Welcome to CseNotes12.in

CseNotes12 official Website help for Computer Science Student. This is a Website about Providing Engineering Notes,PPTs ,Question Papers,Codes ,Projects, Hand Written Notes ,Books ,PDF,MCQs Questions,It is strictly According to the syllabus of Lovely Professional University .It is for all students who are studying B.Tech and for others also college students .Computer Science Notes are available here on this site.Csenotes12 .This is Best Computer Science Website :) .


Pev 107 examily mcq

Mcq:

Click Me

CSE{ CHE 110 } Environment Studies PPT's

What is Environmental Science?


Environmental science is the study of the effects of natural and unnatural processes, and of interactions of the physical components of the planet on the environment.

Environmental studies is a multidisciplinary academic field which systematicallystudies human interaction with the environment in the interests of solving complex problems. ... It is a broad field of study that includes the natural environment, the built environment, and the sets of relationships between them.


•Government's decision to allot forest trees to a sports goods company.
•The local residents in Gopeshwar were denied the similar demand of getting few trees, required for making farm tools.
•Mr. Chandi Prasad Bhatt of ‘Dasoli Gram Swarajya Sangh’(DGSS) wanted to establish small industries using forest resources, with an aim to provide job opportunities to local youth and check migration.

Type of Pollution

•Air Pollution
•Water Pollution
•Soil Pollution
•Noise Pollution
•Radiation Pollution


PPT's ,BOOK,CA Questions Link:Click here






Cyber Security(INT 242) root@csenotes12:~#

CYBER SECURITY  ( INT-> 242):  

root@csenotes12:~# git clone csenotes12.in/notes

 




Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.


What is cybersecurity all about?

A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. A unified threat management system can automate integrations across select Cisco Security products and accelerate key security operations functions: detection, investigation, and remediation.

People

Users must understand and comply with basic data security principles like choosing strong passwords, being wary of attachments in email, and backing up data. Learn more about basic cybersecurity principles.

Processes

Organizations must have a framework for how they deal with both attempted and successful cyber attacks. One well-respected framework can guide you. It explains how you can identify attacks, protect systems, detect and respond to threats, and recover from successful attacks. Watch a video explanation of the NIST cybersecurity framework .

Technology

Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber attacks. Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud. Common technology used to protect these entities include next-generation firewalls, DNS filtering, malware protection, antivirus software, and email security solutions.

Why is cybersecurity important?

In today’s connected world, everyone benefits from advanced cyberdefense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.
Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open source tools. Their work makes the Internet safer for everyone.


Unit 1 PPT : ->CSENOTES12       
Unit 2 PPT : ->CSENOTES12 
Unit 3 PPT : ->CSENOTES12
Unit 4 PPT : ->CSENOTES12
Unit 5 PPT : ->CSENOTES12
Unit 6 PPT : ->CSENOTES12

Programs of Server -Client , Network Scanning & others : ->CSENOTES12

For BOOK Reference :CSENotes12

MCQ'S ETHICS

 INDUSTRY ETHICS AND LEGAL ISSUES  :


Ethics : Definition of ethics, Importance of integrity, Ethics in business world, improving corporate ethics, Creating an ethical work environment, Ethical decision making, Ethics in information technology, Ethical behavior of IT professional, Common ethical issues for IT users, Supporting the ethical practices of IT users
Companies : The Companies Act and its amendments, Introduction to IT and ITES industry (Product based, Services based), Introduction to NASSCOM, STPI, Overview on latest IT projects with global impact, Case study of an IT industry (Product based and Services based), Recent technology advancement, Current affairs related with the IT industry.
Ethics is a set of belief about right and wrong behaviour.
Answer the question
• What does it mean for an individual to act in
an ethical manner? What does it mean for an
organization to act ethically?
• How should an organization balance its
resources between pursuing its primary
mission for existence and striving to meet
social responsibility goals?
• What is difference between moral, ethics and
law ?

