Thursday 4 December 2014
C# Window Programming
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Thursday 27 November 2014
C# Basic Concept and Tutorial
Static Classes
A class can be declared static, which indicates
that it contains only static members. It is not possible to use the new keyword
to create instances of a static class. Static classes are loaded automatically
by the .NET Framework common language runtime (CLR) when the program or
namespace that contains the class is loaded.
Use
a static class to contain methods that are not associated with a particular
object. For example, it is a common requirement to create a set of methods that
do not act on instance data and are not associated to a specific object in your
code. You could use a static class to hold those methods.
Following
are the main features of a static class:
·
They only contain static
members.
·
They cannot be
instantiated.
·
They are sealed.
·
They cannot contain
Instance Constructors (C# Programming Guide).
Creating
a static class is therefore basically the same as creating a class that
contains only static members and a private constructor. A private constructor
prevents the class from being instantiated.
The
advantage of using a static class is that the compiler can check to make sure
that no instance members are accidentally added. The compiler will guarantee
that instances of this class cannot be created.
Static
classes are sealed and therefore cannot be inherited. They cannot inherit from
any class except Object. Static classes cannot contain an instance constructor;
however, they can have a static constructor. For more information
Static Members
A
static method, field, property, or event is callable on a class even when no
instance of the class has been created. If any instances of the class are
created, they cannot be used to access the static member. Only one copy of
static fields and events exists, and static methods and properties can only
access static fields and static events. Static members are often used to
represent data or calculations that do not change in response to object state;
for example, a math library might contain static methods for calculating sine
and cosine.
Static
methods can be overloaded but not overridden.
Static
class members are declared by using the static keyword before the return type of the member, for example:
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Wednesday 26 November 2014
C# Programming Practical Questions
Question : Write a program which accept input of full path of a file and produce following output?
Input : C:/Users/Public/Pictures/SamplePictures/Desert.jpg
Output :
Extension : jpg
File Name : Desert
Path : C:/Users/Public/Pictures/SamplePictures
Solution :
import java.util.*;
public class Main
{
public static void main(String[] args)
{
String str;
Scanner sc=new Scanner(System.in);
System.out.print("Enter your name>> ");
str=sc.nextLine();
int ep,sp;
ep=str.indexOf(".");
sp=str.lastIndexOf("\\");
System.out.print("\nExtention is "+str.substring(ep+1,str.length()));
System.out.println("\nFile Name is "+str.substring(sp+1,ep));
System.out.println("\npath is "+str.substring(0,sp));
}
}
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
C# Tutorial and Notes
Static Classes
A class can be declared static, which indicates
that it contains only static members. It is not possible to use the new keyword
to create instances of a static class. Static classes are loaded automatically
by the .NET Framework common language runtime (CLR) when the program or
namespace that contains the class is loaded.
Use
a static class to contain methods that are not associated with a particular
object. For example, it is a common requirement to create a set of methods that
do not act on instance data and are not associated to a specific object in your
code. You could use a static class to hold those methods.
Following
are the main features of a static class:
·
They only contain static
members.
·
They cannot be
instantiated.
·
They are sealed.
·
They cannot contain
Instance Constructors (C# Programming Guide).
Creating
a static class is therefore basically the same as creating a class that
contains only static members and a private constructor. A private constructor
prevents the class from being instantiated.
The
advantage of using a static class is that the compiler can check to make sure
that no instance members are accidentally added. The compiler will guarantee
that instances of this class cannot be created.
Static
classes are sealed and therefore cannot be inherited. They cannot inherit from
any class except Object. Static classes cannot contain an instance constructor;
however, they can have a static constructor. For more information
Static Members
A
static method, field, property, or event is callable on a class even when no
instance of the class has been created. If any instances of the class are
created, they cannot be used to access the static member. Only one copy of
static fields and events exists, and static methods and properties can only
access static fields and static events. Static members are often used to
represent data or calculations that do not change in response to object state;
for example, a math library might contain static methods for calculating sine
and cosine.
Static
methods can be overloaded but not overridden.
