Merged Answer Key - Merged
Merged Answer Key - Merged
EXPLANATORY MEMORANDUM
The revenue working expenses of the Railways are classified under 13 sub-major heads with a
separate Abstract for each Sub-major head, viz.-
The revenue working expenses of the Railways are classified under 13 sub-major heads with a
separate Abstract for each Sub-major head, viz.-
The Sub-major heads are divided into minor, sub, and detailed heads as shown in the
accompanying classification. The introduction or abolition or change of nomenclature of any
minor or sub head, the transfer of a sub-head or detailed head from one minor head or sub head
to another, and any rearrangement of abstracts are not within the competence of a Railway
Administration. But the Financial Adviser and Chief Accounts Officer of a Railway may with the
approval of the General Manager introduce a new detailed head within a sub-head except when
the necessity arises of a new class of expenditure, in which case the orders of the Railway
Board should be obtained as to the sub-head under which the detailed head should appear.
When, however, a new detailed head is opened by Railway Administration, the Railway Board
should be informed.
The structure of the accounts classification is such that it corresponds to and is in line with the
revised classification of the Demands for Grants. While the alpha (i.e. the letter of the Abstract)
corresponds to the Demand head, the minor, sub-head and detailed heads of accounts,
represent classification of the activity from a broad grouping into its details. The classification
lends itself to computerisation and its utility from the point of view of analysis of costs will be
greater when the compilation is taken on the computer in due course of time. On
computerisation of the accounting system, the alpha of the abstract classification will be
substituted by a Numerical Code as follows:-
A-03, B-04, C-05, D-06, E-07. F-08, G-09, H-10, J-11, K-12, L-13, M-14 & N-12
Which will be the same as for Demands for Grants. Under the manual system however it is
preferable to retain the alpha character of the Abstract classification in view of its age long
familiarity. In this connection, a summary of the Revised demand Structure-Demand for Grants
for Expenditure on Railways is given below:-
While the classification upto the detailed head represents only the activity, the structure of the
classification also incorporates a two digit code to represent the primary unit, i. e. the object of
the expenditure/indicating on "what" the expenditure is incurred viz., salary, allowances, wages,
materials, consumable stores etc. The indication of a classification of expenditure will, therefore,
be complete only if the Abstract, the minor, sub or detailed heads of activity as well as the code
of the object of expenditure are given, in that order for instance.
(i) The wages of the permanent gangs engaged in manual maintenance of a section of BG.
track (with sanctioned speed of 100 km.p.h. -- i.e. a group 'D' track) will be indicated as B. 241-
01.
(v) The kilometrage allowance of Diesel Loco crew will be indicated as F. 212-10.
(vi) The dearness allowance of train passing and Control office staff such as Station Masters,
Assistant Station Masters etc. will be indicated as G. 250-02 and so on,
It will be noted that last two digits show the "object" of expenditure.
Back
In order to make the new classification "function" and "activity'' oriented the following major
changes have been made in the new classification as compared to the existing ones: -
(i) The expenditure on salary and allowances of those officers who are directly connected with
the work of maintenance in the field will be charged to the respective Abstracts on Repairs and
Maintenance instead of to General Administration as at present e.g. Bridge Engineers in-charge
of Bridge Engineering Workshops, Workshop Officers (such as Superintendent of Workshops,
Works Managers etc.), Senior D. E. Es. In-charge of Electric Loco Sheds etc.
(ii) The expenditure on repairs and maintenance of staff quarters and welfare buildings which
used to be charged to existing Abstract 'A'-Maintenance of Way and Works will now be charged
to Abstract' 'J'--Staff Welfare and Amenities.
(iii) The Repairs and Maintenance of Plant and Equipment of all Departments which used to be
charged to the respective Maintenance Abstracts such as 'A', 'B','C' etc., will now be charged to
a separate Abstract for Repairs and Maintenance of Plant and Equipment viz., Abstract 'E'.
(iv) Operating Expenses for Rolling Stock and Equipment which is part of the existing Abstracts
'B', 'C', 'D', 'H' and 'J' will all be charged to a separate Abstracts for Operating Expenses for
Rolling Stock and Equipment viz., the new Abstract 'F' and Operating Expenses forming part of
existing Abstract 'E' and 'G' will be charged to Abstract 'G' and 'K'.
(v) The expenses of the Medical Department, which used to be charged to Abstract 'F' under
General Departments will now be included in new Abstract 'J' Staff Welfare and Amenities.
(vi) Expenditure of the Security Department and related expenses such as Order Police and
payment to State Governments in this connection, which used to be included under the existing
Abstract 'F' for General Departments will now be charged under Abstract 'K' for Miscellaneous
Working Expenses.
(vii) The retirement benefits to staff such as the contribution of bonus to S. R. P. F. gratuities,
Special contribution to Provident Fund which used to be charged to Abstract 'G' Miscellaneous
Expenses and the payment of the pension and other retirement benefits which were charged to
Abstract 'N' will now be charged to separate Abstract for Provident Fund, Pension and other
retirement benefits Abstract 'L'.
(viii) The Abstract 'K' for purposes of recording Miscellaneous Expenses includes the payment of
Compensation Claims, which used to be booked under different Abstracts under the existing
scheme.
(ix) The appropriation to Depreciation Reserve Fund which used to be booked under Abstract 'K'
and appropriation to Pension Fund which used to be booked under Abstract 'M ' under the
existing arrangement are now both booked under Abstract 'M '-Appropriation to Funds.
(x) The expenditure under Suspense which used to be charged to Abstract' I'-Suspense will now
be charged to Abstract 'N'-Suspense.
Back
Brief Description
ShrutLekhan-Rajbhasha, a Hindi speaker independent, continuous speech
recognition system is a milestone in the Speech technology that enables a
machine to recognize human speech (Hindi) and provide an output in Hindi
Unicode. This project has been developed by Applied AI Group, C-DAC,
Pune for Department of Official Language [DOL], Ministry of Home Affairs,
Government of India. Recognizer improves recognition through the use of
grammar (Language Module), which defines the vocabulary and syntax.
The user communicates with the application through the appropriate input
device i.e. a microphone. The Recognizer converts the analog signal into
digital signal for the speech processing. A stream of text is generated after
the processing.
Main uses and domain
Govt. department and employees & Individuals
Features and Technical Specifications
Features of the system:
Output is in UNICODE, a universally accepted font.
Facility to convert UNICODE text into ISFOC fonts.
Unicode Hindi typing help.
Runtime displaying Punctuation marks, Date, Number and Currency formats
Text correction facility.
Bilingual typing & editing facility.
Floating Toolbar provided for MS Word, MS Excel, MS Paint and Notepad
Off-line wave audio wave file input facility has been incorporated for the
user to transcribe his/her stored audio wave file into Hindi text.
Facility for typing through Inscript, Remington and Phonetic keyboards.
Technical Specifications:
Windows operating system (Vista, 7, 10)
Microphone
TOP
Contact Details for Techno Commercial
Information
C-DAC Pune, AAI Group
4th Floor, CDAC Innovation Park,
Panchwati Pashan , Pune -411 008
Phone No. : 020-25503335/255033305
Email: info[dot]aai[at]cdac[dot]in
CENTERS LINKS
Bengaluru About Us
Chennai Products & Services
Delhi R&D
Hyderabad Careers
Kolkata Tenders
Mohali Press Kit
Mumbai Video Gallery
Noida Events
Patna Awards
Pune Downloads
Silchar Achievements
Thiruvananthapuram Alliance
CONTACT US
TOP
Centre for Development of Advanced Computing
C-DAC Innovation Park,
Panchavati, Pashan, Pune - 411 008, Maharashtra (India)
Phone: +91-20-25503100
Fax: +91-20-25503131
Website owned & maintained by: Centre for Development of Advanced Computing (C-DAC)
© 2024 C-DAC. All rights reserved, Last Updated: Wednesday, May 8, 2019
TOP
Annual Programme for 2024-25 for use of Hindi
-12-
11. Website bilingual 100% 100% 100%
13. (i) Inspection by Ministries/ 25% (minimum) 25% (minimum) 25% (minimum)
Departments/ Offices of their
offices located outside their Headquarters
by the officers (DS/Dir/JS) and officers
of OL sections
(% of Offices)
(B) Town Official Language 02 meetings in a year (One meeting in every six months)
Implementation Committee.
15. Translation of Codes, Manuals, Forms, Procedural literature. 100% 100% 100%
(Minimum Sections)
40% in ‘A’ Region, 25% in ‘B’ Region and 15% in ‘C’ Region work
may be done in Hindi for those Public Sector Undertakings/
Corporations where there is no concept of sections.
- 13 -
Which of the following is a common database solution for mobile app
Listen
Some common database solutions for mobile app data management include:
SQLite
A lightweight, serverless, self-contained SQL database engine that's embedded in
the application. It's a good choice for mobile app developers because it's fast and
reliable.
MySQL
A well-known SQL database that's a popular choice for developers working with
structured datasets. It's a good choice for simple applications that won't change
much over time.
PostgreSQL
An open-source, object-based, and highly customizable RDBMS that's an excellent
alternative for iOS and Android apps.
MongoDB
A document-oriented database that uses JSON features. It's a good choice for
custom mobile app development services.
Realm DB
An embedded database that operates directly on the device.
ORMLite
A lightweight ORM library for Java and Android apps that simplifies mapping
database tables to objects with Java.
Core Data
A database for iOS apps that fetches data faster than SQLite and includes built-in
capabilities that lower the code developers write.
Other database solutions for mobile apps include: Amazon DynamoDB and
Cassandra.
How to Choose the Right Mobile App Database for Your Application
10 May 2023
Simform
Electronics Niketan,
6 CGO Complex,
New Delhi-110003
Page 1 of 8
And whereas, as per provisions of sub-section (6) of section 70B of the IT Act,
2000, CERT-In is empowered and competent to call for information and give
directions to the service providers, intermediaries, data centres, body corporate
and any other person for carrying out the activities enshrined in sub-section (4)
of section 70B of the IT Act, 2000.
And whereas, various instances of cyber incidents and cyber security incidents
have been and continue to be reported from time to time and in order to coordinate
response activities as well as emergency measures with respect to cyber security
incidents, the requisite information is either sometime not found available or
readily not available with service providers/data centres/body corporate and the
said primary information is essential to carry out the analysis, investigation and
coordination as per the process of law.
(i) All service providers, intermediaries, data centres, body corporate and
Government organisations shall connect to the Network Time Protocol
(NTP) Server of National Informatics Centre (NIC) or National Physical
Laboratory (NPL) or with NTP servers traceable to these NTP servers, for
synchronisation of all their ICT systems clocks. Entities having ICT
infrastructure spanning multiple geographies may also use accurate and
standard time source other than NPL and NIC, however it is to be ensured
that their time source shall not deviate from NPL and NIC.
(ii) Any service provider, intermediary, data centre, body corporate and
Government organisation shall mandatorily report cyber incidents as
mentioned in Annexure I to CERT-In within 6 hours of noticing such
incidents or being brought to notice about such incidents. The incidents can
be reported to CERT-In via email ([email protected]), Phone (1800-
11-4949) and Fax (1800-11-6969). The details regarding methods and
formats of reporting cyber security incidents is also published on the
website of CERT-In www.cert-in.org.in and will be updated from time to
time.
Page 2 of 8
Aptitude Engineering Mathematics Discrete Mathematics Operating System DBMS Computer Network
We use cookies to ensure you have the best browsing experience on our website. By
using our site, you acknowledge that you have read and understood our Cookie Policy & Got It !
Privacy Policy
Segmentation
Translation
We use cookies to ensure you have the best browsing experience on our website. By
using our
Thesite,address
you acknowledge that you by
generated havethe
readCPU
and understood our Cookie
is divided into: Policy &
Privacy Policy
Segment number (s): Number of bits required to represent the
segment.
Segment offset (d): Number of bits required to represent the position
of data within a segment.
