• Shagun

Niether be electron nor proton. Be Neutral

Ray Optics And Optical Instruments

8
Jul,2017

0

Open the link to practice questions https://goo.gl/forms/8yqgHmDx4btj7zJF2 •Laws of reflection :- 1. The incident ray, normal and reflected ray all lie in the same plane. 2. The angle of incidence is always equal to angle of reflection. •New Cartesian sign…

Quick View on Electrostatics Force Discharge Potential

8
Jul,2017

1

To Practice try these questions. Open the given link. https://goo.gl/forms/8yqgHmDx4btj7zJF2 • Electrostatics is the study of charges at rest. • The intrinsic property of fundamental particle of matter which give rise to electric force between objects is called charge. •…

Basic Programs of Operating System

25
Nov,2016

0

Program for creating a file and writing into it. #include<sys/types.h> #include<stdio.h> #include<fcntl.h> int main()

Steganography Techniques

10
Aug,2016

0

Steganography is a useful technique for hiding data behind the carrier file such as image, audio, video etc. and that data securely transfer from sender to receiver.For the secured sending data, this technique is used.Following is the technique of hiding…

People Don’t Fail They Gave Up

1
Jun,2016

0

In today’s world you often find people demotivating you, pushing you back from the position where you are and always want to be.The main reason behind this is so called Competition between every individual in every field whether it is related to the educational field or any technological field.

Networks : Hamming Code

4
May,2016

0

#include<stdio.h> #include<math.h> using namespace std; int main()

Networks : Program for Checksum

4
May,2016

0

Program for Checksum. #include<iostream> #include<conio.h> using namespace std; int main(){ int n,er3,deci,deci2; cout<<“————————–Sender side—————————“;

Wyvern the Programming Language

17
Jan,2016

0

Wyvern Language Computer scientists at Carnegie Mellon University have designed a way to safely use multiple programming languages within the same program,enabling programmers to use the language most appropriate for each function while guarding against  code injection attacks,one of the…

What is Computer Hacking

14
Jan,2016

0

Computer Hacking In a cyber security world,the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as Hacker,and the process is referred as Hacking.Now a days.people started think that…

New Batteries that hold twice the Charge as Li-ion

10
Jan,2016

0

A  new manufacturing process will allow for solid state batteries to be produced that are both more affordable and more reliable than current generation lithium-ion options.