Recent Post

Monday, December 4, 2023

Unity Job Openings in India: IT Help Desk 2023

 


Job TitleUnity Job Openings in India: IT Help Desk 2023
DescriptionAn IT-related degree or relevant professional experience
Estimated salaryPer hour –
Work LocationPostal code :
Bengaluru
Employment TypeFULL TIME

  • Skill : 
  • Good knowledge of networking and experience with network troubleshooting
  • SaaS administration experience
  • Linux experience

Sunday, December 3, 2023

Types of Authentication

 Types of Authentication



 In cybersecurity, authentication is the process of verifying a user's identity before granting them access to a computer system or network. This is a crucial security measure, as it helps to prevent unauthorized access and protect sensitive data. 


Password-based authentication :


How it works: Users enter a secret combination of letters, numbers, and symbols to gain access. 

✓ Pros: Easy to set up and use, widely available. 

Cons: Weak security, prone to guessing, phishing, and brute-force attacks. 


Pattern-based authentication:

 How it works: Users draw a specific pattern on a touch screen to gain access.

 Pros: Easier to remember than passwords, can be more secure than weak passwords.

 Cons: Still vulnerable to smudge attacks and shoulder surfing, less secure than strong passwords. 


Biometric authentication:


 How it works: Uses physical or behavioral characteristics, such as fingerprints, facial recognition, or voice recognition, to verify identity. 

✓ Pros: Very secure, difficult to forge, convenient. 

Cons: Can be expensive to implement, privacy concerns, not foolproof (e.g., identical twins).


 Token-based authentication :

How it works: Users provide a physical token, such as a security key or a code sent to their phone, to gain access.

Pros: More secure than passwords, good for two-factor authentication. 

Cons: Can be lost or stolen, inconvenient to carry, not widely supported.


 Certificate-based authentication: 


How it works: Uses digital certificates to verify the identity of users, devices, and servers. 

✓ Pros: Very secure, widely used for enterprise applications and VPNs. 

Cons: Can be complex to set up, and requires infrastructure for issuing and managing certificates.


 Location-based authentication:


 How it works: Uses the user's device location to verify their identity. 

✔ Pros: Can be convenient for certain applications, such as mobile banking. 

Cons: Not very secure on its own, easily spoofed, privacy concerns.


Saturday, December 2, 2023

Tata 1mg Python Internship Drive 2023 | Python Job Opportunities





Position – Software Development Engineer -1
Job Role – Engineering
Team – Technology
Location – Gurgaon


What we are looking for:
● Someone with hands-on with any one of these :

     ❖ Python Web Frameworks(Django, Flask, etc.), Ruby on Rails, Nodes or any other programming language .

     ❖ Android/iOS app development.
     ❖ MERN stack.
● Strong foundation in data structures & algorithms.
● Good problem solving skills.
● Knowledge of Non Relational Databases and/or relational databases..
● Knowledge of System design and architecture is a plus.
● Knowledge of service-oriented architectures is a plus.
What will you do:
● Taking ownership of modules development to production.
● Own nonfunctional aspects of the modules.
● Contribute to architecture and tech stack-related tasks.


Sunday, November 19, 2023

*Intel Student Internship | Python3 or Java or C++ Programming is Required

 Intel





Student Intern

 Bengaluru, Karnataka, India

Job ID JR0252467

Job Category Intern/Student

Work Mode Hybrid

Experience Level Intern

Apply

Job Description


Develop software solutions to support factory automation requirements Evaluate new application concepts, Create documentation for and test new software application

Qualifications


Pursuing Bachelor's degree in Computer Science/IT/Electronics Programming experience in C, C++, or Java, PYthon Knowledge of object-oriented programming

Inside this Business Group


As the world's largest chip manufacturer, Intel strives to make every facet of semiconductor manufacturing state-of-the-art -- from semiconductor process development and manufacturing, through yield improvement to packaging, final test and optimization, and world class Supply Chain and facilities support.  Employees in the Technology Development and Manufacturing Group are part of a worldwide network of design, development, manufacturing, and assembly/test facilities, all focused on utilizing the power of Moore’s Law to bring smart, connected devices to every person on Earth.


