Skip to content
  • 0 Votes
    5 Posts
    279 Views
    zareenZ

    Spring 2020_PHY301_1_SOL.pdf

  • 0 Votes
    2 Posts
    777 Views
    zaasmiZ

    @zaasmi said in CS409 Assignment 1 Solution and Discussion:

    Question# 01:
    Scenario
    In today’s era of intelligence and mobility where every thing is shifted on mobile like mobile commerce, and mobile computing. Suppose you are working as DBA in a multinational company which works on mobile system and your company decided to change the database structure to embedded database, and as a DBA you suggest your company to used SQLite. State the reasons by which you will convince your company seniors to use SQL Lite?

    Solution:
    SQLite is file based and embeddable relational database management system. As it is lite and due to its support to relational database management system it is best to use in mobile applications. So, SQLite is very appropriate to construct an embedded database system. It is light database, and it is direct file system engine that uses SQL syntax, also doesn’t require a special database server or anything.
    Similarly, SQLite can easily adjust with the requirements of embedded system as it has small core, open source and database is a file which is very easy to apprehend the copy, move and cross platform sharing of database files. Now a days, SQLite use is increasing in embedded systems due to its advantages. SQLite will be more widely used in the embedded field, such as the remote control, intelligent mobile terminal, information appliances control, home medical equipment, mobile devices etc. In a multiplatform architecture SQLite having wide scope.

    Question # 02: Write any ten situations in which using SQLite will give best results?

    Solution:

    Embedded devices or applications Replacement for ad hoc disk files Stand-in for an enterprise database during testing or demos Multi-user applications Data analysis Application file format Server-side database Data transfer format Cache for enterprise data Internal or temporary database Websites File archive/ data container Education and Training Experimental SQL language extensions
  • 0 Votes
    4 Posts
    287 Views
    Dua ZahraD

    plz send me mth302 asaaignment

  • 0 Votes
    3 Posts
    177 Views
    H

    Develop a program that calculates Loan in C++. Your program should satisfy the following requirement:
    User Input:
    1 User is asked to enter name.
    2 User is asked to enter number of dependent with range (0-5).
    3 User is asked to enter status i.e. (Permanent or Probation).
    4 User is asked to enter Salary.
    5 User is asked to enter Duration at Job (in years):
    o <1
    o 1-2
    o 2-4
    o 4-7
    o >7
    6 User is asked how much loan is required.

    Criteria:
     Loan can be given if and only if a person is on Permanent job for more than 1 years.
     Minimum salary from which a loan can be given is 35,000 per month for a person having no
    dependent. Minimum salary requirement increases by 20,000 per dependent.
     If years of services is from 1 to 2 years, then max loan amount can be up to 6 salaries.
     If years of services is from 2 to 4 years, then max loan amount can be up to 8 salaries.
     If years of services is from 4 to 7 years, then max loan amount can be up to 10 salaries.
     If years of services is from 7 to 10 years, then max loan amount can be up to 12 salaries.
     If years of services is more than 10 years, then max loan amount can be up to 24 salaries.
     Add 13% interest on the approved loan amount. This amount will be payable within 8 years’
    time i.e. 96 months.
     If the money to lend is more than the lend amount, then calculate the difference and show it
    properly.
     For unsuccessful Loan Application: Show Message: “CUSTOMER NAME, your lend
    application has not been successful this time”.
     For Successful Loan Application: Show Message: “Congratulations CUSTOMER NAME, your
    lend application is successful this time. Your monthly installment will be ______ Amount
    Payable for 96 months”.

  • 0 Votes
    3 Posts
    3k Views
    cyberianC

    Q1. Show that the following pairs of regular expressions define the same language over the alphabet

    L = {p, q}.

    (i) (pq)p and p(qp)
    (ii) (p* + q)* and (p + q)*
    (iii) (p* + q*)* and (p + q)*
    [15 marks = 5*3]

    Solution:
    (i) (pq)p and p(qp) represents same language.
    Both will never generate pp’s and both are starting and ending with p

    (ii) (p* +q)* (p+q)*
    (p*)+ q p* + q*
    p* + q* p* + q*
    Both are all strings possible in L = {p,q}

    (iii) (p* +q*)* (p+q)*
    (p*)* + (q*)*
    p* + q*
    (p + q)* Language with all strings

    Q2. Write a regular expression for the following language over the alphabet L = {x, y} such that it accepts all strings in which the letter y is never tripled. This means that no word contains the substring yyy. [5 marks]

    Solution:

    The required R.E will be
    (˄ + y + yy) (x + xy + xyy)*

  • 0 Votes
    2 Posts
    666 Views
    cyberianC

    Task: You have to write the HTML code to show the output as following screenshot. You have to write your own VU Id, Name; Father Name should be in text boxes. All the values in the table should be center aligned.

