CodeTextPro | Web Tutorial | Technology

CodeTextPro | Web Tutorial | Technology

CodeTextPro.com Provides - Web design, Technology gyan, Digital marketing, Online earnings, Seo, Adsense, Technology news, Motivation and inspiration, Latest Technology Affairs, Gadgets, Blogging

Breaking

Thursday, November 28, 2019

Windows Activated Permanently Without Using Any Product Key 7, 8, 8.1, 10 All Version || 100% Legal Way to Active Windows

8:22 PM 0
Windows Activated Permanently Without Using Any Product Key 7, 8, 8.1, 10 All Version || 100% Legal Way to Active Windows

In this article, you will learn how to activate windows. Permanently activate windows 7,8,8.1,10 all versions without installing any harmful software or key. 100% legal way to activate your windows. Do not use KMS Activator to activate any Windows versions (Windows 7, 8, 8.1, 10). This is a genuine way to activate windows 7, 8, 8.1, 10. This is a legal way to activate your windows without using any product key. 




इस लेख में, आप सीखेंगे कि विंडोज़ कैसे सक्रिय करें। किसी भी हानिकारक सॉफ़्टवेयर या कुंजी को स्थापित किए बिना सभी संस्करणों को विंडोज 7,8,8.1,10 पर स्थायी रूप से सक्रिय करें। अपनी खिड़कियों को सक्रिय करने का 100% कानूनी तरीका। किसी भी विंडोज संस्करण (विंडोज 7, 8, 8.1, 10) को सक्रिय करने के लिए KMS उत्प्रेरक का उपयोग न करें। यह विंडोज 7, 8, 8.1, 10 को सक्रिय करने का एक वास्तविक तरीका है। किसी भी उत्पाद कुंजी का उपयोग किए बिना अपनी खिड़कियों को सक्रिय करने का यह एक कानूनी तरीका है।



activate windows
Windows Activated Successfully




Windows Activate Without Software


Windows All Version:

  • Windows-XP  
  • Windows-7
  • Windows-8
  • Windows-8.1
  • Windows-10



FOLLOW MY SETUP


1. Open the web browser.
2. Type the bit.ly/windowstxt.
3. Copy all the text (Ctrl+C).
4. Open a new text document.
5. Paste the copy text (Ctrl+V).
6. Save as file in any name (
Example: Windows.cmd) but
    when you complete typing the file name add (
.cmd) then press save button.
    Example: If you type the file name  
Windows
   Then the complete file name is Windows.cmd
7. Windows text file Run as administrator.
8. Wait for a few minutes and windows activate automatically.




windows activated
windows permanently activated







activate windows
windows activated permanently 




When you complete the process, you can see that product activate successfully.


Windows Activate TXT File Link: https://get.msguides.com/windows-10-8.1-8-7.txt

Click the below link to visit get.msguides official site --------



Note: If you have face any Problem When you follow these processes to activate your Windows 7, 8, 8.1, 10, please connect the Internet and must be remembered your Computer Windows Defender is off. If you are using any others Anti Virus, Turn off the Anti Virus and continue the same process.


यदि आपको अपने विंडोज 7, 8, 8.1, 10 को सक्रिय करने के लिए इन प्रक्रियाओं का सामना करने में कोई समस्या है, तो कृपया इंटरनेट कनेक्ट करें और याद रखें कि आपका कंप्यूटर विंडोज डिफेंडर बंद है। यदि आप किसी अन्य एंटी वायरस का उपयोग कर रहे हैं, तो एंटी वायरस को बंद करें और उसी प्रक्रिया को जारी रखें।  

Tuesday, November 19, 2019

PAN Card Correction: Instructions For Filling Change Request Form | PAN Card Update - NSDL - UTIITSL

4:43 PM 0
PAN Card Correction: Instructions For Filling Change Request Form | PAN Card Update - NSDL - UTIITSL

Request For New PAN Card Or / And Changes Or Correction in PAN Data.

All you have to do is download and print the PAN Card Correction FormFill it and submit it to your nearest NSDL or UTIITSL Center or Retailer. Also, send along the required documents. While filling in the details, do not forget to tick the box on the left margin for details that you would like to change on your PAN card.

update pan card
Request For New PAN Card Or / And Changes Or Correction in PAN Data.



Instructions for filing request for new PAN card or/and changes or correction in PAN data

1. Form to be filled legibly in block letters and preferably in black ink. The form should be filled in English only.

2. Mention 10 digit PAN correctly.

3. Each box, wherever provided, should contain only one character (Alphabet/Number/Punctuation Sign) leaving a blank box after each word.

