Write a python function, find_correct() which accepts a dictionary and returns a list as per the rules mentioned below. The input dictionary will contain correct spelling of a word as key and the spelling provided by a contestant as the value.

Write a python function, find_correct() which accepts a dictionary and returns a list as per the rules mentioned below.
The input dictionary will contain correct spelling of a word as key and the spelling provided by a contestant as the value.

The function should identify the degree of correctness as mentioned below:
CORRECT, if it is an exact match
ALMOST CORRECT, if no more than 2 letters are wrong
WRONG, if more than 2 letters are wrong or if length (correct spelling versus spelling given by contestant) mismatches.

and return a list containing the number of CORRECT answers, number of ALMOST CORRECT answers and number of WRONG answers. 
Assume that the words contain only uppercase letters and the maximum word length is 10.

Also write the pytest test cases to test the program.

#PF-Assgn-48

def find_correct(word_dict):
    #start writing your code here
    key=[]
    value=[]
    count=0
    correct=0
    wrong=0
    atmost=0
    result=[]
    for i,j in word_dict.items():
            key.append(i)
            value.append(j)
    for i in range(len(key)):
        if(len(key[i])==len(value[i]) and key[i]==value[i]):
            correct+=1
        elif((len(key[i])==len(value[i]))==False):
            wrong+=1
        else:
            for j in range(len(key[i])):
                if((key[i][j]==value[i][j])==False):
                    count+=1
                    if(count>2):
                        wrong+=1
                        break
            if(count<=2):
                atmost+=1
            count=0
           
           
    result=[correct,atmost,wrong]
    return result
       


word_dict={"THEIR": "THEIR","BUSINESS":"BISINESS","WINDOWS":"WINDMILL","WERE":"WEAR","SAMPLE":"SAMPLE"}
print(find_correct(word_dict))


The below function is written to check whether a given three digit number is an Armstrong number. Hint: An “Armstrong number” is an n-digit number that is equal to the sum of the nth powers of its individual digits. Example: 371 is an Armstrong number as 371 = 3^3 +7^3+ 1^3

The below function is written to check whether a given three digit number is an Armstrong number.

Hint: An “Armstrong number” is an n-digit number that is equal to the sum of the nth powers of its individual digits.
Example: 371 is an Armstrong number as 371 = 3^3 +7^3+ 1^3



Source:

Write a python function find_duplicates(), which accepts a list of numbers and returns another list containing all the duplicate values in the input list. If there are no duplicate values, it should return an empty list.


Write a python function find_smallest_number() which accepts a number n and returns the smallest number having n divisors. Handle the possible errors in the code written inside the function.












Source Code:-

Given a number n, write a program to find the sum of the largest prime factors of each of nine consecutive numbers starting from n. g(n) = f(n) + f(n+1) + f(n+2) + f(n+3) + f(n+4) + f(n+5) + f(n+6) + f(n+7) + f(n+8) where, g(n) is the sum and f(n) is the largest prime factor of n For example, g(10)=f(10)+f(11)+f(12)+f(13)+f(14)+f(15)+f(16)+f(17)+f(18)=5 + 11 + 3 + 13 + 7 + 5 + 2 + 17 + 3 =66

Given a number n, write a program to find the sum of the largest prime factors of each of nine consecutive numbers starting from n.
g(n) = f(n) + f(n+1) + f(n+2) + f(n+3) + f(n+4) + f(n+5) + f(n+6) + f(n+7) + f(n+8)
where, g(n) is the sum and f(n) is the largest prime factor of n

For example,
g(10)=f(10)+f(11)+f(12)+f(13)+f(14)+f(15)+f(16)+f(17)+f(18) 
        =5 + 11 + 3 + 13 + 7 + 5 + 2 + 17 + 3 
        =66 
 Source Code:-

A 10-substring of a number is a substring of its digits that sum up to 10. For example, the 10-substrings of the number 3523014 are: 3523014, 3523014, 3523014, 3523014

A 10-substring of a number is a substring of its digits that sum up to 10.

For example, the 10-substrings of the number 3523014 are:
3523014, 3523014, 3523014, 3523014

Write a python function, find_ten_substring(num_str) which accepts a string and returns the list of 10-substrings of that string.

Handle the possible errors in the code written inside the function.


Write a recursive function, is_palindrome() to find out whether a string is a palindrome or not. The function should return true, if it is a palindrome. Else it should return false.

