Posts

Showing posts from March, 2016

Day 10

Image
Technology made large populations possible; large populations now make technology indispensable.                                   - Joseph Krutch (Writer)                

Day 9

Image
If you live each day as if it was your last, some day you'll most certainly be right.                                       - Steve Jobs     

markup language

Image
Markup languages are designed for the processing, definition and presentation of text. The language specifies code for formatting, both the layout and style, within a text file. The code used to specify the formatting are called tags. HTML,XHTML,XML,SGML are examples of widely known and used markup language.        Why "html" is called as markup language? Markup language is a set of markup tags. HTML uses markup tags to describe web pages.Markup language is a text-formatting language designed to transform raw text into structured documents, by inserting procedural and descriptive markup into the raw text. Markup is what HTML do to the text inside them. They mark it as a certain type of text(like bold, italic, underline etc). Markup language is a text-formatting language designed to transform raw text into structured documents, by inserting procedural and descriptive markup into the raw text.HTML is a language as it has its own code words like any other langua

Leonardo da Vinci

Image
Leonardo da Vinci (1452-1519) was a painter, architect, inventor, and student of all things scientific. His natural genius crossed so many disciplines that he epitomized the term “Renaissance man”(a man whose seemingly infinite curiosity was equalled only by his powers of invention). Today he remains best known for his art, including two paintings that remain among the world’s most famous and admired, Mona Lisa and The Last Supper . Art, da Vinci believed, was indisputably connected with science and nature. Largely self-educated, he filled dozens of secret notebooks with inventions, observations and theories about pursuits from aeronautics to anatomy. But the rest of the world was just beginning to share knowledge in books made with moveable type, and the concepts expressed in his notebooks were often difficult to interpret. As a result, though he was lauded in his time as a great artist, his contemporaries often did not fully appreciate his genius—the combination of in

Pattern Practice 2

 There is a number N.You have to Generate a pattern from this number N. Pattern from N will be like below pattern. 1 23 456 ........ .......... ...........(N-1)N . Input The first line of the input contains an integer T denoting the number of test cases. The first line of each test case contains a single integer N denoting the number for pattern Output For each test case, output contains a single pattern . Constraints Should contain all the constraints on the input data that you may have. Format it like: 1 ≤ T ≤ 20 1 ≤ N ≤ 1000 Example Input: 2 3 6 Output: 1 23 1 23 456 Explanation Example case 1. Number for pattern is 3 So pattern will be upto 3 1 23    Solution #include<stdio.h> int main() { freopen("input.txt","r",stdin); freopen("output.txt","w",stdout); int i,j,k,num,T,flag; scanf("%d",&T); while(T--) { k=1;flag=1; //printf(""); scanf(&quo

Threading in C

Image
        A thread is a single flow of control within a program.Thread is very much similar to a process.In fact thread is also called light-weight process. What are the differences between process and thread? Threads are not independent of one other like processes as a result threads shares with other threads their code section, data section and OS resources like open files and signals. But, like process, a thread has its own program counter (PC), a register set, and a stack space. Why Multithreading? Threads are popular way to improve application through parallelism. For example, in a browser, multiple tabs can be different threads. MS word uses multiple threads, one thread to format the text, other thread to process inputs, etc. Threads operate faster than processes due to following reasons: 1) Thread creation is much faster. 2) Context switching between threads is much faster. 3) Threads can be terminated easily 4) Communication between threads is faster. C

Day 8

Image
Programs must be written for people to read, and only incidentally for machines to execute.                                  - Harold Abelson  

Pressure.js

Image
Pressure is a JavaScript library that makes dealing with Apple's Force Touch and 3D Touch simple. Force Touch for new Macs and 3D Touch for the new iPhone 6s and 6s Plus, all bundled under one roof with a simple API that makes working with them painless. Pressure gives you a handle on browsers that do and don't support Force or 3D touch so you can have sensible fallbacks for users that don't support it.       Current Browser/Device Support   iPhone 6s (safari)  iPhone 6s Plus (safari )    MacBook 2015 (safari)  13" MacBook Pro 2015 (safari)  15" MacBook Pro 2015 (safari)  Magic Trackpad 2 (safari) (future devices and browser that support force will be added when they come out) If you are not using one of the devices / browsers listed above, here is a gif to show it in action. Example: 1. Pressure Change The best part about Pressure is that is uses a single API that works on both Force Touch and 3D Touch. (note: Apple curren

