Dear readers we have an assignment to do where we have to print a pyramid of numbers.
The user can enter a number as input and for that number as as range the pyramid of numbers should be printed.
So if the user enters 5, the number pyramid should look like this:
So we are going to write a proram to generate this pyramid pattern.
Basically we are going to use FOR loop to achieve this.
I have include the full tutorial here to create this program
... Read more »
So, you worked hard day and nights to develop the codes, assignments and project slides and what not.
And finally your boss shoots you down saying "You have not done well, the client is not happy at all ! Your performance is too week!!"
We all get criticized and pushed back at work in IT sector. And, the best part no matter how great job you have done, how many codes you have written, how many issues you have resolved, they all go unnoticed and if you make a very small silly mistake, that's where your lead and the entire hierarchy jumps into to make a speech..
< ... Read more »
Unibasic programming provides two ways to run programs or commands.
With UniData MENUS, you can transform the UniData command line interface into a menu driven interface.
Menu driven option is a better option to run any command PROC or sentence in Unibasic.
The advantage of menu driven :
You can use a menu to support database security. For example, you can provide menus for users to access data entry programs and reports, while denying them access to the UniData prompt.
All menus are stored in MENUFILE , each UV account usually has a MENU ... Read more »
In this tutorial we shall earna basic stuff.
So we have a .pem file which is key file to login to a remove server.
Usually this is needed when you create a remote server on Cloud and you choose to login with a key pair.
Or you create a key pair, in that case you will be given a *.pem file.
So please follow below steps to generate private key and public key from this file.
System monitoring and administration tools
-Common monitoring tool CCMS(Computing Centre Management System) to monitor alerts of R/3 system from an one place.
-Use of Business server pages to build online stores and portals.
-Database monitoring and administration utilities
-Resource management like memory,buffer,etc. SAP basis
-Authorization and profile management tools for user management.
-Internet access control to the system and business objects.
-Transfer modifications in screen,program,layout from the development to production system for accuracy purpose by Transport Management System.
-Client server architecture and configuration.
-Graphical User Interface designing for the presen ... Read more »
Today, we shall talk about one of the most frequently used command in Linux.
The command is used to print last 10 lines of a file.
tail -f is used to print the last 10 lines plus it keeps on reading the file if a new data is added to the file.
tail -f can be used if a log is currently being updated.
But then what is the use of tailf?
tailf is similar to tail -f except one difference that tailf does access the file if the file is not being updated or not growing.
... Read more »
Hereby we shall try to understand a very basic program to send mail using python library smtplib
The smtplib in python defines a client object that can be used to send mail to any internet machine a SMTP listener daemon.
1. Create an SMTP object.
Note that host or port number are optional.
host: the server where SMTP is running. example: smtp.gmail.com
port number: the port number where SMTP server is listening.
... Read more »
Today in this article we shall build up a small program to understand client -server communication using socket in Python.
1. Create a socket:
socket(socket family, type(TCP/UDP), protocol)
-- Family or domain could be AF_INET or AF_UNIX
-- Type could be TCP: SOCK_STREAM or UDP : SOCK_DGRAM
-- Protocol is left bank, by default it is 0.
2. Bind socket
-- bind the socket to a system's ip address and port ... Read more »
Hello open system guys,
we always get into situation where by we have to copy files from windows to/from Linux/UNIX/AIX syetsm.
When this happens there is pretty much a chance that the ctrl - M character may be found in the files we receive from Window system.
If there is a control - M character in a batch or a script , the script will failed as hell saying "command not found"
The resolution is we have to remove them.
In today's article i will tell you how to do this using perl command.
I have already shared the linux/Unix co ... Read more »
Every person who gets fed up of the monotonous office life generally thinks of quitting his job to chase his dreams of entrepreneurship? It’s generally a quandary for the many young professionals who hold such aspirations. Weighing the pros and the cons of self-employment always seems as an endless process and letting go of that “guaranteed” salary is a tough decision for many aspiring entrepreneurs. The article below gives certain lessons which an aspiring entrepreneur must follow in order to make his business successful . LESSON ONE: Simple is always hard enough “Simple is hard enough” has become a go-to mantra anytime an entrepreneur gets to a fork in the road. Whenever an entrepreneur thinks of looking at a new product concept, his first thought should be to recall the mantra that “simple is hard enough”. Not only does the mantra help cut away the unnecessary fat, but it also helps to implore intelligent design and cuts cost. You should decide quickly what form of business you w ... Read more »
Attachments: Image 1