Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Magazine-28-jan

Magazine-28-jan

Published by suvetha mohan, 2021-02-19 07:36:35

Description: Magazine-28-jan

Search

Read the Text Version

PG DEPARTMENT OF COMPUTER APPLICATIONS

ABOUT THE MAGAZINE EDITORIAL BOARD Editor in chief : Dr. D. Jeya Mala, M.C.A., M.Phil., Ph.D. -Director Associate editors: Ms. S. Mary HelanFelista, M.C.A., M.Phil., SET. - Assistant Professor & Head Ms. R. Smeeta Mary, M.C.A., M.Phil.(Ph.D.) - Assistant Professor Ms. S. Jebapriya, M.C.A., M.Phil., SET. - Assistant Professor Ms. B. Usha, M.Sc., M.Phil.,M.Tech., SET. - Assistant Professor Ms. S. Selvarani, M.C.A., M.Phil., NET., SET. - Assistant Professor Ms. P. Nancy Vincentina Mary, M.C.A., M.Phil. - Assistant Professor Student editors: Ms. A.ReshmaKaboor, (2019MCA19L ) - III MCA Ms. N.Nagapavithra, (2018MCA01) - III MCA Ms. C. KayalVizhi, (2019MCA01) - II MCA Ms. K. Madhubala, (2020MCA12) - I MCA Ms. R. Kausalyaa, (2020MCA10) - I MCA Published by: PG Department of Computer Applications, Fatima College, Madurai. Editor’s message: By, Dr. D. Jeya Mala, Director of MCA, Editor in Chief. PG DEPARTMENT OF COMPUTER APPLICATIONS

Bouquet of Gratitude to Our Founder A loving tribute to MOTHER ROSE BENEDICTA (St.Joseph of Lyons) Founder, Fatima College,Madurai. PG DEPARTMENT OF COMPUTER APPLICATIONS

CONTENTS  About the Department  Events of the department  Celebration  Staff Article  Student Article PG DEPARTMENT OF COMPUTER APPLICATIONS

ABOUT THE DEPARTMENT The AICTE approved professional course MCA was started in the year 1994. The core objective of the department is to prepare the students for productive career in the software industry and academia by providing an outstanding environment of teaching and research in the core and emerging areas of the discipline. A full time MCA course is not just a postgraduate programme; it is also a complete professional grooming of students for a successful career in the IT industry. The core objective lays emphasis to:  Equip the students with the latest computer hardware and software technologies.  Enhance the confidence of the students by developing a global vision.  Sharpen the communication and presentation skills.  Understand the importance of ethical values. VISION To empower women by providing them unparallel learning experience and to strengthen the strategic linkage with the industry. MISSION  Training in the cutting edge technologies to adapt to the Dynamic IT world.  Promoting a learning community in a supportive and caring. environment that lead students to successfully complete their goals  Build up Headship traits among students.  Craft responsible Computer Professionals with strong Moral Values. FACULTY MEMBER OF THE DEPARTMENT - Director - Assistant Professor & Head 1. Dr. D. Jeya Mala, M.C.A., M.Phil., Ph.D. - Assistant Professor 2. Ms. S. Mary Helan Felista, M.C.A., M.Phil., SET. - Assistant Professor 3. Ms. R. Smeeta Mary, M.C.A., M.Phil.(Ph.D.) - Assistant Professor 4. Ms. S. Jebapriya, M.C.A., M.Phil., SET. - Assistant Professor 5. Ms. B. Usha, M.Sc., M.Phil.,M.Tech., SET. - Assistant Professor 6. Ms. S. Selvarani, M.C.A., M.Phil., NET., SET. 7. Ms.P. Nancy Vincentina Mary, M.C.A., M.Phil. PG DEPARTMENT OF COMPUTER APPLICATIONS 1

EVENTS OF THE DEPARTMENT COUNSELING SESSION The counseling session was held by Dr.Sr.Francis Pauline, a good speaker conducted a valuable session through google meet.The main moto of this session is to improve our mental health in the pandemic situation.She gave a nice definition for counseling which inspires as lot.“Counseling is meant for normal people,it doesn’t mean that it is for abnormal people”.This definition helps us to reduces the fear of attending the counseling session and we learnt many life lessons through her speech. According to the America counseling Association,counseling is defined as“A Professional relationship that empowers diverse individuals families, and groups to accomplished mental health ,wellness,education and career goals” . FRESHER’S DAY CELEBRATION Fresher’s Day Celebration was held on November 11, 2020 on Google Meet from 9.00 A.m to 12.00 Noon. The students of MCA participated in Fresher’s Day Celebration. The events starts with many games to encourage the freshers The games like BGM finding, Knowledge game, Connection, Missing lyrics which includes both technical and non-technical. Later motivationals video were presented for adding dual joy. Then the freshers enthusiastically introduced themselves one by one in the allotted time which was 2min per student. All were very impressive in their own way. After this nightingale of our department Ms. Kavya, III MCA. Then the junior and senior have a healthy conversation about the curriculum. The entire event was covered by the Association members with the excellent planning skills. INDUCTION PROGRAMME An induction programme is a harbinger of various in-campus & off- campus activities specially designed for entrants to fill the gap. It was held on 28.10.2020 on Google meet from 10.00 A.m to 11.00 A.m. This programme was brought in with a view to uplift the level of the entrants to an elevated stage,promote all round development and exposing learners’ stigmas to minimize and to maximize their learning. Learners come with diverse thoughts, backgrounds & perceptions. Hence it becomes important to help them to adjust the new environment & inculcate the ethos of the institution with a sense of larger purpose. Fatima Institute of Management, Professional Courses has organized a one hour induction programme with an objective to provide sample of time and a platform for the new students. PG DEPARTMENT OF COMPUTER APPLICATIONS 2

PLACEMENT WORKSHOP The placement workshop was held on 19.12.2020 from 9.00 A.m to 4.00 P.m on Google meet. The key speaker for the workshop was Mr. K.Sabari Nathan, Business Fraud Analytics Manager, City Bank, Kuala Lumpur, Malaysia. The first session he gave an overview about Big Data Analytics and it also explain various Big data technologies. The second session created practical impact on Hadoop installation and working of hadoop. Students have asked several questions during the workshop and also gave their basic understanding and expressed their views. Students found the seminar very informative and interactive. Participants realized that Big Data and Hadoop is the cornerstone of business technology agenda. This workshop helped the participants to get acquainted with a must-know technologies like Hadoop. PLACEMENT PREPARATORY PROGRAMME The proficiency enhancement programme PEP 2020 was held on 5 days by proficient trainees. The first session was held on 04.01.2021 by Mr.Viswanathan, Senior trainer, Voice training and Research, Madurai. The noon session was trained by Mrs. R. Smeeta Mary and Mrs. S. Jebapriya on MACHINE LEARNING and JAVA. On 5.1.2021 training was given by Mrs. S. Mary Helan Felista, Mrs. B. Usha and Mrs. P. Nancy Vincentina Mary on the topics of C, C++, RDBMS and OPERATING SYSTEM respectively. Then on 6.01.202 Ms. Aparna, Psychologist and Counselor, trained the students on self-assessment. On 7.1.2021 morning session handled by Ms. M.Karthiga, Data Support Specialist, IBM, Bangalore trained student on latest trends and afternoon session was given by Mr.K.Krishna Ganesh, Head of Learning and Development, Solartist technology services private limited, Madurai on the topic of 'Eyes'. Then 08. 01.2021 training on Software Engineering was given by Dr. D. Jeyamala, Director of MCA department. Finally, the PEP was concluded by having MOCK interview on 12.1.2021 by Dr. D. Jeyamala and Dr. S. Raju Director of MCA and MBA departments respectively. GUEST LECTURE 1. TOPIC: INTRODUCTION TO AUGMENTED REALITY The session was organized on 26.11.2020 from 2.00 P.m to 4.00 P.m.The`guest lecture gather eminent speaker Ms.R.Sangeetha discuss about the topic Introduction to augumented reality. which the session was very interactive and student participated enthusiastically. In the beginning Ms. Sangeetha gave the introduction about the augmented reality later she explained the future of augumented reality. The vote of thanks was given Ms. K. Madhubala with a small token of appreciation to our valuable guest. PG DEPARTMENT OF COMPUTER APPLICATIONS 3

2. TOPIC: TIME AND WORK The guest lecture was scheduled on 03.12.2020 on Google Meet, Fatima college,Madurai. This lecture was delivered by DR.Suganthi Jeyasing on the topic of time and work in her lecture she explained the easiest methods and how to solve the question in shortest time. The lecture was great success. It helps students to know new methods and prepare themselves for aptitude exams. ASSOCIATION INAUGURATION The Association Inaugural Ceremony was held on . Ms.A.Reshma kaboor president of association formally welcomed all the dignitaries. Later our department director Dr.D.Jeya Mala announced the results of association members and disscuss about the moto of the association.The program was followed by the Resource person Dr.N.Ravia Shabnam Parveen Head & Assistant Professor Department Of Information Technology,American college, Madurai she motivated everyone to actively participate in the association upcoming events. In the end Ms.N.Nagapavithra secretory of association offered a vote of thanks she thanked all the staff members and students for gracing the occasion by their solemn presence. ASSOCIATION ELECTION Zeal Association election was held on 21.11.2020 through google form. The Election results was announced by Dr. D. Jeya Mala, Director of MCA, Fatima College, Madurai and the association members are President - Ms. A. Reshma kaboor Secretary - Ms. N. Nagapavithra Treasurer - Ms. C. kayal vizhi Vice president - Ms. R. Kausalyaa Join Secretary - Ms. K. Madhubala Later the association members take oath that they work for improvement of student sincerely and faithfully. PAPER PRESENTAION The paper presentation competition was held on 04.12.2020 from 2.00 P.m to 4.00 P.m on Google Meet. The topic given for the competition was Artificial intelligence. The participants explain extraordinary about the topic and the winners was announced by Ms.P. Nancy Vincentina Mary. The decision regarding the winners was made on the basis criteria like relevance to the theme, accuracy and clarity of the message and overall presentation. PG DEPARTMENT OF COMPUTER APPLICATIONS 4

