12th New IT ITES 2023 Sehrish Majid - 081903
12th New IT ITES 2023 Sehrish Majid - 081903
12th New IT ITES 2023 Sehrish Majid - 081903
IT/ITES 12 TH CLASS
Complete Notes
Created By
Sehrish Majid
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
EMPLOYABILITY SKILLS------------------10-MARKS
IT/ITES Job Role: Junior Software Developer SUBJECT CODE:- 050 EXAMINATION CODE:- ITE
Communication
Communication is a two-way process through which information or message is exchanged between individuals
using language, symbols, signs or behavior. Speaking, listening, reading and writing are the parts of
communication, which help us to understand others. To learn a language, one needs to develop four key skills,
namely listening, speaking, reading and writing as shown in Figure
Q. Introduction to Listening?
Every effective conversation starts with listening. Listening skill is one of the most important skills in
communication. It is important to learn to give undivided attention to a person with whom a conversation is
taking place.
2
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Introduction to Self-management
It is also referred to as ‘self-control’, is the ability to control one’s emotions, thoughts and behavior effectively
in different situations. This includes motivating oneself, and working towards achieving personal and academic
goals. It helps a person to do better in studies or work. In order to do well at work and life, in general, one must
be able to manage and improve oneself in various skills, including timeliness, discipline, problem solving and
work habits. To manage oneself well, a person needs to develop the following.
3
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Positive thinking: to think that one can get things done and be happy.
Result orientation: to dream big and achieve the desired or set results.
Self-awareness: to be aware of one’s personality traits and make the best out of one’s strengths.
Students with strong self-management skills are better at doing certain things well, such as coming to
class on time, paying attention, obeying teachers, parents and elders, working with discipline, etc.
Following are some ways that can help one maintain a positive attitude.
Start the day with a morning routine. Say positive affirmations, smile often and think about the tasks to be
accomplished during for the day.
Feed the mind with positivity, read motivating books, listen to music with uplifting lyrics, watch
inspiring movies, etc.
Be proactive. A proactive person decides how one must feel regardless of what may be going around or
what the day may bring.
Focus on constructive and positive things. Do not approach life with ‘problems’. Approach it with
‘solutions’.
Learn from failures. Think what could have been better and work towards the goals.
Learn to focus on the present. Negativity mostly stems out from anxiety of the past and future events.
Move towards your goals and dreams. Be cheerful and work hard to achieve the dreams.
Healthy diet: A healthy and balanced diet is important for a healthy body and mind. Eating a balanced diet,
such as daal, roti, green vegetables and fruits provides the strength required to do daily work efficiently.
Adequate sleep:
A good night sleep for at least seven hours is important so that the mind and body can get recharged to
function better the next day.
4
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Q. Define Motivation?
Motivation is derived from the word ‘motive’. Thus, directing behaviour towards certain motive or goal is the
essence of motivation. An individual’s motivation may come from within (intrinsic motivation) or be inspired by
others or events (extrinsic motivation).
Intrinsic motivation
It includes activities for which there is no apparent reward but one derives enjoyment and satisfaction in doing
them. It occurs when people are internally motivated to do something because it brings them pleasure. They
think it is important or feel what they are learning is significant. Incentives related to the motive or goal can
satisfy one’s needs.
Extrinsic motivation
It arises because of incentives or external rewards. Lack of motivation or incentives may lead to frustration, for
example, employees who are kept on contractual basis for a long time may get frustrated and leave an
organisation.
Q. What is Personality?
The word "personality" stems from the Latin word persona, which refers to a theatrical mask worn by
performers to play roles or disguise their identities.
Personality is a cluster of thoughts, feelings and behaviors that make a person unique and different from
others. One’s personality also affects the person’s relationships with others. A positive personality can lead to
better performance, increased productivity and cordial relationships with others. Examples of personality can
be found in how we describe other people's traits. For instance, "She is generous, caring, and a bit of a
perfectionist," or "They are loyal and protective of their friends."
5
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Openness:
Individuals with openness to experience are, generally, creative, curious, active, flexible and
adventurous. If a person is interested in learning new things, meeting new people and making friends,
and likes visiting new places, the person can be called open-minded.
Consciousness:
Individuals, who listen to their conscience, are self-disciplined, do their work on time, take care of
others before themselves and care about others’ feelings.
