tag:blogger.com,1999:blog-18367228790656033542024-02-21T22:56:18.548-08:00All in 1(one)This blog is in under construction.Sorry for inconvenience. Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.comBlogger31125tag:blogger.com,1999:blog-1836722879065603354.post-58933895922818556862014-05-13T21:58:00.001-07:002014-05-13T21:58:16.523-07:00Memorable moment in "Bhola Dai ko "Tea shop <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"> <b>T</b>here is a small tea shop in my
locality commonly named as “BHOLA DAI KO PASAL.”When I completed my schooling,
I came back to my home town for my further study. When I started to enjoy my
college life one of my friends used to take me to that tea shop. When I went
there for the first time I saw almost the entire student from different
colleges used to get together and enjoy tea and smoke and that was like their
daily routine. The shop was little bit isolated from the road and that was a
plus point for the shop. Though the shop was not so fancy and well managed
still it was famous. Students don’t remember their subject teacher name but
they remember BHOLA DAI. Slowly and slowly I also became his regular customer.
When I leave from my home to college, I used to do attendance to that shop
before doing at school and others also do the same.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"> <b>T</b>alking about the shop I heard that he
started his shop with only one cooking material with 5/6 cups made of glass. He
does not think of such a big achievement. He just wanted to open the shop in a
good environment where there will be a crowd. Luck was also in favour of him
because numbers of colleges were increased in that locality and number of
students used to come there. He had never planned for huge number of customers
because that shop was only for eradicating his poverty. Number of customers
increased beyond his assumption so; slowly he started planning to manage the
customers in such a way that none of the customers feel uncomfortable, so he
made a partition of the room one for the breakfast stuff and another for smoking.
He also started to add different category of cigarette, breakfast item, etc. He
also became famous for “alu chop”. He used to provide some tomato checkups with
that “alu chop”. Day by day his shop became so much popular. Many more songs
related to “BHOLA DAI KO PASAL.” were evolved.
I also heard that he had already built 3 storage buildings near to his
shop. Though he has his own house he stays in his shop and rented his house to others.
He can stay without continuing his shop, but he still does it. One of my friends
who is very closed to him told me that he will give continuity to his shop just
for time pass because he does not want to stay idle in his home and that shop became
a part of his life. His lifestyle is still the same as like before.<o:p></o:p></span></div>
<br />
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"> <b>T</b>his example is purely based on luck
phenomenon. He does not want to grow bigger. Only the fact was environment
around his locality supported him to grow bigger. As I had already mentioned
above he just started his shop to eradicate his poverty without any sort of
planning. The goal was only to survive in the locality by doing hard work
because he was uneducated and unemployed. He never had thought of SWOT and PEST
analysis. There are also many more tea shop in that locality but everyone prefers
his shop though his shop is not well managed so called HI-FI type.<o:p></o:p></span></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com2tag:blogger.com,1999:blog-1836722879065603354.post-14336491205342814302014-04-19T08:02:00.005-07:002014-04-19T08:02:56.164-07:00SWOT and PEST analysis of shopping mall named Nepal Bazar which is located in Biratnagar<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">*SWOT<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">*PEST<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">SWOT
ANALISIS:</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"> An analysis of Strengths, Weaknesses, Opportunities
and Threats in the internal environment of the organization is known as SWOT analysis.
These factors are under control of the organization. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 115%;">There is a shopping
mall named Nepal Bazar which is located in Biratnagar. I am well known about
this organization. This organization was well settled and strongly adjusted in
the environment. SWOT and PEST analysis of this organization is shown in
following table.</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"><o:p></o:p></span></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-padding-alt: 0cm 5.4pt 0cm 5.4pt; mso-yfti-tbllook: 1184;">
<tbody>
<tr>
<td style="border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">S</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;"> (Strengths)<o:p></o:p></span></div>
</td>
<td style="border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">W</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;"> (Weaknesses)<o:p></o:p></span></div>
</td>
<td style="border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">O </span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">(Opportunities)<o:p></o:p></span></div>
</td>
<td style="border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin: 0cm 0cm 0.0001pt 36pt; text-indent: -36pt;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">T</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;"> (Threats)<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">1.
Good infrastructure<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Lack
of support from government<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Faster
market growth than before<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Changes
in government policies<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">2.
Flexible and responsive to sales<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Parking
problem<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">New
seats<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">New
competitors<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">3.
High growth<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Lack
of advance technology<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Provide
a bonus<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Changing
market taste<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">4.
Provide discount card<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Security<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Provide
discount cards<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">5.
Available all sorts of goods<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">6.
Proper management<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Strengths:<o:p></o:p></span></b></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">This organization has good infrastructure. Many
customers are attracted by the name of this organization itself i.e. Nepal
bazaar. There is 24 hours A.C and electricity inside the department. Regular
customers are given a discount card and also provide with many gift hampers. Well
managed environment is setup inside the department. All sorts of goods are
available inside the same roof. Price at the grocery is less than the market price. Branded item
directly exports from the foreign countries. The amazing thing about this
organization is that in the opening ceremony, rickshaw driver was given a
chance to cut the ribbon. This also shows that there is no discrimination
between poor and rich. Anyone can be the family of this organization.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Weaknesses:<o:p></o:p></span></b></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">To run the organization smoothly there should be
support from the government. But this support lacks in this organization. There
is an improper management of parking facilities. No improvement has been seen
till now. There is also lack of advanced technology and security.<o:p></o:p></span></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Opportunities:<o:p></o:p></span></b></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">It provides lots of opportunities. Yearly it
announces new seats for the proper management and function of the organization.
It improves market growth than before. It also provides a bonus to the
employee. There was a scheme,
i.e. if any customer crosses 10,000 Rs while shopping they were given a
discount card. Similarly, at the time of festival many schemes were announced.
Some are like Shop for Rs.1000 in grocery and get many products absolutely
free. They also announced that in every purchase anyone can get a chance to win
a trip to Bangkok and many more.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Threats:</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">
Changes in the government policies directly affect this organization.
Fluctuation in the tax rate and vat rate has encounter to this organization.
Many new competitors are planning to decrease the sales rate of this
organization. The market price has been decreased in order to slow down the
selling rate of this organization by the competitors.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">PEST
ANALISIS:</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"> An analysis of Political, Economical,
Socio-cultural and Technological factors in the external environment of the
organization is known as PEST analysis. These factors are not under control of the organization.<o:p></o:p></span></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-padding-alt: 0cm 5.4pt 0cm 5.4pt; mso-yfti-tbllook: 1184;">
<tbody>
<tr>
<td style="border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">P</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;"> (Political)<o:p></o:p></span></div>
</td>
<td style="border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">E</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;"> (Economical)<o:p></o:p></span></div>
</td>
<td style="border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">S</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;"> (Socio-cultural)<o:p></o:p></span></div>
</td>
<td style="border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">T </span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">(Technological)<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">1.
Political ideologies<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Economic
condition<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Obeys
and fulfil social and cultural norms and value<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Fails
to access the newest technology<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">2.
Government term and change<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Economic
system<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Sufficient
level of technology<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">3.
Wars and conflicts<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Price
fluctuation <o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Good
internet infrastructure<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">4.
Environmental issues<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">Globalization<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;">-<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.5pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 115.55pt;" valign="top" width="154">
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Political:</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">
<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">The political ideologies as democracy, socialism,
communism, Maoism, etc. also affect this organization. As we know that every
political parties whenever they are in a government tries to implement their
ideologies which directly affect the environment. This factor affects a lot to
this organization.<o:p></o:p></span></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Economical:</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">
<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">The economical condition of this organization is in
a good shape. Economical factor is one of the external factors of the
environment. It includes different factors like GDP, national income, per
capita income, export and import, purchasing capacity, inflation rate, etc.
These factors give shape and form to the development of the economic system of
the country. Due to the increasing impact of globalization and liberalization
this organization economy is gradually shifting towards an open market economy.
This also results in price fluctuation in this organization. <o:p></o:p></span></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Socio-cultural:<o:p></o:p></span></b></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">This organization is a social unit as it is
established within the society by the people, for the people of the society. This
organization obeys and fulfils social and cultural norms and value. This
organization manages to proper product quality according to the ever changing
life standard of the people and also following and maintaining religion and
ethnical value.<o:p></o:p></span></div>
<br />
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Technological:</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">
The field of technology is very dynamic as there is a continuous up-gradation
in the existing product due to various innovations and renovation. This
organization is upgrading its existing technologies, including various
machineries and equipments, computer technologies, etc. In order to add its
strength by producing extra beneficial product and services in terms of
quality, uses, etc. This organization has passed to upgrade itself with the
change in the technological field.<o:p></o:p></span></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com11tag:blogger.com,1999:blog-1836722879065603354.post-29881771039681434942014-04-16T10:48:00.003-07:002014-04-16T10:48:51.272-07:00Role of CEO of the newly start-up company <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<em><span style="background: #FAFAFA; font-size: 12.0pt; font-style: normal; line-height: 115%; mso-bidi-font-style: italic; mso-bidi-font-weight: bold;">If I became a CEO of the newly start-up company then I would make
following unethical practices for the benefit of the company.<o:p></o:p></span></em></div>
<div class="MsoNormal">
<em><span style="background: #FAFAFA; font-size: 12.0pt; font-style: normal; line-height: 115%; mso-bidi-font-style: italic; mso-bidi-font-weight: bold;">1. Dumping.<o:p></o:p></span></em></div>
<div class="MsoNormal">
<em><span style="background: #FAFAFA; font-size: 12.0pt; font-style: normal; line-height: 115%; mso-bidi-font-style: italic; mso-bidi-font-weight: bold;"> Dumping means the act
performed to crush other organization/companies to destroy the local
competition by flooding the market and selling them at a much lower price. By
the help of dumping company can be benefited. There is a saying that anything
can be achieved only after losing something likewise I will manage to sell
products at a lower price in order to enhance productivity and ultimately for
future profit. On the other hand other companies lose their market. This
unethical practice helps my company to attract customers.<o:p></o:p></span></em></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<em><span style="background: #FAFAFA; font-size: 12.0pt; font-style: normal; line-height: 115%; mso-bidi-font-style: italic; mso-bidi-font-weight: bold;">2. False advertising
tactics:<o:p></o:p></span></em></div>
<div class="MsoNormal">
<em><span style="background: #FAFAFA; font-size: 12.0pt; font-style: normal; line-height: 115%; mso-bidi-font-style: italic; mso-bidi-font-weight: bold;"> Nowadays, many more
companies/organization is applying the same tactics to uplift their business.
