Friday, 22 December 2023

Python Coding challenge - Day 97 | What is the output of the following Python Code?

 


Code :

msg = 'clcoding'

ch = print(msg[-0])

Solution and Explananation: 

msg = 'clcoding': This line creates a variable named msg and assigns it the string value 'clcoding'. In Python, a string is a sequence of characters.

ch = msg[0]: This line creates another variable named ch and assigns it the value of the first character of the string stored in the variable msg. In Python, indexing starts from 0, so msg[0] refers to the first character of the string.

The string 'clcoding' has the following characters at each index:

index:  0  1  2  3  4  5  6  7
value: 'c' 'l' 'c' 'o' 'd' 'i' 'n' 'g'
Therefore, msg[0] is 'c', and this value is assigned to the variable ch.

print(ch): This line uses the print function to display the value of the variable ch to the console. In this case, it will print the character 'c'.

So, when you run this code, the output will be:

c


check your knowledge of numpy in python

a. Numpy library gets installed when we install Python.

Answer

False

b. Numpy arrays work faster than lists.

Answer

True

c. Numpy array elements can be of different types.

Answer

False

d. Once created, a Numpy arrays size and shape can be changed

dynamically.

Answer

True

e. np.array_equal(a, b)) would return True if shape and elements of a and

b match.

Answer

True


Python Coding challenge - Day 96 | What is the output of the following Python Code?

 


The % operator in Python is the modulo operator, which returns the remainder of the division of the left operand by the right operand. In the expression 3 % -2, the remainder of the division of 3 by -2 is calculated. The result is -1, because when 3 is divided by -2, the quotient is -2 with a remainder of -1. Therefore, print(3 % -2) will output -1.

Thursday, 21 December 2023

Merry Christmas Tree using Python

 



Free Code :

import numpy as np 

x = np.arange(7,16) 

y = np.arange(1,18,2) 

z = np.column_stack((x[:: -1],y)) 

for i,j in z: 

    print(' '*i+'*'*j) 

for r in range(3): 

    print(' '*13, ' || ') 

print(' '*12, end = '\======/') 

print('')


#clcoding.com




print(True not True)

Code :

print(True not True)

Output:

False

Explanation:

True not True: This expression involves two boolean values (True and True) and the boolean operator not.

not operator: The not operator inverts the truth value of a boolean expression. It means "the opposite of" or "the negation of".

Evaluation:

True is a boolean value representing truth.

not True means "the opposite of True", which is False.

print(False): The print() function outputs the value False to the console.

Therefore, the code prints False because the expression True not True evaluates to False due to the negation of the boolean value True by the not operator.

x = 5 y = 15 z = x != y print(z)

 In the given Python code:

x = 5

y = 15

z = x != y  

print(z)

Here's what each line does:

x = 5: Assigns the value 5 to the variable x.

y = 15: Assigns the value 15 to the variable y.

z = x != y: Checks if the value of x is not equal to the value of y and assigns the result to the variable z. In this case, x (which is 5) is not equal to y (which is 15), so z will be True.

print(z): Prints the value of z, which is the result of the inequality check. In this example, it will print True.

So, the output of this code will be:

True






Wednesday, 20 December 2023

Python Coding challenge - Day 95 | What is the output of the following Python Code?

 


Code :

msg = 'clcoding'

s = list(msg[:4])[::-1]

print(s)


Solution and Explanation: 

Answer : ['o', 'c', 'l', 'c']

The above code creates a string msg and then manipulates it to print a specific result. Here's an explanation of each step:

msg = 'clcoding': This line defines a variable named msg and assigns the string "clcoding" to it.

s = list(msg[:4])[::-1]: This line does several things at once:

list(msg[:4]): This part takes the first 4 characters of the msg string ("clco") and converts them into a list of individual characters.

[::-1]: This operator reverses the order of the elements in the list. So, our list becomes ["o", "c", "l", "c"].

print(s): This line simply prints the contents of the s list, which is now reversed: ['o', 'c', 'l', 'c'].

Therefore, the code extracts the first 4 characters from the string "clcoding," reverses their order, and then prints the resulting list.

Here are some additional details to keep in mind:

The [:] notation after msg in step 2 is called slicing. It allows us to extract a specific subsequence of characters from a string. In this case, [:4] specifies the range from the beginning of the string (index 0) to the 4th character (index 3, not inclusive).

The [::-1] operator is called an extended slice with a step of -1. This reverses the order of the elements in the list.

Programming in Python

 




What you'll learn

Foundational programming skills with basic Python Syntax.

How to use objects, classes and methods.

Join Free:Programming in Python

There are 5 modules in this course

In this course, you will be introduced to foundational programming skills with basic Python Syntax. You’ll learn how to use code to solve problems. You’ll dive deep into the Python ecosystem and learn popular modules, libraries and tools for Python. 

You’ll also get hands-on with objects, classes and methods in Python, and utilize variables, data types, control flow and loops, functions and data structures. You’ll learn how to recognize and handle errors and you’ll write unit tests for your Python code and practice test-driven development.

By the end of this course, you will be able to:

Prepare your computer system for Python programming
Show understanding of Python syntax and how to control the flow of code
Demonstrate knowledge of how to handle errors and exceptions
Explain object-oriented programming and the major concepts associated with it
Explain the importance of testing in Python, and when to apply particular methods

This is a beginner course for learners who would like to prepare themselves for a career in back-end development or database engineering. To succeed in this course, you do not need prior web development experience, only basic internet navigation skills and an eagerness to get started with coding.

Introduction to Web Development

 


There are 6 modules in this course

This course is designed to start you on a path toward future studies in web development and design, no matter how little experience or technical knowledge you currently have. The web is a very big place, and if you are the typical internet user, you probably visit several websites every day, whether for business, entertainment or education. But have you ever wondered how these websites actually work? How are they built? How do browsers, computers, and mobile devices interact with the web? What skills are necessary to build a website? With almost 1 billion websites now on the internet, the answers to these questions could be your first step toward a better understanding of the internet and developing a new set of internet skills.  

