sant hirdaram girls college, bhopalshgc.in/shgc/data-files/e--magzine_vol_1.pdfsant hirdaram girls...
TRANSCRIPT
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
1
E - Magazine Vol.- I, January, 2014
Tech-Mania Department of Computer Science,
Sant Hirdaram Girls College, Bhopal
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
2
A legend human being, a noble soul and selfish charismatic person who dedicated whole of his life Serving the mankind, especially those who need support the most. A true visionary, he directed his magnanimous social work especially in the field of health & education. Excellent health care units and adorable education institutions established in the remote sub urban area of Bhopal erstwhile known as Bairagarh and now renamed as Sant Hirdaram Nagar are epitomes of his great deeds. His spiritual power & moral ethos continue inspiring us to uphold his ideas and philosophy.
We bow our heads in his lotus feet and our deep tributes to the great soul.
His Holiness Sant Hirdaram Sahibji’s golden service philosophy states that
“The Old, the Infirm and the children Are all forms of God.
Serve them with heart and soul And win laurels of the Lord.”
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
3
DISCLAIMER
The information contained in this e- magazine is compiled with utmost care. The
views expressed in the articles contained in this e-magazine are author’s own. All
possible efforts have been made to keep the material free from errors. However,
Department of Computer Science, Sant HIrdaram Girls College, Bhopal make no
representation or warranty, expressed or implied, as to the originality, accuracy
or completeness of any such information. The college shall not be liable for any
action arising out of allegations of infringement of copyright of material used by
any contributor.
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
4
Editor- in-Chief - Ms. Dalima Parwani
Co-Editor - Ms. Meenu Tahilyani
Technical Editor & Design - Mr. Karan Singh Rajput
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
5
Dr. Charanjit Kaur M.Sc. Ph.D.,
Member of AICER, ISCA, ISAS & ICS
(Principal)
I feel great pleasure and congratulate the Department of Computer
Science for carrying out the first issue of E-Magazine entitled “Tech-mania”.
Over the years the Department has achieved continuing success in raising
the standard of education by presenting a happy blend of theoretical and
practical demonstrations, which has encouraged the students and teaching
fraternity to occupy a better place in modern competitive world. This has
developed all round personalities retaining the beauty of mind and intellect.
Creativity, innovations, analytical ability are all manifestation of the
versatility of the power mind, which leads to unimaginable success. If you
begun to think today then you are the master of tomorrow, in other words
thinking is the first step for determining our destiny.
One more opportunity of bringing our first issue of E-magazine has
been provided by the almighty God to put in our sincere most efforts in the
sublime mission of spreading the fragrance of education. Reading is good,
conference is better but writing is the best and completes ones mission in
life. We endeavour to inspire and empower all being to be lifelong learner,
critical thinkers and productive members of an ever changing global society.
I pray for future growth and prosperity of department and wish all the
concerned the grand success.
Dr. Charanjit Kaur
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
6
Dear Readers,
As the Head of the Department of Computer Science, I feel privileged in presenting the first issue of our e-magazine.
The field of computing is still relatively young and the pioneers who brought us from vacuum tubes to integrated circuits and then on to tablet computers are not only with us but are still making many more meaningful contributions. We as a department have made sincere efforts
and are proud to have assembled this collection of articles, and we hope
you will use this review of the past to think on what directions future research might take.
My special thanks to the following persons for their vital support and encouragement and a free hand in this endeavor enabling us to bring out this volume:
Rev. Sidh Bahuji Chairman
Dr. Shashi Rai Group Director
Shri. Hero Gyanchandani Director
Dr. Charanjit Kaur Principal
Dr. Upasana Sharma Vice-Principal
Last but not the least I am thankful to all the faculty members and the teaching and non-teaching members of Computer Science Department
for their constant support and co-operation.
Mrs. -Dalima Parwani Head & Assistant Professor
Department of Computer Science
Registration :The students who are interested to publish their
articles or quotation related to information technology in the next issue of the magazine are required to mail their data along with class
details to……………..for email id … Your Suggestions would be highly appreciated in further improving quality of the magazine.
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
7
Contents
Biometric Technology: - Ms. Dalima Parwani
Cloud Testing : A Scenario - Ms. MeenuTahilyani
Emerging Technologies - Ms. Reeta Budhani
Hadoop - Ms. Madhu Singh
Emerging Big Data Technology - Ms. Varsha Jotwani
Domain Name Registration - Ms. Neetu Ganglani
Wireless network security methods - Ms. Reeta Chhatani
Cyber Security - Ms. Sonia Sharma
Cyber Crime - Ms. Manju Sahu
Mathematics Software and Programming Languages
- Ms. Firdous Quereshi
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
8
In just the past few years, the
amount of biometric data
records—typically fingerprints, but
increasingly iris and facial
images—has expanded wildly as a
variety of agencies are called upon
to use the latest identification and
verification technologies to better
target people who, for example,
are trying to enter the country
illegally, have committed crimes,
or are on a watch list, among any
number of other possibilities.