This is also one of the unethical acts perform to attract the customers. I will
advertise about our, company, products, aim, objectives, etc. This tactic can
make my company well known around the society. People will be excited to learn
more about us. More number of customers can be increased in a short period of
time. Strong relation can be established between customers and the company.<o:p></o:p></span></em></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<em><span style="background: #FAFAFA; font-size: 12.0pt; font-style: normal; line-height: 115%; mso-bidi-font-style: italic; mso-bidi-font-weight: bold;">3. Vacancy announcement
tactics:<o:p></o:p></span></em></div>
<br />
<div class="MsoNormal">
<em><span style="background: #FAFAFA; font-size: 12.0pt; font-style: normal; line-height: 115%; mso-bidi-font-style: italic; mso-bidi-font-weight: bold;"> In order to run the company smoothly, best
employee is required. So for this I will rise up the salary of every particular
post from top to bottom in the vacancy announcement. I will increase certain
percentage more than the other companies do. Similarly, I will announce
different types of bonus schemes for the employee. This tactic can increase
number of best employee in my company.<o:p></o:p></span></em></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-56041395242569993862014-04-16T10:35:00.001-07:002014-04-16T10:35:17.789-07:00Shopping mall in Biratnagar<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<b><span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 115%;">T</span></b><span style="line-height: 115%;"><span style="font-family: Arial, Helvetica, sans-serif;">here is a shopping mall named Nepal Bazar which is located in Biratnagar.
I am well known about this organization. This organization was recently established
in our society. Before this, there was no such type of organization. As this
type of organization was launched for the first time in our society, many
people were excited to know about this. In the initial phase this organization
provided many schemes to the people. People felt more convenient after the
existence of this mall. </span></span></div>
<div class="MsoNormal">
<span style="line-height: 115%;"><span style="font-family: Arial, Helvetica, sans-serif;"> All sorts of
goods were available in the same roof. Slowly and gradually this organization
became more popular. There was a scheme, i.e. if any customer crosses 10,000 Rs
while shopping they were given a discount card. Similarly, at the time of
festival many schemes were announced. Some are like Shop for Rs.1000 in grocery
and get many products absolutely free. They also announced that in every
purchase anyone can get a chance to win a trip to Bangkok and many more. Also
get 15% off at Nanglo Restaurant and 25% off at Neal David saloon with every coupon.
Also get gift hamper on every purchase exceeding Rs.1000 at the grocery. They
also announced many surprises, offers for the customer. Many people were
attracted by this offer and number of customers was increased day by day. This
organization also turns out to be the best shopping mall in the entire Morang
district.<o:p></o:p></span></span></div>
<br />
<div class="MsoNormal">
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-65010985902869496122013-10-12T21:41:00.003-07:002013-10-12T21:41:13.316-07:00Clever code<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="cross-head" style="background-color: white; color: #505050; display: block; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.231em; font-weight: bold; line-height: 16px; margin: 0px 0px 16px; text-rendering: optimizelegibility;"><br /></span>
<div style="background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;">
Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh.</div>
<div style="background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;">
While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5.</div>
<div style="background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;">
One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored.</div>
<div style="background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;">
However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.</div>
<div style="background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;">
Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found.</div>
<div style="background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;">
"Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh <a href="http://feross.org/fill-disk/" style="color: #4a7194; font-weight: bold; line-height: 16px; text-decoration: none;">in a blogpost about the bug</a>.</div>
<div style="background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;">
Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed.</div>
<div style="background-color: white; clear: left; color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; padding: 0px; text-rendering: auto;">
In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers.</div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-15176893384606533392013-10-12T21:17:00.002-07:002013-10-12T21:17:13.616-07:00NEWS Update<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; line-height: 17px;">Google AdSense is one of the largest advertising solutions for abundant number of publishers; probably it is one of the best. Google AdSense provides various features and currently it has updated its Term of Service. Google has announced that the change will go into effect from April 23rd. </span><br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; line-height: 17px;" /><br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; line-height: 17px;" /><span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; line-height: 17px;">Google says the chief things that are changing in new version of the terms will regarding mobile properties. Further, they have also added some extra stuff for video and media players. .....</span></div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-15844158207796713692013-10-09T02:55:00.001-07:002013-10-09T02:55:30.087-07:00 Which cyber-crime is leading the world?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<span style="font-family: 'Times New Roman', serif;"> </span><b><span style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">TERM PAPER<o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">PAPER TITLE: Which cyber-crime is leading the world?</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">DEERWALK INSTITUE OF
TECHNOLOGY<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">SCHOOL OF COMPUTER
SCIENCE AND INFORMATION TECHNOLOGY<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">SIFAL, KATHMANDU,
NEPAL.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">SUBMITTED DATE: 9/25/2013<o:p></o:p></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; vertical-align: baseline;">
<br /></div>
<div class="MsoTocHeading">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoTocHeading">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoTocHeading">
<span lang="X-NONE">Contents<o:p></o:p></span></div>
<div class="MsoToc1">
<!--[if supportFields]><span
style='font-family:"Times New Roman","serif"'><span style='mso-element:field-begin'></span><span
style='mso-spacerun:yes'> </span>TOC \o "1-3" \h \z \u <span
style='mso-element:field-separator'></span></span><![endif]--><span style="font-family: "Times New Roman","serif";"><o:p></o:p></span></div>
<div class="MsoToc1">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728967">Abstract<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;"> </span><!--[if supportFields]><span
style='color:windowtext;display:none;mso-hide:screen;mso-no-proof:yes;
text-decoration:none;text-underline:none'><span style='mso-element:field-begin'></span>
PAGEREF _Toc360728967 \h <span style='mso-element:field-separator'></span></span><![endif]--><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">1<!--[if gte mso 9]><xml>
<w:data>08D0C9EA79F9BACE118C8200AA004BA90B02000000080000000E0000005F0054006F0063003300360030003700320038003900360037000000</w:data>
</xml><![endif]--></span><!--[if supportFields]><span style='color:windowtext;
display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none'><span style='mso-element:field-end'></span></span><![endif]--></a><o:p></o:p></span></div>
<div class="MsoToc1">
<span style="font-family: "Times New Roman","serif";">introduction………………………………………………………………………………………………..1<o:p></o:p></span></div>
<div class="MsoToc1">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728968">methodology<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">. 1</span></a><o:p></o:p></span></div>
<div class="MsoToc2">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728969">cyber crime<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">. </span><!--[if supportFields]><span
style='color:windowtext;display:none;mso-hide:screen;mso-no-proof:yes;
text-decoration:none;text-underline:none'><span style='mso-element:field-begin'></span>
PAGEREF _Toc360728969 \h <span style='mso-element:field-separator'></span></span><![endif]--><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">2<!--[if gte mso 9]><xml>
<w:data>08D0C9EA79F9BACE118C8200AA004BA90B02000000080000000E0000005F0054006F0063003300360030003700320038003900360039000000</w:data>
</xml><![endif]--></span><!--[if supportFields]><span style='color:windowtext;
display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none'><span style='mso-element:field-end'></span></span><![endif]--></a><o:p></o:p></span></div>
<div class="MsoToc2">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728970">causes<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">. </span><!--[if supportFields]><span
style='color:windowtext;display:none;mso-hide:screen;mso-no-proof:yes;
text-decoration:none;text-underline:none'><span style='mso-element:field-begin'></span>
PAGEREF _Toc360728970 \h <span style='mso-element:field-separator'></span></span><![endif]--><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">2<!--[if gte mso 9]><xml>
<w:data>08D0C9EA79F9BACE118C8200AA004BA90B02000000080000000E0000005F0054006F0063003300360030003700320038003900370030000000</w:data>
</xml><![endif]--></span><!--[if supportFields]><span style='color:windowtext;
display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none'><span style='mso-element:field-end'></span></span><![endif]--></a><o:p></o:p></span></div>
<div class="MsoToc2">
<span style="font-family: "Times New Roman","serif";">cyber attacks<a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728970"><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">. 3</span></a><o:p></o:p></span></div>
<div class="MsoToc2">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728970">malware<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">. 3</span></a><o:p></o:p></span></div>
<div class="MsoToc2">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728970">mobile threat<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;"> 3</span></a><o:p></o:p></span></div>
<div class="MsoToc2">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728972">Comparative Chart<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;"> 4</span></a><o:p></o:p></span></div>
<div class="MsoToc1">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728973">Conclusion<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">. 4</span></a><o:p></o:p></span></div>
<div class="MsoToc1">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/TermPaper_2ndSem_Asmita_0222.doc#_Toc360728974">Bibliography<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">. </span><!--[if supportFields]><span
style='color:windowtext;display:none;mso-hide:screen;mso-no-proof:yes;
text-decoration:none;text-underline:none'><span style='mso-element:field-begin'></span>
PAGEREF _Toc360728974 \h <span style='mso-element:field-separator'></span></span><![endif]--><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">4<!--[if gte mso 9]><xml>
<w:data>08D0C9EA79F9BACE118C8200AA004BA90B02000000080000000E0000005F0054006F0063003300360030003700320038003900370034000000</w:data>
</xml><![endif]--></span><!--[if supportFields]><span style='color:windowtext;
display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none'><span style='mso-element:field-end'></span></span><![endif]--></a><o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<h1>
<a href="" name="_Toc360728967"><span lang="X-NONE">Abstract</span></a><span lang="X-NONE"><o:p></o:p></span></h1>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; vertical-align: baseline;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">Cyber-crime is the crime </span><span style="font-family: "Times New Roman","serif";">committed using a computer and
the internet to steal a person’s identity or sell contraband or stalk victims
or disrupts operations with malevolent programs. It is one of the
fastest-growing types of illegal activity. It has been estimated that about 556
million people are victims of cyber-crime per year. This paper gives detailed
information regarding cybercrime, its causes and the people who are responsible
for it. I have found that malware is most in practice. At last I found that
mobile threat is the most dangerous cyber-crime leading the world. <o:p></o:p></span></div>
<h1>
<span lang="X-NONE">Introduction<o:p></o:p></span></h1>
<div style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 4.8pt;">
<span style="font-size: 11.0pt; line-height: 150%;">Cyber is a prefix that means computer or computer network
whereas crime is an action that is deemed injurious to the public welfare and
is legally prohibited. So, the crime
committed using a computer and the internet to steal a person's identity or
sell contraband or stalk victims or disrupt operations with malevolent programs
is known as cyber-crime. The term “cyber-crime” was first coined by Barry
Collins in 1980’s. In simple words,
cyber-crime refers to any crime that involves a computer and a network. It is
one of the fastest-growing types of illegal activity. It has been estimated
that about 556 million people are victims of cyber-crime per year. More than
600,000 Facebook accounts are compromised every day whereas 15% of social
network users have reported that their profiles have been hacked by pretenders.
