Die Motivation Der Hausarbeit Tagebücher

Die Prinzipien der Motivation der Hausarbeit, Dass Sie in der Lage zu Nutzen, Ab Heute

Es gibt nichts Schöneres als ein Wettlauf gegen die Zeit, um dich zu etwas herauszufordern! Der Schlüssel ist, es lustig zu machen (wenn nicht lustig, dann zumindest lohnend), so dass Sie einen schönen starken Anreiz haben, einleitung hausarbeit schreiben es zu tun. Binden Sie Ihre Kinder ein, stellen Sie einen Timer ein und machen Sie Musik. Ihr könnt eine Vereinbarung treffen, um das Haus aufzuräumen, und wenn ihr das alles getan habt, werdet ihr alle am Ende des Monats ausgehen, um einen All-Girls-Abend zu verbringen. Als Variation des Belohnungssystems könnten Sie vielleicht sogar Freunde mit denselben Problemen dazu bringen, Sie und einander zu motivieren. Sobald Sie ein paar Freunde in Ihr Haus eingeladen haben, werden Sie den Ort im Grunde selbst sauber machen. Wenn mein Mann zu Hause ist, stecke ich mein Handy in die Gesäßtasche und stecke meine akadem-ghostwriter de Kopfhörer hinein.

Der Anstieg der Motivation Hausarbeit

Wenn Sie Hilfe bei sich haben, wird Ihre Hausarbeit Spaß machen. Wenn Sie ein wenig Hilfe benötigen, können Sie mit dem Erstellen eines Reinigungsplans, den Worksby Chrissy von Organize My House erstellt, beginnen. Einige von Ihnen haben vielleicht kürzlich einen Artikel darüber gelesen, wie Spanien ein Gesetz verabschiedet, wonach Kinder ihre Hausarbeiten erledigen müssen. Keine Sorge, die meisten von uns sind so. Sie könnten sogar einige neue Ideen und Perspektiven bekommen, und Sie könnten sich sogar in die Reinigung und Dekoration Ihres Hauses verlieben. Klingt albern, aber es funktioniert WIRKLICH! Sorgen Sie für Ordnung in Ihrer Wäsche, damit Sie keine Wäschestapel mehr haben.

Was auch immer Sie Ihnen Erzählt Motivation Hausarbeit Ist absolut Falsch…Und Hier ist Warum

Wenn es Ihnen wie mir schwerfällt, die Motivation zum Reinigen zu finden, versuchen Sie, sich auf jeweils einen Raum zu konzentrieren. Wenn Sie Schwierigkeiten haben, die Motivation zu finden, das Haus sauber zu machen, versuchen Sie, die Unordnung zu beseitigen. Es gibt so viele Perspektiven auf die Natur Gottes wie es Menschen gibt. Vielleicht ist es so komplex und facettenreich, dass jede Sicht auf Gott einen Aspekt des komplexen Ganzen beschreibt. Oder vielleicht ist es tatsächlich durch unsere Überzeugungen definiert. Alles, was er tun ghostwriter masterarbeit muss, ist sein Leben für den Präsidenten zu geben. Möge die Welt freundlich zu Ihnen sein, und mögen Ihre eigenen Gedanken sich selbst gegenüber sanft sein.

The Most Overlooked Fact About Quantum Mechanics for Dummies Uncovered

There are lots of famed scientists that are liable for the evolution of quantum physics. These two are essay capital the most critical fields in physics. Put simply, two fermions can’t occupy” the precise same state.

Keep in mind, you want to make her happy. Things really begin to acquire hairy as soon as you pause to think of the wider implications of quantum mechanics.

This approach is very vital in the area of quantum chaos. The response would be at the heart of the new area of quantum mechanics. In general, they could result in a better comprehension of nonassociative quantum mechanics.

The Tried and True Method for Quantum Mechanics for Dummies in Step by Step Detail

Additionally, there are various method of interpreting the double-slit experiment. Although, scientific evidence is difficult to measure http://www.phoenix.edu/programs/continuing-education/general-electives/history.html so there isn’t any proof. How the prediction is probabilistic then solely reflects a scarcity of knowledge on the portion of the meteorologist on those ailments.

In the domain of quantum physics, observing something actually influences the bodily processes happening. Entanglement is the concept that in the quantum world, objects aren’t independent if they’ve interacted with one another or come into being through the identical process. Quite simply, the presence of corpuscles accompanied by waves must be assumed in all circumstances.

Through holism, the whole nervous system needs to be involved with each action. No, it’s not true that time only is apparently irreversible, as some claim. In the same manner, the shape of the second does not reveal anything useful in regards to the sort of the first.

The field is not going to really accept energies below a particular threshold. Currently there might be an additional wave function that’s also a remedy to the exact same equation, but describes the particle being in a different part of the box. The precise first case in point is a type of quantum teleportation.

Numerous the new quantum technologies which vary from extremely precise sensors to universal quantum computers require a huge number of quantum bits as a means to exploit the advantages of quantum physics. Therefore, what’s called an observation doesn’t need a human observer, but does require some kind of detector, if it be a film, a photo-detector, or whatever could absorb the photon. Among the fundamental concepts of standard quantum mechanics is the wave feature, which provides the probability of locating a quantum system in a certain state.

Einstein had some vital issues with the area of study for a number of years. This phenomenon can help explain how stars have the capability to remain stable for millions of years. The solution it merely happens to be the one which appears in our Universe.

