#class 12 computer science data file handling
Explore tagged Tumblr posts
Text
Worst Stock
View On WordPress
#a donation of mageweave tbc#ba graduation job#cbse computer science class 10#cbse computer science class 11#class 12 computer science all in one#class 12 computer science amplify learning#class 12 computer science data file handling#class 12 computer science data structures
0 notes
Text
Best Cbz Reader For Mac
Cbz Reader Download
Best Cbz Reader For Mac
Best Cbz Reader For Mac
If you're looking for a CBR and CBZ reader for your favorite OS, look no farther. Comical is an easy-to-use, featureful GUI comic book viewer, written in C++ using wxWidgets. Comic Book Reader supports all major formats like CBR, CBZ, XPS, EPUB, and PDF. CDisplay Ex Lightweight, easy to use and having just the right features, CDisplay Ex is a great comic book reader software for Windows 10. CDisplay Ex is a light, efficient and Free CBR Reader, and it is also the most popular comic book reader.It is able to read all comic book formats (.cbr file,.cbz,.pdf, etc.) and Manga. Everything is designed to give you the best comic reading experience, it load comic books immediately, reading is fluid and comfortable even on slow computer. Mac & iOS: Just go for YACReader, it’s the best comic book reader for Mac and iOS. Windows 10 PC and Mobile: Go for the UWP app called Cover-Comic Book Reader, not only it’s the best comic book reader for Windows 10 PC and Mobile, but it also has the best UI I’ve ever seen on a comic book reader. Rename the file extension to RAR and you can just unarchive it with any capable unarchiver software. Same as CBZ, which uses ZIP. CBR/CBZ are usually used for regroup scanned comic book pages. If you have a CBR file and you want to read the content directly without unarchiving it first, I’d recommend EdgeView 2 for Mac. It’s by far the only comic book reader I’ve ever tested that can do the simplest thing correctly, such as zoom to fit for every page.
CBR/CBZ are usually used for regroup scanned comic book pages. If you have a CBR file and you want to read the content directly without unarchiving it first, I’d recommend EdgeView 2 for Mac. It’s by far the only comic book reader I’ve ever tested that can do the simplest thing correctly, such as zoom to fit for every page. After the recent hiccups introduced by the comicvine database transitioning to a new location, cbanack has releases a new and updated version of his incredible Comic Vine plugin for ComicRack. You can get the new build at the usual location.
These 2019's comic book reader apps for iPhone and iPad are easily the best of the lot. Check out this exclusive list and pick out the one that stands out for you to liven up your comic reading experience.
Do you have a penchant for reading comic books? If yes, we have you covered with the best comic book reader apps to let you experience the spectacle of “Iron Man,” The Avengers, X-Men and more.
What makes these comic reader apps special is the ability to offer unmatched comic reading experience. They support most comic formats and allow you to organize your comics with utmost ease. What’s more, you can even fine tune them to suit your best interest!
Best Comic Book Reader Apps for iPhone and iPad in 2019
#1. Episode ft Pitch Perfect
Episode ft Pitch Perfect is an ideal app to enjoy reading interactive and visual stories. Boasting of the vast catalog of more than 35, 000 stories featuring all the genres like romance, fantasy, comedy and more, it keeps your interest in reading something out-of-the-box alive.
The interactive stories offer you a great chance to lead your life just the way you want and have the desired success. As, you can choose your path to love, popularity and more. Find a gorgeous woman or a super handsome guy to fall in love. That’s not all; there are a lot of mysteries to be unraveled and dangers which you need to encounter to achieve your goal.
Price: Free Download
#2. Wattpad
Wattpad is the one-stop platform to read all types of books and interesting stories. Based on what gets you going, you can explore several things like mystery, comedy, action, fiction, science fiction, romance, adventure, fantasy and more.
You can easily save any articles to read them offline. With the option to sync your account, you will be able to pick up from where you left off on any of your iOS devices. Most importantly, you can directly connect with writers and other readers and share your experience or discuss.
Price: Free Download
#3. comiXology
comiXology is one of the finest comic reader apps. With this app, you will enjoy reading Kindle comics, graphic novels as well as Magna purchases. The massive library boasts of tons of Marvel comics, image comics, DC comics. You can also search for and add your favorite books to the wishlist. If you want to make your comic reading more delightful, you shouldn’t look beyond comiXology.
Price: Free Download
#4. iComics
iComics is designed to be a top class comic reader app. It is compatible with most comic formats such as ZIP, CBZ, RAR, CBR, 7ZIP, CB7, TAR, CBT, LZH, LHA, EPUB, PDF. It features a slider that allows you to move from one comic to another with ease. You can split extra-wide pages to make reading a bit easier. You have the option to share, email and even save individual pages.
Price: $1.99 Download
#5. Chunky Comic Reader
This one is a complete comic book reader app. It’s highly user-friendly and easy-to-use. With the super handy upscaling feature, it makes even low-resolution comics look nice. It features auto-contrast/tint which fixes yellow pages as well as faded ink. There is a self-organizing library which keeps all your stuff in perfect order.
Price: Free Download
#6. Marvel Unlimited Comics
With Marvel Unlimited Comics, you can access a vast library of more than 17, 000 digital comics. Even if you are not connected to Cellular or Wi-Fi, it lets you read up to 12 issues offline. It includes some famous Marvel comics including Spider-Man, The Avengers, Iron Man, Captain America, Hulk, X-Men and more. It allows you to preview every issue in the archive and read some selected issues if you are not signed up.
Price: Free Download
#7. Madefire Comics & Motion Books
The last but not least, “Madefire Comics & Motion Books” is one of the most adorable comic book reader apps for iOS. With the synchronized sound effects, music and 360 panoramic views, it offers an amazing reading experience.
From Batman, Superman, Star Trek to Dark Horse, it was packed in with everything that can thoroughly entertain you. As the new releases are added every week, you will never get bored and always have plenty of options to explore. You can browse through new print comic titles from famous publishers in the print books storefront and quickly buy the one you love via in-app purchases.
Price: Free Download
#8. Comic Book Reader: Viewer for Comic
This comic book reader app supported all formats and considered to be the best for reading, cb7, cbz, cbr, and cbt comics. The impressive design and intuitive user-interface make reading books a great experience.
Thanks to the integration with major cloud services such as Google Drive, Dropbox, OneDrive, Box and network services including SMB, FTP, SFTP, DLNA, it lets you quickly open documents from any network or cloud services. Page layout option in documents such as single page, double page offer more convenience. You can bookmark any story to read it later. The file manager allows you to keep your library in perfect order.
Price: Free Download
#9. Comic Zeal Comic Book Reader
“Comic Zeal Comic Book Reader” is feature-rich and a perfect app to enhance your comic book reading experience. It lets you organize your collection as desired. As, you can put series inside series, and with the use of dividers, you will be able to manage long lists. There is also an option to sort comics into their respective series automatically. Better still, it also includes a parental lock for specific series.
Price: $4.99 Download
#10. ComicFlow
With the smart interface, ComicFlow provides an unmatched comic reading experience. It’s equipped to handle large comic collections. You can easily import your favorite comics in the background. It supports cbr, .cbz and pdf files. It’s compatible with the only iPad.
EC Technology SD Card Reader Aluminum Superspeed USB 3.0 Multi-In-1 Card Reader for SD Card/CF Card/Micro SD Card and More for MacBook Pro Air, iMac, Mac Mini, Microsoft Surface Pro, Lenovo Yoga by EC Technology. Safari opens the Adobe Flash Player page on the Adobe website. Follow the instructions on the Adobe website to download and install the latest version of the plug-in. If you need to use an older version of Flash Player, you can use Internet plug-in management in Safari to run the plug-in in unsafe mode for websites that you trust. Flash player for mac. Adobe flash reader free download - Adobe Flash Player, Adobe Acrobat Reader DC, Adobe Flash Professional CS5.5, and many more programs. Download free Adobe Flash Player software for your Windows, Mac OS, and Unix-based devices to enjoy stunning audio/video playback, and exciting gameplay.
Price: Free Download
That’s it!
Signing Off
These comic book reader apps excel in letting you read books with optimum convenience. So, whether you want to read science-fiction, romance or action thriller, these CBR apps are the class apart. Have I missed any top CBR app for iOS?
Do let us know that in the comments below, on Facebook, Twitter, and Telegram. Also, make sure to try our app on your iPhone and iPad.
Previous articleHow to Change Keyboard Layout on Mac
Next articleBest Apple Watch Series 4 Charging Stands in 2019: Charge Your Smartwatch Elegantly
Please enable JavaScript to view the comments powered by Disqus.
If you've been looking to go digital with your comic book collection, you're probably overwhelmed with all the comic readers available on the iPhone and iPad. Fret no more: Comic Zeal is the app you want.
A Comic Book Lover's Guide to Going Digital
Whether you've been a diehard comic book fan for years or you just want to see what…
Udf reader for mac os x. For Mac OS 10.4. Enables an Apple computer to mount and read disks formatted with recorded video and data files, and supports mounting and reading of DVD, HD-DVD, Blu-ray and other optical media. The new ReadDVD!
Read more Read
Advertisement
Comic Zeal
Platform: iPhone and iPad Price: $4.99 Download Page
Features
Automatically organizes all your comics by series
Manually organize your comics with swipe gestures and easy-to-understand options
Track which comics you have and haven't read
Search and find your comics by title and tags
Proceeds directly to next issue when done reading
Zoom lock lets you fit the page to your screen however you want and remembers it between pages
Tons of additional settings for brightness, navigation, and reading
Load comics over USB, Wi-Fi, or Dropbox
Where It Excels
Comic Zeal is, hands down, the best app on iOS for organizing your comic library. When you import new comics, it automatically detects the series name and filters them all into their own categories by series. If you want to do something different—like create a reading list for a multi-series event—you can do so by swiping individual issues into ComicZeal's 'slider,' then emptying them out as you see fit. It can be a little tedious to do, but it's still light years ahead of any other comic readers. Comic Zeal also has a lot of settings for reading, which means you can get everything set up just how you like it. The 'smart zoom' feature is particularly awesome.
Advertisement Kindle reader for mac download.
Where It Falls Short

Comic Zeal does have a few annoyances, but they're minor enough to keep it in the top slot. Turning pages is a bit slower than it is in other comic readers, so going from page to page doesn't feel very smooth at all. Similarly, importing comics takes a long time, and you can't do anything while the app is importing—so if you're importing a large number of comics, be prepared to set your device down and wait awhile.
Advertisement
The Competition
Cbz Reader Download
Comic Viewer is slightly cheaper at $3.99, but has enough options to keep most people happy. It has a 'fit to screen' or 'fit to width' mode which works flawlessly, and it has a few settings to keep the reading experience solid. It also has a silly-but-kind-of-awesome page flipping animation and sound (which you can turn off), if you want to recreate the real-life reading experience as much as possible. Its organization is nowhere near the level of ComicZeal's (though you can manually categorize things themselves), so I'd recommend spending the extra dollar on Comic Zeal. Comic Viewer is certainly a solid alternative, though.
Advertisement
If you want something free, ComicFlow is probably your best choice. Its 'library' interface is very similar to Comic Zeal's, but with some nice filtering options (though not nearly as many good organization options). ComicFlow, as its name describes, excels at flipping between pages with fantastic smoothness (unlike Comic Zeal). However, it doesn't remember your 'zoom' level on each page, which is extremely annoying for people that don't want it to fit every page to the screen. It also is pretty bare when it comes to settings (for example, it only gives you a 'dim mode' rather than letting you adjust the in-app brightness). Like ComicZeal, ComicFlow can import comics over Wi-Fi, but it'll cost you $3.99 after the first 50 transfers. If ComicFlow has one incredible advantage, its that it imports comics in the background, which is really nice.
Best Cbz Reader For Mac
CloudReaders is another popular one, and while its interface isn't nearly as pretty as Comic Zeal or ComicFlow, the reading experience is a good one. Like ComicFlow, flipping between pages is fantastically smooth, and it has a few more settings if you don't care about looks, care about features, and want something free.
Advertisement
Of course, all the above apps are for reading your DRM-free CBR, CBZ, or PDF comics. If you want to read comics from the official source, you'll want something like Comics from ComiXology. ComiXology is the place to buy, download, and sync comics straight from companies like Marvel and DC (who, incidentally, have their own Marvel and DC versions of the app), as well as others like Image, IDW, and Disney. If you're looking for new comics from these companies, this is the app you'll want to download.
Lifehacker's App Directory is a new and growing directory of recommendations for the best applications and tools in a number of given categories. Free epub reader for mac download.
Best Cbz Reader For Mac
Advertisement
1 note
·
View note
Text
300+ TOP STATA Interview Questions and Answers
STATA Interview Questions for freshers experienced :-
1. What is the elementary use of Stata? The integrated statistical software is fundamentally used as an integral part of research methodologies in the field of economics, biomedicine, and political science in order to examine data pattern. 2. What are the most advisable functions performed with the help of Stata? The program is best suited for processing time? the series, panel, and cross? sectional data. 3. What makes the tool more intuitive? The availability of both command line and graphical user interface makes the usage of the software more spontaneous. 4. What are the competencies of using Stata software? The incorporation of data management, statistical analysis, graphics, simulations, regression, and custom programming and at the same time it also accommodates a system to disseminate user-written programs that lets it grow continuously, making it an integral statistical tool. 5. List four major builds of Stata and state their purposes? STATA MP - Multiprocessor computer which includes dual-core and multicore processors. STATA SE - Majorly used for analyzing larger databases STATA IC - The standard version of the software Numerics by STATA support MP, SE AND IC data types in an embedded environment. 6. State the various disciplines which use Stata as an integral software for efficient results? STATA software acts as an effective analytical and statistical tools for major sectors, they are as follows : Behavioral sciences: Behavioral scientist entrust STATA for its accuracy, extensibility, reproducibility, and ease of use features. Whether it is an extensive research on cognitive development, studying personality traits or developing measurement instruments, The software accommodates all the required collateral to pursue a broad range of behavioral science questions. Education: In the process of developing new tests or researching diverse topics as learning and development, teacher effectiveness, or school finance, STATA establishes the relevant and accurate statistical methodology options forward. The analysis is consistently integrated with illustrations (graphics) and data management into one package in order to seek a wide range of educational questions. Medical: Medicinal researchers entrust to use STATA for its range of biostatistical methods and reproducibility approach towards the data. In the process of any medical research or while performing a clinical trial, the program provides accurate tools which helps conduct the study from power and sample-size calculations to data management to analysis. Biostatistics: Biostatisticians approve of STATA for its accuracy, extensibility, and reproducibility. Inconsiderate of the study’s statistical approach or focus area or whether it is a cross-sectional, longitudinal, or time-to-event. STATA equips the users with all the necessary statistics, graphics, and data management tools needed to implement and study a wide range of biostatistical methods. Economics: The researchers in the field of economics have always relied upon STATA for its accuracy and relevancy. Whether its a study on educational institution selection research process, Gross domestic price or stock trends, Stata provides all the statistics, graphics, and data management tools needed to complete the study with utmost authenticity. Business / Finance - Marketing: financial and marketing research analysts often rely on this tool in the case of researching asset pricing, capital market dynamics, customer-value management, consumer and firm behaviour, or branding, the reason being its accuracy and extensibility of providing all the statistics, graphics, and data management tools. Sociology: Apart from the above-listed sectors, STATA is also used in the study of demographic and geographic research processes. 7. What are the key features of Stata/ MP? STATA/ MP is termed as the fastest and largest version of the program. This version’s multiprocessing abilities provide the most comprehensive support (multi core) to all kinds of statistics and data administration. STATA/MP supports over 64 cores/processors, making it the fastest medium to analyze the data when compared to STATA/SE. This version interprets 10 to 20 billion observations in comparison to STATA/SE’s 2 billion observations. The program is 100% compatible with other versions and needs no modification of the analyses to obtain Stata/MP's speed improvements. 8. List down few highlights of new Stata 15? Extended regression modules which can address the problems such as Endogenous covariates, Nonrandom treatment assignment etc in any combination, unlike the previous Heckman and ivregress modules. STATA’S Latin Class Analysis helps to identify unobserved categories in the latent classes. STATA now supports Markdown - A standard markup language that allows text formatting from plain text input. Program's Dynamic stochastic general equilibrium command estimates the parameters of DSGE models that are linear in the variables but potentially nonlinear in the parameters. Bayes prefix, when combined with Bayesian features with STATA’S spontaneous and elegant specification of regression models, lets the users fit Bayesian regression models more conveniently and fit additional models. 9. What is the work function of Stata’S user interface? Primarily, STATA by default opens in four different windows : Results: This window displays all the commands and their results, with an exception being made for graphs which are showcased in their own window. Review: Only the commands are made visible in this particular window. When clicked on any specific command by the user it appears on a separate window. The review tab has an option of “ Save Review Contents ” which allows the user to save all documented files in the review window to a file for later use. ( This is not a substitute for log and do files.) Command: This is the space used to type the commands while working in an interactive mechanism. All the content typed here will be reflected in both results and review windows. “ Page Up “ and “ Page Down “ keys are used in order to view previously executed commands. Variables: Entire list of user ’s variables and their labels are displayed here. When clicked it will be pasted in the command window. 10. What are the various data format compatible with Stata software? STATA is compatible to import data from various formats, Inclusive of ASCII data formats (such as CSV or databank formats) and spreadsheet formats (including various Excel formats). It can as well read and write SAS XPORT format datasets natively, using the fdause and fdasave commands. The STATAS’s dominion file formats are platform independent, which enables the users from different operating systems comfortably exchange datasets and programs. Although there has been consistent change over the course of time with respect to STATA’S data format, still the users can read all older dataset formats and can write both the current and most recent previous dataset format, using the same old command.
