Q1) Salient Features of the Indian Constitution: It is a written and lengthy Constitution, one of the longest in the world. It has a blend of rigidity and flexibility, where some parts are easily amendable while others need a special majority. It adopts the Parliamentary form of government modeled after the British system. The Constitution provides a federal system with a unitary bias, meaning powers are divided between the Centre and States but the Centre holds dominance. It ensures an independent
Written and Lengthy Constitution – It’s one of the longest constitutions in the world.
Blend of Rigidity and Flexibility – Some parts can be amended easily, others require a special majority.
Parliamentary Form of Government – Modeled after the British system.
Federal System with Unitary Bias – Powers are divided between Centre and States, but Centre holds more power.
Independent Judiciary – Judiciary is impartial and has the
a) DividendA dividend is a portion of a company’s profits distributed to its shareholders. It is decided by the Board of Directors and approved by the shareholders at the Annual General Meeting (AGM).Types of dividend include:1.Interim Dividend – Declared before the AGM.2.Final Dividend – Declared at the AGM after the financial year ends.As per the Companies Act, 2013, dividend can only be paid:a)From current year’s profits after depreciationb)From past reserves (in specific cases)c)Not
OS decides: Which programs live in mem, where they go, how to protect, what to do when mem runs out. Parkinson’s Law: Programs expand to fill the mem available to hold them. 3 Models for organizing mem: A(User on top, RAM on bottom, Pros(Fast execution)Cons(No protection (used in MS-DOS)), B(ROM on top, user on bottom P(OS protected Slow) C(not flexible)), C( Drivers at top, user in middle, RAM at bottom P(Fast & secure) C(Used in Windows 11). Base: Where a process starts in mem. Limit:
1.Which two statements about firewalls are true? They can be used with an intrusion prevention system. They can limit unauthorized user access to protect data.
2.When considering network security, what is the most valuable asset of an organization?data 3. Which risk management plan involves discontinuing an activity that creates a risk?risk avoidance 4.Refer to the exhibit. Which user-mode password has just been set?R I#contig R1(config)# line vty 0 15 R1 (config-line)#password CIscO R1 (...
🔥 CISCO SECURITY CHEATSHEET — FULL 2-PAGE VERSION (ALL 10 MODULES)
🔐 1. SECURING THE EDGE ROUTER
▶ Three Areas of Router Security:
• Physical — Lock the device in secure rooms; use UPS or generators.
• Operating System — Use latest IOS; increase memory; back up configs.
• Router Hardening — Disable unused ports/services, restrict access.
▶ Admin Access Security:
• Local:
line console 0
password [pw]
login
• VTY (Remote):
line vty 0 15
password [pw]
login
• Privileged...
# define management ? what kinds of skills required for successful manager ?
Management is basically about getting things done through people. It’s how businesses or organizations make plans, organize their resources (like people, money, and time), guide their teams, and make sure everything is on track to reach their goals. Good management keeps everything running smoothly and helps everyone work toward the same vision.
Skills Every Successful Manager Needs:
1. Leadership : A great manager leads
Statistics is the science of collecting, organizing, analyzing, interpreting, and presenting data. It helps in converting raw data into meaningful information for decision-making.
Business Analytics refers to the use of statistical methods, data analysis, predictive modeling, and fact-based management to drive business planning. It focuses on turning data into actionable insights to solve business problems and improve performance.
CH3: Memory Management: How the OS handles allocation, tracking, and protection of memory used by processes. | Memory Abstraction: A way for the OS to give each process its own view of memory, isolating them and enabling multitasking. | Base Register: Stores the starting physical address of a process’s memory. | Limit Register: Specifies the range (size) of memory a process can access from its base. | Swapping: The act of moving processes in and out of main memory to free up space. | Fragmentation:
...