Friday, August 30, 2013

Punjab Technical University - Bachelor of Pharmacy (PTU - B.Pharmacy)

Punjab Technical University - Bachelor of Pharmacy (PTU - B.Pharmacy)
PDF Format available for download as well as online viewing.

Punjab Technical University - Bachelor of Commerce - Professional (PTU - B.COM Professional)

Punjab Technical University - Bachelor of Commerce - Professional (PTU - B.COM Professional)
PDF Format available for download as well as online viewing.

Punjab Technical University - Bachelor of Science in Hotel Management and Catering Technology (PTU- B.Sc HMCT)

Punjab Technical University - Bachelor of Science in Hotel Management and Catering Technology (PTU- B.Sc HMCT)
PDF Format available for download as well as online viewing.

Punjab Technical University - Bachelor of Science in Airlines, Tourism and Hospitality Management (PTU- B.Sc ATHM)

Punjab Technical University - Bachelor of Science in Airlines, Tourism and Hospitality Management (PTU- B.Sc ATHM)
PDF Format available for download as well as online viewing.

Punjab Technical University -- Bachelor of Computer Applications (PTU - BCA) Batch 2011 Onwards

Punjab Technical University -- Bachelor of Computer Applications (PTU - BCA) Batch 2011 Onwards
This syllabus is for newer batches which started from 2012 onwards. Older batches should refer to the other syllabus.
PDF Format available for download as well as online viewing.

Punjab Technical University -- Bachelor of Computer Applications (PTU - BCA)

Punjab Technical University -- Bachelor of Computer Applications (PTU - BCA)
PDF Format available for online viewing as well as download also,

Punjab Technical University -- Bachelor of Business Administration -- Syllabus (PTU - BBA) Batch 2012 onwards

Punjab Technical University -- Bachelor of Business Administration -- Syllabus (PTU - BBA)Batch 2012 Onwards This syllabus is for newer batches which started from 2012 onwards. Older batches should refer to the other syllabus.
PDF Format available for download as well as online viewing.

Punjab Technical University -- Bachelor of Business Administration -- Syllabus (PTU - BBA)

Punjab Technical University -- Bachelor of Business Administration -- Syllabus (PTU - BBA)
PDF format available for online viewing as well as for download also

Syllabus - Punjab Technical University - Master of Science in Airlines, Tourism and Hospitality Management - (PTU - M.Sc ATHM)

Syllabus - Master of Pharmaceutics - M.Pharma - Punjab Technical University - PTU
PDF format available for download as well as online viewing.

Syllabus - Master of Pharmaceutics - M.Pharma - Punjab Technical University - PTU

Syllabus - Master of Pharmaceutics - M.Pharma - Punjab Technical University - PTU
PDF format available for download as well as online viewing.

Friday, August 23, 2013

Syllabus - Master of Computer Applications - MCA - Punjab Technical University - PTU - Batch 2012

Syllabus - Master of Computer Applications - MCA - Punjab Technical University - PTU - Batch 2012

PDF format available for download as well as online viewing.

Syllabus - Master of Business Administation in International Business - MBA IB - Punjab Technical University - PTU - Batch 2012

Syllabus - Master of Business Administation in International Business - MBA IB - Punjab Technical University - PTU - Batch 2012

PDF Format available for download as well as online viewing.

Syllabus - Master of Business Administration - MBA - Punajb Technical University - PTU - Batch 2012

PDF format available for  download as well as online view
Syllabus - Master of Business Administration - MBA - Punajb Technical University - PTU - Batch 2012

Monday, August 19, 2013

SAP - Systems, Applications and Products



This presentation explains the topic SAP - Systems, Applications and Products

VPN - Virtual Private Network

This presentation gives you the detailed information about VPN - Virtual Private Network. Again this presentation is prepared by students. So, kindly verify the information before using it.

Windows Registry

This presentation gives you the overview of the windows registry, the core data base of Windows Operating System.


Friday, August 16, 2013

Machine Language

This presentation explains the topic of Machine Language in the subject of System Software / System Programming.


Linkers and Loaders

This presentation explains the topic of Linkers and Loaders in the subject of System Software / System Programming.


Editors

This presentation explains the topic of Editors in the subject of System Software / System Programming.


Compiler -2

This presentation explains the topic of Compilers in the subject of System Software / System Programming.


Compiler - 1

This presentation explains the topic of Compiler in the subject of System Software / System Programming.


Assembly Process

This presentation explains the topic of Assembly Process in the subject of System Software / System Programming.