Before long, hundreds of millions
of identities—petabytes of
biometric material—will be lodged
in the department of
Investigations, State Department,
Homeland Security, and
Department of Defense relational
database management systems
(RDBMS), and these systems will
be asked to identify individuals at
breakneck speed, virtually real-
time.
Relational databases have not
yet produced concrete results in
providing scalable multi-petabyte
solutions, and raw CPU power is
not enough to handle this
perpetually escalating problems.
To overcome this obstacle, came
up with the concept of using cloud
Computing Internet-based
applications - to drive up the
performance of these large
Biometric technology: It knows who you are
- Ms. Dalima Parwani
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
9
biometric databases.
The Security of Cloud Computing
Think of this analogy about cloud
computing. The security used to store
data in cloud computing is similar to
the security used to keep your money
safe in a bank. Which solution offers
more security for your money;
keeping your money in a bank, or in
your house? On the one hand if you
keep your money in your house you
know where it is at all times, but is it
safe? Keeping your money in a
bank offers multiple levels of
security, 24x7 monitoring, and
other assurances in case of any
other problems. Today’s cloud
computing solutions offer more
security, better data backup and
redundancy, and secure access to
your data at a fraction of the cost
of owning your own server based
solution.
Why is Cloud Computing
Important?
Most small and medium size
businesses simply don't have the time,
expertise or money necessary to buy,
deploy, and manage the computing
infrastructure needed to run a solution
like the Biometric Framework on their
own. Cloud computing shields you
from these complexities, and as a
user; you see only the self-service
interface to the computing resources
you need. When thinking about cloud
computing VS setting up you own
servers you need to consider your
needs for reliability, security,
performance, and support.
Biometric Framework
Security
The Biometric Framework uses the
best technology to keep your
biometric data safe. The multiple
levels of security and monitoring
ensures that the user has authentic
access to your data, and keeps that
data anonymized by using 256bit AES
encryption.
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
10
Cloud Computing is a general term
used to describe a new class of
network based computing that takes
place over the Internet. It is a model
for enabling convenient, on-demand
network access to a shared pool of
configurable computing resources
(e.g. networks, servers, storage,
application and services) that can be
rapidly provisioned and released with
minimal management effort or service
provider interaction. Cloud testing is a
form of software testing in which web
applications use cloud computing
environments (a "cloud") to simulate
real-world user traffic.
Types of testing
Stress test
Stress Test is used to determine
ability of application to maintain a
certain level of effectiveness beyond
breaking point. It is essential for any
application to work even under
excessive stress and maintain
stability. Stress testing assures this by
creating peak loads using simulators.
But the cost of creating such scenarios
is enormous. Instead of investing
capital in building on-premise testing
environments, cloud testing offers
affordable and scalable alternative.
Load Test
Load testing is the process of putting
demand on a system or device and
measuring its response. Load testing
is performed to determine a system’s
behavior under both normal and
Cloud Testing : A Scenario
- Ms. MeenuTahilyani
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
11
anticipated peak load conditions. It
helps to identify the maximum
operating capacity of an application as
well as any bottlenecks and determine
which element is causing degradation.
Performance Test
Finding out thresholds, bottlenecks &
limitations is a part of performance
testing. For this, testing performance
under a particular workload is
necessary. By using cloud testing, it is
easy to create such environment and
vary the nature of traffic on-demand.
This effectively reduces cost and time
by simulating thousands of
geographically targeted users.
Functional Testing
Functional testing of both internet and
non-internet applications can be
performed using cloud testing. The
process of verification against
specifications or system requirements
is carried out in the cloud instead of
on-site software testing.
Compatibility Testing Using cloud
environment, instances of different
Operating Systems can be created on
demand, making compatibility testing
effortless.
Browser
Performance Testing
To verify application's support for
various browser types and
performance in each type can be
accomplished with ease. Various tools
enable automated website testing
from the cloud.
Latency Testing
Cloud testing is utilized to measure
the latency between the action and the
corresponding response for any
application after deploying it on
cloud.
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
12
We have seen great leaps in digital
technology in the past five years.
Smartphone’s, Cloud Computing,
Multi Touch tablets, these are all
innovations that revolutionized the
way we live and work. However,
believe it or not, we are just getting
started. Technology will get even
better. In the future, we could live like
how people in science fiction movies
did.
The few Emerging technologies will
surely revolutionize the way, we live
3D Printing
Three-dimensional printing allows the
creation of solid structures from a
digital computer file, potentially
revolutionizing the economics of
manufacturing if objects can be
printed remotely in the home or
office. The process involves layers of
material being deposited on top of
each other in to create free-standing
structures from the bottom up.
