Thursday, 26 February 2015

level of management Lecture No.4

The term “Levels of Management’ refers to a line of demarcation between various managerial positions in an organization. The number of levels in management increases when the size of the business and work force increases and vice versa. The level of management determines a chain of command, the amount of authority & status enjoyed by any managerial position. The levels of management can be classified in three broad categories:
  1. Top level / Administrative level
  2. Middle level / Executory
  3. Low level / Supervisory / Operative / First-line managers
Managers at all these levels perform different functions. The role of managers at all the three levels is discussed below:
Levels of Management

what is management and its functions Lecture No.3

Management is the process of reaching organizational goals by working with and through people and other organizational resources. 
Management has the following 3 characteristics:
  1. It is a process or series of continuing and related activities.
  2. It involves and concentrates on reaching organizational goals.
  3. It reaches these goals by working with and through people and other organizational resources.

multiprogramming and multitasking Lecture No.2

Multiprogramming

Multiprogramming is also the ability of an operating system to execute more than one program on a single processor machine. More than one task/program/job/process can reside into the main memory at one point of time. A computer running excel and firefox browser simultaneously is an example of multiprogramming.
Multiprogramming

Saturday, 21 February 2015

What is Network Topology Lecture no.1

Computer network topology is the way various components of a network (like nodes, links, peripherals, etc) are arranged. Network topologies define the layout, virtual shape or structure of network, not only physically but also logically. The way in which different systems and nodes are connected and communicate with each other is determined by topology of the network.Topology can be physical or logical. Physical Topology is the physical layout of nodes, workstations and cables in the network; while logical topology is the way information flows between different components. 

Wednesday, 18 February 2015

how to hacke facebook account and square your shelf


Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over one billion monthly active users as of October 2012—and around 600 million active daily users.
We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. We even clamor to see the latest versions even before they're ready for primetime.
But we sometimes forget who's watching.

Tuesday, 17 February 2015

2015 Qualification Round Solutions

1. Square Detector (20 Points)

When facing a problem in a programming contest there are three main things to consider when planning your solution. In order of importance:
  1. Is the algorithm correct.
  2. Is the algorithm fast enough.
  3. Is the algorithm easy to implement.

Sunday, 15 February 2015

How to Hack WIFI Password

Hacking WIFI in 2 minutes is not really a difficult task. Any non-Technical person who knows how to operate the computer can hack/crack the wifi within or less that 2 minutes. 




10 Best Hackers The World Has Ever Known




Shutterstock
Shutterstock
In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By personal, we do not just mean the social media. The world wide web which has become the hub of storing and restoring information, considered to be the safest vault, is a mere toy in the hands of a few computer geniuses. Hackers, Black Hat Hackers, villains, crackers, cyber-criminals, cyber pirates as they are well-known, throw a malicious software or virus at a system to gain the access to the desired information. Piqued by curiosity, they may perhaps break into your system too. Here are top 10 hackers or the whiz kids who put the world in awe with their dexterity.

Thursday, 12 February 2015

The Newton-Raphson Metho d

The Newton-Raphson Metho d
1 Intro duction
The Newton-Raphson method, or Newton Method, is a powerful technique
for solving equations numerically. Like so much of the differential calculus,
it is based on the simple idea of linear approximation. The Newton Method,
properly used, usually homes in on a root with devastating efficiency.
The essential part of these notes is Section 2.1, where the basic formula
is derived, Section 2.2, where the procedure is interpreted geometrically,
and—of course—Section 6, where the problems are. Peripheral but perhaps
interesting is Section 3, where the birth of the Newton Method is described.

Android 4.4.4 KitKat updates



Android is a mobile operating system which is based on the Linux developed by the foremost search engine Google. Android is actually designed for the touch screen Smartphones, tablets, IPads etc. Android has also introduced Android T.V, Android smart watches or wrist watches. It is very popular with the technology implemented by it with low cost, ready made hitech improvements. Android introduced the games with many features in it and this had begun with the versions as Android 1.0 as Alpha to Android 4.3 as Jellybean and now the new Android version 4.4.4 kitkat is updated.

install-android-4.4.4

Wednesday, 11 February 2015

how to hack facebook password



Hacking into other peoples' Facebook accounts is an infringement on personal privacy, and should be avoided. Knowing how to break into someone's Facebook account, however, can help you learn how to protect your own. If the user has Login Approvals enabled (Facebook's two-factor authentication system), the only way you'll be able to access their account is if you have their mobile device as well.