Assembler - 2

This presentation explains the topic of Assembler in the subject of System Software / System Programming.


Assembler-1

This presentation explains the topic of Assembler in the subject of System Software / System Programming.


Saturday, August 10, 2013

Topic 1 Data vs Info

This video Presentation explains the concept of DATA / INFORMATION in Database Management Systems.

Topic 2 file system & database

This video Presentation explains the concept of "file system & database" in Database Management Systems.

Topic 3 Adv Disadv Components

This video Presentation explains the concept of "Adv Disadv Components" in Database Management Systems.

Topic 4 Architecture

This video Presentation explains the concept of "Architecture" in Database Management Systems.

Topic 5 Database Models

This video Presentation explains the concept of "Database Models" in Database Management Systems.

Topic 6 Database Models continued)

This video Presentation explains the concept of - in Database Management Systems.

Topic 7 Relational DB & ER Model

This video Presentation explains the concept of "Relational DB & ER Model" in Database Management Systems.

Topic 8 normalization

This video Presentation explains the concept of "Normalization" in Database Management Systems.

Topic 9 Join Dependency & 5NF

This video Presentation explains the concept of "Join Dependency & 5NF" in Database Management Systems.

Topic 10 RDBMS & Relational Algebra

This video Presentation explains the concept of - in Database Management Systems.

Topic 11 Distributed DBMS

This video Presentation explains the concept of - in Database Management Systems.

Topic 12 concurrency & recovery

This video Presentation explains the concept of " concurrency & recovery" in Database Management Systems.

Topic 13 security & integrity

This video Presentation explains the concept of "security & integrity" in Database Management Systems.

Thursday, August 8, 2013

Turbo C / C++ Compiler with support for Windows 7 in Full Screen Mode


Turbo C / C++ Compiler is the legacy software and is required by every computer student who starts learning programming. Turbo C / C++ Compiler generally works very well with all windows edition except Windows 7. Generally students are not able to run compiler in the full screen mode. Here is the solution.

The compiler available here can run FULL Screen in Windows 7 also. It utilizes DOSBOX program for this purpose. But don’t worry. You don’t have to install DOSBOX separately. Everything is already packed for you. Just download the zip file. Extract the setup and then install it like any other software on your windows machine. A shortcut will be created on your DESKTOP. Double click on it to execute and that’s it.

Dev-C++ by Bloodshed Software


Bloodshed Dev-C++ is a full-featured Integrated Development Environment (IDE) for the C/C++ programming language. It uses Mingw port of GCC (GNU Compiler Collection) as it's compiler. Dev-C++ can also be used in combination with Cygwin or any other GCC based compiler.

Java Development Kit / Java Software Development Kit (JDK / JSDK)


The Java Development Kit (JDK) is an Oracle Corporation product aimed at Java developers. Since the introduction of Java, it has been by far the most widely used Java Software Development Kit (SDK).
The JDK has as its primary components a collection of programming tools, including:
java – the loader for Java applications. This tool is an interpreter and can interpret the class files generated by the javac compiler. Now a single launcher is used for both development and deployment. The old deployment launcher, jre, no longer comes with Sun JDK, and instead it has been replaced by this new java loader. 

Direct from Dell - Summary Presentation

Direct from Dell: Strategies that Revolutionized an Industry (Collins Business Essentials) by Michael Dell and Catherine Fredman.

This presentation explains the summary of the famous book "Direct From Dell".
You can read it online or can download to read it later.

Linux Command Reference - Cheat Sheet

This Linux sheet is provided by one of the best book publishing company ie O'Reily. This will be handy to you if you want to learn and have a look to Linux Commands.
You can read it online or can download it to read later.

Made in America - Sam Walton -- PPT Format

Made in America - Sam Walton - Boot Presentation in PPTx format. You can read it online as well as can download also to read it later.

Made in America - Sam Walton in PDF Format

This books is in PDF Format. You can read it online and can download as to read it later.

Data Structure - Lecture 7 - Selection Sort

This Presentation explains the concept of Selection Sort in Data Structure

WhatsApp Launches Voice Messaging Known as Push-To-Talk Service in its latest Update

With all the texting that people do these days, it’s naturally taken a messaging app to re-introduce the act of using our voices to communicate.

WhatsApp, the increasingly ubiquitous global messaging app, has launched “voice messaging,” a new feature that will let users record and send audio files with one tap on their smartphones. UPDATE: WhatsApp has announced the feature on its blog; the post includes a video demo, also embedded below.

