Encapsulating Object Creation Polymorphism enables code to be more abstract. When your code references an interface instead of a class, it loses its coupling to that class and becomes more flexible in the face of future modifications. This use of abstraction was central to many of the techniques of the previous chapters. Class constructors are the one place where such abstraction is not possible. If you want to create an object, you need to call a constructor; and calling a constructor is not possible without knowing the name of the class. This chapter addresses that problem by examining the techniques…


Encryption powers the modern internet. Without the ability to exchange data packets privately and securely, e-commerce would not exist, and users wouldn’t be able to safely authenticate themselves to internet sites. The HyperText Transfer Protocol Secure is the most widely used form of encryption on the web. Web servers and web browsers universally support HTTPS, so the developer can divert all traffic to that protocol and guarantee secure communication for their users. A web developer who wants to use HTTPS on their site needs only to obtain a certificate from a certificate authority and install it with their hosting provider…


GitLab is a code hosting and issue tracking web platform based around the Git version control system. First released in 2011, it has continued to grow and evolve over the years, adding new features and capabilities, and has turned into a one-stop tool for an agile workforce. While it is owned and managed by GitLab Inc., who steer the direction of the project, the core of GitLab is open source software with over 2,000 separate contributors to date

Version control systems and Git Let’s say you write code, or work on a book, or even just want to collect and…


The relationship between cyber security and the economy has only been growing stronger, with cyber attacks on the rise. Cyber attacks have brought a new recognition of the importance of cyber security efforts. Attacks have now become widespread, common, and expected in some firms. New attacks are emerging within weeks due to an underground economy that has seen specialists create built-to-sell malware to a waiting list of cyber criminals. The impacts of cyber attacks have been felt and there are reports that these attacks are only going to get worse. The current and forecasted impacts are a devastation to the…


Services :

when there are operations that need to be represented, but Entities and Value Objects aren’t the best place, you should consider modeling these operations as Services. In Domain-Driven Design, there are typically three different types of Services you’ll encounter:

Application Services: Operate on scalar types, transforming them into Domain types. A scalar type can be considered any type that’s unknown to the Domain Model. This includes primitive types and types that don’t belong to the Domain.

Domain Services: Operate only on types belonging to the Domain. They contain meaningful concepts that can be found within the Ubiquitous Language…


When a website successfully authenticates a user, the browser and the server open a session. A session is an HTTP conversation in which the browser sends a series of HTTP requests corresponding to user actions, and the web server recognizes them as coming from the same authenticated user without requiring the user to log back in for each request. If a hacker can access or forge session information that the browser sends, they can access any user’s account on your site. Thankfully, modern web servers contain secure session-management code, which makes it practically impossible for an attacker to manipulate or…


NETWORK MONITORING SYSTEM

Literature Survey

u A. Basic terminology

Network monitoring tool

Network monitoring tool is the networking tool that is used to examine usage of local area network and provide a statistical data of uploads and downloads in a network. Monitoring tool is usually used to monitor I/P traffic between the LAN and the internet. It is a network diagnostic system that is used to monitor local area network and provide a statistical display of the same. The data can be further used to improve the network efficiency. …


ABSTRACT

LAN chat application is one of easiest way to chat with a your friends through LAN. No internet connection is needed. The only thing which requires is server IP address and you will be able to connect to others members through LAN . It can help you to talk to your friends even you both do not have internet connection. As it is based on LAN. LAN i.e. local area network which connect different client to each other and also client to main server. …


Open Database Connectivity (ODBC)

ODBC is a standard or open application programming interface (API) for accessing to database management systems (DBMS). This API is independent of any one programming language, database system or operating system. ODBC is based on the Call Level Interface (CLI) specifications from SQL, X/Open (now part of The Open Group), and the ISO/IEC. ODBC was created by the SQL Access Group and first released in September, 1992.

By using ODBC statements in a C++ program, you can access files in a number of different databases, such as, MS Access, MS SQL, Oracle, DB2 and My SQL. In addition to the ODBC software, a separate module or driver is needed for each database to be accessed.

For More on C++ connectivity with Database, visit https://www.itguidekolkata.in/2021/04/CPPwith%20Database.html


1. Which enables us to send the same letter to different persons?

A. macros B. template C. mail merge D. none

2. Which key deletes the character to the left of the cursor?

A. End B. Backspace C. Home D. Delete

3. Which key deletes the character to the right of the cursor?

A. End B. Backspace C. Home D. Delete

4. Which would you choose to save a document with a new name?

A. Press Ctrl+S B. Click File, Save C. Click Tools, Options, Save

D. Click File, Save As

5. Which would you choose to move selected text from one place to another?

A. Move and Paste B. Copy and Paste C. Cut and Paste D. Delete and Paste

6. How do you magnify your document?

A. View, Zoom B. Format, Font C. Tools, Options D. Tools, Customize

For More mcq, visit https://www.itguidekolkata.in/2021/04/ms-word-mcq.html

IT GUIDE Computer Training Institution

By Profession a Software Faculty

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store