sant hirdaram girls college, bhopalshgc.in/shgc/data-files/e--magzine_vol_1.pdfsant hirdaram girls...

33
Sant HirDaram Girls College, Bhopal Computer Science Department, E - Magazine Vol.- I January, 2014 1 E - Magazine Vol.- I, January, 2014 Tech-Mania Department of Computer Science, Sant Hirdaram Girls College, Bhopal

Upload: others

Post on 07-Apr-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

1

E - Magazine Vol.- I, January, 2014

Tech-Mania Department of Computer Science,

Sant Hirdaram Girls College, Bhopal

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

2

A legend human being, a noble soul and selfish charismatic person who dedicated whole of his life Serving the mankind, especially those who need support the most. A true visionary, he directed his magnanimous social work especially in the field of health & education. Excellent health care units and adorable education institutions established in the remote sub urban area of Bhopal erstwhile known as Bairagarh and now renamed as Sant Hirdaram Nagar are epitomes of his great deeds. His spiritual power & moral ethos continue inspiring us to uphold his ideas and philosophy.

We bow our heads in his lotus feet and our deep tributes to the great soul.

His Holiness Sant Hirdaram Sahibji’s golden service philosophy states that

“The Old, the Infirm and the children Are all forms of God.

Serve them with heart and soul And win laurels of the Lord.”

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

3

DISCLAIMER

The information contained in this e- magazine is compiled with utmost care. The

views expressed in the articles contained in this e-magazine are author’s own. All

possible efforts have been made to keep the material free from errors. However,

Department of Computer Science, Sant HIrdaram Girls College, Bhopal make no

representation or warranty, expressed or implied, as to the originality, accuracy

or completeness of any such information. The college shall not be liable for any

action arising out of allegations of infringement of copyright of material used by

any contributor.

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

4

Editor- in-Chief - Ms. Dalima Parwani

Co-Editor - Ms. Meenu Tahilyani

Technical Editor & Design - Mr. Karan Singh Rajput

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

5

Dr. Charanjit Kaur M.Sc. Ph.D.,

Member of AICER, ISCA, ISAS & ICS

(Principal)

I feel great pleasure and congratulate the Department of Computer

Science for carrying out the first issue of E-Magazine entitled “Tech-mania”.

Over the years the Department has achieved continuing success in raising

the standard of education by presenting a happy blend of theoretical and

practical demonstrations, which has encouraged the students and teaching

fraternity to occupy a better place in modern competitive world. This has

developed all round personalities retaining the beauty of mind and intellect.

Creativity, innovations, analytical ability are all manifestation of the

versatility of the power mind, which leads to unimaginable success. If you

begun to think today then you are the master of tomorrow, in other words

thinking is the first step for determining our destiny.

One more opportunity of bringing our first issue of E-magazine has

been provided by the almighty God to put in our sincere most efforts in the

sublime mission of spreading the fragrance of education. Reading is good,

conference is better but writing is the best and completes ones mission in

life. We endeavour to inspire and empower all being to be lifelong learner,

critical thinkers and productive members of an ever changing global society.

I pray for future growth and prosperity of department and wish all the

concerned the grand success.

Dr. Charanjit Kaur

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

6

Dear Readers,

As the Head of the Department of Computer Science, I feel privileged in presenting the first issue of our e-magazine.

The field of computing is still relatively young and the pioneers who brought us from vacuum tubes to integrated circuits and then on to tablet computers are not only with us but are still making many more meaningful contributions. We as a department have made sincere efforts

and are proud to have assembled this collection of articles, and we hope

you will use this review of the past to think on what directions future research might take.

My special thanks to the following persons for their vital support and encouragement and a free hand in this endeavor enabling us to bring out this volume:

Rev. Sidh Bahuji Chairman

Dr. Shashi Rai Group Director

Shri. Hero Gyanchandani Director

Dr. Charanjit Kaur Principal

Dr. Upasana Sharma Vice-Principal

Last but not the least I am thankful to all the faculty members and the teaching and non-teaching members of Computer Science Department

for their constant support and co-operation.

Mrs. -Dalima Parwani Head & Assistant Professor

Department of Computer Science

Registration :The students who are interested to publish their

articles or quotation related to information technology in the next issue of the magazine are required to mail their data along with class

details to……………..for email id … Your Suggestions would be highly appreciated in further improving quality of the magazine.

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

7

Contents

Biometric Technology: - Ms. Dalima Parwani

Cloud Testing : A Scenario - Ms. MeenuTahilyani

Emerging Technologies - Ms. Reeta Budhani

Hadoop - Ms. Madhu Singh

Emerging Big Data Technology - Ms. Varsha Jotwani

Domain Name Registration - Ms. Neetu Ganglani

Wireless network security methods - Ms. Reeta Chhatani

Cyber Security - Ms. Sonia Sharma

Cyber Crime - Ms. Manju Sahu

Mathematics Software and Programming Languages

- Ms. Firdous Quereshi

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

8

In just the past few years, the

amount of biometric data

records—typically fingerprints, but

increasingly iris and facial

images—has expanded wildly as a

variety of agencies are called upon

to use the latest identification and

verification technologies to better

target people who, for example,

are trying to enter the country

illegally, have committed crimes,

or are on a watch list, among any

number of other possibilities.

