Tuesday 22 March 2016

HTML MCQ Question - Answer




1. A webpage displays a picture. What tag was used to display that picture?
a. picture
b. image
c. img
d. src
2. <b> tag makes the enclosed text bold. What is other tag to make text bold?
a. <strong>
b. <dar>
c. <black>
d. <emp>
3. Tags and test that are not directly displayed on the page are written in _____ section.
a. <html>
b. <head>
c. <title>
d. <body>

Excel Practice File : Attendance Sheet


Download Excel File 

Sale Invoice

Excel Sale Invoice practice File

Download Excel File

Inquiry Report 
Inquiry Report

Rate Depreciation List for Car Sale

Rate Depreciation List for Car Sale


Sunday 20 March 2016

RSA Alogorithm

The RSA algorithm is an example of asymmetric cryptography, which is widely used in worldwide for securing sensitive while sending insecure medium like the internet.

RSA was first described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology. Two types of keys are used, public and private. Private is secrete key used by the owner or receiver. Data can be encrypted using a public or private key, but decryption can be done only with the private key.

Saturday 19 March 2016

Form Validation,File Type Validation : Javascript

It’s a good practice to validate your form using script before sending because it’s giving quick response than server validity. But keep in mind server validation is always necessary because JavaScript may be disabled by the user. So server validation is mandatory. I am presenting complete code for validating a check box, textbox and file. My main focus is on file validating because file validation is complicated task for new web developers So this will help you a lot.

<html>
<head>
<title>Java script form validation ; Girfa</title>
<script language="javascript">
function validate_mar_news(pic,fl,code) //validate add news pic for home page marquee
{
var check_box=document.getElementById(pic);
var file=document.getElementById(fl);
var code=document.getElementById(code);
var flag=true;
if(check_box.value=="Select Page Number")
{

Friday 18 March 2016

Object oriented programming and UML Objective (MCQ) Questions

9.1 Computer systems are designed by

a. simplifying requirements of system

b. breaking of the system into smaller self-contained co-operating subsystems
c. breaking up the systems into independent parts

d. modular design

9.2 Functions and procedures are

a. not useful in designing computer systems

b. old fashioned and they are not useful

c. useful in designing computer systems

d. have side effects which require special care if they are used as subsystems

MS Access MCQ Question/Answer

1. What Are The Different Views To Display A Table

 A) Datasheet View
 B) Design View
 C) Pivote Table & Pivot Chart View
 D) All Of Above

2. Which Of The Following Creates A Drop Down List Of Values To Choose From?

 A) Ole Object
 B) Hyperlink
 C) Memo
 D) Lookup Wizard

Thursday 17 March 2016

PHP Inheritance

class test
{
function test_base()
{
echo "<br>Base class function";
}

}

class client extends test
{
function client_function()
{
echo "<br>Inside of client function ";
}
}

PHP Class Object Tutorial

class test
{
function test_class()
{
echo "<h1>by default function is public visibility </h1>";
}
function add_num($n1,$n2)
{
return $n1+$n2;
}
private function test_private()
{
echo "<h2> For making private function private keyword is used </h2>";
}
function access_private()
{
$this->test_private();
}
}

Wednesday 16 March 2016

Difference between Top-Down and Bottom- Up Programming

Top Down Programming

Top down approach is used by procedure oriented language like C. In this concern A problem is solved by the top level wise i.e. A main function is created which draw a sketch that how will our program be started and then find out the low level modules further. The problem is divided into the sub modules and implemented each coding separately, which called and control by the main function. Top down approach is no longer popular today.

Bottom Up Programming


Bottom up approach is used by the object oriented language like C++, Java, C#, VB.Net, etc. In this approach design starts with bottom level , by inside of a class. Ones A class is implemented, then object of that class is created. A main function is generally also used here like procedure oriented  languages as a starting point, but it’s used only to call the class functions.

Tuesday 15 March 2016

Calculate Totient number from given number



Q : Write a program to get Totient number from given number?


