Friday, 30 March 2018

How to use two WhatsApp account in one Android Phone

We know that chatting app is very useful for chat between two or more people.It is very efficient and easly transfer messages from one person to another person or group of person.There are billions of chatting app is developed and WhatsApp is one of them.WhatsApp is very popular chatting app.WhatsApp was developed by Brian Acton and Jan Koum in 2009, both former employees of Yahoo!.
Do you know that Android operating system have feature that you can run two WhatsApp account in one phone.

Here's a step-by-step guide to run two WhatsApp accounts using the Clone app or App twin:

1. Install WhatsApp from Play Store.

2. Go to phone's Settings.

3. Look for Dual App/App Twin/Clone app and tap on it.

4. You will see a list of apps that support this feature. Turn the toggle on for WhatsApp.

5. Now to set up the second WhatsApp, start the second WhatsApp.

6.Tap on Agree and Continue and allow WhatsApp to access your files and contacts.

7. Now the app will ask for your phone number, remember to give your second phone number. This will allows you to run two WhatsApp accounts with different phone numbers on one phone.


Note:-For phones that do not have App cloning feature, there are third party-apps which can be downloaded from Play Store and used for twinning the app.

Tuesday, 27 March 2018

Sundar Pichai




Childhood and Early Life

  • He was born as Pichai Sundararajan on July 12, 1972, in Chennai, Tamil Nadu, India. His father, Regunatha Pichai, worked as an electrical engineer for the British conglomerate GEC and managed a factory that made electrical components. His mother used to be a stenographer before having children. He has one brother.


  • Pichai grew up in a middle-class home and was a bright student. He excelled academically at his school, Padma Seshadri Bala Bhavan, and earned a seat in the Indian Institute of Technology in Kharagpur, one of the most prestigious engineering institutions in India.


  • He did his B.Tech in Metallurgical Engineering from IIT Kharagpur and then won a scholarship to study materials science and semiconductor physics from Stanford University from where he eventually earned his M.S.
Career

  • He initially planned to pursue a Ph.D. from Stanford and embark on an academic career. However, he dropped out and joined Applied Materials—a Silicon Valley semiconductor maker—as an engineer and product manager. He did not work there for long.


  • He went on to complete his MBA from the Wharton School of the University of Pennsylvania (2002), where he was named a Siebel Scholar and a Palmer Scholar.
    Following the completion of his MBA he was appointed as a management consultant at McKinsey & Company.

  • He joined Google in 2004. Initially he worked on Google’s search toolbar as a part of a small team. The toolbar gave users of Internet Explorer and Firefox easy access to Google search.
    He also worked on other Google products like Google Gears and Google Pack. The success of Google’s toolbar gave Pichai the idea that Google should develop its own browser. He discussed his idea with his seniors and faced an objection from then-CEO Eric Schmidt, who thought that developing a browser would be a too expensive affair.

  • However, Pichai persevered and convinced the co-founders of Google, Larry Page and Sergey Brin, to launch Google’s own browser. Pichai played a pivotal role in the ultimate launch of the browser, Google Chrome, in 2008. Chrome proved to be a great success as it allowed the users to directly access Google’s search engine.

  • Pichai became an internationally known figure following the phenomenal success of the Chrome which eventually became the No. 1 browser in the world, surpassing competitors such as Internet Explorer and Firefox. The Chrome also paved the way for a series of other important products like Chrome OS, Chromebooks, and Chromecast.

  • In 2008, Pichai was promoted to Vice President of product development. In this position he started appearing more often at Google presentations and continued rising up the ranks in Google. By 2012, he had become the Senior Vice President of Chrome and apps.

  • In 2013, Andy Rubin, the creator of Android, left to work on a different project. Larry Page then made Pichai in-charge of Android as well. His influence continued to increase and he was made the Product Chief in October 2014.

  • In 2015, Google formed a company, Alphabet Inc., to serve as a holding company and conglomerate to own the subsidiaries that were previously owned by Google, including a new “slimmed down” version of Google itself. On 10 August 2015, Sundar Pichai was named the new CEO of Google.
Major Work

An engineering genius known for his innovative ideas, Sundar Pichai is best known as the mastermind behind the launch of the Chrome browser in 2008. He played a pivotal role in convincing his seniors at Google to launch the browser which in time became the most popular browser on the internet and also led to the launch of the Chrome operating system.

