Must Listen inspirational story of APJ Abdul kalam ….
And What a representation By sir Gulzar……….
Must Listen inspirational story of APJ Abdul kalam ….
And What a representation By sir Gulzar……….
Here are some of the major differences that arise with respect to PayTM and Bitcoin:
At the end of the day, there are numerous differences that differentiate between PayTM/Paypal and bitcoin mainly because both are so very different in relatively all aspects except for the fact that both are designed to transfer value.
Bitcoin is in the news for a lot of reasons these days. A form of digital currency, created and supported electronically is named as BitCoin. Bitcoins are not a printed form of currency; they’re produced by people, and increasingly businesses, running computers all around the world, using software that solves mathematical problems. Bitcoin is a cryptocurrency system invented by an unknown programmer or a group of programmer’s. It was released by an unknown programmer under the name of Satoshi Nakamoto as open source software.
This system is peer to peer and transactions take place with users directly, without any intermediary. These transactions are confirmed by network nodes and recorded in a public distributed ledger called a block chain. The system works without a central repository or single administrator. Because of this, bitcoin is called as the first decentralized digital currency.
As of February 2015, over 100,000 merchants and vendors agree to receive bitcoin as payment. According to a research created by Cambridge University in 2017, there are 2.9 to 5.8 million individual users using a cryptocurrency wallet, most of them using bitcoin.
Bitcoin is acquiring 300 percent increase in its value within one year. It could be the kind of investment you may be looking for. However, in animosity of all the curiosity, many of us have wondered if it is safe to accept, store and sell bitcoins in India.
Bitcoins can’t be minted like paper currencies. They can only be mined. There are 21 million bitcoins been created and only 16.8 million or 80 percent of all bitcoins have been mined.
How to buy Bitcoins:-
You can use various digital currency exchanges to buy bitcoin. Credit card can be used for purchase of bitcoins. In India, you can purchase Bitcoin from Zebpay exchange. Zebpay has Android and iPhone app which lets you link your bank account for quick transfers.
Buying Bitcoins can be made by making a payment to Zebpay’s bank account. And can also withdraw the money to your bank account, and can track the data on Bitcoin valuation in the country.
Legality of Bitcoins in India:-
Bitcoin accepting, selling, trading or mining is not illegal by any existing law in India, however, it is not yet officially recognized in India. The Reserve bank of India or the RBI, had earlier cautioned users, holders and traders of Virtualcurrencies (VCs), including Bitcoins.
The central bank had declared that the trading or usages of virtual currency, including bitcoins are not approved by any central bank or monetary authority. It can’t be used as medium for payment.
RBI Deputy Governor R Gandhi warned against crypto-currencies such as Bitcoin. He informed as the Bitcoins possess potential financial, legal, customer protection and security-related risks. Payments by Bitcoins are on peer –to- peer basis and there is no established framework for recourse to customer problems, disputes, etc. There is no legal status for Bitcoins.
At the same time Bitcoins are not banned in the country by the central bank. But not authorised by the central bank of India.
While the United States of America has withdrawn from the Paris Agreement, Asian superpower China is marching towards emission reduction as well as renewable energy commitments. The world’s biggest floating solar power plant has been made operational in Huainan city, Eastern China. The 40-MW plant is situated on a reservoir and is in close proximity to the city. Offshore from Huainan, the plant has been successfully connected with the power grid. Being offshore, it does not take up space and uses less energy than solar farms as seawater acts as a coolant.
Sungrow, the world’s leading photovoltaic system supplier, has set up the plant. Floating solar power plants can be set up on water bodies such as lakes and seas, particularly near cities where land availability is less.
China, the most populated country on the globe is facing high degrees of air pollution, which is estimated to kill 1.1 million people annually in the country. A major reason for air pollution in China is emissions from automobiles, power plants and factories. The plant will push China towards becoming what some call a green superpower. Solar power is fast becoming key component of the Chinese strategy, as similar projects keep coming up all over China.
China is shutting down polluting factories and thermal power plants. In March, the country cancelled plans of constructing 103 new thermal plants (combined capacity 120 GW). It has also started promoting electric vehicles as well as renewable energy substantially. India can learn a lot from how the Chinese are marching ahead on the road to clean and green energy.
Global warming, climate change, and environmental degradation confront mankind, although it’s another matter that US President Donald Trump trashes all evidence and has pulled the USA out of the Paris Climate Accord. NASA—also part of the United States—figures point out globally temperatures have increased by over 1 degree since 1880; also, 9 out of the 10 hottest years occurred after 2000. By 2012, Arctic ice shrank to the lowest level. Internationally, sea levels are going up at 3.4 mm per year. It is just a matter of time before human habitation, particularly in the coastal areas, starts getting submerged.
