-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label Ranchi University. Show all posts
Showing posts with label Ranchi University. Show all posts
  • Memory Subsystem in Computer Architecture


     

    Memory Subsystem

     

    Microcomputer Memory


    Memory is an essential component of the microcomputer system.
    It stores binary instructions and datum for the microcomputer.


    The memory is the place where the computer holds current programs and data that are in use. None technology is optimal in satisfying the memory requirements for a computer system.


    Computer memory exhibits perhaps the widest range of type, technology, organization, performance and cost of any feature of a computer system. The memory unit that communicates directly with the CPU is called main memory. Devices that provide backup storage are called auxiliary memory or secondary memory.



     

    Characteristics of memory systems


    • The memory system can be characterised with their Location, Capacity, Unit of transfer, Access method, Performance,
    • Physical type, Physical characteristics, Organisation.




    RAM, ROM, DRAM, Flash Memory


    • The main memory is a Random Access Memory. It is organized into words of fixed length.
    • The length of a word is called word length.
    • Each of these memory words has an independent address and each has the same number of bits.
    • Normally the total numbers of words in memory are some power of 2. Some typical memory word size are 8 bits, 16 bits, 32 bits etc.
    • The main memory can be both read and written into, therefore it is called read-write memory. 
    • The block diagram of a read- write memory of RAM is shown in figure. 

     

     


    memory subsystem


     

    The access time and cycle time in RAM are constant and independent of the location accessed. The computer places the address of the location into which the data are to be read into the memory address register. This register consist of n binary devices (generally flip-flops), where 2n is the number of words that can be stored in the memory. Example : A 32 × 4 RAM means that this RAM has 32 words, 5 address lines (25 = 32), and 4 bit data word size.



    Dram (Dynamic Random Access Memory)


    RAM technology is divided into two technologies : Dynamic and Static. A Dynamic RAM (DRAM) is made with cells that store data as charge on capacitors. The presence and absence of charge on capacitor is interpreted as binary 0 or 1. Since the capacitors have natural tendency to discharge Dynamic RAM requires periodic charge refreshing to maintain data storage.



    ROM (Read-Only Memory)


    A ROM is a memory or storage device in which a fixed set of binary information is stored. A ROM is a device with several input and output lines such that for each input value there is a unique output value. A block diagram of ROM is shown in the figure 3.


    It consist n input lines and m output lines. Each combination of the input variables in called an address. Each bit combination that comes out of
    the output lines in called a word. The number of bits per word is equal to the number of output lines m. The number of distinct address possible with n input
    variable is 2n.



     

    memory subsystem

     

     

    A ROM is characterized by the number of words (2n) and number of bits (m) per word. For example a 16 × 8 ROM which can be written as 24 × 8 consist of 16 words of 8 bit each, which mean there are 8 output lines and 16 distinct words stored in the unit. There are only 4 input lines because 16 = 24 and with 4 binary variable we can specify 16 address. A ROM is basically a combinational circuit and can be constructed as shown in figure 3 (c). On applying an Input I1 = 0, I2 = 0, the 00 line of the decoder is selected and we will get O1 = 0 and O2 = 1;
    on applying I1 = 0 and I2 = 1 we will get O1 = 1 and O2 = 0. The same logic is used for constructing larger ROM.




     

    Flash Memory :


    Flash Memory is a form of semiconductor memory which was first introduced
    in mid-1980. These memories can be reprogrammed at high speed and hence the
    name flash. These are electronic Random Access Memory but non-volatile in nature. 

    In flash memory the entire memory can be erased in a few seconds by using electric erasing technology. It is used in many I/O devices. It is also used to store data and programming algorithm in cell phones, digital cameras and MP3 music players. Basically flash memory falls in between EPROM and EEPROM.




    There are two kinds of flash memory :


    (i) Code storage flashmade by Intel, AMD, Atmel, etc. It stores
    programming algorithms and is largely found in cell phones 

    (ii) Data storage Flashmade by San Disk, Toshiba etc. It stores data and
    comes in digital cameras and MP3 players.

     

     

    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

  • Ranchi University HTML Mid Sem Exam Paper with solution

     
    Ranchi University HTML Mid Sem Exam Paper with solution

     

     

     


     

     

     

    Group A

     

    1. <h6></h6> 

    2. <!DOCTYPE html>

    3. <!-- -->

    4. break the line

    5. meta

     

     

    Group B

     

    2. Design a login web page using HTML and CSS.

     

     

    <!DOCTYPE html>
    <html>
    <head>
    <title>Login Form</title>
    
    <style>
    
    body {
    	background: linear-gradient(to right, #1e5799 0%, #3ccdbb 20%, #16c9f6 100%);
    	
    }
    
    .form-css
    {
    	top: 50%;
    	left: 50%;
    	transform: translate(-50%, -50%);
    	position: absolute;
    	background-color: white;
    	border: 2px solid black;
    	border-radius: 20px;
    	padding: 50px;
    }
    