Do all of the problems including the hard ones and you’ll essay writing help be prepared for advanced QM with a rather strong foothold. It underpins a lot of the technology around us, for example, chip which makes your smartphone so intelligent. In classical mechanics, objects exist in a specific place at a specific moment.

NLP works at the degree of thoughts. It is just a THEORY after all. Entanglement may also supply a nearly uncrackable process of communication.

Effectively, in the event you have to implement reasonable very very good essay writers, then you’ve have got to pick the organization or editor rather meticulously. Berezin’s book is also a fantastic classic. It’s just various language describing the very same mathematical object.

At times you should have the idea at the acceptable time. It may be hard to understand but it’s been shown to be correct time after time. The appropriate way is selected depending on the problem to be solved.

It’s extremely hard to see the quantum effects when large bodies are involved. Accordingly, by measuring one particle, it is possible to even determine the state of the other. Then it becomes a specific particle in a particular space and time.

A wave function may also describe a system of several particles. The interference that produces colored bands on bubbles cannot be explained by means of a model that depicts light for a particle. Thus, it takes just a very small quantity of heat energy in the system to totally randomize the spin orientations.

Quantum Mechanics for Dummies – What Is It?

It’s so famous since it demonstrates lots of the weird phenomena mentioned previously. Our equations need to be analyzed in more detail so as to find out what should happen in the existence of magnetic fields realized inside this context, and how strong the new effects would then be. The behaviour seems to be somewhat strange.

Therefore, there are lots of mathematical models that have the capability to describe particular phenomena particularly devices. Entanglement may also offer a nearly uncrackable system of communication. A remedy to that equation is a wave feature, which describes the form of the wave at each point in time.

Features it offers to a Strong Relationship Seriously isn’t What You Think

Most of us have the experience from heart rest at the time of much of our adolescent or perhaps your life. It’s unavoidable as we move through lifestyle attempting to find a life partner. Rest ups will be difficult and painful even though of the age of and also experienced we tend to think were definitely. We may believe inch I will under no circumstances cure yourself of the excruciating pain”, “I won’t uncover love again”, or they might be think “there’ isn’t a person else round to me personally. inch

The Most Important Component in a Healthy Relationship

As well as to answering this actual question, is usually to where possible get what is now wrong from the romantic relationship to begin with. This is not always an easy task. You might want to stop and think very difficult using what has grown occurring into the romantic relationship. With occupied schedules at present it is easy to neglect a bond and each additional.

Validation is exceedingly tough for many cases. When it is typically a good predicament in which your heart is badly behaved that agreeing to the best offer be a bad method it usually is more complicated. But telling your girlfriend you ought to do consent to the break up and in some cases go along that it can also be a good option is the greatest beginning move you’ve got for your use -especially for anybody who is already thinking on to try and study discovering he or she fiancee previous 5 straight forward measures. Healthier relationship help will emphasize you its hardly ever really across until almost all parties consider it is actually.

mail order bride Because entrepreneurs, Vj and I am aware lots of different entrepreneurs that contain numerous degrees of achieving success. This journey is not really for the light-hearted! It takes people who offers tenacity, fortitude, and fortitude. Dan Sullivan calls him or her self “the instantaneous sensation, few years throughout the making” since it got that miss him to “make it. inch

It can be one thing to suggest I love you, those written text are crucial you hear for both equally involved whether you’re 25 or eighty-five, but displaying it comes really difficult for many all of us. Playing with the girl’s your hair as well as a stable grasp while in the a waist line are equally a handful of refined signs pertaining to men make use of. Women’s have it slightly tougher considering most men’re information of energy which usually foofy thing isn’t going to change us (yeah right we want them too). Snap up his arse! Yeah When i believed it, snap up a offer full meant for entertainment, it all shows benefit and we’d like that every once in awhile. Other pursuits just for females is definitely enjoy with his hair and also head (if the person has non-e), and catching him via behind sleeping that person for his returning is a really efficient showing from emotion. Guys are generally picture to help you use your thoughts to total a lot of areas presently there.

The Struggle on what to Save Ones Marriage

However single? Not certain the reasons why you cannot seem to discover that special someone? Do you carry on go out with after time frame to find your self never reading back with the appointments? There may be a product taking that you’re not tuned in to. Actually it is likely that most people doing an item wrong are pretty much completely nowadays, just like you were carrying out something suitable then you wouldn’t normally be single.

Raising problem who couples currently have happens because they contain stopped perception fascination with your partner. A large amount of the couples I mentor talk about all the wonderful period should they droped in appreciate – an event that brought them strong happiness?ncluding a a number of additional positive emotional baggage. But since rapport develops these kind of feelings destroy and so are changed by irritation, disappointment, disappointment and sometimes positively dislike because of their spouse. In every solitary case of shattered or broken relationship just about every partner can be in cases where this challenge dependes with all the 1 else. The partnership then spirals into electrical power struggle and stagnates on the expended zone (see my site intended for further answers these phases inside the relationship). Vital Factors For https://books.google.com.ua/books?id=xCdcDQAAQBAJ&pg=PT27&lpg=PT27&dq=healthy+relationship+secrets&source=bl&ots=6hdCASlBo9&sig=ACfU3U2GNwwitLuon6v34E0Mbhr6Lfm50Q&hl=ru&sa=X&ved=2ahUKEwin0ea3hPXiAhVypYsKHdhrANMQ6AEwYHoECGEQAQ – The Inside Track

Yet, if regardless of the an individual does, the mother and father are simply in no way able to understand and that means you think you’re up to little or nothing wrong, chances are you’ll needs to move forward by means of what you may think that is certainly proper. Speak to them any truly serious amounts of explain simply just how much you desire that they may could possibly most people. Right at the end of built, you’ll certainly be happy that has a people on condition that that suits you them. So if you think these are definitely well suited for most people, then move forward jointly with your decision being with these. It is far from going to be convenient. But in the event that you can be proper, its certainly gonna be value the cost. And in credited extend of occasion when your folks check out with regard to their own arguments ways happy if you find yourself, they’ll forgive you.

