Probability: Definitions and examples, Experiment, Sample space, Event, mutually exclusive events, Equally likely events, Exhaustive events, Sure event, Null event, Complementary event and Independent events

Probability is the measure of the likelihood that a particular event will occur. It is expressed as a number between 0 (impossible event) and 1 (certain event). 

1. Experiment

An experiment is a process or activity that leads to one or more possible outcomes.

  • Example:

Tossing a coin, rolling a die, or drawing a card from a deck.

2. Sample Space

The sample space is the set of all possible outcomes of an experiment.

  • Example:
    • For tossing a coin: S={Heads (H),Tails (T)}
    • For rolling a die: S={1,2,3,4,5,6}

3. Event

An event is a subset of the sample space. It represents one or more outcomes of interest.

  • Example:
    • Rolling an even number on a die: E = {2,4,6}
    • Getting a head in a coin toss: E = {H}

4. Mutually Exclusive Events

Two or more events are mutually exclusive if they cannot occur simultaneously.

  • Example:

Rolling a die and getting a 2 or a 3. Both outcomes cannot happen at the same time.

5. Equally Likely Events

Events are equally likely if each has the same probability of occurring.

  • Example:

In a fair coin toss, getting heads (P = 0.5) and getting tails (P = 0.5) are equally likely.

6. Exhaustive Events

A set of events is exhaustive if it includes all possible outcomes of the sample space.

  • Example:

In rolling a die: {1,2,3,4,5,6} is an exhaustive set of events.

7. Sure Event

A sure event is an event that is certain to occur. The probability of a sure event is 1.

  • Example:

Getting a number less than or equal to 6 when rolling a standard die: P(E)=1.

8. Null Event

A null event (or impossible event) is an event that cannot occur. Its probability is 0.

  • Example:

Rolling a 7 on a standard die: P(E)=0.

9. Complementary Event

The complementary event of A, denoted as A^c, includes all outcomes in the sample space that are not in A.

  • Example:

If is rolling an even number ({2,4,6}, then A^c is rolling an odd number ({1,3,5}.

10. Independent Events

Two events are independent if the occurrence of one event does not affect the occurrence of the other.

  • Example:

Tossing two coins: The outcome of the first toss does not affect the outcome of the second toss.

Classification of Data, Principles, Methods, Importance

Classification of Data is the process of organizing data into distinct categories or groups based on shared characteristics or attributes. This process helps in simplifying complex data sets, making them more understandable and manageable for analysis. Classification plays a crucial role in transforming raw data into structured formats, allowing for effective interpretation, comparison, and presentation. Data can be classified into two main types: Quantitative Data and Qualitative Data. These types have distinct features, methods of classification, and areas of application.

Principles of Classification:

  • Clear Objective:

A good classification scheme has a clear objective, ensuring that the classification serves a specific purpose, such as simplifying data or highlighting patterns.

  • Homogeneity within Classes:

The categories must be homogeneous, meaning data within each class should share similar characteristics or values. This makes the comparison between data points meaningful.

  • Heterogeneity between Classes:

There should be clear distinctions between the different classes, allowing data points from different categories to be easily differentiated.

  • Exhaustiveness:

A classification system must be exhaustive, meaning it should include all possible data points within the dataset, with no data left unclassified.

  • Mutual Exclusivity:

Each data point should belong to only one category, ensuring that the classification system is logically consistent.

  • Simplicity:

Classification should be straightforward, easy to understand, and not overly complex. A simple system improves the clarity and effectiveness of analysis.

Methods of Classification:

  • Manual Classification:

This involves sorting data by hand, based on predefined criteria. It is usually time-consuming and prone to errors, but it may be useful for smaller datasets.

  • Automated Classification:

In this method, computer programs and algorithms classify data based on predefined rules. It is faster, more efficient, and suited for large datasets, especially in fields like data mining and machine learning.

Importance of Classification

  • Data Summarization:

Classification helps in summarizing large datasets, making them more manageable and interpretable.

  • Pattern Identification:

By grouping data into categories, it becomes easier to identify patterns, trends, or anomalies within the data.

  • Facilitating Analysis:

Classification provides a structured approach for analyzing data, enabling researchers to use statistical techniques like correlation, regression, or hypothesis testing.

