Sunday 22 May 2016

Paper IT Tools and Business Systems -July-2010

M1-R4: IT TOOLS AND BUSINESS SYSTEMS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and
PART TWO contains FIVE questions.
2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer book
for PART TWO immediately after handing over the answer sheet for PART ONE.

TOTAL TIME: 3 HOURS                                                                               TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1x10)
1.1 Which of the following is a non-volatile memory?
A) Random Access Memory
B) Read Only Memory
C) Virtual Memory
D) Cache Memory
1.2 MIDI means
Answer

Thursday 19 May 2016

Line Configuration

A network is a combination of more than one devices which connect from some medium (wire , wireless) called channel line configuration refer physical communication channel  access method . Three types of access method are follows..


  • Point to Point
  • Multi Point

Sunday 15 May 2016

Computer Fundamental MCQ answer

This is 50 question/answer set useful for BCA, MCA, O Level,CCC,PGDCA students 

Q 1 : Basic Application of computer
(A)Education
(B)Games
(C)Business
(D)All the above

Q 2 : Technology after IC
(A)LSI
(B)VLSI
(C)SSI
(D)All the above

Thursday 12 May 2016

Difference between Computer Architecture and Computer Orgzanization

Computer organization

This is implementation of Computer Architecture. It deals with operational feature of computer that how hardware are working by Computer Architecture and helps programmer to understand working model of hardware and enables them coding for accessing different method of hardware and interrupt ,control signal etc.

Tuesday 10 May 2016

Modes of channel operation

Mode of channel operation define accessing mode of the medium for send and receive data. Types and examples of different types of modes are follows

Simplex

Data in simplex channel is always moves in one direction. Simplex is suitable for many kind of application where reply is necessary because it is not possible to send back error or control signals to the transmit end.

Monday 9 May 2016

Proper Case String VB

Function Name : StrConv

Convert a string into desire specified format.

Syntax

StrConv(String,VbStrConv) as String 

Tuesday 3 May 2016

Difference Between Coupling and Cohesion

Coupling Indicate the relationship between the different modules. Cohesion indicates a relation inside of a single module.
Coupling Cohesion

Saturday 30 April 2016

Resized and Saved Uploaded Image in PHP

Image resizing is an important task because if uploaded image size is bigger than requirement and we are not resizing it then it will consume server space and bandwidth which is not good.
So Resizing is necessary .you need to use four PHP GD functions for achieve this.

imagejpeg PHP GD Function

Creates and output an image to browser or saved into a file

Syntax:

bool imagejpeg ( resource $image [, string $filename [, int $quality ]] )

imagecopyresized PHP GD Function

Copy and resized the specific part of an image

Syntax:

bool imagecopyresized ( resource $dst_image , resource $src_image , int $dst_x , int $dst_y , int $src_x , int $src_y , int $dst_w , int $dst_h , int $src_w , int $src_h )

imagecreatefromjpeg PHP GD Function

Create a new image from a url or uploaded by file control

syntax:

resource imagecreatefromjpeg ( string $filename )

Argument Detail:

filename Path to the JPEG image.

Return Values :

imagecreatetruecolor PHP GD Function

The imagecreatetruecolor () function is used in PHP to create a new true color image using the GD Library.

resource imagecreatetruecolor ( int $width , int $height )

width
Image width for creating

height
Image height for creating

getimagesize PHP Function

Get the size of an image

array getimagesize ( string $filename [, array &$imageinfo ] )

The getimagesize() function will determine the size of any given image file and return the dimensions along with the file type and a height/width text string to be used inside a normal HTML IMG tag and the correspondent HTTP content type.

list($width, $height) = getimagesize($_FILES['file']['tmp_name']);
echo $width;
echo $height;

Thursday 28 April 2016

Difference between Terminal and Non-Terminal Symbols (Compiler Design)