Married and Worth

He is married to Anjali Pichai and his net worth is $1.2 Billion.

Monday, 26 March 2018

How Much Facebook Containes Your Information

You know that Facebook is a social networking site and there are many people like Children, Youth,Men and Women all use it from different-different country.Today it is very popular social networking site. Do You know ? Facebook contains all information about their users Name,Email,Phone number,Images,Chats,Ads those user click and also contain those ads which user not clicked,Choices, Favourite Place, Favourite Game,College Information,About your age,Sex,About your Qualification,previous and current Status and more.
Now a days some people claim to facebook that facebook sells their user Information.And Some people saying that you should block your facebook account because it is danger for democracy.
But facebook CEO(Chief Executive Officer) Mark Zuckerberg saying that he is not selling his user data.



So let's know how much facebook knows about you follow the steps.

Step1:- Login into your facebook account.

Step2:- Go to Settings

Step3:- Go to General and scroll you will see download a copy of your facebook data.

Step4:- Click on the link then You will get an email from Facebook telling you when the data is ready for download.

Step5:-Using the information Facebook has emailed you, download the data. This will be in a ZIP folder.

Step6:-Open the ZIP folder using a program like WinZip or Winrar. Nowadays, Windows also has unbuilt ZIP file opener.

Step7:-Inside the folder you will find a lot of files. Click on the INDEX.HTML file. This will open in a web browser and through it you can see how much Facebook knows about you.

Friday, 23 March 2018

Machine Learning


Machine Learning is an application of Artificial Intelligence that provide systems the ability to automatically learn and improve themselves without external programmed.Machine learning focuses on the development of computer programs that can access data and use it learn for themselves.
The best example of Machine Learning can be Self Driving cars,Speech Recognition etc.Self Driving cars are the driverless car.It will be drive automatically.There are many Companies are doing testing on it like Google,Uber etc.



Machine Learning algorithm can be classified into two parts Supervised Machine Learning and UnSupervised Machine Learning.

Supervised Machine Learning

Supervised machine learning algorithms can apply what has been learned in the past to new data using labeled examples to predict future events. Starting from the analysis of a known training dataset, the learning algorithm produces an inferred function to make predictions about the output values. The system is able to provide targets for any new input after sufficient training. The learning algorithm can also compare its output with the correct, intended output and find errors in order to modify the model accordingly.

UnSupervised Machine Learning

unsupervised machine learning algorithms are used when the information used to train is neither classified nor labeled. Unsupervised learning studies how systems can infer a function to describe a hidden structure from unlabeled data. The system doesn’t figure out the right output, but it explores the data and can draw inferences from datasets to describe hidden structures from unlabeled data.

Thursday, 22 March 2018

Microsoft Add Digital Payment Feature in Kaizala App


In Digital Payment system there are many industry provide facility like Paytm , PhonePay, Whatsapp but today Microsoft also add new feature Payment option in Kaizala app.
 Microsoft Kaizala is a new mobile app that makes it easy to communicate and get work done out in the field. With Kaizala, you have access to the tools you need to stay informed and be efficient. Kaizala makes it easy to get announcements from the main office, send feedback via polls or surveys, or simply chat with others 1:1 or in groups.


Enjoy digital payment with Microsoft Kaizala

Wednesday, 21 March 2018

Cryptography


The process of converting plain text to some other text that is only readable not understandable called cryptography.Converted text is called cypher text.Cryptography is not only use for convert plain text to cypher text but also used for authentication purpose whom data is send.
There is only two process is used in cryptography Encryption and Decryption plain text convert in to cypher text called encryption and cypher text convert in to plain text called decryption.

there are two type of Encryption

1)Symmetric Key Encryption

In Symmetric Key Encryption same key is used for Encryption and Decryption.It can be Public Key or can be private key.Public key is the key that is know by all user while Private key is the key that is know by only user that is the owner of the message.


2)Asymmetric key Encryption

In Asymmetric key data encryption different-different key is used for encryption and decryption.If sender encrypt the data using public key of the receiver then receiver can decrypt the message only by use private key of own.And its vise versa is also possible.

Delete +86 start Account from your whats app group


Doy you know , your data is safe on whats app? It is stunning that Chinese hackers theft Indian user data on whats app.The Country code mobile number of China is +86.like India is +91.
The main purpose of theft this data is to how to control them.Its another purpose can be business like what user want? what is the activity of user?which type product will be successful.

