Download complete MCQ Question Answer Total Free of cost for 32 bit
Pages
▼
Wednesday, 30 March 2016
MCQ Question Answer Software Free Download
Download complete MCQ Question Answer Total Free of cost for 32 bit
Language Processor
Basically Translater i.e. Compiler and Interpreter
Next Topic
Relocatable VS Non- Relocatable Programming
A relocatable program may use many part of memory address in run time of a program. This type of program uses relative addressing and its address space can be change at run as requirement.
A Non-Relocatable program runs in fix address space. Location of program data fix at the time of compilation.
A Non-Relocatable program runs in fix address space. Location of program data fix at the time of compilation.
Tuesday, 29 March 2016
Byte Code
" Middle level output of a compiler "
High level languages like (C,C++,Java,C#) are easy to code , Programmer write code using a text editor or IDE provide by related language compiler called source code.
Source code cannot run direct by computer it need to be transform into machine language by compiler.
Difference between Syntax and Semantic
Syntax | Symantic |
---|---|
Syntax is related to language grammar, i.e. in C language every statement is terminated by semicolon (;) if you missed it, then compiler will generate a syntax error (statement is missing) | Semantic is related to meaning which cannot be detected by the compiler. Wrong implementation of a logic will not produce expected output. For example, we know when the product of a number has to calculate then we must use (*) if by mistake or any other reason (+) are there then it is semantic bug. |
Next Topic
Sunday, 27 March 2016
Fetch Data From Server With Json
data.json file code :
{"Roll":"101","name": "Sona", "city": "Australia"}
HTML Code
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Girfa : Json Tutorial Read Data From Server File</title>
<script language="javascript">
function readData(){
Tuesday, 22 March 2016
Data Communication and Networking MCQ Question Answer
1. Network of networks is known as _________
A. intranet.
B. internet.
C. Local Area Network
D. WAN.
ANSWER: B
2. A computer networks can provide a powerful _________ among employees.
A. communication medium.
B. community development.
C. relationship development.
D. relationship development.
A. intranet.
B. internet.
C. Local Area Network
D. WAN.
ANSWER: B
2. A computer networks can provide a powerful _________ among employees.
A. communication medium.
B. community development.
C. relationship development.
D. relationship development.
Networking Basic MCQ Question Answer
11.1 Internet is
a. a local computer network
b. a world wide network of computers
c. an interconnected network of computers
d. a world wide interconnected network of computers which use a common protocol to communicate with one another
11.2 The facilities available in the internet are
(i) electronic mail
(ii) remote login
(iii)file transfer
(iv)word processing
a. a local computer network
b. a world wide network of computers
c. an interconnected network of computers
d. a world wide interconnected network of computers which use a common protocol to communicate with one another
11.2 The facilities available in the internet are
(i) electronic mail
(ii) remote login
(iii)file transfer
(iv)word processing
SYSTEM ANALYSIS AND DESIGN MCQ Question Answer
Q. 1 …………………………. is an important factor of management information system.
A) System
B) Data
C) Process
D) All
ANS: A) System
Q.3 ………………………….. level supply information to strategic tier for the use of top management.
A) Operational
B) Environmental
C) Competitive
D) Tactical
ANS: D) Tactical
Q.4 In a DFD external entities are represented by a
A) Rectangle
B) Ellipse
C) Diamond shaped box
D) Circle
A) Rectangle
B) Ellipse
C) Diamond shaped box
D) Circle
HTML MCQ Question - Answer
1. A webpage displays a picture. What tag was used to display that picture?
a. picture
b. image
c. img
d. src
2. <b> tag makes the enclosed text bold. What is other tag to make text bold?
a. <strong>
b. <dar>
c. <black>
d. <emp>
3. Tags and test that are not directly displayed on the page are written in _____ section.
a. <html>
b. <head>
c. <title>
d. <body>
Excel Practice File : Attendance Sheet
Download Excel File
Sale Invoice
Download Excel File
Inquiry Report
Rate Depreciation List for Car Sale
Sunday, 20 March 2016
RSA Alogorithm
The RSA algorithm is an example of asymmetric cryptography, which is widely used in worldwide for securing sensitive while sending insecure medium like the internet.
RSA was first described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology. Two types of keys are used, public and private. Private is secrete key used by the owner or receiver. Data can be encrypted using a public or private key, but decryption can be done only with the private key.
RSA was first described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology. Two types of keys are used, public and private. Private is secrete key used by the owner or receiver. Data can be encrypted using a public or private key, but decryption can be done only with the private key.
Saturday, 19 March 2016
Form Validation,File Type Validation : Javascript
It’s a good practice to validate your form using script before sending because it’s giving quick response than server validity. But keep in mind server validation is always necessary because JavaScript may be disabled by the user. So server validation is mandatory. I am presenting complete code for validating a check box, textbox and file. My main focus is on file validating because file validation is complicated task for new web developers So this will help you a lot.
<html>
<head>
<title>Java script form validation ; Girfa</title>
<script language="javascript">
function validate_mar_news(pic,fl,code) //validate add news pic for home page marquee
{
var check_box=document.getElementById(pic);
var file=document.getElementById(fl);
var code=document.getElementById(code);
var flag=true;
if(check_box.value=="Select Page Number")
{
<html>
<head>
<title>Java script form validation ; Girfa</title>
<script language="javascript">
function validate_mar_news(pic,fl,code) //validate add news pic for home page marquee
{
var check_box=document.getElementById(pic);
var file=document.getElementById(fl);
var code=document.getElementById(code);
var flag=true;
if(check_box.value=="Select Page Number")
{
Friday, 18 March 2016
Object oriented programming and UML Objective (MCQ) Questions
9.1 Computer systems are designed by
a. simplifying requirements of system
b. breaking of the system into smaller self-contained co-operating subsystems
c. breaking up the systems into independent parts
d. modular design
9.2 Functions and procedures are
a. not useful in designing computer systems
b. old fashioned and they are not useful
c. useful in designing computer systems
d. have side effects which require special care if they are used as subsystems
a. simplifying requirements of system
b. breaking of the system into smaller self-contained co-operating subsystems
c. breaking up the systems into independent parts
d. modular design
9.2 Functions and procedures are
a. not useful in designing computer systems
b. old fashioned and they are not useful
c. useful in designing computer systems
d. have side effects which require special care if they are used as subsystems
MS Access MCQ Question/Answer
1. What Are The Different Views To Display A Table
A) Datasheet View
B) Design View
C) Pivote Table & Pivot Chart View
D) All Of Above
2. Which Of The Following Creates A Drop Down List Of Values To Choose From?
A) Ole Object
B) Hyperlink
C) Memo
D) Lookup Wizard
A) Datasheet View
B) Design View
C) Pivote Table & Pivot Chart View
D) All Of Above
2. Which Of The Following Creates A Drop Down List Of Values To Choose From?
A) Ole Object
B) Hyperlink
C) Memo
D) Lookup Wizard
Thursday, 17 March 2016
PHP Inheritance
class test
{
function test_base()
{
echo "<br>Base class function";
}
}
class client extends test
{
function client_function()
{
echo "<br>Inside of client function ";
}
}
{
function test_base()
{
echo "<br>Base class function";
}
}
class client extends test
{
function client_function()
{
echo "<br>Inside of client function ";
}
}
PHP Class Object Tutorial
class test
{
function test_class()
{
echo "<h1>by default function is public visibility </h1>";
}
function add_num($n1,$n2)
{
return $n1+$n2;
}
private function test_private()
{
echo "<h2> For making private function private keyword is used </h2>";
}
function access_private()
{
$this->test_private();
}
}
{
function test_class()
{
echo "<h1>by default function is public visibility </h1>";
}
function add_num($n1,$n2)
{
return $n1+$n2;
}
private function test_private()
{
echo "<h2> For making private function private keyword is used </h2>";
}
function access_private()
{
$this->test_private();
}
}
Wednesday, 16 March 2016
Difference between Top-Down and Bottom- Up Programming
Top Down Programming
Top down approach is used by procedure oriented language like C. In this concern A problem is solved by the top level wise i.e. A main function is created which draw a sketch that how will our program be started and then find out the low level modules further. The problem is divided into the sub modules and implemented each coding separately, which called and control by the main function. Top down approach is no longer popular today.Bottom Up Programming
Bottom up approach is used by the object oriented language like C++, Java, C#, VB.Net, etc. In this approach design starts with bottom level , by inside of a class. Ones A class is implemented, then object of that class is created. A main function is generally also used here like procedure oriented languages as a starting point, but it’s used only to call the class functions.
Tuesday, 15 March 2016
Calculate Totient number from given number
Q : Write a program to get Totient number from given number?
[ Totient number = All prime number(M)<given prime number(N)
l.e. N=10
M={1,3,5,7}=4
]
Answer :
/* ::: Girfa :::
http://girfahelp.blogspot.in/p/c-language.html
program : get all prime number less than given number */
Monday, 14 March 2016
Symmetric Encryption
" Data format changed using a secret key and can be decrypted only with this secret key receiver must have the secret key for decrypt message. Symmetric Encryption. "
Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key,
Bridge : Computer Network
" Bridge is May be a combination of hardware and software or individual is used to connect two segment of same LAN (Same IP Domain). Bridge decreases the network traffic and also used to connect two different platform LANs like UNIX and Windows. "
A network bridge is software or hardware that connects two or more networks so that they can communicate.
People with home or small office networks generally use a bridge when they have different types of networks but they want to exchange information or share files among all of the computers on those networks.
Here's an example. Let's say you have two networks: in one, the computers are connected with cables; and in the other, the computers are connected using wireless technology. The wired computers can only communicate with other wired computers, and the wireless computers can only communicate with other wireless computers. With a network bridge, all of the computers can communicate with each other.
Sunday, 6 March 2016
Reading PHP and MySQL a Single Value from a table
When you want to read a single value from a MySQL table following code will help you.
Your need to fetch row using query function with following syntax
[connection_object]->query(sql statement)
After fetched rows use mysqli_fetch_assoc function for access row by row records
Var_name= mysqli_fetch_assoc([connection_object]->query(SQL Statement))
mysqli_fetch_assoc returns one dimensional array so use can use table column name as index
mysqli_fetch_assoc returns one dimensional array so use can use table column name as index