Free Essay

Cds Syllabus

In:

Submitted By sumitbenz
Words 356
Pages 2
Elementary Mathematics Syllabus
Arithmetic
Number System-Natural numbers, Integers, Rational and Real numbers. Fundamental operations addition, subtraction, multiplication, division, Square roots, Decimal fractions.
Unitary method-time and distance, time and work, percentages, applications to simple and compound interest, profit and loss, ratio and proportion, variation.
Elementary Number Theory- Division algorithm. Prime and composite numbers. Tests of divisibility by 2,3,4,5,9 and 11. Multiples and factors. Factorisation Theorem. H.C.F. and L.C.M. Euclidean algorithm, Logarithms to base 10, laws of logarithms, use of logarithmic tables.
Algebra
Basic Operations, simple factors, Remainder Theorem, H.C.F., L.C.M. Theory of polynomials, solutions of quadratic equations, relation between its roots and coefficients (Only real roots to be considered). Simultaneous linear equations in two unknowns-analytical and graphical solutions. Simultaneous linear equations in two variables and their solutions. Practical problems leading to two simultaneous linear equations or inequations in two variables or quadratic equations in one variable & their solutions. Set language and set notation, Rational expressions and conditional identities, Laws of indices.
Trigonometry
Sine x, cosine x, Tangent x when 0 deg < x < 90 deg
Values of sin x, cos x and tan x, for x = 0 deg, 30 deg, 45 deg, 60 deg and 90 deg
Simple trigonometric identities.
Use of trigonometric tables. simple cases of heights and distances.
Geometry
Lines and angles, Plane and plane figures, Theorems on (i) Properties of angles at a point (ii) Parallel lines, (iii) Sides and angles of a triangle, (iv) Congruency of triangles, (v) Similar triangles, (vi) Concurrence of medians and altitudes, (vii) Properties of angles, sides and diagonals of a parallelogram, rectangle and square (viii) Circles and its properties including tangents and normals, (ix) Loci.
Mensuration
Areas of squares, rectangles, parallelograms, triangle and circle. Areas of figures which can be split up into these figures (Field Book), Surface area and volume of cuboids, lateral surface and volume of right circular cones and cylinders, surface area and volume of spheres.
Statistics
Collection and tabulation of statistical data, Graphical representation frequency polygons, histograms, bar charts, pie charts etc. Measures of central tendency.

Similar Documents

Free Essay

Student Resources

...websites and tools that can assist you in completing assignments, connecting to other students, and searching for careers. Instructions Complete the following Scavenger Hunt Matrix regarding student resources provided by the university. In the first column, list the steps used to locate each resource. In the second column, explain how each resource might contribute to your success. Scavenger Hunt Matrix |Student resource |List the specific steps you used to locate |Explain how you can use each resource to support your | | |each resource. |academic, career, or personal success. | |Course syllabus |The course syllabus is located in the |The class syllabus is useful because it is a listing of| | |classroom. 1st location is on class home |all of the required study materials, tasks to complete,| | |and from the current class list on your |and exercises. It lists your assignments and their due | | |ecampus home page |dates. You can check off completed items. | |Academic policies |These are found on the class home page on |The academic policy has a wide range of very important | | |the right hand side of the screen above the|information. It...

