Sunday, July 14, 2024
Sunday, June 30, 2024
Monday, December 4, 2023
Unity Job Openings in India: IT Help Desk 2023
Job Title | Unity Job Openings in India: IT Help Desk 2023 |
---|---|
Description | An IT-related degree or relevant professional experience |
Estimated salary | Per hour – |
Work Location | Postal code : Bengaluru |
Employment Type | FULL TIME |
- Skill :
- Good knowledge of networking and experience with network troubleshooting
- SaaS administration experience
- Linux experience
Sunday, December 3, 2023
Types of Authentication
Types of Authentication
In cybersecurity, authentication is the process of verifying a user's identity before granting them access to a computer system or network. This is a crucial security measure, as it helps to prevent unauthorized access and protect sensitive data.
Password-based authentication :
How it works: Users enter a secret combination of letters, numbers, and symbols to gain access.
✓ Pros: Easy to set up and use, widely available.
Cons: Weak security, prone to guessing, phishing, and brute-force attacks.
Pattern-based authentication:
How it works: Users draw a specific pattern on a touch screen to gain access.
Pros: Easier to remember than passwords, can be more secure than weak passwords.
Cons: Still vulnerable to smudge attacks and shoulder surfing, less secure than strong passwords.
Biometric authentication:
How it works: Uses physical or behavioral characteristics, such as fingerprints, facial recognition, or voice recognition, to verify identity.
✓ Pros: Very secure, difficult to forge, convenient.
Cons: Can be expensive to implement, privacy concerns, not foolproof (e.g., identical twins).
Token-based authentication :
How it works: Users provide a physical token, such as a security key or a code sent to their phone, to gain access.
Pros: More secure than passwords, good for two-factor authentication.
Cons: Can be lost or stolen, inconvenient to carry, not widely supported.
Certificate-based authentication:
How it works: Uses digital certificates to verify the identity of users, devices, and servers.
✓ Pros: Very secure, widely used for enterprise applications and VPNs.
Cons: Can be complex to set up, and requires infrastructure for issuing and managing certificates.
Location-based authentication:
How it works: Uses the user's device location to verify their identity.
✔ Pros: Can be convenient for certain applications, such as mobile banking.
Cons: Not very secure on its own, easily spoofed, privacy concerns.
Saturday, December 2, 2023
Tata 1mg Python Internship Drive 2023 | Python Job Opportunities
❖ Python Web Frameworks(Django, Flask, etc.), Ruby on Rails, Nodes or any other programming language .
Sunday, November 19, 2023
*Intel Student Internship | Python3 or Java or C++ Programming is Required
Intel
Student Intern
Bengaluru, Karnataka, India
Job ID JR0252467
Job Category Intern/Student
Work Mode Hybrid
Experience Level Intern
Job Description
Develop software solutions to support factory automation requirements Evaluate new application concepts, Create documentation for and test new software application
Qualifications
Pursuing Bachelor's degree in Computer Science/IT/Electronics Programming experience in C, C++, or Java, PYthon Knowledge of object-oriented programming
Inside this Business Group
As the world's largest chip manufacturer, Intel strives to make every facet of semiconductor manufacturing state-of-the-art -- from semiconductor process development and manufacturing, through yield improvement to packaging, final test and optimization, and world class Supply Chain and facilities support. Employees in the Technology Development and Manufacturing Group are part of a worldwide network of design, development, manufacturing, and assembly/test facilities, all focused on utilizing the power of Moore’s Law to bring smart, connected devices to every person on Earth.
Posting Statement
All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance.
Benefits
We offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here.
It has come to our notice that some people have received fake job interview letters ostensibly issued by Intel, inviting them to attend interviews in Intel’s offices for various positions and further requiring them to deposit money to be eligible for the interviews. We wish to bring to your notice that these letters are not issued by Intel or any of its authorized representatives. Hiring at Intel is based purely on merit and Intel does not ask or require candidates to deposit any money. We would urge people interested in working for Intel, to apply directly at https://jobs.intel.com/ and not fall prey to unscrupulous elements.
Working Model
This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site.
Sunday, August 13, 2023
Complete the code segment to swap two numbers using call by object reference.
Complete the code segment to swap two numbers using call by object reference.
Program:
import java.util.Scanner;
class Question { //Define a class Question with two elements e1 and e2.
Scanner sc = new Scanner(System.in);
int e1 = sc.nextInt(); //Read e1
int e2 = sc.nextInt(); //Read e2
}
public class Exercise3_5{
// Define static method swap()to swap the values of e1 and e2 of class Question.
public static void swap(Question t) {
int temp = t.e1;
t.e1 = t.e2;
t.e2 = temp;
}
Input | Output | |
Test Case 1 | 10 20 | 20 10 |
This program to exercise the call of static and non-static methods. A partial code is given defining two methods, namely sum( ) and multiply ( ). You have to call these methods to find the sum and product of two numbers. Complete the code segment as instructed.
