Translate

Sunday, 17 November 2024

Wednesday, 6 September 2023

what is DBMS ? DBMS kya hai?

hellow doston aaj ke is post main hum DBMS  ke bare main padhenge , to chaliye  suru karte hai .

  • DBMS ka pura name Data BASE Management System hai 
  • DBMS  ek software hai jiska use database ko create , delete , aur manage karne ke liya kiya jata hai
  • dusare sabdon main kahe to , DBMS ek software application hai jiska upyog database main data ko store karne , manage karne , aur delete karne ke liya kiya kiya jata hai .
  • DBMS bahut sare program ka ek samooh hai , jo user aur database ke bich ek interface ki tarah kam karta hai.
DBMS main bahut sari commmand hoti hai , jinki madad se user asani se database ko bana sakta hai , database ko manage kar sakta aur delete kar sakta hai   
                                                                                     
                                 differnet type of works done by DBMS 

user  data ko create kar sakta hai , delete kar sakta hai

Monday, 13 March 2023

Windows11 shortcut keys

 

comedy hub 24
Shortcut keys for windows 11
  • Win key: Open or close the Start menu
  • Win + A: Open the Action Center
  • Win + D: Show or hide the desktop
  • Win + E: Open File Explorer
  • Win + I: Open the Settings app
  • Win + L: Lock your PC
  • Win + M: Minimize all windows
  • Win + P: Project to a different screen or device
  • Win + S: Open the Search bar
  • Win + X: Open the Quick Link menu
  • Ctrl + Shift + Esc: Open the Task Manager

Multitasking:

  • Win + Tab: Open Task View to see all your open windows and virtual desktops
  • Win + Left arrow: Snap the current window to the left side of the screen
  • Win + Right arrow: Snap the current window to the right side of the screen
  • Win + Up arrow: Maximize the current window
  • Win + Down arrow: Minimize the current window or restore it if it's maximized
  • Alt + Tab: Switch between open windows
  • Ctrl + Win + D: Create a new virtual desktop
  • Ctrl + Win + Left arrow: Switch to the virtual desktop on the left
  • Ctrl + Win + Right arrow: Switch to the virtual desktop on the right
  • Ctrl + Win + F4: Close the current virtual desktop
  • Win + U: Open the Ease of Access Center
  • Win + + (plus): Zoom in
  • Win + - (minus): Zoom out
  • Win + Ctrl + C: Turn color filters on or off
  • Win + Ctrl + N: Turn narrator on or off
  • Win + Enter: Open Narrator

These are just a few of the many shortcut keys available in Windows 11. For a full list, you can visit the Microsoft website or search online for more comprehensive guides.

Sunday, 12 March 2023

Digital Signature full explanation

 

Digital Signature 

                (Digital Signature)

A digital signature is a mathematical technique used to verify the authenticity of a digital message or document. It ensures that the document or message has not been tampered with and comes from the claimed sender.


Here are some key notes on digital signatures:


A digital signature is created using a combination of a private key and a hash function. The private key is known only to the signer, and the hash function creates a fixed-length message digest from the original message.


The digital signature includes both the original message and the message digest, encrypted using the signer's private key. The recipient can then use the signer's public key to decrypt the digital signature and verify the authenticity of the message.


Digital signatures are used to provide non-repudiation, which means that the signer cannot deny having signed the message. This is because the signature is unique to the signer and the message.


Digital signatures are used in various applications, such as electronic contracts, online banking, and email communication.


Digital signatures are not the same as digital certificates, which are used to verify the identity of the signer. Digital certificates are issued by trusted third-party organizations, while digital signatures are created by the signers themselves.


To ensure the security of digital signatures, it is important to keep the private key secret and protected from unauthorized access. Additionally, digital signatures may expire after a certain period, requiring the signer to renew them.

Saturday, 11 March 2023

What is cryptography in detailed?

What is cryptography detailed answer


Cryptography is the practice of secure communication in the presence of adversaries, where adversaries may try to intercept, modify, or otherwise tamper with the communication. It is a technique that involves the use of mathematical algorithms to protect the confidentiality, integrity, and authenticity of data.


Cryptography is widely used in modern technology, such as the internet, electronic commerce, banking systems, and many other applications where secure communication is important. It is used to protect sensitive information such as passwords, credit card numbers, and personal identification information.


The basic concept of cryptography involves the use of encryption and decryption techniques. Encryption is the process of transforming plain text into ciphertext, which is the unreadable form of the message. Decryption is the process of converting the ciphertext back into the original message.


Cryptography uses various techniques such as symmetric key cryptography, asymmetric key cryptography, hash functions, digital signatures, and key exchange protocols to achieve secure communication.


Symmetric key cryptography involves the use of a shared secret key between two parties for encryption and decryption. The same key is used for both encryption and decryption.


Asymmetric key cryptography involves the use of a pair of keys, one public key, and one private key. The public key is used for encryption, and the private key is used for decryption.


Hash functions are used to ensure the integrity of data by generating a fixed-size message digest from the original message. Any change in the original message will result in a different message digest.


Digital signatures are used to ensure the authenticity of data by using a combination of public key cryptography and hash functions. A digital signature is generated by applying a hash function to the original message and encrypting the result using the sender's private key.


Key exchange protocols are used to securely exchange keys between two parties without the risk of interception by adversaries.


In summary, cryptography is a fundamental tool for securing communication and protecting sensitive information in modern technology. It uses mathematical algorithms and various techniques to ensure confidentiality, integrity, and authenticity of data.

Artificial Intelligence notes unit 1(AKTU)

                        Artificial Intelligence notes unit 2(AKTU)   AI UNIT 1 NOTES PDF