Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here
Sign InSign Up

SIKSHAPATH

SIKSHAPATH Logo SIKSHAPATH Logo

SIKSHAPATH Navigation

  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers

Share & grow the world's knowledge!

We want to connect the people who have knowledge to the people who need it, to bring together people with different perspectives so they can understand each other better, and to empower everyone to share their knowledge.

Create A New Account
What's your question?
Follow us on Social Media
telegram instagram
  1. Asked: April 18, 2023In: Other

    What are some free AI image generator from text?

    Best Answer
    ADMIN 2
    Added an answer on April 18, 2023 at 9:32 pm

    Here is the free-to-use AI image generator list. 1. Midjourney, an innovative Text-to-Image AI tool, offers a unique way to create custom images using Discord. While it's not free, users can access a free trial to try out the platform's impressive AI image generation capabilities. 2. Blue Willow, anRead more

    Here is the free-to-use AI image generator list.

    1. Midjourney, an innovative Text-to-Image AI tool, offers a unique way to create custom images using Discord. While it’s not free, users can access a free trial to try out the platform’s impressive AI image generation capabilities.

    2. Blue Willow, another Discord-based AI image generator tool, provides users with a simple and effective way to create unique visuals using artificial intelligence. Check out their website at bluewillow.ai for more information.

    3. Microsoft’s Bing Image Creator, powered by Dall-E, offers users points to generate images quickly and easily. Visit their website at bing.com/create to try out the tool for yourself.

    4. Scribble Diffusion is an AI art generator that requires users to draw an image and then provide a prompt to generate a unique artwork. Check it out at scribblediffusion.com to see what you can create.

    5. Craiyon is a freemium-based AI image generator that allows users to generate images from a given prompt. While the free version may take some time, users can purchase the premium version for faster results. Visit craiyon.com for more information.

    6. Stablediffusion is an innovative online tool that uses advanced algorithms to generate abstract visuals that can be customized and shared.

    It’s just one of many AI image generators available, including Shutter Stock Image Generator, Artnblast AI, 2AI, FreeImage.AI, Enterpix, and Creative Fabrica SPARK ART.

    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
  2. Asked: November 18, 2021In: Programming Language

    Define class EmailId with members, username, domainId and password. Define default and parameterized constructors. Accept values from the command line and create a date object. Throw user defined exceptions – “InvalidUsernameException” or “InvalidPasswordException” if the uaername and password are invalid. If the date is valid, display message “Valid Email Id”.

    I'M ADMIN
    Added an answer on February 19, 2023 at 1:00 pm

    Use Offline IDE like Sublime, VScode , IntelliJ to run this code.   package sikshapath; //create your own package import java.util.*; import java.text.DateFormat; import java.text.SimpleDateFormat; import java.util.Scanner; class EmailId { String domainID,username,password; EmailId() { domainIDRead more

    Use Offline IDE like Sublime, VScode , IntelliJ to run this code.

     

    package sikshapath; //create your own package
    import java.util.*;
    import java.text.DateFormat;
    import java.text.SimpleDateFormat;
    import java.util.Scanner;
    
    class EmailId
    {
    
        String domainID,username,password;
    
        EmailId()
        {
            domainID="K7";
            username="K";
            password="constructc000";
        }
    
        EmailId(String user,String pass,String domID)
        {
            domainID=domID;
            username=user;
            password=pass;
        }
    
        public static void main(String[] args) {
            String user,pass, domID;
            int p=-1,up=-1,u=-1,d=-1;
    
            EmailId obj=new EmailId();
    
            Scanner sc= new Scanner(System.in);
            System.out.println("Enter username: ");
            user=sc.nextLine();
            System.out.println("\nEnter password: ");
            pass=sc.nextLine();
            System.out.println("\nEnter Domain ID: ");
            domID=sc.nextLine();
            System.out.println("Enter a date in dd/mm/yyyy format :");
            String date = sc.next();
    
            EmailId obj1=new EmailId(user,pass,domID);
    
            if((obj.username).equals(obj1.username))
            {
                u=1;
                if(obj.password.equals(obj1.password))
                {
                    up=1;
                }
                else
                {
                    p=0;
                }
            }
            else
            {
                u=0;
            }
    
            if(dateValidation(date)==true)
                d=1;
            else
                d=0;
    
            if(d==1)
            {
                if(u==0)
                {
    
                    try{
                        throw new InvalidUsernameException(user);
                    }
    
                    catch (Exception e) {
                        System.out.println(e) ;
                    }
                }
    
                if (p==0){
                    {
                        try{
    
                            throw new InvalidPasswordException(pass);
                        }
                        catch (Exception e) {
                            System.out.println(e) ;
                        }
                    }
                }
    
                if(up==1)
                {
                    System.out.println("Valid email id");
                }
            }
            else{
                System.out.println("Not a Valid email id");
            }
    