Words: 1025 - Pages: 5

Premium Essay

Asss

...LISTENING REACTION PAPER [pic] Speech 100 – all sections. Assignment Instructions: The Listening Exercise takes place in class. You must be in class doing the exercise to be able to write this short paper. Type a double-spaced, two page paper (see ”Format” in the class syllabus for instructions on margins, etc.) Type full pages – don’t skimp! It’s worth points to fill the page. NUMBER your answers and answer the following: 1. As you listened to a classmate in a “duo” or a “trio” in class, were you “empathically” listening? Explain. 2. Discuss your personal “barriers” to listening (p. 29-31 in the workbook “Communicate.”) How well did you listen? Discuss difficulties you may have experienced during the exercise. 3. Consider page 31 in the workbook – what steps did you take while listening to another person? 4. Do page 37-38 in the Communicate workbook, “Analysis of my listening effectiveness” – and tell me what your results were. What did your results tell you? 5. Finally, when it was YOUR turn to talk and have another person listen to you: (a) Discuss how it felt to have someone listen to you – really listen, without judging, without offering advice, or without trying to ”fix” it. (b) How could you tell they were listening to you? 6. What did you think of this exercise? ** This paper is worth 20 points – points are awarded on the QUALITY and also the required length of the paper, as well as...

Words: 256 - Pages: 2

Free Essay

Nt1430 Bash Scripts

...Title:How to script: A Bash crash course; An easy step-by-step guide to the Bash command-line shell and shell scripting Author(s):Paul Venezia Source:InfoWorld.com. (Mar. 8, 2013): Document Type:Article Copyright : COPYRIGHT 2013 InfoWorld Media Group, Inc. http://www.infoworld.com/ Full Text:  Byline: Paul Venezia Few aspects of Unix system administration are more intimate than the relationship between the admin and their chosen shell. After all, the shell is the most fundamental interface to the system, the conduit for all command-line interactions. Thus, it's important to have a solid foundation in whatever shell you choose. There are many different shells available, from Ash to Zsh. They all differ in many ways, and some (such as Csh and Tcsh) vary wildly from the others. Each has its selling points. However, because Bash has become the de-facto standard shell on most Unix-like operating systems and can generally be found everywhere, it makes an excellent place to start, even if you ultimately choose a different shell for daily use. [ How to get started with MySQL | How to install Apache on Linux | Prove your expertise with the free OS in InfoWorld's Linux admin IQ test round 1 and round 2. | Track the latest trends in open source with InfoWorld's Open Sources blog and Technology: Open Source newsletter. ] This is not designed to be an exhaustive tutorial, but is structured to introduce you to shells in general and Bash in particular, touching on many...

Words: 4013 - Pages: 17

Premium Essay

Dns Server

...“Birch” DNS Server The Mail server will be using fedora as the OS. First step will be to install fedora on the server. After successful install there are 3 packages that need to be installed. The first package will be the bind package. Next will be the bind-utils and bind-chroot packages. After successful install of all packages we will start with adding files to the chroot directory that will be implemented for security. We will do this in anticipation if anyone hacks into the server they will be confined to that directory. To do this a copy of the named.config, named.rfc1912.zones, and the named.root.hints files will made in the /var/named/chroot/etc directory.Also copy the default zone files from/user/share/doc/bind/sample/var/named into var/named/chroot/var/named directory. In the /etc/named.config file we need to add the DNS server Birch.company.com with the ip address 206.207.208.12, mail server Cedar.company.com 206.207.208.11, and web server Aspen.company.com 206.207.208.10 to the list of servers to be added to the DMZ zone.. In the /etc/resolve.config file we need to point the DNS server to quiry the ISP DNS 82.83.84.85 for unknown names or domains. This setup will allow clients on the Corp. side to query the DMZ DNS which will in turn query the ISP DNS for any name resolution and protect the internal network from being compromised. In addition to the using chroot we will also implement SELinux as addition security. To ensure DNS will run automatically at system boot...

Words: 295 - Pages: 2

Free Essay

Kali Always and Forever

...Official Kali Linux Documentation This PDF has been autogenerated on docs.kali.org - Aug 19, 2013 00. Introduction to Kali Linux What is Kali Linux ? Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution. Kali Linux Features Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS. More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either did not work or had other tools available that provided similar functionality. Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux. Open source Git tree: We are huge proponents of open source software and our development tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages. FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc. Vast wireless device support: We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices. Custom kernel patched for injection:...