Terminal Symbol

  • A terminal is a symbol which does not appear on the left-hand side of any production.
  • Terminal symbols cannot be changed using the rules of the grammar.
  • terminal symbols, which are the characters of the alphabet that appear in the strings generated by the grammar.
  • a terminal symbol is one that cannot be broken down further, e.g. a literal character or digit (but not necessarily as it depends on the grammar).
example : Contant etc

Monday 25 April 2016

Histogram Digital Image Processing

The histogram is in digital image processing used to indicate the intensity of colors with the help of graph as follows

Wednesday 20 April 2016

Passing Dynamic Array to function in php

<?php
function test_array($ar)
{
for($i=0;$i<count($ar);$i++)
{
  echo  "<br>" . ($i+1) . "'st element value " . $ar[$i];
}
}
?>

Monday 18 April 2016

Get Record gridview to window control by select a row form gridview


Private Sub DataGridView1_RowHeaderMouseClick_1(ByVal sender As System.Object, ByVal e As System.Windows.Forms.DataGridViewCellMouseEventArgs) Handles DataGridView1.RowHeaderMouseClick

Context Free Grammar

     The analysis phase of a compiler breaks up a source program into constituent pieces and produces an internal representation for it, called intermediate code. The synthesis phase translates the intermediate code into the target program. 

     Analysis is organized around the "syntax" of the language to be compiled. The syntax of a programming language describes the proper form of its programs, while the semantics of the language defines what its programs mean; that is, what each program does when it executes. For specifying syntax, we present a widely used notation, called context-free grammars or BNF (for Backus-Naur Form)

Compilation Process

=====> COMPILATION PROCESS <======

                     |
                     |---->  Input is Source file(.c)
                     |
                     V
            +=================+
            |                 |
            | C Preprocessor  |
            |                 |
            +=================+
                     |
                     | ---> Pure C file ( comd:cc -E <file.name> )
                     |
                     V
            +=================+
            |                 |
            | Lexical Analyzer|
            |                 |
            +-----------------+

Sunday 17 April 2016

Print array without using loop in c language

Q . Write a program to print an array value without using loop.

#include<stdio.h>
#include<conio.h>
/*  Girfa : student Help
    for more question visit: http://girfahelp.blogspot.in/2012/09/some-program-of-c-language.html
*/
void main()
{ int ar[5],i=0;
clrscr();
goinput:
if(i<5)
{

Saturday 16 April 2016

Scrollbar Using HTML

<html>
<head>
<title>
Girfa : Scrollbar Demo
</title>
</head>
<body>

Friday 15 April 2016

Image Map Highlighter

Image Map Highlighter

Image map is used to provide different type of links on image at a any specific place.

Image map help you to provide many links on a single image which is requirement of many fields. I am going to show you an example of e paper for a print paper which is totally based on image map ..


Thursday 14 April 2016

Office and Computer Fundamental MCQ Question Answer

Microsoft-Office-MCQ-Question-Answer

1 By default how many tabs are shown in word
(A)7
(B)8
(c )9
(D)6
2 shortcut of subscript in word
(A)Contl+=
(B)Cntl+=
(c )Cntl++
(D)Both a & b
3 Type writer font
(A)typeface
(B)algerian
(c )times new roman
(D)Courier

Wednesday 13 April 2016

Password Validation Check C Language Program

#include<stdio.h>
#include<conio.h>
/******************************************
Develop By Girfa
Visit : http://girfahelp.blogspot.in/2012/09/some-program-of-c-language.html
*******************************************/
void main()
{
char pass[20],ch;
int i,number,special,capital,small;
number=special=capital=small=0;
clrscr();

Tuesday 12 April 2016

3gvs4g

3G vs 4G

Sunday 10 April 2016

CCC (Computer Basic) MCQ Question Answer



1 a sesitive device that convert printed material into its equivalent digital form
 (A)scanner (B)ocr ( C)a and b (D)None of these

2 Which protocol provide email facility
 (A)FTTP (B)SMTP ( C)SNTP (D)HDLC

3 The basic architecture for digital computer was developed by
 (A)Bill Gates (B)Charles Babbage ( C)John Von Neumann (D)Garden Moore

