ºÝºÝߣshows by User: jass91 / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: jass91 / Sun, 26 Apr 2020 08:53:23 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: jass91 Graphs data structures /slideshow/graphs-data-structures/232660014 graphsdatastructures-200426085323
It includes: Introduction to Graphs Applications Graph representation Graph terminology Graph operations Adding vertex and edge in Adjacency matrix representation using C++ program Adjacency List implementation in C++ Homework Problems References ]]>

It includes: Introduction to Graphs Applications Graph representation Graph terminology Graph operations Adding vertex and edge in Adjacency matrix representation using C++ program Adjacency List implementation in C++ Homework Problems References ]]>
Sun, 26 Apr 2020 08:53:23 GMT /slideshow/graphs-data-structures/232660014 jass91@slideshare.net(jass91) Graphs data structures jass91 It includes: Introduction to Graphs Applications Graph representation Graph terminology Graph operations Adding vertex and edge in Adjacency matrix representation using C++ program Adjacency List implementation in C++ Homework Problems References <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/graphsdatastructures-200426085323-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It includes: Introduction to Graphs Applications Graph representation Graph terminology Graph operations Adding vertex and edge in Adjacency matrix representation using C++ program Adjacency List implementation in C++ Homework Problems References
Graphs data structures from Jasleen Kaur (Chandigarh University)
]]>
631 0 https://cdn.slidesharecdn.com/ss_thumbnails/graphsdatastructures-200426085323-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
B+ trees and height balance tree /slideshow/b-trees-and-height-balance-tree/232572405 btreesandheightbalancetree-200424120138
Detailed description about B+ trees and height balanced trees. ]]>

Detailed description about B+ trees and height balanced trees. ]]>
Fri, 24 Apr 2020 12:01:38 GMT /slideshow/b-trees-and-height-balance-tree/232572405 jass91@slideshare.net(jass91) B+ trees and height balance tree jass91 Detailed description about B+ trees and height balanced trees. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/btreesandheightbalancetree-200424120138-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Detailed description about B+ trees and height balanced trees.
B+ trees and height balance tree from Jasleen Kaur (Chandigarh University)
]]>
1200 0 https://cdn.slidesharecdn.com/ss_thumbnails/btreesandheightbalancetree-200424120138-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Basics of c++ /slideshow/basics-of-c-89897115/89897115 basicsofc-180307094238
Our Facebook Page url: https://www.facebook.com/programming.cplusplus C++ language was developed by Bjarne Stroustrup. C++ is just C with classes where class is a user-defined datatype just like structure but with more advance features of object-oriented programming language. An object is a variable of type class which is created during runtime. That's why the objects are allocated memory in heap and are called as reference types. ]]>

Our Facebook Page url: https://www.facebook.com/programming.cplusplus C++ language was developed by Bjarne Stroustrup. C++ is just C with classes where class is a user-defined datatype just like structure but with more advance features of object-oriented programming language. An object is a variable of type class which is created during runtime. That's why the objects are allocated memory in heap and are called as reference types. ]]>
Wed, 07 Mar 2018 09:42:38 GMT /slideshow/basics-of-c-89897115/89897115 jass91@slideshare.net(jass91) Basics of c++ jass91 Our Facebook Page url: https://www.facebook.com/programming.cplusplus C++ language was developed by Bjarne Stroustrup. C++ is just C with classes where class is a user-defined datatype just like structure but with more advance features of object-oriented programming language. An object is a variable of type class which is created during runtime. That's why the objects are allocated memory in heap and are called as reference types. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/basicsofc-180307094238-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Our Facebook Page url: https://www.facebook.com/programming.cplusplus C++ language was developed by Bjarne Stroustrup. C++ is just C with classes where class is a user-defined datatype just like structure but with more advance features of object-oriented programming language. An object is a variable of type class which is created during runtime. That&#39;s why the objects are allocated memory in heap and are called as reference types.
Basics of c++ from Jasleen Kaur (Chandigarh University)
]]>
234 1 https://cdn.slidesharecdn.com/ss_thumbnails/basicsofc-180307094238-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Static variables /slideshow/static-variables/89888724 staticvariables-180307080125
Static variables scope remains within the whole program. IT is not reinitialised again and again. We can declare the members of a class as static as well. Both possess same properties. Our Facebook page: https://www.facebook.com/programming.cplusplus/]]>