  • Informed Decision Making:

By classifying data into meaningful categories, businesses, researchers, and policymakers can make informed decisions based on the analysis of categorized data.

Calculation of EMI

Equated Monthly Installment (EMI) is the fixed payment amount borrowers make to lenders each month to repay a loan. EMIs consist of both the principal and the interest, and the amount remains constant throughout the loan tenure. The formula for calculating EMI is:

where:

  • P = Principal amount (loan amount),
  • r = Monthly interest rate (annual interest rate divided by 12 and expressed as a decimal),
  • n = Number of monthly installments (loan tenure in months).

Components of EMI Calculation:

  • Principal (P):

This is the amount initially borrowed from the lender. It’s the base amount on which interest is calculated. Higher principal amounts lead to higher EMIs, as the overall amount owed is greater.

  • Interest Rate (r):

The rate of interest applied to the principal impacts the EMI significantly. Interest rate is typically given annually but needs to be converted into a monthly rate for EMI calculations. For instance, a 12% annual rate would be converted to a 1% monthly rate (12% ÷ 12).

  • Loan Tenure (n):

The number of months over which the loan is repaid. A longer tenure reduces the monthly EMI amount because the total loan repayment is spread over a greater number of installments, though this may lead to higher total interest paid.

Types of EMI Calculation Methods:

  • Flat Rate EMI:

Here, interest is calculated on the original principal amount throughout the tenure. The formula differs from the reducing balance method and generally results in higher EMIs.

  • Reducing Balance EMI:

This is the most common method for EMI calculations, where interest is calculated on the outstanding balance. As the principal reduces over time, interest payments decrease, leading to an overall lower cost compared to the flat rate.

Importance of EMI Calculation:

  • Assess Affordability:

Borrowers can determine if the EMI amount fits within their monthly budget, ensuring they can make payments consistently.

  • Plan Finances:

Knowing the EMI in advance helps in planning for other financial obligations and expenses.

  • Compare Loan Options:

Borrowers can evaluate different loan offers by comparing EMIs for similar loan amounts and tenures but with varying interest rates.

Sinking Fund, Purpose, Structure, Benefits, Applications

Sinking Fund is a financial mechanism used to set aside money over time for the purpose of repaying debt or replacing a significant asset. It acts as a savings plan that allows an organization or individual to accumulate funds for a specific future obligation, ensuring that they have enough resources to meet that obligation without straining their financial situation.

Purpose of a Sinking Fund:

The primary purpose of a sinking fund is to manage debt repayment or asset replacement efficiently.

  • Reduce Default Risk:

By setting aside funds regularly, borrowers can reduce the risk of default on their obligations. This practice assures lenders that the borrower is financially responsible and prepared to meet repayment terms.

  • Facilitate Large Purchases:

For organizations, sinking funds can help manage significant future expenditures, such as replacing machinery, vehicles, or technology. This ensures that funds are available when needed, mitigating the impact on cash flow.

  • Enhance Financial Planning:

Establishing a sinking fund encourages better financial planning and discipline. Organizations can forecast their future cash requirements, making it easier to allocate resources appropriately.

Structure of a Sinking Fund:

  • Regular Contributions:

The entity responsible for the sinking fund makes regular contributions, typically monthly or annually. The amount of these contributions can be fixed or variable based on a predetermined plan.

  • Interest Earnings:

The contributions are usually invested in low-risk securities or interest-bearing accounts. This investment allows the sinking fund to grow over time through interest earnings, ultimately increasing the amount available for future obligations.

  • Target Amount:

The sinking fund is established with a specific target amount that reflects the total debt or asset replacement cost. The time frame for reaching this target is also defined, ensuring that contributions align with the due date for the obligation.

Benefits of a Sinking Fund:

  • Financial Stability:

By accumulating funds over time, sinking funds contribute to financial stability, reducing the pressure to secure large amounts of money at once.

  • Improved Creditworthiness:

A well-managed sinking fund can enhance an organization’s credit rating. Lenders view sinking funds as a positive indicator of an entity’s ability to manage its debts responsibly.

  • Cost Management:

Sinking funds help manage the cost of large purchases or debt repayments by spreading the financial burden over time, reducing the impact on cash flow.

  • Flexibility:

The structure of a sinking fund can be adjusted based on changing financial circumstances. Contributions can be increased or decreased as needed, providing flexibility in financial planning.

