How to set environment variables in window?
Here is the below step, which help you to set enviroment variables in window 11. FacebookTwitterLinkedinPinterest
Here is the below step, which help you to set enviroment variables in window 11. FacebookTwitterLinkedinPinterest
Here is the steps for changing password in linux. Open terminal, and then type command passwd and then type your current password, and press enter. It will ask for new password, enter new password and then enter again to confirm that it correct. Change another user Passwords. Open terminal, type command passwd with username like […]
We can add permission in Linux operating system by using below commands on your directory:- Write above both command one by one add permission to your directory in linux ubuntu. To allow user ec2-user write access to the public web directory (/var/www/html),enter this command via Putty or Terminal, as the root user sudo: Make sure permissions on […]
While increasing connectivity around the world is making our lives a lot easier, the dangers have also increased that our personal information can be stolen by a hacker/cybercriminal. Hackers now have many avenues through which they can steal our information and misuse it. You might think that the internet is very beneficial for you because […]
If you are a beginner, students or professional, here are some tips and tricks everyone should know about computers that save your lot of time and improve your computer skills as well. Many people want to learn some new tricks to sharpen their skills. These tips & tricks of computer help you work easier and […]
INTRODUCTION TO COMPUTER STARTING UP THE COMPUTER: BOOTING After switching ON the computer, you generally wait for sometime before the desktop appears on the computer screen. you just sit idle for some time while different messages and the opening screen of windows are displayed. This process is called booting or boot-up. All the components of […]
COMPUTER CRIME: HACKING/CRACKING As in the case of other systems and fields, there are also crimes related to computers. Computer crimes result from deliberate tampering with data and information. The people who are associated with computer crimes are often called Hackers, Crackers, Virus programmers, Breachers, Information Warriors, etc. whatever name they may have, they are […]
INTRODUCTION Computers are used nowadays in almost all walks of life. This age is called the age of computers, computers are used in education, business, manufacturing, designing, entertainment, research, and development. They are everywhere, be at homes, schools, shops, offices, railway stations, airports, and hospitals. It is one of the greatest inventions. But as some […]
CONTROL STATEMENTS you have already learnt about counters and Loops. In Qbasic , loops are made with the help of control statements. Control statements are used to control the flow of the program according to your choice.These are very powerful tools for programmers. Qbasic has many control statements . some are conditional, some are unconditional […]
High level languages are designed, taking into mind the ease for the programmers. These languages are not understood by the computer because it only understands OS and 1S .To make the computer understand a program, it is first converted into machine level language. A high level language is translated into machine level code by a […]