Before long, hundreds of millions

of identities—petabytes of

biometric material—will be lodged

in the department of

Investigations, State Department,

Homeland Security, and

Department of Defense relational

database management systems

(RDBMS), and these systems will

be asked to identify individuals at

breakneck speed, virtually real-

time.

Relational databases have not

yet produced concrete results in

providing scalable multi-petabyte

solutions, and raw CPU power is

not enough to handle this

perpetually escalating problems.

To overcome this obstacle, came

up with the concept of using cloud

Computing Internet-based

applications - to drive up the

performance of these large

Biometric technology: It knows who you are

- Ms. Dalima Parwani

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

9

biometric databases.

The Security of Cloud Computing

Think of this analogy about cloud

computing. The security used to store

data in cloud computing is similar to

the security used to keep your money

safe in a bank. Which solution offers

more security for your money;

keeping your money in a bank, or in

your house? On the one hand if you

keep your money in your house you

know where it is at all times, but is it

safe? Keeping your money in a

bank offers multiple levels of

security, 24x7 monitoring, and

other assurances in case of any

other problems. Today’s cloud

computing solutions offer more

security, better data backup and

redundancy, and secure access to

your data at a fraction of the cost

of owning your own server based

solution.

Why is Cloud Computing

Important?

Most small and medium size

businesses simply don't have the time,

expertise or money necessary to buy,

deploy, and manage the computing

infrastructure needed to run a solution

like the Biometric Framework on their

own. Cloud computing shields you

from these complexities, and as a

user; you see only the self-service

interface to the computing resources

you need. When thinking about cloud

computing VS setting up you own

servers you need to consider your

needs for reliability, security,

performance, and support.

Biometric Framework

Security

The Biometric Framework uses the

best technology to keep your

biometric data safe. The multiple

levels of security and monitoring

ensures that the user has authentic

access to your data, and keeps that

data anonymized by using 256bit AES

encryption.

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

10

Cloud Computing is a general term

used to describe a new class of

network based computing that takes

place over the Internet. It is a model

for enabling convenient, on-demand

network access to a shared pool of

configurable computing resources

(e.g. networks, servers, storage,

application and services) that can be

rapidly provisioned and released with

minimal management effort or service

provider interaction. Cloud testing is a

form of software testing in which web

applications use cloud computing

environments (a "cloud") to simulate

real-world user traffic.

Types of testing

Stress test

Stress Test is used to determine

ability of application to maintain a

certain level of effectiveness beyond

breaking point. It is essential for any

application to work even under

excessive stress and maintain

stability. Stress testing assures this by

creating peak loads using simulators.

But the cost of creating such scenarios

is enormous. Instead of investing

capital in building on-premise testing

environments, cloud testing offers

affordable and scalable alternative.

Load Test

Load testing is the process of putting

demand on a system or device and

measuring its response. Load testing

is performed to determine a system’s

behavior under both normal and

Cloud Testing : A Scenario

- Ms. MeenuTahilyani

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

11

anticipated peak load conditions. It

helps to identify the maximum

operating capacity of an application as

well as any bottlenecks and determine

which element is causing degradation.

Performance Test

Finding out thresholds, bottlenecks &

limitations is a part of performance

testing. For this, testing performance

under a particular workload is

necessary. By using cloud testing, it is

easy to create such environment and

vary the nature of traffic on-demand.

This effectively reduces cost and time

by simulating thousands of

geographically targeted users.

Functional Testing

Functional testing of both internet and

non-internet applications can be

performed using cloud testing. The

process of verification against

specifications or system requirements

is carried out in the cloud instead of

on-site software testing.

Compatibility Testing Using cloud

environment, instances of different

Operating Systems can be created on

demand, making compatibility testing

effortless.

Browser

Performance Testing

To verify application's support for

various browser types and

performance in each type can be

accomplished with ease. Various tools

enable automated website testing

from the cloud.

Latency Testing

Cloud testing is utilized to measure

the latency between the action and the

corresponding response for any

application after deploying it on

cloud.

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

12

We have seen great leaps in digital

technology in the past five years.

Smartphone’s, Cloud Computing,

Multi Touch tablets, these are all

innovations that revolutionized the

way we live and work. However,

believe it or not, we are just getting

started. Technology will get even

better. In the future, we could live like

how people in science fiction movies

did.

