Sunday, May 24, 2020

Maths Answers Class 10 Ncert - 5161 Words

ANSWERS/HINTS 345 APPENDIX 1 ANSWERS/ HINTS EXERCISE 1.1 1. (i) 45 3. 8 columns 4. An integer can be of the form 3q, 3q + 1 or 3q + 2. Square all of these integers. 5. An integer can be of the form 9q, 9q + 1, 9q + 2, 9q + 3, . . ., or 9q + 8. (ii) 196 (iii) 51 2. An integer can be of the form 6q, 6q + 1, 6q + 2, 6q + 3, 6q + 4 or 6q + 5. EXERCISE 1.2 1. 2. 3. (i) 2 Ãâ€" 5 Ãâ€" 7 (iv) 5 Ãâ€" 7 Ãâ€" 11 Ãâ€" 13 (i) LCM = 182; HCF = 13 (i) LCM = 420; HCF = 3 2 (ii) 22 Ãâ€" 3 Ãâ€" 13 (v) 17 Ãâ€" 19 Ãâ€" 23 (ii) LCM = 23460; HCF = 2 (ii) LCM = 1139; HCF = 1 7. 36 minutes (iii) 32 Ãâ€" 52 Ãâ€" 17 (iii) LCM = 3024; HCF = 6 (iii) LCM = 1800; HCF = 1 4. 22338 EXERCISE 1.4 1. (i) Terminating (iii) Non-terminating repeating (v) Non-terminating repeating (vii) Non-terminating†¦show more content†¦(ii) x – y = 18, x + y = 180, where x and y are the measures of the two angles in degrees; x = 99, y = 81. (iii) 7x + 6y = 3800, 3x + 5y = 1750, where x and y are the costs (in Rs) of one bat and one ball respectively; x = 500, y = 50. (iv) x + 10y = 105, x + 15y = 155, where x is the fixed charge (in Rs) and y is the charge (in Rs per km); x =5, y = 10; Rs 255. (v) 11x – 9y + 4 = 0, 6x – 5y + 3 = 0, where x and y are numerator and denominator of the fraction; 7 ( x = 7, y = 9). 9 (ii) s = 9, t = 6 (v) x = 0, y = 0 (iii) y = 3x – 3, (vi) x = 2, y = 3 where x can take any value, i.e., infinitely many solutions. (vi) x – 3y – 10 = 0, x – 7y + 30 = 0, where x and y are the ages in years of Jacob and his son; x = 40, y = 10. EXERCISE 3.4 1. (i) x = 19 6 , y= 5 5 (ii) x = 2, y = 1 (iii) x = 9 5 ,y= − 13 13 (iv) x = 2, y = –3 2. (i) x – y + 2 = 0, 2x – y – 1 = 0, where x and y are the numerator and denominator of the fraction; 3 â‹… 5 (ii) x – 3y + 10 = 0, x – 2y – 10 = 0, where x and y are the ages (in years) of Nuri and Sonu respectively. Age of Nuri (x) = 50, Age of Sonu (y) = 20. (iii) x + y = 9, 8x – y = 0, where x and y are respectively the tens and units digits of the number; 18. (iv) x + 2y = 40, x + y = 25, where x and y are respectively the number of Rs 50 and Rs 100 notes; x = 10, y = 15. (v) x + 4y = 27, x + 2y = 21, where x is the fixed charge (in Rs) and y is the additional charge (in Rs) per day; xShow MoreRelatedPositive Association Between Mean Ses Intake Composition And School Mean Performance1615 Words   |  7 Pagesfive districts of state. A maximum of 25 students and five teachers per school were selected, using systemic selection with a random start. The largest sample was subjected to standardized tests in language and mathematics. These tests were based on class IV curriculum. Background information on pupils, teachers and schools was collected through personal interview using pre-test instruments by the investigator. Preliminary analysis was-conducted using Ordinary Least Squares to important predictor variables

