Wednesday, 17 October 2018
Saturday, 13 October 2018
Friday, 5 October 2018
Wednesday, 3 October 2018
Sum of two numbers in C++
CODE:
#include<iostream>
using namespace std;
int main()
{
cout<<"Enter a Number"<<endl;
int a,b;
cin>>a;
cout<<"Enter a Number"<<endl;
cin>>b;
int sum = a + b;
cout<<"sum of"<<a<<" + "<<b<<" ="<<sum;
return 0;
}
OUTPUT:
#include<iostream>
using namespace std;
int main()
{
cout<<"Enter a Number"<<endl;
int a,b;
cin>>a;
cout<<"Enter a Number"<<endl;
cin>>b;
int sum = a + b;
cout<<"sum of"<<a<<" + "<<b<<" ="<<sum;
return 0;
}
OUTPUT:
Tuesday, 2 October 2018
New iPhone XS 2018 features and specifications
The iPhone XS and XS Max pack 5.8in and 6.5in OLED screens, respectively, while The "low-end" XR features a 6.1in LCD 'Liquid Retina' screen.
iphone XS looks:
PRICE IDEA:
iphone XS looks:
PRICE IDEA:
how to increase blog traffic for free
- The most successful content is that which fulfils the need of Users.
- Think about your target audience and what they really searching.
- Content should Attract the audience.
- Try to use the most appropriate keywords to rank your articles.
- Share your blog link on the social media groups and make pages of related topics.
- Focus on writing long term content like episode wise.
- Always use appropriate visual content to have attention of user.
how to print a table of any number entered by user in C++
#include<iostream>
using namespace std;
int main()
{
cout<<"Enter a Number"<<endl;
int a;
cin>>a;
cout<<a <<" * 1 = "<<a*1<<endl;
cout<<a <<" * 2 = "<<a*2<<endl;
cout<<a <<" * 3 = "<<a*3<<endl;
cout<<a <<" * 4 = "<<a*4<<endl;
cout<<a <<" * 5 = "<<a*5<<endl;
cout<<a <<" * 6 = "<<a*6<<endl;
cout<<a <<" * 7 = "<<a*7<<endl;
cout<<a <<" * 8 = "<<a*8<<endl;
cout<<a <<" * 9 = "<<a*9<<endl;
cout<<a <<" * 10 = "<<a*10<<endl;
return 0;
}
using namespace std;
int main()
{
cout<<"Enter a Number"<<endl;
int a;
cin>>a;
cout<<a <<" * 1 = "<<a*1<<endl;
cout<<a <<" * 2 = "<<a*2<<endl;
cout<<a <<" * 3 = "<<a*3<<endl;
cout<<a <<" * 4 = "<<a*4<<endl;
cout<<a <<" * 5 = "<<a*5<<endl;
cout<<a <<" * 6 = "<<a*6<<endl;
cout<<a <<" * 7 = "<<a*7<<endl;
cout<<a <<" * 8 = "<<a*8<<endl;
cout<<a <<" * 9 = "<<a*9<<endl;
cout<<a <<" * 10 = "<<a*10<<endl;
return 0;
}
Sunday, 30 September 2018
Admob Ads integration in Unity Games (full code)
Copy and paste the below code in your script.
using UnityEngine;
using System.Collections;
using GoogleMobileAds.Api;
using System;
public class AdManager : MonoBehaviour
{
InterstitialAd interstitial;
BannerView bannerAd;
void Start()
{
RequestBanner();
RequestInterstitial();
}
public void RequestBanner()
{
string adUnitId = "banner ad id";
bannerAd = new BannerView(adUnitId, AdSize.Banner, AdPosition.Bottom);
AdRequest request = new AdRequest.Builder().Build();
bannerAd.LoadAd(request);
bannerAd.OnAdLoaded += HandleOnAdLoaded;
}
void HandleOnAdLoaded(object a, EventArgs args)
{
print("loaded");
bannerAd.Show();
}
public void RequestInterstitial()
{
string adUnitId = " interstial ad id ";
interstitial = new InterstitialAd(adUnitId);
AdRequest request = new AdRequest.Builder().Build();
interstitial.LoadAd(request);
}
public void show()
{
if (interstitial.IsLoaded())
{
interstitial.Show();
}
}
}
Tuesday, 28 August 2018
Best multivendor site of pakistan
I just come across the newly launched website in Pakistan named Ezdokan.
