Posts

Showing posts from 2022

Top 10 Javascript Interview Question With Answers | letsbug

     Javascript Interview Questions 1. What is Rest Parameters?      Answer:            The Rest parameter syntax allows a function to accept indefinite number of arguments as an array. 2. What is Rest Operators?      Answer:            The Rest Operator allows us to call a function and then access those excess arguments as an array. 3. What is Currying functions?      Answer:            Currying is a function that takes one argument at a time and returns a new function expecting the next argument. 4. Immediately invoked functions example:      Answer:            (() => {})() 5.  What is Call()      Answer:            The call() method calls the function with a given this value and arguments provided individually. 6. What is apply()      Answer:            The apply method calls the specified function with a given this value, and arguments provided as an array. 7. What is bind()      Answer:            The bind() method creates a new function that, when called, has its this keyword

Cyber Offenses and Cyberstalking | letsbug

    Cyber Offenses And Cyberstalking 1.  Answer the following questions in short. 1. Define Cyber Terrorism.      Answer:            The politically motivated use of computers and information to cause disruption in a nation society 2. What is social engineering?      Answer:            Social engineering is the art of manipulating people, so they give up confidential information. Social engineering is a non-technical strategy used by cyber attackers. It involves human interaction. It uses psychological manipulations to trick uses into making security mistakes or giving away sensitive information. 3. What is cyberstalking?      Answer:            The dictionary meaning of "stalking" is an "act or process of following perey stealthily - trying to approach somebody or something."          Cyberstalking has been defined as the use of information and communications technology, particularly the Internet, by an individual or group or individuals to harass another individua

Introduction To Cyber Crime And Cyber Security Question And Answers | letsbug

   Introduction To Cyber Crime And Cyber Security 1.  Answer the following questions in short. 1. What is E-mail spamming?      Answer:            Spam is any kind unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but is can also be distributed via text messages, phone calls, or social media.          E-mail spam is popular but it is used in other media also like Instant messaging Spam, Usenet newsgroups Spam, Web search engine Spam, Spam in blog, wiki Spam, online classified ads Spam, Mobile phone messaging Spam, Internet forum Spam, Social networking Spam, File Sharing network Spam, Video Sharing sites etc. 2. Define cybercrime?      Answer:            Cybercrime is any illegal behaviour, directed by means of electronic operations that target the security of computer system and the data processed by them. 3. What is hacking?      Answer:            Hacking is an act of breaking into a computer and/or network and it is an offense. Ha

Regular Expression For Email Validation | Javascript | letsbug

     Hello everyone, this article we are going to implement regular expression for email validation in Javascript. Regular Expression is used to validate some value to a specific pattern. If the pattern matches the input value that means it is true else false.     This is not limited to javascript you can implement regular expression in any programming language. The only difference that you will notice is the methods or functions which are built-in the programming language to match these regular expression patterns.     In javascript itself there are many ways to test it. And in this example we will use test() function to test the regular expression against some value pass in as arguments. Regular Expression For Email Validation in Javascript  code: let regx =     / ^ [_A-z0-9-] + ( \.[_A-z0-9] + ) * @ [A-z0-9] + ( \.[A-z0-9-] + ) * ( \.[A-z] {2,3} ) $ / console . log ( regx . test ( "sample@email.com" )) console . log ( regx . test ( "sample.sample@email.subdomain.co

Wired And Wireless LAN Question And Answer | letsbug

 Wired And Wireless LAN 1.  Answer the following questions in short. 1. What is IEEE standards?      Answer:             The Institute for Electrical and Electronic Engineering developed an Ethernet standard know as IEEE standard 802.3. Ethernet is the most widely-installed Local Area Network technology.            This standard defines rules for configuring an Ethernet network and also specifies how the elements in an Ethernet network interacts with one another. By following IEEE standard, network equipment and network protocol can communicate efficiently. 2. Describe Fast Ethernet.      Answer:              The Fast Ethernet standard (IEEE 802.3u) has been established for Ethernet networks that need higher transmission speeds. This standard raises the Ethernet speed limit from 10 mbps to 100 mbps with only minimal changes to the existing cable structure. Fast Ethernet provides faster throughput for video, multimedia, graphics, Internet surfing and stronger error detection and correct

