Problem Statement
A pointer in C is a way to share a memory address among different contexts (primarily functions). They are primarily used whenever a function needs to modify the content of a variable, of which it doesn't have ownership.

In order to access the memory address of a variable, val, we need to prepend it with & sign. E.g., &val" returns the memory address of val.

This memory address is assigned to a pointer and can be shared among various functions. E.g. intp=&val will assign the memory address of val to pointer p. To access the content of the memory to which the pointer points, prepend it with a ". For example, p will return the value reflected by val and any modification to it will be reflected at the source (val).
void increment(int *v) {
(*v)++;
}

int main() {
int a;
scanf("%d", &a);
increment(&a);
printf("%d", a);
return 0;
}

You have to complete the function void update(int *a,int *b), which reads two integers as argument, and sets a with the sum of them, and b with the absolute difference of them.
  • a=a+b
  • b=|ab|
Input Format
Input will contain two integers, a and b, separated by a newline.
Output Format
You have to print the updated value of a and b, on two different lines.

P.S.: Input/ouput will be automatically handled. You only have to complete the void update(int *a,int *b) function.
Sample Input
4
5
Sample Output
9
1
Explanation
  • a=4+5=9
  • b=|45|=1HERE BELOW THE SOLUTION
  • TWO POINTERS CAN NEVER BE ADDED BUT CAN BE SUBTRACTED
  • S
  #include
void update(int *a,int *b) { // Complete this function
int r1=*a+*b; int r2; if(*a<*b){ r2=*b-*a; } else r2=*a-*b; *a=r1; *b=r2; }
int main() {
    int a, b;
    int *pa = &a, *pb = &b;
   
    scanf("%d %d", &a, &b);
    update(pa, pb);
    printf("%d\n%d", a, b);

    return 0;
}
THIS IS A QUESTION FROM A WEBSITE .
I M ONLY USE THIS AS FOR EDUCATIONAL PURPOSE ONLY',SO THAT READERS OF MY BLOG ALSO LEARN ABOUT THE SAME CONCEPT.
SREADING KNOWLEDGE
I LIKE THIS QUESTION VERY MUCH . 
 


Keyboard Shorcuts (Microsoft Windows)

1. CTRL+C (Copy)
2. CTRL+X (Cut)3. CTRL+V (Paste)4. CTRL+Z (Undo)5. DELETE (Delete)6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)7. CTRL while dragging an item (Copy the selected item)8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)9. F2 key (Rename the selected item)10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)15. CTRL+A (Select all)16. F3 key (Search for a file or a folder)17. ALT+ENTER (View the properties for the selected item)18. ALT+F4 (Close the active item, or quit the active program)19. ALT+ENTER (Display the properties of the selected object)20. ALT+SPACEBAR (Open the shortcut menu for the active window)21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneou sly)22. ALT+TAB (Switch between the open items)23. ALT+ESC (Cycle through items in the order that they had been opened)24. F6 key (Cycle through the screen elements in a window or on the desktop)25. F4 key (Display the Address bar list in My Computer or Windows Explorer)26. SHIFT+F10 (Display the shortcut menu for the selected item)27. ALT+SPACEBAR (Display the System menu for the active window)28. CTRL+ESC (Display the Start menu)29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)30. F10 key (Activate the menu bar in the active program)31. RIGHT ARROW (Open the next menu to the right, or open a submenu)32. LEFT ARROW (Open the next menu to the left, or close a submenu)33. F5 key (Update the active window)34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)35. ESC (Cancel the current task)36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box - Keyboard Shortcuts

1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts

1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)

MMC COnsole Windows Shortcut keys

1. SHIFT+F10 (Display the Action shortcut menu for the selected item)
2. F1 key (Open the Help topic, if any, for the selected item)
3. F5 key (Update the content of all console windows)
4. CTRL+F10 (Maximize the active console window)
5. CTRL+F5 (Restore the active console window)
6. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
7. F2 key (Rename the selected item)
8. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote Desktop Connection Navigation

1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
2. ALT+PAGE UP (Switch between programs from left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Keyboard Shortcuts

