Monday, 24 December 2018

How to Add pickup Note for Uber Drivers

Uber is a peer-to-peer ridesharing, taxi cab, food delivery, bicycle sharing and transportation network company headquarter in San Fransisco, California.Founded in March 2009.Uber Platform can be access by website or mobile app like android or IOS.
Recently In Mobile app a new update comes from which help to Uber driver. this is known as "Add Pickup".  This new feature allows users to leave an extra note for the Uber Driver that can provide some extra help to Uber partner driver to find and reach your location quickly. This feature comes in handy especially while booking made in a relatively crowded situations or some society which have many gates.
 Following instruction would follow to use this feature.


PreRequirement:-

1. Download and install updated Uber App form App store.

2. Internet Connectivity.

Steps to follow during leaving pickup note.


Step1:- Open Uber App on Your smartphone.


Step2:- Select the drop location as per your need.


Step3:- Choose the cab you want to book.


Step4:- Make the booking.


Step5:- Once done, Swipe up the slider that contains all details.


Step6:- Now look for the option "Any pickup notes?".


Step7:- Tap on it and start typing message and send.
 

   

Saturday, 22 December 2018

How to delete apps on Android

Here’s how you can remove an app from your Android smartphone.


Step1:- Open Google Play. 
Step2:- Press the hamburger menu icon on the top left corner. Go to My apps & games. 
Step3:- Go to the tab labelled Installed. 
Step4:- Here you will see the list of all apps installed on your device. Tap the name of the app you want to uninstall. 
Step5:- Tap Uninstall on the resulting screen.

If you know the name of the app you want to uninstall, you can do that by following these steps:

Step1:- Open Google Play.
Step2:- Type the name of any app you’ve installed on your phone in the search bar at the top.
Step3:- Select that app from the list of results.
Step4:- Tap Uninstall on the Google Play.

You can also uninstall apps via these steps on Android:

Step1:- Open the app drawer.
Step2:- Tap and hold the icon of the app you want to delete and drag it to the top of the screen where you see Uninstall.
Step3:- Alternatively, you can go to Settings -> Apps.
Step4:- Now select the app you want to delete. Tap Uninstall.

This will remove the app from your Android phone. Note that these steps may vary slightly if your phone doesn’t have stock Android.

Thursday, 20 December 2018

How to send Message Securily

We have seen that in many cases when we are sending message, we want that no one can see our message only receiver able to see those message for sending the message we can use cryptography and steganography is one of the technique of cryptography..
 So today we will learn about steganography and how the message will be send using this technique.

Steganography

Steganography is a technique of hiding data within data. Encryption can also be used in steganography to protect data to access the unauthorized user.
      Steganography can apply with images,audio,video files.Typically, however, steganography is written in characters including hash marking, but its usage within images is also common. At any rate, steganography protects from pirating copyrighted materials as well as aiding in unauthorized viewing.

Let's see how steganography will be apply with image.

Step1:- Open command prompt in your PC/Laptop.

Step2:- type

   echo  message >> image file name

ex.   echo " hello juliya how are you?" >> xyz.jpg

Now your message have written in the image and image is look like a simple image you can see your written message thru right click of image and then go edit with any text editor then in the last you will see that your message is write. 

Monday, 13 August 2018

How to take Screenshot in window 10

In some situation while working in our computer we need to screenshot  of the window.In window 10
Microsoft gives better facility to take screenshot of entire window or some part of window.

1.How to take screenshot of entire screen in window 10


  • Press Windows Key+Print screen
  • Go to picture library of your computer and see the screenshot folder.Here you will find the screenshot saved.
Note:-You can also just press Print Screen and open MS Paint. Now press ctrl + v to paste the screenshot in Paint. You can now save it anywhere you like.

2.How to take screenshot of current window only


If you want to take screenshot of an app that you are open follow these steps
  • Click on the app you want to take a screenshot. Make sure it’s in the foreground and not behind other open apps.
  • Press alt + Print Screen.
  • Open MS Paint.
  • Press Ctrl+V
  • This will paste the screenshot of the open window in Paint. You can save the screenshot anywhere you like.


