Professional Documents
Culture Documents
(1 &2)Write an algorithm and flowchart for programmable problems Example for Reference: • Add/subtract two numbers •
Find the largest/smallest of 3 numbers • Calculate and print sum of 'N' numbers
Algorithm:
step 1: Start
Step 2: Declare variables num1, num2 and sum.
Step 3: Read values for num1, num2.
Step 4: Add num1 and num2 and assign the result to a variable sum.
Step 5: Display sum
Step 6: Stop
Flowchart:
Algorithm :
o Step 1 : Start
o Start 2 : Input A, B, C
o Start 3 : Let max = A
o Start 4 : if B > max then max = B
o Start 5 : if C > max then max = C
o Start 6 : Output max is largest
o Start 7 : Stop
Flowchart :
3.Calculate and print sum of 'N' numbers
Algorithm:
Step 1 : Start
Step 2 : Assign sum=0 and i=0
Step 3 : Read limit of number , n
Step 4 : Repeat steps 5 to 6 until i=n reached
Step 5 : Compute sum=sum+i
Step 6 : Compute i=i+1
Step 7 : Print sum
Step 8 : Stop
Flowchart :
Refer https://scratch.mit.edu/
5. Design and create webpage for displaying your poem (Title, header, paragraph, formatting tags)
<html>
<head>
<title>Simple poem</title>
</head>
<body>
<h1 align=”center”>the fat cat</h1>
<p align=”left”>
<i> I had a cat </i></br>
<i> who was soft </i></br>
<i> he could not even </i></br>
<i> sit on a mat </i></br></p>
</body>
</html>
6.Design and create webpage for your wish list (What you want to do). Also list challenges and opportunities
along with images to present your dreams (List ordered and unordered, Image, table\
//pgm6.html
<html>
<head>
7. Design and create webpage using HTML and CSS about an awesome animal (Use necessary CSS tags)
//pgm7.html
<html>
<head>
<link rel="stylesheet" type="text/css" href="1.css">
</head>
<body>
<h1> Awesome Animal</h1>
<img src="Koala.jpg" />
description about any animal you like
</body>
</html>
//1.css
body
{
background-color:pink;
}
h1
{
color:maroon;
font-size:50px;
}
img {
border-radius: 50%;
float:right;
height:170px;
width:170px;
margin-right:15px
}
8. Design and create web page for a travel book/recipe book with more than 3 pages, table to list
places/recipes (iframe, hyperlink)
//receipe.html
<html>
<head>
<title>Project: Recipe book</title>
</head>
<body>
<h1>GOBI MANCHRIAN</h1>
<li><a href="gobi.html"><img src="gobi.jpg"/ width="50%" height="25%" /></br></a></li>
<h1>HAKKA NODDLES</h1>
<li><a href="hakka noddles.html"><img src="hakkanoddles.jpeg" width="50%" height="25%" </a></li>
</ol>
</body>
</html>
//parta,html
<h2 ><U>PARATA</h2>
<ul>
<li>Time: _</li>
<li>Serves: _</li>
</ul>
<h3>Ingredients quantity</h3>
<p><strong>Step 1:</strong>firstly, in a large kadai heat 4 tsp oil and saute 2 clove garlic,1 inch ginger
and 1 green chilli on high flame.
also, saute ¼ onion and 2 tbsp spring onion on high flame.
further add ½ capsicum and continue to saute till they slightly change colour.
additionally add 2 tbsp tomato sauce, 1 tsp chilli sauce, 2 tsp vinegar, 2 tsp soy sauce, ¼ tsp pepper and ¼ tsp salt.
mix well and saute for a minute.
add cornflour slurry.
give a good mix until the gravy slightly thickens and turns translucent.
</p></br>
<a href="hakka noddles.html">next reciepe</a></em></br>
<a href="recipe.html">home page</a></em>
//hakkanoddles.html
<h2 ><u>HAKKA NODDLES</h2>
<ul>
<li>Time: 9:00_</li>
<li>Serves: 9:15</li>
</ul>
<h3>Ingredients quantity</h3>
<p><strong>Step 1:</strong>firstly, in a large kadai heat 4 tsp oil and saute 2 clove garlic,1 inch ginger and 1
green chilli on high flame.also, saute ¼ onion and 2 tbsp spring onion on high flame.
further add ½ capsicum and continue to saute till they slightly change colour.
additionally add 2 tbsp tomato sauce, 1 tsp chilli sauce, 2 tsp vinegar, 2 tsp soy sauce, ¼ tsp pepper and ¼ tsp salt.
mix well and saute for a minute.
add cornflour slurry.
give a good mix until the gravy slightly thickens and turns translucent.
