Skip to main content

PROBLEM SOLVING AND PYTHON PROGRAMMING QUIZ

1) What is the first step in problem-solving? A) Writing code B) Debugging C) Understanding the problem D) Optimizing the solution Answer: C 2) Which of these is not a step in the problem-solving process? A) Algorithm development B) Problem analysis C) Random guessing D) Testing and debugging Answer: C 3) What is an algorithm? A) A high-level programming language B) A step-by-step procedure to solve a problem C) A flowchart D) A data structure Answer: B 4) Which of these is the simplest data structure for representing a sequence of elements? A) Dictionary B) List C) Set D) Tuple Answer: B 5) What does a flowchart represent? A) Errors in a program B) A graphical representation of an algorithm C) The final solution to a problem D) A set of Python modules Answer: B 6) What is pseudocode? A) Code written in Python B) Fake code written for fun C) An informal high-level description of an algorithm D) A tool for testing code Answer: C 7) Which of the following tools is NOT commonly used in pr...

Computer Security Classification

Computer-Security Classifications 
* No computer system can be 100% safe, and attempts to make it so can fastly make it not usable.
* However one can establish a level of faith to which one feels "safe" using a given computer system for specific security needs.
* The U.S. Department of Defense’s "Trusted Computer System Evaluation Criteria" defines four broad levels of faith, and sub-levels in some cases:
• Level D is the minimum trustworthy, and incorporate all systems that do not meet any of the more strict criteria. DOS and Windows 3.1 fall into level D, whichhas no user identification or authorization, and anyone who sits down has full process and control over the machine.
• Level C1 adds user identification and authorization, and some means of 
controlling what users are permited to process what files. It is constructed for use by a group of mostly cooperating users, and describes most common UNIX systems.
• Level C2 adds individual-level control and monitoring. For example file access 
control can be permited or delayed on a per-individual basis, and the system 
administrator can monitor and log the activities of particular individuals. Another 
limitation is that when one user uses a system resource and then turns it back to the system, another user who uses the same resource later cannot read any of the data that the first user stored there. (I.e. buffers, etc. are wiped out 
between users, and are not left full of old contents.) Some special safe versions 
of UNIX have been verified for C2 security levels, such as SCO.
• Level B adds responsiveness labels on each object in the system, such as "secret", "top secret", and "confidential". Individual users have different clearance levels, which controls which objects they are able to process. All human-readable documents are labeled at both the top and bottom with the responsiveness level of the file.
• Level B2 enlarge sensitivity labels to all system resources, including devices. B2 
also supports turn channels and the auditing of events that could exploit turn channels.
• B3 allows creation of access-control lists that signify users NOT given access to 
specific objects.
• Class A is the highest level of security. Architecturally it is the same as B3, but it 
is developed using formal methods which can be used to prove that the system 
meets all needs and cannot have any possible bugs or other vulnerabilities. 
Systems in class A and higher may be designed by trusted personnel in secure 
facilities.
• These classifications defines what a system can implement, but it is up to 
security policy to define how they are implemented in practice. These systems 
and policies can be reviewed and verified by trusted organizations, such as the 
National Computer Security Centre. Other standards may dictate physical protections and other problems.