Network Connectivity Devices Question And Answer | letsbug

 Network Connectivity Devices 1.  Answer the following questions in short. 1. What are network connectivity devices?      Answer:            Network Connecting devices includes all computers, peripherals, interface cards and other equipments needed to perform data-processing and communications within the network.          Example: Network Interface Card(NIC), Hub, Switch, Bridge, Router, Gateway. 2. What is active and passive hub?      Answer:            Active hub is a type of hub that takes active participation in data communication within the network/LAN. An active hub is basically a multiport repeater of the class II type, although it is still a physical layer device - it buffers incoming frames and regenerates them, sending the regenerated signal out on all of its ports.          Passive hubs does not provide any additional features except for working just as an interface between the topology. A passive hub simply receives signals on input port and broadcast it on the output port

Network Security Questions And Answers | letsbug

Network Security  1.  Answer the following questions in short. 1. What is meant by Network security?      Answer:             Network / Computer security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.          Network security involves the authorization of access to data in a network, which is controlled by the network administrator. 2. What is plaintext and ciphertext?      Answer:           The plaintext or clear text message can be understood by anybody, (sender, recipients) else who gets access total message.         When a plaintext message is codified using any suitable scheme (encryption), the resulting message is called ciphertext .          The message to be encrypted, know as "plain text"          The output of the encryption process, known as the "ciphertext" 3. What is attack? What are its type?

Network Models Question And Answer | letsbug

 Network Models Question And Answer 1.  Answer the following questions in short. 1. what is network model?      Answer:            A Network Model reflects a design or architecture to accomplish communication between different systems. Network models are also referred to as network stacks or protocol suites. Examples of network models includes  TCP/IP, Sequenced Packet Exchange/Internet Packet Exchange(SPX/IPX) used by Novell Netware, the Network Basic Input Output System (Net-BIOS), which comprises the building blocks for most Microsoft networking and network applications; and AppleTalk, the network model for Apple Macintosh computers.     A network model usually consists of layers. Each layers of a model represents specific functionality. Within the layers of model, there are usually protocols specified to implement specific tasks. 2. Write name of addresses used in TCP/IP protocol.      Answer:       In TCP/IP, different levels of addresses are used, Physical Address(Hardware Addres

Categories

Big Data Analytics Binary Search Binary Search Tree Binary To Decimal binary tree Breadth First Search Bubble sort C Programming c++ Chemical Reaction and equation class 10 class 10th Class 9 Climate Complex Numbers computer network counting sort CSS Cyber Offenses Cyber Security Cyberstalking Data Science Data Structures Decimal To Binary Development diamond pattern Digital Marketing dust of snow Economics Economics Lesson 4 Email Validation English fire and ice Food Security in India Footprints Without feet Forest And Wildlife Resources game Geography Geography lesson 6 glassmorphism Glossary Graph HackerRank Solution hindi HTML image previewer India-Size And Location Insertion Sort Internet Network Status Interview Questions Introduction to cyber crime and cyber security IT javascript tricks json to CSV converter lesson 2 lesson 1 lesson 2 Lesson 3 Lesson 6 lesson 7 Life lines of National Economy life processes Linear Search Linked List lowest common ancestor Machine Learning MCQs median in array Merge sort min and max of two numbers Moment Money and Credit My Childhood Natural Vegetation and Wildlife NCERT Network connectivity devices Network Models Network Security No Men Are foreign Node.js operator overloading P5.js PHP Physical features of India Population Prime Numbers python Quick sort R language Rain on the roof Regular Expression Resources and development reversing array saakhi science Searching Algorithm Selection sort Social Media Marketing social science Software Engineering Software Testing Sorting Algorithm Stacks staircase pattern System Concepts Text Recognition The last Leaf time converter Time Passed From A Date Todo List App Tree Trending Technologies Understanding Economic Development username and password video player Visualization water resources Wired And Wireless LAN साखी
Show more

Popular Posts

Big Data MCQs(multiple choice questions) with answers - letsbug

Digital Marketing MCQ(Multiple Choice Questions) with Answers | part 1 | letsbug

Software Engineering MCQs questions with answers - letsbug