Level 2
30 / 3 / 2024
1.Javascript
I started by learning the basics of JavaScript, including variables, functions, and loops. I created a webpage with input fields for student names and marks using HTML. Using JavaScript, I calculated each student's percentage and the class average, and ranked the students based on their marks
2.Async JS
Asynchronous JavaScript (Async JS) is a programming model that enables non-blocking, concurrent execution of tasks I created a program that displays the steps of a food recipe ( Jamun)using callbacks. This program includes at least 10 steps, demonstrating how callbacks can handle the sequence of actions in an asynchronous manner, such as fetching data or performing tasks. Through this exercise, I gained a practical understanding of how callbacks can be used to manage complex asynchronous operations in JavaScript.
3.Promises
Promises in JavaScript are objects that represent the eventual completion or failure of an asynchronous operation and its resulting value. They allow you to write asynchronous code that is easier to read, write, and maintain, compared to using callbacks. Promises have three states: pending, fulfilled (resolved), and rejected, and they can be chained together to handle multiple asynchronous operations sequentially.
4.Introduction to Cloud Computing
Storing data and information in cloud instead of local device is called as cloud computing. There two types in cloud computing
1.Service model 2.Deployment model
a service model refers to the type of service being delivered, such as
1)Infrastructure as a Service (IaaS)
infrastructure as a Service (IaaS) is a cloud computing service model that provides virtualized computing resources over the internet.An example of IaaS is Amazon Web Services (AWS) ,Elastic Compute Cloud (EC2)
2) Platform as a Service (PaaS)
Platform as a Service (PaaS) is a cloud computing service model that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.An example of PaaS is Google App Engine.
3)Software as a Service (SaaS)
Software as a Service (SaaS) is a cloud computing service model that delivers software applications over the internet. Users can access the software through a web browser without needing to install or maintain it on their own devices. Examples of SaaS include Google Workspace, Microsoft 365, and Salesforce.An example of SaaS is Dropbox A deployment model, on the other hand, defines the location and management of the cloud infrastructure. Common deployment models include
1)Public Cloud Deployment:
Public cloud services are hosted and managed by third-party providers, offering scalability and cost-effectiveness. They are accessible over the internet to multiple users and organizations.
2)Private Cloud Deployment :
Private cloud infrastructure is dedicated to a single organization, offering enhanced security and control. It is hosted either on-premises or by a third-party provider.
3)Hybrid Cloud Deployment:
Hybrid cloud combines public and private cloud environments, allowing data and applications to be shared between them. It offers flexibility and scalability, ideal for organizations with fluctuating workloads. each offering different levels of privacy, control, and scalability based on the organization's requirements and preferences.
5)Introduction to Cyber Security
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks. These attacks often target sensitive information, including personal, financial, or intellectual property data.
Basics of cybersecurity: confidentiality, integrity, availability (CIA)
Confidentiality: Ensuring that date is private and accessible to authorized users only.
Integrity : This means data is available to users but ensuring that it is remains unaltered and reliable throughout its lifecycle.
Availability : This means ensuring that data and systems are accessible whenever required.
Malware :Malware, short for malicious software, is any software designed to disrupt, damage, or gain unauthorized access to a computer system or network.
Phishing : Its a technique where attackers pretend to trusted people and try to take personal details of the users.
Social Engineering : In this the attackers manipulate human psychology to gain access to confidential information, systems, or physical locations.
Converting the text Cybersecurity in Marvelinto :
1)Caesar Cipher(Shift of 3): \Fbvehvfxwphlv lq Phduvo."
-
**Pigpen Cipher ** :Screenshot 2023-09-15 204513
-
Morse Code "-.-. -.-- -... . .-. ... -.-. ..-. .. -.-- . -. / .. -. / -- .- .-. ...- . .- .-.."
4)**Rail Fence Cipher ** (2 Rails): "CeeeyeiMeabtvrcyrfnnl."
5)Polybius Cipher : " 13 54 12 15 42 43 15 13 45 42 24 44 54 24 33 32 11 42 51 15 31".
6)Playfair Cipher : "DXYDYKMCWYI LY BGNSCK."
6)Get familiar with the command line and do the following subtasks:
1)Creating a folder named "test": mkdir test.
2)Changing directory: cd.
3)To create an empty folder: mkdir foldername.
4)For creating 2600 folders: mkdir folder{1..2600}.
5)Concatenating 2 files, "file1.txt" and "file2.txt", and displaying contents in another file "output.txt": cat file1.txt file2.txt > output.txt.
6)Displaying the concatenated contents: cat output.txt.
7)VI
Vi is a powerful and widely used text editor in Unix and Linux systems. Open a File: vi /path/to/file (opens an existing file, creates a new file if it doesn't exist) Edit a System File: sudo vi /etc/fstab Command Mode: Entered when opening a file in VI, used for navigating and making changes
→ →Deleting Characters: Use x to delete a character
→ →Deleting Lines: Use dd to delete an entire line
→ →Copy and Paste: Use v to select text, y to copy, and p to paste
→ →Insert Mode: Entered with i, allows entering text directly into the file
→ →Exiting Insert Mode: Press Escape to return to Command Mode
→ →Save and Quit: Use :wq to write the file to disk and quit VI
8) Linux Continued
Regular Expressions (Regex)
Regular expressions (regex) are sequences of characters that define a search pattern. They are used for searching, manipulating, and editing text. In Linux, tools like grep, sed, and awk allow you to use regex to perform complex text operations.
Piping in Linux
Piping, represented by the | symbol, is a way to redirect the output of one command as input to another command. It allows you to chain multiple commands together, enabling powerful and efficient data processing workflows in the Linux terminal.
Using grep to Extract Information from Log Files
grep is a command-line utility for searching plain-text data sets for lines that match a regular expression. It's commonly used to search log files for specific patterns or keywords, helping you extract relevant information from large log files."