An Example: Windows XP 
* Windows XP is a normal purpose OS designed to support a vast variety of security features and methods. It is based on user accounts which can be collected in any manner.
* When a user logs on, a security process token is gives that includes the security ID for the user, security IDs for any groups of which the user is a member, and a list of any special privileges the user has, such as performing backups, shutting down the system, and modifying the system clock.
* Every process running on behalf of a user gets a duplicate of the user’s security token, which defines the privileges of that process running on behalf of that user.
* Authentication is generally complete via passwords, but the modular design of XP permits for another authentication such as retinal scans or fingerprint readers.
* Windows XP includes built-in auditing that permits many common security threats to be monitored, such as successful and unsuccessful logins, logouts, attempts to write to executable files, and process to certain sensitive files.
* Security attributes of objects are defined by security descriptors, which adds the ID of the owner, group ownership for POSIX subsystems only, a discretionary access-control list defining exactly what permissions each user or collection on the system has for this specific object, and auditing control information.
* The access control lists adds for each specified user or group either Access Allowed or Access Denied for the following types of actions: Read Data, Write Data, Append Data, Execute, Read Attributes, Write Attributes, ReadExtendedAttribute, and WriteExtendedAttribute.
* Container objects such as directories can logically consists of other objects. When a new object is created in a container or duplicate into a container, by default it inherits the permissions of the new container. No container objects inherit any other permission. If the permissions of the container are changed later, that does not affect the access of the contained objects.
* Although Windows XP is effective of supporting a secure system, many of the security features are not enabled by default, resulting in a fair number of security breaches on XP systems. There are also a large number of system daemons and other programs that start 
automatically at start-up, whether the system administrator has thought about them or not. (My system currently has 54 processes running, most of which I did not intentionally start and which have short cryptic names which makes it hard to divine exactly what they do /or why. Faced with this situation, most users and administrators will simply leave alone 
anything they don't understand. )

Popular posts from this blog

Abbreviations

No :1 Q. ECOSOC (UN) Ans. Economic and Social Commission No: 2 Q. ECM Ans. European Comman Market No : 3 Q. ECLA (UN) Ans. Economic Commission for Latin America No: 4 Q. ECE (UN) Ans. Economic Commission of Europe No: 5 Q. ECAFE (UN)  Ans. Economic Commission for Asia and the Far East No: 6 Q. CITU Ans. Centre of Indian Trade Union No: 7 Q. CIA Ans. Central Intelligence Agency No: 8 Q. CENTO Ans. Central Treaty Organization No: 9 Q. CBI Ans. Central Bureau of Investigation No: 10 Q. ASEAN Ans. Association of South - East Asian Nations No: 11 Q. AITUC Ans. All India Trade Union Congress No: 12 Q. AICC Ans. All India Congress Committee No: 13 Q. ADB Ans. Asian Development Bank No: 14 Q. EDC Ans. European Defence Community No: 15 Q. EEC Ans. European Economic Community No: 16 Q. FAO Ans. Food and Agriculture Organization No: 17 Q. FBI Ans. Federal Bureau of Investigation No: 18 Q. GATT Ans. General Agreement on Tariff and Trade No: 19 Q. GNLF Ans. Gorkha National Liberation Front No: ...

Operations on data structures

OPERATIONS ON DATA STRUCTURES This section discusses the different operations that can be execute on the different data structures before mentioned. Traversing It means to process each data item exactly once so that it can be processed. For example, to print the names of all the employees in a office. Searching It is used to detect the location of one or more data items that satisfy the given constraint. Such a data item may or may not be present in the given group of data items. For example, to find the names of all the students who secured 100 marks in mathematics. Inserting It is used to add new data items to the given list of data items. For example, to add the details of a new student who has lately joined the course. Deleting It means to delete a particular data item from the given collection of data items. For example, to delete the name of a employee who has left the office. Sorting Data items can be ordered in some order like ascending order or descending order depending ...

The Rise of Green Buildings: A Sustainable Future

In an era where climate change and environmental sustainability dominate global conversations, the concept of green buildings has emerged as a pivotal solution. These structures, designed with both ecological and human health in mind, represent a shift towards more sustainable urban development. But what exactly are green buildings, and why are they so important? What Are Green Buildings? Green buildings, also known as sustainable buildings, are structures that are environmentally responsible and resource-efficient throughout their life cycle—from planning and design to construction, operation, maintenance, renovation, and demolition. This holistic approach seeks to minimize the negative impact of buildings on the environment and human health by efficiently using energy, water, and other resources. Key Features of Green Buildings Energy Efficiency: Green buildings often incorporate advanced systems and technologies to reduce energy consumption. This can include high-efficiency HVAC sys...