Blueprints from computer-aided
design are sliced into cross-section for
print templates, allowing virtually
created objects to be used as models
for “hard copies” made from plastics,
metals, alloys or other materials..
Oculus Rift
The Oculus Rift is a next-generation
virtual reality headset designed for
immersive gaming.. This history-
defining 3D headset lets you mentally
feel that you are actually inside a
Video Game. In the Rift’s virtual
world, you could turn your head
around with ultra-low latency to view
the world in high resolution display.
This is the beginning of the
revolution for next-generation
gaming.
Leap Motion
Leap Motion represents an entirely
new way to interact with your
computers. It's more accurate than a
mouse, as reliable as a keyboard and
more sensitive than a touch screen.
For the first time, you can control a
computer in three dimensions with
your natural hand and finger
movements.
Emerging Technologies
- Ms. Reeta Budhani
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
13
The Leap Motion works on Windows
Vista/7/8 and Mac OS X, with Linux
being on the agenda.
Google Driverless Car The
driverless car will become reality
And it’s now a reality, made possible
by a search engine company, Google.
While the data source is still a secret
recipe, the Google driverless car is
powered by artificial intelligence that
utilizes the input from the video
cameras inside the car, a sensor on the
vehicle’s top and some radar and
position sensors attached to different
positions of the car. Sounds like a lot
of effort to mimic the human
intelligence in a car, but so far the
system has successfully driven 1609
kilometers without human commands!
“You can count on one hand the
number of years it will take before
ordinary people can experience this.”
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
14
Hadoop is a free, Java-based
programming framework that
supports the processing of large data
sets in a distributed computing
environment. It is part of
the Apache project sponsored by the
Apache Software Foundation.Hadoop
makes it possible to run applications
on systems with thousands of nodes
involving thousands of terabytes. Its
distributed file system facilitates
rapid data transfer rates among nodes
and allows the system to continue
operating uninterrupted in case of a
node failure. This approach lowers the
risk of catastrophic system failure,
even if a significant number of nodes
become inoperative.
Hadoop was inspired
by Google's MapReduce, The Hadoop
framework is used by major players
including Google, Yahoo and IBM,
largely for applications search
engines and advertising. The
preferred operating systems are
Windows and Linux but Hadoop can
also work with BSD and OS X.
The Apache Hadoop framework is
composed of the following modules :
Hadoop Common contains
libraries and utilities needed by other
Hadoop modules.
Hadoop Distributed
File System (HDFS) - a
distributed file-system that stores
data on the commodity machines,
providing very high aggregate
bandwidth across the cluster.
Ten Ways To Improve the RDBMS
with Hadoop
Hadoop can complement the
enterprise RDMS in a number of
powerful ways. These include:
1. Accelerating nightly batch business
processes. Many organizations have
production transaction systems that
require nightly processing and have
Hadoop
- Ms. Madhu Singh
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
15
narrow windows to perform their
calculations and analysis before the
start of the next day.
2. Hadoop MapReduce - a
programming model for large scale
data processing.
3. Storage of extremely high volumes
of enterprise data. The Hadoop
Distributed File System is a marvel
in itself and can be used to hold
extremely large data sets safely on
commodity hardware long term that
otherwise couldn't stored or handled
easily in a relational
database. Hadoop can then keep the
data that it processes, even after it it's
been imported into other enterprise
systems.
4. Improving the scalability of
applications. Very low cost
commodity hardware can be used to
power Hadoop clusters since
redundancy and fault resistance is
built into the software instead of using
expensive enterprise hardware or
software alternatives with proprietary
solutions. This makes adding more
capacity (and therefore scale) easier to
achieve and Hadoop is an affordable
and very granular way to scale out
instead of up.
Use of Java for data processing instead of
SQL. Hadoop is a Java platform and can
be used by just about anyone fluent in the
language (other language options are
coming available soon via APIs.)
Hadoop can be a boon to organizations
that have strong Java environments with
good architecture, development, and
testing skills.
And while yes, it's possible to use
languages such as Java and C++ to
write stored procedures for an
RDBMS.
5. Producing just-in-time feeds for
dashboards and business intelligence.
Hadoop excels at looking at enormous
amounts of data and providing
detailed analysis of business data that
an RDBMS would often take too long
or would be too expensive to carry
out.
6. Handling urgent, ad hoc requests for
data. While certainly expensive
enterprise data warehousing software
can do this, Hadoop is a strong
performer when it comes to quickly
asking and getting answers to urgent
questions involving extremely large
datasets.
7. Turning unstructured data into
relational data. While ETL tools and
bulk load applications work well with
smaller datasets, few can approach the
data volume and performance that
Hadoop can, especially at a similar
price/performance point. The ability
to take mountains of inbound or
existing business data, spread the
work over a large distributed cloud,
add structure, and import the result
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
16
into an RDBMS makes Hadoop one
of the most powerful database import
tools around.