Source Code:-

Represent a small bilingual (English-Swedish) glossary given below as a Python dictionary

{"merry":"god", "christmas":"jul", "and":"och", "happy":"gott", "new":"nytt", "year":"ar"} 

and use it to translate your Christmas wishes from English into Swedish.

That is, write a python function translate() that accepts the bilingual dictionary and a list of English words (your Christmas wish) and returns a list of equivalent Swedish words. 


Write a python program to generate the ticket numbers for specified number of passengers traveling in a flight as per the details mentioned below: The ticket number should be generated as airline:src:dest:number

where
  1. Consider AI as the value for airline
  2. src and dest should be the first three characters of the source and destination cities.
  3. Number should be auto-generated starting from 101
The program should return the list of ticket numbers of last five passengers.
Note: If passenger count is less than 5, return the list of all generated ticket numbers.










Solution:-

https://gist.github.com/newsundram2018/56b3df5125e68b31654c71dd9cc59290

The Metro Bank provides various types of loans such as car loans, business loans and house loans to its account holders. Write a python program to implement the following requirements: Initialize the following variables with appropriate input values:account_number, account_balance, salary, loan_type, loan_amount_expected and customer_emi_expected. The account number should be of 4 digits and its first digit should be 1. The customer should have a minimum balance of Rupees 1 Lakh in the account. If the above rules are valid, determine the eligible loan amount and the EMI that the bank can provide to its customers based on their salary and the loan type they expect to avail. The bank would provide the loan, only if the loan amount and the number of EMI’s requested by the customer is less than or equal to the loan amount and the number of EMI’s decided by the bank respectively. Display appropriate error messages for all invalid data. If all the business rules are satisfied ,then display account number, eligible and requested loan amount and EMI’s. Test your code by providing different values for the input variables.

The Metro Bank provides various types of loans such as car loans, business loans and house loans to its account holders. Write a python program to implement the following requirements:
  • Initialize the following variables with appropriate input values:account_number, account_balance, salary, loan_type, loan_amount_expected and customer_emi_expected.
  • The account number should be of 4 digits and its first digit should be 1.
  • The customer should have a minimum balance of Rupees 1 Lakh in the account.
  • If the above rules are valid, determine the eligible loan amount and the EMI that the bank can provide to its customers based on their salary and the loan type they expect to avail.
  • The bank would provide the loan, only if the loan amount and the number of EMI’s requested by the customer is less than or equal to the loan amount and the number of EMI’s decided by the bank respectively.
Display appropriate error messages for all invalid data. If all the business rules are satisfied ,then display account number, eligible and requested loan amount and EMI’s.

Test your code by providing different values for the input variables.


You have x no. of 5 rupee coins and y no. of 1 rupee coins. You want to purchase an item for amount z. The shopkeeper wants you to provide exact change. You want to pay using minimum number of coins. How many 5 rupee coins and 1 rupee coins will you use? If exact change is not possible then display -1.

Question:
You have x no. of 5 rupee coins and y no. of 1 rupee coins. You want to purchase an item for amount z. The shopkeeper wants you to provide exact change. You want to pay using minimum number of coins. How many 5 rupee coins and 1 rupee coins will you use? If exact change is not possible then display -1.
Solution:

FoodCorner home delivers vegetarian and non-vegetarian combos to its customer based on order.,Given the type of food, quantity (no. of plates) and the distance in kms from the restaurant to the delivery point, write a python program to calculate the final bill amount to be paid by a customer.

Question:
FoodCorner home delivers vegetarian and non-vegetarian combos to its customer based on order.

A vegetarian combo costs Rs.120 per plate and a non-vegetarian combo costs Rs.150 per plate. Their non-veg combo is really famous that they get more orders for their non-vegetarian combo than the vegetarian combo.

Apart from the cost per plate of food, customers are also charged for home delivery based on the distance in kms from the restaurant to the delivery point. The delivery charges are as mentioned below:

Given the type of food, quantity (no. of plates) and the distance in kms from the restaurant to the delivery point, write a python program to calculate the final bill amount to be paid by a customer. 

The below information must be used to check the validity of the data provided by the customer: 
  • Type of food must be ‘V’ for vegetarian and ‘N’ for non-vegetarian.
  • Distance in kms must be greater than 0.
  • Quantity ordered should be minimum 1.
If any of the input is invalid, the bill amount should be considered as -1.