4. Individual applications should affix two recent color photographs with white background (size 3.5 cm x 2.5 cm) in the space provided on the form. The photographs should not be stapled or clipped to the form. The clarity of the image on the PAN card will depend on the quality and clarity of a photograph affixed on the form.


Guidelines for filling PAN Card Form

Please select an appropriate title.
Do not use abbreviations in the First and Last name / Surname.

For Example, HANIF should be written as: 

Fill your name on PAN Card
Fill your name on PAN Card


For Example, HANIF MIAH should be written as: 


Correctly fill your name on PAN Card
Correctly fill your name on PAN Card


For Example, HANIF ALI MIAH should be written as: 

 Correct way to types your name on PAN Card
 Correct way to types your name on PAN Card


See the Full Image to learn  How to Write Correct Details on Your PAN Card Update Form -






Wednesday, November 13, 2019

Check Voter Identity Card Details Online | Voter ID Card Details | Voter Online Pariseva

10:22 PM 4
Check Voter Identity Card Details Online | Voter ID Card Details | Voter Online Pariseva

Check Voter Identity Card Details Online


Voter ID Card Details
Check Voter Identity Card Details Online

What is a Voter ID card?

The Voter ID card is a card, it's also known as Voter Registration Card or Election Card is issued to an Indian citizen by the Election Commission of India which acts as a proof of his/her citizenship and allows them to cast their votes in this country. This photo identity card helps in improving the accuracy of the electoral roll and to help prevent cases of electoral fraud. A photo identity card or Voter Id card is important for an Indian citizenship proof. 

voter online pariseva
Check Voter Identity Card Details Online Click View Details


Step by Step Process to search for your Voter ID Card online-

  • Visit the Electoral Search Website
  • Click on Search by Epic No.
  • Types Your Voter ID Card Number
  • Select State Which One You Belong From
  • Write the Captcha Text Code
  • Click on Search
  • Click On View Details
  • Now You Can see 


Click here to visit Electoral Search Official Website


electrol voter card online check details
Check Voter Card Online | Get Voter Card Details





Final Output Voter Information:

Check Voter Identity Card Details Online | Voter ID Card Details | Voter Online Pariseva


Wednesday, November 6, 2019

JavaScript Tutorial: Full JavaScript Tutorial Notes with PDF by CodeTextPro

10:01 PM 0
JavaScript Tutorial: Full JavaScript Tutorial Notes with PDF by CodeTextPro
In this javascript tutorials, we will learn about - What is JavaScript? , Client-Side JavaScript, Advantages of JavaScript, Limitations of JavaScript, JavaScript Development Tools, Where is JavaScript Today? , Enabling JavaScript in all browser(JavaScript in Internet Explorer, JavaScript in Firefox, JavaScript in Firefox, JavaScript in Chrome, JavaScript in Opera, Warning for Non-JavaScript Browsers, Placement in JavaScript, Variables in JavaScript, Operators in JavaScript, If-Else condition in JavaScript, Switch case in Javascript, While loop, for-loop, For-in-loop in JavaScript, Loop Control in JavaScript, Functions in JavaScript, Events in JavaScript, Cookies in JavaScript) etc.






What is JavaScript?

Javascript is a dynamic computer programming language. It is lightweight and most commonly used as a part of web pages, whose implementations allow
client-side script to interact with the user and make dynamic pages. It is an interpreted programming language with object-oriented capabilities.

JavaScript was first known as LiveScript, but Netscape changed its name to JavaScript, possibly because of the excitement being generated by Java.
JavaScript made its first appearance in Netscape 2.0 in 1995 with the name LiveScript. The general-purpose core of the language has been embedded in Netscape, Internet Explorer, and other web browsers.

The ECMA-262 Specification defined a standard version of the core JavaScript language.

 JavaScript is a lightweight, interpreted programming language.
 Designed for creating network-centric applications.
 Complementary to and integrated with Java.
 Complementary to and integrated with HTML.

 Open and cross-platform.


Client-Side JavaScript

Client-side JavaScript is the most common form of language. The script should be included in or referenced by an HTML document for the code to be
interpreted by the browser.

It means that a web page need not be a static HTML, but can include programs that interact with the user, control the browser, and dynamically create HTML
content.

The JavaScript client-side mechanism provides many advantages over traditional CGI server-side scripts. For example, you might use JavaScript to check if the
user has entered a valid e-mail address in a form field.

The JavaScript code is executed when the user submits the form, and only if all the entries are valid, they would be submitted to the Web Server.

JavaScript can be used to trap user-initiated events such as button clicks, link navigation, and other actions that the user initiates explicitly or implicitly.