Join Free:Introduction to Web Development

By the end of this course you’ll be able to describe the structure and functionality of the world wide web, create dynamic web pages using a combination of HTML, CSS, and JavaScript, apply essential programming language concepts when creating HTML forms, select an appropriate web hosting service, and publish your webpages for the world to see. Finally, you’ll be able to develop a working model for creating your own personal or business websites in the future and be fully prepared to take the next step in a more advanced web development or design course or specialization.

Technical Support Fundamentals

 


Build your Support and Operations expertise

This course is part of the Google IT Support Professional Certificate

When you enroll in this course, you'll also be enrolled in this Professional Certificate.

Learn new concepts from industry experts

Gain a foundational understanding of a subject or tool

Develop job-relevant skills with hands-on projects

Earn a shareable career certificate from Google

Join Free:Technical Support Fundamentals

There are 6 modules in this course

This course is the first of a series that aims to prepare you for a role as an entry-level IT Support Specialist. In this course, you’ll be introduced to the world of Information Technology, or IT. You’ll learn about the different facets of Information Technology, like computer hardware, the Internet, computer software, troubleshooting, and customer service. This course covers a wide variety of topics in IT that are designed to give you an overview of what’s to come in this certificate program.

By the end of this course, you’ll be able to:

● understand how the binary system works
● assemble a computer from scratch
● choose and install an operating system on a computer
● understand what the Internet is, how it works, and the impact it has in the modern world
● learn how applications are created and how they work under the hood of a computer
● utilize common problem-solving methodologies and soft skills in an Information Technology setting


Programming with JavaScript

 


What you'll learn

Creating simple JavaScript codes.

Creating and manipulating objects and arrays.

Writing unit tests using Jest 

Join Free:Programming with JavaScript

There are 5 modules in this course

JavaScript is the programming language that powers the modern web. In this course, you will learn the basic concepts of web development with JavaScript. You will work with functions, objects, arrays, variables, data types, the HTML DOM, and much more. You will learn how to use JavaScript and discover interactive possibilities with modern JavaScript technologies. Finally, you will learn about the practice of testing code and how to write a unit test using Jest.

Introduction to Web Development with HTML, CSS, JavaScript

 


What you'll learn

Describe the Web Application Development Ecosystem and terminology like front-end developer, back-end, server-side, and full stack.

Identify the developer tools and integrated development environments (IDEs) used by web developers. 

Create and structure basic web pages using HTML and style them with CSS. 

Develop dynamic web pages with interactive features using JavaScript.

Join Free:Introduction to Web Development with HTML, CSS, JavaScript

There are 5 modules in this course

Want to take the first steps to become a Web Developer? This course will help you discover the languages, frameworks, and tools that you will need to create interactive and engaging websites right from the beginning.  

You will begin by learning about the roles of front-end, back-end, and full-stack developers and how they work together on development projects. Through this, you will also become familiar with the terminology and skills needed in your career as a web developer.  

Next, you will explore the languages needed for developing websites or applications. You will gain a thorough understanding of HTML and CSS and learn how a combination of both technologies can help developers create the structure and style of their websites.  

Finally, you will learn how JavaScript can make your webpages dynamic with features that include interactive forms, dynamic content modification, and sophisticated menu systems. 

By learning the fundamentals of HTML5, CSS, and JavaScript you will be able to combine them to:  

- create the basic structure of a website  
- create format and layout for web applications 
- enhance your website and create rich, interactive applications 
- increase user interactivity and enhance user experience 
- give your website a real wow factor! 

In this course you will practice what you learn with numerous hands-on labs. Lastly, you will complete a final project where you will create a webpage to showcase your skills and have a great addition to your portfolio!

Tuesday, 19 December 2023

Python Coding challenge - Day 94 | What is the output of the following Python Code?

 


The provided Python code is a simple loop that iterates over a range of numbers and prints the result of a mathematical expression for each iteration. Here's a breakdown of what the code does:

for i in range(4):

    print(0.1 + i * 0.25)

Explanation:

for i in range(4):: This line sets up a loop that iterates over the numbers 0, 1, 2, and 3. The variable i takes on each of these values during each iteration.

print(0.1 + i * 0.25): Inside the loop, this line calculates a value using the current value of i and prints the result. The expression 0.1 + i * 0.25 is evaluated for each iteration. The value of i is multiplied by 0.25, and then 0.1 is added to the result. The final result is printed to the console.


Output:

The output of the code will be as follows:

0.1

0.35

0.6

0.85

This is because for each iteration, i takes on the values 0, 1, 2, and 3, and the corresponding calculations result in the printed values.

Monday, 18 December 2023

Introduction to Cybersecurity Foundations

 


What you'll learn

What Cybersecurity is

What an Operating System is  

What Risk Management is  

Join Free:Introduction to Cybersecurity Foundations

There are 4 modules in this course

Most introductory or beginner level cybersecurity courses are not truly beginner level. Most of them assume some level of technical competence and expect that cybersecurity is not your first technical job role. However, as I've successfully mentored people coming from fields such as nursing, aviation (an airline pilot!), and real estate, I've learned that these people are underserved as far a true introduction. This Learning Path is an answer to that gap.


Introduction to Cybersecurity Essentials

 


What you'll learn

Recognize the importance of data security, maintaining data integrity, and confidentiality

Demonstrate the installation of software updates and patches

Identify preferred practices for authentication, encryption, and device security

Discuss types of security threats, breaches, malware, social engineering, and other attack vectors

Join Free:Introduction to Cybersecurity Essentials

There are 4 modules in this course

With this beginner friendly course, learn fundamental Cybersecurity skills that are crucial for anyone using computing devices and connecting to the Internet.  

You will first learn to recognize common security threats and risks that individuals and organizations may face, such as theft, tampering, and destruction of sensitive information. You’ll then discover the characteristics of cyber-attacks and learn how you can employ best practices to guard against them.  

Next, you’ll learn about the best practices against cyberattacks. These include using strong passwords, good password management, and multi-factor authentication. You’ll learn ways in which you can strengthen your security plan with techniques like device hardening, encryption and more. 