Static
class members are declared by using the static keyword before the return type of the member, for example:
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Tuesday 25 November 2014
File Management in C Languge
Formatted Input in a file
#include<stdio.h>
#include<conio.h>
void main()
{
int roll,i;
char nm[10],ct[10];
FILE *ft;
clrscr();
ft=fopen("abc.doc","w");
for(i=1;i<=3;i++)
{
printf("Enter %d'st roll>> ",i);
scanf("%d",&roll);
fflush(stdin);
printf("Enter %d'st name>> ",i);
gets(nm);
fflush(stdin);
printf("Enter %d'st City>> ",i);
gets(ct);
fprintf(ft,e"%d\t%s\t%s\n",roll,nm,ct);
}
}
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Sunday 2 November 2014
Output Device
CRT
The cathode ray tube (CRT) is a vacuum tube containing an electron gun (a source of electrons or electron emitter) and a fluorescent screen used to view images. It has a means to accelerate and deflect the electron beam(s) onto the fluorescent screen to create the images. The image may represent electrical waveforms (oscilloscope), pictures (television, computer monitor), radar targets and others. CRTs have also been used as memory devices, in which case the visible light emitted from the fluoresecent material (if any) is not intended to have significant meaning to a visual observer (though the visible pattern on the tube face may cryptically represent the stored data)LCD
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Saturday 1 November 2014
Input Device
In computing, an input device is any peripheral (piece of computer hardware equipment) used to provide data and control signals to an information
processing system
such as a computer or other information
appliance. Examples
of input devices include keyboards, mice, scanners, digital cameras and joysticks.
Input Devices Before computers, the phrase "input device" probably
was not on the tip of anyone's tongue. It has a dry and impersonal sound, sorta
technical - rather like computer talk, don't you think? The phrase is easy to
define because a "device" is an instrument that performs a simple task.
"Input" is also easy - something put into a system. So in the
technology world... an input device is any tool that feeds data into a computer. For example, a keyboard is an input device, whereas a display monitor is an output device. Mice, trackballs, and light pens are all input devices. Isn't it amusing that under the dry title of "input devices," we get such fun words as mice, joystick, trackball, touch pad, light pen, and puck?
Keyboards
The input of information into your computer is generally done through your keyboard and your mouse or mouse substitute. The keyboard has the distinction of being the standard input device.
The variety of keyboards is almost staggering. No one has to stick with the standard keyboard that comes with the computer. Ergonomically designed keyboards often have unusual sculpted or contoured shapes and a space age look. These keyboards are designed to help avoid repetitive stress injury to the wrists. Some of these keyboards come with foot pedals to spread the work to other limbs. Some keyboards are even designed to take advantage of the strength in the thumbs.
Other keyboards come with extra large keys to help users with sight or hand coordination problems. Wireless keyboards can offer the freedom from being tethered to the computer. In keyboards, if you shop around, you will find that there really is something for everyone.
Your choice of keyboard, like your choice of any input device, is a very personal matter. If only we could test each type of keyboard or mouse for an extended period of time before buying one, but that just doesn't happen in today's marketplace. Computer users should research the many different products offered. Make sure you know if and how you can customize the input device for your own use. Only you can decide which kind of device is most comfortable for you. And that applies to all input devices.
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Wednesday 29 October 2014
Operating System
Types of Operating System |
Types of Operating System
Overlays
One of the main limitations imposed on programmers in the early days of computing was the size of the computer's memory. If the program was larger than the available memory, it could not be loaded, which placed severe restrictions on program size. The obvious solution would be to increase the amount of memory available, but this would significantly increase the cost of the computer system. One way for a programmer to overcome these limitations was to use overlays. The programmer divided the program into a number of logical sections. A small portion of the program had to remain in memory at all times, but the remaining sections (or overlays) were loaded only when they were needed. The use of overlays allowed programmers to write programs that were much larger than physical memory, although responsibility for managing memory usage rested with the programmer rather than the operating system.
- The entire program and data of a process must be in the physical memory for the process to execute.
- The size of a process is limited to the size of physical memory.
- If a process is larger than the amount of memory, a technique called overlays can be used.
- Overlays is to keep in memory only those instructions and data that are needed at any given time.
- When other instructions are needed, they are loaded into space that was occupied previously by instructions that are no longer needed.
