Assignment 1.
Installation of Python IDLE Environment
Write a program to print "Hello, This is My First Python Program".
Python Program to read two numbers and print their quotient and remainder.
Python Program to take the temperature in Celsius and convert it to Fahrenheit.
Python Program to read height in centimeters and then convert the height to feet and
inches
Python program to add two numbers.
Python Program to print odd numbers within a given range.
Python Program for Program to find area of a circle.
Python Program for Simple interest calculation.
Python program to reverse three digits number without using loop.
Python program to exchange the values of two numbers without using a temporary
variable.
Python program to calculate gross salary where gross salary=Basic+HRA+DA
o In this HRA is 16% of Basic, DA is 12% of Basic
Assignment 2.
Write a Python program to find maximum between two numbers using if else.
Write a program to find maximum among three number
Python Program to Take in the Marks of 5 Subjects and Display the Grade.
Python Program to check Armstrong Number use three digit number.
Write a Python program to check whether a number is positive, negative or zero.
Installation of Python IDLE Environment
Write a program to print "Hello, This is My First Python Program".
Python Program to read two numbers and print their quotient and remainder.
Python Program to take the temperature in Celsius and convert it to Fahrenheit.
Python Program to read height in centimeters and then convert the height to feet and
inches
Python program to add two numbers.
Python Program to print odd numbers within a given range.
Python Program for Program to find area of a circle.
Python Program for Simple interest calculation.
Python program to reverse three digits number without using loop.
Python program to exchange the values of two numbers without using a temporary
variable.
Python program to calculate gross salary where gross salary=Basic+HRA+DA
o In this HRA is 16% of Basic, DA is 12% of Basic
Assignment 2.
Write a Python program to find maximum between two numbers using if else.
Write a program to find maximum among three number
Python Program to Take in the Marks of 5 Subjects and Display the Grade.
Python Program to check Armstrong Number use three digit number.
Write a Python program to check whether a number is positive, negative or zero.
Assignment 3.
Python program to calculate factorial of a given number
Python Program to find the sum of digits in a number.
Python Program to count the number of digits in a number.
Python Program for n-th Fibonacci number.
Assignment 4.
Create a function to calculate the area of Circle.
Create a function to find out factorial of a number.
Create a function to find the reverse of a number.
Create a function to calculate the arithmetic operation.
Assignment 5.
Program to Find Out Length of String.
Python program to Check Palindrome of string.
Program to count No. of vowels of string.
By using String Function Count a substring in main string
Assignment 6.
Create a lambda Function to calculate remainder.
Find the Square of a number by using lambda function.
Program to add number from 1 to 6 by using Function recursion.
Program to Calculate Factorial Value By Using Recursion Function.
Assignment 7.
Program to check the file is Exist or not.
Program to Read text from File. (File Must be created before reading) at default location.
Write a program to save the output of program in a file.
Create a file By using w mode.
Create a Program to Writing in file using writelines function.
Python program to calculate factorial of a given number
Python Program to find the sum of digits in a number.
Python Program to count the number of digits in a number.
Python Program for n-th Fibonacci number.
Assignment 4.
Create a function to calculate the area of Circle.
Create a function to find out factorial of a number.
Create a function to find the reverse of a number.
Create a function to calculate the arithmetic operation.
Assignment 5.
Program to Find Out Length of String.
Python program to Check Palindrome of string.
Program to count No. of vowels of string.
By using String Function Count a substring in main string
Assignment 6.
Create a lambda Function to calculate remainder.
Find the Square of a number by using lambda function.
Program to add number from 1 to 6 by using Function recursion.
Program to Calculate Factorial Value By Using Recursion Function.
Assignment 7.
Program to check the file is Exist or not.
Program to Read text from File. (File Must be created before reading) at default location.
Write a program to save the output of program in a file.
Create a file By using w mode.
Create a Program to Writing in file using writelines function.
Assignment 8.
Create an array using NumPy.
Find the dimension of array using NumPy inbuilt methods.
Create an array using NumPy.
Find the dimension of array using NumPy inbuilt methods.
