Friday 6 January 2017

Write a program that accept two string one for main string and second string will store some word and remove this word form main string?

Question : Write a program that accept two string one for main string and second string will store some word and remove this word form main string?

Input : ram is a good boy
Search string : ram good
Output : is a boy

Solution : 

import java.util.*;

Write a program which accept input from user and print the word which has consecutive repeated Character?

Question : Write a program which accept input from user and print the word which has consecutive repeated Character?

Input  :  An apple is banana and banana is apple.

Output : apple,banana,banana,apple

Solution : 
import java.util.*;

Write a program which accept input of full path of a file and produce following output?

Question : Write a program which accept input of full path of a file and produce following output?

Input : C:/Users/Public/Pictures/SamplePictures/Desert.jpg
Output :
Extension : jpg
File Name : Desert
Path : C:/Users/Public/Pictures/SamplePictures

Solution :

Tuesday 3 January 2017

UGC Net Computer Science Paper II Dec 12,Page 5 (Solve)

UGC Net Computer Science Paper II Dec 12,Page 5 (Solve)
41. Enumeration is a process of
(A) Declaring a set of numbers
(B) Sorting a list of strings
(C) Assigning a legal values possible for a variable
(D) Sequencing a list of operators
Answer C
Explanation : Enumeration is a special datatype which provide an integer number sequence to its member which help to track some common properties with meaning full name instead of number like color names

42. Which of the following mode declaration is used in C++ to open a file for input ?
(A) ios : : app
(B) in : : ios
(C) ios : : file
(D) ios : : in
Answer D
Explanation : ios::in allows input (read operations) from a stream.ios::out allows output (write operations) to a stream.

43. Data Encryption Techniques are particularly used for ______.
(A) protecting data in Data Communication System.
(B) reduce Storage Space Requirement.
(C) enhances Data Integrity.
(D) decreases Data Integrity.
Answer A
Explanation : when we send our data through public network then eavesdropping risk become high So we need some technique which increase security when data is send through public network.

Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. Two main types of data encryption exist - asymmetric encryption, also known as public-key encryption, and symmet

44. Let L be a set accepted by a non deterministic finite automaton. The number of states in non-deterministic finite automaton is |Q|. The maximum number of states in equivalent finite automaton that accepts L is
(A) |Q|
(B) 2|Q|
(C) 2|Q| – 1
(D) 2|Q|
Answer D
Explanation :In NFA there may be possibility to more than one state transition but in DFA state transition is single direction so about this question if NFA is |Q| then DFA may have 2|Q| state over this type of NFA.

45. What is the result of the following expression ?

(1 & 2) + (3 & 4)

(A) 1
(B) 3
(C) 2
(D) 0
Answer D
Explanation :& is bitmap compare a number at binary level from right to left and operator which return true when all operand is true otherwise false so after evaluate the given expression result become false .
(01 &  10)    +  (011 & 100)

0+0=0

46. Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes.
(A) Forward from source to sink
(B) Backward from sink to source
(C) Forward from source to hidden nodes
(D) Backward from since to hidden nodes
Answer B

47. Match the following :

a. TTL       1. High fan out
b. ECL      2. Low propagation delay
c. CMOS   3. High power dissipation

Code :
      a    b    c
(A) 3   2    1
(B) 1   2    3
(C) 1   3    2
(D) 3   1    2
Answer A
Explanation : 


a.TTL draws more power => 3
b. ECL has highest speed ; Hence it must have lowest propagation delay =>2
c. CMOS has high fan out =>1

48. ______ is an “umbrella” activity that is applied throughout the software engineering process.

.(A) Debugging
(B) Testing
(C) Designing
(D) Software quality assurance
Answer D
Explanation : 
The umbrella activities in a software development life cycle process include the following:
  • Software Project Management
  • Formal Technical Reviews
  • Software Quality Assurance
  • Software Configuration Management
  • Re-usability Management
  • Risk Management
  • Measurement and Metrics
Document Preparation and Production

49. Identify the operation which is commutative but not associative ?
(A) OR
(B) NOR
(C) EX-OR
(D) NAND

Answer D
Explanation :


1)Every logic gate follows Commutative law.

2)AND,OR,Ex-OR,EX-NOR follows Associative law. NAND,NOR doesn`t follow Associative law.