Advantages of JavaScript

The merits of using JavaScript are:


  • Less server interaction: You can validate user input before sending the page off to the server. This saves server traffic, which means less load on your server.
  • Immediate feedback to the visitors: They don't have to wait for a page reload to see if they have forgotten to enter something.
  • Increased interactivity: You can create interfaces that react when the user hovers over them with a mouse or activates them via the keyboard.
  • Richer interfaces: You can use JavaScript to include such items as drag and drop components and sliders to give a Rich Interface to your site visitors.

Download Full JavaScript Tutorial PDF Notes Click the below Tutorialspoint link - 
JavaScript Tutorial Full Notes

Saturday, October 26, 2019

Virtual Memory Organization | Mapping | Virtual Memory Management Technique - CodeTextPro

10:38 AM 1
Virtual Memory Organization | Mapping | Virtual Memory Management Technique - CodeTextPro
In this virtual memory organization tutorial, we wil learn more about - What is Virtual Memory?, Virtual Memory, Virtual Address Space and Memory Space, Virtual Memory Management Technique, Paged memory management technique, Virtual Address Translation, Address Translation Steps, Segmented Memory Management Technique, virtual memory in computer architecture, 



Virtual memory organization, mapping and management techniques


Virtual Memory / What is Virtual Memory?
In a memory hierarchy system, programs and data are first stored in auxiliary memory. Portions of a program or data are brought into main memory as they are needed by the CPU. Virtual memory is a concept used in some large computer systems that permit the user to construct programs as though a large memory space were available, equal to the totality of auxiliary memory. It is used to give programmers the illusion that they have a very large memory at their disposal, even though the computer actually has a relatively small main memory.



Virtual Address Space and Memory Space
An address used by a programmer is called a virtual address, and the set of such addresses are called virtual address space. An address in main memory is called a location or physical address. The set of such locations is called the memory space.



Virtual Memory Management Technique
There are various techniques re used to manage virtual memory such as paged memory management technique, segmented memory management technique e.t.c


1. Paged memory management technique
User program is divided into fixed size block called pages while main memory is also divided into same size block called page frame.

Now if a user program is divided into 256 no of pages each of size 4 Kb and main memory is divided into 16 no of pages then CPU must have information which 16 pages among 256 pages is available in main memory. For this purpose a table is maintained for each process in main memory called page map table (PMT).


PMT (Page Map table)

Size of PMT: It is total no of pages in user program. In above case it is 256.


Location of page table in main memory: the start address of PMT in main memory is kept in a register called page table register.




Contents of page table
Each page table entry indicates the page frame where a particular page resides. So the basic structure is Where page index is used to access a particular entry in PMT. Page frame address is the page frame no in main memory where actually the page resides. Valid bit or presence bit indicates whether the page frame contains the page or not i.e. the page is copied into main memory or not. If not then the page is copied from auxiliary memory and corresponding entry is made into PMT.

Virtual Memory Management Technique
Virtual Memory Management Technique


Virtual Address Translation
Let’s consider CPU supports 20 bit address so the virtual address is of 20 bits.


This 20 bits virtual address is divided into two parts

1. Virtual Page number
2. Page offset.

If there are total 256 pages then it needs 8 bits to address one of the virtual addresses. So the remaining 12 bits are page offset which indicates an entry within a page.


Virtual Address Translation
Virtual Address Translation


Virtual Address Translation
Virtual Address Translation


Address Translation Steps:
1. CPU generates 20 bits virtual address.

2. Virtual page number (p) is added with page table register to get page table entry in main memory.

3. Page frame number (f) is fetched from PMT if the present bit is set to 1. Otherwise, page is brought from disk into main memory and makes corresponding entry in PMT.



Problem: We have to access main memory at least twice to get the page. First to get the page frame address from PMT and then to get the page frame.





2. Segmented Memory Management Technique
To eliminate the problems of paging we divided the program into logical entity based on some logical characteristics called segments. For example code segment, data segment or stack segment e.t.c. the size of this segments are not fixed.


Segment:
A segment is a set of logically related instructions or data elements associated with a given name. Segments may be generated by the programmer or by the operating system. Examples of segments are a subroutine, an array of data, a table of symbols, or a user's program.


Segmented Memory Management Technique
Segmented Memory Management Technique

Address Translation
Assumption: No paging in the system.

The steps are

1. CPU generates logical addresses.

2. These addresses consist of a segment number and an offset into the segment


3. Use segment number to index into a table called segment descriptor table. 

  • Segment descriptor table contains the physical address of the start of the segment called the base address.

4. Add the offset to the base address and generate the physical address.
  • Before doing this, check the offset against a limit.
  • The limit is the size of the segment.

Virtual Memory Address Translation
Virtual Memory Address Translation



Friday, October 25, 2019

Basic Computer Organization | Basic Computer Instruction with Full Tutorials - by CodeTextPro

8:58 PM 0
Basic Computer Organization | Basic Computer Instruction with Full Tutorials - by CodeTextPro
BASIC COMPUTER ORGANIZATION

In this basic computer organization tutorials, we will learn more about basic computer model and different units of computer, central processor unit [CPU], Input Unit, Output Unit, Memory Unit, Volatile Memory, Non-Volatile Memory, semiconductor memories, Secondary Memory, Example of secondary memories, generation of computer, First generation of computer, Second Generation (1956-1963), Third Generation (1964-1971), Fourth Generation (1971-Present), Fifth Generation (1980), Von Neumann Architecture, Stored Program Concept, The key features of Von Neumann architecture, Drawback, Harvard Architecture, Difference between Von Neumann and Harvard Architecture, etc.


Basic Computer Model and different units of Computer

The model of a computer can be described by four basic units in high-level abstraction. These basic units are:

  • Central Processor Unit
  • Input Unit
  • Output Unit
  • Memory Unit

cpu
Central Processor Unit (CPU), Input, Output, and Memory unit


A. Central Processor Unit [CPU]:

Central processor unit consists of two basic blocks:
  • The program control unit has a set of registers and control circuits to generate control signals.
  • The execution unit or data processing unit contains a set of registers for storing data and an Arithmetic and Logic Unit (ALU) for execution of arithmetic and logical operations.
In addition, CPU may have some additional registers for temporary storage of data.





B. Input Unit:

With the help of input unit data from outside can be supplied to the computer. Program or data is read into main storage from input device or secondary storage under the control of CPU input instruction.
Example of input devices: Keyboard, Mouse, Hard disk, Floppy disk, CD-ROM drive etc.



C. Output Unit:

With the help of output unit computer results can be provided to the user or it can be stored in storage device permanently for future use. Output data from main storage go to output device under the control of CPU output instructions.

Example of output devices: Printer, Monitor, Plotter, Hard Disk, Floppy Disk etc.




D. Memory Unit:

Memory unit is used to store the data and program. CPU can work with the information stored in memory unit. This memory unit is termed as primary memory or main memory module. These are basically semiconductor memories.

There are two types of semiconductor memories -

1. Volatile Memory: RAM (Random Access Memory).

2. Non-Volatile Memory: ROM (Read only Memory), PROM
(Programmable ROM) EPROM (Erasable PROM), EEPROM (Electrically Erasable PROM).



Secondary Memory :
There is another kind of storage device, apart from primary or main memory, which is known as secondary memory. Secondary memories are non-volatile memory and it is used for permanent storage of data and program.

Example of secondary memories:

1. Hard Disk, Floppy Disk, Magnetic Tape ------ These are
magnetic devices,
2. CD-ROM ------ is optical device
3. Thumb drive (or pen drive) ------ is semiconductor memory.




GENERATIONS OF COMPUTER

First generation of computer:

The earliest attempt to make an electronic computer using vacuum tubes appears to have been made in the late 1930s. This special purpose machine was intended for solving linear equations, but the project never completed at all. The first successful, widely known general purpose electronic computer system was electronic numerical integrator and calculator or ENIAC.



Second Generation (1956-1963):
In second generation Transistors replaced the vacuum tubes used in the first generation. The transistor was invented in 1947 but did not see widespread use in computers until the late 1950s. The transistor was far superior to the vacuum tube, allowing computers to become smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation predecessors. Though the transistor still generated a great deal of heat that subjected the computer to damage, it was a vast improvement over the vacuum tube. Second-generation computers still relied on punched cards for input and printouts for output. Second-generation computers moved from cryptic binary machine language to
symbolic, or assembly, languages, which allowed programmers to specify instructions in words. High-level programming languages were also being developed at this time, such as early versions of COBOL and FORTRAN. These were also the first computers that stored their instructions in their memory, which moved from a magnetic drum to magnetic core technology. The first computers of this generation were developed for the atomic energy industry.




Third Generation (1964-1971):

The development of the integrated circuit was the hallmark of the third generation of computers. Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed and efficiency of computers. Instead of punched cards and printouts, users interacted with third generation computers through keyboards and monitors and interfaced with an operating system, which allowed the device to run many different applications at one time with a central program that monitored the memory. Computers for the first time became accessible to a mass audience because they were smaller and cheaper than their predecessors.