Wednesday, May 13, 2020

Mark Twain s Clemens Notebook 1904 - 1341 Words

As Samuel L. Clemens, otherwise known as Mark Twain once said, â€Å"Whenever you find yourself on the side of the majority, it is time to pause and reflect.† This was said in Clemens’ Notebook 1904. For generations, many people have lived by this quote. Some whether notorious or any ordinary people. Being politics in the government, or people using their knowledge for their everyday lives. Everyone must make their own individual decisions in any situation. The majority cannot be one person, one person has their own ideas and emotions. Agreeing with everyone else without personal views is basically writing the same thing over and over again. Nothing will be resolved, ever. Our opinions, thoughts, and ideas make us who we are, and it is who we are that makes people different from their societies.. Its views, everything. Lucille Ball chose to be different from other women in the United States, she was an actress, a very notorious and successful one at that. Ball was slow and steady, but eventually became a success. As told in Top 101 Remarkable Women, edited by Jeanne Nagle, Lucille Ball was unsuccessful at first, but she eventually became more and more popular. To the point she and her husband formed Desilu Productions, launching comedies and specials, such as, I Love Lucy and The Lucille Ball-Desi Arnaz Show. (Nagle 8) She may have struggled, but in the end, Ball was heard. She was a legend because of it. More and more, her voice was heard, she became a powerful

