6, జులై 2025, ఆదివారం

now offering ruby , ADV RUBY , perl. ADV PERL, tcl SL's.............Write a function to calculate the roots of a Quadratic equation, where you give the coefficients a,b,c to the function, and it returns both the values of x

 PERL :Data Types, Variables, Scalars, Operators, Conditional statements , Loops, Arrays ,Strings ,Hashes, Lists,Built-inFunctions,Patternmatchingandregularexpressionoperators.

ADV PERL......

Ruby:Datatypes,Variables,Operators,Conditionalstatements,Loops,Methods,Blocks,Modules,Arrays,Strings,Hashes,FileI/O,RubyForm handling.

ADV RUBY........

TOOL COMMAND LANGUAGE..................


print "Hello world";
exit();
my $divisionResult = 4000/7;
print "Result of 4000 divided by 7 is $divisionResult";
sub evaluate_delta_and_answer {
        my($x,$y,$z) = @_;
        if ($x != 0) {
                $delta = ($y**2 - (4 * $x * $z));
                if ($delta < 0) {
                        print "b^2-4ac is less than zero. Both roots undefined.\n\n";
                        print "Program Terminated. Goodbye, Dave.\n\n"
                        }
                elsif ($delta == 0) {
                        $root = (0 - $y) /(2 * $x );
                        print "b^2-4ac = 0. There will be only one root: " . $root . "\n\n";
                        print "Goodbye, Dave.\n\n";
                        }
                elsif ($delta > 0) {
                        print "b^2-4ac > 0. There will be two roots.\n\n";
                        $root1 = ((0 - $y) - ($delta)**(0.5)) / (2 * $x);
                        $root2 = ((0 - $y) + ($delta)**(0.5)) / (2 * $x);
                        print "The first root, x1 = " . $root1 . "\n\n";
                        print "The second root, x2 = " . $root2 . "\n\n";
                        print "Goodbye, Dave.\n\n";
                        }
        }
        else {
                print "a = 0. This is not a quadratic function.\n";
                print "Goodbye, Dave.\n";
        }
}

The rest of the program:

print "This program takes three numbers (a, b and c) as coefficients\n";
print "of a quadratic equation, calculates its roots, and displays them\n";
print "on the screen for you.\n\n";
print "Please enter the value of a and press <ENTER>: ";
$a = <STDIN>;
print "\n";
print "Please enter the value of b and press <ENTER>: ";
$b = <STDIN>;
print "\n";
print "Please enter the value of c and press <ENTER>: ";
$c = <STDIN>;
print "\n";

evaluate_delta_and_answer($a,$b,$c);
offering for B.TECH 4TH Yr ......Mr.RAM.A.DAYINABOYINA FOR C.S.CYBERSECURITY..........
CS742PE: CYBER SECURITY (Professional Elective – IV)
B.Tech. IV Year I Sem. L T P C
3 0 0 3
Course objectives:
 To understand various types of cyber-attacks and cyber-crimes.
 To learn threats and risks within the context of cyber security.
 To have an overview of the cyber laws & concepts of cyber forensics.
 To study the defensive techniques against these attacks.
Course Outcomes:
1. Analyze and evaluate the cyber security needs of an organization.
2. Understand Cyber Security Regulations and Roles of International Law.
3. Design and develop security architecture for an organization.
4. Understand fundamental concepts of data privacy attacks.
UNIT- I
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security, Vulnerability,
threat, Harmful acts, Internet Governance – Challenges and Constraints, Computer Criminals, CIA
Triad, Assets and Threat, motive of attackers, active attacks, passive attacks, Software
attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber
Espionage, etc., Comprehensive Cyber Security Policy.
UNIT - II
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations, Roles of
International Law. The INDIAN Cyberspace, National Cyber Security Policy.
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for
Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email, Digital
Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics.
UNIT - III
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security
Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service
Security, Attacks on Mobile/Cell Phones, Organizational security Policies and Measures in Mobile
Computing Era, Laptops.
UNIT- IV
Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR issues, web
threats for organizations, security and privacy implications, social media marketing: security risks and
perils for organizations, social computing and the associated challenges for organizations.
UNIT - V
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy Attacks, Data
linking and profiling, privacy policies and their specifications, privacy policy languages, privacy in
different domains- medical, financial, etc.
Cybercrime: Examples and Mini-Cases
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose Millions of
Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing instances.
Mini-Cases: The Indian Case of online Gambling, An Indian Case of Intellectual Property Crime,
Financial Frauds in Cyber Domain.

కామెంట్‌లు లేవు:

కామెంట్‌ను పోస్ట్ చేయండి