review - gnauniversity.edu.in · gna 16th feb —2018 . fcs ... weeks ago. three customers had...

16
COMPUTATIONAL REVIEW A monthly newsletter of Faculty of Computational Science Volume : 19 Febuary, 2018 Editor : Ms Ashima Mittal Designer : Mr Gagandeep Singh

Upload: vuxuyen

Post on 30-Jul-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

FCS Newsletter February, 2018

COMPUTATIONAL REVIEW

A monthly newsletter of Faculty of Computational Science

Volume : 19 Febuary, 2018

Editor : Ms Ashima Mittal Designer : Mr Gagandeep Singh

INSIDE THIS ISSUE

Technical News

Facial-Recognition Glasses

SpaceX's Satellite Broadband

Whatsapp payment service in India

Linovo Laptop Fire Risk

T Mobile Crypto Currency Theft

1-2 Knowledge Manage-

ment in Organizations

3-4 How modern organizations cre-

ate, share, use and manage the

knowledge and information to

make useful decisions.

Story of a genius : Bill Gates

A fantacy about accuracy of a machine

drived him crazy. This interest in writ-

ing codes drove him crazy and he be-

came the worlds Richest man

5-6 Hack WI-FI Passwords

7-8 What to do when you really need

your wi-fi password and you do not

remember it at all.

Imagination vs Knowledge

Workshops and Visits

When imagination and knowledge

meet face to face...which is more

important in life?

9 10-12

Star Placements 13

Kshitiz-2018 14

Inter College

Competetion

GNA

16th FEB—2018

FCS Newsletter February, 2018

Surveillance in China means the authorities know pretty much everything about you whenever you ap-pear on camera. Now police there have a new weap-on with which to fight crime and capture criminals: high-tech glasses that allow for facial recognition at the push of a button.There is a camera mounted above the left eye and the glasses are linked to a smartphone-like handheld device. When worn, an officer can look in the direction of an individual, take their photo, and have that person's face recognized and all their information brought up on the handheld. The information is pulled from a central database the handheld can access and includes a person's name, gender, ethnicity, full address, and whether they have been charged with any crimes or have outstanding warrants. The police can also access an individual's internet usage. If they are staying away from home, that information is known, too.

Police in China Start Wearing Facial-Recognition Glasses

A SpaceX project to sup-ply satellite-powered broadband cleared a regu-latory hurdle.FCC chair-man Ajit Pai recommend-ed approval of the compa-ny's plan, citing the need to bring internet to "hard-to-serve places" in the US. "To bridge America's digital divide, we'll have to use innovative technol-ogies," Pai said in a state-ment.

Satellite-powered internet is actually nothing new, but the plan from SpaceX promises to make it cheaper and far faster. To make it work, the compa-ny needs to send over 4000 satellites into low-

orbit around the Earth.

The satellites from SpaceX will then com-municate with stations on the ground to supply af-fordable broadband across the world. Speeds for the internet service will reach up to one gigabit per se-cond (Gbps), far ahead the 31 Mbps an average US household receives. Pai said the satellite tech-nology could also serve areas of rural America where fiber optic cables and cell towers have failed to reach. It'll also introduce healthy compe-tition with internet service providers on the ground too, he said.

/

SpaceX's Satellite Broadband

1

FCS Newsletter February, 2018

A T-Mobile customer is suing the carrier over a cryptocurrency heist. Carlos Tapang claims that hackers broke into his cryptocurrency account because T-Mobile was fooled into transferring his account to AT&T. The hackers then used Tapang's wireless account to access his cryptocur-rency account and sell virtual currencies for 2.875 in bitcoin Tapang, a resident of King County, Wash-ington, noticed the theft when his phone lost its connection to T-Mobile on Nov. 7. He called the carrier, and learned that T-Mobile had canceled the service and trans-ferred his phone number to AT&T. "More specifically, unbeknownst to Mr. Tapang, T-Mobile had transferred control of his phone number to a device under the con-

trol of someone else," the lawsuit claims.

It took T-Mobile a day or two to retrieve the phone number from AT&T, the lawsuit says. But by then it was too late. The hack-ers had changed the passwords on one of Tapang's cryptocurrency accounts, and drained the funds inside The lawsuit ac-cuses T-Mobile of failing to stop the iden-tity theft, even as Tapang had placed a se-curity measure on his phone number that should have thwarted the hackers. Prior to the heist, Tapang had enabled a PIN num-ber that was supposedly needed to transfer his phone number to another carrier. But despite this, the hackers still tricked T-Mobile agents into porting Tapang's phone number to AT&T.

T-Mobile Sued Over Theft of Customer's

Cryptocurrency

Lenovo is recalling over 80,000 ThinkPad X1 Carbon laptops be-cause they potentially pose a fire hazard. The laptops actually contain an unfastened screw inside that can damage the lithium-ion battery, and trigger overheating or a fire, Lenovo said.The problem applies to fifth-generation ThinkPad X1 laptops sold between Dec. 2016 and Nov. 2017.Lenovo has re-leased a support document that can help customers identify whether they own an affected lap-top.

The company is offering the inspections and repairs free-of-charge.Lenovo said it learned about the issue several weeks ago. Three customers had re-ported their laptops overheating, re-sulting in damage to the products. The PC maker conducted an investigation, and found the culprit: a small unfas-tened screw that had been left in lap-tops during their manufacture. Lenovo has since fixed the problem on the supply side. The company has a website that can help customers locate a warranty pro-

Lenovo Recalls Certain ThinkPad X1 Carbon

Laptops Over Fire Risk

WhatsApp has been working on dig-

ital, peer-to-peer payments for quite

some time now, and the Facebook-

owned messaging company appears

to have just launched the service in

beta in India, one of its most im-

portant markets. For India users, a

way to transfer money digitally is

especially useful for local merchants

and for friends and family to transfer

funds among themselves. WhatsApp

has reportedly signed up a number

of Indian banks to help bolster its

payments service. The company also

makes use of the Indian govern-

ment‘s Unified Payments Interface,

or UPI, framework, which allows

for instant transfer between partici-

pating banks.

WHATSAPP’S LAUNCHES PAYMENTS SERVICE IN INDIA

2

FCS Newsletter February, 2018

nowledge Management (KM) is one of the fore-

most strategic directions being investigated and

adopted by multinational corporations today. It

gives promises of better decision-making, faster turna-

round times, improved organizational communication,

and higher levels of cooperation and knowledge sharing

among employees of Multinational Corporation.

Knowledge Management is a formal process of deter-

mining what information a company has that can benefit others in the organization and making the information easily available for use by those who need it. The pro-

cess includes formal procedures to collect such infor-mation as lessons learned during a project‘s execution and the best practices occurring throughout the organiza-tion, a well-established infrastructure, networks for

transferring knowledge between employees, and tools to facilitate the process. Once the process captures the or-ganization‘s knowledge, the real power occurs when the

users utilizing the information use it by putting the shared into action [1]. Knowledge Management is the collection of processes that govern the creation, dissemi-

nation, and utilization of knowledge. In one form or an-other, Knowledge Management has been around for a very long time. Practitioners have included philosophers,

priests, teachers, politicians, scribes, Librarians, etc. KM processes exist whether we acknowledge them or not and they have a profound effect on the decisions we make

and the actions we take, both of which are enabled by knowledge of some type. Knowledge Management (KM) comprises a range of strategies and practices used in an

organization to identify, create, represent, distribute, and enable adoption of insights and experiences. The way family businesses were carried on from generation to

generation by passing the trade secrets and business strategies illustrates the original form of Knowledge Management. Similarly, the handing over and taking

UNDERSTANDING KNOWLEDGE

MANAGEMENT(KM) IN ORGANIZATIONS

According to Duhon

KNOWLEDGE

MANAGEMENT

is a discipline that promotes

an integrated approach to

identifying, capturing, evalu-

ating, retrieving and sharing

all of the enterprise`s infor-

mation assets.

By : Dr. Shailesh Kumar , Associate Professor (F.C.S.)

3

FCS Newsletter February, 2018

over procedures evolved in various organizations

demonstrates a form of Knowledge Management. In

some of the British, American and Indian private sec-

tor organizations, when a senior official is to retire,

the new incumbent is recruited few months before, so

that both work together. Thus, the experience and

knowledge gained is not lost with the previous gener-

ation. Orientation, familiarization and training pro-

grammes organized from time to time in both the ser-

vice and production industries also stress the need

and importance of transfer or use of knowledge or

experience [2].

Knowledge Management practice in several indus-

tries is still young and each company and industry

has its own key knowledge assets. As a result, we

lack successful and generic models to emulate. How-

ever, KM depends on the knowledge i.e., the way the

company or an institution serves and treats its cus-

tomers, employees, the economies of its business and

the people it hires. The most important point is how

the company or the institution uses and reuses the

information that is generated with these interactions

with their customers, employees and other stake

holders. KM mainly focuses on one of the many pos-

sible type of knowledge that resides in an organiza-

tion or institutions. That is the knowledge that em-

ployees or researchers learn from doing an organiza-

tion work, knowledge here is different from book

knowledge or from lists of regulations or databases

of customer information. To perform all the activities

with regard to Knowledge Management organiza-

tions have implemented various types of Knowledge

Management Systems (KMS). KMS efforts typically

focus on organizational objectives such as improved

performance, competitive advantage, innovation, the

sharing of lessons learned, integration and continuous

improvement of the organization. KMS is used to

support creation, transfer, and application of

knowledge in multinational organizations. To devel-

op KMS sophisticated IT technologies are being

used.

[1] Davenport, T. & Prusak, L. (1998). Know What

You Know. Retrieved February17, 1999 from the

World Wide Web: http://www.brint.com/ km/

davenport/cio/know.htm

[2] A Text book Titled ―Information & Knowledge Management‖ written by D Kamlavijayan (2005) re-printed in 2007 by Macmillan Publishers

4

FCS Newsletter February, 2018

The Story of a Genius

ntrepreneur Bill Gates

founded the world's larg-

est software business,

Microsoft, with Paul Allen, and

subsequently became one of

the richest men in the world.

Gates was born in Seattle,

Washington on October 28,

1955. He is the son of William

H. Gates Sr. and Mary Max-

well Gates (1929–1994). His

father was a prominent lawyer,

and his mother served on the

board of directors for First In-

terstate BancSystem and the

United Way. Gates's maternal

grandfather was JW Maxwell,

a national bank president.

Gates has one elder sister,

Kristi (Kristianne), and one

younger sister, Libby. He is the

fourth of his name in his fami-

ly, but is known as William

Gates III or "Trey" because his

father had the "II" suffix Early

on in his life, Gates's parents

had a law career in mind for

him. When Gates was young,

his family regularly attended a

church of the Congregational

Christian Churches, a

Protestant Reformed denomi-

nation. The family encouraged

competition; one visitor report-

ed that "it didn't matter whether

it was hearts or pickleball or

swimming to the dock ...

At 13, he enrolled in the Lakeside

School, a private preparatory

school. When he was in the eighth

grade, the Mothers' Club at the

school used proceeds from

Lakeside School's rummage sale

to buy a Teletype Model 33 ASR

terminal and a block of computer

time on a General Electric (GE)

computer for the school's students.

Gates took an interest in program-

ming the GE system in BASIC,

and was excused from math clas-

ses to pursue his interest. He wrote

his first computer program on this

machine: an implementation of tic

-tac-toe that allowed users to play

games against the computer Gates

was fascinated by the machine and

how it would always execute the

code perfectly. When he reflected

back on the moment, he said,

there was always a reward

for winning and there

was always a pena-

lty for loosing‖

―There was just

something neat

about the machine‖

After the Mothers Club donation was

exhausted, he and other students sought

time on systems including DEC PDP

minicomputers. One of these systems

was a PDP-10 belonging to Computer

Center Corporation (CCC), which

banned four Lakeside students – Gates,

Paul Allen, Ric Weiland, and Kent Ev-

ans – for the summer after it caught them

exploiting bugs in the operating system

to obtain free computer time.

By : Mr Gagandeep Singh, Assistant Professor(F.C.S.)

5

FCS Newsletter February, 2018

At the end of the ban, the four stu-dents offered to find bugs in CCC's software in exchange for extra com-puter time. Rather than use the sys-tem via Teletype. Subsequently, Gates went to CCC's offices and studied source code for various pro-grams that ran on the system, in-cluding programs in Fortran, Lisp, and machine language. The ar-rangement with CCC continued un-til 1970, when the company went out of business. The following year, Information Sciences, Inc. hired the four Lakeside students to write a

payroll program in COBOL, providing them computer time and royalties. After his administrators became aware of his programming abilities, Gates wrote the school's computer program to schedule stu-dents in classes. He modified the code so that he was placed in clas-ses with "a disproportionate number of interesting girls."He later stated that "it was hard to tear myself away from a machine at which I could so unambiguously demon-strate success."At age 17, Gates formed a venture with Allen, called Traf-O-Data, to make traffic coun-ters based on the Intel 8008 proces-sor. In early 1973, Bill Gates served as a congressional page in the U.S. House of Representatives

Gates was a National Merit Scholar when he graduated from Lakeside School in 1973.[He scored 1590 out of 1600 on the Scholastic Aptitude Tests (SAT) and enrolled at Har-vard College in the autumn of 1973. He chose a pre-law major but took mathematics and graduate level computer science courses. During this time he met Paul Allen and both use to hack into the university computers to seek some extra time. In the year 1974 the worlds first electronic minicomputer altair 8800 was launched. Bill Gates and Paul

Allen seeked it as an oppertunity to write the first program for this com-puter. The reward he got gave him enough motivation for dropping out of the worlds best school and start his own company called "MICROSOFT". In June 1977 Ap-ple released their second and the most revolutionary computer called Apple II. Which brought the world of computing to home. But this computer was not much good for business purposes. Bill Gates and his team developed a Business Card for this computer which ran all the business software's in this comput-er. For the next few years this was the major source of income for Mi-crosoft. A few years later IBM stepped into

the market and demanded for the operating system. Microsoft at that time was not having any operating system. But Bill Gates bought Disk Operating System (DOS) from Tim Paterson and bought it for only $50,000 and made a deal with IBM on the condition that Microsoft can sell MS DOS to other parties also. With MS DOS as the best operating system of the time and selling this operating system to the entire com-puter manufacturing companies Mi-crosoft became one of the biggest name in the software industry.

But in October 1974 Apple gave Microsoft a biggest challenge by introducing to the world, the worlds first GUI operating system called Macintosh. But it was too slow and was not much popular among the people. At the same time Apple kicked off Steve Jobs from Apple/. Microsoft on the other hand used this as an opportunity and launched their first GUI operating system Windows 1.0 on November 20, 1985. This was faster as compared to MAC and soon became the most popular operating system in the computer industry. And Microsoft became the richest company in the world.

6

FCS Newsletter February, 2018

HOW TO HACK WI-FI PASSWORDS

Chances are you have a Wi-Fi network at home, or live close to one (or more) that tantalizingly pop up in a list whenever you boot up the laptop. The problem is, if there's a lock next to the network name (the SSID, or service set identifier), that indicates security is turned on. Without the password or pass-phrase, you're not going to get access to that network, or the sweet, sweet internet that goes with it. You could just go to a café, buy a latte, and use the "free" Wi-Fi there. Download an app for your phone like WiFi-Map (available for iOS and Android), and you'll have a list of over 2 million hotspots with free Wi-Fi for the taking (including some passwords for locked Wi-Fi connections, if they're shared by any of the app's 7 million users).

Windows Commands to Get the Key

By: Mr Vimal Dev, Assistant Professor, (FCS)

This trick only work if you have forgotten your pass-word. It works because Windows 8 and 10 create a pro-file of every wi-fi network to which it is attached to. If you tell Windows to forget the network, then it also for-gets the password, so this won't work.It requires that you go into a Windows Command Prompt with admin-istrative privileges. To do so, use Cortana to search for "cmd" and the menu will show Command Prompt; right-click that entry and select "Run as administrator." That'll open the black box full of white text with the prompt inside—it's the line with a > at the end, proba-bly something like C:\WINDOWS\system32\>. A blinking cursor will indicate where you type.

netsh wlan show profile

The results will bring up a section called User Pro-files—those are all the Wi-Fi networks (aka WLANs, or wireless local area networks) you've accessed and saved. Pick the one you want to get the password for, highlight it, and copy it. At the prompt , type the fol-lowing, but replace the Xs with the network name

you copied; At the prompt below, type the follow-ing, but replace the Xs with the network name you copied; you only need the quotation marks if the network name has spaces in it.

netsh wlan show profile name="XXXXXXXX"

key=clear

On macOS, open up the Spotlight search (Cmd+Space) and type terminal to get the Mac equivalent of a command prompt. Type the follow-ing, replacing the Xs with the network name. security find-generic-password -wa XXXXX

Reset the Router

Before you do a full router reset just to get on the wireless, try to log into the router first. From there, you can easily reset your Wi-Fi password/key if you've forgotten it. That's not possible if you don't know the password for the router, either. (They're not the same thing unless you set it up that way). Resetting the router only works if you have access. That access could be over Wi-Fi (which we've just established you don't have) or physically utilizing an Ethernet cable.Almost every router in existence has a recessed reset button. Push it with a pen or unfolded paperclip, hold it for about 10 seconds, and the router will reset to the factory settings.

If you've got a router that came from your internet service provider (ISP), check the stickers on the unit before a reset—the ISP might have printed the router and Wi-Fi key right on the hardware. Once a router is reset, you need another password (plus a username) to access the router itself. Again, you can do this via a PC attached to the router via Ethernet—you'll need that since the reset probably killed any potential Wi-Fi connection you had go-ing in. The actual access is typically done with a web browser. The URL to type is either 192.168.1.1 or 192.168.0.1, or some variation. Try them random-ly, which generally works. Or, to figure out which one, on the PC connected to the router, open a command prompt and type "ipconfig" without the quotes. Look among the gobbledygook for an "IPv4 Address," which will start with 192.168. The other two spaces, called octets, are going to be different numbers between 0 and 255. Note the

7

FCS Newsletter February, 2018

third octet (probably a 1 or 0). The fourth is specific to the PC you're using to log into the router. In the brows-er type 192.168.x.1, replacing the X with the number you found in the ipconfig search. The 1 in the last octet should point at the router—it's the number one device on the network. At this point, the router should then ask for a username and password. You can check your manual, but you probably lost or threw that away. So instead, go to RouterPasswords.com, which exists for one reason: to tell people the default username/password on every router ever created.

You'll need the router's model number, but that's easy enough to find on the back or bottom. You'll quickly see a pattern among router makers of having the username of admin and a password of password. Since most people are lazy and don't change an assigned pass-word, you could try those options before hitting the re-set button. (But c'mon, you're better than that—change the password when you access the router's settings via your web browser.) Once you've accessed the router interface, go to the Wi-Fi settings, turn on the wireless networks, and assign strong but easy-to-recall passwords. After all, you don't want to share with neighbors without your permission.

Crack the Code

Searching on "wi-fi password hack," or other variations, nets you a lot of links—mostly for software on sites where the adware and bots and scams are pouring like snake oil. You could create a system just for this kind of thing, maybe dual-boot into a separate operating system that can do what's called "penetration testing"—a form of offensive approach security, where you examine a net-work for any and all possible paths of a breach. Kali Linux is a Linux distribution built for just that purpose. You can run Kali Linux off a CD or USB key without even installing it to your PC's hard drive. It's free and comes with all the tools you'd need to crack a network.

