Wednesday, 30 March 2016

MCQ Question Answer Software Free Download


Download complete MCQ Question Answer Total Free of cost for 32 bit


Download Computer Fundamental Test

Language Processor

Basically Translater i.e. Compiler and Interpreter 

If a language processor is a translator that produces machine or assembly code as output (in object code or executable code) then it is called a compiler. If the language processor executes the translated program (output from the translator) then it is called an interpreter.

Next Topic

Relocatable VS Non- Relocatable Programming

A relocatable program may use many part of memory address in run time of a program. This type of program uses relative addressing and its address space can be change at run as requirement.

A Non-Relocatable program runs in  fix address space. Location of program data fix at the time of compilation.

Tuesday, 29 March 2016

Graphics : Draw Hut Using VB.Net


 Dim myPen As New System.Drawing.Pen(System.Drawing.Color.White)
        Dim formGraphics As System.Drawing.Graphics
        formGraphics = Me.CreateGraphics()
        formGraphics.DrawLine(myPen, 300, 135, 800, 175)
        formGraphics.DrawLine(myPen, 300, 135, 175, 300)
        formGraphics.DrawLine(myPen, 300, 135, 400, 300)

Byte Code

" Middle level output of a compiler "


High level languages like (C,C++,Java,C#) are  easy to code , Programmer write code using a text editor or IDE  provide by related language compiler called source code.

Source code cannot run direct by computer it need to be transform into machine language by compiler.

Difference between Syntax and Semantic

Syntax Symantic
Syntax is related to language grammar, i.e. in C language every statement is terminated by semicolon (;) if you missed it, then compiler will generate a syntax error (statement is missing) Semantic is related to meaning which cannot be detected by the compiler. Wrong implementation of a logic will not produce expected output. For example, we know when the product of a number has to calculate then we must use (*) if by mistake or any other reason (+) are there then it is semantic bug.

Next Topic

Sunday, 27 March 2016

XML VS Json


Fetch Data From Server With Json

data.json file code :


{"Roll":"101","name": "Sona", "city": "Australia"}

HTML Code


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Girfa : Json Tutorial Read Data From Server File</title>
<script language="javascript">
function readData(){

Tuesday, 22 March 2016

Data Communication and Networking MCQ Question Answer

1. Network of networks is known as _________
A. intranet.
B. internet.
C. Local Area Network
D. WAN.
ANSWER: B
2. A computer networks can provide a powerful _________ among employees.
A. communication medium.
B. community development.
C. relationship development.
D. relationship development.

Networking Basic MCQ Question Answer

11.1 Internet is

a. a local computer network

b. a world wide network of computers

c. an interconnected network of computers

d. a world wide interconnected network of computers which use a common protocol to communicate with one another

11.2 The facilities available in the internet are

(i) electronic mail

(ii) remote login

(iii)file transfer

(iv)word processing

SYSTEM ANALYSIS AND DESIGN MCQ Question Answer


Q. 1 …………………………. is an important factor of management information system.
A) System
B) Data
C) Process
D) All
ANS:     A) System
Q.3 ………………………….. level supply information to strategic tier for the use of top management.
A) Operational
B) Environmental
C) Competitive
D) Tactical
ANS:  D) Tactical
Q.4  In a DFD external entities are represented by a
A) Rectangle
B) Ellipse
C) Diamond shaped box
D) Circle

HTML MCQ Question - Answer




1. A webpage displays a picture. What tag was used to display that picture?
a. picture
b. image
c. img
d. src
2. <b> tag makes the enclosed text bold. What is other tag to make text bold?
a. <strong>
b. <dar>
c. <black>
d. <emp>
3. Tags and test that are not directly displayed on the page are written in _____ section.
a. <html>
b. <head>
c. <title>
d. <body>

Excel Practice File : Attendance Sheet


Download Excel File 

Sale Invoice

Excel Sale Invoice practice File

Download Excel File

Inquiry Report 
Inquiry Report

Rate Depreciation List for Car Sale

Rate Depreciation List for Car Sale


Sunday, 20 March 2016

RSA Alogorithm

The RSA algorithm is an example of asymmetric cryptography, which is widely used in worldwide for securing sensitive while sending insecure medium like the internet.

RSA was first described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology. Two types of keys are used, public and private. Private is secrete key used by the owner or receiver. Data can be encrypted using a public or private key, but decryption can be done only with the private key.

Saturday, 19 March 2016

Form Validation,File Type Validation : Javascript

It’s a good practice to validate your form using script before sending because it’s giving quick response than server validity. But keep in mind server validation is always necessary because JavaScript may be disabled by the user. So server validation is mandatory. I am presenting complete code for validating a check box, textbox and file. My main focus is on file validating because file validation is complicated task for new web developers So this will help you a lot.

