Knowledge in Computer Science

STRING PROCESSING (First semester notes) Chapter-4 (Part-3) Makhanlal chaturvedi national University,Bhopal

(Part-3) IN This, There is a chapter fourth of COMPUTER FUNDAMENTAL Subject Part-3 named PROGRAMMING FUNDAMENTAL Makhanlal Chaturvedi national journalism and communication University, Bhopal. There is a very important note oF Fundamental computers For BCA first semester Students. Share with your friends and help them to learn Fundamental of Computers. There are Five subjects in BCA first semester .

READING AND WRITING STORAGE (First semester notes) Chapter-4 (Part-4) Makhanlal chaturvedi national University,Bhopal

(Part-4) IN This, There is a chapter fourth of COMPUTER FUNDAMENTAL Subject Part-4 named PROGRAMMING FUNDAMENTAL Makhanlal Chaturvedi national journalism and communication University, Bhopal. There is a very important note oF Fundamental computers For BCA first semester Students. Share with your friends and help them to learn Fundamental of Computers. There are Five subjects in BCA first semester .

Cost metrics and pricing models

Cost metrics and pricing models | IT

Code Optimization of compilers

Code optimization for compilers.

Java: array lists

this file will give you the basic way of using arrays in java. it includes how to declare it , how to use it, how to access it, and all the basics you need to know about array lists to use in java. do refer to this and enjoy learning

NCT: network simulation

the attachments include the GUI user manual to learn network simulator,the main c code and the protocols. ENJOY LEARNING.

Computer Networks: CRC : CCiTT 16 bit

This C code is written for CRC , that is Cyclic Redundancy Check , it implements error detection for 16 bit data.

Computer Networks: distance vector algorithm

This C code will explain about the distance vector algorithm. which finds the shortest way to deliver a message using graphs .

Computer Networks: Encryption and decryption

It is very important to encrypt and decrypt a message sent. This c code uses the RSA algorithm to do the same.

Computer Networks: leaky bucket algorithm

it is very important that message sent should be sent in the sequence the user wants it to be. if the message is delivered abruptly in any manner the message delivered is of no use. that is why we use leaky bucket algorithm. this algorithm achieves constant rate of data delivery