1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar)
6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
9. CTRL+P (Open the Print dialog box)
10. CTRL+R (Update the current Web )
SHARE IT WITH YOUR FRIENDS
catenation
#include
#include
void main()
{
int i,l,j=0;
char str1[80],str2[80];
printf("Enter a string");
gets(str1);
printf("Enter another string");
gets(str2);
i=0;
while(str1[i]!='\0')
{  l++;
   i++;
}
for(i=l;str2[j]!='\0';i++)
   {
      str1[i]=str2[j];
      j++;
   }
str1[i]='\0';
puts(str1);
getch();
}
                              compare
#include
#include
main()
{
char a[10],b[10],i=0;
clrscr();
printf("Enter first string:");
gets(a);
printf("Enter second string:");
gets(b);
while((a[i]==b[i])&&(a[i]!='\0')&&(b[i]!='\0'))
 {
   i=i+1;
 }
if(a[i]=='\0'&&b[i]=='\0')
  printf("Both strings are same");
else if(a[i]>b[i])
  printf("a is bigger than b alphabetically");
else
  printf("b is bigger than a alphabetically");
 getch();
}
                         copy
#include
#include
main()
{
char str1[10],str2[10];
int i,length;
clrscr();
puts("Enter first string:");
gets(str1);

for(i=0;str1[i]!='\0';i++)
 {
   str2[i]=str1[i];
 }
 str2[i]='\0';
 puts("Copied string is :");
 puts(str2);
 getch();
 }
                  string length
       #include
       #include
       main()
       {
       char a[50],i,length=0;
       clrscr();
       printf("Enter a string:");
       scanf("%s",a);
       clrscr();
       printf("String entered by you is : %s",a);
       printf("\nLength of this string is :");
       i=0;
       while(a[i]!='\0')
       {
length=length+1;
i++;
       }
       printf("%d",length);
       getch();
       }
            iisc code
#include
#include
void main()
{
char str[20];
int i;
printf("Enter string\n");
gets(str);
for(i=0;str[i]!='\0';i++)
{
if((str[i]>='A')&&(str[i]<='Z'))
{
str[i]=str[i]+32; //A->65 ,a->97
}
}
printf("Converted string is :");
puts(str);
getch();
}
                           string palidrome
#include
#include
void main()
{
char str[20];
int i,j,len,flag=0;
printf("Enter string\n");
gets(str);
for(i=0;str[i]!='\0';i++)
len=i;
i=0;
j=len;

//for(i=0,j=len;i=0;i++,j--)
while(i<=j)
{
if(str[i]!=str[j])
{
flag=1;
break;
}
i++;
j--;
}
if(flag==0)
printf("String is palindrome");
else
printf("String is not palindrome");
getch();
}
                      reverse
#include
#include
#include
main()
{
char str1[10],str2[10];
int i,j,length=0;
clrscr();
puts("Enter string to reverse");
gets(str1);
j=0,i=0;
while(str1[i]!='\0')
{
  length++;
  i++;
}
for(i=length-1;i>=0;i--)
 {
    str2[j]=str1[i];
    j++;
 }

    str2[j]='\0';

puts(str2);
getch();
}
                       search

#include
#include
void main()
{
char str1[80],str2[10];
int l1,l2,i,j,s=0;
clrscr();
puts("Enter a string:");
gets(str1);
puts("Enter search substring:");
gets(str2);
l1=strlen(str1);
l2=strlen(str2);
for(i=0;i<l1;i++)
{
   for(j=0;j<l2;j++)
{
if(str1[i+j]==str2[j])
    {
                s=s+1;
    }

else
break;
}
if(s==l2)
printf("String found ");
}
getch();

}
                        sorting
#include
#include
#include  
void main()
{
 char name[10][8],temp[8];
int i, j, N;
  clrscr();  
printf("Enter the value of N\n");
scanf("%d", &N);  
printf("Enter %d names\n", N);
for(i=0; i< N ; i++)
{
scanf("%s",name[i]);
}
for(i=0; i < N-1 ; i++)
{
 for(j=i+1; j< N; j++)
  {  
if(strcmpi(name[i],name[j]) > 0)
{
 strcpy(temp,name[i]);
 strcpy(name[i],name[j]);
 strcpy(name[j],temp);
}
  }
}
printf("Sorted names\n");
for(i=0; i< N ; i++)
{
printf("%s\n",name[i]);
}
getch();
}
                     string sort
#include
#include
#include
void main( )
{
    char s[20],t;
    int i,j,l;
    clrscr( );
    printf("\n Enter a string to sort");
    gets(s);
    l=strlen(s);
    for(i=0;i<l-1;i++)
    {
       for(j=0;j<l-i-1;j++)
       {
          if(s[j]>s[j+1])
          {
             t=s[j];
             s[j]=s[j+1];