Static variables scope remains within the whole program. IT is not reinitialised again and again. We can declare the members of a class as static as well. Both possess same properties. Our Facebook page: https://www.facebook.com/programming.cplusplus/]]>
Wed, 07 Mar 2018 08:01:25 GMT /slideshow/static-variables/89888724 jass91@slideshare.net(jass91) Static variables jass91 Static variables scope remains within the whole program. IT is not reinitialised again and again. We can declare the members of a class as static as well. Both possess same properties. Our Facebook page: https://www.facebook.com/programming.cplusplus/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/staticvariables-180307080125-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Static variables scope remains within the whole program. IT is not reinitialised again and again. We can declare the members of a class as static as well. Both possess same properties. Our Facebook page: https://www.facebook.com/programming.cplusplus/
Static variables from Jasleen Kaur (Chandigarh University)
]]>
958 1 https://cdn.slidesharecdn.com/ss_thumbnails/staticvariables-180307080125-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Operating system notes pdf /slideshow/operating-system-notes-pdf/65491116 ch-2operatingsystem-160830041834
Definition of Computer Classification of Computer Applications of Computer Block Diagram and Working of Computer System Different Peripheral Devices Main Storage and Auxiliary Storage Devices Computer Hardware and Software]]>

Definition of Computer Classification of Computer Applications of Computer Block Diagram and Working of Computer System Different Peripheral Devices Main Storage and Auxiliary Storage Devices Computer Hardware and Software]]>
Tue, 30 Aug 2016 04:18:33 GMT /slideshow/operating-system-notes-pdf/65491116 jass91@slideshare.net(jass91) Operating system notes pdf jass91 Definition of Computer Classification of Computer Applications of Computer Block Diagram and Working of Computer System Different Peripheral Devices Main Storage and Auxiliary Storage Devices Computer Hardware and Software <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ch-2operatingsystem-160830041834-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Definition of Computer Classification of Computer Applications of Computer Block Diagram and Working of Computer System Different Peripheral Devices Main Storage and Auxiliary Storage Devices Computer Hardware and Software
Operating system notes pdf from Jasleen Kaur (Chandigarh University)
]]>
14191 11 https://cdn.slidesharecdn.com/ss_thumbnails/ch-2operatingsystem-160830041834-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE /slideshow/priority-based-congestion-avoidance-hybrid-scheme-published-in-ieee/58429654 jasleen-4th-prposedwork-160218161715
Nowadays, Wireless Sensor Network has been greatly used with RFID technology because of its certain advantages. RFID is abbreviated as radio frequency identification. The frequency identification RFID technology is similar to a Wireless Sensor Network (WSN) as it also captures the physical environment data, process it and provide the rapid response about location and target tracking [3]. RFID active tags are connected with sensors to communicate with users [4]. RFID technology uses radio waves to communicate the data and other necessary information. It includes RFID tags and RFID readers. The tags are equipped on an object which we want to sense. It can discover the information about that object even without coming in contact with it. The data is then send to the host system through intranet. RFID can easily discern the objects and can trace the location even if no information about the physical position is provided. The main difference is that RFID provides much more and accurate information about physical environment than a Wireless Sensor Network could provide. There is a major drawback of this technology which is its lowest communication range up to 12m only due to limited battery problem. This drawback can be made insignificant by integrating it with WSN. As a result, combination of RFID and WSN can provide us with a bundle of environment related information such as how the data is routed by the nodes, which routing protocol is used, resource ID, location and ID of communicating nodes and also the physical condition of nodes. 80 percent of the node’s energy is utilized during the process of communication, processing, and activation [3]. Figure 1 shows the advantages that we can have by integrating these two technologies.]]>