- Overlays are implemented by user, no special support needed from operating system, programming design of overlay structure is complex
Page Stealing
When this supply becomes low, OS uses page stealing to replenish it, that is, it takes a frame assigned to an active user and makes it available for other work. The decision to steal a particular page is based on the activity history of each page currently residing in a central storage frame. Pages that have not been active for a relatively long time are good candidates for page stealing.
Belady's Anamaly
This is a stage which occurs in FIFO page replacement algorithm,
in which a large number of page fault
happens.
Preemptive scheduling
Task are usually assigned with priority at times it is necessary
to run a certain task that has higher priority before another task although it
is running therefore the running task is
interrupted for some time and resumes later when the priority task has finished
its execution. This is called preemptive scheduling
E.g. Round-Robin
Non-Preemptive
In non preemptive scheduling a running task
is executed till. it cannot be interrupted
E.g. FIFO
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Tuesday 21 October 2014
Computer Memory
Memory
Characteristics
Volatile memory
Volatile memory is a type of storage whose contents are erased when the system's power is turned off or interrupted. For example, RAM is volatile; meaning users will lose a document if they do not save their work to a non-volatile classification of memory, such as a hard drive, before shutting down the computer.Non-volatile
Non-volatile is a term used to describe any memory or storage that is saved regardless if the power to the computer is on or off. The best example of non-volatile memory and storage is a computer hard drive, flash memory, and ROM. If data is stored on a hard drive, it will remain on that drive regardless if the power is interrupted, which is why it is the best place to store your data and documents. This is also how your computer keeps the time and other system settings even when the power is off.
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Wednesday 8 October 2014
Hamming Code
Data Error
Data error is term which occurs when we send data and it’s
not received as we send.
Error Type
There are two type of error single bit and multiple bits (Burst)
Error detection and Correction
Error detection technique are user detect an error on the other
hand error correction technique enable us to resolve an error. We can remove one,
two and three bit error only because burst error may occur extremely.
Hamming code
Hamming code is a set of error-correction code s that can be used to detect and correct bit errors that can occur when computer data is moved or stored. Hamming code is named for R. W. Hamming of Bell Labs.
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Monday 29 September 2014
New Exam Pattern for UGC NET for Dec 2014
After UGC's failure, CBSE to conduct NET
NEW DELHI: Central Board of Secondary Education, the country's largest exam conducting body, is all set to add another test to its bouquet, the National Eligibility Test. The inclusion of the test from this year will make the board the biggest exam conducting body, with the number of CBSE candidates set to cross 65 lakh in a year.After failing to conduct the test without hiccups, the University Grants Commission, with the HRD ministry's consent, has asked the CBSE to conduct the test. The decision was taken at the full commission meeting on Tuesday with near unanimity. The NET is conducted twice a year for grant of junior research fellowship and eligibility for assistant professor in institutions of higher learning.
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Thursday 18 September 2014
Add an image to Google
Step for upload your Image
- If you have a website then upload your image their
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Monday 15 September 2014
september 1752 calendar missing days reason
In September 1752 the Julian calendar was replaced with the Gregorian calendar in Great Britain and its American colonies. The Julian calendar was 11 days behind the Gregorian calendar, so 14 September got to follow 2 September on the day of the change. The result was that between 3 and 13 September, absolutely nothing happened!
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Friday 12 September 2014
How to create automatic password using php
Password is widely used in computer as a security mechanism
so we must make a password in such a manner which cannot be guessable by any one. Mostly peoples make
password pattern related to their life i.e. date of birth,city name,address or
something like that which can be guess easily. So we must stop this practice, A strong password
may be difficult to guess.
A strong password comprises special character, numeric,
small and capital case character combination that restricts hacker to guess it.
So I am representing coding that generate password automatically in strong
form. You can use my coding if you want to generate password automatically.
<?php
$msg="";
function makeRandomString ($length=8)
{
$chars =
"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQ
RSTUVWXYZ0123456789!%,-:;@_{}~";
for ($i = 0, $makepass = '', $len =
strlen($chars); $i < $length;
$i++) $makepass .= $chars[mt_rand(0,
$len-1)];
return $makepass;
}
if(isset($_POST['pass']))
$msg=makeRandomString(10);
?>
<html>
<head>
<title>Untitled Document</title>
</head>
<body>
<form
action="<?php echo $_SERVER['PHP_SELF']?>"
method="post" >
<input type="submit"
value="Get password" name="pass" />
<h1><?php echo $msg;?></h1>
</form>
</body>
</html>
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Thursday 11 September 2014
Girfa Pics
Picture
A picture is a visual capture of an object. Pictures are created using another hardware device such as a digital camera or a scanner and not the computer. The picture of pictures shown here is a good example of a picture.