             s[j+1]=t;
          }
        }
     }
     printf("\n Sorted string is");
     puts(s);
     getch( );
}

operations on string

sstr operations

#include
#include
#include
void main()
{
int i,b;
char str1[80],str2[80];
printf("Enter a string");
gets(str1);
printf("Enter another string");
gets(str2);
if(strstr(str1,str2)==NULL)
printf("Not Found");
else
printf("found");
getch();
}
conversion lower to upper
#include
#include
#include
void main()
{
char str[20];
int len;
printf("Enter first string\n");
gets(str);
len=strlen(str);
printf("Length of string is %d\n",len);
printf("Upper case transformation is : \n");
puts(strupr(str));
printf("Lower case transformation is : \n");
puts(strlwr(str));
printf("Reverse is : \n");
puts(strrev(str));
getch();
}
string copy
#include
#include
#include
void main()
{
char ori[20],dup[20];
int i ;
printf("Enter string");
gets(ori);
strcpy(dup,ori);
puts("Original string is ");
puts(ori);
puts("Duplicate string is ");
puts(dup);
getch();
}
  string comparison
#include
#include
void main()
{
int i,b;
char str1[80],str2[80];
printf("Enter a string");
gets(str1);
printf("Enter another string");
gets(str2);
if(strcmp(str1,str2)==0)
   printf("Strings are equal");
else
   printf("Strings are not equal");

getch();
}
STRING USES FOR DISPLAYING  CITIES NAMES:-

#include "stdafx.h"
#include "iostream"
#include "conio.h"
using namespace std;
void main()
{
      char city[5][30];
      int i;
      for(i=0;i<5;i++)
      {
            cout<<"Enter city name";
            cin>>city[i];
      }
      for(i=0;i<5;i++)
            cout<<city[i]<<endl;
      getch();

}


COMPARISON OF TWO STRINGS:-


#include "stdafx.h"
#include "iostream"
#include "conio.h"
#include "string.h"
using namespace std;
void main()
{
      char str1[60],str2[60];
      int r;
      cout<<"Enter first string:";
      cin.getline(str1,60);
      cout<<"Enter the second string:";
      cin.getline (str2,60);
      r=strcmp(str1,str2);
      if(r<0)
            cout<<"string 1 is less than string 2";
      else if(r==0)
            cout<<"string 1 is equal to string 2";
      else
            cout<<"string 1 is greater than string 2";
      getch();
}

COPYING OF TWO STRINGS:-




// sob1.cpp : Defines the entry point for the console application.
//


#include "stdafx.h"
#include "iostream"
#include "conio.h"
#include "string.h"
using namespace std;
void main()
{
      char str1[80]="i love programming";
      char str2[80]="i am professional programmer";
      cout<<"str1 =";
      puts(str1);
      cout<<"str2 =";
      puts(str2);
      strcpy(str1,str2);
      cout<<"\nAfter strcpy(str1,str2)...\n";
      cout<<"str1 =";
      puts(str1);
      cout<<"str2 =";
      puts(str2);
      getch();
}

I actually started off majoring in computer science, but I knew right away I wasn't going to stay with it. It was because I had this one professor who was the loneliest, saddest man I've ever known. He was a programmer, and I knew that I didn't want to do whatever he did. So after that, I switched to Communications.

J. Cole

My background was computer science and business school, so eventually I worked my way up where I was running product groups - development, testing, marketing, user education.

Melinda Gates

BusinessEducationScience

I think the combination of graduate education in a field like Computer Science and the opportunity to apply this in a work environment like Microsoft is what drove me. The impact these opportunities create can lead to work that has broad, worldwide impact.

Satya Nadella

WorkEducationScience

The rise of Go ogle, the rise of Face book, the rise of Apple, I think are proof that there is a place for computer science as something that solves problems that people face every day.

Eric Schmidt

ScienceFaceProblems

When people think about computer science, they imagine people with pocket protectors and thick glasses who code all night.

Marissa Mayer

ComputersScienceNight

Even when I was studying mathematics, physics, and computer science, it always seemed that the problem of consciousness was about the most interesting problem out there for science to come to grips with.

David Chalmers

ScienceProblemPhysics

Computer science is no more about computers than astronomy is about telescopes.

Edsger Dijkstra

ComputersScienceComputer

People think that computer science is the art of geniuses but the actual reality is the opposite, just many people doing things that build on each other, like a wall of mini stones.

