from turtle import * import colorsys bgcolor('black') pensize(0) tracer(50) h=0 for i in range(300): c=colorsys.hsv_to_rgb(h,1,1) h+=0.9 color(c) forward(300) left(100) fd(i) goto(0,0) down() rt(90) begin_fill() circle(0) end_fill() rt(10) for j in range(5): rt(30) done() Please follow my blog and subscribe my channel for more videos and newly updates 👍👍👍👍👍 import turtle as t import colorsys t.bgcolor('black') t.tracer(100) h=0.4 def draw(ang,n): t.circle(5+n,60) t.left(ang) t.circle(5+n,60) for i in range(200): c=colorsys.hsv_to_rgb(h,1,1) h+=0.005 t.color(c) t.pensize(2) draw(90,i*2) draw(120,i*2.5) draw()
IBM hiring freshers Any graduate Any branch Salary 4+ LPA// Apply now
- Get link
- Other Apps
By Kajal Vishwakarma
Our Study Notes
-
IBM hiring freshers Any graduate Any branch Apply now
- Country/Region:IN
- State:MULTIPLE
- City:Multiple Cities
- Category:Technical Specialist
- Required Education:Bachelor's Degree
- Position Type:Entry Level
- Employment Type:Full-Time
- Contract Type:Regular
- Company:(Y030) Kyndryl Solutions Private Limited
Required Technical and Professional Expertise
Fundamentals of IT
Basic Concepts in Networking, Windows, Linux, Unix and other OS
Basic Knowledge of concepts about databases
Basic Knowledge of Z/Os and Operations Monitoring
Fundamentals of SAN, Back-up and Restore Technology
Fundamentals of Cloud and Cloud Computing
Preferred Technical and Professional Expertise
We are looking for BE/Btech/ME/MTech/B.Sc/M.Sc/BCA/MCA/Diploma (computer/IT specialization only) students,2022 pass outs.
65% or 6.5 CGPA above are eligible to apply.
All subjects will be considered including elective/optional subjects
No current Backlogs
Apply here:-
- Get link
- Other Apps
Popular posts from this blog
Create shape using python turtle 🐢
By Kajal Vishwakarma
Our Study Notes
-
Python turtle 🐢 graphic design shapes using turtle python from turtle import * import colorsys bgcolor('black') tracer(200) pensize(3) j=0 goto(-110,200) for t in range(400): c=colorsys.hsv_to_rgb(j,1,1) fillcolor(c) begin_fill() left(119) circle(50,180) circle(-50,180) circle(20) backward(350- t) j+=0.005 end_fill() done() Youtube Link:- https://youtu.be/8ki4Sk6Z4zE
Make fire crackers using python turtle 🐢
By Kajal Vishwakarma
Our Study Notes
-
Make fire crackers using python turtle 🐢 //python turtle//graphic design import turtle as t t.bgcolor('black') t.pensize(3) t.tracer(100) t.ht() for i in range(600): color=('red','white','green','blue') t.color(color[i%4]) t.fd(i) t.rt(20) for i in range(6): t.fd(i) t.rt(145) t.bk(i/2) t.lt(180) t.done() Other program you may like it. And please support me guys and please subscribe my youtube channel and also follow my blog. Create one of the best design with python turtle 🐢 it's code is very simple you can easily understood that I hope you enjoy this and please subscribe my youtube channel and don't forget to follow my blog. #2 from turtle import * import colorsys as cs tracer(50) bgcolor('black') h=0.3 pensize(3) for i in range(300): color(cs.hsv_to_rgb(h,1,1)) h+=0.005 rt(20) for j in range(5): fd(i) rt(100) rt(50) rt(118) done() F
Protocol verification using finite state machine model in computer network
By Kajal Vishwakarma
Our Study Notes
-
Protocol Verification Using Finite State Machine Model:- The finite state machine is a mainly used in several protocol models with this technique, every protocol machine is always in a particular state at every time instant. Variables, including the program counter. From every state, there are zero or more possible transition to other states. When some event happens, transition take place. In case of a protocol machine, a transition might take place if a frame is transmitted, if a frame arrives, if a timer expires, if an interrupt takes place, etc. One particular state is designated as the initial state. This state corresponds to the description of the system when it starts running, or at some convenient starting place shortly thereafter. From the initial state, some, perhaps all, of the other states may be approached by a sequence of transition. this technique is called reachability analysis. This analysis can be helpful in determining whether a protocol is correct. All processes are
Comments
Post a Comment