9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
InternshipReport-1.pdf
1. INTERNSHIP - I REPORT
Report on Internship - I
Submitted to
Department of Technology Shivaji
University, Kolhapur
For the partial fulfillment of the term work of
T.Y. B. Tech
in
Computer Science & Technology Engineering
Under the Faculty of Engineering & Technology
By
Mr:-PRAMOD NANA LAATE
(Roll no. – 64)
(PRN- 2021075813)
DEPARTMENT OF TECHNOLOGY
SHIVAJI UNIVERSITY, KOLHAPUR
Year: 2023-24
2. DEPARTMENT OF TECHNOLOGY
SHIVAJI UNIERSITY, KOLHAPUR
CERTIFICATE
BRANCH : CST CLASS : 3RD
YEAR
This is Certified that Mr. Pramod Nana Lavate
of T.Y. B.Tech Computer Science & Technology Engineering, has
completed Internship-I under the guidance of Mr. H.A.Tirmare towards
fulfillment of ‘Bachelor of Technology’ (Computer Science & Technology
Engineering)SEM V Roll No. 64, of Department of Technology, Shivaji
University, Kolhapur.
Date : Place : Kolhapur
Guide Co-Ordinator CST
Mr. H.A.Tirmare Dr. Miss. R. J.
Deshmukh
3. DECLARATION
I hereby declare that the report on Internship-I has been completed and
written by me for the partial fulfillment of the requirement for the award of
degree of Bachelor of Technology in Computer Science & Technology
Engineering. The contents of this report are written by me and are not copied
from any source or published anywhere in any form prior to the submission.
Further wherever required, prior permission of the authority has been taken.
Mr. Pramod Nana Lavate
(Student)
Date:
Place : Kolhapur
4. DECLARATION BY STUDENT
I am Mr. Pramod Nana Lavate studying in T.Y. B.Tech Computer Science
& Technology Engineering, declares that I have undergonemandatoryfour week
Internship-I program in the vacation during the period 22 July 2023To 22 August
2023 at Open Weaver
The report written here with is the outcome of my learning at the company
where I completed my internship.
Mr. Pramod Nana Lavate
Date :
Place : Kolhapur
5. ACKNOWLEDGEMENT
I hereby declare that the report on Internship-I has been completed and
written by me for the partial fulfillment of the requirement for the award of
degree of Bachelor of Technology in Computer Science and Technology
Engineering. The contents of this report are written by me and are not
copied from any source or published anywhere in any form prior to the
submission. Further wherever required, prior permission of the authority has
been taken.
Date :-
Place :- Kolhapur
6. Table of Contents
Sr No. Title
1. Company Profile
2. Details of Internship
3. Certificate
4. Learning Journey
5. Learning Courses
6. Implementation
7. Technical Knowledge Acquired
8. Conclusion
7. COMPANY PROFILE
Company Name : OPEN WEAVER INDIA PRIVATE LIMITED
Established : 17 March 2020
Address : 41 / 97, IV Th Md, GANDHINAGAR, ADAYAR,
CHENNAI Chennai TN 600020 IN
Business Served : Other computer related activities [for example
maintenance of websites of other firms/ creation of
multimedia presentations for other firms etc.]
8. DETAILS OF INTERNSHIP
Name of Company : OPEN WEAVER INDIA
PRIVATE LIMITED
Domain of work
: IIoT
(Industrial Internet-of-Things)
Duration of
Internship
:
1 months
Assigned task
:
Basics of Javascripts
Daily working hours : 1
Mode Of Learning : Online
10. LEARNING JOURNEY
1. Initial Understanding of JavaScript
- Getting Started with JavaScript
- Learning the Basics
- Building a Foundation
2. Exploring the DOM
- Understanding the Document Object Model
- Manipulating HTML Elements with JavaScript
- Event Handling
3. Front-End Development
- HTML and CSS
- Responsive Web Design
- CSS Frameworks
4. Back-End Integration
- Working with APIs
- Server-Side Communication
- Data Handling with JavaScript
5. Real-World Projects
- Project 1: Interactive Web Application
- Project 2: E-commerce Website
- Project 3: Collaborative Coding Platform
6. Debugging and Problem Solving
- Identifying and Resolving JavaScript Errors
- Debugging Tools and Techniques
7. Version Control and Collaboration
- Utilizing Git and GitHub
- Collaborating with Team Members
- Code Reviews and Feedback
8. Personal Growth and Reflection
- Lessons Learned
- Challenges Faced and Overcoming Them
9. - Professional Developmen
11. Learning Courses
Task assignment with an industrial expert lecture typically involves the
following steps:
Identification of the Learning Objectives:Determine the specific learning
objectives or goals that the expert lecture should address.
What do you want the learners to take away from the lecture?
Selecting the Industrial Expert: Identify and invite an industrial expert who
has the relevant knowledge and experience in the subject matter. This
expert should be able to provide valuable insights and
practical knowledge to the learners.
Setting the Agenda: Collaborate with the expert to outline the agenda or
topics to be covered during the lecture. Ensure that the
content aligns with the learning objectives.