The few Emerging technologies will

surely revolutionize the way, we live

3D Printing

Three-dimensional printing allows the

creation of solid structures from a

digital computer file, potentially

revolutionizing the economics of

manufacturing if objects can be

printed remotely in the home or

office. The process involves layers of

material being deposited on top of

each other in to create free-standing

structures from the bottom up.

Blueprints from computer-aided

design are sliced into cross-section for

print templates, allowing virtually

created objects to be used as models

for “hard copies” made from plastics,

metals, alloys or other materials..

Oculus Rift

The Oculus Rift is a next-generation

virtual reality headset designed for

immersive gaming.. This history-

defining 3D headset lets you mentally

feel that you are actually inside a

Video Game. In the Rift’s virtual

world, you could turn your head

around with ultra-low latency to view

the world in high resolution display.

This is the beginning of the

revolution for next-generation

gaming.

Leap Motion

Leap Motion represents an entirely

new way to interact with your

computers. It's more accurate than a

mouse, as reliable as a keyboard and

more sensitive than a touch screen.

For the first time, you can control a

computer in three dimensions with

your natural hand and finger

movements.

Emerging Technologies

- Ms. Reeta Budhani

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

13

The Leap Motion works on Windows

Vista/7/8 and Mac OS X, with Linux

being on the agenda.

Google Driverless Car The

driverless car will become reality

And it’s now a reality, made possible

by a search engine company, Google.

While the data source is still a secret

recipe, the Google driverless car is

powered by artificial intelligence that

utilizes the input from the video

cameras inside the car, a sensor on the

vehicle’s top and some radar and

position sensors attached to different

positions of the car. Sounds like a lot

of effort to mimic the human

intelligence in a car, but so far the

system has successfully driven 1609

kilometers without human commands!

“You can count on one hand the

number of years it will take before

ordinary people can experience this.”

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

14

Hadoop is a free, Java-based

programming framework that

supports the processing of large data

sets in a distributed computing

environment. It is part of

the Apache project sponsored by the

Apache Software Foundation.Hadoop

makes it possible to run applications

on systems with thousands of nodes

involving thousands of terabytes. Its

distributed file system facilitates

rapid data transfer rates among nodes

and allows the system to continue

operating uninterrupted in case of a

node failure. This approach lowers the

risk of catastrophic system failure,

even if a significant number of nodes

become inoperative.

Hadoop was inspired

by Google's MapReduce, The Hadoop

framework is used by major players

including Google, Yahoo and IBM,

largely for applications search

engines and advertising. The

preferred operating systems are

Windows and Linux but Hadoop can

also work with BSD and OS X.

The Apache Hadoop framework is

composed of the following modules :

Hadoop Common contains

libraries and utilities needed by other

Hadoop modules.

Hadoop Distributed

File System (HDFS) - a

distributed file-system that stores

data on the commodity machines,

providing very high aggregate

bandwidth across the cluster.

Ten Ways To Improve the RDBMS

with Hadoop

Hadoop can complement the

enterprise RDMS in a number of

powerful ways. These include:

1. Accelerating nightly batch business

processes. Many organizations have

production transaction systems that

require nightly processing and have

Hadoop

- Ms. Madhu Singh

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

15

narrow windows to perform their

calculations and analysis before the

start of the next day.

2. Hadoop MapReduce - a

programming model for large scale

data processing.

3. Storage of extremely high volumes

of enterprise data. The Hadoop

Distributed File System is a marvel

in itself and can be used to hold

extremely large data sets safely on

commodity hardware long term that

otherwise couldn't stored or handled

easily in a relational

database. Hadoop can then keep the

data that it processes, even after it it's

been imported into other enterprise

systems.

4. Improving the scalability of

applications. Very low cost

commodity hardware can be used to

power Hadoop clusters since

redundancy and fault resistance is

built into the software instead of using

expensive enterprise hardware or

software alternatives with proprietary

solutions. This makes adding more

capacity (and therefore scale) easier to

achieve and Hadoop is an affordable

and very granular way to scale out

instead of up.

Use of Java for data processing instead of

SQL. Hadoop is a Java platform and can

be used by just about anyone fluent in the

language (other language options are

coming available soon via APIs.)

Hadoop can be a boon to organizations

that have strong Java environments with

good architecture, development, and

testing skills.

And while yes, it's possible to use

languages such as Java and C++ to

write stored procedures for an

RDBMS.

5. Producing just-in-time feeds for

dashboards and business intelligence.

Hadoop excels at looking at enormous

amounts of data and providing

detailed analysis of business data that

an RDBMS would often take too long

or would be too expensive to carry

out.

6. Handling urgent, ad hoc requests for

data. While certainly expensive

enterprise data warehousing software

can do this, Hadoop is a strong

performer when it comes to quickly

asking and getting answers to urgent

questions involving extremely large

datasets.

