Vijay Kumar Verma
Testimonial for My College
"The computer technology changes very fast and those who are not able to match with it are left behind forever. I am thankful to SVIET for providing the training programs and workshops on latest technology in the college, equipped me for the challenges of the IT sector. I remember when I joined MCA, I was totally confused. I had taken it up as it was in vogue. But the guidance provided by Ms. Kawaljeet Kaur (HOD MCA) helped me a lot. I thank my Computer Application Department for encouraging me to think globally and spread my wings to take off for the land of rising sun. I am confident that my future is very bright and I would make my college and my parents proud"
About Myself
I’ve learned I don’t know anything. Have also learned that people will pay for what I know.
Favorite Quotes
I would like very much if you call me VJY instead of Long name with respected suffix prefix.
"The computer technology changes very fast and those who are not able to match with it are left behind forever. I am thankful to SVIET for providing the training programs and workshops on latest technology in the college, equipped me for the challenges of the IT sector. I remember when I joined MCA, I was totally confused. I had taken it up as it was in vogue. But the guidance provided by Ms. Kawaljeet Kaur (HOD MCA) helped me a lot. I thank my Computer Application Department for encouraging me to think globally and spread my wings to take off for the land of rising sun. I am confident that my future is very bright and I would make my college and my parents proud"
About Myself
I’ve learned I don’t know anything. Have also learned that people will pay for what I know.
Favorite Quotes
"Arise! awake! and don't stop until goal reach."
“Don't compare yourself with anyone in this world...if you do so, you are insulting yourself.”
“I never topped in the university, but today toppers of best universities are my employees...”Extra
I would like very much if you call me VJY instead of Long name with respected suffix prefix.
Graphics Programs: Draw Circle using Polynomial Method
Source Code
/********************************************************** * Program : Simple Circle Drawing Algorithm * Author : Vijay Kumar Verma (VJY) | MCA * Website : vjysoftworx.com * Date : 25-Jan-2014 ***********************************************************/ #include ‹iostream.h› #include ‹conio.h› #include ‹graphics.h› #include ‹math.h› int main(){ int dr=DETECT, md; initgraph(&dr,&md,"c:\\tc\\bgi"); int h, k, r, x, y, xe,col; cout<<"Enter co-ordinate of center(h,k): "; cin>>h>>k; cout<<"Enter radius: "; cin>>r; cout<<"Enter Color code(0-15): "; cin>>col; x= 0; xe = (int)r/sqrt(2)+0.5; //calculate the end point of x y = r; //add the value of r to y while(x <= xe){ putpixel(x+h,y+k, col); putpixel(x+h,-y+k,col); putpixel(y+h,-x+k, col); putpixel(-y+h,-x+k, col); putpixel(-x+h,-y+k, col); putpixel(-x+h,y+k, col); putpixel(-y+h,x+k, col); putpixel(y+h,x+k, col); x++; y = (int)sqrt(r*r-x*x)+0.5; //calculate the value of y } getch(); closegraph(); return 0; }Output:
Happy New Year 2013
Create File and Folder with Name "CON" in Windows
Most of people wondering, when hear that we cannot create a folder with the name CON.
Simple ppl dont know why they cant create File named with "CON"?
Very few know that they can still create it someway. why are they supposed to do exactly like that..
Now, After reading this tutorial, you will become one of the rest.
Not only CON, we cannot create any of these:
CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9 and more.
The reason is that con, prn, lpt1..lpt9, etc are underlying devices from
the time dos was written. so if u r allowed to create such folders,
there will be an ambiguity in where to write data when the data is
supposed to go to the specified devices. In other words, if i want to
print something, internally what windows does is -- it will write the
data to the folder prn (virtually u can call it a folder, i mean prn,
con, etc are virtual folders in device level). So if we are able to
create con folder, windows will get confused where to write the data, to
virtual con folder or real one.
So Now, Try this...
C:\> md \\.\x:\con
Note: x: represent the Drive letter where want to create. (it may be C:, D: and So on)
Now, Open My Computer and browse through the path where you created CON folder ... Surprising.. ?? Yeah.. you have created it successfully..