Scheduling and Logistics: Coordinate with the expert to schedule the
lecture at a convenient time for the learners. Arrange the logistics, such as
the location, technology setup (if it's an online lecture), and
any required materials.
Preparation and Pre-Lecture Materials: Request the expert to provide any
pre-lecture materials, such as readings, videos, or slides, that learners
should review before the lecture. This can help learners
come prepared and make the lecture more engaging.
Engagement Strategies: Collaborate with the expert to plan engagement
strategies during the lecture. This could include
interactive discussions, Q&A sessions, or case studies to ensure active
participation from learners.
Assessment and Evaluation: Determine how the lecture's impact will be
assessed. This may involve quizzes, assignments, or group
projects related to the expert's content.
12. Follow-up and Discussion: Plan a follow-up session or discussion after the
lecture where learners can ask questions and further explore the topics
covered. This can enhance comprehension and application.
Feedback and Evaluation: Collect feedback from the learners and the
expert about the lecture's effectiveness and areas for improvement.
Use this feedback to refine future lectures.
Documentation and Resources: Ensure that the lecture is properly
documented, and resources (such as recorded sessions or lecture
notes) are made available for learners to revisit.
Integration into Curriculum: If the expert lecture is part of an academic or
training program, make sure it's integrated into the curriculum effectively
and that learners receive appropriate credit or recognition.
Continuous Improvement: Use the feedback and evaluation data to
continuously improve the process of assigning tasks to industrial
expert lectures. This ensures that future lectures are even more beneficial
to the learners.
Overall, the key is to create a well-structured and engaging learning
experience by involving industrial experts who can provide practical
insights and real-world knowledge, aligning the lecture with specific
learning objectives, and evaluating the impact on learners' understanding
and skills.
15. AWT stands for Abstract Window Toolkit, which is an API for creating
graphical user interface (GUI) or windows-based applications in Java.
AWT provides various components like buttons, labels, text fields, etc.
that can be used as objects in a Java program
Key Components of AWT:
1. Containers: As the name suggests, this awt component is used to hold
other components.
Basically, there are the following different types of containers available in
java.awt package:
a. Window: This is a top-level container and an instance of a window
class that does not contain a border or title.
b. Frame: Frame is a Window class child and comprises the title bar,
border and menu bars. Therefore, the frame provides a resizable canvas
and is the most widely used container used for developing AWT-based
applications. Various components such as buttons, text fields, scrollbars
etc., can be accommodated inside the frame container.
Java Frame can be created in two ways:
By Creating an object of Frame class.
By making Frame class parent of our class.
Dialog: Dialog is also a child class of window class, and it provides
support for the border as well as the title bar. In order to use dialog as a
container, it always needs an instance of frame class associated with it.
Panel: It is used for holding graphical user interface components and does
not provide support for the title bar, border or menu.
2. Button: This is used to create a button on the user interface with a
specified label. We can design code to execute some logic on the click
event of a button using listeners.
3. Text Fields: This component of java AWT creates a text box of a single
line to enter text data
4. Label: This component of java AWT creates a multi-line descriptive
string that is shown on the graphical user interface.
5. Canvas: This generally signifies an area that allows you to draw shapes
on a graphical user interface.
6. Choice: This AWT component represents a pop-up menu having
multiple choices. The option which the user selects is displayed on top of
the menu.
7. Scroll Bar: This is used for providing horizontal or vertical scrolling
feature on the GUI.
8. List: This component can hold a list of text items. This component
allows a user to choose one or more options from all available options in
16. the list.
9. Checkbox: This component is used to create a checkbox of GUI whose
state can be either checked or unchecked.
AWT Hierarchy
17. What is JavaScript Security?
JavaScript is a widely-used client-side programming language,
but it can run on the server as well. Like any programming
language, applications written in JavaScript can contain
vulnerabilities that attackers can exploit for various purposes.
JavaScript security includes the processes and tools used to
secure JavaScript. This includes identifying these vulnerabilities
in applications and taking steps to eliminate them during the
development process or prevent them from being exploited in
production
18. Why is JavaScript Security Important?
As a primarily front-end language, JavaScript applications are
especially vulnerable to attack because the application’s code is
accessible to the user. This makes it much easier for an attacker
to identify and exploit vulnerabilities in a front-end application.
Also, an attacker has the ability to modify the code in their
browser or send requests directly to the server-side applications,
bypassing front-end protections.
JavaScript’s unique exposure makes it vitally important to find
and fix vulnerabilities before they can be exploited by an
attacker. JavaScript security helps organizations to do so by
identifying known vulnerabilities in the organization’s
JavaScript code
19. Common JavaScript Security Vulnerabilities
JavaScript applications can contain a range of potential vulnerabilities.
Some of the most common include the following:
• Coding Errors: JavaScript applications may contain coding errors that
create vulnerabilities in the application. This is especially dangerous with
client-side JavaScript because attackers can easily read the code and
search for issues.