Ezdokan offer you large number of product range as well as help vendor like you in social media marketing of products.
On each sale of your product Ezdokan take 5% commission.
Hurry up!
Sign up Now on www.ezdokan.com
Ezdokan offer you large number of product range as well as help vendor like you in social media marketing of products.
On each sale of your product Ezdokan take 5% commission.
Hurry up!
Sign up Now on www.ezdokan.com
Tuesday, 8 May 2018
ladies leather luxurious handbag
ladies leather luxurious handbag
Click Link below to buy:
https://rover.ebay.com/rover/1/711-53200-19255-0/1?icep_id=114&ipn=icep&toolid=20004&campid=5338306281&mpre=https%3A%2F%2Fwww.ebay.com%2Fitm%2F4pcs-Women-Leather-Handbag-Lady-Shoulder-Bags-Tote-Purse-Messenger-Satchel-Set-L%2F123023815987%3Fhash%3Ditem1ca4ca7533%3Am%3AmhkTght9b1v01VdR5rUxXwA
Saturday, 5 May 2018
Cheap Hosting and Domains
WebSouls's Affiliate Program is one of the most attractive Web Hosting Affiliate Programs on the Internet. We have high quality products on offer, a high converting web site and high payouts which help you to make easy money from your website. There is no better time to join a web hosting affiliate program than now! The easiest way to earn high commission with minimal effort.
Link of website: https://billing.websouls.com/aff.php?aff=356
Link of website: https://billing.websouls.com/aff.php?aff=356
Friday, 4 May 2018
funny video see complete here on this link.
Very in video of this month is 10 rupay k kurkure.
TYPES OF BEST CARDIO EXCERCISES FOR WEIGHT LOSS
Cardio
exercise usually carves strong feelings among most of the people. Some
people love to hop on a treadmill and sweat out while others just run a mile to
exercise making up an excuse to skip the cardio. Doesn’t matter if you love it
or hate it, everyone is keen to know how cardio can make you lose weight or the
duration for which Cardio should be done best for fat loss.
Getting it Right
Cardio can get you ultra-slim but you have to get it right.
Doing too much Cardio can make you slim but you also sacrifice muscle to get
that much lean. Little cardio workout has a very less effect on your body. If
you do a moderate cardio workout
with balanced diet, you can be sure of coming in lean and muscular.
Cardio Sessions for You
Deciding how many days per week you should do cardio is the
first and foremost question.
·
Those who love cardio will start off with too
many cardio sessions resulting in extreme weight loss as human body is highly
adaptive to the rate of cardio done. Extreme cardio workouts just to keep
losing fat can lead to over-training
and ultimately result in muscle
tissue breakdown.
·
Those who are not interested in cardio that much
will try to ease themselves by doing a couple of cardio sessions in a week.
This is not a good approach as your body doesn’t sweat out much and lose fat in
real time.
·
If you are thinking to lose weight in a limited
period of time, a moderate cardio work out can be the best option for you.
Cardio workout specifics like intensity
and duration are highly dependent on your body type so a moderate cardio is
what you should consider doing.
Types of Cardio
There are two types of Cardio:
Ø Low Intensity, Long Duration Cardio
Ø High Intensity, Short Duration Cardio
People often ask what type of cardio is best for fat loss.
Well, both types of cardio can make you lose fat but it’s highly dependent on
your body type that can adjust to any one of these types.
Low Intensity, Long Duration Cardio
Low Intensity, long duration cardio
is also referred to as Low
Intensity Steady State Cardio (LISS).
