Study material

Android Design Pattern

AMSSOI-Andhra Mahila Sabha School of Informatics

Android Design Pattern

The Android platform provides a common set of design patterns, and with the limited hardware resources you get compared to Web-apps it is still often best to stick with using these directly in production code. There are other frameworks that sort of &quot;wrap&quot; the base platform; these are worth looking into if you have a specific purpose (or perhaps for prototyping/experimenting), but for the best level of support you are generally best sticking with the standard components. &nbsp;<br /> <br /> <br />

Click for more details
C++

AMSSOI-Andhra Mahila Sabha School of Informatics

C++

This document is for C++ programming language aptitude questions frequently asked in Company entrance examinations. You will find it very useful in case you are preparing for Company Placement examinations.<br /> <br /> <br /> <em><strong>Find the information in the attached document..</strong></em>

Click for more details
born facts about people

BBSIMS-B B S Institute of Management Studies

born facts about people

born fact..

Click for more details
Preceding Years  Papers of Karnataka Public Service Commission Gazetted Probationers Main Exam

PPIMT-Prannath Parnami Institute of Management and Technology

Preceding Years Papers of Kar ...

This is the sample paper of&nbsp;Karnataka Public Service Commission Gazetted Probationers Main Exam.There are two parts of this question paper.Paper I included following Concepts:-<br /> <br /> &bull; Modern History of India and Indian Culture with special reference to the History and Culture of Karnataka<br /> &bull; Current events of State, National and International importance<br /> &bull; Statistical Analysis, Graphs and Diagrams<br /> <br /> Paper II included following Concepts:-<br /> &bull; Indian Polity with special reference to Karnataka State<br /> &bull;&nbsp; Indian Economy and Geography of India with Special reference to Karnataka Economy and Karnataka Geography<br /> &bull; The roll and impact of Science and Technology in the development of Karnataka and India.<br /> <br /> Both the papers question papers are of three hours in duration and carries a total mark of 300 each.<br /> <br />

Click for more details
IEEE Standard Format for Paper Presentation

AAMEC-Anjalai Ammal Mahalingam Engineering College

IEEE Standard Format for Paper Presentation

IEEE presentation will claer all the doubts of with the detail informatiom. In the presentation there is a full information aboout IEEE, proper guidelines &nbsp;related to topic, all the necessary points which should be added while presenting or preparing presentation. The guide book is helpful to clear and make the perfect IEEE presentation.&nbsp;

Click for more details

AIT-Acharya Institute of Technology

Object oriented modeling design

13 MCA51

Click for more details
Lesson 21 Delete data from database in PHP for AMSSOI Hyderabad

AMSSOI-Andhra Mahila Sabha School of Informatics

Lesson 21 Delete data from dat ...

<u><strong>Lesson 21: Delete data from database</strong></u><br /> <br /> In the two previous lessons, you have learned to insert and retrieve data from a database. In this lesson, we&#39;ll look at how to delete records in the database, which is considerably easier than inserting data.<br /> <br /> <em><strong>Delete data using SQL</strong></em><br /> <br /> The syntax for an SQL statement that deletes records is:<br /> <br /> <br /> DELETE FROM TableName WHERE condition<br /> <br /> <br /> <u><strong>Example: Delete a record</strong></u><br /> <br /> When deleting a record, you can use the unique AutoNumber field in the database. In our database, it is the column named id. Using this unique identifier ensures that you only delete one record. In the next example, we delete the record where id has the value 24:<br /> <br /> <br /> &lt;html&gt;<br /> &lt;head&gt;<br /> &lt;title&gt;Delete data in the database&lt;/title&gt;<br /> &lt;/head&gt;<br /> <br /> &lt;body&gt;<br /> <br /> &lt;?php<br /> // Connect to database server<br /> mysql_connect(&quot;mysql.myhost.com&quot;, &quot;user&quot;, &quot;sesame&quot;) or die (mysql_error ());<br /> <br /> // Select database<br /> mysql_select_db(&quot;mydatabase&quot;) or die(mysql_error());<br /> <br /> // The SQL statement that deletes the record<br /> $strSQL = &quot;DELETE FROM people WHERE id = 24&quot;;<br /> mysql_query($strSQL);<br /> <br /> // Close the database connection<br /> mysql_close();<br /> ?&gt;<br /> <br /> &lt;h1&gt;Record is deleted!&lt;/h1&gt;<br /> <br /> &lt;/body&gt;<br /> &lt;/html&gt;<br /> <br /> <br /> Remember that there is no &quot;Recycle Bin&quot; when working with databases and PHP. Once you have deleted a record, it is gone and cannot be restored.<br />

Click for more details
Lesson 22 Update data in a database notes for AMSSOI Hyderabad

AMSSOI-Andhra Mahila Sabha School of Informatics

Lesson 22 Update data in a dat ...