Posting Statement


All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance.

Benefits


We offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here.


It has come to our notice that some people have received fake job interview letters ostensibly issued by Intel, inviting them to attend interviews in Intel’s offices for various positions and further requiring them to deposit money to be eligible for the interviews. We wish to bring to your notice that these letters are not issued by Intel or any of its authorized representatives. Hiring at Intel is based purely on merit and Intel does not ask or require candidates to deposit any money. We would urge people interested in working for Intel, to apply directly at https://jobs.intel.com/ and not fall prey to unscrupulous elements.


Working Model


This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site.

Sunday, August 13, 2023

Complete the code segment to swap two numbers using call by object reference.


 

Complete the code segment to swap two numbers using call by object reference.


Program:


import java.util.Scanner;

class Question {  //Define a class Question with two elements e1 and e2.

  Scanner sc = new Scanner(System.in);

int e1 = sc.nextInt();  //Read e1

int e2 = sc.nextInt();  //Read e2

}

public class Exercise3_5{

// Define static method swap()to swap the values of e1 and e2 of class Question.

public static void swap(Question t) {

int temp = t.e1;

    t.e1 = t.e2;

    t.e2 = temp;

  }

public static void main(String[] args) {
//Create an object of class Question
Question t = new Question ();
  //Call the method swap()
swap(t);

System.out.println(t.e1+" "+t.e2);    
  }

}


InputOutput
Test Case 1
10 20
20 10

This program to exercise the call of static and non-static methods. A partial code is given defining two methods, namely sum( ) and multiply ( ). You have to call these methods to find the sum and product of two numbers. Complete the code segment as instructed.


 

This program to exercise the call of static and non-static methods. A partial code is given defining two methods, namely sum( ) and multiply ( ). You have to call these methods to find the sum and product of two numbers. Complete the code segment as instructed.



Program :

import java.util.Scanner;

class QuestionScope {

int sum(int a, int b){ //non-static method

        return a + b;

    }

static int multiply(int a, int b){ //static method

        return a * b;

    }

}

public class Exercise3_4{

public static void main( String[] args ) {

        Scanner sc = new Scanner(System.in);

int n1=sc.nextInt();

int n2=sc.nextInt();

QuestionScope st = new QuestionScope(); // Create an object to call non-  

                                                //static method 

      int result1=st.sum(n1,n2); // Call the method

      int result2=QuestionScope.multiply(n1,n2); // Create an object to call 

                                                //static method 

System.out.println(result1);

System.out.print(result2);

}

}



InputOutput
Test Case 1
3 5
8
15

A class Shape is defined with two overloading constructors in it. Another class Test1 is partially defined which inherits the class Shape. The class Test1 should include two overloading constructors as appropriate for some object instantiation shown in main() method. You should define the constructors using the super class constructors. Also, override the method calculate( ) in Test1 to calculate the volume of a Shape.

 



A class Shape is defined with two overloading constructors in it. Another class Test1 is partially defined which inherits the class Shape. The class Test1 should include two overloading constructors as appropriate for some object instantiation shown in main() method. You should define the constructors using the super class constructors. Also, override the method calculate( ) in Test1 to calculate the volume of a Shape.