You’ll then learn about safe browsing practices. You’ll gain an understanding of why you must practice safe browsing; to protect yourself against hackers, phishing, identity theft, security leaks, privacy issues and more. You’ll also explore methods for securing and managing confidential information. Then, discover how to configure browsers to help reduce security breaches. 

Throughout this course you will complete many hands-on labs which will enhance your understanding of course material. At the end of this course, you will have the opportunity to complete a final project where you will demonstrate your proficiency in cybersecurity. 

Designed specifically for beginners and those who are interested in a Cybersecurity Specialist or Analyst roles as well as entry-level roles in Information Security (Infosec) engineering. This course dives into the world of cybersecurity to give you the critical skills employers need. It also supports the needs of technical and IT support roles, who can find themselves on the front lines of defense for cybersecurity issues.

CompTIA a+_ cyber Specialization

 


What you'll learn

Understand and perform basic security tasks for Windows computers and home networks

Recognize the procedures and tools used in cybersecurity to protect enterprise networks

Describe the tools used for managing Linux computers and creating automation scripts

Join Free:CompTIA a+_ cyber Specialization

Specialization - 3 course series

Embark on an exciting journey into the world of cybersecurity with this comprehensive specialization. Designed for beginners, this cybersecurity specialization provides an introduction to cybersecurity, including basic knowledge and key skills needed to confidently start training for CompTIA Security+ certification.                   

In today's digital age, cybersecurity professionals are in high demand and are one of the highest-paying IT career paths. Job opportunities in this fast-growing sector seek applicants with technical skills, analytical thinking and creative problem-solving qualifications.

Through this specialization, you'll learn from cybersecurity experts and industry insiders about the day-to-day tasks and challenges you can expect in this role. You'll gain insights into how to protect a company's valuable information from theft and damage, ensuring that computers and networks store and process data according to the organization’s rules.   

Moreover, you'll acquire practical computer and network administration skills, preparing you to confidently begin a complete cybersecurity training program. This is your first step to becoming a key player in the cybersecurity field.  

Don't miss this opportunity to kickstart your career in cybersecurity. Enroll in this specialization today and take the first step towards a promising future in information security.

Applied Learning Project

In this cybersecurity specialization, you'll engage in practical activities that serve as a steppingstone to meet the pre-requisites for Security+ training. You'll gain hands-on experience in securing Windows and Linux systems, networking and scripting. You'll be able to test your knowledge through multiple-choice practice questions with extensive feedback. Additionally, you'll have access to informative videos and interviews with seasoned industry professionals, providing real-world context and insights into how these skills are applied in the cybersecurity field. This course is designed with accessibility in mind, meeting WCAG 2.0 AA compliance, including keyboard navigation, alt-tags for images, captions for videos, screen reader compatibility and adherence to color contrast guidelines.  

Python for Cybersecurity Specialization

 


What you'll learn

Develop custom Python scripts to automate cybersecurity tasks.

Apply Python to meet objectives through the cybersecurity attack lifecycle.

Automate common cyberattack and defense activities with Python.

Join Free:Python for Cybersecurity Specialization

Specialization - 5 course series

 Python is one of the most popular and widely-used programming languages in the world due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using Python for cybersecurity. Python can help to automate tasks across the cyberattack life cycle for both cyber attackers and defenders. This Specialization demonstrates some of these applications and how Python can be used to make cybersecurity professionals more efficient and effective.    

Applied Learning Project

Learners will acquire the technical skills needs to develop custom Python scripts to automate cybersecurity tasks. The challenges in this project involve developing or modifying Python code to address cybersecurity use cases drawn from MITRE ATT&CK and Shield.

Cyber Security Fundamentals

 


Join Free:Cyber Security Fundamentals

There are 3 modules in this course

This course is intended to provide a general introduction to key concepts in cyber security. It is aimed at anyone with a good general knowledge of information and communications technology. The nature, scope and importance of cyber security are explained, and key concepts are justified and explored. This includes examining the types of threat that cyber security must address, as well as the range of mechanisms, both technological and procedural, that can be deployed.

The role of cryptography in providing security is explored, including how algorithms and keys play their part in enabling cyber security. The key supporting function played by key management is identified, including why the use of cryptographic functions depends on it.

The need for security management in an organisation is explained, and its main elements are introduced - including the key role played by risk management. The importance of standardised approaches to security management is explained, as is the notion of compliance.

Sunday, 17 December 2023

IT Fundamentals for Cybersecurity Specialization

 


Advance your subject-matter expertise

Learn in-demand skills from university and industry experts

Master a subject or tool with hands-on projects

Develop a deep understanding of key concepts

Earn a career certificate from IBM

Join Free:IT Fundamentals for Cybersecurity Specialization

Specialization - 4 course series

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree.  Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. 

Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration,  operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics.  

The instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective.  They will share their skills which they need to secure IBM and its clients security systems.

The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. 

Applied Learning Project

This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics.

This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems.

Learners will apply the skills they acquire to complete assessment exams as well as a project at the end of the four courses within this specialization.

Certified in Cybersecurity Specialization

 


What you'll learn

Demonstrate that you have foundational knowledge of industry terminology, network security, security operations and policies and procedures.

Join Free:Certified in Cybersecurity Specialization

Specialization - 5 course series

Congratulations on your interest in pursuing a career in cybersecurity. The Certified in Cybersecurity (CC) certification will demonstrate to employers that you have foundational knowledge of industry terminology, network security, security operations and policies and procedures that are necessary for an entry- or junior-level cybersecurity role. It will signal your understanding of fundamental security best practices, policies and procedures, as well as your willingness and ability to learn more and grow on the job.

Applied Learning Project

Each course includes a case study that will require students to put into practice the knowledge they have gained throughout each course. Successful completion of course projects will require the basic understanding of the topics covered and the ability to relate those topics to the real world. The objective of each project is to determine whether students have understood course concepts and are able to use them in a real world setting. 

