You're about to create your best presentation ever

Quiz Game Powerpoint Template

Create your presentation by reusing a template from our community or transition your PowerPoint deck into a visually compelling Prezi presentation.

Quiz Game! :)

Transcript: Decomposition Double Replacement Single Replacement Combustion Synthesis *Select which one is the best answer in each set of balanced equations among these choices. *For the correct answers, please see detailed research attached on a different file.. ;) Let's Begin! :) Questions-Fourth Set H2O2 -> H2O + O2 2 KClO3 -> 2 KCl + 3 O2 6 NaHCO3 -> 3 Na2CO3 + 3 H2O + 3 CO2 CaCO3 -> CaO + CO2 2H2O(l) → -> 2H2(g) + O2(g) 2NaCl(l) → -> 2Na(s) + Cl2(g) 2HgO(s) ->→ 2Hg(l) + O2(g) H2SO4 → -> H2O(l) + SO3(g) Ca(OH)2(s) → -> CaO(s) + H2O(g) CaCO3(s) →-> CaO(s) + CO2(g) C2H4 + 3O2->2CO2+ 2H2O H2(SO4)+ 2 K(OH) -> K2(SO4) + 2 H(OH) 2 H3PO4 + 3 Ca(OH)2 -> 6 H(OH) + Ca3(PO4)2 CH4(g) + 2O2(g) → -> CO2(g) + 2H2O(g) 2C4H10(g) + 13O2(g) →-> 8CO2(g) + 10H2O(g) C10H8 + 12 O2 ---> 10 CO2 + 4 H2O CH4 + 2 O2 --> CO2 + 2 H2O CH2S + 6 F2 →-> CF4 + 2 HF + SF6 2 CH4 + 3 O2 → -> 2 CO + 4 H2O N2 + 2 O2 -> → 2 NO2 Mg + 2NaCl  ->MgCl2 + 2Na Br2 + 2NaCl-> 2NaBr + Cl2 2 AgNO3 + Cu -> Cu(NO3)2 + 2 Ag 2 KI + Cl2 -> 2 KCl + I2 2 ZnS + O2 -> 2 ZnO + 2 S Cu + 2AgNO3 -> 2Ag + Cu(NO3)2 Zn + CuSO4 ->ZnSO4 + Cu H2SO4 + Zn -> ZnSO4 + H2 3 CaO + 2 Al -> Al2O3 + 3 Ca Cl2 + 2 NaBr -> 2 NaCl + Br2 Eureka! Questions-First Set Questions-Third Set Questions-Second Set 2NaCl + MgBr2->MgCl2 + 2NaBr Ag+ + (NO3)- + K+ +Cl- -> AgCl + K+ + (NO3)- H+ + Cl- + Na+ + (OH)- -> HOH + Na+ + Cl Ca2+ + (CO3)2- + 2 H+ + 2 Cl- -> Ca2+ + 2 Cl- + H2O + CO2 Pb(NO3)2 + 2NaI -> PbI2 + 2NaNO3 CaF2 + H2SO4 -> CaSO4 + 2 HF 2 NaOH + H2CO3 -> Na2CO3 + 2 H2O 2 Al(OH)3 + 3 H2SO4 -> 6 H2O + Al2(SO4)3 Ba(OH)2 + H2SO4 -> 2 H2O + BaSO4 Al2(SO4)3 + 3 Ca(OH)2 -> 2 Al(OH)3 + 3 CaSO4 2Na + Cl2 -> 2NaCl FeCl2 + Na3PO4 ->NaCl + Fe3(PO4)2 Mg + N2 -> Mg3N2 2 H2 + O2 -> 2 H2O H2O + SO3 -> H2SO4 NH3 + H2O -> NH4OH Li2O + H2O -> 2 LiOH S + O2 -> SO2 2Na + Cl2 -> 2 NaCl •2P(s) + 3Cl2(g) →-> 2PCl3(g) Questions-Fifth Set

QUIZ GAME

Transcript: REQUIREMENTS 1) Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy 2) If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified 3) watermarks can sometimes be destroyed if the data recipient is malicious 4)Watermarks can be very useful in some cases, but again, involve some modification of the original data 5)Another enterprise may outsource its data processing, so data must be given to various other companies. We call the owner of the data the distributor and the supposedly trusted third parties the agents DATA LEAKAGE DETECTION 5) Watermarks can be very useful in some cases, but again, involve some modification of the original data 6) In this paper we study unobtrusive techniques for detecting leakage of a set of objects or records 7)We also present algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker 8) If it turns out an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty P-IV - 3.0Ghz 865/915 Chipset 800 Mhz FSB 512 MB RAM 80 GB 7200 RPM HARDRIVE CD-ROM DRIVE 10/100 NIC OPTICAL WHEEL MOUSE KEY BOARD 11+ INCHES COLOUR MONITOR SOFTWARE K.VIKHYATH KUMAR -13AG1A0554 K.VENKAT SHASHI KUMAR -13AG1A0555 A.BALAKRISHNA -14AG5A0501 PROPOSED MODULES EXISTING SYSTEM 1) Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data 2) Perturbation is a very useful technique where the data is modified and made “less sensitive” before being handed to agents 3) We develops unobtrusive techniques for detecting leakage of a set of objects or record DEVELOPED THANK YOU REQUIREMENTS HARDWARE 1. In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties 2.We call the owner of the data the distributor and the supposedly trusted third parties the agents 3. Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data 4. Perturbation is a very useful technique where the data is modified and made “less sensitive” before being handed to agents DESCRIPTION operating system : windows xp/2003 or Linux/Solaris user interface : HTML,CSS client-side scripting : javascript programming language : java(JDBC,servlets,JSP) IDE/Workbench : Eclipse with My Eclipse plug in Database : MySQL Web Server : Apache Tomcat 7.0 Technology : JDK 1.7 Data Distributor Login Send file to agent View sent files View Leaked file details Agent/User Register Login Send files View distributor files Download file BY PROPOSED MODULES

Now you can make any subject more engaging and memorable