[     Totient number = All prime number(M)<given prime number(N)
      l.e. N=10
     M={1,3,5,7}=4
]

Answer : 


/*   ::: Girfa :::
http://girfahelp.blogspot.in/p/c-language.html
program : get all prime number less than given number   */

Monday 14 March 2016

Symmetric Encryption



 " Data format changed using a secret key and can be decrypted only with this secret key receiver must have the secret key for decrypt message. Symmetric Encryption. " 

Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key,

Bridge : Computer Network



  " Bridge is May be a combination of hardware and software or individual is used to connect two segment of same LAN (Same IP Domain). Bridge decreases the network traffic and also used to connect two different platform LANs like UNIX and Windows.


    A network bridge is software or hardware that connects two or more networks so that they can communicate.
    People with home or small office networks generally use a bridge when they have different types of networks but they want to exchange information or share files among all of the computers on those networks.
     Here's an example. Let's say you have two networks: in one, the computers are connected with cables; and in the other, the computers are connected using wireless technology. The wired computers can only communicate with other wired computers, and the wireless computers can only communicate with other wireless computers. With a network bridge, all of the computers can communicate with each other.

Sunday 6 March 2016

Reading PHP and MySQL a Single Value from a table



When you want to read a single value from a MySQL table following code will help you.

Your need to fetch row using query function with following syntax

     [connection_object]->query(sql statement)

After fetched rows use mysqli_fetch_assoc function for access row by row records
 
    Var_name= mysqli_fetch_assoc([connection_object]->query(SQL Statement))

mysqli_fetch_assoc returns one dimensional array so use can use table column name as index

Thursday 3 March 2016

What is cable Modem


" Simply Dish cable connection to homes "


A cable modem is used in homes for cable services provide by the service provider.Coaxial cable is used to connect our home to cable operator office a modem is attached with television, which convert analog signal to digital signal Vice-Versa.

Saturday 27 February 2016

Baseband



Mainly used in LAN in which entire capacity of the medium is dedicated to a particular device, Simple and small than broad band.

     Digital communication technology in which (in contrast to 'broadband') the entire bandwidth (data carrying capacity) of a medium such as a wire, cable, or channel, is used to transmit a single signal. Therefore, only one communication channel is available at any given time. Baseband is cheaper and simpler (though less versatile) technology than broadband, and is employed in most types of local area networks such as Ethernet and Token Ring.

Why was the OSI developed


  • Educational purpose
  • To make a standard which help to vender for developed network hardware
  • Making a good understanding people of networking concept
  • It’s just a model which help making networking concept more depict able 
  • Making Layering concept more clear than TCP/IP

Directory Service


User friendly information about network resources

     A directory service or name service, maps the names of network resources to their respective network addresses. With the name service type of directory, a user does not have to remember the physical address of a network resource; providing a name locates the resource. Each resource on the network is considered an object on the directory server. Information about a particular resource is stored as attributes of that object. Information within objects can be made secure so that only users with the available permissions are able to access it. More sophisticated directories are designed with namespaces as Subscribers, Services, Devices, Entitlements, Preferences, Content and so on. This design process is highly related to Identity management.

Friday 26 February 2016

C Language program to shift array element with previous one


/* Girfa : C Language program to shift array element with previous one*/
/* Find more question Answer on http://girfahelp.blogspot.in/2012/09/some-program-of-c-language.html */
#include<stdio.h>
#include<conio.h>
void main()
{
int ar[5],i,j;
clrscr();
for(i=0;i<5;i++)
ar[i]=i+1;

Thursday 25 February 2016

Subnet Mask - Subnetting

   The subnet mask is used to divide a network into a further sub network within A private network. Subnetting can be used for security purpose in many cases it enable a network administrator to divide a college network for example into many departments like Botany, Art and Science group network.

   Subnetting is applied on host id we reserve host id bits for subnetting from left to right following example depict all aspects of operation 

What is Subnetting?

Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format.

The full address is:

Soft carriage Return

A soft break or soft return is a carriage return automatically inserted by the software program usually because of a word wrap. Soft returns allow you to continue typing without having to press the return key manually at the end of each line. The picture shows an example of soft returns with formatting marks enabled. The soft returns look like an arrow that goes down and then points to the left, much like the arrow seen on the enter key.


In the picture above blue line indicate hard carriage return and red soft carriage return.