4 Decimal (128) Hex Equal is (?) 
 (A)20 (B)30 ( C)40 (D)80

Thursday 7 April 2016

Image Map HTML

<html>
<head>
<title>Girfa : Image Map</title>
</head>
<body>
<img src="1.jpg" usemap="#planetmap" >
<map name="planetmap" >
  <area shape="rect" coords="0,0,82,126" href="2.htm" alt="Sun" title="Get Report">
  <area shape="rect" coords="150,90,320,620" href="2.jpg" alt="Sun" title="Strong Man">
  </map>
</body>
</html>

Color-Tringle-c-clanguage-program

Color Triangle C Language Program with full code.This program creates a dynamic triangle based on user input and print message when  tringle size exceeded.

Color C Language Program outpur screen

#include<stdio.h>
#include<conio.h>
/* Girfa : Student Help
   Color triangle example
   for program visit :
   http://girfahelp.blogspot.in/p/c-language.html
*/
void main()
{

Wednesday 30 March 2016

MCQ Question Answer Software Free Download


Download complete MCQ Question Answer Total Free of cost for 32 bit


Download Computer Fundamental Test

Language Processor

Basically Translater i.e. Compiler and Interpreter 

If a language processor is a translator that produces machine or assembly code as output (in object code or executable code) then it is called a compiler. If the language processor executes the translated program (output from the translator) then it is called an interpreter.

Next Topic

Relocatable VS Non- Relocatable Programming

A relocatable program may use many part of memory address in run time of a program. This type of program uses relative addressing and its address space can be change at run as requirement.

A Non-Relocatable program runs in  fix address space. Location of program data fix at the time of compilation.

Tuesday 29 March 2016

Graphics : Draw Hut Using VB.Net


 Dim myPen As New System.Drawing.Pen(System.Drawing.Color.White)
        Dim formGraphics As System.Drawing.Graphics
        formGraphics = Me.CreateGraphics()
        formGraphics.DrawLine(myPen, 300, 135, 800, 175)
        formGraphics.DrawLine(myPen, 300, 135, 175, 300)
        formGraphics.DrawLine(myPen, 300, 135, 400, 300)

Byte Code

" Middle level output of a compiler "


High level languages like (C,C++,Java,C#) are  easy to code , Programmer write code using a text editor or IDE  provide by related language compiler called source code.

Source code cannot run direct by computer it need to be transform into machine language by compiler.

Difference between Syntax and Semantic

Syntax Symantic
Syntax is related to language grammar, i.e. in C language every statement is terminated by semicolon (;) if you missed it, then compiler will generate a syntax error (statement is missing) Semantic is related to meaning which cannot be detected by the compiler. Wrong implementation of a logic will not produce expected output. For example, we know when the product of a number has to calculate then we must use (*) if by mistake or any other reason (+) are there then it is semantic bug.

Next Topic

Sunday 27 March 2016

XML VS Json


Fetch Data From Server With Json

data.json file code :


{"Roll":"101","name": "Sona", "city": "Australia"}

HTML Code


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Girfa : Json Tutorial Read Data From Server File</title>
<script language="javascript">
function readData(){

Tuesday 22 March 2016

Data Communication and Networking MCQ Question Answer

1. Network of networks is known as _________
A. intranet.
B. internet.
C. Local Area Network
D. WAN.
ANSWER: B
2. A computer networks can provide a powerful _________ among employees.
A. communication medium.
B. community development.
C. relationship development.
D. relationship development.