Program :

import java.util.Scanner;

class Shape{

double length, breadth;

Shape(double l, double b){ //Constructor to initialize a Shape object  

length = l;

breadth= b;

}

Shape(double len){    //Constructor to initialize another Shape object  

length = breadth = len;

}

double calculate(){// To calculate the area of a shape object

return length * breadth ;

}

}

public class Test1 extends Shape{

double height;

Test1(double length,double h) {

//base class constructor with one parameter is called

super(length);

height=h;

}

Test1(double length,double breadth,double h) {

//base class constructor having two argument is called

super(length,breadth);

height=h;

}


double calculate() {

return length*breadth*height;

}

public static void main(String args[]){
Scanner sc = new Scanner(System.in);//Create an object to read                                                               
                                          //input
double l=sc.nextDouble(); //Read length
double b=sc.nextDouble(); //Read breadth
double h=sc.nextDouble(); //Read height
Test1 myshape1 = new Test1(l,h);
Test1 myshape2 = new Test1(l,b,h);
double volume1;
double volume2;
volume1 = myshape1.calculate();
volume2=myshape2.calculate();
System.out.println(volume1);
System.out.println(volume2);
}
}


InputOutput
Test Case 1
2.0 3.0 4.0
16.0
24.0

Define a class Point with two fields x and y each of type double. Also, define a method distance(Point p1, Point p2) to calculate the distance between points p1 and p2 and return the value in double. Complete the code segment given below. Use Math.sqrt( ) to calculate the square root.



 Define a class Point with two fields x and y each of type double. Also, define a method distance(Point p1, Point p2) to calculate the distance between points p1 and p2 and return the value in double.

Complete the code segment given below. Use Math.sqrt( ) to calculate the square root.


Program :


import java.util.Scanner;


public class Circle extends Point{

public static void main(String[] args) {


Scanner sc = new Scanner(System.in);

Point p1=new Point();

p1.x=sc.nextDouble();

p1.y=sc.nextDouble();

Point p2=new Point();

p2.x=sc.nextDouble();

p2.y=sc.nextDouble(); 

Circle c1=new Circle();

c1.distance(p1,p2);

  }


}

class Point{

  double x;

  double y;


public static void distance(Point p1,Point p2){

        double d;

  d=Math.sqrt((p2.x-p1.x)*(p2.x-p1.x) + (p2.y-p1.y)*(p2.y-p1.y));

  System.out.print(d);

  }

}  



InputOutput
Test Case 1
2.0  3.0
1.0  2.0
1.4142135623730951

This program is related to the generation of Fibonacci numbers. For example: 0,1, 1,2, 3,5, 8, 13,… is a Fibonacci sequence where 13 is the 8th Fibonacci number.


 

This program is related to the generation of Fibonacci numbers.


For example: 0,1, 1,2, 3,5, 8, 13,… is a Fibonacci sequence where 13 is the 8th Fibonacci number.


Program :

import java.util.Scanner; //This package for reading input
public class Fibonacci { 

public static void main(String args[]) { 
Scanner sc = new Scanner(System.in);
int n=sc.nextInt(); //Read an integer
System.out.println(fib(n)); //Generate and print the n-th Fibonacci                
                                     //number
    } 
static int fib(int n) {

           if (n==1)      //Terminal condition
            return 0;
        else if(n==2)
            return 1;
return fib(n - 1) + fib(n - 2); //Recursive call of function 
}
}


InputOutput
Test Case 1
8
13


NPTEL » Programming In Java Week-3 Quiz Solution

 


Week 3:Assignment 3


1 point
 
 
 
 
1 point
 
 
 
 
1 point
 
 
 
 
1 point
 
 
 
 
1 point
 
 
 
 
1 point
 
 
 
 
1 point
 
 
 
 
1 point
 
 
 
 
1 point
 
 
 
 
1 point
 
 
 
 

Write a Program to find the sum of all even numbers from 1 to N where the value of N is taken as input. [For example when N is 10 then the sum is 2+4+6+8+10 = 30]


 

Write a Program to find the sum of all even numbers from 1 to N where the value of N is taken as input. [For example when N is 10 then the sum is 2+4+6+8+10 = 30]


Program :

#include <stdio.h>  

void main()

{

int N, sum=0; 

scanf("%d", &N);

int i;

for (i = 1; i <= N; i++)

{

if (i % 2 == 0)

sum = sum + i;

}

printf("Sum = %d", sum);

}



InputOutput
Test Case 1
10
Sum = 30
Test Case 2
15
Sum = 56