COMPUTER KEDA

TECH. INFO.

image
Hello,

I'm YUVRAJ SINGH MEWARA

HELLO I'M YUVRAJ SINGH

Fusce quis volutpat porta, ut tincidunt eros est nec diam erat quis volutpat porta, neque massa, ut tincidunt eros est nec diam FusceFusce quis volutpat portaFusce quis volutpat porta, ut tincidunt eros est nec diam erat quis volutpat porta


Education
University of Engineering

Bachelor of Science

College of Awesomeness

Master of Fine Arts

School of Amusement

Bachelor of Fine Arts


Experience
Lead Developer

State Art company

UI/UX Developer

Design Corporation

Front-End Developer

Creative Design Studio


My Skills
Design
Programming
Branding
Marketing

764

Awards Won

1664

Happy Customers

2964

Projects Done

1564

Photos Made

WHAT CAN I DO

Web Design

Fusce quis volutpat porta, ut tincidunt eros est nec diam erat quis volutpat porta

Responsive Design

Fusce quis volutpat porta, ut tincidunt eros est nec diam erat quis volutpat porta

Graphic Design

Fusce quis volutpat porta, ut tincidunt eros est nec diam erat quis volutpat porta

Clean Code

Fusce quis volutpat porta, ut tincidunt eros est nec diam erat quis volutpat porta

Photographic

Fusce quis volutpat porta, ut tincidunt eros est nec diam erat quis volutpat porta

Unlimited Support

Fusce quis volutpat porta, ut tincidunt eros est nec diam erat quis volutpat porta

SOME OF WORK

CRYPTOGRAPHY TUTORIAL 2

In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from malicious activities such as attacks. Let us consider the types of attacks to which information is typically subjected to.
Attacks are typically categorized based on the action performed by the attacker. An attack, thus, can be passive or active.

Passive Attacks

The main goal of a passive attack is to obtain unauthorized access to the information. For example, actions such as intercepting and eavesdropping on the communication channel can be regarded as passive attack.
These actions are passive in nature, as they neither affect information nor disrupt the communication channel. A passive attack is often seen as stealinginformation. The only difference in stealing physical goods and stealing information is that theft of data still leaves the owner in possession of that data. Passive information attack is thus more dangerous than stealing of goods, as information theft may go unnoticed by the owner.
Passive Attacks

Active Attacks

An active attack involves changing the information in some way by conducting some process on the information. For example,
  • Modifying the information in an unauthorized manner.
  • Initiating unintended or unauthorized transmission of information.
  • Alteration of authentication data such as originator name or timestamp associated with information
  • Unauthorized deletion of data.
  • Denial of access to information for legitimate users (denial of service).
Active Attacks
Cryptography provides many tools and techniques for implementing cryptosystems capable of preventing most of the attacks described above.

Assumptions of Attacker

Let us see the prevailing environment around cryptosystems followed by the types of attacks employed to break these systems −

Environment around Cryptosystem

While considering possible attacks on the cryptosystem, it is necessary to know the cryptosystems environment. The attacker’s assumptions and knowledge about the environment decides his capabilities.
In cryptography, the following three assumptions are made about the security environment and attacker’s capabilities.

Details of the Encryption Scheme

The design of a cryptosystem is based on the following two cryptography algorithms −
  • Public Algorithms − With this option, all the details of the algorithm are in the public domain, known to everyone.
  • Proprietary algorithms − The details of the algorithm are only known by the system designers and users.
In case of proprietary algorithms, security is ensured through obscurity. Private algorithms may not be the strongest algorithms as they are developed in-house and may not be extensively investigated for weakness.
Secondly, they allow communication among closed group only. Hence they are not suitable for modern communication where people communicate with large number of known or unknown entities. Also, according to Kerckhoff’s principle, the algorithm is preferred to be public with strength of encryption lying in the key.
Thus, the first assumption about security environment is that the encryption algorithm is known to the attacker.

Availability of Ciphertext

We know that once the plaintext is encrypted into ciphertext, it is put on unsecure public channel (say email) for transmission. Thus, the attacker can obviously assume that it has access to the ciphertext generated by the cryptosystem.

Availability of Plaintext and Ciphertext

This assumption is not as obvious as other. However, there may be situations where an attacker can have access to plaintext and corresponding ciphertext. Some such possible circumstances are −
  • The attacker influences the sender to convert plaintext of his choice and obtains the ciphertext.
  • The receiver may divulge the plaintext to the attacker inadvertently. The attacker has access to corresponding ciphertext gathered from open channel.
  • In a public-key cryptosystem, the encryption key is in open domain and is known to any potential attacker. Using this key, he can generate pairs of corresponding plaintexts and ciphertexts.

