Types of programming languages

Programming languages A programming language is a means of communication for the user to communicate with the computer system. The programming language is a set of instructions which tells the computer what to do. This is a language which is understood by both man and machine. There are a number of programming languages. However all … Read more

What is Data Structure?

Data structure is a representation of the logical relationship existing between individual elements of data. Data Structure is a way of organizing all data items that considers not only the elements stored but also their relationship to each other. We can also define data structure as a mathematical or logical model of a particular organization … Read more

C Program to check whether a Character is an Alphabet or not

  #include <stdio.h> int main() { char ch; printf(“Enter any character: “); scanf(“%c”,&ch); if( (ch>=’a’ && ch<=’z’) || (ch>=’A’ && ch<=’Z’)) printf(“The entered character %c is an Alphabet”,ch); else printf(“The entered character %c is not an Alphabet”,ch); return 0; }  

C Program to Find the Largest Number Among Three Numbers

Using if Statement #include <stdio.h> int main() { double n1, n2, n3; printf(“Enter three different numbers: “); scanf(“%lf %lf %lf”, &n1, &n2, &n3); if (n1 >= n2 && n1 >= n3) printf(“%.2f is the largest number.”, n1); if (n2 >= n1 && n2 >= n3) printf(“%.2f is the largest number.”, n2); if (n3 >= n1 … Read more

working with linux directories

This module is a brief overview of the most common commands to work with directories: pwd, cd, ls, mkdir and rmdir. These commands are available on any Linux (or Unix) system. pwd The you are here sign can be displayed with the pwd command (Print Working Directory). Go ahead, try it: Open a command line … Read more

TYPES OF HACKING

One of the most frequent threats of hacking is those faced by the websites. It is very common to see a particular website or online account being hacked open intentionally using unauthorized access and its contents being changed or made public. The web sites of political or social organizations are the frequent targets by groups … Read more

MOBILE SECURITY IMPORTANCE

“WHY IS MOBILE SECURITY IMPORTANT?” Mobile devices are the fastest growing consumer technology, with worldwide unit sales expected to increase from 300 million in 2010, to 650 million in 2012. Mobile applications are likewise booming. In June 2011, for the first time ever people on average spent more time using mobile applications (81 minutes) than … Read more

Introduction of Internet of Things

What is an Internet of Things (IoT) The Internet of Things(IoT) can be defined as a network of physical objects or people called “things” that are embedded with software, electronics, network, and sensors which allows these objects to collect and exchange data. The goal of IoT is to extend to internet connectivity from standard devices … Read more

Internet of Things (Government perspective)

Government perspective Several countries have recognised the importance of the Internet of Things for future economic growth and sustainability. From 2006 onwards the European Commission launched public consultations and stimulated widely open discussions on RFID and the Internet of Things, especially regarding critical policy issues such as governance, privacy, and resilience/security. These initiatives reached their … Read more