SlideShare a Scribd company logo
1 of 19
{
SECURED EMPLOYEE DATA
MANAMAGEMENT SYSTEM
 Today everyone is turning towards technology
and they believe it is quite secure and easy to
handle because of END TO END encrypted
database management system.
 Encrypted database management system helps
us to handle our personal and important
database easily.
 The manager can access the whole data of their
employees easily from anywhere just using
their smart phone.
INTRODUCTION
 Encrypted database is more secured because
even when data is stolen the attackers cannot
access the data without the key.
 In END TO END encryption even developers
cannot see the data transferred between two
users .Example :- Whatsapp.
 Requires less security because data is in
encrypted form.
ADVANTAGES OF
ENCRYPTED DATABASE
Administrator can add following details
1. Name of employee
2. Age of employee
3. ID number of employee
4. Mobile number of employee
5. Salary of employee
The features of this program
are as follows.
6. Sector of employee
7. Year of joining
8. Gender
9. Designation
 login() – This function provides the user interface for
administrator to enter the username and password.
 display() – This function is used to display the two
lines(component of UI) after 1.5 sec.
Operations that can be
performed on database.
 choice() - This function checks the password
entered by administrator and if the password is correct it
allows to enter the database and also provides the user
interface to choose the operations like end, decrypt,
encrypt, write, delete, search, modify, read.
 read() – This function is used to call getdata()
and decide that more record are to be entered or
not.
 getdata() – This function is called in read
function to get the data of one employee.
 write() – This function is used to create user interface for entering
the data.
 modify() and modifydata() – These functions are used to modify
the existing data.
 displaydata() – This function display the single record from data.
 search() – This function is used to search a particular record in
database.
 deleted() – This function is used to delete the particular record
from the database.
 displayall() – This functions is used to display the whole
database together.
 encrypt() – This function is used to encrypt the data to
unreadable format.
 decrypt() – This function is used to decrypt the data to original
format.
 end() – This function displays the screen below.
CONCLUSION
 For now what our knowledge says is C++ is the best
programming language.
 C++ language can solve almost every real world problem
 C++ language should be used for making our life easy by
writing such programs.
Made by :- Apurv Singh Gautam
Rushin Tilva
Thankyou !!

More Related Content

Viewers also liked

آسیبها از کجا می آیند؟
آسیبها از کجا می آیند؟آسیبها از کجا می آیند؟
آسیبها از کجا می آیند؟Alireza Yazdani
 
Karoo 30 NEXUS
Karoo 30 NEXUSKaroo 30 NEXUS
Karoo 30 NEXUSMark Scott
 
City Clerk Office Woodlawn Cemetery GIS Project
City Clerk Office Woodlawn Cemetery GIS ProjectCity Clerk Office Woodlawn Cemetery GIS Project
City Clerk Office Woodlawn Cemetery GIS ProjectZoralys Calle, GISP
 
Smart water Andrea Zelioli
Smart water Andrea ZelioliSmart water Andrea Zelioli
Smart water Andrea ZelioliAndrea Zelioli
 
Shrutishravan Software Solutions Pvt Ltd
Shrutishravan Software Solutions Pvt LtdShrutishravan Software Solutions Pvt Ltd
Shrutishravan Software Solutions Pvt LtdSardar Yadav
 
Jinghong song successful writer
Jinghong song   successful writerJinghong song   successful writer
Jinghong song successful writerJinghong Song
 
PALANIVEL_MUTHUVEL_Resume_20082016
PALANIVEL_MUTHUVEL_Resume_20082016PALANIVEL_MUTHUVEL_Resume_20082016
PALANIVEL_MUTHUVEL_Resume_20082016PALANIVEL MUTHUVEL
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented ProgrammingSerdar Cavdar
 
Nida uddinart21project
Nida uddinart21projectNida uddinart21project
Nida uddinart21projectNidaau23
 
دوسالانه‌ها؛ خودستایی یا خودستیزی؟
دوسالانه‌ها؛ خودستایی یا خودستیزی؟دوسالانه‌ها؛ خودستایی یا خودستیزی؟
دوسالانه‌ها؛ خودستایی یا خودستیزی؟Alireza Yazdani
 

Viewers also liked (13)

آسیبها از کجا می آیند؟
آسیبها از کجا می آیند؟آسیبها از کجا می آیند؟
آسیبها از کجا می آیند؟
 