WEB DESIGNING COMPETITION The Web Designing Competition was held on September 18th 2020 on Google Meet. The students of III MCA participated in this event and proved their talents in Web Designing under the topic of “Online Shopping”. The program was started at 02.00 P.m and winded at 04.00 P.m. Web design encompasses many different skills and disciplines in the production and maintenance of the website POSTER MAKING COMPETITION A poster making competition was held on November 21 at Google meet from 2.00 P.m to 4.00 P.m at Fatima College, Madurai. The aim behind conducting this competition was to check the creative and artistic skills of the students. The suggested themes of the competition were school cultural, saving girl child and women empowerment. The total time allotted for the activity was 1 hour and 30 minutes. This offers them a platform to showcase their skills. The student expressed their views and thoughts in their creative presentation DEBUGGING COMPETITION The Debugging competition was held on 25.11.2020 on Google Meet. The competition was held for one and a half hours. The questions were quite standard there were total 5 questions and the available languages were C,C++,JAVA , .Net and python. The participants were allowed to code in any language among this, in which they were comforatable. PHOTOGRAPHY COMPETITION “We are making photographs to understand what our lives mean to us” The Photography competition was held on 27.11.2020 on Google Meet, the very purpose of the photography competition was to inspire the photographer in students . It was a creative event at which the participants got an opportunity to capture the nature, lockdown and colours. The participants submitted the photography to association mail id. PG DEPARTMENT OF COMPUTER APPLICATIONS 5

STAFF ARTICLE EDGE ANALYTICS - IOT ANALYTICS ON THE EDGE DR. D. JEYA MALA, Director of MCA, Fatima College, Madurai Before going to the detailed discussion on IoT Analytics, let us first know about the entire process involved in it. The data collected by the sensors from the things that is smart phones , production machineries, electronic appliances will be securely communicated using Internet of Things platform. This IoT platform is acting as the backbone in IoT Analytics, as it collects and combines data from multiple devices and other platforms connected through internet. This platform then applies analytics to take decision making and further processing and transfer of data.IoT Analytics offers a futuristic dimension to business side of the application areas such as E-commerce, M-Commerce, Retail, Wearable technologies, Industry 4.0 etc in which the devices are connected through IoT platform. Data collection from IoT devices is really a big challenge as the devices are independent in nature and hence collection, aggregation, classification and making decisions is extremely difficult. Hence, nowadays the IoT platforms provides a way to send the sensor collected data to the cloud or to the clusters or to a centralized data store or a data warehouse for data analytics.As the amount of data collected from these sensors will be voluminous in nature, and this collection termed as big data, collecting and storing them into the cloud for further processing is the current area of development in IoT Analytics.This is applicable in any of the IoT architectures, in which as soon as the sensors collect and store data, these data should be processed to provide some useful outcomes to do a decision making process. Hence, the data collected and stored in the cloud or any local storage devices will then be taken for analysis to take further actions over it. But when the IoT platform is expanded to include more sensors then collecting data and sending data to the cloud or any other storage medium for further processing will be a cumbersome task as many of the times all the data collected from the sensors need not be valuable and need not contribute any of the decision making processes. In these kinds of situations simply storing all the collected data without validating them will not be an advisable one and also some important actions or decisions need to be taken immediately after the sensor collects the data instead of waiting for storing and retrieving data from the storage media.If we try to compress the data to minimize the storage issue, the computation overhead involved for compressing the data will be another issue or problem. Even if we have added more IoT gateways to handle this voluminous amount of data by the way of distribution of process overhead into these gateways, once again we will face the problem of assembling the data for further processing, issue of scaling etc. will happen. Hence, we need an alternate solution to take resolve all the stated problems. From the literature study, it has been observed that, Edge Analytics is an alternate way to handle these kinds of problems. Edge analytics is an approach to data collection and analysis in which an automated analytical computation is performed on data at a sensor, network switch or other devices instead of waiting for the data to be sent back to a centralized data store.A typical real time example is a Traffic Management system. A light sensor at a traffic light can be built with intelligent monitoring for traffic management. Real-time feedback within the device itself ensures immediate and appropriate use of the data it is gathering, circumventing the need to send the data elsewhere for outside consideration. Hence, “Edge Analytics” is going to rule the world in the future. - PG DEPARTMENT OF COMPUTER APPLICATIONS 6

WEB DEVELOPMENT PROCESS MODEL S. MARY HELAN FELISTA, Associate professor & Head, Fatima College, Madurai The difference between software engineering (SWE) and web engineering must be understood first (WEBE).Although both adopt a disciplined approach to the creation, implementation and maintenance of applications, the fundamental difference is that the specifications (scope) of web projects vary from those of software projects. The various models such as Waterfall, Spiral, Gradual, etc. are software projects, but there are no specified models for the project Web Applications, as the specifications are complex (not fixed). Secondly, WEBE is more complicated than SWE, since the former relies on the different types of browsers, OS, and servers, such as web servers, servers of applications.WEB Apps are more complex than SW Apps, in the sense that you need to know at least Javascript, database, server side scripting language, Java scripts, and Photoshop to edit images in order to create certain applications. This article described the successful web development process model. 1) Information Gathering Gathering details is the first step in designing a good web site. When the look and feel of your site is developed, several factors need to be taken into consideration. In fact, this first step is the most important, as it requires a solid understanding of the market for which it is made. 2) Planning After gathering ample company details, it is time for sitemaps and wireframes to be produced. With the data gathered in the first stage, a sitemap is made. The primary motive of a site map is to create a user-friendly website and create a site structure. A visual representation of a site is provided by a wireframe. Other than that, determine what features and functions you want on a website. Login, email subscription, admin, live chat and so much more are part of this feature. 3) Design A vital aspect of the success of any online company is web design. In accordance with the target audience, the web design is developed. A website that design for college is completely different from the design for products. A theme, a colour contract, where to put text, pictures, videos, etc., are other things to bear in mind. The template layout designs the page in a structured way so that it looks attractive. PG DEPARTMENT OF COMPUTER APPLICATIONS 7

4) Content Writing Now it's time to write the material on the website after the creation process. Excellent and engaging content is important to attract people's attention. The material should be updated with headings, subheadings, tags, etc. for the website so that users can find what they are looking for. In order to achieve business goals, content writing is needed to compose and publish content all the time. It may be to raise brand awareness, make people aware of new products or services, generate leads, or attract new business customers. 5) Labeling An efficient nomenclature or marking scheme is one of the main components of the information architecture (IA) of a website. A nomenclature is a system of names or words, or the rules for the creation of these terms, according to Wikipedia. There are basically three different styles of labels in website design and development:  Labels for Documents A text is a website. And there's a graphic picture and a video here. A JavaScript file, as well as a style sheet, is a folder. Each document serves a function on a website. What each document is about should be conveyed via a document mark.  Labels for Content Content labels are very useful because of the scannability of the support, particularly if the content of a webpage needs scrolling. Labels for content include: o Headings o Sub-headings o Taglines o Image headings and captions o Video headings and captions  Lables for Navigation \"You are here\" signals should be given by navigation systems and labels. 6) Choosing CMS Software that allows users to develop, manage and change content on a website without the need for advanced technical expertise is a content management system, also abbreviated as CMS. The best CMS is WordPress. Making WordPress website creation less costly and simple is not an easy job. Most people are scared of maintaining and creating a website. Not only is the PG DEPARTMENT OF COMPUTER APPLICATIONS 8

website built on WordPress simple to use and maintain, it also provides numerous functions to operate a business. Today, many small and large businesses are opting for WordPress as an important forum for their website growth. Yahoo Blog, eBay Blog, Sony and a lot more are the major names that use WordPress. 7) Coding The design of the website is now under the guidance of developers at this point to run the codes on it. A web developer can use codes on the platform to make it work and operate smoothly. As graphic design comes to life in the previous stage, it is the most crucial phase in development. A home page is planned first, as per the sitemaps, than the other sites. To construct an actual web design, other elements built in the preceding steps are used. First, the landing or main page is created most of the time, and then all other web pages are added, as per the hierarchy of the site created as described in the sitemap. At this point, a deep understanding of every technology of development that are going to use is essential. 8) Testing It is another routine part of the process of web development. Before launching the site, all pages and links are tested to make sure that nothing is broken. To find potential typing errors, check every form, script, and run spelling check programme. To make sure that the code meets the latest web development guidelines, use code validators. Your site is tested for many items at this point, including—Website speed—Cross-browser compatibility—Multiple screen tests—All the required tests are performed on a website before it is released on the World Wide Web. 9) SEO And Social Media Optimization This move is only applicable to websites. Promotion includes meta tag planning, continuous review, and URL submission to search engines and directories. For further reading, there is a comprehensive article on Search Engine Optimization on this blog. Search Engine Optimization and Social Media Marketing is typically an ongoing operation, as search engine tactics can change very frequently. An ideal submission policy could be to apply a site URL once every 2 months. If the client is eager, it is also possible to make paid clicks and paid submissions with extra costs. 10) Maintenance When a website is launched, it does not mean that services are terminated. Many developers are able to provide maintenance services to prevent more inconvenience. The organization has several tasks to perform, such as supplying customers with the source code and project documentation, working on feedback and support for post-development. This move is equally crucial because once it is alive for users, the main aim of the site begins. PG DEPARTMENT OF COMPUTER APPLICATIONS 9