Cryptographic Attacks

The basic intention of an attacker is to break a cryptosystem and to find the plaintext from the ciphertext. To obtain the plaintext, the attacker only needs to find out the secret decryption key, as the algorithm is already in public domain.
Hence, he applies maximum effort towards finding out the secret key used in the cryptosystem. Once the attacker is able to determine the key, the attacked system is considered as broken or compromised.
Based on the methodology used, attacks on cryptosystems are categorized as follows −
  • Ciphertext Only Attacks (COA) − In this method, the attacker has access to a set of ciphertext(s). He does not have access to corresponding plaintext. COA is said to be successful when the corresponding plaintext can be determined from a given set of ciphertext. Occasionally, the encryption key can be determined from this attack. Modern cryptosystems are guarded against ciphertext-only attacks.
  • Known Plaintext Attack (KPA) − In this method, the attacker knows the plaintext for some parts of the ciphertext. The task is to decrypt the rest of the ciphertext using this information. This may be done by determining the key or via some other method. The best example of this attack is linear cryptanalysis against block ciphers.
  • Chosen Plaintext Attack (CPA) − In this method, the attacker has the text of his choice encrypted. So he has the ciphertext-plaintext pair of his choice. This simplifies his task of determining the encryption key. An example of this attack is differential cryptanalysis applied against block ciphers as well as hash functions. A popular public key cryptosystem, RSA is also vulnerable to chosen-plaintext attacks.
  • Dictionary Attack − This attack has many variants, all of which involve compiling a ‘dictionary’. In simplest method of this attack, attacker builds a dictionary of ciphertexts and corresponding plaintexts that he has learnt over a period of time. In future, when an attacker gets the ciphertext, he refers the dictionary to find the corresponding plaintext.
  • Brute Force Attack (BFA) − In this method, the attacker tries to determine the key by attempting all possible keys. If the key is 8 bits long, then the number of possible keys is 28 = 256. The attacker knows the ciphertext and the algorithm, now he attempts all the 256 keys one by one for decryption. The time to complete the attack would be very high if the key is long.
  • Birthday Attack − This attack is a variant of brute-force technique. It is used against the cryptographic hash function. When students in a class are asked about their birthdays, the answer is one of the possible 365 dates. Let us assume the first student's birthdate is 3rd Aug. Then to find the next student whose birthdate is 3rd Aug, we need to enquire 1.25*√365 ≈ 25 students.
    Similarly, if the hash function produces 64 bit hash values, the possible hash values are 1.8x1019. By repeatedly evaluating the function for different inputs, the same output is expected to be obtained after about 5.1x109 random inputs.
    If the attacker is able to find two different inputs that give the same hash value, it is a collision and that hash function is said to be broken.
  • Man in Middle Attack (MIM) − The targets of this attack are mostly public key cryptosystems where key exchange is involved before communication takes place.
    • Host A wants to communicate to host B, hence requests public key of B.
    • An attacker intercepts this request and sends his public key instead.
    • Thus, whatever host A sends to host B, the attacker is able to read.
    • In order to maintain communication, the attacker re-encrypts the data after reading with his public key and sends to B.
    • The attacker sends his public key as A’s public key so that Btakes it as if it is taking it from A.
  • Side Channel Attack (SCA) − This type of attack is not against any particular type of cryptosystem or algorithm. Instead, it is launched to exploit the weakness in physical implementation of the cryptosystem.
  • Timing Attacks − They exploit the fact that different computations take different times to compute on processor. By measuring such timings, it is be possible to know about a particular computation the processor is carrying out. For example, if the encryption takes a longer time, it indicates that the secret key is long.
  • Power Analysis Attacks − These attacks are similar to timing attacks except that the amount of power consumption is used to obtain information about the nature of the underlying computations.
  • Fault analysis Attacks − In these attacks, errors are induced in the cryptosystem and the attacker studies the resulting output for useful information.

EXP - 8 (210 PC MANTINACE)

How to Install a Network Printer

A network printer is a printer that is connected to a computer network and can be accessed from many different computers. This can come in handy if you have more than one computer in your home or business but do not want to have a separate printer for every computer. There are several ways you can go about installing a network printer, depending on the capabilities of the printer and the types of computers connected to the network.