<u><strong>Lesson 22: Update data in a database</strong></u><br /> <br /> In previous lessons, you have learned to insert, retrieve and delete data from a database. In this lesson, we will look at how to update a database, i.e., edit the values of existing fields in the table.<br /> <br /> <em><strong>Update data with SQL</strong></em><br /> <br /> The syntax for an SQL statement that updates the fields in a table is:<br /> <br /> <br /> UPDATE TableName SET TableColumn=&#39;value&#39; WHERE condition<br /> <br /> <br /> It is also possible to update multiple cells at once using the same SQL statement:<br /> <br /> <br /> UPDATE TableName SET TableColumn1=&#39;value1&#39;, TableColumn2=&#39;value2&#39; WHERE condition<br /> <br /> <br /> With the knowledge you now have from the lessons 19, 20 and 21, it should be quite easy to understand how the above syntax is used in practice. But we will of course look at an example.<br /> <br /> <em><strong>Example: Update cells in the table &quot;people&quot;</strong></em><br /> <br /> The code below updates Donald Duck&#39;s first name to D. and changes the phone number to 44444444. The other information (last name and birthdate) are not changed. You can try to change the other people&#39;s data by writing your own SQL statements.<br /> <br /> <br /> &lt;html&gt;<br /> &lt;head&gt;<br /> &lt;title&gt;Update data in database&lt;/title&gt;<br /> <br /> &lt;/head&gt;<br /> &lt;body&gt;<br /> <br /> &lt;?php<br /> // Connect to database server<br /> mysql_connect(&quot;mysql.myhost.com&quot;, &quot;user&quot;, &quot;sesame&quot;) or die (mysql_error ());<br /> <br /> // Select database<br /> mysql_select_db(&quot;mydatabase&quot;) or die(mysql_error());<br /> <br /> // The SQL statement is built<br /> $strSQL = &quot;Update people set &quot;;<br /> $strSQL = $strSQL . &quot;FirstName= &#39;D.&#39;, &quot;;<br /> $strSQL = $strSQL . &quot;Phone= &#39;44444444&#39; &quot;;<br /> <br /> $strSQL = $strSQL . &quot;Where id = 22&quot;;<br /> <br /> // The SQL statement is executed<br /> mysql_query($strSQL);<br /> <br /> // Close the database connection<br /> mysql_close();<br /> ?&gt;<br /> <br /> &lt;h1&gt;The database is updated!&lt;/h1&gt;<br /> &lt;/body&gt;<br /> &lt;/html&gt;<br /> <br /> <br /> This example completes the lessons on databases. You have learned to insert, retrieve, delete and update a database with PHP. Thus, you are actually now able to make very advanced and dynamic web solutions, where the users can maintain and update a database using forms.<br /> <br /> If you want to see a sophisticated example of what can be made with PHP and databases, try to join our community. It&#39;s free and takes approximately one minute to sign up. You can, among other things, maintain your own profile using the form fields. Maybe you will get ideas for your own site.<br /> <br /> This also ends the tutorial. PHP gives you many possibilities for adding interactivity to your web site. The only limit is your imagination - have fun!<br />

Click for more details
PHP array functions

AMSSOI-Andhra Mahila Sabha School of Informatics

PHP array functions

The array functions allow you to manipulate arrays.<br /> <br /> PHP supports both simple and multi-dimensional arrays. There are also specific functions for populating arrays from database queries.<br /> <br /> These functions allow you to interact with and manipulate arrays in various ways. Arrays are essential for storing, managing, and operating on sets of variables.<br /> <br /> Simple and multi-dimensional arrays are supported, and may be either user created or created by another function. There are specific database handling functions for populating arrays from database queries, and several functions return arrays.<br /> <br /> <strong>For detailed explanation read the attached document.</strong>