Solution:
              Scroll Left And Right To See Clearly



What is NASSCOM and What does it do exactly?


The National Association of Software and Services Companies (NASSCOM) is the premier trade body and the chamber of commerce of the IT-BPM industries in India. 

NASSCOM is a global trade body with more than 1300 members, which include both Indian and multinational companies that have a presence in India. 

NASSCOM's member and associate member companies are broadly in the business of software development, software services, software products, consulting services, BPO services, e-commerce & web services, engineering services off-shoring and animation and gaming. 

About 25 years ago, NASSCOM’s founders felt that there is a need for a model agency to look into government and international environment to analyse the forces that affect Indian IT-BPM industry.  This helped the team and the members to leverage the opportunities and address challenges prevailing in the environment. 

NASSCOM has been playing the role of catalyst in binding the industry players together, representing them and engaging with various stakeholders to encourage the growth of Indian IT-BPM industry. 

Its most important role is to constantly engage with government stakeholders within and outside India to alter the existing or introduce new policies, regulations, initiatives that serves the interest of Indian IT-BPM players. Over decades now NASSCOM members address challenges, build strategies for the future and share best practices, with the overall objective of building a growth-led competitive and sustainable industry.

Top Cyber Security Trends In 2019




Change is the only constant for technology. As technology continues to evolve, the role of tech-savvy IT professionals cannot remain the same. Therefore, constant strive for skill development will be necessary to shine in the job market. The rising tide of cyber crimes and data theft has caused major concern for organizations in every industry – healthcare, retail, medical, financial services and what not.
As per Nasscom, to cope up with the increasing pace of cyber attacks, data protection efforts will drastically increase and so will change the dynamics of job prospects in cyber security industry. It is expected to create USD 35 billion revenue opportunity and employment opportunities for about a million professionals by 2025 for India.
Let's have a look at the top cyber security trends that are going to dominate in 2019 and create new job opportunities. It's time to adapt for the new jobs emerging in the coming year.

1. AI will strengthen cyber security solution:

According to ESG research, 12% of enterprise organizations have already deployed AI-based security analytics extensively, and 27% have deployed AI-based security analytics on a limited basis. AI proves to be more reliable when it comes to incident detection, incident response, prioritizing the right decisions and automating remediation tasks. Organizations are adopting AI based cyber security solutions to communicate risk to the business by sorting through innumerable software vulnerabilities, configuration errors and threat intelligence to prioritize high-risk situations that need immediate attention. AI-based cyber security technology also helps to gain a better understanding of situational awareness in case there is a breach. It is often misunderstood that AI will replace human beings in the workplace but the fact is AI would just make things easier and there will be a requirement for skilled Data Scientists and experts to make AI work.

2. Integrated Security Solution is the future:

We deal with various devices and systems. But we don't want to deal with the complexity it comes with. In the fast-paced digital world, we want all the devices to be able to work well together and share information effectively. Organizations often have this misconception that each threat requires different layers of protection and the threat can slip through the net. Cyber security needs an integrated approach which will involve leveraging multilayered security solutions and integrating them into one cohesive system.
Monitoring a wide range of threats and their sources can be difficult. Businesses should implement simple tools – like a dashboard which will be the sole platform through which IT teams can monitor the entire security scenario without any confusion and complex processes. Depending on a company's needs, an integrated IT system might include intrusion prevention, web proxy and anti-malware, web application firewalls, VPN, antivirus, data encryption, vulnerability scanning, email security, DNS protection, and more. Individual security aspects should be able to complement each other and work as an integrated solution to manage the situation better.

3. Poorly secured IoT devices will be targeted:

In the coming years, IoT attacks will move beyond massive botnet powered DDoS attacks to far more sophisticated attacks. Wi-fi connectivity is common to most of the latest devices and that means they can be connected through the internet with each other. Hence, IoT enabled home appliances, cars, and other gadgets are all connected and exchanging data over the internet. IoT devices that bridge the digital and physical worlds will be the soft targets for hackers. The attack on home-based IoT devices and devices that control critical infrastructures like power distribution or communication networks - will be targeted which will have very harmful consequences.
For that, organizations will definitely hire skilled IoT professionals to be part of their tech team to address several issues in terms of operations and performances. Skills in IoT security, cloud computing knowledge, data analytics, automation, understanding of embedded systems, device knowledge will not only ensure a promising career in IoT but also set you apart from the crowd as there is still a shortage of skills in this field.