FAQs on Segmentation
1. What is Segmentation?
Answer:
Answer:
GeeksforGeeks 224
We use cookies to ensure you have the best browsing experience on our website. By
using our site, you acknowledge that you have read and understood our Cookie Policy &
Privacy Policy
Video | Segmentation in Memory Management Visit Course
Similar Reads
System Protection in Operating System
Introduction: System protection in an operating system refers to the
mechanisms implemented by the operating system to ensure the security…
3 min read
Company Explore
About Us Job-A-Thon Hiring Challenge
Legal Hack-A-Thon
Careers GfG Weekly Contest
In Media Offline Classes (Delhi/NCR)
Contact Us DSA in JAVA/C++
Advertise with us Master System Design
GFG Corporate Solution Master CP
Placement Training Program GeeksforGeeks Videos
Geeks Community
Languages DSA
Python Data Structures
Java Algorithms
C++ DSA for Beginners
PHP Basic DSA Problems
GoLang DSA Roadmap
SQL DSA Interview Questions
R Language Competitive Programming
Android Tutorial
We use cookies to ensure you have the best browsing experience on our website. By
using our site, you acknowledge that&you
Data Science MLhave read and understood our Cookie Policy
Web&Technologies
Privacy Policy
Data Science With Python HTML
Data Science For Beginner CSS
Machine Learning JavaScript
ML Maths TypeScript
Data Visualisation ReactJS
Pandas NextJS
NumPy NodeJs
NLP Bootstrap
Deep Learning Tailwind CSS
DSA/Placements Development/Testing
Data Structures and Algorithms - Self Paced [Online Course] JavaScript Full Course Online | Learn JavaScript with
Data Structures & Algorithms in JavaScript - Self Paced Course Certification
Data Structures & Algorithms in Python - Self Paced React JS Course Online - React JS Certification Course
C Programming Course Online - Learn C with Data Structures React Native Course Online: Learn React Native Mobile App
Complete Interview Preparation Development
Master Competitive Programming - Complete Beginner to Complete Django Web Development Course - Basics to
Advanced Advance
Core Computer Science Subject for Interview Preparation Complete Bootstrap Course For Beginners [Online]
Mastering System Design: From Low-Level to High-Level Full Stack Development with React & Node JS - [LIVE]
Solutions JAVA Backend Development - [LIVE]
Tech Interview 101 - From DSA to System Design for Working Complete Software Testing Course - Beginner to Advance -
professional [LIVE] [LIVE]
DSA to Development: A complete guide [HYBRID] Android Mastery with Kotlin: Beginner to Advanced - [LIVE]
Placement Preparation Crash Course [LIVE]
We use cookies to ensure you have the best browsing experience on our website. By
using our site, you acknowledge that you have read and understood our Cookie Policy &
Privacy Policy
Aptitude Engineering Mathematics Discrete Mathematics Operating System DBMS Computer Network
Wireshark is a free and open-source packet analysis tool that lets you
capture and analyze network traffic in real-time. It is available for
Windows, macOS, and Linux operating systems.
So, in this article, we will understand how we can perform the sniffing of
login credentials or how to capture the password using Wireshark. and
also see the overview of the Wireshark tool in terms of network security.
Password Capturing
Wireshark can capture not only passwords but any type of information
transmitted over the network: usernames, email addresses, personal
information, etc. As long as we can capture network traffic, Wireshark can
sniff passing passwords.
In sniffing can include passwords for various protocols such as HTTP, FTP,
Telnet, etc. the captured data can be used to troubleshoot network
problems, but can also be used maliciously to gain unauthorized access to
sensitive information.
We use cookies to ensure you have the best browsing experience on our website. By
using So, here
our site, we willthat
you acknowledge see howreadwe
you have can capture
and understood the
our Cookie password
Policy & Got It ! the
using
Wireshark network capture Privacy Policy
analyzer. and see the outputs of the following
steps.
Step 1: First of all, open your Wireshark tool in your window or in Linux
virtual machine. and start capturing the network. suppose I am capturing
my wireless fidelity.
Step 2: After starting the packet capturing we will go to the website and
login the credential on that website as you can see in the image.
Step 3: Now after completing the login credential we will go and capture
We use cookies to ensure you have the best browsing experience on our website. By
the password in Wireshark. for that we have to use some filter that helps
using our site, you acknowledge that you have read and understood our Cookie Policy &
to find the login credential through the packet capturing.
Privacy Policy
Step 4: Wireshark has captured some packets but we specifically looking
for HTTP packets. so in the display filter bar we use some command to
find all the captured HTTP packets. as you can see in the below image the
green bar where we apply the filter.
http
Step 5: So there are some HTTP packets are captured but we specifically
looking for form data that the user submitted to the website. for that, we
have a separate filter
As we know that there are main two methods used for submitting form
data from web pages like login forms to the server. the methods are-
GET
POST
Step 6: So firstly for knowing the credential we use the first method and
apply the filter for the GET methods as you can see below.
http.request.method == "GET"
We use cookies to ensure you have the best browsing experience on our website. By
using our site, you acknowledge that you have read and understood our Cookie Policy &
Privacy Policy
GET method
As you can see in the image there are two packets where the login page
was requested with a GET request as well, but there is no form data
submitted with a GET request.
Step 7: Now after checking the GET method if we didn’t find the form data,
then we will try the POST method for that we will apply the filter on
Wireshark as you can see.
http.request.method == "POST"
We use cookies to ensure you have the best browsing experience on our website. By
As you can see we have a packet with form data click on the packet with
using our site, you acknowledge that you have read and understood our Cookie Policy &
user info and the application URL encoded. and click on the down-
Privacy Policy
HTML form URL Encoded where the login credential is found. login
credential as it is the same that we filed on the website in step 2.
soura… 3
Next Article
Steps of Filtering While Capturing in
Wireshark
Similar Reads
Method of Capturing Files and File Modes in Wireshark
Wireshark is a network protocol analyzer that captures packets from a
network connection. It is a software tool used to monitor network traffic…
3 min read
Company Explore
About Us Job-A-Thon Hiring Challenge
Legal Hack-A-Thon
Careers GfG Weekly Contest
In Media Offline Classes (Delhi/NCR)
Contact Us DSA in JAVA/C++
Advertise with us Master System Design
GFG Corporate Solution Master CP
We use cookies to ensure you
Placement haveProgram
Training the best browsing experience on our website.GeeksforGeeks
By Videos
using our site, you acknowledge that you have read and understood our Cookie Policy & Community
Geeks
Privacy Policy
Languages DSA
Python Data Structures
Java Algorithms
C++ DSA for Beginners
PHP Basic DSA Problems
GoLang DSA Roadmap
SQL DSA Interview Questions
R Language Competitive Programming
Android Tutorial
We use cookies to ensure you have the best browsing experience on our website. By
using our site, you acknowledge that you have read and understood our Cookie Policy &
Privacy Policy
DSA/Placements Development/Testing
Data Structures and Algorithms - Self Paced [Online Course] JavaScript Full Course Online | Learn JavaScript with
Data Structures & Algorithms in JavaScript - Self Paced Course Certification
Data Structures & Algorithms in Python - Self Paced React JS Course Online - React JS Certification Course
C Programming Course Online - Learn C with Data Structures React Native Course Online: Learn React Native Mobile App
Complete Interview Preparation Development
Master Competitive Programming - Complete Beginner to Complete Django Web Development Course - Basics to
Advanced Advance
Core Computer Science Subject for Interview Preparation Complete Bootstrap Course For Beginners [Online]
Mastering System Design: From Low-Level to High-Level Full Stack Development with React & Node JS - [LIVE]
Solutions JAVA Backend Development - [LIVE]
Tech Interview 101 - From DSA to System Design for Working Complete Software Testing Course - Beginner to Advance -
professional [LIVE] [LIVE]
DSA to Development: A complete guide [HYBRID] Android Mastery with Kotlin: Beginner to Advanced - [LIVE]
Placement Preparation Crash Course [LIVE]
Clouds/Devops GATE
DevOps Engineering - Planning to Production GATE CS & IT Test Series - 2025
AWS Solutions Architect Certification Live Training Program GATE Data Science and Artificial Intelligence Test Series 2025
Salesforce Certified Administrator Online CourseSalesforce GATE Computer Science & Information Technology - 2025
Certified Administrator Online Course GATE Data Science and Artificial Intelligence 2025
We use cookies to ensure you have the best browsing experience on our website. By
using our site, you acknowledge that you have read and understood our Cookie Policy &
Privacy Policy