Posts

Showing posts from March, 2022

About The Course Programming in Python CST 362 KTU

Image
CST 362 PROGRAMMING IN PYTHON Category PEC L T P 2 1 0 Credit 3 Year of Introduction 2019 Preamble: The objective of the course is to equip the learners to develop multi-module software solutions for real world computational problems using Python. It encompasses the Python programming environment, syntax, data representations, intermediate level features, GUI programming, Object Oriented Programming and data processing. This course lays the foundation to develop modular software solutions including complex interactive applications, network applications, and data-driven intelligent applications. Prerequisite: Basic knowledge in Computational Problem Solving, A course in any programming language. Course Outcomes: After the completion of the course the student will be able to  CO1:Write, test and debug Python programs (Cognitive Knowledge level: Apply) CO2: Illustrate uses of conditional (if, if-else and if-elif-else ) and iterative (while and for) statements in Python programs. (Cogn

Text Analysis- Case Study

In 1949, Dr. Rudolf Flesch published The Art of Readable Writing, in which he proposed a measure of text readability known as the Flesch Index. This index is based on the average number of syllables per word and the average number of words per sentence in a piece of text. Index scores usually range from 0 to 100, and they indicate readable prose for the following grade levels: Flesch Index                Grade   Level of Readability 0–30                                  College 50–60                                  High School 90–100                             Fourth Grade In this case study, we develop a program that computes the Flesch Index for a text file. Write a program that computes the Flesch Index and grade level for text stored in a text file Analysis The input to this program is the name of a text file. The outputs are the number of sentences, words, and syllables in the file, as well as the file’s Flesch Index and Grade Level Equivalent. During analysis, we consult expert

Data Encryption-Case Study

As you might imagine, data traveling on the information highway is vulnerable to spies and potential thieves. It is easy to observe data crossing a network, particularly now that more and more communications involve wireless transmissions. For example, a person can sit in a car in the parking lot outside any major hotel and pick up transmissions between almost any two computers if that person runs the right sniffing software. For this reason, many applications now use data encryption to protect information transmitted on networks.  Some application protocols have been updated to include secure versions that use data encryption.Examples of such versions are FTPS and HTTPS, which are secure versions of FTP and HTTP for file transfer and Web page transfer, respectively. Encryption techniques are as old as the practice of sending and receiving messages. The sender encrypts a message by translating it to a secret code, called a cipher text. At the other end, the receiver decrypts the cipher

Graphical User Interfaces ( GUI)

Image
Most modern computer software employs a graphical user interface or GUI. A GUI displays text as well as small images (called icons) that represent objects such as directories, files of different types,command buttons, and drop-down menus. In addition to entering text at the keyboard, the user of a GUI can select an icon with a pointing device, such as a mouse, and move that icon around on the display. Commands can be activated by pressing the Enter key or Control keys, by pressing a command button, or by selecting a dropdown menu item with the mouse. Put more simply, a GUI displays all information, including text, graphically to its users, and allows them to manipulate this information directly with a pointing device. The structure of a GUI program differs significantly from that of a terminal-based program. Second, a GUI program is event driven, meaning that it is inactive until the user clicks a button or selects a menu option. In contrast, a terminal-based program maintains constant