Mostly Chinese hackers join Armed Group where Information is sharing.They are seeing that how the Indian Armed Person worked and what is choice and activity of them.





 
So I request you please check your all whats app group and delete these number if anyone add .


Saturday, 17 March 2018

How to become Crorepati to find Bug

1)Microsoft

Microsoft is an American Multinational Technology company.It develop, manufactures, licenses,and sell software,electronics and Personal computers.Windows is a very popular Operating System which is develop by Microsoft.
Microsoft provide rewards to those who find vulnerability on its online services.

Find:https://technet.microsoft.com/en-us/library/dn425036.aspx

How much can you make: up to 1.6 crore.


2)Apple 

Apple is an American Multinational Technology Company.It design, develops,manufactures and consumers electronic, software and online services.
It also offers reward to those find vulnerability on its online services.Still, flaws and bugs are often found and the Cupertino-based giant also has a bug bounty programme but its restricted to developers.

Find:https://developer.apple.com/bug-reporting/

How much can you make: up to 1.2 crore



3)Google

Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, search engine, cloud computing, software, and hardware.
Google offers bounty for finding bugs in a host of its products and offers.In fact, the company paid out as much as $3 million in rewards to security researchers in 2017.

Find:https://www.google.com/about/appsecurity/reward-program/

How much can you make:up to 1.2 crore.



4)Facebook

If you can find security vulnerabilities on the social media network, then there’s a good chance you will be handsomely rewarded. Facebook paid over $800,000 to researchers in 2017 with India leading in number of bugs and vulnerabilities reported.

Find:https://www.facebook.com/whitehat/

How much can you make: up to no upper limit specified.



5)Samsung 

Samsung Electronics’ mobile division has an attractive rewards programme for those who can report bugs and vulnerabilities across its smartphones and tablet devices.
There are tough set of terms and conditions which one has to pass before qualifying for the bug bounty programme.

 Find:https://security.samsungmobile.com/rewardsProgram.smsb

How much can you make: up to 1.2 crore.

Wednesday, 14 March 2018

Fcts Related to Facebook


1) Where you're Logged In

By this facebook feature you can see where your facebook account currently logged in and in past which device has been logged in. for use this feature goto setting->Security and Logged In
Now you can see where yo're logged in area.


2) Get Alert By Unrecognized Log in


This feature alert you when a person login in your account from other country where you does not go.
It containes three part .Notification, Messenger and Email. You can get alert all these three facility by activate it. For activate it goto setting->Seccurity and Logged In->Get alerts about unrecognized logins.


 


3)Use Two-Factor Authentication

This feature secure you by two layer. when you logged in you account facebook send you OTP(One time password) to your registered mobile number then you will need to enter this OTP and then you logged in otherwise not.



Tuesday, 13 March 2018

Google added few new feature for Indian Users in India


1) Plus Codes: Converts long address into short alpha numeric codes

Plus Codes have been there in Google Maps from quite some time outside India. Now, the feature has been rolled out in the country as well. Google explains that in these alphanumeric codes, the first four determines the area, while adding more digits to it will zoom in to the locality and will eventually give the near-exact location of the place. These Plus codes can be generated from inside the Maps app and can be sent through any text messaging service. One can even paste it in the Google Search bar. This will open the Google Maps automatically with the particular address.



2) Add Addresses:You can add address

Add an Address is another feature using which Google expects to bring those locations on its map that have been apparently missing till date. For this, a user can simply drop a Pin at a location and fill in the location address to enable other users to see it. This crowdsourcing feature has a verification filter attached as well.



3)Search Smart address

Smart Address search feature by Google may not give users the exact address but uses AI's prowess to recognise the nearby landmarks to the specific location that a user is searching for. This is aimed to help users at least reach a near-by location.



4) Support for few Indian Language

Google has also added support for six new Indian languages in Google Maps. Users can now get voice navigation support for Bengali, Gujarati, Kannada, Telugu, Tamil and Malayalam. This is in addition to other languages including Hindi and English.


Huawei Honor 7C Specification


Huawei brand Honor announce its latest budjet smartphone in China Honor 7C.The handset comes with HD+ display with 18:9 aspect ratio.It has Face Unlock capabilities and a rear-mounted finger print sensor. The honor 7C offers portrait mode on both the front as well as rear camera.It will be available in Chinese market on Tuesday 13 March. 