  • Risk Mitigation:

By setting aside funds in advance, entities can mitigate the risks associated with sudden financial obligations, ensuring they are prepared for unexpected expenses or economic downturns.

Practical Applications of Sinking Funds:

  • Corporate Bonds:

Many corporations issue bonds that require a sinking fund to be established. The company sets aside money regularly to repay bondholders at maturity or periodically throughout the life of the bond.

  • Municipal Bonds:

Local governments often use sinking funds to repay municipal bonds. This practice ensures that they can meet their obligations without significantly impacting their budgets.

  • Asset Replacement:

Businesses may establish sinking funds for replacing equipment or vehicles. By planning ahead, they can avoid large capital outlays and maintain operations without disruption.

  • Real Estate:

Property management companies may set up sinking funds for the maintenance and eventual replacement of common areas or amenities within residential complexes.

  • Educational Institutions:

Schools and universities may use sinking funds to save for future building projects or major renovations, ensuring they can finance these endeavors without resorting to debt.

Perpetuity, Function

Perpetuity refers to a financial instrument or cash flow that continues indefinitely without an end. In simpler terms, it is a stream of cash flows that occurs at regular intervals for an infinite duration. The present value of a perpetuity can be calculated using the formula:

PV = C/ r

Where,

C is the cash flow per period

r is the discount rate.

The concept of perpetuity has several important functions in finance and investment analysis. Here are eight key functions of perpetuity:

  • Valuation of Investments:

Perpetuity provides a method for valuing investments that generate constant cash flows over an indefinite period. This is particularly useful in valuing companies, real estate, and other assets that are expected to generate steady income streams indefinitely. By calculating the present value of these cash flows, investors can determine the fair value of such assets.

  • Determining Fixed Income Securities:

Perpetuities are often used in valuing fixed income securities like preferred stocks and bonds that pay a constant dividend or interest indefinitely. Investors can assess the attractiveness of these securities by comparing their present value to the market price, thus aiding investment decisions.

  • Simplifying Financial Analysis:

The concept of perpetuity simplifies complex financial models by allowing analysts to consider cash flows that extend indefinitely. This simplification is particularly valuable in scenarios where cash flows are expected to remain constant over a long period, providing a clearer picture of an investment’s worth.

  • Corporate Valuation:

In corporate finance, perpetuity is a critical component of valuation models, such as the Gordon Growth Model, which estimates the value of a company based on its expected future dividends. By considering dividends as a perpetuity, analysts can derive a more accurate valuation for firms with stable dividend policies.

  • Real Estate Investment:

In real estate, perpetuity helps in evaluating properties that generate consistent rental income. Investors can use the perpetuity formula to estimate the present value of future rental cash flows, facilitating better decision-making regarding property purchases or investments.

  • Retirement Planning:

Perpetuity can assist individuals in planning for retirement. By understanding how much they can withdraw from their retirement savings while maintaining a sustainable income level indefinitely, retirees can ensure financial security throughout their retirement years.

  • Life Insurance Valuation:

Perpetuities play a role in life insurance products that provide lifelong benefits. The present value of future benefits can be calculated using the perpetuity concept, aiding insurers in pricing their products and ensuring they can meet future obligations.

  • Evaluating Charitable Donations:

Nonprofit organizations can benefit from the concept of perpetuity when structuring endowments or perpetual funds. These funds are designed to provide a steady stream of income for ongoing operations, scholarships, or charitable initiatives. By understanding the present value of these perpetual cash flows, organizations can make informed decisions about resource allocation and fund management.