Enjoy...

Thursday, 9 August 2018

Google Release Android 9 Pie fully based on AI(Artificial Intelligence)

Android 9 Pie harnesses the power of Artificial Intelligence to give you more from your phone.Now it is very smarter,faster and adapts as you use it.

Tailored to you


Android 9 adapts to you and how you use your phone, learning your preferences as you go. Your experience gets better and better over time, and it keeps things running smoother, longer.

Adaptive Battery


Go more with a single charge. Adaptive Battery learns how you like to use your phone, so the apps and services you don’t use as much aren’t a battery drain.


Adaptive Brightness


In Android 9 Pie You don't worry to change your brightness.It automatically adjust brightness based on situation.If your phone is in darkness its bright will be high and vice versa.


Getting around just got easier


Switch between apps and get to what you need more naturally by using gestures instead of buttons.

Thursday, 12 July 2018

Samsung Largest Smart Phone manufacturing factory in India

Samsung is a South Korean multi national Company.It produces various products like Consumer electronic (LCD,LED, PDP ,CRT). Mobile phone, Digital Camera,Application processors etc.
Samsung is founded in 1 March,1938 by Lee Byung-chul. Headquarters in  Seoul(South Korea).

July 9,2018 South Korean president Moon Jae-in and Indian Prime Minister Narendra Modi   inaugurate largest mobile manufacturing factory in Noida (India,Uttar Pradesh).
The target of this factory producing 1.2 Crore phone per month.



Samsung announce that more than 30% phone will be export to other company.It shows that Indian market is open for all manufacturing company who want to manufacture in India.

Saturday, 28 April 2018

Virtual Private Network(VPN)

Do you know? when you search any data on internet it is not secure.All activity that you are doing seen by ISP(Internet Service Provide) and they can track you. So in such situation you need to secure your data.There are several way to secure your data on internet VPN is one of them.

Virtual Private Network is a technology that create a safe and secure or encrypt your data on less secure network such as Internet.VPN technology was developed as a way to allow remote users and offices to securely access data ,applications and other resources.

The information transmitted between the two locations via the encrypted tunnel cannot be read by anyone else because the system contains several elements to secure both the company's private network and the outside network through which the remote user connects through.

The first step to security is usually a firewall between the client and the host server, requiring the remote user to establish an authenticated connection with the firewall. Encryption is also an important component of a secure VPN. Encryption works by having all data sent from one computer encrypted in such a way that only the computer it is sending to can decrypt the data.

Main Protocol Use By VPN

There are three main protocol use with VPN Tunnels.These protocols are generally incompatible with each other. They include the following:

IPSec:-
 A set of protocols developed by the IETF to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement VPNs. IPsec supports two encryption modes: transport and tunnel.

PPTP:-
The Point-to-Point Tunneling Protocol is a technology for creating VPNs, developed jointly by Microsoft, U.S. Robotics and several remote access vendor companies, known collectively as the PPTP Forum.

L2TP:-
Layer Two (2) Tunneling Protocol is an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs).

Tuesday, 24 April 2018

Technical Interview Questions asked in Top Companies

Q.1:- How will you implement Linked list with 1 million nodes? How will you access 999999th node?

Q.2:- Clone a linked list with next and random pointer.

Q.3:-Serialise and Deserialise a linked list with next and random pointer.

Q.4:-Given two sorted array(with repetitive elements) find kth minimum number from both array.

Q.5:-Given two linked list both represent a number.Create a linked list that create its sum.

Q.6:-Given a binary search tree, print the path which has sum equal to k and has minimum hopes.i.e. if there are multiple paths with the sum equal to k then print the path with minimum number of nodes.

Q.7:-Given an array, arrange the elements such that the number formed by concatenating the elements is highest. 
E.g.: input = [9, 93, 24, 6], the output should be: [9,93,6,24]. This is because if you concatenate all the numbers, 993624 is the highest number that can be formed.     


Q.8:-Given an string find the longest sub string which is palindrome.  