Without security measures and controls in place, your data might be subjected to an attack. Some attacks are passive, meaning information is monitored; others are active, meaning the information is altered with intent to corrupt or destroy the data or the network itself.
Your networks and data are vulnerable to any of the following types of attacks if you do not have a security plan in place.
In general, the majority of network communications occur in an unsecured or “cleartext” format, which allows an attacker who has gained access to data paths in your network to “listen in” or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise. Without strong encryption services that are based on cryptography, your data can be read by others as it traverses the network.
After an attacker has read your data, the next logical step is to alter it. An attacker can modify the data in the packet without the knowledge of the sender or receiver. Even if you do not require confidentiality for all communications, you do not want any of your messages to be modified in transit. For example, if you are exchanging purchase requisitions, you do not want the items, amounts, or billing information to be modified.
Most networks and operating systems use the IP address of a computer to identify a valid entity. In certain cases, it is possible for an IP address to be falsely assumed— identity spoofing. An attacker might also use special programs to construct IP packets that appear to originate from valid addresses inside the corporate intranet.
After gaining access to the network with a valid IP address, the attacker can modify, reroute, or delete your data. The attacker can also conduct other types of attacks, as described in the following sections.
A common denominator of most operating system and network security plans is password-based access control. This means your access rights to a computer and network resources are determined by who you are, that is, your user name and your password.
Older applications do not always protect identity information as it is passed through the network for validation. This might allow an eavesdropper to gain access to the network by posing as a valid user.
When an attacker finds a valid user account, the attacker has the same rights as the real user. Therefore, if the user has administrator-level rights, the attacker also can create accounts for subsequent access at a later time.
After gaining access to your network with a valid account, an attacker can do any of the following:
Unlike a password-based attack, the denial-of-service attack prevents normal use of your computer or network by valid users.
After gaining access to your network, the attacker can do any of the following:
As the name indicates, a man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently. For example, the attacker can re-route a data exchange. When computers are communicating at low levels of the network layer, the computers might not be able to determine with whom they are exchanging data.
Man-in-the-middle attacks are like someone assuming your identity in order to read your message. The person on the other end might believe it is you because the attacker might be actively replying as you to keep the exchange going and gain more information. This attack is capable of the same damage as an application-layer attack, described later in this section.
A key is a secret code or number necessary to interpret secured information. Although obtaining a key is a difficult and resource-intensive process for an attacker, it is possible. After an attacker obtains a key, that key is referred to as a compromised key.
An attacker uses the compromised key to gain access to a secured communication without the sender or receiver being aware of the attack.With the compromised key, the attacker can decrypt or modify data, and try to use the compromised key to compute additional keys, which might allow the attacker access to other secured communications.
A sniffer is an application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet. Even encapsulated (tunneled) packets can be broken open and read unless they are encrypted and the attacker does not have access to the key.
Using a sniffer, an attacker can do any of the following:
An application-layer attack targets application servers by deliberately causing a fault in a server’s operating system or applications. This results in the attacker gaining the ability to bypass normal access controls. The attacker takes advantage of this situation, gaining control of your application, system, or network, and can do any of the following:
The easiest way to start with a problem like this is to ask yourself a simpler question first. So, let’s ask ourselves how can we find the highest salary in a table? Well, you probably know that is actually really easy – we can just use the MAX aggregate function:
select MAX(Salary) from Employee;
You should remember that SQL uses sets as the foundation for most of its queries. So, the question is how can we use set theory to find the 2nd highest salary in the table above? Think about it on your own for a bit – even if you do not remember much about sets, the answer is very easy to understand and something that you might be able to come up with on your own.
What if we try to exclude the highest salary value from the result set returned by the SQL that we run? If we remove the highest salary from a group of salary values, then we will have a new group of values whose highest salary is actually the 2nd highest in the original Employee table.
So, if we can somehow select the highest value from a result set that excludes the highest value, then we would actually be selecting the 2nd highest salary value. Think about that carefully and see if you can come up with the actual SQL yourself before you read the answer that we provide below. Here is a small hint to help you get started: you will have to use the “NOT IN” SQL operator.
Now, here is what the SQL will look like:
SELECT MAX(Salary) FROM Employee WHERE Salary NOT IN (SELECT MAX(Salary) FROM Employee )
Running the SQL above would return us “450”, which is of course the 2nd highest salary in the Employee table.