Networking Basic MCQ Question Answer

11.1 Internet is

a. a local computer network

b. a world wide network of computers

c. an interconnected network of computers

d. a world wide interconnected network of computers which use a common protocol to communicate with one another

11.2 The facilities available in the internet are

(i) electronic mail

(ii) remote login

(iii)file transfer

(iv)word processing

SYSTEM ANALYSIS AND DESIGN MCQ Question Answer


Q. 1 …………………………. is an important factor of management information system.
A) System
B) Data
C) Process
D) All
ANS:     A) System

Q.3 ………………………….. level supply information to strategic tier for the use of top management.
A) Operational
B) Environmental
C) Competitive
D) Tactical
ANS:  D) Tactical

Q.4  In a DFD external entities are represented by a
A) Rectangle
B) Ellipse
C) Diamond shaped box
D) Circle

HTML MCQ Question - Answer




1. A webpage displays a picture. What tag was used to display that picture?
a. picture
b. image
c. img
d. src
2. <b> tag makes the enclosed text bold. What is other tag to make text bold?
a. <strong>
b. <dar>
c. <black>
d. <emp>
3. Tags and test that are not directly displayed on the page are written in _____ section.
a. <html>
b. <head>
c. <title>
d. <body>

Excel Practice File : Attendance Sheet


Download Excel File 

Sale Invoice

Excel Sale Invoice practice File

Download Excel File

Inquiry Report 
Inquiry Report

Rate Depreciation List for Car Sale

Rate Depreciation List for Car Sale


Sunday 20 March 2016

RSA Alogorithm

The RSA algorithm is an example of asymmetric cryptography, which is widely used in worldwide for securing sensitive while sending insecure medium like the internet.

RSA was first described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology. Two types of keys are used, public and private. Private is secrete key used by the owner or receiver. Data can be encrypted using a public or private key, but decryption can be done only with the private key.

Saturday 19 March 2016

Form Validation,File Type Validation : Javascript

It’s a good practice to validate your form using script before sending because it’s giving quick response than server validity. But keep in mind server validation is always necessary because JavaScript may be disabled by the user. So server validation is mandatory. I am presenting complete code for validating a check box, textbox and file. My main focus is on file validating because file validation is complicated task for new web developers So this will help you a lot.

<html>
<head>
<title>Java script form validation ; Girfa</title>
<script language="javascript">
function validate_mar_news(pic,fl,code) //validate add news pic for home page marquee
{
var check_box=document.getElementById(pic);
var file=document.getElementById(fl);
var code=document.getElementById(code);
var flag=true;
if(check_box.value=="Select Page Number")
{

Friday 18 March 2016

Object oriented programming and UML Objective (MCQ) Questions

9.1 Computer systems are designed by

a. simplifying requirements of system

b. breaking of the system into smaller self-contained co-operating subsystems
c. breaking up the systems into independent parts

d. modular design

9.2 Functions and procedures are

a. not useful in designing computer systems

b. old fashioned and they are not useful

c. useful in designing computer systems

d. have side effects which require special care if they are used as subsystems

MS Access MCQ Question/Answer

1. What Are The Different Views To Display A Table

 A) Datasheet View
 B) Design View
 C) Pivote Table & Pivot Chart View
 D) All Of Above

2. Which Of The Following Creates A Drop Down List Of Values To Choose From?

 A) Ole Object
 B) Hyperlink
 C) Memo
 D) Lookup Wizard

Thursday 17 March 2016

PHP Inheritance

class test
{
function test_base()
{
echo "<br>Base class function";
}

}

class client extends test
{
function client_function()
{
echo "<br>Inside of client function ";
}
}

PHP Class Object Tutorial

class test
{
function test_class()
{
echo "<h1>by default function is public visibility </h1>";
}
function add_num($n1,$n2)
{
return $n1+$n2;
}
private function test_private()
{
echo "<h2> For making private function private keyword is used </h2>";
}
function access_private()
{
$this->test_private();
}
}

Wednesday 16 March 2016

Difference between Top-Down and Bottom- Up Programming

Top Down Programming

Top down approach is used by procedure oriented language like C. In this concern A problem is solved by the top level wise i.e. A main function is created which draw a sketch that how will our program be started and then find out the low level modules further. The problem is divided into the sub modules and implemented each coding separately, which called and control by the main function. Top down approach is no longer popular today.

Bottom Up Programming


Bottom up approach is used by the object oriented language like C++, Java, C#, VB.Net, etc. In this approach design starts with bottom level , by inside of a class. Ones A class is implemented, then object of that class is created. A main function is generally also used here like procedure oriented  languages as a starting point, but it’s used only to call the class functions.