Going a celebration exactly where I believed I had zero selection until somebody stated if you ask everybody simply how much frizzy hair I have on my own venture. I have plenty of hair to compensate three heads. I just also have 5 children when ever some people could be pleased once they would likely have yet one. My point obtain which i did currently have abundance yet I simply isn’t seeing the item. You overly do not have exclusively great components inside human body that happen to be worth like and I just will show you in order to confirm I what I say to you is valid… Develop a list of 10 people a good life. This can certainly include acquaintances, close family or people you receive. Put in writing what you may appreciate about these folks… find a little something. Now check during this list. Do you know that you might not likely see anything in some other individual when ever it are not an important part of you? What we discover in others is usually but a reflection in who we all truly are. Look again too list and listen to if perhaps any factors are generally not likewise in the human body. They are really there however you solely hadn’t realize these products yet.

We tend to chase around in search of the idea out right now there worldwide, with him, within their, from this cash, as achieving success. Funny matter, all that going after around should get us no place. And we live bowed and bended feasible same exact feeling, the main one we live so very no stranger to: emptiness with a measure of futility increased too.

File Folder Locker

                        File Folder Locker

Authors:

Raihanoor Farid(170218)

Ahsanul Haque(170223)

Mostaq Ahmed Polok(170232)

Ashiquer Rahman Naim(170238)

Computer Science and Engineering Discipline,

Khulna University

11th  November 2018

 

File Folder locker is used to hide personal folder of user.

 

We made this project using C programming language. We used file to hide information.

First, we use string to store the path of the folder that we want to hide.in our code there are three functions.

They are

1.Setcolour()

2.Lockfolder()

3.Unlockfolder()

 

Description of the function

 

1.Setcolour();

This function is used to set the colour of the text of our code.We use different colour in our code using different integer value. If we pass the value in setcolour function the function set different colour of the text.

 

2.Lockfolder();

This function is used to lock the folder. First it takes the path of the folder, that we want to hide.Then it stores the path in other palce and delete the path from the directory. So,the folder is locked.

 

3.Unlockfolder();

This function is used to retrieve the folder that we have locked.This takes the path and make new path for it and the folder is accessable again.

 

 

 

LINK OF THE CODE IS GIVEN BELOW

https://drive.google.com/file/d/1K3aiEb2Od06hiS7SJoYbwpR1txeaBi8H/view?fbclid=IwAR33TBz8CNE7_t0Q7FhEcsHAlvPi1HUZecZDQw65r21pDcUFV-3xX6Zj1ks

 

Student report card

                                                                       Student report card

Anika Asfi,Rownok Jahan Silvy,

Nakshi Saha and Al Amin Shaikh

Computer Science and Engineering Discipline,

Khulna University

Khulna,Bangladesh

 

 

Introduction: Student report card provides us with the information about a student’s name, student id with the marks and gpa etc.

 

We made this project using C programming language. We used file to store the information of the students.

Reference: http://mini-projects-in-c.blogspot.com/2011/04/student-report-card.html

 

Explanation: First, we use structure to store the information in our code. Struct student st. for every case we input the name roll and the marks of 3 subject. For this we just collected 3 subject numbers. We used input to take the desired input from the user if the user wishes to see the data they just simply call displayall() function. Inside input function we called gradecalculation() function to calculate the desired grade after that we appended the structure to the file. When user wants to see the output simply call the displayall() function which will show the total entry with grade and gpa. We used a standard library <stdlib> header . This header gives us a function called system. Using this function we send a string parameter “cls” which tells the programme to clear the screen we used student.txt file to store the data we  created a structure and saved the structure in the student.txt file . when we need to show the data we simply retrieve the data from the txt file.

 

How to run: while running the code user will be asked if he wants to see the result menu or entry or to exit using entry he will store the information of students using writestudent function and user will be shown information with grade and details when user goes to result menu

 

ALL THE CODE AND PIC ARE GIVEN BELOW:

https://drive.google.com/open?id=1uwJy7l8o-5-L-I5eCFFRTxfCixY9cEIL

source code link: https://github.com/nakshisaha/project_1c-/blob/master/student%20report%20card

Written By:

1.Anika Asfi (Student ID: 170224)

2.Rownok Jahan Silvy (Student ID: 170234)

3.Nakshi Saha(Student ID: 170236)

4.Al Amin Shaikh (Student ID :160229)

 

 

WHO WILL BE THE MILLIONAIRE (Using File Directory)

C Project

Who Will Be The Millionaire

(Using File Directory)

 

Authors:

Nafisa Binta Tofayel (180205)

Jawadul Islam (180213)

Musfiq Rahman (180214)

Jannatul Ferdous (180215)

Mukit Hasan Pranto (180224)

 

Computer Science and Engineering Discipline,

Khulna University.

