. What are device types A and B in the exhibit below?
2. Which of the following is a NOT a network category based on the geographical dispersion of network components?
Cis 175 Enthusiastic Study / snaptutorial.comGeorgeDixon96
. What are device types A and B in the exhibit below?
2. Which of the following is a NOT a network category based on the geographical dispersion of network components?
1.) Describe pulse code modulation, phase shift modulation, amplitude modulation, and frequency modulation. Indicate how each is used to represent data.
2.) What
is the difference between noise and distortion? How can noise and distortion be introduced into a transmission medium? How does a channel's signal-to-noise ratio affect the reliability of data transmission?
3.) Many phone companies are replacing the wire in their phone systems with fiber
optic cable. What do they expect to gain from doing so?
4.)The current IP address standard is 32 bits. IPv6 will increase the address length to 128 bits. An IP socket address is a combination of an IP address and IP port number, usually written with the IP address first followed by a colon and the port number (for example, 129.24.8.1:42). An IP socket allows multiple hardware devices or software services to "listen" to different message streams sent to the same IP address.
a. What is the URL name and dotted quad IP address of an Internet URL that you use? (It could be your ISP)
b. What is the Network Class of the address?
c. How did you determine the dotted quad address (i.e., what utility did you use to determine the address not how you converted it to binary)?
5.)
Concurrency, of course, is a requirement for modern operating systems. What
are the major challenges that an OS designer faces in supporting efficient concurrency that she would not face if the operating system could just run one program at a time?
6.)
Clearly explain the differences between multiprogramming, multiuser, and multiprocessing.
7.)
How does interpretation differ from compilation?
8.) What is the difference between the logical description of a file and the physical description?
9.)
List and explain some definite advantages to the use of a command line interface over other types of interfaces. Do the same for a graphical user interface. Do the same for a Web-based interface. What is the target audience for each type of interface?
.
The Considerations for Internet of Things @ 2017Jian-Hong Pan
物聯網是一門透過通訊,將端點蒐集到的資料,集中關聯分析,並將分析結果用以決策並回饋的工程藝術。
本次的分享將從物聯網的目的當作進入點,接著分享可能的佈署架構。並概述目前各個常用的通訊標準、協定,以及其所屬的角色。
除此之外,也會分享去年到柏林參加Linux Foundation舉辦的Open IoT Summit Europe 2016的心得。
在此,帶回一些國外對於物聯網節點的佈署、更新或維護的看法、作法。
另外,也會分享一些物聯網可能需要考量的資訊安全議題。
IoT is a kind of engineering art, which analyzes the collected data from
the device nodes through the communication and has the result for the
decision making and feedback.
This sharing goes for the purpose of IoT and it's deployment structure.
Then, the slide introduces the most used communication standards or
protocols in IoT and their roles.
Besides, also shares what I have got from the Open IoT Summit Europe 2016
which was held by Linux Foundation in Berlin last year.
It introduces how will the device nodes be deployed, updated and maintained.
Finally, the slide provides some security issues that should be considered
in IoT.
. What are device types A and B in the exhibit below?
2. Which of the following is a NOT a network category based on the geographical dispersion of network components?
Cis 175 Enthusiastic Study / snaptutorial.comGeorgeDixon96
. What are device types A and B in the exhibit below?
2. Which of the following is a NOT a network category based on the geographical dispersion of network components?
1.) Describe pulse code modulation, phase shift modulation, amplitude modulation, and frequency modulation. Indicate how each is used to represent data.
2.) What
is the difference between noise and distortion? How can noise and distortion be introduced into a transmission medium? How does a channel's signal-to-noise ratio affect the reliability of data transmission?
3.) Many phone companies are replacing the wire in their phone systems with fiber
optic cable. What do they expect to gain from doing so?
4.)The current IP address standard is 32 bits. IPv6 will increase the address length to 128 bits. An IP socket address is a combination of an IP address and IP port number, usually written with the IP address first followed by a colon and the port number (for example, 129.24.8.1:42). An IP socket allows multiple hardware devices or software services to "listen" to different message streams sent to the same IP address.
a. What is the URL name and dotted quad IP address of an Internet URL that you use? (It could be your ISP)
b. What is the Network Class of the address?
c. How did you determine the dotted quad address (i.e., what utility did you use to determine the address not how you converted it to binary)?
5.)
Concurrency, of course, is a requirement for modern operating systems. What
are the major challenges that an OS designer faces in supporting efficient concurrency that she would not face if the operating system could just run one program at a time?
6.)
Clearly explain the differences between multiprogramming, multiuser, and multiprocessing.
7.)
How does interpretation differ from compilation?
