Thursday, March 26, 2020

Cloud computing

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.

Tuesday, March 17, 2020

top programming languages 2020

Let us take a look at best Programming Languages to learn in 2020 for a job and for future prospects:
  • Python. Python undoubtedly tops the list. ...
  • Java.
  • C/C++ C/C++ is like the bread and butter of programming. ...
  • JavaScript. JavaScript is the “frontend” programming language. ...
  • Go programming language. ...
  • R. ...
  • Swift. ...
  • PHP.

Monday, March 16, 2020

object oriented programming

Object-oriented programming (OOP) refers to a type of computer programming (software design) in which programmers define the data type of a data structure, and also the types of operations (functions) that can be applied to the data structure.
Object-oriented programming is a programming paradigm based on the concept of "objects", which can contain data, in the form of fields, and code, in the form of procedures. A feature of objects is an object's procedures that can access and often modify the data fields of the object with which they are associated

Sunday, March 15, 2020

Which brand computer is best?

  • Best & Worst Laptop Brands 2019

  • HP (86/100) HP has vaulted to No. ...
  • Asus (83/100) As they say, fortune favors the bold. ...
  • Dell (81/100) ...
  • Alienware (80/100) ...
  • Lenovo (76/100) ...
  • Razer (75/100) ...
  • Acer (75/100) ...
  • Microsoft (72/100)

Blockchain

What is Blockchain?


If this technology is so complex, why call it “blockchain?” At its most basic level, blockchain is literally just a chain of blocks, but not in the traditional sense of those words. When we say the words “block” and “chain” in this context, we are actually talking about digital information (the “block”) stored in a public database (the “chain”).

“Blocks” on the blockchain are made up of digital pieces of information. Specifically, they have three parts:
  1. Blocks store information about transactions like the date, time, and dollar amount of your most recent purchase from Amazon. (NOTE: This Amazon example is for illustrative purchases; Amazon retail does not work on a blockchain principle as of this writing)
  2. Blocks store information about who is participating in transactions. A block for your splurge purchase from Amazon would record your name along with Amazon.com, Inc. (AMZN). Instead of using your actual name, your purchase is recorded without any identifying information using a unique “digital signature,” sort of like a username.
  3. Blocks store information that distinguishes them from other blocks. Much like you and I have names to distinguish us from one another, each block stores a unique code called a “hash” that allows us to tell it apart from every other block. Hashes are cryptographic codes created by special algorithms. Let’s say you made your splurge purchase on Amazon, but while it’s in transit, you decide you just can’t resist and need a second one. Even though the details of your new transaction would look nearly identical to your earlier purchase, we can still tell the blocks apart because of their unique codes.

Friday, March 13, 2020

TOP TEN EMERGING TECHNOLOGY



Emerging Technology

  1. IoT. IoT is driving business changes by providing the data needed to improve marketing, increase sales, and decrease costs, the report found. ...
  2. Artificial Intelligence (AI) ...
  3. 5G. ...
  4. Serverless computing. ...
  5. Blockchain. ...
  6. Robotics. ...
  7. Biometrics. ...
  8. 3D printing.

Saturday, March 7, 2020

Hacking and its types

What is Hacking?

Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system
Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.
In this tutorial, we will learn-
Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking.

Who is a Hacker? Types of Hackers

Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.
SymbolDescription
What is Hacking ? An IntroductionEthical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments.
What is Hacking ? An IntroductionCracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
What is Hacking ? An IntroductionGrey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
What is Hacking ? An IntroductionScript kiddies: A non-skilled person who gains access to computer systems using already made tools.
What is Hacking ? An IntroductionHacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
What is Hacking ? An IntroductionPhreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.