Donald Knuth

ArtScienceReality


 

 Introduction “Malware” are programs or parts of programs that have a malicious ( “Mal” ) or unpleasant effect on your computer security. This covers many different terms that you may have heard before, such as “Virus”, “Worm” and “Trojan” and possibly a few that you haven't like “Rootkit”, “Logicbomb” and  “Spyware”. This lesson will introduce, define and explain each of these subdivisions of malware, will give you examples, and will explain some of the countermeasures that can be put into place to restrict the problems caused by malware.
Viruses (Virii)
 Introduction Virus – this is the most common type of malware that people will be aware of. The reason that it is known as a virus, rather than anything else, is historical. The press ran the stories of the first computer virus at the same time as articles concerning the spread of AIDS. At the time, there were simple parallels that could be easily drawn between the two, propagation through interaction with a contaminated party, the reliance on a host and the ultimate “death” of anything infected. This resulted, and still does occasionally, in concerns that people could become “infected” with a computer virus.
 Description Viruses or virii are self-replicating pieces of software that, similar to a biological virus, attach themselves to another program, or, in the case of “macro viruses”, to another file. The virus is only run when the program or the file is run or opened. It is this which differentiates viruses from worms. If the program or file is not accessed in any way, then the virus will not run and will not copy itself further. There are a number of types of viruses, although, significantly, the most common form today is the macro virus, and others, such as the boot sector virus are now only found “in captivity”.
 Boot Sector Viruses The boot sector virus was the first type of virus created. It hides itself in the executable code at the beginning of bootable disks. This meant that in order to infect a machine, you needed to boot from an infected floppy disk. A long time ago, ( 15 years or so ) booting from floppy was a relatively regular occurrence, meaning that such viruses were actually quite well spread by the time that people figured out what was happening. This virus ( and all other types ) should leave a signature which subsequent infection attempts detect, so as not to repeatedly infect the same target. It is this signature that allows other software ( such as Anti-Virus-software ) to detect the infection.
 The Executable File Virus The Executable File virus attaches itself to files, such as .exe or .com files. Some viruses would specifically look for programs which were a part of the operating system, and thus were most likely to be run each time the computer was turned on, increasing their chances of successful propagation. There were a few ways of adding a virus to an
5
  MALWARE
executable file, some of which worked better than others. The simplest way ( and the least subtle ) was to overwrite the first part of the executable file with the virus code. This meant that the virus executed, but that the program would subsequently crash, leaving it quite obvious that there was an infection – especially if the file was an important system file.
 The Terminate and Stay Resident (TSR) Virus TSR is a term from DOS where an application would load itself into memory, and then remain there in the background, allowing the computer to run as normal in the foreground. The more complex of these viruses would intercept system calls that would expose them and return false results - others would attach themselves to the 'dir' command, and then infect every application in the directory that was listed – a few even stopped ( or deleted ) Anti-Virus software installed onto the systems.
 The Polymorphic Virus Early viruses were easy enough to detect. They had a certain signature to identify them, either within themselves as a method to prevent re-infection, or simply that they had a specific structure which it was possible to detect. Then along came the polymorphic virus. Poly – meaning multiple and morphic – meaning shape. These viruses change themselves each time they replicate, rearranging their code, changing encryption and generally making themselves look totally different. This created a huge problem, as instantly there were much smaller signatures that remained the same – some of the “better” viruses were reduced to a detection signature of a few bytes. The problem was increased with the release of a number of polymorphic kits into the virus writing community which allowed any virus to be recreated as a polymorph.
The Macro Virus The Macro Virus makes use of the built-in ability of a number of programs to execute code. Programs such as Word and Excel have limited, but very powerful, versions of the Visual Basic programming language. This allows for the automation of repetitive tasks, and the automatic configuration of specific settings. These macro languages are misused to attach viral code to documents which will automatically copy itself on to other documents, and propagate. Although Microsoft has turned off the feature by default now on new installations, it used to be that Outlook would automatically execute certain code attached to e-mails as soon as they were read. This meant that viruses were propagating very quickly by sending themselves to all of the e-mail addresses that were stored on the infected machine.


 LESSON 6 – MALWARE
statistics regarding your web surfing, or it might be your credit card number. Some pieces of spyware blow their cover by rather irritatingly popping up advertisements all over your desktop.