8.) What is the difference between the logical description of a file and the physical description?
9.)
List and explain some definite advantages to the use of a command line interface over other types of interfaces. Do the same for a graphical user interface. Do the same for a Web-based interface. What is the target audience for each type of interface?
.
The Considerations for Internet of Things @ 2017Jian-Hong Pan
物聯網是一門透過通訊,將端點蒐集到的資料,集中關聯分析,並將分析結果用以決策並回饋的工程藝術。
本次的分享將從物聯網的目的當作進入點,接著分享可能的佈署架構。並概述目前各個常用的通訊標準、協定,以及其所屬的角色。
除此之外,也會分享去年到柏林參加Linux Foundation舉辦的Open IoT Summit Europe 2016的心得。
在此,帶回一些國外對於物聯網節點的佈署、更新或維護的看法、作法。
另外,也會分享一些物聯網可能需要考量的資訊安全議題。
IoT is a kind of engineering art, which analyzes the collected data from
the device nodes through the communication and has the result for the
decision making and feedback.
This sharing goes for the purpose of IoT and it's deployment structure.
Then, the slide introduces the most used communication standards or
protocols in IoT and their roles.
Besides, also shares what I have got from the Open IoT Summit Europe 2016
which was held by Linux Foundation in Berlin last year.
It introduces how will the device nodes be deployed, updated and maintained.
Finally, the slide provides some security issues that should be considered
in IoT.
1 What is the difference between a local area network LAN.pdfsagaraccura
1. What is the difference between a local area network (LAN) and a wide area network (WAN)?
What are some of the advantages and disadvantages of each type of network?
2. What is the role of the Internet Protocol (IP) in computer networking? How do IP addresses and
subnet masks help to route data packets across a network?
3. How do routers and switches work, and what is their role in computer networking? How do
these devices help to manage traffic and ensure reliable data transmission?
4. What is the role of the Domain Name System (DNS) in computer networking? How do DNS
servers translate domain names into IP addresses?
5. What is the difference between TCP and UDP? How do these protocols impact data
transmission speed and reliability?
6. How do firewalls and other security mechanisms help to protect networks from attacks and
unauthorized access? What are some of the key strategies for securing a network?
7. What is cloud computing, and how does it impact network architecture and design? What are
some of the advantages and disadvantages of using cloud services for networking?
8. What are some of the emerging trends and technologies in computer networking, such as
software-defined networking (SDN) and network function virtualization (NFV)? How do these
technologies impact network architecture and design?
9. How do network protocols and standards evolve over time, and what are some of the
challenges in ensuring compatibility and interoperability between different devices and systems?
10. How do networks impact the broader landscape of technology and society, such as the rise of
social media, e-commerce, and online education? What are some of the ethical and social
considerations that arise from these trends?
11. Describe the two key roles of computer networks.
12. Explain the difference between circuit switching and packet switching. Which one is more
suitable for today's internet and why?
13. What are the five components of a network protocol? Explain each component briefly.
14. Describe the ISO/OSI reference model and its seven layers. Provide an example of a protocol
or service that belongs to each layer.
15. What is the difference between a client-server and a peer-to-peer network architecture? Give
an example of a network application for each architecture.
16. What are the three types of guided media? Provide an example of each.
17.Explain the difference between analog and digital signals. Which one is more suitable for
transmitting data over long distances and why?
18. What is the role of a router in a network? How does it differ from a switch?
19. What is the difference between TCP and UDP? When would you use one over the other?
20.Explain the concept of bandwidth and its relation to data transfer rate.
Assignment Submission and Format:
All assignments must be submitted electronically through the designated online platform (e.g.,
Canvas, Blackboard, Moodle).
Assignments must be submitted as a Microsoft Word or PDF document. Other file for.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
The Cytoscape Cyberinfrastructure extends Cytoscape and its community into web-connected services.The CI is a Service Oriented Architecture that supports network biology oriented computations that can be orchestrated into repeatable workflows.
1 What is the difference between a local area network LAN.pdfsagaraccura
1. What is the difference between a local area network (LAN) and a wide area network (WAN)?
What are some of the advantages and disadvantages of each type of network?
2. What is the role of the Internet Protocol (IP) in computer networking? How do IP addresses and
subnet masks help to route data packets across a network?
3. How do routers and switches work, and what is their role in computer networking? How do
these devices help to manage traffic and ensure reliable data transmission?
4. What is the role of the Domain Name System (DNS) in computer networking? How do DNS
servers translate domain names into IP addresses?
5. What is the difference between TCP and UDP? How do these protocols impact data
transmission speed and reliability?