Microsoft Cybersecurity Analyst Professional Certificate

 


What you'll learn

Understand the cybersecurity landscape and learn core concepts foundational to security, compliance, and identity solutions.

Understand the vulnerabilities of an organizations network and mitigate attacks on network infrastructures to protect data.

Develop and implement threat mitigation strategies by applying effective cybersecurity measures within an Azure environment.   

Demonstrate your new skills with a capstone project and prepare for the industry-recognized Microsoft SC-900 Certification exam. 

Join Free:Microsoft Cybersecurity Analys Professional Certificate

Professional Certificate - 9 course series

Learners who complete this program will receive a 50% discount voucher to take the SC-900 Certification Exam. 

Organizations rely on cybersecurity experts to protect themselves from threats, but nearly 60% report security talent shortages.1 Prepare for a new career in this high-demand field with professional training from Microsoft — an industry-recognized leader in cybersecurity.

The role of a cybersecurity analyst includes monitoring networks for vulnerabilities or potential threats, mitigating attacks on the network infrastructures, and implementing strategies for data protection. With 95% of fortune 500 companies using Azure, it’s critical for cybersecurity professionals to learn to protect data within an Azure environment.2

Through a mix of videos, assessments, and hands-on activities, you’ll learn cybersecurity concepts and how they apply to a business environment, discuss threat mitigation strategies from an enterprise perspective, apply effective cybersecurity policy measures within an Azure environment, & practice on tools like MS defender, Azure Active Directory & more.

When you graduate, you’ll have tangible examples to talk about in job interviews and you’ll also be prepared to take the Microsoft SC-900 Certification Exam.

1McKinsey & Company, Securing your organization to reduce cyber risk (June 2022)

2Microsoft Azure, Microsoft Azure:The only consistent, comprehensive hybrid cloud (Sept 2018)

Applied Learning Project

This program has been uniquely mapped to key job skills required in cybersecurity analyst roles. In each course, you’ll be able to consolidate what you have learned by completing a capstone project that simulates real-world cybersecurity scenarios. You’ll also complete a final capstone project where you’ll create your own cybersecurity proposal for the creation and protection of a business network and infrastructure. The projects will include practicing on:

A real-world scenario focused on penetration testing, building configuration, and testing strategy for white box testing of a penetration test on virtual networks.

A real-world capstone project that enables you to demonstrate your cybersecurity analyst skills. 

To round off your learning, you’ll take a mock exam that has been set up in a similar style to the industry-recognized Microsoft Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals. 

Google IT Support Professional Certificate

 


What you'll learn

Gain skills required to succeed in an entry-level IT job

Learn to perform day-to-day IT support tasks including computer assembly, wireless networking, installing programs, and customer service

Learn how to provide end-to-end customer support, ranging from identifying problems to troubleshooting and debugging

Learn to use systems including Linux, Domain Name Systems, Command-Line Interface, and Binary Code

Join Free:Google IT Support Professional Certificate

Prepare for a career in IT Support

Receive professional-level training from Google
Demonstrate your proficiency in portfolio-ready projects
Earn an employer-recognized certificate from Google
Qualify for in-demand job titles: IT Specialist, Tech Support Specialist, IT Support Specialist

Introduction to Cybersecurity Tools & Cyber Attacks

 


What you'll learn

Discuss the evolution of security based on historical events.  

List various types of malicious software.  

Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.  

Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.   

Join Free: Introduction to Cybersecurity Tools & Cyber Attacks

There are 4 modules in this course

This course gives you the background needed to understand basic Cybersecurity.  You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals.  Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field.

You will learn about critical thinking and its importance to anyone looking to pursue a career in Cybersecurity.

Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.

This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the first course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.

The completion of this course also makes you eligible to earn the Introduction to Cybersecurity Tools & Cyber Attacks IBM digital badge. 

Python for Data Analysis: Pandas & NumPy

 


What you'll learn

Understand python programming fundamentals for data analysis

Define single and multi-dimensional NumPy arrays

Import HTML data in Pandas DataFrames

Join Free : Python for Data Analysis: Pandas & NumPy

About this Guided Project

In this hands-on project, we will understand the fundamentals of data analysis in Python and we will leverage the power of two important python libraries known as Numpy and pandas. NumPy and Pandas are two of the most widely used python libraries in data science. They offer high-performance, easy to use structures and data analysis tools. 

Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.

Data Science with NumPy, Sets, and Dictionaries

 


There are 4 modules in this course

Become proficient in NumPy, a fundamental Python package crucial for careers in data science. This comprehensive course is tailored to novice programmers aspiring to become data scientists, software developers, data analysts, machine learning engineers, data engineers, or database administrators.

Starting with foundational computer science concepts, such as object-oriented programming and data organization using sets and dictionaries, you'll progress to more intricate data structures like arrays, vectors, and matrices. Hands-on practice with NumPy will equip you with essential skills to tackle big data challenges and solve data problems effectively. You'll write Python programs to manipulate and filter data, as well as create useful insights out of large datasets.

By the end of the course, you'll be adept at summarizing datasets, such as calculating averages, minimums, and maximums. Additionally, you'll gain advanced skills in optimizing data analysis with vectorization and randomizing data.

Throughout your learning journey, you'll use many kinds of data structures and analytic techniques for a variety of data science challenges , including mathematical operations, text file analysis, and image processing. Stepwise, guided assignments each week will reinforce your skills, enabling you to solve problems and draw data-driven conclusions independently.

Prepare yourself for a rewarding career in data science by mastering NumPy and honing your programming prowess. Start this transformative learning experience today!


Join Free : Data Science with NumPy, Sets, and Dictionaries



Python and Pandas for Data Engineering

 


What you'll learn

Setup a provisioned Python project environment

Use Pandas libraries to read and write data into data structures and files

Employ Vim and Visual Studio Code to write Python code

Join Free : Python and Pandas for Data Engineering

There are 4 modules in this course

In this first course of the Python, Bash and SQL Essentials for Data Engineering Specialization, you will learn how to set up a version-controlled Python working environment which can utilize third party libraries. You will learn to use Python and the powerful Pandas library for data analysis and manipulation. Additionally, you will also be introduced to Vim and Visual Studio Code, two popular tools for writing software. This course is valuable for beginning and intermediate students in order to begin transforming and manipulating data as a data engineer.