    <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Document</title> </head> <body> <center> <!-- <center> --> <p align="right" ><img src="logo.png" alt=""></p> <!-- <img align="right" src="logo.png" alt=""> --> <form action="#" method="post"> <p >VU ID: <input type="text" name="vid" id="vid" value ="BC123456"> <span style="color: red;" >* BC123456</span> </p> <p>Name: <input type="text" name="sname" id="sname" value ="Aamir Latif"><span style="color: red;" >* Aamir Latif</span></p> <p>Father Name: <input type="text" name="fname" id="fname" value ="Muhammad Latif" ><span style="color: red;" >* Muhammad Latif</span></p> <table border="1" width="30%"> <tr> <th>Semester</th> <th>Degree</th> <th>Subject</th> <th>Grade</th> </tr> <tr style="text-align:center" > <td>Spring 2020</td> <td>BSCS</td> <td>IT430</td> <td>A</td> </tr> </table> </form> </center> </body> </html>

    logo.png

  • 0 Votes
    3 Posts
    741 Views
    zaasmiZ

    @moaaz said in CS603 Assignment No. 1 Solution and Discussion:

    Questions No 02 Marks (5)
    Consider a scenario where we have to perform some operations on the basis of the number. If the number
    is odd, perform the following operations:

    Add 5 to the number
    Multiply it by 5
    Display the number
    If the number is even, then perform the following operations:
    Add 7 to the number
    Multiply it by 7
    Display the number
    At the end add 20 to the number regardless if it is even or odd. According to the above scenario, the activity diagram is given below:

    Redraw the above diagram by using Decision and Merge nodes.

    Solution:
    2a595f28-2f8e-49a3-9df5-8fb27e42a024-image.png

  • 0 Votes
    4 Posts
    207 Views
    zaasmiZ

    @zareen said in CS603 Assignment No. 2 Solution and Discussion:

    Draw an ACTIVITY diagram for the above scenario.

    Steps to develop Activity Diagrams
    The steps below outline the major steps to take in creating a UML Activity Diagram.

    Finding system Actors, Classes and use cases Identifying key scenarios of system use cases Combining the scenarios to produce comprehensive workflows described using activity diagrams Where significant object behavior is triggered by a workflow, adding object flows to the diagrams Where workflows cross technology boundaries, using swimlanes to map the activities Refining complicated high level activities similarly, nested activity diagrams
  • 0 Votes
    2 Posts
    178 Views
    zaasmiZ

    @zaasmi said in CS441 Assignment 1 Solution and Discussion:

    Re: CS441 Assignment 1 Solution and Discussion

    Assignment No. 1
    Semester: Spring 2020
    CS441 – Big Data Concepts
    Total Marks: 20
    Due Date: 01/06/2020
    Lectures covered:
    Week 1 to week 3

    Instructions
    Please read the following instructions carefully before submitting assignment:
    It should be clear that your assignment will not get any credit if:

    o Assignment is submitted after due date.
    o Submitted assignment does not open or file is corrupt.
    o Assignment is copied (From internet/students).

    Software allowed to develop Assignment

    Python editor

    Objectives:
    To enable students to write, execute a program in Python. Moreover to familiarize students with the concepts of:
    • Variables and operators
    • Conditional statements
    • Loop structures

    Assignment Submission Instructions
    You have to submit only.py file on the Assignments interface of CS441 on VULMS. Assignment submitted in any other format will not be accepted and will be graded zero marks.

    Assignment

    Write a program in Pyton programming language, which allows the user to input an integer value for a variable named upperLimit. Based on the input value, the program should perform the following tasks:

    • Check whether the value entered by the user falls within the range from 1 to 100. (1 and 100 included in the given range.)
    • Calculate and display the sum of all numbers within the range (1 to upperLimit).
    • Calculate and display the average of all numbers within the range (1 to upperLimit).
    • Calculate and display the total number of numbers within the range (1 to upperLimit).

    Sample output for the wrong input:
    0dc57223-3af8-49ca-a7ce-e95a5d2ec81f-image.png

    Sample output for the wrong input:

    ad04a7df-09b6-41d8-8ad8-d1c79cba3c0d-image.png

    Sample output for the correct input:

    cbc6325a-a282-467b-a7dc-01cb8fe23173-image.png

    Deadline:
    The deadline to submit your assignment solution is 01/06/2020. Your assignment must be submitted within the due date through VULMS. No assignment will be accepted through email after the due date.