Also, 1 in 10 social network users said they’d fallen victim to a scam or fake
link on social network platforms. Computer crime encompasses a broad range of
activities. Generally, however, it may be divided into two categories. <o:p></o:p></span></div>
<div style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: .5in; margin-right: 0in; margin-top: 4.8pt; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 11.0pt; line-height: 150%; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;">
</span></span><!--[endif]--><span style="font-size: 11.0pt; line-height: 150%;">Crimes
that target computers directly <o:p></o:p></span></div>
<div style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: .5in; margin-right: 0in; margin-top: 4.8pt; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol; font-size: 11.0pt; line-height: 150%; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;">
</span></span><!--[endif]--><span style="font-size: 11.0pt; line-height: 150%;">Crimes
facilitated by computer networks or devices, the primary target of which is
independent of the computer network or device<sup>.</sup><o:p></o:p></span></div>
<div style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 4.8pt;">
<span style="font-size: 11.0pt; line-height: 150%;">Crimes that primarily target computer networks or devices
include Computer viruses, Denial-of-service attacks and Malware</span><span class="apple-converted-space"> </span><span style="font-size: 11.0pt; line-height: 150%;">(malicious code) whereas crimes that use computer networks or
devices to advance other ends include <a href="http://en.wikipedia.org/wiki/Cyberstalking" title="Cyberstalking">cyber
stalking</a>, fraud</span><span class="apple-converted-space"> </span><span style="font-size: 11.0pt; line-height: 150%;">and</span><span class="apple-converted-space"> </span><span style="font-size: 11.0pt; line-height: 150%;">identity theft, information warfare and phishing scams.<o:p></o:p></span></div>
<h1 style="line-height: 150%;">
<a href="" name="_Toc360728971"><span lang="X-NONE">Methodology</span></a><span lang="X-NONE"><o:p></o:p></span></h1>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif"; mso-bidi-language: EN-US;">This research is fully web based. Researches done
previously were taken as main reference. All the findings included here are
based on internet. I got lots of difficulties during data collection. It is not
easy doing any research likewise this research wasn’t easy for me. I went
through many papers done previously by experts. I studied every data related to
my topic. And finally, I concluded my paper by finding mobile threat as the most
dangerous cyber-crime. In this way, I collected the required data and prepared
this paper. <a href="" name="_Toc360728968"><o:p></o:p></a></span></div>
<div class="MsoNormal">
<a href="" name="_Toc360728969"><b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Causes of Cyber
Crime<o:p></o:p></span></b></a></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">Lack of evidence is one of the
main causes for cyber-crime. Other causes include confidential information,
negligence, complexity of codes, accessibility of victims, etc. Since catching
such criminals is difficult, they are increasing day by day. Hence, this has
led to a rise in cyber-crime across the world.<o:p></o:p></span></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Who are
responsible?<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">Most cyber-crimes are committed
by individuals or small groups which mostly includes teenagers. However, large
organized crime groups are also involved in cyber crime. These professional
criminals treat cyber-crime like a business and form global criminal communities.
They are not only letting themselves to earn more money but also destructing
the whole world.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";"> Note:Research charts are not displayed in this paper.</span></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">Sources are mention in the orginal paper</span></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Cyber attacks<o:p></o:p></span></b></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif";">The most common cyber-attacks
with their occurrences are as follows <o:p></o:p></span></div>
<table border="0" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="background: white; border-collapse: collapse; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184;">
<tbody>
<tr style="height: 6.15pt; mso-yfti-firstrow: yes; mso-yfti-irow: 0;">
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: solid #DEDEDE 1.0pt; border-top: inset 1.0pt; height: 6.15pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: solid #DEDEDE .75pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 348.7pt;" valign="top" width="465">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<b><i><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";"> </span></i></b><b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";">Attack Types</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";"><o:p></o:p></span></div>
</td>
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: inset 1.0pt; border-top: inset 1.0pt; height: 6.15pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 72.85pt;" valign="top" width="97">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<b><i><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";">%</span></i></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";"><o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 6.5pt; mso-yfti-irow: 1;">
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: solid #DEDEDE 1.0pt; border-top: none; height: 6.5pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: solid #DEDEDE .75pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 348.7pt;" valign="top" width="465">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">Viruses,
malware, worms, Trojans<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: inset 1.0pt; border-top: none; height: 6.5pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 72.85pt;" valign="top" width="97">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">50%<o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 5.75pt; mso-yfti-irow: 2;">
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: solid #DEDEDE 1.0pt; border-top: none; height: 5.75pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: solid #DEDEDE .75pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 348.7pt;" valign="top" width="465">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">Criminal
insider<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: inset 1.0pt; border-top: none; height: 5.75pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 72.85pt;" valign="top" width="97">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">33%<o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 6.15pt; mso-yfti-irow: 3;">
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: solid #DEDEDE 1.0pt; border-top: none; height: 6.15pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: solid #DEDEDE .75pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 348.7pt;" valign="top" width="465">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">Theft of
data-bearing devices<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: inset 1.0pt; border-top: none; height: 6.15pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 72.85pt;" valign="top" width="97">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">28%<o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 6.15pt; mso-yfti-irow: 4;">
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: solid #DEDEDE 1.0pt; border-top: none; height: 6.15pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: solid #DEDEDE .75pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 348.7pt;" valign="top" width="465">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">SQL
injection<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: inset 1.0pt; border-top: none; height: 6.15pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 72.85pt;" valign="top" width="97">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">28%<o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 6.15pt; mso-yfti-irow: 5;">
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: solid #DEDEDE 1.0pt; border-top: none; height: 6.15pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: solid #DEDEDE .75pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 348.7pt;" valign="top" width="465">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">Phishing<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: inset 1.0pt; border-top: none; height: 6.15pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 72.85pt;" valign="top" width="97">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">22%<o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 5.75pt; mso-yfti-irow: 6;">
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: solid #DEDEDE 1.0pt; border-top: none; height: 5.75pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: solid #DEDEDE .75pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 348.7pt;" valign="top" width="465">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">Web-based
attacks<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: inset 1.0pt; border-top: none; height: 5.75pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 72.85pt;" valign="top" width="97">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">17%<o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 4.25pt; mso-yfti-irow: 7;">
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: solid #DEDEDE 1.0pt; border-top: none; height: 4.25pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: solid #DEDEDE .75pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 348.7pt;" valign="top" width="465">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">Social
engineering<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid #DEDEDE 1.0pt; border-left: none; border-right: inset 1.0pt; border-top: none; height: 4.25pt; mso-border-bottom-alt: solid #DEDEDE .75pt; mso-border-right-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 72.85pt;" valign="top" width="97">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">17%<o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 8.75pt; mso-yfti-irow: 8; mso-yfti-lastrow: yes;">
<td style="border-bottom: inset 1.0pt; border-left: none; border-right: solid #DEDEDE 1.0pt; border-top: none; height: 8.75pt; mso-border-bottom-alt: inset windowtext .25pt; mso-border-right-alt: solid #DEDEDE .75pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 348.7pt;" valign="top" width="465">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">Other<o:p></o:p></span></div>
</td>
<td style="border-bottom: inset 1.0pt; border-left: none; border-right: inset 1.0pt; border-top: none; height: 8.75pt; mso-border-bottom-alt: inset windowtext .25pt; mso-border-right-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; mso-border-top-alt: inset windowtext .25pt; padding: 6.75pt 7.5pt 6.75pt 7.5pt; width: 72.85pt;" valign="top" width="97">
<div class="MsoNormal" style="line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">11%<o:p></o:p></span></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal" style="background-color: #f4f4f4; background-position: initial initial; background-repeat: initial initial; margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif";"> </span></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">This data shows that the occurrence
of malware is 50% which means malware is leading cyber-crime.<o:p></o:p></span></div>
<h3>
<span lang="X-NONE" style="color: windowtext; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Malware<o:p></o:p></span></h3>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">Malware, short for malicious
software, is <span style="background: white;">software that is intended to damage
or disable computers and computer systems. It </span>includes computer viruses,
computer worms, Trojan horses and other malicious and unwanted software.