</p></br>
<a href="gobi.html">next receipe</a></em></br>
<a href="recipe.html">home page</a></em>
//gobi.html
<h2 ><U>GOBI MANCHURAIAN</h2>
<ul>
<li>Time: _</li>
<li>Serves: _</li>
</ul>
<h3>Ingredients quantity</h3>
<p><strong>Step 1:</strong>firstly, in a large kadai heat 4 tsp oil and saute 2 clove garlic,1 inch ginger and
1 green chilli on high flame.
also, saute ¼ onion and 2 tbsp spring onion on high flame.
further add ½ capsicum and continue to saute till they slightly change colour.
additionally add 2 tbsp tomato sauce, 1 tsp chilli sauce, 2 tsp vinegar, 2 tsp soy sauce, ¼ tsp pepper and ¼ tsp salt.
mix well and saute for a minute.add cornflour slurry.give a good mix until the gravy slightly thickens and turns
translucent.</p></br>
<a href="parta.html">next receipe</a><em></br>
<a href="recipe.html">home page</a></em>
9. Design and create web page with JavaScript to design a simple calculator to perform the following
operations: sum, product, difference and quotient
//pgm9.html
<html>
<head>
<script>
//function that display value
function dis(val)
{
document.getElementById("result").value+=val
}
11. Design and create web page about advantages of business process automation with respect to your
branch of engineering
//pgm11.html
<html>
<head>
<title>buisness process automation</title>
</head>
<body>
<h2 style="text-align:center;"><U>advantages of buisness process automation</u></h2>
<h3>Computer science</h3>
<ul>
<li>
Transportation: From self-driving cars to driverless trains and subways being developed in certain countries,
Drivers for Lyft and Uber, as well as those who deliver for apps like Postmates, </li>.
<li>Healthcare: Automation advancements in healthcare have helped increase the quality of patient care and
interactions. Some healthcare automation examples include automatic medication refill reminders or using an AI
app to screen initial symptoms before making an appointment with a healthcare provider.</li>.
<li>Online marketing: Automation processes are behind the algorithms that make purchase suggestions for you
when you sign into an online account or after making a transaction. Automation can also help marketers run
messaging testing to see which marketing campaign resonates more with consumers</li>.
<li>Reporting: Almost every business relies on reporting of some kind. From stock and inventory to sales and lead
conversions, reporting is essential to a successful business, </li>.
<li>Customer service: Telephone prompts were the beginning to customer service automation and as more people
found themselves typing instead of calling, the next logical move was to automate online chat to help provide
customer service in a medium that customers preferred. </li>
</ul>
</body>
</html>
12.Create a workflow for education loan approval in bank/diploma admission process (Use any tool)
13. Demonstrate ERP with ERPNext Demo for manufacturing, retail and service sector (Use any other ERP
erp and erp next on retail
ERPstands for Enterprise Resource Planning and refers to software and systems used to plan and manage all the
core supply chain, manufacturing, services,
ERPNext is a generic ERP software used by manufacturers, distributors and services companies. It includes
modules like accounting, CRM, sales, purchasing, website, e-commerce, point of sale, manufacturing, warehouse,
project management, inventory, and services. Also, it has domain specific modules like schools, healthcare,
agriculture, and non-profit.[4]
1.Each customer has their own process, control mechanism. Most of these are defined more than 20 years ago and
still they follow it.
2. Each one has their own workflow and approval process?—?for example
Some wants to create a Sales Order, Check with Finance whether they received money or not? After receipt then
confirm SO and release to production.
.3. The workflow has to be flexible as each one can have their own status comments and with their own
“wordings” to track and control the process .
4. How to integrate the same with ERP and make sure it too understands these comments is illustrated in the
below website
https://erpnext.com/open-source-sales-purchase
14.Create user account and demonstrate use of Google drive, Google docs ,Google Co-lab (Usage of Jupyter
Notebook)
Google drive
Access and sync your content from any device
1.Backup and Sync
Back up all of your content to the cloud – easily access your files in Google Drive and your photos in Google
Photos
2.Drive for desktop
Access all of your Google Drive content directly from your Mac or PC, without using up disk space
Google docs
Google Docs is Google's browser-based word processor. You can create, edit, and share documents online and
access them from any computer with an internet connection.
Google Co-lab
Colab notebooks allow you to combine executable code and rich text in a single document, along with images,
HTML, LaTeX and more.