Data Engineering, Big Data, and Machine Learning on GCP Specialization

 


Advance your subject-matter expertise

Learn in-demand skills from university and industry experts

Master a subject or tool with hands-on projects

Develop a deep understanding of key concepts

Earn a career certificate from Google Cloud

Join Free:Data Engineering, Big Data, and Machine Learning on GCP Specialization

Specialization - 5 course series

87% of Google Cloud certified users feel more confident in their cloud skills. This program provides the skills you need to advance your career and provides training to support your preparation for the industry-recognized 
Google Cloud Professional Data Engineer
 certification.

Here's what you have to do

1) Complete the Coursera Data Engineering Professional Certificate

2) Review other recommended resources for the 
Google Cloud Professional Data Engineer certification
 exam

3) Review the 
Professional Data Engineer exam guide

4) Complete 
Professional Data Engineer 

5) Register
 for the Google Cloud certification exam (remotely or at a test center)

Applied Learning Project

This professional certificate incorporates hands-on labs using Qwiklabs platform.These hands on components will let you apply the skills you learn. Projects incorporate Google Cloud products used within Qwiklabs. You will gain practical hands-on experience with the concepts explained throughout the modules.

Applied Learning Project

 This Specialization incorporates hands-on labs using our Qwiklabs platform.

These hands on components will let you apply the skills you learn in the video lectures. Projects will incorporate topics such as BigQuery, which are used and configured within Qwiklabs. You can expect to gain practical hands-on experience with the concepts explained throughout the modules.

Connect and Protect: Networks and Network Security

 


What you'll learn

Define the types of networks and components of networks

Illustrate how data is sent and received over a network

Understand how to secure a network against intrusion tactics

Join Free:Connect and Protect: Networks and Network Security

There are 4 modules in this course

This is the third course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the second Google Cybersecurity Certificate course.

In this course, you will explore how networks connect multiple devices and allow them to communicate. You'll start with the fundamentals of modern networking operations and protocols. For example, you'll learn about the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow your computer to send and receive information on the internet. Then, you'll learn about network security. Organizations often store and send valuable information on their networks, so networks are common targets of cyber attacks. By the end of this course, you'll be able to recognize network-level vulnerabilities, and explain how to secure a network using firewalls, system hardening, and virtual private networks. 

Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. 

Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.

By the end of this course, you will: 

- Describe the structure of different computer networks.
- Illustrate how data is sent and received over a network.
- Recognize common network protocols.
- Identify common network security measures and protocols.
- Explain how to secure a network against intrusion tactics.
- Compare and contrast local networks to cloud computing.
- Explain the different types of system hardening techniques.

Play It Safe: Manage Security Risks

 


What you'll learn

Identify the primary threats, risks, and vulnerabilities to business operations

Examine how organizations use security frameworks and controls to protect business operations

Define commonly used Security Information and Event Management (SIEM) tools

Use a playbook to respond to threats, risks, and vulnerabilities

Join Free:Play It Safe: Manage Security Risks

There are 4 modules in this course

This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course.

In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit.

Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. 

Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.

By the end of this course, you will: 

- Identify the common threats, risks, and vulnerabilities to business operations.
- Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on.
- Comprehend the purpose of security frameworks and controls.
- Describe the confidentiality, integrity, and availability (CIA) triad.
- Explain the National Institute of Standards and Technology (NIST) framework.
- Explore and practice conducting a security audit.
- Use a playbook to respond to threats, risks, and vulnerabilities.

Generative AI Fundamentals Specialization


What you'll learn

Explain the fundamental concepts, capabilities, models, tools, applications, and platforms of generative AI foundation models.

Apply powerful prompt engineering techniques to write effective prompts and generate desired outcomes from AI models.

Discuss the limitations of generative AI and explain the ethical concerns and considerations for the responsible use of generative AI.

Recognize the ability of generative AI to enhance your career and help implement improvements at your workplace.

Join Free: Generative AI Fundamentals Specialization

Specialization - 5 course series

Generative AI is revolutionizing our lives.

This specialization provides a comprehensive understanding of the fundamental concepts, models, tools, and applications of generative AI to enable you to leverage the potential of generative AI toward a better workplace, career, and life.

The specialization consists of five short, self-paced courses, each requiring 3–5 hours to complete.

Understand powerful prompt engineering techniques and learn how to write effective prompts to produce desired outcomes using generative AI tools.

Learn about the building blocks and foundation models of generative AI, such as the GPT, DALL-E, and IBM Granite models. Gain an understanding of the ethical implications, considerations, and issues of generative AI.

Listen to experts share insights and tips for being successful with generative AI. Learn to leverage Generative AI to boost your career and become more productive.

Practice what you learn using hands-on labs and projects, which are suitable for everyone and can be completed using a web browser. These labs will give you an opportunity to explore the use cases of generative AI through popular tools and platforms like IBM watsonx.ai, OpenAI ChatGPT, Stable Diffusion, and Hugging Face.

This specialization is for anyone passionate about discovering the power of generative AI and requires no prior technical knowledge or a background in AI. It will benefit professionals from all walks of life.

Applied Learning Project

Throughout this specialization, you will complete hands-on labs and projects to help you gain practical experience with text, image, and code generation, prompt engineering tools, foundation models, AI applications, and IBM watsonx.ai.

Some examples of the labs included are:

Text generation using ChatGPT and Bard

Image generation using GPT and Stable Diffusion

Code generation in action

Getting to know prompting tools

Experimenting with prompts

Different approaches in prompt engineering

Generative AI foundation models

Exploring IBM watsonx.ai and Hugging Face

 

Generative AI for Everyone

 


What you'll learn

What generative AI is and how it works, its common use cases, and what this technology can and cannot do.

How to think through the lifecycle of a generative AI project, from conception to launch, including how to build effective prompts.

