Eti 1
Eti 1
MICRO PROJECT
Academic year: 2023-24
TITLE OF PROJECT
2. Nikita Avchar
Guided By:
Mrs.R.F.Shikhare
DEPARTMENT OF
COMPUTER
ENGINEERING
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that
Mr/Ms Nikita Panchal,Nikita Avchar Roll No:112,143of Semester Sixth of
Diploma in Computer Engineering of Institute, JS POLYTECHNIC (Code:0711)
has completed the Micro Project satisfactorily in Subject- Emerging Trends in
Computer and Information Technology (22618)for the academic year 2023-
2024 as prescribed in the curriculum.
Place: Hadapsar, Pune Enrollment No:
2107110455
2207110678
We would like to express our special thanks of gratitude to our subject teacher
Ms.S.R.Rajbhoj as well as our principal sir and HOD sir who gave us the golden
opportunity to do this wonderful Report on the topic Describe Different Types of
Hacking
of In which also helped us doing lot of Research and we came to know about so
many new things related to Emerging Trends in Computer and Information
Technology (22618) we are really thankful to them.
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-
28 Academic Year 2023-2024
INDEX
Sr No contain Page No
1 Front page
2 Certificate
3 Acknowledgement
4 Abstract
5
Introduction
to hacking
6 Types of
hacking
There are
three main
7 types of
hacking
8 Advantages
and
disadvantage
s
Conclusion
9
References
10
Abstract
Chat application is a feature or a program on the Internet to communicate directly among Internet users who
are online or who were equally using the internet. Chat applications allow users to communicate even though from a
great distance. Therefore, this chat application must be real-time and multi-platform to be used by many users. The
development of information and communication technologies are rapidly making one of the reasons for Indonesia,
especially Bandung to develop this chat application. That's because Indonesia does not always rely on outsiders. It is
important for Indonesia to develop this chat application for themselves. This chat application in the manufacture
begins with the collection of relevant data that will be displayed in the web and mobile versions.
INTRODUCTION
Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to
gain access to personal data or business data. An example of computer hacking can be: using a password
cracking algorithm to gain access to a computer system. Computers have become mandatory to run a
successful business. It is not enough to have isolated computers systems; they need to be networked
to facilitate communication with external businesses. This exposes them to the outside world and
hacking. System hacking means using computers to commit fraudulent acts such as fraud, privacy
invasion, stealing corporate/personal data, etc. Cybercrimes cost many organizations millions of dollars
every year. Businesses need to protect themselves against such attacks. Hacking refers to activities that
seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
And while hacking might not always be for malicious purposes, nowadays most references to hacking, and
hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain,
protest, information gathering (spying), and even just for the “fun” of the challenge. A commonly used
hacking definition is the act of compromising digital devices and networks through unauthorized access to an
account or computer system. Hacking is not always a malicious act, but it is most commonly
associated with illegal activity and data theft by cyber criminals. Hacking in cyber security refers to the
misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems,
gather information on users, steal data and documents, or disrupt data-related activity. A traditional view of
hackers is a lone rogue programmer who is highly skilled in coding and modifying computer software and
hardware systems. But this narrow view does not cover the true technical nature of hacking. Hackers are
increasingly growing in sophistication, using stealthy attack methods designed to go completely
unnoticed by cybersecurity software and IT teams. They are also highly skilled in creating attack vectors that
trick users into opening malicious attachments or links and freely giving up their sensitive personal data.
