Notes, summaries, assignments, exams, and problems for Other courses

Sort by
Subject
Level

Blockchain Cryptography: ECC, Hashing, and Consensus

Posted by Anonymous and classified in Computers

Written on in English with a size of 19.16 KB

Elliptic Curve Cryptography (ECC) in Blockchain

Elliptic Curve Cryptography (ECC) is a public-key cryptography technique based on the mathematics of elliptic curves over finite fields. It is widely used in blockchain systems such as Bitcoin and Ethereum for generating secure public-private key pairs and digital signatures. The main advantage of ECC is that it provides high security with smaller key sizes, making it faster and more efficient.

The Mathematical Equation of ECC

The general equation of an elliptic curve is:

y2 = x3 + ax + b

  • a and b are constants that define the shape of the curve.
  • The curve is defined over a finite field Fₚ (where p is a prime number) for cryptographic applications.
  • To be a valid elliptic curve, it must satisfy the condition:
... Continue reading "Blockchain Cryptography: ECC, Hashing, and Consensus" »

Biology Class 9: Plant Tissues & Cellular Structure

Posted by Anonymous and classified in Biology

Written on in English with a size of 1.57 KB

Biology Class IX: Tissues Assessment

A. Choose the Correct Option (1x5=5)

  1. Rapid elongation of bamboo stem is due to:

    • a. Lateral meristem
    • b. Intercalary meristem
    • c. Cambium
    • d. None of the above
  2. Which of the following tissues has dead cells?

    • a. Parenchyma
    • b. Sclerenchyma
    • c. Collenchyma
    • d. Epithelial tissue
  3. Girth of stem increases due to which of the following meristem?

    • a. Apical
    • b. Intercalary
    • c. Lateral
    • d. None of the above
  4. The flexibility in plants is due to a tissue called:

    • a. Chlorenchyma
    • b. Parenchyma
    • c. Sclerenchyma
    • d. Collenchyma
  5. Which of the following tissues has the ability to divide?

    • a. Xylem
    • b. Phloem
    • c. Meristematic tissue
    • d. Permanent tissue

B. Very Short Type Questions (2x2=4)

  1. Define the following:

    • a. Tissue
    • b. Differentiation
  2. Write any two utilities of tissue.

... Continue reading "Biology Class 9: Plant Tissues & Cellular Structure" »

Python Fundamentals and String Methods for Data Preparation

Posted by Anonymous and classified in Computers

Written on in English with a size of 5.02 KB

Day 1: Python Basics for AI/ML Preparation

Output Statements

  • print() – Displays output to the console.
  • end=" " – Prevents a new line after the print statement.
  • sep="," – Specifies the character used to separate multiple items in the output.

Input and Type Casting

  • The input() function always returns a string data type.
  • Adding strings results in *concatenation* (e.g., "5" + "10" = "510").
  • Use int() or float() for numerical input conversion:

    Example: num = int(input("Enter a number: "))

Variables and Data Types

  • Common types include int (integer), float (decimal), str (string), and bool (boolean).
  • Use type(variable) to check the data type of any variable.

Formatted Strings (f-Strings)

  • Used for easy string formatting and embedding variables:

    Example: print(

... Continue reading "Python Fundamentals and String Methods for Data Preparation" »

Digital Business and Information Systems Fundamentals

Posted by Anonymous and classified in Language

Written on in English with a size of 50.02 KB

E-commerce Security Requirements

E-commerce security refers to the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. Because financial transactions and sensitive information (like credit card numbers, passwords, and personal details) are involved, strong security is essential in e-commerce systems.

Key E-commerce Security Requirements:

  • Authentication: Ensures that the parties involved (both buyer and seller) are who they claim to be.
  • Authorization: Grants specific permissions to authenticated users.
  • Confidentiality: Ensures that data is accessible only to authorized individuals.
  • Integrity: Ensures that data is not altered during transmission or storage.
  • Non-Repudiation: Prevents parties from denying their actions.
... Continue reading "Digital Business and Information Systems Fundamentals" »

Information Security Fundamentals: Concepts, Cryptography, and Jamming Defenses

Posted by Anonymous and classified in Computers

Written on in English with a size of 8.66 KB

What is Information Security?

Information security means protecting data from theft, alteration, destruction, disclosure, or denial of access. It has traditionally relied on physical measures (e.g., locked cabinets) and administrative controls (e.g., personnel screening). Even today, some reliance on physical security remains.

Modern Information Security Needs

With increased computer usage, automated tools are now essential for protecting stored information. As network usage grows, securing data during transmission has become equally essential.

Aspects of Information Security (ITU-T X.800/1205)

  • Security Attack: Any action that compromises system security.
  • Threat: A potential violation, defined as capability plus intent.
  • Security Mechanism: Any policy
... Continue reading "Information Security Fundamentals: Concepts, Cryptography, and Jamming Defenses" »

Pharmaceutical Dosage Forms: Creams, Powders, and Solutions

Posted by Anonymous and classified in Chemistry

Written on in English with a size of 7.18 KB

Defining Creams and Pastes

Creams

Creams are semi-solid emulsions used externally on the skin. They can be either oil-in-water (O/W) or water-in-oil (W/O) emulsions. They are used for moisturizing, healing, or delivering drugs through the skin.