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Wednesday 10 September 2014
How to Add a Widget to Blogger
Widgets, also known as gadgets, are small tools or applications that can be added to a website or blog to enhance its content or functions, or to pull content and services from third-party websites. Widgets come in multiple forms, such as countdown tickers, photos, games, or interactive social media applications that allow you to chat. Some widgets in Blogger serve the purpose of enhancing your blog, such as listing your blog followers or allowing readers to subscribe to your blog content. Here are steps on how to add a widget to Blogger.
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Tuesday 9 September 2014
PHP Paging
I have made a website for flat selling. Many customer enquiries daily for flat booking by filling enquiry form. I have made an admin page which shows enquiry data of customer, everything was ok but when enquiry got increase then admin page data also increase so my client had to scroll very long that was not a good interface. So I decided to show enquiry table content page wise.
Thanks to limit clause used by MYSQL. You can use limit
clause with select statement for limit the returns row from database, its takes
two clause as a record number start and stop
You can change limit clause argument for desire row, fist
number for start and second one stand for stop retrieving row form table.
Click here to download full example
Click here to download full example
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Tuesday 26 August 2014
Core Java Programming
This post is for student who study java and they need many programs in their exam and test so I am trying to make some java programs which help them to make their work easy
Question : Write a program which accept input of full path of a file
and produce following output?
Input : C:/Users/Public/Pictures/SamplePictures/Desert.jpg
Output :
Extension : jpg
File Name : Desert
Path : C:/Users/Public/Pictures/SamplePictures
Solution :
import java.util.*;
public class Main
{
public static void main(String[] args)
{
String str;
Scanner sc=new Scanner(System.in);
System.out.print("Enter your name>> ");
str=sc.nextLine();
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Monday 18 August 2014
How to send email a form data using php
Form is a electronic way where organization gathered data
from user through website. A website owner usually take details of esquires to
his website using login provide by the website developer.
But we are familiar with email because it’s an era of android word and every one configure email
with mobile so sending form data in email as well as database is a good idea.
PHP provide a easy way to achieve this just take a look on flowing
code and please don’t say thanks to me.
$to =' rajkumar9795@gmail.com';
$subject = 'Enquiry Data';
$message = "<h2>Welcome This is
Enquiry for Now</h2><hr>Name : $_POST[name]<br>Gender : $_POST[gen]<br>Course :
$_POST[course]<br> Email : $_POST[email]<br>Mobile :
$_POST[phone]<br>Query : $_POST[query]";
$headers = 'From: bcmt@basantgroupofinstitution.org'
. "\r\n" .
'Reply-To: basantcollege.mt@gmail.com' .
"\r\n" .
'X-Mailer: PHP/' . phpversion().
'MIME-Version: 1.0' . "\r\n".
'Content-type: text/html; charset=iso-8859-1' .
"\r\n";
mail($to, $subject, $message,
$headers);
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Thursday 31 July 2014
Window 7 Shortcut Keys
General Keyboard Shortcut
|
|
---|---|
F1
|
Display Help
|
Ctrl+C
|
Copy the selected item
|
Ctrl+X
|
Cut the selected item
|
Ctrl+V
|
Paste the selected item
|
Ctrl+Z
|
Undo an action
|
Ctrl+Y
|
Redo an action
|
Delete
|
Delete the selected item and move it to the Recycle
Bin
|
Shift+Delete
|
|
F2
|
Rename the selected item
|
Ctrl+Right Arrow
|
Move the cursor to the beginning of the next word
|
Ctrl+Left Arrow
|
Move the cursor to the beginning of the previous
word
|
Ctrl+Down Arrow
|
Move the cursor to the beginning of the next
paragraph
|
Ctrl+Up Arrow
|
Move the cursor to the beginning of the previous
paragraph
|
Ctrl+Shift with an arrow key
|
Select a block of text |
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Subscribe to:
Posts (Atom)