Skip to main content

Posts

PDF Merger Code in JavaScript

Recent posts

Node Package Manager - Create scripts to find node and NPM version

NPM - Node Package Manager Problem Statement - 1. Perform the below mentioned steps by creating package.json file named npm_commands. (a) Create a file named index.js (b) Write a JavaScript code in index.js file to create a string named myVar and value as node package manager and convert it into uppercase. Note: Please use console.log to display the output of myVar in index.js 2. Configure scripts in package.json (a) to check the versions of npm and node by using npm run release | tee output1.txt (b) to execute index.js by using npm run build | tee output.txt Solution - 1. Inside challenge folder, create a JavaScript file named index.js and type the following code in it -      myVar = "node package manager"      console.log(myVar.toUpperCase()) 2. In the terminal, type the following command -      npm init      Different properties would be shown. By default, the package name would be challenge.      Enter "npm_commands" next to it.      Node modules would be creat

JavaScript - setTimeout and setInterval

Working with Timers Complete the function "logString" in the editor below. 'logString" has the following parameters:      input:stringToLog Write a timer function to log "Logging {stringToLog} every 0.5 seconds" 0.3 seconds after the server is started. Write a timer function to log "{stringToLog}" every 0.5 seconds and the string should log 5 times. Once the code is written, click Run Tests to run the test cases. Solution: function logString ( stringToLog ) {   let counter = 0 ;   function printSetTimeout () {     console . log ( `Logging ${ stringToLog } every 0.5 seconds` );   }   setTimeout ( printSetTimeout , 300 );   let timer = setInterval ( function () {     counter ++;     if ( counter === 5 ) clearInterval ( timer );     console . log ( stringToLog );   }, 500 ); }

IoE (Internet of Everything) Question Bank and Solution (MCQs) for Mumbai University Examination Information Technology Semester 8 - Part 2

Hello Everyone! This article is based on the Multiple Choice Questions related to IoE. These MCQs were given as question bank in Mumbai University-BE-Information Technology-Semester 8 Exam for the subject- Internet of Everything.  Q 1) Match the following characteristics of IoT- Column A Column B 1) Heterogeneity State of device changes 2) Enormous scale Anything can be interconnected with the global information and communication infrastructure 3) Dynamic changes Interaction is possible with other devices or service platforms through different networks 4) Thing related services The number of devices that need to be managed and that communicate with each other will be atleast an order of magnitude larger than the devices connected to the current internet 5) Interconnectivity Provides services such as pri

IoE (Internet of Everything) Question Bank and Solution (MCQs) for Mumbai University Examination Information Technology Semester 8 - Part 1

Hello Everyone! This article is based on the Multiple Choice Questions related to IoE. These MCQs were given as question bank in Mumbai University-BE-Information Technology-Semester 8 Exam for the subject- Internet of Everything. Q 1) A Bitwise Arbitration Tree anti-collision protocol aims to minimize the total number of slots, to increase RFID system efficiency. State the above Statement is True or False? a. True b. False Solution: a) True Q 2) ALOHA uses random access strategy in order to identify the number of tags in an interrogation area. a. True b. False Solution: a) True Q 3) CSMA based protocols are called as ______. a. Listen before talk b. Talk before listen c. Bot

Cyber Security - Penetration Testing MCQs and Solutions

Hello everyone!  These Multiple Choice Questions are based on Penetration Testing which is also known as pen-testing. Pen-testing is related to computer security where legal professionals try to find out vulnerabilities of the system by attacking it. Here are some of the important and frequently asked questions of penetration testing. Q 1) Penetration testing __________. a. Does not determine the critical vulnerabilities  b. Cannot be used to identify the vulnerabilities left undetected by automated vulnerability scanners  c. Can evaluate the security of system or network d. Is an unauthorized attempt to exploit a computer system Solution:  c. Can evaluate the security of system or network Q 2) Before performing any penetration test through legal procedure, which key points listed below is not mandatory? a. Know the nature of the organization b. System and network c. C

Mumbai University | Semester 8 | IT | Question Papers - 2021 University Examinations

Hello Everyone! These are the questions asked in the Final Theory exam of Semester 8, Branch Information Technology, 2021-Mumbai University. Subject - User Interaction Design Q2 A) Solve any Two What is Usability? Explain different usability goals. What is Prototyping? Why is it needed? What care will you take while designing an interface for a blind person? Q2 B) Solve any One Illustrate the concept of heuristic evaluation. Explain different interview styles. Q3) Solve any Two out of Three Summarize principles of good UI Design. Write a note on Good Error Messages with examples. Explain Experimental Design and its types. Subject - Project Management Q2 A) Solve any Two Questions out of Three Compare AOA and AON. Compare internal risk and external risk. State the limitations of Gantt chart. Q2 B) Solve any One What is Work breakdown structure. Draw and e

IoE (Internet of Everything) - RFID Question Bank and Solution (MCQs) for Mumbai University Examination Information Technology Semester 8 - Part 4

Hello Everyone! This article is based on the Multiple Choice Questions related to IoE topic RFID. These MCQs were given as question bank in Mumbai University-BE-Information Technology-Semester 8 Exam for the subject- Internet of Everything. These MCQs are related to topic Radio Frequency Identification. Q 1) Which RFID Tag suitable for Production, monitoring and maintenance applications in Archive systems, asset management, facility management, airplanes, food and consumable goods? a. Semi-passive b. Passive c. Semi-Active d. Active Solution: b) Passive Q 2) Which of the following is not RFID type? a. Low frequency b. Ultra high frequency c. High frequency d. Ultra low frequency Solution: d) Ultra low frequency