Professional Documents
Culture Documents
Pieas Interview
Pieas Interview
1. Introduce yourself?
2. Drawing graph given the equation?
Here, The y intercept give as the point on y axis where graph will pass through. Run and rise tell
us every time we move 1 unit to right then we have to go down 2 units.
Given the standard from of equation, You have to find the x and y intercept,
For finding x intercept simply put zero in place of y and similarly find the y intercept once you find
both of them simply connect them.
For quadratic equation, you have to find the vertex (The point of parabola starting) which can be
easily found using the point
x = -b/2a
Once you find vertex you can find value for neighboring points.
Basically, as this is not a quadratic equation standard form we can not find the vertex directly,
Instead we need to first complete the square and transform it into the form
C tells horizontal/phase shift and D tells the vertical shift. In above image P is the period.
Rules remain same for both sin and cos just the design change for each graph respectively.
While access times of fast hard disks are typically from 5 to 10 milliseconds, solid state drive (SSD)
access times are in the 25 to 100 microsecond range.
3. Machine Learning
Multiprogramming computer operating systems use queues in almost all its main components,
including memory and process management.
Clock speed is one measure of computer "power," but it is not always directly proportional to the
performance level. If you double the speed of the clock, leaving all other hardware unchanged,
you will not necessarily double the processing speed. The type of microprocessor, the bus
architecture, and the nature of the instruction set all make a difference. In some applications, the
amount of random access memory (RAM) is important, too. Some processors execute only one
instruction per clock pulse. More advanced processors can perform more than one instruction
per clock pulse. The latter type of processor will work faster at a given clock speed than the
former type. Similarly, a computer with a 32-bit bus will work faster at a given clock speed than a
computer with a 16-bit bus. For these reasons, there is no simplistic, universal relation among
clock speed, "bus speed," and millions of instructions per second (MIPS).
In above length, we are using run length encoding. Here, instead of telling that there will be
seven red color what we do is add another byte representing run length for yellow instead of
repeating yellow seven time. Here, we may need to add additional data but this is worth it. Here,
we didn't lose any data we can get exact original representation back this is known as loss less
compression.
In lossy compression, we discard some data in order to compress the data. For example for
audio file there will be some frequency which human can not hear so we will discard them.
Similarly image compression some times also used lossy compression. It effects the quality
depend upon how much compression you have done.
While data mining is simply looking for patterns that already exist in the data, machine
learning goes beyond what’s happened in the past to predict future outcomes based on the
pre-existing data.
In data mining, the ‘rules’ or patterns are unknown at the start of the process. Whereas, with
machine learning, the machine is usually given some rules or variables to understand the
data and learn.
Data mining is a more manual process that relies on human intervention and decision
making. But, with machine learning, once the initial rules are in place, the process of
extracting information and ‘learning’ and refining is automatic, and takes place without
human intervention. In other words, the machine becomes more intelligent by itself.
Data mining is used on an existing dataset (like a data warehouse) to find patterns. Machine
learning, on the other hand, is trained on a ‘training’ data set, which teaches the computer
how to make sense of data, and then to make predictions about new data sets.
We send a bit stream along with an extra bit also known as parity bit which tells us the number
of 1's in the stream of bits.
1. Even
In even the value for parity bit depends upon the number of 1's in bit of stream if they are odd
than we will make even by adding parity bit as 1. if they are even then we will simply put parity bit
as 0.
2. Odd
In time domain we need to find the time variations of amplitude but in frequency domain we
need to find the response of the system as a function of frequency
With cloud servers, you can optimize IT performance without the huge costs associated with
purchasing and managing fully dedicated infrastructure. Businesses with variable demands and
workloads often find that cloud servers are an ideal fit.
Dedicated Servers
A dedicated server is a physical server that is purchased or rented entirely for your own business
needs. Dedicated servers are typically used by large businesses and organizations that require
exceptionally high levels of data security, or organizations that have steady, high demands for
server capacity.
With dedicated servers, businesses still need the IT capacity and expertise to manage ongoing
maintenance, patches and upgrades. Businesses using I/O-heavy applications, such as databases
and big data platforms, find significant value in bare metal dedicated hardware.
There will be no error. But if you try to print the value of that pointer that will result in
segmentation fault.