STATA Interview Questions 11. Elaborate on Do, Log and CmdLog files? The User must always operate his work in a do-file, which ensures the output can be reproduced at a later time. One can start a do.file by simply clicking on the do.file editor button. The user has to also make sure to always turn on “Auto indent” and Auto save on do/run” options presented in the preferences tab. Another cardinal rule while working on STATA is the always maintain a log file running. These files have a record of the work done and even showcases the results. This function can be activated by giving "log using mylog.log" command. The usage of “.log” extension automatically creates the log as a plain text file that can then be opened in Microsoft Word or notepad as well as Stata's viewer. One can initiate command log with the command "cmdlog using mycmdlog.log". This ensures the file is saved in the text format. CmdLog has only the executed commands with no reflection of the output. Additionally, all the commands irrespective of where they are issued from are recorded in the command log. 12. Explain Stata salient features? Time series: This feature of the software allows the users to handle all the statistical challenges constitutional to time-series data, for example, common factors, autoregressive conditional heteroskedasticity, unit roots, autocorrelations etc. The program operates various activities like filtering to fitting compound multiple variate models and graphing which reveals the structure into the time series. Survival Analysis: With the help of specialized survival analytical tools provided by STATA, the user an analyze the duration of an outcome. They can estimate and plot the possibility of survival over time irrespective of discrepancies such as (unobserved event, delay entry or gaps in the study). hazard ratios, mean survival time, and survival probabilities can be predicted with the help of this model. Extended regression Models: ERM is the face name for the class of models addresses several complications that arise on a regular basis frequently. Example of ERMS are 1) endogenous covariates, 2) sample selection and 3) non random treatment assignment. These complications can either arise alone or with any combination. The ERMs grants the user to make authentic inferences. Structural Equation Modeling: SME performs an assessment of the mediation effects. It evaluates the relationship between unobserved latent concept and observed variables that measure the concerned latent concept. ANOVA / MANOVA: These are known as Fit one- and two-way models. They analyze the data enclosed, fixed or random factors or with repeated measures. ANOVA is used when the user faces continuous covariates, whereas MANOVA models when the user has multiple outcome variables. The relationship between the outcome and predictors can be explored by estimating effect sizes and computing least-squares and marginal means. 13. List down standards methods and advanced techniques provided by Stata program? STATA provides over 100 various authentic statistical tools. Here are the few examples: STANDARD METHODS ADVANCED TECHNIQUES Basic tabulations and summaries Time-series smoothers Multilevel models Binary, count, and censored outcomes Case-control analysis Contrasts and comparisons Dynamic panel-data (DPD) regressions Multiple imputations Power analysis SEM (structural equation modeling) ANOVA and MANOVA Latent class analysis (LCA) 14. Explain Publication - Quality graphics feature? STATA makes it convenient for the users to generate high-quality styled graphs and visual representations. A user can either point and click or write scripts to produce numerous graphs in a reproducible manner. In order to view the visual, it must be either converted into EPS or TIF for publication, to PNG or SVG for the web, or to PDF. With an additional feature of integrated graph editor, the user can alter the graph accordingly. 15. List the different graph styles provided by STATA? STATA is one of the recommended software to create graphical illustrations, the following are the types of graphs made available by STATA namely : Bar charts Box plots Histograms Spike plots Pie charts Scatterplot matrices Dot charts Line charts Area charts etc. 16. How does the reading and documentation function work in STATA? In order to write a program to read data into STATA, Then the user has two possible choices. “Infile” and “infix” . When compared to infix, the infile command has more capabilities but at the same time has a higher level of complexity. If the user’s codebook has “start” and “length” information for the variables or the variables are separated by spaces ( not commas or tabs) then it advisable to use infile. On the other hand, if the codebook contains “start” and “end” column information then, the user can go ahead with infix. 17. What are the advantages of using STATA program? STATA is a fast, accurate and easy to use interface, with an additional feature of intuitive command syntax making it a powerful statistical data analytical tool. STATA provides a wide range of statistical tools from standard methods such as Basic tabulations and summaries, Case-control analysis, Linear regression to advanced techniques for example: Multilevel models, Dynamic panel data regressions, SEM etc. Data administration feature of STATA allows complete control over all data types. The user can then combine and reshape data sets, manage variables, and collect statistics across groups or duplicates. The software is capable to manage unique data sets (survival/duration data, panel/longitudinal etc.) The program is cross-platform compatible which includes windows, MAC, Linux. 18. Explain the role of MATA programming language? MATA is a full-fledged programming language that compiles the data typed into bytecode, optimizes it, and executes it fast. Al though it is not a requirement in order to use STATA a fast and complex matrix programming language is an essential part of STATA. The language acts as both interactive environments for manipulating matrices and fully developed environment that can produce compiled and optimized code. It complies important features for the processing of panel data, performs operations on real or complex matrices and offers outright support for object-oriented -programming and is fully integrated with every form of STATA. 19. Explain describe and codebook commands? Once the data is loaded in STATA, User must document in order to know what are the variables and how they are coded. The describe and codebook commands furnish information about the user’s data. Describe command is the most basic form of a command. It projects a short description of the file and also lists variables and their required information in the datasets. Codebook drafts a detailed description of each variable. By default, the codebook command will list variables that have nine or less discrete values and means for those which are more than nine. STATA Interview Questions and Answers Pdf Download Read the full article
0 notes
Photo

Python Programming is designed as a textbook to fulfil the requirements of the first-level course in Python programming. It is suited for undergraduate degree students of computer science engineering, information technology as well as computer applications. This book will enable students to apply the Python programming concepts in solving real-world problems. The book begins with an introduction to computers, problem solving approaches, programming languages, object oriented programming and Python programming. Separate chapters dealing with the important constructs of Python language such as control statements, functions, strings, files, data structures, classes and objects, inheritance, operator overloading and exceptions are provided in the book. • Case studies on creating calculator, calendar, hash files, compressing strings and files, tower of Hanoi, image processing, shuffling a deck of cards and mail merge demonstrate the application of various concepts. • Point-wise summary and glossary of key terms to aid quick recapitulation of concepts. Table of contents 1. Introduction to Computers and Problem Solving Strategies 2. Introduction to Object Oriented Programming 3. Basics of Python Programming 4. Decision Control Statements 5. Functions 6. Python Strings Revisited 7. File Handling 8. Data Structures 9. Classes and Objects 10. Inheritance and Polymorphism 11. Operator Overloading 12. Error and Exception Handling. • About the Author - Reema Thareja is presently Assistant Professor, Department of Computer Science, Shyama Prasad Mukherji College for Women, University of Delhi. #unifeed #onlinebookstore #pune #reemathareja #python #pythonprogramming #oop #programming #code #pythonprogramming (at Python) https://www.instagram.com/p/B2zK3Cxh60l/?igshid=tuzb744iutd4
0 notes
Text
NCERT Class 12 Computer Science Chapter 7 Networking and Open Source Concepts
NCERT Class 12 Computer Science Python Solutions for Chapter 7 :: Networking and Open Source Concepts
TOPIC-1
Communication TechnologiesVery Short Answer Type Questions (1 Mark each)
Question 1:Identify the Domain name and URL from the following:https://ift.tt/2Rc5dG8Answer:Domain name – income.inURL – https://ift.tt/2Rc5dG8.
Question 2:What is web hosting?Answer:Web hosting is the service that makes our website available to be viewed by others on the Internet. A web host provides space on its server, so that other computers around the world can access our website by means of a network or modem.
Question 3:Write two characterstics of Wi-Fi.Answer:
It is wireless network.
It is for short range.
Question 4:Which protocol is used to creating a connection with a remote machine?Answer:Telnet: It is an older internet utility that lets us log on to remote computer system. It also facilitates for terminal emulation purpose.
Question 1:Which protocol is used to create a connection to a remote machine? Give any two advantages of using optical fibers.Answer:Two advantage of using optical fibers are:
Capable of extremely high-speed.
No electromagnetic interference.
Extremely low attending.
Question 6:Expand the following:
GSM
GPRS
Answer:
GSM: Global System for Mobile Commu-nication.
GPRS: General Packet Radio Service.
Question 7:What is the difference between packet and message switching ?Answer:
Question 8:What is cloud computing?Answer:The sharing of compute resources (dedicated, time-shared, or dynamically shared servers) and related infrastructure components (load balncers, firewalls, network storage, developer tools, monitors and management tools) to facilitate the deployment and operation of web and network based applications. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a net-work.
Question 9:Which type of network (out of LAN, PAN and MAN) is formed, when you connect two mobiles using Bluetooth to transfer a video?Answer:PAN
Question 10:Write one characterstic each for 2G and 3G mobile technologies.Answer:2G networks primarily involve the transmission of voice information, 3G technology provides the additional advantage of data transfer.
Question 11:What is the difference between Packet switching and circuit switching techniques?Answer:In circuit switching, a dedicated path exists from source to destination while in packet switching, there is no fixed path.
Question 12:Write two advantages of using an optical fibre cable over an Ethernet cable to connect two service stations, which are 200 m away from each other.Answer:Advantages of optical fibre:
Faster speed than ethernet
Lower attenuation
Question 13:Write one advantage of bus topology of network. Also illustrate how four (4) computers can be connected with each other using bus topology of network.Answer:Advantage (benefits) of linear Bus topology is that the cable length required for this topology is the least compared to the other networks.Bus Topology of Network:
Question 14:Give one suitable example of each URL and Domain Name.Answer:URL: http://waltons.inDomain Name: @gmail.com
Question 15:Write one advantage of star topology network? Also, illustrate how five (5) computers can be connected to each other using star topology of network.Answer:Advantage (benefits) of star toplogy:Easy to replace, install or remove hosts or other devices.
Question 16:What is the function of Modem?Answer:The function of modem is modulation and demo-dulation, means turn data into a format that can be transmitted via an audio link such as a phone line.
Question 17:Explain the purpose of a router.Answer:A router established connection between two networks and it can handle network with different protocols. Using a routing table, routers make sure that the data packets are travelling through the best possible paths to reach their destination.
Question 18:Name any two components required for net-working.Answer:
Repeater
Routers
Question 19:What are repeaters?Answer:A repeater is an electronic device that receives a signal and retransmits it at a higher level and/ or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
Question 20:Mention one advantage of star topology over bus topology in networking?Answer:Simple to add more computers to network.
Question 21:Differentiate between packet swiching and message switching technique in network commu-nication.Answer:In packet switched network, data are transmitted in discrete units of potentially variable length blocks called packets, while in message switching mechanism, a node receives a message stores it until the appropriate route is free, then sends it along.
Question 22:Differentiate between Bus and Star topology of network.Answer:
Question 23:What is VoIP?Answer:Voice over Internet Protocol (VoIP) is one of a family of internet technologies, communication protocols, and transmission technologies for delivery of voice communications and multi-media sessions over internet protocol (IP) network, such as the internet.
Question 24:In networking, what is WAN? How is it different from LAN?Answer:WAN (Wide Area Network):A communication network that uses such devices as telephone lines, satellite, dishes, or radiowaves to span a larger geographic area which cannot be covered by a LAN.
Question 25:Define the term bandwidth. Give any one unit of bandwidth.Answer:Bandwidth is referred as the volume of information per unit of time that a transmission medium (like an internet connection) can handle.ORThe amount of data that can be transmitted in a fixed amount of time is known as bandwidth. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).
Question 26:What is the difference between LAN and MAN?Answer:LAN: It is Local Area Network. The diameter is not more than a single building.WAN: It is Metropolitan Area Network. LAN spans a few kms while MAN spans 5-50 km diameter and is larger than a LAN.
Question 27:What is the importance of URL in networking ?Answer:A Uniform Resource Locator (URL) is used to specify, where an identified resource is available in the network and the mechanism for retrieving it. A URL is also referred to as a web address. 1
Question 28:What was the role of ARPANET in the computer network?Answer:In 1969, ARPANET was set up by the American government for defence purpose. ARPANET stands for Advanced research Projects agency Network.
Question 29:Which of the following is not a unit for data transfer rate ?
bps
abps
gbps
kbps
Answer:(ii) abps
Question 30:Identify the type of topology from the following:
Each node is connected with the help of a single cable
Each node is connected with the help of independent cable with central switching.
Answer:
Bus topology
Star topology
Question 31:ABC International School is planning to connect all computers, each spread over a distance of 50 metres. Suggest an economic cable type having high speed data transfer to connect these computers.Answer:Optical fibre cable.
Question 32:Mahesh wants to transfer data within a city at very high speed. Write the wired transmission medium and type of network.Answer:Wired transmission medium – Optical fibre cable Type of network – MAN.
Question 33:Which device is used to connect all computers inside a lab?Answer:Hub
Question 34:Which device is used to connect all computers to the internet using telephone wire?Answer:RJ – 45. It is an eight wired connectors used to connect computers on a LAN.
Question 35:What is Wi-Fi Card?Answer:Wi-Fi cards are small and portable cards that allow the computer to connect to the internet through a wireless network. The transmission is through the use of radio waves.
Short Answer Type Questions
Question 1:Write any two differences between twisted pair and co-axial pair cable.Answer:
Question 2:Write one advantage of Bus Topology of network, also, illustrate how 4 computers can be connected with each other using star topology of network.Answer:Bus topology: Cable length required for his topology is the least compared to other networks.
Question 3:Explain any two switching techniques used in networking.Answer:Message Switching: It is similar to Post-office mailing system. A temporary link is established for one message transfer.Packet Switching: It is a form of store and forward switching system which stores the message as small packets at the switch nodes and then transmits it to the destination.
Long Answer Type Questions
Question 1:Write answer of the following:(a) Differentiate between PAN and LAN types of networks.(b) Which protocol helps us to transfer files to and from a remote computer ?(c) Write two advantages of 3G over 2G mobile telecommunication technologies in terms of speed and services.(d) Write two characteristics of Web 2.0(e) Write the basic difference between worm and Trojan Horse.(f) Categorize the following under client-side and server-side scripts category:
Jave Script
ASP
VB Script
JSP
(g)Intelligent Hub India is a knowledge community aimed to uplift the standard of skills and knowledge in the society. It is planning to setup its training centres in multiple towns and villages pan India with its head offices in the nearest cities. They have created a model of their network with a city, a town and 3 villages as given.As a network consultant, you have to suggest the best network related solution for their issues/problems raisedin (i) to (iv) keeping in mind the distance between various locations and given parameters.
Shortest distance between various locations:
Number of computers iinstalled at various locations are as follows:
Note:• In Villages, there are community centres, in which one room has been given as training center to this organiza¬tion to install computers.• The organization has got financial support from the government and top IT companies.
Suggest the most appropriate location of the SERVER in the YHUB (out of the 4 locations), to get the best and effective connectivity. Justify your answer.
Suggest the best wired medium and draw the cable layout (location to location) to efficiently connect vari¬ous locations within the YHUB.
Which hardware device will you suggest to connect all the computers within each location of YHUB?
Which server/protocol will be most helpful to conduct live interaction of Experts from Head office and people at YHUB locations?
Answer:1.(a)OR(b) FTP or Telnet or TCPFTP OR Telnet OR TCP(c) Speed
Faster web browsing.
Faster file transferService –
Better video clarity
Better security
OR(Any other correct advantage can be considered)
(d) Makes web more interactive through online social media.Supports easy online information exchange.Interoperability on the internet.Video sharing possible in the websites.(e)
(f)
(g)(i) YTOWNJustification
Since it has the maximum number of computers.
It is closet to all other locatios.
(ii) Optical Fiber
(iii) Switch or Hub(iv) Video conferencing or VoIP or any other correct service/protocol.
Question 2:Indian School, in Mumbai is starting up the network between its different wings. There are four Buildings named as SENIOR, JUNIOR, ADMIN and HOSTEL as shown below:The distance between various buildings is as follows:Number of Computers in Each Building :
Suggest the cable layout of connections between the buildings.
Suggest the most suitable place (i.e., building) to house the server of this school, provide a suitable reason.
Suggest the placement of the following devices with justification.
Repeater
Hub/Switch
The organisation also has inquiry office in another city about 50-60 km away in hilly region. Suggest the suitable transmission media to interconnect to school and inquiry office out of the following :
Fiber optic cable
Microwave
Radiowave
Answer:
Server can be placed in the ADMIN building as it has the maxium number of computer.
Repeater can be placed between ADMINand SENIOR building as the distance is more than 110 m.
Radiowaves can be used in hilly regions as they can travel through obstacles.
Question 3:Vidya Senior Secondary Public School in Nainital is setting up the network between its different wings. There are 4 wings named as SENIOR(S), JUNIOR(J), ADMIN(A) and HOSTEL(H).Distance between various wings are given below:
Suggest a suitable Topology for networking the computers of all wings.
Name the most suitable wing where the Server should be installed. Justify your answer.
Suggest where all should Hub(s)/Switch(es) be placed in the network.
Which communication medium would you suggest to connect this school with its main branch in Delhi ?
Answer:
Server should be in Wing S as it has the maxi-mum number of computers. 1
All Wings need hub/switch as it has more thanone computer.
Since the distance is more, wireless transmission would be better. Radiowaves are reliable and can travel through obstacles.
Question 5:
Which out ot three type of networks LAN. MAN and WAN, is to be used when an institute connects computers of two adjacent computer laboratories ?
What is the difference between HTTP and FTP?
What is the major difference between Message Switching and Packet Switching in networking?
What is the basic difference between DNS and URL?
Give two applications of web 2.0.
Categories the following under client side and Server-Side script category?
JSP
ASP
VBScript
Jave Script
Answer:(i) LAN (The ange is upto one KM)(ii) (iv)(v) Application of web 2.0
web hosting
web browsing
web Indexing
web searching
(vi) Client side Script
JSP
Java ScriptServer Side Scripts
ASP
VB Script
Question 6:Trine Tech Corporation (TTC) is a professional consultancy company. The company is planning to set up their new offices in India with its hub at Hyderabad. As a network adviser, you have to understand their requirement and suggest them the best available solutions. Their queries are mentioned as (i) to (iv) below.Physical Locations of the blocked of TTC
What will be the most appropriate block, where TTC should plan to install their server?
Draw a block to cable layout to connect all the buildings in the most appropriate manner for efficient communication.
What will be the best possible connectivity out of the following, you will suggest to connect the new setup of offices in Bangalore with its London based office:
Satellite Link
Infrared
Ethernet Cable
Which of the following device will be suggested by you to connect each computer in each of the buildings:
Switch
Modem
Gateway
Answer:
Finance block because it has maximumnumber of computers.
Satellite link
Switch
Question 7:G.R.K International Inc. is planning to connect its Bengaluru Office Setup with its Head Office in Delhi. The Bengaluru Office G.R.K. international Inc. is spread across and area of approx. 1 square kilometer, consisting of 3 blocks – Human Resources, Academics and Administration.You as a network expert have to suggest answers to the four queries (i) to (iv) raised by them.Notes : Keep the distance between blocks and number of computers in each block in mind, while providing them the solutions.
Suggest the most suitable block in the Bengaluru Office Setup, to host the server.Give a suitable reason with your suggestion.
Suggest the cable layout among the various blocks within the Bengaluru Office Setup forconnecting the Blocks.
Suggest a suitable networking device to be installed in each of the blocks essentially required for connecting computers inside the blocks with fast and efficient connectivity.
Suggest the most suitable media to provide secure, fast and reliable data connectivity between Delhi Head Office and the Bengaluru Office Setup.
Answer:
Human Resources because it has maximum number of computers.
Switch 1
Satellite link
Question 8:Rovenza Communications International (RCI) is an online corporate training provider company for IT related courses. The company is setting up their new compus in Kolkata. You as a network expert have to study the physical locations of various blocks and the number of computers to be installed. In the planning phase, provide the best possible answers for the queries (i) to (iv) raised by them.Block to Block Distances(in Mtrs.)Expected computers to be installed in each block
Suggest the most appropriate block, where RCI should plan to install the server.
Suggest the most appropriate block to block cable layout to connect all three blocks for efficient communication.
Which type of network out of the following is formed by connecting the computers of these three blocks?
LAN
MAN
WAN
Which wireless channel out of the following should be opted by RCI to connect to students from all over the world?
Infrared
Microwave
Satellite
Write two advantages of using open source software over proprietary software.
Which of the following crime(s) does not come under cybercrime?
Copying some important data from a computer without taking permission from the owner of-the data.
Stealing keyboard and mouse from a shop.
Getting into unknown person’s social networking account and start messaging on his behalf.
Answer:
Faculty Recording Block.
Star topology
LAN
Satellite connection
Advantages of open source over proprietary software:
Open source software’s source code is available, can be modified copied & distributed while propritary software can’t be change.
Open source is free while proprietary a paid.
(c) Stealing keyboard & mouse from a shop.4
Question 9:
Identify the type of topology on the basis ofthe following:
Since every node is directly connected to the server, a large amount of cable is needed which increases the installation cost of the network.
It has a single common data path connecting all the nodes.
Answer:
Star Topology
Bus Topology
(ii) Expand the following
VOIP
SMTP
Answer:
Voice Over Internet Protocol
Simple Mail Transder Protocol
(iii) Who is a hacker?
Answer:A computer enthusiast, who uses his computer programming skill to intentionally access a computer without authorization is known as hacker. A hacker accesses the computer without the intention of destroying data or maliciously harming the computer.(iv) The following is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. 140.179.220.200What is it? What is its importance?Answer:It is an IP Address. It is used to identify the computers on a network.(v) Daniel has to share the data among various computes of his two offices branches situated in the same city. Name the network (out of LAN, WAN, PAN and MAN) which is being formed in this process.Answer:MAN(vi)Rehaana Medicos Center has set up its new center in Dubai. It has four buildings as shown in the diagram given below:
As a network expert, provide the best possible answer for the following queries:
Suggest a cable layout of connections between the buildings.
Suggest the most suitable place (i.e. building) to house the server of this organization.
Suggest the placement of the following device with justification:
Repeater (b) Hub/Switch
Suggest a system (hardware/software) to prevent unauthorized access to or from the network.
Answer:
Layout 1
The most suitable place / building to house the server of this organization would be building Research Lab, as this building contains the maximum number of computers.
Since the cabling distance between Accounts to Store is quite large, so a repeater would ideally be needed along their path to avoid loss of signals during the course of data flow in this route.
Firewall.
Question 10:
What is the difference between domain nameand IP address?
Write two advantages of using an optical fibre cable over an Ethernet cable to connect two service stations, which are 190 m away from each other.
Expertfa Professsional Global (EPG) is an online, corporate training provider company for IT related courses. The company is setting up their new campus in Mumbai. You as a network expert have to study the physical locations of various buildings and the number of computers to be installed. In the planning phase, provide the best possible answer for the
Building to Building distances (in Mtrs.)
Suggest the most appropriate building, where EPG should plan to install the server.
Suggest the most appropriate building to building cable layout to connect all three buildings for efficient communication.
Which type of network out of the following is formed by connecting the computers of these three buildings?
LAN
MAN
WAN
Which wireless channel out of the following should be opted by EPG to connect to students of all over the world?
Infrared
Microwave
Satellite
Answer:
Domain Name is alphanumeric addressof a resource over network IP address is a Numeric Address of a resource in a Network.Example:Domain Name 1www.Gabsclasses.comIP Address102.112.0.153
Optical fibre Advantages:
Faster Communication.
Free from electrical & Noise interference.
(a) Faculty Studio Building(b) Bus Topology(c) LAN(d) Satellite
Question 11:To provide telemedicine faculty in a hilly state, a computer network is to be setup to connect hospitals in 6 small villages (VI, V2, …, V6) to the base hospital (H) in the state capital. This is shown in the following diagram.
No village is more than 20 km away from the state capital.Imagine yourself as a computer consultant for this project and answer the following questions with justification:
Out of the following what kind of link should be provided to setup this network: Microwave link, Radio Link, Wired Link ?
What kind of network will be formed; LAN, MAN, or WAN ?
Many times doctors at village hospital will have to consult senior doctors at the base hospital. For this purpose, how should they contact them: using email, sms, telephone, or video conference ?
(b) Out of SMTP and POP3 which protocol is used to receive emails ?(c) What are cookies in the context of computer networks?(d) Rajeshwari is trying for on-line subscription to a magazine. For this she has filled in a form on the magazine’s web site. When the clicks submit button she gets a message that she has left e-mail field empty and she must fill it. For such checking which type of script is generally executed client side script or server-side script ?(e) Mention any one difference between free-ware and free software.
Answer:(a)
Radio Link
MAN
e-mail
(b) POP3(c) Cookies are files that store user information that is used to identify the user when he logs into the system.(d) Server-side script(e) Freeware is a software that has the user to get unlimited usage for. Free software may be free for a certain period only.