To install a network, wireless, or Bluetooth printer

If you're trying to add a network printer at the office, you'll usually need the name of the printer. If you can't find it, contact your network administrator.

  1. Click the Start  button, and then, on the Start menu, click Devices and Printers.
  2. Click Add a printer.
  3. In the Add Printer wizard, click Add a network, wireless or Bluetooth printer.
  4. In the list of available printers, select the one you want to use, and then click Next. (If your computer is connected to a network, only printers listed in Active Directory for your domain are displayed in the list.)
  5. If prompted, install the printer driver on your computer by clicking Install driver
    Administrator permission required
     If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
  6. Complete the additional steps in the wizard, and then click Finish.

LOCAL VS NETWORK PRINTERS: THE BASICS

A local printer is one which is directly connected to a specific computer via USB cable. This printer is only accessible from that particular workstation and therefore, can only service one computer at a time.

A network printer, on the other hand, is part of a workgroup or network of computers that can all access the same printers at the same time. The printer does not have to have a physical connection to the network, and can also be connected wirelessly and assigned to a workgroup.

There are certain businesses and work environments that are better served by the use of local printers, allowing specific employees direct access to a printer with no queue. In other instances though, network printers serve a better purpose because the printing needs of multiple employees can be more efficiently met with one printer. 

experiment - 7

What is Printer 

A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. Printers vary in size, speed, sophistication, and cost. In general, more expensive printers are used for higher-resolution color printing.
Personal computer printers can be distinguished as impact or non-impact printers. Early impact printers worked something like an automatic typewriter, with a key striking an inked impression on paper for each printed character

Non-impact printers

Non-impact printers do not use a striking device to produce characters on the paper; and because these printers do not hammer against the paper they are much quieter. Following are some non-impacted printers.
गैर-प्रभाव प्रिंटर कागज पर वर्णों का उत्पादन करने के लिए एक स्ट्राइकिंग डिवाइस का उपयोग नहीं करते हैं; और क्योंकि ये प्रिंटर कागज के खिलाफ हथौड़ा नहीं करते हैं वे बहुत शांत हैं निम्नलिखित कुछ गैर-प्रभावित प्रिंटर हैं

Ink-jet printers

Ink-jet printers work in the same fashion as dot-matrix printers in the form images or characters with little dots. However, the dots are formed by tiny droplets of ink. Ink-jet printers form characters on paper by spraying ink from tiny nozzles through an electrical field that arranges the charged ink particles into characters at the rate of approximately 250 characters per second. The ink is absorbed into the paper and dries instantly. Various colors of ink can also be used.
One or more nozzles in the print head emit a steady stream of ink drops. Droplets of ink are electrically charged after leaving the nozzle. The droplets are then guided to the paper by electrically charged deflecting plates [one plate has positive charge (upper plate) and the other has negative charge (lover plate)]. A nozzle for black ink may be all that’s needed to print text, but full-color printing is also possible with the addition of needed to print text, but full-color printing is also possible with the addition three extra nozzles for the cyan, magenta, and yellow primary colors. If a droplet isn’t needed for the character or image being formed, it is recycled back to its input nozzle.
Several manufacturers produce color ink-jet printer. Some of these printers come with all their color inks in a cartridge; if you want to replace on color, you must replace all the colors. Other color ink-jet printers allow you to replace ink individually. These printers are a better choice if user uses one color more than other colors. These printers produce less noise and print in better quality with greater speed.

इंक-जेट प्रिंटर समान रूप से फ़ोट छवियों या छोटे बिंदुओं वाले पात्रों में डॉट-मैट्रिक्स प्रिंटर के रूप में काम करते हैं। हालांकि, डॉट्स स्याही की छोटी बूंदों द्वारा बनाई गई हैं। स्याही-जेट प्रिंटर, कागज़ पर वर्णों को छोटे नलिका से बिजली के क्षेत्र के माध्यम से स्याही के छिड़काव करते हैं जो आरोप लगाए गए स्याही कणों को प्रति सेकंड लगभग 250 वर्णों की दर से वर्णित करता है। स्याही कागज में लीन हो जाती है और तुरन्त सूख जाता है। स्याही के विभिन्न रंगों का भी उपयोग किया जा सकता है। प्रिंट सिर में एक या अधिक नलिकाएं स्याही की एक स्थिर धारा का उत्सर्जन करती हैं। नोक छोड़ने के बाद स्याही की बूंदियां विद्युत रूप से लगायी जाती हैं। तब बूंदों को विद्युत रूप से चार्ज किए जाने वाले प्लेटों के द्वारा पेपर पर निर्देशित किया जाता है [एक प्लेट में सकारात्मक चार्ज (ऊपरी प्लेट) और दूसरा नकारात्मक चार्ज (प्रेमी प्लेट)] है। काली स्याही के लिए एक नोजल हो सकता है कि पाठ को प्रिंट करने के लिए आवश्यक हो, लेकिन पाठ को प्रिंट करने के लिए आवश्यक के साथ पूर्ण रंगीन प्रिंटिंग संभव भी हो सकती है, लेकिन सियान, मैजेंटा के लिए तीन अतिरिक्त नोजल के साथ पूर्ण रंग मुद्रण भी संभव है , और पीला प्राथमिक रंग यदि चरित्र या छवि बनने के लिए छोटी बूंद की आवश्यकता नहीं है, तो इसे अपने इनपुट नोजल में वापस पुनर्नवीनीकरण किया जाता है कई निर्माताओं में रंग इंक-जेट प्रिंटर का उत्पादन होता है। इनमें से कुछ प्रिंटर कारतूस में अपने सभी रंगीन स्याही के साथ आते हैं; यदि आप रंग पर प्रतिस्थापित करना चाहते हैं, तो आपको सभी रंगों को बदलना होगा। अन्य रंग स्याही जेट प्रिंटर आपको अलग-अलग इंक बदलने की अनुमति देते हैं। ये प्रिंटर एक बेहतर विकल्प हैं यदि उपयोगकर्ता अन्य रंगों से एक रंग का उपयोग करता है ये प्रिंटर अधिक मात्रा के साथ बेहतर गुणवत्ता में कम शोर और प्रिंट का उत्पादन करते हैं।

Laser printers

A laser printer works like a photocopy machine. Laser printers produce images on paper by directing a laser beam at a mirror which bounces the beam onto a drum. The drum has a special coating on it to which toner (an ink powder) sticks. Using patterns of small dots, a laser beam conveys information from the computer to a positively charged drum to become neutralized. From all those areas of drum which become neutralized, the toner detaches. As the paper rolls by the drum, the toner is transferred to the paper printing the letters or other graphics on the paper. A hot roller bonds the toner to the paper.
Laser printers use buffers that store an entire page at a time. When a whole page is loaded, it will be printed. The speed of laser printers is high and they print quietly without producing much noise. Many home-use laser printers can print eight pages per minute, but faster and print approximately 21,000 lines per minute, or 437 pages per minute if each page contains 48 lines. When high speed laser printers were introduced they were expensive. Developments in the last few years have provided relatively low-cost laser printers for use in small businesses.

एक लेजर प्रिंटर एक फोटोकॉपी मशीन की तरह काम करता है। लेजर प्रिंटर एक दर्पण पर एक लेज़र बीम को निर्देशित करके कागज पर छवियां पेश करते हैं जो एक ड्रम पर बीम को बाउंस करता है। ड्रम पर एक विशेष कोटिंग है जिसमें टोनर (एक स्याही पाउडर) चिपक जाती है। छोटे बिंदुओं के पैटर्न का उपयोग करते हुए, लेजर बीम कंप्यूटर से एक सकारात्मक चार्ज ड्रम के लिए सूचना को निष्प्रभावी बना देता है। ड्रम के उन सभी क्षेत्रों से जो तटस्थ हो जाते हैं, टोनर को अलग करता है। ड्रम द्वारा पेपर रोल के रूप में, टोनर कागज पर पत्र या अन्य ग्राफिक्स को छपाई करने वाले पेपर को स्थानांतरित किया जाता है। कागज के लिए टोनर को गर्म रोलर बांड करता है लेजर प्रिंटर बफ़र्स का उपयोग करते हैं जो एक समय में पूरे पृष्ठ को संग्रहीत करते हैं। जब एक पूरा पृष्ठ लोड होता है, तो इसे प्रिंट किया जाएगा। लेजर प्रिंटर की गति अधिक है और वे बहुत शोर पैदा किए बिना चुपचाप प्रिंट करते हैं। कई होम-लेज़र प्रिंटर प्रति पृष्ठ आठ पृष्ठों प्रिंट कर सकते हैं, लेकिन तेज और प्रिंट लगभग 21,000 लाइनें प्रति मिनट या 437 पृष्ठों प्रति मिनट अगर प्रत्येक पृष्ठ में 48 लाइनें हैं। जब हाई स्पीड लेजर प्रिंटर पेश किए गए थे तो वे महंगे थे। पिछले कुछ सालों में विकास ने छोटे व्यवसायों में उपयोग के लिए अपेक्षाकृत कम लागत वाले लेजर प्रिंटर उपलब्ध कराए हैं।