Although intrusion detection systems monitor networks for potentially malicious activity, they are
also disposed to false alarms. Hence, organizations need to fine-tune their IDS products when
they first install them. It means properly setting up the intrusion detection systems to recognize
what normal traffic on the network looks like as compared to malicious activity.
Intrusion prevention systems also monitor network packets inbound the system to check the
malicious activities involved in it and at once sends the warning notifications.
Network intrusion detection systems (NIDS) are set up at a planned point within the network
to examine traffic from all devices on the network. It performs an observation of passing
traffic on the entire subnet and matches the traffic that is passed on the subnets to the
collection of known attacks. Once an attack is identified or abnormal behavior is observed,
the alert can be sent to the administrator. An example of an NIDS is installing it on the
subnet where firewalls are located in order to see if someone is trying crack the firewall.
2. Host Intrusion Detection System (HIDS):
Host intrusion detection systems (HIDS) run on independent hosts or devices on the
network. A HIDS monitors the incoming and outgoing packets from the device only and will
alert the administrator if suspicious or malicious activity is detected. It takes a snapshot of
existing system files and compares it with the previous snapshot. If the analytical system files
were edited or deleted, an alert is sent to the administrator to investigate. An example of
HIDS usage can be seen on mission critical machines, which are not expected to change their
layout.
3. Protocol-based Intrusion Detection System (PIDS):
Protocol-based intrusion detection system (PIDS) comprises of a system or agent that would
consistently resides at the front end of a server, controlling and interpreting the protocol
between a user/device and the server. It is trying to secure the web server by regularly
monitoring the HTTPS protocol stream and accept the related HTTP protocol. As HTTPS is un-
encrypted and before instantly entering its web presentation layer then this system would
need to reside in this interface, between to use the HTTPS.
4. Application Protocol-based Intrusion Detection System (APIDS):
Hybrid intrusion detection system is made by the combination of two or more approaches of
the intrusion detection system. In the hybrid intrusion detection system, host agent or
system data is combined with network information to develop a complete view of the
network system. Hybrid intrusion detection system is more effective in comparison to the
other intrusion detection system. Prelude is an example of Hybrid IDS.
Signature-based IDS detects the attacks on the basis of the specific patterns such as number
of bytes or number of 1’s or number of 0’s in the network traffic. It also detects on the basis
of the already known malicious instruction sequence that is used by the malware. The
detected patterns in the IDS are known as signatures.
Signature-based IDS can easily detect the attacks whose pattern (signature) already exists in
system but it is quite difficult to detect the new malware attacks as their pattern (signature)
is not known.
2. Anomaly-based Method:
Anomaly-based IDS was introduced to detect the unknown malware attacks as new malware
are developed rapidly. In anomaly-based IDS there is use of machine learning to create a
trustful activity model and anything coming is compared with that model and it is declared
suspicious if it is not found in model. Machine learning based method has a better
generalized property in comparison to signature-based IDS as these models can be trained
according to the applications and hardware configurations.
IDS and firewall both are related to the network security but an IDS differs from a firewall as a
firewall looks outwardly for intrusions in order to stop them from happening. Firewalls restrict
access between networks to prevent intrusion and if an attack is from inside the network it don’t
signal. An IDS describes a suspected intrusion once it has happened and then signals an alarm.
DDOS is similar to DOS but the traffic/packet send to the target come from multiple sources.
The lifetime* of a variable or function is the time duration for which memory is allocated to store it,
and when that memory is released. It also referred as *extent of a variable.
a is actually containing the base address value of array. In more specifically, We can say that a[] is
equal to a* that are pointer.
const int a = 2;
A natural logarithm can be referred to as the power to which the base ‘e’ that has to be raised to
obtain a number called its log number. Here e is the exponential function. It was initially
discovered in the 17th century by John Napier, who discovered and conceptualized the theory of
logarithms. Before looking into the key difference between ln and log, let’s understand the
definition of log and ln.
Primary
Gulf of Oman
inflows
Basin Iran, Iraq, Kuwait, Saudi Arabia, Qatar, Bahrain, United Arab Emirates and
countries Oman (exclave of Musandam)
Maldives, in full Republic of Maldives, also called Maldive Islands, independent island country
in the north-central Indian Ocean.