4. Impact GDPR compliance:

The General Data Protection Regulation (GDPR) that came into effect on 25th May 2018 has already created a stir when it comes to data protection regulation and data privacy. GDPR offers a framework for data protection which includes lots of do's and don'ts for organizations in terms of collecting, keeping, storing and using data. There are amplified responsibilities and obligations for organizations including elevated rights for data subjects, larger territorial scope, and stringent consent laws. GDPR applies to all businesses and organizations established in the EU regardless of whether the data processing takes place in EU or not. If a company tries to be compliant, it has to confront a tough penalty structure.
The new compliance requirements will inevitably create demand for skills and knowledge. Implementation of GDPR will also require complex business processes and practices and there will be scope for Data Protection Officers, Data Controllers, Security Architects, Data & Analytics Managers etc.
LEAD IMPLEMENTER TRAINING FOR GENERAL DATA PRIVACY REGULATIONS (GDPR)

5. The rise of Blockchain in security:

Despite the recent dive in the market price of cryptocurrencies, the jobs in this field are continuously rising. The reason might be, Blockchain offers security that is useful in many other ways. The underlying technology behind blockchain is now gaining more acceptance and adoption that is creating more jobs. The heightened security, for which Blockchain is used to mine cryptocurrencies – can play a significant role in securing confidential information. Blockchain can also be used to improve global supply chain, protect assets etc.
Freelancer.com, a reputable online crowdfunding site, shows the demand for cryptocurrency and blockchain related jobs grew by 82% in the last quarter. Blockchain engineering is also the second-most in-demand skill after robotics and automation. PayPal is one of the very first that adopted the payment of cryptocurrency on its platform.
As threats and risks in the cyber security field continue to pile up, we need to be ready to accept all the challenges that come along. As technology is evolving, we need to be ready for more dangerous attacks. These are few trends that are going to rule in 2019 but all these fields have a shortage of skilled professionals. If you wish to stand apart from the crowd then this is the time. Get trained, gather knowledge and emerge as a valued professional in the field of cyber security.

Top 10 Best Direct Selling Companies In India 2019



Now more than 10000 Companies of direct selling operating in India whose business turnover is more than 3500 Crores fiscal year 2009-2010, according to the Indian Direct Selling Association, IDSA. IDSA is an association developed by some of the direct selling MLM companies in India for the core issues related to this business and future prospects of the trade.


The best direct selling companies in India 2019 , here’s the list of best direct selling companies, best network marketing companies ,best MLM companies in India.
Direct selling business is noble profession in the world. Direct selling companies ,network marketing companies provide best opportunity.
Direct selling business opportunity for everyone and many companies is working in this platform. We describe here which is best direct selling business companies in India  2019.
Here’s the list of  Top 10 Best Direct Selling Companies,Network Marketing Companies and MLM Companies in India 2019.

10. Altos Enterprise Ltd:
9. Oriflame:
8. Herbalife
7. Avon( The company for women)
6. Tupperware Brands
5. Unicity
4. Dewsoft( your partners for life)
3. Vestige
2. Hindustan Unilever Ltd
1. Amway
What is Your Experience with Direct Selling Compnies Write down in comment below.

Online IT Security Courses






Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks.

With more money at risk and data breaches at a rise, more certified cybersecurity experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves.

That's why jobs in the cyber security field have gone up 80% over the past three years than any other IT-related job. So, this is the right time for you to consider a new career as a cyber security professional.

Cybersecurity experts with industry-standard certification are coming from a wide range of backgrounds, who prepare themselves to protect computer systems and networks from viruses and hackers.

But before getting started your career as a cybersecurity expert, it's important to understand basics of networks and how data moves from place to place, and for this, you are highly advised to gain some valuable cyber security certifications.

Cybersecurity certifications not only boost your skills but also verify your knowledge and credibility.

Thanx For Reading. Wish you All the Best for your Career. Feeling the feeling of a cybersecurity expert is awesome.

अगर अभी से इन बातों का ध्यान रखा जाये तो आप भी ३० बर्ष की उम्र तक अमीर बन सकते हैं

आज कल की ज़िन्दगी में पैसा किसे पसंद नहीं है आज हर इंसान को  उस एटीएम मशीन की पैसे निकलने से पहले की  आवाज़ और   ***००० अमाउंट क्रेडिटेड इन  योर अकाउंट बाले मैसेज से ही सबसे ज्यादा खुसी  होती है । लेकिन क्या  एक अमीर इंसान बनने के लिए नौकरी नाम के भंवर में फसने के अल्वा और भी कई रास्ते मौजूद हैं जी हाँ बिलकुल इन्वेस्टिंग कैपिटल(पूँजी) किसी के लिए भी नए शब्द हो सकते हैं लेकिन ये आपके अमीर बनने के रास्ते में वाधा नहीं एक वरदान है एक सामान्य ज़िन्दगी से ऊपर उठके एक लक्ज़री लाइफ जीना हमारे लिए आज एक सपना बनके रह गया है  To become a billionaire, create opportunities, invest wisely and retain wealth. Here's a theory of how to become a billionaire.

1. मन लगा के मेहनत से पढ़ो :
सामान्यतः एक अमीर आदमी होना किसी दुर्घटना का परिणाम या कोई चमत्कार नहीं होता है  । टैक्स , इंटरेस्ट  और डिविडेंड्स (लाभांश) का अध्धयन करके अमीर बनो ।फाइनेंस और उद्यमिता (एन्त्रेप्रेंयूर्शिप) के बारे में पढ़िए  ,उपभोक्ताओं की जरूरतों  को पहचानिये और उन जरूरतों के अनुसार बिज़नेस मॉडल बनाकर उन्हें पूरा करिये । बर्तमान समय में बहुत ही कम समयबधि में आप  कंप्यूटर साइंस और नयी टेक्नोलॉजी की योग्यताओ को सीखकर अपना कर्रिएर बना सकते हैं ध्यान रखे यहाँ कैरियर से मेरा मतलब सुबह से शाम बाली नौकरी से नहीं है ।

धनी लोगो के बारे में गहनता से पढ़िए वारेन बफेट ,बिल गेट्स मार्क ज़ुकरबर्ग मुकेश अम्बानी आदि । और अधिक पाने के लिए अपने पैसे के साथ बुद्धिमानी पूर्वक पेश आइये । 

2. पैसे बचाइए :
पैसा कमाने के लिए पैसा जरुरी होता है  तो  जो भी पैसा आपको प्राप्त हो उसमे से कुछ पैसे एक तरफ रख दीजिये  चाहे तो आप उन्हें भबिष्य में ब्याज और इन्वेस्टमेंट के लिए सेविंग अकाउंट में रख सकते हैं । निश्चित करें के आप अपने पैसो का कितने प्रतिशत सेव करना चाहते हैं (१०००-१२००  प्रति माह ३ या ५ साल में एक बड़ा अंतर खड़ा कर सकता है । 

3. सारे उधार  दें :
क़र्ज़ में रहकर सफलता की रह पर आगे बढ़ना बहुत मुश्किल होता है   




Top 10 websites to learn coding



10 of the best trustworthy web  platforms for learning CODING that you may not know:-