Malware is made by attackers to disrupt computer operation, gather sensitive
information or gain access to private computer systems. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">In these days, malwares on mobile
phones, also known as mobile threat is increasing day by day.<o:p></o:p></span></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Mobile Threats<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">Mobile devices are the fastest
growing consumer technology, with worldwide unit sales expected to increase
from 300 million in 2010, to 650 million in 2012. Mobile applications are
likewise booming. In June 2011, it was found that people on average spent more
time using mobile applications than browsing the mobile web. The incentives for
cyber-criminals increases </span><span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">as
mobile devices grow in popularity. Studies have shown that cyber criminals
experiment with new business models specially by targeting mobile phones. Mobile
users are not even safe while downloading applications from apps store. Recently
over 250,000 Android users had mobile attack when they downloaded malicious
software disguised as legitimate applications from the Android Market.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">The statistics of Kaspersky Lab
indicated this is the first time for the total number of malicious programs for
Android exceeding that for Java 2 Micro Edition (J2ME). Over the last two
years, the most prevalent platform for malware has been J2ME among mobile
threats. However, this dramatic change indicates that virus writers tend to
concentrate on Android malware, which is a promising mobile platform. At the
end of October, the experts in Kaspersky Lab had detected 1,916 malware for
Android belonging to 92 malware families, at the same time, 1,610 variations
from 60 families were detected for J2ME. In all, the total number of mobile
threats detected in October is 4,053 from 289 families. Figure 1 shows the
details of malicious programs for all mobile platforms.<o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";"><br />
Figure 1: Breakdown of malicious programs for all mobile platforms <o:p></o:p></span></div>
<div class="MsoNoSpacing">
<o:p></o:p></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">
</span><b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"><o:p></o:p></span></b></div>
<br /><div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif"; mso-bidi-font-size: 13.5pt;">Figure:
Smartphone sales to end users by operating system in the Second Quarter of
2012, Gartner</span><span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";"> </span><a href="" name="_Toc360728973"></a><span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";"><o:p></o:p></span></div>
<div class="MsoNoSpacing">
</div>
<div class="MsoNoSpacing">
<br /></div>
<div class="MsoNoSpacing">
<br /></div>
<div class="MsoNoSpacing">
<b><span style="font-family: "Times New Roman","serif"; font-size: 14.0pt; mso-bidi-font-size: 11.0pt;">Conclusion</span></b><span style="font-size: 12.0pt; mso-bidi-font-size: 11.0pt;"> </span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-bidi-font-size: 13.5pt;"><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: 15.0pt; margin-left: 0in; margin-right: 0in; margin-top: 15.0pt; vertical-align: baseline;">
<span style="font-family: "Times New Roman","serif"; mso-bidi-language: EN-US;">This
paper was started with the introduction of cyber-crime. I found malware to be leading cyber-crime
among other types. Within malware,</span><span style="font-family: "Times New Roman","serif";">
short for malicious software, I found mobile threat is increasing rapidly. From
this research, I found that</span><span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";"> no one is safe from having any kind
of cyber attacks. Not even apps store of mobile phone is free from malware. We
may be attacked at anytime and anywhere. So the risk is high and we must be well concerned
on minimizing such cyber-crimes.<o:p></o:p></span></div>
<h1>
<br /></h1>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com2tag:blogger.com,1999:blog-1836722879065603354.post-75820044579314860802013-10-05T07:12:00.002-07:002013-10-07T11:44:47.824-07:00 Hacking, a leading crime.<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkp8eDp1gNgtEMuD5v2_0A-omSLz8hbxWDk_lRQ_FQyPPwWKkvxyF4TU810VFFXAx-cMbz_BvG-_swO5DTEa1BQppUfCW2rPexP0Q1KBT1mvZURUHfY3eVF2apxQ5-Xp3JuhGwhHWi_l8/s1600/this+is+it.jpg" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkp8eDp1gNgtEMuD5v2_0A-omSLz8hbxWDk_lRQ_FQyPPwWKkvxyF4TU810VFFXAx-cMbz_BvG-_swO5DTEa1BQppUfCW2rPexP0Q1KBT1mvZURUHfY3eVF2apxQ5-Xp3JuhGwhHWi_l8/s320/this+is+it.jpg" /></a><br />
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<div class="MsoNormal">
<span style="font-family: 'Times New Roman', serif; font-size: 14pt; line-height: 115%;"> </span><b><span style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%;">TERM PAPER<o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">PAPER
TITLE: Hacking, a leading crime.</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"><o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif";">DEERWALK
INSTITUE OF TECHNOLOGY<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif";">SCHOOL
OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif";">SIFAL,
KATHMANDU, NEPAL.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif";">NAME: Suman Thapa<o:p></o:p></span></b></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif";">ROLL NUMBER:0215<o:p></o:p></span></b></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif";">CLASS: 0216 ‘A’ <o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif";">SUBMITTED DATE: 9/24/2013<o:p></o:p></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; vertical-align: baseline;">
<br /></div>
<div class="MsoTocHeading">
<br /></div>
<div class="MsoTocHeading" style="line-height: 150%;">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoTocHeading" style="line-height: 150%;">
<br /></div>
<div class="MsoTocHeading" style="line-height: 150%;">
<span style="font-size: 12.0pt; line-height: 150%;">Contents</span><!--[if supportFields]><span style='font-size:
12.0pt;line-height:150%;mso-fareast-font-family:Calibri;font-weight:normal'><span
style='mso-element:field-begin'></span> TOC \o "1-3" \h \z \u <span
style='mso-element:field-separator'></span></span><![endif]--><span style="font-size: 12pt; line-height: 150%;"><o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/termpaper_2ndsem_suman_0215.doc#_Toc360728967">Abstract<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">……………………………………………………………………………………………………</span><!--[if supportFields]><span
style='color:windowtext;display:none;mso-hide:screen;mso-no-proof:yes;
text-decoration:none;text-underline:none'><span style='mso-element:field-begin'></span>
PAGEREF _Toc360728967 \h <span style='mso-element:field-separator'></span></span><![endif]--><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">1<!--[if gte mso 9]><xml>
<w:data>08D0C9EA79F9BACE118C8200AA004BA90B02000000080000000E0000005F0054006F0063003300360030003700320038003900360037000000</w:data>
</xml><![endif]--></span><!--[if supportFields]><span style='color:windowtext;
display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none'><span style='mso-element:field-end'></span></span><![endif]--></a><o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";">Methodology…….………………………………………………………………………..………………..1<o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/termpaper_2ndsem_suman_0215.doc#_Toc360728968">Introduction<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">………….,,……………………………………………………………………………………2</span></a><o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/termpaper_2ndsem_suman_0215.doc#_Toc360728969">types of hacking<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">…………………………………………………………………………………………….</span><!--[if supportFields]><span
style='color:windowtext;display:none;mso-hide:screen;mso-no-proof:yes;
text-decoration:none;text-underline:none'><span style='mso-element:field-begin'></span>
PAGEREF _Toc360728969 \h <span style='mso-element:field-separator'></span></span><![endif]--><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">2<!--[if gte mso 9]><xml>
<w:data>08D0C9EA79F9BACE118C8200AA004BA90B02000000080000000E0000005F0054006F0063003300360030003700320038003900360039000000</w:data>
</xml><![endif]--></span><!--[if supportFields]><span style='color:windowtext;
display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none'><span style='mso-element:field-end'></span></span><![endif]--></a><o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";">History
of hacking…………………………………………………………………………………………..2<o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";">Charts..…………………………………………………………………………..<a href="file:///C:/Users/Aashish/Desktop/termpaper_2ndsem_suman_0215.doc#_Toc360728970"><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">........................................</span><!--[if supportFields]><span
style='color:windowtext;display:none;mso-hide:screen;mso-no-proof:yes;
text-decoration:none;text-underline:none'><span style='mso-element:field-begin'></span>
PAGEREF _Toc360728970 \h <span style='mso-element:field-separator'></span></span><![endif]--><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">2<!--[if gte mso 9]><xml>
<w:data>08D0C9EA79F9BACE118C8200AA004BA90B02000000080000000E0000005F0054006F0063003300360030003700320038003900370030000000</w:data>
</xml><![endif]--></span><!--[if supportFields]><span style='color:windowtext;
display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none'><span style='mso-element:field-end'></span></span><![endif]--></a><o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/termpaper_2ndsem_suman_0215.doc#_Toc360728970">comparision ……<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">……..……………………………………………………………………………………3</span></a><o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/termpaper_2ndsem_suman_0215.doc#_Toc360728972">Prevention <span style="display: none; mso-hide: screen;">…......</span><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">…...…………………………………………………………………………………….3</span></a><o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/termpaper_2ndsem_suman_0215.doc#_Toc360728973">Conclusion<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">………………………………………………………………………………………………….4</span></a><o:p></o:p></span></div>
<div class="MsoNoSpacing">
<span style="font-family: "Times New Roman","serif";"><a href="file:///C:/Users/Aashish/Desktop/termpaper_2ndsem_suman_0215.doc#_Toc360728974">Bibliography<span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">………………………….…………………………………………………………………….</span><!--[if supportFields]><span
style='color:windowtext;display:none;mso-hide:screen;mso-no-proof:yes;
text-decoration:none;text-underline:none'><span style='mso-element:field-begin'></span>
PAGEREF _Toc360728974 \h <span style='mso-element:field-separator'></span></span><![endif]--><span style="color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;">4<!--[if gte mso 9]><xml>
<w:data>08D0C9EA79F9BACE118C8200AA004BA90B02000000080000000E0000005F0054006F0063003300360030003700320038003900370034000000</w:data>
</xml><![endif]--></span><!--[if supportFields]><span style='color:windowtext;
display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none'><span style='mso-element:field-end'></span></span><![endif]--></a><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<br /></div>
<h1 style="line-height: 150%;">
<a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" name="_Toc360728967"><span style="font-size: 12.0pt; line-height: 150%;">Abstract</span></a><span style="font-size: 12.0pt; font-weight: normal; line-height: 150%; mso-bidi-font-weight: bold;"><o:p></o:p></span></h1>
<div class="MsoNoSpacing" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif"; mso-bidi-language: EN-US;">Nowadays Hacking has been one of the common practices
made by the computer expert in order to try<o:p></o:p></span></div>
<div class="MsoNoSpacing" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif"; mso-bidi-language: EN-US;">and find vulnerabilities in a network infrastructure.
In this paper I have mentioned three different types <o:p></o:p></span></div>
<div style="background: white; line-height: 150%; margin-bottom: .0001pt; margin: 0in;">
<span style="font-size: 11.0pt; line-height: 150%; mso-bidi-language: EN-US;">of Hacker
i.e. White Hat Hacker, Grey Hat Hacker and Black Hat hacker. </span><span style="font-size: 11.0pt; line-height: 150%;">White Hat Hacking is the practice made
by the hackers to dominant the world by their criminal skills. It is used in
the profit making purpose<span style="background-position: initial initial; background-repeat: initial initial;">. Whereas </span></span><span style="font-size: 11.0pt; line-height: 150%; mso-bidi-language: EN-US;">Grey Hat Hacker</span><span style="background-position: initial initial; background-repeat: initial initial; font-size: 11pt; line-height: 150%;"> is a Hacker who is
part White Hat and part Black Hat. They can be both helpful and harmful</span><span style="font-size: 11.0pt; line-height: 150%;"> purpose. Grey Hat Hackers can also
be known as ethical hackers<span style="background-position: initial initial; background-repeat: initial initial;">.</span></span><span style="font-size: 11.0pt; line-height: 150%; mso-bidi-language: EN-US;"> Similarly
last and most demanding types of hacker known as Black Hat Hacker is described
in this paper. It is also known as cracker or dark side hacker. Further, we
talk about </span><span style="font-size: 11.0pt; line-height: 150%;">Daily trends
of hacking attacks including <strong><span style="background-position: initial initial; background-repeat: initial initial; font-weight: normal;">Distribution of Attack Techniques and </span></strong><strong><span style="font-weight: normal; mso-bidi-font-weight: bold;">Distribution of Targets</span></strong><span class="apple-converted-space">. We also
found which country has high risk of hacking. In this way I also have found the
preventive measures for being safe from hackers.<o:p></o:p></span></span></div>
<h1 style="line-height: 150%;">
<span style="font-size: 12.0pt; line-height: 150%;">Introduction<o:p></o:p></span></h1>
<div class="MsoNoSpacing" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">The
word ‘hack’ refers to <span style="background: white;">use a computer to gain unauthorized
access to data in a system.</span> </span><span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">When someone modifies computer
hardware or software in a way that alters the creator's original intent, it is
known as computer hacking and People who hack computers are called hackers. </span><span style="font-family: "Times New Roman","serif"; mso-bidi-language: EN-US;">Nowadays
Hacking has been one of the common practices made by the computer expert in
order to try and find vulnerabilities in a network infrastructure.</span><span style="font-family: "Times New Roman","serif";"> There are different types of hacking White Hat Hacking, Grey Hat Hacking and Black
Hat hacking. White Hat Hacking is the practice made by the hackers to dominant
the world by their criminal skills. It is used in the profit making purpose.
