-
Explain the requirements of Public key cryptography?
in public key cryptography there should be two key called private key and public key private key kept in secret and public key put in ... -
State Fermat’s Theorem. Find out the result of 3^12 mod 11 using second version of ...
Fermat's states that if p is a prime number and a is an integer not divisible by p then a^(p-1)=1(mod p) or the modification of ... -
What is ransomware?
Ransomware is a type of malware which restrict the access to the infected system in some way and demand a ransom to lift the restriction. ... -
Text Pre-Processing to Latent Semantic Indexing
Slide 2: text preprocessing Stopwords removal Stemming Basic stemming methods remove ending transform words Digits Hyphens Punctuation Marks Case of Letters Identifying different text fields ... -
Information Retrieval and Web Search
slide1:Introduction to Information Retrieval (IR) slide 4: Information Retrieval (IR) Architecture slide 6:IR queries types Keyword queries Boolean queries (using AND, OR, NOT) Phrase queries Proximity ... -
Differentiate Regex patterns and Regex modifiers. Explain any 3 uses of regular expression with relevant ...
regular expression in python is A tiny, highly specialized programming language embedded inside and made available through the re module. it helps to match or ... -
Explain the concept of inheritance in Python with suitable examples.
Inheritance is the capability of one class to derive or inherit the properties from another class. The benefits of inheritance are: It represents real-world relationships ... -
Write a python program to search a word in a file and replace with another ...
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITYFIFTH SEMESTER M.C.A. DEGREE EXAMINATION, DECEMBER 2018Course Code: RLMCA369Course Name: PYTHON PROGRAMMING Here we represented two type to replace one using ... -
Explain seek() and tell() methods with example?
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITYFIFTH SEMESTER M.C.A. DEGREE EXAMINATION, DECEMBER 2018Course Code: RLMCA369Course Name: PYTHON PROGRAMMING Syntax Following is the syntax for seek() method − fileObject.seek(offset[, whence]) ... -
Explain various services provided by Google Cloud ?
Google Cloud is a suite of Cloud Computing services offered by Google. The platform provides various services like compute, storage, networking, Big Data, and many more ...