• Insecure Libraries: JavaScript applications commonly use third-party
libraries available via npm or similar sources. These libraries may include
vulnerabilities or malicious code that makes the application vulnerable.
• Poor Input Validation: A failure to validate user input before processing
it can create injection vulnerabilities. This can lead to various types of
injection attacks depending on the format of the data and its use.
• Cross-Site Scripting (XSS): XSS vulnerabilities allow an attacker to
inject malicious JavaScript code into a webpage. This code can be used to
steal sensitive data or take other malicious actions.
• Cross-Site Request Forgery: In a CSRF attack, the attacker tricks a
user’s browser into performing requests to a website that they have already
authenticated to. This could allow an attacker to change the user’s
password on the site, perform a bank transaction, make social media posts,
or take other undesirable actions.
• Sensitive Data Exposure: JavaScript code has the ability to access
sensitive data in a web request such as the values stored in HTTP cookies.
This can be used to steal session ID tokens that enable the attacker to
hijack an authenticated user’s session with the webpage
20. Technical Knowledge Acquired
1. Programming:
Programming is the process of writing instructions for a
computerto perform specific tasks. Python, C++, Java, and
many other languages are commonly used for
programming.
2. Java:
Java is a multi-platform, object-oriented, and network-centric
language that can be used as a platform in itself. It is a fast,
secure, reliable programming language for coding everything
from mobile apps and enterprise software to big data
applications and server-side technologies.
3. Data Structures:
Data structures are ways to organize and store data in a
computer'smemory. Examples include arrays, linked lists,
trees, and graphs, eachwith specific use cases and advantages.
4. Data Modeling:
Data modeling involves creating a visual representation of
how data is structured, organized, and related within a
database. It's crucialfor database design and optimization.
5. Data Analysis:
Data analysis is the process of examining, cleaning,
transforming,and interpreting data to discover valuable
insights, trends, and patterns. Python and tools like Pandas
are often used in data analysis.
6. Planning:
Planning is the process of setting goals and defining
the steps toachieve those goals. It is essential in
project management, business
21. 7. Formal Communication:
Formal communication refers to structured, official, and
often written communication methods used in
professional settings. Thisincludes reports, memos,
emails, and formal meetings.
8. Software Development Processes:
These are structured methodologies used to develop
software efficiently. Examples include Agile, Waterfall,
and DevOps, eachwith its own approach to software
development.
9. Computer Networks:
Computer networks are systems that connect computers and
otherdevices, allowing them to communicate and share
resources. This includes LANs, WANs, the Internet, and
network protocols.
10. Web Security:
Web security encompasses practices and technologies to
protectwebsites and web applications from threats like
hacking, data breaches, and other cyberattacks.
These topics cover a wide range of areas in the fields of
programming, data analysis, software development, and IT.
Depending on your interests and goals, you can explore and delve
deeper into these areas to acquire relevant skills and knowledge.
22. Conclusion
"In conclusion, my internship experience with JavaScript has been
both educational and practical. I've gained a solid understanding of
the language and its role in web development. Throughout the
internship, I had the opportunity to work on real-world projects,
enhancing my coding skills and problem-solving abilities.
JavaScript's flexibility and compatibility with various frameworks
and libraries make it an indispensable tool for web developers. I've
also learned how to create interactive and responsive web
applications, improving the overall user experience. This internship
has not only deepened my technical knowledge but also provided
valuable insights into the dynamic and ever-evolving field of web
development. I look forward to applying the skills I've acquired to
future projects and continuing to grow as a JavaScript developer."
My internship journey with JavaScript has been a transformative
learning experience. Throughout this period, I have immersed
myself in the intricacies of this versatile programming language and
its profound impact on modern web development. I have had the
privilege of working on a range of projects that demanded creativity,
problem-solving, and a keen understanding of JavaScript's
capabilities.
The internship has underscored the critical role that JavaScript plays
in the creation of dynamic, user-centric web applications. Its
compatibility with a multitude of frameworks, such as React and
Angular, has allowed me to streamline development processes and
deliver responsive, interactive user interfaces. I have delved into the
world of asynchronous programming, grasping the significance of
promises and async/await in handling complex operations.
Furthermore, I've explored server-side JavaScript using Node.js,
broadening my knowledge and realizing the potential of full-stack
development. This internship has not only honed my technical skills
but also instilled in me a deep appreciation for the collaborative
nature of software development. Effective teamwork and
communication were pivotal in successfully delivering projects and
meeting deadlines.
23. The ever-evolving nature of JavaScript and the web development
ecosystem has taught me the importance of adaptability and
continuous learning. Staying up-to-date with the latest trends,
libraries, and best practices in the JavaScript community will remain
a cornerstone of my career as a developer.
In conclusion, this internship has been a significant stepping stone in
my professional journey. It has provided me with invaluable
experience, honed my JavaScript expertise, and fostered a strong
sense of curiosity and commitment to excellence in web
development. I'm excited to carry the knowledge and skills gained
during this internship into my future endeavors, contributing to the
ever-evolving landscape of JavaScript and web development.