social improvement

Nutrition:  Nutrition is the biochemical and physiological processes by which an organism uses food support its life. 

Health:    Health is a state of complete physical, mental and social well being and absence of disease. 

Type of Health:

1. Physical Health 2. Social Health 3. Spiritual Health 4. Emotional Health

1. Physical Health:  It is define as the state in which every cell and every organ is functioning at optimum capicity and imperfect hormony will the rest of the body. The physical

...

See on Student Notes »

economics

Q1) Salient Features of the Indian Constitution: It is a written and lengthy Constitution, one of the longest in the world. It has a blend of rigidity and flexibility, where some parts are easily amendable while others need a special majority. It adopts the Parliamentary form of government modeled after the British system. The Constitution provides a federal system with a unitary bias, meaning powers are divided between the Centre and States but the Centre holds dominance. It ensures an independent

...

See on Student Notes »

fybcom

Q1) Salient Features of the Indian Constitution

  1. Written and Lengthy Constitution – It’s one of the longest constitutions in the world.

  2. Blend of Rigidity and Flexibility – Some parts can be amended easily, others require a special majority.

  3. Parliamentary Form of Government – Modeled after the British system.

  4. Federal System with Unitary Bias – Powers are divided between Centre and States, but Centre holds more power.

  5. Independent Judiciary – Judiciary is impartial and has the

...

See on Student Notes »

crytography

Message Authentication Code (MAC)

A Message Authentication Code (MAC) is a small block of data generated using a secret key and the original message. It is used to ensure data integrity and authenticity.

  • The sender computes the MAC using a secret key and sends it along with the message.

  • The receiver re-computes the MAC using the same key and compares it with the received MAC.

  • If they match, the message is considered authentic and unaltered.

MAC ≠ Hash
MAC uses a key, while a regular hash

...

See on Wikiteka »

Business law 2

a) DividendA dividend is a portion of a company’s profits distributed to its shareholders. It is decided by the Board of Directors and approved by the shareholders at the Annual General Meeting (AGM).Types of dividend include:1.Interim Dividend – Declared before the AGM.2.Final Dividend – Declared at the AGM after the financial year ends.As per the Companies Act, 2013, dividend can only be paid:a)From current year’s profits after depreciationb)From past reserves (in specific cases)c)Not

...

See on Wikiteka »

ghfytdf

OS decides: Which programs live in mem, where they go, how to protect, what to do when mem runs out. Parkinson’s Law: Programs expand to fill the mem available to hold them. 3 Models for organizing mem: A(User on top, RAM on bottom, Pros(Fast execution)Cons(No protection (used in MS-DOS)​), B(ROM on top, user on bottom P(OS protected Slow) C(not flexible)), C( Drivers at top, user in middle, RAM at bottom P(Fast & secure) C(Used in Windows 11). Base: Where a process starts in mem. Limit:

...

See on Wikiteka »

network security

1.Which two statements about firewalls are true? They can be used with an intrusion prevention system. They can limit unauthorized user access to protect data.

2.When considering network security, what is the most valuable asset of an organization?data   3. Which risk management plan involves discontinuing an activity that creates a risk?risk avoidance  4.Refer to the exhibit. Which user-mode password has just been set?R I#contig R1(config)# line vty 0 15 R1 (config-line)#password CIscO R1 (...

See on Student Notes »

network sec

🔥 CISCO SECURITY CHEATSHEET — FULL 2-PAGE VERSION (ALL 10 MODULES)

🔐 1. SECURING THE EDGE ROUTER
▶ Three Areas of Router Security:
• Physical — Lock the device in secure rooms; use UPS or generators.
• Operating System — Use latest IOS; increase memory; back up configs.
• Router Hardening — Disable unused ports/services, restrict access.

▶ Admin Access Security:
• Local: 
  line console 0
  password [pw]
  login
• VTY (Remote):
  line vty 0 15
  password [pw]
  login
• Privileged...

See on Student Notes »

management

# define management ? what kinds of skills required for successful manager ? 

Management is basically about getting things done through people. It’s how businesses or organizations make plans, organize their resources (like people, money, and time), guide their teams, and make sure everything is on track to reach their goals. Good management keeps everything running smoothly and helps everyone work toward the same vision.

Skills Every Successful Manager Needs:
1. Leadership : A great manager leads

...

See on Student Notes »