3)AND ,OR follows Distributive law.Ex-OR,EX-NOR,NAND,NOR doesn`t follow Distributive law.AND operation only distributive on EX-OR operation no other operation is distributive including itself.


50. Given a Relation POSITION (Posting-No, Skill), then query to retrieve all distinct pairs of posting-nos. requiring skill is

 (A) Select p.posting-No, p.posting-No from position p 
         where p.skill = p.skill     and p.posting-No < p.posting-No
(B) Select p1.posting-No, p2.posting-No   from position p1, position p2
       where p1.skill = p2.skill
(C) Select p1.posting-No, p2.posting-No  from position p1, position p2 
       where p1.skill = p2.skill   and p1.posting-No < p2.posting-No
(D) Select p1.posting-No, p2.posting-No   from position p1, position p2
      where p1.skill = p2.skill    and p1.posting-No = p2.posting-No
Answer C

Friday 30 December 2016

CCC Fundamental and Word MCQ/True-False Solve

CCC MCQ Fundamental and word question answer

  CCC TEST PAPER  
Fundamental and Word             
Time: 1HRS                                              M M: 50 MARK

Objective Question:

 1. sesitive device that convert printed material into its equivalent digital form
 (A)scanner
(B)ocr
 ( C)a and b
(D)None of these

2.The basic architecture for digital computer was developed by
 (A)Bill Gates
 (B)Charles Babbage
( C)John Von Neumann
(D)Garden Moore

Wednesday 28 December 2016

UGC Net Computer Science Paper II Dec 12,Page 4 (Solve)

UGC Net Computer Science Paper II Dec 12,Page 4 (Solve)

31. Basis path testing falls under
(A) system testing
(B) white box testing
(C) black box testing
(D) unit testing
Answer : B
Explanation : The basis path testing is same, but it is based on a white box testing method, that defines test cases based on the flows or logical path that can be taken through the program. Basis path testing involves execution of all possible blocks in a program and achieves maximum path coverage with least number of test cases. It is a hybrid of branch testing and path testing methods.

The objective behind basis path testing is that it defines the number of independent paths, thus the number of test cases needed can be defined explicitly (maximizes the coverage of each test case).
     
     int a,b;
     for(a=1,b=2;a<=10;a++)
          printf("\n%d",a*b);

Basis Path Testing Diagram



Basis Path Testing


32. The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between
(A) DBMS & the Host record
(B) Host program and Host record
(C) Host program and DBMS
(D) Host program and Host language
Answer : C
Explanation :A set of program variables, declared in the host program, to communicate the contents of individual records between the DBMS and the host program.

For each record type in the database schema, a corresponding program variable with the same format should be declared in the host program.

Tuesday 27 December 2016

UGC Net Computer Science Paper II Dec 12,Page 3 (Solve)

GC Net Computer Science Paper II Dec 12

21. Which API is used to draw a circle ?
(A) Circle ( )
(B) Ellipse ( )
(C) Round Rect ( )
(D) Pie ( )
Answer B
Explanation : In mathematics, an ellipse is a curve in a plane surrounding two focal points such that the sum of the distances to the two focal points is constant for every point on the curve. As such, it is a generalization of a circle.
22. In DML, RECONNCT command
cannot be used with
(A) OPTIONAL Set
(B) FIXED Set
(C) MANDATOR Set
(D) All of the above
Answer B
Explanation : The RECONNECT command can be used with both OPTIONAL and MANDATORY sets, but not with FIXED sets. The RECONNECT command moves a member record from one set instance to another set instance of the same set type. It cannot be used with FIXED sets because a member record cannot be moved from one set instance to another under the FIXED constraint.