Data Analysis for Business Decisions 2nd Semester BU BBA SEP Notes

Unit 1 [Book]  
Introduction, Meaning, Definitions, Features, Objectives, Functions, Importance and Limitations of Statistics VIEW
Important Terminologies in Statistics: Data, Raw Data, Primary Data, Secondary Data, Population, Census, Survey, Sample Survey, Sampling, Parameter, Unit, Variable, Attribute, Frequency, Seriation, Individual, Discrete and Continuous VIEW
Classification of Data VIEW
Requisites of Good Classification of Data VIEW
Types of Classification Quantitative and Qualitative Classification VIEW
Types of Presentation of Data Textual Presentation VIEW
Tabular Presentation VIEW
One-way Table VIEW
Important Terminologies: Variable, Quantitative Variable, Qualitative Variable, Discrete Variable, Continuous Variable, Dependent Variable, Independent Variable, Frequency, Class Interval, Tally Bar VIEW
Diagrammatic and Graphical Presentation, Rules for Construction of Diagrams and Graphs VIEW
Types of Diagrams: One Dimensional Simple Bar Diagram, Sub-divided Bar Diagram, Multiple Bar Diagram, Percentage Bar Diagram Two-Dimensional Diagram Pie Chart, Graphs VIEW
Unit 2 [Book]  
Meaning and Objectives of Measures of Tendency, Definition of Central Tendency VIEW
Requisites of an Ideal Average VIEW
Types of Averages, Arithmetic Mean, Median, Mode (Direct method only) VIEW
Empirical Relation between Mean, Median and Mode VIEW
Graphical Representation of Median & Mode VIEW
Ogive Curves VIEW
Histogram VIEW
Meaning of Dispersion VIEW
Standard Deviation, Co-efficient of Variation-Problems VIEW
Unit 3 [Book]  
Correlation Meaning and Definition, Uses, VIEW
Types of Correlation VIEW
Karl Pearson’s Coefficient of Correlation probable error VIEW
Spearman’s Rank Correlation Coefficient VIEW
Regression Meaning, Uses VIEW
Regression lines, Regression Equations VIEW
Correlation Coefficient through Regression Coefficient VIEW
Unit 4 [Book]  
Introduction, Meaning, Uses, Components of Time Series VIEW
Methods of Trends VIEW
Method of Moving Averages Method of Curve VIEW
Fitting by the Principle of Least Squares VIEW
Fitting a Straight-line trend by the method of Least Squares VIEW
Computation of Trend Values VIEW
Unit 4 [Book]  
Probability: Definitions and examples -Experiment, Sample space, Event, mutually exclusive events, Equally likely events, Exhaustive events, Sure event, Null event, Complementary event and independent events VIEW
Mathematical definition of Probability VIEW
Statements of Addition and Multiplication Laws of Probability VIEW
Problems on Probabilities  
Conditional Probabilities VIEW
Probabilities using Addition and Multiplication Laws of Probabilities VIEW

Business Data Analysis 2nd Semester BU B.Com SEP Notes

Unit 1 [Book]
Introduction, Meaning, Definitions, Features, Objectives, Functions, Importance and Limitations of Statistics VIEW
Important Terminologies in Statistics: Data, Raw Data, Primary Data, Secondary Data, Population, Census, Survey, Sample Survey, Sampling, Parameter, Unit, Variable, Attribute, Frequency, Seriation, Individual, Discrete and Continuous VIEW
Classification of Data VIEW
Requisites of Good Classification of Data VIEW
Types of Classification Quantitative and Qualitative Classification VIEW
Unit 2 [Book]
Types of Presentation of Data Textual Presentation VIEW
Tabular Presentation VIEW
One-way Table VIEW
Important Terminologies: Variable, Quantitative Variable, Qualitative Variable, Discrete Variable, Continuous Variable, Dependent Variable, Independent Variable, Frequency, Class Interval, Tally Bar VIEW
Diagrammatic and Graphical Presentation, Rules for Construction of Diagrams and Graphs VIEW
Types of Diagrams: One Dimensional Simple Bar Diagram, Sub-divided Bar Diagram, Multiple Bar Diagram, Percentage Bar Diagram Two-Dimensional Diagram Pie Chart, Graphs VIEW
Unit 3 [Book]
Meaning and Objectives of Measures of Tendency, Definition of Central Tendency VIEW
Requisites of an Ideal Average VIEW
Types of Averages, Arithmetic Mean, Median, Mode (Direct method only) VIEW
Empirical Relation between Mean, Median and Mode VIEW
Graphical Representation of Median & Mode VIEW
Ogive Curves VIEW
Histogram VIEW
Meaning of Dispersion VIEW
Standard Deviation, Co-efficient of Variation-Problems VIEW
Unit 4 [Book]
Correlation Meaning and Definition, Uses, VIEW
Types of Correlation VIEW
Karl Pearson’s Coefficient of Correlation probable error VIEW
Spearman’s Rank Correlation Coefficient VIEW
Regression Meaning, Uses VIEW
Regression lines, Regression Equations VIEW
Correlation Coefficient through Regression Coefficient VIEW
Unit 5 [Book]
Introduction, Meaning, Uses, Components of Time Series VIEW
Methods of Trends VIEW
Method of Moving Averages Method of Curve VIEW
Fitting by the Principle of Least Squares VIEW
Fitting a straight-line trend by the method of Least Squares VIEW
Computation of Trend Values VIEW