8. Taking on tasks that require massive
parallelism. Hadoop has been known
to scale out to thousands of nodes in
production environments. Even better,
It requires relatively little innate
programing skill to achieve since
parallelism is an intrinsic property of
the platform.
9. Moving existing algorithms, code,
frameworks, and components to a
highly distributed computing
environment. Hadoop can be used as
a way to migrate old, single core code
into a highly distributed environment
to provide efficient, parallel access to
ultra-large datasets. Many
organizations already have proven
code that is tested and hardened and
ready to use but is limited without an
enabling framework.
Big data is the term for a collection
of data sets so large and complex that
it becomes difficult to process using
on-hand database management tools
or traditional data processing
applications. The trend to larger data
sets is due to the additional
information derivable from analysis
of a single large set of related data, as
compared to separate smaller sets
with the same total amount of data,
allowing correlations to be found to
"spot business trends, determine
quality of research, prevent
diseases, link legal citations, combat
crime, and determine real-time
roadway traffic conditions. Big data is
difficult to work with using most
Emerging Big Data Technology
- Ms. Varsha Jotwani
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
17
relational database management
systems and desktop statistics and
visualization packages, requiring
instead "massively parallel software
running on tens, hundreds, or even
thousands of servers.
The Importance of Big
Data
The real issue is not that you are
acquiring large amounts of data. It's
what you do with the data that counts.
For instance, by combining big data
and high-powered analytics, it is
possible to:
Determine root causes of failures,
issues and defects in near-real time,
potentially saving billions of dollars
annually.
Optimize routes for many thousands
of package delivery vehicles while
they are on the road.
Generate retail coupons at the point of
sale based on the customer's current
and past purchases.
Send tailored recommendations to
mobile devices while customers are in
the right area to take advantage of
offers.
Recalculate entire risk portfolios in
minutes.
Quickly identify customers who
matter the most.
Use click stream analysis and data
mining to detect fraudulent behavior.
Challenges
Many organizations are concerned
that the amount of amassed data is
becoming so large that it is difficult to
find the most valuable pieces of
information.
What if your data volume gets so
large and varied you don't know how
to deal with it?
Do you store all your data?
Do you analyze it all?
How can you find out which data
points are really important?
How can you use it to your best
advantage?
Until recently, organizations have
been limited to using subsets of their
data, or they were constrained to
simplistic analyses because the sheer
volumes of data overwhelmed their
processing platforms. But, what is the
point of collecting and storing
terabytes of data if you can't analyze it
in full context, or if you have to wait
hours or days to get results? On the
other hand, not all business questions
are better answered by bigger data.
You now have two choices:
Incorporate massive data volumes in
analysis. If the answers you're seeking
will be better provided by analyzing
all of your data, go for it. High-
performance technologies that extract
value from massive amounts of data
are here today. One approach is to
apply high-performance analytics to
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
18
analyze the massive amounts of data
using technologies such as grid
computing, in-database processing
and in-memory analytics.
Determine upfront which data is
relevant. Traditionally, the trend has
been to store everything (some call it
data hoarding) and only when you
query the data do you discover what is
relevant. We now have the ability to
apply analytics on the front end to
determine relevance based on context.
This type of analysis determines
which data should be included in
analytical processes and what can be
placed in low-cost storage for later
use if needed.
Technologies
A number of recent technology
advancements enable organizations to
make the most of big data and big
data analytics:
Cheap, abundant storage.
Faster processors.
Affordable open source, distributed big
data platforms, such as Hadoop.
Parallel processing, clustering, MPP,
virtualization, large grid environments,
high connectivity and high
throughputs.
Cloud computing and other flexible
resource allocation arrangements.
What Is A Domain Name?
A domain name is your unique web
address for your website. For example
steps-to-make-your-own-website.com
is the domain name of this website.
Without any system to name websites,
there would have been total chaos
inside the jungle of internet, leave
alone trying to locate your website. A
domain name is your unique identity
on the internet. It is the address of
your cyberspace. Owning a domain
DOMAIN NAME REGISTRATION
– Ms. Neetu Ganglani
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
19
name gives you the same feeling that
you get once you have in your hands
the title deed for your newly
purchased house. With the Domain
Name System(DNS) you can create
your desired name for your website
which when entered into a web
browser leads to your website.
Each domain name consists of two
parts:
Top Level Domain - A top-
level domain (TLD) is the part of the
domain name located to the right of
the dot. The most common top-level
domains are .COM, .NET, and .ORG.
Second Level Domain - The second-
level domain name is the part of the
domain name located to the left of the
dot. Steps-to-make-your-own-website
is the second-level domain name and
represents the organization or entity
behind the internet. Second Level
Domain name must be registered with
an ICANN (Internet Corporation for
Assigned Names and Numbers) -
accredited registrar.
