14 / 9 / 2023
Task 1 - Javascript
Learn the basics of javascript and create a small webpage which takes the names and marks of ten students and calculates the
Git hub link for the source code
Images of the website
Task 2 - Async JS
Learn about asynchronous javascript and implement a small callback based program that displays the steps of a food recipe (consisting of at least 10 steps).
Git hub link for the source code
Images of the website
Task 3 - Promises
Implement the above recipe program with promises and list the potential benefits and improvements of using the same.
Github link for the source code
TASK 4: Get familiar with the command line on ubuntu:
Ubuntu is a linux based operating system used in computers . As I have seen it is more responsive than windows, and as it all the compatibility of linux commands it is more efficient than windows.
I have used the following commands to carry out this task:
1. Creating a folder named test : mkdir test.
2. Change directory: cd.
3. Knowing the current directory: pwd.
4. To create empty folder : touch file name.
5. For creating 2600 folders: mkdir M{1..2600}.
6. Concatinating 2 files _file1.txt_ _file2.txt_ and displaying contents in another file
_output.txt_ : cat file1.txt file2.txt>output.txt
7. Displaying the concatenated contents Command : cat output.txt
TASK 5: VI
Learn the basics of vi and create a markdown file in vi illustrating the various features of vi that you found to be fascinating.
Vi is a powerful text editor included with most Linux systems, even embedded ones
Commands in VI:
Writing anything in command mode results in unexpected behaviour.
Insert mode:
Once you entered the text entered is written in file rather than treating it as a command.
Task 6 - Linux Continued
Learn the basics of regex and piping in Linux.
Regular Expressions (Regex):
Definition:
Regular expressions are patterns that define a set of strings. They are used for searching, matching, and manipulating text based on patterns rather than specific characters.
Piping
Definition:
Piping is a method in Linux that allows you to take the output of one command and use it as the input for another command. It connects multiple commands together to create a sequence of operations.
Task 7 - Introduction to Cloud Computing
We have three types of Service Models
a. SAAS - Software as a service
b. PAAS - Platform as a service
c. IAAS - Infrastructure as a service
a.Public cloud
The cloud infrasture is made available to general public over internet and is owned by a cloud provider Example: AWS , Alibaba , GCS
b.Private cloud
The cloud infrastructure is exclusively operated by a single organization. It can be managed by the organization or a third party. Example : AWS, VMware
c.Hybrid Cloud
It consists of functionalities of both public and private cloud Example : Companies opt for private cloud when sensitive information is involved and they use public cloud to share datasets with general public.
Setting up a local file sharing solution can be useful for sharing files between devices within your home or office network.
These are steps to set up a network share on computer
Step 1: Choose the Host Computer
You need to select the computer that will serve as the host for sharing files. This computer should be connected to the same local network as the other devices you want to share files with.
Step 2: Enable File and Printer Sharing
Step 3: Share a Folder
Step 4: Access Shared Files from Another Device
Now, you can access the shared folder from another device on the same network.
Task 8 - Introduction to Cybersecurity
Basics of cybersecurity: confidentiality, integrity, availability (CIA)
Here I learnt the basics of cyber security, ie CIA
Confidentiality :
Ensuring that date is private and accessible to authorized users only. Integrity :
This means data is available to users but ensuring that it is remains
unaltered and reliable throughout its lifecycle. Availability :
This means ensuring that data and systems are accessible whenever required.Common types of cyber threats: malware, phishing, social engineering
Malware :
Its consists of programs designed to harm , infiltrate and gain unauthorized access to other data and systems. Phishing :
Its a technique where attackers pretend to trusted people and try to take personal details of the users.Social Engineering :
In this the attackers manipulate human psychology to gain access to confidential information, systems, or physical locations.Overview of cybersecurity frameworks and standards
Cybersecurity frameworks and standards are like guidelines or rules that organizations follow to keep their digital information safe from hackers and other threats. They help organizations figure out how to protect their computers, networks, and data.
Cryptography and various ciphers
Cryptography is a method of securing information by transforming it into unreadable format , and transformed back back to original whenever required.
1. Caesar Cipher (Shift of 3):
"Fbvehvfxwphlv lq Phduvo."
2. Pigpen Cipher :
3. Morse Code:
"-.-. -.-- -... . .-. ... -.-. ..-. .. -.-- . -. / .. -. / -- .- .-. ...- . .- .-.."
4. Rail Fence Cipher (2 Rails):
"CeeeyeiMeabtvrcyrfnnl."
5. Polybius Cipher :
" 13 54 12 15 42 43 15 13 45 42 24 44 54 24 33 32 11 42 51 15 31".
6. Playfair Cipher :
"DXYDYKMCWYI LY BGNSCK."
"