28 October 2018.

Indroductry

C is an inevitable part of coding. Most of us who wants to learn programming as a beginner, starts by learning C. Mini projects like creating games or applications is always fun and challenging for a beginner programmer who completed learning the core parts of C language. The game “Who Will Be The Millionaire” is inspired by the famous reality show goes with the same name. The source code is not that long, over 400 lines. It is compiled in Code::Blocks IDE with GCC compiler. Various sound effect has been added to this project so in compiler linker settings “winmm” has been added. To help understand the code many comments will be given in the source code.

N.B: This project is created with file directory so other .txt file is as important as the source file.

Click on the link below to directly download the source file along with other important files used in this project.

 

Download Link

Click here to download all the mandatory files needed for this project ->

Download Here

 

 

About This Project

The project on “Who Will Be The Millionaire” is an console application which has no graphics interface. Although various sound effects are used. The unique thing about this game is, it is created mainly by file directory. Total number of 15 questions will be presented in the game and all 15 of them will be randomly selected from 15 files which contains 10 questions each. A total number of 32 .txt files are created. 15 files for questions and 15 files for answer and lastly 2 files for adding and showing records. There are also 3 .wav files created for Intro, right answer and wrong answer background music. The prize pool ladder for 15 questions is as same as the original.

 

 

First of all, to add audio effect “winmm” library need to be added in the compiler linker setting.

https://drive.google.com/file/d/1Y-jdirjYppBNj-e4GbbG9d7BzNTfZxAe/view?usp=sharing

https://drive.google.com/file/d/1dsQrA051uAqgicw_sNaKXKS2Bjk0O7Kt/view?usp=sharing

-+

Gameplay

The game opens in the main menu which has 3 options.

https://drive.google.com/file/d/1g1B0s1beqU2WVaBXJWfoSQRNnlv652Zx/view?usp=sharing

By pressing ‘I’, the introduction window pops up, in which the prize money ladder is explained.

https://drive.google.com/file/d/19fx8yf_awTeGPkFh4VzJdp6nDEPmTB0f/view?usp=sharing

By pressing ‘R’, the previous records for the game shows up.

https://drive.google.com/file/d/1wZU0-MePaFh7V0zt_H-LtyQTkVa9mG0W/view?usp=sharing

By pressing ‘S’, The game of knowledge begins. For every right answer, player will get the rightful amount of prize money and climb up the ladder.

https://drive.google.com/file/d/1_wMdstIwqMRUCDkM-SFkuSZQ5BpR-kBO/view?usp=sharing

But for a wrong answer, the game will be terminated and player will return to the main menu.

https://drive.google.com/file/d/1muORgeRARgA0M0bjavRv1DB1qzAmjWaw/view?usp=sharing

 

 

 

Function Explanation

The functions used in the source code are simple and easy to understand. They are described in the source code with comments.

The following library functions are used:

  1. <stdio.h> – for standard input output
  2. <conio.h> – for console input output
  3. <ctype.h> – for case sensitivity
  4. <time.h> – for generating a random number
  5. <windows.h> – for declaration of all the function especially <MMSystem.h>
  6. <MMSystem.h> – multimedia function for adding multimedia files.

 

The following user defined functions are used:

  1. void open_sector(char question[20], char answer[20]) : This is the most important function. It contains two other functions named as ‘void questions() and ‘void answer_match()’. It opens both the question and answer files in reading mode. After that it calls both the functions.

https://drive.google.com/file/d/1bfZt1LsdD2iY0V8-CcWHDOGxY7Iak2gM/view?usp=sharing

 

  1. void question(): First a random number is generated by using srand(time(0)), rand() and <time.h>. Then it prints a random question with options.

https://drive.google.com/file/d/1yGybPvxAQuF5wcJZaSiVsEUDvhkaNqeq/view?usp=sharing

 

  1. void answer_match(): First an input is taken from the user then it matches with the correct answer. If it doesn’t match the answer then the game will take user to the main menu.

https://drive.google.com/file/d/1W-wbxNXN083NOMPG47uE-K5xg0qtx5cu/view?usp=sharing

 

  1. void add_record(): After every game ends. The name of the player and the prize money is printed in a separated file.

https://drive.google.com/file/d/1Ed9CA6gz6t-knhdObqEFdwHVzP95kIkC/view?usp=sharing

 

  1. void show_record(): It shows the previous records in the console by printing the values from the file.

https://drive.google.com/file/d/15kksc7kcFHJHWkDpnPiFeG92MkiaqDb_/view?usp=sharing

 

Thank you very much.

 

THE END

 

Virus With C

Virus

with C

Authors:

Charles Chayon Mondol (180208)

Abu Dawod Rahman (180216)

Rabiul Hasan Nayan (180234)

Muntaseer Hafiz (180239)

What is a Computer Virus?

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

One of the ideal methods by which viruses spread is through emails – opening the attachment in the email, visiting an infected website, clicking on an executable file, or viewing an infected advertisement can cause the virus to spread to your system. Besides that, infections also spread while connecting with already infected removable storage devices, such as USB drives.

It is quite easy and simple for the viruses to sneak into a computer by dodging the defense systems. A successful breach can cause serious issues for the user such as infecting other resources or system software, modifying or deleting key functions or applications and copy/delete or encrypt data.

There are two types of ways in viruses operate, as soon as they land on a new device they begin replicating, while the second type plays dead until a particular trigger makes the malicious code to be executed. Thereby, it is highly important to stay protected by installing a robust antivirus program.

Presently, the sophisticated ones come with evasion capabilities that help in bypassing antivirus software and other advanced levels of defenses. Subsequently, the polymorphic malware development in the recent times enables the viruses to dynamically change its code as it spreads. This has made the virus detection and identification very challenging.