If you're only after a Wi-Fi network, the Wifislax

distro is a Live CD targets them directly.

Aircrack has been around for years, going back to when Wi-Fi security was only based on WEP (Wired Equivalent Privacy). WEP was weak even back in the day and was supplanted in 2004 by WPA (Wi-Fi Protected Access). The latest Air-crack-ng—labeled as a "set of tools for auditing wireless networks," so it should be part of any net-work admin's toolkit—will take on cracking WEP and WPA-PSK keys. Aircrack-ng comes with full documentation, but it's not simple. To crack a network you need to have the right kind of Wi-Fi adapter in your com-puter, one that supports packet injection. You need to be comfortable with the command line and have a lot of patience. Your Wi-Fi adapter and Aircrack have to gather a lot of data to get any-where close to decrypting the passkey on the net-work you're targeting. It could take a while. Also on the Mac: Wi-Fi Crack. To use those, or Air-crack-ng on the Mac, you need to install them us-ing MacPorts, a tool for installing command-line products on the Mac.

Reaver-wps is the one tool that looks to be up to the task. You'll need that command-line comfort again to work with it. After two to 10 hours of brute force attacks, Reaver should be able to re-veal a password... but it's only going to work if the router you're going after has both a strong sig-nal and WPS (Wi-Fi Protected Setup) turned on. WPS is the feature where you can push a button on router, another button on a Wi-Fi device, and they find each other and link auto-magically, with a fully encrypted connection.

8

FCS Newsletter February, 2018

IMAGINATION

VS

KNOWLEDGE

―Imagination is more important than knowledge, knowledge is lim-ited but imagina-tion encircles the world‖ said by one of the greatest sci-entist, Elbert Ein-stein.

here was a boy name Alex, who had fond of dreaming although he was not good at learning. He was usually criticised by his friends, teachers and even Parents that if he will remain the same, he will not going to survive in near coming future of com-

petition. Even though Alex never took their words to his heart because he was an eight year old student and these words were not a matter of con-cern for him. After some years, Alex was tall, handsome, dark guy who was ready to enter in the world of competition. Today when he woke up in the morn-ing, he has decided that he will be clearing his interview today. He went for that interview and he found the candidates sitting there for that job were good in skills, degrees with 100 percent aggregates. He felt nervous and his mind start imagining the worst scenarios for him. Suddenly he called for an interview in the room. He knocked room and asked ―may I come in sir‖. ―Yes, come in‖ the interviewer said. Alex knew that he was neither having his success stories to tell the interviewer nor he was having good skills to show but he knew the one thing that he can imagine better. ―Mr Alex what better you can do for our company? ―Interviewer asked. Alex start using his only skill and let interviewer to feel his words. He showed interviewer his imaginative skill and inter-viewer was impressed. This story can be of anyone. Books only let you to think on specific things but imagination let you to explore that thing in a much better way. Imagination is something which brings creativity inside you. The problem with most of the learner is that they know how to read topics but they do not know how to explore that topic. This is the reason that most of the students remain jobless even after getting hundred percentile. This world demands new every time and we cannot stick to the same things. We humans are meant to create something different, something new, something imaginative, that‘s why we are known as humans be-cause we have the ability of thinking, we have ability of imagination. So start imagining that what different you want to see in this world and definitely you will get an idea to create different. You must let your thoughts to explore you.

By: Ashutosh Nautiyal, Student,

B. Tech C.S.E. 4th

9

FCS Newsletter February, 2018

Faculty of Computational Science organized ‗One day workshop‘ in the Univer-sity entitled " Web Development using PhP‖ for willing 40 students in the collab-oration with AcadView, New Delhi on 25/01/18. The resource person Mr. Varun Jain, Co-Founder AcadView, New Delhi conducted marvellous interactive knowledgeable session(s) on Web Programming, with the students on ―Web De-velopment using PHP ".

