Students and Teachers Forum
In general sense, population refers to the total number of people living in a certain place over a certain period of time. But the definition has become more comprehensive at present. Now, population refers to the 'cohort of organized group of .....
In Nepal, there are two types of population distribution. One of them is regional distribution. There are five development regions in Nepal. Among them central development region has covered one third population and eastern has covered one fifth .....
The distribution of population is influenced by various reasons. They are enlisted below: Service and facilities are not distributed in all part of the country. Life is not equally convenient in all part of the country due to structure of the .....
Every year the population is increasing at an alarming rate in the world especially in developing countries. The world population growth rate was 2.06 percent in 1970 and dropped to 1.75 percent between 1980 and 1988. In 1988, the world population .....
The population density of Nepal according to the census 2011 AD is 180 per sq.km. .....
According to the census of 2058 BS, the population density of Nepal was 57(23151423/147181) people per sq.km. .....
The average number of people over a standard unit of land, generally per sq.km. is known as density of population. .....
Arrangement of population of a certain country over its various geographical areas and political units is known as population distribution. .....
The total number of the people living in a certain place in a certain time is called population. .....
Referential integrity is a set of rules used by RDBMS to make sure that the relationships between tables are valid and that the related data is not accidentally changed or .....
MS-Access is a Relational Database Management System developed by Microsoft Corpotration. It is used to store and manipulate large amount of data in multiple tables. The objects of MS-Access are:1) table2) query3) form4) report5) pages6) macro7) .....
A unique field or combination of fields in a linked table whose value matches with a primary key in another table is known as foreign key. The group of primary key that consists of two or more attributes is called composite .....
Primary key is a special field or group of fields in the table that uniquely identifies each record from the database. The primary key does not accept duplicate value for a field and it does not allow a user to leave the field blank or null.The .....
The property that speeds up searching and sorting of records based on field is known as property of a field. .....
Data validation is the process of ensuring that a program operates on clean, correct and usefuldata. It is useful in database because it checks and controls data to be entered in the field and defines expression to limit the values that can .....
The property that specifies a pattern for all data to be entered and makes data entry easier is known as input mask property. .....
The property that allows a user to display data in different formats and used to specify the appearance of the value when displayed is known as format field property. .....
The property that allows a user to specify the maximum number of characters that can be stored in a field is known as field size property. The default field size of text field data type is 50. .....
A caption field property is defined as the property that allows a user to set a descriptive label for the field. The maximum characters of a caption is 2048 characters long. .....
The field properties is the plane that displays the list of properties associated with each field data type and determine how the values in the field are stored. .....
The primary key is a special filed or group of fields in a table that has unique value for each record and does not accept the duplicate value for a field. Any two uses of primary key are as follows: To identify each record of a table. .....
A Rotational Database Management System (RDBMS) is the most widely used type of DBMS which stores database in multiple tables which can be linked with each other on the basis of key field. Any two examples of RDBMS are as follows: .....
File Transfer Protocol (FTP) is an internet tool that allows the user to transfer file on one computer to another computer. It also provides the facility for downloading or uploading a large volume of files from a remote computer known as FTP .....
Internet telephony is a system that allows the user to make voice communication through internet using some additional hardware and software. It is one of the cheapest and reliable services provided by the .....
Newsgroup is a system of discussion group that focuses on a particular subject or topic through which people can post articles or message using internet. The interested people can read or comment on the articles posted on the newsgroup. Netscape .....
Internet Relay Chat (IRC) or simply chat is one of the most popular services provided by internet. It allows people at different locations can communicate with each other in real time. You can send and receive text or voice message through the IRC. .....
E-Mail is the world's largest electronic message system that is transferred from one computer to another through the internet. It is easy, fast, cheaper and economic medium to exchange messages than traditional mailing system.Advantages:1) It is the .....
World Wide Web (WWW) or simply web is one of the most popular services of the internet. Web is a collection of documents or web sites, which are shared by different users using Hypertext Transfer Protocol (HTTP). It provides information on various .....
Intranet is a privately maintained computer network which is control by company or an organization. It uses all the features of the internet and is accessible only by employee or members. Extranet is also private network that uses Internet protocol .....
The process of copying of a file or data program etc. from a remote computer (web server) to the requesting computer (user computer) is called downloading. The process of copying a copy of a file or document or program from a user's computer to the .....
Webpage is a document stored in an electronic form that contains information in specific or single topic using text, graphics, sounds, animated pictures, hyperlinks etc. The information of the webpage is displayed on the user's computer using the .....
Some Internet security measures are:1) By installing firewalls programs on computer networks to prevent unauthorized access to network.2) Install different antivirus and anti-spyware software.3) By setting different security options in .....
Web browser is a software or program that accesses web pages and displays them on the user's computer from around the world. In another terms, it is software required for browsing and surfing web sites. It also allows user to retrieve, view and copy .....
E-commerce is also one of the important services of internet through which you can sell or buy goods. In simple terms, it is doing business through the internet or online business through internet. You can use the e-commerce site are: .....
Search engine is the web site that allows the users to search information based on a keyword or combinations of keywords in different subjects and topics. Some of the search engine web sites are: google.com, yahoo.com, bing.com .....
Internet is the largest computer network that can connect millions of computers around the world. It connects several thousands computer networks all over the world. So, it is known as networks of networks. The internet is an information .....
The syntax for Do control is:do { statement block; .....
The syntax for While control is:while(condition) { statement block .....
The syntax for if else is:if (condition) { statement; } else if (condition) { statements; } .............. else { statements .....
C language is popular than QBASIC because of following reasons: C language is simple, reliable and easy to use. C language can be used for developing application programs and system programs whereas QBASIC is used for developing .....
Binary numbers are divided in the same manner as decimal numbers. We need to remember the rules of binary subtraction.Rules for binary division: A B A/B 0 0 0 1 0 1 1 1Not defined 0 1Not .....
Binary numbers are multiplied in the same manner as decimal numbers. We need to remember the rules of binary addition.Rules for binary multiplication: A B A×B 0 0 0 1 0 0 0 1 0 1 1 .....
The rules for subtraction are the same in the binary system as in the decimal system. The result of the subtraction of binary digit is either 0 or 1.Rules for binary subtraction: A B A-B 0 0 0 1 0 1 1 1 0 0 1 1i.e. due to borrowing from the next .....
Binary numbers are added to the same manner as decimal numbers. There are only four possible combinations resulting from the addition of two binary digits. Rules for binary addition: A B A+B 0 0 0 0 1 1 1 0 1 1 1 10 i.e. 0 carry 1 .....
There is no any direct method to convert hexadecimal number into octal. So, at first the given hexadecimal number is converted into its binary equivalent then the result will be converted into octal as in previous methods.Solution:Hexadecimal .....
There is no any direct method to convert octal number into octal. So, at first the given octal number is converted into its binary equivalent then the result will be converted into hexadecimal as in previous methods.Octal Number: 3 2 5 6 Binary .....
Octal digit is represented in 3 bits. An octal number is converted to its binary equivalent by just substituting the respective binary value for each digit of the octal number. Binary TableOctal Binary0 0001 0012 0103 0114 1005 1016 1107 .....