best data recovery software for pc


Acronis True Image 2015 Crack 18.0 Full Free Download:

Acronis True Image 2015 Crack 18.0 Full Version With Keygen is a used for backup of images and complete system recovery. It can also recover your mails, audio, images and applications.
Acronis True Image 2015 Crack 18.0 Full Free Download

Best Free Apps Windows 8.1


Virtual machines, amazing art, great games and mesmerising music

10 best free apps for Windows 8 and Windows 8.1

how to square my computer from hackers

INTRODUCTION

I’ve been interested in looking at the information contained in credit cards ever since I first heard about the Square card reader. The idea of such a tiny device being able to parse all the information on a credit card directly into your phone is fascinating to me and I wanted to figure out how it worked and if I could play with it a little bit. Unfortunately, Square moved from a very simple circuit design to a larger, encrypted version before I got mine. Coming into this weekend, I didn’t even have the expertise to figure out the simple version, much less the encrypted version and so I had mostly given up on working with credit card information.
However, one of my friends happened to have a few of the old Square readers that he gave me to work with. That gave me the opportunity to see what I could do and start hacking on this project.

how to delete my facebook account


Facebook may boast 1.28 billion monthly active users, but the social network isn’t for everyone. Maybe you don’t find it all that useful, or you’ve received one too many FarmVille requests. Or perhaps the June 2014 disclosure that the company messed with users’ News Feeds as part of a research experiment proved to be the final straw (even if monkeying with News Feeds is what Facebook does all the time). Whatever the reason, you’ve had it with Facebook.
So how do you make a clean break? You’ve got two choices—deactivating your Facebook account or deleting it outright.

How do I recover my hacked Facebook account



Recovery

Underneath the password field of the Facebook login is a link:
Facebook Can't Login Link
It may say “Can’t log in”, “Forgot your password?” or something similar. Click that.

HOW TO FIND TO MY GMAIL ACCOUNT


  • Program: Gmail - Web Based
  • Estimated time: 5 Minutes
  • Difficulty: Beginner

    Google Tut Gmail Hacked

    Is someone else using my Gmail? | Gmail hacked

    This is a three part tutorial. The first part is “The Explanation”. The second part we will do the “The Example”. And lastly we will walk you through “The How-To”.
    The Explanation:

    Tuesday, 10 February 2015

    Best Free Apps for Windows 8


    Must Have Apps for Windows 8
    One of the key features of the recently released operating system from Microsoft is its Windows Store. Users of Windows 8 can download apps from the store instead of searching for them online.

    For now, there are just 5,000 apps available on the store, but Microsoft is planning to increase the number of apps available for its customers.

    Windows 8 has brought significant improvement to its mobile device operating system. There are drastic changes focused on improving user experience. Windows Store apps run within the Windows Runtime. Some simple apps can be easily created on this platform using HTML5 and JavaScript.

    Below are some of the best free apps available on Windows Store for Windows 8 OS

    5 Of The World’s Most Famous Hackers





    There are two types of hackers. First, you’ve got the kind that is so often portrayed by Hollywood as an anti-social nerd with a chip on his shoulder out to dominate the cyberworld by breaking into secure networks and messing things up. Second, you’ve got the kind of people who just enjoy fiddling around with software source code and hardware gigs. That’s right. The term “hacker” originally referred to the second type, which held absolutely no malevolent connotations. Only recently has the term been used to refer primarily to criminal masterminds. There are good hackers and bad hackers! Nowadays, benevolent hackers are often called “white hats” while the more sinister are called “black hats.”
    In this article, I’ll be talking specifically about famous hackers that don hats of black. Here are five of the most widely known black hatters and what happened to them for their recklessness.

    How to Protect Your Facebook Account from Hackers

    Steps.1

    Protect Your Facebook Account from Hackers Step 2 Version 3.jpgImagine you wake up early in the morning, just to find that you couldn’t log on to your Facebook account. While you are just wondering about the reason for this lockout problem, your friend calls you to check if you are fine seeing your weird Facebook status. At times like these, how do you say your account is secure enough? How do you protect your Facebook account from hackers?