Choose a unique Name of
domain
A domain name should be unique.
Your domain name should speak
about you. It should reflect your
persona and style Don’t register a
domain name that tells about some
other person or that duplicates
someone else’s way of presentation
and voice.
Choose a Simple and Easy to
Remember Domain Name.
Simplicity always wins. Choose a
good domain name that is simple and
easy to remember. Simple domain
names are easy to memorize by the
visitors and they can easily re-visit
your site. Usually most of the internet
users just remember the domain name
of their preferred site and do not use
bookmarks.
Choose your Domain Name
that is also your Website
Name.
It is logical to think that your domain
name and your website name should
be one. Whenever your visitor would
think of your website she will not
have trouble recalling your website
URL. She would automatically know
how to reach your website. Choosing
a good domain name that reflects your
website business is vitally important.
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
20
Use Site Concept Keyword
in Domain Name.
Whenever people search for
something they feed certain words in
a search engine which are called
keywords. Your website is likely to be
found more often for those words, if
your domain name contains those
keywords in it. Choosing a good
domain name is an important part of
the overall marketing process and
should not be taken lightly. Make sure
your domain name represents your
company, product and image.
Besides getting people’s creditability
for a dot com website you are likely
to get search engine preference as
their algorithms are designed to look
for .com sites before other TLD
websites.
Register Multiple Domain
Names to Protect Your
Brand.
Generally it is seen that to protect
their domain name from getting
registered exactly for other TLDs,
people get them registered
simultaneously in their name. The
usual practice is to get a domain name
registered for the three most popular
TLDs .com. org and .net. This way
they ensure that no other website by a
similar domain name can “steal” their
traffic by registering with a different
TLD.
Choose a good domain
name that doesn’t
infringe anyone’s
copyright.
While choosing a good domain name
people sometimes take care of nearly
all the tips mentioned above but fail to
check if they are infringing someone’s
copyright. It would be devastating to
spend your time, money and energy in
developing a thriving website..
Sometimes people want to ride the
popularity of someone else’s website
by making alteration to their
trademarks, company’s name, product
name etc, and then using them as their
domain names to steal some market
share. They often use misspelled,
plural or singular, and other ingenious
versions, but they all are copyright
infringements and an invitation for
legal backlashes. At other times you
might be accidently and not
intentionally infringing upon
someone’s copyright. But that too is
trouble.
Register your good domain
name now and opt for a
longer period of time.
Once choosing a good domain name
process is over by meeting most of the
tips mentioned above you must
proceed to immediately register it
with a chosen domain registrar.
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
21
If you plan to have a wireless
network, you should set itup so that
only people you choose can access it.
Here are a few options for wireless
network security.
Wi-Fi Protected Access
(WPA)
WPA encrypts information, and it
also checks to make sure that the
network security key has not been
modified. WPA also authenticates
users to help ensure that only
authorized people can access the
network.
There are two types of WPA
authentication: WPA and WPA2.
WPA is designed to work with all
wireless network adapters, but it
might not work with older routers or
access points. WPA2 is more secure
than WPA, but it will not work with
some older network adapters. WPA is
designed to be used with an 802.1X
authentication server, which
distributes different keys to each user.
This is referred to as WPA-Enterprise
or WPA2-Enterprise. It can also be
used in a pre-shared key (PSK) mode,
where every user is given the same
passphrase. This is referred to as
WPA-Personal or WPA2-Personal.
Wired Equivalent Privacy
(WEP)
WEP is an older network security
method that is still available to
support older devices, but it is no
longer recommended. When you
enable WEP, you set up a network
security key. This key encrypts the
information that one computer sends
to another computer across your
The Different Wireless Network Security Methods
- Ms. Reeta Chhatani
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
22
network. However, WEP security is
relatively easy to crack.
We don't recommend using WEP.
WPA or WPA2 are more secure. If
you try WPA or WPA2 and they don't
work, we recommend that you
upgrade your network adapter to one
that works with WPA or WPA2.
802.1X authentication
802.1X authentication can help
enhance security for 802.11 wireless
networks and wired Ethernet
networks. 802.1X uses an
authentication server to validate users
and provide network access. On
wireless networks, 802.1X can work
with Wired Equivalent Privacy
(WEP) or Wi-Fi Protected Access
(WPA) keys. This type of
authentication is typically used when
connecting to a workplace network.
Wireless network security
recommendations
If you have a wireless network, there
are some additional security
precautions that you should take.
Use a network security
key
If you have a wireless network, you
should set up a network security key,
which turns on encryption. With
encryption, people can't connect to
your network without the security
key. Also, any information that is sent
across your network is encrypted so
that only computers that have the key
to decrypt the information can read it.