The SQL above first finds the highest salary value in the Employee table using “(select MAX(Salary) from Employee)”. Then, adding the “WHERE Salary NOT IN” in front basically creates a new set of Salary values that does not include the highest Salary value. For instance, if the highest salary in the Employee table is 200,000 then that value will be excluded from the results using the “NOT IN” operator, and all values except for 200,000 will be retained in the results.
This now means that the highest value in this new result set will actually be the 2nd highest value in the Employee table. So, we then select the max Salary from the new result set, and that gives us 2nd highest Salary in the Employee table. And that is how the query above works.
We can actually use the not equals operator – the “<>” – instead of the NOT IN operator as an alternative solution to this problem. This is what the SQL would look like:
select MAX(Salary) from Employee WHERE Salary <> (select MAX(Salary) from Employee )
What we did above was write a query to find the 2nd highest Salary value in the Employee table. But, another commonly asked interview question is how can we use SQL to find the Nth highest salary, where N can be any number whether it’s the 3rd highest, 4th highest, 5th highest, 10th highest, etc? This is also an interesting question – try to come up with an answer yourself before reading the one below to see what you come up with.
Here we will present one possible answer to finding the nth highest salary first, and the explanation of that answer after since it’s actually easier to understand that way. Note that the first answer we present is actually not optimal from a performance standpoint since it uses a subquery, but we think that it will be interesting for you to learn about because you might just learn something new about SQL. If you want to see the more optimal solutions first, you can skip down to the sections that says “Find the nth highest salary without a subquery” instead.
The SQL below will give you the correct answer – but you will have to plug in an actual value for N of course. This SQL to find the Nth highest salary should work in SQL Server, MySQL, DB2, Oracle, Teradata, and almost any other RDBMS:
SELECT * /*This is the outer query part */ FROM Employee Emp1 WHERE (N-1) = ( /* Subquery starts here */ SELECT COUNT(DISTINCT(Emp2.Salary)) FROM Employee Emp2 WHERE Emp2.Salary > Emp1.Salary)
The query above can be quite confusing if you have not seen anything like it before – pay special attention to the fact that “Emp1” appears in both the subquery (also known as an inner query) and the “outer” query. The outer query is just the part of the query that is not the subquery/inner query – both parts of the query are clearly labeled in the comments.
The subquery in the SQL above is actually a specific type of subquery known as a correlated subquery. The reason it is called a correlated subquery is because the the subquery uses a value from the outer query in it’s WHERE clause. In this case that value is the Emp1 table alias as we pointed out earlier. A normal subquery can be run independently of the outer query, but a correlated subquery can NOT be run independently of the outer query. If you want to read more about the differences between correlated and uncorrelated subqueries you can go here: Correlated vs Uncorrelated Subqueries.
The most important thing to understand in the query above is that the subquery is evaluated each and every time a row is processed by the outer query. In other words, the inner query can not be processed independently of the outer query since the inner query uses the Emp1 value as well.
Let’s step through an actual example to see how the query above will actually execute step by step. Suppose we are looking for the 2nd highest Salary value in our table above, so our N is 2. This means that the query will look like this:
SELECT * FROM Employee Emp1 WHERE (1) = ( SELECT COUNT(DISTINCT(Emp2.Salary)) FROM Employee Emp2 WHERE Emp2.Salary > Emp1.Salary)
You can probably see that Emp1 and Emp2 are just aliases for the same Employee table – it’s like we just created 2 separate clones of the Employee table and gave them different names.
Let’s assume that we are using this data:
For the sake of our explanation, let’s assume that N is 2 – so the query is trying to find the 2nd highest salary in the Employee table. The first thing that the query above does is process the very first row of the Employee table, which has an alias of Emp1.
The salary in the first row of the Employee table is 200. Because the subquery is correlated to the outer query through the alias Emp1, it means that when the first row is processed, the query will essentially look like this – note that all we did is replace Emp1.Salary with the value of 200:
SELECT * FROM Employee Emp1 WHERE (1) = ( SELECT COUNT(DISTINCT(Emp2.Salary)) FROM Employee Emp2 WHERE Emp2.Salary > 200)
So, what exactly is happening when that first row is processed? Well, if you pay special attention to the subquery you will notice that it’s basically searching for the count of salary entries in the Employee table that are greater than 200. Basically, the subquery is trying to find how many salary entries are greater than 200. Then, that count of salary entries is checked to see if it equals 1 in the outer query, and if so then everything from that particular row in Emp1 will be returned.