 

Different Types of Virus:

  • Boot Sector Virus.
  • Web Scripting Virus.
  • Browser Hijacker.
  • Resident Virus.
  • Direct Action Virus.
  • Polymorphic Virus.
  • File Infector Virus.
  • Multipartite Virus.
  • Macro Virus.

Among these types of viruses, we have tried to make some Direct-Action Viruses using only C language.

Here we have made 4 sample Direct-Action Viruses that uses

File directory access to manipulate, delete, copy and as well as making its own replica.

And almost all of them implements the header file dirent.h which enables us accessing through the file directories.

dirent.h

The <dirent.h> header defines the following data type through typedef: DIR. A type representing a directory stream. It also defines the structure dirent which includes the following members: ino_t d_ino file serial number char d_name [] name of entry. The type ino_t is defined as described in <sys/types.h>.

This header file is used in our codes and its library functions like readdir                                                                has been used for various purposes

 

We have created Four Viruses

  • Self-Replicating Virus
  • Copy Virus
  • Memory eater
  • Deleting Virus

All of them are Direct action Virus and they are controllable under certain circumstances.

We have also tested them on Windows operated machines and also in Virtual Box to avoid certain complexity and damage of the machines.

 

Self-Replicating Virus

This virus’s work is to replicate its own executive file in every folder of a partition. For making this virus we will need to work with directory. We need DIR type pointer to access directory and struct dirent type pointer. We will also need to work with strings and dynamically allocate memory. So, we will need stdio.h, stdlib.h, string.h, dirent.h header file.

LINK OF THE CODE IS GIVEN BELOW

https://drive.google.com/open?id=1UaJfmt8XzZpSTEQCEAnObfFZqzKjmTNx&fbclid=IwAR2VT6bTX3_ycBt77Af-rj6VDwAkD9RARx3Erate6Hjf59PA2EQLuEZKhWE

Here we only need to give this virus a path and it will make a copy of its own executive file in each folder including the path folder. Firstly, we need include stdio.h, stdlib.h, string.h, dirent.h header files.

In the main function we have just used a user defined function “replicate_d”. Its return type is “void” and its parameter have a character type pointer. The formal view of this function is: “void replicate_d (char *str1)” We have also used three more user defined function named addstring, copy, fileorfolder. Formal view of these functions is:

char *addstring (char *str1, char *str2)

It takes two-character type pointer as parameter and returns a character type pointer.

  • Its work is to add two strings. The first pointer *str1 points the first string. The second pointer *str2 points the second string. This function just adds these two strings returns the joined string.
  • In this function firstly, we have declared two integer len1 and len2 and assigned the length of the first string and the second string respectively. For doing this we have used “strlen” function.
  • We have declared a character type pointer *str and 3 integer type variable I, j, k;
  • Then we have dynamically allocated memory to *str. For this reason, we need “malloc” function. Malloc function dynamically allocates memory. Here we have allocated (len1+len2+1) numbered character type memory.
  • Then we assigned two strings one after another by using loop and added a null character at the next memory of the last character. And have return the str.

int fileorfolder (char *str)

It takes a character type pointer as parameter and returns an integer.

int copy (char *str)

It takes a character type pointer as parameter and returns an integer. The work of four user defined functions are:

void replicate_d (char *str1)

We have worked with the directory in this function. We have opened the directory with opendir () function and read the file or folder of that directory with readdir () function. If an element is folder then we copy the main executive file in that folder. We have copied the main executive file with copy () function and figured out that element is file or folder with fileorfolder () function. We have used recursion to go through all the folders

int fileorfolder (char *str)

Its work is to let us know if the given string is file or folder. • Firstly, we have assigned the length of the string which the parameter pointer indicates in an integer variable.

  • If the string “.” or “..” the function will return 1 which means we don’t want to copy anything here. So, we have used control statement.
  • Then we have checked the whole string using loop. If we can find ‘.’ character there then the function will return 1. Because it would be a file. It will be a folder if the string doesn’t contain any ‘.’. So, we have controlled this situation in a loop with control statement. If the loop executed completely then it will return 0. That means the string is a folder as it doesn’t have any ‘.’ character in it.

int copy (char *str)

  • In this function we have declared two FILE type pointers *fp1 and *fp2. We have opened the main executive file with “fopen ()” function and assigned it in fp1. Then we have used the addstring function and added two strings one of which is saved in “str” and another one is “Virus.exe” and assigned the function’s return value into str1. Here “str” is a path. For using “Virus.exe”, this virus copies the same .exe file as the main .exe file of the virus.
  • Then we have opened and created a new file named “Virus.exe” and copied the full fp1 file to fp2.
  • Then we have closed fp2. And used rewind () function so that we can copy the fp1 again.

Thus, this is how the Self-Replicating Virus operates.

 

………………………………………………………………………………………………….

Copy Virus

This Virus’s work is to make a folder in partitions so that the space in drives goes out. We have used stdio.h, string.h, stdlib.h header file.

