Implementing Hash Tables with Chaining and Linear Probing

Hash Function Implementation

def hash_func(key, size):
return sum(ord(c) for c in key) % size

Hash Table with Chaining

class HashTableChaining:
def __init__(self, size):
self.table = [[] for _ in range(size)]
self.comparisons = 0

Insert Method

def insert(self, name, number):
index = hash_func(name, len(self.table))
self.table[index].append((name, number))

Search Method

def search(self, name):
index = hash_func(name, len(self.table))
for n, num in

Read More

Malware Types and Cyber Attack Defense Strategies

Malware: Malicious Software Defined

Malware is malicious software designed to disrupt systems, steal information, or gain unauthorized access. The primary goals of malware include:

  • Disruption: Shutting down processes or freezing systems.
  • Data Theft: Exfiltrating sensitive data like passwords.
  • Unauthorized Access: Providing attackers with a secret entry point.
  • Covert Control: Enabling remote command and control (C&C) operations, often forming botnets.

The fundamental concept of malware has remained

Read More

Comprehensive Java Concepts and Key Features Explained

1. What is Java and Explain Features of Java?

2. Why is Java a Platform Independent Language?

3. What is Byte Code and the Importance of Byte Code?

4. What is the Difference Between Byte Code and Machine Code?

5. What is the Difference Between Platform Independency and Cross Platform?

6. What is OOP and Explain in Depth?

7. What are the Pillars of OOP?

8. What is the Difference Between Semi Object Oriented and Pure Object Oriented?

9. What is JDK, JRE, and JVM?

10. What is the Difference Between JDK, JRE,

Read More

Understanding Packet Transmission in Extended LANs and Protocols

15. Consider the extended LAN connected using bridges B1 and B2 in the given figure. (a) A sends a packet to C. (b) E sends a packet to F. (c) F sends a packet to E. (d) G sends a packet to E. (e) D sends a packet to A. (f) B sends a packet to F.

a.) B1 will forward this packet on ports 2, 3, and 4. B2 will forward it on ports 1, 2, and 3. b.) B2 will forward this packet on ports 1, 3, and 4. B1 will forward it on ports 1, 2, and 3. c.) B2 will not forward this packet on any of its ports, and
Read More

Parallels RAS 20 Administration Reference: Core Concepts and Troubleshooting

🧠 Parallels RAS 20 – Administrator’s Guide Cheat Sheet


🏗️ 1. Core Architecture

TermDescription
Farm
The main logical container of all RAS components. One central configuration and licensing database per farm.

Site

A subset of a farm, typically representing a physical location (e.G., Toronto site, Montreal site). Each site must have at least one Connection Broker and Secure Gateway.

RAS Console

The admin tool (desktop app) used to configure and manage all RAS components.

RAS Management Portal

A
Read More

Understanding Virtualization and Cloud Computing Concepts

a) What are the disadvantages of virtualization?

b) What is the difference between distributed objects and RPC?
c) Define federated clouds.

a) Disadvantages of Virtualization

(Any 3 points for 2 marks)

  1. Performance Overhead:
    Virtual machines run on top of a hypervisor, so applications may not perform as fast as on physical hardware.

  2. High Initial Cost:
    Powerful servers, hypervisors, and storage systems are required, which increases setup cost.

  3. Complex Management:
    Managing multiple VMs, snapshots, networks,

Read More