Price

The 3GB RAM and 32GB storage variant of the Honor 7C will be priced in China CNY 899 or Rs. 9,200 while 4GB RAM and 64GB variant will be priced CNY 1299 or Rs. 13,300. The phone will be available Red,Gold,Black and Blue variant.

Honor 7C run on Android 7.0 Oreo operating System. It support 5.99-inch HD+(720*1440 pixels ) IPS display with a pixel density of 268ppi and 2.5D curved glass. The phone is powered by octa-core Qualcomm Snapdragon 450 SoC.

Honor 7C have dual rear camera 13megapixel and 2megapixel and f/2.2 aperture.It also have 8megapixel front camera for selfie and video calling.
It have 32GB/64GB inbuilt storage but it can be expand through SDcard.

 
  

Monday, 12 March 2018

How to surf internet securely


This article will tell you how to be secure yourself during net surfing.By reading this article you will be able secure while net surfing and anyone can not find your location through IP Address or any ideas.
 So let's start.....

Follow the following steps..

Step 1: Open you favourite web browser and type https://www.torproject.org/download/download-easy.html.en  and download the TOR web browser.

Step 2: Install the Tor browser.

Step3: Now search any thing on it .It generate random IP Address and makes the hierarchy of  location and locate your wrong location.So anyone can not trace you.

Tor web browser uses DuckDuckGo search engine.


Note: Attention that does not maximize, small or large the window of tor browser because your location can be trace by using window.


I search from India through TOR browser but It show my location  France.

Now you are secure ......Enjoy

Sunday, 11 March 2018

How to execute C or C++ program through command Prompt

  Follow these steps very carefully

 

Step1: Open Your favourite web browser and type http://tdm-gcc.tdragon.net/download .

Step2:  Download  tdm-gcc-5.1.0-3.exe  for windows 32-bit operating system. or download
             tdm64-gcc-5.1.0-2.exe for windows 64-bit operating system.

Stemp3: Install the downloaded program.

Step4:Write your C or C++ program in any text editor and save it with extension .c or .cpp

Step5: Open command prompt and set the path where you save your C or C++ program using cd  command.

Step6: type gcc -o filename filename.c
           
                ex. gcc -o x x.c   here x is the filename and press enter.

Step7:If your program have no any error then an .exe file would be generate and run the program with following command.

type  filename
ex. x here x is the file name.

Now your program output would be show......Enjoy 

Saturday, 10 March 2018

Some things you should never do while charging their smartphone


1) Always charge your phone its own charger

We know that every smartphone,laptop or any electronic device have own charger which have own capacity to charger their device like rating in voltage and ampere. If we charge it other charger it affect battery performance.

2) Ignore cheap charger from unknown manufacturer

Avoid cheap charger from unknown manufacturer because they do not include any safety mechanism to protect against fluctuation and over charging.So there are possibility to damage the battery and phone also.

3) Fast charger are not always the best option

Use the fast charger is not the best option because it affect the battery performance.Fast charger have higher voltage capacity and it send higher voltage to phone.So battery performance slow.

4)Never charge there phone over.Overcharging of the phone or electronic devices effect the health of the battery.

5)Try to charge your smartphone only at 85%.

6) Avoid Constant Recharge because it affect the battery performance.


Friday, 9 March 2018

How to Repaire currupted SD Card

Follow the Steps

Step1: Open Command Promp(cmd) using Run as Administrator

Step2: type diskpart

Step3: type list disk

Step4: type select disk 1

Step5: type clean 

Step6: type create partition primary

Step7: type active

Step8: type select partition 1

Step9: type format fs=fat32

Now your SD Card will work properly 

Let's Know what will be change in Android P

1) In android P time will show left side in status bar while android O(Oreo) It shows in right side.Google change it show that you can take notch friendly notification.



2) In android P all the setting options will be colorful while in android O all the option was colorless.



3) In android P volume slider will be in right side vertically By use You can increase and decrease volume effectivelly.




4) If you will press power button in android P then three option will be show Power off, Restart and screenshot while in android O It was only two Power Off and Restart.




5) In android P If anyone send image to your message then it will show in your notification and you can reply your message in your notification while android O it was not.


6) In android P another feature is Indoor Positioning by which you can track your location very effectivelly.