Program (JS) - Check palindrome number
<html>
<head>
<script>
function Palindrome() {
var a,number,b,temp=0;
number=document.getElementById("num").value;
b=number;
while(number>0)
{
a=number%10;
number=parseInt(number/10);
temp=temp*10+a;
}
if(temp==b)
{
alert("Palindrome number");
}
else
{
alert("Not a Palindrome number");
}
}
</script> </head>
<body>
<br><br>
Enter any Number: <input id="num">
<button onclick="Palindrome()">Check</button>
</body>
</html>
<html>
<head>
<script>
function Palindrome() {
var a,number,b,temp=0;
number=document.getElementById("num").value;
b=number;
while(number>0)
{
a=number%10;
number=parseInt(number/10);
temp=temp*10+a;
}
if(temp==b)
{
alert("Palindrome number");
}
else
{
alert("Not a Palindrome number");
}
}
</script> </head>
<body>
<br><br>
Enter any Number: <input id="num">
<button onclick="Palindrome()">Check</button>
</body>
</html>
Create an HTML page to demonstrate a Clickable image.
<!DOCTYPE html>
<html>
<head>
<title>Clicable image </title>
</head>
<body >
<a href="http://www.youtube.com/newideasyt">
<img title="I am Clicable Image." src="main.jpg">
</a>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>Clicable image </title>
</head>
<body >
<a href="http://www.youtube.com/newideasyt">
<img title="I am Clicable Image." src="main.jpg">
</a>
</body>
</html>
Add two number using function
<html>
<head>
<title>Clicable image </title>
</head>
<body >
<script type="text/javascript">
var num1 = parseInt(prompt("Enter a first number: "));
var num2 = parseInt(prompt("Enter a negative number: "));
function sum (x, y) {
return (x + y);
}
document.write('The sum is =',sum(num1,num2));
</script>
</body>
</html>
<html>
<head>
<title>Clicable image </title>
</head>
<body >
<script type="text/javascript">
var num1 = parseInt(prompt("Enter a first number: "));
var num2 = parseInt(prompt("Enter a negative number: "));
function sum (x, y) {
return (x + y);
}
document.write('The sum is =',sum(num1,num2));
</script>
</body>
</html>
Write an HTML form that accepts a student's name and roll no. Use JavaScript function to perform following validation.
Roll no field should receive only numeric data.
Name field should not be empty and shall not exceed 20 characters in length.
</head>
<body>
<form>
Student name:<input type="text" id="name"><br>
Roll no.:<input type="text" id="roll"><br>
<button onclick="vali()">Submit</button>
</form>
<script>
function vali(){
var a= document.getElementById('name').value;
var b= document.getElementById('roll').value;
if(a==""||a.length>20){
alert("Name can not empty or more then 20 char");}
else if(isNaN(b)){
alert("Roll number can not character and should be a numeric data");}
else{
alert("Form submitted succussfully");}
}
</script>
</body>
</html>
Roll no field should receive only numeric data.
Name field should not be empty and shall not exceed 20 characters in length.
</head>
<body>
<form>
Student name:<input type="text" id="name"><br>
Roll no.:<input type="text" id="roll"><br>
<button onclick="vali()">Submit</button>
</form>
<script>
function vali(){
var a= document.getElementById('name').value;
var b= document.getElementById('roll').value;
if(a==""||a.length>20){
alert("Name can not empty or more then 20 char");}
else if(isNaN(b)){
alert("Roll number can not character and should be a numeric data");}
else{
alert("Form submitted succussfully");}
}
</script>
</body>
</html>
Malware is a software developed with an intention
to damage computer hardware, software, steal
data, or cause any other trouble to a user.
• A virus is a piece of software code created
to perform malicious activities and hamper
resources of a computer system.
• The Worm is also a malware that incurs
unexpected or damaging behaviour on an infected
computer system.
• Worms are standalone programs that are capable
of working on its own.
• Ransomware is a type of malware that targets
user data.
• Ransomware either blocks the user from
accessing their own data or threatens to publish
their personal data online and demands ransom
payment against the same.
• Trojan is a malware, that looks like a legitimate
software and once it tricks a user into installing
it, it acts pretty much like a virus or a worm.
• Spyware records and sends the collected
information to an external entity without the
consent or knowledge of a user.
• An adware displays unwanted online
advertisements using pop-ups, web pages, or
installation screens.
• A keylogger makes logs of daily keyboard usage
and may send it to an external entity as well.
• The on-screen keyboard is an application software
that uses a fixed QWERTY key layout.
• Online virtual keyboard is a web-based or a
standalone software with a randomised key
layout every time it is used.
to damage computer hardware, software, steal
data, or cause any other trouble to a user.
• A virus is a piece of software code created
to perform malicious activities and hamper
resources of a computer system.
• The Worm is also a malware that incurs
unexpected or damaging behaviour on an infected
computer system.
• Worms are standalone programs that are capable
of working on its own.
• Ransomware is a type of malware that targets
user data.
• Ransomware either blocks the user from
accessing their own data or threatens to publish
their personal data online and demands ransom
payment against the same.
• Trojan is a malware, that looks like a legitimate
software and once it tricks a user into installing
it, it acts pretty much like a virus or a worm.
• Spyware records and sends the collected
information to an external entity without the
consent or knowledge of a user.
• An adware displays unwanted online
advertisements using pop-ups, web pages, or
installation screens.
• A keylogger makes logs of daily keyboard usage
and may send it to an external entity as well.
• The on-screen keyboard is an application software
that uses a fixed QWERTY key layout.
• Online virtual keyboard is a web-based or a
standalone software with a randomised key
layout every time it is used.
An antivirus software is used to detect and remove
viruses and hence the name anti-virus.
• Antiviruses now come bundled with the prevention,
detection, and removal of a wide range of malware.
• Some of the prominent methods of malware
identification used by an antivirus include:
Signature-based detection, Sandbox detection,
Heuristics.
• Any unwanted data, information, email,
advertisement, etc. is called Spam.
• HTTP (Hyper Text Transfer Protocol) and HTTPS
(Hyper Text Transfer Protocol Secure) are a set
of rules or protocol that govern how data can be
transmitted over the World Wide Web.
• Firewall is a network security system designed
to protect a trusted private network from
unauthorised access or traffic originating from an
untrusted external network.
• There are two basic types of firewalls — Network
Firewall and Host-based Firewall.
• A computer cookie is a small file or data packet,
which is stored by a website on the client’s
computer.
• Cookies are used by the websites to store browsing
information of the user.
• Hackers/Crackers find loopholes and
vulnerabilities in computer systems or computer
networks and gain access to unauthorised
information.
• If a hacker uses its knowledge to find and help in
fixing the security flaws in the system, its termed
as White Hat hacker.
• If hackers use their knowledge unethically to
break the law and disrupt security by exploiting
the flaws and loopholes in a system, then they are
called black hat hackers.
• The grey hats take system security as a challenge
and just hack systems for the fun of it.
• The Denial of Service (DoS) attack floods the
victim resource with traffic, making the resource
appear busy.
viruses and hence the name anti-virus.
• Antiviruses now come bundled with the prevention,
detection, and removal of a wide range of malware.
• Some of the prominent methods of malware
identification used by an antivirus include:
Signature-based detection, Sandbox detection,
Heuristics.
• Any unwanted data, information, email,
advertisement, etc. is called Spam.
• HTTP (Hyper Text Transfer Protocol) and HTTPS
(Hyper Text Transfer Protocol Secure) are a set
of rules or protocol that govern how data can be
transmitted over the World Wide Web.
• Firewall is a network security system designed
to protect a trusted private network from
unauthorised access or traffic originating from an
untrusted external network.
• There are two basic types of firewalls — Network
Firewall and Host-based Firewall.
• A computer cookie is a small file or data packet,
which is stored by a website on the client’s
computer.
• Cookies are used by the websites to store browsing
information of the user.
• Hackers/Crackers find loopholes and
vulnerabilities in computer systems or computer
networks and gain access to unauthorised
information.
• If a hacker uses its knowledge to find and help in
fixing the security flaws in the system, its termed
as White Hat hacker.
• If hackers use their knowledge unethically to
break the law and disrupt security by exploiting
the flaws and loopholes in a system, then they are
called black hat hackers.
• The grey hats take system security as a challenge
and just hack systems for the fun of it.
• The Denial of Service (DoS) attack floods the
victim resource with traffic, making the resource
appear busy.
Snooping is the process of secret capture and
analysis of network traffic by malicious users.
• Eavesdropping is an unauthorised real-
time interception or monitoring of private
communication between two entities over
a network
analysis of network traffic by malicious users.
• Eavesdropping is an unauthorised real-
time interception or monitoring of private
communication between two entities over
a network