Workshop on " Web Development Using PHP"

In collaboration with ACADVIEW, Delhi

10

FCS Newsletter February, 2018

Faculty of Computational Science organized ‗One day workshop‘ in the University entitled " IOT using Arduino‖ for the shortlisted 30 FCS students in the collabora-tion with AcadView, New Delhi on 19/01/18 .The resource per-son Mr. Tarun Sharma and Mr. Nitin , Technical Specialist from AcadView, New Delhi conducted knowledgeable session(s) on Ar-duino Coding for different Pro-jects , Amazon Alexa Skill with the students on ―IOT us-ing Arduino".

Workshop on "IOT using Arduino”

Industrial Visit at

Netsmartz Infotech

Pvt Ltd

Students of BCA 6th Semester visited a Software development company named, Netsmartz Infotech Pvt. Ltd, IT Park ,Chandigarh on 09/02/18 ,Friday along with Mr. Navdeep Singh A.P. and Ms. Ashima Mittal A.P of FCS . Netsmartz Infotech Pvt. Ltd, IT Park ,Chandigarh a Software De-velopment Company having 08 locations all over the world with 17+ years existence in IT Spectrum , developed 2000+ software Projects and having 1000+ Team members. A Technical Session by the Company Senior Software Developer Mr.Dheeraj Agnihotri on ‗Web Based Applications‘ & ―Evolution in Digital Marketing‖ was conducted for the con-cerned students .

11

FCS Newsletter February, 2018

GNA University has associated with DELL EMC (The World‘s Larg-

est Privately Controlled Technology Company) as an Academic Alli-

ance partner instigated by Faculty of Computational Science.

It is a step towards bridging the knowledge gap as a part of Dell EM-

C‘s Academic Alliance Program in the upcoming digital era of IT and

workforce transformation. The purpose is to ensure that the students

and faculty a like, are well equipped to evolve digitally and to be better

prepared when it comes to employability, with the help of training in

the correct skill-set.

In collaboration with Sebiz Infotech Pvt. Ltd.,Mohali FCS Organized one day workshop on “Android Application Development” on 21 February 2018 under CSI Student Chapter. Mr. Sandeep Sharma , Senior Manager- Sebiz InfoTech first addressed the students how this workshop will help them to develop Mobile Apps.Ms. Jyotsna Joshi , Team leader, Sebiz InfoTech demonstrated the points on Android Project Overview, Activity Life Cycle, Designing a user interface in XML, ,Android WidgetsTextView, EditText,Button, ToggleButton, Switch, Check-box, Radio Group Spinner, Auto Complete Text View,Multi Auto CompleteTextView and a workable Live Project was completed in this workshop.

Workshop on “Android Application

Development”in collaboration with Sebiz InfoTech

Dell EMC

Academic

Alliance

Partner

12

FCS Newsletter February, 2018

Students selected in Infosys. A Pool Campus Placement drive by Infosys was conducted in the SVIET, Banur on 31/01/2018. About 700 students out of Which 43 eligible students from FCS, GNA University participated in this drive for the 1st round i.e. Online Written test. About 70 students out of which 4 students from FCS cleared the written exam. Final round of interview was conducted on dated 01/02/18 in Chitkara University, About 400 shortlist-ed students from various Universities/Colleges of Northern region including our 04 shortlisted students appeared for the 2nd round out of which our 3 FCS students fi-nally selected for Infosys. Great Congratulations !! to these 03 select-ed Students named Mr. Rakesh Tiwari , Ms.Vishali (BCA ,06 semester) and Ms.Anu (BSc-IT 06 semester).

13

FCS Newsletter February, 2018

Kshi

tiz-20

18

Kshitiz 2018-an intecollege competition that includes Programming contest and Web page development are conducted by FCS department on 16/02/2018. It included total 80 teams from different Colleges and Universities. Students shows their calibre and enthusi-asm regarding Programming and Web technologies.

14