Posts

List of college in Daund for 11th Science

List of College in Daund for 11th Science: 1.Sheth Jotiprasad Vidyalaya & Jr College Address:-Ambedkar chowk , Daund, Dist:Pune, Maharashtra . walking distance from railway station 2. St. Sebastian High School & Jr College Address:- Janta Colony , Daund, Dist:Pune, Maharashtra . walking distance from railway station 3. Mary Memorial School & Jr College Adress:-Patas road ,near vijay dhaba, Daund 4. Gurella college Adress :-Daund- Sidhatek road,Daund Above colleges are of Maharashtra State Board  of Higher Education

Graphics using C

To write program for graphics using c you must have following: #include<stdio.h> #include<conio.h> #include<graphics.h> #include<graphics. lib> /*graphics header file necessary in graphics c program*/ main() { int gd = DETECT, gm; /*initialization of graphics drivers*/ -------------------------- initgraph(); /*change the programs into graphics mode */ //other graphics functions closegraph(); /*close the graphics*/ } Following are some important terminology of graphics 1)Header File: To perform program using graphs we have to first add the header file as #include<graphics.h> #include<graphics. lib> It includes all graphics function definition. 2) Opening the graphics mode Normally when any C program is work with any stream it is in by default text mode. Too convert text mode into graphics mode we can initializes the graphics program by using initgraph(). The meaning of initgraph is initialization of graph. These function tak...

Write C program to copy one file in to another using command line arguments

/* program to copy one file in to another using command line arguments */ #include<stdio.h> void main(argc, argv) int argc; char *argv[] ; { FILE *A,  *B; int c; if(argc==1)    {           printf("\n You forgot to enter command line arguments ") ; exit();     } if((A=fopen(argv[1],"r"))==(FILE*)NULL) printf(" \n Couldn't open %s for reading \n", argv[1]); else if((B=fopen(argv[2],"w"))==(FILE*)NULL) printf(" \n Couldn't open %s for writing \n", argv[2]); else     {         while((c=getc(A))! =EOF)         putc(c, B);         printf("\n File has been copied \n") ;   } } OUTPUT : # gcc copyfile.c #. /a. out You forgot to enter the command line arguments #./a.out co1.c out.c Couldn't open co1.c for reading #. /a. out comm1.c out.c File has been copied

Theorems in geometry

Theorem :- Basic Proportionality Theorem ( BPT )  If a line parallel to one side of a triangle interests the other two sides in two distinct points,  then the line divides the other two sides in proportion. Theorem :- Converse of Basic Proportionality Theorem If a line divides two sides of a triangle in the same ratio, then the line is parallel to the third side. Theorem  of Pythagoras :- In a right angled triangle ,  the  square  of the hypotenuse is equal to the sum of the squares of the other two sides. Converse of Pythagoras Theorem :- In a triangle ,  if the square of one side  is equal to the sum of the squares of the remaining two sides , then the angle opposite to the first side is a right angle and the triangle is a right angled triangle. Theorem of 30° 60° 90°   Triangle   If the angles of a triangle are 30°, 60° and 90°, then the side opposite to 30° is half of the hypotenuse an...

Cell phone cloning

What is cell phone cloning ? Introduction and definition :- Cell phone cloning is copying the identity of one mobile telephone to another  telephone .Usually this is done for the purpose of making fraudulent telephone calls .The bill for the calls go to the legitimate subscriber .This made cloning very popular in areas with large immigrant populations , where the cost to "call home" was very steep . The cloner is also able to make effectively anonymous calls ,which attracts another group of interested users. History Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid 90's with a commonly available modification for the Motorola "brick" phones , sch as the Classic, the Ultra Classic , and the Model 8000. Significance Cloning involved modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic Serial Number) via software. You would also have to change the MIN (...

Transport Layer Protocols

Need of Transport Layer a. The Internet layer provides unreliable , connectionless service - "best effort" network. b. The underlying layer (internal layer ) provides the connectionless protocol IP . c. Datagrams may be lost or reordered . d. Datagrams can be duplicated or delivered after long delays . Thus , there is a need for a layer , which takes care of end - to - end delivery. Features of transport layer i. True end to end layer . ii . Takes care of process to process delivery. iii . Acts as a liaison between the application layer and the underlying internetwork details . iv . Shields the applications  from  the complexities of the internetwork. v. Provides a "logical communication " between application processes running on different hosts . For this purpose ,it performs the following duties: i. Packetizing : Divides the application data into packets to be sent over the internetwork . ii . Connection Control : Controls the "logical " c...

Hash Table

If we have a table organization and a search technique which retrieve the key in a single access ,it would be very efficient. To do so, the position of the key in the table should not depend upon the other keys but the location should be calculated on the basis of the key itself .Such an organization and search technique is called hashing . In hashing the address or location of an identifier X is obtained by using some function f(X) which gives address of X in a table. HASHING TERMINOLOGY Hash function :- A function that transforms a key X into a table index is called a hash function. Hash address:- The address of X computed by the hash function is called the hash address or home address of X. Hash Table :- The memory available to maintain the symbol table is sequential . This is referred to as hash table . Bucket :- Each hash table is partitioned into b buckets ht[0]......ht[b-1]. Each bucket is capable of holding 's' records . Thus , a bucket consists of 's' sl...