This can help avert attempts to access
your network and files without your
permission. Common wireless
network encryption methods are
Wi-Fi Protected Access (WPA) and
WPA2. For more information,
Change the default administrator
name and password on your router or
access point
If you have a router or access point,
you probably used a default name and
password to set up the equipment.
Most manufacturers use the same
default name and password for all of
their equipment, which someone
could use to access your router or
access point without you knowing it.
To avoid that risk, change the default
administrator user name and password
for your router. Check the information
that came with your device for
instructions about how to change the
name and password.
Change the default SSID
Routers and access points use a
wireless network name known as a
service set identifier (SSID). Most
manufacturers use the same SSID for
all of their routers and access points.
We recommend that you change the
default SSID to keep your wireless
network from overlapping with other
wireless networks that might be using
the default SSID. It makes it easier for
you to identify which wireless
network is yours, if there is more than
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
23
one nearby, because the SSID is
typically shown in the list of available
networks. Check the information that
came with your device for instructions
about how to change the default
SSID.
Position your router or access point
carefully
Wireless signals can transmit a few
hundred feet, so the signal from your
network could be broadcast outside of
your home. You can help limit the
area that your wireless signal reaches
by positioning your router or access
point close to the center of your home
rather than near an outside wall or
wind.
Computer security also includes
protection from unplanned events and
natural disasters. Security
Architecture can be defined as the
design artifacts that describe how the
security controls (security
countermeasures) are positioned, and
how they relate to the overall
information technology architecture.
Cyber Security is a growing field.
This field is one that many other
people are not aware of and the jobs
are increasing throughout the years.
Since technology is improving every
year, the number of jobs in cyber
security is increasing as well. Cyber
security has to do with making sure
that hackers and data breaches do not
happen. These are things that could
cause a serious threat to our
government and it is important to
keep files disclosed. These threats
happen everyday, the most common is
probably identity theft. There are
many cyber security student programs
out there that can help one pursue a
career.
Ways to reduce cyber
crime
Cyber Security
- Ms. Sonia Sharma
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
24
Use your computer's firewall
protection feature, which is a digitally
created barrier that prevents hackers
from getting into your computer
system. Always keep it turned on.
Encrypt important data you don't want
compromised. Utilize encryption
software, which "garbles" your data to
make it unintelligible to anyone who
tries to hack into your computer
system.
Be wary of providing personal
information via a website you know
nothing about, especially those that
ask for your name, mailing address,
bank account number or social
security number.
Make sure that you do online
shopping on a secure website, like
those with a url that starts with "https"
and/or have a TRUSTe or VeriSign
seal. If you don't see these anywhere
on the site, you run the risk of
submitting credit card information
and other personal information to a
site that may be a fraud.
Avoid getting taken in by common
scams, such as foreign lotteries,
phony sweepstakes and similar
methods used by cyber criminals to
get your personal information and
money. If it sounds too good to be
true, it probably is.
Monitor the online activities of
your children. They should only
have access to a computer
located in a central area of your
home and you should regularly
check all browser and email
activity.
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
25
Cyber crime is one of the fastest-
growing types of illegal activity, both
nationally and internationally. While
the Internet links people together like
never before, it also provides endless
opportunity to criminals seeking to
exploit the vulnerabilities of others.
Cyber crime statistics are staggering.
Nearly 73% of Americans have
encountered some form of computer
crime or attempted crime on the Web.
These types of crime are notoriously
hard to solve and sometimes occur
without the victim ever knowing
anything illegal has taken place.
Despite the risks, there are things you
can do to help protect yourself from
becoming one of the many cyber
crime statistics.
What is cyber crime?
There are several different types of
computer crime, many of which
overlap. Below are a few of the most
commonly reported :-
Phishing – Phishing is the practice of
sending fraudulent emails in an
attempt to trick the recipient, usually
for the purpose of obtaining money.
The elderly are particularly vulnerable
to these types of cyber crime.
Hacking – Hacking is similar to digital
trespassing. Hackers infiltrate online
networks to illegally download
confidential information, manipulate
functions and in some cases steal
identities that can be used to
fraudulently purchase goods online.
Stalking / Harassment – Not all types
of cyber crime involve money. Some
cyber criminals use the Internet as a
cover for other illegal behaviors like
stalking, harassment and in lesser
cases, bullying.
How you can protect
yourself from computer
crime?
Though cyber crime statistics are on
the rise, even the most serious Internet
criminals rarely make the FBI
Fugitives List. These types of
perpetrators are extremely difficult to
track down. In fact, the FBI says at
least 25% of all cyber crimes aren’t
able to be prosecuted.
Cyber Crime
– Ms. Manju Sahu
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
26
However, it’s not that difficult to stop
many cyber criminals if you know
what to look for. The Internet isn’t
totally anonymous, and anonymity is
what most criminals count on to keep
their illegal activities under wraps.
