The Mini Projects were updated
NOW SPEAK IT EVEN BETTER
It is a free utility that enables user to remove antivirus and other applications as on your system.Sometimes antivirus programs do not uninstall completely.AppRemover found all the virus and software protection programs on your system.This program lists its findings and gives you the option to select which ones you want to delete.
These days webcams are pretty much look the same,here is something that can break into the monotony.Here are the details of this webcam
This device is compatible with PC running on Microsoft Windows XP SP3 and vista SP1 and Mac computers running on Mac OS X 10.5.1.
A large version of the machine would be used in a hospital,but a smaller one could be taken to emergencies.It could be a life-safer against the avian flu or bio-weapons like Ebola and small pox,giving people a chance to survive a deadly attack, whether it`s from a terrorist or a virus.
WORKING
The hemopurifier uses antibodies to remove viruses as blood filters through it.It is designed to filter out viruses and toxins before they attack organs.the method is very similar to dialysis,and can be used to help patients with HIV,Hepatitis C,the measles,mumps,the flu,and more.It can also begin working before doctors identify the cause of the illness.
WHAT IS DIALYSIS ?
Hemodialysis is often used as a treatment for end stage renal disease(ESRD),or kidney failure,in which blood is removed from the body,filtered through an artificial kidney and then the cleaned blood is returned to the body .However,dialysis is also a painful,expensive procedure,and while it cleans the blood well enough to maintain existence,it does little to improve a patient`s overall quality of life.Also,data shows that if patients get a transplant before they get to the point of dialysis,they do better in the longer time.
Microsoft Windows XP Registry Guide
BY
Jerry Honeycutt
The registry is the heart and soul of Microsoft Windows XP.The registry contains the configuration data that makes the operating system work. The registry enables developers to organize configuration data in ways that are impossible with other mechanisms, such as INI files.
It's behind just about every feature in Windows XP that you think is cool. More importantly, it enables you to customize Windows XP in ways you can't through the user interface.
Windows XP and every application that runs on Microsoft's latest desktop operating system do absolutely nothing without consulting the registry first. When you double-click a file, Windows XP consults the registry to figure out what to do with it. When you install a device, Windows XP assigns resources to the device based on information in the registry and then stores the device's configuration in the registry. When you run an application such as Microsoft Word 2002, the application looks up your preferences in the registry. If you were to monitor the registry during a normal session, you'd see the registry serves up thousands of values within minutes.
In this book, you will learn how to customize the registry, but you must also learn how to take care of the registry. You must learn how to back up the registry so you can restore it if things go away. You must also learn the best practices for editing the registry safely.
Click on the Download icon to Download the E-book
Media fire link Ziddu link
OOPS (OBJECT ORIENTED PROGRAMMING LAB) programs for 2-2 IT and CSE according to JNTUK
THIS FILES INCLUDE ALL THE PROGRAMS WITH OUTPUTS THAT ARE GIVEN IN YOUR SYLLABUS BOOK….NJOYY
TO DOWNLOAD WORD DOCUMENT CLICK HERE
TO DOWNLOAD PDF FILE CLICK HERE
Computer Networks, Fourth Edition
Author : Andrew S. Tanenbaum
Publisher : Prentice Hall
The world's leading introduction to networking-fully updated for tomorrow's key technologies.
Computer Networks, Fourth Edition is the ideal introduction to today's networks-and tomorrow's.
This E-Book covers all this and more:
Physical layer (e.g., copper, fiber, wireless, satellites, and Internet over cable)
Data link layer (e.g., protocol principles, protocol verification, HDLC, and PPP)
MAC Sublayer (e.g., gigabit Ethernet, 802.11, broadband wireless, and switching)
Network layer (e.g., routing algorithms, congestion control, QoS, IPv4, and IPv6)
Transport layer (e.g., socket programming, UDP, TCP, RTP, and network performance)
Application layer (e.g., e-mail, the Web, PHP, wireless Web, MP3, and streaming audio)
Network security (e.g., AES, RSA, quantum cryptography, IPsec, and Web security)
The book gives detailed descriptions of the principles associated with each layer and presents many examples drawn from the Internet and wireless networks.
Click here to download this E-Book
NOTE : This is a File of .chm extension.This files will not open in some systems. This file is not opening in your system then Download this small software called “ chm Decoder”
Filesize : 420kb