Natural fibers like Cotton, Jute, and Flax are plant-derived cellulose-based materials used extensively in textiles, originating from seed, bast, and stem tissues respectively, and cultivated in tropical to temperate regions worldwide.[1][3][7]
## Origin and Distribution
Cotton (Gossypium spp.) originated in India and Africa, spreading to tropical and subtropical zones, with top producers including India, China, the US, Brazil, and Pakistan. Jute (Corchorus capsularis and C. olitorius, family Tiliaceae)
🌾 Introduction to Cereals and Millets -Cereals and Millets are grains harvested from grasses (family Poaceae) and form the basis of the world's major staple foods. They are vital sources of carbohydrates, protein, fats, vitamins, and minerals.* Cereals are generally larger-grained grasses like Rice, Wheat, and Maize, which have been cultivated for thousands of years and were central to the development of many early civilizations. * Millets are a group of small-seeded grasses, often preferred
Define Cardiotonic
Cardiotonic drugs are substances that make the heart pump stronger and improve heart function. They are mainly used in heart weakness and heart failure and usually contain cardiac glycosides.
Examples with Biological Source
1. Digitalis
Source: Leaves of Digitalis purpurea
Use: Helps the heart contract better.
2. Strophanthus
Source: Seeds of Strophanthus
kombe
Use: Strengthens heart pumping.
Rauwolfia
Biological Source:Rauwolfia consists of the dried roots of the plant Rauwolfia serpentina,
1️⃣ Define Cyber Security.
Answer:
Cyber Security refers to the practices, technologies, and processes designed to protect computers, networks, programs, and data from unauthorized access, attacks, and damage.
2️⃣ What is the CIA Triad? Explain.
Answer:
CIA Triad is the core model of cyber security:
Confidentiality: Protecting data from unauthorized access.
Integrity: Ensuring data is accurate and unchanged.
Availability: Ensuring data/services are accessible when needed.
3️⃣ What is Malware?...
✅ 1. Define Cyber Security. Why is it important?
Cyber Security is the practice of protecting computers, networks, and data from unauthorized access, attacks, or damage.
Importance:
Protects sensitive data
Prevents financial loss
Ensures privacy and safe online activities
✅ 2. What is Social Engineering? Explain with examples.
Social Engineering is manipulating people to steal confidential information.
Example: Phishing emails, fake customer-care calls asking for OTP, impersonation scams.
✅
Modulation is the process of varying a property of a high-frequency carrier signal (such as its amplitude, frequency, or phase) in accordance with the information signal, like voice, music, or data. Common types include: AM (Amplitude Modulation) – carrier amplitude varies FM (Frequency Modulation) – carrier frequency varies and Phase modulation. Need for Modulation- 1) To Transmit Signals Over Long Distances-Low-frequency message signals (like human voice at ~3 kHz) cannot travel far. A high-...
📝 Accounting Treatment of Amalgamation as per AS-14
Accounting Standard (AS) 14, 'Accounting for Amalgamations,' issued by the Institute of Chartered Accountants of India (ICAI), prescribes the accounting treatment for amalgamations. The standard classifies amalgamations into two types, which determines the appropriate accounting method to be used by the Transferee Company (the acquiring/new company).
I. Types of Amalgamation
AS-14 distinguishes between two types of amalgamation based on the conditions
Absolutely! ICDS is a crucial program in India focused on holistic child development.
👶 What is ICDS? (Meaning)
ICDS stands for Integrated Child Development Services. It is a flagship social welfare scheme of the Government of India launched in 1975.
It is one of the world's largest community-based programs that aims to provide a package of services for the holistic development of children under the age of six, along with their mothers. The services are delivered primarily through a network of grassroots
Creating GUI applications using AWT involves setting up a top-level container, adding components, arranging them with a Layout Manager, and then making the container visible.
Here is a step-by-step guide to creating a simple AWT application (specifically, a Frame):
🏗️ Steps to Create an AWT Application
1. Choose a Top-Level Container
The application needs a primary window to hold all the components. The most common choice is the Frame class, which provides a title bar, borders, and window controls.