Posts

Showing posts from February, 2021

Graphic design python turtle 🐢

from turtle import * import colorsys bgcolor('black') pensize(0) tracer(50) h=0 for i in range(300): c=colorsys.hsv_to_rgb(h,1,1) h+=0.9 color(c) forward(300) left(100) fd(i) goto(0,0) down() rt(90) begin_fill() circle(0) end_fill() rt(10) for j in range(5): rt(30) done() Please follow my blog and subscribe my channel for more videos and newly updates 👍👍👍👍👍 import turtle as t import colorsys t.bgcolor('black') t.tracer(100) h=0.4 def draw(ang,n): t.circle(5+n,60) t.left(ang) t.circle(5+n,60) for i in range(200): c=colorsys.hsv_to_rgb(h,1,1) h+=0.005 t.color(c) t.pensize(2) draw(90,i*2) draw(120,i*2.5) draw()

Hypothesis function and testing in Machine Learning

 Hypothesis function and testing: - Hypothesis testing is a statistical method that is used in making statistical decision using experimental data. Hypothesis Testing is basically an assumption that we make about the population parameter. Ex : you say avg student in class is 40 or a boy is taller than girls. All those example we assume need some statistic way to prove those. we need some mathematical conclusion what ever we are assuming is true. Hypothesis testing is an essential procedure in statistics. A hypothesis test evaluates two mutually exclusive statements about a population to determine which statement is best supported by the sample data. When we say that a finding is statistically significant, it's thanks to a hypothesis test. The process of hypothesis testing is to draw inferences or some conclusion about the overall population or data by conducting some statistical tests on a For drawing some inferences, we have to make some assumptions that lead to two terms that ar

Scope and Limitation of Machine Learning

 Scope :- Increase in Data Generation:- Due to excessive production of data, need a method that can be used to structure, analyze and draw useful insight from data. This is where machine learning comes in. It uses data to solve problems and find solution the most complex tasks faced by organizations. Improve Decision Making :- By making use of Various algorithms, Machine Learning can be used to make better business decisions. For example, Machine Learning is used to forecast sales, predict downfalls in the stock market, identify risks and anomalies, etc. Uncover patterns & trends in data:- Finding hidden patterns and extracting key insight from data is the most essential part of machine learning. by building predictive models and using statistical techniques, machine learning allows you to dig beneath the surface and explore the data at a minute scale. Understanding data and extracting patterns manually will take days, whereas machine learning algorithms can perform such computati

What is model ? Explain in detail about the life cycle process.

 Model :- A model is a representational abstraction containing a set of logical and quantitative relationships between the members of a set of variables or primitives. An important reason behind constructing a model is that it helps to manage the complexity in a problem and facilitates arriving at good solutions and at the same time helps to reduce the design costs. A model helps to understand the problem easily. Life cycle process: - A life cycle model specifies the different activities that need to be performed to develop a software product and the sequencing of these activities. The software life cycle is also sometimes called as the systems development life cycle (SDLC). Basically, the classical waterfall model is the basic life cycle customer. This is called product conception. Starting with his stage it undergoes transformation through a series of identifiable stages until it is fully developed and released to the customer. After release, the product is used by the customer and

booting, spooling and Buffering

Booting Process : - Whenever a computer system is "cold started", say, after being powered or following a system crash, at least a portion of the operating system must be brought into main memory and given control of the processor. This activity is known as system booting or bootstrapping of an operating system. Typically, the hardware initially transfers control to a known address where a starting routine in ROM is placed. This routine is called the bootstrap loader . It can be used to bring the rest of the system gradually to main memory, for instance, from secondary memory or from another node in a distributed system. In disk-based systems, the core portion of the operating system is often placed at a known address, called the boot block or boot area of a known system disk drive. Thus, the bootstrap loader routine can include a rudimentary from of a disk driver whose primary function is to load and to activate the initialization section of the operating system. This

What is System Calls and it's types./Explain in detail about system calls ?

 Definition:- The interface between the operating system and the user programs in defined by the set of  "extended instruction" that the operating system provides. These extended instructions are known as system calls. User programs communicate with the operating system and request services from it by making system calls. There exists a library procedure  corresponding to each system call that user program can call. This procedure puts the parameters of the system call in a specific place, such as the machine registers, and then issues a TRAP instruction to start the operating system. When the operating system gets control after the TRAP, it examines the parameters to see if they are valid, and if so, performs the work requested. When it is finished, the operating system puts a status code in a register, telling whether it succeeded of failed, and executes a RETURN FROM TRAP instruction, to return control back to the library procedure. the library procedure then returns to th

Introduction of machine learning, Need and Important Terms of machine learning.