How to keep your family
safe?
For many Crime Stoppers home is the
first line of defense, particularly when
children are involved. Be sure your
Internet connection is password-
protected and your server is
encrypted. If kids are using the Web,
know what sites they’re visiting and
exactly who they’re talking to.
Children are particularly vulnerable
for cyber crime because they’re
naturally less skeptical than adults. Be
sure you teach your kids the dangers
of the Web and give them concrete
rules to follow when using the
computer.
What are your risk
factors?
It’s crucial to go a step beyond
finding out “what is cyber crime?”
and learn more about the specific
risks surrounding your online
activities.
If you like to purchase clothing
online, for example, check to be sure
all the sites you purchase from have a
nationally affiliated security
certification. If you like to visit chat
rooms, never give out any personal
information to anyone you don’t
know.
Also, check crime reports in your area
to be sure there isn’t a cyber criminal
out there preying on people like you.
Know the online warning signs
The Web can be a perfectly safe place
to learn, connect and shop, but you
have to know what to avoid. If you
see any of the following while online,
assume a cyber criminal is at work:
Suspicious “official” websites that
look amateurish or poorly maintained
Emails asking for personal
information or passwords
Sites requesting credit card
information for entry Computer
crime isn’t victimless. Millions of
people lose money to ruthless cyber
criminals every year, and some are
actually physically harmed by people
they meet online. When you’re using
the Web, remember to stay alert, stay
aware and protect your information.
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
27
Some of the Mathematical Softwares –Mathematica :
Mathematica is a software system and
computer language for use in
mathematical applications and was
conceived by Stephen Wolfram and is
developed by Wolfram Research of
Champaign. The three classes of
Mathematica computations are:
numerical, symbolic, and graphical.
With Mathematica one can do
calculations upto arbitrary precision.
Mathematica can perform operations
on functions, manipulate algebraic
formulas, and do calculus.
Mathematica is also able to produce
both two- and three-dimensional
graphs. Maple
Maple is a world leader commercial
computer algebra system for numeric
computation. It was developed in
1980 by the Symbolic Computation
Group at the University of Waterloo,
Canada. Maple Computation Engine
combines high performance numeric
computations with world leading
symbolic capabilities .In Maple user
can enter mathematics in its
traditional mathematical notations
such as fraction, radical, summation
etc. User can perform the
approximation up to any precision
that is required without any
limitations like incase of Calculators.
MATLAB
MATLAB is a programming language
developed by Math Work. The name
MATLAB stands for MATrix LAB
oratory .It is a high level techniqual
computing language that allows
matrix manipulations and calculation,
plotting of function and data
implementation of algorithm, creation
of user interfaces and interfacing with
with other programming languages
including C, C++, Java and Frotan.
Minitab 14
Minitab 14 is software that serves as a
boon for statistical analysis of data. It
Mathematics Software and Programming Languages
– Ms. Firdous Quereshi
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
28
can read 1000 variable at a time and
calculate 35 inverses within a second.
Equation Editor
Microsoft Word provides an Equation
Editor .It is a recommended tool for
creating equations. User can built
equation by selecting symbols from
the equation tool bar and by typing
variable and number. From the top
row of the Equation Editor one can
choose more than 150 mathematics
symbols and from bottom row one
can choose a variety of templates and
framework that contains symbols such
as fraction, integrals and summations.
Equation Editor has some of the
inbuilt equation like Binomial,
Expansion of a sum Fourier series,
Pythagoras, Quadratic Formula etc.
Trick 1:
Do you know the number of the
flight that was used to attack the
world trade centre??????
The flight number was Q33N.
Trick 2:
Open MS word document and
type =rand(15,30). Now press
enter and see the result
Now open your Notepad type the
number of the flight (i.e. Q33N)
Now click on formatfont and
increase the font size up to 72
and change the font style to
‘wingdings’. Now see the
ammmmazzzzing thing.
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
29
Highlights of the Department
Measures of Excellence
Rich laboratories with quality equipments .
Departmental Library with standard books and journals .
Cohesive Teaching learning ambiance.
Add-on skill imparting activities like Workshops, Training
Programs,Internships, Guest Lectures etc. Parallel to the traditional teaching
Well qualified experienced and committed teachers .
Outstanding performance of the students.
Collaboration activities
Paper published by Ms. Reeta Budhani, Ms Dalima Parwani and Ms Meenu
Tahilyani on “Reconfigurable character based token set pruner(RCBTSP)
for Hetergeneous Environment” in “International Journal of Advanced
Computer Research- Dec 2011”.
Paper published by Manju Sahu on “Evolution of New Cryptography
Algorithm (An Approach for Data Security)” in JCT (Journal of computing
ISSN: 2278-3814) journal volume 2 issue 3- march-2013.