Wednesday, May 6, 2020

Biography on Julius Caesar Free Essays

Julius Caesar was the means to the evolution of the Roman Republic into an empire. This transition extended its significance to more than 60 million citizens through the outcome of the empire, some of which is virtual peace and prosperity. Arriving at this conclusion, we must now ask, was this transition all because of Caesar? It seems to appear that Caesar had intentionally planned to initiate a dominion as the key to all the troubles in the world. We will write a custom essay sample on Biography on Julius Caesar or any similar topic only for you Order Now The events that took place, namely the invasion of Gaul, the combat opposing Pompey, and the dictatorship of Caesar, moved so fast and certain. This viewpoint was equally shared by a few historians; the most expressive of them was the German scholar Theodor Mommsen (1817-1903). He articulated this viewpoint in his Romische Geschichte. For Mommsen, Caesar had cleared all crooked aristocracy and formed an empire that functioned for all of its citizens. Dominion and equality were evenhanded in its foundation. This was a thing that Mommsen would have greatly loved in his own homeland. Mommsen wrote that Caesar’s â€Å"aim was the highest which a man is allowed to propose himself – the political, military, intellectual, and moral regeneration of his own deeply decayed nation [†¦ ] The hard school of thirty years’ experience changed his views as to the means by which this aim was to be reached; his aim itself remained the same in the times of his hopeless humiliation and of his unlimited plenitude of power, in the times when as demagogue and conspirator he stole towards it by paths of darkness, and in those when, as joint possessor of the supreme power and then as monarch, he worked at his task in the full light of day before the eyes of the world. [†¦ ] According to his original plan he had purposed to reach his object [†¦ ] without force of arms, and throughout eighteen years he had as leader of the people’s party moved exclusively amid political plans and intrigues – until, reluctantly convinced of the necessity for a military support, he, when already forty years of age, put himself at the head of an army. †( Romische Geschichte) Many of his actions had sheltered the common citizens against the self-centered rules of the rich. His rules on levies and nationality most likely demonstrate this. On the other hand, were these actions to protect the people his goal or just his instrument to create a solid foundation for a personal cause? The following arguments are the judgments of enormous historians, namely Eduard Meyer and Jerome Carcopino. They believed, as written in their Caesars Monarchie und das Pinzipat des Pompejus and Histoire Romaine, that even as a child, Caesar’s goal was the organization of a dominion in Rome. Caring for the citizens’ welfare was not his aim, instead, he utilized them. According to the German historian Matthias Gelzer, maybe, it was not right to center on Caesar’s guiding principle. He added that Caesar maybe was just an exemplar to a much bigger course. Caesar made history but not in the condition of his own option. He explained further that there had to be profound causes for these actions and it was not right to consider influential men like Julius Caesar as stimulators of social change. Ronald Syme, an Oxford professor, shared the same perspective with Gelzer’s thought that Caesar was just an exemplar to a much bigger course. According to him, Caesar outshined his associate nobles because he established groundwork outside Italy. His abundant allocation of nationality was a significant tool for him to receive this support. He wanted to be the original among his fellows. After World War II, most people agreed with Syme’s abhor of one-man ruling. This resulted in the vanishing of the subject about Caesar. There were articles but there were no improvements. Today, Syme’s ideas were most likely agreed by most historians than Mommsen’s. However, the perspective of Syme deteriorated very fast. His divisions were similar to the elites that managed universities in the 20th century. His principle in family fidelity was not very possible in the real world. (Lendering) At the Capitoline hill in present Rome lies the statue of Caesar. It stares down above the remains of his round-table. What types of accomplishments were left for a man who cared much about his personal heritage to history? Since Caesar’s death, his effect on the history of his country has been continually deliberated. The path he chose in life was obviously notorious. Historians either agreed for his actions or opposed it. Centuries later, uneducated native people who barely knew Rome knew his name. His name is one among some which are often renowned. Those who admire Cicero always oppose the fearless, dignified orator against the striving, monomaniacal demolisher of Rome. Likewise, the ones who look up to Caesar seem to view Cicero as a selfish tool for the oligarchs who, in the first place, had destabilized the Republic even before the arrival of Caesar. In the 19th century, intellectuals raised Caesar’s statesmanship and knowledge into a level that nearly advances into a sect of personality. In Mommsen’s opinion, the Roman Empire was out of power and leads towards devastation. According to him, it was Caesar’s declaration that seized organization of its history and headed towards unwavering years of the Republic. In the 20th century, many historians likened Caesar to Hitler and Stalin due to the unavoidable responses after the end of World War II. Nevertheless, his status has lived two millennia of disordered government and will live the limits of the previous years. For me, Caesar’s path is a breakpoint in the history of Rome and very essential. An obvious misinterpretation of the Roman psyche of his own era is the mistreatment of Caesar as a man preoccupied by his own dignities. To challenge deeply in quest of individual credit was the outcome of as aristocratic whose only immortality rest in eternally touching the history of Rome. Cicero, for all his fully conscious acceptance of the history of Rome, blazed with an unslaked yearning to influence his era and be recalled for his actions. Caesar carried amazing traits to his concluding power of the nation which were not present in his motivated equals. The case was unpersuasive for me because the legislation of his Consulate and the soon after kinds passed while Dictator did not gravely tried to restore mistakes long disregarded by the wrangling rich men who declared that he shattered freedom on his own. Caesar was far more than dreams not like the Gracchis. He was a progressive. Sorting out the applicable comments of his measures from the doubt that a lot of his colleagues were provoked by their personal gluttony and jealousy of his rank among them is hard. Furthermore, the power of Rome was absolutely incompetent of calmly accommodating the transformations of Caesar. It believes with confidence that the Republic was the finest of all potential worlds and that whichever amend was not merely hazardous but completely unpatriotic. Reading the past of Rome from the Gracchi to Augustus is an extensive and disheartening investigation of what prejudice, factionalism, individual goal, aggression, and gluttony had made to Romans. Basically, Rome had turned relatively ensnared in the collapse when men need not describe the universal superior likewise, and where the aspirations of persons or families were dominant. Cicero enclosed his row completely to the advantage of the status quo and the past rulers of Rome for centuries. He probably have profoundly hoped to trust in a concordance of the guidelines and this is the capability of every Roman to work as one. Determining that no one ought to continually accumulate excessive authority or control had get nearer to signify that any reformer was ruined in spite of whether his reorganization was excellent or terrible is the most. It is because to execute them may gain him so much thankful patrons. Probably the most grave in estimating whether the Republic could have viably sustained devoid of Caesar’s measures is to acknowledge this thinking. All of those under pressure to tackle the troubles of the late empire, from the era of Gracchi to Caesar, were all destroyed. Transformation was badly required and no modification appeared probable inside the structure. This perspective is the result of all transformations. Caesar was the only one who lived long enough to start changing the perspective. The main reason why he died is because he did this without enough cruelty. After another war and 20 years of turmoil, the people of Rome acknowledged that dictatorship may be preferable to sovereignty if it conveyed harmony in its way. Unlike Caesar, Augustus was able to make in the course of a technical civil service. This is a vent for the wealthy and determined adolescent noble to perform for his nation devoid of resorting to aggression. (Cross) Reference: Cross, Suzanne. â€Å"Julius Caesar: The Last Dictator; A Biography of Caesar and Rome 100-44 B. C. † 2002-2006. October 27, 2006. http://web. ma/heraklia/Caesar/index. html. Lendering, Jona. â€Å"Gaius Julius Caesar†. 2006. Livius: Articles on ancient history. October 27 2006. http://www. livius. org/caa-can/caesar/caesar01. html. How to cite Biography on Julius Caesar, Papers