The potential opportunities and risks that generative AI technologies present to individuals, businesses, and society.

Join Free: Generative AI for Everyone

There are 3 modules in this course

Instructed by AI pioneer Andrew Ng, Generative AI for Everyone offers his unique perspective on empowering you and your work with generative AI. Andrew will guide you through how generative AI works and what it can (and can’t) do. It includes hands-on exercises where you'll learn to use generative AI to help in day-to-day work and receive tips on effective prompt engineering, as well as learning how to go beyond prompting for more advanced uses of AI.

You’ll get insights into what generative AI can do, its potential, and its limitations. You’ll delve into real-world applications and learn common use cases. You’ll get hands-on time with generative AI projects to put your knowledge into action and gain insight into its impact on both business and society. 

This course was created to ensure everyone can be a participant in our AI-powered future.

Algorithms for Decision Making (Free PDF)

 


A broad introduction to algorithms for decision making under uncertainty, introducing the underlying mathematical problem formulations and the algorithms for solving them.

Automated decision-making systems or decision-support systems—used in applications that range from aircraft collision avoidance to breast cancer screening—must be designed to account for various sources of uncertainty while carefully balancing multiple objectives. This textbook provides a broad introduction to algorithms for decision making under uncertainty, covering the underlying mathematical problem formulations and the algorithms for solving them.

The book first addresses the problem of reasoning about uncertainty and objectives in simple decisions at a single point in time, and then turns to sequential decision problems in stochastic environments where the outcomes of our actions are uncertain. It goes on to address model uncertainty, when we do not start with a known model and must learn how to act through interaction with the environment; state uncertainty, in which we do not know the current state of the environment due to imperfect perceptual information; and decision contexts involving multiple agents. The book focuses primarily on planning and reinforcement learning, although some of the techniques presented draw on elements of supervised learning and optimization. Algorithms are implemented in the Julia programming language. Figures, examples, and exercises convey the intuition behind the various approaches presented.

Buy : Algorithms for Decision Making by Mykel J. Kochenderfer (Author), Tim A. Wheeler (Author), Kyle H. Wray (Author)


PDF Download : Algorithms for Decision Making



Saturday, 16 December 2023

Computer Graphics [CGR]

 Basic Concepts:

a. Define computer graphics and explain its significance.

b. Differentiate between raster and vector graphics.


Graphics Primitives:

a. Discuss the difference between points, lines, and polygons as graphics primitives.

b. Explain the concept of anti-aliasing in the context of computer graphics.


2D Transformations:

a. Describe the translation, rotation, and scaling transformations in 2D graphics.

b. Provide examples of homogeneous coordinates in 2D transformations.


Clipping and Windowing:

a. Explain the need for clipping in computer graphics.

b. Discuss the Cohen-Sutherland line-clipping algorithm.


3D Transformations:

a. Describe the translation, rotation, and scaling transformations in 3D graphics.

b. Explain the concept of perspective projection.


Hidden Surface Removal:

a. Discuss the challenges of hidden surface removal in 3D graphics.

b. Explain the Z-buffer algorithm.


Color Models:

a. Describe the RGB and CMY color models.

b. Explain the concept of color depth.


Rasterization:

a. Discuss the process of scan conversion in computer graphics.

b. Explain the Bresenham's line-drawing algorithm.


Computer Animation:

a. Define keyframes and in-betweening in computer animation.

b. Discuss the principles of skeletal animation.


Ray Tracing:

a. Explain the concept of ray tracing in computer graphics.

b. Discuss the advantages and disadvantages of ray tracing.


OpenGL:

a. Describe the OpenGL graphics pipeline.

b. Explain the purpose of the Model-View-Projection (MVP) matrix in OpenGL.


Virtual Reality (VR):

a. Define virtual reality and its applications in computer graphics.

b. Discuss the challenges of achieving realism in virtual reality.

Digital Techniques [DTE]

 Number Systems:

a. Convert the binary number 101010 to its decimal equivalent.

b. Explain the concept of two's complement in binary representation.


Logic Gates:

a. Implement the XOR gate using only NAND gates.

b. Explain the truth table for a half adder circuit.


Combinational Circuits:

a. Design a 4-to-1 multiplexer using basic logic gates.

b. Implement a full subtractor circuit.


Sequential Circuits:

a. Describe the operation of a D flip-flop.

b. Design a 3-bit binary counter using JK flip-flops.


Registers and Counters:

a. Explain the difference between a shift register and a parallel-in/serial-out register.

b. Design a 4-bit synchronous up-counter using T flip-flops.


Memory Units:

a. Define the terms RAM and ROM.

b. Explain the concept of memory decoding in digital systems.


Digital-to-Analog Conversion:

a. Describe the operation of a weighted resistor digital-to-analog converter.

b. Explain the purpose of a sample-and-hold circuit in digital-to-analog conversion.


Analog-to-Digital Conversion:

a. Discuss the successive approximation method for analog-to-digital conversion.

b. Explain the concept of quantization error in the context of analog-to-digital conversion.


Multiplexers and Demultiplexers:

a. Design an 8-to-1 multiplexer using 4-to-1 multiplexers.

b. Explain the function of a demultiplexer.


Digital Logic Families:

a. Compare and contrast TTL and CMOS logic families.

b. Discuss the advantages and disadvantages of ECL logic.


Programmable Logic Devices (PLDs):

a. Describe the types of PLDs and their applications.

b. Explain the concept of a look-up table (LUT) in programmable logic.

Object Oriented Programming [OOP]

 Basic Concepts:

a. Define what an object is in the context of OOP.

b. Explain the difference between a class and an object.


Encapsulation:

a. Describe the concept of encapsulation and its benefits.

b. Provide an example of encapsulation in a programming language of your choice.


Inheritance:

a. Explain the concept of inheritance and its purpose.

b. Differentiate between single inheritance and multiple inheritance.


Polymorphism:

a. Define polymorphism and explain its types.

b. Provide an example of compile-time and runtime polymorphism.


