Q1. What is a sink? a. A node with no incoming edges. b. A node with maximum incoming edges. c. A node with maximum outgoing edges. d. A node with no outgoing edges. Q2. What should we do when ...Read more
SIKSHAPATH Latest Questions
Q1. NMAP command can be used for? a. Host Discovery b. Port Scanning c. Service and Version Detection d. OS Detection e. Vulnerability Scanning Q2. In UDP sweep scan, a scanner sends a UDP datagram and receives an ...Read more
A manufacturer claims that only 4% of his products supplied by him are defective. A random sample of 600 products contains 36 defectives. Test the claim of the manufacturer at 5% level of significance.
Identify and explain any five security vulnerabilities and provide a protective measure for each of these vulnerabilities
Course Name: Data Manipulation in Python: Master Python, Numpy & Pandas Platform: Udemy Certificate: Available Python is one of the best general-purpose programming languages for beginners. It is too easy to learn the syntax of ...Read more
Imagine A bank manager is given a data set containing records of 1000 applicants who have applied for a loan. The bank manager uses a suitable machine learning model to categorize the records of applicants into two classes either approved ...Read more
An Online bookstore is to be implemented. This project is a website that acts as a central book store. Such online bookstores tend to get a large number of online visitors. A user visiting the website can see a wide ...Read more
Create a network using Distance Vector routing Protocol using Packet Tracer
How it is to be considered that software having good quality will have good functionality? Discuss the various parameters which play a keen role during quality assurances.
Analyze the relationship between architectural model, reference model, and reference architecture. Bring out the numerous process recommendations used by an architect while developing software architectures.