Thursday, 8 March 2018

How to boot your pen drive using command prompt

Boot Your Pen Drive

Step1: Open Command Prompt(cmd) using Run as Administrator

Step2: Type diskpart

Step3: type list disk 

Step4: type select disk 1, or, 2 or 3 etc.

 Step5: type clean

Step6: type create partition primary

Step7: type select partition 1,2 or 3 etc

Step8: type format fs=ntfs quick 

Step9: type active

Step10: type exit

Now your pen drive is boot successfully.............Enjoy 

Wednesday, 7 March 2018

Sql Injection


SQL Injection is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.This information can be anything like user data , administrator authentication information, company data, customer private details.

A successful attack of SQL injection may result in unauthorized viewing of user list, the deletion of entire tables the attacker have administrator authentication and control to the database.

Code that can be injected by SQL injection

statement = " select * from Student where name = ' " + xyz + " '; "

this SQL statement is used to retrieve the record of student table where name is xyz.
SQL injection can be use like set xyz to following-

' OR ' 1 ' = ' 1 '

or using comments to rest of the query

' OR ' 1 ' = ' 1 ' --
' OR ' 1 ' = ' 1 '({
' OR ' 1 ' = ' 1 ' /*

Ex. select * from Student where name = ' OR ' 1 ' = ' 1 ';  

Network Devices


Repeater

Repeater is a device that amplifies the signal it receive.In other words repeater is a device which receive a signal and retransmits it at higher level or high power so that the signal can cover longer distance.
Its used when the distance between sender and receiver is more so that data can be send noiseless(true data) to receiver.

Bridge

Bridge is a device that is used to connect sub network or LAN(Local Area Network). It connect only similar type of LAN or sub network. Means protocol should be same both network. Its possible to connect more than one bridge between two LAN it called redundant bridge.Disadvantage of redundant bridge is data may be in loop.



Router

Router is a network device that is used to connect two sub network or LAN but protocol of network can be different. Its also responsible to provide route to data.It is not a multi port converter.


Hub

Hub is a network device which is used to connect multiple network hosts. A hub is also used to do data transfer.The data is transfer in term of packet on the network.
Its two type
Active Hub has cleaning and boosting capacity and It can use for cable connection.
Passive Hub has no cleaning and boosting capacity and It may or may not use for cable connection.


Switch

Switch is almost similar to Hub but it is more intelligent to hub such that Hub just does the work of data forwarding, a switch does filter and forwarding which is more intelligent way of dealing with the data packet.



Gateway

It is similar to the Router and used to connect different type protocol network but It can connect more than two sub network which can be dissimilar type so it called multi port convertor.

How to make Fake Register on any site


Make Fake Email Address


Open new tab in your web browser and type https://10minutemail.com. This site generate a fake email for 10 minute.This will be fake email for your account.All the messages of this email will be shown on your web browser.You can see the mail to refresh the page.




Make Fake Mobile Number for OTP


Open new tab in your web browser and type http://receivefreesms.net/ or http://hs3x.com/ and select one mobile number from list of mobile number and enter that mobile number in your form.Your OTP will send on that website you can read the OTP and fill it in your form.





Thus You can make fake Register on any form.....Enjoy

Tuesday, 6 March 2018

Samsung Galaxy S9 and Galaxy S9+ launch in India 06/03/2018


Samsung Galaxy S9 Specification



The Galaxy S9 is powered with 10 nm, 64 bit, octa-core Exynos 9810 processor in India.
The phone is come with 4GB RAM and in two storage variants 64GB and 256 GB. The phone memory can be expanded up to 400GB through external microSD card.

The phone has aluminium frame and a glass front and back.The display resolution of the phone is 1440*2960 pixels with an18.5:9 aspect ratio.

It has 12 megapixel  flagship dual rear camera with varying aperture f/1.5-f/2.4.It has also a 8 megapixel front(selfie) camera with aperture f/1.7.


Price Rs. 57,900 for 64GB Model, and goes up to Rs. 65,900 for 256GB variant.

Samsung Galaxy S9+ Specification



Almost all the specification of S9+ is similar to S9 but some difference is as follow.
The Galaxy S9+, like the S9 with 10nm, 64bit, octa-core Exynos 9810 processor in India however S9+ features of 6GB RAM and comes with 64GB and 256GB of storage variants.

The storage can be expand up to 400GB through a microSD card.