Fourth Generation (1971-Present):
The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand. The Intel 4004 chip, developed in 1971, located all the components of the computer—from the central processing unit and memory to input/output controls—on a single chip. In 1981 IBM introduced its first computer for the home user, and in 1984 Apple introduced the Macintosh. Microprocessors also moved out of the realm of desktop computers and into many areas of life as more and more everyday products began
to use microprocessors. As these small computers became more powerful, they could be linked together to form networks, which eventually led to the development of the Internet. Fourth generation computers also saw the development of GUIs, the mouse and handheld devices.




Fifth Generation (1980):
The period of fifth-generation is the 1980-till date. In the fifth generation, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components.
This generation is based on parallel processing hardware and AI (Artificial Intelligence) software. AI is an emerging branch in computer science, which interprets the means and methods of making computers think like human beings. All the high-level languages like C and C++, Java, .Net, etc., are used in this generation.

generations of computer
generations of computer

generations of computer
generations of computer short description with list




Von Neumann Architecture

The architecture, suggested by John Von Neumann, is referred to as the Von Neumann Architecture, which has similar structural blocks as the constituent units which were suggested by Charles Babbage. Neumann identified five blocks to perform operations on the data.

Von Neumann Architecture
Von Neumann Architecture


The blocks are namely Input block, Memory block, Output block; Arithmetic and Logic Unit block (ALU) and the Control Unit block. Traditionally ALU and Control Unit block are built together. 

The functions of these two blocks are complementary to each other to the extent that they are better built together. These
two blocks together are referred to as the Central Processing Unit (CPU). The units work with the inherent philosophy of stored program concept given by Von Neumann.




Stored Program Concept:
The concept utilizes the memory to store all the instructions to be performed by the computer for a particular task prior to execution. The required data also are to be stored in memory at execution time. The CPU fetches one instruction from
memory, decodes it and executes the same. At the end of the execution of the current instruction, it fetches the next instruction and the cycle continues till the job is finished.


The key features of Von Neumann architecture are as follows:


The computer reads the instruction set from the outside world through the input device.

The memory gets them through the Arithmetic and Logic Unit (ALU) and stores them within.

The Control Unit of CPU fetches one instruction at a time from the memory to the ALU, analyses it, and fetches required data.

ALU executes the instruction, stores result back to memory if required.

To give an output, the content from ALU is given to output device.

Control Unit of CPU controls all operations. It executes instructions in sequential order unless the effect of the instruction is to change the sequence of instructions.


It can be well observed that there is a single path between memory and ALU. Each instruction and operand need to be fetched from memory. Intermediate results are also needed to be stored in memory. This path between the memory and the ALU is kept busy almost every moment. Being a single path it is very critical. This path is called the bottleneck of the Von Neumann architecture. The Von Neumann machines are termed as Institute of Advanced Systems (IAS) machine or Princeton Machine by some authors. This is because the design of the system was done in Institute of Advanced Systems (IAS) at Princeton University, USA. Very few computers have a pure Von Neumann architecture. Most computers add another step to check for interrupts, electronic events that could occur at any time. Interrupts let a computer do other things while it waits for events.




Drawback:
Von Neumann computers spend a lot of time moving data to and from the memory, and this slows the computer (this problem is called von Neumann bottleneck) so, engineers often separate the bus into two or more busses, usually one for instructions, and the other for data.




Harvard Architecture


The Harvard architecture is computer architecture with physically separate storage and signal pathways for instructions and data. The term originated from the
Harvard Mark I relay-based computer, which stored instructions on punched tape (24 bits wide) and data in electro-mechanical counters. These early machines had
limited data storage, entirely contained within the central processing unit, and provided no access to the instruction storage as data. Programs needed to be loaded by an operator, the processor could not boot itself.

Harvard Architecture
Harvard Architecture


In Harvard architecture, there is no need to make the two memories share characteristics. In particular, the word width, timing, implementation technology, and memory address structure can differ. In some systems, instructions can be stored in read-only memory while data memory generally requires read-write memory.

The Harvard architecture uses physically separate memories for their instructions and data, requiring dedicated buses for each of them. Instructions and operands can therefore be fetched simultaneously. Different program and data bus widths are possible, allowing program and data memory to be better optimized to the architectural requirements. E.g.: If the instruction format requires 14 bits then program bus and
memory can be made 14-bit wide, while the data bus and data memory remain 8-bit wide.



Difference between Von Neumann and Harvard Architecture.
difference between Harvard Architecture and Von Neumann
Von Neumann and Harvard Architecture Difference