Similarly other type of hacking is Grey Hat Hacking in which he or she is
submerged in the world of hacking for non-profitable purpose Grey Hat Hackers
can also be known as ethical hackers. Similarly last and most high demanding
types of hacking known as Black Hat Hacking is describe in this paper. It is
also known as cracker or dark side hacker. In this types of hacking he or she
is fully involve in profit making activities by destroying organization
network, stealing others valuable data ,documents, hacking bank account and
transferring money to their own and so
on.</span><span style="font-family: "Times New Roman","serif"; mso-bidi-language: EN-US;"><o:p></o:p></span></div>
<div class="MsoNoSpacing" style="line-height: 150%;">
<br /></div>
<div class="MsoNoSpacing" style="line-height: 150%;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;">Methodology</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%; mso-bidi-language: EN-US;"><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif"; mso-bidi-language: EN-US;">This research is based on internet. It is a totally
web based research. Different types of hacking with their motivates are found
using internet. Also the daily trend of attack is studied in this paper. The
top 3 countries leading in high hacking is found on the basis of previous researches.
Since, only few data were <a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" name="_Toc360728968">existed on the basis of
objective of research so it took lot of time in searching. I went through
almost all the search engines. Time taken for finding results differed in each
search engines. However, I managed to do the best in my own view. <o:p></o:p></a></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%; tab-stops: 282.0pt;">
<a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" name="_Toc360728969"><b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%; mso-fareast-font-family: "Times New Roman";">Types of hacking</span></b></a><b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="background: white; font-family: "Times New Roman","serif";">There are three
types of hackers and they are white hat, grey hat, and black hat.<span class="apple-converted-space"> <o:p></o:p></span></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<b><span style="background: white; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;">White hat hackers</span></b><span style="background: white; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;"> :</span><span style="font-family: "Times New Roman","serif";">
White Hat Hacking is the practice made by the hackers to dominant the world by
their criminal skills. It is used in the profit making purpose.<span style="background: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<b><span style="background: white; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;">A Grey hat hacker</span></b><b><span style="background: white; font-family: "Times New Roman","serif";"> </span></b><span style="background: white; font-family: "Times New Roman","serif";">is a Hacker who is part White Hat and part Black Hat. They
can be both helpful and harmful, and should be treated with respect. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<b><span style="background: white; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;">A Black hat hacker</span></b><span style="font-family: "Times New Roman","serif";">.
In this types of hacking he or she is fully involve in profit making activities
by destroying organization network, stealing others valuable data ,documents,
hacking bank account and transferring
money to their own and so on.<span style="background: white;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<b><span style="background: white; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;">History of hacking<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 150%;">
<span style="background: white; font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">Nowadays many people have different views on the hacking
scenes. The origin of the term "hacker began in the 1960s at MIT (</span><span style="background: white; font-family: "Times New Roman","serif";">Massachusetts Institute of Technology</span><span style="background: white; font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">) similarly during
1960s hackers emerged out of the artificial intelligence labs at MIT.</span><span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";"><br />
<span style="background: white;">In1969, Bell Labs employee Ken Thompson invented
UNIX. Then in 1970s, Dennis Ritchie invented "C” programming language
which was specifically invented to be used with UNIX. ARPANET (</span></span><span style="background: white; font-family: "Times New Roman","serif";">Advanced Research Projects Agency Network</span><span style="background: white; font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">) was founded by
the Department of Defense as a means to link government offices later on it was
evolved into internet.</span><b><span style="background: white; font-family: "Times New Roman","serif";"><o:p></o:p></span></b></div>
<div class="MsoNormal">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Charts <o:p></o:p></span></b></div>
<div style="line-height: 150%; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;">
<span style="background: white; font-size: 11.0pt; line-height: 150%;">Here the summer
shows its effects showing a constantly decreasing shape after the peak occurred
the 15<sup>th</sup><o:p></o:p></span></div>
<div style="margin: 0in 0in 7.5pt;">
<span style="font-size: 15px; line-height: 22px;">Sorry 4 the technical error</span></div>
<div style="line-height: 150%; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;">
<span style="background: white; font-size: 11.0pt; line-height: 150%;">Below is the chart
of <strong>Distribution of Attack Techniques</strong><b> </b>and it is found that Defacements lead the<span class="apple-converted-space"> </span>Chart. Also the account Hijackings are
becoming very popular. Whereas SQLi and DDoS are out from the first three ranks.
Defacements are taken into consideration only when they are meaningful, that is
targeting Governmental primary domains or high profile targets, or also when
they cause the leaking of data.</span><span style="font-size: 11.0pt; line-height: 150%;"><o:p></o:p></span></div>
<div style="line-height: 150%; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;">
<span style="font-size: 15px; line-height: 22px;">Sorry 4 the technical error</span></div>
<div style="background: white; line-height: 150%; margin-bottom: .0001pt; margin: 0in; text-align: justify;">
<span style="font-size: 11.0pt; line-height: 150%;">The<span class="apple-converted-space"> </span><strong>Distribution
of Targets</strong><span class="apple-converted-space"><b> </b></span>Chart
below confirms governmental targets at the first place with nearly 30%,
immediately followed by, as usual, industries (18.8%) & organizations
(12.5%). In any case the level of attention of crooks is also high against
targets belonging to the Financial and News sector, which steadily rank
respectively at number 4 & 5 of this unwelcome chart with the 10.9% and
9.4%. <o:p></o:p></span></div>
<div style="line-height: 150%; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;">
<a href="http://paulsparrows.files.wordpress.com/2013/02/distribution-of-targets-1-15-february-2013.png"><span style="color: #2970a6; font-size: 11.0pt; line-height: 150%;"><br /></span></a><span style="font-size: 15px; line-height: 22px;">Sorry 4 the technical error</span></div>
<div class="MsoNormal" style="line-height: 150%;">
<span class="apple-converted-space"><span style="background: white; font-family: "Times New Roman","serif";"> </span></span><span style="font-family: "Times New Roman","serif";"><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;">Hacking attacks in US , India and
China<span class="apple-converted-space"><span style="background: white;"><o:p></o:p></span></span></span></b></div>
<div style="background: white; line-height: 150%; margin-bottom: .0001pt; margin: 0in;">
<span style="font-size: 11.0pt; line-height: 150%;">Here are the 3 countries with respective data showing their hacking
statistics<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in;">
<b><span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 150%;">1. United States</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%; mso-fareast-font-family: "Times New Roman";"><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: 7.5pt;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">The United States topped in overall
malicious activity measured by Symantec, with 19 percent of the total in 2009.
This is a drop from 23 per cent in 2008. The United States was the country of
the most bot-infected computers observed by Symantec in 2009, accounting for 11
per cent of the global total, a slight decrease from 12 percent in 2008. It
also topped as the No.1 country of origin for Web-based attacks in 2009,
accounting for 34 per cent of the worldwide total.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in;">
<b><span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 150%;">2. China</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%; mso-fareast-font-family: "Times New Roman";"><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: 7.5pt;">
<span style="font-family: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman";">China is ranked second in the list
in terms of bots and origin of most attacks. It is ranked sixth in terms of
phishing hosts and eighth in terms of spam zombies. China was at the same
position last year also.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: 7.5pt;">
<b><span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 150%;">3. India<o:p></o:p></span></b></div>
<div style="line-height: 150%; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;">
<span style="font-size: 11.0pt; line-height: 150%;">India is the world's third largest hotspot
of malicious activity, according to Symantec's Internet Security Threat report.
The top Web-based attack in 2009 was associated with malicious PDF activity,
which accounted for 49 percent of the total attacks. The education sector
accounted for 20 percent of data breaches that could lead to identity theft
during this period, more than any other sector; this is a decrease from 27
percent in 2008, when it was also the highest ranked sector for data breaches.