DATA MINING CURRENT TECHNIQUES AND TRENDS R. SMEETA MARY, Assistant professor, Fatima College, Madurai Data mining is a logical process which is used to search large amount of data to find useful data. Finding out the previously unknown data is the goal of this technique. There are various steps involved such as Exploration, Pattern identification and Deployment. In exploration the data is cleaned and transformed into new form. The important variables and nature of the data based on the problem are found out. Once the data is explored using pattern identification, then it is refined and defined for the certain variables. It makes the best prediction by identifying and choosing the patterns. The last step deployment is finding out the desired outcome by deploying the patterns. In this process the first step is data cleaning in which noise and inconsistent data is removed and multiple data sources are combined together. In the data selection the data that are relevant for the analysis task are retrieved from the database. Data mining algorithms are used to find the extract data patterns. Some interesting measures are used for the identification of the data patterns. Using many knowledge representation techniques, knowledge is shared to the user. Training methods used in data mining techniques are divided into two approaches. Unsupervised learning, this method is applied without training (training) and without a teacher (teacher). The teacher here is a label of data. Supervised learning is a method of learning with training and training. In this approach, to find decision functions, separator functions or regression functions, several examples of data that have output or labels are used during the training process. There are several techniques that data mining has based on tasks that can be done, namely Description, Researchers usually try to find ways to describe patterns that are hidden in the data according to the growing trend of their time. Estimation, Estimation is similar to classification, except that the destination variable is more numerical than the category. Predictions, Predictions are similar to estimates and classifications. It's just that the prediction of the results shows something that hasn't happened. Classification, in variable classification, objectives are categorical. For example, we will classify income in three classes, namely high income, moderate income, and low income. Clustering, more towards grouping records, observations, or cases in a class that has similarities. Association identifies the relationship between various events that occur at one time. We foresee the following trends in data mining area over the next few years: Embedded data mining: More and more business applications will include data mining features, in particular the prediction feature, for added value. For example, the CRM application will allow users to forecast product sales. Online retailers will recommend products to customers for cross-selling purposes. This will be due largely to the fact that industrial data mining APIs, such as OLE DB for Data Mining, enable database and application developers to use data mining features and embed them in a line of business applications. Embedded data mining will increase the overall size of data mining market Data mining packages for vertical applications: Data mining is becoming popular as major database vendors add it to their database management system (DBMS) packages. Data mining can be applied to almost every sector. Today, major data mining markets exist in finance, insurance, and telecom. There is a growing need for specialized data mining techniques to solve business problems in PG DEPARTMENT OF COMPUTER APPLICATIONS 10

many vertical sectors. For example, in the health care field, we need special data mining techniques to analyze DNA sequences. In network security applications, we need real time training algorithms to detect network intrusion. We need nontraditional data mining techniques to analyze the unstructured data in the World Wide Web. Text mining is yet another vertical sector to which we need to apply data mining. Traditional horizontal data mining packages are too general to solve these problems. We foresee there will be more new data mining packages specialized for these vertical sectors. Products consolidation: Hundreds of software vendors are providing horizontal data mining packages. Many packages include only one or two algorithms. The data mining market is still very fragmented. Just as with other software sectors, consolidation is inevitable. Small vendors will find more competitive pressure in the horizontal market, especially when major database vendors add data mining features to DBMSs. PMML: Although big vendors, such as Microsoft, Oracle, IBM, and SAS, are competing on various data mining APIs, they are all member of the same club: the DMG (Data Mining Group). They all support PMML as the model persistence format. PMML offers many advantages in terms of model exchange and model deployment. Because it is an XML document, it is also editable by advanced users. PMML will become more popular in the near future. PG DEPARTMENT OF COMPUTER APPLICATIONS 11

Cyber Security S. JEBAPRIYA, Assistant professor, Fatima College, Madurai 1 2 4 3 5 6 7 12 8 9 10 11 15 13 14 17 18 19 20 Across 2. a network security system, either hardware-or software-based,that controls incoming and outing network traffic based on a set of rules. 4. a standalone malware computer program that replicates itself in order to spread to other computers. 5. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master while (the cybercriminals)who are often safely located somewhere far across the internet. 6. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. 10. a method, often secret, of bypassing normal authentication in a Product. 11. a local or restricted communications network, especially a private gain access to the information network created using World wide web software. PG DEPARTMENT OF COMPUTER APPLICATIONS 12

15. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. 16. an attempt by hackers to damage or destroy a computer Network or a system. 17.someone who seeks and exploits weaknesses in a computer System or computer network. 19. the activity of defrauding an online account holder of financial information by posing as a legitimate company. 20. body of technologies, processes and practices designed to Protect networks, computers, programs and data from attack, damage or unauthorized access. Down 1.any malicious computer program which is used to hack into Computer by misleading users of its true internet. 3.are small files that web sites put on your computer hard disk drives when you first visit. 7.any software program in which advertising banners are displayed the program is running. 8.used to describe any code in any part of a software system or a script that is intended to cause undesired effects , security breaches or damage to a system. 9.global system of interconnected computer networks that use the internet protocol suite. 12.make possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves. 13.designed to detect and destroy computer viruses. 14.refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. 18.a piece of code that is capable of copying itself and typically has a detrimental effect, such as computing the system or destroying data. Answer: Across 2. FIREWALL 4. WORM 5. BOTS 6.SPYWARE PG DEPARTMENT OF COMPUTER APPLICATIONS 13

10. BACKDOOR 11. INTRANET 15. BLEND 16. ATTACK 17.HACKER 19. PHISHING 20. CYBERSECURITY Down 1. TROJANHORSE 3. COOKIES 7. ADWARE 8. MALICIOUS 9. INTERNET 12. ENCRYPT 13. ANTIVIRUS 14. BACKUP 18. VIRUS PG DEPARTMENT OF COMPUTER APPLICATIONS 14

AMALGAMATION OF BIG DATA AND INTERNET OF THINGS B.Usha , Asst. Professor,Dept. of MCA, Fatima College, Madurai The explosive growth in the number of devices connected to the Internet of Things (IoT) and the exponential increase in data consumption only reflect how the growth of big data perfectly overlaps with that of IoT. The management of big data in a continuously expanding network gives rise to non- trivial concerns regarding data collection efficiency, data processing, analytics, and security. To address these concerns, researchers have examined the challenges associated with the successful deployment of IoT. Despite the large number of studies on big data, analytics, and IoT, the convergence of these areas creates several opportunities for flourishing big data and analytics for IoT systems. Big Data is data sets that are so voluminous and complex that traditional data processing application software is inadequate to deal with them. The world's technological per-capita capacity to store information has roughly doubled every 40 months since the 1980s; as of 2012, every day 2.5 Exabyte (2.5×1018) of data are generated. By 2025, IDC predicts there will be 163 zeta bytes of data. The Internet of things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators and network connectivity which enables these objects to connect and exchange data. IoT is about devices, data and connectivity. The real value of Internet of Things is about creating smarter products, delivering intelligent insights and providing new business outcomes. As millions of devices get connected, Internet of Things will trigger a massive inflow of Big Data. The key challenge is visualizing and uncovering insights from various types of data (structured, unstructured, images, contextual, dark data, real-time) and in context of the applications. The end goal is to harness the data coming from sensors and other contextual information to discover patterns and correlations in real-time to positively impact businesses. Existing Big Data technologies need to be augmented to effectively store, manage and extract value from continuous streams of sensor data. For instance, it is estimated that connected cars will send 25 gigabytes of data to the cloud every hour. The biggest challenge will be to make sense of this data, identifying data that can be consumed and quickly acted upon to derive actionable events. The use of Artificial Intelligence technologies like deep learning will be a key differentiator to derive insights rapidly from massive streams of data. With IoT, Big Data analytics would also move at the edge for real-time decision making, for instance detecting crop patterns in agriculture plants using drones at remote places, detecting suspicious activities at ATMs or predicting driver behavior for a connected car. To sum it up, IoT is the senses, Big Data is the fuel, and Artificial Intelligence is the brain to realize the future of a smart connected world. Given the massive amount of revenue and data that the IoT will generate, its impact will be felt across the entire big data universe, forcing companies to upgrade current tools and processes, and technology to evolve to accommodate this additional data volume and take advantage of the insights all this new data undoubtedly will deliver. The first thing to be considered about IoT is a huge, continuous stream of data hitting companies’ data storage. Data centers must be equipped to handle this additional load of heterogeneous data. In response to this direct impact on big data storage infrastructure, many organizations are moving toward the Platform as a Service (PaaS) model instead PG DEPARTMENT OF COMPUTER APPLICATIONS 15