Usage of Jupyter
Jupyter is a free, open-source, interactive web tool known as a computational notebook, which researchers
can use to combine software code, computational output, explanatory text and multimedia resources in a single
document.
15.Demonstrate Internet of Things using with examples a. Smart home b. Smart city c. Smart farming .
1.Smart Farming
It can be structured in seven application areas:
Livestock monitoring
Indoor farming: greenhouses and stables
Fish farming
Forestry
2. Smart home
The more information you share online, the easier it’s going to be for someone to get their hands on it.
Don’t cooperate.
Take a look at your social media profiles and keep them barren—the people who need to know your birth
date, email address and phone number already have them. And what exactly is the point of sharing
everything about yourself in your Facebook profile? If you care about your privacy, you won’t do it.
2. Be choosy about sharing your social security number—even the last 4 digits.
Think twice about sharing your social security number with anyone, unless it’s your bank, a credit bureau, a
company that wants to do a background check on you or some other entity that has to report to the IRS. If
someone gets their hands on it and has information such your birth date and address they can steal your
identity and take out credit cards and pile up other debt in your name.
Set up your PC to require a password when it wakes from sleep or boots up. Sure, you may trust the people
who live in your house, but what if your laptop is stolen or you lose it?
If you don’t want anyone with physical access to your computer to see where you’re hanging out online you
should enable “private browsing,” a setting available in each major web browser. It deletes cookies,
temporary Internet files and browsing history after you close the window.
5. Use a password vault that generates and remembers strong and unique passwords.
Most people know better than to use the same password for more than one website or application. In reality,
it can be impossible to remember a different one for the dozens of online services you use. The problem
with using the same password in more than one place is if someone gets their hands on your password—say,
through a phishing attack—they can access all your accounts and cause all sorts of trouble.
You can lock down your Facebook, Google, Dropbox, Apple ID, Microsoft, Twitter and other accounts with
two-factor authentication. That means that when you log in, you’ll also need to enter a special code that the
site texts to your phone. Some services require it each time you log in, other just when you’re using a new
device or web browser. The Electronic Frontier Foundation has a great overview of what’s available.
This is a simple way to keep an eye on anything someone might be saying about you on the web. It’s just a
matter of telling Google what to look for (in this case, your name), as well as what kinds of web pages to
search, how often to search and what email address the search engine giant should use to send you
notifications. Set up a Google alert here.
According to Business Insider, credit card companies are selling your purchase data to advertisers. Don’t
want companies knowing how much booze you’re buying or other potentially embarrassing habits? Buy
things the old fashioned way—with coins and bills.
9. Keep your social network activity private.
Check your Facebook settings and make sure only friends can see what you’re doing. Go to the settings cog
in the upper right hand corner of your screen, then click on Privacy Settings >> Who can see my stuff.
10. Don’t give our your zip code when making credit card purchases.
Often stores will ask for your zip code when you’re checking out with a credit card. Don’t give it to them
unless you want to donate your details to their marketing database, warns Forbes. By matching your name,
taken from your credit card, with your zip code, companies can more easily mine more information,
including your address, phone number and email. address.
“What is your mother’s maiden name?” or “In what city were you born?” are common questions websites
often ask you to answer so as to supposedly keep your account safe from intruders. In reality, there’s
nothing secure about such generic queries. That’s because someone who wants access to your account could
easily do some Internet research to dig up the answers.
19.Demonstration of common security threats (using videos) a. Phishing b. DoS attack c. Man in the middle
attack d. Spamming e. Virus
1. Phishing attacks are the practice of sending fraudulent communications that appear to come from a
reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login
information, or to install malware on the victim's machine.
Example:
Phishing Email
Fake Websites. ...
CEO Fraud. ...
Content Injection. ...
Session Hijacking. ...
Malware.
2.A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to
its intended users
buffer overflow attacks – the most common DoS attack. ...
ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every
computer on the targeted network, instead of just one specific machine. ...
SYN flood – sends a request to connect to a server, but never completes the handshake.
3.A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. ...
For example, a fake banking website may be used to capture financial login information. The fake site is “in
the middle” between the user and the actual bank website
4.Spamming attacks are defined as an organized and unauthorized use of an app to send thousands of messages to
their users. These messages are sent by fake or hacked profiles, and often include unreal advertisements and links to
which real users are asked to click onWhen you send a million people an email to try to make money online by
selling them a worthless product, this is an example of a time when you spam. Spam is a brand of canned ham, or
mass marketing junk emails sent out to millions of recipients without their request.
5. computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and
performs malicious actions. ... It can self-replicate, inserting itself onto other programs or files, infecting them in the
process.