6. How do firewalls and other security mechanisms help to protect networks from attacks and
unauthorized access? What are some of the key strategies for securing a network?
7. What is cloud computing, and how does it impact network architecture and design? What are
some of the advantages and disadvantages of using cloud services for networking?
8. What are some of the emerging trends and technologies in computer networking, such as
software-defined networking (SDN) and network function virtualization (NFV)? How do these
technologies impact network architecture and design?
9. How do network protocols and standards evolve over time, and what are some of the
challenges in ensuring compatibility and interoperability between different devices and systems?
10. How do networks impact the broader landscape of technology and society, such as the rise of
social media, e-commerce, and online education? What are some of the ethical and social
considerations that arise from these trends?
11. Describe the two key roles of computer networks.
12. Explain the difference between circuit switching and packet switching. Which one is more
suitable for today's internet and why?
13. What are the five components of a network protocol? Explain each component briefly.
14. Describe the ISO/OSI reference model and its seven layers. Provide an example of a protocol
or service that belongs to each layer.
15. What is the difference between a client-server and a peer-to-peer network architecture? Give
an example of a network application for each architecture.
16. What are the three types of guided media? Provide an example of each.
17.Explain the difference between analog and digital signals. Which one is more suitable for
transmitting data over long distances and why?
18. What is the role of a router in a network? How does it differ from a switch?
19. What is the difference between TCP and UDP? When would you use one over the other?
20.Explain the concept of bandwidth and its relation to data transfer rate.
Assignment Submission and Format:
All assignments must be submitted electronically through the designated online platform (e.g.,
Canvas, Blackboard, Moodle).
Assignments must be submitted as a Microsoft Word or PDF document. Other file for.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
The Cytoscape Cyberinfrastructure extends Cytoscape and its community into web-connected services.The CI is a Service Oriented Architecture that supports network biology oriented computations that can be orchestrated into repeatable workflows.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
1. Cloud IT Solution Page 449
Viva Experience: ICT Division (PSC)
1. What is the name of the ICT Minister? Which does he study?
2. What is Protocol? Tell some protocol name.
3. What is Bandwidth? Is our Bandwidth export or import?
4. Short Nonte : webpage,website,web design and webportal
5. Use of submarine cable?
6. Which programming language are use
7. Have you use Phython?
8. Difference between object oriented programming and structural programming
9. Define :physical/logical/port address and how much bit
10. What is the unit of data?
11. Name of the ICT ministry?
12. Define: pre-process, header file, library function,translator and load.
13. Does ICT division is autonomous or semi autonomous?
14. Difference between programming and software?
15. Have you working web project, mobile app development, j2ee?
16. How improve network security?
17. Define: Cyber crime and ICT act.
18. OOP principle
19. Difference among black box,wite box and gray box testing
20. Difference between php and mysql
21. Component of optical fiber
22. OSI Model
23. E-goverance and how does it work?
24. Element of data communication
25. What kinds of work you have to commit in this area?
26. What kinds of problems you may face?
27. Give the solutions to recover your problem.
28. IP distribution in networking
29. Static IP ve Dynamic IP
30. DHCP
31. Any collision or error in IP
Viva Voce
2. Cloud IT Solution Page 450
32. Define : Inheritance ,DDL,DML,primary key,structured programming language,layer of
TCP/IP
33. What are your interested areas/fields?
34. Write a code string and number reverse code
35. Write a code prime number
36. Have any idea Digital Bangladesh?Who is the founder of Digital Bangladesh?
37. What is UDC?
38. Have any idea Digita development?
39. Details Ciber security(bank security, wifi router security, firewall)
40. Micro Processor bit(8086)
41. Define : OSI Layer,TCP/IP Laye,Protocol ,Programming,DNS,VPN,API, web
service,RAM,ROM,Cloud computing,paypal,programming error, Sketch
42. Find 2nd largest value from nth number array
43. 5.difference between windows 8.1 and windows10
44. How configure Static and Dynamic IP?
45. Define : Governance, DHCP,POP3, Information Superhighway,MAC address,IP
address,subnetting,C++
46. About working environment and job responsibilities.
47. Working principle of a compiler
48. Difference between C an C++?
49. Gigabyte to bit calculation
50. What is VOIP? Do you earn using VOIP?Is it possible eatical VOIP?
51. Define : ICX, Tower sharing
52. Difference between IPV6 and IPV4.Advantages of IPV6
53. What is Roaming
54. Range of IP class
55. Working principle of hacking?Is it possible to hack my personal mail id?
56. What is trigger ?Eample of trigger and real life application
57. What is indexing? Why do we use indexing?
58. Create a table using sql syntax
59. Pseudocode :Fibonacci series
60. Difference between data and object
61. What is IP address? Why do you use IP and MAC? Is it possible only one instead of IP
and MAC?