Business Quantitative Analysis 1st Semester BU B.Com SEP Notes

Unit 1,2,3,4 Pl. Refer Books Book

 

Unit 5 [Book]
Definition of Interest and Other Terms: Simple Interest and Compound Interest VIEW
Effective rate of Interest:
Present Value VIEW
Future Value VIEW
Perpetuity VIEW
Annuity VIEW
Sinking Fund VIEW
Valuation of Bonds VIEW
Calculating of EMI VIEW

 

WEB Security: Best Practices for Developers

Web Application Security is a critical aspect of software development, and developers play a key role in ensuring the safety and integrity of web applications. Implementing best practices for security helps protect against various threats, vulnerabilities, and attacks. Implementing robust web application security requires a proactive approach from developers. By incorporating these best practices into the development process, developers can create more secure web applications that withstand a range of potential threats. Security is an ongoing concern, and staying informed about emerging threats and continuously updating security measures are crucial components of a comprehensive web security strategy.

  1. Input Validation:
  • Sanitize User Input:

Validate and sanitize all user inputs to prevent common attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). Implement input validation on both client and server sides to ensure a robust defense.

  1. Authentication and Authorization:

  • Strong Password Policies:

Enforce strong password policies, including complexity requirements and regular password updates. Use secure password hashing algorithms to store passwords.

  • Multi-Factor Authentication (MFA):

Implement MFA to add an extra layer of security beyond traditional username and password combinations. Utilize authentication factors such as biometrics or one-time codes.

  • Role-Based Access Control (RBAC):

Implement RBAC to ensure that users have the minimum necessary permissions to perform their tasks. Regularly review and update access permissions.

  1. Secure Session Management:
  • Use Secure Session Tokens:

Use secure, random session tokens and ensure they are transmitted over HTTPS. Implement session timeouts to automatically log users out after periods of inactivity.

  • Protect Against Session Fixation:

Regenerate session IDs after a user logs in to prevent session fixation attacks.

 Implement session rotation mechanisms to enhance security.

  1. Secure File Uploads:

  • Validate File Types and Content:

Validate file types and content during the file upload process. Restrict allowed file types, and ensure that uploaded files do not contain malicious content.

  • Store Uploaded Files Safely:

Store uploaded files outside of the web root directory to prevent unauthorized access. Implement file integrity checks to verify the integrity of uploaded files.

  1. Security Headers:

  • HTTP Strict Transport Security (HSTS):

Implement HSTS to ensure that the entire session is conducted over HTTPS. Use HSTS headers to instruct browsers to always use a secure connection.

  • Content Security Policy (CSP):

Enforce CSP to mitigate the risk of XSS attacks by defining a whitelist of trusted content sources. Regularly review and update the CSP policy based on application requirements.

  1. Cross-Site Scripting (XSS) Protection:

  • Input Encoding:

Encode user input to prevent XSS attacks. Utilize output encoding functions provided by the programming language or framework.

  • Content Security Policy (CSP):

Implement CSP to mitigate the impact of XSS attacks by controlling the sources of script content. Include a strong and restrictive CSP policy in the application.

  1. Cross-Site Request Forgery (CSRF) Protection:

  • Use Anti-CSRF Tokens:

Include anti-CSRF tokens in forms and requests to validate the legitimacy of requests. Ensure that these tokens are unique for each session and request.

  • SameSite Cookie Attribute:

Set the SameSite attribute for cookies to prevent CSRF attacks. Use “Strict” or “Lax” values to control when cookies are sent with cross-site requests.

  1. Error Handling and Logging:

  • Custom Error Pages:

Use custom error pages to provide minimal information about system errors to users. Log detailed error information for developers while showing user-friendly error messages to end-users.

  • Sensitive Data Protection:

Avoid exposing sensitive information in error messages. Log errors securely without revealing sensitive data, and monitor logs for suspicious activities.