Monday 26 December 2016

2-D Array Matrix Multiplication

2-D Array Matrix Multiplication Rule

  • Matrix a row must be same as Matrix B column
  • Each Cell of Matrix A multiply by each column of matrix B
2-D Array Matrix Multiplication Rule
Code : 


/*   #################################################
          Girfa : Student Help
          Multiplication of 2-d array
          for more program visit : http://girfahelp.blogspot.in/p/c-language-array-programming.html
     #################################################

Sunday 25 December 2016

UGC Net Computer Science Paper 1 December 12 , Page 1-Solved

UGC Net Computer Science Paper 1 December 12 , Page 1-Solved
1. The English word ‘Communication’ is derived from the words
(A) Communis and Communicare
(B) Communist and Commune
(C) Communism and Communalism
(D) Communion and Common sense
Answer : A

2. Chinese Cultural Revolution leader Mao Zedong used a type of communication to
talk to the masses is known as
(A) Mass line communication
(B) Group communication
(C) Participatory communication
(D) Dialogue communication
Answer : A

Saturday 24 December 2016

UGC Net Computer Science Paper II Dec 12 Page 2 (Solved)


UGC Net Computer Science Paper II Dec 12 Page 2 (Solved)

UGC Net Computer Science Paper II Dec 12 Page 2 (Solved)


11. In compiler design ‘reducing the strength’ refers to
(A) reducing the range of values of input variables.
(B) code optimization using cheaper machine instructions.
(C) reducing efficiency of program.
(D) None of the above
Answer : B
Explanation :I

n compiler design , strength reduction is a compiler optimization where expensive operations are replaced with equivalent but less expensive operations. The classic example of strength reduction converts "strong" multiplications inside a loop into "weaker" additions – something that frequently occurs in array addressing.

Most of a program's execution time is typically spent in a small section of code (called a hot spot), and that code is often inside a loop that is executed over and over.

A compiler uses methods to identify loops and recognize the characteristics of register values within those loops.

12. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register ?
(A) Absolute
(B) Indirect
(C) Immediate
(D) Index
Answer : D

Tuesday 20 December 2016

Write a program to merge two array into a single array?

Q : Write a program to merge two array into a single array?

/*     #################################
           Girfa Student Help
           Merge two Array
           Programmber : Vishal
           For more program visit : http://girfahelp.blogspot.in/p/c-language.html
       #################################
*/
#include<stdio.h>
#include<conio.h>
#define MAX 5
void main()
{
       int a1[MAX],a2[MAX],a3[MAX*2];
       int i,j;
       clrscr();
       puts("First Array Input");
       for(i=0;i<MAX;i++)

Monday 19 December 2016

Write a program to implement union and intersection?

Q.: Write a program to implement union and intersection?

/*   ##########################

     Girfa : Student Help
     For More Program Visit : http://girfahelp.blogspot.in/p/c-language.html
     Program to implement union and intersection
     ##########################*/
#include<stdio.h>
#include<conio.h>
#define MAX 5
int check_avl(int [],int,int); /* Check a number exist in an array */
void print(int [],int); /* Print an arrar*/
void main()
{
     int ar1[MAX],ar2[MAX],uni[MAX*2],ins[MAX];
     int uni_index,int_index,flag=0,i,j;
     clrscr();
     printf("\nFirst Array Input\n");
     for(i=0;i<MAX;i++)
     {
          printf("Enter %d Position number>> ",i+1);
          scanf("%d",&ar1[i]);
     }
     printf("\nSecond Array Input\n");
     for(i=0;i<MAX;i++)
     {
          printf("Enter %d Position number>> ",i+1);
          scanf("%d",&ar2[i]);
     }

Sunday 18 December 2016

UGC Net Computer Science Paper-1 Page 1

1. The English word ‘Communication’ is derived from the words
(A) Communis and Communicare
(B) Communist and Commune
(C) Communism and Communalism
(D) Communion and Common sense


Saturday 17 December 2016

Core Java Data – Type MCQ

1. What is the range of data type short in Java?
a) -128 to 127
b) -32768 to 32767
c) -2147483648 to 2147483647
d) None of the mentioned

2. An expression involving int, byte with literal numbers then resulting expression will be to which of these?
a) int
b) long
c) byte
d) float

3. Which of the following are legal lines of Java code?
1. int w = (int)888.8;
2. byte x = (byte)1L;
3. long y = (byte)12;
4. byte z = (byte)123L;
a) 1 and 2
b) 2 and 3
c) 3 and 4

Friday 16 December 2016

UGC Net Computer Science Paper II Dec 12 Page 1 (Solved)

UGC Net Computer Science Paper II Dec 12

1. Consider the circuit shown below. In a certain steady state, Y is at logical ‘l’.What are possible values of A, B, C ?
(A) A = 0, B = 0, C = 1
(B) A = 0, B = C = 1
(C) A = 1, B = C = 0
(D) A = B = 1, C = 1
Flip-flop UGC Net Computer Science Paper II Dec 12

Answer A
Explanation : Nand gate behave opposite of and gate so if any 0 in input then result will be 1. So output Y will be 1 if A = 0, B = 0, C = 1

Wednesday 14 December 2016

Prepare Statement Select Mysqli

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Girfa : My SQLi Tutorial</title>
</head>

<body><?php
$servername 
"localhost";
$username   
"root";
$password   
"";
$dbname     
"tmp";

Write a program to copy a file into another file.