Question 12:Workalot Consultants are setting up a secured network for their office campus at Gurgaon for their day-to-day office and web-based activities. They are planning to have connectivity between three buildings and the head office situated in Mumbai. Answer the questions (i) to (iv) after going through the building positions in the campus and other details, which are given below :
Suggest the most suitable place (i.e., building) to house the server of this organization. Also give a reason to justify your suggested location.
Suggest a cable layout of connections between the buildings inside the campus.
Suggest the placement of the following devices with justification:
Repeater.
Switch.
The organization is planning to provide a high speed link with its head office situated in Mumbai using a wired connection. Which of the following cables will be most suitable for this job ?
Optical Fiber
Co-axial Cable
Ethernet Cable
Answer:
The most suitable place to install server is building “RED” because this building have maximum computer which reduce communication delay.
(a) Since the cabling distance between buildings GREEN, BLUE and RED are quite large, so a repeater each, would ideally be need along their path to avoid loss of signals during the course of data flow in there routes.
(b) In the layout a switch each, would be needed in all the buildings, to interconnect the group of cables from the different computers in each building.
(iv) Optical fiber
Question 13:Granuda Consultants are setting up a secured network for their office campus at Faridabad for their day to day office and web based activities. They are planning to have connectivity between 3 building and the head office situated in Kolkata. Answer the questions (i) to (iv) after going through the building positions in the campus and other details, which are given below:
Suggest the most suitable place (i.e., block) to house the server of this organization. Also give a reason to justify your suggested location.
Suggest a cable layout of connections between the buildings inside the campus.
Suggest the placement of the following devices with justification:
Repeater
Switch
The organization is planning to provide a high speed link with its head office situated in the KOLKATA using a wired connection. Which of the following cable will be most suitable for this job?
Optical Fibre
Co-axial Cable
Ethernet Cable
Answer:
The most suitable place to install server is building “JAMUNA” because this building have maximum computer which reduce the communication delay.
Cable layout. (Bus topology).
(a) Since the cabling distance between buildings GANGA and JAMUNA are quite large, so a repeater each, would ideally be needed along their path to avoid loss of signals during the course of data flow in these routes.(b) In the layout a switch each would be needed in all the building, to interco¬nnect the group of cables from the different computers in each building.
Optical fiber
Question 14:India Skills Hub is a skill development community which has an aim to promote the standard of skills in the society. It is planning to set up its training centres in multiple towns and villages Pan India with its head offices in the nearest cities. They have created a model of their network with a city ABC Nagar, a town (UVW town) and 3 villages.As a network consultant, you have to suggest the best network related solutions for their issues/ problems raised in (i) to (iv), keeping in mind the distances between various locations and other given parameters.
Note:– In Villagers, there are community centers, in which one room has been given as training entrer to this organization to install computers.– The organization has got financial support from the government and top Multinational Organizations.
Suggest the most appropriate location of the SERVER in the Cluster (out of the 4 locations), to get the best and effective connectivity. Justify your answer.
Suggest the best wired medium and draw the cable layout (location to location) to efficiently connect various locations within the Cluster.
Which hardware device will you suggest to connect all the computers within each location of
Which service/protocol will be most helpful to conduct live interactions of Expersts from Head Office and peole at all locations of Cluster?
Answer:
Best location for the server is UVW-TOWN, because it is approximately equidistant from the village P, Q and R.
For connectivity between UVW-TOWN to head office is optic Fiber and to connect the villages, P, Q and R with server at UVW- TOWN is co-axial cable.
The villages R Q and R can be connected with server at UVW-TOWN by a Hub and the head office is connected by a Bus topology.
Between head office and UVWTOWNwe recommend for Bus topology, so HTTP protocol and other terminal can be connected by UDP or FTP protocols.
Question 15:Mudra publishing is a group of companies engaged in publishing IT related books located in the hilly area of Shimla. The companies are located in four different, blocks whose layout is shown in the following figure. Answer the questions (i) to (iv) with the relevant justifi-cations.Mudra publishing
Distance between various Blocks :
Block A to Block C is 50 m
Block A to Block D is 100 m
Block B to Block C is 40 m
Block B to Block D is 70 m
Block C to Block D is 125 mNumber of Computers
Block A is 25
Block B is 50
Block C is 20
Block D is 120
Suggest a suitable network topology between the blocks.
Which is the most suitable block to house the server of this organization?
Suggest the placement of the following devices with justification
Repeater
Switch
The organization is planning to link the whole blocks to its marketing Office in Delhi. Since cable connection is not possible from Shimla, suggest a way to connect it with high speed.
Answer:
Suitable topology is bus topology.
The most suitable block for hosting server is BLOCK-D because this block has maximum number of computers.Mudra Publishing
Switch is a device used to segment network into different sub-networks so switch will exist in all the blocks. Since distance between BLOCK-D and BLOCK-C is large so repeater will be install between BLOCK-D and BLOCK-C.
The most economic way to connect it with a reasonable high speed would be the use radiowave transmission, as they are easy to install, can travel long distance and penetrate buildings easily, so they are used for communication, both indoors and outdoors. Radiowaves also have the advantage of being omni-directional. They can travel in all the directions from the source, so that the transmitter and receiver do not have to be carefully aligned physically.
TOPIC-2Network Security and Web ServiceVery Short Answer Type Questions(1 Mark each)
Question 1:Define firewall.Answer:A system designed to prevent unauthorized access to or from a private network is called firewall, it can be implemented in both hardware and software or combination of both.
Question 2:Write any two examples of Server side Scripts.Answer:
ASP
PHP
Question 3:What is the difference between E-mail & chat?Answer:
Chat occurs in near real time, while E-mail doesn’t.
Chat is a 2-way communication which require the permission of both parties, while E-mail is a 1-way communication.
Question 4:Write names of any two popular open source software, which are used as operating systems.Answer:
Kernels
Unix
Linux
Question 5:What is the difference between video conferencing and chat.Answer:In conference, we can include more than one person and it allows text video and audio while chat is one-to-one communication.
Question 6:Expand the following abbreviations :
HTTP
VOIP
Answer:
HTTP-Hyper Text Transfer Protocol.
VOIP-Voice Over Internet Protocol.
Question 7:What is the difference between HTTP and FTP?Answer:Hyper Text Transfer Protocol deals with Transfer of Text and Multimedia content over internet while FTP (File Transfer Protocol) deals with transfer of files over the internet.
Question 8:What out of the following, will you use to have an audio-visual chat with an expert sitting in a far-away place to fix-up a technical issue ?
VoIP
email
FTP
Answer:(i) VoIP 1
Question 9:Name one server side scripting language and one client side scripting language.Answer:Client Side :
JAVASCRIPT
VBSCRIPTServer Side
ASP
JSP
Question 10:Which out of the following comes under cyber crime ?
Operating someone’s internet banking account, without his knowledge.
Stealing a keyboard from someone’s computer.
Working on someone’s Computer with his/ her permission.
Answer:(i) Operating someone’s internet banking account, without his knowledge.
Question 11:Name two proprietary software along with their application.Answer:
MS-Office – All office applications MS-Word, MS-Excel, MS-PowerPoint.
Visual Studio – Visual Basic, Visual C+ +software for application development.
Question 12:Out of the following, identify client side script (s) and server side script (s).
ASP
Javascript
VBScript
JSP
Answer:Server side scripting
ASP
JSPClient side scripting
Javascript
VBscript Vi
Question 13:Compare open source software and proprietary software.Answer:One need an authorized license paid in order to use this proprietary software while open sourcesoftware can be used by anybody and are usually free. One can use this software for their personal use. After giving any notation or code in this type one cannot change the code or modify it.
Question 14:Differentiate between XML and HTML.Answer:
Question 15:What is WEB 2.0 ?Answer:Web2.0 refers to the new generation of web based services and communities characterised by participation, collaboration and sharing of information among users online.
Question 16:Which of the following is/are not a client side script:
VB Script
Java Script
ASP
PHP ?
Answer:(iii) ASP and(iv) PHP are not client side scripts.
Question 17:If someone has hacked your website, to whom you lodge the complaint ?Answer:The complaint has to be lodged with the police under IT Act.
Question 18:What do you mean by IP address? How is it useful in computer security ?Answer:An Internet Protocol (IP) address is a numerical identification and logical address that is assigned to devices connected in a computer network.An IP address is used to uniquely identify devices on the internet and so one can quickly know the location of the system in the network. 1
Question 19:What do you mean by spam mails ? How can you protect your mailbox from spams ?Answer:Spam mails, also known as junk e-mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail.We can protect our mailbox from spams by creating appropriate filters.
Question 20:When do you prefer XML over HTML and why ?Answer:The first benefit of XML is that because you are writing your own markup language, you are not restricted to a limited set of tags defined by proprietary vendors.Rather than waiting for standards bodies to adopt tag set enhancements (a process which can take quite some time), or for browser companies to adopt each other’s standards with XML, you can create your own set of tags at your own place.
Question 21:How does firewall protect our network ?Answer:A firewall is a part of a computer system or network, that is designed to block unauthorized access while permitting authorized communi-cations. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and, other criteria. 1
Question 22:Compare freeware and shareware.Answer:Freeware, the name derived from the words “free” and “software”. It is a computer software that is available for use at no cost or for an optional fee. Freeware is generally proprietary software available at zero price, and is not free software. The author usually restricts one or more rights to copy, distribute, and make derivative works of the software.Shareware is usually offered as a trial version with certain features only available after the license is purchased, or as a full version, but for a trial period. Once the trial period has passed, the program may stop running until a license is purchased. Shareware is often offered without support, updates, or help menus, which only become available with the purchase of a license. The words “free trial” or “trial version” are indicative of shareware.
Question 23:How trojan horses are different from worms? Mention any one difference.Answer:A trojan horse is a term used to describe malware that appears to the user, to perform a desirable function but, in fact, facilitates unauthorized access, to the user’s computer system.A computer worm is a self-replicating computer program. It uses a network to send copies of itself to the other nodes (computers on the network) and it may do so without any user intervention.
Question 24:Give the full form of :
FOSS
HTTP
Answer:
FOSS : Free Open Source Software.
HTTP : Hyper Text Transfer Protocol.
Question 25:What is the difference between trojan horse and virus in terms of computers ?Answer:A trojan, sometimes referred to as a trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system. The term is derived from the trojan horse story in greek mythology.A computer virus is a computer program that can copy itself and infact a computer. A true virus can only spread from one computer to another.The chief difference between a trojan horse and a virus is that a trojan horse does not replicate itself. A virus does. 1
Question 26:Which term we use for a software/hardware device, which is used to block, unauthorized access while permitting authorized communi¬cations. This term is also used for a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.Answer:Firewall.
Question 27:Write the full forms of the following:
GNU
XML
Answer:
GNU stands for “GNU’s Not Unix”
XML stands for “Extensible Markup Language”.
Question 28:Expand the following terminologies:
GSM
WLL (IMP)
Answer:
GSM: Global System for Mobile Communication
WLL: Wireless Local Loop.
Question 29:Name some cyber offences under the IT Act.Answer:
Tampering with computer source documents
Hacking.
Publishing of information which is obscenein electronic form.
Question 30:What are the three ways of protecting intellectual property ?Answer:
Patents
Copyrights
Trademark
Question 31:When a user browses a website, the web server sends a text file to the web browser. What is the name of this?Answer:Cookies.
Short Answer Type Questions
Question 1:Define the following:
Firewall
VoIE
Answer:
Firewall: A system designed to preventunauthorized access to or from a private network is called firewall, it can be implemented in both hardware and software or combination of both.
VoIP: Voice-over-Internet Protocol(VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Question 2:Give the full form of the following terms.
XML
FLOSS
HTTP
FTP
Answer:
XML: Extensible Markup Language.
FLOSS: Free-Libre Open Source Software.
HTTP: Hyper Text Transfer Protocol.
FTP: File Transfer Protocol.
Question 3:Differentiate between WORM and VIRUS in Computer terminology.Answer:VIRUS directly effects the system by corrupting the useful data. A computer virus attaches itself to a program or file enabling it to spread from one computer to another.A WORM is similar to a virus by design is considered to be subclass of a virus. Worm spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. 2
Question 4:Expand the following
GSM
GPRS.
Answer:
GSM: Global System for Mobile Communi-cation.
GPRS: General Packet Radio Service.
Question 5:Expand the following abbreviations :
HTTP
VOIP
Answer:
HTTP: Hyper Text Transfer Protocol.
VOIP: Voice Over Internet Protocol.
Question 6:Give the full form of :
FOSS
HTTP
Answer:
FOSS: Free Open Source Software.
HTTP: Hyper Text Transfer Protocol.
Question 7:Write the full forms of the following :
GNU
XML
Answer:
GNU: GNU’s Not Unix
XML: Xtensible Markup Language.
Question 8:Expand the following terminologies :
GSM
WLL
Answer:
GSM: Global System for Mobile Communi-cation
WLL: Wireless Local Loop.
Question 9:Give the full forms of the following terms :
CDMA
TDMA
FDMA
Answer:
CDMA: Code Division Multiple Access
TDMA: Time Division Multiple Access
FDMA: Frequency Division Multiple Access
Question 10:Expand the following abbreviations :
FTP
TCP
SMTP
VOIP
Answer:
FTP: File Transfer Protocol
TCP: Transmission Control Protocol.
SMTP: Simple Mail Transfer Protocol.
VOIP: Voice Over Internet Protocol
via Blogger https://ift.tt/3bZDUs4
0 notes
Text
Solo 8: See this cheaper robot creature jump
A relatively low-cost, easy-and-fast-to-assemble quadruped robot called “Solo 8” can be upgraded and modified, researchers report.
Solo 8 could open the door to sophisticated research and development to teams on limited budgets, including those at startups, smaller labs, or teaching institutions.
Robots capable of the sophisticated motions that define advanced physical actions like walking, jumping, and navigating terrain can cost $50,000 or more, making real-world experimentation prohibitively expensive for many.
youtube
The researchers designed the device with an eye to making robot research and pedagogy more accessible to a broader range of institutions and labs and—through the use of the same open-source platform—allow researchers to compile comparative data—a critical step towards rapid progress in robotics.
“Our robot platform is a great base to quickly prototype and build high-performance hardware…”
Solo 8’s functionality, including torque-controlled motors and actuated joints, allows it to behave like far more expensive robots: it can, for example, perform jumping actions, walk in multiple configurations and directions, and recover orientation, posture, and stability after being overturned.
Additionally, all the components of Solo 8 can be either 3D-printed or bought in a shop, and the construction files are freely available online, enabling other scientists to leverage the modular set-up when prototyping and developing their own technology.
youtube
The robot makes possible research in such areas as:
Exploration of animal-based limb movement and movement over laboratory surfaces, gravel, soil, sand, mud, and other such terrains.
Reinforcement learning for complex and dynamic behaviors, including those that push performance to stress limits that would be too risky to attempt with expensive platforms.
Very dynamic locomotion (including parkour-style behaviors), which very few robots can perform
Manipulation of the environment (such as opening doors or pushing buttons).
Integration of robots with advanced communications technology.
“Already many universities have approached us, and wish to make a copy of our robot and use it as a research platform,” says Ludovic Righetti, associate professor of electrical and computer engineering and mechanical and aerospace engineering at New York University’s Tandon School of Engineering, a research group leader at the Max Planck Institute for Intelligent Systems (MPI-IS) in Tübingen and Stuttgart, Germany in addition to his duties at Tandon. He explains that the concept was recently used by the department of empirical inference at the MPI-IS to build robotic fingers that can manipulate objects.
“Our robot platform is a great base to quickly prototype and build high-performance hardware,” he says.
“For a research group to develop such a robot themselves, it takes easily four years of work.”
“In return we benefit, because other researchers can contribute to the project; for example colleagues at the LAAS-CNRS in France have developed an electronic board to help communicate with the robot over WiFi. Also, complex control and learning algorithms can be rapidly tested on the platform, decreasing the time from idea to experimental validation. It greatly simplifies our research, and our open-source approach allows us to compare algorithms with other laboratories,” Righetti says.
“In my lab here in New York, we have developed very efficient motion optimization algorithms, but testing them on a complex, heavy robot can easily take half a year of work for several researchers, while this can be done more easily with Solo. That was a big deal for us.”
“For a research group to develop such a robot themselves, it takes easily four years of work,” says Alexander Badri-Spröwitz, leader of the Dynamic Locomotion research group at MPI-IS. “Additionally, you need a wide range of expertise. Our platform is the combined knowledge of several teams. Now any lab worldwide can go online, download the files and print the parts, and buy the remaining components from the catalog. And everybody can add extra features, within a few extra weeks. Done—you’ve got yourself a world-class robot.”
He adds that with an estimated price of a few thousand Euros, the robot, homemade and easy to tweak to meet individual research goals, is more accessible to greater numbers of researchers and instructors than a store-bought legged robot.
“Solo has some novel capabilities that we are interested to explore in the future,” says Felix Grimminger, a mechatronics engineer. “It has an extensive range of motion, for example. When the robot falls on its back, it can configure the legs the other way and just stand up. Or it can jump up to reach 65 centimeters [25.59 inches] from a standing height of 24 cm [9.44 inches].”
Thanks to torque-controlled motors, the robot achieves a spring-like behavior, which perform like muscles and elastic tendons in animal legs.
“Note that the robot uses virtual springs, not mechanical springs. And as virtual springs, they can be programmed. You can, for instance, adjust the spring stiffness from soft to hard, which is interesting because we see variable stiffness in humans and animals, and with adjusted stiffness the robot achieves adaptive and robust locomotion behavior,” Badri-Spröwitz adds.
Solo 8 weighs just over 2 kilograms (4.4 lbs), providing a very high power to weight ratio. Most quadruped robots are significantly heavier and therefore more dangerous and harder to handle in a research environment. With a low weight, it now becomes easier and safer for students to handle the robot, which can even be carried in a backpack to be transported home or to a conference.
The robot carries the number eight in its name as an indicator of its eight actuated joints: each robotic leg can change its angle and length. Researchers recently finished a new version, however, and they’ve conducted the first tests with 12 degrees of freedom, three per leg. The new robot can now also step sideways.
“Because of the additional degrees of freedom it will be a lot more versatile and will be able display more interesting and complex behaviors,” says Badri- Spröwitz.
The researchers’ work has been accepted for publication in Robotics and Automation Letters. The researchers will present the work virtually later this month at ICRA, the International Conference on Robotics and Automation.
Funding for the research came from Righetti’s ERC Starting Grant and then by several MPI-IS’ grassroots projects and a US National Science Foundation grant.
Source: New York University
The post Solo 8: See this cheaper robot creature jump appeared first on Futurity.