Faculty Achievements
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
30
Ms Dalima Parwani, Ms Meenu Tahilyani, Ms Reeta Budhani, Ms Madhu
Singh have Life membership of ISCA (International Science Congress
Association).
Ms Manju Sahu has membership of IAENG (International Association of
Engineers), IACSIT (International Association of Computer Science and
Information Technology) and UACEE (Universal Association of Computer
& Electronics Engineers).
Reasearch Project by Madhu mam
Students Awards and Achievements –
Academics:
Ms. Roma Manwani of BSc(CS) secured 5th merit position in Barkatullah
University (2008- 09)
Ms. Shweta Gwalani of BCA secured 8th merit position in Barkatullah
University (2009-10)
Ms. Aishwarya Singh of BCA secured 4th merit position in Barkatullah
University (2010-11)
Co- Curricular Activities
Ms. Babli Meena of BCA 1st Sem secured 1st position in District Level T.T.
Competition (2009-10)
Ms. Godawari Parwani of BCA 1st Sem secured 2nd position in District
Level Kho-Kho Competition (2009-10)
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
31
Ms. Ritu Sharma of BCA 2nd Sem secured Bronze Medal & Gold Medal in
State Level International Karate Competition & National Karate
Competition (20010-11)
Ms. Shivangi Tongare of BCA 2nd Sem secured 2nd position in District
Level Badminton Competition (2010-11)
Ms. Sonu Rajput of BCA secured Silver Medal in State Level and National
Level Karate Competition in Merital Art Category (2011-12)
Ms. Anshul Sarathe of BCA 1st Sem secured Silver Medal in State Level
Karate Competition in Merital Art Category (2011-12)
Ms. Ritu Sharma of BCA 3rd Sem secured Bronze Medal and Gold Medal
in State Level Karate Competition in Merital Art Category (2011-12)
Ms. Rithima Agrawal of BCA 3rd Sem secured Bronze Medal and Silver
Medal in State and National Level Karate Competition in Merital Art
Category (2011-12)
Ms. Prachi Parmar of BCA 3rd Sem secured Gold Medal in National Level
Karate Competition in Marital Art Category (2011-12)
Ms. Kavita Patidar of BCA 3rd Sem secured Bronze Medal in
Athletics(Track and field event) in 4X400mt. Relay Category (2011-12)
Ms. Divya Singh of BCA 5th Sem secured 1st position in Annual Sports in
three legged Race Category (2011-12)
Ms. Huma Khan of BCA secured 2nd position in Annual Sports in three
legged Race Category (2011-12)
Ms. Neha Singh of BCA 5th Sem secured 2nd position in Annual Sports in
three legged Race Category (2011-12)
Campus Placements
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
32
Ms. Ayushi Agarwal has got selected in Axis Bank (2009-10).
Ms. Chandni Rai Sighani has got selected in Sigma Group of Industries
(2009-10)
Ms. Komal Sharma has got selected as “Engineer Trainees” by Wipro-
Infotech(2011-12).
Ms. Laxmi Verma has got selected as “Engineer Trainees” by Wipro-
Infotech(2011-12).
Ms. Samiksha Paryani has got selected as “Engineer Trainees” by Wipro-
Infotech(2011-12).
Ms. Tanushree Garg has got selected as “Engineer Trainees” by Wipro-
Infotech(2011-12).
Ms. Alka Bhagwani has got selected as “Engineer Trainees” by Wipro-
Infotech(2011-12).
Ms. Rama Wadhwani has got selected as “Engineer Trainees” by Wipro-
Infotech(2011-12).
Ms. Sarita Meena has got selected as “Engineer Trainees” by Wipro-
Infotech(2011-12).
Ms. Deepika Harchandani has got selected in Tech Mahindra, Pune
(2012-13).
Ms. Divya Chelani has got selected in Tech Mahindra (2012-13).
Ms. Sakshi Jain has got selected in IFBI (2012-13).
Ms. Shreya Agarwal has got selected in ICICI (2012-13).
Sant HirDaram Girls College, Bhopal
Computer Science Department, E - Magazine Vol.- I January, 2014
33
Student – Spotlight
Ms. Preeti Saharawat
Ms. Preeti Sehrawat of BCA participated in Republic day Parade on 26 Jan
2010 and salute our honourable President of India.
Ms. Preeti Sehrawat of BCA got an opportunity to represent India at
international level “Cultural & Youth Exchange Programme in China” (11
Jul -21 Jul) 2011.
Ms. Preeti Sehrawat secured state level NSS Award honoured by Shri
Lakshmi Kant Sharma at Samanvaya Bhavan, Bhopal (M.P) on 1 Oct 2013.
Ms. Preeti Sehrawat secured Indira Gandhi NSS Award at national level
given by honourable President of India Pranab Mukherji at Rashtrapati
Bhawan, New Delhi.