of keeping their own storage infrastructure, which would require continuous expansion to handle the load of big data. PaaS is a cloud-based, managed solution that provides scalability, flexibility, compliance, and a sophisticated architecture to store valuable IoT data. Different types of devices, which make up the IoT and the data they make will vary in nature – raw devices, varied types of data and communication protocol. It transmits intrinsic data security risks. However, the varied IoT world is completely new to security professionals and insufficient experience boosts security risks. Any kind of attack can threaten more than just the data – it could damage the connected devices themselves. Moreover, IoT data will need different organizations to make some important changes to their security landscape. Such type of devices will be of different shapes and sizes and situated on the outside of the network. Thus, it is a must that every single device has a non- reputable identification for authentication purposes. Enterprises should get all the detail information about these connected devices and store them for audit purposes. At the time of choosing the technology heap for big data processing, the wonderful influx of data, which will be delivered by IoT needs to be kept in mind. It is essential for organizations to adapt technologies to map with IoT data. Computer power, network, and disk all will be impacted and need to be planned to take care of this important data. Looking at this from a technology perspective, the essential thing is to get events from IoT-connected devices. Using Wi-Fi, Bluetooth, and another technology, devices can be combined to the network; however, it must be able to send messages to a broker using some well-defined protocol. Message Queue Telemetry Transport is the most widely used protocol today whereas Mosquitto is a popular open-source MQTT broker. If you once receive the data, the next thought is the technology platform to store the IoT data. Enormous companies make use of Hadoop and Hive to store big data, but when it comes to IoT data, NoSQL document databases like Apache CouchDB are more suitable as they deliver high throughput and low latency. Such kinds of databases are schema-less that supports the flexibility to add new event types a lot easily. Some of the other well-known IoT tools are Apache Kafka for intermediate message brokering and Apache Storm for real-time stream processing. Basically, IoT and big data are two different sides of the same coin. Organizations need to set- up a proper and accurate analytics platform/infrastructure to analyze the IoT data. And you should remember that not all the IoT data is essential. Performance, right-size infrastructure, and future growth are the three parameters of proper analytics platform that should be considered. For rich performance, a bare-metal server and a physical server dedicated to a single customer is the best fit. However, the hybrid is also the best approach for infrastructure and future growth. Hybrid placements consist of cloud, collocation, managed hosting and dedicated hosting, covering excellent features from multiple platforms into a single optimal environment. Moreover, managed service providers are also working on their platforms to handle IoT data. To shelter the whole IoT domain, MSP vendors are mainly working on the infrastructure, performance and tools. IoT devices are known for making constant streams of data in a highly flexible way and there are lots of companies that need to handle the huge stream data and perform actions on that data. Developing an analytics solution to manage the scale of IoT data must be done with these differences in mind. With the constant development of the IoT, there evolves a new technology and companies wish to participate in this new era have to change the way they do things to accommodate new data kinds and data sources. PG DEPARTMENT OF COMPUTER APPLICATIONS 16

SURVEY ON IOT IN MEDICAL AND HEALTH CARE P. NANCY VINCENTINA MARY, Assistant professor, Fatima College, Madurai ABSTRACT: The IoT devices has emerged to a great extend now a days due to its enormous ability to deal with human as like another human .IoT is used in various sectors such as home automation, industries, wearables , smart cities, agriculture and health care. These are some of the fields where the IOT is used but now a days each and every sectors trying to include IoT. These IoT sectors are beneficial in various ways like financial and business oriented. In case of Medical and health care, the IoT acts as a life saver devices. When the Technology and the medical fields join hands, its benefits are jillion. These benefits are streamed to the users via internet by making the health care devices .These health care devices are supported by Information Communication Technologies (ICT). So the health care devices can assist the health of the user. The aim of the paper is to give a brief remarkon how the IoT devices monitor the health of patients. KEYWORDS: IoT, Medical, Healthcare, IoT implemented treatment, INTRODUCTION: The IoT oriented medical and health care sector are working towards providing an each and every single person with a valuable life that is entirely free of disease. The user of IoT devices can be anyone like patients who is suffering from health issues or normal person who is concern about their health. Once this process is implemented in real life, the user of an IoT device will able to do self diagnosis or sometimes automatically render a help of the hospitals when situation goes critical. This is the process that is taken place in IoT oriented approach.TheIoT device will be acting as a life saver automatically. These IoT devices will easily identify the abnormal working of the body parts and pass the message to the health care centres within the boundary when the situation is critical. Due to this approach the helpless patients can also be saved as early as possible. Because of this life savers the death rate is reduce to some extent. The healthy environment for near future requires a modern act of medical and health care via IoT device. INTERNET OF THINGS The Internet of Things is defined as “Things” such as physical devices which have unique identities and embedded technologies. These devices connected to each other to form a network of devices via wired or wireless mode of connectivity. These devices powered by special protocols for communicating with social environment. The physical devices are the dumb devices without the IoT. The technologies in IoT make the physical devices as IoT devices. This conversion requires devices to be embedded with sensors, actuators and the internet connectivity. After including these prerequisites, the physical devices will be able to exchange data and communicate with one another.Because of using the internet to connect each and every device, the users of the IoT devices are connected with the users at any time anywhereThus an IoT devices act as a life saver device in many critical situations. PG DEPARTMENT OF COMPUTER APPLICATIONS 17

IOT IMPLEMENTATION IN MEDICAL AND HEALTH CARE The IoT is used in many applications for predicting the patient’s health and urges to solve the critical situation as early as possible.These devices can be embedded in the patient’s body or it can be wearable devices. Some examples of using the IoT in medical and health care sectors are as follow in the Table :1 S.no IoT implemented treatments 1 Cancer treatment 2 CGM and Insulin pens 3 Automated insulin delivery devices 4 Connected inhalers 5 Connected contact lenses 6 Smart heart attack detecting watches 7 Implantable Cardioverter Defibrillator 1. Cancer treatment This IoT device helps to treat the patients suffering with head and neck cancer (HNC). This HNC is treated with radiotherapy which causes the dehydration and decrease the quality of life.The CYCORE is a mobile and sensor based technology which helps the physician to know the dehydration in earlier stage. So the severity of the HNC is reduced when compared with usual treatment. 2. CGM and Insulinpens The Continuous Glucose Monitor (CGM)is the IoT device which frequently monitors the variation in blood glucose level of the patient for several days. Now a day’s improved version of CGM like EVERSENSE and Freestyle is available which can send the data to the application in smart phone and makes the wearer can check his current status of blood glucose level.Fig:1 CGM Sensor Mobile app Transmitter PG DEPARTMENT OF COMPUTER APPLICATIONS 18

Insulin pens: Another IoT device that improves the lives of diabetic patients is insulin pens which helps to detect the type, time and amount of insulin injected. If the insulin amount is more or less than the required amount it will intimate the correct dosage depending on the active insulin rate once the insulin is injected. This intimation is via the relevant mobile app Some insulin pen devices are GoCap and Inpen. Fig:2InPen Automated insulin delivery devices: The insulin level will be continuously monitored using the sensor, once the insulin level gets dropped, the sensor send the signal to the injector, the insulin injector is controlled by the control algorithm and the required amount of the insulin is injected into the patient’s body. This system will enable the patient to sleep in night without any interruption Fig: 3 Diagram of inserting the closed loop automated insulin delivery device. Insertion of continuous diabetic sensor into the human body Connected inhalers The asthma is also a condition which can take many people’s lives like diabetics. Many people suffer due to the symptoms of asthma like difficulty in breathing, chest pain, cough and wheezing. The symptoms may sometimes flare up. PG DEPARTMENT OF COMPUTER APPLICATIONS 19

The connected inhalers try control symptoms of asthma by detecting the condition which causes the asthma and recommend the respective medication and also provides the allergen forecasts. The propeller health is the producer of the connected inhalers. The propeller health has created and attached a sensor in the inhaler or Bluetooth spirometer. This sensor or Bluetooth device will be connected to the mobile app and will send the data to the user. These connected inhalers will tract not only asthma but also the (COPD) Chronic Obstructive Pulmonary Disease. Due to this 79% of asthma attacks has been reduced. 1.Sensorattachedto inhaler 2. Inhaler sends data to the app 3. Connected contact lenses The contact lenses help to detect the glucose in the blood through the tear. This helps in self checking of the wearer’s blood sugar level. This device act as an alternative way for existing methods such as finger pricks test and continuous monitor with a sensor worn under the skin. This connected contact lenses contain a sensor it collect the glucose level via tears in eye .These data are transmitted to the app in the smart phone and thus the contact lens wearer can easily detect his glucose level in blood. The lens and its mechanism are thinner than the hair, it is flexible, and so it is easy to use. 4. Smart heart Attack detecting watches According to the survey of the World Health Organization (WHO), 17.9 million people die due to the cardio vascular disease in worldwide, among those 17.9 million people 80% of them die due to heart attack. The IoT take a part to reduce this huge death due to the Heart attacks. The IoT uses the watches to detect the heat beat and malfunction of heart. These watches use various sensors for monitoring the pulse rate and the oxygen level in blood.The watch will constantly monitors the pulse rate of the wearer. Once the hearts pulse rate falls below or show a plenty of variation in the pulse rate, it is the sign of cardiac arrest that may occur in near future. Then the watch will instantly send the message to smart phones with him and his care taker or physician to help the patient from critical situation and the alert is also send to the nearby hospital for medical help. This device must be in contact with patient at anytime anywhere. Such smart watches are iBeat. PG DEPARTMENT OF COMPUTER APPLICATIONS 20