 

Mcqs'Link

CSE 322 OAS {CA} Automata mcq

CA Practice Mcq:

FINITE AUTOMATA : The Equivalence of Deterministic and Non-deterministic Finite Automata, Definition and Description of a Finite Automaton, Deterministic and Non-deterministic Finite State Machines, Acceptability of a String by a Finite Automaton, Mealy and Moore Machines, Minimization of Finite Automata, Basics of Strings and Alphabets, Transition Graph and Properties of Transition Functions, Regular Languages
REGULAR EXPRESSIONS AND REGULAR SETS : Regular Expressions and Identities for Regular Expressions, Finite Automata and Regular Expressions: Transition System Containing null moves, NDFA with null moves and Regular Expressions, Conversion of Non-deterministic Systems to Deterministic Systems, Algebraic Methods using Arden's Theorem, Construction of Finite Automata Equivalent to a Regular Expression, Equivalence of Two Finite Automata and Two Regular Expressions, Closure Properties of Regular Sets, Pumping Lemma for Regular Sets and its Application, Equivalence between regular languages: Construction of Finite Automata Equivalent to a Regular Expression, Properties of Regular Languages, Non-deterministic Finite Automata with Null Moves and Regular Expressions, Myhill-Nerode Theorem


FOR OAS CA DOWNLOAD CLICK->    CSENOTES12


FOR PDF DOWNLOAD CLICK->    CSENOTES12


Unit 1 MCQs
Download


For Solutions :clickme

CSE:332 INDUSTRY ETHICS AND LEGAL ISSUES

CSE:332 <<For CA 3 Mcqs  scroll Down>>

 (INDUSTRY ETHICS AND LEGAL ISSUES)

Ethics : Definition of ethics, Importance of integrity, Ethics in business world, improving corporate ethics, Creating an ethical work environment, Ethical decision making, Ethics in information technology, Ethical behavior of IT professional, Common ethical issues for IT users, Supporting the ethical practices of IT users

Companies : The Companies Act and its amendments, Introduction to IT and ITES industry (Product based, Services based), Introduction to NASSCOM, STPI, Overview on latest IT projects with global impact, Case study of an IT industry (Product based and Services based), Recent technology advancement, Current affairs related with the IT industry

Government Funding and schemes for Startup : what are Startups, Startup India benefits, Resources, bank loan for start up business, Start-up India, 10000 startups -A NASSCOM Initiative, Export promotion schemes: Software Technology Parks (STPs), Special Economic Zones (SEZ) Scheme, Laws for Startups

Startup in IT : Planning of startup business in IT sector-Executive summary, General company Description, Products and services, Marketing plan, Operational plan, Management and organization, Personal Financial Statement, Startup Expenses and Capitalization, Financial Plan, Appendices, Refining the Plan, Examples of Successful Start-ups

Legal, Ethical and Professional issues in Information Security : Introduction, Law and Ethics in Information Security, Organizational Liability and the Need for Counsel, Policy Versus Law, Cyber Crime, Cyber-crime on the rise, Cyber law of India, Need for cyber law in India

Intellectual Properties : Concept of Intellectual Property, Copyrights, Trademarks, Different kinds of marks (brand names, logos, signatures, symbols, well known marks, certification marks and service marks), Patents, Importance of Patent Information in Business Development

For Download BOOK click ->     CSENOTES12

For Download PPT click     ->    CSENOTES12

For  CA's MCQS   (1,2,3)     ->     CSENOTES12

CSE322 Formal Languages and Automation Theory

CSE 322 

 

Text Book
Theory of Computer Science: Automata, Languages and Computation
Author: KLP Mishra and N. Chandrasekaran

 

The course contents

 