Machine Learning is a tool for turning information into knowledge. Machine learning techniques are used to automatically find the valuable underlying patterns within complex data that we would otherwise struggle to discover. The hidden patterns and knowledge about a problem can be used to predict future events and perform all kinds of complex decision making. Tom Mitchell gave a "well-posed" mathematical and relational definition that " A computer program is said to learn from experience E with respect to some task T and some performance measure P, if  its performance on T, as measured by P, improves with experience E ". For example :- A checkers learning problem:                        Task(T): Playing checkers.                         Performance measures (P): Performance of games won.                         Training Experience (E): Playing practice games against itself. Need for Machine Learning:- Ever since the technical revolution, we've been generating an

Various types of operating systems ? Explain in detail various types of operating system.

 The various types of operating systems are as follows - (i) Desktop system  (ii) Multiprocessor system (iii) Clustered system (iv) Handheld system  (v) Real-time system  (vi) Multitasking  (vii) Multiprogramming  (viii) Distributed system (i) Desktop system :- Personal computers PCs introduced in the 1970s. During their first decade, the CPUs in PCs lacked the features needed to protect an operating system from use programs. Therefore, PC operating systems were neither multiuser nor multitasking. However, PC operating systems have changed with time; instead of maximizing CPU and peripheral utilization, the systems opt for maximizing user convenience and responsiveness. These systems include PCs running Microsoft Windows and the Apple Macintosh. The MS-DOS operating system from Microsoft has been superseded by multiple flavors of Microsoft Windows, and IBM has upgraded MS-DOS to the OS/2 multitasking system. The Apple Macintosh operating system has been ported to more advanced hardwar

How can we protect our data from Cyber Crime ?

Image
Protect our data from Cyber Crime:- some easy tips to protect computer from the growing theats:- 1) Create backup of important data 2) Keep your software updated 3) Use security programs 4) Protect your password 5) Participation in social networking 6) Strengthen your home network 1) Create backup of important data:- Backup of all the important files whether personal or professional should be created. Getting used to back up your files regularly is the first step towards security of your personal computer.  2) Keep your software updated:- This is especially important with your operating system and Internet security software. Cyber criminals frequently use known exploits, of flaws, in your software to gain access to your system. 3) Use security programs:- If your system does not have data protection software to protect online, then by all means buy Internet security programs for your computer. 4) Protect your password:- Try creating a password that consists of a combination of letters (

What is Web Browser and its types.//Purpose of Web Browser.

Web Browser   A web browser is the program you use to view web pages & navigate the world wide web. Large variety of web browsers are available for every computer platform links. It is a client / program / software / tool through which we sent HTTP request to web server. Main purpose of web browser is to locate the current on the www & display in the form of webpage, image, audio or video on client computer. It is called as client because it connect the web server for desired information & if the requested data is available in the webserver then it will send back the requested information to web browser. Web browsers are capable to understand the HTML, JAVASCRIPT, AJAX etc. Web browser for mobile are called as Micro browsers.  

What is HTTP and basic features of HTTP.

  HTTP  It is stands for Hypertext Transfer Protocol. It is a protocol used by WWW for data communication between web client (browser) & web server. HTTP protocol defines how messages are prepared & transmitted during web client & web server communication. It also defines what actions web server browser should take in response to various commands. HTTP is a TCP/IP based communication protocol, that is used to deliver data which may be HTML files, image files, query results, etc. On the world wide web(www). The defaults port is TCP 80, but other ports can be used as well. Basic Features of HTTP :- There are three features that make HTTP a simple but powerful protocol. 1. Connectionless Protocol :- HTTP is a Connectionless protocol. HTTP client initiates a request and waits for a response from the server. When the server receive the request, the server processes the request and sends back the response to the HTTP client after which the client disconnecteds the connection. Th