Tuesday 15 March 2016

Calculate Totient number from given number



Q : Write a program to get Totient number from given number?


[     Totient number = All prime number(M)<given prime number(N)
      l.e. N=10
     M={1,3,5,7}=4
]

Answer : 


/*   ::: Girfa :::
http://girfahelp.blogspot.in/p/c-language.html
program : get all prime number less than given number   */

Monday 14 March 2016

Symmetric Encryption



 " Data format changed using a secret key and can be decrypted only with this secret key receiver must have the secret key for decrypt message. Symmetric Encryption. " 

Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key,

Bridge : Computer Network



  " Bridge is May be a combination of hardware and software or individual is used to connect two segment of same LAN (Same IP Domain). Bridge decreases the network traffic and also used to connect two different platform LANs like UNIX and Windows.


    A network bridge is software or hardware that connects two or more networks so that they can communicate.
    People with home or small office networks generally use a bridge when they have different types of networks but they want to exchange information or share files among all of the computers on those networks.
     Here's an example. Let's say you have two networks: in one, the computers are connected with cables; and in the other, the computers are connected using wireless technology. The wired computers can only communicate with other wired computers, and the wireless computers can only communicate with other wireless computers. With a network bridge, all of the computers can communicate with each other.

Sunday 6 March 2016

Reading PHP and MySQL a Single Value from a table



When you want to read a single value from a MySQL table following code will help you.

Your need to fetch row using query function with following syntax

     [connection_object]->query(sql statement)

After fetched rows use mysqli_fetch_assoc function for access row by row records
 
    Var_name= mysqli_fetch_assoc([connection_object]->query(SQL Statement))

mysqli_fetch_assoc returns one dimensional array so use can use table column name as index

Thursday 3 March 2016

What is cable Modem


" Simply Dish cable connection to homes "


A cable modem is used in homes for cable services provide by the service provider.Coaxial cable is used to connect our home to cable operator office a modem is attached with television, which convert analog signal to digital signal Vice-Versa.

Saturday 27 February 2016

Baseband



Mainly used in LAN in which entire capacity of the medium is dedicated to a particular device, Simple and small than broad band.

     Digital communication technology in which (in contrast to 'broadband') the entire bandwidth (data carrying capacity) of a medium such as a wire, cable, or channel, is used to transmit a single signal. Therefore, only one communication channel is available at any given time. Baseband is cheaper and simpler (though less versatile) technology than broadband, and is employed in most types of local area networks such as Ethernet and Token Ring.

Why was the OSI developed


  • Educational purpose
  • To make a standard which help to vender for developed network hardware
  • Making a good understanding people of networking concept
  • It’s just a model which help making networking concept more depict able 
  • Making Layering concept more clear than TCP/IP

Directory Service


User friendly information about network resources

     A directory service or name service, maps the names of network resources to their respective network addresses. With the name service type of directory, a user does not have to remember the physical address of a network resource; providing a name locates the resource. Each resource on the network is considered an object on the directory server. Information about a particular resource is stored as attributes of that object. Information within objects can be made secure so that only users with the available permissions are able to access it. More sophisticated directories are designed with namespaces as Subscribers, Services, Devices, Entitlements, Preferences, Content and so on. This design process is highly related to Identity management.

Friday 26 February 2016

C Language program to shift array element with previous one


/* Girfa : C Language program to shift array element with previous one*/
/* Find more question Answer on http://girfahelp.blogspot.in/2012/09/some-program-of-c-language.html */
#include<stdio.h>
#include<conio.h>
void main()
{
int ar[5],i,j;
clrscr();
for(i=0;i<5;i++)
ar[i]=i+1;

Thursday 25 February 2016

Subnet Mask - Subnetting

   The subnet mask is used to divide a network into a further sub network within A private network. Subnetting can be used for security purpose in many cases it enable a network administrator to divide a college network for example into many departments like Botany, Art and Science group network.

