (class), hiding the internal implementation details.

4. **Inheritance:** A mechanism that allows a class (subclass/derived class) to inherit properties and behaviors from another class (base class).

5. **Polymorphism:** The ability of objects to take on multiple forms; in C++, achieved through function overloading and virtual functions.

6. **Abstraction:** Simplifying complex systems by modeling classes based on the essential features they provide, while ignoring unnecessary details.

These principles collectively enable the creation of modular, reusable, and maintainable code in C++ through object-oriented programming. 

Main role of object oriented programming in C++ :-

The main role of object-oriented programming (OOP) in C++ is to provide a structured and modular approach to software development. OOP in C++ is centered around the following key principles:

1. **Encapsulation:** Bundling data and related functions into a single unit (class) to hide the implementation details. This enhances data security and allows for better organization of code.

2. **Inheritance:** Enabling the creation of new classes (derived classes) based on existing classes (base classes), promoting code reuse and the establishment of a hierarchy.

3. **Polymorphism:** Allowing objects of different types to be treated as objects of a common base type. This facilitates flexibility and extensibility in the code.

4. **Abstraction:** Simplifying complex systems by modeling classes based on essential features, while abstracting away unnecessary details. This helps in managing the complexity of large software projects.

5. **Modularity:** Breaking down a
Sure, let's start with a simple "Hello, World!" program in C++. 
        

           Programming in C++ :-


#include <iostream>

int main() {
    std::cout << "Hello, World!" << std::endl;
    return 0;
}

This program uses the `iostream` library for input and output and has a `main` function where the execution begins. It prints "Hello, World!" to the console. If you have a specific task or type of program you'd like assistance with, feel free to let me know! program into smaller, manageable units (objects and classes), making it easier to develop, test, and maintain. This promotes code reusability and collaboration among developers.

By adhering to these OOP principles, C++ enables the creation of robust, scalable, and maintainable software systems, fostering better organization, ease of understanding, and the ability to adapt to changing requirements.

Labels:

Tuesday 9 May 2023

Web designing

In this article we will tell you about web design 


By Yash vashistha 




 What is web design?


Web design refers to the design of websites that are displayed on the internet. It usually refers to the user experience aspects of website development rather than software development. Web design used to be focused on designing websites for desktop browsers; however,since the mid-2010s, design for mobile and tablet browsers has become ever-increasingly important.


A web designer works on the appearance, layout,and, in some cases, content of a website.appearence , for instance, relates to the colours,  font ,and , images used .

Layout refers to how information is structured and categorised. A good web design is easy to use, aesthetically pleasing, and suits the user group and brand of the website. Many webpages are designed with a focus on simplicity, so that no extraneous information and functionality that might distract or confuse user appears. As the Keystone of a web designer's output is a site that wins and Fosters the trust of the target audience, removing as many potential points of user frustration as possible is a critical consideration.


Two of the most common methods for designing websites that work well both on desktop and mobile are responsive and adaptive design. In responsive design, 

Content moves dynamically depending on screen size; in adaptive design, the website content is fixed in layout sizes that match common screen sizes . 

Preserving a layout that is as consistent as possible between devices is crucial to maintaining user trust and engagement. As responsive design can present difficulties in this regard, designers must be careful in relinquishing control of how their work will appear. If they are responsible for the content as well, while they may need to broaden their skillset, they will enjoy having the advantage of full control of the finished product.

One of the key ingredients to a successful product is the creation of effective, efficient and visually pleasing displays. In order to produce such high-quality displays, whether they are graphical (e.g., websites) or tangible (e.g., remote controls), an understanding of human vision is required, along with the knowledge of visual perception. By observing, researching, and identifying examples of our perceptual abilities, we can design products according to these unifying qualities. In order to spread such skills within the world of interaction design, we have developed “Gestalt Psychology and Web Design: The Ultimate Guide.”


Gestalt psychology is a theory of mind which has been applied to a number of different aspects of human thought, action, and perception. In particular, Gestalt theorists and researchers attempt to understand visual perception in terms of the way in which underlying processes are organized and how they help us make sense of the world. The organization of these cognitive processes is important to our understanding of how we interpret the constant stream of visual information entering our eyes and how it becomes a cohesive, meaningful and usable representation of the world. Over the last twenty years, the work of Gestalt psychologists has been adopted by interaction designers and other professionals involved in the development of products for human users.