Sunday, May 3, 2020

Biometric data

Question: What isBiometric data? Explain. Answer: Biometric data is the present trending discussed topic in the past and present also. Previous discussion includes many research papers, proposals for strong biometric information (data) on passports. Many countries like Germany have already implemented this technology in Video Stores for authentication, fingerprint sensor integrated in laptops and even banks started using this biometric devices as well. Even though having wide range of trail uses and proposals, in many countries, this biometric data systems are not widely used for authentication purpose. In this report, we have discussed why biometric authentication is not a standard technique till now. We also analyzed that these biometric devices will make system safety and much more secure. Even though these devices cost high, it is also worth spending much more amount of money on these systems. Our results leads to a conclusion that in most of the cases, the trade-offs which need not to be consider users biometric data for authen tication as compared to other alternative methods like password authentication. Introduction: Security is the most important aspect in the software industry. Many scientists have been proposed different methods like login/password, Personal Identification Number (PIN) etc. But if we look into the present security problems, these methods cannot prevent those problems. In order to overcome the problems, a new security system has been implemented i.e. Biometric data for authentication. Now a days, this technology is used in many places, like banks, market stores, companies, institutions, etc. Even we find finger print sensors in laptops (integrated with it) and also for computers connected as external device. Systems using biometric data introduces a new concept authentication paradigm i.e. based on something like fingerprint, face ,iris etc. or you can do such as handwriting, voice etc. What is Biometric: It is study of automated method for genuinely recognizing things based on one or more intrinsic behavioral or physical traits. It is also described as study of Biometrics that discover ways to compare and make difference between things (individuals) using personal things (that we do) and physical characteristics (things we are). The general physical features used are eyes (IRIS and retina), facial features, hand geometry and fingerprints. The common examples for personal traits are handwriting and voice that are used to distinguish between persons. As these characteristics and traits are unique and universal for all individuals, these are commonly used in this system. Biometric authentication Before going into the detailed explanation about biometric authentication, Let us discuss the general view of access control model that is useful to understand how to keep the authenticaiton system secure. If we look at the following diagram, fig 2, it gives an overview about the model. Fig 2. Overview of access control model. The guard in the middle will give grant for the access to the system. For the decision, the guard uses the data to identify the authorization information and requesting source to find out if the given source is equal to the identified source. If it is equal, then the user was allowed to get access to the requested resource. If necessary, The decision taken by the guard is given to log in, so that it can be able to backtrack decisions. In this report, we talk about the authentication process of the systems that is marked with the darker colored parts in the diagram. In this case, The source is biometric information provided by the person along with combination with other identification information. This information is sent to the guard. The guard use algorithms and it will perform a comparison with the stored information. If it matches, the user was allowed to get access. If not, no grant for the access. Biometric identification is the process of presenting the unknown person biometric data to the system. Then the system use the algorithms for processing the data and compares the data with the stored database until one matches. By this, the system will be able to identify the unknown personality (one to many). So there are many process to run, it takes a little time than that of biometric verification. Biometric verification is the process of providing biometric data to the system and it claims whether the particul ar identity belongs to this data or not (one to one). In most of the authentication processes, biometric verification is used[2]. Working of Biometric system: Coming to the working of biometric system, A biometric system consists of a testing and an enrolment phase. The sample biometric data sets are produced and saved in enrollment phase, that are used for comparison in the authentication process. Each authorized user has to go with this step. In this phase, examples like fingerprints are as in digital information and saved in a database as PIN. If we come to the testing phase, when the person requested for the access of the system, the saved sample in the enrollment phase is used by the guard for decision whether to give grant access to the system or not. The important process for a biometric system is enrollment phase. This can be explained with an example. Suppose if the given sample data taken from a user for authentication, is not good enough, then there will be a high chance of refusing the access to that person[3]. Performance and security considerations: In this section, we will look at the performance and security considerations. We know that as the technology gets improved, the old systems gets replaced by the new systems.