Lets start You have more than one active internet connections and you are using only one at a time, while the other is resting? Don'...

Lets start


You have more than one active internet connections and you are using only one at a time, while the other is resting? Don't let it be lazy. Combine them all to get combined internet speed. Say you have two connections of 1 Mbps each, you just can make 1+1=2. This can work regardless of the type of the connections, i.e. it may be wired, wireless or mobile communication.


Method 1 of 4: Combining LANs
Steps:

1. Turn everything on your computer, modems (in case of DSL).

2. Connect them on the relative ports.

3. Establish Connections. Dial or do whatever you need to do to establish an Internet connection and test each one by one separately. If all good proceed to the next step.

4. While each one is active and connected, navigate to the "Network Devices" folder of your computer. It usually stays under control panel.

Windows 8 or Windows 8.1, press Windows D to navigate to the desktop, and the rest is the same as windows 7 below.

For Windows 7 and Vista, Click the network icon on the task bar-> then click \ Open Network and Sharing Center\ . Then click \ Change Adapter settings\

5. Review the Connections. Review the window showing all of your network connections.

6. Drag and select. Drag and select Active LAN (Wired, Wireless or DSL Modem) connections.

7. Right click on one of the selected-> click "Bridge Connections." Then wait and a network bridge with different icon will appear. You might have to provide administrative right.


 Method 2 of 4: Load Balancing

If you connect 2 internet connection to Windows at a time, the operating system automatically selects one connection as primary and uses others as as failover connection mode. You can force Windows 7, 8 to use both connections simultaneously using a simple trick.

Steps:

• Open Network and Sharing Center > Change Adapter Settings

• Go to properties of any of your active Internet connection whether it be LAN, WiFi or 3G/4G.
Select Internet Protocol TCP/IP Version 4, Open its properties, then go to advanced.

• Uncheck the Automatic Metric and type “15”.

• Repeat same steps on other Internet connections you want to combine.

• Restart your Computer.


Method 3 of 4:Using Connectify
Hotspot

Steps:

• Download the Connectify Dispatch

• Install the Dispatch software.

• Run. Then click "Start Dispatch".

• Connect all your modems or network connections


Method 4 of 4: Using Speedify

Steps:

• Speedify is a new cloud service from the makers of Connectify, that lets you easily combine multiple WiFi, 3G/4G, and wired networks to create one faster and more reliable Internet connection.

• Visit [www.speedify.com] to begin your free, 3-day trial. Once your trial has started, you will receive an email with your login and a download link for the Speedify client software (for Mac OS X+ & PC)

• Install the Speedify software and then simply enter the email and password that you received from Speedify to log into the Speedify server netwok

• Click the 'Speed Me Up' button to log in. Speedify will automatically connect you to the nearest and fastest Speed Server to ensure that you get the maximum speed and reliability of your Internet connections combined.

• Now, just ensure that you have two or more WiFi, mobile broadband, or wired Internet connections active on y our computer, and Speedify does the rest:
• Connect all your modems or network connections.

So guys I am sure you will like this an article of some cool tips and tricks to combine two routers to get faster internet.
If you stuck in any kind of trouble feel free to contact us
 Thank you


Lets start If you’re still worried about hacking, there are further steps you can take to protect yourself. However, taking things to...

Lets start



If you’re still worried about hacking, there are further steps you can take to protect yourself. However, taking things too far will defeat the purpose of having a smartphone at all.

Avoid unsecured public WiFi. Hackers often target important locations such as bank accounts via public WiFi that can often be unsecured due to relaxed safety standards or even none at all.

• Turn off your autocomplete feature. By doing this, you can prevent stored critical personal data from being accessed.

• Regularly delete your browsing history, cookies, and cache. Removing your virtual footprint is important in minimizing the amount of data that can be harvested by prying eyes.

• Have an iPhone? Enable Find My iPhone. By turning the feature on in your settings, you’ll be able to locate your phone if you misplace it before the hackers can lay their paws on it.

• Use a security app that increases protection. For Android owners, Webroot offers the all-in-one Mobile Security for Android app that provides antivirus protection and allows you to remotely locate, lock up and wipe your phone in the event you lose track of it. 
For iOS users, Webroot also offers a free secure web browser for increased mobile security on your iPhone and iPad.