Q.9:-How would you create your own hash function?

Q.10:-How would you implement red-black tree?

Q.11:-Tell me what you think about Google Charging users $1 per month to use Gmail.

Sunday, 22 April 2018

Queue in Java

Queue is FIFO(First In First Out) data structure.In which every element insert in the rear end and deleted from front end.
Some method which very helpful during coding on the basis of Queue is following-

boolean offer(Object obj):- This method is used for insert an obj in the rear end of the Queue.If insertion of obj is successful it return true else false.

Object poll():- This method return head(first) element of Queue and also delete it.If no element exist in the Queue it return null.

Object remove():- This method also return head(first) element of Queue and delete it But when no element found in the Queue it return NoSuchElementException.

Object peek():-  This method return head(first) element of Queue but It does not delete it and return null when Queue is Empty.

Object element():- This method also return head(first) element of Queue and does not delete it but when Queue is Empty it return NoSuchElementException.

add() method is also use for insert element in the rear end of the Queue.

Sunday, 15 April 2018

Best Questions ask by Google in Job Interviews

Question1:How would I explain the importance of HTML 5 to Larry Page and then to my grandma?


Question2: How could you solve humankind's biggest crisis given $1 billion and a spacecraft?


Question3: Let’s say you have to construct Google maps from scratch and guide a person standing on Gateway of India (Mumbai) to India Gate (Delhi). How do you do the same?


Question4: Estimate the number of students who are college seniors, attend four-year schools, and graduate with a job in the United States every year.


Question5: If you had access to a bank's database, how would you use that information to design an ATM for elderly people?


Question6: How would you solve homelessness in downtown San Francisco?


Question7: A man pushed his car to a hotel and lost his fortune. What happened?


Question8: Anywhere in the world, where would you open up a new Google office and how would you figure out compensation for all the employees at this new office?


Question9: Design an evacuation plan for the building.


Question10: A coin was flipped 1,000 times and there were 560 heads. Do you think the coin is biased.


Question11: What is your opinion on whether or not individuals should be required to use their official name when opening a Gmail or Google + account?


Question12: You’re the captain of a pirate ship, and your crew gets to vote on how the gold is divided up. If fewer than half of the pirates agree with you, you die. How do you recommend apportioning the gold in such a way that you get a good share of the booty, but still survive?


Question13: How many ways can you think of to find a needle in a haystack? Asked in an interview in May 2014


Question14: If you could only choose one song to play every time you walked into a room for the rest of your life, what would it be?


Question15: What’s 2 to the power of 64?


Question16: How many times a day does a clock’s hands overlap?


Question17: What is the probability of breaking a stick into 3 pieces and forming a triangle?


Question18: Tell me what you think about Google charging users $1 per month to use Gmail. This question was asked in an interview in 2015


Question19: How many haircuts do you think happen in America every year?


Saturday, 14 April 2018

Dynamic Programming

Dynamic programming like divide and conquer method , solves problems by combining the solutions to sub-problems.
Divide-and-Conquer algorithms partition the problem into disjoint sub-problems , solve the sub- problem recursively and then combine their solutions  to solve original problem.
In contrast dynamic programming applies when the sub-problem  overlap that is when sub-problem share sub-problem

Feature of Dynamic programing


1)Optimal Substructure
2)Overlapping Sub-Problems

Optimal Substructure


A given problem has optimal substructure property if optimal solution of the given problem can be obtained by using optimal solutions of its sub-problems.
For example :-The shortest path problem has the following optimal substructure property.If a node x lies in the shortest path from node u to node v then the shortest path from u to x and shortest path from from x to v. The standard all pair shortest path algorithm like Floyd Warshall and Bellman-Ford typical example of dynamic programming.

Overlapping Subproblem


Like divide and conquer, Dynamic programming combine solutions to sub-problems.Dynamic programming is mainly used when solution of same sub-problems are needed again and again. In dynamic programming, computed solutions to sub-problems are stored in a table so that these don't have recomputed. So dynamic programming is not used when there are no common(overlapping) sub-problems.

