Notes

List of Programs

1.    To deduce error involved in polynomial equation.
2.    To Find out the root of the Algebraic and Transcendental equations using Bisection method.
3.    To Find out the root of the Algebraic and Transcendental equations using Regula-Falsi method.
4.    To Find out the root of the Algebraic and Transcendental equations using Newton-Raphson method.
5.    To Find out the root of the Algebraic and Transcendental equations using Iterative method.
6.    To implement Numerical Integration using Trapezoidal rule.
7.    To implement Numerical Integration using Simpson 1/3 rule.
8.    To implement Numerical Integration Simpson 3/8 rule.
9.    To implement Newton’s Forward Interpolation formula.
10.    To implement Newton’s Backward Interpolation formula.
11.    To implement Gauss Forward Interpolation formula.
12.    To implement Gauss Backward Interpolation formula.
13.    To implement Bessel’s Interpolation formula.
14.    To implement Sterling’s Interpolation formula.
15.    To implement Newton’s Divided Difference formula.
16.    To implement Langrange’s Interpolation formula.
17.    To implement Numerical Differentiations.
18.    To implement Least Square Method for curve fitting.
19.    To draw frequency chart like histogram, frequency curve and pie-chart etc.
20.    To estimate regression equation from sampled data and evaluate values of standard deviation, t-statistics, regression coefficient, value of R^2 for at least two independent variables.

 

Compress PDF

Security Threats
There are numerous threats to security of applications and data. With the increasing use of internet and the advancing IT, applications are becoming increasingly vulnerable to threats that could be a malicious code, viruses, worms, etc.
Some of the security threats are as follows:-