This program to exercise the call of static and non-static methods. A partial code is given defining two methods, namely sum( ) and multiply ( ). You have to call these methods to find the sum and product of two numbers. Complete the code segment as instructed.
Program :
import java.util.Scanner;
class QuestionScope {
int sum(int a, int b){ //non-static method
return a + b;
}
static int multiply(int a, int b){ //static method
return a * b;
}
}
public class Exercise3_4{
public static void main( String[] args ) {
Scanner sc = new Scanner(System.in);
int n1=sc.nextInt();
int n2=sc.nextInt();
QuestionScope st = new QuestionScope(); // Create an object to call non-
//static method
int result1=st.sum(n1,n2); // Call the method
int result2=QuestionScope.multiply(n1,n2); // Create an object to call
//static method
System.out.println(result1);
System.out.print(result2);
}
}
Input | Output | |
Test Case 1 | 3 5 | 8 15 |
A class Shape is defined with two overloading constructors in it. Another class Test1 is partially defined which inherits the class Shape. The class Test1 should include two overloading constructors as appropriate for some object instantiation shown in main() method. You should define the constructors using the super class constructors. Also, override the method calculate( ) in Test1 to calculate the volume of a Shape.
A class Shape is defined with two overloading constructors in it. Another class Test1 is partially defined which inherits the class Shape. The class Test1 should include two overloading constructors as appropriate for some object instantiation shown in main() method. You should define the constructors using the super class constructors. Also, override the method calculate( ) in Test1 to calculate the volume of a Shape.
Program :
import java.util.Scanner;
class Shape{
double length, breadth;
Shape(double l, double b){ //Constructor to initialize a Shape object
length = l;
breadth= b;
}
Shape(double len){ //Constructor to initialize another Shape object
length = breadth = len;
}
double calculate(){// To calculate the area of a shape object
return length * breadth ;
}
}
public class Test1 extends Shape{
double height;
Test1(double length,double h) {
//base class constructor with one parameter is called
super(length);
height=h;
}
Test1(double length,double breadth,double h) {
//base class constructor having two argument is called
super(length,breadth);
height=h;
}
double calculate() {
return length*breadth*height;
}
Input | Output | |
Test Case 1 | 2.0 3.0 4.0 | 16.0 24.0 |
Define a class Point with two fields x and y each of type double. Also, define a method distance(Point p1, Point p2) to calculate the distance between points p1 and p2 and return the value in double. Complete the code segment given below. Use Math.sqrt( ) to calculate the square root.
Define a class Point with two fields x and y each of type double. Also, define a method distance(Point p1, Point p2) to calculate the distance between points p1 and p2 and return the value in double.
Complete the code segment given below. Use Math.sqrt( ) to calculate the square root.
Program :
import java.util.Scanner;
public class Circle extends Point{
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
Point p1=new Point();
p1.x=sc.nextDouble();
p1.y=sc.nextDouble();
Point p2=new Point();
p2.x=sc.nextDouble();
p2.y=sc.nextDouble();
Circle c1=new Circle();
c1.distance(p1,p2);
}
}
class Point{
double x;
double y;
public static void distance(Point p1,Point p2){
double d;
d=Math.sqrt((p2.x-p1.x)*(p2.x-p1.x) + (p2.y-p1.y)*(p2.y-p1.y));
System.out.print(d);
}
}
Input | Output | |
Test Case 1 | 2.0 3.0 1.0 2.0 | 1.4142135623730951 |
This program is related to the generation of Fibonacci numbers. For example: 0,1, 1,2, 3,5, 8, 13,… is a Fibonacci sequence where 13 is the 8th Fibonacci number.
This program is related to the generation of Fibonacci numbers.
Input | Output | |
Test Case 1 | 8 | 13 |
NPTEL » Programming In Java Week-3 Quiz Solution
Week 3:Assignment 3
Write a Program to find the sum of all even numbers from 1 to N where the value of N is taken as input. [For example when N is 10 then the sum is 2+4+6+8+10 = 30]
Write a Program to find the sum of all even numbers from 1 to N where the value of N is taken as input. [For example when N is 10 then the sum is 2+4+6+8+10 = 30]
Program :
#include <stdio.h>
void main()
{
int N, sum=0;
scanf("%d", &N);
int i;
for (i = 1; i <= N; i++)
{
if (i % 2 == 0)
sum = sum + i;
}
printf("Sum = %d", sum);
}
Input | Output | |
Test Case 1 | 10 | Sum = 30 |
Test Case 2 | 15 | Sum = 56 |