Dot matrix printing

Dot-matrix impact printing[edit]
Dot matrix printing is the process of computer printing from a collection of dot matrixdata to a device, which can be one of:
  • Impact dot matrix printers, what The New York Times calls "dot-matrix impact printers."[1]
  • non-impact dot matrix printers, such as inkjetthermal, or laser printers.
Dot matrix (impact) printing is a type of computer printing which uses a print head that moves back-and-forth, or in an up-and-down motion, on the page and prints by impact, striking an ink-soaked cloth ribbon against the paper, much like the print mechanism on a typewriter. However, unlike a typewriter or daisy wheel printer, letters are drawn out of a dot matrix, and thus, varied fonts and arbitrary graphics can be produced.
These printers can print on multi-part (carbon paper) forms since they print using mechanical pressure.
Sometimes called impact matrix printing or dot matrix printing, this is a type of computer printing which uses a print head that moves back-and-forth, or in an up-and-down motion, on the page and prints by impact, striking an ink-soaked cloth ribbon against the paper, much like the print mechanism on a typewriter. However, unlike a typewriter or daisy wheel printer, letters are drawn out of a dot matrix, and thus, varied fonts and arbitrary graphics can be produced.
Although nearly all inkjetthermal, and laser printers also print closely spaced dots rather than continuous lines or characters, it is not customary to call them dot matrix printers.

205 , PRACTICAL - FILE


202 Tutotail - 5

Q1: Explain addressing modees and also explain what is effective address ?

Ans :

Adressing Modes 

The operation field of an instruction specifies the operation to be performed. This operation will be executed on some data which is stored in computer registers or the main memory. The way any operand is selected during the program execution is dependent on the addressing mode of the instruction. The purpose of using addressing modes is as follows:
  1. To give the programming versatility to the user.
  2. To reduce the number of bits in addressing field of instruction.

Types of Addressing Modes:

Immediate Mode

In this mode, the operand is specified in the instruction itself. An immediate mode instruction has an operand field rather than the address field.
For example: ADD 7, which says Add 7 to contents of accumulator. 7 is the operand here.

Register Mode

In this mode the operand is stored in the register and this register is present in CPU. The instruction has the address of the Register where the operand is stored.
Register Mode Addressing
Advantages of this mode:
  • Shorter instructions and faster instruction fetch.
  • Faster memory access to the operand(s)
Disadvantages of this mode:
  • Very limited address space
  • Using multiple registers helps performance but it complicates the instructions.

Register Indirect Mode

In this mode, the instruction specifies the register whose contents give us the address of operand which is in memory. Thus, the register contains the address of operand rather than the operand itself.
Register Indirect Mode Addressing

Auto Increment/Decrement Mode

In this the register is incremented or decremented after or before its value is used.

Direct Addressing Mode

In this mode, effective address of operand is present in instruction itself.
  • Single memory reference to access data.
  • No additional calculations to find the effective address of the operand.
Direct Addressing Mode
For Example: ADD R1, 4000 - In this the 4000 is effective address of operand.
NOTE: Effective Address is the location where operand is present.

Indirect Addressing Mode

In this, the address field of instruction gives the address where the effective address is stored in memory. This slows down the execution, as this includes multiple memory lookups to find the operand.
Indirect Addressing Mode

Displacement Addressing Mode

In this the contents of the indexed register is added to the Address part of the instruction, to obtain the effective address of operand.
EA = A + (R), In this the address field holds two values, A(which is the base value) and R(that holds the displacement), or vice versa.
Displacement Addressing Mode

Relative Addressing Mode

It is a version of Displacement addressing mode.
In this the contents of PC(Program Counter) is added to address part of instruction to obtain the effective address.
EA = A + (PC), where EA is effective address and PC is program counter.
The operand is A cells away from the current cell(the one pointed to by PC)

Base Register Addressing Mode

It is again a version of Displacement addressing mode. This can be defined as EA = A + (R), where A is displacement and R holds pointer to base address.

Stack Addressing Mode

In this mode, operand is at the top of the stack. For example: ADD, this instruction will POP top two items from the stack, add them, and will then PUSH the result to the top of the stack.

Q2 : 

Start Work With Me

Contact Us
YUVRAJ, SMITH
+91-6350062832
JAIPUR,RAJASTHAN,INDIA