Click for more details
Storage and File Structure

AMSSOI-Andhra Mahila Sabha School of Informatics

Storage and File Structure

Database tables/indexes are typically stored on hard disk in one of many forms, ordered/unordered Flat files, ISAM, Heaps, Hash buckets or B+ Trees. These have various advantages and disadvantages discussed in this topic. The most commonly used are B+trees and ISAM.<br /> <br /> <u><strong>Storage and File Structure</strong></u><br /> <br /> We have been looking mostly at the higher-level models of a database. At the conceptual or logical level the database was viewed as<br /> A collection of tables (relational model).<br /> A collection of classes of objects (object-oriented model).<br /> The logical model is the correct level for database users to focus on. However, performance depends on the efficiency of the data structures used to represent data in the database, and on the efficiency of operations on these data structures.<br /> <br /> <em><strong>For detailed explanation read the attached document.</strong></em>

Click for more details
Indexing & Hashing

AMSSOI-Andhra Mahila Sabha School of Informatics

Indexing & Hashing

<ul> <li> Indexing is used to speed up access to desired data.</li> <li> E.g. author catalog in library</li> <li> A search key is an attribute or set of attributes used to look up records in a file. Unrelated to keys in the db schema.</li> <li> An index file consists of records called index entries.</li> <li> An index entry for key k may consist of</li> <li> An actual data record (with search key value k)</li> <li> A pair (k, rid) where rid is a pointer to the actual data record</li> <li> A pair (k, bid) where bid is a pointer to a bucket of record pointers</li> <li> Index files are typically much smaller than the original file if the actual data records are in a separate file.</li> <li> If the index contains the data records, there is a single file with a special organization.</li> </ul> <br /> <em><strong>For detailed explanation read the attached document.</strong></em>

Click for more details
Query Processing

AMSSOI-Andhra Mahila Sabha School of Informatics

Query Processing

<em><strong>What Is a Query Processor?</strong></em><br /> <br /> A relational database consists of many parts, but at its heart are two major components: the storage engine and the query processor. The storage engine writes data to and reads data from the disk. It manages records, controls concurrency, and maintains log files.<br /> <br /> The query processor accepts SQL syntax, selects a plan for executing the syntax, and then executes the chosen plan. The user or program interacts with the query processor, and the query processor in turn interacts with the storage engine. The query processor isolates the user from the details of execution: The user specifies the result, and the query processor determines how this result is obtained.<br /> <br /> <br /> <br /> <em><strong>For detailed explanation read the attached document.</strong></em>

Click for more details
HTML5 Attributes

AMSSOI-Andhra Mahila Sabha School of Informatics

HTML5 Attributes

Attributes may only be specified within start tags and must never be used in end tags.<br /> <br /> HTML5 attributes are case insensitive and may be written in all uppercase or mixed case, although the most common convention is to stick with lowercase.<br /> <br /> For further information read the attached document....

Click for more details
HTML5 Events

AMSSOI-Andhra Mahila Sabha School of Informatics

HTML5 Events

When a user visit your website, they do things like click on text and images and given links, hover over things etc. These are examples of what JavaScript calls events.<br /> <br /> We can write our event handlers in Javascript or vbscript and you can specify these event handlers as a value of event tag attribute. The HTML5 specification defines various event attributes as listed below:<br /> <br /> <em><strong>For further information read the attached document....</strong></em>

Click for more details
2

TI-Tulas Institute

2

....

Click for more details
JSP Intro

AMSSOI-Andhra Mahila Sabha School of Informatics

JSP Intro

Introduction to JSP Introduction to JSP Java Server Pages or JSP for short is Sun&#39;s solution for developing dynamic web sites. JSP provide excellent server side scripting support for creating database driven web applications. JSP enable the<br /> <br /> JSP or Java Server Pages, was developed by Sun Microsystems. JSP technology is object-oriented programming language and is based on Java language. In this section you will learn about JSP and some its important features.<br /> <br /> <br />

Click for more details
C Interview Questions and Answers

AMSSOI-Andhra Mahila Sabha School of Informatics

C Interview Questions and Answers

This is the C Programming interview questions and answers section for various interview, competitive examination and entrance test. Fully solved examples with explanation. This will be very helpful for those appearing for various competitive and interview exams.<br /> <br /> <strong>For complete details see the attached document..</strong>