7. Turning unstructured data into

relational data. While ETL tools and

bulk load applications work well with

smaller datasets, few can approach the

data volume and performance that

Hadoop can, especially at a similar

price/performance point. The ability

to take mountains of inbound or

existing business data, spread the

work over a large distributed cloud,

add structure, and import the result

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

16

into an RDBMS makes Hadoop one

of the most powerful database import

tools around.

8. Taking on tasks that require massive

parallelism. Hadoop has been known

to scale out to thousands of nodes in

production environments. Even better,

It requires relatively little innate

programing skill to achieve since

parallelism is an intrinsic property of

the platform.

9. Moving existing algorithms, code,

frameworks, and components to a

highly distributed computing

environment. Hadoop can be used as

a way to migrate old, single core code

into a highly distributed environment

to provide efficient, parallel access to

ultra-large datasets. Many

organizations already have proven

code that is tested and hardened and

ready to use but is limited without an

enabling framework.

Big data is the term for a collection

of data sets so large and complex that

it becomes difficult to process using

on-hand database management tools

or traditional data processing

applications. The trend to larger data

sets is due to the additional

information derivable from analysis

of a single large set of related data, as

compared to separate smaller sets

with the same total amount of data,

allowing correlations to be found to

"spot business trends, determine

quality of research, prevent

diseases, link legal citations, combat

crime, and determine real-time

roadway traffic conditions. Big data is

difficult to work with using most

Emerging Big Data Technology

- Ms. Varsha Jotwani

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

17

relational database management

systems and desktop statistics and

visualization packages, requiring

instead "massively parallel software

running on tens, hundreds, or even

thousands of servers.

The Importance of Big

Data

The real issue is not that you are

acquiring large amounts of data. It's

what you do with the data that counts.

For instance, by combining big data

and high-powered analytics, it is

possible to:

Determine root causes of failures,

issues and defects in near-real time,

potentially saving billions of dollars

annually.

Optimize routes for many thousands

of package delivery vehicles while

they are on the road.

Generate retail coupons at the point of

sale based on the customer's current

and past purchases.

Send tailored recommendations to

mobile devices while customers are in

the right area to take advantage of

offers.

Recalculate entire risk portfolios in

minutes.

Quickly identify customers who

matter the most.

Use click stream analysis and data

mining to detect fraudulent behavior.

Challenges

Many organizations are concerned

that the amount of amassed data is

becoming so large that it is difficult to

find the most valuable pieces of

information.

What if your data volume gets so

large and varied you don't know how

to deal with it?

Do you store all your data?

Do you analyze it all?

How can you find out which data

points are really important?

How can you use it to your best

advantage?

Until recently, organizations have

been limited to using subsets of their

data, or they were constrained to

simplistic analyses because the sheer

volumes of data overwhelmed their

processing platforms. But, what is the

point of collecting and storing

terabytes of data if you can't analyze it

in full context, or if you have to wait

hours or days to get results? On the

other hand, not all business questions

are better answered by bigger data.

You now have two choices:

Incorporate massive data volumes in

analysis. If the answers you're seeking

will be better provided by analyzing

all of your data, go for it. High-

performance technologies that extract

value from massive amounts of data

are here today. One approach is to

apply high-performance analytics to

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

18

analyze the massive amounts of data

using technologies such as grid

computing, in-database processing

and in-memory analytics.

Determine upfront which data is

relevant. Traditionally, the trend has

been to store everything (some call it

data hoarding) and only when you

query the data do you discover what is

relevant. We now have the ability to

apply analytics on the front end to

determine relevance based on context.

This type of analysis determines

which data should be included in

analytical processes and what can be

placed in low-cost storage for later

use if needed.

Technologies

A number of recent technology

advancements enable organizations to

make the most of big data and big

data analytics:

Cheap, abundant storage.

Faster processors.

Affordable open source, distributed big

data platforms, such as Hadoop.

Parallel processing, clustering, MPP,

virtualization, large grid environments,

high connectivity and high

throughputs.

Cloud computing and other flexible

resource allocation arrangements.

What Is A Domain Name?

A domain name is your unique web

address for your website. For example

steps-to-make-your-own-website.com

is the domain name of this website.

Without any system to name websites,

there would have been total chaos

inside the jungle of internet, leave

alone trying to locate your website. A

domain name is your unique identity

on the internet. It is the address of

your cyberspace. Owning a domain

DOMAIN NAME REGISTRATION

– Ms. Neetu Ganglani

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

19

name gives you the same feeling that

you get once you have in your hands

the title deed for your newly

purchased house. With the Domain

Name System(DNS) you can create

your desired name for your website

which when entered into a web

browser leads to your website.

Each domain name consists of two

parts:

Top Level Domain - A top-

level domain (TLD) is the part of the

domain name located to the right of

the dot. The most common top-level

domains are .COM, .NET, and .ORG.