Symantec observed an average of 46,541 active bot-infected computers per day in
2009; this is a 38 percent decrease from the 75,158 per day average observed in
2008. The report pointed out that 'bot' or 'robot software' is being highly
preferred in cyber-attacks.<o:p></o:p></span></div>
<div class="MsoNoSpacing" style="line-height: 150%;">
<a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" name="_Toc360728973"><b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;">Prevention <o:p></o:p></span></b></a></div>
<div class="MsoNoSpacing" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";"> We can take following steps for prevention of hacking:<o:p></o:p></span></div>
<div class="MsoNoSpacing" style="line-height: 150%; margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;">
</span></span><!--[endif]--><span style="font-family: 'Times New Roman', serif;">Harden our system by
deactivating unnecessary software.<o:p></o:p></span></div>
<div class="MsoNoSpacing" style="line-height: 150%; margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;">
</span></span><!--[endif]--><span style="font-family: 'Times New Roman', serif;">Installing Firewall on
the system.<o:p></o:p></span></div>
<div class="MsoNoSpacing" style="line-height: 150%; margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;">
</span></span><!--[endif]--><span style="font-family: 'Times New Roman', serif;">Not using same password
for multiple account.<o:p></o:p></span></div>
<div class="MsoNoSpacing" style="line-height: 150%; margin-left: .5in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;">
</span></span><!--[endif]--><span style="font-family: 'Times New Roman', serif;">Using encrypted
connection.<o:p></o:p></span></div>
<div class="MsoNoSpacing" style="line-height: 150%;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;">Conclusion</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%;"> <a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" name="_Toc360728974"><o:p></o:p></a></span></div>
<div class="MsoNoSpacing" style="line-height: 150%;">
<span style="font-family: "Times New Roman","serif";">Hence, from this research, it can
be concluded that hacking is increasing day by day. US are leading in having
hacking attacks whereas China and India are on second and third position. We
know these countries are also leading in development in many fields. If such
countries are not safe from hacking then no one else is safe which ultimately
means we may be hacked at any time anywhere. So, we can call hacking as a
leading crime.<o:p></o:p></span></div>
<span style="background: white; color: #555555; font-family: "Calibri","sans-serif"; font-size: 11.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">
<!--[endif]--></span><br />
<div class="MsoNoSpacing" style="line-height: 150%;">
<br /></div>
</div>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com1tag:blogger.com,1999:blog-1836722879065603354.post-17217577380833334892013-08-27T02:32:00.001-07:002013-08-27T02:32:24.939-07:00Program of linked list<div dir="ltr" style="text-align: left;" trbidi="on">
#include<conio.h><br />
#include<stdio.h><br />
struct node<br />
{<br />
int data;<br />
struct node *next;<br />
};<br />
<br />
void addatbeg(int x,struct node**plist);<br />
void addatend(int x,struct node **plist);<br />
int deletefrombeg(struct node **plist); <br />
int deletefromend(struct node **plist);<br />
void display(struct node *plist);<br />
int main()<br />
{<br />
struct node *list=NULL;<br />
addatbeg(5,&list);<br />
addatbeg(7,&list);<br />
addatbeg(10,&list);<br />
display(list);<br />
addatend(8,&list);<br />
display(list);<br />
deletefrombeg(&list);<br />
display(list);<br />
deletefromend(&list);<br />
display(list);<br />
getch();<br />
}<br />
void display(struct node *p)<br />
{<br />
printf("\nThe list is:");<br />
while(p!=NULL)<br />
{<br />
printf("%4d-->",p->data);<br />
p=p->next;<br />
}<br />
printf("END");<br />
}<br />
void addatbeg(int x,struct node**plist)<br />
{<br />
struct node *new;<br />
new=(struct node*)malloc(sizeof(struct node));<br />
new->data=x;<br />
new->next=*plist;<br />
*plist=new;<br />
}<br />
<br />
<br />
void addatend(int x,struct node **plist)<br />
{<br />
struct node *temp,*new;<br />
new=(struct node*)malloc(sizeof(struct node));<br />
new->data = x;<br />
new->next=NULL;<br />
if((*plist)==NULL)<br />
{<br />
(*plist)=new;<br />
}<br />
else<br />
{<br />
temp=(*plist);<br />
while(temp->next!=NULL)<br />
{<br />
temp=temp->next;<br />
}<br />
temp->next=new;<br />
}<br />
} <br />
int deletefrombeg(struct node **plist)<br />
{<br />
struct node *temp;<br />
temp=*plist;<br />
if(temp==NULL)<br />
{<br />
printf("list is empty");<br />
return;<br />
}<br />
*plist=temp->next;<br />
free(temp);<br />
} <br />
int deletefromend(struct node**plist)<br />
{<br />
struct node *temp,*prev;<br />
temp=*plist;<br />
if(temp==NULL) <br />
{<br />
printf("The list is empty:");<br />
return;<br />
}<br />
else if(temp->next==NULL)<br />
{<br />
(*plist)=NULL;<br />
free(temp);<br />
return;<br />
}<br />
while(temp->next != NULL)<br />
{<br />
prev = temp;<br />
temp = temp->next;<br />
}<br />
<br />
prev->next = NULL;<br />
free(temp);<br />
return; <br />
}<br />
<br />
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-68913625706436362432013-08-20T23:35:00.000-07:002013-08-20T23:35:03.924-07:00<div dir="ltr" style="text-align: left;" trbidi="on">
<br /></div>
<img class="spotlight" alt="" aria-describedby="fbPhotosSnowliftCaption" aria-busy="false" src="https://fbcdn-sphotos-g-a.akamaihd.net/hphotos-ak-prn2/970918_530386880367591_314771360_n.jpg" style="width: 532px; height: 399px;">
Last Sunday i.e. on 18<sup>th</sup> August, we had football weekend. It was held on Futsal, Battisputali. We booked the ground for 2 hours. Our team of about 18 students was headed to the targeted place at 12:30 pm. We divided 3 teams, 5 students in each team. The league game was held between each team. We all had lot of fun. Photographs were taken with the help of Surya Raj Timsina. We also thank him for providing drinking water to the players with his pocket money. We also thank our college’s administration including Hitesh sir for the help and support provided to us. We hope we will be having it again next Sunday. One thing that I want to suggest to all the players those who were playing with pants-shirt as if they are going for dating should come with proper jersey.
ThankyouAnonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-10802095044190577602013-07-21T09:08:00.000-07:002013-07-21T09:08:06.783-07:00ABSTRACT OF CYBER CRIME<div dir="ltr" style="text-align: left;" trbidi="on">
<div align="center" class="MsoNormal" style="text-align: center;">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%;"> As we all know that Cybercrime has been one of the
common practices made by the computer expert. In this paper I have mentioned some
of the impact of the cybercrime. Cybercrime is that activities made by the people
for destroying organization network, stealing others valuable data, documents,
hacking bank account and transferring money to their own and so on. My <span style="background: white; color: #030303;">paper gives detailed information
regarding cybercrime, its types, modes of cybercrime and security measures
including prevention to deal effectively with cybercrime...</span>Finally I
will go for the research on the crime
made by the misuse of cybercrime in some of the field and areas like in <span style="background: white; color: #222222;">Financial crimes, Cyber pornography,
Online gambling, Intellectual Property crimes, Forgery, Cyber Defamation, Cyber
stalking, Email spoofing, Email bombing, Denial of Service attack, Salami
attacks, Virus / worm attacks, Web jacking, Data diddling etc.</span> and also try to find which type of cybercrime is
most practice in the world and finally I
will get the main objective of my term paper.
Like this my term paper will be completed.<o:p></o:p></span></div>
<br />
<div class="MsoNormal">
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com11tag:blogger.com,1999:blog-1836722879065603354.post-27229955465548829812013-07-20T08:49:00.001-07:002013-07-20T08:49:15.154-07:00ABSTRACT ON ANDROID OS<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px; white-space: pre-wrap;">As we all know that the world is in transition to mobile computing from desktop pc and laptops. There are almost six billion users around the globe. The mobile phones around us are the combination of hardware and the software. The hardware is the hard part of device and the software are the governor of the hardware. There are different OS for mobile among them I going to pick up three of them. They are android OS, iOS and windows phone OS. Android OS is an open source operating system used use in android mobiles. The iOS is an operating system developed by apple corporation and used in apple products like iPad,iPhone etc. Windows mobile operating system developed by Microsoft itself and embedded by many different mobile companies like Nokia.</span><br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px; white-space: pre-wrap;" /><span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px; white-space: pre-wrap;">The purpose behind picking of these three OS is to find out the popularity of these three in terms of inflexibility. Here the flexibility means how easy people find using mobile devices containing different OS. What is the feature that they love it on these phones. For this I have figure out to collect opinions of people within DWIT premises. The collection of opinions will be arranged using Google sheet (radio buttons type) .The research materials will be websites accompanied with android ,apple and windows. The eBooks on these topics and google news and DWIT itself.</span><br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px; white-space: pre-wrap;" /><span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px; white-space: pre-wrap;">The conclusion more like which one has the easiest interface of the user and how they have proven themselves as the best.The conclusion will be totally based on my research and check whether the conclusion I have drawn has relevant meaning or not.</span></div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-30618106987579280332013-07-20T06:56:00.002-07:002013-07-20T06:56:47.603-07:00MODIFIED ABSTRACT( Types of hacking that may leads to recall the world war)<div dir="ltr" style="text-align: left;" trbidi="on">
<div align="center" class="MsoNormal" style="text-align: center;">
Term Paper Abstract</div>
<div align="center" class="MsoNormal" style="text-align: center;">
BY Suman Thapa</div>
<br />
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif";"> Nowadays
Hacking has been one of the common practices made by the computer expert in
order to try and find vulnerabilities in a network infrastructure. In this
paper I have mentioned three different types of Hacking i.e. White Hat Hacking,
Grey Hat Hacking and Black Hat hacking. White Hat Hacking is the practice made
by the hackers to dominant the world by their criminal skills. It is used in
the profit making purpose. Similarly other type of hacking is Grey Hat Hacking
in which he or she is submerged in the world of hacking for non-profitable
purpose Grey Hat Hackers can also be known as ethical hackers. Similarly last
and most high demanding types of hacking known as Black Hat Hacking is describe
in this paper. It is also known as cracker or dark side hacker. In this types
of hacking he or she is fully involve in profit making activities by destroying
organization network, stealing others valuable data ,documents, hacking bank
account and transferring money to their
own and so on. Finally I will go for the research between these 3 types of
hacking in some fields like in network organization, industries and also try to find which type of hacking is most
cause for the recall of world war and finally I will get the main objective of my term paper. Lastly I recommend
that hacking is the extra ordinary skill so everyone want to become hacker but
please used this skill to destroy the crime but not to commit the crime.<o:p></o:p></span></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-628822703149482942013-07-11T04:19:00.002-07:002013-07-11T04:26:12.691-07:00Abstract of Types of hacking that may leads to recall the world war<div dir="ltr" style="text-align: left;" trbidi="on">
<div align="center" class="MsoNormal" style="text-align: center;">
<br /></div>
<br />
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif";">Nowadays
Hacking has been one of the common practices made by the computer expert in
order to try and find vulnerabilities in a network infrastructure. In this
paper I have mentioned three different types of Hacking i.e. White Hat Hacking,
Grey Hat Hacking and Black Hat hacking. White Hat Hacking is the practice made
by the hackers to dominant the world by their criminal skills. It is used in
the profit making purpose. Similarly other type of hacking is Grey Hat Hacking
in which he or she is submerged in the world of hacking for non-profitable
purpose and also want to prove themselves that they can dominant the world by
their criminal skills. For example if he or she is intended to enter into other
computers and able to extract important data without causing harm to the victim
can be term as he or she is Grey Hat Hackers. Grey Hat Hackers can also be
known as ethical hackers that they can be both helpful and harmful as it is the
combination of both White & Black Hat Hacking. In addition to that if the
Grey Hat Hackers crosses their boundaries then there is no chance to become
Black Hat Hackers. Similarly last and most high demanding types of hacking
known as Black Hat Hacking is describe in this paper. It is also known as
cracker or dark side hacker. In this types of hacking he or she is fully
involve in profit making activities by destroying organization network,
stealing others valuable data ,documents, hacking bank account and
transferring money to their own and so on.
