⚡ What is Routing Protocol?

Let us try to understand this with an example-

Suppose you want to go to your home from college. You book a cab or take a bus to your home. In the path of your journey, you encounter several sign boards which help you take proper or best path, or in case of a cab, Google Maps will help you in choosing the best route.

In this analogy, consider yourself as the DATA, the bus or cab as the ROUTED PROTOCOL and the…

Task Description 📄


🔅 Launch node in AWS
🔅 Launch node in Azure
🔅 Launch node in GCP
🔅 One node on cloud should be Master Node
🔅 Then setup multi node Kubernetes cluster.

So to do this task, I have created three nodes :

Master node on AWS, Slave nodes on AWS, Azure and GCP.

Let’s start :

First : Setting up Kubernetes master on AWS :

Object Recognition using CNN model

Task Description 📄

📌 In this task :

👉Create a model that will detect a car in a live stream or video and recognize characters on number plate of the car .

👉Secondly , it will use the characters and fetch the owners information using RTO API’s .

👉Create a Web portal where all this information will be displayed (using HTML, CSS, and JS)

📌 Note : You may create your own detection model .

The code to find the car number plate i.e., at first read the image, then make it gray, then detecting…

What is JavaScript ?

JavaScript often abbreviated as JS, is a programming language which is high-level, often just-in-time compiled, and multi-paradigm. It has curly-bracket syntax, dynamic typing, prototype-based object-orientation, and first-class functions.

Alongside HTML and CSS, JavaScript is one of the core technologies of the World Wide Web. Over 97% of websites use it client-side for web page behavior, often incorporating third-party libraries. All major web browsers have a dedicated JavaScript engine to execute the code on the user’s device.

As a multi-paradigm language, JavaScript supports event-driven, functional, and imperative programming styles. …

👉 What is CYBERCRIME ?

Cybercrime, or computer crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone’s security and financial health.

Common forms of cybercrime include:

  • phishing: using fake email messages to get personal information from internet users
  • misusing personal information (identity theft)
  • hacking: shutting down or misusing websites or computer networks
  • spreading hate and inciting terrorism
  • distributing child pornography

👉 What is a Confusion Matrix ?

A Confusion matrix is the comparison summary of the predicted results and the actual results in any classification problem use case…

✨ What is Database ?

A database is an organized collection of data, generally stored and accessed electronically from a computer system. Where databases are more complex they are often developed using formal design and modeling techniques.

✨ What is NoSQL ?

NoSQL can be defined as an approach to database designing, which holds a vast diversity of data such as key-value, multimedia, document, columnar, graph formats, external files, etc. NoSQL is purposefully developed for handling specific data models having flexible schemas to build modern applications. Some famous examples are MongoDB, Neo4J, HyperGraphDB, etc.

Vrukshali Torawane

Arth Learner - LinuxWorld Informatics Pvt Ltd

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store