Now, try to delete the folder from My computer
OOPS!!! You cant delete it...
Now, try this in command prompt console
Now, Open My Computer and browse through the path where you created CON folder ... Surprising.. ?? Yeah.. you have created it successfully..
Now, try to delete the folder from My computer
OOPS!!! You cant delete it...
Now, try this in command prompt console
C:\> RD \\.\x:\con
Laptop Touch Pad Click option doesn't woked
Last day when I am working on my QT (Its name of my laptop).
A problem is occurred, that is after restarting windows touch pad of laptop
doesn’t work perfectly. There was some error, It works well for moving the
mouse pointer. But click and double click operation cannot performed by touch
pad, even left and right click button works fine. I was shocked. I was trying
to sort out the problem by control panel, there was nothing to do. Finally I restored
the computer at previous time. It still not worked. At last I googled the
problem. I searched a lots of solution but that was not worked. Suddenly, I
think why not download the touch pad drivers. In some solution I found that if
device setting tab available in mouse property then our problem could be solve.
That very option didn’t appear in my mouse property. So, I am tensed. After
then I downloaded the driver called
Synaptics
Pointing Device Driver
Any one can download it from there Laptop manufacturer website or
anywhere. Here is the link that can be also work for most of laptop (HP, Acer,
Lenovo, Sony, Toshiba and more)
After installation of software restart you PC and open the mouse device setting by
Start | Cotrol Panel | Hardware and Sound category | click on "mouse"
OR
Start | Type “main.cpl”
In both case a dialog box will appear like
Now click on Device Setting tab. Then following dialog box will appear that is use to enable and disable the pointing devices. We can also hide / show driver icon from system tray using following box.
For my problem
I used the settings.. button then another window will open
Here taping option provide a lots of facility from where, I just select enable tapping option and my problem had been solved.
I used the settings.. button then another window will open
Here taping option provide a lots of facility from where, I just select enable tapping option and my problem had been solved.
Note: Snaptics driver can not only used for touch pad of
laptop but also used for other pointing devices.
From this setting we can control the speed scroll, gestures
and many more setting easily that increase the value of touch pad. Some video
tutorial also included that can help in understanding the touch pad technique.
F2LA or Forever Friendship License Agreement
In near future if Face book add this agreement before sending the request.
FOREVER FRIENDSHIP LICENSE AGREEMENT (F2LA)
ATTENTION: you may need to scroll down to the end of this F2LA
before you can agree to the F2LA and continue with sending the friend request.
IMPORTANT: THIS AGREEMENT (or "F2LA") IS A
LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED
THIS FRIENDSHIP BY SENDING AND ACCEPTING THE FRIEND REQUEST, YOU HAVE TO ACCEPTS THE F2LA AND AGREES TO THE TERMS OF
THIS AGREEMENT.
1.
Send Request if you know the person.
2.
Send Request if like the activities of person.
3.
You have not permission to interfere in the
activities of person and if person want they can interfere in your life.
4.
Person can give idea and suggestion to you but person
is not responsible, if something may wrong with that condition.
5.
You can never request for money or physical
thing to the person. However if person want they can give you anything (may be poison
to).
6.
You can leave the agreement any time if want but
you have to pay the cost in any way as person demand.
7.
You cannot plan to destroy the person in any
case. If you caught at the time of planning your friendship can destroy and you
may punished.
Questions : BCA 3rd Year (magadh University)
BCA Paper 5 (2010)
Time : 3 hours
Full Marks : 100
The Questions are of equal value.
Answer any five questions, including question no.1 which is compulsory.
1. Choose the correct answer:
(a) While using
msgbox(string, integer, title) function, if the integer argument value is 3,
the resulting Msgbox command buttons are:
the resulting Msgbox command buttons are:
(i)
Abort, Retry, Ignore
(ii)
Yes, No, Cancel
(iii)
Ok, Cancel, Retry
(iv)
None of the above
(b) A form’s
coordinates and dimensions on screen are always measured in :
(i)
Point
(ii)
Twips
(iii)
Pixel
(iv)
Inch
(c) The following
functions converts the numeric values of an indicated date to a visual
basic date type:
basic date type:
(i)
Date value
(ii)
Date serial
(iii)
Date format time
(iv)
None of the above
(d) How do you
create a method for a class
(i)
Creating a public procedure in a class module
(ii)
Creating a private procedure in a class module
(iii)
Creating a properties of class
(iv)
none of the above
(e) One advantage
of the object browser over the properties window is that:
(i) The browser can show both
function and subroutine of the registered
classes
classes
(ii)
The browser can set the properties of registered classes
(iii)
The browser can show both properties and methods of the registered
classes
classes
(iv)
all of the above
(f) All the
following statements are true about variable scope except:
(i)
Local
(ii)
Module
(iii)
Global
(iv)
Static
(g) A new property
in a class module has been created; but its scope is not specified.
What scope is it?
What scope is it?
(i)
Private
(ii)
Friend
(iii)
public
(iv)
Global
(h) A schema
describes:
(i)
Record Relationship
(ii)
Data Elements
(iii)
Record and files
(iv)
All of the above
(i) One of the flowing is valid record-based data
models:
(i)
Object-Oriented model
(ii)
Relational Model
(iii)
Entity relationship Model
(iv)
none of the above
2. (a) Differentiate between implicit variable
declaration and explicit variable declaration by
running a VB program.
running a VB program.
(b) Differentiate
between ListBox and ComboBox control. List basic properties of these.
(c) Write
the source for drawing methods of VB such as Circle and line.
(d) Explain
the key objects of ADO model that enable programmers to retrieve set of
records from a given data source.
records from a given data source.
3. (a) Explain: Error trapping and handling in VB.
(b) Explain the difference between Resume and
Resume Next in an error handler in the
call list.
call list.
(c) Explain what happens when an error is raised
in a procedure that does not contain an error handler.
(d) Explain
with description the properties and methods of err object.
4. (a) Give the
difference between check box control and option button control.
(b) How can
we established the connection of a data bound control to a database using
the Data Environment?
the Data Environment?
(c)
List five properties of the ADO data control Recordset and explain
them.
(d) Write
down the steps in sequence for adding and deleting records with ADODC.
5. (a) Variables
are used by Visual Basic to hold information needed by your application.
What are Visual basic data types? Briefly explain each type.
What are Visual basic data types? Briefly explain each type.
(b) Arrays
and collections provide a mean of organizing a group of objects. What are
the differences between control Array and Controls Collection?
the differences between control Array and Controls Collection?
(c) What
are the uses of Text Boxes in Windows Programs?
(d) Modules
are files that contain program code. List the different types of modules in VB.
6. (a) MDI
applications are useful when it requires working with multiple documents. Write
a program to create MDI application.
a program to create MDI application.
(b) Data
validation is checking the input of a program against the conditions
specified.
Write a program to check validating data at Field Level.
Write a program to check validating data at Field Level.
(c) Write
short notes on : Visual Basic standard controls.
(d) Forms
are used to develop the user interface. Write a program to create and remove
forms at runtime.
7. (a) Write a
short notes on Arrays.
(b)
Differentiate between the class modules and the standard module.
(c) Define shadowing.
(d) how to
change the position of the form during design time. And how to position it
during run time?
during run time?
8. (a) Write
short note Timer Control.
(b) What is
use of Popup Menu? Explain, how to create the popup menu in Visual Basic.
(c) How to
manipulate menu at run-time?
(d)
Distinguish among RUN, Design and Debug modes I Visual Basic.
9. (a) Explain
the purpose and scope of database security and explain the following in
terms of providing security for a database: authorization, views, backup and recovery,
integrity, encryption and RAID technology.
terms of providing security for a database: authorization, views, backup and recovery,
integrity, encryption and RAID technology.
(b) What is
the difference between logical data independence and physical data
independence?
independence?
(c) Explain
the procedure to perform E-R Relational mapping with the help of a suitable
example.
example.
(d) what is
referential integrity? Explain with suitable examples.
10.(a) State any five advantages of DBMS.
(b) Mention
any three advantages of views.
(c) Explain
the purpose of triggers in SQL with the help of an example.
(d) Explain
the functions of Database Administrator.
Subscribe to:
Posts
(
Atom
)