LINK OF THE CODE IS GIVEN BELOW

https://drive.google.com/open?id=1gE4odRZHaS6AqWSZWysPWjVYoiJNR95B&fbclid=IwAR2vfYauaDQ16uVE35jZeSdejxiaVZb5tMnrvoOyjACKAOTOUY2HbsAfFy4

 

We have used take () user defined function to copy files into C drive, take_d () user defined function to copy files into D drive and take_e () user defined function to copy files into E drive. First, we have copied files into C drive. We can’t just copy file into C drive because windows do not give us permission. So, we have created a folder first there using mkdir () function, then we have copied files there. For D and E drive, we can copy files there so we have not created any folder there. In main function we have taken an array of characters to determine the file name because we cannot make files having same name. The user defined function’s work is to copy a specific file. We have passed the name to the file through the parameter. In the function we have gone through loop where files would be created. Here we have used fopen (), fclose (), rewind () functions to do that.

………………………………………………………………………………………………….

Memory Eater

This virus tests the capacity of operating system of creating folder. We can create folder in our machine because windows provide us that accessibility to do so.

But there a question arises how much?

So, this virus was made to test the fact actually how much indeed how long the windows can offer us to create folders.

So, this simple code starts creating directories by mkdir (char [] s) when it runs the console prints and the directories are made. After sometime like 2-3 sec the device feels a bit laggy and the after that it hangs and disrupts doing the simple commands like closing the program. Though the windows recover when we close it after crashing due to stack overflow

LINK OF THE CODE IS GIVEN BELOW

https://drive.google.com/open?id=1EQCRVZXl-wlSAwWlXblaYUWzThAl5TEF&fbclid=IwAR31ZNxfP8m_7BUkELDEFevvM4ILJlJoiPlIbBwOJunQgLwrRt4mfDYfbzs

here we have a screenshot while running the virus and a window of Task Manager that indicates that the virus consuming the disk space and making CPU deal a heavy load thus, causing lag and hang eventually.

This virus enables us to make infinite directory creating approach which most of the windows versions handle pretty well but faces certain lag during this and lower OS will crash due to stack overflow.

https://drive.google.com/open?id=1wOfNfHgjXM6YiFS1vcZ1OSGg9WgS-BP_&fbclid=IwAR0oqlNwq8IRpZLbDhuox8i2o9013_iQztFGoBb-pwLos8MNP8hytJvQ2Cg

………………………………………………………………………………………………….

Deleting Virus

This virus’s work is to delete the files of the folder including itself where it is stored of a partition. For making this virus we will need to work with directory. We need DIR type pointer to access directory and struct dirent type pointer. We will also need to work with elimination and check availability of file in those directories and being able to open as well as reading those directories. So, we will need stdio.h, stdlib.h, string.h, dirent.h header file.

LINK OF THE CODE IS GIVEN BELOW

https://drive.google.com/open?id=1bvtm6QwPmi0B2PHARl-7J6O8p8-VPAVL&fbclid=IwAR19MBiSRMRTr7X3Y7vwFX4nt0sh_XZqtJjr5Q1IM5_jSR76NuAodmdSo5s

Here we only need to give this virus a path and it will delete all the files and folders of that directory. Firstly, we need include stdio.h, stdlib.h, string.h, dirent.h header files.

Here we have made some user defined functions to make the process easy those are addstring (char *s1, char *s2) , fileOrDir(char* aa) , deelet(char aa[])

char* addString (char *s1, char *s2)

this function returns a string pointer that adds Strings s1 & s2 that are given in the parameter.

  • We have dynamically allocated memory to *str. For this reason, we need “malloc” function. Malloc function dynamically allocates memory. Here we have allocated (len1+len2+1) numbered character type memory.
  • Then we assigned two strings one after another by using loop and added a null character at the next memory of the last character. And have return the str.

int fileOrDir (char* aa)

this function checks the given string whether it’s a file or a directory. Usually it looks for ‘.’ In a string to determine the given string as a file or it will be a directory –

  • It’s work is to let us know if the given string is file or folder. • Firstly, we have assigned the length of the string which the parameter pointer indicates in an integer variable.
  • If the string “.” or “..” the function will return 1 which means we don’t want to copy anything here. So, we have used control statement.
  • Then we have checked the whole string using loop. If we can find ‘.’ character there then the function will return 1. Because it would be a file. It will be a folder if the string doesn’t contain any ‘.’. So, we have controlled this situation in a loop with control statement. If the loop executed completely then it will return 0. That means the string is a folder as it doesn’t have any ‘.’ character in it.

 

 

int deelet (char aa [])

this function does the main part of this code by using the remove (char *s) function to delete the files in other words making the files address to the memory undetectable and returns zero if successful. remove () is a function of stdio.h header file which enables us damaging the files of the selected path and the directory location where the virus is stored.

In this scope we try to open the directory the virus is stored in using opendir () & also apply a recursive way to read the directories through using readdir () if the directory is null then we move forward using addString (bb,” \\”) after that when we find a file while opening the directories we use the remove function that makes the files disappear and after that close the directory using closedir ()

In the main function we just have to copy the path of the virus where it consists and after running the program all the files of the directory will be deleted except the directories.

And surprisingly it happens fast and big amount of data can be deleted within 2-3 secs only. Moreover, the data that are damaged cannot be found in the recycle bin!

Through the execution the virus itself will be deleted by itself after every execution and only the .exe will be available.

We have also upgraded the virus to be able to remove the directories also and avoiding more time complexity the code runs very fast.

LINK TO THE MAIN COPY OF THIS REPORT

https://drive.google.com/open?id=1EajsPzVRkqCmGGVjzx_IHfr43bccVQfu&fbclid=IwAR0OLFG8IZQgayYdFLcQYLwxZwpEA5clNf8RfmaZ8kvzgUtEjrwtF4IbA1k

Caution

  • The following viruses are tested and been proven to do what they are described this long.
  • Please be cautious while trying and executing these programs it can cause unrecoverable damage.
  • It is advised to use Virtual Box to test these Viruses & avoid certain difficulties.