Friday, 13 April 2018

How to add Contact On Gmail

We know that no one can not remember the contact number of everyone and if we have not our phone then we need a technology that store our contact number and when we need it can show.Google service Gmail is one of them.
Let's know how we can add contact number on gmail and see anytime.Follow the steps.

Step1:- Login to your Gmail account.

Step2:- Click on Contact icon which show right side in the up corner.

Step3:- Click on plus(+) icon which show left side in down corner.

Step4:- Fill the contact information like name,email,phone number etc. and click on the save button.

Now your contact information is save on gmail contact.You can see it any time remotely.


Thursday, 12 April 2018

Navigational Satellite

Navigational Satellite is a group of satellite that provide geographical location of object on the earth.It is also used to find the rout or destination address of the object,show the rout of ships and airplane and if anyone forget there rout then through navigational satellite we can find them.Google map is work on the basis of navigational satellite GPS(Global Positioning System).
Now a days only four country USA,RUSSIA,EUROPEAN UNION and CHINA`have their own navigational satellite.But INDIA have also launch their own navigation satellite and very soon it will work.
Navigational satellite and their country name is following

1)NAVSTAR Global Positioning System (GPS)  -USA  32 medium earth orbit satellites operations since 1978
 
2) GLONASS - Russian since 1995 

3) Galilio - European Union - 30 MEO satelites some are  operations since 2014 , expected to be in full service till 2020 
 
4)Beidou-2  - China  , 30 MEO satellites , expanding current regional service into global by 2020

5)IRNSS- INDIA, It is set of eight satellite IRNSS1A,IRNSS1B,IRNSS1C,IRNSS1D,IRNSS1E,IRNSS1F,IRNSS1G,IRNSS1I

Wednesday, 11 April 2018

Internet of things (IOT)

Collection of all devices which are connected to the internet are called internet of thing.
For Example: Mobile Phone,Security Camera,Smart Cars,Router,Smart houses ,Cofee makers, Washing Machine,Headphone,wearable devices etc.These devices can communicate between or other and also can share their information.
These all devices are very beneficial to human life because these are work automaticaly. For example if you have a smart car that have GPS(Global Positioning System) and it is connected to internet and you go anywhere and suddenly something happened then your car will help you to call somebody.
 

Wednesday, 4 April 2018

Top 15 Engineering College in India 2018 NIRF Report

NIRF(National Institute Ranking Framework) issue ranking of engineering colleges in which there are many IIT and NIT are top position.So let's know ranking of the engineering colleges.

Rank 1:Indian Institute of Technology, Madras

Number of Faculty Member with Ph.D Qualification=606
Total no. of Faculty Member=607
Number of Women Faculty Member=78

 

Rank 2:Indian Institute of Technology,Bombay

Number of Faculty Member with Ph.D Qualification=527
Total no. of Faculty Member=528
Number of Women Faculty Member=61

 

Rank 3:Indian Institute of Technology,Delhi

Number of Faculty Member with Ph.D Qualification=476
Total no. of Faculty Member=481
Number of Women Faculty Member=73



 

Rank 4:Indian Institute of Technology,Kharagpur

Number of Faculty Member with Ph.D Qualification=641
Total no. of Faculty Member=644
Number of Women Faculty Member=66

 

Rank 5:Indian Institute of Technology,kanpur

Number of Faculty Member with Ph.D Qualification=418
Total no. of Faculty Member=418
Number of Women Faculty Member=34

 

Rank 6:Indian Institute of Technology,Roorkee

Number of Faculty Member with Ph.D Qualification=419
Total no. of Faculty Member=423
Number of Women Faculty Member=51

 

Rank 7:Indian Institute of Technology,Guwahati

Number of Faculty Member with Ph.D Qualification=388
Total no. of Faculty Member=401
Number of Women Faculty Member=41

 

Rank 8:Anna University,Chennai

Number of Faculty Member with Ph.D Qualification=581
Total no. of Faculty Member=903
Number of Women Faculty Member=401

 