Second Level Domain - The second-

level domain name is the part of the

domain name located to the left of the

dot. Steps-to-make-your-own-website

is the second-level domain name and

represents the organization or entity

behind the internet. Second Level

Domain name must be registered with

an ICANN (Internet Corporation for

Assigned Names and Numbers) -

accredited registrar.

Choose a unique Name of

domain

A domain name should be unique.

Your domain name should speak

about you. It should reflect your

persona and style Don’t register a

domain name that tells about some

other person or that duplicates

someone else’s way of presentation

and voice.

Choose a Simple and Easy to

Remember Domain Name.

Simplicity always wins. Choose a

good domain name that is simple and

easy to remember. Simple domain

names are easy to memorize by the

visitors and they can easily re-visit

your site. Usually most of the internet

users just remember the domain name

of their preferred site and do not use

bookmarks.

Choose your Domain Name

that is also your Website

Name.

It is logical to think that your domain

name and your website name should

be one. Whenever your visitor would

think of your website she will not

have trouble recalling your website

URL. She would automatically know

how to reach your website. Choosing

a good domain name that reflects your

website business is vitally important.

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

20

Use Site Concept Keyword

in Domain Name.

Whenever people search for

something they feed certain words in

a search engine which are called

keywords. Your website is likely to be

found more often for those words, if

your domain name contains those

keywords in it. Choosing a good

domain name is an important part of

the overall marketing process and

should not be taken lightly. Make sure

your domain name represents your

company, product and image.

Besides getting people’s creditability

for a dot com website you are likely

to get search engine preference as

their algorithms are designed to look

for .com sites before other TLD

websites.

Register Multiple Domain

Names to Protect Your

Brand.

Generally it is seen that to protect

their domain name from getting

registered exactly for other TLDs,

people get them registered

simultaneously in their name. The

usual practice is to get a domain name

registered for the three most popular

TLDs .com. org and .net. This way

they ensure that no other website by a

similar domain name can “steal” their

traffic by registering with a different

TLD.

Choose a good domain

name that doesn’t

infringe anyone’s

copyright.

While choosing a good domain name

people sometimes take care of nearly

all the tips mentioned above but fail to

check if they are infringing someone’s

copyright. It would be devastating to

spend your time, money and energy in

developing a thriving website..

Sometimes people want to ride the

popularity of someone else’s website

by making alteration to their

trademarks, company’s name, product

name etc, and then using them as their

domain names to steal some market

share. They often use misspelled,

plural or singular, and other ingenious

versions, but they all are copyright

infringements and an invitation for

legal backlashes. At other times you

might be accidently and not

intentionally infringing upon

someone’s copyright. But that too is

trouble.

Register your good domain

name now and opt for a

longer period of time.

Once choosing a good domain name

process is over by meeting most of the

tips mentioned above you must

proceed to immediately register it

with a chosen domain registrar.

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

21

If you plan to have a wireless

network, you should set itup so that

only people you choose can access it.

Here are a few options for wireless

network security.

Wi-Fi Protected Access

(WPA)

WPA encrypts information, and it

also checks to make sure that the

network security key has not been

modified. WPA also authenticates

users to help ensure that only

authorized people can access the

network.

There are two types of WPA

authentication: WPA and WPA2.

WPA is designed to work with all

wireless network adapters, but it

might not work with older routers or

access points. WPA2 is more secure

than WPA, but it will not work with

some older network adapters. WPA is

designed to be used with an 802.1X

authentication server, which

distributes different keys to each user.

This is referred to as WPA-Enterprise

or WPA2-Enterprise. It can also be

used in a pre-shared key (PSK) mode,

where every user is given the same

passphrase. This is referred to as

WPA-Personal or WPA2-Personal.

Wired Equivalent Privacy

(WEP)

WEP is an older network security

method that is still available to

support older devices, but it is no

longer recommended. When you

enable WEP, you set up a network

security key. This key encrypts the

information that one computer sends

to another computer across your

The Different Wireless Network Security Methods

- Ms. Reeta Chhatani

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

22

network. However, WEP security is

relatively easy to crack.

We don't recommend using WEP.

WPA or WPA2 are more secure. If

you try WPA or WPA2 and they don't

work, we recommend that you

upgrade your network adapter to one

that works with WPA or WPA2.

802.1X authentication

802.1X authentication can help

enhance security for 802.11 wireless

networks and wired Ethernet

networks. 802.1X uses an

authentication server to validate users

and provide network access. On

wireless networks, 802.1X can work

with Wired Equivalent Privacy

(WEP) or Wi-Fi Protected Access

(WPA) keys. This type of

authentication is typically used when

connecting to a workplace network.

Wireless network security

recommendations

If you have a wireless network, there

are some additional security

precautions that you should take.

Use a network security

key

If you have a wireless network, you

should set up a network security key,

which turns on encryption. With

encryption, people can't connect to

your network without the security

key. Also, any information that is sent

across your network is encrypted so

that only computers that have the key

to decrypt the information can read it.