 

 

 

 

 

 

 

 

 

 

MINESWEEPER GAME

Abstract
Minesweeper is a small grid-based game where a player has to identify hidden mines and open all the safe tiles. Players who are bored of staring at the same monitor and willing to play in a different monitor, can try this project game. The game was created by Robert Donner whilst working for Microsoft. The objective of the project is to create a tutoring system that will help the player how to play this game. While playing this game, strategies will be explored and the strategies will help a player to understand the game in an efficient and effective way.

Introduction
The computer game Minesweeper is a game that was made popular by the windows OS. The computer game minesweeper starts the game by showing you blank grid of squares. Some squares conceal mines, the rest are safe. Your task is to work out where the mines are without detonating any of them.

History of Minesweeper
Minesweeper is a single player puzzle game. The origin of the minesweeper game is the earliest mainframe game of the 60’ and 70’ decades. The earliest ancestor of Minesweeper was Jermiac Ratliff’s Cube. This game became more popular amongst puzzle games during 1980’s with the title of ‘Mined-out’ ,’Yomp’ and ‘Cube’.The game of minesweeper that we play now-a-days created for windows.
Robert Donner and Curtis Johnson, who worked for Microsoft, wrote and developed the game for release with the Microsoft Entertainment Pack for Windows 3.1 in 1990. It was then upgraded in 1992 to feature in the in-game pack, replacing Reversi in the process. Versions of Minesweeper are frequently bundled with operating systems and GUIs, including Minesweeper for OS/2, Minesweeper in Windows, KMines in KDE (Unix-like OSes), Gnomine in GNOME and MineHunt in Palm OS.

Game rules
At the beginning of the game, a 2D grid of identically looking tiles (or squares) is presented to the player. The player has to find all the mines and it determines the difficulty of the game. The goal of the game is to set up flags on the tiles that are containing mine. If the player reveals a tile containing a mine, the game will over. To prevent the mine from being exploded player has to set up the flags on all the mines that are possible according to the game rules. At first, the player has to reveal a tile which will show some numbers and that is the clue to find the mines. The number on a particular tile indicates number of possible mines around its adjacent eight tiles.

Code explanation
This game is a C based Minesweeper. To implement this code we used four header files: graphics.h, conio.h, stdio.h, time.h. Including these libraries we got some advantages. By using time.h library we can use srand(time(NULL)) function which helps us to generate random number in every execution. Using graphics.h libarary we get a graphical user interface. From this library we used different types of functions like
• initwindow(): This function initializes the graphics system by opening a graphics window of the specified size. The first two parameters (width and height) are required but all other parameters have default values.
• bar(): This function is used to draw a two dimensional rectangular filled bar which takes four parameters as the co-ordinates of the bar. First two arguments are the starting point and last two arguments are the ending point.
• line(): This function is used to draw a line which takes four parameters as the co-ordinates of the line. First two arguments are the starting point and last two arguments are the ending point.
• setcolor(): This function is used to set the current drawing color to the new color.
• outtextxy(): This function takes three parameters. First two are the co-ordinates and the third parameter is the string or the text we want to display.
• settextstyle(): This function is used to change the way in which text appears. It takes three parameters. First one is font style, second one is direction and third one is text size.
• cleardevice(): This function clears the graphics window.
• setfillstyle(): It sets the current fill pattern and color to new fill pattern and color.
• closegraph(): It closes the graphics mode.

How to play this game
When we run the code a window and console will pop up like shown below:

After pressing “enter” we will see two options: Play and game rules as in the picture:

If we press “space” we will see the game rules.

Press “ESC” to return to main menu.
If we press left key we will see a 6X6 grid which is the main board of the game and on the console we will have to enter a starting point to open a tile.

After entering row and column number, we will see this:

If we want to flag a tile, we will have to select the f mode and after giving the point we will see this output:

If we want to open a tile, we will have to select the o mode and input a point and the output will be like this:

If we want to remove a flag, we will have to select the r mode and input the point where we want to remove the flag.
If we successfully flag all the mines, we will win and we will see this output:
And if we open a tile which contains a mine we will lose and see this

To play this game, download the source code from here

Written By:
Ayasha Hossain Jui (180201)
Maliha Bintay Zaman (180210)
Samia Sharnami (180233)
Umma Habiba Akhey(180237)

Thank you

Ludo game (snake & ladder)

                                  Ludo  game

                              Snake &ladder

 

                           SUBMITTED  BY:

 Student name                                                 id

Md. Mazharul Islam                             (180203)

Rayhain Jobair                                       (180209)

Abid Afsan Hamid                                 (180217)

Sheikh Asif Hasan                                 (180223)

 

 

 

Introduction :

The game of Snakes and Ladders is today considered a classic, and is loved by children from all over the world. Whilst the game itself is known my most people, its origin is less well-known. As a matter of fact, the game of Snakes and Ladders is an ancient Indian invention, and was not played for mere entertainment, but had a philosophical dimension to it as well.