Tuesday 2 May 2023

Type of hacking

 Type of HACKING:-


By Yash vashistha 

We will tell you about the type of hacking in this article 


Hacking is the activity of characterizing weaknesses in a knowledge processing system and a network to take advantage of the security to comprehend access to private knowledge or business data. Computers became obligatory in running a decent business. It is not enough to possess isolated computers systems. They need to be networked to facilitate communication with external businesses. This exposes them to the surface world and hacking. System hacking means exploitation of computers to commit fallacious acts like fraud, privacy invasion, stealing corporate/personal knowledge, etc. Cyber-crimes cost several organizations several bucks every year. Businesses are compelled to defend themselves against such attacks.

Types of Hacking :
Hacking is something from which you’ve to protect yourself and solely can be done by anticipating how a hacker might think to get into the system.

  1. Phishing –
    In this type of hacking, hackers intention is to steal critical information of users like account passwords, MasterCard detail, etc. For example, hackers can replicate an original website for users interaction and can steal critical information from the duplicate website the hacker has created.
     
  2. Virus –
    These are triggered by the hacker into the filters of the website once they enter into it . The purpose is to corrupt the information or resources on the net website.
     
  3. UI redress –
    In this technique, the hacker creates a pretend interface and once the user clicks with the intent of progressing to a particular website, they are directed to a special website.
     
  4. Cookie theft –
    Hackers access the net website exploitation malicious codes and steal cookies that contain tips, login passwords, etc. Get access to your account then will do any factor besides your account.
     
  5. Distributed denial-of-service(DDOS) –
    This hacking technique is aimed toward taking down a website so that a user cannot access it or deliver their service. Gets the server down and stops it from responding, which may cause a condition error constantly.
     
  6. DNS spoofing –
    This essentially uses the cache knowledge of an internet website or domain that the user might have forgotten keeping up to date. It then directs the data to a distinct malicious website.

  7. Social engineering –
  8. Social engineering is an attempt to manipulate you to share personal info, sometimes by impersonating a trustworthy supply.

  9. Missing security Patches –
  10. Security tools will become outdated as a result of the hacking landscape advancement and needs frequent updates to protect against new threats.
     
  11. Malware-injection- Devices –
    Cyber-criminals will use hardware to sneak malware onto your pc. You would have detected infected USB sticks which can allow hackers remote access to your device when it is connected to your pc.
     
  12. Cracking password
    Hackers will get your credentials through a technique known as key-logging.

Techniques to protect yourself :

  1. First, you’ve to make sure that your personal information and account details are kept private.
  2. Install antivirus code for shielding from malicious activity.
  3. Do not click on an unauthorized link and make sure to check any data sent to you is from a legitimate source.
  4. Always have updated software and do not use default configurations on devices.


Sunday 30 April 2023

Hacking

In this article we will tell you about HACKING.

By Yash vashistha

What is hacking ?

Definition: Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

Description: To better describe hacking, one needs to first understand ha

ckers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.


  • Authentication

    Authentication is the process of recognizing a user’s identity. It is the mechanism of associating a

  • Authorization

    Authorization is a security mechanism to determine access levels or user/client privileges related t

  • Buffer Overflow

    Buffer overflow occurs when a program tries to store more data in a temporary storage area than it c

  • Ciphertext

    Cipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output

  • Clickjacking

    Clickjacking is a phenomenon of hijacking "clicks" in a website context. It is vulnerability in the

  • Computer Virus

    A computer virus is a malicious software program loaded onto a user’s computer without the user’s kn

  • Computer Worm

    A computer worm is a malicious, self-replicating software program (popularly termed as 'malware') wh


  • Cross-site Request Forgery

    Cross-Site Request Forgery - also known as CSRF, XRSF or Cross Site Reference Forgery - is a type of

  • Cross-site Scripting

    Cross-site scripting (XSS) is a type of computer security vulnerability. It is accounted for almost

  • Cryptography

    Cryptography is associated with the process of converting ordinary plain text into unintelligible te.