Click for more details

NIE-National Institute of Engineering

Oops in C++

Notes for C++

Click for more details
Face to face interview

AMSSOI-Andhra Mahila Sabha School of Informatics

Face to face interview

<strong>Whether you&#39;re looking for your first job or your fifth, you&#39;re after an entry level sales position or top management spot, there are some universal rules to successful interviewing. An interview is not a two way street! It is your job to sell yourself with a positive attitude and enthusiasm. Regardless of your initial impression of the job opportunity, your main objective is to obtain a JOB OFFER by outshining the competition. It is impossible to properly evaluate a position before a bona fide offer has been extended. Preparation for an interview should be a serious matter. Interviewers are looking at you not only as a candidate but as a performer in their organization.</strong><br /> <br /> <strong>For More details click the attachment below.</strong>

Click for more details
Tips for Appearance on the day of Interview

AMSSOI-Andhra Mahila Sabha School of Informatics

Tips for Appearance on the day of Interview

<strong>Your appearance is probably one of the most important aspects when first impressions are concerned. Ever heard the saying &ldquo;A picture is worth a thousand words&rdquo;? The same can be said for your appearance at a job interview. Turn up dressed in dirty, unironed clothing to an interview for an executive position, then no matter how well you perform during that interview, your appearance may be the reason they turn you down.<br /> Also, ensure your appearance isn&rsquo;t too distracting. For example, if you wear nail polish, ensure it&rsquo;s not chipped. Don&rsquo;t wear loud ties, or excessive amounts of jewelry. Ensure your makeup isn&rsquo;t too heavy and make sure your hair is washed and not flopping into your eyes so you have to keep pushing it back.<br /> <br /> For more details read the attached document.</strong>

Click for more details
Learn C and Data Structures

SMU-Sikkim Manipal University

Learn C and Data Structures

<br /> This lecture will gives you all the information regarding related to the subject. From this&nbsp;C and Data Structues notes your all problems come to solution in the easy way. These notes has cover all the essential topic to make you undersand. To know more about the&nbsp;C and Data Structues notes download cand ds glossary.pdf, c language tutorial.pdf and important question.pdf to get the best information.&nbsp;

Click for more details
Tulas

TI-Tulas Institute

Tulas

Speed: One of the major disadvantage of the public-key encryption is that it is slower than secret-key encryption. In secret key encryption, a single shared key is used to encrypt and decrypt the message which speeds up the process while in public key encryption, different two keys are used, both related to each other by a complex mathematical process. Therefore, we can say that encryption and decryption take more time in public key encryption. Authentication: A public key encryption does not have a built-in authentication. Without authentication, the message can be interpreted or intercepted without the user's knowledge. Inefficient: The main disadvantage of the public key is its complexity. If we want the method to be effective, large numbers are needed. But in public key encryption, converting the plaintext into ciphertext using long keys takes a lot of time. Therefore, the public key encryption algorithms are efficient for short messages not for long messages.

Click for more details
Tulas

TI-Tulas Institute

Tulas

The main restriction of private key encryption is the sharing of a secret key. A third party cannot use this key. In public key encryption, each entity creates a pair of keys, and they keep the private one and distribute the public key. The number of keys in public key encryption is reduced tremendously. For example, for one million users to communicate, only two million keys are required, not a half-billion keys as in the case of secret key encryption.

Click for more details
t

TI-Tulas Institute

t

Java is a popular programming language, created in 1995. It is owned by Oracle, and more than 3 billion devices run Java. It is used for: Mobile applications (specially Android apps) Desktop applications Web applications Web servers and application servers Games Database connection And much, much more!

Click for more details
Windows XP notes for Andhra Mahila Sabha School of Informatics Hyderabad

AMSSOI-Andhra Mahila Sabha School of Informatics

Windows XP notes for Andhra Ma ...

<u><strong>Windows XP</strong></u><br /> <br /> The Windows eXPerience operating system is available as home and professional edition and are similar suitable for the use on standalone computers. The home edition is suitable for user which worked with Windows 9x/ME till now and don&#39;t need special network or security features in theire environment. If the user have used Windows NT/2000 private, in business or both, the Professional Edition is not only with a view of the administration optimally. Microsoft already encloses 10,000 drivers on the installation media of Windows XP, about the Windows update further more 2,000 drivers are available.<br /> <br /> The Professional Edition of Windows XP has more network features than the Home Edition. An update of Windows 9 x/ME is possible, with Windows NT/2000 only the Professional Edition can be used for update. Optional FAT32 and NTFS are available as a file system for the installation partition.<br /> <br /> Windows XP (Windows version 5.1) becomes a predecessor of Windows 9x/ME as well as Windows NT/2000 and is available for 32-bits CPUs in the following versions:<br /> <br /> - Embedded<br /> - Home Edition (1 CPU) for private user (Oct. 2001)<br /> - Professional Edition (2 CPU) for business user (Oct. 2001)<br /> - Media Center (1 CPU) especially for multimedia devices (Nov. 2002)<br /> - Tablet PC Edition especially for Tablet PCs (Nov. 2002)<br /> - Server Edition (4 CPU)<br /> - Advanced Server (8 CPU), also 64-bit Intel CPUs<br /> - Microsoft Windows Fundamentals for Legacy PCs (July 2007)<br /> <br /> A 64-bit version of Windows XP was announced officially of Microsoft in April 2003. The RC2 was available in February 2005. Windows XP Professional x64 was published in April 2005. At most 16 gbyte RAM are utilizably with that, the virtual address range enlarges to 16 tbyte.<br />