I have also presented one Kevin Mitinick example regarding Black Hat Hacking. So
by the detail analysis of this three types of hacking I have conclude that Black
Hat Hacking is more responsible for future to bring world war among different
nations due to their criminal activities. In addition to that i have also
design my own figure after the detail analysis which shows that Black Hat
Hacking leads many computer engineers into criminal as it is a crime and also
creates misunderstanding among different nations. Lastly I recommend that
hacking is the extra ordinary skill so everyone want to become hacker but
please used this skill to destroy the crime but not to commit the crime.<o:p></o:p></span></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-67429448063942922272013-07-07T23:31:00.001-07:002013-07-07T23:31:18.109-07:00U Comment I Follow: Introduction the U Comment I Follow Directory<a href="http://ucommentifollow.blogspot.com/2008/11/debut-list-of-bloggers-that-use-u.html#links">U Comment I Follow: Introduction the U Comment I Follow Directory</a>Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com1tag:blogger.com,1999:blog-1836722879065603354.post-31308332274109350602013-07-06T22:54:00.001-07:002013-07-06T22:54:36.112-07:00PROGRAM TO CALCULATE FACTORIAL BY RECURSION METHOD <div dir="ltr" style="text-align: left;" trbidi="on">
Auther Suman Thapa<br />
#include<conio.h><br />
#include<stdio.h><br />
long int factorial(int);<br />
int main()<br />
{<br />
int i,n,y,x,result;<br />
printf("\nEnter the number");<br />
scanf("%d",&n);<br />
result=factorial(n);<br />
printf("\nFactorial of %d is %d",n,factorial(n));<br />
<br />
getch();<br />
}<br />
long int factorial(int n)<br />
{<br />
int y;<br />
if(n==0)<br />
return(1);<br />
int x=n-1;<br />
y=factorial(x);<br />
return(n*y);<br />
<br />
}<br />
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-65853310567303765172013-07-06T22:49:00.005-07:002013-07-06T22:49:52.215-07:00program for infix expression to post fix expression<div dir="ltr" style="text-align: left;" trbidi="on">
/*program to calculate the given infix expression to post fix expression<br />
Auther :Suman Thapa<br />
Roll No.0215<br />
Sec: A<br />
Practical Sheet 2<br />
Date:2013//07/07*//<br />
#include<stdio.h><br />
#include<math.h><br />
#include<stdlib.h><br />
#define STACKSIZE 20<br />
<br />
struct stack<br />
{<br />
int top;<br />
char items[STACKSIZE];<br />
};<br />
<br />
int precedence (char c);<br />
char pop (struct stack *s);<br />
void push (struct stack *s,char data);<br />
int isOperand(char c);<br />
int emptyStack(struct stack *s);<br />
<br />
int main (void)<br />
{<br />
char a = '*';<br />
printf("%d",a);<br />
char postfix[8];<br />
char infix[8];<br />
int i = 0,j=0 ,n;<br />
char symbol , topSymbol, temp;<br />
struct stack oprstk;<br />
<br />
printf("Enter the expression:");<br />
scanf("%s",infix);<br />
<br />
<br />
oprstk.top = -1;<br />
oprstk.items[oprstk.top++] = '#';<br />
while (infix[i] != '\0')<br />
{<br />
symbol = infix[i];<br />
//printf("\nsymbol : %c",symbol);<br />
if (isOperand(symbol) == 1)<br />
{<br />
postfix[j++] = symbol;<br />
}<br />
else<br />
{<br />
while (precedence(oprstk.items[oprstk.top] ) >= precedence(symbol))<br />
{<br />
topSymbol = pop(&oprstk);<br />
postfix[j++] = topSymbol;<br />
} // end of while<br />
push(&oprstk,symbol);<br />
<br />
<br />
} // end of else<br />
<br />
i++;<br />
<br />
} // end of outer while<br />
<br />
for (i=0;oprstk.top!=0;i++)<br />
{<br />
postfix[j++] = pop(&oprstk);<br />
}<br />
<br />
postfix[j] = '\0';<br />
<br />
for (i=0;postfix[i] != '\0';i++)<br />
printf("%c",postfix[i]);<br />
<br />
return 0;<br />
<br />
}<br />
<br />
<br />
<br />
<br />
<br />
void push (struct stack *s,char data)<br />
{<br />
s->top++;<br />
s->items[s->top] = data;<br />
}<br />
<br />
<br />
<br />
char pop (struct stack *s)<br />
{<br />
return (s->items[(s->top)--]);<br />
<br />
}<br />
<br />
<br />
int isOperand (char c)<br />
{<br />
if ((c >= 'a' && c<= 'z') || ( c >= 'A' && c <= 'Z'))<br />
return 1;<br />
return 0;<br />
<br />
}<br />
<br />
int precedence (char c)<br />
{<br />
<br />
switch (c)<br />
{<br />
case '$':<br />
return 3;<br />
<br />
case '/':<br />
case '*':<br />
return 2;<br />
<br />
case '+':<br />
case '-':<br />
return 1;<br />
<br />
case '#':<br />
return 0;<br />
}<br />
<br />
}<br />
<br />
int emptyStack(struct stack *s)<br />
{<br />
if (s->top == -1)<br />
return 1;<br />
return 0;<br />
<br />
}<br />
<br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-44716587699557934952013-07-03T11:20:00.002-07:002013-07-03T11:25:40.432-07:00PROGRAM FOR (Infix to Postfix Conversion)<div dir="ltr" style="text-align: left;" trbidi="on">
//Detail research and finalized program (Infix to Postfix Conversion) by Suman Thapa<br />
#include<stdio.h><br />
#include<conio.h><br />
#include<string.h><br />
#include<ctype.h><br />
#include<stdlib.h><br />
<br />
#define N 64<br />
<br />
#define LP 10<br />
#define RP 20<br />
#define OPERATOR 30<br />
#define OPERAND 40<br />
<br />
// Left parentheses precedence. Minimum of all<br />
#define LPP 0<br />
<br />
// Addition Subtraction precedence. Minimum among all operator precedence<br />
#define AP 1<br />
#define SP AP<br />
<br />
// Multiplication divisor precedence.<br />
#define MP 2<br />
#define DP MP<br />
<br />
// Remainder precedence.<br />
#define REMP 2<br />
<br />
#define NONE 9<br />
<br />
static char infix[N+1],stack[N],postfix[N+1];<br />
static int top;<br />
<br />
void infixtopostfix(void); /** POSTFIX CONVERSION FUNCTION **/<br />
int gettype(char); /** TYPE OF EXPRESSION GENERATOR **/<br />
void push(char); /** PUSH FUNCTION **/<br />
char pop(void); /** POP FUNCTION **/<br />
int getprec(char); /** PRECEDENCE CHECKER FUNCTION **/<br />
<br />
void main()<br />
{<br />
char ch;<br />
do<br />
{<br />
top=-1;<br />
printf("\nEnter an infix expression\n");<br />
fflush(stdin);//<span style="background-color: #f1f1f1; color: #333333; font-family: Verdana, Arial, Tahoma, Calibri, Geneva, sans-serif; font-size: 13px;">This is undefined behavior supposed to clear the input stream of all pending input//</span><br />
gets(infix);<br />
infixtopostfix();<br />
printf("\ninfix = %s\npost fix =%s\n",infix,postfix);<br />
printf("\nDo you wish to continue\n");<br />
ch=getche();<br />
}while(ch=='Y' || ch=='y');<br />
}<br />
<br />
void infixtopostfix(void)<br />
{<br />
int i,p,l,type,prec;<br />
char next;<br />
i=p=0;<br />
l=strlen(infix);<br />
while(i<l)<br />
{<br />
type=gettype(infix[i]);<br />
switch(type)<br />
{<br />
case LP:<br />
push(infix[i]);<br />
break;<br />
case RP:<br />
while((next=pop())!='(')<br />
postfix[p++]=next;<br />
break;<br />
case OPERAND:<br />
postfix[p++]=infix[i];<br />
break;<br />
case OPERATOR:<br />
prec=getprec(infix[i]);<br />
while(top>-1 && prec <= getprec(stack[top]))<br />
postfix[p++]=pop();<br />
push(infix[i]);<br />
break;<br />
}<br />
i++;<br />
}<br />
while(top>-1)<br />
postfix[p++]=pop();<br />
postfix[p]='\0';<br />
}<br />
<br />
<br />
int gettype(char sym)<br />
{<br />
switch(sym)<br />
{<br />
case '(':<br />
return(LP);<br />
case ')':<br />
return(RP);<br />
case '+':<br />
case '-':<br />
case '*':<br />
case '/':<br />
case '%':<br />
return(OPERATOR);<br />
default :<br />
return(OPERAND);<br />
}<br />
}<br />
<br />
void push(char sym)<br />
{<br />
if(top>N)<br />
{<br />
printf("\nStack is full\n");<br />
exit(0);<br />
}<br />
else<br />
stack[++top]=sym;<br />
}<br />
<br />
char pop(void)<br />
{<br />
if(top<=-1)<br />
{<br />
printf("\nStack is empty\n");<br />
exit(0);<br />
}<br />
else<br />
return(stack[top--]);<br />
}<br />
<br />
int getprec(char sym)<br />
{<br />
switch(sym)<br />
{<br />
case '(':<br />
return(LPP);<br />
case '+':<br />
return(AP);<br />
case '-':<br />
return(SP);<br />
case '*':<br />
return(MP);<br />
case '/':<br />
return(DP);<br />
case '%':<br />
return(REMP);<br />
default :<br />
return(NONE);<br />
}<br />
}<br />
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-56890435659529848812013-07-01T12:28:00.002-07:002013-07-01T12:32:24.146-07:00full prog about evaluating postfix expression<div dir="ltr" style="text-align: left;" trbidi="on">
//Any quire then let me know// //help nd supported by shankhar koirala//<br />
/*program to evaluate postfix expression<br />
AUTHER: Suman Thapa<br />
DATE:013/07/02<br />
TIME:1:11 AM*/<br />
#include<stdio.h><br />
#include<math.h><br />
#include<stdlib.h><br />
#define STACKSIZE 20<br />
<br />
<br />
struct stack<br />
{<br />
int top;<br />
double items[STACKSIZE];<br />
};<br />
<br />
double oper(int symbol, double x,double y);<br />
int isDigit (char c);<br />
double pop (struct stack *);<br />
void push (struct stack *,double data);<br />
double evaluate (char expr[]);<br />
<br />
<br />
<br />
<br />
int main (void)<br />
{<br />
<br />
<br />
char expression[16] =<br />
{'6','2','3','+','-','3','8','2','/','+','*','2','$','3','+'};<br />
<br />
printf("\nthe given expression is : %s",expression);<br />
<br />
printf("\nthe evaluated value is : %f",evaluate(expression));<br />
<br />
getchar ();<br />
return 0;<br />
}<br />
<br />
<br />
double evaluate (char expr[])<br />
{<br />
char c;<br />
int i;<br />
<br />
double operand1, operand2, value;<br />
struct stack s;<br />
s.top = -1;<br />
double num;<br />
<br />
for (i=0; (expr[i] )!=!'\0'; i++)<br />
{<br />
c=expr[i];<br />
if (isDigit(c) == 1)<br />
{<br />
<br />
num = c - 48;<br />
push(&s,num);<br />
}<br />
<br />
else<br />
{<br />
operand2 = pop(&s);<br />
operand1 = pop(&s);<br />
<br />
value = oper(c,operand1,operand2);<br />
<br />
push(&s,value);<br />
}<br />
<br />
<br />
}<br />
return (pop(&s));<br />
<br />
<br />
}<br />
<br />
void push (struct stack *s,double data)<br />
{<br />
s->top++;<br />
s->items[s->top] = data;<br />
}<br />
<br />
<br />
<br />
double pop (struct stack *s)<br />
{<br />
return (s->items[(s->top)--]);<br />
<br />
}<br />
<br />
<br />
int isDigit (char c)<br />
{<br />
if (c >= '0' && c<= '9')<br />
return 1;<br />
else<br />
return 0;<br />
<br />
}<br />
<br />
<br />
double oper(int symbol, double x,double y)<br />
{<br />
switch (symbol)<br />
{<br />
case '+' :<br />
return (x+y);<br />
<br />
case '-' :<br />
return (x-y);<br />
<br />
case '*' :<br />
return (x*y);<br />
<br />
case '/' :<br />
return (x/y);<br />
<br />
case '$' :<br />
return (pow(x,y));<br />
<br />
}<br />
<br />
<br />
}<br />
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-79183922152225596342013-06-29T08:03:00.000-07:002013-06-29T08:03:07.148-07:00The Talking Robot(Kirobo)<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
Designer
in Japan have built a robot which they hope to send to space. The talking robot,
called Kirobo, has been developed to help astronauts working whilst in orbit. Yorichika
Nishijima, who worked on the project ,said Russian where the first to go to space.