Extraversion:
Extroverts are individuals, who love interacting with people around and are, generally, talkative. A
person, who can easily make friends and make any gathering lively, is confident and an extrovert.
Agreeableness:
Individuals having such a trait are, generally, kind, sympathetic, cooperative, warm and considerate.
They accommodate themselves in any situation. For example, people who help and take care of others
are, generally, agreeable.
Neuroticism:
Neuroticism is a trait, wherein, individuals show tendency towards anxiety, self-doubt, depression,
shyness and other similar negative feelings. People, who have difficulty in meeting others and worry
too much about things, show signs of neuroticism.
6
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
7
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Introduction to Spreadsheet
A spreadsheet is an electronic document, which has rows and columns. It is used to store data in a systematic
way and do calculations.
For example, a grocery shop has many items. The shopkeeper keeps a track of the total quantity of each item,
quantity sold, cost and selling price of each item, etc. All these details can be maintained using a spreadsheet as
shown in Table 3.1 below. It will also help the shopkeeper do difficult calculations easily, such as finding out
profit or loss.
Types of spreadsheet
There are many types of spreadsheet available that have been created by different companies. Some of the
most popular ones are given in Figure 3.1.
8
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Components of a spreadsheet
9
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
2. If you're saving the file for the first time, the Save As pane will appear in Backstage view.
3. You'll then need to choose where to save the file and give it a file name. Click Browse to select
a location on your computer. You can also click OneDrive to save the file to your OneDrive.
10
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
4. The Save As dialog box will appear. Select the location where you want to save the
presentation.
5. Enter a file name for the presentation, then click Save.
6. The presentation will be saved. You can click the Save command again to save your changes as
you modify the presentation.
You can also access the Save command by pressing Ctrl+S on your keyboard.
2. Click Browse. Alternatively, you can choose OneDrive to open files stored on your OneDrive.
11
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
3. The Open dialog box will appear. Locate and select your presentation, then click Open.
12
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Figure 3.12: Printing the spreadsheet Figure 3.13: Print dialog box
13
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
can be of many kinds, including new products — like adding varieties, new services like home delivery or
credit services, new marketing ideas, new cost reduction ideas and many more.
Economists define an entrepreneur as someone, who brings in resources, labour, material and other
assets into profit making combinations.
Psychologists define an entrepreneur as a person, who is, typically, driven by a psychological force,
which creates a desire to obtain or attain something.
Sociologists define an entrepreneur as a person, whose actions would determine social status and
contribute to societal development.
Service entrepreneurs
These entrepreneurs either create a new market for their services or provide a service in an existing
market. They spot an idea and convert it into a service, which is unprecedented or not available in the
market. It is irrespective of the nature and size of operations but is essentially a service.
14
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Business entrepreneurs
These are entrepreneurs, who undertake business and trading activities and are not concerned with
the manufacturing work. A business entrepreneur identifies the potential of a product in a market.
From that point onwards, the business and trading entrepreneur is responsible for stimulating demand
for the product.
Industrial entrepreneurs
An industrial entrepreneur is, essentially, a manufacturer, who identifies the needs of customers and
creates products or services to serve them. Such an entrepreneur is product oriented, who starts
through an industrial unit to create a product like electronic industry, textile unit, machine tools,
manufacturing unit, etc.
Agricultural entrepreneurs
Agriculture has always been considered as a low‑yielding entrepreneurship. Agriculturists have now
introduced new and innovative technology to maximise the yield, giving birth to agriculture
entrepreneurship.
Technical entrepreneurs
The Industrial Revolution gave birth to technical entrepreneurs, who use their technical expertise to
create and offer machines, tools and methods. They constantly innovate to make industrial processes
seamless and efficient. Technical entrepreneurs use their technical knowledge and skills to innovate.
Non-technical entrepreneurs
These entrepreneurs use their expertise in providing services to create a market for technical
entrepreneurs. Their expertise is in non-technical aspects of a product or service, i.e., they are not
concerned with the manufacturing process but have more to do with before and after the
manufacturing process.
Professional entrepreneurs
Such an entrepreneur starts a business, nurtures it and makes it reach a point of self-sustenance. Once
the project reaches that point, the entrepreneur sells the business and starts a new one, and then,
follows the same cycle.
IT entrepreneurs
People who take up entrepreneurship in the field of Information Technology (IT) are called IT
entrepreneurs.
Women entrepreneurs
As the name suggests, when women take up entrepreneurship, they are called women entrepreneurs.