Note that Emp1 and Emp2 are both aliases for the same table – Employee. Emp2 is only being used in the subquery to compare all the salary values to the current salary value chosen in Emp1. This allows us to find the number of salary entries (the count) that are greater than 200. And if this number is equal to N-1 (which is 1 in our case) then we know that we have a winner – and that we have found our answer.
But, it’s clear that the subquery will return a 2 when Emp1.Salary is 200, because there are clearly 2 salaries greater than 200 in the Employee table. And since 2 is not equal to 1, the salary of 200 will clearly not be returned.
So, what happens next? Well, the SQL processor will move on to the next row which is 800, and the resulting query looks like this:
SELECT * FROM Employee Emp1 WHERE (1) = ( SELECT COUNT(DISTINCT(Emp2.Salary)) FROM Employee Emp2 WHERE Emp2.Salary > 800)
Since there are no salaries greater than 800, the query will move on to the last row and will of course find the answer as 450. This is because 800 is greater than 450, and the count will be 1. More precisely, the entire row with the desired salary would be returned, and this is what it would look like:
It’s also worth pointing out that the reason DISTINCT is used in the query above is because there may be duplicate salary values in the table. In that scenario, we only want to count repeated salaries just once, which is exactly why we use the DISTINCT operator.
Let’s go through a high level summary of how someone would have come up with the SQL in the first place – since we showed you the answer first without really going through the thought process one would use to arrive at that answer.
Think of it this way – we are looking for a pattern that will lead us to the answer. One way to look at it is that the 2nd highest salary would have just one salary that is greater than it. The 4th highest salary would have 3 salaries that are greater than it. In more general terms, in order to find the Nth highest salary, we just find the salary that has exactly N-1 salaries greater than itself. And that is exactly what the query above accomplishes – it simply finds the salary that has N-1 salaries greater than itself and returns that value as the answer.
We can also use the TOP keyword (for databases that support the TOP keyword, like SQL Server) to find the nth highest salary. Here is some fairly simply SQL that would help us do that:
SELECT TOP 1 Salary FROM ( SELECT DISTINCT TOP N Salary FROM Employee ORDER BY Salary DESC ) AS Emp ORDER BY Salary
To understand the query above, first look at the subquery, which simply finds the N highest salaries in the Employee table and arranges them in descending order. Then, the outer query will actually rearrange those values in ascending order, which is what the very last line “ORDER BY Salary” does, because of the fact that the ORDER BY Default is to sort values in ASCENDING order. Finally, that means the Nth highest salary will be at the top of the list of salaries, which means we just want the first row, which is exactly what “SELECT TOP 1 Salary” will do for us!
There are many other solutions to finding the nth highest salary that do not need to use the TOP keyword, one of which we already went over. Keep reading for more solutions.
The solution we gave above actually does not do well from a performance standpoint. This is because the use of the subquery can really slow down the query. With that in mind, let’s go through some different solutions to this problem for different database vendors. Because each database vendor (whether it’s MySQL, Oracle, or SQL Server) has a different SQL syntax and functions, we will go through solutions for specific vendors. But keep in mind that the solution presented above using a subquery should work across different database vendors.
In MySQL, we can just use the LIMIT clause along with an offset to find the nth highest salary. If that doesn’t make sense take a look at the MySQL-specific SQL to see how we can do this:
SELECT Salary FROM Employee ORDER BY Salary DESC LIMIT n-1,1
Note that the DESC used in the query above simply arranges the salaries in descending order – so from highest salary to lowest. Then, the key part of the query to pay attention to is the “LIMIT N-1, 1”. The LIMIT clause takes two arguments in that query – the first argument specifies the offset of the first row to return, and the second specifies the maximum number of rows to return. So, it’s saying that the offset of the first row to return should be N-1, and the max number of rows to return is 1. What exactly is the offset? Well, the offset is just a numerical value that represents the number of rows from the very first row, and since the rows are arranged in descending order we know that the row at an offset of N-1 will contain the (N-1)th highest salary.
In SQL Server, there is no such thing as a LIMIT clause. But, we can still use the offset to find the nth highest salary without using a subquery – just like the solution we gave above in MySQL syntax. But, the SQL Server syntax will be a bit different. Here is what it would look like:
SELECT Salary FROM Employee ORDER BY Salary DESC OFFSET N-1 ROW(S) FETCH FIRST ROW ONLY
Note that I haven’t personally tested the SQL above, and I believe that it will only work in SQL Server 2012 and up. Let me know in the comments if you notice anything else about the query.