Rank 9:Indian Institute of Technology,Hyderabad

Number of Faculty Member with Ph.D Qualification=181
Total no. of Faculty Member=183
Number of Women Faculty Member=21


Rank 10:Institute of Chemical Technology,Mumbai

Number of Faculty Member with Ph.D Qualification=108
Total no. of Faculty Member=116
Number of Women Faculty Member=38

 

Rank 11:National Institute of Technology Tiruchirappalli

Number of Faculty Member with Ph.D Qualification=243
Total no. of Faculty Member=346
Number of Women Faculty Member=113

 

Rank 12:Jadavpur University,Kolkata

Number of Faculty Member with Ph.D Qualification=287
Total no. of Faculty Member=323
Number of Women Faculty Member=65

 

Rank 13:Indian Institute of Technology,Dhanbad

Number of Faculty Member with Ph.D Qualification=311
Total no. of Faculty Member=340
Number of Women Faculty Member=22

 

Rank 14:Indian Institute of Technology,Indore

Number of Faculty Member with Ph.D Qualification=116
Total no. of Faculty Member=116
Number of Women Faculty Member=13

 

Rank 15:National Institute of Technology Rourkela

Number of Faculty Member with Ph.D Qualification=278
Total no. of Faculty Member=299
Number of Women Faculty Member=42


 

Sunday, 1 April 2018

10 facts you should know to improve your phone battery life

Lower your phone's screen brightness/set this to automatic


Let your phone automatically decide its optimum screen brightness according to the ambient environment. In case you want a manual control over its brightness, it's advisable you set it close to the 50 per cent mark, rather than keeping it to a full. Your smartphone's bright and vibrant display consumes a lot of power, therefore keeping a check on it should improve battery life significantly.

Turn off Bluetooth and Wi-Fi when you don't need them


It's a common sight for users to keep their Bluetooth and/or Wi-Fi on for far longer than they need them. Sometimes, you share a file via Bluetooth and then forget to close it. As for the Wi-Fi, many users have it open to detect available connections and connect accordingly. An open Bluetooth and Wi-Fi are significant power drainers on your phone since they continuously work to detect nearby signals. Also, keeping these open unnecessarily is also a threat to your smartphone privacy/security.

Keep a check on your location/GPS Tracking


Similar to your Bluetooth and Wi-Fi functions, the location tracking feature that tracks your location using radio waves and satellites (Google Maps is an example) drains out your phone battery drastically. It is recommended that you keep this on only when you require navigation, and keep it close at all other times (to keep a check on your mobile data as also its battery).

Keep your screen timeout low


Screen timeout is the time your smartphone takes to automatically go into a sleep mode in the absence of any activity (swipe or tap). Keep the screen timeout of your phone to a minimum. After all, keeping your display on when you don't need it is a genuine waste of battery juice.

Turn off notifications from unnecessary apps


While it's good to receive notifications from useful apps (like news and email etc), most apps today tend to send out random notifications that are really not needed. Take for instance, notifications from games like Asphalt that ask you to play it for you've been away from the race track for a while now. Seriously, do you really need that?

Also, it's advisable to have the phone vibrate function off for notifications (also in general) to save on your battery juice since vibration drains it significantly.


Multitasking is good, but close apps when you're done with them


With more and more phones having greater RAM memory on-board, multi-tasking is what you call a walk in the park for a majority of the handsets. While multi-tasking is good, it is also a battery hog. Keep useful apps (that you'd generally open) in the background while closing all unnecessary apps to free your RAM as also keep your battery life in check. You can always open an app when you need it.

Avoid using flash while taking photos


Smartphones today include an LED flash along with the cameras (heck some even include flash for the front camera). While an LED flash is a handy resource in low light, it is also a major battery drainer. Use it only if you must, and use it wisely.

Don't let your phone heat up unnecessarily


Today we are getting phones that have powerful hardware inside a sleek frame. Therefore, heating is a common phenomenon in most of these handsets. Heating takes excess toll on your device's battery life. While you cannot totally control what's going on inside your smartphone, you can at least keep a check on your phone's ambient environment. This means, avoid keeping your smartphone in direct sunlight or even your pockets for that matter (especially during summers).