Abstraction:

a. Discuss the importance of abstraction in OOP.

b. Provide an example of abstraction in a real-world scenario.


Class and Object Relationships:

a. Explain the difference between a class method and an instance method.

b. Describe the concept of composition in OOP.


Interfaces and Abstract Classes:

a. Define an interface and explain its role in OOP.

b. Differentiate between an interface and an abstract class.


Design Patterns:

a. Discuss the singleton design pattern and its use cases.

b. Explain the observer design pattern.


Exception Handling:

a. Describe how exception handling is implemented in an object-oriented language.

b. Discuss the importance of try-catch blocks in OOP.


Object-Oriented Analysis and Design (OOAD):

a. Explain the phases of Object-Oriented Analysis and Design.

b. Discuss the importance of UML (Unified Modeling Language) in OOAD.


Generic Programming:

a. Define generic programming and its advantages.

b. Provide an example of using generics in a programming language.


Reflection:

a. Explain the concept of reflection in OOP.

b. Discuss situations where reflection can be useful.

Database Management System [DBMS]

 Basics of DBMS:

a. Define what a database is and explain its advantages.

b. Differentiate between DBMS and RDBMS.


Relational Database Concepts:

a. Define the terms: table, tuple, attribute, and primary key.

b. Explain the concept of normalization and its importance in a relational database.


SQL Queries:

a. Write an SQL query to retrieve all records from a table named "Employees."

b. Explain the differences between the WHERE and HAVING clauses in SQL.


Database Design:

a. What is the purpose of a foreign key in a relational database?

b. Describe the steps involved in the normalization process.


Transaction Management:

a. Define the ACID properties in the context of database transactions.

b. Explain the concepts of commit and rollback in a database transaction.


Indexing and Query Optimization:

a. Discuss the importance of indexing in a database.

b. Explain how the query optimizer works in a relational database system.


Concurrency Control:

a. What is a deadlock in the context of database concurrency?

b. Discuss the various methods of handling concurrent transactions.


Data Integrity and Constraints:

a. Explain the concept of referential integrity in a relational database.

b. Define the CHECK constraint in SQL.


NoSQL Databases:

a. Compare and contrast SQL and NoSQL databases.

b. Provide examples of NoSQL databases and their use cases.


Database Security:

a. Discuss the importance of database security.

b. Describe techniques for securing a database, including access control and encryption.

Data Structures Using C

 Arrays and Strings:

a. Write a C program to find the sum of elements in an array.

b. Explain how you can reverse a string in C.


Linked Lists:

a. Implement a function to insert a node at the beginning of a linked list.

b. Write a program to detect a loop in a linked list.


Stacks:

a. Implement a stack using an array.

b. Write a C program to check for balanced parentheses using a stack.


Queues:

a. Implement a queue using two stacks.

b. Write a C program to perform enqueue and dequeue operations on a queue.


Trees:

a. Implement a binary search tree and perform an inorder traversal.

b. Write a function to find the height of a binary tree.


Graphs:

a. Implement a depth-first search (DFS) algorithm for a graph.

b. Write a program to find the shortest path in a weighted graph using Dijkstra's algorithm.


Sorting and Searching:

a. Implement the quicksort algorithm in C.

b. Write a program to perform binary search on a sorted array.


Hashing:

a. Implement a hash table in C.

b. Write a program to handle collisions in a hash table using chaining.


Dynamic Programming:

a. Solve the Fibonacci sequence using dynamic programming.

b. Implement the knapsack problem using dynamic programming.


Miscellaneous:

a. Explain the difference between a stack and a queue.

b. Describe the advantages and disadvantages of arrays and linked lists.

Linear Regression with Python

 


What you'll learn

Create a linear model, and implement gradient descent.

Train the linear model to fit given data using gradient descent.

Join Free:Linear Regression with Python

About this Guided Project

In this 2-hour long project-based course, you will learn how to implement Linear Regression using Python and Numpy. Linear Regression is an important, fundamental concept if you want break into Machine Learning and Deep Learning. Even though popular machine learning frameworks have implementations of linear regression available, it's still a great idea to learn to implement it on your own to understand the mechanics of optimization algorithm, and the training process.

Since this is a practical, project-based course, you will need to have a theoretical understanding of linear regression, and gradient descent. We will focus on the practical aspect of implementing linear regression with gradient descent, but not on the theoretical aspect.

Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.

Data Science as a Field

 


What you'll learn

By taking this course, you will be able explain what data science is and identify the key disciplines involved.

You will be able to use the steps of the data science process to create a reproducible data analysis and identify personal biases.

You will be able to identify interesting data science applications, locate jobs in Data Science, and begin developing a professional network.

Join Free:Data Science as a Field

There are 4 modules in this course

This course provides a general introduction to the field of Data Science. It has been designed for aspiring data scientists, content experts who work with data scientists, or anyone interested in learning about what Data Science is and what it’s used for. Weekly topics include an overview of the skills needed to be a data scientist; the process and pitfalls involved in data science; and the practice of data science in the professional and academic world. This course is part of CU Boulder’s Master’s of Science in Data Science and was collaboratively designed by both academics and industry professionals to provide learners with an insider’s perspective on this exciting, evolving, and increasingly vital discipline.

Data Science as a Field can be taken for academic credit as part of CU Boulder’s Master of Science in Data Science (MS-DS) degree offered on the Coursera platform. The MS-DS is an interdisciplinary degree that brings together faculty from CU Boulder’s departments of Applied Mathematics, Computer Science, Information Science, and others. With performance-based admissions and no application process, the MS-DS is ideal for individuals with a broad range of undergraduate education and/or professional experience in computer science, information science, mathematics, and statistics. Learn more about the MS-DS program at https://www.coursera.org/degrees/master-of-science-data-science-boulder.