Click for more details

AMSSOI-Andhra Mahila Sabha School of Informatics

File System Implementation not ...

<u><strong>File System Implementation</strong></u><br /> <br /> Discuss several file system implementation strategies.<br /> <br /> First implementation strategy: contiguous allocation. Just lay out the file in contiguous disk blocks. Used in VM/CMS - an old IBM interactive system.<br /> Advantages:<br /> Quick and easy calculation of block holding data - just offset from start of file!<br /> For sequential access, almost no seeks required.<br /> Even direct access is fast - just seek and read. Only one disk access.<br /> <br /> Disadvantages:<br /> Where is best place to put a new file?<br /> Problems when file gets bigger - may have to move whole file!!<br /> External Fragmentation.<br /> Compaction may be required, and it can be very expensive.<br /> <br /> Next strategy: linked allocation. All files stored in fixed size blocks. Link together adjacent blocks like a linked list.<br /> <br /> Advantages:<br /> No more variable-sized file allocation problems. Everything takes place in fixed-size chunks, which makes memory allocation a lot easier.<br /> No more external fragmentation.<br /> No need to compact or relocate files.<br /> <br /> Disadvantages:<br /> Potentially terrible performance for direct access files - have to follow pointers from one disk block to the next!<br /> Even sequential access is less efficient than for contiguous files because may generate long seeks between blocks.<br /> Reliability -if lose one pointer, have big problems.<br /> <br /> FAT allocation. Instead of storing next file pointer in each block, have a table of next pointers indexed by disk block. Still have to linearly traverse next pointers, but at least don&#39;t have to go to disk for each of them. Can just cache the FAT table and do traverse all in memory. MS/DOS and OS/2 use this scheme.<br />

Click for more details
File System Interface notes for Andhra Mahila Sabha School of Informatics Hyderabad

AMSSOI-Andhra Mahila Sabha School of Informatics

File System Interface notes fo ...

<u><strong>File System Interface</strong></u><br /> <br /> A frequent use of streams is to communicate with a file system to which groups of data (files) can be written and from which files can be retrieved.<br /> <br /> Common Lisp defines a standard interface for dealing with such a file system. This interface is designed to be simple and general enough to accommodate the facilities provided by ``typical&#39;&#39; operating system environments within which Common Lisp is likely to be implemented. The goal is to make Common Lisp programs that perform only simple operations on files reasonably portable.<br /> <br /> To this end Common Lisp assumes that files are named that given a name one can construct a stream connected to a file of that name and that the names can be fit into a certain canonical implementation-independent form called a pathname.<br /> <br /> Facilities are provided for manipulating pathnames for creating streams connected to files and for manipulating the file system through pathnames and streams.<br />

Click for more details
12 Codd Rules

AMSSOI-Andhra Mahila Sabha School of Informatics

12 Codd Rules

Codd&#39;s twelve rules are a set of thirteen rules (numbered zero to twelve) proposed by Edgar F. Codd, a pioneer of the relational model for databases, designed to define what is required from a database management system in order for it to be considered relational, i.e., a relational database management system (RDBMS).[1][2] They are sometimes jokingly referred to as &quot;Codd&#39;s Twelve Commandments&quot;.<br /> Codd produced these rules as part of a personal campaign to prevent his vision of the relational database being diluted, as database vendors scrambled in the early 1980s to repackage existing products with a relational veneer. Rule 12 was particularly designed to counter such a positioning.<br /> Even if such repackaged non-relational products eventually gave way to SQL DBMSs, no popular &quot;relational&quot; DBMSs are actually relational, be it by Codd&rsquo;s twelve rules or by the more formal definitions in his papers, in his books or in succeeding works in the academia or by its coworkers and successors, Christopher J. Date, Hugh Darwen, David McGoveran and Fabian Pascal. Only less known DBMSs, most of them academic, strive to comply. The only commercial example, as of December 2010, is Dataphor.<br /> Some rules are controversial, specially rule three, due to the debate on three-valued logic.<br /> <br /> <strong>For further information read the attached document....</strong>