        }
    
        public static boolean dateValidation(String date)
        {
            boolean status = false;
    
            if (checkDate(date)) {
                DateFormat dateFormat = new SimpleDateFormat("dd/MM/yyyy");
                dateFormat.setLenient(false);
                try {
                    dateFormat.parse(date);
                    status = true;
                } catch (Exception e) {
                    status = false;
                }
            }
            return status;
        }
    
        static boolean checkDate(String date) {
            String pattern = "(0?[1-9]|[12][0-9]|3[01])\\/(0?[1-9]|1[0-2])\\/([0-9]{4})";
            boolean flag = false;
            if (date.matches(pattern)) {
                flag = true;
            }
            return flag;
    
        }
    
    
    
    }
    
    class InvalidUsernameException extends Exception{
        String num1;
        InvalidUsernameException(String num2) {
            num1=num2;
        }
        public String toString(){
            return ("exception in thread ‘main’ InvalidUsernameException: Username: "+ num1 + " doesn’t match") ;
        }
    }
    
    class InvalidPasswordException extends Exception{
        String num1;
        InvalidPasswordException(String num2) {
            num1=num2;
        }
        public String toString(){
            return ("exception in thread ‘main’ InvalidPasswordException: Username: "+ num1 + " doesn’t match") ;
        }
    }
    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
  3. Asked: February 13, 2023In: Internshala

    Data Science Internshala final test answer

    I'M ADMIN
    Added an answer on February 13, 2023 at 1:51 pm

    Get Internshala final test answers for all courses on SIKSHAPATH-STORE Like: Data science final test answer ( Link : DATA_SCIENCE ) Blockchain final test answer Internshala blockchain final test answer Matlab final test answer Ethical hacking final test answer Android app development final test answRead more

    Get Internshala final test answers for all courses on SIKSHAPATH-STORE

    Like:

    Data science final test answer ( Link : DATA_SCIENCE )

    Blockchain final test answer

    Internshala blockchain final test answer

    Matlab final test answer

    Ethical hacking final test answer

    Android app development final test answer Internshala

    Web development final test answer

    Cloud computing using AWS final test answer

    and many more.

    Just visit: https://store.sikshapath.in/store/ or CLICK HERE -> Sikshapath-Store

    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
  4. Asked: October 23, 2022In: Data Structure

    Solve using fractional knapsack: M=20, n=4 P= (3, 10, 15, …

    58n25709
    Added an answer on January 30, 2023 at 10:13 am

    The fractional knapsack problem involves selecting items to fill a knapsack of limited capacity (M=20 in this case) in such a way as to maximize the total value. Here's how to solve it: Sort the items in decreasing order of their value per unit weight (i.e. Pi/Wi). Item 1: 3/5 = 0.6 Item 2: 10/13 =Read more

    The fractional knapsack problem involves selecting items to fill a knapsack of limited capacity (M=20 in this case) in such a way as to maximize the total value.

    Here’s how to solve it:

    1. Sort the items in decreasing order of their value per unit weight (i.e. Pi/Wi).
      • Item 1: 3/5 = 0.6
      • Item 2: 10/13 = 0.769
      • Item 3: 15/12 = 1.25
      • Item 4: 5/8 = 0.625
    2. Take the items in the order of the sorted list until the knapsack is full. If a complete item cannot fit, take a fraction of it.
      • Item 3 (15/12) can fit completely, so add it to the knapsack and reduce the capacity to 20-12=8.
      • Item 2 (10/13) can fit completely, so add it to the knapsack and reduce the capacity to 8-13= -5.
      • Item 1 (3/5) cannot fit completely, so add 3/5 of it to the knapsack and reduce the capacity to 0.
      • Item 4 (5/8) is not considered since the knapsack is full.
    3. The total value of the items in the knapsack is 15 + 10 + (3/5)*3 = 22.

    So the optimal solution is to choose items 3, 2 and a fraction of item 1, with a total value of 22.

    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
  5. Asked: October 23, 2022In: Data Structure

    Analyse the algorithm (in terms of both time and space) …

    58n25709
    Added an answer on January 30, 2023 at 10:11 am

    The time complexity of the subset sum problem using dynamic programming technique is O(nW), where n is the number of items and W is the target sum. The space complexity is O(nW). The most time-consuming part of the algorithm is the bottom-up dynamic programming loop, where each cell in the n x W matRead more

    The time complexity of the subset sum problem using dynamic programming technique is O(nW), where n is the number of items and W is the target sum. The space complexity is O(nW).

    The most time-consuming part of the algorithm is the bottom-up dynamic programming loop, where each cell in the n x W matrix is filled in. This loop takes O(nW) time in total.

    The most space-consuming part of the algorithm is the n x W matrix itself, which requires O(nW) space to store the results of the dynamic programming.

