SlideShare a Scribd company logo
1 of 11
SEMINAR REPORT ON
CRYPTOGAPHY
SUBMITTED TO:
Mr.SANJAY SINGH & Mr. S. K. SHAH
SUBMITTED BY:
Mustahid ali
TOPICS COVERED IN THE
SEMINAR :
• BASIC DEFINATIONS OF TERMS USED
IN CRYPTOGRAPHY
• NEED OF CRYPTOGRAPHY
• TYPES OF CRYPTOGRAPY
• APPLICATIONS
BASIC DEFINATIONS
• Encryption: process of coding the
•
•
•
•

message.
Decryption: decoding the message in
original form.
Cipher text: encrypted data.
Key: single piece of private information.
Plain text: original information.
INTRODUCTION:
•
•
•

Cryptology=kryptos+logos
Which means hidden +words
Important services that cryptography
provides
• 1.secrecy
• 2.authencity
• 3.integrity
NEED OF CRYPTOGRAPHY:
• It is necessary when communicating over
untrusted medium.
• To increase the privacy & security.
• Protection against theft & alteration
TYPES :
Cryptography

Single key
Or
Secret key

Two key
Or
Public key

Hash function
Single key :
•
•
•
•

One key is used by sender & receiver
Key is transferred by a secure medium.
Provides secrecy & authenticity.
Major disadvantage is transfer of key
because it is costly, inconvenient & slow
Two key :
• Uses two keys.
• employs two keys that are mathematically
related.
• Both the keys are required for decryption.
• It provides integrity along with privacy &
authenticity.
Hash functions :
• are algorithms that, in some sense, use no
key. Instead, a fixed-length hash value is
computed based upon the plaintext that
makes it impossible for either the contents
or length of the plaintext to be recovered.
Hash algorithms.
• Provide a measure of integrity.
Applications:
•
•
•

Atm cards.
Computer passwords.
Electronic commerce.

More Related Content

What's hot

cryptography deepan fav subject
cryptography deepan fav subjectcryptography deepan fav subject
cryptography deepan fav subjectdeepan v
 
Building a Bitcoin Hardware Wallet with Golang and a Raspberry Pi Zero
Building a Bitcoin Hardware Wallet with Golang and a Raspberry Pi ZeroBuilding a Bitcoin Hardware Wallet with Golang and a Raspberry Pi Zero
Building a Bitcoin Hardware Wallet with Golang and a Raspberry Pi ZeroNic Raboy
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection featuresMariaDB plc
 
Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresJose L. Quiñones-Borrero
 
E-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithmE-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithmgauravv7536
 
Singapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSingapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSeokgu Yun
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Cees van Wijk - How to preserve privacy on a blockchain?
Cees van Wijk - How to preserve privacy on a blockchain?Cees van Wijk - How to preserve privacy on a blockchain?
Cees van Wijk - How to preserve privacy on a blockchain?Vincent Everts
 

What's hot (20)

Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography deepan fav subject
cryptography deepan fav subjectcryptography deepan fav subject
cryptography deepan fav subject
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Building a Bitcoin Hardware Wallet with Golang and a Raspberry Pi Zero
Building a Bitcoin Hardware Wallet with Golang and a Raspberry Pi ZeroBuilding a Bitcoin Hardware Wallet with Golang and a Raspberry Pi Zero
Building a Bitcoin Hardware Wallet with Golang and a Raspberry Pi Zero
 
Cryptography
CryptographyCryptography
Cryptography
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Cryptography
CryptographyCryptography
Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection features
 
Sw2
Sw2Sw2
Sw2
 
Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and Countermeasures
 
E-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithmE-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithm
 
Singapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSingapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet Network
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cees van Wijk - How to preserve privacy on a blockchain?
Cees van Wijk - How to preserve privacy on a blockchain?Cees van Wijk - How to preserve privacy on a blockchain?
Cees van Wijk - How to preserve privacy on a blockchain?
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 

Similar to Cryptogaphy

CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxKuntalSasmal1
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptxNithiShree5
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptSudhanshuKarna
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfVAIBHAVCHAKRAWARTI
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MEDZatulNadia
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Petar Radanliev
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security Mathan Gopal
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityShanthi Mathan
 
PresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptxPresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptxHRockyAman
 

Similar to Cryptogaphy (20)

Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Cryptography
Cryptography Cryptography
Cryptography
 
cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
Ccn
CcnCcn
Ccn
 
Ccn
CcnCcn
Ccn
 
cryptography
cryptographycryptography
cryptography
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Digital signature
Digital signatureDigital signature
Digital signature
 
PresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptxPresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptx
 

More from Mustahid Ali

HR SYMPOSIUM 2014, Universal business school
HR SYMPOSIUM 2014, Universal business schoolHR SYMPOSIUM 2014, Universal business school
HR SYMPOSIUM 2014, Universal business schoolMustahid Ali
 