Click for more details
111

AMSSOI-Andhra Mahila Sabha School of Informatics

111

Codd&#39;s twelve rules are a set of thirteen rules (numbered zero to twelve) proposed by Edgar F. Codd, a pioneer of the relational model for databases, designed to define what is required from a database management system in order for it to be considered relational, i.e., a relational database management system (RDBMS).[1][2] They are sometimes jokingly referred to as &quot;Codd&#39;s Twelve Commandments&quot;.<br /> Codd produced these rules as part of a personal campaign to prevent his vision of the relational database being diluted, as database vendors scrambled in the early 1980s to repackage existing products with a relational veneer. Rule 12 was particularly designed to counter such a positioning.<br /> Even if such repackaged non-relational products eventually gave way to SQL DBMSs, no popular &quot;relational&quot; DBMSs are actually relational, be it by Codd&rsquo;s twelve rules or by the more formal definitions in his papers, in his books or in succeeding works in the academia or by its coworkers and successors, Christopher J. Date, Hugh Darwen, David McGoveran and Fabian Pascal. Only less known DBMSs, most of them academic, strive to comply. The only commercial example, as of December 2010, is Dataphor.<br /> Some rules are controversial, specially rule three, due to the debate on three-valued logic.<br /> <br /> <strong>For further information read the attached document....</strong>

Click for more details
Overview of Oracle

AMSSOI-Andhra Mahila Sabha School of Informatics

Overview of Oracle

An Oracle database is a collection of data treated as a unit. The purpose of a database is to store and retrieve related information. A database server is the key to solving the problems of information management. In general, a server reliably manages a large amount of data in a multiuser environment so that many users can concurrently access the same data. All this is accomplished while delivering high performance. A database server also prevents unauthorized access and provides efficient solutions for failure recovery.<br /> <br /> Oracle Database is the first database designed for enterprise grid computing, the most flexible and cost effective way to manage information and applications. Enterprise grid computing creates large pools of industry-standard, modular storage and servers. With this architecture, each new system can be rapidly provisioned from the pool of components. There is no need for peak workloads, because capacity can be easily added or reallocated from the resource pools as needed.<br /> <br /> The database has logical structures and physical structures. Because the physical and logical structures are separate, the physical storage of data can be managed without affecting the access to logical storage structures.<br /> <br /> <strong>For further information read the attached document....</strong>

Click for more details
Tulas Institute

TI-Tulas Institute

Tulas Institute

Tulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas InstituteTulas Institute

Click for more details
Tulas

TI-Tulas Institute

Tulas

a b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c da b c d a b c d

Click for more details
1

TI-Tulas Institute

1

..

Click for more details
cyber security

PU-Poornima University

cyber security

Cyber security is the practice of protecting systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad term that encompasses a wide range of security measures, from physical security to data encryption.

Click for more details
Tulas

TI-Tulas Institute

Tulas

Java is a popular programming language, created in 1995. It is owned by Oracle, and more than 3 billion devices run Java. It is used for: Mobile applications (specially Android apps) Desktop applications Web applications Web servers and application servers Games Database connection And much, much more!

Click for more details

MERI-Management Education and Research Institute

Java Notes

This Notes is Very Helpful to All Students..

Click for more details

BIT-Birla Institute of Technology Noida

Admission Alert - MCA Course A ...

Admissions open for MCA batch in all the campuses of BIT.

Click for more details
sales3

JNC-Jyoti Nivas College

sales3

ppt

Click for more details
tesdt

democollegey4w

tesdt

revr gr ybvy

Click for more details
By Specialization :  
By Course :  
POST BLOG
Why not help your peers? Share your college’s study materials, lecture notes or assignments

What is there for you?

  • Study material

    Colleges are sharing lecture notes, study material, file, assignment etc.

    Study material
  • Clarify Doubts

    Ask any study related doubt and get answered by college students and faculty.

    Clarify Doubts
  • Educational videos

    College student sharing a great video to help peers study.

    Educational videos
  • Previous Year Papers

    Access previous year papers for various courses.

    Previous Year Papers
  • Info. update by students of the respective college only.