    Solution Code:

    start=1 sum=0.0 average=0.0 count=0 print("Enter the upper Limit:") upperLimit=input() if upperLimit<=1: print("Wrong input!! Upper Limit should not be less than 1") elif upperLimit>100: print("Wrong input!! Upper Limit should not be greter than 100") else: print for num in range(start, upperLimit+1): sum=sum+num count=count+1 print("Sum of all numbers within the range:") print(sum) print average= sum/count print("Average of all the numbers within the range:") print(average) print print("Total number of numbers within the range:") print(count)
  • 0 Votes
    2 Posts
    166 Views
    zaasmiZ

    @zaasmi said in BT403 GDB 1 Solution and Discussion:

    Discuss which plant transformation method works best for plant transformation and why?

    This natural ability to alter the plant’s genetic makeup was the foundation of plant transformation using Agrobacterium. Currently, Agrobacterium-mediated transformation is the most commonly used method for plant genetic engineering because of relatively high efficiency.

    4c87b525-f2e7-4708-893c-ec3ea55ae249-image.png
    Source:

  • 0 Votes
    2 Posts
    179 Views
    Easha DollE

    @zaasmi said in BT101 GDB 1 Solution and Discussion:

    Similarities and differences between “camouflage and Mimicry”.

    Camouflage is the ability of animals to blend with the environment using the coloration and patterns while mimicry is the ability of organisms to resemble another organism. This is the main difference between camouflage and mimicry. Both camouflage and mimicry help in the protection or predation.

  • 0 Votes
    2 Posts
    108 Views
    zaasmiZ

    @zaasmi said in BT604 GDB 1 Solution and Discussion:

    What is Fermentation? What are the Key factors relating to improve the economic efficiency of Fermentation process?

    The third situation is when the substrate is available in solid form, such as is the case with many organic residues, and it is economically advantageous to use it in this form rather than processing it for use in SLF. There are three main considerations here. First, additional costs are usually incurred in preprocessing the solid material into a form that is suitable for use in a liquid medium. Preprocessing for an SSF process is simpler, as it typically requires only a simple grinding to produce particles of an appropriate size. Second, the capital investment required for SLF bioreactors is higher than that required for SSF bioreactors. Third, large amounts of water need to be added in order to prepare a medium for a traditional SLF process. After the fermentation, the product is recovered from the fermentation broth and the spent broth then needs to be treated before disposal or recycling. Water additions are minimized in SSF and downstream processing is less costly. The ideal situation is when the fermented solid material can be used directly in the application for which it is intended, without the need for prior extraction of the product. One example of this is the production of fermented solids that contain enzymes. After a simple air drying to facilitate storage, these fermented solids can be added directly to an aqueous or organic reaction medium, to catalyze hydrolysis or synthesis reactions, respectively. In fact, SSF is a highly promising technology for application in biorefineries for processing plant biomass; in these biorefineries, many inputs and intermediates are in solid form and can be processed into value-added products using SSF.

  • 0 Votes
    2 Posts
    679 Views
    zaasmiZ

    @cyberian said in EDU516 Assignment 1 Solution and Discussion:

    write down in detail at least four major problems that teacher face during teaching english???

    Disturbed Environment of the Class:

    Environment matter most in learning and teaching the English language. Mostly the English teachers faced the environmental problem in teaching the English language.

    The disturbing environment of the classroom distracts the teachers and affect the teaching of the English language.

    A suitable and comfortable environment is the basic need of teaching the English language.

    If the environment is not suitable and comfortable for the teachers then it ruins all the teaching and learning process of the English language.

    A positive and comfortable learning environment is very essential for teaching the English language.

    Mostly the teachers faced such kind of disturbing environment in teaching the English language.

    Limited Teaching Resources:

    Not only the English language, Teaching anything mostly depends on the resources.

    Mostly the teachers faced this kind of problem, the resources which are essential for delivering the lectures of the English language to the students for effective learning are not provided to them.

    It became very difficult for the teachers to teach without the resources essential for the lectures.

    The resources include the speakers, mike, projectors, computer system and other kinds of digital devices.

    It makes the overall lecture and environment interesting and effective for the students and helps them in learning the English language.