  1. Regular Security Audits and Testing:

  • Automated Security Scans:

Conduct regular automated security scans using tools to identify vulnerabilities. Integrate security scanning into the continuous integration/continuous deployment (CI/CD) pipeline.

  • Penetration Testing:

Perform regular penetration testing to identify and address potential security weaknesses. Engage with professional penetration testers to simulate real-world attack scenarios.

  1. Security Training and Awareness:

  • Developer Training:

Provide security training to developers on secure coding practices and common security vulnerabilities. Stay updated on the latest security threats and mitigation techniques.

  • User Education:

Educate users about security best practices, such as creating strong passwords and recognizing phishing attempts. Include security awareness training as part of onboarding processes.

Web Scraping: Techniques and Best Practices

Web Scraping is an automated technique for extracting information from websites. Using scripts or specialized tools, it navigates through web pages, retrieves data, and stores it for analysis or integration into other systems. Web scraping is employed for various purposes, including data mining, market research, and aggregating information from multiple online sources.

Web Scraping Techniques:

Web scraping is the process of extracting data from websites. It involves fetching the web page and then extracting the required information from the HTML. Various techniques and tools are employed in web scraping, and the choice depends on the complexity of the website and the specific requirements of the task.

  1. Manual Scraping:

Manually extracting data from a website by viewing the page source and copying the relevant information.

  • Use Cases: Suitable for small-scale scraping tasks or when automation is not feasible.
  1. Regular Expressions:

Using regular expressions (regex) to match and extract patterns from the HTML source code.

  • Use Cases: Effective for simple data extraction tasks where patterns are consistent.
  1. HTML Parsing with BeautifulSoup:

Utilizing libraries like BeautifulSoup to parse HTML and navigate the document structure for data extraction.

  • Use Cases: Ideal for parsing and extracting data from HTML documents with complex structures.

from bs4 import BeautifulSoup

import requests

url = ‘https://example.com’

response = requests.get(url)

soup = BeautifulSoup(response.text, ‘html.parser’)

# Extracting data using BeautifulSoup

title = soup.title.text

  1. XPath and Selectors:

Using XPath or CSS selectors to navigate the HTML document and extract specific elements.

  • Use Cases:

Useful for targeting specific elements or attributes in the HTML structure.

from lxml import html

import requests

url = ‘https://example.com’

response = requests.get(url)

tree = html.fromstring(response.content)

# Extracting data using XPath

title = tree.xpath(‘//title/text()’)[0]

  1. Scrapy Framework:

A powerful and extensible framework for web scraping. It provides tools for managing requests, handling cookies, and processing data.

  • Use Cases: Suitable for more complex scraping tasks involving multiple pages and structured data.

import scrapy

class MySpider(scrapy.Spider):

name = ‘example’

start_urls = [‘https://example.com’]

def parse(self, response):

title = response.css(‘title::text’).get()

yield {‘title’: title}

  1. Selenium for Dynamic Content:

Using Selenium to automate a web browser, allowing interaction with dynamically loaded content through JavaScript.

  • Use Cases: Useful when content is rendered dynamically and traditional scraping methods may not capture it.

from selenium import webdriver

url = ‘https://example.com’

driver = webdriver.Chrome()

driver.get(url) # Extracting data using Selenium

title = driver.title

  1. API Scraping:

Accessing a website’s data through its API (Application Programming Interface) rather than parsing HTML. Requires knowledge of API endpoints and authentication methods.

  • Use Cases: Preferred when the website provides a well-documented and stable API.
  1. Headless Browsing:

Running a browser in headless mode (without a graphical user interface) to perform automated tasks, similar to Selenium but without displaying the browser.

  • Use Cases: Useful for background scraping without the need for a visible browser window.

Best Practices and Considerations:

  • Respect Robots.txt:

Always check the website’s robots.txt file to ensure compliance with its scraping policies.

  • Use Delay and Throttling:

Introduce delays between requests to avoid overwhelming the website’s server and to mimic human behavior.

  • Handle Dynamic Content:

For websites with dynamic content loaded via JavaScript, consider using tools like Selenium or Splash.

  • User-Agent Rotation:

Rotate user agents to avoid detection and potential IP blocking by websites.

  • Legal and Ethical Considerations:

Be aware of legal and ethical implications; ensure compliance with terms of service and applicable laws.

error: Content is protected !!