Solo 8: See this cheaper robot creature jump published first on https://triviaqaweb.weebly.com/
0 notes
Text
How Waves runs user queries and recommendations at scale with Amazon Neptune
This is a guest post by Pavel Vasilyev, Director of Solutions Architecture at ClearScale, an APN Premier Consulting Partner that provides a full range of cloud professional services. When executive management from Waves, a Y Combinator-backed mobile dating app, realized they were outgrowing their existing IT architecture on Google Cloud, they knew it was time to migrate to AWS. Waves decided to partner with ClearScale to migrate from Google Cloud to AWS and implement features with services including Amazon Neptune, a purpose-built graph database engine. Neptune enables developers to build and run applications that rely on connected datasets, which is the functionality that Waves needed. The Waves app had been experiencing several challenges due to rapid growth of the user base. These challenges included reliability and latency issues caused by specific database queries that the app’s embedded recommendation engine ran. Additionally, Waves’s infrastructure expenses were scaling faster than anticipated, with no plateau on the horizon. In this post, we discuss how ClearScale migrated Waves’s workloads to AWS and used Neptune to build a sophisticated recommendation engine capable of handling massive query volumes. We also explain how ClearScale enhanced Waves’s overall architecture using other AWS features. The project Waves and ClearScale worked together to scope an engagement consisting of five stages: Static data migration from Cloud Storage to Amazon Simple Storage Service (Amazon S3) User profile data migration from Cloud Firestore to Neptune Implementation of Neptune Streams to capture graph changes Implementation of AWS AppSync and GraphQL to transmit database queries Optimization of end-user experience with Amazon Cognito and Amazon Pinpoint Migrations had to be executed with extreme caution so that existing users experienced little disruption. Additionally, the final state had to empower Waves developers to deploy new functionality and improvements over the long term. Migrating static data to Amazon S3 Waves previously stored static data, such as user profile photos, in Google Cloud Platform (GCP) Cloud Storage. ClearScale migrated this data to Amazon S3, a highly scalable and durable object storage service. Amazon S3 comes with a range of storage classes characterized by different access levels and rates, which enables you to maximize cost-effectiveness. ClearScale’s database experts used a transient EMR and DistCp command to execute the migration. DistCp uses MapReduce to copy data from one cluster to another. The team downloaded static data to EMR HDFS and uploaded it to Amazon S3. To allow connections to GCP Cloud Storage, the team configured SSH access to the cluster and added required properties to the /etc/hadoop/conf/core-site.xml configuration file. The value for the google.cloud.auth.service.account.json.keyfile property pointed to the json-key file provided by the Waves team. Migrating user profile data to Neptune Waves initially stored user profile data in Google Cloud Firestore. Because the total data load was relatively small at the time of the migration, ClearScale was able to move all information to Neptune using a separate Amazon Elastic Compute Cloud (Amazon EC2) instance and the node-firestore-import-export (MIT license) utility. Data was downloaded in a JSON format and converted to a Neptune-compatible format using a custom Node.js utility. The final step of the migration involved using a POST request for the standard endpoint and Neptune bulk loader endpoint. For more information, see Neptune Loader Command. Why Neptune? ClearScale chose Neptune because the graph database service can store and query billions of relationships with minimal latency. Social networking and dating apps, like Waves, require this functionality to present users with quality profile matches. Neptune supports mainstream graph models and query languages, and allows for read replicas, point-in-time recovery, and continuous backups. Neptune is also a fully-managed graph database service, which means that development teams can offload burdensome administrative tasks, such as hardware provisioning, configuration, and software patching. Implementing Neptune Streams to capture graph changes Neptune also includes Neptune Streams, a mechanism for logging database changes. The feature tracks every graph change and logs entries synchronously with the transactions that cause those changes. With Neptune Streams, Waves developers can add code to the application that reacts to changes and delivers updates to the front-end experience. Users can retrieve change records using an HTTP REST API. ClearScale developed a filtering component that analyzes the Neptune Streams log and processes events based on specific actions. For example, a change in a user’s geolocation triggers a recalculation of the list of suggested profiles presented to the individual. A similar process occurs for sending notification messages. Implementing AWS AppSync and GraphQL ClearScale implemented AWS AppSync so that the Waves app could send database queries from its mobile application. The managed service uses GraphQL to orchestrate data flows between several data sources. It was particularly useful in simplifying how user behaviors in the Waves app were sent and stored in the application’s server component. At the application level, HTTP requests are sent to the AWS AppSync API, which validates them against a defined GraphQL schema. AWS AppSync uses request and response mapping templates to map to and from the data source accordingly. Using AWS AppSync allowed ClearScale to focus on the application logic and add a decoupling layer to the architecture, which simplified the development process. Optimizing end-user experience with Amazon Cognito and Amazon Pinpoint The final component of the project involved the implementation of Amazon Cognito and Amazon Pinpoint to enhance the front-end experience. Amazon Cognito allowed Waves to authorize new user profiles through the users’ personal devices. Amazon Pinpoint enables the app to send tailored push notifications directly to users. Because ClearScale migrated an existing application, it was crucial to transition current users in the first step. Existing user profiles were pre-created in the Amazon Cognito User Pool to provide a seamless transition between old and new environments. New users are registered in the Amazon Cognito during the sign-up process. The Waves team also wanted to keep push notifications in the application. ClearScale implemented Amazon Pinpoint to fulfill this requirement. Summary In this post, we covered how ClearScale migrated a mobile application from Google Cloud to AWS and implemented several cloud services to maximize performance, scalability, and reliability. Central to the engagement was Neptune, a purpose-built graph database engine that is especially useful for applications involving recommendation engines, fraud detection, and knowledge graphs. The Waves dating app uses Neptune in combination with Amazon Cognito, Amazon Pinpoint, and AWS AppSync to streamline the front-end user experience and grow to meet future demand. About the Author Pavel Vasilyev, Director of Solutions Architecture Pavel leads the Solutions Architecture team at ClearScale. Pavel has more than 12 years of hands-on experience in designing and deploying scalable, highly available, and fault-tolerant systems. He holds a Master’s degree in Engineering and Technology in Informatics and Computer Science. https://aws.amazon.com/blogs/database/how-waves-runs-user-queries-and-recommendations-at-scale-with-amazon-neptune/
0 notes
Text
Free Access Why Python Is the Next Wave in Earth Sciences Computing
So, why all the fuss about Python? Perhaps you have heard about Python from a coworker, heard a reference to this programming language in a presentation at a conference, or followed a link from a page on scientific computing, but wonder what extra benefits the Python language provides given the suite of powerful computational tools the Earth sciences already has. This article will make the case that Python is the next wave in Earth sciences computing for one simple reason: Python enables users to do more and better science. We'll look at features of the language and the benefits of those features. This article will describe how these features provide abilities in scientific computing that are currently less likely to be available with existing tools, and highlight the growing support for Python in the Earth sciences as well as events at the upcoming 2013 AMS Annual Meeting that will cover Python in the Earth sciences.
Python is a modern, interpreted, object-oriented, open-source language used in all kinds of software engineering. Though it has been around for two decades, it exploded into use in the atmospheric sciences just a few years ago after the development community converged upon the standard scientific packages (e.g., array handling) needed for atmospheric sciences work. Python is now a robust integration platform for all kinds of atmospheric sciences work, from data analysis to distributed computing, and graphical user interfaces to geographical information systems. Among its salient features, Python has a concise but natural syntax for both arrays and nonarrays, making programs exceedingly clear and easy to read; as the saying goes, “Python is executable pseudocode.” Also, because the language is interpreted, development is much easier; you do not have to spend extra time manipulating a compiler and linker. In addition, the modern data structures and object-oriented nature of the language makes Python code more robust and less brittle. Finally, Python's open-source pedigree, aided by a large user and developer base in industry as well as the sciences, means that your programs can take advantage of the tens of thousands of Python packages that exist. These include visualization, numerical libraries, and interconnection with compiled and other languages, memory caching, Web services, mobile and desktop graphical user interface programming, and others. In many cases, several packages exist in each of the above domain areas. You are not limited to only what one vendor can provide or even what only the scientific community can provide!
A number of other languages have some of Python's features: Fortran 90, for instance, also supports array syntax. Python's unique strengths are the interconnectedness and comprehensiveness of its tool suite and the ease with which one can apply innovations from other communities and disciplines. Consider a typical Earth sciences computing workflow. We want to investigate some phenomena and decide to either analyze data or conduct model experiments. So, we visit a data archive and download the data via a Web request, or we change parameters in the (probably Fortran) source code of a model and run the model. With the dataset or model output file in hand, we write an analysis program, perhaps using IDL or MATLAB, to conduct statistical analyses of the data. Finally, we visualize the data via a line plot or contour plot. In general, we accomplish this workflow using a kludge of tools: shell scripting for Web requests and file management, the Unix tool Make for code and compilation management, compiled languages for modeling, and IDL or MATLAB for data analysis and visualization. Each tool is isolated from every other tool, and communication between tools occurs through files.
In Python, every tool is used in the same interpreted environment. And data flow does not have to occur through files; we can access any variable in any tool at any (logical) time in the workflow. As a result, our workflow becomes much more robust and flexible. Additionally, the breadth of the Python tool set means the most important capabilities we need will very likely be available even if a given vendor changes its priorities. Python users also have much greater ability to access innovations from industries outside of the Earth sciences. This latter advantage will become increasingly more important as we push inexorably into the world of cloud computing, big data, and mobile computing; in the next decade, the Earth sciences cannot afford to ignore these innovations.
To be fair, Python has real disadvantages, including the fact that pure Python code runs much slower than compiled code, there are fewer scientific libraries compared to Fortran, and documentation and support for new science users is relatively sparse. There are tools to overcome the speed penalty, the collection of scientific libraries is growing, and science support resources are becoming more robust; nevertheless, these are real issues. For most Earth science applications, the strengths of Python outweigh the weaknesses.
The Earth sciences community has begun to recognize the unique benefits of Python, and as a result its population of users is growing. Adoption of Python by Earth sciences users is no longer confined to “early adopters.” Institutional support includes groups at Lawrence Livermore National Laboratory's Program for Climate Model Diagnosis and Intercomparison, NCAR's Computer Information Systems Laboratory, and the British Atmospheric Data Centre. Several packages exist that handle file formats used by atmospheric and oceanic sciences users, including netCDF, HDF4, HDF-EOS 2, and GRIB 1 and 2 (e.g., via the netCDF4-Python, UV-CDAT, and PyNIO packages). And Python's utility as a common glue is being leveraged by both open-source and proprietary vendors: Python can be used as a scripting language for applications such as Unidata's Integrated Data Viewer, the NCAR Command Language (via PyNGL), GrADS (via OpenGrADS), and Esri's ArcGIS.
Over the last two years, the AMS has helped support the development of Python in the Earth sciences by sponsoring the Symposiums on Advances in Modeling and Analysis Using Python, as well as short courses on using Python in the atmospheric and oceanic sciences. At the 2013 AMS Annual Meeting in Austin, Texas, we will feature the Third Python Symposium; short courses for beginning, intermediate, and advanced users; and a Town Hall meeting to provide answers to questions nonprogrammers and decision makers may have about how Python can help institutions become more productive.
The computational tools the Earth sciences have traditionally used are powerful and have enabled us to accomplish much. With modern tools, however, we can accomplish more. Python, in particular, can help us do more science and do it better. Python enables better science through enabling clear code: its elegant syntax and broad and robust tool set helps Earth scientists write less buggy code. Python also enables more science by helping us to take advantage of the recent explosion of computing resources by giving us access to an amazing set of software tools: Python gives us new capabilities through its modern, object-oriented structure but also gives us access to the new capabilities being generated daily from industries outside of the sciences. More and more, Earth scientists are becoming aware of Python's ability to help us do better and more science. With this “perfect storm” of a clear and concise language, access to a previously unfathomable range of software tools, and a growing scientific user community, Python is poised to become the next wave in the computational Earth sciences.[Source]-https://journals.ametsoc.org/doi/10.1175/BAMS-D-12-00148.1
Advanced level Python Certification Course with 100% Job Assistance Guarantee Provided. We Have 3 Sessions Per Week And 90 Hours Certified Basic Python Classes In Thane Training Offered By Asterix Solution
0 notes
Link
Learn Python from the ground up and use Python to build your own basic Blockchain and Cryptocurrency (Coin)!
What you’ll learn
Students can take advanced Python courses and build real projects with it
Students may build upon the Python and Blockchain knowledge gained in this course and start working on their own Blockchain
Students can dive into Web Development or Data Science with Python
Requirements
NO prior programming language is required
You can use whatever operating system you want – macOS, Linux or Windows: It’s all covered
Description
Want to learn Python “on the job” whilst building an exciting course project? This course is for you!
Python is probably THE most trending programming language you can learn these days!
It’s very popular because it’s easy to learn and use, runs on all operating systems and allows you to build a broad variety of programs: Be that web applications, desktop applications, utility scripts or using it for data science and machine learning.
In this course, you’ll learn Python from scratch – and you’ll do so whilst building your own Blockchain and Cryptocurrency. These are of course also highly trending topics and not a lot of people understand what a Blockchain really is. As a nice side-effect, you will know how a Blockchain works once you completed this course. It’s an exciting course project that allows you to learn and apply Python to something you know and you can use.
Why Python?
As written above, Python is both easy-to-use and extremely versatile and powerful at the same time. Certainly not the worst combination. If you check it on Google trends (and compare it to other programming languages), you’ll see that it’s very popular these days.
It’s being used by almost any important company – be that Google, Amazon or Facebook. It’s used to run web applications, scripts, desktop programs and machine learning algorithms. This course sets the basics for all these use-cases!
Why Blockchain?
I believe that you learn something best if you directly apply it to a real-world project. And the Blockchain technology is an exciting trend which is there to stay. In this course, you’ll learn a lot about the core concepts of the Blockchain and you’ll see how Python can be used for the many aspects that make up a Blockchain and Cryptocurrency.
In my opinion, a perfect course project is challenging, interesting, something you know from real-life but also not overly complex. And that’s all the case for the Blockchain! It poses some nice challenges where a lot of different Python features can be used to overcome them. It also is something we hear about all the time and yet no one knows how it works. And we can dive into the core Blockchain concepts without spending 100+ hours working on it.
Who’s teaching you?
My name is Maximilian Schwarzmüller and I’m a freelance developer. My focus is on web development but I’ve been working with Python for many years. It’s actually one of the first languages I started with when I was 13. I’m the creator of many 5 star bestseller courses here on Udemy and I love diving into new technologies. That’s why I had to dive into this whole Blockchain thing when it became more popular and why I chose it as a project for this course.
I can’t wait to welcome you on board of this course and I hope you’ll enjoy it just as much as I did creating it! 🙂
What’s in the course?
Great question! Here’s a brief summary:
A summary of Python and the Blockchain technology
All the base Python syntax you need to know (variables, operators, functions, …)
Loops and conditional statements
More complex data structures like tuples or dictionaries
A closer look at built-in functions and the standard library Python ships with
String manipulation
How to work with files
Error handling
Debugging
Object-oriented programming with classes and inheritance
Internal & external modules (packages)
How to spin up an Http server with the Flask package
Handling Http requests (sending & receiving)
And more!
What are the course prerequisites?
NO prior programming knowledge is required
Very basic knowledge about how a computer works will help you though (but can also be built up whilst you’re going through the course)
Is this course for you?
It’s for you if …
You want to get into programming => Python is a great “first language” since it’s easy to learn and very versatile
You want to broaden your horizon => Are you a web developer? Want to learn something new? Here you go!
You’re interested in Python for web development => This course will teach you Python in general but there are two modules where we’ll also dive into web development a bit
You’re interested in the Blockchain technology => You’ll learn the core concepts of it as a side-effect of this course!
You know Python but want to practice it => The course project is challenging and taken from real-life – there probably is no better practice
Does that sound good to you? I’d be honoured to welcome you in this course! 🙂
Who this course is for:
Anyone interested in learning Python and building a real project with it
Anyone who’s interested in learning about the core internals of a blockchain
Beginner developers who want to dive into one of the most trending and popular programming languages
Created by Academind by Maximilian Schwarzmüller, Maximilian Schwarzmüller Last updated 2/2019 English English [Auto-generated]
Size: 9.10 GB
Download Now
https://ift.tt/2K7NbPR.
The post Learn Python by Building a Blockchain & Cryptocurrency appeared first on Free Course Lab.
0 notes
Text
350+ TOP PYTHON Interview Questions and Answers
PYTHON Interview Questions for freshers & experienced :-
1) What Is Python? Python is an interpreted, interactive, object-oriented programming language. It incorporates modules, exceptions, dynamic typing, very high level dynamic data types, and classes. Python combines remarkable power with very clear syntax. It has interfaces to many system calls and libraries, as well as to various window systems, and is extensible in C or C++. It is also usable as an extension language for applications that need a programmable interface. Finally, Python is portable: it runs on many Unix variants, on the Mac, and on PCs under MS-DOS, Windows, Windows NT, and OS/2. 2) What are the different ways to create an empty NumPy array in python? There are two methods we can apply to create empty NumPy arrays. The first method. import numpy numpy.array() The second method. # Make an empty NumPy array numpy.empty(shape=(0,0)) 3) Can’t concat bytes to str? This is providing to be a rough transition to python on here f = open( ‘myfile’, ‘a+’ ) f.write(‘test string’ + ‘\n’) key = “pass:hello” plaintext = subprocess.check_output() print (plaintext) f.write (plaintext + ‘\n’) f.close() The output file looks like: test string 4) Expline different way to trigger/ raise exception in your python script? Raise used to manually raise an exception general-form: raise exception-name (“message to be conveyed”). voting_age = 15 if voting_age output: ValueError: voting age should be at least 19 and above 2.assert statements are used to tell your program to test that condition attached to assert keyword, and trigger an exception whenever the condition becomes false. Eg: a = -10 assert a > 0 #to raise an exception whenever a is a negative number Output: AssertionError Another way of raising an exception can be done by making a programming mistake, but that is not usually a good way of triggering an exception 5) Why is not__getattr__invoked when attr==’__str__’? The base class object already implements a default __str__ method, and __getattr__function is called for missing attributes. The example as it we must use the __getattribute__ method instead, but beware of the dangers. class GetAttr(object): def __getattribute__(self, attr): print(‘getattr: ‘ + attr) if attr == ‘__str__’: return lambda: ‘’ else: return lambda *args: None A better and more readable solution to simply override the __str__ method explicitly. class GetAttr(object): def __getattr__(self, attr): print(‘getattr: ‘ + attr) return lambda *args: None def __str__(self): return ��’ 6)What do you mean by list comprehension? The process of creating a list performing some operation on the data so that can be accessed using an iterator is referred to as list comprehension. EX: Output: 65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90 7) What will be the output of the code:def foo (i=)? i.append (1) return i >>> foo () >>> foo () Output: The argument to the function foo is evaluated once when the function is defined However since it is a list on every all the list is modified by appending a 1 to it. 8) How to Tic tac toe computer move? Below The code of computer move in the game tic tac toe in python def computermove(board,computer,human): movecom=” rmoves=rd(0,8) for movecom in legalmoves(board): board=computer if winner(board)==computer: return movecom board=” for movecom in legalmoves(board): board=human if winner(board)==human: return movecom board=” while rmoves not in legalmoves(board): rtmoves=rd(0,8) return rmoves 9) Explain about ODBC and python? ODBC (Open Database Connectivity) API standard allows the connections with any database that supports the interface such as the PostgreSL database or Microsoft access in a transparent manner Three types of ODBC modules for python: PythonWin ODBC module – limited development mxODBC – a commercial product pyodbc – This is open source python package 10) How to implement the decorator function, using dollar ()? Code: def dollar(fn): def new(*args): return ‘$’ + str(fn(*args)) return new @dollar def price(amount, tax_rate): return amount + amount*tax_rate print price(100,0.1) output: $110