  • Example: Cold Cream (W/O), Vanishing Cream (O/W)

Pastes

Pastes are also semi-solid but contain a high amount of insoluble powders (around 25-50%), making them stiffer and more absorptive. They form a protective layer on the skin and are used where longer contact is needed.

  • Example: Zinc Oxide Paste

Understanding Pharmaceutical Aerosols

Aerosols are pressurized dosage forms that release active ingredients as a fine spray, mist, or foam when a valve is opened. They use propellants (like hydrocarbons or compressed... Continue reading "Pharmaceutical Dosage Forms: Creams, Powders, and Solutions" »

Shoulder Joint Anatomy: Bones, Muscles, Movement, & Injuries

Posted by Anonymous and classified in Physical Education

Written on in English with a size of 42.72 KB

The shoulder joint, also known as the glenohumeral joint, is a ball-and-socket type synovial joint that allows a wide range of motion in the upper limb. Here’s a breakdown of its key features:


🦴 Bones Involved

  1. Humerus – the upper arm bone; its head forms the "ball."
  2. Scapula (shoulder blade) – contains the glenoid cavity, which forms the "socket."
  3. Clavicle (collarbone) – indirectly involved, connecting the shoulder to the axial skeleton via the acromioclavicular and sternoclavicular joints.

🦾 Movements Allowed

9k=

Because it is a ball-and-socket joint, it allows:

  • Flexion and Extension
  • Abduction and Adduction
  • Medial (internal) and Lateral (external) Rotation
  • Circumduction (circular movement)

💪 Muscles Involved

9k=

9k=

Key muscles acting on the shoulder... Continue reading "Shoulder Joint Anatomy: Bones, Muscles, Movement, & Injuries" »

Major World Conflicts and Historical Turning Points

Classified in History

Written on in English with a size of 5.44 KB

World War II: Major Combatants & Events

Sides and Leaders of WWII

  • Allied Powers:
    • Countries: U.S., U.K., France, China, Soviet Union
    • Leaders: Winston Churchill (U.K.), Franklin D. Roosevelt / Harry S. Truman (U.S.), Joseph Stalin (Soviet Union), Charles de Gaulle (France), Chiang Kai-shek (China)
  • Axis Powers:
    • Countries: Germany, Japan, Italy
    • Leaders: Adolf Hitler (Germany), Benito Mussolini (Italy), Emperor Hirohito / Hideki Tojo (Japan)

Molotov-Ribbentrop Pact (1939)

Signed in 1939 by Germany and the Soviet Union, this pact included a secret protocol that divided territories:

  • Germany: Western Poland and part of Lithuania
  • Soviet Union: Eastern Poland, Finland, Estonia, Latvia, and parts of Romania

Nuclear Bombings of Japan (1945)

Hiroshima was bombed... Continue reading "Major World Conflicts and Historical Turning Points" »

Understanding Chromatography: Techniques and Applications

Posted by Anonymous and classified in Chemistry

Written on in English with a size of 17.84 KB

Principle of Chromatography - Chromatography is a separation method where the analyte is combined within a liquid or gaseous mobile phase, which is pumped through a stationary phase. Usually, one phase is hydrophilic and one is lipophilic. The components of the analyte interact differently with these two phases. Depending on their polarity, they spend more or less time interacting with the stationary phase. This leads to the separation of different components present in the sample. Each sample component elutes from the stationary phase at a specific time called retention time.


Types of Chromatography

  1. Liquid Chromatography - This type of chromatography is used to separate and analyze non-volatile compounds. In this technique, the sample is dissolved
... Continue reading "Understanding Chromatography: Techniques and Applications" »

Yellow Fever Vaccination: Requirements, Procedure, and Safety

Posted by Anonymous and classified in Medicine & Health

Written on in English with a size of 639.69 KB

Yellow Fever Vaccination: Requirements and Procedure

Vaccination Fees

The total cost for the Yellow Fever vaccination service is $120, broken down as follows:

  • Travel Consultation Fee: $50
  • Yellow Fever (YF) Assessment Fee: $50
  • Injection Fee: $20

Country Requirements for Yellow Fever Vaccine

The following countries often require proof of Yellow Fever vaccination for entry:

Angola
Benin
Burkina Faso
Burundi
Cameroon
Central African Republic
Republic of the Congo
Côte d’Ivoire
Democratic Republic of the Congo
French Guiana
Gabon
Ghana
Guinea
Guinea-Bissau
Mali
Niger
Sierra Leone
South Sudan
Togo
Uganda

Pharmacy Workflow Steps

  1. Patient checks in.
  2. Fees are explained (Total: $120).
  3. Consent is obtained.
  4. Check Travax: Ensure the administration date is at least 10 days before the
... Continue reading "Yellow Fever Vaccination: Requirements, Procedure, and Safety" »