Words: 26373 - Pages: 106

Premium Essay

Linux Security Basics

...Linux Security Basics Security is always at the top of the list when setting up a network and also administering a network. Linux is an operating system that can be easily obtained over the internet due to its open source distributions. Linux is one of the most secure operating systems because of having less use than Windows for the end user. There are several security technologies in Linux that can be implemented into a network. The three technologies that I will be discussing are SELinux, chroot jail, and iptables. SELinux was developed by the National Security Administration in an effort to incorporate a strong, flexible mandatory access control architecture into the major subsystems of the Linux kernel. The NSA recognized that operating system security is critical at higher levels. It provides a tool to enforce the separation of information based on the confidentiality and integrity requirements. This helps when addressing threats of tampering and bypassing of application security. It also assists in the isolation of damage that is caused by malicious software or damaged applications. SELinux uses the Flux Advanced Security Kernel which contains components that provide support for enforcing many kinds of MAC policies like type enforcement, role-based access control, and multilevel security. The Linux kernel that is implementing SELinux enforces MAC policies that limit the user programs and system servers to only what they need to complete the job. When a limit...

Words: 1313 - Pages: 6

Premium Essay

Persuading for Pas

...Title                     : Euthanasia: To live and let die. Specific purpose       : To persuade my audience that euthanasia should be legalized in Malaysia.Central idea               : Euthanasia is about giving people the right to choose how they want to live and die, saves money in medical bills, and it also stops the person from having a bad quality of life.INTRODUCTIONAttention getter :Imagine yourself being unable to walk, unable to see, and can barely breathe let alone speak. Your life was well lived all those years before. You are now in such unbearable pain that you can’t even cry.   You can no longer complete simple tasks on your own and there is no way that you could function without assistance. You think and feel as if your life has no meaning.   Although your family is there to support you, you wonder could ending your life be the answer? Well in all reality this isn’t something anyone needs to imagine. This is a real situation for many, many people. These people should be able to make their own choices and have control of their own lives.ThesisWhat’s life without the quality of life?Now let's take a look and examine 3 reasons why Physician Assistant suicide should be legalized. PAS is about giving people the right to choose how they want to live and die, saves money in medical bills, and it also stops the person from having a bad quality of life.Transition to body of speech :BODYA. Main-point 1: Everyone has the right to choose how they want to live and die.i. Supporting...

Words: 336 - Pages: 2

Free Essay

Diversity

...Diversity Walking Tour Signature Assignment Heather Zieman Brandman University May 3, 2015 Patricia Scott The area I chose to tour was an area in Rochester, MN where a lot of the people live below the poverty line. Rochester consists of about 110,000 people so there were a couple areas around town that were like this. The problems that they faced would be anywhere from windows broken, not warm enough in the winter, and the families that had children were ashamed that they lived that way. They discussed with me that they were doing the best that they could do and some even working multiple jobs just to live in the house that they live in. The first glance that one looks at the neighborhood, it looks run down with “junk” piles in some of the yards. At first glance it does not look like a good place to live but do not judge a book by the cover. The people in the neighborhood make it better because they want a better future for themselves and their children. Even if they might not be able to get out of the neighborhood, they try to make the house as beautiful as they can. They had a yard filled with flowers and decorations leading up to the door. The special part that I felt right away was that they all came together as neighbors once a week to have a “special” meal with everyone. The challenges that most of them faced would be that they did not have a car at all or one that did not work very well. It is fine to take the bus but the bus does not run 24/7 plus if one is...

Words: 731 - Pages: 3

Premium Essay

None

...A place misunderstood The place that I will be writing about today is Idaho City because there is a lot of talk about how negative this town really is. I lived in Idaho City for about three years and I like to try to stay in touch with this particular town, even though I didn’t grow up there I still feel as it were my home. I can’t tell you how many times I have heard that all Idaho city is a place of drugs and violence and that a lot of bad, which I feel is a false statement. I think illegal things do accrue in Idaho City, but just because things happen in Idaho City doesn’t mean people should label a whole town for certain people’s actions. If you look at any town there will always be violence and drugs. I know it’s sad but it is part of the world that we live in. So I am going to argue my fact that Idaho City is a great town if you look at the things it has to offer, and not just the things that are negative about Idaho City. If you really look at it Idaho City has been around sinse1867 before I was around and will be here longer than I will live. How can we cast judgment on a town just because of some irresponsible actions of some of its citizens? I think that if you look past some of the bad things that you will see that it is a really beautiful place, and from my point of view the most beautiful place I have ever...

Words: 275 - Pages: 2

Free Essay

Reserch

...Into The Wild Thoreau Quote Essay By: Kayla Hermening “I went to the woods because I wished to live deliberately, to front only the essential facts of life, and see if I could not learn what it had to teach, and not when i came to die, discover that I had lived.” This is one of the many quotes that Chris McCandles lived by. He did exactly what the quote states. He went to live off the land and only have the essentials of life. During the summer when me and my family go Up North and stay at our cabin stranded it the middle of no where, this is exactly how I feel. While living in the society we live in today it’s really hard to get away from technology. The cabin is so far out that we barely get cell phone service and we can’t get the internet. We have cable but i much rather be outside riding the ATV than watching some stupid TV show about teens getting drunk and then knocked up. We don’t even have to use our cars when we are up north because we can drive our ATV right into town. Writers who come up with quotes have a great impact on society today. There are several things that quotes can influence, such as writers. In the song Runaway by Love and Theft, it says “and pack my bags and never look back, run a parallel line with the railroad tracks and make my getaway. This says exactly what Chris did accept Chris didn’t bring much with him when he left. “And from a rearview I got a clear view of who I used to be, a little bit faster don’t wanna turn around....

Words: 406 - Pages: 2

Free Essay

Ubuntu, Humanity to Others

...I decided to write my project on Ubuntu, which is a distro of Linux. Ubuntu |oǒ'boǒntoō|: Ubuntu is an ancient African word meaning 'humanity to others'. It also means 'I am what I am because of who we all are'. The Ubuntu operating system brings the spirit of Ubuntu to the world of computers. (The Ubuntu Story) I chose Ubuntu because I have used it since 2009 and have loved it ever since then. I will be discussing the current distro which is 14.04, the next one will be 15.04 but 14.04 is the current stable version of Ubuntu or also often referred to as LTS or Long Term Support. The history of Ubuntu is quite short or at least 2004 kind of short. Mark Shuttleworth, from South Africa, started a company called Canonical which was created alongside Ubuntu. The purpose was to help it reach a wider market. They help governments and businesses the world over with migrations, management, and support for their Ubuntu deployments. They would work together with their partners, to ensure that Ubuntu runs reliably on every platform from the pc and the smartphone to the server and, crucially, the cloud. (Canonical) Ubuntu is part of a type of software referred to as open source, a development model promotes a universal access via a free license to a product's design or blueprint, and universal redistribution of that design or blueprint, including subsequent improvements to it by anyone. (Open source) The vision of Ubuntu is part social and part economic: free software, available to everybody...

Words: 733 - Pages: 3

Free Essay

Nt 1230 Lab 7

...available for the adapter. After downloading and installing the driver update, you restart the system. The system appears to start normally, except that the graphical interface has been replaced by incomprehensible noise. Because you can’t see the display, you can’t work with the system. What should you do return the computer to an operational state? The new graphic adapter is most likely interfering with current devices. Boot Windows 7 into safe mode, then use generic driver, and remove the driver from Add Remove Programs and/or get cleaner from piriform.com and run that for removal/general Windows 7 cleaning assistance. If you want a generic hardware test also can run a Linux Live CD from your disc drive, enabled as first boot device in BIOS, visit distrowatch.com look for Linux Mint Live CD image to burn and if it gets into Linux and still has the lines on the...