    Overall, both the time and space complexity are directly proportional to the size of the n x W matrix, making the dynamic programming solution to the subset sum problem an exponential-time algorithm.

    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
  6. Asked: October 23, 2022In: Data Structure

    A networking company uses a compression technique to encode the …

    58n25709
    Added an answer on January 30, 2023 at 10:09 am
    This answer was edited.

    Total number of characters in the message = 100. Each character takes 1 byte. So total number of bits needed = 800. After Huffman Coding, the characters can be represented with: f: 0 c: 100 d: 101 a: 1100 b: 1101 e: 111 Total number of bits needed = 224 Hence, number of bits saved = 800 - 224 = 576Read more

    Total number of characters in the message = 100. 
    Each character takes 1 byte. So total number of bits needed = 800.
    
    After Huffman Coding, the characters can be represented with:
    f: 0
    c: 100
    d: 101
    a: 1100
    b: 1101
    e: 111
    Total number of bits needed = 224
    Hence, number of bits saved = 800 - 224 = 576
    
    Huffman Coding | Greedy Algo-3 - GeeksforGeeks
    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
  7. Asked: June 1, 2023In: C language

    What is a set of instructions used to perform some tasks?

    Best Answer
    ADMIN 2
    Added an answer on January 20, 2023 at 2:34 am
    This answer was edited.

    The set of instructions that are used to perform a specific task is referred to as program, or software program. A program can be created using various programming languages, such as C, Java, Python, etc. A program contains statements that specify the logic and data of the task. Before a program canRead more

    The set of instructions that are used to perform a specific task is referred to as program, or software program.

    A program can be created using various programming languages, such as C, Java, Python, etc.

    A program contains statements that specify the logic and data of the task.

    Before a program can run on a computer, it has to be either compiled or interpreted.

    A program can also communicate with other programs and hardware devices using input and output operations.

    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
  8. Asked: January 8, 2023In: DBMS

    DBMS QUESTION LATEST 2023

    I'M ADMIN
    Added an answer on January 8, 2023 at 4:00 pm

    1.What is a database? a) Organized collection of information that cannot be accessed, updated, and managed b) Collection of data or information without organizing c) Organized collection of data or information that can be accessed, updated, and managed d) Organized collection of data that cannot beRead more

    1.What is a database?
    a) Organized collection of information that cannot be accessed, updated, and managed
    b) Collection of data or information without organizing
    c) Organized collection of data or information that can be accessed, updated, and managed
    d) Organized collection of data that cannot be updated

     

    2.What is DBMS?
    a) DBMS is a collection of queries
    b) DBMS is a high-level language
    c) DBMS is a programming language
    d) DBMS stores, modifies and retrieves data

     

    3.Who created the first DBMS?
    a) Edgar Frank Codd
    b) Charles Bachman
    c) Charles Babbage
    d) Sharon B. Codd

     

    4.Which type of data can be stored in the database?
    a) Image oriented data
    b) Text, files containing data
    c) Data in the form of audio or video
    d) All of the above

     

     

    5.Which of the following is not a type of database?
    a) Hierarchical
    b) Network
    c) Distributed
    d) Decentralized

     

    6.Which of the following is not an example of DBMS?
    a) MySQL
    b) Microsoft Acess
    c) IBM DB2
    d) Google

     

    7.Which of the following is a feature of DBMS?
    a) Minimum Duplication and Redundancy of Data
    b) High Level of Security
    c) Single-user Access only
    d) Support ACID Property

     

    8.Which of the following is known as a set of entities of the same type that share same properties, or attributes?
    a) Relation set
    b) Tuples
    c) Entity set
    d) Entity Relation model

     

    9.What is information about data called?
    a) Hyper data
    b) Tera data
    c) Meta data
    d) Relations

     

    10.What does an RDBMS consist of?
    a) Collection of Records
    b) Collection of Keys
    c) Collection of Tables
    d) Collection of Fields

     

     11.The values appearing in given attributes of any tuple in the referencing relation must likewise occur in specified attributes of at least one tuple in the referenced relation, according to _____________________ integrity constraint.
    a) Referential
    b) Primary
    c) Referencing
    d) Specific

     

     

    12._____________ is a hardware component that is most important for the operation of a database management system.
    a) Microphone
    b) High speed, large capacity disk to store data
    c) High-resolution video display
    d) Printer

     

     

    13.The DBMS acts as an interface between ________________ and ________________ of an enterprise-class system.
    a) Data and the DBMS
    b) Application and SQL
    c) Database application and the database
    d) The user and the software

     

    14.______________ is a set of one or more attributes taken collectively to uniquely identify a record.
    a) Primary Key
    b) Foreign key
    c) Super key
    d) Candidate key

     