In today’s digital world, coding has become so popular that it can change one’s life. We have composed 10 of the best trustworthy sites to learn coding. You can take an example of coders who have sold their code to multi-nationals and became millionaires in months.
Initially coding can be tough for a beginner. A person needs to understand the concept of computer science and get used to tools that help in developing the code. Many people give up before starting, but it doesn’t have to be in that manner.
The best way to learn code is with project based approach. It will give you new ideas, keep you motivated and most importantly your retention of code will be increased.
So, before you start coding lesson, think of a small project in your mind. Below mentioned are the best resources for getting started with coding.
This is the most popular and recognized resource for learning code. Join the community of codecademy and you can choose from courses grouped into eight tracks: APIs, Ruby, Python, JavaScript, jQuery, PHP, web fundamentals, or combine languages into projects.
Code Racer as the name suggest provides code learning while competing with others in a Race. With time limits and help feature Code Racer has made a unique style to learn from.
There are hundreds of free videos to help you learn web development, with an optional premium membership to get even more out of PhpAcademy.
Khan Academy brings millions of students from around the world together to learn all sorts of digital skills, from coding to calculus to computer science theory. This means you can become an expert coder and a proficient mathematician in the same place.
If you have Python and Java problems then no frills just the exercises. It is probably better for someone with a little bit of background (meaning you know what a function/parameter is and can use The Google to figure out/find grammar/functions you need). The site was made by the same guy who taught the Google Python Class.
Online education giant Coursera brings the world’s best courses from dozens of top universities online, and lets anyone take them for free. Coursera classes are now available in five languages i.e. English, Spanish, French, Italian and Chinese, and are taught by professors from 62 universities.
On the CodePlayer, you can watch interactive presentations that explain how people built things from scratch. Once you become a coding expert, you can add your own presentations to teach others what you know.
Udacity is a very famous brand and has been in the market for years now. It is for Massive Online Open Courses (MOOCs). It is multi-facetted and you get to know about many things apart from coding as well. It is like a social network analysis. It’s almost like a college without a diploma degree. Organizations like Google have a detailed course on Android Apps, and consequently ios apps also have courses well within reach. Generally it is free but some courses have fees for one on one tuition. This is a worth trying website for coders.
I would say it’s more for intermediate learners, but a fantastic resource for learning code. You can do a beginner level course on Udacity, Treehouse and Codeacademy, and if you go further you will be more at an ease with Code School. They have a different approach and more interactive way to teach you about coding. You have the path style sections – Ruby, HTML/CSS, iOS, and JavaScript. At the same time, you have Git, Objective – C and jQuery.
Treehouse is another top notch consistent player in the MARKET. With a 14-day free testing, $25 is charged for the primary account and $49 for a specialist and you will find to learn almost anything with the proper material. You will get excellent videos, interactive quiz, forums exercises and expert reviews to make your journey to learn coding easier.

If you like this post and got anything valuable.Give your positive feedback.Your feedback value for us.

Know what is "Ransomeware" Virus?जानिए क्या है Ransomeware....


Ransomewar:-
These days being caught for ransom can happen quite differently with your computer of all things. It may be possible that at this moment you are suffering from wanna cry ransomeware who affected 3.5 lacs computer devices around the world. We are talking definitely about Ransomware, an especially type of malware that is to say bad software that’s been making headlines recently. So here’s how it works, once Ransomware gets on your computer usually through an infected email attachment or the all-too-common Trojan.
It will encrypt your data in some way and require in exchange for giving control of your system back to you.
A simpler form of Ransomware will only try to trick you into believing there’s something wrong with your computer and get you to pay money to fix it. A favourite tactic that we see in those banner ads that tell you that something has infected you. Now often with those, you’ve got at least basic control over your system still, so the only real issue is that you have to deal with constant pop-ups until you find a way to get rid of the malware.
Properties of Ransomware :
– It has unbreakable encryption, which means that you can’t decrypt the files on your own, but there are some tools that can decrypt some types.
– It can encrypt all sorts of files, from documents to pictures, videos, audio files and everything you may have on your computer.
– It can jostle your file names, so you can’t know which data was infected.
– It will append a different extension to your files.
– It will display a message or a background image that lets you know your data has been encrypted and that you have to pay some money to restore it.
– It always requests payment in Bitcoins, because governments can not track it.
– It uses complicated evasion techniques to be undetected by antivirus software.
– It can infect other PCs connected to a (LAN) local area network, generating further destruction.

At this time it’s not possible to recover the files that are encrypted by recent Ransomware. 

How to become an Ethical Hacker in 12 steps


Hacking is one of the hottest jobs in this decade but don’t take it as an easy job. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look.                                                                       
1. Learn UNIX/LINUX
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is impossible to become a hacker.
2. Code in C language
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.
3. Learn to code in more than one Programming Language
It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.
4. Learn Networking Concepts
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.
5. Learn More Than One Operating Systems
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.
6. Learn Cryptography
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.
7. Learn more and more about hacking
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.
Follow our website’s Ethical Hacking tutorials to learn more hacking skills.
8. Experiment A Lot
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.
9. Write Vulnerability (Loop hole program)
Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.
10. Contribute To Open Source Security Projects
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.
11. Continue never ending Learning
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems.
12. Join Discussions and meet hackers
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.
Source: codeingsec


Write a python function, find_correct() which accepts a dictionary and returns a list as per the rules mentioned below. The input dictionary will contain correct spelling of a word as key and the spelling provided by a contestant as the value.

Write a python function,  find_correct()  which accepts a dictionary and returns a list as per the rules mentioned below. The input diction...