    A Large Number of Students in the Classroom:

    A large number of students in the classroom produce a lot of disturbance and stress for the teachers because teaching a large number of students the teachers have to do more effort and hardworking.
    The problems caused by a large number of students are given below:

    Disturbed the teacher by making noises.
    Difficult to manage the class students.
    Engaging crowded students in learning is very difficult.
    The learning resources are not available for all the students.
    These are some problems that arise in a crowded class.

    Wrong Syllabus to be Teach:

    The syllabus is a kind of content that the teachers follow what to teach to the students. Syllabus plays a very important role in teaching the English language and also in other subjects.

    Syllabus helps the teachers to prepare the important factors of the course and organized the overall course to teach to the students step by step.

    Mostly the teachers faced this problem in teaching the English language. The wrong syllabus is given to them to teach the students the English language.

    The teachers teach the wrong syllabus will make negative impressions on the students, and by this, the students cannot learn and speak the English language.

    Limited Time for Lecture to Teach:

    Time is the most important thing in learning the English language. It takes time for the teachers to observe their students and teach them at their level. The time of the class is very less for the teachers to teach the English language.

    This one of the most difficult tasks for the teachers to teach in less time.

    This is probably not possible for the teachers to complete the topics of their lectures in less time, which is not enough.

    Students Hijack Lessons:

    Students hijack the lessons. Mostly the students are not interested in learning the English language. They hijack the lessons and do other kinds of activities and the English learning process defeated.

    The English language teachers always count the students because he cannot go further in the course if the students are missing.

    Students Disturbed the Class:

    Sometimes the students get bored and try to do other activities during the lectures which disturbed the teachers during teaching the English language.

    They try to speak to the other students during the lectures which disturbed the teachers a lot.

    Some students come late for the lecture. They enter in the class during the lecture it disturbed the teacher.

    The disturbance is the biggest problem mostly the teachers faced in teaching the English language. It defeated all the learning process of learning the English language.

    Using Other Languages in the Classrooms:

    Speaking other languages or speaking in the native language is the most noticeable issue faced by English teachers.

    For the students, it’s very easy to speak in their native language or other languages which they can speak easily instead of the English language.

    It’s very frustrating for the students trying to speak the language and think the words and sentences to speak which they didn’t know.

    It’s very easy for them to communicate in their native language or the language they already have experience with.

    This is the most common and big problem faced by the English teachers in teaching the English language to the students in which the English language is not their native language.

    Student Depends on a Teacher:

    Another noticeable problem faced by the teachers is the students completely depend on the teachers. They didn’t try to learn and speak themselves.
    Those students every time look to the teachers for helping them in learning and giving them the correct answers.

    They didn’t try to make words and correct sentences in speaking the English language.

    By this problem, the students didn’t learn the technical terms and conditions of how using different kinds of tenses and words of the English language in speaking.

    Students Bored and not Interested in Learning English Language:

    Students getting bored and not interest in learning the English language is also a problem faced by teachers.

    Sometimes the students are not interested in learning and attending the lectures of the English language. Then they try to do other activities.

    Sometimes They disturbed the teachers by talking to the others and doing other non-sense activities during the lecture.

    Difficult to Managed the Class:

    In the English learning academies, it can be found that mostly the students in the English classes belong to different backgrounds.

    Mostly the students in English learning classes belong to the rural areas. Where there is no scope of learning the English language. it’s very difficult for them to learn the English language.

    Mostly they are unable to learn the English language. Some of them have the capabilities of learning the English language.

    Then it becomes very difficult for the teachers to manage the class and keep all the class going in the same way.

    Source Link

  • 0 Votes
    5 Posts
    260 Views
    zaasmiZ

    @zaasmi said in CS204 Assignment 2 Solution and Discussion:

    Suppose that if you’ve ever tried to login to your online bank account and find that not all of your savings are being accounted for, it could be an indication that you’ve been targeted by cyber criminal. Although there are several ways that cyber criminals could have gotten your account data, there’s a fair chance you’ve accidentally come across a phishing website in the past, misinterpreting the login page of your online bank. Enlist all possible security measures to protect your online banking account from cyber criminals.