    15.Which of the following set should be associated with weak entity set for weak entity to be meaningful?
    a) Neighbour set
    b) Strong entity set
    c) Owner set
    d) Identifying set

     

    16.Which forms have a relation that contains information about a single entity?
    a) 4NF
    b) 2NF
    c) 5NF
    d) 3NF

     

    17.The top level of the hierarchy consists of ______ each of which can contain _____.
    a) Schemas, Catalogs
    b) Schemas, Environment
    c) Environment, Schemas
    d) Catalogs, Schemas

     

    18._______ indicates the maximum number of entities that can be involved in a relationship.
    a) Greater Entity Count
    b) Minimum cardinality
    c) Maximum cardinality
    d) ERD

     

    19.The user IDs can be added or removed using which of the following fixed roles?
    a) db_sysadmin
    b) db_accessadmin
    c) db_securityadmin
    d) db_setupadmin

     

     

    20.Why the following statement is erroneous?

    SELECTdept_name, ID,avg(salary)

    FROM instructor

    GROUPBYdept_name;

    1. a) Dept_id should not be used in group by clause
      b) Group by clause is not valid in this query
      c) Avg(salary) should not be selected
      d) None

     

    21.Which of the following is not the utility of DBMS?
    i) Backup ii) Loading iii) Process Organization iv) File organization
    a) i, ii, and iv only
    b) i, ii and iii only
    c) i, iii and iv only
    d) All i, ii, iii, and iv

     

    22.What is the function of the following command?

    Delete from r where P;

    1. a) Clears entries from relation
      b) Deletes relation
      c) Deletes particular tuple from relation
      d) All of the mentioned

     

    23.Which of the following is popular for applications such as storage of log files in a database management system since it offers the best write performance?
    a) RAID level 0
    b) RAID level 1
    c) RAID level 2
    d) RAID level 3

     

    24.Which of the following represents a query in the tuple relational calculus?
    a) { }{P(t) | t }
    b) {t | P(t)}
    c) t | P() | t
    d) All of the mentioned

     

     

    25.Evaluate the statements issued by the DBA in the given sequence if OE and SCOTT are the users and the ORDERS table is owned by OE.

    CREATEROLE r1;GRANTSELECT,INSERTONoe. orders TO r1;GRANT r1 TOscott;GRANTSELECTONoe. orders TOscott;REVOKESELECTONoe.ordersFROMscott;

    What would be the outcome after executing the statements?
    a) The REVOKE statement would give an error because the SELECT privilege has been granted to the role R1
    b) The REVOKE statement would remove the SELECT privilege from SCOTT as well as from the role R1
    c) SCOTT would be able to query the OE.ORDERS table
    d) SCOTT would not be able to query the OE.ORDERS table

    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
  9. Asked: November 12, 2022In: University

    Web and Mobile  Security worksheet All worksheet 1 to 10

    JonSnow07
    Added an answer on November 12, 2022 at 1:24 pm
    This answer was edited.

    Click on the below drive link to download the file: https://drive.google.com/uc?export=download&id=1OlrSLOJhdFXHicWRrHQELoaa-Sf0Cu97

    Click on the below drive link to download the file:

    https://drive.google.com/uc?export=download&id=1OlrSLOJhdFXHicWRrHQELoaa-Sf0Cu97

    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
  10. Asked: November 9, 2022In: Java

    Create a student class object array of size four having …

    I'M ADMIN
    Added an answer on November 10, 2022 at 7:18 pm

    Follow the below link for answer:   https://sikshapath.in/question/create-a-student-class-object-array-of-size-four-having-attributes-name-java-programming-language/

    Follow the below link for answer:

     

    Create a student class object array of size four having attributes name-Java programming language

    See less
    • 0
    • Share
      Share
      • Share on WhatsApp
      • Share onFacebook
      • Share on Twitter
      • Share on LinkedIn
Load More Answers

Sidebar

store ads

Stats

  • Questions 1k
  • Answers 1k
  • Posts 141
  • Best Answers 64
  • AI 101: Create Presentation Slide Using AI | Gamma App
  • What is the Difference Between Section, Article and Aside in HTML5?
  • How to enable or disable ChatGPT on the Windows 11 taskbar
  • NPTEL Data Mining Assignment Answers 2023 -Week 8
  • NPTEL Data Mining Assignment Answers 2023 -Week 7

Explore

  • Recent Questions
  • Questions For You
  • Answers With Time
  • Most Visited
  • New Questions
  • Recent Questions With Time

Footer

Sikshapath Logo

Helpful Links

  • Contact
  • Disclaimer
  • Privacy Policy Notice
  • TERMS OF USE
  • FAQs
  • Refund/Cancellation Policy
  • Delivery Policy for Sikshapath

Follow Us

© 2021-23 Sikshapath. All Rights Reserved

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Refresh
Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock