New Ideas YT
7.84K subscribers
428 photos
4 videos
79 files
1.62K links
This channel provides O level and CCC study material (pdf). Also visit our Website www.examjila.com | www.primegyan.com Youtube channel :- www.youtube.com/Newideasyt
Download Telegram
Assignment 3.
 Python program to calculate factorial of a given number
 Python Program to find the sum of digits in a number.
 Python Program to count the number of digits in a number.
 Python Program for n-th Fibonacci number.
Assignment 4.
 Create a function to calculate the area of Circle.
 Create a function to find out factorial of a number.
 Create a function to find the reverse of a number.
 Create a function to calculate the arithmetic operation.
Assignment 5.
 Program to Find Out Length of String.
 Python program to Check Palindrome of string.
 Program to count No. of vowels of string.
 By using String Function Count a substring in main string
Assignment 6.
 Create a lambda Function to calculate remainder.
 Find the Square of a number by using lambda function.
 Program to add number from 1 to 6 by using Function recursion.
 Program to Calculate Factorial Value By Using Recursion Function.
Assignment 7.
 Program to check the file is Exist or not.
 Program to Read text from File. (File Must be created before reading) at default location.
 Write a program to save the output of program in a file.
 Create a file By using w mode.
 Create a Program to Writing in file using writelines function.
Assignment 8.
 Create an array using NumPy.
 Find the dimension of array using NumPy inbuilt methods.
3.pdf
7.2 MB
CHAPTER 3 PYTHON
Program (JS) - Check palindrome number
<html>
<head>
<script>
function Palindrome() {
var a,number,b,temp=0;
number=document.getElementById("num").value;
b=number;
while(number>0)
{
a=number%10;
number=parseInt(number/10);
temp=temp*10+a;
}
if(temp==b)
{
alert("Palindrome number");
}
else
{
alert("Not a Palindrome number");
}
}
</script> </head>
<body>
<br><br>
Enter any Number: <input id="num">
<button onclick="Palindrome()">Check</button>
</body>
</html>
Create an HTML page to demonstrate a Clickable image.
<!DOCTYPE html>
<html>
<head>
<title>Clicable image </title>
</head>
<body >
<a href="http://www.youtube.com/newideasyt">
<img title="I am Clicable Image." src="main.jpg">
</a>
</body>
</html>
Add two number using function
<html>
<head>
<title>Clicable image </title>
</head>
<body >
<script type="text/javascript">
var num1 = parseInt(prompt("Enter a first number: "));
var num2 = parseInt(prompt("Enter a negative number: "));
function sum (x, y) {
return (x + y);
}
document.write('The sum is =',sum(num1,num2));
</script>
</body>
</html>
Write an HTML form that accepts a student's name and roll no. Use JavaScript function to perform following validation.
Roll no field should receive only numeric data.
Name field should not be empty and shall not exceed 20 characters in length.

</head>
<body>
<form>
Student name:<input type="text" id="name"><br>
Roll no.:<input type="text" id="roll"><br>
<button onclick="vali()">Submit</button>
</form>
<script>
function vali(){
var a= document.getElementById('name').value;
var b= document.getElementById('roll').value;
if(a==""||a.length>20){
alert("Name can not empty or more then 20 char");}
else if(isNaN(b)){
alert("Roll number can not character and should be a numeric data");}
else{
alert("Form submitted succussfully");}
}
</script>
</body>
</html>
Malware is a software developed with an intention
to damage computer hardware, software, steal
data, or cause any other trouble to a user.
• A virus is a piece of software code created
to perform malicious activities and hamper
resources of a computer system.
• The Worm is also a malware that incurs
unexpected or damaging behaviour on an infected
computer system.
• Worms are standalone programs that are capable
of working on its own.
• Ransomware is a type of malware that targets
user data.
• Ransomware either blocks the user from
accessing their own data or threatens to publish
their personal data online and demands ransom
payment against the same.
• Trojan is a malware, that looks like a legitimate
software and once it tricks a user into installing
it, it acts pretty much like a virus or a worm.
• Spyware records and sends the collected
information to an external entity without the
consent or knowledge of a user.
• An adware displays unwanted online
advertisements using pop-ups, web pages, or
installation screens.
• A keylogger makes logs of daily keyboard usage
and may send it to an external entity as well.
• The on-screen keyboard is an application software
that uses a fixed QWERTY key layout.
• Online virtual keyboard is a web-based or a
standalone software with a randomised key
layout every time it is used.
An antivirus software is used to detect and remove
viruses and hence the name anti-virus.
• Antiviruses now come bundled with the prevention,
detection, and removal of a wide range of malware.
• Some of the prominent methods of malware
identification used by an antivirus include:
Signature-based detection, Sandbox detection,
Heuristics.
• Any unwanted data, information, email,
advertisement, etc. is called Spam.
• HTTP (Hyper Text Transfer Protocol) and HTTPS
(Hyper Text Transfer Protocol Secure) are a set
of rules or protocol that govern how data can be
transmitted over the World Wide Web.
• Firewall is a network security system designed
to protect a trusted private network from
unauthorised access or traffic originating from an
untrusted external network.
• There are two basic types of firewalls — Network
Firewall and Host-based Firewall.
• A computer cookie is a small file or data packet,
which is stored by a website on the client’s
computer.
• Cookies are used by the websites to store browsing
information of the user.
• Hackers/Crackers find loopholes and
vulnerabilities in computer systems or computer
networks and gain access to unauthorised
information.
• If a hacker uses its knowledge to find and help in
fixing the security flaws in the system, its termed
as White Hat hacker.
• If hackers use their knowledge unethically to
break the law and disrupt security by exploiting
the flaws and loopholes in a system, then they are
called black hat hackers.
• The grey hats take system security as a challenge
and just hack systems for the fun of it.
• The Denial of Service (DoS) attack floods the
victim resource with traffic, making the resource
appear busy.
Snooping is the process of secret capture and
analysis of network traffic by malicious users.
• Eavesdropping is an unauthorised real-
time interception or monitoring of private
communication between two entities over
a network