Youtube-dl

Image
Hi friends! Today in LinuxTips section I will talk about youtube-dl command which is used for downloading videos from youtube and many others websites. youtube-dl   is  a  small  command-line  program to download videos from  youTube.com and a few more sites.It should work on your Unix box, on Windows or on Mac OS X.  It is released to the public domain,which means you can modify it, redistribute it or use it however you like. Syntax :  youtube-dl [OPTIONS] URL [URL...] Example : Suppose I want to download a video from youtube in my Ubuntu Pc then what will I have to do. step 1: At first copy link of video that I want to download (suppose I want to download https://www.youtube.com/watch?v=JcnlZGekHok ) step 2: Open Terminal by using command ctrl+alt+t step 3: write command  youtube-dl https://www.youtube.com/watch?v=JcnlZGekHok step 4: After Press Enter and Downloading will be started. Note : By using this command You Download video of

Pattern Practice 1

Problem description. One participant in Aayam who likes any string S. He decide to draw a pattern from string S. pattern size is |S| * |S|. where |S| length of string S. eg. string is CAR then pattern will be CAR A A RAC please try to help me to find pattern. Input The first line of the input contains an integer T denoting the number of test cases. The description of T test cases follows.Each testcase consists of a pattern consisting of a string S . Output For each test case, output containing string pattern. Constraints 1 ≤ T ≤ 20 1 ≤ S ≤ 1000 Example Input: 2 string dheeraj Output: string t n r i i r n t gnirts dheeraj h a e r e e r e a h jareehd    Solution: #include<stdio.h> #include<string.h> int main()     {     freopen("input.txt","r",stdin);       freopen("output.txt","w",stdout);     char name[101],temp;     int i,j

Install XAMPP Stack On Ubuntu

Image
         Download the latest version from the official download page . As of writing this article, the latest version was 5.6.8. After downloading the XAMPP package, make it executable as shown below. sudo chmod +x xampp-linux-x64-5.6.8-0-installer.run Now, install XAMPP stack as shown below. sudo ./xampp-linux-x64-5.6.8-0-installer.run You’ll be asked to answer a couple questions. Here. I will go with defaults. Press Y to accept the defaults. ---------------------------------------------------------------------------- Welcome to the XAMPP Setup Wizard. ---------------------------------------------------------------------------- Select the components you want to install; clear the components you do not want to install. Click Next when you are ready to continue. XAMPP Core Files : Y (Cannot be edited) XAMPP Developer Files [Y/n] :y Is the selection above correct? [Y/n]: y ---------------------------------------------------------------------------- Installation

Day 7

Image
"Never before in history has innovation offered promise of so much to so many in so short a time."                                   - Bill Gates       

Best Freelance Websites to Find Jobs for It sector

Image
              Whether you’re looking for another way to pay the bills, seeking more professional development opportunities or just love the freedom that freelancing offers, there’s no question that millions of people have discovered the benefits of professional freelancing. As trends like the digital nomad lifestyle grow in popularity, the number of freelance resources out there has increased as well. There are plenty of guides for striking out on your own, but as a freelancer, getting higher-paying gigs isn’t just a matter of signing up on popular platforms. You’ll have to branch out, establish a great portfolio of past work and maybe even prove yourself through tests that showcase your skills. Here’s a list of the 15 best sites to find work as a freelancer. 1. Upwork With over 1.5 million clients, Upwork  (previously oDesk) offers something for every type of freelancer. It accommodates both short- and long-term projects, hourly or per-project work and expert-

Day 6

Image
“To succeed in life and achieve results, you must understand and master three mighty forces— desire, belief, and expectation.”                                                                                          ― A.P.J. Abdul Kalam    

network functions virtualization (NFV)

Image
Network functions virtualization (NFV) is an initiative to virtualize the network services that are now being carried out by proprietary, dedicated hardware. If successful, NFV will decrease the amount of proprietary hardware that's needed to launch and operate network services. The goal of NFV is to decouple network functions from dedicated hardware devices and allow network services that are now being carried out by routers, firewalls, load balancers and other dedicated hardware devices to be hosted on virtual machines (VMs). Once the network functions are under the control of a hypervisor, the services that once require dedicated hardware can be performed on standard x86 servers.        This capability is important because it means that network administrators will no longer need to purchase dedicated hardware devices in order to build a service chain. Because server capacity will be able to be added through software, there will be no need for network adm

Day 5

Image
Design is not just what it looks like and feels like. Design is how it works.                                                                                              - Steve Jobs

API (Application Programming Interface)

Image
Definition  1.A set of routines by which an application program can call specific programs or services of a computer operating system (OS) or network operating system (NOS). 2.A set of routines by which an application program allows another application program to work directly with it.            ( A pplication P rogramming I nterface) A language and message format used by an application program to communicate with the operating system or some other control program such as a database management system (DBMS) or communications protocol. APIs are implemented by writing function calls in the program, which provide the linkage to the required subroutine for execution. Thus, an API implies that a driver or program module is available in the computer to perform the operation or that software must be linked into the existing program to perform the tasks. Plenty of API Programming Is Done Understanding an API is a major part of what a programmer does. Except for