PYTHON Interview Questions 11) How to count the number of instance? You have a class A, you want to count the number of A instance. Hint: use staticmethod Example class A: total = 0 def __init__(self, name): self.name = name A.total += 1 def status(): print “Number of instance (A) : “, A.total status = staticmethod(status) a1 = A(“A1”) a2 = A(“A2”) a3 = A(“A3”) a4 = A(“A4”) A.status() Output: The number of instance (A) : 4 12) What are the Arithmetic Operators that Python supports? ‘+’ : Addition ‘-’ : Subtraction ‘*’ : Multiplication ‘/’: Division ‘%’: Modulo division ‘**’: Power Of ‘//’: floor div Python does not support unary operators like ++ or – operators. Python supports “Augmented Assignment Operators”. i.e., A += 10 Means A = A+10 B -= 10 Means B = B-10 13) How do you reload a Python module? All that needs to be a module object to the imp.reload() function or just reload() in Python 2.x, and the module will be reloaded from its source file. Any other code references symbols exported by the reloaded module, they still are bound to the original code. 14) How does Python handle Compile-time and Run-time code checking? Python supports compile-time code checking up to some extent. Most checks for variable data types will be postponed until run-time code checking. When an undefined custom function is used, it will move forward with compile-time checking. During runtime, Python raises exceptions against errors. 15) What are Supporting Python packages for data science operations? Pandas: A package providing flexible data structures to work with relational or labeled data. NumPy: A package that allows working with numerical based data structures like arrays and tensors. Matplotlib: A 2D rendering engine written for Python. Tensorflow: A package used for constructing computational graphs. 16) What are the ones that can be used with pandas? A python dict, ndarray or scalar values can be used with Pandas. The passed index is a list of axis labels. 17) How To Add an Index, Row or Column to a Pandas DataFrame? The index can be added by calling set_index() on programmer DataFrame. For accessing rows, loc works on labels of programme index, iloc works on the positions in programme index, it is a more complex case: when the index is integer-based, programmer passes a label to ix. 18) How To Create an Empty DataFrame? The function that programmer will use is the Pandas Dataframe() function: it reuires the programmer to pass the data that programmer wants to put in, the indices and the columns. 19) Does Pandas Recognize Dates When Importing Data? Yes. but programmer needs to help it a tiny bit: add the argument parse_dates when programmer by reading in data from, let is say, a comma-separated value (CSV) file. 20) How to convert a NumPy array to a Python List? Use tolist(): import numpy as np >>> np.array(,]).tolist() , ] 21) How to set the figure title and axes labels font size in Matplotlib? Functions dealing with text like label, title, etc. accept parameters same as matplotlib.text.Text. For the font size you can use size/fontsize: 39) What is dictionary in Python? The built-in datatypes in Python are called a dictionary. It defines one-to-one Relationship between keys and values. It contains a pair of keys and their corresponding values. Dictionaries are indexed by keys. It is a collection which is unordered, changeable and indexed. Let’s take an example: The following example contains some keys. State, Capital,Language. Their corresponding values are Karnataka, Bangalore, and Kannada respectively. Dict={ ‘Country’:’Karnataka’,’Capital’:’Bangalore’,’Launguage’:’Kannada’} print dict Karnataka Print dict Bangalore Print dict Kannada 40) How memory is managed in Python? Python private heap space manages python memory. Python heap has all Python objects and data structures. Access to this private heap is restricted to programmer also Python private heap is taken care by the interpreter. The core API gives access to some tools for the programmer to code. Python memory manager allocates python heap space. 41)What is the output of this following statement? f=none for i in range(5); with open(“data.txt”, ”w”) as f: if I>1: break print f.closed A) True B) False C) None D) Error Ans: A 42) Write a coding in Find a Largest Among three numbers? num1 = 10 num2 = 14 num3 = 12 if (num1 >= num2) and (num1 >= num3): largest = num1 elif (num2 >= num1) and (num2 >= num3): largest = num2 else: largest = num3 print(“The largest number between”,num1,”,”,num2,”and”,num3,”is”,largest) Output: The largest Number is 14.0 43) What is Lambda in Python? lambda is an one line anonymous function, Example: Sum=lambda i,c:i+c 44) What is the difference between list and tuples? Lists are the mutable elements where we can able to perform the task in the existed variable. Lists can able to reduce the utilization of memory Tuples are immutable so it can execute faster when compared with list. But it will wastes the memory. 45) What are the key features of Python? The python doesn’t have any header files It doesn’t have any structure or syntax except the indentation. It can execute the instructions fastly because of the RISC architecture. It consumes only less memory because of no internal executions. It doesn’t have any compilers compilation can be done at the time of the program. 46) How to delete a file in Python? In Python, Delete a file using this command, os.unlink(filename) or os.remove (filename) 47) What is the usage of help() and dir() function in Python? Help() and dir() both functions are accessible from the Python interpreter used for viewing a consolidated dump of built-in functions. Help() function: The help() function is used to display the documentation string and also facilitates you to see the help related to modules, keywords, attributes, etc. 48) Which of the following statements create a dictionary? (Multiple Correct Answers Possible) a) d = {} b) d = {“john”:40, “peter”:45} c) d = {40:”john”, 45:”peter”} d) d = (40:”john”, 45:”50”) Ans: All of the above 49) Which of the following is an invalid statement? a) abc = 1,000,000 b) a b c = 1000 2000 3000 c) a,b,c = 1000, 2000, 3000 d) a_b_c = 1,000,000 Ans: c 50) What is the output of the following? try: if ‘1’ != 1: raise “someError” else: print(“someError has not occured”) except “someError”: print (“someError has occured”) a) someError has occured b) someError has not occured c) invalid code d) none of the above Ans: b 51) What is the maximum possible length of an identifier? a) 31 characters b) 63 characters c) 79 characters d) None of the above Ans: d 52) Differentiate list and tuple with an example? difference is that a list is mutable, but a tuple is immutable. Example: >>> mylist= >>> mylist=2 >>> mytuple=(1,3,3) >>> mytuple=2 TypeError: ‘tuple’ object does not support item assignment 53) Which operator will be helpful for decision making statements? comparison operator 54) Out of two options which is the template by default flask is following? a) Werkzeug b) Jinja2 Ans : b 55) Point out the use of help() function Help on function copy in module copy: copy(x) Shallow copy operation on arbitrary Python objects. 56) From below select which data structure is having key-value pair ? a.List b.Tuples c.Dictionary Ans : c 57) Differentiate *args and **kwargs? *args : We can pass multiple arguments we want like list or tuples of data **kwargs : we can pass multiple arguments using keywords 58) Use of Negative indices? It helps to slice from the back mylist= >>>mylist 6 59) Give an example for join() and split() funcitons >>> ‘,’.join(‘12345’) ‘1,2,3,4,5’ >>> ‘1,2,3,4,5’.split(‘,’) 60) Python is case sensitive ? a.True b.False Ans : a 61) List out loop breaking functions break continue pass 62) what is the syntax for exponentiation and give example? a**b 2**3 = 8 63) Which operator helps to do addition operations ? arithmetic operator 64) How to get all keys from dictionary ? dictionary_var.keys() 65) Give one example for multiple statements in single statement? a=b=c=3 66) What is the output for the following code? >> def expandlist(val, list=): list.append(val) return list >>> list1 = expandlist (10) >>> list2 = expandlist (123,) >>> list3 = expandlist (‘a’) >>> list1,list2,list3 Ans : (, , ) 67) Number of argument’s that range() function can take ? 3 68) Give an example to capital first letter of a string? a=’test’ print a.upper() Test 69) How to find whether string is alphanumeric or not? str = “hjsh#”; print str.isalnum() Ans :False 70) Which method will be used to delete a file ? os.remove(filename) 71) What is difference between match & search in regex module in python? Match Checks for a match only at the beginning of the string, while search checks for a match anywhere in the string. 72) Can we change tuple values? If yes, give an example. Since tuple are immutable, so we cannot change tuple value in its original form but we can convert it into list for changing its values and then convert again to tuple. Below is the example: my_tuple=(1,2,3,4) my_list=list(my_tuple) my_list=9 my_tuple=tuple(my_list) 73) What is purpose of __init__ in Class ? Is it necessary to use __init__ while creating a class ? __init__ is a class contructor in python. __init__ is called when we create an object for a class and it is used to initialize the attribute of that class. eg : def __init__ (self, name ,branch , year) self.name= name self.branch = branch self.year =year print(“a new student”) No, It is not necessary to include __init__ as your first function every time in class. 74) Can Dictionary have a duplicate keys ? Python Doesn’t allow duplicate key however if a key is duplicated the second key-value pair will overwrite the first as a dictionary can only have one value per key. For eg : >>> my_dict={‘a’:1 ,’b’ :2 ,’b’:3} >>> print(my_dict) {‘a’: 1, ‘b’: 3} 75) What happened if we call a key that is not present in dictionary and how to tackle that kind of error ? It will return a Key Error . We can use get method to avoid such condition. This method returns the value for the given key, if it is present in the dictionary and if it is not present it will return None (if get() is used with only one argument). Dict.get(key, default=None) 76) What is difference b/w range and arange function in python? numpy.arange : Return evenly spaced values within a given interval. Values are generated within the half-open interval stop, dtype=None) Range : The range function returns a list of numbers between the two arguments (or one) you pass it. 77) What is difference b/w panda series and dictionary in python? Dictionaries are python’s default data structures which allow you to store key: value pairs and it offers some built-in methods to manipulate your data. 78) Why it need to be create a virtual environment before staring an project in Django ? A Virtual Environment is an isolated working copy of Python which allows you to work on a specific project without worry of affecting other projects. Benefit of creating virtualenv : We can create multiple virtualenv , so that every project have a different set of packages . For eg. if one project we run on two different version of Django , virtualenv can keep thos projects fully separate to satisfy both reuirements at once.It makes easy for us to release our project with its own dependent modules. 79) How to write a text from from another text file in python ? Below is the code for the same. import os os.getcwd() os.chdir(‘/Users/username/Documents’) file = open(‘input.txt’ ,’w’) with open(“output.txt”, “w”) as fw, open(“input.txt”,”r”) as fr: 80) what is difference between input and raw_input? There is no raw_input() in python 3.x only input() exists. Actually, the old raw_input() has been renamed to input(), and the old input() is gone, but can easily be simulated by using eval(input()). In python 3.x We can manually compile and then eval for getting old functionality. python2.x python3.x raw_input() input() input() eval(input()) 81) What are all important modules in python reuired for a Data Science ? Below are important module for a Data Science : NumPy SciPy Pandas Matplotlib Seaborn Bokeh Plotly SciKit-Learn Theano TensorFlow Keras 82) What is use of list comprehension ? List comprehensions is used to transform one list into another list. During this process, list items are conditionally included in the new list and each items are transformed as reuired. Eg. my_list= my_list1= Using “for “ loop : for i in my_list1: my_list.append(i*2) Using List comprehension : my_list2= print(my_list2) 83) What is lambda function ? lambda function is used for creating small, one-time and anonymous function objects in Python. 84) what is use of set in python? A set is a type of python data Structure which is unordered and unindexed. It is declared in curly braces . sets are used when you reuired only uniue elements .my_set={ a ,b ,c,d} 85) Does python has private keyword in python ? how to make any variable private in python ? It does not have private keyword in python and for any instance variable to make it private you can __ prefix in the variable so that it will not be visible to the code outside of the class . Eg . Class A: def __init__(self): self.__num=345 def printNum(self): print self.__num 86) What is pip and when it is used ? it is a package management system and it is used to install many python package. Eg. Django , mysl.connector Syntax : pip install packagename pip install Django : to install Django module 87) What is head and tail method for Data frames in pandas ? Head : it will give the first N rows of Dataframe. Tail : it will give last N rows of Dataframe. By default it is 5. 88) How to change a string in list ? we can use split method to change an existing string into list. s= ‘Hello sam good morning ’ s.split() print(s) 89) How to take hello as output from below nested list using indexing concepting in python. my_list=, 4,5]],3,4] Ans : my_list print(my_list) 90) What is list when we have to use ? Lists always store homogeneous elements. we have to use the lists when the data is same type and when accessing is more insteading of inserting in memory. 91) What is dict when we have to use ? Dict is used to store key value pairs and key is calculated using hash key. This is used when we want to access data in O(1) time as big O notation in average case. Dict I used in u can say super market to know the price of corresponding while doing billing 92) What is tuple when we have to use ? Tuple is hetrogenous and we have to use when data is different types. 93) Is String Immutable ? Yes because it creates object in memory so if you want to change through indexing it will throw an exception since it can’t be changes I,e immutable. 94) How to handle Exception ? We can handle exceptions by using try catch block . we can also else block in python to make it executed based on condition. 95) Will python work multiple inheritance? Yes it works .by seuentially referring parent class one by one. 96) Will class members accessible by instances of class? Yes by referring corresponding attributes we can access. 97) What are Special methods in python and how to implement? Special methods in python are __init__,__str__,__iter__,__del__ __init__-it will initialize when class loads. __str__-It is used to represent object in a string format. __iter__-it I used to define iteration based on reuirements. __del__-It is used to destroy object when it is not reuired for memory optimization. 98) How to handle deadlock in python. By providing synchronization methods so that each thread access one at a time.It will lock another thread until thread fine it execution. 99) How for loop will works in python? For loop internally calls iter method of an object for each call. 100) What is List comprehension how to define it and when to use? List Comprehensions are expression based iteration. So we have to give expression and then provide loop and provide if condition if needed. We have to use when we want to define in such a way that write the code in a compact way. 101) What is set when we have to use? Set is used to define uniue elements without duplicates. So if you have lump of data and we are searching through email record. By using set we can get the uniue elements. 102) How django works ? Django will take an url from frontend and look for url reolvers and url will ap corresponding view and if data to be handled it will use certain model to make any database transactions and give repone via view and then passs to UI. Or django template 103) Is python pure object oriented programming ? Yes in python all types are stored a objects. 104) What are packages in python which are commonly used explain one ? The packages used are os, sys,time,tempfile,pdb, Os –it is used for file and directories handling. Pdb-It is used to debug the code to find the root cause of issue. 105) How will you merge 2 dictionaries in python? a = {1:’1’} , b={2:’2’} c= {**a,**b} 106) What is the other way of checking truthiness? These only test for truthiness: if x or y or z: print(‘passed’) if any((x, y, z)): print(‘passed’) 107) How will you verify different flags at once? flags at once in Python v1,v2,v3 = 0, 1, 0 if v1 == 1 or v2 == 1 or v3 == 1: print(‘passed’) if 1 in (v1, v2, v3): print(‘passed’) 108) What happens when you execute python == PYTHON? You get a Name Error Execution 109) Tool used to check python code standards? Pylint 110) How strings can be sliced? They can be generally treated as arrays without commas. Eg: a = “python” a -> i can be any number within the length of the string 111) How to pass indefinite number of arguments to any function? We use **args when we don’t know the number of arguments to be passed 112) In OOPS what is a diamond problem in inheritance? During multiple inheritance, when class X has two subclasses Y and Z, and a class D has two super classes Y and Z.If a method present in X is overridden by both Y and Z but not by D then from which class D will inherit that method Y or Z. 113) Among LISTS,SETS,TUPLES which is faster? Sets 114) How Type casting is done in python? (Str -> int) s = “1234” # s is string i = int(s) # string converted to int 115) How python maintains conditional blocks? Python used indentation to differentiate and maintain blocks of code 116) Write a small code to explain repr() in python ? Repr gives the format that can be read by the compiler. Eg: y=2333.3 x=str(y) z=repr(y) print ” y :”,y print “str(y) :”,x print “repr(y):”,z ————- output y : 2333.3 str(y) : 2333.3 repr(y) : 2333.3000000000002 117) How to encrypt a string? str_enc = str.encode(‘base64’, ‘strict’) 118) Functions are objects -> Explain ? # can be treated as objects def print_new(val): return val.upper() print ( print_new(‘Hello’)) yell = print_new print yell(‘different string’) 119) Explain the synbtax to split a string in python? Str.split(separator,max_split) 120) How can you identify the data type of any variable in python? Use type(var) 121) What does MAP function in python do? map() returns a list of the results after it applys the function to each item in a iterable data type (list, tuple etc.) 122) What does the enum function in python do? When we need to print the vars index along when you iterate, we use the enum function to serve this purpose. 123) Explain assert in action? assert “py” == “PY”, “Strings are not eual” 124) How does pop function works in set data types? Pop deletes a random element from the set 125) Is Python open source? If so, why it is called so? Python is an open source programming language. Because Python’s source code (the code in which Python software is written) is open for all and anyone can have a look at the source code and edit. 126). Why Python is called portable? Because we can run Python in wide range of hardware platforms and has similar interfaces across all the platforms 127) How to give comments in Python? Using Hashes (#) at the starting of a line 128) How to create prompt in the console window? Using input function 129) How to write multiple statements in a single line in Python? Using semicolon between the statements 130) List out standard datatypes in Python Numbers, string, list, tuple, dictionary 131) Which standard datatype in Python is immutable? tuple 132) What is indexing? Explain with an example Indexing is the numbering of characters in string or items in list, tuple to give reference for them. It starts from 0. Str = “Python”. The index for P is 0, y is 1, t is 2 and goes on. 133).Which statement is used to take a decision based on the comparison? IF statement 134) List out atleast two loop control statements break, continue, pass 135) What is the result of pow(x,y) X raised to the power Y 136) What is the difference between while and for loop? While loops till the condition fails, for loops for all the values in the list of items provided. 137) Which method removes leading and trailing blanks in a string? strip – leading and trialing blanks, lstrip – leading blanks, rstrip – trailing blanks 138) Which method removes and returns last object of a list? list.pop(obj=lst) 139) What is argument in a function? Argument is the variable which is used inside the function. While calling the function we need to provide values to those arguments. 140) What is variable length argument in function? Function having undefined no. of arguments are called variable length argument function. While calling this function, we can provide any no. of arguments 141) What is namespace? Namespace is the dictionary of key-value pairs while key is the variable name and value is the value assigned to that variable. 142) What is module? Module is a file containing python code which can be re-used in a different program if it is a function. 143) Which is the default function in a class? Explain about it – _init_. It is called class contructor or initialization method. Python calls _init_ whenever you create a instance for the class 144) What is docstring? How to define it? docstring is nothing but a comment inside the block of codes. It should be enclosed inside “”” mark. ex: “”” This is a docstring ””” 145) What is the default argument in all the functions inside a class? Self 146) How to send a object and its value to the garbage collection? del objname 147) How to install a package and import? In DOS prompt, run pip install package_name and run import package_name in editor window in Python’s IDE. 148) Name the function which helps to change the files permission os.chmod 149) Which is the most commonly used package for data importing and manipulation? Pandas 150) Will python support object oriented? Yes, it will support by wrapping the code with objects. 151) IS python can be compatible with command prompt? Yes, it can be accessed through command prompt. 152) How Lists is differentiated from Tuples? List are slow, can be edited but Tuples are fast and cannot be edited. 153). Use of NUMPY package? It is fastest, and the package take care of the number calculations. 154). Uses of python? Pie charts, web application, data modeling, automation and Cluster data. 155) Does python interact with Database? Yes, it interfaces to most of the Databases. 156) Is python is intended oriented? Yes, it will throw error if it is not in seuence. 157) How is Garbage handled in python? It will be automatically handle the garbage after the variable is used. 158) How will you check python version? Using python –version. 159) How will you uit the python? Using exit() 160) Does Python has any command to create variable? No, just (x =244) 161) What is complex type in python? It is mixture of variable and number. 162) Casting in python? To make String use command str(2) = ‘2’ 163) What is strip in python? Used to remove white spaces in String 164) Other String literals? Lower, upper, len, split, replace. 165) Python operators? Arithmetic, Assignment, Comparison, Logical, Identity, Membership and Bitwise. 166) Membership operator in python? In and not in. 167) Lambda in python? Can take only one expression but any number of Argument. 168) Dict in python? It is something like key and value pair as Map in java. 169) Does python has classes? In python all are denoted as some classes. 170) Multi threading on python? It is a package in python and it use GIL to run the thread one after the other. But isn’t it being not good to use here. 171) What is python private heap space? It is a inbuild garbage collection like java and this space can be used by the developer. 172) Does python support inheritance? Yes, it supports all forms of inheritance single, multiple, hierarchical and multi-level 173) Benefits of Flask? It is light weight and independent package. Mainly a web micro framework. 174) How dir() function is used in python? The defined symbols are defined here. 175) Will exit method in python de allocate the global namespace? No, it has a specific mechanism which it follows as an individual portion. 176) Has python has monkey patching concept within? Yes of course, it does dynamic transactions during the run time of the program. 177) args vs kwargs? Args – don’t know how many arguments are used. Kwargs- don’t know how many keywords are used. 178) use of isupper keyword in python? This will prompt the upper keyword of any character in a string literal. 179) pickling vs unpickling? If the objects translated from string then it seems to be pickling If the String is dumped to objects then it seems to un picking 180) What is py checker in python? It is tool to uantitatively detects the bugs in source code. 181) What are the packages? NUMPY, SCIPY, MATLAB, etc 182) Pass in Python? IT is a namespace with no character and it can be moved to next object. 183) How is unit test done in python? It is done in form of Unittest. This does major of testing activity. 184) Python documentation is called? DoctString such as AI, Python jobs ,Machine learning and Charts. 185) Convert Sting to number and viceversa in python? Str() for String to number and oct() for number to string. 186) Local vs Global in python? Anything inside the function body is local and outside is global as simple as that. 187) How to run script in python? Use py command or python command to run the specific file in Unix. 188) What is unlink in python? This is used to remove the file from the specified path. 189) Program structure in python? Always import the package and write the code without indention 190) Pyramid vs Django? Both used for larger application and Django comes with a ORM framework. 191) Cookies in python? Sessions are known as cookies here it is used to reuest from one object to other. 192) Different types of reuest in python? Before reuest – it is used to passes without the arguments. After reuest – it is used to pass the reuest and response will be generated. Tear down reuest – it is used as same as past but it does not provide response always and the reuest cant be changed. 193) How is fail over mechanism works in python? Once the server shoots the fail over term then it automatically tends to remove the packet each on the solid base and then re shoot again on its own. Socket wont get removed or revoked from the orgin. 194) Dogpile mechanism explain? Whenever the server host the service and when it gets multiple hits from the various clients then the piles get generated enormously. This effect will be seems as Dogpile effect. This can be captured by processing the one hit per time and not allowed to capture multiple times. 195) What is CHMOD 755 in python? This will enhance the file to get all the privileges to read write and edit. 196) CGI in Python? This server mode will enable the Content-type – text/html\r\n\r\n This has an extension of .cgi files. This can be run through the cgi command from the cmd prompt. 197) Sockets explain? These are the terminals from the one end to the other using the TCP, UDP protocols this reuires domain, type, protocol and host address. Server sockets such as bind, listen and accept Client socket such as connect. 198) Assertions in python? This is stated as the expression is hits when we get the statement is contradict with the existing flow. These will throw the error based on the scenario. 199) Exceptions in python? This is as same as JAVA exceptions and it is denoted as the try, catch and finally this also provides the user defined expression. 200) What made you to choose python as a programming language? The python programming language is easy to learn and easy to implement. The huge 3rd party library support will make python powerful and we can easily adopt the python 201) what are the features of python? The dynamic typing Large third party library support Platform independent OOPs support Can use python in many areas like machine learning,AI,Data science etc.. 202) How the memory is managed in python? The private heap space is going to take care about python memory. whenever the object is created or destroyed the heap space will take care. As a programmer we don’t need to involve in memory operations of python 203) What is the process of pickling and unpicling? In python we can convert any object to a string object and we can dump using inbuilt dump().this is called pickling. The reverse process is called unpicling 204). What is list in python? A list is a mutable seuential data items enclosed with in and elements are separated by comma. Ex: my_list=] In a list we can store any kind of data and we can access them by using index 205) What is tuple in python? A tuple is immutable seuential data element enclosed with in () and are separated by comma. Ex: my_tuple=(1,4,5,’mouli’,’python’) We use tuple to provide some security to the data like employee salaries, some confidential information 206) Which data type you prefer to implement when deal with seuential data? I prefer tuple over list. Because the tuple accessing is faster than a list because its immutability 207) What are advantages of a tuple over a list? We can use tuple as a dictionary key because it is hash able and tuple accessing very fast compare to a list. 208) What is list comprehension and dictionary comprehension and why we use it? A list comprehension is a simple and elegant way to create a list from another list. we can pass any number of expressions in a list comprehension and it will return one value, we can also do the same process for dictionary data types Data= Ex: new_list = 209) What is the type of the given datatype a=1? a)int b)Tuple c)Invalid datatype d)String Ans:b 210) Which is the invalid variable assignment from the below? a)a=1,2,3 b)The variable=10 c)the_variable=11 d)none of the above Ans:b 211) Why do we use sets in python? Generally we use sets in python to eliminate the redundant data from any data. And sets didn’t accept any mutable data types as a element of a set Ex: my_set={123,456,’computer’,(67,’mo’)} 212) What are the nameless functions in python? The anonymous functions are called nameless functions in python. We can also call it as lambda function. The lambda functions can be called as a one liner and can be created instantly Syntax: lambda arguments: expression Ex: hello=lambda d:d-(d+1) To call the lambda function Hello(5) 213) What is map and filter in python? Map and filter are called higher order functions which will take another functions as an argument. 214) What is the necessity to use pass statement in python program? Pass is no operation python statement. we can use it while we are implementing the classes or functions or any logic. If class is going be define later in the development phase we can use pass statement for the class to make it syntactically make it valid. Ex: def library(): Pass 215) What is *kwargs and **kwargs? Both are used in functions. both are allowed to pass variable number of arguments to a function only difference is *kwargs is used for non-key word arguments and **kwargs is used for key word arguments Ex: def kwargs(formal_arg, *kwargv): print(“first normal arg:”, formal_arg) for arg in kwargv: print(“another arg through *argv:”, arg) kwargs(‘mouli’, ‘ramesh’, ‘rajesh’, ‘kanna’) 216) Explain about negative indexing? Negative indexing is used in python seuential datatypes like list,string,tuple etc We can fetch the element from the back with out counting the list index Ex: list1 217) What is file context manager? To open a file in safe mode we use WITH context manager. This will ensure the file crashing from some exceptions. we don’t need to close the file explicitly Ex: with open(‘sample.txt’,’w’) as f: Pass 218) Explain between deep and shallow copy? The deep copy , copy the object with reference so that if we made any changes on the original copy the reference copy will be effected, shallow copy ,copy the object in a separate memory so that if we do any changes on original it won’t effect the shallow copy one 219) How can you make modules in python? First we need to save the file with somename.py Second import the somename.py in the newfile.py, so that we can access the somename.py functions in the newfile.py. so that somename.py acts as a module. Even we can share our module to the rest of the world by registering to PYPY community 220) Explain about default database with python? SLite3 comes with python3. It is light weight database for small scale of application 221) What are different modes in file operations? There are 3 modes in python file operations read, write and append sometimes we can do both at a time. read(),readline(),readlines() are the inbuilt functions for reading the file write() is inbuilt function for writing to the file 222) What is enumerate() explain its uses? Enumerate is a built in function to generate the index as we desired in the seuential datatypes Ex: for c ,i in enumerate(data,p): Print(c,i) Here p is optional if we don’t want it we can eliminate it 223) Can we use else with for loop in python? Yes we can use. once all the for loop is successfully executed the else part is going to execute, If there are any error occurs or any break happened in the loop then the else is not going to execute Ex: for I in list1: print(i) Else: print(execution done) even we can use else with while also 224) What is type() and id() will do? The type() will give you the information about datatype and id() will provide you the memory location of the object 225) What is decorators? The decorators are special functions which will very useful when tweaking the function or class.it will modify the functionality of another function. 226) Explain about different blocks in exception handling? There are three main blocks in python exception handling Try Except Finally In the try block we will write all the code which can be prone to error, if any error occurred in this block it will go to the except block. If we put finally block also the execution will hit the finally block. 227) Explain inheritance in python? Inheritance will allow the access to the child call meaning it can access the attributes and methods of the base. There are many types in the inheritance Single inheritance: in this one, have only one base class and one derived class Multilevel inheritance: there can be one or more base classes and one more derived classes to inherit Hierarchical: can derive any number of child classes from single base class Multiple: a single derived can be inherited from any number of base classes 29.write sorting algorithm in python for given dataset= using list comprehension x= print(x.sort()) 228) Explain about multi-threading concept in python? Multi-threading process can be achieved through the multiprocess inbuilt module. GIL(global interpreter lock ) will take care about the multiprocessing in python. simultaneously there are several threads can be run at same time. The resource management can be handled by GIL. 229) Can we do pattern matching using python? Yes, we can do it by using re module. like other programming languages python has comes with powerful pattern matching techniue. 230) What is pandas? Pandas is data science library which deal with large set of data. pandas define data as data frame and processes it. Pandas is a third party library which we need to install. 231) What is pip? Pip is a python package installer. Whenever we need third party library like paramiko,pandas etc We have to use pip command to install the packages Ex: pip install paramiko 232) What is the incorrect declaration of a set? a)myset={} b)myset=set() c)myset=set((1,2,3)) d)myset={1,2,3} Ans:a 233) What is OS module will do in python? OS module is giving access to python program to perform operating system operations like changedirectory, delete or create. Ex: import os os.cwd() 234) What is scheduling in threading? Using scheduling we can decide which thread has to execute first and what is the time to execute the thread. And it is highly dynamic process 235) What is the difference between module and package? A package is folder which can have multiple modules in it. We can import module by its package name.module name 236) How we can send email from python? We can use smtplib inbuilt module to define smtp client, that can be used to send email 237) What is TKIner? TKIner is a python inbuilt library for developing the GUI 238) How can you prevent abnormal termination of a python program We can prevent the abnormal termination by using the exception handling mechanism in python. Try , except and finally are the key words for handling the exception. we can raise our own exceptions in the python. They are called user exceptions 239) what module is used to execute linux commands through the python script and give us with one example We can use OS module to execute any operation system commands. We have to import the OS module first and then give the commands Ex: import os Print(os.system(‘nslookup’+’127.10.45.00’)) 240) what is the process to set up database in Django First we need to edit the settings.py module to set up the database. Django comes with SLite database by default, if we want to continue with default database we can leave settings.py as it is. If we decide to work with oracle or other kind of databases like oracle your database engine should be ‘django.db.backends.oracle’. if it is postgresl then the engine should ‘django.db.backends.postgresl_psycopg2’. We can add settings like password, name host etc. 241) what is Django template A django template is a simple text file which is used to create HTML,CSV or XML. A template contains variables that is replaced with values when we evaluates it 242) what is the uses of middleware in Django? Middleware is responsible for user authentication, session management . 243) what is Django architecture Django architecture contains models ,views, templates and controller The model describes the database schema and data structure. the views retrieves data from model and pass it to the template. Templates are described how the user see it. controller is the logic part and heart of the Django 244) List some of the data science libraries in python NumPy Pandas SciPy Matplotlib 245) How do substitute a pattern in a string using re module Import re >>> re.sub(‘’, ‘o’, ‘Space’) ‘Spooe’ >>> re.sub(‘’, ‘n’, re.sub(‘’, ‘o’, ‘Space’)) ‘Spoon’ 246) What is random module will do in python and what are the functions we can apply on random module Random module will gives the random number from the specific range. Every time we execute we will get the random number Randrange() Randint() Choice() Shuffle() Uniform() Are some of the useful functions in random module 247) What are the noted modules of python in terms of networking Paramiko, netmiko, pexpect etc These module will create a ssh connection between server and the program 248) What is beautifulSoup module will do in python? We are using the module for pulling the data from HTML and XML files 249) What is reuests module will do? It is a python http library. The aim of the reuests module is to make http reuests simpler and more human friendly Ex: Import reuests r = reuests.get(‘https://api.github.com/user’, auth=(‘user’, ‘pass’)) r.status_code 200 >>> r.headers ‘application/json; charset=utf8’ >>> r.encoding ‘utf-8′ >>> r.text # doctest: +ELLIPSIS u'{“type”:”User”…’ >>> r.json() # doctest: +ELLIPSIS {u’private_gists’: 419, u’total_private_repos’: 77, …} 250) What are the basic datatypes in python? Python datatypes include int, float, strings, lists, tuples, sets, dictionaries. 251) How Manages to Python Handle Memory Management? Python is a separate on heaps to keep its memory. So the heap contains all the Python information and these data structures. And it’s the Python created handler that manages the Individual heap. Python employs a built-in garbage receiver, which salvages all the available memory including offloads it to some heap space. 252) What is means by string Python? A string in Python is a mixture of the alpha-numeric volume of characters. They are clear of objects Volume. It suggests that both don’t help move once all get assigned a value. Python provides to programs of join(), replace(), or split() to alter strings variable. 253) What does the meaning of Slicing in python? Python Slicing is defined as Lists of Tuples and Arrays Volume function. The Lists element function has a default bit fo the functionality while slicing. If there is a no conseuence of before that first colon, it expects to begin at the start index of the list. 254) Definition of %S In Python? Python it has to been guide for formatting of any value into a string volume function. It may include uite complex characters. It’s One of the popular usages of the start contents into a string including the %s form specifier. The %S formatting helps Python in a similar variable volume syntax as the C function printf(). 255) what does a function of python programming? A function is an object which describes a block of the system and is a reusable object. It takes modularity to a performance code program and a higher level of code reusability. Python has to give us several built-in functions Volume such as print() function volume and it gives the ability to perform a user-defined function. 256) How to write a functioning volume for python? Step-1: To begin the function Volume of start writing the function with the keyword and then specify the Volume function name. Step-2: We can immediately give the reasons and enclose them doing the parentheses. Step-3: After pushing an enter, we can do it determine the coveted Python records for execution. 257) What is means by Call function in Python? A python function value gets treated because of a callable object. It can provide any thoughts value and also pass a value or increased values into the model of a tuple. Apart from this function, Python should additional constructs, such as being groups or the class instances fit in the related category. 258) How to use of return keywords in python? The purpose of a value function get the inputs and return value of some output. The return value of is a Python statement if it’s we can relate to using for sending content following to its caller. 259) What is meant by“Call By Value” In Python? In call-by-value, that argument to be valued expression or value becomes connected to the particular variable in this function. Python command treats that variable being confined within the function-level field. Any changes done to this variable will continue local and order reflect outside the function. 260) What does means by “Call By Reference” In Python? The Call-by-reference we pass as an argument by reference volume, then it is possible because of an absolute source on the use, first then some simple copy. In such any case, any change to the discussion instructions further is obvious to the caller. 261) Difference between Pass and Continue In Python? The continue report executes the loop value to return from the following emphasis. On the opposite, that passing record instructs to make nothing, including the remainder from the code effects as usual. 262) What is meant by R strip() In Python? Python gives the r-strip() system to increases this string value function but allows avoid this whitespace symbols of that end. This r-strip() transmits that numbers value function of right end based upon particular argument value a string specifying the group of numbers to get excluded. 263) What does defined by whitespace in python? Whitespace is representing the characters string value function that we practice for spacing moreover separation. They maintain the“empty” value function symbol. In Python, it could move some tab or space. 264) What is defined Isalpha() In Python? Python has been provided that built-in isalpha() value function for each string manipulating purpose. It reflects the True value function if all types in this string value function are of alphabet type number, else value function it returns False. 265) What does making the CPython Different From Python? Jython means an implementation from some Python programming language that can operate code using on this Java platform. Jython is uiet as compared to CPython and reuires agreement with CPython libraries. A Python implementation is written in C# getting a Microsoft’s .NET framework. 266) Which is the package Fastest Form Of Python? PyPy gives maximum agreement while utilizing CPython implementation as increasing its performance. The tests verified that PyPy is almost five times faster than uniue CPython. 267) What does the meaning of GIL In Python Language? Python is helped to GI(thats means by the global interpreter) which operates some mutex done to ensure introduction into Python objects, synchronizing multiple threads of running these Python bytecodes at the same time. 268) How do Python Thread Safe? Python ensures the reliable path of the threads. It does this GIL mutex to secure synchronization. If a thread fails the GIL lock through any time, when you must to get this system thread-safe. 269) How Does determine the Python Manage The Memory? Python performs a property manager within which operates any of its articles also data structures. This heap manager makes that allocation/de-allocation from heap space to objects. 270) What is a means by “Tuple In Python”? A tuple is a group of specific data structure under Python is immutable. They mean similar to progressions, really prefer the lists. Also, that tuples follow parentheses as including, but these programs have suare sections in their syntax. 271) What does means by split do in Python? This is the opposite of order which mixes or combines strings within one. To do this, you practice this split function value. What it takes is divided or develop up a string and attach that data into each order collection using a specified separator. If none separator is specified while you charge against specific function, whitespace order signify done by default. 272) How do you convert a string to in python? Use the “int” String function value to convert the number to an integer value. Add five value to the integer. Then, the “str” function value it’s to converts the integer function value to a string value function that Python concatenates and print the output value of the answer. 273) How do you reverse any string in Python? This is continued the reverse value function part syntax. It goes outcomes too by doing – by leaving start value and end off value and defining a step of -1, it reverses value function a string function. 274) What does by Python a scripting language? Python is identified as a scripting language because it is an interpreted language also because that is simple to record scripts in it. A defined python communication programming is a language whose programs have to be obtained before they can be run. 275) What language is Python based on? Since largest recent OS continue written in C, compilers/editors before improved high-level languages exist also written in C. Python continues an exception – its various popular/”traditional” implementation means described CPython more is written in C. 276) What is the best free website to learn Python? Python.org. is one the best Python Software Foundation’s official website is further one of the valuable free source locations.SoloLearn- If it refers to a modular, crash-course-like information environment, SoloLearn gives an excellent, step-by-step knowledge program for beginners, TechBeamers , Hackr.io, Real Python. 277) Difference between Python and Java? The Two biggest difference languages signify that the Java is one the statically typed program coding language and Python is one of the dynamical typed. Python is very heavily code programming language but dynamically typed. In certain means types in one code remain confined to strongly Copied something at runtime. 278) How Can you declare the variables function in Python? In Java or C, every variable must be certified before it can be used. Declaring the variable means connecting it to a data type value function. Declaration of variables is expected in Python. You can specify an integer value function to a variable, use it is an integer value function for a while and when specifying a string to the variable function. 279) How to declare the variables function in Python? Python is defined as a dynamically typed variable, which indicates that you have to declare what type each function variable is. In Python, variables do a storage placeholder during texts and numbers variable. It needs to convert one name so that you remain ualified to get this again. The variable does forever assign with an eual sign, replaced by the value of the variable function. 280) How do you reverse the string in python? There is no such inbuilt function for this. The Easiest way for reversing the string in python is using slice which steps backwards, -1. For example: txt = “Hello World” print(txt). 281) WAP to find the given string in the line? This is the WAP for finding the given string in line. Str = ‘Hello world’ If ‘hello’ in str: Print ‘string found’. 282) What is class variable in python? The Class variable are also known as static variables. These variables are shared by all objects. In Python the variables that are assigned the value in class declaration are known as class variables. 283) What is class in Python? The python is “object oriented language”. Almost all the codes of this language are implemented using a special construct called Class. In simple words, “Class” is an object constructer in Python. 284) How can you handle multiple exception in python? To handle multiple exception in python you can use try statement. You can also use these blocks: The try/except blocks The finally blocks The raise keywords Assertions Defining your own exception 285) Can we write else statement try block in python? Yes, it is possible to write else statement try block. try: operation_that_can_throw_ioerror() except IOError: handle_the_exception_somehow() else: # we don’t want to catch the IOError if it’s raised another_operation_that_can_throw_ioerror() finally: something_we_always_need_to_do(). 286) Does Python have do-while loop statements? No, Python doesn’t have any do-while loop statements. 287) What is the difference between range and xrange in Python? In python the range and xrange are two functions that are used repeat number of time in for loops. The major difference between rang and xrange is that the xrange returns the xrange object while the range returns a python list objects. The xrange is not capable for generating the static list at run-time. On the other hand range can do that. 288) Is it possible to inherit one class from another class? Yes, we can inherit one class from another class in python. 289) Name different types of inheritance in python? The inheritance refers to the capability of on class to derive the properties from other class. In python, there are two major types of inheritance. Multiple Inheritance Multilevel Inheritance 290) What is polymorphism? The polymorphism in python refers to various types of respond to the same function. In Greek language the word poly means “many” and morphism means “forms”. This means that the same function name is being used on objects of different types. 291) How do you convert string as a variable name in python? The simplest way to convert string as a variable name is by using vars(). 292) Why do we want to use break statement in while-loop? While-loop can convert into the infinite loop if you don’t use break statement. 293) Why we are using Def keyword for method? The Def keyword in python is used to form a new user-defined function. The def keywords mark the beginning of function header. The functions are the objects through which one can easily organize the code. 294) Why are we using self as first argument? The first argument represents the current instance of the class. The first argument is always called self. With the use of “self” keyword one can easily access the characteristics and methods of the class in python. 295) Why we are using a Python Dictionary? There is huge collection of data values in the python dictionary. These dictionaries are accessed to retrieve the value of the keys that unknown to the users. There is a key: value pair provided in the dictionary which makes it more optimized. 296) What are the use of tuples in Python? A tuple in python is a series of immutable Python objects. These tuples are similar to the list that are used for organizing data to make it easier to understand. If Python has created a tuple in memory, it difficult to change them. 297) What are the use of sets in Python? The Python Set is the collection objects similar to lists and dictionaries. All the elements should be original and uniue and must be immutable. The python sets in comparison with list provides highly optimized method for ensuring whether a specific element is contained in the set. 298) Does Python supports hybrid inheritance? No, python doesn’t support hybrid inheritance. But we can use straight method and round diamond method we can achieve it. 299) What is the uses of middleware in Django? Middleware is responsible for user authentication, session management . 300) Explain Deep Copy in Python There are some values copied already. To store those copied values, Deep copy is used. Unlike Shallow copy, Deep copy will not copy the reference pointers. 301) Define the usage of split If you want to separate a provided string in Python, use split() function. 302) What is the keyword to import a module in Python? Use the keyword ‘import’ to import the modules in Python. 303) List out the different types of inheritance available in Python Hierarchical inheritance, Multi-level inheritance, Multiple inheritance, and Single Inheritance are the four types inheritance available in Python. 304) Define monkey patching You can make dynamic modifications to a module or class during the run-time. This process is called monkey patching in Python. 305) Explain encapsulation Binding the data and code together is known as encapsulation. Example of encapsulation is a Python class. 306) Define Flask in Python Flask, a microframework principally constructed for a minor application with easier reuirements. External libraries must be used in Flask and flask is always ready to use state. 307) Define Pyramid in Python For larger application, you can make use of Pyramid and this is hefty configurable concept. Pyramid affords suppleness and permits the developer to employ the appropriate tools for their assignment. 308) Define Django in Python Similar to Pyramid, Django is built for larger applications and ORM is included. 309) Provide the Django MVT Pattern Django Pattern 310) Why to use Python numpy instead o f lists? Python numpy is convenient, less memory and rapid when compared to lists. Hence, it is better to use python numpy. 311) Mention the floor division available in Python Double-slash (//) is the floor division in Python. 312) Is there any maximum length expected for an identifier? No, there is no maximum length expected for an identifier as it can have any length. 313) Why do we say “a b c = 1000 2000 3000” is an invalid statement in Python? We cannot have spaces in variable names and hence a b c = 1000 2000 3000 becomes invalid statement. 314) Mention the concept used in Python for memory managing Python private heap space is the one used to manage memory. 315) What are the two (2) parameters available in Python map? Iterable and function are the two (2) parameters available in Python map 316) Explain “with” statement in Python As soon as there is a block of code, you can open and close a file using “with” statement in Python. 317) What are the modes to open a file in Python? read–write mode (rw), write-only mode (w), and read-only mode (r) is the three (3) modes to open a file in Python. 318) Try to provide the command to open a file c:\welcome.doc for writing Command to open a file for writing f= open(“welcome.doc”, “wt”) 319) Explain Tkinter in Python An inbuilt Python module helpful in creating GUI applications is known as Tkinter. 320) What does the keyword do in python? The yield keyword can turn ant function into a generator. It works like a standard return keyword. But it will always return a generator object. A function can have multiple calls the keyword. Example: def testgen(index): weekdays = yield weekdays yield weekdays day = testgen(0) print next(day), next(day) Output: Sun mon PYTHON Interview Questions with Answers Pdf Download Read the full article
0 notes
Text
Important Questions for Class 12 Computer Science (C++) - Data File Handling
Important Questions for Class 12 Computer Science (C++) – Data File Handling Previous Years Examination Questions 1 Mark Questions Question 1: Find the output of the following C++ code considering that the binary file CLIENTS.DAT exists on the hard disk with a data of 200 clients: All India 2017 class CLIENTS { int CCode;char CName[20]; …
0 notes
Text
NCERT Class 12 Computer Science Chapter 7 Networking and Open Source Concepts
NCERT Class 12 Computer Science Python Solutions for Chapter 7 :: Networking and Open Source Concepts
TOPIC-1
Communication TechnologiesVery Short Answer Type Questions (1 Mark each)
Question 1:Identify the Domain name and URL from the following:https://ift.tt/2Rc5dG8Answer:Domain name – income.inURL – https://ift.tt/2Rc5dG8.
Question 2:What is web hosting?Answer:Web hosting is the service that makes our website available to be viewed by others on the Internet. A web host provides space on its server, so that other computers around the world can access our website by means of a network or modem.
Question 3:Write two characterstics of Wi-Fi.Answer:
It is wireless network.
It is for short range.
Question 4:Which protocol is used to creating a connection with a remote machine?Answer:Telnet: It is an older internet utility that lets us log on to remote computer system. It also facilitates for terminal emulation purpose.
Question 1:Which protocol is used to create a connection to a remote machine? Give any two advantages of using optical fibers.Answer:Two advantage of using optical fibers are:
Capable of extremely high-speed.
No electromagnetic interference.
Extremely low attending.
Question 6:Expand the following:
GSM
GPRS
Answer:
GSM: Global System for Mobile Commu-nication.
GPRS: General Packet Radio Service.
Question 7:What is the difference between packet and message switching ?Answer:
Question 8:What is cloud computing?Answer:The sharing of compute resources (dedicated, time-shared, or dynamically shared servers) and related infrastructure components (load balncers, firewalls, network storage, developer tools, monitors and management tools) to facilitate the deployment and operation of web and network based applications. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a net-work.
Question 9:Which type of network (out of LAN, PAN and MAN) is formed, when you connect two mobiles using Bluetooth to transfer a video?Answer:PAN
Question 10:Write one characterstic each for 2G and 3G mobile technologies.Answer:2G networks primarily involve the transmission of voice information, 3G technology provides the additional advantage of data transfer.
Question 11:What is the difference between Packet switching and circuit switching techniques?Answer:In circuit switching, a dedicated path exists from source to destination while in packet switching, there is no fixed path.
Question 12:Write two advantages of using an optical fibre cable over an Ethernet cable to connect two service stations, which are 200 m away from each other.Answer:Advantages of optical fibre:
Faster speed than ethernet
Lower attenuation
Question 13:Write one advantage of bus topology of network. Also illustrate how four (4) computers can be connected with each other using bus topology of network.Answer:Advantage (benefits) of linear Bus topology is that the cable length required for this topology is the least compared to the other networks.Bus Topology of Network:
Question 14:Give one suitable example of each URL and Domain Name.Answer:URL: http://waltons.inDomain Name: @gmail.com
Question 15:Write one advantage of star topology network? Also, illustrate how five (5) computers can be connected to each other using star topology of network.Answer:Advantage (benefits) of star toplogy:Easy to replace, install or remove hosts or other devices.
Question 16:What is the function of Modem?Answer:The function of modem is modulation and demo-dulation, means turn data into a format that can be transmitted via an audio link such as a phone line.
Question 17:Explain the purpose of a router.Answer:A router established connection between two networks and it can handle network with different protocols. Using a routing table, routers make sure that the data packets are travelling through the best possible paths to reach their destination.
Question 18:Name any two components required for net-working.Answer:
Repeater
Routers
Question 19:What are repeaters?Answer:A repeater is an electronic device that receives a signal and retransmits it at a higher level and/ or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
Question 20:Mention one advantage of star topology over bus topology in networking?Answer:Simple to add more computers to network.
Question 21:Differentiate between packet swiching and message switching technique in network commu-nication.Answer:In packet switched network, data are transmitted in discrete units of potentially variable length blocks called packets, while in message switching mechanism, a node receives a message stores it until the appropriate route is free, then sends it along.
Question 22:Differentiate between Bus and Star topology of network.Answer:
Question 23:What is VoIP?Answer:Voice over Internet Protocol (VoIP) is one of a family of internet technologies, communication protocols, and transmission technologies for delivery of voice communications and multi-media sessions over internet protocol (IP) network, such as the internet.
Question 24:In networking, what is WAN? How is it different from LAN?Answer:WAN (Wide Area Network):A communication network that uses such devices as telephone lines, satellite, dishes, or radiowaves to span a larger geographic area which cannot be covered by a LAN.
Question 25:Define the term bandwidth. Give any one unit of bandwidth.Answer:Bandwidth is referred as the volume of information per unit of time that a transmission medium (like an internet connection) can handle.ORThe amount of data that can be transmitted in a fixed amount of time is known as bandwidth. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).
Question 26:What is the difference between LAN and MAN?Answer:LAN: It is Local Area Network. The diameter is not more than a single building.WAN: It is Metropolitan Area Network. LAN spans a few kms while MAN spans 5-50 km diameter and is larger than a LAN.
Question 27:What is the importance of URL in networking ?Answer:A Uniform Resource Locator (URL) is used to specify, where an identified resource is available in the network and the mechanism for retrieving it. A URL is also referred to as a web address. 1
Question 28:What was the role of ARPANET in the computer network?Answer:In 1969, ARPANET was set up by the American government for defence purpose. ARPANET stands for Advanced research Projects agency Network.
Question 29:Which of the following is not a unit for data transfer rate ?
bps
abps
gbps
kbps
Answer:(ii) abps
Question 30:Identify the type of topology from the following:
Each node is connected with the help of a single cable
Each node is connected with the help of independent cable with central switching.
Answer:
Bus topology
Star topology
Question 31:ABC International School is planning to connect all computers, each spread over a distance of 50 metres. Suggest an economic cable type having high speed data transfer to connect these computers.Answer:Optical fibre cable.
Question 32:Mahesh wants to transfer data within a city at very high speed. Write the wired transmission medium and type of network.Answer:Wired transmission medium – Optical fibre cable Type of network – MAN.
Question 33:Which device is used to connect all computers inside a lab?Answer:Hub
Question 34:Which device is used to connect all computers to the internet using telephone wire?Answer:RJ – 45. It is an eight wired connectors used to connect computers on a LAN.
Question 35:What is Wi-Fi Card?Answer:Wi-Fi cards are small and portable cards that allow the computer to connect to the internet through a wireless network. The transmission is through the use of radio waves.
Short Answer Type Questions
Question 1:Write any two differences between twisted pair and co-axial pair cable.Answer:
Question 2:Write one advantage of Bus Topology of network, also, illustrate how 4 computers can be connected with each other using star topology of network.Answer:Bus topology: Cable length required for his topology is the least compared to other networks.
Question 3:Explain any two switching techniques used in networking.Answer:Message Switching: It is similar to Post-office mailing system. A temporary link is established for one message transfer.Packet Switching: It is a form of store and forward switching system which stores the message as small packets at the switch nodes and then transmits it to the destination.
Long Answer Type Questions
Question 1:Write answer of the following:(a) Differentiate between PAN and LAN types of networks.(b) Which protocol helps us to transfer files to and from a remote computer ?(c) Write two advantages of 3G over 2G mobile telecommunication technologies in terms of speed and services.(d) Write two characteristics of Web 2.0(e) Write the basic difference between worm and Trojan Horse.(f) Categorize the following under client-side and server-side scripts category:
Jave Script
ASP
VB Script
JSP
(g)Intelligent Hub India is a knowledge community aimed to uplift the standard of skills and knowledge in the society. It is planning to setup its training centres in multiple towns and villages pan India with its head offices in the nearest cities. They have created a model of their network with a city, a town and 3 villages as given.As a network consultant, you have to suggest the best network related solution for their issues/problems raisedin (i) to (iv) keeping in mind the distance between various locations and given parameters.
Shortest distance between various locations:
Number of computers iinstalled at various locations are as follows:
Note:• In Villages, there are community centres, in which one room has been given as training center to this organiza¬tion to install computers.• The organization has got financial support from the government and top IT companies.
Suggest the most appropriate location of the SERVER in the YHUB (out of the 4 locations), to get the best and effective connectivity. Justify your answer.
Suggest the best wired medium and draw the cable layout (location to location) to efficiently connect vari¬ous locations within the YHUB.
Which hardware device will you suggest to connect all the computers within each location of YHUB?
Which server/protocol will be most helpful to conduct live interaction of Experts from Head office and people at YHUB locations?
Answer:1.(a)OR(b) FTP or Telnet or TCPFTP OR Telnet OR TCP(c) Speed
Faster web browsing.
Faster file transferService –
Better video clarity
Better security
OR(Any other correct advantage can be considered)
(d) Makes web more interactive through online social media.Supports easy online information exchange.Interoperability on the internet.Video sharing possible in the websites.(e)
(f)
(g)(i) YTOWNJustification
Since it has the maximum number of computers.
It is closet to all other locatios.
(ii) Optical Fiber
(iii) Switch or Hub(iv) Video conferencing or VoIP or any other correct service/protocol.
Question 2:Indian School, in Mumbai is starting up the network between its different wings. There are four Buildings named as SENIOR, JUNIOR, ADMIN and HOSTEL as shown below:The distance between various buildings is as follows:Number of Computers in Each Building :
Suggest the cable layout of connections between the buildings.
Suggest the most suitable place (i.e., building) to house the server of this school, provide a suitable reason.
Suggest the placement of the following devices with justification.
Repeater
Hub/Switch
The organisation also has inquiry office in another city about 50-60 km away in hilly region. Suggest the suitable transmission media to interconnect to school and inquiry office out of the following :
Fiber optic cable
Microwave
Radiowave
Answer:
Server can be placed in the ADMIN building as it has the maxium number of computer.
Repeater can be placed between ADMINand SENIOR building as the distance is more than 110 m.
Radiowaves can be used in hilly regions as they can travel through obstacles.
Question 3:Vidya Senior Secondary Public School in Nainital is setting up the network between its different wings. There are 4 wings named as SENIOR(S), JUNIOR(J), ADMIN(A) and HOSTEL(H).Distance between various wings are given below:
Suggest a suitable Topology for networking the computers of all wings.
Name the most suitable wing where the Server should be installed. Justify your answer.
Suggest where all should Hub(s)/Switch(es) be placed in the network.
Which communication medium would you suggest to connect this school with its main branch in Delhi ?
Answer:
Server should be in Wing S as it has the maxi-mum number of computers. 1
All Wings need hub/switch as it has more thanone computer.
Since the distance is more, wireless transmission would be better. Radiowaves are reliable and can travel through obstacles.
Question 5:
Which out ot three type of networks LAN. MAN and WAN, is to be used when an institute connects computers of two adjacent computer laboratories ?
What is the difference between HTTP and FTP?
What is the major difference between Message Switching and Packet Switching in networking?
What is the basic difference between DNS and URL?
Give two applications of web 2.0.
Categories the following under client side and Server-Side script category?
JSP
ASP
VBScript
Jave Script
Answer:(i) LAN (The ange is upto one KM)(ii) (iv)(v) Application of web 2.0
web hosting
web browsing
web Indexing
web searching
(vi) Client side Script
JSP
Java ScriptServer Side Scripts
ASP
VB Script
Question 6:Trine Tech Corporation (TTC) is a professional consultancy company. The company is planning to set up their new offices in India with its hub at Hyderabad. As a network adviser, you have to understand their requirement and suggest them the best available solutions. Their queries are mentioned as (i) to (iv) below.Physical Locations of the blocked of TTC
What will be the most appropriate block, where TTC should plan to install their server?
Draw a block to cable layout to connect all the buildings in the most appropriate manner for efficient communication.
What will be the best possible connectivity out of the following, you will suggest to connect the new setup of offices in Bangalore with its London based office:
Satellite Link
Infrared
Ethernet Cable
Which of the following device will be suggested by you to connect each computer in each of the buildings:
Switch
Modem
Gateway
Answer:
Finance block because it has maximumnumber of computers.
Satellite link
Switch
Question 7:G.R.K International Inc. is planning to connect its Bengaluru Office Setup with its Head Office in Delhi. The Bengaluru Office G.R.K. international Inc. is spread across and area of approx. 1 square kilometer, consisting of 3 blocks – Human Resources, Academics and Administration.You as a network expert have to suggest answers to the four queries (i) to (iv) raised by them.Notes : Keep the distance between blocks and number of computers in each block in mind, while providing them the solutions.
Suggest the most suitable block in the Bengaluru Office Setup, to host the server.Give a suitable reason with your suggestion.
Suggest the cable layout among the various blocks within the Bengaluru Office Setup forconnecting the Blocks.
Suggest a suitable networking device to be installed in each of the blocks essentially required for connecting computers inside the blocks with fast and efficient connectivity.
Suggest the most suitable media to provide secure, fast and reliable data connectivity between Delhi Head Office and the Bengaluru Office Setup.
Answer:
Human Resources because it has maximum number of computers.
Switch 1
Satellite link
Question 8:Rovenza Communications International (RCI) is an online corporate training provider company for IT related courses. The company is setting up their new compus in Kolkata. You as a network expert have to study the physical locations of various blocks and the number of computers to be installed. In the planning phase, provide the best possible answers for the queries (i) to (iv) raised by them.Block to Block Distances(in Mtrs.)Expected computers to be installed in each block
Suggest the most appropriate block, where RCI should plan to install the server.
Suggest the most appropriate block to block cable layout to connect all three blocks for efficient communication.
Which type of network out of the following is formed by connecting the computers of these three blocks?
LAN
MAN
WAN
Which wireless channel out of the following should be opted by RCI to connect to students from all over the world?
Infrared
Microwave
Satellite
Write two advantages of using open source software over proprietary software.
Which of the following crime(s) does not come under cybercrime?
Copying some important data from a computer without taking permission from the owner of-the data.
Stealing keyboard and mouse from a shop.
Getting into unknown person’s social networking account and start messaging on his behalf.
Answer:
Faculty Recording Block.
Star topology
LAN
Satellite connection
Advantages of open source over proprietary software:
Open source software’s source code is available, can be modified copied & distributed while propritary software can’t be change.
Open source is free while proprietary a paid.
(c) Stealing keyboard & mouse from a shop.4
Question 9:
Identify the type of topology on the basis ofthe following:
Since every node is directly connected to the server, a large amount of cable is needed which increases the installation cost of the network.
It has a single common data path connecting all the nodes.
Answer:
Star Topology
Bus Topology
(ii) Expand the following
VOIP
SMTP
Answer:
Voice Over Internet Protocol
Simple Mail Transder Protocol
(iii) Who is a hacker?
Answer:A computer enthusiast, who uses his computer programming skill to intentionally access a computer without authorization is known as hacker. A hacker accesses the computer without the intention of destroying data or maliciously harming the computer.(iv) The following is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. 140.179.220.200What is it? What is its importance?Answer:It is an IP Address. It is used to identify the computers on a network.(v) Daniel has to share the data among various computes of his two offices branches situated in the same city. Name the network (out of LAN, WAN, PAN and MAN) which is being formed in this process.Answer:MAN(vi)Rehaana Medicos Center has set up its new center in Dubai. It has four buildings as shown in the diagram given below:
As a network expert, provide the best possible answer for the following queries:
Suggest a cable layout of connections between the buildings.
Suggest the most suitable place (i.e. building) to house the server of this organization.
Suggest the placement of the following device with justification:
Repeater (b) Hub/Switch
Suggest a system (hardware/software) to prevent unauthorized access to or from the network.
Answer:
Layout 1
The most suitable place / building to house the server of this organization would be building Research Lab, as this building contains the maximum number of computers.
Since the cabling distance between Accounts to Store is quite large, so a repeater would ideally be needed along their path to avoid loss of signals during the course of data flow in this route.
Firewall.
Question 10:
What is the difference between domain nameand IP address?
Write two advantages of using an optical fibre cable over an Ethernet cable to connect two service stations, which are 190 m away from each other.
Expertfa Professsional Global (EPG) is an online, corporate training provider company for IT related courses. The company is setting up their new campus in Mumbai. You as a network expert have to study the physical locations of various buildings and the number of computers to be installed. In the planning phase, provide the best possible answer for the
Building to Building distances (in Mtrs.)
Suggest the most appropriate building, where EPG should plan to install the server.
Suggest the most appropriate building to building cable layout to connect all three buildings for efficient communication.
Which type of network out of the following is formed by connecting the computers of these three buildings?
LAN
MAN
WAN
Which wireless channel out of the following should be opted by EPG to connect to students of all over the world?
Infrared
Microwave
Satellite
Answer:
Domain Name is alphanumeric addressof a resource over network IP address is a Numeric Address of a resource in a Network.Example:Domain Name 1www.Gabsclasses.comIP Address102.112.0.153
Optical fibre Advantages:
Faster Communication.
Free from electrical & Noise interference.
(a) Faculty Studio Building(b) Bus Topology(c) LAN(d) Satellite
Question 11:To provide telemedicine faculty in a hilly state, a computer network is to be setup to connect hospitals in 6 small villages (VI, V2, …, V6) to the base hospital (H) in the state capital. This is shown in the following diagram.
No village is more than 20 km away from the state capital.Imagine yourself as a computer consultant for this project and answer the following questions with justification:
Out of the following what kind of link should be provided to setup this network: Microwave link, Radio Link, Wired Link ?
What kind of network will be formed; LAN, MAN, or WAN ?
Many times doctors at village hospital will have to consult senior doctors at the base hospital. For this purpose, how should they contact them: using email, sms, telephone, or video conference ?
(b) Out of SMTP and POP3 which protocol is used to receive emails ?(c) What are cookies in the context of computer networks?(d) Rajeshwari is trying for on-line subscription to a magazine. For this she has filled in a form on the magazine’s web site. When the clicks submit button she gets a message that she has left e-mail field empty and she must fill it. For such checking which type of script is generally executed client side script or server-side script ?(e) Mention any one difference between free-ware and free software.
Answer:(a)
Radio Link
MAN
e-mail
(b) POP3(c) Cookies are files that store user information that is used to identify the user when he logs into the system.(d) Server-side script(e) Freeware is a software that has the user to get unlimited usage for. Free software may be free for a certain period only.
Question 12:Workalot Consultants are setting up a secured network for their office campus at Gurgaon for their day-to-day office and web-based activities. They are planning to have connectivity between three buildings and the head office situated in Mumbai. Answer the questions (i) to (iv) after going through the building positions in the campus and other details, which are given below :
Suggest the most suitable place (i.e., building) to house the server of this organization. Also give a reason to justify your suggested location.
Suggest a cable layout of connections between the buildings inside the campus.
Suggest the placement of the following devices with justification:
Repeater.
Switch.
The organization is planning to provide a high speed link with its head office situated in Mumbai using a wired connection. Which of the following cables will be most suitable for this job ?
Optical Fiber
Co-axial Cable
Ethernet Cable
Answer:
The most suitable place to install server is building “RED” because this building have maximum computer which reduce communication delay.
(a) Since the cabling distance between buildings GREEN, BLUE and RED are quite large, so a repeater each, would ideally be need along their path to avoid loss of signals during the course of data flow in there routes.
(b) In the layout a switch each, would be needed in all the buildings, to interconnect the group of cables from the different computers in each building.
(iv) Optical fiber
Question 13:Granuda Consultants are setting up a secured network for their office campus at Faridabad for their day to day office and web based activities. They are planning to have connectivity between 3 building and the head office situated in Kolkata. Answer the questions (i) to (iv) after going through the building positions in the campus and other details, which are given below:
Suggest the most suitable place (i.e., block) to house the server of this organization. Also give a reason to justify your suggested location.
Suggest a cable layout of connections between the buildings inside the campus.
Suggest the placement of the following devices with justification:
Repeater
Switch
The organization is planning to provide a high speed link with its head office situated in the KOLKATA using a wired connection. Which of the following cable will be most suitable for this job?
Optical Fibre
Co-axial Cable
Ethernet Cable
Answer:
The most suitable place to install server is building “JAMUNA” because this building have maximum computer which reduce the communication delay.
Cable layout. (Bus topology).
(a) Since the cabling distance between buildings GANGA and JAMUNA are quite large, so a repeater each, would ideally be needed along their path to avoid loss of signals during the course of data flow in these routes.(b) In the layout a switch each would be needed in all the building, to interco¬nnect the group of cables from the different computers in each building.
Optical fiber
Question 14:India Skills Hub is a skill development community which has an aim to promote the standard of skills in the society. It is planning to set up its training centres in multiple towns and villages Pan India with its head offices in the nearest cities. They have created a model of their network with a city ABC Nagar, a town (UVW town) and 3 villages.As a network consultant, you have to suggest the best network related solutions for their issues/ problems raised in (i) to (iv), keeping in mind the distances between various locations and other given parameters.
Note:– In Villagers, there are community centers, in which one room has been given as training entrer to this organization to install computers.– The organization has got financial support from the government and top Multinational Organizations.
Suggest the most appropriate location of the SERVER in the Cluster (out of the 4 locations), to get the best and effective connectivity. Justify your answer.
Suggest the best wired medium and draw the cable layout (location to location) to efficiently connect various locations within the Cluster.
Which hardware device will you suggest to connect all the computers within each location of
Which service/protocol will be most helpful to conduct live interactions of Expersts from Head Office and peole at all locations of Cluster?
Answer:
Best location for the server is UVW-TOWN, because it is approximately equidistant from the village P, Q and R.
For connectivity between UVW-TOWN to head office is optic Fiber and to connect the villages, P, Q and R with server at UVW- TOWN is co-axial cable.
The villages R Q and R can be connected with server at UVW-TOWN by a Hub and the head office is connected by a Bus topology.
Between head office and UVWTOWNwe recommend for Bus topology, so HTTP protocol and other terminal can be connected by UDP or FTP protocols.
Question 15:Mudra publishing is a group of companies engaged in publishing IT related books located in the hilly area of Shimla. The companies are located in four different, blocks whose layout is shown in the following figure. Answer the questions (i) to (iv) with the relevant justifi-cations.Mudra publishing
Distance between various Blocks :
Block A to Block C is 50 m
Block A to Block D is 100 m
Block B to Block C is 40 m
Block B to Block D is 70 m
Block C to Block D is 125 mNumber of Computers
Block A is 25
Block B is 50
Block C is 20
Block D is 120
Suggest a suitable network topology between the blocks.