A number of women entrepreneurs are taking initiatives in starting entrepreneurial activities and many
of them have even made it to the top.
Social entrepreneurs
Individuals, who focus on developing solutions that benefit the society, are called social entrepreneurs.
The term ‘social innovator’ is used interchangeably with social entrepreneurs.
15
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Personal barriers
How long will the business last? How much profit will it make? Will my customers like my product? Will I have
enough money to support my family? These are the questions that might go through an entrepreneur’s mind
before the person actually starts a business venture. Establishing any new venture is a risk because there is
always a fear of what may go wrong. Secondly, finding a suitable team is also a tedious job. A team of careless
and non-suitable workers may cause damage to a business.
(a). Self-doubt
It is easy to get discouraged when something goes wrong in a business. One starts doubting oneself and
may even feel like giving up. Self-doubt comes when we do not have confidence in ourselves and our
abilities.
(b). Forming a team and teamwork
Finding suitable people and training them to put in their best for the business is a tedious and difficult
exercise. As an entrepreneur, one must find people, who think and feel like the rest of the team. When
new people fit into the culture of the team, work can happen better and faster.
16
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Organic fruits and vegetables are free from chemical residues of synthetic fertilisers, and hence, are
good for our health. Farmers’ cooperatives are one of the most effective means of reducing the risk in
agriculture and strengthening the livelihoods of small and marginal farmers.
Some green jobs in the agriculture sector are in organic farming, integrated pest management, farm
mechanisation and agriculture tourism. The Krishi Vigyan Kendras (KVKs) set up by the government, can
be utilised to provide support activities like technology dissemination, training awareness to the local
youth and farmers for collection, storage and reuse of agro waste.
The EESL seeks to create market for electric vehicle, a technology poised to boost e mobility in the
country. The emergence of electric drives as an alternate to internal combustion engines has opened
opportunities for new entrants in the automotive market.
These do not consume electricity and provide a way for people to exercise. Using bamboo channels for
drip irrigation is an eco-friendly way to irrigate the land. It uses water efficiently without any wastage.
It is cheaper to build, and after 2–3 years when the bamboo rots, it can be added to the soil as manure.
17
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Some common jobs in this sector are roofer, solar panel installation technician and field technician.
18
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Introduction to DBMS
A database system is basically a computer record keeping system. Limitations
faced in file system can be overcome by storing the data in a database where data
are logically related. We can organise related data in a database so that it can be
managed in an efficient and easy way.
A database management system (DBMS) or database system in short, is a
software that can be used to create and manage databases. DBMS lets users to
create a database, store, manage, update/modify and retrieve data from that
database by users or application programs.
19
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
5.Faster data Access: The Data base management system (DBMS) helps to produce
quick answers to database queries thus making data accessing faster and more
accurate.
6.Better decision making: Due to DBMS now we have Better managed data and
Improved data accessing because of which we can generate better quality information
hence on this basis better decisions can be made. Better Data quality improves
accuracy, validity and time it takes to read data. DBMS does not guarantee data quality,
it provides a framework to make it is easy to improve data quality.
7.Simple: Data base management system (DBMS) gives simple and clear logical view of
data. Many operations like insertion, deletion or creation of file or data are easy to
implement.
20
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
For example, each row in the table represents a related set of values. Each row of
Table 1 represents a particular guardian and has related values viz. guardian‘s ID
with guardian name, address and phone number. Thus, a table consists of a
collection of relationships.
Similarly, attribute GUID is placed with STUDENT table for extracting guardian
details of a particular student. If linking attributes are not there in appropriate
relations, it will not be possible to keep the database in correct state and retrieve
valid information from the database.
Figure 1 shows the relational database Student Attendance along with the three
relations (tables) STUDENT, ATTENDANCE and GUARDIAN.
iii.Domain:
It is a set of values from which an attribute can take a value in each row. Usually, a data
type is used to specify domain for an attribute. For example, in STUDENT relation, the
attribute RollNumber takes integer values and hence its domain is a set of integer
values. Similarly, the set of character strings constitutes the domain of the attribute
SName.
iv. Degree:
The number of attributes in a relation is called the Degree of the relation. For example,
relation GUARDIAN with four attributes is a relation of degree 4.
21
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
v. Cardinality:
The number of tuples in a relation is called the Cardinality of the relation. For example,
the cardinality of relation GUARDIAN is 5 as there are 5 tuples in the table.
