1.Explain EC Security requirements
==E-commerce security refers to the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. Because financial transactions and sensitive information (like credit card numbers, passwords, and personal details) are involved, strong security is essential in e-commerce systems. */key EC security requirements, : Authentication : Ensures that the parties involved (both buyer and seller) are who they claim to be. Authorization Grants
Unit-1: Communication Fundamentals
1. What is communication? Discuss various elements & features?
Communication is the process of conveying information, ideas, or feelings between individuals or groups through a common system of symbols, signs, or behavior.
Elements:
Sender, receiver, message, channel, encoding, decoding, feedback, and noise.
Features:
Two-way process, dynamic, continuous, goal-oriented, and can be verbal or non-verbal.
2. Discuss various Barriers of communication?
Semantic
...1.Define Pixel and resolution. Explain in brief about Back face detection algorithm.
==A pixel (short for picture element) is the smallest unit of a digital image or display screen. It represents a single point in a raster image and has a specific color and intensity. //Resolution refers to the number of pixels in an image or display, usually written as width × height (e.g., 1920×1080).Higher resolution means more pixels, which leads to sharper and more detailed images.
=Back-face detection...
What is Leadership?
MOTO: “BE EASY TO FOLLOW”
Today’s leadership job is to coach, chart the path, clear the path, and help people have awesome experiences in the process.
Followership
Followership is the complement to leadership. Leadership is the complement to followership. They are separate roles but they are inseparable.
Two main lessons
Leadership and followership work best together
The most effective leadership happens when the goal is desired by the follower(s).
Short Notes:
(a) Service Led growth
Service-led growth refers to economic growth driven primarily by the service sector, which includes industries like finance, IT, tourism, and healthcare. This type of growth is characterized by a significant contribution of services to the GDP, often surpassing the contributions of the primary and secondary sectors.
(b) Primary sector
The primary sector involves the extraction and production of raw materials, such as agriculture, forestry, fishing, and mining.
...Definition and Characteristics of a System
A system is a set of interrelated components working together toward a common goal by accepting inputs and producing outputs in an organized transformation process. In computing, a system typically refers to a collection of hardware and software designed to process data into useful information. The key characteristics of a system include:
Organization: Every system has a structure and components arranged logically.
Interaction: All parts of a system interact
🔹 AGENTE: Clostridium tetani
Bacilo Gram (+)
Anaerobio estricto
Esporas (forma de palillo de tambor)
Vive en suelo y en intestino de animales
🔹 TOXINA
Tetanospasmina → neurotoxina potente
Afecta nervios motores → médula espinal
Causa espasmos, rigidez y contracciones tónicas
Ascendente: por nervios
Descendente: por sangre al SNC
🔹 PERIODO INCUBACIÓN: 10–14 días (varía entre 1-3 semanas)
🔹 SIGNOS CLÍNICOS
Rigidez inicial: mandíbula (maseteros), cuello, extremidades
Espasmos,
What is Information Security? Information security means protecting data from stealing, changing, destroying, disclosing, or denying access. It has traditionally relied on physical measures (like locked cabinets) and administrative controls (such as personnel screening). Even today, some reliance on physical security remains. Modern Information Security Needs: Due to increased computer use, automated tools are now needed to protect stored information. As network use grows, it has become essential...