   Subnetting is applied on host id we reserve host id bits for subnetting from left to right following example depict all aspects of operation 

What is Subnetting?

Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format.

The full address is:

Soft carriage Return

A soft break or soft return is a carriage return automatically inserted by the software program usually because of a word wrap. Soft returns allow you to continue typing without having to press the return key manually at the end of each line. The picture shows an example of soft returns with formatting marks enabled. The soft returns look like an arrow that goes down and then points to the left, much like the arrow seen on the enter key.


In the picture above blue line indicate hard carriage return and red soft carriage return.

Wednesday 24 February 2016

Narrowband ISDN

The first generation of ISDN is called as a narrowband ISDN and it is based on the use of 64 kbps channel as the basic unit of switching and has a circuit switching orientation. The main device in the narrowband ISDN is the frame relay. The second generation of ISDN is referred to as the broadband ISDN (B-ISDN).

Trunk in networking

Trunk


Trunk (Branches between exchanges) in networking is links which enables to connect many clients from a network through sharing a medium or wire frequency we can take example of tree for better understand of trunk.
Tree has a root and many branches whose fulfill their requirement from root.

A trunk is a single transmission channel between two points, each point being either the switching center or the node.

Telephone Local Loop

What is a 'Local Loop'?

The Local Loop in a telephone network (sometimes referred to as the "last mile" of the network) is
the bit that connects your home to your local telephone exchange. It refers literally to the copper
cables that run from your home to the telephone exchange.

Tuesday 23 February 2016

Dynamic Array in PHP

     The array is a collection of similar data types which occupies continuous location in memory. There are two types of array static and dynamic. In dynamic array size can be decreased and increase as requirement which best uses of memory utilization on the other hand static array is fixed in nature you cannot increase and decrease array capacity when require so it’s not popular in PHP. We deal with mostly dynamic array in PHP.

Dynamic Array example code :

<?php

$ar=array("Red","Green","Blue");
for($i=0;$i<count($ar);$i++)
{
echo  "<br>" . ($i+1) . "'st element value " . $ar[$i];
}
?>

Example 2:

$ar[]="";
for ($i = 0; $i <$10; $i++)
{
array_push($ar,$i);
}

for($i=0;$i<count($ar);$i++)
echo "<h2>" . $ar[$i] . "</h2>";

Monday 22 February 2016

Thrashing

     If the number of frames allocated to a low-priority process falls below the minimum number required by the computer architecture, we must suspend that process's execution. We should then page out its remaining pages, freeing all its allocated frames. This provision introduces a swap-in, swap-out level of intermediate CPU scheduling.

     In fact, look at any process that does not have "enough" frames. If the process does not have the number of frames it needs to support pages in active use, it will quickly page-fault. At this point, it must replace some page. However, since all its pages are in active use, it must replace a page that will be needed again right away. Consequently, it quickly faults again, and again, and again, replacing pages that it must bring back in immediately.

     This high paging activity is called thrashing.A process is thrashing if it is spending more time paging than executing.

Reason of Thrashing

     Thrashing results in severe performance problems. Consider the following scenario, which is based on the actual behavior of early paging systems.

SHA1 PHP encryption function

SHA1 accept a string as a key and return hash string which is encrypted. For decryption key is required, which is used in the encryption.

Syntax

string sha1 ( string $str [, bool $raw_output = false ] )

If the optional raw_output is set to TRUE, then the sha1 digest is instead returned in raw binary format with a length of 20, otherwise the returned value is a 40-character hexadecimal number.

Sunday 21 February 2016

Preemption in OS

In computing, preemption is the act of temporarily interrupting a task being carried out by a computer system, without requiring its cooperation, and with the intention of resuming the task at a later time. Such a change is known as a context switch. It is normally carried out by a privileged task or part of the system known as a preemptive scheduler, which has the power to preempt, or interrupt, and later resume, other tasks in the system.