Krishan updated cv
Krishan updated cvKrishan updated cv
Krishan updated cv
 
Karoo 30 NEXUS
Karoo 30 NEXUSKaroo 30 NEXUS
Karoo 30 NEXUS
 
City Clerk Office Woodlawn Cemetery GIS Project
City Clerk Office Woodlawn Cemetery GIS ProjectCity Clerk Office Woodlawn Cemetery GIS Project
City Clerk Office Woodlawn Cemetery GIS Project
 
Smart water Andrea Zelioli
Smart water Andrea ZelioliSmart water Andrea Zelioli
Smart water Andrea Zelioli
 
Shrutishravan Software Solutions Pvt Ltd
Shrutishravan Software Solutions Pvt LtdShrutishravan Software Solutions Pvt Ltd
Shrutishravan Software Solutions Pvt Ltd
 
Jinghong song successful writer
Jinghong song   successful writerJinghong song   successful writer
Jinghong song successful writer
 
Examen
ExamenExamen
Examen
 
Typography-InDesign
Typography-InDesign Typography-InDesign
Typography-InDesign
 
PALANIVEL_MUTHUVEL_Resume_20082016
PALANIVEL_MUTHUVEL_Resume_20082016PALANIVEL_MUTHUVEL_Resume_20082016
PALANIVEL_MUTHUVEL_Resume_20082016
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
 
Nida uddinart21project
Nida uddinart21projectNida uddinart21project
Nida uddinart21project
 
دوسالانه‌ها؛ خودستایی یا خودستیزی؟
دوسالانه‌ها؛ خودستایی یا خودستیزی؟دوسالانه‌ها؛ خودستایی یا خودستیزی؟
دوسالانه‌ها؛ خودستایی یا خودستیزی؟
 

Similar to Encrypted database management system

Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
introtomongodb
introtomongodbintrotomongodb
introtomongodbsaikiran
 
online mobile phone shopping
online mobile phone shoppingonline mobile phone shopping
online mobile phone shoppingamar patwa
 
Questions On The Code And Core Module
Questions On The Code And Core ModuleQuestions On The Code And Core Module
Questions On The Code And Core ModuleKatie Gulley
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
Linux Assignment 3
Linux Assignment 3Linux Assignment 3
Linux Assignment 3Diane Allen
 
Viadeos Segmentation platform with Spark on Mesos
Viadeos Segmentation platform with Spark on MesosViadeos Segmentation platform with Spark on Mesos
Viadeos Segmentation platform with Spark on MesosCepoi Eugen
 
Cw comp1661 211574_mo233_20131122_234918_1314
Cw comp1661 211574_mo233_20131122_234918_1314Cw comp1661 211574_mo233_20131122_234918_1314
Cw comp1661 211574_mo233_20131122_234918_1314Owen Muzi
 
Invoices-app it is uesde to build a.pptx
Invoices-app it is uesde to build a.pptxInvoices-app it is uesde to build a.pptx
Invoices-app it is uesde to build a.pptxcajativ595
 
Database Engine Control though Web Portal Monitoring Configuration
Database Engine Control though Web Portal Monitoring ConfigurationDatabase Engine Control though Web Portal Monitoring Configuration
Database Engine Control though Web Portal Monitoring ConfigurationIRJET Journal
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoringIAEME Publication
 
School management System
School management SystemSchool management System
School management SystemHATIM Bhagat
 
IRMUK-SOA_for_MDM_DQ_Integration_DV_20min
IRMUK-SOA_for_MDM_DQ_Integration_DV_20minIRMUK-SOA_for_MDM_DQ_Integration_DV_20min
IRMUK-SOA_for_MDM_DQ_Integration_DV_20minDigendra Vir Singh (DV)
 
software design principles
software design principlessoftware design principles
software design principlesCristal Ngo
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Jennifer Lopez
 
Project for Student Result System
Project for Student Result SystemProject for Student Result System
Project for Student Result SystemKuMaR AnAnD
 
Dori waldman android _course
Dori waldman android _courseDori waldman android _course
Dori waldman android _courseDori Waldman
 

Similar to Encrypted database management system (20)

Uma SunilKumar Resume
Uma SunilKumar ResumeUma SunilKumar Resume
Uma SunilKumar Resume
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
introtomongodb
introtomongodbintrotomongodb
introtomongodb
 
online mobile phone shopping
online mobile phone shoppingonline mobile phone shopping
online mobile phone shopping
 
Questions On The Code And Core Module
Questions On The Code And Core ModuleQuestions On The Code And Core Module
Questions On The Code And Core Module
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
Oracle ADF Case Study
Oracle ADF Case StudyOracle ADF Case Study
Oracle ADF Case Study
 