ethical hacking is a process that helps improve the security of computer systems by identifying potential
weaknesses and vulnerabilities during their testing. It is done by professionals who have authorized access to
the computer and networks to report loopholes in the system of an organization to safeguard it from future
attacks or malicious users. Ethical hackers use the same techniques and tools that black hat hackers use
except that they have the authorization to report weak points in an organization’s network or computing
environment while protecting the security and privacy of that information
Types of Hacking
tile_print_position[( i, j)][0],
tile_print_position[(i, j)][1],
tile_no[k], i, j)
tiles.append(t)
matrix[i][j] = tile_no[k]
k += 1
check_mobility()
check_mobility()
for i in range(tile_count):
tile = tiles[i]
row_index =
tile.position_x col_index =
tile.position_y
adjacent_cells = []
for i in range(len(adjacent_cells)):
if (adjacent_cells[i][0] >= 0 and adjacent_cells[i][0] < rows) and (adjacent_cells[i][1] >= 0 and adjacent_cells[i][1]
< cols):
adjacent_cells[i][2] = True
for j in range(len(adjacent_cells)):
if adjacent_cells[j][2]:
adj_cell_row = adjacent_cells[j][0]
adj_cell_col = adjacent_cells[j][1]
for k in range(tile_count):
if adj_cell_row == tiles[k].position_x and adj_cell_col == tiles[k].position_y:
adjacent_cells[j][2] = False
alse_count =
for m in
range(len(adjacent_cells)): if
adjacent_cells[m][2]:
tile.movable = True
break
else:
false_count += 1
if false_count == 4:
tile.movable =
False
then
allcelldata = ""
for i in range(rows):
for j in range(cols):
game_over = True
game_over_banner = "Game
for i in range(tile_count):
tiles[i].movable =
False tiles[i].selected =
False # Window
dimension
tiles = [1]
tile_width = 200
tile_depth = 200
tile_no = []
# initial values of
variables mouse_press =
False
x_m_click, y_m_click = 0, 0
x_m_click_rel, y_m_click_rel = 0,
0 game_over = False
game_over_banner = ""
caption pygame.init()
move_count = 0
pygame.display.set_caption("Slide Game")
puzzle create_tyles()
running = True
while running:
game_over_print = game_over_font.render(
str if move_count == 0:
move_count_render =
move_count_font.render( move_count_banner,
else:
move_count_render = move_count_font.render(
if event.type == pygame.QUIT:
running = False
if event.type == pygame.MOUSEMOTION:
for i in range(tile_count):
tiles[i].mouse_hover(x_m_motion, y_m_motion)
# if the tile is selected & mouse is pressed
if event.type == pygame.MOUSEBUTTONDOWN:
mouse_press = True
for i in range(tile_count):
tiles[i].mouse_click(x_m_click, y_m_click)
if event.type == pygame.MOUSEBUTTONUP:
mouse_press = False
x_m_click, y_m_click = 0, 0
cell_found = False
if (x_m_click_rel > tile_start_pos_x and x_m_click_rel < tile_start_pos_x + tile_width) and (y_m_click_rel >
tile_start_pos_y and y_m_click_rel < tile_start_pos_y + tile_depth):
if matrix[i][j] == "":
for k in range(tile_count):
if game_over == False:
if tiles[k].selected:
if tiles[k].movable:
cell_found = True
dummy = matrix[tiles[k].position_x][tiles[k].position_y]
matrix[tiles[k].position_x][tiles[k].position_y] = matrix[i][j]
matrix[i][j] = dummy
tiles[k].position_x = i
tiles[k].position_y = j
tiles[k].start_pos_x = tile_print_position[(
i, j)][0]
tiles[k].start_pos_y =
tile_print_position[( i, j)][1]
move_count += 1
isGameOver()
check_mobility()
if cell_found == False:
for k in range(tile_count):
if tiles[k].selected:
mat_pos_x = tiles[k].position_x
mat_pos_y = tiles[k].position_y
tiles[k].start_pos_x =
tile_print_position[( mat_pos_x,
mat_pos_y)][0]
tiles[k].start_pos_y = tile_print_position[(
mat_pos_x, mat_pos_y)][1]
brack
for i in range(tile_count):
tiles[i].draw_tyle()
# If no argument is passed it
pygame.display.flip()
screen
pygame.display.update()
Output
Conclusion
A two Player Puzzle game , which we can play on the command line. Python is generally utilized for
creating websites and software , task automation , data analysis , and data visualization
JSPM’s
JAYWANTRAO SAWANT POLYTECHNIC
DEPARTMENT OF COMPUTER
ENGINEERING
Action Plan:
Sr. Details of activity Planned Planned Name of
No start date Finish date Responsible
Team
members
1 Introduction 10th March 14th March
2 Design Of The Project 13th March 20th March 1. Ankita A
3 Understand Of The 15th March 24th March Mane
Project
4 24th March 27th March 2. Rohan D
Finally Running The
Shinde
Code
5 Output 28th March 30th March
3. Yash D
30th Marh 31th March Vibhute
4. Akib k Khan
6 Conclusion
Actual Resources Used:
1. PC Intel i7 1
vPro,8GB
RAM
2. Python IDE Windows -
/Linux
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer
Engineering Academic Year 2023-24
Teacher Evaluation Sheet
Nameofstudent:NikitaPanchaEnrollm
enNo: 2107110455
Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column
Signature: ………………………….
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer
Engineering Academic Year 2023-24
Teacher Evaluation Sheet
Name of student: Nikita AvcharEnrollment No: 2207110678
Name of program: Computer Engineering Semester: Sixth
Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column
Signature: ………………………….
………….