It has 12 megapixel rear(primary) camera with f/1.5-f/2.4 aperture.and front(selfie)  camera is 8 megapixel with f/2.4 aperture.

The dual sensor on S9+ can record videos 2160p at 60fps (frame per second) and 1080p videos at 240fps.


Price Rs. 65,900 for 64GB Model, and goes up to Rs. 72,900  for 256GB.

Both S9 and S9+ have Face detection, iris scanner and fingerprint scanner as security purpose.

Monday, 5 March 2018

How to search very effectively on Google and use like pro


1) Search anything in double quote (""). Ex. "hello google". It will show only hello google not about other thing.

2) If you want to eliminate a word from your search, you can use (-word)
 Ex. Linux Distribution -Ubuntu
It will show all distribution of Linux except Ubuntu.

 3) You can search any site using site:sitename Ex. site:hbtu.ac.in

4)You can search on google related thing to word using tilde(~) symbol. Ex. ~sushil

5) You can gain any value using asterisk(*) symbol on google.
  Ex. salary of software engineer is *

6)You can gain any article ,news,websites on google between time range.
 Ex. windows 2011..2014
It will show all articles, news and websites between 2011 and 2014.

7)File type search on google.
Ex. filetype:ppt software book
 It will show ppt only on software book.

Network

Network:- The connection of computer or devices in such a way that it could communicate between them is called network.In network two or more computer can share their resources(printer,memory).
Computers linked together wired medium or wireless.When a computer request something from other computer it called client and service provider computer called server.

Type of network

a)LAN(Local Area Network)

b)MAN(Metropolitan Area Network)

c)WAN(Wide Area Network)

LAN:- If two or more computers or devices are connected in a place or in a organization is called Local Area Network.Mostly its possible through wired medium.




MAN:- If two or more computers or devices are connected in a city is called Metropolitan Area Network. It is mostly possible through wired medium.



         
WAN:- If two or more computers or devices are connected in a country or between country is called Wide Area Network.Its mostly possible through wireless medium.Ex. Internet.


Difference between SSD and HDD

1)SSD stands for Solid State Drive while HDD stands for Hard Disk Drive.

2)SSD is more costly than HDD

3)SSD speed is more than HDD

4)SSD has less capacity to HDD

5)SSD is not easly available in the market while HDD is easly available in the market.

6)SSD is not easly crash while HDD is easly crash.

Saturday, 3 March 2018

14 Best Websites

Steve Jobs Biography

Born-  February 24,1955 in San Francisco, California, USA

Died-  October 5, 2011 in Palo Alto, California, USA

Cause of Death- Pancreatic neuroendocrine Park

Birth Name- Steven Paul Jobs

Occupation- Co-Founder, Chairman, and CEO of Apple Inc
                     Primary Investor and CEO of Pixar
                     Founder and CEO of NeXT

Steve Paul Jobs was an American inventor, designer and entrepreneur who was the co-founder and CEO of Apple Computer. Apple's revolutionary products, which include the iPod, iPhone and iPad, are now seen as dictating the evolution of modern technology.Jobs left the company in 1985, launching Pixar Animation Studio then returned to Apple more than a decade later.
Jobs died in 2011 followng a long battle with pancreatic cancer.

Friday, 2 March 2018

How to Change Windows password using "net user" Command

1)Open command prompt(cmd) with run as administrator.

2)Type net user . all the user of the windows would be show.

3)Type net user <user name> * .
  ex:- net user sushil *. here sushil is the user name.

4)Enter your password

5)Then Re Enter password

6)Now your password will be change ..

Enjoy

Android Journey

10) Version Number-(5.0-5.1.1)
      Version Name-Lolipop
11)Version Number-(6.0-6.0.1)
     Version Name-Marshmallow
12)Version Number-(7.0-7.1.2)
     Version Name-Nougat
13)Version Number-(8.0-8.1)
     Version Name-Oreo




Android Journey

5)Version Number(2.3-2.3.7)
   Version Name-Gingerbread
6)Version Number-(3.0-3.2.6)
   Version Name-Honeycomb
7)Version Number-(4.0-4.0.4)
   Version Name-Ice Cream, Sandwitch
8) Version Number-(4.1-4.3.1)
   Version Name-Jelly Bean
9)Version Number-(4.4-4.4.4)
   Version Name-KitKat