Don't wait for your phone to discharge completely before charging


Many users think it's wise to drain the battery completely before charging it fresh. Well, it's time to smell coffee in that case. Most phones come with Lithium Ion batteries and in the case of Li-ion batteries, draining them completely before charging them again may lead to lowering your battery life or even damaging them in some cases. It's advisable you keep charging your phone occasionally, instead of waiting for it to drain out completely.

Keep a portable charger at hand


It's always handy to keep an additional power source with you should your phone run out of juice at the most unfortunate of times. Portable chargers or power banks are useful devices and the market is flooded with some really good ones today (at affordable prices too).


Friday, 30 March 2018

How to use two WhatsApp account in one Android Phone

We know that chatting app is very useful for chat between two or more people.It is very efficient and easly transfer messages from one person to another person or group of person.There are billions of chatting app is developed and WhatsApp is one of them.WhatsApp is very popular chatting app.WhatsApp was developed by Brian Acton and Jan Koum in 2009, both former employees of Yahoo!.
Do you know that Android operating system have feature that you can run two WhatsApp account in one phone.

Here's a step-by-step guide to run two WhatsApp accounts using the Clone app or App twin:

1. Install WhatsApp from Play Store.

2. Go to phone's Settings.

3. Look for Dual App/App Twin/Clone app and tap on it.

4. You will see a list of apps that support this feature. Turn the toggle on for WhatsApp.

5. Now to set up the second WhatsApp, start the second WhatsApp.

6.Tap on Agree and Continue and allow WhatsApp to access your files and contacts.

7. Now the app will ask for your phone number, remember to give your second phone number. This will allows you to run two WhatsApp accounts with different phone numbers on one phone.


Note:-For phones that do not have App cloning feature, there are third party-apps which can be downloaded from Play Store and used for twinning the app.

Tuesday, 27 March 2018

Sundar Pichai




Childhood and Early Life

  • He was born as Pichai Sundararajan on July 12, 1972, in Chennai, Tamil Nadu, India. His father, Regunatha Pichai, worked as an electrical engineer for the British conglomerate GEC and managed a factory that made electrical components. His mother used to be a stenographer before having children. He has one brother.


  • Pichai grew up in a middle-class home and was a bright student. He excelled academically at his school, Padma Seshadri Bala Bhavan, and earned a seat in the Indian Institute of Technology in Kharagpur, one of the most prestigious engineering institutions in India.


  • He did his B.Tech in Metallurgical Engineering from IIT Kharagpur and then won a scholarship to study materials science and semiconductor physics from Stanford University from where he eventually earned his M.S.
Career

  • He initially planned to pursue a Ph.D. from Stanford and embark on an academic career. However, he dropped out and joined Applied Materials—a Silicon Valley semiconductor maker—as an engineer and product manager. He did not work there for long.


  • He went on to complete his MBA from the Wharton School of the University of Pennsylvania (2002), where he was named a Siebel Scholar and a Palmer Scholar.
    Following the completion of his MBA he was appointed as a management consultant at McKinsey & Company.

  • He joined Google in 2004. Initially he worked on Google’s search toolbar as a part of a small team. The toolbar gave users of Internet Explorer and Firefox easy access to Google search.
    He also worked on other Google products like Google Gears and Google Pack. The success of Google’s toolbar gave Pichai the idea that Google should develop its own browser. He discussed his idea with his seniors and faced an objection from then-CEO Eric Schmidt, who thought that developing a browser would be a too expensive affair.

  • However, Pichai persevered and convinced the co-founders of Google, Larry Page and Sergey Brin, to launch Google’s own browser. Pichai played a pivotal role in the ultimate launch of the browser, Google Chrome, in 2008. Chrome proved to be a great success as it allowed the users to directly access Google’s search engine.

  • Pichai became an internationally known figure following the phenomenal success of the Chrome which eventually became the No. 1 browser in the world, surpassing competitors such as Internet Explorer and Firefox. The Chrome also paved the way for a series of other important products like Chrome OS, Chromebooks, and Chromecast.