The messaging company, which has 45 employees and is based in Mountain View, Calif., confirmed a report in AllThingsD that the service would allow users to press and hold the microphone on their keyboard to send a voice message, a bit like using a walkie-talkie.

Said to be a brainchild of the US-based company's co-founder and CEO Jan Koum, the new feature allows users to just hold to record a message and release to send it.

There is also a blue blinker notification that lets users know when the message is received. In case the user decides not to send the message, a swipe to the left and the recording is deleted. All this is built into a single tap. There is also no time-length limit for the recorded messages. Also, the volume automatically switches from speaker when held at arm's length to soft when held next to an ear.

Wednesday, August 7, 2013

JPSays.com is on FACEBOOK and TWITTER now

Hi Readers !

JPSays.com has got its official pages on Facebook and Twitter now. All the posts of the blogs will be available on Facebook page and Twitter.

So, All of you should have a look and suggest what else can be done it spread my this effort JPSays.com




Facebook Address









Twitter Address

www.twitter.com.JPSaysDotCom



Smart TV Users -- Get ready to be HACKED.......

Attackers can use embedded features, such as microphones, cameras, and lots of storage, to spy on people and steal their sensitive data.
Just like with mobile phones, the more advanced the common television gets, the more likely it can be turned against its users by attackers who can use embedded features, such as microphones, cameras, and lots of storage, to spy on people and steal their sensitive data. At Black Hat USA, two different presentations offered research on how these activities can be carried out against the current generations of Smart TVs
It's a troubling development for consumers because, as researcher Seungjin Lee with Korea University put it, when a home computer is hacked there is usually just one main victim. But if a home television is hacked and the camera trained on its watchers, that affects the whole family and invades the most private areas of the home. However, remote attacks against smart TVs aren't just a consumer concern.

Apple Offers Trade-In Program for Third-Party iPhone, iPad Adapters

Apple on Monday detailed a new program where owners of third-party iPhone, iPod and iPad adapters can trade their products in for an Apple charger for $10 — roughly half the typical price of a new Apple charger.
Apple USB charger 

“Recent reports have suggested that some counterfeit and third party adapters may not be designed properly and could result in safety issues,” Apple said on a website announcing the program. “While not all third party adapters have an issue, we are announcing a USB Power Adapter Takeback Program to enable customers to acquire properly designed adapters.”

Monday, August 5, 2013

Install any edition (Home Basic, Home Premium, Professional, Ultimate) of Windows 7 from one Windows 7 ISO / Image


Yes, you read it right. Now you can install any edition of Windows 7 from any Original ISO. You do not need to buy different DVDs for each edition of Windows 7. Every windows 7 DVD contains all the editions of the Windows 7(Home Basic, Home Premium, Professional, Ultimate).
If you have DVD of Windows 7 (any edition), you need to create of ISO of it. To prepare ISO of DVD, you can use any DVD ISO MAKER software. I generally use MINIDVDSOFT’s Free DVD ISO MAKER software to prepare ISO of DVDs. Once you have created ISO, lets move to the next step.
Now using UltraISO or MagicISO, you can edit the ISO File. You have to browse to “SOURCES” folder. Look for the file “ei.cfg”.

Saturday, August 3, 2013

Google's Android Device Manager is clone of Apple's Find my Phone

It has taken a long time, but Android users will soon have a tool to help them locate misplaced phones and remotely wipe their data in case it’s lost or stolen.
Today, Google introduced Android Device Manager, which offers several different methods for dealing with a lost phone. With it, you can set off your phone’s ringer at maximum volume (even if your device is in silent mode) to help you try to locate it. 

You can also track your device in real time on a map. Finally, it gives you the ability to remotely erase all your data in case it’s truly lost or in the hands of a thief. While this type of feature has long been available on the iPhone and Windows Phone devices, Android owners have had to use third-party apps like Phone Locator and Lookout Mobile Security to get similar features.

Networking - Topic 18 ISDN

This Presentation explains the concept of ISDN in Networking and Data Communication.

Networking - Topic 17 IEEE 802 5

This presentation explains the concept of IEEE 802.5 in Data Communication and Networking.

Networking - Topic 16 IEEE 802 4

This presentation explains the concept of IEEE 802.4 in Data Communication and Networking.

Networking - Topic 14 Collision Free & Wireless Protocols

This presentation explains the concept of Collision Free & Wireless Protocols in Data Communication and Networking.

Networking - Topic 13 Channel Allocation ALOHA & CSMA

This presentation explains the concept of Channel Allocation ALOHA & CSMA in Data Communication and Networking.

