Page 389 - Informatics_Practices_Fliipbook_Class12
P. 389
S TRIM() 160
savefig() 96 Trojan Horse 275
Scatter Plot 98 U
SELECT statement 148 UCASE() / UPPER() 158
Sender 221 UNION, INTERSECTION AND DIFFERENCE 195
sep 34, 37 UNIQUE Constraint 132
Series 9 unique() 53
set_index() 43, 45 UPDATE-SET statement 147
Setting axis label and title 94 V
shape 37, 38 value_counts() 53
SHOW TABLES statement 139
skiprows 35 VARCHAR(L) 134
Viruses 274
SMALLINT 133
Social Media Étiquettes 270 Voice over Internet Protocol (VoIP) 258
Social Networks 269 W
Spam 273 WAN 230
Spread of rumours 273 Web Browser 254
Spyware 275 Web Hosting 260, 261
Star Topology 225 Web page, Website, and URL 253
Structured Query Language (SQL) 132 WHERE clause 149
subplot() 103, 104, 107 white hat hackers 271
SUM() 162 WiFi Card 232
sum() 12, 49 Worms 275
Switch 234 Writing to csv file 60
T X
tables 127 xlabel() 95
tail() 9, 40 xticks() 96
Text Functions 158 Y
title() 95 YEAR() 161
to_csv() 60, 61 ylabel() 95
Trademark Infringement 279 yticks() 96
Trademark 279
Tree Topology 227, 228
375
Index 375