  • In 2008, Pichai was promoted to Vice President of product development. In this position he started appearing more often at Google presentations and continued rising up the ranks in Google. By 2012, he had become the Senior Vice President of Chrome and apps.

  • In 2013, Andy Rubin, the creator of Android, left to work on a different project. Larry Page then made Pichai in-charge of Android as well. His influence continued to increase and he was made the Product Chief in October 2014.

  • In 2015, Google formed a company, Alphabet Inc., to serve as a holding company and conglomerate to own the subsidiaries that were previously owned by Google, including a new “slimmed down” version of Google itself. On 10 August 2015, Sundar Pichai was named the new CEO of Google.
Major Work

An engineering genius known for his innovative ideas, Sundar Pichai is best known as the mastermind behind the launch of the Chrome browser in 2008. He played a pivotal role in convincing his seniors at Google to launch the browser which in time became the most popular browser on the internet and also led to the launch of the Chrome operating system.

Married and Worth

He is married to Anjali Pichai and his net worth is $1.2 Billion.

Monday, 26 March 2018

How Much Facebook Containes Your Information

You know that Facebook is a social networking site and there are many people like Children, Youth,Men and Women all use it from different-different country.Today it is very popular social networking site. Do You know ? Facebook contains all information about their users Name,Email,Phone number,Images,Chats,Ads those user click and also contain those ads which user not clicked,Choices, Favourite Place, Favourite Game,College Information,About your age,Sex,About your Qualification,previous and current Status and more.
Now a days some people claim to facebook that facebook sells their user Information.And Some people saying that you should block your facebook account because it is danger for democracy.
But facebook CEO(Chief Executive Officer) Mark Zuckerberg saying that he is not selling his user data.



So let's know how much facebook knows about you follow the steps.

Step1:- Login into your facebook account.

Step2:- Go to Settings

Step3:- Go to General and scroll you will see download a copy of your facebook data.

Step4:- Click on the link then You will get an email from Facebook telling you when the data is ready for download.

Step5:-Using the information Facebook has emailed you, download the data. This will be in a ZIP folder.

Step6:-Open the ZIP folder using a program like WinZip or Winrar. Nowadays, Windows also has unbuilt ZIP file opener.

Step7:-Inside the folder you will find a lot of files. Click on the INDEX.HTML file. This will open in a web browser and through it you can see how much Facebook knows about you.

Friday, 23 March 2018

Machine Learning


Machine Learning is an application of Artificial Intelligence that provide systems the ability to automatically learn and improve themselves without external programmed.Machine learning focuses on the development of computer programs that can access data and use it learn for themselves.
The best example of Machine Learning can be Self Driving cars,Speech Recognition etc.Self Driving cars are the driverless car.It will be drive automatically.There are many Companies are doing testing on it like Google,Uber etc.



Machine Learning algorithm can be classified into two parts Supervised Machine Learning and UnSupervised Machine Learning.

Supervised Machine Learning

Supervised machine learning algorithms can apply what has been learned in the past to new data using labeled examples to predict future events. Starting from the analysis of a known training dataset, the learning algorithm produces an inferred function to make predictions about the output values. The system is able to provide targets for any new input after sufficient training. The learning algorithm can also compare its output with the correct, intended output and find errors in order to modify the model accordingly.

UnSupervised Machine Learning

unsupervised machine learning algorithms are used when the information used to train is neither classified nor labeled. Unsupervised learning studies how systems can infer a function to describe a hidden structure from unlabeled data. The system doesn’t figure out the right output, but it explores the data and can draw inferences from datasets to describe hidden structures from unlabeled data.

Thursday, 22 March 2018

Microsoft Add Digital Payment Feature in Kaizala App


In Digital Payment system there are many industry provide facility like Paytm , PhonePay, Whatsapp but today Microsoft also add new feature Payment option in Kaizala app.
 Microsoft Kaizala is a new mobile app that makes it easy to communicate and get work done out in the field. With Kaizala, you have access to the tools you need to stay informed and be efficient. Kaizala makes it easy to get announcements from the main office, send feedback via polls or surveys, or simply chat with others 1:1 or in groups.


