Thursday, 10 November 2016

Assignment : DATA COMMUNICATION AND NETWORK TECHNOLOGIES

Assignment 1.


What is the load on simple ALOHA system in packet/sec, with a data rate of 9600 bps,
packet size of 804 bits and G=0.75

{Where G is total rate of data presented to network for transmission or simply offered load}

Assignment : DATA COMMUNICATION AND NETWORK TECHNOLOGIES

Assignment 1.


What is the load on simple ALOHA system in packet/sec, with a data rate of 9600 bps,
packet size of 804 bits and G=0.75

{Where G is total rate of data presented to network for transmission or simply offered load}

Passing Array to Java Script Function

You can an array to JavaScript function as an argument. In side of function you can handle this argument in any other programming language. Take a look on following example : 

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Array to Java Script Function : Girfa</title>
<script language="javascript">
     function ardemo(ar)
     {
          
           for(i=0;i<ar.length;i++)
                document.write("[" +ar[i] + "] ");
          
          
     }
</script>
</head>

Wednesday, 9 November 2016

Syllabus Data Communication and Network Technologies

Outline of Course


Sr No.
Topic
Minimum No. of Hour
1
Data Communications
06
2
Communication Network Fundamentals
08
3
Media Access Control
06
4
Networking Components
06
5
Link Control and MAC Protocols
05
6
Local Area Networks (LAN)
05
7
Wide Area Networks (WAN)
08
8
Application Protocols
08
9
Wireless Networks
03
10
Security and Management
05
Lectures
60
Practical/tutorials
60
Total
120

A9-R4: DATA COMMUNICATION AND NETWORK TECHNOLOGIES


Objective of the Course

This course will allow students to develop background knowledge as well as core expertise in data communication and networking (DCN) technologies, which is one of the fastest growing industries in today’s world. It forms an integral part of the modern Information and Communications Technology (ICT) in any organizations. Starting from intranet/extranet in small offices to the World Wide Web, principles of DCN play an important role in designing any modern telecom infrastructure.

A major ramification of the fantastic growth of telecommunications and networking is a dramatic increase in the number of professions, where an understanding of DCN is essential for success. Today, students wanting to understand the concepts and mechanisms underlying DCN infrastructures come from a variety of academic and professional backgrounds. Hence, to be useful, a course on DCN infrastructures must be accessible to students without technical backgrounds while still providing technical material comprehensive enough to challenge more experienced readers. This course is designed with this new mix of students in mind.

Tuesday, 8 November 2016

Operator Priority : C Language

Operator
Description
Associativity
( )
[ ]
.
->
++ --
Parentheses (function call)
Brackets (array subscript)
Member selection in structure
Member selection of structure  via pointer
Postfix increment/decrement
left-to-right
++ --
+ -
! ~
(
type)
*
&
sizeof
Prefix increment/decrement
Unary plus/minus
Logical negation/bitwise complement
Cast (convert value to temporary value of
 type)
Access Data via Pointer
Address (of operand)
Determine size in bytes on this implementation

right-to-left

Monday, 7 November 2016

Chess Board Using HTML Table

Chess Board Using HTML Table

<html>
<head>
<title>Girfa Student Help: Table</title>
</head>
<body>

<table width=100%>
<tr>
      <td width="12.5%"bgcolor=black    onmouseover="this.style.backgroundColor='yellow'" onmouseout="this.style.backgroundColor=''">
      <br><br><br><br><br><br><br>
      </td>
      <td width="12.5%">
      </td>
      <td width="12.5%"bgcolor=black  onmouseover="this.style.backgroundColor='yellow'" onmouseout="this.style.backgroundColor=''"  >
     
      </td>

Friday, 4 November 2016

Operator C Language

Operator   C Language


Operator

In terms of programming an operator is a symbol which performs some specific task design by compiler. An Operator works on some operand which may be single or more than one. Operators, which work on single operand known as unary operator otherwise binary.
5+5 (five is operand and + is binary operator)
Following types of operators −
  • Arithmetic Operators
  • Relational Operators
  • Logical Operators
  • Bitwise Operators
  • Assignment Operators
  • Misc Operators

Wednesday, 2 November 2016

July, 2010 A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

July, 2010
A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 A permission of 664 on a file means that a file has which of the following attributes?
A) - r - - r - - r - -
B) - r – x r – x r – x
C) - r w – r w – r - -
D) - r - - r - - r w –
1.2 The find command can be used to get information about files and directories. Which of the
following pieces of information can it find?
A) File ownership
B) The last time when the file was accessed
C) Files bigger than a certain size
D) All of the above

January, 2011 A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

   January, 2011 A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

1.1 The hidden files in Unix
A) have special status bit associated with the file descriptor
B) have names starting with a dot
C) can be accessed only by the operating system kernel
D) None of the above
1.2 Which one of the following is use of whatis command?
A) It shows short description of command
B) It shows user logged in
C) It shows file type
D) None of the above

July, 2011 A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

 July, 2011
A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 Which program searches given input for a pattern?
A) sort
B) grep
C) search
D) cat
1.2 The pwd command
A) Changes your password
B) Prints the current directory
C) Prints a file
D) None of the above

January, 2012 A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

January, 2012
A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 What operating system was Linux designed to "resemble somewhat"?
A) Minix
B) Windows
C) System V
D) Vunix
1.2 Which of the following is not a Linux boot loader?
A) Lilo
B) Syslinux
C) Grub
D) None of the above

Monday, 31 October 2016

Loop : C Language

C Language Loop Baner

Loop

Suppose you’re a class teacher and your college organized a tour for somewhere so you have assigned a task to fill up tour fee form. Total 200 hundred students in your class, in this situation you need to reach each student seat and collect fees. If we analysis from computer point of view for this scenario then you need to take total 200 step for achieve this.

