engrlek

Spike Jonze’s Her (2013) and Jonathan Demme’s The Silence of the Lambs (1991) both explore characters who experience deep loneliness, but they show it in very different visual ways. Her uses warm colours, soft lighting, and close-up shots to reveal Theodore’s emotional isolation and his sometimes idealized or unrealistic view of the women around him. In contrast, The Silence of the Lambs relies on point-of-view shots, spatial arrangement, and framing to show how Clarice is constantly observed,

...

See on Student Notes »

Stats

🎯 MAIN RULE (ALL TESTS)

p < 0.05 → Significant → Reject H0
p ≥ 0.05 → Not significant → Fail to reject H0

1 group vs known value → One-sample t-test
2 groups (different people) → Independent t-test
2 groups (same people before/after) → Paired t-test
3+ groups → ANOVA (+ Tukey if significant)
Numeric ↔ Numeric → Correlation
Predict Y from X → Regression
Categorical ↔ Categorical → Chi-Square

⭐ 1. ONE-SAMPLE t-TEST 

Use: one group vs a target number.
Think: “Is my sample

...

See on Student Notes »

mllllll

Explain Rule-based classification technique.

Rule-Based Classification Technique

Rule-based classification is a data mining method where IF–THEN rules are used to classify data into different categories. Each rule has two parts:

  • IF (condition): tests certain attribute values
  • THEN (conclusion): assigns a class label

Example:

IF age > 18 AND income = high THEN class = “Premium Customer”.

Key points:

  1. Simple and Interpretable:
    Rules are easy to understand because they are written in natural
...

See on Student Notes »

Statistics

1. Define Mean
Mean = Average.
Sum of all values ÷ Number of values.
2. Find mean of first ten natural numbers
First 10 natural numbers: 1 to 10
Sum = 55
Mean = 55 ÷ 10 = 5.5
3. Define Median
Median = Beech wala value jab data ko chhote–bade order me likhte hain.
4. Find median of first ten even numbers
First 10 even numbers: 2,4,6,8,10,12,14,16,18,20
Even count (10 values) → median = average of 5th & 6th value
5th = 10, 6th = 12
Median = (10 + 12)/2 = 11
5. Define Mode
Mode = Jo value sabse zyada baar

...

See on Student Notes »

advance services

6Q1. Write short notes on (Any Four) — (4 × 5 = 20)

(a) Impurities in water and relevant treatment process

Impurities — physical (suspended solids, turbidity), chemical (dissolved salts, hardness, metals, pH), biological (bacteria, viruses, protozoa), and organics (oil, pesticides).
Treatment processes (typical sequence):

  1. Intake & Screening — remove large debris.

  2. Coagulation & Flocculation — add coagulant (alum/iron salts) to destabilize colloids; gentle mixing forms flocs.

...

See on Student Notes »

ccccc

a) What are the disadvantages of virtualization?

b) What is the difference between distributed objects and RPC?
c) Define Federated Clouds.

a) Disadvantages of Virtualization

(Any 3 points for 2 marks)

  1. Performance Overhead:
    Virtual machines run on top of a hypervisor, so applications may not perform as fast as on physical hardware.

  2. High Initial Cost:
    Powerful servers, hypervisors, and storage systems are required, which increases setup cost.

  3. Complex Management:
    Managing multiple VMs, snapshots,

...

See on Student Notes »

exam 2

A

ABC Analysis

Assigns items to groups (A, B, C) based on value/importance.
Example: A = laptops, B = keyboards, C = mousepads.

Accumulation

Receiving goods from multiple sources.
Example: A DC receives shipments from 10 factories.

Activity-Based Costing (ABC)

Assigns cost based on activities, not departments.
Example: Shipping-heavy customers show higher cost-to-serve.

Allocation

Matching inventory to customer orders.
Example: DC allocates 50 units to a customer order.

Anticipatory Stock

Inventory

...

See on Student Notes »

ijsfdsdfd

Malware: malicious software designed to disrupt systems, steal information, or gain unauthorized access. Goal of malware(Disruption:shutting down processes, freezing systems, Data Theft:exfiltrating passwords, Unauthorized Access:giving attackers a secret way in, Covert Control:remote command & control, botnets). Malware has not changed fundamentally sincevon Neumann’s 1949 paper on self replicating automata. Mal classified; Viruses (Need a host file), infect executable files or boot sectors,...

See on Student Notes »

Ιστορία

Η νομοθεσία

Με τα αξιόλογα νομοθετήματα της Μακεδονικής Δυναστείας επιδιώχθηκε συνειδητά η απομάκρυνση από το Δίκαιο των Εικονομάχων και η επιστροφή στο Ρωμαϊκό Δίκαιο, με προσαρμογές όμως που υπαγόρευαν τα νέα κοινωνικά και πολιτικά δεδομένα.

Η αναθεώρηση του ισχύοντος...

See on Wikiteka »