Nowadays, Wireless Sensor Network has been greatly used with RFID technology because of its certain advantages. RFID is abbreviated as radio frequency identification. The frequency identification RFID technology is similar to a Wireless Sensor Network (WSN) as it also captures the physical environment data, process it and provide the rapid response about location and target tracking [3]. RFID active tags are connected with sensors to communicate with users [4]. RFID technology uses radio waves to communicate the data and other necessary information. It includes RFID tags and RFID readers. The tags are equipped on an object which we want to sense. It can discover the information about that object even without coming in contact with it. The data is then send to the host system through intranet. RFID can easily discern the objects and can trace the location even if no information about the physical position is provided. The main difference is that RFID provides much more and accurate information about physical environment than a Wireless Sensor Network could provide. There is a major drawback of this technology which is its lowest communication range up to 12m only due to limited battery problem. This drawback can be made insignificant by integrating it with WSN. As a result, combination of RFID and WSN can provide us with a bundle of environment related information such as how the data is routed by the nodes, which routing protocol is used, resource ID, location and ID of communicating nodes and also the physical condition of nodes. 80 percent of the node’s energy is utilized during the process of communication, processing, and activation [3]. Figure 1 shows the advantages that we can have by integrating these two technologies.]]>
Thu, 18 Feb 2016 16:17:15 GMT /slideshow/priority-based-congestion-avoidance-hybrid-scheme-published-in-ieee/58429654 jass91@slideshare.net(jass91) Priority Based Congestion Avoidance Hybrid Scheme published in IEEE jass91 Nowadays, Wireless Sensor Network has been greatly used with RFID technology because of its certain advantages. RFID is abbreviated as radio frequency identification. The frequency identification RFID technology is similar to a Wireless Sensor Network (WSN) as it also captures the physical environment data, process it and provide the rapid response about location and target tracking [3]. RFID active tags are connected with sensors to communicate with users [4]. RFID technology uses radio waves to communicate the data and other necessary information. It includes RFID tags and RFID readers. The tags are equipped on an object which we want to sense. It can discover the information about that object even without coming in contact with it. The data is then send to the host system through intranet. RFID can easily discern the objects and can trace the location even if no information about the physical position is provided. The main difference is that RFID provides much more and accurate information about physical environment than a Wireless Sensor Network could provide. There is a major drawback of this technology which is its lowest communication range up to 12m only due to limited battery problem. This drawback can be made insignificant by integrating it with WSN. As a result, combination of RFID and WSN can provide us with a bundle of environment related information such as how the data is routed by the nodes, which routing protocol is used, resource ID, location and ID of communicating nodes and also the physical condition of nodes. 80 percent of the node’s energy is utilized during the process of communication, processing, and activation [3]. Figure 1 shows the advantages that we can have by integrating these two technologies. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jasleen-4th-prposedwork-160218161715-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Nowadays, Wireless Sensor Network has been greatly used with RFID technology because of its certain advantages. RFID is abbreviated as radio frequency identification. The frequency identification RFID technology is similar to a Wireless Sensor Network (WSN) as it also captures the physical environment data, process it and provide the rapid response about location and target tracking [3]. RFID active tags are connected with sensors to communicate with users [4]. RFID technology uses radio waves to communicate the data and other necessary information. It includes RFID tags and RFID readers. The tags are equipped on an object which we want to sense. It can discover the information about that object even without coming in contact with it. The data is then send to the host system through intranet. RFID can easily discern the objects and can trace the location even if no information about the physical position is provided. The main difference is that RFID provides much more and accurate information about physical environment than a Wireless Sensor Network could provide. There is a major drawback of this technology which is its lowest communication range up to 12m only due to limited battery problem. This drawback can be made insignificant by integrating it with WSN. As a result, combination of RFID and WSN can provide us with a bundle of environment related information such as how the data is routed by the nodes, which routing protocol is used, resource ID, location and ID of communicating nodes and also the physical condition of nodes. 80 percent of the node’s energy is utilized during the process of communication, processing, and activation [3]. Figure 1 shows the advantages that we can have by integrating these two technologies.
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE from Jasleen Kaur (Chandigarh University)
]]>
614 7 https://cdn.slidesharecdn.com/ss_thumbnails/jasleen-4th-prposedwork-160218161715-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
03 function overloading /slideshow/03-function-overloading/58426118 03function-overloading-160218150416
If any class have multiple functions with same names but different parameters then they are said to be overloaded. Function overloading allows you to use the same name for different functions, to perform, either same or different functions in the same class. If you have to perform one single operation but with different number or types of arguments, then you can simply overload the function. ]]>

If any class have multiple functions with same names but different parameters then they are said to be overloaded. Function overloading allows you to use the same name for different functions, to perform, either same or different functions in the same class. If you have to perform one single operation but with different number or types of arguments, then you can simply overload the function. ]]>
Thu, 18 Feb 2016 15:04:15 GMT /slideshow/03-function-overloading/58426118 jass91@slideshare.net(jass91) 03 function overloading jass91 If any class have multiple functions with same names but different parameters then they are said to be overloaded. Function overloading allows you to use the same name for different functions, to perform, either same or different functions in the same class. If you have to perform one single operation but with different number or types of arguments, then you can simply overload the function. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/03function-overloading-160218150416-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> If any class have multiple functions with same names but different parameters then they are said to be overloaded. Function overloading allows you to use the same name for different functions, to perform, either same or different functions in the same class. If you have to perform one single operation but with different number or types of arguments, then you can simply overload the function.
03 function overloading from Jasleen Kaur (Chandigarh University)
]]>
3369 7 https://cdn.slidesharecdn.com/ss_thumbnails/03function-overloading-160218150416-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Chapter 2.datatypes and operators /slideshow/chapter-2datatypes-and-operators/57606750 chapter2-160128141710
While doing programming in any programming language, you need to use various variables to store various information. Variables are nothing but reserved memory locations to store values. This means that when you create a variable you reserve some space in memory. You may like to store information of various data types like character, wide character, integer, floating point, double floating point, boolean etc. Based on the data type of a variable, the operating system allocates memory and decides what can be stored in the reserved memory.]]>

While doing programming in any programming language, you need to use various variables to store various information. Variables are nothing but reserved memory locations to store values. This means that when you create a variable you reserve some space in memory. You may like to store information of various data types like character, wide character, integer, floating point, double floating point, boolean etc. Based on the data type of a variable, the operating system allocates memory and decides what can be stored in the reserved memory.]]>
Thu, 28 Jan 2016 14:17:10 GMT /slideshow/chapter-2datatypes-and-operators/57606750 jass91@slideshare.net(jass91) Chapter 2.datatypes and operators jass91 While doing programming in any programming language, you need to use various variables to store various information. Variables are nothing but reserved memory locations to store values. This means that when you create a variable you reserve some space in memory. You may like to store information of various data types like character, wide character, integer, floating point, double floating point, boolean etc. Based on the data type of a variable, the operating system allocates memory and decides what can be stored in the reserved memory. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/chapter2-160128141710-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> While doing programming in any programming language, you need to use various variables to store various information. Variables are nothing but reserved memory locations to store values. This means that when you create a variable you reserve some space in memory. You may like to store information of various data types like character, wide character, integer, floating point, double floating point, boolean etc. Based on the data type of a variable, the operating system allocates memory and decides what can be stored in the reserved memory.
Chapter 2.datatypes and operators from Jasleen Kaur (Chandigarh University)
]]>
1659 9 https://cdn.slidesharecdn.com/ss_thumbnails/chapter2-160128141710-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Chapter 1 /slideshow/chapter-1-57332375/57332375 chapter-1-160121155929
C++ is a middle-level programming language developed by Bjarne Stroustrup starting in 1979 at Bell Labs. C++ runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX Most C++ compilers don't care what extension you give your source code, but if you don't specify otherwise, many will use .cpp by default Most frequently used and free available compiler is GNU C/C++ compiler, otherwise you can have compilers either from HP or Solaris if you have respective Operating Systems. ]]>

C++ is a middle-level programming language developed by Bjarne Stroustrup starting in 1979 at Bell Labs. C++ runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX Most C++ compilers don't care what extension you give your source code, but if you don't specify otherwise, many will use .cpp by default Most frequently used and free available compiler is GNU C/C++ compiler, otherwise you can have compilers either from HP or Solaris if you have respective Operating Systems. ]]>
Thu, 21 Jan 2016 15:59:29 GMT /slideshow/chapter-1-57332375/57332375 jass91@slideshare.net(jass91) Chapter 1 jass91 C++ is a middle-level programming language developed by Bjarne Stroustrup starting in 1979 at Bell Labs. C++ runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX Most C++ compilers don't care what extension you give your source code, but if you don't specify otherwise, many will use .cpp by default Most frequently used and free available compiler is GNU C/C++ compiler, otherwise you can have compilers either from HP or Solaris if you have respective Operating Systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/chapter-1-160121155929-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> C++ is a middle-level programming language developed by Bjarne Stroustrup starting in 1979 at Bell Labs. C++ runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX Most C++ compilers don&#39;t care what extension you give your source code, but if you don&#39;t specify otherwise, many will use .cpp by default Most frequently used and free available compiler is GNU C/C++ compiler, otherwise you can have compilers either from HP or Solaris if you have respective Operating Systems.
Chapter 1 from Jasleen Kaur (Chandigarh University)
]]>
1748 6 https://cdn.slidesharecdn.com/ss_thumbnails/chapter-1-160121155929-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Remote desktop connection /slideshow/remote-desktop-connection-57331882/57331882 remotedesktopconnection-160121154836
With Remote Desktop Connection, you can connect to a computer running Windows from another computer running Windows that's connected to the same network or to the Internet. For example, you can use all of your work computer's programs, files, and network resources from your home computer, and it's just like you're sitting in front of your computer at work. To connect to a remote computer, that computer must be turned on, it must have a network connection, Remote Desktop must be enabled, you must have network access to the remote computer (this could be through the Internet), and you must have permission to connect. For permission to connect, you must be on the list of users. Before you start a connection, it's a good idea to look up the name of the computer you're connecting to and to make sure Remote Desktop connections are allowed through its firewall. To find the Remote Desktop Connection shortcut, click the Start button Start button, click All Programs, and then click Accessories. To quickly open Remote Desktop Connection, click the Start button Start button, type mstsc in the search box, and then press Enter. Redirecting a device on your computer makes it available for use in a Remote Desktop session. If a Remote Desktop Connection dialog box appears after you click Connect and enter your credentials, you can redirect local devices and resources, such as your local drives or Clipboard. Click Details, and then select the check box for each item you want to redirect. ]]>

With Remote Desktop Connection, you can connect to a computer running Windows from another computer running Windows that's connected to the same network or to the Internet. For example, you can use all of your work computer's programs, files, and network resources from your home computer, and it's just like you're sitting in front of your computer at work. To connect to a remote computer, that computer must be turned on, it must have a network connection, Remote Desktop must be enabled, you must have network access to the remote computer (this could be through the Internet), and you must have permission to connect. For permission to connect, you must be on the list of users. Before you start a connection, it's a good idea to look up the name of the computer you're connecting to and to make sure Remote Desktop connections are allowed through its firewall. To find the Remote Desktop Connection shortcut, click the Start button Start button, click All Programs, and then click Accessories. To quickly open Remote Desktop Connection, click the Start button Start button, type mstsc in the search box, and then press Enter. Redirecting a device on your computer makes it available for use in a Remote Desktop session. If a Remote Desktop Connection dialog box appears after you click Connect and enter your credentials, you can redirect local devices and resources, such as your local drives or Clipboard. Click Details, and then select the check box for each item you want to redirect. ]]>
Thu, 21 Jan 2016 15:48:36 GMT /slideshow/remote-desktop-connection-57331882/57331882 jass91@slideshare.net(jass91) Remote desktop connection jass91 With Remote Desktop Connection, you can connect to a computer running Windows from another computer running Windows that's connected to the same network or to the Internet. For example, you can use all of your work computer's programs, files, and network resources from your home computer, and it's just like you're sitting in front of your computer at work. To connect to a remote computer, that computer must be turned on, it must have a network connection, Remote Desktop must be enabled, you must have network access to the remote computer (this could be through the Internet), and you must have permission to connect. For permission to connect, you must be on the list of users. Before you start a connection, it's a good idea to look up the name of the computer you're connecting to and to make sure Remote Desktop connections are allowed through its firewall. To find the Remote Desktop Connection shortcut, click the Start button Start button, click All Programs, and then click Accessories. To quickly open Remote Desktop Connection, click the Start button Start button, type mstsc in the search box, and then press Enter. Redirecting a device on your computer makes it available for use in a Remote Desktop session. If a Remote Desktop Connection dialog box appears after you click Connect and enter your credentials, you can redirect local devices and resources, such as your local drives or Clipboard. Click Details, and then select the check box for each item you want to redirect. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/remotedesktopconnection-160121154836-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With Remote Desktop Connection, you can connect to a computer running Windows from another computer running Windows that&#39;s connected to the same network or to the Internet. For example, you can use all of your work computer&#39;s programs, files, and network resources from your home computer, and it&#39;s just like you&#39;re sitting in front of your computer at work. To connect to a remote computer, that computer must be turned on, it must have a network connection, Remote Desktop must be enabled, you must have network access to the remote computer (this could be through the Internet), and you must have permission to connect. For permission to connect, you must be on the list of users. Before you start a connection, it&#39;s a good idea to look up the name of the computer you&#39;re connecting to and to make sure Remote Desktop connections are allowed through its firewall. To find the Remote Desktop Connection shortcut, click the Start button Start button, click All Programs, and then click Accessories. To quickly open Remote Desktop Connection, click the Start button Start button, type mstsc in the search box, and then press Enter. Redirecting a device on your computer makes it available for use in a Remote Desktop session. If a Remote Desktop Connection dialog box appears after you click Connect and enter your credentials, you can redirect local devices and resources, such as your local drives or Clipboard. Click Details, and then select the check box for each item you want to redirect.
Remote desktop connection from Jasleen Kaur (Chandigarh University)
]]>
6277 7 https://cdn.slidesharecdn.com/ss_thumbnails/remotedesktopconnection-160121154836-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Operators in C Programming /slideshow/operators-in-c-programming-54095036/54095036 4-151019003520-lva1-app6891
An operator is a symbol that tells the compiler to perform specific mathematical or logical manipulations. C language supports a rich set of built-in operators. An operator is a symbol that tells the compiler to perform certain mathematical or logical manipulations. Operators are used in program to manipulate data and variables.]]>

An operator is a symbol that tells the compiler to perform specific mathematical or logical manipulations. C language supports a rich set of built-in operators. An operator is a symbol that tells the compiler to perform certain mathematical or logical manipulations. Operators are used in program to manipulate data and variables.]]>
Mon, 19 Oct 2015 00:35:20 GMT /slideshow/operators-in-c-programming-54095036/54095036 jass91@slideshare.net(jass91) Operators in C Programming jass91 An operator is a symbol that tells the compiler to perform specific mathematical or logical manipulations. C language supports a rich set of built-in operators. An operator is a symbol that tells the compiler to perform certain mathematical or logical manipulations. Operators are used in program to manipulate data and variables. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/4-151019003520-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An operator is a symbol that tells the compiler to perform specific mathematical or logical manipulations. C language supports a rich set of built-in operators. An operator is a symbol that tells the compiler to perform certain mathematical or logical manipulations. Operators are used in program to manipulate data and variables.
Operators in C Programming from Jasleen Kaur (Chandigarh University)
]]>
6089 9 https://cdn.slidesharecdn.com/ss_thumbnails/4-151019003520-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Pointers in C Programming /slideshow/pointers-in-c-programming/54094926 8-151019002912-lva1-app6892
A pointer is a variable whose value is the address of another variable, i.e., direct address of the memory location. Like any variable or constant, you must declare a pointer before you can use it to store any variable address. There are few important operations, which we will do with the help of pointers very frequently. (a) we define a pointer variable (b) assign the address of a variable to a pointer and (c) finally access the value at the address available in the pointer variable. This is done by using unary operator * that returns the value of the variable located at the address specified by its operand.]]>

A pointer is a variable whose value is the address of another variable, i.e., direct address of the memory location. Like any variable or constant, you must declare a pointer before you can use it to store any variable address. There are few important operations, which we will do with the help of pointers very frequently. (a) we define a pointer variable (b) assign the address of a variable to a pointer and (c) finally access the value at the address available in the pointer variable. This is done by using unary operator * that returns the value of the variable located at the address specified by its operand.]]>
Mon, 19 Oct 2015 00:29:12 GMT /slideshow/pointers-in-c-programming/54094926 jass91@slideshare.net(jass91) Pointers in C Programming jass91 A pointer is a variable whose value is the address of another variable, i.e., direct address of the memory location. Like any variable or constant, you must declare a pointer before you can use it to store any variable address. There are few important operations, which we will do with the help of pointers very frequently. (a) we define a pointer variable (b) assign the address of a variable to a pointer and (c) finally access the value at the address available in the pointer variable. This is done by using unary operator * that returns the value of the variable located at the address specified by its operand. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/8-151019002912-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A pointer is a variable whose value is the address of another variable, i.e., direct address of the memory location. Like any variable or constant, you must declare a pointer before you can use it to store any variable address. There are few important operations, which we will do with the help of pointers very frequently. (a) we define a pointer variable (b) assign the address of a variable to a pointer and (c) finally access the value at the address available in the pointer variable. This is done by using unary operator * that returns the value of the variable located at the address specified by its operand.
Pointers in C Programming from Jasleen Kaur (Chandigarh University)
]]>
38643 14 https://cdn.slidesharecdn.com/ss_thumbnails/8-151019002912-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Calculating garbage value in case of overflow /slideshow/calculating-garbage-value-in-case-of-overflow/54083953 calculatinggarbagevalueincaseofoverflow-151018163342-lva1-app6891
Garbage Value: If any variable is not initialized then that variables having garbage value(unassigned value). For example: int i; Variable ‘i’ is integer type but it wont assign any value.so,it take garbage value.It maybe any value. Before allocating memory in run time system does not clear the memory before allocating the variable.So,default value of the variable is garbage value.]]>

Garbage Value: If any variable is not initialized then that variables having garbage value(unassigned value). For example: int i; Variable ‘i’ is integer type but it wont assign any value.so,it take garbage value.It maybe any value. Before allocating memory in run time system does not clear the memory before allocating the variable.So,default value of the variable is garbage value.]]>
Sun, 18 Oct 2015 16:33:42 GMT /slideshow/calculating-garbage-value-in-case-of-overflow/54083953 jass91@slideshare.net(jass91) Calculating garbage value in case of overflow jass91 Garbage Value: If any variable is not initialized then that variables having garbage value(unassigned value). For example: int i; Variable ‘i’ is integer type but it wont assign any value.so,it take garbage value.It maybe any value. Before allocating memory in run time system does not clear the memory before allocating the variable.So,default value of the variable is garbage value. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/calculatinggarbagevalueincaseofoverflow-151018163342-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Garbage Value: If any variable is not initialized then that variables having garbage value(unassigned value). For example: int i; Variable ‘i’ is integer type but it wont assign any value.so,it take garbage value.It maybe any value. Before allocating memory in run time system does not clear the memory before allocating the variable.So,default value of the variable is garbage value.
Calculating garbage value in case of overflow from Jasleen Kaur (Chandigarh University)
]]>
2826 6 https://cdn.slidesharecdn.com/ss_thumbnails/calculatinggarbagevalueincaseofoverflow-151018163342-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Final jasleen ppt /slideshow/final-jasleen-ppt-50159623/50159623 finaljasleenppt-150704112017-lva1-app6892
My Tours and Travels Project. New user can login and book their travel. description of various places with their maps is also given. Editing the new records of customers and tourists by administrator. 2) Verifying customers(tourists) registration and complaint forms filled by visitors. 3) Creation of new admin by administrator. 4) Viewing of accounts information by customer online. 5) Creation of new records of tours, number of days and nights, bookings and customers. 6) Amending the records of existing customers and administrator. 7) Each customer or member of the ‘Country Drive’ having unique id and password. 8) Viewing all the details of his/her account, tours and bookings 9) Only administrator can grant permission for bookings, view customers, add customer and admin etc. 10) Password confirmation for customers and admin is applied. 11) Viewing of receipts and balance by tourists and customers. 12) Previous records of customers are also available to admin. 13) Full Proof and ease to use online tour booking, handling services & registration. 14) Admin can add max 2 advertisements on the home page of the website. 15) Also there is complaint form for visitors to enquire about the tours and their booking during, before or after their travel. 16) There are tour details of every tour, description of popular places and their photographs to make tourists know more about the place they are going to visit. ]]>

My Tours and Travels Project. New user can login and book their travel. description of various places with their maps is also given. Editing the new records of customers and tourists by administrator. 2) Verifying customers(tourists) registration and complaint forms filled by visitors. 3) Creation of new admin by administrator. 4) Viewing of accounts information by customer online. 5) Creation of new records of tours, number of days and nights, bookings and customers. 6) Amending the records of existing customers and administrator. 7) Each customer or member of the ‘Country Drive’ having unique id and password. 8) Viewing all the details of his/her account, tours and bookings 9) Only administrator can grant permission for bookings, view customers, add customer and admin etc. 10) Password confirmation for customers and admin is applied. 11) Viewing of receipts and balance by tourists and customers. 12) Previous records of customers are also available to admin. 13) Full Proof and ease to use online tour booking, handling services & registration. 14) Admin can add max 2 advertisements on the home page of the website. 15) Also there is complaint form for visitors to enquire about the tours and their booking during, before or after their travel. 16) There are tour details of every tour, description of popular places and their photographs to make tourists know more about the place they are going to visit. ]]>
Sat, 04 Jul 2015 11:20:17 GMT /slideshow/final-jasleen-ppt-50159623/50159623 jass91@slideshare.net(jass91) Final jasleen ppt jass91 My Tours and Travels Project. New user can login and book their travel. description of various places with their maps is also given. Editing the new records of customers and tourists by administrator. 2) Verifying customers(tourists) registration and complaint forms filled by visitors. 3) Creation of new admin by administrator. 4) Viewing of accounts information by customer online. 5) Creation of new records of tours, number of days and nights, bookings and customers. 6) Amending the records of existing customers and administrator. 7) Each customer or member of the ‘Country Drive’ having unique id and password. 8) Viewing all the details of his/her account, tours and bookings 9) Only administrator can grant permission for bookings, view customers, add customer and admin etc. 10) Password confirmation for customers and admin is applied. 11) Viewing of receipts and balance by tourists and customers. 12) Previous records of customers are also available to admin. 13) Full Proof and ease to use online tour booking, handling services & registration. 14) Admin can add max 2 advertisements on the home page of the website. 15) Also there is complaint form for visitors to enquire about the tours and their booking during, before or after their travel. 16) There are tour details of every tour, description of popular places and their photographs to make tourists know more about the place they are going to visit. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/finaljasleenppt-150704112017-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My Tours and Travels Project. New user can login and book their travel. description of various places with their maps is also given. Editing the new records of customers and tourists by administrator. 2) Verifying customers(tourists) registration and complaint forms filled by visitors. 3) Creation of new admin by administrator. 4) Viewing of accounts information by customer online. 5) Creation of new records of tours, number of days and nights, bookings and customers. 6) Amending the records of existing customers and administrator. 7) Each customer or member of the ‘Country Drive’ having unique id and password. 8) Viewing all the details of his/her account, tours and bookings 9) Only administrator can grant permission for bookings, view customers, add customer and admin etc. 10) Password confirmation for customers and admin is applied. 11) Viewing of receipts and balance by tourists and customers. 12) Previous records of customers are also available to admin. 13) Full Proof and ease to use online tour booking, handling services &amp; registration. 14) Admin can add max 2 advertisements on the home page of the website. 15) Also there is complaint form for visitors to enquire about the tours and their booking during, before or after their travel. 16) There are tour details of every tour, description of popular places and their photographs to make tourists know more about the place they are going to visit.
Final jasleen ppt from Jasleen Kaur (Chandigarh University)
]]>
311 5 https://cdn.slidesharecdn.com/ss_thumbnails/finaljasleenppt-150704112017-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
License Plate recognition /slideshow/license-plate-recognition-46139150/46139150 lpr-150322111747-conversion-gate01
This presentation is based on the research paper "Automated license plate recognition in Egypt']]>

This presentation is based on the research paper "Automated license plate recognition in Egypt']]>
Sun, 22 Mar 2015 11:17:46 GMT /slideshow/license-plate-recognition-46139150/46139150 jass91@slideshare.net(jass91) License Plate recognition jass91 This presentation is based on the research paper "Automated license plate recognition in Egypt' <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lpr-150322111747-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is based on the research paper &quot;Automated license plate recognition in Egypt&#39;
License Plate recognition from Jasleen Kaur (Chandigarh University)
]]>
3884 4 https://cdn.slidesharecdn.com/ss_thumbnails/lpr-150322111747-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The solar system /slideshow/the-solar-system-46138743/46138743 thesolarsystem-150322105723-conversion-gate01
SOLAR SYSTEM . Specially for small age group children. This ppt is for small girl child :) I have also upload ppt for boy child to make it interesting]]>

SOLAR SYSTEM . Specially for small age group children. This ppt is for small girl child :) I have also upload ppt for boy child to make it interesting]]>
Sun, 22 Mar 2015 10:57:23 GMT /slideshow/the-solar-system-46138743/46138743 jass91@slideshare.net(jass91) The solar system jass91 SOLAR SYSTEM . Specially for small age group children. This ppt is for small girl child :) I have also upload ppt for boy child to make it interesting <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thesolarsystem-150322105723-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SOLAR SYSTEM . Specially for small age group children. This ppt is for small girl child :) I have also upload ppt for boy child to make it interesting
The solar system from Jasleen Kaur (Chandigarh University)
]]>
1181 1 https://cdn.slidesharecdn.com/ss_thumbnails/thesolarsystem-150322105723-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The solar system /jass91/the-solar-system-46138649 thesolarsystem-150322105218-conversion-gate01
Everything about solar system. This ppt is specially made for school going children :)]]>

Everything about solar system. This ppt is specially made for school going children :)]]>
Sun, 22 Mar 2015 10:52:17 GMT /jass91/the-solar-system-46138649 jass91@slideshare.net(jass91) The solar system jass91 Everything about solar system. This ppt is specially made for school going children :) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thesolarsystem-150322105218-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Everything about solar system. This ppt is specially made for school going children :)
The solar system from Jasleen Kaur (Chandigarh University)
]]>
410 5 https://cdn.slidesharecdn.com/ss_thumbnails/thesolarsystem-150322105218-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Afforestation environmental issue /slideshow/afforestation-environmental-issue-38982166/38982166 afforestation-environmentalissue-140911123423-phpapp01
Introduction, impact, advantages and disadvantages of afforestation.]]>

Introduction, impact, advantages and disadvantages of afforestation.]]>
Thu, 11 Sep 2014 12:34:23 GMT /slideshow/afforestation-environmental-issue-38982166/38982166 jass91@slideshare.net(jass91) Afforestation environmental issue jass91 Introduction, impact, advantages and disadvantages of afforestation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/afforestation-environmentalissue-140911123423-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Introduction, impact, advantages and disadvantages of afforestation.
Afforestation environmental issue from Jasleen Kaur (Chandigarh University)
]]>
13017 7 https://cdn.slidesharecdn.com/ss_thumbnails/afforestation-environmentalissue-140911123423-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data aggregation in wireless sensor networks /slideshow/data-aggregation-in-wireless-sensor-networks/38981874 dataagg-140911122619-phpapp01
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters]]>

This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters]]>
Thu, 11 Sep 2014 12:26:19 GMT /slideshow/data-aggregation-in-wireless-sensor-networks/38981874 jass91@slideshare.net(jass91) Data aggregation in wireless sensor networks jass91 This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dataagg-140911122619-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
Data aggregation in wireless sensor networks from Jasleen Kaur (Chandigarh University)
]]>
7876 9 https://cdn.slidesharecdn.com/ss_thumbnails/dataagg-140911122619-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network security /jass91/network-security-28565419 networksecurity-131123205942-phpapp02
]]>

]]>
Sat, 23 Nov 2013 20:59:42 GMT /jass91/network-security-28565419 jass91@slideshare.net(jass91) Network security jass91 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/networksecurity-131123205942-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Network security from Jasleen Kaur (Chandigarh University)
]]>
1239 5 https://cdn.slidesharecdn.com/ss_thumbnails/networksecurity-131123205942-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-jass91-48x48.jpg?cb=1628484450 Assistant Professor in Chandigarh University CSE department https://cdn.slidesharecdn.com/ss_thumbnails/graphsdatastructures-200426085323-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/graphs-data-structures/232660014 Graphs data structures https://cdn.slidesharecdn.com/ss_thumbnails/btreesandheightbalancetree-200424120138-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/b-trees-and-height-balance-tree/232572405 B+ trees and height ba... https://cdn.slidesharecdn.com/ss_thumbnails/basicsofc-180307094238-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/basics-of-c-89897115/89897115 Basics of c++