ASE
ASEASE
ASE
 
Linux Assignment 3
Linux Assignment 3Linux Assignment 3
Linux Assignment 3
 
Viadeos Segmentation platform with Spark on Mesos
Viadeos Segmentation platform with Spark on MesosViadeos Segmentation platform with Spark on Mesos
Viadeos Segmentation platform with Spark on Mesos
 
Cw comp1661 211574_mo233_20131122_234918_1314
Cw comp1661 211574_mo233_20131122_234918_1314Cw comp1661 211574_mo233_20131122_234918_1314
Cw comp1661 211574_mo233_20131122_234918_1314
 
Invoices-app it is uesde to build a.pptx
Invoices-app it is uesde to build a.pptxInvoices-app it is uesde to build a.pptx
Invoices-app it is uesde to build a.pptx
 
Database Engine Control though Web Portal Monitoring Configuration
Database Engine Control though Web Portal Monitoring ConfigurationDatabase Engine Control though Web Portal Monitoring Configuration
Database Engine Control though Web Portal Monitoring Configuration
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
 
School management System
School management SystemSchool management System
School management System
 
IRMUK-SOA_for_MDM_DQ_Integration_DV_20min
IRMUK-SOA_for_MDM_DQ_Integration_DV_20minIRMUK-SOA_for_MDM_DQ_Integration_DV_20min
IRMUK-SOA_for_MDM_DQ_Integration_DV_20min
 
software design principles
software design principlessoftware design principles
software design principles
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
Project for Student Result System
Project for Student Result SystemProject for Student Result System
Project for Student Result System
 
Dori waldman android _course
Dori waldman android _courseDori waldman android _course
Dori waldman android _course
 

More from Apurv Singh Gautam

More from Apurv Singh Gautam (15)

Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty things
 
Threat Hunting on the Dark Web
Threat Hunting on the Dark WebThreat Hunting on the Dark Web
Threat Hunting on the Dark Web
 
All about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS student
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Cyber Security Seminar Day 1
Cyber Security Seminar Day 1Cyber Security Seminar Day 1
Cyber Security Seminar Day 1
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
OSINT
OSINTOSINT
OSINT
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Flexible Displays
Flexible DisplaysFlexible Displays
Flexible Displays
 
India against corruption
India against corruptionIndia against corruption
India against corruption
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Encrypted database management system

  • 2.  Today everyone is turning towards technology and they believe it is quite secure and easy to handle because of END TO END encrypted database management system.  Encrypted database management system helps us to handle our personal and important database easily.  The manager can access the whole data of their employees easily from anywhere just using their smart phone. INTRODUCTION
  • 3.  Encrypted database is more secured because even when data is stolen the attackers cannot access the data without the key.  In END TO END encryption even developers cannot see the data transferred between two users .Example :- Whatsapp.  Requires less security because data is in encrypted form. ADVANTAGES OF ENCRYPTED DATABASE
  • 4. Administrator can add following details 1. Name of employee 2. Age of employee 3. ID number of employee 4. Mobile number of employee 5. Salary of employee The features of this program are as follows.
  • 5. 6. Sector of employee 7. Year of joining 8. Gender 9. Designation
  • 6.  login() – This function provides the user interface for administrator to enter the username and password.  display() – This function is used to display the two lines(component of UI) after 1.5 sec. Operations that can be performed on database.
  • 7.  choice() - This function checks the password entered by administrator and if the password is correct it allows to enter the database and also provides the user interface to choose the operations like end, decrypt, encrypt, write, delete, search, modify, read.
  • 8.  read() – This function is used to call getdata() and decide that more record are to be entered or not.  getdata() – This function is called in read function to get the data of one employee.
  • 9.  write() – This function is used to create user interface for entering the data.
  • 10.  modify() and modifydata() – These functions are used to modify the existing data.
  • 11.  displaydata() – This function display the single record from data.
  • 12.  search() – This function is used to search a particular record in database.
  • 13.  deleted() – This function is used to delete the particular record from the database.
  • 14.  displayall() – This functions is used to display the whole database together.
  • 15.  encrypt() – This function is used to encrypt the data to unreadable format.
  • 16.  decrypt() – This function is used to decrypt the data to original format.
  • 17.  end() – This function displays the screen below.
  • 18. CONCLUSION  For now what our knowledge says is C++ is the best programming language.  C++ language can solve almost every real world problem  C++ language should be used for making our life easy by writing such programs.
  • 19. Made by :- Apurv Singh Gautam Rushin Tilva Thankyou !!