History of the ludo  game(snake & ladder):

The board game, today called Snakes and Ladders, originated in ancient India, where it was known with the name Mokshapat or Moska Patamu. It’s not exactly known when or who invented it, through it’s believed the game was played at a time as early as 2ad century BC. According to some historians , the game was invented by Saint Gyandev In  the 13th century AD. Orginlly ,the game was used as a part of moral instruction to children. The squaries in which ladders start were each supposed to stand for a virtue, and those housing the head of a snake were supposed to stand for a evil. The snakes outnumbered the ladders in the original Hindu game. The game was transported to England by the colonial rules in the latter part of the 19th century, with some notifications. The modified game was named snakes and Ladders and stripped of it’s moral and religious aspects and the number of laders and snakes were equlizesd.

 

Game Rules:

 

This game is played between two or more people. Each of the player can play the game with rolling the dice.

How to play:

  • Each player puts their counter on the space that says ‘start here’.

 

  • Take it in turns to roll the dice. Move your counter forward the number of spaces shown on the dice.

 

  • If your counter lands at the bottom of a ladder, you can move up to the top of the ladder.

 

  • If your counter lands on the head of a snake, you must slide

down to the bottom of the snake.

 

  • The first player to get to the space that says ‘home’ is the winner.

 

 

Using  graphichal function:

Line(): 

 

Declaration: void line(int  x1, int  y1, int  x2, int  y2);

 

 line function is used to draw a line from a point(x1,y1) to point(x2,y2) i.e. (x1,y1) and (x2,y2) are end points of the line.The code given below draws a line.

Circle():

Declaration: void circle(int x, int y, int radius);

 

Circle function is used to draw a circle with center (x,y) and third parameter specifies the radius of the circle. The code given below draws a circle.

Floodfill():

Declaration: void floodfill(int x, int y, int border);

floodfill function is used to fill an enclosed area. Current fill pattern and fill color is used to fill the area.(x, y) is any point on the screen if (x,y) lies inside the area then inside will be filled otherwise outside will be filled,border specifies the color of boundary of area. To change fill pattern and fill color use setfillstyle. Code given below draws a circle and then fills it.

Setfillstyle():

Declaration: void setfillstyle( int pattern, int color);

 

Setfillstylefunction sets the current fill pattern andfill color.

Setcolour():

Declaration: void setcolor(int color);

 

Total 16 colors are available. Strictly speaking number of available colors depends on current graphics mode and driver.For Example :- BLACK is assigned 0, RED is assigned 4 etc. Setcolorfunction is used to change the current drawing color.e.g. Setcolor(RED) or setcolor(4) changes the current drawing color to RED. Remember that default drawing color is WHITE.

Outtextxy():

Declaration: void outtextxy(int x, int y, char *string);

 

Outtextxy function display text or string at a specified point(x,y) on the screen.

Getmaxx():

Declaration: int getmaxx();

Getmaxx function returns the maximum X coordinate for current graphics mode and driver.

Getmaxxy() :

Declaration: int getmaxy();

 getmaxy function returns the maximum Y coordinate for current graphics mode and driver.

Getch():

getchfunction prompts a user to press a character and that character isn’t printed on screen,getch header file is conio.h. This function is not a part of standard C library.

Delay():

Declaration: void delay(unsigned int);

delay function is used to suspend execution of a program for a particular time.

Cleardevice():

Declaration: void cleardevice();

 

cleardevice function clears the screen in graphics mode and sets the current position to (0,0). Clearing the screen consists of filling the screen with current background color.

Rand():

rand is using for print random number.

 

 

Code explanation:

In our code we use graphics. For this we need to use graphics .h header file. For this we need to ready our codeblocks for supporting graphics .h. Then we use as usual header file. Now we go to our code:

At first we declare a global array. Then we also declare two array for snake and for ladder that’s return type is boolean.  Then we make a rectangular board where we use some line function to draw the 100 square boxes where every boxes have value sequence according the basic ludo game. For this we use loop and in this we use sprintf and outtextxy, function of c++. Then for changing the color of the value  we use setcolor function. Then we make some snake using circle function. For coloring that snake we use setfillstyle and floodfill function to color the snake. Then we use ladder to increasing the value. The ladder is made with line function. We using so many line function to make the ladder. Now in main function we use random number to roll the dice. Then according to the value the pointer will move .And  the value is set in the current score. And all the value will print beside the board and it will using the function outtextxy. We also make a dice which will show the value  of random number in star. We also use placeguti function for changing the row and column form lower to upper. It will the row when one row is end the column will increase in 45. So the column will change and then it starting from the right.

And in this process the code executed. It is the main functionality of our function.

 

When we run the code a window and console will pop up like shown below:

 

First view after opening the consol…….

https://drive.google.com/open?id=1GtCftri10ZAMcpOjnCkR8rLeqIPruhCJ

Then after pressing 1……

https://drive.google.com/open?id=1_csFXdHgzuIAnxDyzKFGCEUcaSHnlLAA

After that press 3 to open the game……..

https://drive.google.com/open?id=1eYTaX7Y_6ybomeN8Gw_fInhhPdsANG7-

Then after throwing the dice ………

https://drive.google.com/open?id=1PNEXB7Rt3TRDxOen8tzWb6jXok0tG00A

https://drive.google.com/open?id=1NSVcveV8qbsR6nnNiT1k_K8L4VlWrqgu

https://drive.google.com/open?id=1H00jgnaJY3KrIomKtzL4KsC165zZDrme

At the last, when game is over it will show who will win……

https://drive.google.com/open?id=1LuWdr0QeAn09duxxM5WcSRfLKcNJPnMc

Now the code link is here ……….

https://drive.google.com/open?id=1fLVur5EFzBycx__FXX9tEQ-i2yS3wUcc

  • This code can be downloaded from this link.

                                            Thank you