Institutional support towards entrepreneurship in India:
SIDO – apex body under MSME Ministry, coordinates state policies, provides training, consultancy, tech support, operates SISIs, testing centres, field offices,
NSIC – promotes MSMEs via hire-purchase, raw material distribution, export marketing, tech training, credit support,
SIDBI – apex MSME bank, offers refinance, direct finance, venture capital, modernization loans, SMILE scheme,
NABARD
Risk Management Basics
Risk: Probability of loss or disruption, Asset: Item of value (e.g., data, systems), Threat: Entity exploiting a weakness., Vulnerability: Weakness that can be exploited., Risk Management: Identifying, evaluating, reducing, or accepting risks.
Types of Threat Actors
Script Kiddie: Uses pre-written code, lacks technical skill, wants fame, Hacktivist: Politically motivated, defaces sites or networks, Nation State/APT: Government-backed, highly sophisticated, Organized Crime:
POTENTIAL EXAM QUESTIONS
1. Changes in taxonomy from 1900 to present
-The earliest change started with Carol von Nägeli in the 1800s, who proposed bacteria and fungi be placed in the plant kingdom. However, in 1959, they were given their own kingdom.
-In 1937, the term prokaryote was introduced and Robert G. E. Murray proposed the Kingdom Prokaryotae .
-In the 1960s, the molecular clock was proposed which was an evolutionary timeline based on observations of the nucleotide sequence in an organism.
1] Explain some Database applications. Explain advantages and disadvantages of database system.???
A database application is software used to store, manage, and access data easily.
👉 Examples:
1. Banking – stores customer and transaction details.
2. E-commerce – manages products, orders, and user info.
3. Hospitals – keeps patient records and doctor schedules.
4. Schools – stores student marks and attendance.
5. Airlines – handles bookings and flight details.
_______________________
L10 – Reliable Transfer and Connection Management
TCP Reliable Transfer:
Sequence Number
Each byte of data is assigned a sequence number. This number is used by the receiver to correctly order the data and ensure there are no missing segments
Acknowledgements
The receiver sends back an ACK to the sender for the sequence number of the next expected byte. If the sender receives the Ack before its timer expires, it knows everything up to that byte was received correctly.
Programming Languages: Chapter 1 Cheat Sheet
Expressiveness: Leverage diverse language features
Selection: Match language to task (e.g., LISP for AI, PHP for web)
Learning: Foundations ease uptake of new languages
Efficiency: Choose constructs (recursion vs. iteration) for performance
Maintenance: Better code reuse and understanding
| Domain | Focus | Language Example |
|---|---|---|
| Scientific | Floating‑point computations |
Agriculture :
Produces:
History:
Estomatitis vesicular. ( Mal de tierra , Mazamorra)
Etiología
Virus: Rhabdoviridae , género Vesiculovirus
Serotipos: Nueva Jersey e Indiana
Formato: bala , 180 x 75 nm
Zoonótica → en humanos da síntomas gripales
Afecta: bovinos, equinos, porcinos (raras veces: ovejas, cabras, llamas)
Endémica: América Central, del Sur y México
No existe fuera del hemisferio occidental
Contacto directo con animales lesionados
Insectos hematófagos Mosca negra - Mosca de arena
Prevalencia