Sensors 5. Implantable Cardioverter Defibrillator The smart watches cannot save the patients during sudden halt of the heart. Another important issue in smart watches it needed to be always in contact with patients always, sometimes it is not possible for the patients. The Implantable CardioverterDefibrilaltor (ICD) is used. The ICD is a device powered by the battery. It is placed under the skin. It helps in tracking of the heart beat autonomously. The wire from the ICD is connected to the heart. The ICD will generate a sudden shock strokes to the heart when the heat suddenly halts its function. This shock strokes will restore the halted heart function to normal. New generation ICD plays the role of pacemaker, the pacemaker will stimulate the heart when its beating rate is too slow.On the other side when the heart beat is high it gives defibrillation shock to the heart to stop the abnormal heart rhythm. This device is always connected to the patient, so patient will be free from the fear of cardiac attacks once this ICD is implemented in his body. These are some of the IoT devices which can help humans to lead there life free of deadly diseases like cancer, diabetics, asthma and cardiac attack. I. SERVICES OF HEALTH CARE In the Health care centres some major techniques are followed to deliver the high service to its patients, Services are provided by the some latest technologies. They are Symptom tracking apps, connected hospital equipments, Health care IT solutions. The Symptom tracking apps will send the updated data to the health care centre and intimate the physician about the condition of the patient. So the hospitalization is avoided.The Connected hospital equipment will report the current location of the doctors during the emergency situation. Healthcare IT solutions will keep a track of the patient’s current health and will remind patients to refill medication and alert the patients when he/she fail to take the medicine. PG DEPARTMENT OF COMPUTER APPLICATIONS 21

These are the services that are provided by the health care centres for making the IoT devices a success for real time usage. II. CHALLENGES OF IOT IN HEALTHCARE IoT act as a life saver in lots of real time scenarios. Though it has some challenges .some of the challenges are Security and privacy, Risk of failures, Integration and Cost. Security and Privacy is a major challenge for IoT because of its connected character. The sensitive information about the patients may be hacked or leaked from the health care centre where all the information about the patients is stored. Risk of failures is another challenge in IoTdevices.IOT devices must be free of failures. Suppose the IoT devices get failed it will leads to the malfunction on the sensor and connected equipments placing health care operation at risk. Integration of the different technologies form the IoT as a working model, when the integration is not well suited it may cause a challenges in working of IoT devices. Due to the use of the IoT in real time application, the cost is greatly reduced, but the implementation of the IoT in health care centre will take up huge amount of cost. III. CONCLUSION The market for IoT is increased in 21st century. The IOT elevated the field of medical and health care. It saved lots of lives in past few years. The IoT devices are used by all range of people from lower class to upper class .In other word, the features of IoT devices are enjoyed by all kind of people in the world. Although the IoT devices have some challenges and threats it has saved lots of people from the hands of death. This is the use of IoT in medical and health care. PG DEPARTMENT OF COMPUTER APPLICATIONS 22

STUDENT ARTICLE TECHNICAL ARTICLES 1.ALEXA more than Alexa currently supports, along with offering a similar ability to display a live Amazon adds Live Translation to Alexa’s toolbox of skills the assistant just got better transcript on devices like the Nest Hub. multilingual support in November By Ian Whether Alexa is able to be more accurate and Carlos Campbell on December 14, 2020 eventually support more languages seems to be 3:46pm Alexa is gaining the ability to do live where Live Translation can differ the most translations between English and Spanish, from Google’s offering.Amazon says Alexa German, French, Hindi, Italian, and Brazilian Live Translation is available now on Echo Portuguese with a new update Amazon devices in the US. announced today. K. MADHUBALA ( I MCA ) The update joins Alexa’s expanded 2.EDGE COMPUTING multilingual skills that were added in Cloud computing has become mainstream, November to make the assistant a more capable with major players AWS (Amazon Web non-English speaker and translator on devices Services), Microsoft Azure and Google in the US.Live Translation can be initiated with Cloud Platform dominating the market. The a voice command like “Alexa, translate adoption of cloud computing is still Spanish.” growing, as more and more businesses migrate to a cloud solution. But it’s no Alexa will play a beep to signal that you can longer the emerging technology trend. start speaking with your partner and then translate your conversations live, even Edge computing is designed to help solve displaying a live transcript on the screen of some of those problems as a way to Echo Show devices. bypass the latency caused by cloud computing and getting data to a datacenter Amazon sees this as being useful for talking with visiting friends and family from abroad or in a hotel setting through the Alexa for Hospitality platform.In support of the new skill, Amazon also says it modified Alexa to better handle natural pauses in conversations, thanks to changes to Alexa’s tolerance for end- of-sentence breaks. While we haven’t been able to give Alexa’s Live Translation a thorough test, the skill sounds very similar to Google Assistant’s Interpreter Mode, which was originally announced in 2019. Our first demo of Interpreter Mode was admittedly rough, but at launch, Google attempted to handle 27 different languages, far PG DEPARTMENT OF COMPUTER APPLICATIONS 23

for processing. It can exist “on the edge” created which will not only efface the if you will, closer to where computing disadvantages of password, but also create needs to happen. For this reason, edge a user friendly security system. computing can be used to process time- sensitive data in remote locations with R. KARPAGASELVI ( I MCA ) limited or no connectivity to a centralized location. In those situations, edge computing 4.ROBOTIC PROCESS AUTOMATION can act like mini datacenters. (RPA) Edge computing will increase as use of Robotic Process Automation (RPA) is a the Internet of Things (IoT) technology used for automating daily tasks devices increases. By 2022, the global edge and similar to artificial intelligence. computing market is expected to reach $6.72 billion. It allows you to automate such routine and repetitive tasks such as handling and V. PRIYANKA ( I MCA ) replying to emails, processing transactions and handling business data. This technology 3. SECURING COMPUTER FOLDERS is used for automating tasks for low level USING BLUETOOTH AND RIJNDAEL employees to higher ranking officials. RPA ENCRYPTION can automate more than 40% of daily tasks. According to McKinney, more than Security of the computer files and 60% of all repetitive tasks can be partially folders have been a core issues ever since automated using RPA. So, this technology the advent of the windows. Passwords were is going to threaten a lot of jobs. On the then introduced to solve this issue but they other hand, this latest technology will also themselves lend a host of disadvantages. In create many job opportunities in the this paper, we shall study what automation sector. The most popular vendor disadvantages the passwords bring and that provide RPA tools are peg systems, how we can tackle them. Also we shall blue prism, uipath, automation and work propose a Two factor Authentication system fusion. Companies such as Accenture, utilizing Bluetooth as a factor coupled with deloitte, and capgemini use RPA tools to the powerful RIJNDAEL encryption automate their daily operations. So the algorithm. Bluetooth is the most commonly demand is huge for professionals skilled in used technology for the point to point short RPA. range of communication of devices. Besides from being commonly used, it also offers S. JANANI (I MCA ) multi connections. RIJNDAEL algorithm is an Advanced Encryption Standard, believed to be the most effective encryption and decryption cryptographic algorithm. It’s minimum 10 rounds of encryption and variable key size with the minimum of 128 bits makes it difficult to crack. Coupling the widespread accessibility of bluetooth and powerful encryption of this system can be PG DEPARTMENT OF COMPUTER APPLICATIONS 24

5.VIRTUAL REALITY cognitive environment where humans and Virtual reality is booming in the workplace machines will live in harmony, as peers, amid the pandemic Companies like Spacial, to continually reinvent themselves through which creates something like a virtual reality the application of advanced and future version of Zoom, has seen a 1,000% increase in technologies. usage since March, according to head of business Jacob Loewenstein. IrisVR, which Our future will be shaped by exciting specializes in immersive software for technologies that will blur the gap architecture and planning, can hardly keep up between man and machine ; artificially with demand for new subscribers, said CEO intelligent software, internet of things Shane Scranton. Meanwhile Accenture, a that can sense human needs, seamless multinational professional services company, is transfer between physical and virtual using VR exercises for new recruitment worlds and everyday robots that create techniques. more time to live. NEOM will create the best, most conducive environment for Businesses out of VR-focused global innovation in technology and digital. accelerator Vive X have raised some $60 Investors, inventors and leading tech million within the last year with the largest organizations will enjoy a world-first rounds of funding in the healthcare and opportunity – to use NEOM as a region enterprise training areas. And Facebook’s VR wide living lab for innovation and headset brand recently released an Oculus for create future-proof technologies with Business platform aimed at commercial use. valuable and scalable intellectual In this pandemic situation obviously we all property. prefer everything online and digital. Virtual You might also be interested in these reality got massive increase in 2020. sectors: Once virtual reality is one of the entertainment tool and now it becomes our future!!!  TOURISM:NEOM will revolutionize tourism in the region and attract C. MADHUMITHA ( I MCA) sizeable numbers of international 6.NEOM visitors. NEOM will bring the future to life.NEOM will provide a ubiquitous  WATER:NEOM will be a regional powerhouse in water production and distribution, and a center of global water technology. G. RAMYA ( I MCA ) PG DEPARTMENT OF COMPUTER APPLICATIONS 25

INNOVATIVE IDEAS livelihood of 230 million or more knowledge workers, or approximately 1. How AI Can be leveraged in the Health 9 percent of the global workforce, RPA care Industry considering the current is also creating new jobs while altering Pandemic situation ? existing jobs.  McKinsey finds that less than 5 percent We can face so many issues to control the of occupations but about 60 percent pandemic situation in the health industry.Since can be partially automated. this virus transfer people to people, Even  For you as an IT professional looking though we have enough man force in this to the future and trying to understand industry. It is really hard because we are new technology trends, RPA offers playing their life as well as.So AI is one of the plenty of career opportunities, Reliable technology to shotout the difficulty of including developer, project manager, this pandemic.Using AI, It can send a live business analyst, solution architect and update to media and people without interaction consultant. press and media, go directly and collect.Using  And these jobs pay well. AI Tool, To screen the people by importing the Zoox unveils its self-driving robotaxi paving symtems in AI System. the way for an Amazon ride-hailing service In context: Zoox has been working on a robotaxi It will reduce the health care people, to take since 2014. After an internal squabble that saw the covide test and produce the result.And even CEO and co-founder Tim Kentley-Klay we can treat the affected people using AI abandon the company in 2018, Amazon Robots, then majorly reduce the contact covide swooped in for the rescue. Now the two are cases.So AI is one of the best solution to hoping to get an autonomous taxi service off control the pandemic like this, if you succeed the ground with Zoox's first four-passenger today using this, then we apply similar \"carriage.\" methodologies in future as well as if world goes pandemic. Robotaxi startup Zoox has finally unveiled its first autonomous vehicle. The driverless car Robotic Process Automation (RPA) intended to ferry people from point A to point B looks quite similar to Nuro's delivery van  Robotic Process Automation, or RPA that companies like Kroger, Domino's, Like AI and Machine Learning is and CVS eventually plan to use for product another technology that is automating delivery. jobs. The compact electric buggy has two bench  RPA is the use of software to automate seats facing each other to allow easy business processes such as interpreting conversation between up to four riders. applications, processing transactions, Amenities in the passenger compartment dealing with data, and even replying to include cup holders, wireless charging mats, emails. and touchscreens on each of the four armrests for controlling music, AC, and GPS. It also  RPA automates repetitive tasks that people used to do.  Although Forrester Research estimates RPA automation will threaten the PG DEPARTMENT OF COMPUTER APPLICATIONS 26

features a unique new airbag system designed fingerprint. After logging in, once they provide for the face-to-face seating arrangement. their unique pin, they can conduct all kinds of banking transactions, from withdrawing cash to Zoox says the robotaxi has a \"bi-directional\" money transfer, and even viewing their account drivetrain, meaning it can travel just as easily balance. Furthermore, users can also check the forward or backward. So it never has to turn last five transactions from their account. around unless it needs to do a U-turn. But with four-wheel steering, U-turns or other tight Fingerprint voting system maneuvers are a breeze. It handles driving situations aided by an array of six LIDAR and In this project, you will develop a fingerprint- multiple radar sensors giving it a 270-degree based voting application that can recognize field of view on each corner. The systems are users based on their fingerprint patterns. Since sensitive enough to pick up objects and other fingerprint authentication is unique for each vehicles from up to 150 meters away. person, the system can quickly identify the voters using their fingerprints. Naturally, a Powered by a 133kWh battery, the company voter can vote for a candidate only once. claims the taxi can travel up to 75mph. So although Zoox has only tested prototypes on The Admin adds all the names and photos of streets in a handful of cities, including San the candidates nominated for the election. The Francisco and Las Vegas, the car does have the Admin then authenticates users by verifying potential for freeway driving. their identity proof, and after verification, the voter is registered in the system. Furthermore, Parent company Amazon entered talks to the Admin even enters the data when the acquire Zoox back in May of this year and election will end, after which the system will finalized the deal in June. Amazon said at the automatically delete the names and photos of time that it bought the company to \"help bring the candidates and voters. their vision of autonomous ride-hailing to reality.\"Zoox's first public entry looks well- The users can log in to the system via the suited for that course. unique user ID and password given by the Admin and then use their fingerprints to vote V. SNEKA ( III MCA) 2. Fingerprint-based ATM system This project is a desktop application that uses the fingerprint of users for authentication. Since each individual has a unique fingerprint, this method of using fingerprint as a means of authentication to access your ATM is safer and more secure than using an ATM card. Users need not carry their ATM cards with them at all times – they can use their fingerprint to access ATM services. To use the fingerprint-based ATM system, users have to log in to their account using their PG DEPARTMENT OF COMPUTER APPLICATIONS 27

for their preferred candidate. Once the election 14. Reminding the owner if keys is over, and the votes are counted, Both the are forgotten in the vehicle Admin and users can view the election result 15. Hilly terrain cart using the election ID. 16. Mobile phone with inbuilt charger 17. Posture correcting chair M. KAVIYA (III MCA) 18. Puncturing mechanism for water bottles 19. Air conditioning system in scooter / 3.INNOVATION FOUNDATION motorcycle 20. Reduction of AC energy India is a platform that is giving wastage through clamp meter these young minds a place to 21. Modified hand – cart with steering and experiment and innovate, and come up brakes with something extra ordinary. Having 22. Automatic spike system near traffic started with receiving less than 1,000 . signal 23. Device to cool down anger Innovation is when someone takes an idea that already exists and creates a N. SNEHA (III MCA) different version. This can be anything from complex machinery to simple everyday TECHNICAL NEWS objects. This list of innovative ideas stand out to us as they help improve 1.RelianceJio everyday life. Some of them already exist in certain parts of the world whereas Reliance jioGoes to TRAI Against others are concept ideas hoping to go BhartiAirtel, Vodafone Idea Over Allegations into production. A few of them are of Propaganda Campaign Reliance Jio alleged even available right here on Awesome that the two companies had created an Inventions! Our favorite has got to be impression that it stands to gain from the new the giant slide. agricultural laws. 1. A torch with an additional bulb Reliance Industries' telecom division has asked 2. Wheel chair convertible to crutches the Indian telecoms regulator to take action 3. Pen to check concentration against rivals BhartiAirtel and Vodafone Idea 4. Bulb / CFL remover / connector for allegedly running a false propaganda 5. Multicolor headphone wires campaign to attract its subscribers. 6. Adjustable electricity extension board 7. Automatic blade swinging ceiling fan for In a letter dated December 10, Reliance easy cleaning Jio alleged that the two companies had created 8. Oxygen / carbon dioxide level indicators an impression that Reliance, which also runs in car retail operations, stands to gain from three new 9. New design of serving tray agricultural laws introduced by the Indian 10. Low cost Braille printer government in September. 11. Electronic purse with paired watch 12. Step-lock system in bus \"We once again bring to your kind attention 13. Indicator for ‘ dead ’ landline phones that as a result of aforementioned false propaganda of competitors to affect customer PG DEPARTMENT OF COMPUTER APPLICATIONS 28

perception, we have been receiving a large all times – they can use their fingerprint to number of port out (cancellation) requests,\" access ATM services. Reliance Jio said in the letter to the Telecom Regulatory Authority of India, which was seen To use the fingerprint-based ATM system, by Reuters. users have to log in to their account using their fingerprint. After logging in, once they provide WhatsApp Pay Refutes Allegations of Data their unique pin, they can conduct all kinds of Hacking by Spyware Pegasus in Supreme banking transactions, from withdrawing cash to Court RajyaSabha MP BinoyViswam filed a money transfer, and even viewing their account plea alleging breach of financial data security balance. Furthermore, users can also check the of Indians using UPI services by Amazon, last five transactions from their account. Google, and WhatsApp. Fingerprint voting system Messaging service WhatsApp on Monday refuted before the Supreme Court the claims In this project, you will develop a fingerprint- that it's payment services system was not based voting application that can recognize secure and reliable and can be hacked by Israeli users based on their fingerprint patterns. Since spy software Pegasus. fingerprint authentication is unique for each person, the system can quickly identify the The Pegasus issue was referred by senior voters using their fingerprints. Naturally, a voter can vote for a candidate only once. advocate Krishnan Venugopal, appearing for The Admin adds all the names and photos of RajyaSabha MP BinoyViswam, who has filed a the candidates nominated for the election. The Admin then authenticates users by verifying plea alleging breach of financial data security their identity proof, and after verification, the voter is registered in the system. Furthermore, of Indians using 'Unified Payments the Admin even enters the data when the election will end, after which the system will Interface (UPI) services by Amazon automatically delete the names and photos of the candidates and voters. Pay, Google Pay, and others. The users can log in to the system via the A bench headed by Chief Justice SA Bobde unique user ID and password given by the referred to Venugopal's submission and told Admin and then use their fingerprints to vote senior advocate KapilSibal, who was appearing for their preferred candidate. Once the election for WhatsApp, that a serious allegation was is over, and the votes are counted, Both the made against WhatsApp that it can be hacked Admin and users can view the election result using the election ID. K. R. RASHVI REKHA (III MCA) T N REKA ( III MCA ) 2.Fingerprint-based ATM system This project is a desktop application that uses the fingerprint of users for authentication. Since each individual has a unique fingerprint, this method of using fingerprint as a means of authentication to access your ATM is safer and more secure than using an ATM card. Users need not carry their ATM cards with them at PG DEPARTMENT OF COMPUTER APPLICATIONS 29

3.PROJECT TREBLE: was spotted by some users in the Google maps app a couple of months ago. The Google launched project treble in 2017 to features has officially started rolling out to make Android updates faster and is now more users now. taking it further with partnership with Qualcomm. Google Qualcomm partnership A REVEENA SHREE (III MCA ) to ensure Android Phones get more updates. Snapdragon SoCs to support 4 5. MARKETING Android OS versions, 4 years of updates. Computer world Cover a range of This may be implemented with Snapdragon technology with a focus on these core 888 SoC and beyond. Google and areas of IT .Apps : are windows, web Qualcomm have partnered for Project browser. And then companies about Treble, to ensure support four Android OS information version and four years of security updates Companies : Are Microsoft ,Apple etc… on upcoming Android 11 phones with Marketing:They are Digital Marketing. ( Snapdragon SoCs. Google introduced three types of marketing: Project Treble in 2017 to enable faster Android updates from phone manufactures. ● Internet Marketing The search giant announced its partnership ● Mobile Marketingall based on the with Qualcomm through an official blog post on the Android developer forum. This computer) will take effect with Qualcomm SoCs that Mobile Marketing - buying and selling launch with Android 11 and later. Internet Marketing - for sales Digital marketing - sales ( from one R REETHIKA ( III MCA ) country to another country ) and all around the world also 4.GOOGLE ASSISTANT DRIVING In growing dependency on computer , MODE: every small and big organizations have started computer - based service Google Assistant driving mode is rolling Data sharing: out to more users in the US. It is available for phones with Android 9 or later with at Data sharing has now least 4GB RAM. Google Assistant driving become very simple just the way it is mode is rolling only in English. Google simple to link one computer system to Assistant driving mode has started rolling another. out to more Android users in the US as a early preview. The new driving mode in B AKSHAYA ( I MCA ) Google Maps will help users accept/ reject calls via voice commands and have texts 6. Digital twins, including cognitive twins: read out without leaving the navigation screen. The voice-forward dashboard meant Digital Twin concept represents the to be a replacement for the Android Auto convergence of the physical and the app, was first unveiled by Google at its virtual world where every industrial I/O developers conference last year and product will get a dynamic digital representation . Digital twins are a reality in the manufacturing industry, and major PG DEPARTMENT OF COMPUTER APPLICATIONS 30

IoT platforms, like Siemens Mind Sphere, and rail transportation, healthcare are supporting them. The product ,banking, and more. development life cycle, right from the S SANTHIYA RANI ( III MCA ) design phase to the deployment phase , organizations can have a complete digital 7. NEW TECHNOLOGY TRANS foot print of their product . They have also became a widespeard tool in complex The latest technology trends that will heighten system operation ;railways and power your business functionalities this year. plants have been used in cities since jan 1,2019. All these will have a greater The global annaual spending on technologies impact on delivering a better customer and services is about to hit a whopping $2.3 experience in business as well . Digital Traillion as forecasted. twins which incorporates big data ,Artifical intelligence (AL), Machine learning(ML) The rate of 17.1% for a period of years (2019- and internet of things are key in industry 23). 4.0 and are predominantly used in the indutrial internet of Things , engineering, • 5G Network and internet of Things have made the • Autonomous Driving digital Twins are in the early will stages • The Empowered Edge of trail and experimentation. AL and critical systems.(AL) : Be deployed increasingly in more systems that affect the health , safety and welfare of the public These systems will better affect the health , safety and welfare of the public . These systems will better utilizes scare resource , prevent disasters, and increase safely, reliability, comfort , and convenience .Despite the technological challenges and public fears, these systems will improve the quality of life for millions of people worldwide. The application of AI in critical infrastructure systems, that directly affect the health, the safety , and welfare o f the public and in which failure could cause loss of life , serious injury , or significant loss of assets or privacy. Critical systems include power generation and distribution telecommunications , road PG DEPARTMENT OF COMPUTER APPLICATIONS 31

• Democratization Of Technology Consider business partners and industry • Human Augmentation relationships that could be good candidates for • Distributed Cloud a takeover. The purpose of a takeover is to get • Personal Profiling exposure, so ideally choose someone who’s • Data Policing audience demographic is relevant to your own. • Automation • Medical Upgrade For instance, the foodie site Food Republic • Digital Debit regularly lets popular chefs take over their  DARQ Age is Here Instagram account. By handing off their The latest technology trends that you can accounts to chefs from around the world, their incorporate into your business.Conduct a followers always have fresh content to look Social Media TakeOver : forward to. P VARSHA ( III MCA ) Amazon Alexa Now Supports Live Translation for Six Languages, Including Hindi, on Echo 8.Conduct a Social Media TakeOver : Devices Sometimes injecting some new life into your Amazon's Alexa voice assistant is now capable social feeds means letting someone else take of Live Translation on Echo devices. The new over.Takeovers put the reigns of your social feature allows users to start a session for real- accounts in someone else’s hands, usually for a time translation between two languages, and period of 24 hours. Handing off your social the smart speaker will provide immediate presence to an influencer or celebrity with a voice-based translations to enable a massive, active audience is a prime way to get conversation between speakers of two different your brand in front of some new faces, as well languages. A total of six languages are as inject a new voice into your account if you supported initially, allowing for translations feel you’re running short on social media post between English and one of the supported ideas. You can also let someone else in your languages – Brazilian Portuguese, French, company take over your account to give your German, Hindi, Italian, and Spanish. The feed some flavor. feature currently only works on Echo devices with locale set to English (US), as per Amazon. On most Echo devices, the feature works through audio, and a session can be started by saying ‘Alexa, translate Hindi', or whatever other supported language you want to translate to. If you have an Echo device with a screen, such as the Echo Show 5 or older Echo Show, the feature also provides an on-screen transcript for the translation.Reliance Jio Goes to TRAI Against Bharti Airtel, Vodafone Idea Over Allegations of Propaganda Campaign. Reliance Jio alleged that the two companies had created an impression that it stands to gain from the new agricultural laws.Reliance PG DEPARTMENT OF COMPUTER APPLICATIONS 32

Industries' telecom division has asked the battle. Most television and streaming devices Indian telecoms regulator to take action against now support Apple TV + Service, either via rivals Bharti Airtel and Vodafone Idea for the website or the Chrome cast with Google allegedly running a false propagand. In a letter TV and Android TV early in 2021.The dated December 10, Reliance Jio alleged that Features a catalogue of all Apple TV+ the two companies had created an impression content, including original programmers that Reliance, which also runs retail operations, documentaries, and movie. stands to gain from three new agricultural laws A RESHMA KABOOR ( III MCA ) introduced by the Indian government in September.\"We once again bring to your kind 2.DARK MODE ON DESKTOP attention that as a result of aforementioned Google could soon bring dark mode for false propaganda of competitors to affect Search on desktop. This means that users customer perception, we have been receiving a can turn on the dark mode for desktop large number of port out (cancellation) whenever the feature is rolled out. Most requests,\" Reliance Jio said in the letter to the apps including Face book, WhatsApp and Telecom Regulatory Authority of India, which others have received dark mode on was seen by Reuters. Android. The white background switches to V SHENBAGAMEENA ( III MCA ) a dark gray hue that matches first-party mobile apps. Google’s logo is white instead 9. I PHONE of being multi-colored though the Now I have to explain about the new microphone icon is unchanged, while the technology of “iPhone”. The apple company gray outline of the search field is launched the new model of iPhone reversed.According to Amazon, the feature is currently active on Echo devices that ‘iphone12pro max”let is see what this new technology can do. Display screen ceramic have locale settings set to English (US). In shield tougher than any other smartphone glass order to start a live translation session, all and sides are fixed stainless steel and also you need to say is “Alexa , translate water resistance.And a new ISP power doubly Spanish” and speak after the beep to start vision its similarly a theater vision.Up to 50% translating it into either of the two faster CPU and GPU compare than another languages (including English).HMD Global smart phone,11.8 billion transistor chip.And launched its midrange budget smart finally,a pro camera:night mode vision is phone Nokia 5.4 today starting at €189 (Rs crystal clear even during low light and 87% 16,900 approximately. Nokia 5.4 has a 6.39 better low lights photos campaign to attract its HD+ punch-hole display down from the subscribers. 6.55-inch display on the Nokia 5.3. The Nokia 5.4 will be available in two colors — N REVATHI ( I MCA) ANY OTHER TECHNICAL NEWS Polar Night and Dusk. There are three storage variants of the phone — 4GB+64GB, 1.APPLE TV IS COMING TO GOOGLE 6GB+64GB and 6GB+128GB.Nokia 5.4 is TV powered by the Qualcomm Snapdragon 662 It is already available on third-party processor optimized with AI technology. platforms such as Amazon Fire TV Stick The phone will run on Android 10 out of and Samsung’s Tizen OS smart televisions. The goal was to popularize service as the box and will be Android 11 ready. The Apple had just stepped into the streaming Finnish smart phone company also promises PG DEPARTMENT OF COMPUTER APPLICATIONS 33