Americans where the first to land on the moon. And he wants Japan to be the
first to send a communication robot astronaut to space. If all goes to the
plan. Kirobo will join other astronaut’s international space station.<o:p></o:p></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-81190496087760959722013-06-25T06:50:00.002-07:002013-06-26T07:08:21.635-07:00Key to Success............<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
No one is born perfect.We all are born to learn.Never judge anyone depending on his/her performance nor his status.These are artificial things gained after coming in this world.We can easily gain lots of success if we try hard until & unless we get them.Don't ever be depressed if you are failed because failure is the key to your success.<br />
Most important things to be remembered to reach your goal or to be successful includes:<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>Be confident on yourself.If you don't trust yourself you are very far from your success.So develop <br />
your confidence.<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>Start the day with a smile including positive thoughts. It's much enough for making your day.<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>Love your work.If you enjoy working, you obviously get success.<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>Hope for the best.Your positiveness helps your work done partially.<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>World is big enough but time is limited. So, do try not to waste your time.<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>Developing personality is the important factor to be successful.Work on it.<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>Never hesitate adopting new places or new people.You must learn to be comfortable to new things.<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>Patience is the most important factor needed to be successful.Make it your habit.<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>Things won't be easy.But never start the new work if the preceeding one is pending.<br />
⦁<span class="Apple-tab-span" style="white-space: pre;"> </span>Never think yourself an inferior.If you can't be best in your eyes, you can't be best in others too.<br />
So,these are some tips which may be used for gaining success.Best of luck for your life ahead.</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-62870005811680088582013-06-24T07:52:00.000-07:002013-06-24T11:17:19.430-07:0010 Best Steve Jobs Quotes........<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<ul style="text-align: left;">
<li>Innovation distinguishes between a leader and a follower.</li>
<li>Let's go invent tomorrow rather than worrying about what happened yesterday.</li>
<li>Stay hungry, stay foolish.</li>
<li>It's more fun to be a pirate than to join the navy.</li>
<li>I want to put ding in the universe.</li>
<li>Quality is more important than Quantity.One home run is better than two doubles.</li>
<li>Simple can be harder than complex.You have to work hard to get your thinking clean to make it simple.But it's worth in the end because once you get there,you can move mountains.</li>
<li>Design is not just what it looks like and feels like.Design is how it works.</li>
<li>You can't just ask customers what they want and then try to give that to them.By the time you get it built, they'll want something new.</li>
<li>Your work is going to fill large part of your life, and the only way to be truly satisfied is to do what you believe is great work.And the only way to do great work is to love what you do.If you have not found it yet, keep looking.Don't settle.</li>
</ul>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-90482202736208420602013-06-16T10:12:00.000-07:002013-06-16T10:12:18.532-07:00LENOVO A800 smartphone<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><br /></a><a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><br /></a><a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><br /></a><a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="http://www.blogger.com/blogger.g?blogID=1836722879065603354" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ7BNCJ714pVtliv1hzKQxSRTM7kxJfvqjtJrvfTAqFqL3wJpOYXFzzamhyphenhyphenw645pL7fHuRaGlV6n03-72-eMN5ALZ6Kp0q22inj5MJwnZ4qkI5uvuYpKU_BQM9F-hnJMNaMYP4TzDEG5k/s1600/Lenovo_A800_1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="175" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ7BNCJ714pVtliv1hzKQxSRTM7kxJfvqjtJrvfTAqFqL3wJpOYXFzzamhyphenhyphenw645pL7fHuRaGlV6n03-72-eMN5ALZ6Kp0q22inj5MJwnZ4qkI5uvuYpKU_BQM9F-hnJMNaMYP4TzDEG5k/s320/Lenovo_A800_1.jpg" width="320" /></a></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="font-size: 13.5pt;">Lets have a look to our products.We are here with our Lenovo
Lenovo K800 dual-core smartphone with dual SIM Camera 4.5-inch HD 720.Likewise
OS to Android 4.0 with CPU Intel Atom 1.6Ghz 3G WCDMA . In addition to that it
also based on many features i, e Al.GPS with built-in GPS and sensor, sensor P,
L-sensor, Wifi, Multi Touch, etc.<o:p></o:p></span></div>
<div style="margin: 0in 0in 0.0001pt;">
<span style="font-size: 13.5pt;">Similarly we can also translet different languages ??according to
the needs of the costomer.<o:p></o:p></span></div>
<div style="margin: 0in 0in 0.0001pt;">
<span style="font-size: 13.5pt;">Please be in touch.<o:p></o:p></span></div>
<br />
<div class="MsoNormal">
<!--[if gte vml 1]><v:shapetype
id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t"
path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f">
<v:stroke joinstyle="miter"/>
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0"/>
<v:f eqn="sum @0 1 0"/>
<v:f eqn="sum 0 0 @1"/>
<v:f eqn="prod @2 1 2"/>
<v:f eqn="prod @3 21600 pixelWidth"/>
<v:f eqn="prod @3 21600 pixelHeight"/>
<v:f eqn="sum @0 0 1"/>
<v:f eqn="prod @6 1 2"/>
<v:f eqn="prod @7 21600 pixelWidth"/>
<v:f eqn="sum @8 21600 0"/>
<v:f eqn="prod @7 21600 pixelHeight"/>
<v:f eqn="sum @10 21600 0"/>
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
<o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="Picture_x0020_1" o:spid="_x0000_i1025" type="#_x0000_t75"
alt="Description: C:\Users\Aashish\Downloads\Lenovo_A800_1.jpg" style='width:468pt;
height:257.25pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:///C:\Users\Aashish\AppData\Local\Temp\msohtmlclip1\01\clip_image001.jpg"
o:title="Lenovo_A800_1"/>
</v:shape><![endif]--><!--[if !vml]--><br /><o:p></o:p></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com0tag:blogger.com,1999:blog-1836722879065603354.post-76288536040353801322013-06-13T10:05:00.001-07:002013-06-13T10:05:20.565-07:00About wireless Bluetooth mini Keyboard<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_GI5KFnFTrwvle3MVUUxDBKsb1h4-HM6iLIF6NbCAwLu74juSH6dvb40lCDc6HupBaCKcjQrv_cly3po4aiNkiwND5kqjcHj89kHdMOryF2yNGP7VdxlVpKl0kfpPiuXzZnMjEYWqGaE/s1600/keyboard.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="122" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_GI5KFnFTrwvle3MVUUxDBKsb1h4-HM6iLIF6NbCAwLu74juSH6dvb40lCDc6HupBaCKcjQrv_cly3po4aiNkiwND5kqjcHj89kHdMOryF2yNGP7VdxlVpKl0kfpPiuXzZnMjEYWqGaE/s320/keyboard.PNG" style="cursor: move;" width="320" /></a></div>
<div class="MsoNormal">
<!--[if gte vml 1]><v:shapetype
id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t"
path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f">
<v:stroke joinstyle="miter"/>
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0"/>
<v:f eqn="sum @0 1 0"/>
<v:f eqn="sum 0 0 @1"/>
<v:f eqn="prod @2 1 2"/>
<v:f eqn="prod @3 21600 pixelWidth"/>
<v:f eqn="prod @3 21600 pixelHeight"/>
<v:f eqn="sum @0 0 1"/>
<v:f eqn="prod @6 1 2"/>
<v:f eqn="prod @7 21600 pixelWidth"/>
<v:f eqn="sum @8 21600 0"/>
<v:f eqn="prod @7 21600 pixelHeight"/>
<v:f eqn="sum @10 21600 0"/>
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
<o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="Picture_x0020_2" o:spid="_x0000_i1025" type="#_x0000_t75"
style='width:468pt;height:179.25pt;visibility:visible;mso-wrap-style:square'>
<v:imagedata src="file:///C:\Users\Aashish\AppData\Local\Temp\msohtmlclip1\01\clip_image001.png"
o:title=""/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--><o:p></o:p></div>
<br />
<div class="MsoNormal">
This is an special type of universal
wireless Bluetooth mini Keyboard which support almost all kinds of tablets like
Apple ,Android, Smartphone etc. .We have especially design it to support different
versions of Apple tablets. Likewise it can also support Android tablet like Galaxy,
Google Nexus tabs. In addition to that its size is ultra-thin as compared to
our previous products of mini keyboard. It is too portable that it can be carry
out in our pockets. Likewise it can perform its work within 10m away from the
related tablet and can standby almost 25 days.</div>
<o:p></o:p></div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com2tag:blogger.com,1999:blog-1836722879065603354.post-53316290817919150382013-06-10T10:31:00.000-07:002013-06-10T10:31:06.840-07:00TOWER OF HANOI<div dir="ltr" style="text-align: left;" trbidi="on">
#include<stdio.h><br />
#include<conio.h><br />
#include<math.h><br />
int moves;<br />
void transfer(int n,char from,char to,char temp);<br />
int main(void)<br />
{<br />
int n;<br />
printf("Enter the number:");<br />
scanf("%d",&n);<br />
transfer(n,'A','C','B');<br />
moves=pow(2,n)-1;<br />
printf("No.of moves=%d\n",moves);<br />
getch();<br />
}<br />
void transfer(int n,char from,char to,char temp)<br />
{<br />
if(n>0)<br />
{<br />
transfer(n-1,from,temp,to);<br />
printf("Move disk %d from %c to %c\n",n,from,to);<br />
transfer(n-1,temp,to,from);<br />
<br />
}<br />
<br />
}<br />
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/13633002676440111119noreply@blogger.com1