This type of cardio is done for 60
minutes or more at a constant pace. This type of cardio usually burns
calories most of which comes from fat. Intensity level is significant in any
type of exercise. Energy derived from fat oxidation will be greater if the
intensity level is higher and the calories being burned off will come from muscle tissue and glycogen. That is why
running on a treadmill or a stair stepper for longer intervals is preferred to
burn more fats and less muscle during LISS.
Once your body is used to LISS, you
can consider shifting to a moderate intensity state cardio by lowering the
duration to lose more fats. Training at about 65% Vo2 max, fat oxidation is the highest. You can continue this
rate of exercise for longer duration as well at this intensity level.
Body fats become minimal at some
point while dieting continuously which makes muscle tissue breakdown more
likely. Limit the amount of time your body is catabolic to maintain the muscles
you’ve worked so hard for. Therefore, Moderate intensity cardio is a good
option for losing fat in quick time and maintaining your muscles.
High Intensity, Short Duration Cardio
High Intensity Interval Timing (HIIT) is the most efficient form of
High Intensity, short duration Cardio which has become more popular in the
recent years. HIIT is performed at very high intensity for shorter period with
constant breaks as well. Many people also believe that High intensity cardio
burns calories coming from muscle glycogen rather than body fats and that’s why
Moderate Intensity Cardio
(MIT) is more effective than HIIT.
Fat loss occurs through a process
called lipolysis that takes place
when energy expenditure exceeds caloric intake. During cardio, high intensity
workout in less time can burn enough calories to create a deficit that is important for lipolysis to occur. Studies show that
loss of subcutaneous fat is greater
than in HIIT as compared to LISS training as lipid utilization increases at high intensities. This means your
body burns calories even after your workout or exercise has ended and also
helps increase your metabolism rate.
HIIT can also help you build and
retain muscles as at higher intensities, body releases growth hormones (GH) as well as by breaking down amino acids and
use them up for energy. % of Vo2 max
determines the level of growth hormone response to aerobic
exercise. HIIT also increases the testosterone
level and keep it elevated for couple of hours after an aerobic exercise
like aerobic growth hormones. HIIT significantly helps you retain muscles by
burning off calories and enhancing the production of aerobic hormones such as
growth hormones and testosterones to make you look slim and muscular in little
time.
Therefore, the answer to “which type of cardio is best for
fat loss” is BOTH, HIIT and LISS. As they help you shed fat efficiently through
different pathways of course but it depends highly on your body to which cardio
it can adapt more easily.
References
Saturday, 14 April 2018
Sunday, 25 March 2018
C++ program for checking vowels with switch statement
Here is the code copy and paste it on your IDE to run the program and get output.
#include<iostream>
using namespace std;
int main()
{
char num;
cout<<"Enter a Character"<<endl;
cin>>num;
switch(num)
{
case 'a':
case 'e':
case 'i':
case 'o':
case 'u':
case 'A':
case 'E':
case 'I':
case 'U':
case 'O':
cout<<"its vowel"<<endl;
break;
default:
cout<<"not vowel"<<endl;
}
}
Output:
\
#include<iostream>
using namespace std;
int main()
{
char num;
cout<<"Enter a Character"<<endl;
cin>>num;
switch(num)
{
case 'a':
case 'e':
case 'i':
case 'o':
case 'u':
case 'A':
case 'E':
case 'I':
case 'U':
case 'O':
cout<<"its vowel"<<endl;
break;
default:
cout<<"not vowel"<<endl;
}
}
Output:
\
Saturday, 24 February 2018
EMOTIONAL INTELLIGENCE AND EMPPLOYEES PERFORMANCE
EMOTIONAL INTELLIGENCE:
The ability to monitor
one's own and other people's emotions, to discriminate
between different emotions and
label them appropriately, and to use emotional information to guide thinking and behavior.