Which is the most suitable block to house the server of this organization?
Suggest the placement of the following devices with justification
Repeater
Switch
The organization is planning to link the whole blocks to its marketing Office in Delhi. Since cable connection is not possible from Shimla, suggest a way to connect it with high speed.
Answer:
Suitable topology is bus topology.
The most suitable block for hosting server is BLOCK-D because this block has maximum number of computers.Mudra Publishing
Switch is a device used to segment network into different sub-networks so switch will exist in all the blocks. Since distance between BLOCK-D and BLOCK-C is large so repeater will be install between BLOCK-D and BLOCK-C.
The most economic way to connect it with a reasonable high speed would be the use radiowave transmission, as they are easy to install, can travel long distance and penetrate buildings easily, so they are used for communication, both indoors and outdoors. Radiowaves also have the advantage of being omni-directional. They can travel in all the directions from the source, so that the transmitter and receiver do not have to be carefully aligned physically.
TOPIC-2Network Security and Web ServiceVery Short Answer Type Questions(1 Mark each)
Question 1:Define firewall.Answer:A system designed to prevent unauthorized access to or from a private network is called firewall, it can be implemented in both hardware and software or combination of both.
Question 2:Write any two examples of Server side Scripts.Answer:
ASP
PHP
Question 3:What is the difference between E-mail & chat?Answer:
Chat occurs in near real time, while E-mail doesn’t.
Chat is a 2-way communication which require the permission of both parties, while E-mail is a 1-way communication.
Question 4:Write names of any two popular open source software, which are used as operating systems.Answer:
Kernels
Unix
Linux
Question 5:What is the difference between video conferencing and chat.Answer:In conference, we can include more than one person and it allows text video and audio while chat is one-to-one communication.
Question 6:Expand the following abbreviations :
HTTP
VOIP
Answer:
HTTP-Hyper Text Transfer Protocol.
VOIP-Voice Over Internet Protocol.
Question 7:What is the difference between HTTP and FTP?Answer:Hyper Text Transfer Protocol deals with Transfer of Text and Multimedia content over internet while FTP (File Transfer Protocol) deals with transfer of files over the internet.
Question 8:What out of the following, will you use to have an audio-visual chat with an expert sitting in a far-away place to fix-up a technical issue ?
VoIP
email
FTP
Answer:(i) VoIP 1
Question 9:Name one server side scripting language and one client side scripting language.Answer:Client Side :
JAVASCRIPT
VBSCRIPTServer Side
ASP
JSP
Question 10:Which out of the following comes under cyber crime ?
Operating someone’s internet banking account, without his knowledge.
Stealing a keyboard from someone’s computer.
Working on someone’s Computer with his/ her permission.
Answer:(i) Operating someone’s internet banking account, without his knowledge.
Question 11:Name two proprietary software along with their application.Answer:
MS-Office – All office applications MS-Word, MS-Excel, MS-PowerPoint.
Visual Studio – Visual Basic, Visual C+ +software for application development.
Question 12:Out of the following, identify client side script (s) and server side script (s).
ASP
Javascript
VBScript
JSP
Answer:Server side scripting
ASP
JSPClient side scripting
Javascript
VBscript Vi
Question 13:Compare open source software and proprietary software.Answer:One need an authorized license paid in order to use this proprietary software while open sourcesoftware can be used by anybody and are usually free. One can use this software for their personal use. After giving any notation or code in this type one cannot change the code or modify it.
Question 14:Differentiate between XML and HTML.Answer:
Question 15:What is WEB 2.0 ?Answer:Web2.0 refers to the new generation of web based services and communities characterised by participation, collaboration and sharing of information among users online.
Question 16:Which of the following is/are not a client side script:
VB Script
Java Script
ASP
PHP ?
Answer:(iii) ASP and(iv) PHP are not client side scripts.
Question 17:If someone has hacked your website, to whom you lodge the complaint ?Answer:The complaint has to be lodged with the police under IT Act.
Question 18:What do you mean by IP address? How is it useful in computer security ?Answer:An Internet Protocol (IP) address is a numerical identification and logical address that is assigned to devices connected in a computer network.An IP address is used to uniquely identify devices on the internet and so one can quickly know the location of the system in the network. 1
Question 19:What do you mean by spam mails ? How can you protect your mailbox from spams ?Answer:Spam mails, also known as junk e-mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail.We can protect our mailbox from spams by creating appropriate filters.
Question 20:When do you prefer XML over HTML and why ?Answer:The first benefit of XML is that because you are writing your own markup language, you are not restricted to a limited set of tags defined by proprietary vendors.Rather than waiting for standards bodies to adopt tag set enhancements (a process which can take quite some time), or for browser companies to adopt each other’s standards with XML, you can create your own set of tags at your own place.
Question 21:How does firewall protect our network ?Answer:A firewall is a part of a computer system or network, that is designed to block unauthorized access while permitting authorized communi-cations. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and, other criteria. 1
Question 22:Compare freeware and shareware.Answer:Freeware, the name derived from the words “free” and “software”. It is a computer software that is available for use at no cost or for an optional fee. Freeware is generally proprietary software available at zero price, and is not free software. The author usually restricts one or more rights to copy, distribute, and make derivative works of the software.Shareware is usually offered as a trial version with certain features only available after the license is purchased, or as a full version, but for a trial period. Once the trial period has passed, the program may stop running until a license is purchased. Shareware is often offered without support, updates, or help menus, which only become available with the purchase of a license. The words “free trial” or “trial version” are indicative of shareware.
Question 23:How trojan horses are different from worms? Mention any one difference.Answer:A trojan horse is a term used to describe malware that appears to the user, to perform a desirable function but, in fact, facilitates unauthorized access, to the user’s computer system.A computer worm is a self-replicating computer program. It uses a network to send copies of itself to the other nodes (computers on the network) and it may do so without any user intervention.
Question 24:Give the full form of :
FOSS
HTTP
Answer:
FOSS : Free Open Source Software.
HTTP : Hyper Text Transfer Protocol.
Question 25:What is the difference between trojan horse and virus in terms of computers ?Answer:A trojan, sometimes referred to as a trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system. The term is derived from the trojan horse story in greek mythology.A computer virus is a computer program that can copy itself and infact a computer. A true virus can only spread from one computer to another.The chief difference between a trojan horse and a virus is that a trojan horse does not replicate itself. A virus does. 1
Question 26:Which term we use for a software/hardware device, which is used to block, unauthorized access while permitting authorized communi¬cations. This term is also used for a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.Answer:Firewall.
Question 27:Write the full forms of the following:
GNU
XML
Answer:
GNU stands for “GNU’s Not Unix”
XML stands for “Extensible Markup Language”.
Question 28:Expand the following terminologies:
GSM
WLL (IMP)
Answer:
GSM: Global System for Mobile Communication
WLL: Wireless Local Loop.
Question 29:Name some cyber offences under the IT Act.Answer:
Tampering with computer source documents
Hacking.
Publishing of information which is obscenein electronic form.
Question 30:What are the three ways of protecting intellectual property ?Answer:
Patents
Copyrights
Trademark
Question 31:When a user browses a website, the web server sends a text file to the web browser. What is the name of this?Answer:Cookies.
Short Answer Type Questions
Question 1:Define the following:
Firewall
VoIE
Answer:
Firewall: A system designed to preventunauthorized access to or from a private network is called firewall, it can be implemented in both hardware and software or combination of both.
VoIP: Voice-over-Internet Protocol(VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Question 2:Give the full form of the following terms.
XML
FLOSS
HTTP
FTP
Answer:
XML: Extensible Markup Language.
FLOSS: Free-Libre Open Source Software.
HTTP: Hyper Text Transfer Protocol.
FTP: File Transfer Protocol.
Question 3:Differentiate between WORM and VIRUS in Computer terminology.Answer:VIRUS directly effects the system by corrupting the useful data. A computer virus attaches itself to a program or file enabling it to spread from one computer to another.A WORM is similar to a virus by design is considered to be subclass of a virus. Worm spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. 2
Question 4:Expand the following
GSM
GPRS.
Answer:
GSM: Global System for Mobile Communi-cation.
GPRS: General Packet Radio Service.
Question 5:Expand the following abbreviations :
HTTP
VOIP
Answer:
HTTP: Hyper Text Transfer Protocol.
VOIP: Voice Over Internet Protocol.
Question 6:Give the full form of :
FOSS
HTTP
Answer:
FOSS: Free Open Source Software.
HTTP: Hyper Text Transfer Protocol.
Question 7:Write the full forms of the following :
GNU
XML
Answer:
GNU: GNU’s Not Unix
XML: Xtensible Markup Language.
Question 8:Expand the following terminologies :
GSM
WLL
Answer:
GSM: Global System for Mobile Communi-cation
WLL: Wireless Local Loop.
Question 9:Give the full forms of the following terms :
CDMA
TDMA
FDMA
Answer:
CDMA: Code Division Multiple Access
TDMA: Time Division Multiple Access
FDMA: Frequency Division Multiple Access
Question 10:Expand the following abbreviations :
FTP
TCP
SMTP
VOIP
Answer:
FTP: File Transfer Protocol
TCP: Transmission Control Protocol.
SMTP: Simple Mail Transfer Protocol.
VOIP: Voice Over Internet Protocol
via Blogger https://ift.tt/3bZDUs4
0 notes
Text
How To Set Up Your Computer Workstation
Droian Ergonomic Computer Workstation
The new prime-of-the-line HP Z Workstations can be configured with some drool-inducing specs, which includes 3TB RAM, 48TB storage and dual CPUs. Digital Storm CAD workstations function a vast choice of rapidly and trustworthy SSD storage solutions that will permit content creators to do more in significantly less time. Nonetheless, while this level of efficiency will be noticed across new solution introductions from all the main workstation vendors, what makes HP stand out from the crowd at this moment in time is its revolutionary method to chassis design and style, which looks set to make the servicing of workstations an absolute breeze. He demonstrated the identical intensity and passion for both folks (African Americans and South Africans) as he worked to raise the awareness level about the reality of both struggles. The Application Licensing Service reported that the application ID does not match the application ID for the license.
Your account will be reset to the greater of either USD 100,000 or five times the total equity of the your production account. Our modern day workplace furnishings will reinvent the space that defines your workday and sparks the imagination of you employees and clientele. Discover how the UCLA Extension Architecture + Interior Style plan can support you attain your expert goals by attending our free of charge details session. Moreover, these processors include encryption performance overhead reduction attributes, and technologies improving run time and migration VM integrity. The new workstations incorporate Thunderbolt 3 (optional) and Dual 1GbE Ports (normal) to assistance the higher bandwidth data transfer demanded by existing and future users, as nicely as Microsoft Windows 76 assistance for legacy workflows.
It delivers the graphics performance and high quality demanded by a lot of CAD, media, and entertainment applications. Our classic wood desks function conservative styles and classic finishes. If you are aiming for a sleek, modern day residence functioning space then a light oak office desk would be perfect, but for a much more traditional, formal house workspace then an impressive mahogany desk and matching filing cabinet may possibly effectively be a far better selection. A geometric modeling kernel is a application component that gives strong modeling and surface modeling characteristics to CAD applications. Industrial Personal computer Workstations Safeguard Laptop Equipment and Boost Processes, Boosting General Productivity. A Computer or Laptop will do. The PC’s require to be full with mouse, keyboard and monitor.

The workstations also meet the Energy Star 5. criteria taking impact in July, and select workstation models are rated Gold by the Electronic Solution Environmental Assessment Tool for their environmental attributes. The configuration file for the application contains an invalid tag. VIVED also had applications in laptop science, like a Minority Report-style interactive workspace, referred to as the Virtual Interface Environment Workstation (VIEW), where the user enlisted speech and gestures to interact with devices, objects and data, and could view, reposition and delete files. (46) The Director, Technologies Solutions (DTS) will advise to the University Executive acceptable Pc Workstation Policy to meet the operational needs of the University.
The chair characteristics 3 mounted screens as effectively as space for a tablet or intelligent phone, mouse, keyboard, and a lot more. HP’s ZBook Mobile Workstations are also equipped with a complete security solution, enabling robust remote configurability and manageability of your HP ZBooks, automating data protection, and aid decrease down time for customers and IT due to BIOS attack or corruption, with exclusive HP Certain Commence technologies. Sophisticated Micro Devices continued its year of recovery on Thursday, unveiling a new line of microprocessor chips known as Ryzen Pro aimed at desktop workstations. Full your workspace with workplace furnishings from Sauder. The Z4 is a bit weaker still, housing only a single Intel Xeon W CPU, 256GB of RAM, as effectively as dual 1GbE ports and dual M.2 slots.
Requirements: 1.five GHz or faster 32-bit (x86) or 64-bit (x64) processor, 2GB RAM minimum memory (4GB recommended), Windows 7, 8, 8.1, or 10, disk space of 500 MB minimum plus 30 MB for every single installed app, or 350 MB for each and every installed suite. The newest Z Workstations can be upgraded with thoughts-boggling hardware specs. And if word of on the internet tech help specialists is to be taken, such client-side exploits quite nicely end up making workstations a much more attractive target than ever just before. The new model offers a lot more than 3 instances the graphics overall performance of an HP enterprise-class mini Pc, is 63% quieter even when operating at a heavy load, and has had three times the top quality testing —368,000 hours total. HP’s tagline for Performance Adviser is Focus on your function, not your workstation.” The thought is it make certain your pc is optimized for crucial applications.
The workstation’s eco-conscious design and style provides up to a 92 percent efficient power supply, as nicely as Power Star five.2, 80 Plus Platinum, EPEAT Gold and GREENGUARD certifications. File servers are higher energy processing machines (computers ), employed to handle and monitor the data sharing activities more than a network. The Software program Licensing Service reported that invalid add-on data was found. The cause for this is since unlike Intel which has had years and years of time crushing bugs and perfecting their platform, AMD’s Zen architecture primarily based CPUs (Ryzen) have only been on the marketplace for much less than a year. Glass workplace desks make the workplace appear a lot more spacious. The new HP ZBook x2 supports the HP-created pen primarily based on Wacom EMR technologies.
All our desks, chairs and storage choices can be combined in all sorts of techniques, so you can be certain you are going to uncover a combination that functions for you. We would be pleased to help you temporarily scale up your hardware and software licences. Several of these workplace cubicle setups consist of modular pc desks, modular desk walls, and desktop hutches. Sometimes the CEO would add a note underneath like, See if I can also bring my kids.” We would ask for +3 guests instead of just +1. The requested run level switch can’t be completed effectively given that one particular or far more solutions will not cease or restart inside the specified timeout. Like a second processor and memory riser remedy so customers can speedily and simply double their compute capabilities.
With 360 video and Virtual Reality, Audio 360 also modifications quickly in true-time, as the user appears around either wearing a VR headset or rotates a smartphone exactly where they are viewing the 360 content. Despite the fact that each the customer desktop and the workstation advantage from CPUs created about the multicore concept (basically, numerous processors on a die , the application of which IBM’s POWER4 was a pioneer), modern workstations normally use multiple multicore CPUs, error correcting memory and significantly bigger on-die caches than those located on “customer-level” CPUs. The Broadberry CyberStation Graphics® range has been designed and optimised specifically for top CAD and Style & Manufacturing suites. VMware Workstation is genuinely a program for engineers, designed by engineers when you see its networking attributes.
The Dell Precision T1700 is an entry-level workstation that delivers true workstation performance in two compact sizes for about the value of a desktop Pc. Shop now. AutoCAD is a quite complex design tool that calls for appropriate education and instruction to get the most out of. It does come with an in depth aid guide but these that are new to CAD will discover it quite difficult to use. We use Intel MBs for single socket and Supermicro MBs for dual socket. HP’s most versatile detachable to date, the HP ZBook x2 operates in 4 modes: laptop, detached, docked and tablet. 6. One more option to get low-cost office desks is to acquire utilized workplace desks. The Software Licensing Service determined that the license is invalid. With the falling expenses related with SSDs, we practically constantly recommend utilizing an SSD for the primary drive that will host your OS, AutoCAD itself, and any active projects you are operating on. The high speed of SSDs enables your program to boot, launch applications, and load files several times quicker than any classic difficult drive.
You can commence with a single processor to save expense, but if you don’t see yourself upgrading to a second one particular then you may as properly save oneself a entire lot of money and go with a Core i7 processor. Common workplace workstation styles include a desk, chair, pc and other needed gear. 2 x Xeon E5-2643 v3 or v4 would give me 12 cores with related clock speeds. A single way this machine keeps up with high-finish applications is by supporting dual Nvidia Graphics cards and Nvidia GPU virtualization. This time is decreased with each and every grade level enhance, specially exactly where the students have participated in workstations in prior college years. The Office television show from the UK featuring personnel of Wernham-Hogg operating in a mixture of desks and cubicles.
The CineBench test shows the pure raw CPU processing energy of each workstation, and on this test, the Z420 lags both Lenovo ThinkStations and the HP Z220. Comparable to CPU and RAM, the difficult drive in most laptops can be replaced with an upgrade at a later time. With assistance for two processors, the HP Z820 can operate with up to 24 processing cores, delivering ultimate functionality to assist you accomplish a lot more. The limited quantity of effective and dignified images of African-Americans in the media and the neighborhood as a whole reduces our sense of self-respect. Panel systems allow a business to give their employees with some degree of privacy and quiet with out possessing to pay the significant fees related with giving folks a complete workplace.

1. HP Remote Graphics Computer software needs Windows and an net connection. Scan 3XS Pro Graphics workstations are anxiety-tested for a minimum of 24 hours prior to shipping, making sure they manage what ever workload you throw their way, and are provided with a full 3 year warranty and seven day technical support need to you encounter any troubles. Dual Intel Xeon Bronze, Silver, Gold, or Platinum- up to 28 cores per CPU, up to three your input here.6 Ghz CPU clock. Delivering assistance for up to eight cores of processing energy, the HP Z420 never slows you down. As you could count on, these larger standards mean that workstations are costlier than customer PCs. HP Workstations are the internal desktop regular all through Avid. There are numerous trendy styles presently in office desks.
from KelsusIT.com – Refurbished laptops, desktop computers , servers http://bit.ly/2tUIh2T via IFTTT
0 notes
Text
Free Access Why Python Is the Next Wave in Earth Sciences Computing
So, why all the fuss about Python? Perhaps you have heard about Python from a coworker, heard a reference to this programming language in a presentation at a conference, or followed a link from a page on scientific computing, but wonder what extra benefits the Python language provides given the suite of powerful computational tools the Earth sciences already has. This article will make the case that Python is the next wave in Earth sciences computing for one simple reason: Python enables users to do more and better science. We'll look at features of the language and the benefits of those features. This article will describe how these features provide abilities in scientific computing that are currently less likely to be available with existing tools, and highlight the growing support for Python in the Earth sciences as well as events at the upcoming 2013 AMS Annual Meeting that will cover Python in the Earth sciences.
Python is a modern, interpreted, object-oriented, open-source language used in all kinds of software engineering. Though it has been around for two decades, it exploded into use in the atmospheric sciences just a few years ago after the development community converged upon the standard scientific packages (e.g., array handling) needed for atmospheric sciences work. Python is now a robust integration platform for all kinds of atmospheric sciences work, from data analysis to distributed computing, and graphical user interfaces to geographical information systems. Among its salient features, Python has a concise but natural syntax for both arrays and nonarrays, making programs exceedingly clear and easy to read; as the saying goes, “Python is executable pseudocode.” Also, because the language is interpreted, development is much easier; you do not have to spend extra time manipulating a compiler and linker. In addition, the modern data structures and object-oriented nature of the language makes Python code more robust and less brittle. Finally, Python's open-source pedigree, aided by a large user and developer base in industry as well as the sciences, means that your programs can take advantage of the tens of thousands of Python packages that exist. These include visualization, numerical libraries, interconnection with compiled and other languages, memory caching, Web services, mobile and desktop graphical user interface programming, and others. In many cases, several packages exist in each of the above domain areas. You are not limited to only what one vendor can provide or even what only the scientific community can provide!
A number of other languages have some of Python's features: Fortran 90, for instance, also supports array syntax. Python's unique strengths are the interconnectedness and comprehensiveness of its tool suite and the ease with which one can apply innovations from other communities and disciplines. Consider a typical Earth sciences computing workflow. We want to investigate some phenomena and decide to either analyze data or conduct model experiments. So, we visit a data archive and download the data via a Web request, or we change parameters in the (probably Fortran) source code of a model and run the model. With the dataset or model output file in hand, we write an analysis program, perhaps using IDL or MATLAB, to conduct statistical analyses of the data. Finally, we visualize the data via a line plot or contour plot. In general, we accomplish this workflow using a kludge of tools: shell scripting for Web requests and file management, the Unix tool Make for code and compilation management, compiled languages for modeling, and IDL or MATLAB for data analysis and visualization. Each tool is isolated from every other tool, and communication between tools occurs through files.[Source]-https://journals.ametsoc.org/doi/10.1175/BAMS-D-12-00148.1
Advanced level Python Certification Course with 100% Job Assistance Guarantee Provided. We Have 3 Sessions Per Week And 90 Hours Certified Basic Python Classes In Thane Training Offered By Asterix Solution
0 notes