Consumer Behavior Analysis, Segmentation, demographic segmentation
Consumer Behavior Analysis, Segmentation, demographic segmentationConsumer Behavior Analysis, Segmentation, demographic segmentation
Consumer Behavior Analysis, Segmentation, demographic segmentationMustahid Ali
 
Corporate governance
Corporate governanceCorporate governance
Corporate governanceMustahid Ali
 
Retail management project, picasso art gallery
Retail management project, picasso art galleryRetail management project, picasso art gallery
Retail management project, picasso art galleryMustahid Ali
 
Lg electronics vendor summer internship report
Lg electronics vendor summer internship reportLg electronics vendor summer internship report
Lg electronics vendor summer internship reportMustahid Ali
 
Info graphic of Top 10 internet users worlwide,facts
Info graphic of Top 10 internet users worlwide,factsInfo graphic of Top 10 internet users worlwide,facts
Info graphic of Top 10 internet users worlwide,factsMustahid Ali
 
Retail management project, picasso art gallery
Retail management project, picasso art galleryRetail management project, picasso art gallery
Retail management project, picasso art galleryMustahid Ali
 
Nfl case-digital media strategy presentation
Nfl case-digital media strategy presentationNfl case-digital media strategy presentation
Nfl case-digital media strategy presentationMustahid Ali
 
Case study culinarian cookware
Case study  culinarian cookwareCase study  culinarian cookware
Case study culinarian cookwareMustahid Ali
 
Case study culinarian cookware
Case study  culinarian cookwareCase study  culinarian cookware
Case study culinarian cookwareMustahid Ali
 
Nfl case-digital media strategy presentation
Nfl case-digital media strategy presentationNfl case-digital media strategy presentation
Nfl case-digital media strategy presentationMustahid Ali
 
Universal business school
Universal business schoolUniversal business school
Universal business schoolMustahid Ali
 
Cadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourCadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourMustahid Ali
 
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYNETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYMustahid Ali
 
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYNETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYMustahid Ali
 
Cadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourCadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourMustahid Ali
 
big bazaar retail visit project report
big bazaar retail visit project reportbig bazaar retail visit project report
big bazaar retail visit project reportMustahid Ali
 
Mercedes its still a car, campaign
Mercedes  its still a car, campaignMercedes  its still a car, campaign
Mercedes its still a car, campaignMustahid Ali
 
Carrefour china case study-solution
Carrefour  china case study-solutionCarrefour  china case study-solution
Carrefour china case study-solutionMustahid Ali
 
Xylys case study solution
Xylys case study  solutionXylys case study  solution
Xylys case study solutionMustahid Ali
 

More from Mustahid Ali (20)

HR SYMPOSIUM 2014, Universal business school
HR SYMPOSIUM 2014, Universal business schoolHR SYMPOSIUM 2014, Universal business school
HR SYMPOSIUM 2014, Universal business school
 
Consumer Behavior Analysis, Segmentation, demographic segmentation
Consumer Behavior Analysis, Segmentation, demographic segmentationConsumer Behavior Analysis, Segmentation, demographic segmentation
Consumer Behavior Analysis, Segmentation, demographic segmentation
 
Corporate governance
Corporate governanceCorporate governance
Corporate governance
 
Retail management project, picasso art gallery
Retail management project, picasso art galleryRetail management project, picasso art gallery
Retail management project, picasso art gallery
 
Lg electronics vendor summer internship report
Lg electronics vendor summer internship reportLg electronics vendor summer internship report
Lg electronics vendor summer internship report
 
Info graphic of Top 10 internet users worlwide,facts
Info graphic of Top 10 internet users worlwide,factsInfo graphic of Top 10 internet users worlwide,facts
Info graphic of Top 10 internet users worlwide,facts
 
Retail management project, picasso art gallery
Retail management project, picasso art galleryRetail management project, picasso art gallery
Retail management project, picasso art gallery
 
Nfl case-digital media strategy presentation
Nfl case-digital media strategy presentationNfl case-digital media strategy presentation
Nfl case-digital media strategy presentation
 
Case study culinarian cookware
Case study  culinarian cookwareCase study  culinarian cookware
Case study culinarian cookware
 
Case study culinarian cookware
Case study  culinarian cookwareCase study  culinarian cookware
Case study culinarian cookware
 
Nfl case-digital media strategy presentation
Nfl case-digital media strategy presentationNfl case-digital media strategy presentation
Nfl case-digital media strategy presentation
 
Universal business school
Universal business schoolUniversal business school
Universal business school
 
Cadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourCadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumour
 
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYNETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
 
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYNETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
 
Cadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourCadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumour
 
big bazaar retail visit project report
big bazaar retail visit project reportbig bazaar retail visit project report
big bazaar retail visit project report
 
Mercedes its still a car, campaign
Mercedes  its still a car, campaignMercedes  its still a car, campaign
Mercedes its still a car, campaign
 
Carrefour china case study-solution
Carrefour  china case study-solutionCarrefour  china case study-solution
Carrefour china case study-solution
 
Xylys case study solution
Xylys case study  solutionXylys case study  solution
Xylys case study solution
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Cryptogaphy