11, సెప్టెంబర్ 2025, గురువారం

HOW TO WRITE RESIGNATION LETTER FOR AN ENGINEERING COLLEGE, IN AN OFFICIAL MANNER …Mr.RAM. A. DAYINABOYINA ...................................DURING A NOTICE PERIOD, YOU ARE GENERALLY EXPECTED TO CONTINUE YOUR USUAL DUTIES, COMPLETE PENDING PROJECTS, AND ASSIST WITH THE HANDOVER OF RESPONSIBILITIES TO ENSURE A SMOOTH TRANSITION FOR YOUR SUCCESSOR. YOU SHOULD NOT TAKE ON SIGNIFICANT NEW WORK OR PROJECTS .

ఒక ఇంజనీరింగ్ కళాశాలకు రాజీనామా లేఖను అధికారిక పద్ధతిలో ఎలా రాయాలి ... ................................. శ్రీ రామ్. ఎ. దయినాబోయిన

RESIGNATION LETTER

From:

M.VIJAYAKUMAR,

Lecturer,

Department of Mechanical Engineering,

SRG Engineering College,

Namakkal.

To

THE PRINCIPAL,

SRG Engineering College,

Namakkal.

Respected sir,

SUB: requisition for resignation reg:

                         As I am working as a lecturer last five months in SRG Engineering College

in the Department of Mechanical Engineering. I am going to resign my job due to

insufficient salary. I have more than one year experience but not consider my experience

last five months, for which I want leave from our college. So please accept my resignation

letter and relieve me, And I am also want my original certificates and experience

certificates.

Thanking you,

Date: Yours sincerely,

Place: Namakkal

(VIJAYAKUMAR.M)


important information about notice period....

A valid notice period in a private engineering college depends on the college's policies, as outlined in your employment contract or appointment letter. While there's no universal rule, common notice periods range from one to maximum of three months


1, సెప్టెంబర్ 2025, సోమవారం

Mr.Ram@jntuh............

 

S C M.........at JNTU HYDERABAD..........................

 At Jawaharlal Nehru Technological University (JNTUH), "faculty SCM" refers to Faculty Selection Committee Minutes or the process of ratifying faculty qualificationsThese minutes document the decisions of a committee that interviews candidates and assesses their qualifications for faculty positions, a process critical for granting affiliation to the university's colleges. 

Here's a breakdown of the meaning:
  • Faculty: Refers to the teaching staff at JNTUH's affiliated colleges. 
  • SCM: Stands for Selection Committee Minutes. 
  • Purpose:
    • The minutes are generated by the university's Selection Committee, which includes university nominees and college representatives, to select and ratify the qualifications of faculty members for affiliated colleges. 
    • This process is essential for ensuring that colleges meet the university's standards for qualified faculty and maintain proper faculty-student ratios. 
    • Colleges upload their faculty data and SCM/ratification letters to the JNTUH portal for the university's approval. 
Why it's important:
  • Affiliation:
    JNTUH uses the faculty SCM process to verify the eligibility of faculty and grant or renew the affiliation of its colleges. 
  • Compliance:
    It ensures that colleges adhere to the university's norms and qualified faculty standards, especially for new technology courses, reports The Hans India. 
  • Quality Assurance:
    The ratification of qualifications through the SCM process contributes to maintaining the academic quality of JNTUH's affiliated institutions. 

 def reverse_string_slicing(s):

    """Reverses a string using slicing."""

    return s[::-1]


# Example usage

input_string = "hello"

reversed_string = reverse_string_slicing(input_string)

print(f"Original: {input_string}, Reversed: {reversed_string}")



from collections import Counter


s = "Python is Fun!"

v = "aeiouAEIOU"

cnt = Counter([i for i in s if i in v])

print(cnt)


my_list = [1, 2, 3, 1, 4, 2, 1, 5]

item_to_count = 1

count = my_list.count(item_to_count)

print(f"The item {item_to_count} appears {count} times in the list.")

27, ఆగస్టు 2025, బుధవారం

mr

 

Python Variables


Variables

Variables are containers for storing data values.


Creating Variables

Python has no command for declaring a variable.

A variable is created the moment you first assign a value to it.

x = 5

y = "John"
print(x)
print(y)

Variables do not need to be declared with any particular type, and can even change type after they have been set.

Example

x = 4       # x is of type int
x = "Sally" # x is now of type str
print(x)

Casting

If you want to specify the data type of a variable, this can be done with casting.

Example

x = str(3)    # x will be '3'
y = int(3)    # y will be 3
z = float(3)  # z will be 3.0



Get the Type

You can get the data type of a variable with the type() function.

Example

x = 5
y = "John"
print(type(x))
print(type(y))
You will learn more about data types and casting later in this tutorial.

Single or Double Quotes?

String variables can be declared either by using single or double quotes:

Example

x = "John"
# is the same as
x = 'John'

Case-Sensitive

Variable names are case-sensitive.

Example

This will create two variables:

a = 4
A = "Sally"
#A will not overwrite a

26, ఆగస్టు 2025, మంగళవారం

python lamba expressions ..............

 A lambda function is a small anonymous function.

A lambda function can take any number of arguments, but can only have one expression.


Syntax

lambda arguments expression

The expression is executed and the result is returned:



Add 10 to argument a, and return the result:

x = lambda a : a + 10
print(x(5))

Lambda functions can take any number of arguments:

Example

Multiply argument a with argument b and return the result:

x = lambda a, b : a * b
print(x(56))

Example

Summarize argument ab, and c and return the result:

x = lambda a, b, c : a + b + c
print(x(562))



.................................The power of lambda is better shown when you use them as an anonymous function inside another function.

Say you have a function definition that takes one argument, and that argument will be multiplied with an unknown number:

def myfunc(n):
  return lambda a : a * n

Use that function definition to make a function that always doubles the number you send in:

Example

def myfunc(n):
  return lambda a : a * n

mydoubler = myfunc(2)

print(mydoubler(11))

Or, use the same function definition to make a function that always triples the number you send in:

Example

def myfunc(n):
  return lambda a : a * n

mytripler = myfunc(3)

print(mytripler(11))

Or, use the same function definition to make both functions, in the same program:

Example

def myfunc(n):
  return lambda a : a * n

mydoubler = myfunc(2)
mytripler = myfunc(3)

print(mydoubler(11))
print(mytripler(11))

Use lambda functions when an anonymous function is required for a short period of time.

python intl/regnl languages..................# A lambda function to add 10 to a number add_ten = lambda x: x + 10 print(add_ten(5)) # Output: 15 # Using lambda with filter() to get even numbers my_list = [1, 2, 3, 4, 5, 6] even_numbers = list(filter(lambda x: x % 2 == 0, my_list)) print(even_numbers) # Output: [2, 4, 6]

 





python introduction......................


















Mr ram.a.dayinaboyina......................

 

23, ఆగస్టు 2025, శనివారం

Python Online Compiler................... programiz.proStrings in Python are sequences of characters, so we can access individual characters using indexing. Strings are indexed starting from 0 and -1 from end. This allows us to retrieve specific characters from the string. s = "ramdayinaboyina " # Accesses 3rd character: 'r' print(s[-10]) # Accesses 5th character from end: '' print(s[-5])



























 









print("Try programiz.pro")

a=3

b=3.4

print(a,b)

print(type(a))

a=b

print(a)

a=int(b)

print(a)

c = "ramu.a.dayinaboyina"

print(c)

s = "ram.a.dayinaboyina"

print(s[1]) # access 2nd char

s1 = s + s[0] # update

print(s1) # print

output:-

Try programiz.pro

3 3.4

<class 'int'>

3.4

3

ramu.a.dayinaboyina

a

ram.a.dayinaboyinaa


s = """I am Learning

Python String on by ramu sir """

print(s)


s = '''I'm a 

ramu'''

print(s)




i watch ..........MODELLING BASICS RUNWAY MODELS, WEDDING PHOTOGRAPHY, LIVE MODELLING, RAMP WALK, PHOTOGRAPHIC, STILL MODELLING, ELECTRONIC MEDIA MODELLING …………























 






































































22, ఆగస్టు 2025, శుక్రవారం

lab session 5 for python programming ....................

 



n = 6

# Initialize the factorial variable to 1
fact = 1

# Calculate the factorial using a for loop
for i in range(1, n + 1):
    fact *= i

print(fact)



import math

# Lambda function to calculate square root using math.sqrt()sqrt_lambda_math = lambda x: math.sqrt(x)# Example usagenumber = 25result = sqrt_lambda_math(number)print(f"The square root of {number} using math.sqrt() is: {result}")


program 3

# using lambda with max() function

find_max = lambda a, b, c: max(a, b, c)


result = find_max(10, 5, 8)


print(&quot;Maximum Number :&quot;, result)


prg4 for filter , lambda concepts

a = [1, 2, 3, 4, 5]


res = list(filter(lambda num: num % 2 == 0, a))

print(res)


output

[2, 4]

8, ఆగస్టు 2025, శుక్రవారం

cyber security.............

 Volume-based attacks, also known as volumetric attacks, are a type of DDoS attack that flood a target with massive amounts of network traffic, overwhelming its resources and causing service disruptionsThese attacks are typically measured in bits per second (bps), packets per second (pps), or connections per second (cps). The goal is to saturate the target's bandwidth and processing power, making it unable to handle legitimate traffic


Application-based attacks exploit vulnerabilities in software applications to gain unauthorized access, disrupt functionality, or steal dataThese attacks can target various layers of an application, including the web, API, and mobile application layers. Common types include injection attacks, cross-site scripting (XSS), cross-site request forgery (CSRF), and denial-of-service (DoS/DDoS) attacks. 

A URL interpretation attack, also known as a semantic URL attack, occurs when an attacker manipulates the parameters of a URL to exploit vulnerabilities in how a web application interprets the URL's syntax and semantics. This can lead to unauthorized access to resources, modification of data, or other unexpected behavior


A dictionary attack is a type of cyberattack where hackers try to guess passwords by systematically trying words from a pre-defined list (a "dictionary") of common passwordsThis method exploits the fact that many people use predictable or easily guessed passwords. Attackers use automated tools to rapidly input these potential passwords until they find a match, gaining unauthorized access to systems or data


Protocol-based attacks are a type of DDoS (Distributed Denial of Service) attack that exploits weaknesses in network protocols, particularly at Layers 3 and 4 of the OSI modelThese attacks aim to disrupt a service by overwhelming a target's resources with malicious connection requests or by exploiting protocol vulnerabilities to exhaust server capacity.