1.Candidate Key:-
A relation can have one or more attributes that takes distinct values. Any of these
attributes can be used to uniquely identify the tuples in the relation. Such
attributes are called candidate keys as each of them are candidates for the
primary key.
As shown in Figure, the relation GUARDIAN has four attributes out of which
GUID and GPhone always take unique values. No two guardians will have same
phone number or same GUID. Hence, these two attributes are the candidate keys
as they both are candidates for primary key.
2.Primary Key:-
A primary key is a set of one or more attributes that can uniquely identify tuples
within the relation.
Out of one or more candidate keys, the attribute chosen by the database designer
to uniquely identify the tuples in a relation is called the primary key of that
relation.
The remaining attributes in the list of candidate keys are called the alternate
keys.
A candidate key that is not the primary key is called as Alternate Key.
In the relation GUARDIAN, suppose GUID is chosen as primary key, then GPhone
will be called the alternate key.
3.Composite Key:-
If no single attribute in a relation is able to uniquely distinguish the tuples, then
more than one attribute are taken together as primary key. Such primary key
consisting of more than one attribute is called Composite Primary key.
22
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
4.Foreign Key:-
A non-key field(attribute) of a table that refers to the primary key of another
table(relation).
A foreign key is used to represent the relationship between two relations. A foreign
key is an attribute whose value is derived from the primary key of another
relation.
This means that any attribute of a relation (referencing), which is used to refer
contents from another (referenced) relation, becomes foreign key if it refers to the
primary key of referenced relation.
The referencing relation is called Foreign Relation. In some cases, foreign key can
take NULL value if it is not the part of primary key of the foreign table. The
relation in which the referenced primary key is defined is called primary relation
or master relation.
In Figure 5, two foreign keys in Student Attendance database are shown using
schema diagram where the foreign key is displayed as a directed arc (arrow)
originating from it and ending at the corresponding attribute of the primary key of
the referenced table. The underlined attributes make the primary key of that
table.
23
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Data Types
We know that a database consists of one or more relations and each relation
(table) is made up of attributes (column). Each attribute has a data type. We can
also specify constraints for each attribute of a relation.
Data type of an attribute indicates the type of data value that an attribute can
have or in other words the type of data that a variable can hold. It also decides
the operations that can be performed on the data of that attribute.
For example, arithmetic operations can be performed on numeric data but not on
character data. Commonly used data types in MySQL are numeric types, date and
time types, and string types .
24
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Syntax:
CREATE TABLE tablename ( attributename1 datatype constraint, attributename2
datatype constraint, attributenameN datatype constraint);
Create table STUDENT.
ALTER Table
After creating a table, we may realise that we need to add/remove an attribute or
to modify the datatype of an existing attribute or to add constraint in attribute. In all
such cases, we need to change or alter the structure (schema) of the table by using
the alter statement.
25
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
4.Remove An Attribute:-
Syntax:
ALTER TABLE table_name DROP attribute_name
Example:
ALTER TABLE Guardian DROP Income;
DROP Database
Syntax:
DROP DATABASE Database_name
Example:
DROP DATABASE GGHSSMagam;
DROP Table
Syntax:
DROP TABLE table_name
Example:
DROP TABLE Guardian;
INSERTION of Records
i.Insertion of records (For all attributes/Fields)
Syntax:
INSERT into Table_Name Values(Value1, Value2,…..)
Example:
INSERT into Guardian Values(4444, ‟Gowhar‟, 7006123456, „Surasyar Budgam‟);
ii.Insertion of records (For Some attributes/Fields)
Syntax:
INSERT into Table_Name (Column1, Column4) Values(Value1, Value4)
Example:
INSERT into Guardian (GUID, GAddress) Values(5555, „Magam‟)
SELECT Statement
The SQL Statement SELECT is used to retrieve data from the tables in a database
and the output is also displayed in tabular form.