    
    .avatar-image img
    {
    	 justify-content: center;
    	 top: 0%;
    	 left: 50%;
    	 transform: translate(-0%, -50%);
    	position: absolute;
    	border: 1px solid black;
        border-radius: 50%;	
    	
    }
    
    button {
    	font-family: sans-serif;
    	padding: 5px;
    	cursor: pointer;
    }
    
    
    </style>
    
    
    
    
    </head>
    
    <body>
    <div class="container">
    
    <form action="controller/login-db.php" method="POST" class="form-css">
    <div class="avatar-image">
    <img src="image/avatar.png"  alt="avatar">
    </div>
    <br />
    <br />
    Email ID :
    <input type="text" name="email" placeholder="Enter your Email ID">
    <br />
    <br />
    Password :
    <input type="text" name="password" placeholder="Enter your password">
    <br />
    <br />
    <button type="submit" name="submit">Login</button>
    <br />
    <br />
    <a href="Signup.php">Signup Here</a>
    </form>
    </div>
    
    </body>
    </html>
    

     

     

     

    Ranchi University HTML Mid Sem Exam Paper with solution

     

     

     

    updating...

     

    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

  • Ranchi University Java Mid Sem Exam Paper with solution


    Ranchi University Java Mid Sem Exam Paper with solution 
     
     
     

    Ranchi University Java Mid Sem Exam Paper with solution

     
     
    Ranchi University Java Mid Sem Exam Paper with solution


     

     
    1. Write using html and servlet to insert data in MySql database.


    A simple servlet code to accept values from a form and insert it into database using JDBC Code.

     

     

    <!DOCTYPE html>  
    <html>  
        <head>  
            <meta charset="ISO-8859-1">  
            <title>Insert title here</title>  
        </head>  
        <body>  
            <form method="Post" action="/Servlet">  
                <div>  
                    <label>Enter Movie Name: </label>  
                    <input type="text" name="name">  
                </div>  
                <div>  
                    <label>Enter Actor Name: </label>     
                    <input type="text" name="actor">  
                </div>  
                <div>  
                    <label>Enter Actress Name: </label>  
                    <input type="text" name="actress">    
                </div>  
                <div>  
                    <label>Enter Director Name: </label>      
                    <input type="text" name="director">  
                </div>  
                <div>  
                    <label>Enter Release Date: </label>   
                    <input type="text" name="rDate"blue>  
                </div>  
                <div>  
                    <label>Enter Rating Point: </label>  
                    <input type="text" name="rPoint">     
                </div>  
                <div>  
                    <input type="submit" value="Add movie">  
                </div>  
            </form>  
        </body>  
    </html> 
    
    
    
    

     

     

     

        import java.io.IOException;    
        import java.io.PrintWriter;    
        import java.sql.*;    
        import javax.servlet.ServletException;    
        import javax.servlet.annotation.WebServlet;    
        import javax.servlet.http.HttpServlet;    
        import javax.servlet.http.HttpServletRequest;    
        import javax.servlet.http.HttpServletResponse;    
            
           
        @WebServlet("/MovieServlet")    
        public class MovieServlet extends HttpServlet {    
            private static final long serialVersionUID = 1L;    
                   
               
            public MovieServlet() {    
                super();    
                // TODO Auto-generated constructor stub    
            }    
            
               
            protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {    
                // TODO Auto-generated method stub    
                response.getWriter().append("Served at: ").append(request.getContextPath());    
            }    
            
              
            protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {    
                    
                PrintWriter pw;    
                response.setContentType("text/html");    
                pw=response.getWriter();    
                    
                    
                String name=request.getParameter("name");    
                String actor=request.getParameter("actor");    
                String actress=request.getParameter("actress");    
                String director=request.getParameter("director");    
                String rDate=request.getParameter("rDate");    
                String rPoint=request.getParameter("rPoint");    
                float rating=Float.parseFloat(rPoint);    
                    
                    
                try    
                {    
                    Class.forName("com.mysql.jdbc.Driver");    
                    String url="jdbc:mysql://localhost:3306/mcapracticals";    
                    String user="root";    
                    String password="admin";    
                        
                    Connection con=DriverManager.getConnection(url, user, password);    
                    String query="Insert into movie(name,actor,actress,director,releaseDate,ratingPoint) values (?,?,?,?,?,?);";    
                    PreparedStatement pstmt=con.prepareStatement(query);    
                    pstmt.setString(1, name);    
                    pstmt.setString(2, actor);    
                    pstmt.setString(3,actress);    
                    pstmt.setString(4, director);    
                    pstmt.setString(5, rDate);    
                    pstmt.setFloat(6,rating);    
                        
                    int x=pstmt.executeUpdate();    
                        
                    if(x==1)    
                    {    
                    pw.println("Values Inserted Successfully");    
                    }    
                        
                }    
                catch(Exception e)    
                {    
                        e.printStackTrace();    
                }    
                    
                    
                pw.close();    
            }    
            
        }   
    

     

     

     

    Uploading.....

     


    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.