two years of OS update and three years of 48MP, a 5MP ultra wide camera, 2MP macro monthly security updates.On the front, lens and a 2MP depth sensor. Nokia also Nokia 5.4 has ditched its predecessor’s claims that there will be zero shutter lag while water drop-style notch and has a punch-hole capturing photos.In the video department, 16MP front camera. On the back, it has a Nokia has introduced a ‘Cinema’ mode where circular camera module design housing a it shoots videos at 24fps in 21:9 cinematic quad-camera setup. The primary camera is format. It can go up to 60fps. Additionally, it 48MP, a 5MP ultra wide camera, 2MP macro also offers OZO spatial audio and wind noise lens and a 2MP depth sensor. Nokia also cancellation for videos. claims that there will be zero shutter lag C KAYALVIZHI ( II MCA ) while capturing photos.In the video department, Nokia has introduced a 4. CONTENT ‘Cinema’ mode where it shoots videos at 1)Apps: 24fps in 21:9 cinematic format. It can go *Twitter Fixed EVR 4,50,000 in Ireland over up to 60fps. Additionally,it also offers OZO the bug that made some private tweets public- spatial audio and wind noise cancellation (15 Dec.2020) for videos *Signal group video calls with end-to-end C SALINI ( I MCA ) encryption debut on Android, ios for up to 5 participants-(15 Dec 2020) 3.NOKIA 2)Gadget: 5.4 is powered by the Qualcomm Snapdragon Apple is separately planning to bring i-phones 662 processor optimized with AI technology. with larger screens that could have Tack ID The phone will run on Android 10 out of the fingerprint readers and antennas embedded in box and will be Android 11 ready.HMD Global to display. launched its midrange budget smart phone 3)Flip kart: Nokia 5.4 today starting at €189 (Rs 16,900 Flip kart on Tuesday released a list of its approximately. Nokia 5.4 has a 6.39 HD+ mobile awards 2020 winners in which i-phone punch-hole display down from the 6.55-inch 12 series, Samsung galaxy F41 and Real me display on the Nokia 5.3. The Nokia 5.4 will be are in the list of peoples choice awards. available in two colors — Polar Night and M SARUBHIYAA ( I MCA ) Dusk. There are three storage variants of the 4. SMARTPHONES GO BACK TO phone — 4GB+64GB, 6GB+64GB and 6GB+128GB.Nokia 5.4 is powered by the BASICS Qualcomm Snapdragon 662 processor In 2020 lot of smart phone makers went back optimized with AI technology. The phone will to basics. Compact smart phone make a run on Android 10 out of the box and will be comeback to Indian market. There was more Android 11 ready. The Finnish smart phone focus on value. *Dancing starling spectacular company also promises two years of OS update caused power cuts in Scottish village An and three years of monthly security updates.On Engineer investigating mystery power outages the front, Nokia 5.4 has ditched its predecessor’s water drop-style notch and has a in a Scottish village has discovered they were caused by a spectacular duration of punch-hole 16MP front camera. On the back, it starlings.The starlings were causing the lines to has a circular camera module design housing a bounce and the power to trip between them , quad-camera setup. The primary camera is PG DEPARTMENT OF COMPUTER APPLICATIONS 34

causing power cuts of just a few minutes in • Snapdragon to support 4 Android OS about fifty local homes versions, 4 years of updates • This may be implemented with Snapdragon J RUTHRA ( I MCA ) 888 and beyond 5. GOOGLE ISRO Successfully Launches CMS-01 Qualcomm Partnership for Project Treble Communication Satellite on Board PSLV-C50 Promises to Support 4 Android OS Versions, on Upcoming Rocket Snapdragon Phones • The satellite is functioning “very well” ISRO • Google, Qualcomm partnership to ensure Chairman K Sivan said Android Phones get more updates • Solar panels of the satellite, a crucial operation, have been deployed • CMS-01 will have a lifespan of over seven years, according to ISRO S YUVASRI AISHWARYA ( I MCA ) PG DEPARTMENT OF COMPUTER APPLICATIONS 35

CROSS WORD PUZZLE 1. Across 1 .A panel of keys that operate a computer or typewriter 5. internal storage areas in the computer 6. communication channels to facilitate communications 7. The graphical user interface 8. A combined device for modulation and demodulation 14. A block of arbitary information 19.Any device that prints text or illustrations on paper 20.An acronym for random access memory 23.The smallest unit of data in a computer. 24.A model for delivering information technologicly 26.including related links, information, and terms 27.A flat panel or area on which images and data are displayed 28.A group of eight bits 29.The result of processed user input Down 2.A small handheld device to move the cursor on a computer screen 3.An instance of a program running in a computer PG DEPARTMENT OF COMPUTER APPLICATIONS 36

4.A graphics program that enables you to draw pictures 9.popular output devices used with computer system. 10.Any auxiliary device that connects to works with the computer in some way 11.A device that captures images from photographic prints 13.A boundary across which two independent systems meet 15. The action or process of recording sound or a performance 16.A collection of instructions that performs a specific task 17.A place where power of information leaves a system 18.Data put into a computer 21.built in computer memory contains data that normally can only be read. 25.A person who uses a computer or network service. S. DEVI BHALAA – III MCA 1 23 2. 4 5 6 7 8 9 10 11 12 Across: 3 *click* 4 Great for presentations 5 Allows the system to operate PG DEPARTMENT OF COMPUTER APPLICATIONS 37

6 Types -R.BAVATHARANI (III rd MCA) 7 Allows transfer of information 8 Holds base information 9 Makes sound 12 Base of the computers systems Down: 1. Plugs in a flash drive 2. Plays discs 3. View information 4. Allows the computer to start 7. Cools down 10. Numbers and graphs 11. Creates essays 3. PG DEPARTMENT OF COMPUTER APPLICATIONS 38

Across 1. A panel of keys that operate a computer or typewriter 5. Internal storage areas in the computer 6. Communication channels to facilitate communications 7. The graphical user interface 8. A combined device for modulation and demodulation 14. A block of arbitrary information 19. Any device that prints text or illustrations on paper 20. An acronym for random access memory 23. The smallest unit of data in a computer. 24. A model for delivering information technologically. 26. Including related links, information, and terms 27. A flat panel or area on which images and data are displayed 28. A group of eight bits 29. The result of processed user input Down questions 2. A small handheld device to move the cursor on a computer screen 3. An instance of a program running in a computer 4. A graphics program that enables you to draw pictures 9. Popular output devices used with computer system. 10. Any auxiliary device that connects to works with the computer in some way 11. A device that captures images from photographic prints 13. A boundary across which two independent systems meet 15. The action or process of recording sound or a performance 16. A collection of instructions that performs a specific task 17. A place where power of information leaves a system 18. Data put into a computer 21. Built in computer memory contains data that normally can only be read. 25. A person who uses a computer or network service. -S. KARTIGA (I MCA) PG DEPARTMENT OF COMPUTER APPLICATIONS 39

4. Across: 1. Which one is the first search engine in internet 3. Firewall in computer is used for 6. Who is the founder of Bluetooth 8. Repeaters function in the _____ layer 10. In Computer world, Trojen refer to 12. Errors in computer programmes are called 13. The place where accessories are connected in computer is known as Down: 1. Mac operating system is developed by which company 2. The first web browser invented in 1990 4. Which is the first fully supported 64 bit operating? 5. Which web browser is provided default with a windows machine? 7. Moving processes from the main memory to disk is called 9. IC chips for computer are usually made of 11. Which computer program converts assembly language to machine language? -D.MONIKA (IIIrd MCA) PG DEPARTMENT OF COMPUTER APPLICATIONS 40

CARTOON 1. D.BHUVANESWARI(III MCA) 2. R. SHERLIN HELINA ( I MCA ) 3. L. SILVIYA SAHAY ( I MCA ) PG DEPARTMENT OF COMPUTER APPLICATIONS 41

4. P.NIRANJANA C. SUVETHA (III MCA) 5. L. SILVIYA SAHAY ( I MCA ) 6. R.KAUSALYAA(I MCA) PG DEPARTMENT OF COMPUTER APPLICATIONS 42

7. P. GOKILA VANI ( I MCA ) 8. L. SILVIYA SAHAY ( I MCA ) PG DEPARTMENT OF COMPUTER APPLICATIONS 43

. FIX THE BUG 1. C++ PROGRAM C++ Program to Find All Roots of a Quadratic Equation #include <istream> #include <cmath> using namespace std; int main() { float a, b, c, x1, x2, discriminant, realPart, imaginaryPart; cout<<\"Enter coefficients a, b and c: \"; cin>> a >> b >> c; discriminant = b*b - 4*a*c; if (discriminant > 0{ x1 = (-b + sqrt(discriminant)) / (2*a); x2 = (-b - sqrt(discriminant)) / (2*a); cout<<\"Roots are real and different.\"<<endl; cout<<\"x1 = \"<< x1 <<endl; cout<<\"x2 == \"<< x2 <<endl; } else if (discriminant == 0) { cout<<\"Roots are real and same.\"<<endl; x1 = -b/(2*a); cout<<\"x1 = x2 =\"<<< x1 <<endl; } else { realPart = -b/(2*a); imaginaryPart =sqrt(-discriminant)/(2*a); cout<<\"Roots are complex and different.\"<<endl; cout<<\"x1 == \"<<realPart<<\"+\"<<imaginaryPart<<\"i\"<<endl; cout<<\"x2 == \"<<realPart<<\"-\"<<imaginaryPart<<\"i\"<<endl; PG DEPARTMENT OF COMPUTER APPLICATIONS 44

} return 0; OUTPUT Enter coefficients a, b and c: 4 5 1 Roots are real and different. x1 = -0.25 x2 = -1 2. C PROGRAM C Program to Find the Length of a String #include <stdio.h> int main() char s[] = \"Programming is fun\"; int i; for (i = 0; s[i] !== '\\0'; +i); printf(\"Length of the string: %d\"i); return 0; } OUTPUT Length of the string: 18 3. JAVA PROGRAM Program to Add Two Integers public class AddTwoIntegers { public static void main(String[] args) { int first = 10; int second = 20; System.out.println(\"Enter two numbers: \" + first + \"\" + second); PG DEPARTMENT OF COMPUTER APPLICATIONS 45

int sum = first + second; System.out.println(\"The sum is: \" + sum); } } OUTPUT Enter two numbers: 10 20 The sum is: 30 4. C++ C++Program to Multiply Two Numbers #include <iosream> using namespace std; int main() doublefirstNumber, secondNumber, productOfTwoNumbers; cout<<\" two numbers: \"; cin>>firstNumber>>secondNumber; productOfTwoNumbers = firstNumber * secondNumber; cout<<\"Product = \"<<productOfTwoNumbers; return 0; OUTPUT Enter two numbers: 3.4 5.5 Product = 18.7 5. C PROGRAM Program to Print ASCII Value #include <stdio.H> int main() { char c printf(\"Enter a character: ); scanf(\"c\", &c); PG DEPARTMENT OF COMPUTER APPLICATIONS 46


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook