• December 21, 2024

MCA Fifth Semester Model Papers

Faculty: IT 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1.  Cloud Computing  Click Here  Click Here 2.  Analysis & Design of Algorithm  Click Here …

MCA Third Semester Model Papers

Faculty: IT 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1.  Java Technologies  Click Here  Click Here 2.  Web Technologies  Click Here  Click Here 3. …

MCA First Semester Model Papers

Faculty: IT 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1.  Discrete Mathematics  Click Here  Click Here 2.  Programming in C & C++  Click Here …

MSC (Biotechnology) Previous Year Model Papers

Faculty: Science 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1  Immunology, Virology and Pathogenesis  Click Here  Click Here 2.  Cell Biology  Click Here  Click …

MSC (Biotechnology) Final Year Model Papers

Faculty: Science 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1  Plant Biotechnology  Click Here  Click Here 2.  Genetic Engineering  Click Here  Click Here

Breadth-first search

Breadth-first search (BFS) is an algorithm for traversing or searching tree or graph data structures. It starts at the tree root (or some subjective node of a graph, sometimes referred to …

LIFI

Li-Fi refers to visible light communications (VLC) technology, which delivers high-speed, bidirectional, networked mobile communications in a manner similar to Wi-Fi. It promises huge speed advantages, as well as more-secure communications …

BLUE EYES TECHNOLOGY

WHAT IS BLUE EYES TECHNOLOGY?  Aims at creating computational machines that have perceptual and sensory ability.  Use camera and microphone to identify user actions and emotions The term BLUE …

Properties of Ellipse

Ellipse is an elongated form of circle or in other words, circle is an special case of ellipse where the two radii of the circle are equal. Cvc An ellipse explained …

TalkTalk Hackers Demanded £80K in Bitcoin

TalkTalk, a British phone and broadband provider with more than four million customers, disclosed Friday that intruders had hacked its Web site and may have stolen personal and financial data. Sources …

Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data

Homomorphism Encryption (HE) provides a solution to the problem of outsourcing computations privately to a cloud. There are a number of Somewhat Homomorphism Encryption (SHE) schemes that support many additions but …

5 Pen Technology

Today’s era is considered to be as new world era. In the modern world, communication technology is rapidly growing. And of course the computer is the main communication machine used. Since …

Random Scan Display

The arrangement of a simple random scan system is shown in the following figure. System stores and application program in the system memory along with a graphics package. With the help …

The Origins of C++

C++ began as an expanded version of C. The C++ extensions were first invented by Bjarne Stroustrup in 1979 at Bell Laboratories in Murray Hill, New Jersey. He initially called the …

Computer Ergonomics

It seems almost each one in this digital globe is spending a lot of time in frontage of a computer, which can damage the eyes as well as other parts of …