Level 1 Task Report
1 / 4 / 2024
Task 1 - JavaScript
The objective of this task was to learn JavaScript and to make a webpage that takes in the names and marks of ten students and calculates the:
Percentage of each student
Class average
Rankings of the students
JavaScript is suitable for this task because JavaScript is a versatile programming language commonly used for web development. It runs directly in the browser, allowing for dynamic interaction with web pages without needing to rely on server-side processing.
Link to code:
Task 2 - Async JS
Asynchronous programming is a programming paradigm that allows multiple tasks to be executed concurrently, rather than sequentially. In an asynchronous program, tasks can start and complete independently of each other, and the program doesn't have to wait for one task to finish before starting another.
Common patterns and mechanisms for asynchronous programming include:
1. Callbacks: Functions that are passed as arguments to other functions and are called once an asynchronous operation completes.
2. Promises: Objects representing the eventual completion or failure of an asynchronous operation. They allow attaching callbacks to handle the success or failure of the operation.
3. Async/Await: A more recent addition to JavaScript, async functions enable writing asynchronous code in a synchronous-like manner using the async and await keywords, making it easier to work with asynchronous code and handle errors.
Here for this task, we use callback functions in JavaScript. A callback function is a function that is passed as an argument to another function and is executed at a later point in time or under specific conditions.


# Task 5 - VI
The default editor that comes with the UNIX operating system is called vi (visual editor). Learnt the basics of VI, created an md file that contains an article about VI and its features .<br />


[link to markdown file: ](https://github.com/JeffJohn424/Level-2/blob/main/marveltask.md)
# Task 6 - Linux Continued
Got a basic understanding about regex, piping and grep working. The task required us to extract login times within a date/time range from the login logs. Used the last command. Had to create a folder called logs and the extracted information was put into a .txt file. And then this folder was zipped using gzip and tar.<br />


# Task 7 - Introduction to Cloud Computing
Watched the videos provided to understand the basic benefits, components of cloud computing. <br />
***Cloud Computing*** refers to data and applications being stored and run on the cloud rather than on your local computer. The data and applications on the cloud are accesed by using internet. So the workload is no longer on the local computer but on the cloud. Cloud is a big building filled with computers ie. servers.<br />
There are **3 service models** of cloud computing i.e.
1. **Iaas**(Infrastructure as a service)
2. **Paas**(Platform as a service)
3. **Saas**(Software as a service).<br />
Also got good exposure to the services offered by the big 3 Cloud Service Providers AWS, Microsoft Azure, and Google Cloud Platform and which one is preferred by major businesses.
<br /> The objective of the task was to get familiar with the process of setting up a local file sharing solution. Here is the procedure to do the same:
```- Go to Network Sharing Center & gt;
Advanced Sharing settings and ensure network discovery and file sharing are enabled in both systems. - Services > SSDP Discovery > Properties > Startup type must be set to Automatic- The same must be done for the UPnP device host, Function Discovery Provider Host, and Function Discovery Resolution Publication. - Head to Properties of the file to be shared and then go to Advanced Settings. Select `Share this folder` > Permissions > Allow all permissions. Click on `Share`. Provide access to everyone and permit to read/write and then share. The file will be visible on the receiver system. ```
# Task 8: Introduction to Cybersecurity
***Cybersecurity*** is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.<br />
***Cryptography*** is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix “graphy” means “writing”. In Cryptography the techniques which are use to protect information are obtained from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it.<br /> Conversion of "Cybersecurity in Marvel" into various ciphers:
```1. Caesar Cipher: F C E H U V H F X U L W B
2. Pigpen Cipher: ⨁⨂⨂⊡⊓⨅⨂⊔⨂⊓⊡⨅⨂⊓⊔⨅⊔⨂⨅⊓⊓⨅⨂⊓⊡⊔
3. Morse Code: -.-. -.-- -... . .-. ... . -.-. ..- .-. .. -.-- / .. -. / -- .- .-. ...- . .-..
4. Rail Fence Cipher (3 Rails): CERSY ENIUAVBRLM
5. Polybius Square Cipher: 33 54 12 15 52 53 33 35 15 24 53 45 31 14 24 45 11 13 54 15 42 52 15 33 21
6. Playfair Cipher: G V Z R V K S Z R U S Q A N K V U```"