Friday 28 April 2023

cycber security

cycber security :-

In this article we will tell you about cyber security 

By Yash vashistha 

Engineering is the process of developing an efficient mechanism which quickens and eases

What Is Cybersecurity?

What Is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cycberattecks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomwere ; or interrupting normal business processes.

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

What is cybersecurity all about?

A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. A unified th management system can automate integrations across select Cisco Security products and accelerate key security operations functions: detection, investigation, and remediation.

People

Users must understand and comply with basic data security principles like choosing strong passwords, being wary of attachments in email, and backing up data. Learn more about basic cybersecurity principles with these top 10 cyber tips.

Processes

Organizations must have a framework for how they deal with both attempted and successful cyber attacks. One welll-respected framework can guide you. It explains how you can identify attacks, protect systems, detect and respond to threats, and recover from successful attacks. Learn about the the NIST cybersecurity framework .

Technology

Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber attacks. Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud. Common technology used to protect these entities include next-generation firewalls, DNS filtering, malware protection, antivirus software, and email security solutions.

Why is cybersecurity important?

In today’s connected world, everyone benefits from advanced cyberdefense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.

Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open source tools. Their work makes the Internet safer for everyone.

Types of cybersecurity threats

Phishing


Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber attack. You can help protect yourself through education or a technology solution that filters malicious emails.


Social engineering


Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.


Ransomware


Ransomwwere is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system.


Malware


Malware is a type of software designed to gain unauthorized access or to cause damage to a computer. 


Tuesday 25 April 2023

Engineering ethics

In this article we will tell you about engineering ethics 

By Yash vashistha 

Engineering is the process of developing an efficient mechanism which quickens and eases the work using limited resources, with the help of technology. Ethics are the principles accepted by the society, which also equate to the moral standards of human beings. An engineer with ethics, can help the society in a better way.

Hence the study of Engineering ethics, where such ethics are implemented in engineering by the engineers, is necessary for the good of the society. Engineering Ethics is the study of decisions, policies and values that are morally desirable in engineering practice and research.

Morals

The word “Morality” originates from the Latin word “mos” meaning “custom”. Morals are the principles or habits with respect to right or wrong of one’s own conduct. They are not imposed by anyone. Morals are what you think is good and bad personally.

Though morals are not imposed, they can be understood as the preaching of our inner self. Depending on a few factors, our mind filters things as good or bad. These are the ideas that help frame our personality so that we can distinguish between what is right and what is wrong.

A moral is the code of conduct that you develop over time and set for yourself to follow, just like

  • Being good to everyone
  • Speaking only the truth
  • Going against what you know is wrong
  • Having chastity
  • Avoid cheating
  • Being a nice human being etc.

Morals are always defined by one’s own personality. Morals can be changed according to one’s beliefs as they are completely dependent on one’s perception towards the ethical values.

Ethics

The word “Ethics” originates from the Greek word “ethos” meaning “character”. Ethics are a set of rules or principles that are generally considered as standards or good and bad or right and wrong, which are usually imposed by an external group or a society or a profession or so.

Ethics can be understood as the rules of conduct proposed by a society or recognized with respect to a particular class of human actions or a particular group or culture. Ethics are dependent on others definition. They may or may not vary from context to context.

Ethics

A person who strictly follows a set of ethical principles, may not have any moral at all while a person who violates ethical principles at times, may maintain a high moral integrity. The ethical theories include duty ethics, right ethics, virtue ethics and so on. A best example that can explain ethics is utilitarianism.

Utilitarianism is the philosophy which explains that the happiness or pleasure of a greatest number of people in the society is considered as the greatest good. According to this philosophy, an action is morally right if its consequences leads to happiness of the people and wrong if the action leads to their unhappiness. This theory moves beyond the scope of one’s own interests and takes into account the interests of others.

Ethics in Engineering

Ethics are principles followed depending upon the moral responsibility that a person feels. The study of related questions about moral ideals, character, policies and relationships of people and organizations involved in technological activity, can be termed as Engineering ethics.