This can help avert attempts to access

your network and files without your

permission. Common wireless

network encryption methods are

Wi-Fi Protected Access (WPA) and

WPA2. For more information,

Change the default administrator

name and password on your router or

access point

If you have a router or access point,

you probably used a default name and

password to set up the equipment.

Most manufacturers use the same

default name and password for all of

their equipment, which someone

could use to access your router or

access point without you knowing it.

To avoid that risk, change the default

administrator user name and password

for your router. Check the information

that came with your device for

instructions about how to change the

name and password.

Change the default SSID

Routers and access points use a

wireless network name known as a

service set identifier (SSID). Most

manufacturers use the same SSID for

all of their routers and access points.

We recommend that you change the

default SSID to keep your wireless

network from overlapping with other

wireless networks that might be using

the default SSID. It makes it easier for

you to identify which wireless

network is yours, if there is more than

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

23

one nearby, because the SSID is

typically shown in the list of available

networks. Check the information that

came with your device for instructions

about how to change the default

SSID.

Position your router or access point

carefully

Wireless signals can transmit a few

hundred feet, so the signal from your

network could be broadcast outside of

your home. You can help limit the

area that your wireless signal reaches

by positioning your router or access

point close to the center of your home

rather than near an outside wall or

wind.

Computer security also includes

protection from unplanned events and

natural disasters. Security

Architecture can be defined as the

design artifacts that describe how the

security controls (security

countermeasures) are positioned, and

how they relate to the overall

information technology architecture.

Cyber Security is a growing field.

This field is one that many other

people are not aware of and the jobs

are increasing throughout the years.

Since technology is improving every

year, the number of jobs in cyber

security is increasing as well. Cyber

security has to do with making sure

that hackers and data breaches do not

happen. These are things that could

cause a serious threat to our

government and it is important to

keep files disclosed. These threats

happen everyday, the most common is

probably identity theft. There are

many cyber security student programs

out there that can help one pursue a

career.

Ways to reduce cyber

crime

Cyber Security

- Ms. Sonia Sharma

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

24

Use your computer's firewall

protection feature, which is a digitally

created barrier that prevents hackers

from getting into your computer

system. Always keep it turned on.

Encrypt important data you don't want

compromised. Utilize encryption

software, which "garbles" your data to

make it unintelligible to anyone who

tries to hack into your computer

system.

Be wary of providing personal

information via a website you know

nothing about, especially those that

ask for your name, mailing address,

bank account number or social

security number.

Make sure that you do online

shopping on a secure website, like

those with a url that starts with "https"

and/or have a TRUSTe or VeriSign

seal. If you don't see these anywhere

on the site, you run the risk of

submitting credit card information

and other personal information to a

site that may be a fraud.

Avoid getting taken in by common

scams, such as foreign lotteries,

phony sweepstakes and similar

methods used by cyber criminals to

get your personal information and

money. If it sounds too good to be

true, it probably is.

Monitor the online activities of

your children. They should only

have access to a computer

located in a central area of your

home and you should regularly

check all browser and email

activity.

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

25

Cyber crime is one of the fastest-

growing types of illegal activity, both

nationally and internationally. While

the Internet links people together like

never before, it also provides endless

opportunity to criminals seeking to

exploit the vulnerabilities of others.

Cyber crime statistics are staggering.

Nearly 73% of Americans have

encountered some form of computer

crime or attempted crime on the Web.

These types of crime are notoriously

hard to solve and sometimes occur

without the victim ever knowing

anything illegal has taken place.

Despite the risks, there are things you

can do to help protect yourself from

becoming one of the many cyber

crime statistics.

What is cyber crime?

There are several different types of

computer crime, many of which

overlap. Below are a few of the most

commonly reported :-

Phishing – Phishing is the practice of

sending fraudulent emails in an

attempt to trick the recipient, usually

for the purpose of obtaining money.

The elderly are particularly vulnerable

to these types of cyber crime.

Hacking – Hacking is similar to digital

trespassing. Hackers infiltrate online

networks to illegally download

confidential information, manipulate

functions and in some cases steal

identities that can be used to

fraudulently purchase goods online.

Stalking / Harassment – Not all types

of cyber crime involve money. Some

cyber criminals use the Internet as a

cover for other illegal behaviors like

stalking, harassment and in lesser

cases, bullying.

How you can protect

yourself from computer

crime?

Though cyber crime statistics are on

the rise, even the most serious Internet

criminals rarely make the FBI

Fugitives List. These types of

perpetrators are extremely difficult to

track down. In fact, the FBI says at

least 25% of all cyber crimes aren’t

able to be prosecuted.

Cyber Crime

– Ms. Manju Sahu

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

26

However, it’s not that difficult to stop

many cyber criminals if you know

what to look for. The Internet isn’t

totally anonymous, and anonymity is

what most criminals count on to keep

their illegal activities under wraps.