Emotional Intelligence is the practice
to accept and recognize and understand our own emotions and feelings, including their impact on ourselves and
other people and to utilize this knowledge to refine our own behaviors
as well as to handle our relationship with others. It is fundamentally
the ability for identifying our own feelings and those in others, for
encouraging ourselves, for handling and managing feelings and emotions rightly
in us and in our relationships. The term ‘emotional’ in emotional intelligence
is used broadly to refer to moods as well as emotions. Emotional intelligence
essentially describes the ability to effectively join emotions and reasoning,
using emotions to facilitate reasoning and reasoning intelligently about
emotions (Mayer & Salovey, 1997).(George, 1996; Tellegen,
1985).Goleman (1997) and Higgs, (2000) believes that emotional intelligence is
about knowing what you are feeling and being able to handle those feelings without
having them swamp you. So basically;
“Emotional
Intelligence is the intelligent use of Emotions.”
·
EMPLOYEES
PERFORMANCES:
The job related activities expected of a worker and how well those activities were executed.
Performance is an individual output in terms of quality and quantity expected from every employee in a particular job. On a very general level employee’s performance can be defined as “all the behaviors employees engage in while at work” (Jex2002). However, this is a rather vague description. More commonly, employee performance refers to how well someone performs at his or her work. Definitions range from general to specific aspects and from quantitative to qualitative dimensions.
Performance is an individual output in terms of quality and quantity expected from every employee in a particular job. On a very general level employee’s performance can be defined as “all the behaviors employees engage in while at work” (Jex2002). However, this is a rather vague description. More commonly, employee performance refers to how well someone performs at his or her work. Definitions range from general to specific aspects and from quantitative to qualitative dimensions.
Sunday, 18 February 2018
Effects of Social media
Effects of Social media
Social media and social networking seems to play an imperative part of people lives around the world. There are some who debate whether it is improving or crippling communication skills. Sitting behind a computer communicating with cyber friends can be easy and fun but can weaken a person's verbal communication
skills. According to various research studies in the field of online social
networks, it has been revealed that these sites are impacting the lives of the
youth greatly. With the many rapid advances being made in technology and the
internet, people express concern for the future of society as a whole.
Many
people argue that theoretically, social media is having a negative impact on
youth (typically teenagers) by decreasing the amount of social interaction,
whereas others are in disbelief of the “decreasing” amount of social
interaction amongst youth. Self-identities play a big role in social
interaction, yet a person’s self-identity is partially derived from social
media. One’s self-identity is developed by self-awareness and gaining feedback
on achievements. With the recent invention of social media, people are
tending to base their identities solely off of the latest trends over social
media, and the blatant image of the “perfect person” that has undermined every
positive self-images of oneself. Whether it is “the perfect body-image” or “the
perfect personality” being propelled towards people, many people feel
the lack of confidence which degrades their self-image.
Before social media’s
existence, many people lacked these degrading feelings of self-image, yet the
tide has turned. Society is now incessantly veered to the prominent teaching
that self-image is the very basis of humans, and if one has an inferior
self-image, that person is inferior to society. Subsequently, there becomes a
loss of identity when one becomes wrapped up in “all the hype” on supposedly
Facebook or Instagram. Society as a whole is not perceiving the detrimental
outcome of the negative brainwashing social media can have on people. Society
has simply become immune to popular influences and believes that the way of
popular self-image pertains to what each individual’s self-image should be.
“Self-identity is no longer self-identity, meaning derived from the self, but
rather is an identity projected onto us by popular culture and in no way an
accurate reflection of who we really are” (Taylor). When using these sites such
as Twitter, Facebook or MySpace, there are both positive and negative effects
on the youth. Websites such as Facebook makes communication with others an easy
task. Facebook improved communication and even made communication a better
experience. Facebook allow people to share photos, post comments, and view
people’s personal information. With almost 500 million users’ accounts,
facebook is considered to be one of the most popular social media websites;
most of the people use it as a substitute for real life human interaction. According to Forbes, there are about 1
billion social media accounts all over the world, these accounts makes almost
all of the countries of the world connected with each other.
Leader and the Leadership
Leadership
basically belongs to the concept of giving inspiration to others. Leadership
does not directly organization, to management but if we take a deep look it’s
all about management. The only difference between leadership and management is
that management mainly focuses on leader characteristics but leadership focus
on sharing and establishment of clear vision. (Kruse, April 9 2009) (Tannenbaum,
2013)
Leadership is the attribute of a leader. It is the ratio of the influence of
leader upon others. It involves in the
balancing of vision of subordinates and all stakeholders. Leadership basic
quality is emotional intelligence that they took themselves in place of others
to get a better idea of the problem and they mainly empathize on managers by
getting their secrets. With the help of empathy, leaders build the link with
others.
The leader is
basically director, who has authority to inspire others to act towards a common
goal. A leader is a person who represents each action of followers. The main
purpose of him or her is that his/her followers achieve a common goal and
during this journey, all should commit to the goal. The leader should be
creative and he should create an encouraging environment as well as encourage
his teams by his developmental skills. Respect the mind of others and their
creativity and try to learn from others. Bring motivation to his coworkers.
Saturday, 17 February 2018
priya varrier new sensation (new video)
Priya Varrier is a model of Malayalam cinema. She is the daughter of prakash the most prominent villain of bollywood cinema. Her videos are becoming viral on social media day by day. Some people are speaking against her and some are in her favor. But we should not degrade anyone or make fun of her abilities. We should appreciate her acting and efforts. Its her choice to be like that.
Tuesday, 6 February 2018
TYPES OF BIOMETRIC AUTHENTICATION
Main types of biometric methods include:
There are many different methods of authentication in a biometric system but these two have more importance as signature dynamics mainly based on the concept of signature identification through signature images but sometimes it also gives wrong report because of different situations and different writing speed. This is mainly applicable to banking applications or highly confidential documents. (htt) Typing patterns is somehow similar to the signature dynamics but a change in a context of keyboard writing as it done on a keyboard the and secure through password and test by speed and patterns. Eye scans include actually iris recognition as well as retina recognition.This technique is inconvenient and more expensive as compared to other methods. Most users are not comfortable with this method and feel uneasy.Iris is the region of the bounded eye with pupil and sclera and the biometric system use a high quality camera to take the scan of iris and avoid to cause any damage as it emits infrared light which is may harmful when using inefficiently. Face recognition method is quite convenient and helpful. It works in recognizing facial features may include lining outside of eye sockets, nose structure and the cheeks lining with side areas of the mouth. Voice identification is basically designed to understand the voice patterns and it's not affected by what is said but only the voice notes.Voice features basically based on the nasal cavities and vocal tracts as well as mouth. Fingerprint verification based on the little physical space and fingerprints are unique and easily accessible. Fingerprints made of valleys and ridges marks and these marks are extracted by the fingerprint verification system for the comparison of marks.
SECURITY IMPLICATIONS IN BIOMETRIC IMPLEMENTATION:
biometric implementations are highly susceptible to security risks in any validation process. As the biometric system is embodied with unique functions so, its necessary that government should take notice of strategic values of the system. (Harinda)Sometimes government commitments are beyond the security steps of biometric implementations like in some countries government allowed stakeholders of big industries to verify the data of there customers from government biometric database before allowing any other services. Biometric implementations come up with many security risks and imposed big responsibility to handle the individual information. The main thing is that the system is quite efficient but the technology concern with unwanted privacy. Some of the experts alarm that sometimes biometric information shows the way to break of freedom of any person and the basic rights of an individual. Once there is all biometric information of an individual than the person has increased significant concerns. different privacy threats contain the utilization of biometrics for any person verification.
