INTEGARTION OF FLUTTER WITH DOCKER (DOCKER APP)

🎯 Task 11 🎯

1. Create attractive GUI

2.Make sure you implement other technologies if possible

3.Show your creativity (Optional: Animations,Responsive UI,DB connection ,etc)

TASK STATEMENT

⦁ Many individuals don’t have knowledge of docker and its commands but still have the need to…

What is JavaScript?

JavaScript is a scripting or programming language that allows you to implement complex features on web pages — every time a web page does more than just sit there and display static information for you to look at — displaying timely content updates, interactive maps, animated 2D/3D…

Task Description 📄

⚙️ Task 7.1 -

📌 We have to create a Web Application for Docker (one of the great Containerization Tool which provides the user
Platform as a Service (PaaS)) by showing your own creativity and UI/UX designing skills to make the web portal user friendly.
📌 This app will help the…

Task Description 📄

❄️ Create a program that perform below mentioned task upon recognizing a particular face.

📌 When it recognize your face then —
👉 It send mail to your mail id by writing this is face of your_name.
👉 Second it send WhatsApp message to your friend, it can be anything.

📌 When it recognize second face, it can be your friend or family members face.
👉 Create EC2 instance in the AWS using CLI.
👉 Create 5 GB EBS volume and attach it to the instance.

Task Description 📄

📌 Create Live Streaming Video Chat App without voice using cv2 module of Python:

Server Side Code (“Server.py”)

import socket, cv2, pickle,struct

# ----->Socket Creation
server_socket = socket.socket(socket.AF_INET,socket.SOCK_STREAM)

#getting host ip
host_name = socket.gethostname()
host_ip = socket.gethostbyname(host_name)

#port as user input
port = int(input('Enter the port number----->'))
socket_address = (host_ip,port)

# ---->Socket binding
server_socket.bind(socket_address)

# ----->Socket listening
server_socket.listen(5)
print("listening…

What is Cyber Crime?

Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense. A cybercriminal may use a device to access a user’s personal information, confidential business information, government information, or disable a device. …

Priyanshugoyal

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store