8

Anti-Virus Anti-Virus-software is available in many commercial and Open Source versions. These all work following the same method. They each have a database of known viruses and they will match the signatures of these against the files on the system to see if there are any infections. Often though, with modern viruses, these signatures are very small, and there can often be false positives  - things that appear to be viruses that are not.  Some virus scanners employ a technique known as heuristics, which means that they have a concept of what a virus “looks like” and can determine if an unknown application matches these criteria. Recently AntiVirus software has also crossed the boundary into Host Based Intrusion Detection, by keeping a list of files and checksums in order to increase the speed of scanning.
NIDS Network intrusion detection is similar to AntiVirus software.  It looks for a particular signature or behavior from a worm or virus. It can then either alert the user, or automatically stop the network traffic carrying the malware.
9
 MALWARE
HIDS Host based Intrusion Detection systems, such as Tripwire, are capable of detecting changes made to files. It is reasonable to expect that an application, once it is compiled, should not need to change, so watching various aspects of it, such as its size, last modification date and checksum, make it instantly obvious that something is wrong.
 Firewalls Worms propagate across the network by connecting to vulnerable services on each host. Apart from ensuring that none of these vulnerable services are running, the next best thing is to ensure that your firewall does not allow connections to these services. Many modern firewalls will provide some form of packet filtering similar to a NIDS which will rule out packets matching a certain signature.  (Firewalls are discussed in more detail in section 7.1.2).
 Sandboxes The concept of a sandbox is simple. Your application has its own little world to play in and can't do anything to the rest of your computer. This is implemented as standard in the Java programming language, and can also be implemented through other utilities such as chroot in Linux. This restricts the damage that any malware can do to the host operating system by simply denying it the access required. Another option is to run a full machine inside a machine using a virtual machine product such as VMWare. This isolates the virtual machine from the host operating system, only allowing access as defined by the user. Example – http://www.vmware.com – VMWare virtual machines
Exercises:
1. Matching Game: Research each of the following and match it to the type of countermeasure that it is: 1. http://www.vmware.com NIDS 2. http://www.tripwire.org Antivirus 3. http://www.snort.org Firewalls 4. http://www.checkpoint.com Sandboxes 5. http://www.sophos.com  HIDS 2. Research Spybot Search and Destroy and determine what type of malware it protects your computer again. 3. Research how NIDs  and HIDS works. 4. Research Firewall solutions on the net. 5. Look up “chroot” on the internet. Read about this type of “jail” or “sandbox”. 

WHAT IS THE NEED OF CHANGE SYSTEM ADMINISTRATION NAME

actually when some legally run any command in the pc a log file is created in the system folder of c driver .when some one tries to hack your pc it simply "bypass" the way to create a log file in your system .in this way he dont left anyfoot print behind his work.

what happen when hacker hack your pc .he simple directly target your system administration by default its is "sa" so that he can acces your pc directly from his computer over the network.
thats y it is important to change your system administration name .

How to Find or Change My Computer's Administrator

In Windows, an administrator account has full control over the computer’s files, systems, and settings. As a result, only trusted users should have administrator privileges. Administrators can create new administrative accounts or revoke privileges from users. However, if you ever need to find or change your computer's administrator settings, it is easy to do so; just make sure that the account you're working from has administrator privileges as well.
Ad

Method 1 of 2: Windows 7 and Vista

  1. Find or Change My Computer's Administrator Step 1 Version 4.jpg
    1
    Go to Start.
    Ad
  2. Find or Change My Computer's Administrator Step 2 Version 4.jpg
    2
    Select Control Panel
  3. Find or Change My Computer's Administrator Step 3 Version 4.jpg
    3
    Set the view to small icons.
  4. Find or Change My Computer's Administrator Step 4 Version 4.jpg
    4
    Go to User Accounts.
  5. Find or Change My Computer's Administrator Step 5 Version 4.jpg
    5
    Click "Manage Another Account".
  6. Find or Change My Computer's Administrator Step 6 Version 4.jpg
    6
    Select the account you want to manage.
  7. Find or Change My Computer's Administrator Step 7 Version 4.jpg
    7
    Click "Change account type".
  8. Find or Change My Computer's Administrator Step 8 Version 4.jpg
    8
    Tick the administrator option.
  9. Find or Change My Computer's Administrator Step 9 Version 4.jpg
    9
    Click "change account type" to implement the changes.
    Ad