Words: 335 - Pages: 2

Premium Essay

Hitman

...Hitman 2: Silent Assassin README file 19/09/2002 Version 1.0 Part 1: Things You Should Know Please read through the DirectX section of this document. This section has information that is vital to successfully running Hitman 2: Silent Assassin on your system. 1.1 DirectX This game is optimised for Microsoft's DirectX 8.1. In order for you to play the game, you must have DirectX 8.1 compliant drivers for your video card and sound card. Please note that although DirectX 8.1 is installed with the game, your video and sound card drivers will not be upgraded to DirectX 8.1 drivers. You will need to obtain the latest DirectX 8.1 drivers from your card manufacturer or PC supplier. These drivers cannot be supplied by Eidos. 1.2 Memory and Performance While the game will run fine in 128 Mb of RAM, your playing experience will be smoother if you have at least 192 Mb. Regardless of how much memory you have, you can maximize your available memory and increase the overall performance of the game engine by doing the following: q Closing any open windows q Shutting down all other programs, including menu-bar programs like ICQ q Defragmenting your hard drive Eidos recommends that you have no other programs running at all while playing Hitman 2: Silent Assassin. Other programs, including virus checkers, system utilities and screen savers can cause system degradation when playing games software and may conflict with the game for system resources, potentially...

Words: 3112 - Pages: 13

Free Essay

Re: Lesson 06 Discussion Question

...Guide to Computer Forensics and Investigations Fourth Edition Chapter 4 Data Acquisition Objectives • List digital evidence storage formats • Explain ways to determine the best acquisition method • Describe contingency planning for data acquisitions • Explain how to use acquisition tools Guide to Computer Forensics and Investigations 2 Objectives (continued) • Explain how to validate data acquisitions • Describe RAID acquisition methods • Explain how to use remote network acquisition tools • List other forensic tools available for data acquisitions Guide to Computer Forensics and Investigations 3 Understanding Storage Formats for Digital Evidence • Three formats – Raw format – Proprietary formats – Advanced Forensics Format (AFF) Guide to Computer Forensics and Investigations 4 Raw Format • Makes it possible to write bit-stream data to files • Advantages – Fast data transfers – Can ignore minor data read errors on source drive – Most computer forensics tools can read raw format • Disadvantages – Requires as much storage as original disk or data – Tools might not collect marginal (bad) sectors Guide to Computer Forensics and Investigations 5 Proprietary Formats • Features offered – Option to compress or not compress image files – Can split an image into smaller segmented files – Can integrate metadata into the image file • Disadvantages – Inability to share an image between different tools – File size limitation for each...

Words: 2803 - Pages: 12

Premium Essay

Essay: the Bad Seed

...The world itself is full of people and the secrets hidden within. A prime example of this are from books like The Bad Seed by William March and We Have Always Lived in the Castle by Shirley Jackson. These two novels both contain characters with many secrets, many dark secrets that cause them to hide and live away from society. In a sense, these characters live in “secret worlds”. Starting off with The Bad Seed, Rhoda, the main character who is responsible for violent crimes and her mother Christine who is the “guardian angel” that’s responsible for keeping Rhoda out of trouble. Just like Rhoda, the character Merricat from We Have Always Lived in the Castle is the one causing the trouble and her sister Constance is the protector. The dark secrets of both Rhoda and Merricat involving murder provide reasons as to why they separate themselves from society, why this secrecy leads them to perversity and violence and why the emotions felt within encourage this life of secrecy. Both characters live in a world where they have a difficult time adapting to society and life problems. As a result, they do what they feel is needed even if it involves performing murderous actions. The secrecy deep within the characters lead to violence and is probably due to the fact that they don’t have the support that they need. For instance in Rhoda’s situation, her father Kenneth leaves at the beginning of the novel and heads out on a business trip. This leaves her to mainly rely on her mother Christine...

Words: 870 - Pages: 4