    Respond as if the network has already been breached. Adopting this mindset forces the IT team to prioritize the most business-critical parts of the network and use network segmentation as a strategy. When done correctly, network segmentation, achieved through the creation of network zones, limits the ability for a hacker to move laterally across a compromised network. Network segmentation requires continual updates and configurations, but it can mean the difference between a hacker getting only as far as an employee’s infected computer and helping themselves to the bank’s ATM systems. Implement an enterprise-wide security policy. A well-defined security policy serves as a crucial road map for any bank IT team to maintain a truly adaptive security architecture. It’s what helps the people tasked with protecting the bank’s systems determine the best way for the network to operate with minimal risk. Additionally, the security policy should take into consideration all regulatory and enterprise compliance requirements and how to apply timely patches to maintain compliance. Security policy enforcement. It’s one thing to have a security policy that defines how the IT platform behaves and another to actually validate that it is being enforced across your network. Doing the former but not the latter might allow you to comply with some regulations, but it won’t make your network safer. Organizations must constantly monitor their network for changes to configurations and ensure that these changes are approved and compliant with policy. It’s a collaborative effort across the enterprise—network operations, security operations, and the CIO.
  • 0 Votes
    3 Posts
    144 Views
    zaasmiZ
    #include<iostream> using namespace std; class Question { private : int QuestionID; string QuestionType; int QuestionMarks; public : Question() { cout<<"Enter Question ID : "; cin>>QuestionID; cout<<"Enter Question Type : "; cin>>QuestionType; cout<<"Enter Question Marks : "; cin>>QuestionMarks; } void setQueID(int id) { QuestionID=id; } void setQueType(string type) { QuestionType=type; } void setQueMarks(int marks) { QuestionMarks=marks; } int getQueID() const { return QuestionID; } string getQueType() const { return QuestionType; } int getQueMarks() const { return QuestionMarks; } }; class Exam { private : string ExamType; string CourseCode; static const int NoOfQuestions=2; Question *questions[NoOfQuestions]; public : Exam(string EType, string CCode) { ExamType=EType; CourseCode=CCode; for(int i=0; i<NoOfQuestions; i++) { cout<<"\n***** Enter Data of Question No. "<<i+1<<" *****\n"; questions[i] = new Question(); } } void DisplayInfo() { cout<<"----------------------------\n"; cout<<"**** Displaying Exam Information ****"; cout<<"\n----------------------------"; cout<<"\nExam Type : "<<ExamType; cout<<"\nCourse Code : "<<CourseCode; cout<<"\nTotal No of Questions for Exam : "<<NoOfQuestions; cout<<"\n----------------------------\n"; cout<<"**** Displaying Question Information ****"; cout<<"\n----------------------------"; for(int i=0; i<NoOfQuestions; i++) { cout<<"\nQuestion No. : "<<i+1; cout<<"\nQuestion Id : "<<questions[i]->getQueID(); cout<<"\nQuestion Type : "<<questions[i]->getQueType(); cout<<"\nQuestion Marks : "<<questions[i]->getQueMarks(); cout<<"\n----------------------------"; } } }; main() { cout<<"\n\t\tCS304 Assignment No. 2 Solution \n"; cout<<"\nPlease Subscribe Cyberian Youtube Channel to get Solutions of all Programming Assignments\n\n"; string type, code; cout<<"Enter Exam Type : "; getline(cin, type); cout<<"Enter Course Code : "; getline(cin, code); Exam exm1(type,code); exm1.DisplayInfo(); }
  • 0 Votes
    3 Posts
    868 Views
    zaasmiZ

    @moaaz said in CS204 Assignment 1 Solution and Discussion:

    Question. 2 Marks 10
    Mr. “Omar” is an HR coordinator at XYZ University. He receives an E-mail containing a message that, “Your University’s E-mail account password will be expired within 24 hours” from some fake E-mail account pretending to be the legitimate E-mail from University. Mr. “Omar” is redirected to a fake password renewal page i.e.“xyzcuniversity.edurenewal.com” where both new and existing passwords are requested. The cyber attacker is monitoring the page and hacks the original password to gain access.
    Keeping in view the above scenario, answer the following questions:

    Mention the cyber-crime name, which is occurring in the scenario.
    Mention the category of cyber-crime.
    Mention all possible prevention measures for such type of cyber-crimes.

    Solution:

    Phishing Attack , Data theft or Email Spoofing Cyber-Crime against property

    Prevention Measures
    • Learn to Identify Suspected Phishing Emails
    • Check the Source of Information from Incoming Mail
    • Do not click on hyperlinks or links attached in the email, as it might direct you to a fraudulent website.
    • Type in the URL directly into your browser or use bookmarks / favorites if you want to go faster.
    • Enhance the Security of Your Computer
    • Update on your operating system and web browsers.
    • Enter Your Sensitive Data in Secure Websites Only
    • The best way to prevent phishing is to consistently reject any email or news that asks you to provide confidential data.
    • Delete these emails and ask your university to clarify any doubts.
    • Check Back Frequently to Read About the Evolution of Malware