Networking - Topic 12 Flow Control Protocols

This presentation explains the concept of Flow Control Protocols in Data Communication and Networking.

Networking - Topic 11 Framing

This presentation explains the concept of Framing in Data Communication and Networking.

Networking - Topic 10 Error Correction

This presentation explains the concept of Error Correction in Data Communication and Networking.

Networking - Topic 9 Error Detection

This presentation explains the concept of Error Detection in Data Communication and Networking.

Topic 8 Transmission Media (Unguided)

This presentation explains the concept of Transmission Media (Unguided) in Data Communication and Networking.

Networking - Topic 7 Transmission Media (Guided)

This presentation explains the concept of Transmission Media (Guided) in Data Communication and Networking.

Networking - Topic 6 Switching

This presentation explains the concept of Switching in Data Communication and Networking.

Networking - Topic 5 PSTN & Multiplexing

This presentation explains the concept of PSTN & Multiplexing in Data Communication and Networking.

Networking - Topic 4 Transmission

This presentation explains the concept of Transmission in Data Communication and Networking.

Networking - Topic 3 OSI Model Versus TCP-IP Model

This presentation explains the concept of OSI Model Versus TCP-IP Model in Data Communication and Networking.

Networking - Topic 2 TCP IP Model

This presentation explains the concept of TCP IP Model in Data Communication and Networking.

Networking - Topic 1 OSI Model

This presentation explains the concept of OSI Model in Data Communication and Networking.

Data Structure - Lecture 6 - Array Deletion

This Presentation explains the concept of Array Deletion in Data Structure

Data Structure - Lecture 5 - Array Insertion

This Presentation explains the concept of Array Insertion in Data Structure

Data Structure - Lecture 4 - Array Traversal

This Presentation explains the concept of Array Traversal in Data Structure

Data Structure - Lecture 3 - Array Searching

This Presentation explains the concept of Array Searching in Data Structure

Lecture 2 - Data Structure types

This Presentation explains the concept of Data Structure Types in Data Structure

Data Structure - Need of Data Structure

This Presentation explains the concept of Need of Data Structure

Thursday, August 1, 2013

Essential Networking Notes -- Set-1

  1. Topic 1- OSI Model - PDF Format
  2. Topic 2 - TCP IP - PDF Format
  3. Topic 3 - osi vs tcp - PDF Format
  4. Topic 4 - Transmission - PDF Format
  5. Topic 5 -PSTN & Multiplexing - PDF Format
  6. Topic 6 - Switching - PDF Format
  7. Topic 7 - Transmission Media (Guided) - PDF Format
  8. Topic 8 - Transmission Media (Unguided) - PDF Format
  9. Topic 9 - Error Detection - PDF Format
  10. Topic 10 - Error Correction - PDF Format
  11. Topic 11 - Framing - PDF Format
  12. Topic 12 - Flow Control Protocols - PDF Format
  13. Topic 13 - Channel Allocation ALOHA & CSMA - PDF Format
  14. Topic 14 - Collision Free & Wireless Protocols - PDF Format
  15. Topic 15 - IEEE 802.3 - PDF Format
  16. Topic 16 - IEEE 802.4 - PDF Format
  17. Topic 17- IEEE 802.5 - PDF Format
  18. Topic 18 - ISDN - PDF Format

Presentations in PDF Format on General Topics - Set 12

Windows 8 and Security Updates

Like earlier versions of the operating system, Windows 8 can check to see if software updates for your computer are available from Microsoft — and then install them for you so you don't have to remember to do it yourself.

Security updates and other software patches deemed important or critical are typically installed automatically when Microsoft pushes them out. (The company often releases the updates on the second Tuesday of each month, but it can happen as needed).

But even if you have the automatic updates option turned on, not all the software Microsoft sends you will install itself. Certain types of updates, including fresh versions of programs that have new user agreements or terms of service statements, require your attention because you are asked to read the legal fine print — or at least click the Agree button — before you can install the software.
Click here to read complete article

New Zealand PM's website Hacked


WELLINGTON: The hacktivist group Anonymous on Tuesday briefly crashed New Zealand Prime Minister John Key's website in protest at plans to allow the country's intelligence agency to spy on local residents.

A group identifying itself as Anonymous NZ posted a clip on YouTube saying it had attacked Key's website www.johnkey.co.nz and 12 others linked to the ruling National Party to show its opposition to "a despicable piece of legislation."


"John Key make no mistake the majority of New Zealanders oppose this bill," it said.

