STRING PROCESSING (First semester notes) Chapter-4 (Part-3) Makhanlal chaturvedi national University,Bhopal
(Part-3) IN This, There is a chapter fourth of COMPUTER FUNDAMENTAL Subject Part-3 named PROGRAMMING FUNDAMENTAL Makhanlal Chaturvedi national journalism and communication University, Bhopal. There is a very important note oF Fundamental computers For BCA first semester Students. Share with your friends and help them to learn Fundamental of Computers. There are Five subjects in BCA first semester .
READING AND WRITING STORAGE (First semester notes) Chapter-4 (Part-4) Makhanlal chaturvedi national University,Bhopal
(Part-4) IN This, There is a chapter fourth of COMPUTER FUNDAMENTAL Subject Part-4 named PROGRAMMING FUNDAMENTAL Makhanlal Chaturvedi national journalism and communication University, Bhopal. There is a very important note oF Fundamental computers For BCA first semester Students. Share with your friends and help them to learn Fundamental of Computers. There are Five subjects in BCA first semester .
Cost metrics and pricing models
Cost metrics and pricing models | IT
Code Optimization of compilers
Code optimization for compilers.
Code Optimization | Compilers part 2
Sequence of code optimization
Code optimization | compilers part 3
Sequence of code optimization.
Java: array lists
this file will give you the basic way of using arrays in java. it includes how to declare it , how to use it, how to access it, and all the basics you need to know about array lists to use in java. do refer to this and enjoy learning
NCT: network simulation
the attachments include the GUI user manual to learn network simulator,the main c code and the protocols. ENJOY LEARNING.
Computer Networks: CRC : CCiTT 16 bit
This C code is written for CRC , that is Cyclic Redundancy Check , it implements error detection for 16 bit data.
Computer Networks: distance vector algorithm
This C code will explain about the distance vector algorithm. which finds the shortest way to deliver a message using graphs .
Computer Networks: Encryption and decryption
It is very important to encrypt and decrypt a message sent. This c code uses the RSA algorithm to do the same.
Computer Networks: leaky bucket algorithm
it is very important that message sent should be sent in the sequence the user wants it to be. if the message is delivered abruptly in any manner the message delivered is of no use. that is why we use leaky bucket algorithm. this algorithm achieves constant rate of data delivery