Remember if the thought of hacking has you tossing and turning at night, you can just turn the phone off, remove the battery and hide it under your pillow for some sweet lithium-ion induced dreams. Or, you can double down on securing your mobile devices with mobile security solutions offering secure web browsing and real-time defense against phishing attacks

So guys this is some cool tips by using this steps  you can prevent phone hacking.
I hope you like these tips then share with others too
Thank you

How To Repair Corrupted Memory Card/USB Pen Drive? Let's start The method is based on an uncomplicated command prompt trick ...

How To Repair Corrupted Memory Card/USB Pen Drive?
How To Repair Corrupted Memory Card/USB Pen Drive?


Let's start


The method is based on an uncomplicated command prompt trick that will force format your external drive, and then you can use it smoothly and error-free. However, note that this will delete all your files from USB pen drive and if you have any important data, then use the recovery tool to restore these data before implementing this method. So just follow the simple steps that I have discussed below.


Top 3 Methods to Repair


1.Connect the USB Device To Other Computer


So, we mostly face SD card or Pendrive issues due to the incompatibility or any other driver related issue. So, before you conclude that your USB or SD card is damaged and its useless, try to connect it with other devices. If the USB device works fine on other devices, then you need to work on your computer rather than USB or SD card. So, this is the very first step that you should take to check or repair your SD card or USB flash drive.


2.Using Troubleshooter


Well, troubleshooter is the best way to short out any kind of Hardware problem. You just need to ‘TroubleShooting’ in the start menu and then under ‘Hardware and sound’ select the option ‘Configure a device’and follow the on-screen instruction to sort out any problem regarding USB device or other hardware.


3. Updating USB Driver


If Windows failed to read your USB drive then outdated drivers might be another reason. Well, sometimes updating the device driver could fix any existing problem. Here’s how you can update the device drivers


• First of all, you need to open the RUN box and then type in devmgmt.msc. It will open up the Device Manager.

• Now you need to expand the Universal Serial Bus Controllers. Here you will see the corrupted or unrecognized USB devices as ‘Unknown Devices’

• Right-click on the ‘Unknown Devices’ and then you will see the option ofUpdate Driver, click on that.

Now if you needed an necessary update it will let you know. Simply update it and it will fix any existing problem.

So guys this was an article about repair corrupted memory/pen drive. I hope you like this cool tips and do share with others too.

Thank you


TOP 10 POPULAR BOOKS TO LEARN ETHICAL HACKING Let's start It should come as no surprise that cyber security is one of the mo...

TOP 10 POPULAR BOOKS TO LEARN ETHICAL HACKING
TOP 10 POPULAR BOOKS TO LEARN ETHICAL HACKING

Let's start

It should come as no surprise that cyber security is one of the most important and lucrative fields in the world right now, and it’s becoming more important every day  thanks to a growing number of cyber attacks that are targeting everything from individuals and startups to Fortune 500 companies and entire government agencies.

With 10 most popular cyber security books (listed below), spanning 12 hours of in-depth instruction, this bundle walks you through everything from the more theoretical and abstract elements of cybersecurity to its most essential tools and platforms, through instruction that relies on real-world examples and hands-on exercises.

1• Expert Metasploit Penetration Testing

2• Kali Linux 2 Assuring Security by Penetration Testing

3• Kali Linux 2: Windows Penetration Testing

4• Mastering Kali Linux Wireless Pentesting

5• Learning Python Web Penetration Testing

6• Practical Mobile Forensics

7• Learning Python for Forensics

8• Digital Forensics with Kali Linux

9• Network Analysis Using Wireshark 2

10• Building Virtual Pentesting Labs for Penetration Testing


Regardless of your previous experience in tech or coding, this bundle will teach you about the most important elements of penetration testing, how to work with Kali Linux 2 in order to exploit the weaknesses in enemy networks, how to debug and reverse-engineer Windows systems, how to anticipate and retaliate against advanced hacks on complex server infrastructures, and much more.

There are also lessons that show you how to work with Python (one of the most powerful and ubiquitous programming languages in the field), construct virtual pen-testing labs for advanced analysis, build secure networks in virtually any environment, and more.


So guys above all about ethical hacking and cyber security  related books.Hope you like this then do share with others too.
 Thank you

Let's start 1. If we start encrypting keystrokes of a keyboard the value that keylogger will record is different from the act...

How To Encrypt Keyboard To Avoid Keyloggers attacks?

Let's start

1. If we start encrypting keystrokes of a keyboard the value that keylogger will record is different from the actual value, that means they would only record random characters. 
2. We will be using Keyscrambler software to encrypt our keyboard. So have a look on simple steps below to implement this in your Windows PC.

3. Steps To Encrypt Keystrokes To Avoid Keylogger Attacks 

4. Step 1. First of all download and install the toolKeyScrambler.



5. Step 2. Now after downloading, install it and after complete installation, you have to reboot your system.
6.


Step 3. Now when your computer boots up, right click on the icon of KeyScrambler in the system tray at the bottom of a screen.



7. Step 4. Now choose options from there and Keyscrambler will open and you will see the screen like below.

8. Step 5. Now you can alter settings in this according to your wish and after that simply click on ok. Now your key scrambler app is ready, open your browser and type anything you can see that your keystrokes are being encrypted.
9.
That’s it! you are done, now you can see this tool every time you open your browser.

10. Similar Type Of Softwares

11. Guarded ID

12. GuardedID eliminates your vulnerability to data theft due to keylogging attacks, a leading cause of cyber crime. StrikeForce’s patented anti-keylogging technology secures your sensitive personal and financial information by proactively encrypting every keystroke as you type. GuardedID also provides advanced anti-clickjacking and anti-screen capture technology, for multiple layers of protection from cyber attacks.

13. Zemana Antilogger

14. Zemana AntiLogger recognizes, prevents and blocks any kind of online identity theft and financial deception. Zemana AntiLogger allows you to camouflage your daily online activities-shopping, calling, texting, online banking and more, so intruders can never get a pick into it.

15. Oxynger KeyShield


16. Oxynger KeyShield is a secure, anti-screenshot and free virtual keyboard to protect passwords and other sensitive information from malicious programs and hacking. Oxynger KeyShield protects its keystrokes from keystroke logging, screen logging, mouse logging, clipboard logging and shoulder surfing.

17. NextGen AntiKeylogger


18. This is the next generation anti-keylogger program that guards your data against all types of keylogging programs both known, unknown or being developed right now. NextGen AntiKeylogger uses some unique method of protection.

19. Spyshelter

20.
SpyShelter Anti-Keylogger gives trustworthy protection in real time against known and unknown “zero-day” spy and monitoring software, for example: keyloggers, screen loggers, webcam loggers, and even advanced financial malware.

21. Elite Anti Keylogger



22. With Elite Anti Keylogger you can efficiently remove keyloggers, detect spyware, trojans, worms, and other malicious software. This software helps you watch vulnerable areas of your system particularly related to other applications’ monitoring activities and detect even most advanced keyloggers.



23. So guys above is all about Encrypt Keyboard To Avoid Keyloggers. With this, you can easily protect yourself from keylogger attacks and disallow attackers to steal your Personal Identification from your computer. Hope you like this cool security tips. Do share with others too!
24. Thank you

Why water droplets confuse your smartphone touch screen? Read till the end for complete understanding Let's start Touch scree...

Why water droplets confuse your smartphone touch screen?
Why water droplets confuse your smartphone touch screen?

Read till the end for complete understanding

Let's start

Touch screen locate your finger on the grid by measuring, how much the charge drops between two intersecting electrodes a process called "mutual capacitance".

The problem is that drop of sweet or rain can reduce the charge too by providing another conduct between the electrodes. Thankfully over the past years, touch screen engineers have solved the water problem by drawing on different mode of touch sensing called "self capacitance".


Instead of measuring of charge across pairs of electrode, the touch screen measures the increase in charge between an individual electrode on the screen and the ground you are standing on.
Because water droplets are not ground the phone's firmware is better able to ignore them.


So we can say that it is also fully not successful because it won't work during multipoint touch operations like pinch, zoom, etc.

So guys this was an article I hope this would be helpful.
 
Thank you

Types Of Password Attacks In Details you must know!(2019) Let's start Password cracking techniques are used to recover passwords...

Types Of Password Attacks In Details you must know!(2019)
Types Of Password Attacks In Details you must know!(2019)

Let's start


Password cracking techniques are used to recover passwords from computer systems, files etc.

Attacker's use these password cracking techniques to gain unauthorized access to the vulnerable systems. Most of the password cracking techniques are successful due to weak are easily guessable passwords.

Non-Electronic Attack

It is the type of attack in which an attacker does not need any technical knowledge to crack password hence it is called as non-technical attack.
Some of the examples are shoulder surfing, social engineering and Dumpster Diving.

Active online attacks

It is a attack in which an attacker perform password cracking by directly communicating with the victim machine. Some of the examples are Brute force/ Dictionary , Hash injection, phishing, usb stealer, keyloggers, trojan, spywares etc.

Passive online attack

It is an attack in which an attacker perform password cracking without communicating with the victim machine. Some of the examples are wire sniffing, Man in the middle attack, reply attack, etc.

Offline attack

It is a attack in which an attacker copies the target's password file which is encrypted and then tries to crack password in his own system at different location. Some of the examples are pre-Computed Hashes (Rainbow Table), Distributed network, etc.

So the main thing is password can not be found are hacked if lost are forgotten. They can only be recovered through alternative backups such as email, number, etc. Hackers guess or sniff the password while many people misunderstand that they create exact password on their own.


   So guys this was an article about types of password attacks which is most important thing in those days to know. I hope this article would be helpful. if you find useful you  can leave here a like and comment.

  And if you find any type of mistake please do comments or email us.

  Thank you

An introduction of piggybacking why everyone should know?(2019) Piggybacking  Let's start Piggybacking refers to a situation ...

An introduction of piggybacking why everyone should know?(2019)
An introduction of piggybacking why everyone should know?(2019)

Piggybacking

 Let's start

Piggybacking refers to a situation where an unauthorized party gains access to someone system in connection with an authorized party. 

This can happen in several ways,including piggybacking on public wireless networks,and piggybacking into a password protected system.

In simple words  making use of others resources for free without knowledge or permission.

Reason for piggybacking

 Computer users who either do not have their own internet connections and found someone hotspot by luck.

Many users can't afford monthly subscription or want to save money. Online courses 

 Which are sold at abc prices are leaked and used by people free ,etc. are some of the reasons and examples of piggybacking.

Legal or illegal

Sitting behind another passenger on a train, and reading their newspaper over their shoulder. Enjoying the music when a neighbor is playing in their backyard, etc are some of the examples where piggybacking is considered legal to some extent.

 Using others subscription plans, entering into others room just because it is unlocked, etc are claimed as illegal.

Laws vary from country to country. Many people support stating it harmless but some criticize by terms like leeching and freeloading.

Guys this was an basic introduction about piggybacking I think everyone must know about this  if use find useful please share with your friends also and leave a like.

If you find any type of mistake in the article please tell us do comments or email.

Thank you



What is Clickjacking? How to prevent it?(2019) Clickjacking     Let's start Clickjacking is an attack in which hackers f...

What is Clickjacking? How to prevent it?(2019)


Clickjacking


    Let's start


Clickjacking is an attack in which hackers fools users thinking that they are clicking on the thing when they are actually clicking on another thing.

Users thinks they are using a web page's normal UI but in fect there is a hidden UI in it.

This is the possible because of the html iframes i.e the ability to display web page's within others web pages.

Users click a link or a bottom , excepting a particular action from the original site and the attacker's script runs instead.

You might have faced this whenever you download a crack file, music ,movies etc from random links instead of official.

This is done for getting paid on ad(advertisement) clicks.

The best way to get rid of such ads(advertisement) is just move the cursor on it. You can  see the link below indicating the link is genuine or ad(advertisemen).

Guys this was an a simple article of Clickjacking because everyone doing in his daily life so be careful for this type of attacks.

  I hope this article would be helpful for everyone.

  Thank you

An introduction of cloud computing for beginners (2019) 1. Cloud Computing 2. Let's start a. Accroding to wikipedia ...


An introduction of cloud computing for beginners (2019)

1. Cloud Computing

2. Let's start


a. Accroding to wikipedia "cloud computing is shared pools of configurable” computer system resources and higher level services that can be rapidly provisioned with minimal management effort,often over the internet.


3. Now let's understand the same in simple manner using innovative example.


4. Read till the end for complete understanding.

5. Computer are used a lot inside the home or business but now we can the power of computers over the internet in a completely different location.This is known as cloud computing.

6. Suppose Rajesh started a business of selling books.He hired some people who will deliver his books to the customers. Later the demand for his books increased so he hired more people for delivery.

7. Sometimes the the sales got low but he has to pay entire salary to the delivery boys.


8. This was a big headache for him as he it was out of budget and it was hard to decide how many people are required for delivery. He found a new company that has unlimited delivery service and he can use them according to his need. His business started growing as he needs to pay less if business is low and high as business rises.


9. Now he can make a delivery in all parts of the world in a reasonable rates.

10. Similarly later,he started the website, software,courses and many more services


11. All this have to maintained at headquarters.This budget got exceeded as it required huge storage high processing power and maintenance. So he got to know about cloud computing which is similar to the business model we have seen in previous books delivery.


12. Example. So he took help of a company who have a all the computing powers he need for runnnru his business website,software,courses etc.


13. Now he can access and control everything anywhere through the browser over the internet through the cloud. The best thing which he likes is he just he has to pay for the resources he use the depending on the traffic generated. As there are multiple data center connected over the world wide Web,his data is backuped in multiple servers and if one's goes down others gets activating and there is no problem in the service.


14. Used for 

15. Cloud computing is used to enhance the ability to achieve business goals. 

16. Some of the the cloud computing uses infrastructure as a service platform as a service,software as a service, big data analytics,file storage, backup, disaster recovery etc.


17. Guys this was a bsicb introduction of cloud computing for beginners.

18. I hope this article would be helpful for you. If you want more article like this plese follow us and share as much as you can.

19. Thank you

1. Doxing 2. (Gathering information via the internet)  i.e a. Name  b. Age  c. Email  d. Address e. Phone number's ...

1. Doxing

2. (Gathering information via the internet)  i.e

a. Name 

b. Age 

c. Email 

d. Address

e. Phone number's

f. Etc.

3. Let's discuss in detail


4. Doxing is a process of gathering/extracting people's information such as names addresses phone , numbers photo's likes , dislikes credit card details,etc.


5. Doxing may be targeted toward a specific person or an organization .

6. Internet has become a wonderful place to gain knowledge , exchange, ideas,share information,make new friends.


7. Nowadays many people keep their profiles public on social media just for a greed of a likes and followers.

8. Even many companies don't use provapr guard to save money revealing their domain details.

9. Doxing technique is also used by some journalists during their research activity, governments or security forces when they investigate a crime used by enemies competitors etc.


10. It also helps hackers for creating dictionaries for brute force attacks, social engineering attacks.


11. Note: Its only for knowledge perpose please don't use for any kind of  malicious activity


Let's start     What is IMSI catcher? How it work • IMSI are international mobile subscriber identify is a unique digit n...

Let's start  

What is IMSI catcher? How it works?
What is IMSI catcher? How it work



• IMSI are international mobile subscriber identify is a unique digit number used for authentication of a person moving network to network.

•The number is stored in the read only section of a SIM card and with a mobile operator IMSI catchers are devices that are presumably used by government agencies to wiretap the mobile phones of people under surveillance .

• You might be thinking why should we worried about it right? 
It is because not only government but Also some hackers make use of it.

•IMSI catchers are devices that act like fake call towers which trick a target's device to connect to them .
All the communication such as calls message, internet traffic, etc. Can be collected and read.
The interesting part is for victim it seems like everything is working normally.
In the cyber world it's also known as Man In The Middle Attack.

You might thinking how can be a IMSI catcher trick your device. Basically there is a loophole in the GSM protocol i.e mobile phones always connect to the strongest signal if you are within the range of IMSI catcher and your phone is on you can't do anything to prevent it form connecting to the fake tower .

These fake towers access points generally sniff IMSI suggested to disable to WiFi calling feature.
WiFi calling is based on the identities such as IMSI numbers which are protected by a certificate leading to MITM atttack.

And the main thing is don't confuse the IMSI number with IMEI number.

IMSI is tied to a user SIM while IMEI is  unique device id  whenever you enter a new SIM in your phone a message is sent. It is nothing but your IMSI number.

I hope this article would be helpful for you and if you want more like this please do comments or email us we will upload your content ASAP.


  Facts 1.PCs went by the name “ Electronic Brains ” in the 1950s. 2. Email has been around longer than the World Wide Web . 3. HP,...

 Facts


1.PCs went by the name “Electronic Brains” in the 1950s.

2.Email has been around longer than the World Wide Web.

3.HP, Google, Microsoft and Apple have just one thing in common, other than the fact that they are IT companies. They were all started in garages.

4.Bill Gates’ house was designed used a Mac computer.

5.There are approximately 6000 new viruses released every month.

6.Computer programming is currently one of the fastest growing occupations related to technology.

7.28% of IT professionals hide their career from friends and family to get out of giving free tech support.

8.The 30th of November is known as “Computer Security Day”.

9.Technophobia is the fear of technology, Nomophobia is the fear of being without a mobile phone, Cyberphobia is the fear of computers.

10.The original name of Windows was Interface Manager.

So this was some facts about technology I think you should know about this.
  If you find useful please share with your friends also.
And if you wanna more like this do comments or Email, tell us we will upload ASAP.

For being updated do subscribe and click on follow bottom also you can follow our Facebook page @geekyworld2019

Pointers Basic Of Pointer • int x=5; For Example     main() {      int x=5; Printf("%d\n",X); printf("%d&qu...

Pointers

Basic Of Pointer

• int x=5;

For Example

    main()

{

     int x=5;

Printf("%d\n",X);

printf("%d",&X);

}

Output Screen


Address Of Opertor

• & is known as address of operator.

• It is an unary operator.

• Operend must be the name of variable.

• & operator gives the address number of variable.

• & is also known as referencing operator

• (Address and reference are same).

Indirection Operator

• * is indirection operOper.

• It is also known as defrencing operator.

• It takes address as an argument.

• * returns the content (container whose address is its argument)


Example

  main()

{

  int x=5;

printf("%d \n",x);

printf("%d",*&x);

printf ("%d",*&x);

}

• % 32768 to 32767

• %u  0 to 65535

Question

int x=5;

 &x = 7;

            ↘(Error)

Because we can't store anything in &x as &x is not a variable it is the way to represent address of block x.

But 

  int x=5;                

     j=&x;

We can store address in another variable but 'j' has to be declared before use.


Pointer

  int *j, x=5;  /* Here (*) symbol is denoted as pointer */

  j=&x;

• j is not an ordinary variable like another integer variable.

• It is a variable which contains the address of another variable.

Definition of Pointer

• pointer is a variable which that contains address of another variable.

• Pointer always consumes 2 bytes memory.


Example

main()

{

   int x = 5; *j;

  j= &x;

printf("%d %d\n",x,j);

printf("%d %d",*j,&x);

printf("%d", *&j);

}


Output 


Base Address

 int a,*j;

 float b,*k;

char c, *r;

So in the pointer 

j=&a;  k=&b; c=&c;

{Whenever we will enter float data type or other data type value should be in the form of float otherwise

It will give error in C language.}

This was the basic concepts of pointer I hope guys this article would be helpful for you.


Function's • Function is a piece of a code to accomplish certain operation. • It has a name for identification. • They are of tw...

Function's

• Function is a piece of a code to accomplish certain operation.
• It has a name for identification.
• They are of two types

1. Predefined function.


2. User-defined function.


Example

add() /* function */
{
int a,b,c;
Printed("Enter two numbers");
Scanf("%d %d",&a,&b);
c=a+b;
Printf("sum is %d",c);
} isEven()
{ int a;
printf ("Enter a number");
scanf("%d",&a);
if (a%2==0)
printf ("Even");
else
printf("add");
}
main()
{
clrscr();
add();
isEven();
add();
add();
}

Technical Terms
• Function Call
• Function Declaration (Functional prototype)
• Function Call

Function Definition

  add()
{
printf("Enter two numbers");
scanf ("%d %d",&a,&b);
c=a+b;
printf("sum is %d",c);
}

Function Call

main()
{
clrscr();
add();


Remember


• Program must have at least one function.
• Function name must be unique.
• Function is an operation once defined can be used many times.
• One function is the program must be main.
• Function consumes memory only when it is invoked and released from RAM as soon as it finished it's job.


Benefits Of Function


Modularization
• Easy to read
• Easy to Debug
• Easy to modify
• Avoids rewriting of same code over and over
• Better memory utilisation


Ways To Define A Function

• Takes nothing return something.
• Take something return nothing.
• Takes nothing return somthsome.
• Takes somthsome return something.

/*Takes nothing return something*/

#include<studio.h>
#include<conio.h>

  void main ()
{
     void add(void);
     clrscr();
    getch();
}
  void add()
{
    int a,b,c;
printf("Enter two numbers");
scanf ("%d %d",&a,&b);
c=a+b;
printf("sum is %d",c);
}

/* Take somtsomet returns nothing*/

There is no use of function ( printf() and scanf()) because there is no need to take data from the user whereas already data is stored is variable.

Example

#include<conio.h>
#include<studio.h>

 void add (int,int);
 void main()
{
    int x,y;
   clrscr ();
printf("Enter two numbers");
scanf("%d %d",&X,&y);

add(x,y); /* actual argument (call by value)*/

getch();

}
void add (int x,int y) /* formal argument*/
{
 int c;
c= x+y;
printf("sum is %d" , c);
}

/*Takes Nothing Returns Nothing */

Example

 #include<conio.h>
 #include<studio.h>
   main()
{
     int s;
  clrscr ();
 s = add();
printf("sum is %d", s);
  getch ();
}
  int add()
{
int a,b,c;
printf("Enter two numbers");
scanf("%d %d", &a,&b);

return (a+b);
}


/*Takes something returns nothing */
  
#include<conio.h>
#include<studio.h>

    int add (int,int);
     void main()
{
    int s,x,y;
  clrscr ();
printf ("Enter two numbers");
   s= add (x,y);
printf("sum is %d",s);
    getch();
}
   int c;
c = a+b;
return (c);
}



1. Objective • History Of  C++ • Fact • Features Of C++ 2. History Of C++ • Bgarne Stroustrub • 1979 • At&T&...

1. Objective


History Of  C++

Fact

Features Of C++


2. History Of C++

Bgarne Stroustrub

1979

At&T'S Bell Labs

C with Classes

1983 (C++)


3. Facts Of C++

C++ 's OOps aspects was inspired by a computer simulation language called simula67.

Java is written in C++

Major operating system of modern times are written in C++

C++ is words 4th most used programming language

4.

Features of C++

C++ is a middle level language.

C++ support's principal of objects oriented paradigm.

C++ joins three separate programming tradition represented by c. The object oriented language tradition represented by the class enhancement C++ add to C.

Generic programming supported by C++ template's.

5. Comparison Between C & C++

C++ is a super set of C language .

C++ program can use existing C software libraries.

C follows top down approach of programming .

C++ follows bottom up approach of lrogrprogra.

C adopts procedure oriented programming language


6. Object Oriented Programming (OOP)


Oops is Programming approach which revolves around the concept of "objects".

"An entity in the system that can be defined as a set of properties and set of operation performed using entity properly set is known as object".


Encapsulation

Data hiding

Abstraction

Polymorphism

Inheritance


7. Class  And Object

Class is a blueprint of an object.

Class is a description of objects property set and set of operation.

Creating class is as good as defining a new data type .

Class is a means to achieve encapsulation.

Object is an instance of class.


8. Class Vs Object


9. Class box⟵(data type)

10. {

11. int l,b,h; /* variable in C but here object in C++ \*

12. void set dimension(int X ,int y ,int z)

i. ⇖(function)

13. {........}


14. void showDimension()

1. ⇖(function)

15. {........}


16. };





Let's start       INTRODUCTION TO 'C' LANGUAG      Worth to know about C language  . •Oracle is written in C. •Core ...

Let's start      


INTRODUCTION TO 'C' LANGUAG

     Worth to know about C language  .

•Oracle is written in C.

•Core libraries of android are written in C.

•My SQL written in C.

•Almost every device driver is written in C 

•Major parts of web browser is written in C.

•'C' is the worlds most popular programming language.

For Students Point Of View

•'C' is important to build programming skills.

•'C' covers basic features of all programming language

•Campus recruitment process.

•'C' is most popular language for hardware dependent programming.

History of C language 

• Martin Richard (Developer of BCPL) In 1966.

•(Ken Thompson) Developer of 'B' language in 1969.Also developer of UNIX operating system.

He is also developed first master level Chess

Called Belle in 1980.

•Dennis Ritchie (Devloper of C language) in 1972. At AT&T'S Bell laboratory, USA.

He is also co-devloper of UNIX operating system


   So guys this this was the basic information about c language everyone should know.

I hope this article would be helpful for you.

Next I will continue guys for being updated subscribe my blog for more articles.

    Thank you 😊