"Due to your own arrogance and your unwillingness to listen to the people we have decided to take direct action."

Key's website was operating normally by Tuesday afternoon and the prime minister condemned the hackers.

"(It's) pretty juvenile behaviour in my view," he told Radio New Zealand. "These people are obviously doing something that's both illegal and inappropriate. They're trying to make their own political point, but their point's wrong."

New Zealand's intelligence service, the Government Communications Security Bureau (GCSB), is currently barred from spying on New Zealand citizens or residents.

Key argues the restriction should be removed so it can cooperate more closely with agencies such as the police and military in an increasingly complex cybersecurity environment.

The bill is currently before parliament and expected to pass by a single vote, although groups ranging from the Law Society to internet giants Facebook and Google have raised concerns about the proposal.
Click here to read complete article

Indian develops technology to make software unhackable


WASHINGTON: A unique system has been designed by researchers that will encrypt software in order to make it impervious to reverse-engineering.

UCLA computer science professor Amit Sahaiand a team of researchers have developed a system which will only allow someone to use a programme as intended, while preventing any deciphering of the code behind it.

This is known as software obfuscation in computer science and it is the first time it has been accomplished.


Sahai said that the new system puts up an iron wall making it impossible for an adversary to reverse-engineer the software without solving mathematical problems that take hundreds of years to work out on today's computers.

Click here to read original ARTICLE

Save your Privacy on Facebook

With the latest addition of the Graph Search to social networking site Facebook, it has become time consuming and cumbersome to customize settings for every post and each photograph. 

 According to the Sydney Morning Herald, a few quick clicks here and there can help restore a profile to being less vulnerable to public access, including photographs and posts. 

 To limit the way people in the friends list access the content one can simply select Friends under the 'Who can see my stuff' section in the privacy settings and further put them in the Restricted category so as to allow them access to only those posts which are made public. 

 Furthermore, to save oneself from being seen in those old embarrassing photographs, a user can simply click on the Activity Log, then 'photos of me' and on the top of the page one can customize 'On Timeline' visible settings which allows for bulk-untag. 

 To review the customized settings, a user can choose to view their own profile as a particular person or to public by clicking on View As in the Activity Log section, the report added.

Presentations in PDF Format on General Topics - Set 11

Presentations in PDF Format on General Topics - Set 10

  1. Presentation on MobilePhonesBeyondCallsAndSMS - PDF Format
  2. Presentation on MobileRouters - PDF Format
  3. Presentation on Motherboard - PDF Format
  4. Presentation on MS_Excel2007 - PDF Format
  5. Presentation on MS_Windows_v2 - PDF Format
  6. Presentation on MS_Word2007 - PDF Format
  7. Presentation on MS_Word_2007 - PDF Format
  8. Presentation on Netbook_vs_Laptop - PDF Format
  9. Presentation on OfficeAutomation - PDF Format
  10. Presentation on RAID - PDF Format

Presentations in PDF Format on General Topics - Set 9

  1. Presentation on DiscussionBoards - PDF Format
  2. Presentation on FileCompression - PDF Format
  3. Presentation on FileCompressionTechniques - PDF Format
  4. Presentation on Gadgets - PDF Format
  5. Presentation on GamingConsole - PDF Format
  6. Presentation on GreenComputing - PDF Format
  7. Presentation on HandheldDevices - PDF Format
  8. Presentation on IntrusionDetectionSystem - PDF Format
  9. Presentation on LaserTechnology - PDF Format
  10. Presentation on Meego - PDF Format

Presentations in PDF Format on General Topics - Set 8

  1. Presentation on Bluray - PDF Format
  2. Presentation on Cloud_Computing_1 - PDF Format
  3. Presentation on Cloud_Computing_2 - PDF Format
  4. Presentation on Cloud_Computing_3 - PDF Format
  5. Presentation on Cloud_Computing_4 - PDF Format
  6. Presentation on Cloud_Computing_5 - PDF Format
  7. Presentation on ComputerVirus - PDF Format
  8. Presentation on ContentManagementSystem - PDF Format
  9. Presentation on CyberCrime - PDF Format
  10. Presentation on DefendingDistributedSystemsAgainstMaliciousIntrusionsAndNetworkAnomalies - PDF Format

BP Profile as Homepage version 1.1 - updated for Wordpress 4.1 and Buddypress 2.1.1

After pointing out by John Clause, I have just updated the plugin for Wordpress 4.1 and Buddypress 2.1.1. Now enjoy the facebook function...