Syntax:
SELECT Attribute1,Attribute2 FROM Table_Name WHERE condition
Example:
SELECT Sname, SDOB FROM student WHERE RollNumber =1;
To select all the data available in a table
Syntax:
SELECT * from Table_Name
Example:
SELECT * from student:
26
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
DATA Updation
Syntax:
UPDATE Table_Name set attributes1=value1, attribute2= value2,………..where condition
Example:
UPDATE student Set GUID=1010 where RollNumber=3;
DATA Delection
Syntax:
DELETE from table_name WHERE condition;
Example:
Delete from student where RollNumber=2;
Aggregate Functions
i.Max (Maximum)
SELECT Max(Marks) from student;
ii.Min (Minimum)
SELECT Min(Marks) from student;
iii.Average
SELECT Average(Height) from student;
iv.Sum
SELECT Sum(Fee) from student;
v.Count(*)
SELECT Count(*) from student;
27
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
SDLC Phases
Phase 1: Requirement collection/Planning and analysis
Phase 2: Feasibility study
Phase 3: System Design
Phase 4: System Implementation/Coding
Phase 5: System Testing
Phase 6: System Installation/Deployment
Phase 7: System Maintenance
28
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Phase 2: Design
In this phase, the system and software design documents are prepared as per the requirement
specification document. This helps define overall system architecture. This design phase serves as input
for the next phase of the model. There are two kinds of design documents developed in this phase:
Before you put out the actual software, it is important to know how it will work, perform various
functions and what will be the algorithms used for solving the problems.
The software is then reviewed and alterations can be made based on the feedback of the team and the
partners in the Software Development process.
All of this is covered in the design phase of the Software Development Life Cycle.
Phase 4: Coding/Implementation
Well, it is now time to start with actually building and developing our software. This is the part where
programmers and developers play their role. The design for our software which was previously finalized
and the prototypes which were made before, now take form of the actual software.
In this phase, developers start build the entire system by writing code using the chosen programming
language. In the coding phase, tasks are divided into units or modules and assigned to the various
developers. It is the longest phase of the Software Development Life Cycle process.
In this phase, Developer needs to follow certain predefined coding guidelines. They also need to use
programming tools like compiler, interpreters, debugger to generate and implement the code.
Phase 5: Testing
Now, it is time that we answer the question of ‘Did we succeed in developing what we wanted our
software to be?” To answer this question, we have the testing phase.
Once the software is complete, and it is deployed in the testing environment. The testing team starts
testing the functionality of the entire system. This is done to verify that the entire application works
according to the customer requirement. During this phase, testing team may find some bugs/defects
which they communicate to developers. The development team fixes the bug and send back to theteam
for a re-test. This process continues until the software is bug-free, stable, and working according to the
business needs of that system.
29
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Phase 6: Installation/Deployment
Once the software testing phase is over and no bugs or errors left in the system then the final deployment
process starts. So, after going through the above phases of the Software Development Life Cycle, we now are
ready to install this software and start using it.
Phase 7: Maintenance
Once the system is deployed, and customers start using the developed system, following 3 activities occur
Bug fixing – bugs are reported because of some scenarios which are not tested at all
Upgrade – Upgrading the application to the newer versions of the Software.
Enhancement – Adding some new features into the existing software.The main focus of this SDLC phase
is to ensure that needs continue to be met and that the system continues to perform as per the
specification mentioned in the first phase.
30
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Unit Testing
It is a software testing technique by means of which individual units of software i.e. group of computer
program modules, usage procedures, and operating procedures are tested to determine whether they
are suitable for use or not. It is a testing method using which every independent module is tested to
determine if there is an issue by the developer himself. It is correlated with the functional correctness
of the independent modules.
Unit Testing is defined as a type of software testing where individual components of a software are
tested. Unit Testing of the software product is carried out during the development of an application. An
individual component may be either an individual function or a procedure. Unit Testing is typically
performed by the developer.
In SDLC Unit testing is the first level of testing done before integration testing. Unit testing is such a
type of testing technique that is usually performed by developers. Although due to the reluctance of
developers to test, quality assurance engineers also do unit testing.
White-Box Testing:
The technique of testing in which the tester is aware of the internal workings of the product, has access to its
source code, and is conducted by making sure that all internal operations are performed according to the
specifications is known as white box testing.
Advantages:
1. White box testing is very thorough as the entire code and structures are tested.
2. It results in the optimization of code removing error and helps in removing extra lines of code.
3. It can start at an earlier stage as it doesn’t require any interface as in case of black box testing.
4. Easy to automate.
5. White box testing can be easily started in Software Development Life Cycle.
6. Easy Code Optimization.
31
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
32
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Introduction of Iterations:-
A basic building block of all programs is to be able to repeat some code over and over
again. Whether it is updating the bank balances of millions of customers each night, or
sending email messages to thousands of people programming involves instructing the
computer to do many repetitive actions. In computing, we refer to this repetitive
execution as iteration. In this section, we will explore some mechanisms for basic
iteration.
Python programming language provides the following types of loops to handle
looping requirements. Python provides three ways for executing the loops. While
all the ways provide similar basic functionality, they differ in their syntax and
condition-checking time.
Syntax:
while expression:
statement(s)
33
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Output
Hello Geek
Hello Geek
Hello Geek
n=4
for i in range(0, n):
print(i)
Output
0
1
2
3
Continue Statement
The continue statement in Python returns the control to the beginning of the loop.
34
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Output
Current Letter : g
Current Letter : k
Current Letter : f
Current Letter : o
Current Letter : r
Current Letter : g
Current Letter : k
Break Statement
The break statement in Python brings control out of the loop.
Output
Current Letter : e
Output
Hello Geek
Hello Geek
Hello Geek
In Else Block
35
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
The syntax for a nested while loop statement in the Python programming language is as
follows:
while expression:
while expression:
statement(s)
statement(s)
A final note on loop nesting is that we can put any type of loop inside of any other type
of loop. For example, a for loop can be inside a while loop or vice versa.
Output
1
22
333
4444
Python Program:
Using for loop to iterate over a string in Python
string_to_iterate = "Data Science"
for char in string_to_iterate:
print(char)
36
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
S
c
i
e
n
c
e
Python, String operators represent the different types of operations that can be
employed on the program’s string type of variables. Python allows several string
operators that can be applied on the python string are as below:
Assignment operator: “=.”
Concatenate operator: “+.”
String repetition operator: “*.”
String slicing operator: “[]”
String comparison operator: “==” & “!=”
Membership operator: “in” & “not in”
Escape sequence operator: “\.”
String formatting operator: “%” & “{}”
Membership operators are used to test if a sequence is presented in an object:
Operator Description Example Try
it
== Equal x == y Try it »
37
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
<= Less than or equal to x <= y Try it »
38
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Output
Converted String:
GEEKS FOR GEEKS
Converted String:
geeks for geeks
Converted String:
Geeks For Geeks
Converted String:
GEEkS fOR GEeKs
Original String
geeKs For geEkS
39
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Machine Learning
Machine learning is an application of artificial intelligence (AI) that provides systems the ability to
automatically learn and improve from experience without being explicitly programmed. Machine
learning focuses on the development of computer programs that can access data and use it learn for
themselves.
These algorithms, called models, are first trained and tested using a training data and testing data,
respectively. After successive trainings, once these models are able to give results to an acceptable
level of accuracy, they are used to make predictions about new and unknown data.
40
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Figure shows that at the current pace, around 2.5 quintillion bytes of data are created each day, and
the pace is increasing with the continuous evolution of the Internet of Things (IoT).This results in the
generation of data sets of enormous volume and complexity called Big Data. Such data cannot be
processed and analysed using traditional data processing tools as the data is not only voluminous, but
also unstructured like our posts, instant messages and chats, photographs that we share through
various sites, our tweets, blog articles, news items, opinion polls and their comments, audio/video
chats, etc.
Big data not only represents voluminous data, it also involves various challenges like integration,
storage, analysis, searching, processing, transfer, querying and visualisation of such data. Big data
sometimes hold rich information and knowledge which is of high business value, and therefore there is
a keen effort in developing software and methods to process and analyse big data.
41
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
At present, in a typical household, many devices have advanced hardware (microcontrollers) and
software. These devices are used in isolation from each other, with maximum human intervention
needed for operational directions and input data.
IoT tends to bring together these devices to work in collaboration and assist each other in creating an
intelligent network of things. For example, if a microwave oven, an air conditioner, door lock, CCTV
camera or other such devices are enabled to connect to the Internet, we can access and remotely
control them on-the-go using our smartphone.
42
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
its configuration. It provides a deployment environment for developers at a much reduced cost
lessening the complexity of buying and managing the underlying hardware and software.
Q. Introduction to Cybercrime.
Cybercrime or a computer-oriented crime is a crime that includes a computer and a network. The computer
may have been used in the execution of a crime or it may be the target. Cybercrime is the use of a computer as
a weapon for committing crimes such as committing fraud, identity theft, or breaching privacy. Cybercrime,
especially through the Internet, has grown in importance as the computer has become central to every field
like commerce, entertainment, and government. Cybercrime may endanger a person or a nation’s security and
financial health.
