Functions in C

function in c

Functions C Human is an intelligent species, but still cannot perform all of life’s tasks all alone. He has to rely on others. You may call a mechanic to fix up your bike, hire a gardener to mow your lawn, or rely on a store to supply you groceries every month. A computer program (except … Read more

C program to convert time in Hours:Minutes:Seconds to seconds

c program to add 2 numbers

C program to convert time in Hours:Minutes:Seconds to seconds /* C program to convert time in hours:minutes:seconds to seconds */ #include <stdio.h> int main() { int hour, minute, second, timeinsec; printf(“Enter the value for hour:”); /* get hour value from user*/ scanf(“%d”, &hour); printf(“Enter the value for minute:”); /* get minute value from user */ … Read more

internet security types

“TYPES OF INTERNET SECURITY” NETWORK LAYER SECURITY- TCP/IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet. These protocols include SSL and TLS for web traffic, PGP for email, and IPsec for the network layer security. IPSEC PROTOCOL- This protocol is designed … Read more

INTERNET SECURITY

“INTRODUCTION” In order to provide useful services or to allow people to perform tasks more conveniently, computer systems are attached to networks and get interconnected. This resulted in the world-wide collection of local and wide-area networks known as the Internet. Unfortunately, the extended access possibilities also entail increased security risks as it opens additional avenues … Read more

Evolution of Java

java script

“The Evolution of Java” The initial release of Java was nothing short of revolutionary, but it did not mark the end of Java’s era of rapid innovation. Unlike most other software systems that usually settle into a pattern of small, incremental improvements, Java continued to evolve at an explosive pace. Soon after the release of … Read more

DATA BACKUP

“INTRODUCTION” Data backup is said to be the best prevention for data loss. Now the question arise what exactly Backup is? It is a process of having duplicate copy of the original one. It is an activity of copying files or databases so that the data will be preserved in case of any accidentally or … Read more

VIRUS

“VIRUS (VITAL INFORMATION RESOURCES UNDER SEIZE)” A virus is a computer program that executes when an infected program is executed. Therefore only executable files can be infected. On MS-DOS systems, these files usually have the extensions .EXE, .COM, .BAT or .SYS another class of files called overlay files can also be infected. These files often … Read more

MALWARES

“INTRODUCTION TO MALWARES” Malware is a collective term for any malicious software which enters system without authorization of user of the system. The term is created from merging the words  malicious‘ and  software‘.Malware is a very big threat in today‘s computing world. It continues to grow in volume and evolve in complexity. As more and … Read more

Selection Sort Algorithm

sorting algorithm

Selection Sort Algorithm Selection sort is an algorithm that selects the smallest element from an unsorted list in each iteration and places that element at the beginning of the unsorted list. The Selection sort algorithm is based on the idea of finding the minimum or maximum element in an unsorted array and then putting it … Read more

VPN THREATS

“VPN THREATS” HACKING ATTACKS- A client machine may become a target of attack, or a staging point for an attack, from within the connecting network. An intruder could exploit bugs or mis-configuration in a client machine, or use other types of hacking tools to launch an attack. These can include VPN hijacking or man-in-the-middle attacks. … Read more