Enjoy digital payment with Microsoft Kaizala

Wednesday, 21 March 2018

Cryptography


The process of converting plain text to some other text that is only readable not understandable called cryptography.Converted text is called cypher text.Cryptography is not only use for convert plain text to cypher text but also used for authentication purpose whom data is send.
There is only two process is used in cryptography Encryption and Decryption plain text convert in to cypher text called encryption and cypher text convert in to plain text called decryption.

there are two type of Encryption

1)Symmetric Key Encryption

In Symmetric Key Encryption same key is used for Encryption and Decryption.It can be Public Key or can be private key.Public key is the key that is know by all user while Private key is the key that is know by only user that is the owner of the message.


2)Asymmetric key Encryption

In Asymmetric key data encryption different-different key is used for encryption and decryption.If sender encrypt the data using public key of the receiver then receiver can decrypt the message only by use private key of own.And its vise versa is also possible.

Delete +86 start Account from your whats app group


Doy you know , your data is safe on whats app? It is stunning that Chinese hackers theft Indian user data on whats app.The Country code mobile number of China is +86.like India is +91.
The main purpose of theft this data is to how to control them.Its another purpose can be business like what user want? what is the activity of user?which type product will be successful.

Mostly Chinese hackers join Armed Group where Information is sharing.They are seeing that how the Indian Armed Person worked and what is choice and activity of them.





 
So I request you please check your all whats app group and delete these number if anyone add .


Saturday, 17 March 2018

How to become Crorepati to find Bug

1)Microsoft

Microsoft is an American Multinational Technology company.It develop, manufactures, licenses,and sell software,electronics and Personal computers.Windows is a very popular Operating System which is develop by Microsoft.
Microsoft provide rewards to those who find vulnerability on its online services.

Find:https://technet.microsoft.com/en-us/library/dn425036.aspx

How much can you make: up to 1.6 crore.


2)Apple 

Apple is an American Multinational Technology Company.It design, develops,manufactures and consumers electronic, software and online services.
It also offers reward to those find vulnerability on its online services.Still, flaws and bugs are often found and the Cupertino-based giant also has a bug bounty programme but its restricted to developers.

Find:https://developer.apple.com/bug-reporting/

How much can you make: up to 1.2 crore



3)Google

Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, search engine, cloud computing, software, and hardware.
Google offers bounty for finding bugs in a host of its products and offers.In fact, the company paid out as much as $3 million in rewards to security researchers in 2017.

Find:https://www.google.com/about/appsecurity/reward-program/

How much can you make:up to 1.2 crore.



4)Facebook

If you can find security vulnerabilities on the social media network, then there’s a good chance you will be handsomely rewarded. Facebook paid over $800,000 to researchers in 2017 with India leading in number of bugs and vulnerabilities reported.

Find:https://www.facebook.com/whitehat/

How much can you make: up to no upper limit specified.



5)Samsung 

Samsung Electronics’ mobile division has an attractive rewards programme for those who can report bugs and vulnerabilities across its smartphones and tablet devices.
There are tough set of terms and conditions which one has to pass before qualifying for the bug bounty programme.

 Find:https://security.samsungmobile.com/rewardsProgram.smsb

How much can you make: up to 1.2 crore.

Wednesday, 14 March 2018

Fcts Related to Facebook


1) Where you're Logged In

By this facebook feature you can see where your facebook account currently logged in and in past which device has been logged in. for use this feature goto setting->Security and Logged In
Now you can see where yo're logged in area.


2) Get Alert By Unrecognized Log in


This feature alert you when a person login in your account from other country where you does not go.
It containes three part .Notification, Messenger and Email. You can get alert all these three facility by activate it. For activate it goto setting->Seccurity and Logged In->Get alerts about unrecognized logins.


 


3)Use Two-Factor Authentication

This feature secure you by two layer. when you logged in you account facebook send you OTP(One time password) to your registered mobile number then you will need to enter this OTP and then you logged in otherwise not.