How to keep your family

safe?

For many Crime Stoppers home is the

first line of defense, particularly when

children are involved. Be sure your

Internet connection is password-

protected and your server is

encrypted. If kids are using the Web,

know what sites they’re visiting and

exactly who they’re talking to.

Children are particularly vulnerable

for cyber crime because they’re

naturally less skeptical than adults. Be

sure you teach your kids the dangers

of the Web and give them concrete

rules to follow when using the

computer.

What are your risk

factors?

It’s crucial to go a step beyond

finding out “what is cyber crime?”

and learn more about the specific

risks surrounding your online

activities.

If you like to purchase clothing

online, for example, check to be sure

all the sites you purchase from have a

nationally affiliated security

certification. If you like to visit chat

rooms, never give out any personal

information to anyone you don’t

know.

Also, check crime reports in your area

to be sure there isn’t a cyber criminal

out there preying on people like you.

Know the online warning signs

The Web can be a perfectly safe place

to learn, connect and shop, but you

have to know what to avoid. If you

see any of the following while online,

assume a cyber criminal is at work:

Suspicious “official” websites that

look amateurish or poorly maintained

Emails asking for personal

information or passwords

Sites requesting credit card

information for entry Computer

crime isn’t victimless. Millions of

people lose money to ruthless cyber

criminals every year, and some are

actually physically harmed by people

they meet online. When you’re using

the Web, remember to stay alert, stay

aware and protect your information.

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

27

Some of the Mathematical Softwares –Mathematica :

Mathematica is a software system and

computer language for use in

mathematical applications and was

conceived by Stephen Wolfram and is

developed by Wolfram Research of

Champaign. The three classes of

Mathematica computations are:

numerical, symbolic, and graphical.

With Mathematica one can do

calculations upto arbitrary precision.

Mathematica can perform operations

on functions, manipulate algebraic

formulas, and do calculus.

Mathematica is also able to produce

both two- and three-dimensional

graphs. Maple

Maple is a world leader commercial

computer algebra system for numeric

computation. It was developed in

1980 by the Symbolic Computation

Group at the University of Waterloo,

Canada. Maple Computation Engine

combines high performance numeric

computations with world leading

symbolic capabilities .In Maple user

can enter mathematics in its

traditional mathematical notations

such as fraction, radical, summation

etc. User can perform the

approximation up to any precision

that is required without any

limitations like incase of Calculators.

MATLAB

MATLAB is a programming language

developed by Math Work. The name

MATLAB stands for MATrix LAB

oratory .It is a high level techniqual

computing language that allows

matrix manipulations and calculation,

plotting of function and data

implementation of algorithm, creation

of user interfaces and interfacing with

with other programming languages

including C, C++, Java and Frotan.

Minitab 14

Minitab 14 is software that serves as a

boon for statistical analysis of data. It

Mathematics Software and Programming Languages

– Ms. Firdous Quereshi

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

28

can read 1000 variable at a time and

calculate 35 inverses within a second.

Equation Editor

Microsoft Word provides an Equation

Editor .It is a recommended tool for

creating equations. User can built

equation by selecting symbols from

the equation tool bar and by typing

variable and number. From the top

row of the Equation Editor one can

choose more than 150 mathematics

symbols and from bottom row one

can choose a variety of templates and

framework that contains symbols such

as fraction, integrals and summations.

Equation Editor has some of the

inbuilt equation like Binomial,

Expansion of a sum Fourier series,

Pythagoras, Quadratic Formula etc.

Trick 1:

Do you know the number of the

flight that was used to attack the

world trade centre??????

The flight number was Q33N.

Trick 2:

Open MS word document and

type =rand(15,30). Now press

enter and see the result

Now open your Notepad type the

number of the flight (i.e. Q33N)

Now click on formatfont and

increase the font size up to 72

and change the font style to

‘wingdings’. Now see the

ammmmazzzzing thing.

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

29

Highlights of the Department

Measures of Excellence

Rich laboratories with quality equipments .

Departmental Library with standard books and journals .

Cohesive Teaching learning ambiance.

Add-on skill imparting activities like Workshops, Training

Programs,Internships, Guest Lectures etc. Parallel to the traditional teaching

Well qualified experienced and committed teachers .

Outstanding performance of the students.

Collaboration activities

Paper published by Ms. Reeta Budhani, Ms Dalima Parwani and Ms Meenu

Tahilyani on “Reconfigurable character based token set pruner(RCBTSP)

for Hetergeneous Environment” in “International Journal of Advanced

Computer Research- Dec 2011”.

Paper published by Manju Sahu on “Evolution of New Cryptography

Algorithm (An Approach for Data Security)” in JCT (Journal of computing

ISSN: 2278-3814) journal volume 2 issue 3- march-2013.