Oracle syntax doesn’t support using an offset like MySQL and SQL Server, but we can actually use the row_number analytic function in Oracle to solve this problem. Here is what the Oracle-specific SQL would look like to find the nth highest salary:
select * from ( select Emp.*, row_number() over (order by Salary DESC) rownumb from Employee Emp ) where rownumb = n; /*n is nth highest salary*/
The first thing you should notice in the query above is that inside the subquery the salaries are arranged in descending order. Then, the row_number analytic function is applied against the list of descending salaries. Applying the row_number function against the list of descending salaries means that each row will be assigned a row number starting from 1. And since the rows are arranged in descending order the row with the highest salary will have a 1 for the row number. Note that the row number is given the alias rownumb in the SQL above.
This means that in order to find the 3rd or 4th highest salary we simply look for the 3rd or 4th row. The query above will then compare the rownumb to n, and if they are equal will return everything in that row. And that will be our answer!
Oracle also provides a RANK function that just assigns a ranking numeric value (with 1 being the highest) for some sorted values. So, we can use this SQL in Oracle to find the nth highest salary using the RANK function:
select * FROM ( select EmployeeID, Salary ,rank() over (order by Salary DESC) ranking from Employee ) WHERE ranking = N;
The rank function will assign a ranking to each row starting from 1. This query is actually quite similar to the one where we used the row_number() analytic function, and works in the same way as well.
We’ve now gone through many different solutions in different database vendors like Oracle, MySQL, and SQL Server. Hopefully now you understand how to solve a problem like this, and you have improved your SQL skills in the process! Be sure to leave a comment if you have any questions or observations.
The “cd” stands for ‘change directory’ and this command is used to change the current directory i.e; the directory in which the user is currently working.
there are few question related to incident management……
please have a look……….
QUESTION 1: What is your understanding of incident management?
ANSWER 1: An Incident occurs when there is an interruption in the flow of service, or if the quality of the process has reduced. For example, (power cut scenario – finance company – server down). Incident management means restoring the flow of process as soon as possible by rectifying the issue caused due to the incident. It reduces the adverse impact on the business.
QUESTION 2: On what factors do you prioritize an Incident?
ANSWER 2: The priority of an Incident can be decided on answering the following questions:
QUESTION 3: Explain – Priority = Impact + Urgency (Priority Matrix)
ANSWER 3: Impact is the level of loss, be it financial or on the business. Urgency is how quick the solution has to be provided. Priority is decided based both on Impact and Urgency.
QUESTION 4: What is an Emergency Change? How different is it from a Normal Change?
ANSWER 4: Emergency Change is something which has huge impact if not addressed immediately. It is dealt by ECAB (Emergency Change Advisory Board), with shorter time-scales and higher levels of urgency. ECAB does the impact assessment and decides whether to approve or to reject the change request.
QUESTION 5: Describe the different phases involved in the Incident Management Process.
ANSWER 5: In the different phases, one needs to:
QUESTION 6: How do you engage Problem Management while handling incidents?
ANSWER 6: As soon as an Incident is identified as a problem ticket, the problem management team comes into the picture to check the previous and related incidents, and then do a root cause analysis so as to find the reason for the recurring incident. The incident management team provides, the required incident details to the problem manager, and also coordinates with the end user in times of need.
QUESTION 7: What type of Incident Management reports did you or your team have?
ANSWER 7: The types are:
QUESTION 8: What are the escalation methods that are used in Incident management?
ANSWER 8: There are two types of methods used: the Functional method and the Hierarchical method.
Functional escalation means forwarding or assigning a particular incident from one department to another for resolution.
Hierarchical escalation is done when we don’t get the proper and timely response from the support teams. We escalate it to the senior management above the support team members.
QUESTION 9: Why does an Incident manager need to be aware of new developments and technical changes?
ANSWER 9: An Incident Professional needs to update his knowledge and be aware of the new developments and technical changes because it helps him or her to find upgraded resolutions that may trigger in future.
QUESTION 10: What are the daily responsibilities of an Incident Manger?
ANSWER 10: An Incident Manager is responsible of the following activities:
QUESTION 11: How different is Major Management Process from Incident Management Process?
ANSWER 11: There is some similarity in the two processes. In both the cases, we aim to get the incident resolved at the earliest so as to reduce adverse impact on the business. But there is a slight difference in their approaches. Major incident management is a critical process where the timelines are shorter and urgency levels are higher. The way your team wants to deal with it may depend on your organization structure. Usually someone specific is assigned to take care of that particular major incident – right from the identification of the major incident, bringing in the support team members on to a conference call or a group chat till resolving the incident.
QUESTION 12: How is a Major Incident Management bridge call handled?
ANSWER 12: A Major Incident Management bridge call is handled by: