TERM PAPER
On Hacking
Submitted to Mr. Y.S Rathore
Amity School of Engineering & Technology
Guided By: Submitted By: Mr. Y.S Rathore Raj Sharma A2305213236
AMITY UNIVERSITY UTTAR PRADESH
GAUTAM BUDDHA NAGAR
Declaration by the student
I Raj Sharma student of B.Tech-3CSE3 hereby declare that the project titled
"HACKING” which is submitted by me to Department of Computer Science
AMITY SCHOOL OF ENGINEERING & TECHNOLOGY, Amity University Uttar Pradesh, Noida,
in partial fulfillment of requirement for the award of the degree of Bachelor of Technology
in Computer Science Engineering , has not been previously formed the basis for the award
of any degree, diploma or other similar title or recognition.
The Author attests that permission has been obtained for the use of any copy righted
material appearing in the Dissertation / Project report other than brief excerpts requiring
only proper acknowledgement in scholarly writing and all such use is acknowledged.
Signature
Noida
Date Name and Signature of Student
CERTIFICATE
This is to certify that Mr. DEEPAK CHAUHAN, student of B.Tech.
Dr. Randy Pausch, a professor of computer science at Carnegie-Mellon University who was diagnosed with pancreatic cancer, educated me with his powerful inspirational message. Dr. Randy Pausch, 47 years old man who has terminal cancer with a life expectancy of a few months gave me a life lesson. He thought me how to achieve dreams also how to face death. Being diagnosed with any kinds of cancer is devastating and despairing, but for him it was opposite; he was happy and cognitively healthy during his final lecture at Carnegie-Mellon University. He even said, “If I don 't seem as depressed or morosed as I should be, sorry to disappoint you” (Video) and continued lecturing. He hadn’t show any sadness or depression during his lecture
CERTIFICATE OF ORIGINALITY: I certify that the attached paper is my original work and has not previously been submitted by me or anyone else for any class. I further declare I have cited all sources from which I used language, ideas, and information, whether quoted verbatim or paraphrased, and that any assistance of any kind, which I received while producing this paper, has been acknowledged in the References section. I have obtained written permission from the copyright holder for any trademarked material, logos, or images from the Internet or other sources. I further agree that my name typed on the line
I hereby certify that no part of this assignment/product has been copied from any other student’s work or from any other source except where due acknowledgement is made in the assignment. No part of this assignment/product has been written/produced for me by another person except where such collaboration has been authorised by the subject lecturer/tutor concerned.
The School of Computing, Engineering and Environment’s Bachelor of Sciences in Computer Science and Electrical Engineering are accredited by the Computing Accreditation Commission (CAC) of the Accreditation Board for Engineering and
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
“I certify that this paper is an original paper composed by me for this course. It has not been copied or closely paraphrased from any other source or set of sources, and has not been submitted as a whole, or in part, for any credit in any other course at OU or any other educational institution by me or anyone else. I have attributed all sources by proper citations and all sources have been included in my bibliography.”
Declaration of Ownership: In submitting this work I declare that, unless otherwise acknowledged, this work is wholly my own. I understand that my work may be submitted to SafeAssign and consent to this taking place.
“I affirm that this is my original work and has not been copied or plagiarized from any other sources, nor has it been previously submitted for academic credit. This electronic message counts as my signature”
CERTIFICATE OF ORIGINALITY: I certify that the attached paper, which was produced for the class identified above, is my original work and has not previously been submitted by me or by anyone else for any class. I further declare that I have cited all sources from which I used language, ideas and information, whether quoted verbatim or paraphrased, and that any and all assistance of any kind, which I received while producing this paper, has been acknowledged in the References section. This paper includes no trademarked material, logos, or images from the Internet, which I do not have written permission to include. I further agree that my name typed on the line below is
Computer Systems analyst focus on an organization’s present computer systems and processes and purposes information systems resolutions to assist the organization function more professionally and efficiently. They bring business and information technology together by understanding the necessities and limitations of both. They bridge the communication and indulgent gap among the IT department and business management, help each side understand each other’s proposals, outlooks and restrictions, improving inclusive business efficiency. Computer systems analyst careers engross researching and studying new technologies, they evaluate the expenditures and settlements to the company to help organization determine if the technology would expand business
“I hereby certify that this work is my own, except where otherwise acknowledged, and that it has not been submitted previously for a degree at this, or any other university”.
I certify that I am the author of this work and that any assistance I received
rights are granted without permission in writing from the publisher or under licence from the
International Journal of Applied Engineering and Technology ISSN: 2277-212X (Online) An Online International Journal Available at http://www.cibtech.org/jet.htm 2011 Vol. 1 (1) January-April/ pp104-113/Tripathi and Raj.