Faculty Achievements

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

30

Ms Dalima Parwani, Ms Meenu Tahilyani, Ms Reeta Budhani, Ms Madhu

Singh have Life membership of ISCA (International Science Congress

Association).

Ms Manju Sahu has membership of IAENG (International Association of

Engineers), IACSIT (International Association of Computer Science and

Information Technology) and UACEE (Universal Association of Computer

& Electronics Engineers).

Reasearch Project by Madhu mam

Students Awards and Achievements –

Academics:

Ms. Roma Manwani of BSc(CS) secured 5th merit position in Barkatullah

University (2008- 09)

Ms. Shweta Gwalani of BCA secured 8th merit position in Barkatullah

University (2009-10)

Ms. Aishwarya Singh of BCA secured 4th merit position in Barkatullah

University (2010-11)

Co- Curricular Activities

Ms. Babli Meena of BCA 1st Sem secured 1st position in District Level T.T.

Competition (2009-10)

Ms. Godawari Parwani of BCA 1st Sem secured 2nd position in District

Level Kho-Kho Competition (2009-10)

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

31

Ms. Ritu Sharma of BCA 2nd Sem secured Bronze Medal & Gold Medal in

State Level International Karate Competition & National Karate

Competition (20010-11)

Ms. Shivangi Tongare of BCA 2nd Sem secured 2nd position in District

Level Badminton Competition (2010-11)

Ms. Sonu Rajput of BCA secured Silver Medal in State Level and National

Level Karate Competition in Merital Art Category (2011-12)

Ms. Anshul Sarathe of BCA 1st Sem secured Silver Medal in State Level

Karate Competition in Merital Art Category (2011-12)

Ms. Ritu Sharma of BCA 3rd Sem secured Bronze Medal and Gold Medal

in State Level Karate Competition in Merital Art Category (2011-12)

Ms. Rithima Agrawal of BCA 3rd Sem secured Bronze Medal and Silver

Medal in State and National Level Karate Competition in Merital Art

Category (2011-12)

Ms. Prachi Parmar of BCA 3rd Sem secured Gold Medal in National Level

Karate Competition in Marital Art Category (2011-12)

Ms. Kavita Patidar of BCA 3rd Sem secured Bronze Medal in

Athletics(Track and field event) in 4X400mt. Relay Category (2011-12)

Ms. Divya Singh of BCA 5th Sem secured 1st position in Annual Sports in

three legged Race Category (2011-12)

Ms. Huma Khan of BCA secured 2nd position in Annual Sports in three

legged Race Category (2011-12)

Ms. Neha Singh of BCA 5th Sem secured 2nd position in Annual Sports in

three legged Race Category (2011-12)

Campus Placements

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

32

Ms. Ayushi Agarwal has got selected in Axis Bank (2009-10).

Ms. Chandni Rai Sighani has got selected in Sigma Group of Industries

(2009-10)

Ms. Komal Sharma has got selected as “Engineer Trainees” by Wipro-

Infotech(2011-12).

Ms. Laxmi Verma has got selected as “Engineer Trainees” by Wipro-

Infotech(2011-12).

Ms. Samiksha Paryani has got selected as “Engineer Trainees” by Wipro-

Infotech(2011-12).

Ms. Tanushree Garg has got selected as “Engineer Trainees” by Wipro-

Infotech(2011-12).

Ms. Alka Bhagwani has got selected as “Engineer Trainees” by Wipro-

Infotech(2011-12).

Ms. Rama Wadhwani has got selected as “Engineer Trainees” by Wipro-

Infotech(2011-12).

Ms. Sarita Meena has got selected as “Engineer Trainees” by Wipro-

Infotech(2011-12).

Ms. Deepika Harchandani has got selected in Tech Mahindra, Pune

(2012-13).

Ms. Divya Chelani has got selected in Tech Mahindra (2012-13).

Ms. Sakshi Jain has got selected in IFBI (2012-13).

Ms. Shreya Agarwal has got selected in ICICI (2012-13).

Sant HirDaram Girls College, Bhopal

Computer Science Department, E - Magazine Vol.- I January, 2014

33

Student – Spotlight

Ms. Preeti Saharawat

Ms. Preeti Sehrawat of BCA participated in Republic day Parade on 26 Jan

2010 and salute our honourable President of India.

Ms. Preeti Sehrawat of BCA got an opportunity to represent India at

international level “Cultural & Youth Exchange Programme in China” (11

Jul -21 Jul) 2011.

Ms. Preeti Sehrawat secured state level NSS Award honoured by Shri

Lakshmi Kant Sharma at Samanvaya Bhavan, Bhopal (M.P) on 1 Oct 2013.

Ms. Preeti Sehrawat secured Indira Gandhi NSS Award at national level

given by honourable President of India Pranab Mukherji at Rashtrapati

Bhawan, New Delhi.