  1. Find or Change My Computer's Administrator Step 10 Version 4.jpg
    1
    Find the My Computer icon on your desktop.
  2. Find or Change My Computer's Administrator Step 11 Version 4.jpg
    2
    Right-click the icon and select Manage. This will bring up the Computer Management window.
  3. Find or Change My Computer's Administrator Step 12 Version 4.jpg
    3
    Expand Local Users and Groups by clicking the + to the left.
  4. Find or Change My Computer's Administrator Step 13 Version 4.jpg
    4
    Click Groups. You will see headings for Administrators, Guests, Power Users, and so on.
  5. Find or Change My Computer's Administrator Step 14 Version 2.jpg
    5
    Double-click on Administrators. This brings up a list of all the administrators on your machine. If you have administrative access to this computer, you should be able to change the settings in this menu.
  6. Find or Change My Computer's Administrator Step 15 Version 2.jpg
    6
    Click on Add to designate a new administrator. This will open a new window.
  7. Find or Change My Computer's Administrator Step 16 Version 2.jpg
    7
    Type in the name of the account you wish to add, and click Check Names.The name should now be underlined. Click OK to close this window and save your settings.
  8. Find or Change My Computer's Administrator Step 17 Version 2.jpg
    8
    Remove an administrator. To remove an administrator, highlight the target account and click the Remove.
    • If you wish to retain your own administrative rights, make sure not to delete your account from this list.
  9. Find or Change My Computer's Administrator Step 18 Version 2.jpg
    Edit step
    9
    Save your changes. If the settings for your account haven't been changed, there is no need to reboot. Otherwise, log out and back in again to save the settings
ENUMRATION
#include
#include
enum Days {Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday};
main()
{
      enum Days Today = Sunday;
      switch(Today)
      {
                   case 0:
                         cout<<"its sunday";
                         break;
                   case 1:
                         cout<<"its monday";
                         break;
                         default:
                                 cout<<"not monday";
                                 }
                                 getch();
                                 }
UNION
#include
#include
main()
{
struct stu1
      {
     
    //  int roll;
      float marks;
      char name[20];
      }d1 ;
     

union abc
      {
     
 //  int roll;
    float marks;
      char name[20];
      }d ;
     
      

 //  cout<<"enter the roll number";
//  cin>>d1.roll;
     cout<<"enter ur marks";
     cin>>d1.marks;
     cout<<"enter name";
     cin>>d1.name;
      cout<<endl; 

//  cout<<"enter the roll number";
//  cin>>d.roll;
     cout<<"enter ur marks";
     cin>>d.marks;
      cout<<"enter name";
     cin>>d.name;
     cout<<endl;
     cout<<"sizeof(d1)is"<<sizeof(d1);
      cout<<"\n";
      cout<<"sizeof(d)is"<<sizeof(d);
      getch();
      }
//*Function returning a Structure */
    #include
    #include
    struct student
    {
        int student_roll_no ;
        int marks_in_subject1 ;
        int marks_in_subject2 ;
    } ;
     main ()
    {
        struct student function ()  ;
        struct student t ;
        float result ;
       
        t = function () ;
    cout<<"Student Record : \n";
    cout<<"Roll Number    : "<<t.student_roll_no;
    cout<<"Subject 1 marks  : "<< t.marks_in_subject1 ;
    cout<<"Subject 2 marks : "<< t.marks_in_subject2 ;
    getch () ;
    }
    struct student function ( )
    {
        struct student s1 = { 3032, 89, 78 } ;
        return ( s1 ) ;
    }

ASSIGNMENT AND POINTER
#include
#include
main()
{
      struct abc
      {
      int roll;
      float marks;
      };
      abc d,d1;
       abc* d2;
d2=&d;
  cout<<"enter the roll number";
  cin>>d.roll;
     cout<<"enter ur marks";
     cin>>d.marks;
    // d1=d;
     cout<<d2<<endl;
   
    cout<roll<<"      "<marks;
      getch();
      }

 STRUCTURE WITH ARRAY
#include
#include
main()
{
      struct abc
      {
             int roll[10];
             float marks[10];
             }d;
            
             for(int i=0;i<10;i++)
             {
                     cout<<"enter the oll number";
                     cin>>d.roll[i];
                     cout<<"enter the marks";
                     cin>>d.marks[i];
                     }
                     for(int i=0;i<10;i++)
             {
                     cout<<d.roll[i]<<" "<<d.marks[i]<<"\n";
                     }
                     getch();
                     }