- signature dynamics
- Typing patterns
- Eye scans
- face recognition
- voice identification
- fingerprint verification
There are many different methods of authentication in a biometric system but these two have more importance as signature dynamics mainly based on the concept of signature identification through signature images but sometimes it also gives wrong report because of different situations and different writing speed. This is mainly applicable to banking applications or highly confidential documents. (htt) Typing patterns is somehow similar to the signature dynamics but a change in a context of keyboard writing as it done on a keyboard the and secure through password and test by speed and patterns. Eye scans include actually iris recognition as well as retina recognition.This technique is inconvenient and more expensive as compared to other methods. Most users are not comfortable with this method and feel uneasy.Iris is the region of the bounded eye with pupil and sclera and the biometric system use a high quality camera to take the scan of iris and avoid to cause any damage as it emits infrared light which is may harmful when using inefficiently. Face recognition method is quite convenient and helpful. It works in recognizing facial features may include lining outside of eye sockets, nose structure and the cheeks lining with side areas of the mouth. Voice identification is basically designed to understand the voice patterns and it's not affected by what is said but only the voice notes.Voice features basically based on the nasal cavities and vocal tracts as well as mouth. Fingerprint verification based on the little physical space and fingerprints are unique and easily accessible. Fingerprints made of valleys and ridges marks and these marks are extracted by the fingerprint verification system for the comparison of marks.
SECURITY IMPLICATIONS IN BIOMETRIC IMPLEMENTATION:
biometric implementations are highly susceptible to security risks in any validation process. As the biometric system is embodied with unique functions so, its necessary that government should take notice of strategic values of the system. (Harinda)Sometimes government commitments are beyond the security steps of biometric implementations like in some countries government allowed stakeholders of big industries to verify the data of there customers from government biometric database before allowing any other services. Biometric implementations come up with many security risks and imposed big responsibility to handle the individual information. The main thing is that the system is quite efficient but the technology concern with unwanted privacy. Some of the experts alarm that sometimes biometric information shows the way to break of freedom of any person and the basic rights of an individual. Once there is all biometric information of an individual than the person has increased significant concerns. different privacy threats contain the utilization of biometrics for any person verification.
BIOMETRIC FOR AUTHENTICATION: (SECURITY AND PRIVACY IMPLICATIONS)
BIOMETRIC FOR AUTHENTICATION: (SECURITY AND PRIVACY IMPLICATIONS)
Biometrics derived from the two Greek words "bios" means life and "metrikos" means measuring. Biometric technologies offer face, fingerprint recognition with more security and convenient than traditional methods. For the purpose of validation and identification, biometric technology is implemented by government sectors mostly usually for fully efficient and effective results. Biometric system is only useful in three possible conditions that when the user know something like identification number(personal) to authenticate, secondly, the user may have some identification card like the smart card and last but not least that user have and fingerprint or any other related physical characteristic.
Biometric system is basically a recognition system that recognizes fingerprints, patterns, face or iris depends on its modules. (Ratha) This system uses to identify either physical appearance or the behavioral characteristics and after identification the result match with the pre-existing data of the same character. For the identification of any person, system will search the whole database for a match.
Biometrics derived from the two Greek words "bios" means life and "metrikos" means measuring. Biometric technologies offer face, fingerprint recognition with more security and convenient than traditional methods. For the purpose of validation and identification, biometric technology is implemented by government sectors mostly usually for fully efficient and effective results. Biometric system is only useful in three possible conditions that when the user know something like identification number(personal) to authenticate, secondly, the user may have some identification card like the smart card and last but not least that user have and fingerprint or any other related physical characteristic.
Biometric system is basically a recognition system that recognizes fingerprints, patterns, face or iris depends on its modules. (Ratha) This system uses to identify either physical appearance or the behavioral characteristics and after identification the result match with the pre-existing data of the same character. For the identification of any person, system will search the whole database for a match.
Thursday, 1 February 2018
Prayer timings in islamabad
Prayer timings in islamabad
Fajjar: 5:39 AM
ZOHAR 12:21 PM
ASSR 4:00 PM
MAGHRIB 5:39 PM
ISHA 7:04 PM
Subscribe to:
Comments (Atom)