<html>
<head>
<title>Java script form validation ; Girfa</title>
<script language="javascript">
function validate_mar_news(pic,fl,code) //validate add news pic for home page marquee
{
var check_box=document.getElementById(pic);
var file=document.getElementById(fl);
var code=document.getElementById(code);
var flag=true;
if(check_box.value=="Select Page Number")
{

Friday, 18 March 2016

Object oriented programming and UML Objective (MCQ) Questions

9.1 Computer systems are designed by

a. simplifying requirements of system

b. breaking of the system into smaller self-contained co-operating subsystems
c. breaking up the systems into independent parts

d. modular design

9.2 Functions and procedures are

a. not useful in designing computer systems

b. old fashioned and they are not useful

c. useful in designing computer systems

d. have side effects which require special care if they are used as subsystems

MS Access MCQ Question/Answer

1. What Are The Different Views To Display A Table

 A) Datasheet View
 B) Design View
 C) Pivote Table & Pivot Chart View
 D) All Of Above

2. Which Of The Following Creates A Drop Down List Of Values To Choose From?

 A) Ole Object
 B) Hyperlink
 C) Memo
 D) Lookup Wizard

Thursday, 17 March 2016

PHP Inheritance

class test
{
function test_base()
{
echo "<br>Base class function";
}

}

class client extends test
{
function client_function()
{
echo "<br>Inside of client function ";
}
}

PHP Class Object Tutorial

class test
{
function test_class()
{
echo "<h1>by default function is public visibility </h1>";
}
function add_num($n1,$n2)
{
return $n1+$n2;
}
private function test_private()
{
echo "<h2> For making private function private keyword is used </h2>";
}
function access_private()
{
$this->test_private();
}
}

Wednesday, 16 March 2016

Difference between Top-Down and Bottom- Up Programming

Top Down Programming

Top down approach is used by procedure oriented language like C. In this concern A problem is solved by the top level wise i.e. A main function is created which draw a sketch that how will our program be started and then find out the low level modules further. The problem is divided into the sub modules and implemented each coding separately, which called and control by the main function. Top down approach is no longer popular today.

Bottom Up Programming


Bottom up approach is used by the object oriented language like C++, Java, C#, VB.Net, etc. In this approach design starts with bottom level , by inside of a class. Ones A class is implemented, then object of that class is created. A main function is generally also used here like procedure oriented  languages as a starting point, but it’s used only to call the class functions.

Tuesday, 15 March 2016

Calculate Totient number from given number



Q : Write a program to get Totient number from given number?


[     Totient number = All prime number(M)<given prime number(N)
      l.e. N=10
     M={1,3,5,7}=4
]

Answer : 


/*   ::: Girfa :::
http://girfahelp.blogspot.in/p/c-language.html
program : get all prime number less than given number   */

Monday, 14 March 2016

Symmetric Encryption



 " Data format changed using a secret key and can be decrypted only with this secret key receiver must have the secret key for decrypt message. Symmetric Encryption. " 

Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key,

Bridge : Computer Network



  " Bridge is May be a combination of hardware and software or individual is used to connect two segment of same LAN (Same IP Domain). Bridge decreases the network traffic and also used to connect two different platform LANs like UNIX and Windows.


    A network bridge is software or hardware that connects two or more networks so that they can communicate.
    People with home or small office networks generally use a bridge when they have different types of networks but they want to exchange information or share files among all of the computers on those networks.
     Here's an example. Let's say you have two networks: in one, the computers are connected with cables; and in the other, the computers are connected using wireless technology. The wired computers can only communicate with other wired computers, and the wireless computers can only communicate with other wireless computers. With a network bridge, all of the computers can communicate with each other.

Sunday, 6 March 2016

Reading PHP and MySQL a Single Value from a table



When you want to read a single value from a MySQL table following code will help you.

Your need to fetch row using query function with following syntax

     [connection_object]->query(sql statement)

After fetched rows use mysqli_fetch_assoc function for access row by row records
   
    Var_name= mysqli_fetch_assoc([connection_object]->query(SQL Statement))

mysqli_fetch_assoc returns one dimensional array so use can use table column name as index

Thursday, 3 March 2016

What is cable Modem


" Simply Dish cable connection to homes "


A cable modem is used in homes for cable services provide by the service provider.Coaxial cable is used to connect our home to cable operator office a modem is attached with television, which convert analog signal to digital signal Vice-Versa.