An engineer whether he works individually or works for a company, has to go through some ethical issues, mostly under the conditions such as, conceptualization of a product, issues arising in design and testing departments, or may be on the issues involving the manufacturing, sales and services. Questions related to morality also arise during supervision and team works.

The ethical decisions and moral values of an engineer need to be considered because the decisions of an engineer have an impact the products and services - how safe they are to use, the company and its shareholders who believe in the goodwill of the company, the public and the society who trusts the company regarding the benefits of the people, the law which cares about how legislation affects the profession and industry, the job and his moral responsibilities and about how the environment gets affected, etc.

Ethics in Engineering

Not only an engineer, but everyone has to follow a set of morals in order to keep away from getting morally degraded. Our behavior should include the following −

  • Respecting others and ourselves.
  • Respecting the rights of others.
  • Keeping promises.
  • Avoiding unnecessary problems to others.
  • Avoiding cheating and dishonesty.
  • Showing gratitude towards others and encourage them to work.

Morality commands respect for persons, both others and ourselves. It involves being fair and just, meeting obligations and respecting rights and not causing unnecessary harm by dishonesty and cruelty or by hubris.

Chemical engineering

 Chemical engineering 

In this article we will tell you about chemical engineering 

By Yash vashistha 

Chemical engineering involves the production and manufacturing of products through chemical processes. This includes designing equipment, systems, and processes for refining raw materials and for mixing, compounding, and processing chemicals.

Chemical engineers translate processes developed in the lab into practical applications for the commercial production of products, and then work to maintain and improve those processes. They rely on the main foundations of engineering: math, physics, and chemistry. Biology also plays an increasingly important role.


One of the four major kinds of engineering is chemical engineering – the others being civil, mechanical, and electrical engineering. As its name implies, it involves the production and the processing of chemicals. Chemical engineering is useful in the development of products, such as metals, detergents, plastics, and pharmaceuticals, from chemicals. In general, chemical engineers work to create safe uses for chemicals in the most cost-effective manner. New compounds may be discovered by chemists; however, without a chemical engineer engaging her skills to quantify, test, and produce it, the new compound may never become a final product.

Chemical engineering is based on a deep understanding of how matter is structured and how molecules can be transformed. At times, matter is inspected on the molecular scale, such as with certain polymes that are used in controlled-release formulated drugs. In contrast, matter can also be studied on the global scale, such as measuring the chemistry involved in global climate changes. In all, chemical engineers are responsible for contributing to the technological backbone of many of the world’s industries, ranging from the manufacturing of chemicals, pharmaceuticals, and plastics to the processing of petroleum and food.

Chemical engineers work to develop safe uses and processes for chemicals.

Because chemical engineering involves a deep understanding in a wide range of studies, it is also one of the most versatile disciplines. For example, a chemical engineer is expected to study chemistry, physics, advanced mathematics, and biology. As a result, those interested in chemical engineering can choose from any number of industries or specialties. Research, technical sales, a biomedical engineering are three such specialties, discussed below.

Chemical engineering is based on a deep understanding of how matter is structured and how molecules can be transformed.

Sometimes chemical engineering is deeply intertwined with research. In those cases, the engineers work hand-in-hand with chemists to create new or improved products or processing methods. Once a new or improved product is thought-up, the next step is to develop it – usually in a laboratory under the supervision of a chemical engineer. If the product appears to be successful, it continues on to a pilot plant where a chemical engineer will test the product or the new process, make changes where necessary, and keep detailed reports. In modifying the product or process, they want to ensure that it is better than before, without posing safety issues, creating undue waste, or spending too much money or time.

Chemical engineers can be employed in industries such as pharmaceuticals.

Technical sales engineering and biomedical engineering are each subsets of chemical engineering. A chemical engineer involved in technical sales will work with customers to determine what kind of manufactured product will fit their needs. Often times, they will work as managers and make decisions related to their business. A biomedical engineer develops concepts and ponders the ideas of other members in the medical and scientific community and makes them into devices, materials, treatments, instruments, procedures, and techniques that are usable and helpful to patients and their doctors.