Friday 19 February 2016

Tags - Display HTML code in HTML

There are many times when we want to show HTML tags on our web page mainly when we make some HTML tutorial type application. This enables you to show an HTML code example on your webpage. Following code help you


<xmp>
<h1>Test </h1>
</xmp>

&lt marquee &gt

Thursday 18 February 2016

PHP Variable Scope

Local Variable

     A local variable is accessible only the block where it has defined. When a code block over then the entire local variable inside of block automatically released by the compiler.
<?php
           
            function fun1()
            {                      
                        $a=10;
                        echo $a;
            }
            function fun2()
            {
                        echo $a+10;
                        // Error : Undefined variable: a because it has not defined in fun2 and a is local variable for  fun1
            }          
?>
<?php
            //fun1();
            fun2();
?>

Global Variable

     The scope of a PHP variable depends on where it has defined I.e. when a variable is declared in top side of the PHP code block, then it becomes global variable for all PHP code block but not inside of a function.

Saturday 13 February 2016

M4.1-R4 Application of .NET Technology

M3-R4 Programming and Problem Solving through ‘C’ language

Internet Technology and Web Design

IT Tools and Business Systems

Thursday 11 February 2016

HTML: Special Characters

Punctuation
HTML Entity(case sensitive)
ISO Latin-1 code
name or meaning
&ndash;
&#8211;
en dash
&mdash;
&#8212;
em dash
¡
&iexcl;
&#161;
inverted exclamation
¿
&iquest;
&#191;
inverted question mark
"
&quot;
&#34;
quotation mark
&ldquo;
&#8220;
left double curly quote
&rdquo;
&#8221;
right double curly quote
'

&#39;
apostrophe (single quote)
&lsquo;
&#8216;
left single curly quote
&rsquo;
&#8217;
right single curly quote
«


»

Wednesday 10 February 2016

Java Script Then and Now

Java Script Then and Now

HTML VS CSS

HTMLvsJavaScript

Tuesday 9 February 2016

HTML Tutorial

HTML-Banner


What Is HTML?

HTML is a markup language, not a programming language. In fact, the term HTML is an acronym that stands for Hypertext Markup Language. You can apply this markup language to your pages to display text, images, sound and movie files, and almost any other type of electronic information. You use the language to format documents and link them together, regardless of the type of computer with which the file was originally created.
HTML is written as plain text that any Web browser or word processing software can read. The software does this by identifying specific elements of a document (such as heading, body, and footer), and then defining the way those elements should behave. These elements, called tags, are created by the World Wide Web Consortium (W3C).
simple HTML page
<html>
<head>
<title>My Second Web Page</title>
</head>
<body>
Place Your Code Here
</body>
</html>

Paragraphs


In HTML, a paragraph is created whenever you insert text between the <p> tags
<p>This is my first XHTML page.</p>

Headings
HTML enables you to add six different heading tags to your pages by using the tags <h1><h6>. These tags are very simple to use.

<h1>This is Heading 1</h1>

Saturday 6 February 2016

Object Oriented Programming (OOPS)

Object Oriented Programming Banner OOP

Class

     In object oriented programming basic working unit start with a class. Class is a template which comprises all the aspect of an object which is a instance of a class.

     In OOP we first create a class to solve any problem. A Class is divide into two parts first is Data section other is function or method section. In data section we get data member which are needed to solve a problem and function section we implement function section functions are defined which handle data.

Class Diagram example OOPs

Monday 1 February 2016

How to make HTML File using PHP

If you are familiar with C filing programming then your knowledge will be work here. Just copy and paste the following complete code and implement your logic as you want 

<?php 
if($_POST['submit'])
{
$myfile = fopen($_POST['fnm'].".html", "w") or die("Unable to open file!");
;
fwrite($myfile, $_POST['msg']);
fclose($myfile);
}
?>

YouTube HTML 5 Embed iframe code from URL with PHP

Hi folks
I was making a website and my client request me to upload youtube video on his website. For do this take some fact about youtube video



  • When upload video. Youtube provide a unique URL for every uploaded video which user can use to share their video to other platform or other youtube user.
  • Iframe is used to show youtube video on other website
  • An embedded URL need in iframe SRC