[3] It is difficult to measure the performance of a biometric authentication. The main factor that tells about the system is accuracy that indicate whether the performance is good or bad. There are also other factors that need to be considered like speed, cost, storage and ease of use are also considered as well.[5] Sometimes, biometric devices are not perfect and produces errors. If we look at an example, sometimes there are chances of authorized person is rejected by the system and also will get access for a non- authorized person. The probability of the rates of these errors are named as False acceptance and False rejection. In short they are called as FA and FR. For most of the systems, it is possible to tradeoff these types of errors against each other. This is done by increasing the threshold that is used for decision to make a match for these two biometric data. The FA and FR are dependent on each other. For a perfect system, there will be no errors and these rates (FA and FR) are almost zero. For a very secure system, the probability of FA rate is increased to almost zero that results in a high FR rate. The time needed for the authentication process depends on the accuracy and thereby with the security of the system. If the system needs high security, i.e. high rate of FA, then the system could use more characteristic points that need to be compared for an authentication process. So for a more security system, the authentication time will be more as compared with the one with lower security. Therefore authentication systems having a FR and FA rates that affects the time of the authentication process. The below list presents some factors that should be considered in decision process: Amount of support for the running system. Distinctiveness and uniqueness of the biometric trait or characteristic. Intrusiveness of the system Variation of the biometric trait or characteristic Cooperation of the customer Vulnerability to fraud the system Now lets discuss the results of several optical, thermal and capacitive fingerprint scanners, one face recognition and iris scanner system. There are 3 scenarios about how to fool the biometric system.[4] For regular sensing technology, the artificial created data can be used to trick the system. The 2nd scenario is about the artificially created data which is time gained by sniffer programs. The 3rd scenario is if about the directly attack of the database. All fingerprint scanners are able to trick by using artificial gained data. The following methods are used in tricking the fingerprint recognition system: Reactivate the finger fat traces left on the sensors surface by breathing on it. The latent fingerprint is dusted with normal graphite powder, and Adhesive film is slightly pressed on the sensors surface to gain access to the system.[3] Placing a bag filled with warm water on the fingerprint sensor so as Reactivate latent fingerprints. Artificial silicon fingerprints can be produced which can be used for the optical and thermal scanners to access the system successfully. Advantages: The useful advantage of the biometric data is, it cant get lost, duplicated, stolen, forgotten like keys. And also they cant be shared, observed, forgotten, guessed or forgotten like PINs, secret codes. People need not to change the authentication data for every 3 months. This type of authentication systems can increase the security much more as compared to the other systems. The system hardware cant be cheated, If the accuracy of the system is very high. Disadvantages: Acceptability is one of the advantage of the these authentication systems. people are afraid about the light used in the IRIS scanner as it can be harmful for the eyes. These biometric authentication technologies are of high cost. Another disadvantage of biometric systems is varying reliability. Conclusion : If we look at the above results and discussion, it seems to exist more advantages as compared to the disadvantages for biometric authentication systems. The biometric authentication is an interesting and presently the trending topic that has a lot of research going on and to be done on this area. It is also advised to use biometric authentication with other different authentication technologies. This use of multi factor authentication is more secure and research has to be made to improve the techniques and increase the applications of this technology. References: Birgit Kaschte(2005), Biometric authentication systems today and in the future, University of Auckland. Renu Bhatia(2013), Biometrics and Face Recognition Techniques, IJARCSSE, Volume 3, Issue 5, May. Vaclav Matyas, Zdenek Riha, Biometric Authentication Security And Usability. J. Phillips, A. Martin, C.L. Wilson, and M. Przybocki. An introduction to evaluating biometric systems. Computer, 33:56632, February 2000. Anil K. Jain, Lin Hong, Sharath Pankanti, and Ruud Bolle, An identity- authentication system using à ¯Ã‚ ¬Ã‚ ngerprints. In Proceedings of the IEEE, volume 85 of 9, September 2007.