    UNIT 1 - Finite automata

                                  UNIT 2 - Regular expressions and regular sets

                                         UNIT 3 - Formal languages and regular grammars

                                             UNIT 4 - Context- free languages and simplification   of context-free grammar

                          UNIT 5 - Pushdown automata and parsing

                           UNIT 6 - Turing machines and complexity



PPT UNIT FOR 1 TO 6 ALL:CSENOTES12


















Answer Key Quantitative and Logical Aptitude Analytical Skills 1 – PEA305




Quantitative and Logical Aptitude
Analytical Skills 1 – PEA305 



Answer Key of Unit 1:

NUMBER SYSTEM :
Natural Numbers
The counting numbers are commonly called
natural numbers.
For example Natural Number, N = {1, 2, 3 ...}
● All natural numbers are positive.
● The smallest natural number is 1.
● Zero (0) is not a natural number.
Whole Numbers
All the natural numbers including Zero are
called Whole Numbers. It is also known as
non-negative integers.
For example Whole Numbers, W = {0, 1, 2, 3
...}.
Integers
Whole numbers as well as negative numbers
form the set of integers. It can be classified
into two types,
(i) Positive integers  {1, 2, 3...}
(ii) Negative integers  {– 1, – 2, – 3...}
(iii) Zero i

FACTORS or DIVISORS:

In order to find the factors of a number
Nidentify the prime factors and their
respective powers thereof and rewrite the
number where a, band c are the prime factors
and x, y and z are their respective powers as
N=a x * b y * c z
Number of factors = (x+1)(y+1)(z+1)
Remainder theorem
The basic remainder theorem formula is:
Dividend = Divisor* Quotient + Remainder
If remainder = 0, then the number is divisible
by the divisor and divisor is a factor of the
number.
For example when 8 divides 40, the
remainder is 0 and it can be said that 8 is a
factor of 40.
Cyclicity of Remainders:
Cyclicity is the property of remainders, due to
which the remainders start repeating after a
certain point.
Euler’s theorem
Euler’s theorem states that for any co prime
numbers
P and Q,
P φ(n)
R( Q ) = 1. Where φ (n) is Euler’s totient.
It is applicable only for co-prime numbers.
Euler’s totient
φ (n) = n x (1 - 1/P 1 ) x (1 - 1/P 2 ) x (1 -
1/P 3 ) x....
Fermat’s theorem
a p−1
Remainder of p = 1, which is Fermat’s little
theorem,where p is a prime number and a
and p are co primes.

PEV 107 Workbook with Answer key

PEV 107 WORKBOOK:


For Workbook download:Click Here 

 For Answer Key: Click me :) 

Chapters:

1. Sentence Correction                     2.Voice & Accent Stress & Intonation

3.Narration  & Email writing            4.Essay Writing &Reading Comprehension

5.Cover Letter &Active Passive         6.Critical Reasoning

 

Pea 305 Workbook ANALYTICAL SKILLS-I

PEA-305 WORKBOOK:


NUMBER SYSTEM
Natural Numbers

The counting numbers are commonly called natural numbers. For example Natural Number, N = {1, 2, 3 …} ● All natural numbers are positive. ● The smallest natural number is 1.   ● Zero (0) is not a natural number.

Whole Numbers

All the natural numbers including Zero are called Whole Numbers. It is also known as non-negative integers. For example Whole Numbers, W = {0, 1, 2, 3 …}.

Integers

Whole numbers as well as negative numbers form the set of integers. It can be classified into two types, (i) Positive integers  {1, 2, 3…} (ii) Negative integers  {– 1, – 2, – 3…} (iii) Zero is neither a positive nor a negative integer.

Even Numbers

All the counting numbers which are divisible by 2 are called even numbers. For example 2, 4, 6, 8, 10…2n ● Unit place of an Even number is 0, 2, 4, 6, or 8.

Odd Numbers

The numbers which are not divisible by 2 are called odd numbers. For Example 1, 3, 5, 7, 9, 11 … (2n-1). ● Unit place of an odd number is 1, 3, 5, 7,or 9. Odd * Odd = Odd Even * Even = Even Odd * Even = Even

For download:Click Here