Hypertext Transfer Protocol Request and Response Methods

Image
HTTP Request and Response Methods:-  The operation of Hypertext Transfer Protocol(HTTP) involves the communication between a Hypertext Transfer Protocol(HTTP) client application (Usually web browser) and a Hypertext Transfer Protocol (HTTP). Server application (Web server like IIS). Hypertext Transfer Protocol (HTTP) uses Transmission Control Protocol (TCP) as the Transport Layer Protocol at well known port number 80. Once the TCP connection is established, the two step in Hypertext Transfer Protocol (HTTP) communication are - 1. HTTP Client Request :-  Hypertext Transfer Protocol (HTTP) client sends an Hypertext Transfer Protocol (HTTP) Request to the Hypertext Transfer Protocol. Hypertext Transfer Protocol (HTTP) sever acooding to the HTTP standard, specifying the information the client like to retrieve from the Hypertext Transfer Protocol (HTTP) server. 2. HTTP Server Response :- Once the Hypertext Transfer Protocol (HTTP) Request arrived at the Hypertext Transfer Protocol (HTTP) se

What is Sitemap//difference between web2.0 and Web 3.0

Image
 A site map is a model of a websites content designed to help both users and search engines navigate the site. In the context of search engines, the site map also known as a sitemap. XML file, helps search engine crawlers index all pages on the site. While a site map does not guarantee that every page of a site will be crawled, major search engines recommend them. A site map [or sitemap] is a list of pages of a web site. There are three primary kinds of site map:- 1) Site maps used during the planning of a web site by it's designers. 2) Human visible listings, typically hierarchical of the pages on a site. 3) Structured listings intended for web crawlers such as search engines. Difference between web 2.0 and Web 3.0 :-

Concept Of WWW in IWT

WWW stands for World Wide Web. WWW is a collection of information which is accessed with the help of Internet. WWW is a collection of text, pages, digital photographs, music files, videos & animation you can access over the Internet. WWW is a system of Internet servers that support specially formatted documents (web pages). These documents are formatted in a markup language called HTML(Hypertext Markup Language) that supports links to other documents as well as graphics, audio & video files. Users access the www facilities with the help of web browsers, which provides transparent access to the www servers. WWW is an information sharing model that is built on top of the Internet. WWW uses HTTP( Hypertext Transfer Protocol) to transmit data(web pages). It is the part of the internet that is available to the public. If a site has www in the address, it is a public site on the world wide web. World Wide Web is commonly known as web. https://youtu.be/jGDS4vKy8d8

Main functions of an Operating System/purposes of an operating system.

What are the two main functions of an Operating System ? What are the main functions of an Operating System ? Explain the functions of operating system. An Operating System perform two basically unrelated functions, extending the machine and managing resources- 1) The Operating System as an Extended Machine- The function of the operating system is to present the user with the equivalent of an extended machine or virtual machine that is easier to program than the underlying hardware. 2) The Operating System as a Resource Manager- Internally an operating system acts as a manager of resources of the computer system such as processor, memory, files, and I/O devices. In this role, the operating system keeps track of the status of each resource, and decides who gets a resource, for how long, and when. In systems that support concurrent execution of programs, the operating system resolves conflicting requests for resources in a manner that preserve system integrity, and in so doing attempts t

Components of Operating System

Image
Write the name of system components of Operating System ? An operating system is an important part 1 each computer system.  A computer system can be divided into four components - the hardware, the operating system, the application programs, and the users. The hardware - the central processing unit (CPU), the memory, and the input/output (I/O) devices - provides an basic computing resources. The application programs such as word processors, spreadsheet, compilers, and web browsers-define the ways in which these resources are used in solve the computing problems of the users. The operating system controls and coordinates the use of the hardware among various applications programs for the various users.

What is Operating System ? Difficulties involved in Writing an Operating System for a realtime environment.

What is an operating system ? Difficulties involved in Writing an Operating System for a real-time environment. An operating system may be viewed as an organized collection of software extensions of hardware, consisting of control routines for operating a computer and for providing an environment for execution of programs. Other programs rely on facilities provided by the operating system to gain access to computer system resources, such as files and input/output (I/O) devices. Programs usually invoke services of the operating system by means of operating-system calls. In either case, the operating system acts as interface between users and hardware of a computer system. Difficulties involved in Writing an Operating System for a Real time Environment- The main difficulties are keeping the operating system within the fixed time constraints of a real-time system. If the system does not complete a task in a certain time, it could cause a breakdown of the entire system it is running. There