62. Define: e-governence, e-commerce, e-education and e-service.
63. What is Optical fiber? Working Principle of Optical fiber? Is it Reflection or refraction?
64. Define: Total Internal Reflection, splicing optical cable
65. How to connect if the cable breaks somewhere?
66. Define: Hacking, Digital Security Act, Linux.
3. Cloud IT Solution Page 451
67. Have any idea specific programming language like java,.net and php.
68. Write a java code using three class A,B and C
69. Define: html, css, bootstrap, javascript, ODBC, LAN Speed,NIC, Encryption,
Decryption.
70. How configure a LAN and a server? Working principle of a server.
71. Difference between Layer 2 switch and between Layer 3 switch. Can Layer 2 switch
work as like as Layer 3 switch?
72. Main responsibilities of Layer 3 switch
73. Differences between Bandwidth and Spectrum
74. Difference between POP and Stack? Example of stack.
75. Difference between Array and Link list?
76. Difference between polymorfism and encapsulation? When do you use encapsulation and
not use encapsulation?
77. Difference between i++ and ++i?
78. Difference between for loop and do while loop?
79. Writing a code find out a largest number from 3 values.
80. What is the Digital Bangladesh day old name and celebrate date
81. What is Freelancing? Procedure of Freelancing steps.
82. Define :FTP,
83. What is bandwidth ?Explain details
84. How do you define bandwidth of an area?Have we export or import bandwidth?
85. What is differences between static vs dynamic IP ?
86. How do you solve a network problem?
87. What's the means BASIS?
88. What is firewall? If someone breaks the firewall then what will be used as secondary for
protection?
89. Do you work network device?
90. What is the range of Bluetooth coverage?
91. What do you use in bluetooth and wifi? Why do you?
92. Tell some protocol name
93. Use of sub marine cable.
4. Cloud IT Solution Page 452
Viva Experience: Agrani Bank Senior Officer (IT)
Board: 2
1. What is your name and university name ?
2. What is the difference between array and Link list?
3. Why Binary search is faster than sequential search?
4. Is it possible to apply divide and conquer method in Link list?
5. Problem between array and Link List.
Viva Experience: BDBL Senior Officer (IT)
Board: 1
1. What is your Name?
2. What is your University name?
3. Do you know about Bangladesh Development Bank?
4. Describe Loan rate of BDBL.
5. What is information System? Which converts data to information?
6. What is correlation coefficient? How prove a line is straight?
Viva Experience: BTCL(Assistant Manager(Technical) )
Board 2:
1. What is your Name?
2. Where have you completed BSC and M.Sc degree?
3. What is EPROM?
4. Why Ram is differing from ROM?
5. Define OOP and structure Language?
6. Where the first use of optical fiber?
7. Does HTTPS is a protocol? Which layer uses it?
8. Describe DHCP.
9. Differentiate between IPV4 and IPV6?
Viva Experience: Export Promotion Bureau of Bangladesh
Board 1:
1. What is your Name?
2. What is your District Name?
3. What is Boolean logic?
4. Real example of X-OR gate?
5. What is polarization?
5. Cloud IT Solution Page 453
6. Difference among primary key, super key and foreign key.
7. Explain details Relationship database management system.
8. Basic Query.
Viva Experience: Bangladesh Land Port Authority
Board 1:
1. What is your Name?
2. What is your District Name?
3. Working experience details and job responsibilities.
4. Difference between stack and Queue.
5. What is trigger and real application of trigger?
6. Write a code :Marge two file
7. What is sub netting?
8. PHP Connection method code.
Viva Experience: Palli Sanchaya Bank
Board 1:
1. What is your Name?
2. Some Famous person of your district.
3. Difference between thow and throws
4. How to handle exception?
5. Working principle of VPN?
6. Difference between POST and GET method?
Viva Experience: Bangladesh Technical Education Board (BTEB)
Board 1:
1. What is your Name?
2. Difference between method overloading and method overriding?
3. What is the Port no of SMPT protocol?
4. Insert query in a table.
5. Difference between CSE and ICT?
6. Difference between POST and GET method?
Viva Experience: Dhaka Transport Co-ordination Authority
Board 1:
1. What is your Name?
2. What is the abbreviation of SDG?
3. How to ensure database security?
4. Difference between Dos and DDos?
5. What is the abbreviation of ping?
6. Cloud IT Solution Page 454
6. What is scramming?
7. Basic principle of Security?
8. Basic feature of OOP.