Excel/VBA for Creative Problem Solving, Part 3 (Projects)

 


What you'll learn

Create a VBA user form that will implement or solve a real world scenario or problem

Join Free:Excel/VBA for Creative Problem Solving, Part 3 (Projects)

There are 5 modules in this course

In this course, learners will complete several VBA projects.  It is highly recommended that learners first take "Excel/VBA for Creative Problem Solving, Part 1" and "Excel/VBA for Creative Problem Solving, Part 2".  This course builds off of skills learned in those two courses.  This is a project-based course.  Therefore, the projects are quite open-ended and there are multiple ways to solve the problems.  Through the use of Peer Review, other learners will grade learners' projects based on a grading rubric.

Introduction to Data Analysis Using Excel

 


Build your subject-matter expertise

This course is part of the Business Statistics and Analysis Specialization

When you enroll in this course, you'll also be enrolled in this Specialization.

Learn new concepts from industry experts

Gain a foundational understanding of a subject or tool

Develop job-relevant skills with hands-on projects

Earn a shareable career certificate

Join Free:Introduction to Data Analysis Using Excel

There are 4 modules in this course

The use of Excel is widespread in the industry. It is a very powerful data analysis tool and almost all big and small businesses use Excel in their day to day functioning. This is an introductory course in the use of Excel and is designed to give you a working knowledge of Excel with the aim of getting to use it for more advance topics in Business Statistics later. The course is designed keeping in mind two kinds of learners -  those who have very little functional knowledge of Excel and those who use Excel regularly but at a peripheral level and wish to enhance their skills. The course takes you from basic operations such as reading data into excel using various data formats, organizing and manipulating data, to some of the more advanced functionality of Excel. All along, Excel functionality is introduced using easy to understand examples which are demonstrated in a way that learners can become comfortable in understanding and applying them.

To successfully complete course assignments, students must have access to a Windows version of Microsoft Excel 2010 or later. 
________________________________________
WEEK 1
Module 1: Introduction to Spreadsheets
In this module, you will be introduced to the use of Excel spreadsheets and various basic data functions of Excel.

Topics covered include:

Reading data into Excel using various formats
Basic functions in Excel, arithmetic as well as various logical functions
Formatting rows and columns
Using formulas in Excel and their copy and paste using absolute and relative referencing
________________________________________
WEEK 2
Module 2: Spreadsheet Functions to Organize Data
This module introduces various Excel functions to organize and query data. Learners are introduced to the IF, nested IF, VLOOKUP and the HLOOKUP functions of Excel. 

Topics covered include:

IF and the nested IF functions
VLOOKUP and HLOOKUP
The RANDBETWEEN function
________________________________________
WEEK 3
Module 3: Introduction to Filtering, Pivot Tables, and Charts
This module introduces various data filtering capabilities of Excel. You’ll learn how to set filters in data to selectively access data. A very powerful data summarizing tool, the Pivot Table, is also explained and we begin to introduce the charting feature of Excel.

Topics covered include:

VLOOKUP across worksheets
Data filtering in Excel
Use of Pivot tables with categorical as well as numerical data
Introduction to the charting capability of Excel
________________________________________
WEEK 4
Module 4: Advanced Graphing and Charting
This module explores various advanced graphing and charting techniques available in Excel. Starting with various line, bar and pie charts we introduce pivot charts, scatter plots and histograms. You will get to understand these various charts and get to build them on your own.

Topics covered include

Line, Bar and Pie charts
Pivot charts
Scatter plots
Histograms

Hadoop Platform and Application Framework

 


There are 5 modules in this course

This course is for novice programmers or business people who would like to understand the core tools used to wrangle and analyze big data. With no prior experience, you will have the opportunity to walk through hands-on examples with Hadoop and Spark frameworks, two of the most common in the industry. You will be comfortable explaining the specific components and basic processes of the Hadoop architecture, software stack, and execution environment.   In the assignments you will be guided in how data scientists apply the important concepts and techniques such as Map-Reduce that are used to solve fundamental problems in big data.  You'll feel empowered to have conversations about big data and the data analysis process.

Join Free:Hadoop Platform and Application Framework

Friday, 15 December 2023

Using Python to calculate standard deviation and variance

 

import numpy as np

data = np.array([1, 3, 5, 7, 9])

sd = np.std(data)

var = np.var(data)

print(f"Standard deviation: {sd:.2f}")

print(f"Variance: {var:.2f}")

#For free code visit clcoding.com




import statistics

data = [1, 3, 5, 7, 9]

sd = statistics.stdev(data)

psd = statistics.pstdev(data)

print(f"Standard deviation: {sd:.2f}")

print(f"Population standard deviation: {psd:.2f}")


#For free code visit clcoding.com




Python Coding challenge - Day 93 | What is the output of the following Python Code?

 


Solution and Explanation :


The code print(round(1 / 3, 2)) will output the result of dividing 1 by 3 and rounding the result to 2 decimal places. Let's calculate:

1/3≈0.333333...31​≈0.333333...

Rounding this to 2 decimal places, the result will be:

round(13,2)≈0.33round(31​,2)≈0.33

So, the output of the code will be: 0.33

Popular Posts

Categories

100 Python Programs for Beginner (56) AI (34) Android (24) AngularJS (1) Assembly Language (2) aws (17) Azure (7) BI (10) book (4) Books (174) C (77) C# (12) C++ (82) Course (67) Coursera (228) Cybersecurity (24) data management (11) Data Science (128) Data Strucures (8) Deep Learning (21) Django (14) Downloads (3) edx (2) Engineering (14) Excel (13) Factorial (1) Finance (6) flask (3) flutter (1) FPL (17) Google (34) Hadoop (3) HTML&CSS (47) IBM (25) IoT (1) IS (25) Java (93) Leet Code (4) Machine Learning (60) Meta (22) MICHIGAN (5) microsoft (4) Nvidia (3) Pandas (4) PHP (20) Projects (29) Python (935) Python Coding Challenge (368) Python Quiz (27) Python Tips (2) Questions (2) R (70) React (6) Scripting (1) security (3) Selenium Webdriver (4) Software (17) SQL (42) UX Research (1) web application (8) Web development (4) web scraping (2)

Followers

Person climbing a staircase. Learn Data Science from Scratch: online program with 21 courses