Top 11 Things You Didn't Know About Nikola Tesla

Image
1. Tesla was born on July 10, 1856, in the Austrian Empire, now Croatia. He was the fourth of five children. After a checkered academic career in Europe, he worked as a telegraph drafter and electrician before moving to the United States to work for Thomas Edison in 1884. 2. If you couldn’t imagine life without your TV remote, thank Nikola Tesla for making it possible. Tesla invented, predicted or contributed to development of hundreds of technologies that play big parts in our daily lives -- like the remote control, neon and fluorescent lights, wireless transmission, computers, smartphones, laser beams, x-rays, robotics and, of course, alternating current, the basis of our present-day electrical system. 3. Innovation runs in Tesla’s blood. Tesla once wrote: “My mother was an inventor of the first order and would, I believe, have achieved great things had she not been so remote from modern life and its multi fold opportunities. She invented and constructed all ki

Shutdown your Computer using C Programming Language

Hi friends! It is quite boring to shutdown your computer in windows by pressing windows button and then shutdown button and in ubuntu by pressing button on the corner of your pc. Today I will talk you to how to shutdown your computer using c programming language. /* ******************** Linux Operating System ****************** */ #include <stdio.h>  int main() {   system("shutdown -h now");   return 0; } /* ******************* Linux Operating System ******************** */ Here shutdown -h now is command used for shut down Linux based operating system.There are also some other commands which are also used for shutdown system. /* **************** Windows XP Operating System *************** */  C programming code for Windows XP #include <stdio.h> #include <stdlib.h> int main() {    char ch;    printf("Do you want to shutdown your computer now (y/n)\n");    scanf("%c", &ch);    if (ch == 'y' || ch ==

Java Point

/*      Wap a Program that capitalizes a two-word name.For example the       input dheeraj kumar would produce the output Dheeraj Kumar         */ import java.util.Scanner; public class StandardName {     public static void main(String[] args) {         String fname,lname,name,name1,name2;         Scanner sb=new Scanner(System.in);         System.out.println("Enter first name :");         name1=sb.next();         System.out.println("Enter last name :");         name2=sb.next();         fname=name1.substring(0,1).toUpperCase()+name1.substring(1).toLowerCase();         lname=name2.substring(0,1).toUpperCase()+name2.substring(1).toLowerCase();         name=fname.concat("").concat(lname);         System.out.println("Name :"+name+"");         } } input : Enter first name : dheeraj Enter last name : kumar output: Name :DheerajKumar

Day 4

Image
The Hacker Way is an approach to building that involves continuous improvement and iteration. Hackers believe that something can always be better, and that nothing is ever complete.                                                                - Mark Zuckerberg                    The number one benefit of information technology is that it empowers people to do what they want to do. It lets people be creative. It lets people be productive. It lets people learn things they didn't think they could learn before, and so in a sense it is all about potential. Read more at: http://www.brainyquote.com/quotes/topics/topic_technology.html The number one benefit of information technology is that it empowers people to do what they want to do. It lets people be creative. It lets people be productive. It lets people learn things they didn't think they could learn before, and so in a sense it is all about potential. Read more at: http://www.brainyquote.com/quotes/top

IP address

Image
Every machine on a network has a unique identifier. Just as you would address a letter to send in the mail, computers use the unique identifier to send data to specific computers on a network. Most networks today, including all computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network. In the TCP/IP protocol, the unique identifier for a computer is called its IP address. An Internet Protocol address ( IP address ) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." There are two standards for IP addresses: IP Version 4 (IPv4) and IP Version 6 (IPv6). All co

snooping

Image
Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an e-mail that appears on another's computer screen or watching what someone else is typing. More sophisticated snooping uses software programs to remotely monitor activity on a computer or network device.                          Malicious hackerkeyloggers to monitor keystrokes, capture passwords and login information, and to intercept e-mail and other private communications and data transmissions. Corporations sometimes snoop on employees legitimately to monitor their use of business computers and track Internet usage; governments may snoop on individuals to collect information and avert crime and terrorism. Although snooping has a negative connotation in general, in computer technology snooping

Day 3

Image
Just because something doesn’t do what you planned it to do doesn’t mean it’s useless.                                  - Thomas Edison (Inventor)               

Day 2

Image
Technology is anything that wasn’t around when you were born.                                      - Alan Kay (Computer Scientist)                    

PING or ping

Image
Stands - Packet Internet Groper     Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer and back. Traditionally Ping refers to an Internet Program used to determine whether a specific IP addresss is accessible or not.It works by sending a packet to specified address and waiting for reply. The name comes from active sonar terminology that sends a pulse of sound and listens for the echo to detect objects under water; however, the backronym "PING" meaning "Packet InterNet Groper" has been in use since early days in computing for testing and measuring networks and the Internet.                                     Application of Ping 1. To know IP address of any website :  For this purpose we have to use ping command and type                     ping url  ping www