Q. Write a program to copy a file into another file?

/*   ###########################
     Girfa : Student Help
     for more program visit : http://girfahelp.blogspot.in/p/c-language.html
     copy a file content to another file
     ############################
*/
#include<stdio.h>
#include<conio.h>
void main()
{
     FILE *sfile,*dfile;
     char ch;
     int flag=1;
     clrscr();
     sfile=fopen("source.txt","r"); /* Source file */
     if(sfile==NULL)

Write a program to find the power of number using function.

Q. Write a program to find the power of number using function.

/*   ###########################
     Girfa : Student Help
     for more program visit : http://girfahelp.blogspot.in/p/c-language.html
     Power of a number using function
     ############################
*/
#include<stdio.h>
#include<conio.h>
int power(int,int);
void main()
{
     int n,p;
     clrscr();
     printf("Enter number>> ");
     scanf("%d",&n);
     printf("Enter Power>> ");
     scanf("%d",&p);
     printf("\n\nPower of %d by %d is %d",n,p,power(n,p));
     getch();

}

Tuesday 13 December 2016

Write a program to calculate number of vowels (a, e, i, o, u) separately in the entered string.

/*   ###########################
     Girfa : Student Help
     for more program visit :http://girfahelp.blogspot.in/p/c-language.html
     Count no. of vowel seprately
     ############################
*/
#include<stdio.h>
#include<conio.h>
void main()
{
     char ch[200];
     int a,e,i,o,u,index;
     a=i=o=u=e=0;
     clrscr();
     printf("Enter your string>> ");
     gets(ch);
     for(index=0;ch[index]!='\0';index++)
     {
           switch(ch[index])
           {
                case 'a' :
                     a++;
                     break;
                case 'A' :

January, 2016 M3-R4: PROGRAMMING AND PROBLEM SOLVING THROUGH ‘C’ LANGUAGE Solved

January, 2016

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Function of a compiler is to
A) put together the file and functions that are required by the program
B) translate the instructions into a form suitable for execution by the program
C) load the executable code into the memory and execute them
D) allow the user to type the program
1.2 The preprocessor directives start with
A) //
B) /
C) #
D) /*

Monday 12 December 2016

Placing X buuton on top right corner on an image


Placing X buuton on top right corner on an image


<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Girfa : Student Help</title>
<style type="text/css">
.tpopup{
  position:absolute;
  width:520;
  height:300px;
  background:#fff;
  left:50%;
  top:50%;
  border-radius:5px;
  padding:60px 0;
  margin-left:-320px; /* width/2 + padding-left */
  margin-top:-150px; /* height/2 + padding-top */
  text-align:center;
  box-shadow:0 0 10px 0 #000;
}

Thursday 8 December 2016

Microsoft Access Database Tutorial

Microsoft Access Database Tutorial

Microsoft Access is database package which is suitable for small scale project for single PC Application. Most Fundamental of any project which you should learn before start your project is database operation (insert ,update,Delete and show). This tutorial help you to learn database operation with full source code . So enjoy programming with Access.

Microsoft Access Database Insert Update Delete



Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load

Tuesday 6 December 2016

C Language Fundamental Assignment


C Language
Fundamental Assignment
Q1. Write a program to display the following pattern
**********************************************************
                Name                    Your Name
                Subject                 Subject Name
                Course                  Course Name
**********************************************************

Thursday 1 December 2016

C Language practice Question

C language (Set1)

Test

TOTAL TIME: 1 HOURS                                                                                                  TOTAL MARKS: 50
 


1. Which of the following is not a valid variable name declaration?
a) int __a3;
b) int __3a;
c) int __A3;
d) None of the mentioned
2. The format identifier ‘%i’ is also used for _____ data type?
a) char
b) int
c) float
d) double