This was real life an example which creates a basic idea of repetitive task. This type of task needs some automatic process which minimizes our effort then loop is your solution. Following are some example of task where you need loop.

  • Printing all numbers between 1 to 100
  • Printing your name a number of times
  • Accessing some continuous item like arrays

C language gives you three types of loops to accomplished repetitive task.

  • While
  • For
  • Do-while

While Loop

Syntax:
while-loop

Sunday, 30 October 2016

July, 2012 A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

 July, 2012
A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 Who developed the Linux?
A) Charles Babbage
B) Linus Torvalds
C) Alan Turing
D) None of the above
1.2 What terminology is not used in the Linux?
A) Shell
B) Process
C) File
D) Folder

January, 2013 A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

January, 2013
A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 How to switch from text mode to GUI mode in linux?
A) <Ctrl><Tab>F7
B) <Ctrl><Shift>F7
C) <Shift><Tab>F7
D) <Ctrl><Alt>F7
1.2 Which one of the following gives Process ID in UNIX?
A) pid
B) showpid
C) ps
D) none of the above

July, 2013 A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING

July, 2013
A8-R4: BASICS OF OS, UNIX AND SHELL PROGRAMMING


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Which Linux command is used to assign privileges over a particular file to a designated user?
A) chroot
B) chown
C) assign
D) chgrp
1.2 According to the Linux filesystem hierarchy standard, which of the following directories would be
an appropriate location for a user to install a shared application to?
A) /sbin
B) /dev/user/bin
C) /usr/local/bin
D) /etc/bin

Friday, 28 October 2016

UGC Net Computer Science Paper 3 July-16 Page 8


71. Which of the following is characteristic of an MIS ?
(1) Provides guidance in identifying problems, finding and evaluating alternative
solutions, and selecting or comparing alternatives.
(2) Draws on diverse yet predictable data resources to aggregate and summarize data.
(3) High volume, data capture focus.
(4) Has as its goal the efficiency of data movement and processing and interfacing
different TPS.


72. How does randomized hill-climbing choose the next move each time ?
(1) It generates a random move from the moveset, and accepts this move.
(2) It generates a random move from the whole state space, and accepts this move.
(3) It generates a random move from the moveset, and accepts this move only if this
move improves the evaluation function.
(4) It generates a random move from the whole state space, and accepts this move only
if this move improves the evaluation function.

UGC Net Computer Science Paper 3 July-16 Page 7

61. The region of feasible solution of a linear programming problem has a _____ property in
geometry, provided the feasible solution of the problem exists.
(1) concavity
 (2) convexity
(3) quadratic
 (4) polyhedron

62. Consider the following statements :
(a) Revised simplex method requires lesser computations than the simplex method.
(b) Revised simplex method automatically generates the inverse of the current basis
matrix.
(c) Less number of entries are needed in each table of revised simplex method than
usual simplex method.
Which of these statements are correct ?
(1) (a) and (b) only
 (2) (a) and (c) only
(3) (b) and (c) only
(4) (a), (b) and (c)

UGC Net Computer Science Paper 3 July-16 Page 6

51. Which of the following information about the UNIX file system is not correct ?
(1) Super block contains the number of i-nodes, the number of disk blocks, and the start
of the list of free disk blocks.
(2) An i-node contains accounting information as well as enough information to locate
all the disk blocks that holds the file’s data.
(3) Each i-node is 256-bytes long.
(4) All the files and directories are stored in data blocks.

Answer C
Explanation : 

The default bytes per inode is approximately 16384. If you're running out of inodes, you might try for
example:mkfs.ext4 -i 8192 /dev/mapper/main-var2

52. Which of the following option with reference to UNIX operating system is not correct ?
(1) INT signal is sent by the terminal driver when one types <Control-C> and it is a
request to terminate the current operation.
(2) TERM is a request to terminate execution completely. The receiving process will
clean up its state and exit.
(3) QUIT is similar to TERM, except that it defaults to producing a core dump if not
caught.
(4) KILL is a blockable signal.

Answer D
Explanation : 

Thursday, 27 October 2016

IF statement : C Language

If-Else

Conditional operator

Before start writing something about this post I want to ask you a question.

Is computer IQ is greater than human?

What is your answer Yes/NO?

Answer

Computer IQ is zero. If IQ is zero then how can computer work smartly and take decision like human.

It is possible of IF statement which enable your computer to make decision. That is why every programming language support if-else statement.

Syntax

If(condition)
{
                If condition is true
                Then this part will be run
}
Else
{
                If condition is false
                Then this part will be run
}