Cybercrime can generally be divided into two categories:
1. Crimes that aim at computer networks or devices. These types of crimes involve different threats (like virus,
bugs etc.) and denial-of-service (DoS) attacks.
2. Crimes that use computer networks to commit other criminal activities. These types of crimes include cyber
stalking, financial fraud or identity theft.
Hacking
Criminal hacking is the act of gaining unauthorized access to data in a computer or network. Exploiting
weaknesses in these systems, hackers steal data ranging from personal information and corporate secrets to
government intelligence. Hackers also infiltrate networks to disrupt operations of companies and
governments.
Malware
Malware, or malicious software, refers to any code designed to interfere with a computer's normal functioning
or commit a cyber crime. Common types of malware include viruses, worms, trojans, and various hybrid
programs as well as adware, spyware, and ransomware.
Identity Theft
According to the FBI, identity theft occurs when someone “unlawfully obtains another individual's
personal information and uses it to commit theft or fraud”. Not all identity thefts are a result of cyber
attacks, but malware such as trojans and spyware are often used to steal personal information.
A common method for perpetrating identity theft, phishing refers to a method used by cyber criminals
to obtain confidential information using emails or texts. Scammers pose as a trusted source (often a
43
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
bank or well-known company) and trick recipients into providing personal information, such as account
passwords and social security numbers.
Social Engineering
Social engineering is the psychological manipulation of people into performing actions or divulging confidential
information. Cyber criminals use social engineering to commit fraud online. Platforms such as online dating
sites provide opportunities to initiate conversations with potential victims. Once the criminal establishes a
relationship with the target and gains their trust, the criminal asks for money or information.
44
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
45
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Q. Define Copyright?
The term ‘copyright’ concerns the rights of the creators/authors of literary and artistic works. A copyright is
also called a ‘literary right’ or ‘author’s right’. Copyright gives an author exclusive rights to his creation and
prevents the copying and unauthorised publishing of his work. Copyright protection begins at the very moment
a work is created and expressed in some tangible form. Copyright protection is granted to a work that is an
original creation.
Copyright protects the following two rights of the author:
1. Economic rights i.e., the right of the owner to derive financial benefit from the use of their works by
others. For instance, the right to prohibit or authorise reproduction of the work in various forms,
the right to prohibit unauthorised translation of the work, etc.
2. Moral rights i.e., protection of non-economic interests of the author. For instance, the right to
oppose changes to work and the right to claim authorship, etc.
Q. Define Patents?
A patent is an exclusive right granted for an invention or innovation, which might be a product, a method or a
process, that introduces a novel way of doing something or offers a new technical solution to a problem. In
other words, it is a right of monopoly granted to a person who has invented:
1. a new and useful article, or
2. improvement of an existing article, or
3. a new process of making an article.
A patent is granted for inventions having industrial and commercial value. It is the exclusive right to
manufacture the new article/manufacture the article with the invented process for a limited period of time
(usually 20 years from the filing date of the application) in exchange for disclosure of the invention. A patent
owner can sell his patent or grant licence to others to exploit the same.
Sleep disorders
We love our devices so much that many of us even sleep with them. One study found that 71 percent
of smartphone owners keep their phone next to their bed at night to ensure they don’t miss a thing.
Another study found that over 40 percent of bedside smartphone users wakeup from noises or lighting
from notifications coming from their device.
National Sleep Foundation and Swedish researchers discovered a link between heavy cell phone use
and increased sleep disorders in both men and women.
46
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
Physical inactivity
When we’re using technology like computers, video games or TVs, we generally aren’t exercising.
That’s why there’s an increasing body of research linking the overuse of digital devices to decreasing
exercise and fitness levels.
Logically, spending more time on the couch and watching TV or playing video games reduces the time
you spend staying active. However, the link between obesity and gaming is marginally associated to
weight gain in adults
Mental Health
More than three billion people interact with each other over social media every day. While many of our
exchanges are generally harmless, overusing these services can impact our well-being. Social media
addiction is linked to a rise in mental health disorders like depression suicidal ideation, particularly in
teenagers.
Researchers made that correlation by highlighting how platforms like Facebook, Instagram, and Twitter
place higher social pressures on young people and adults that can lead to instances of cyberbullying,
increased need for approval, and general feelings of discontent.
47
Notes Compiled By -----Sehrish Majid Mob.:-7006647085
48