Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Sushil Sharma

Member since: Dec 23, 2018
Published articles: 15

10 Skills Computer Science Student Should Have ||

10 skills computer science student should have ||At 6:30 P.M. in Nedderman Hall Room 100, there will be a Microsoft Computer Science Trivia Night, an event that will pit team against team in contest...

Articles > Computers > Other Jan 08, 2019
5 of the Most in - Demand Programming Languages - and Where to Learn Them

JAVAYou're probably most familiar with Java because of how of ten it asks for your permission when you're loading websites with video or interactive content. Considered to be one of the most used...

Articles > Computers > Programming Jan 08, 2019
Biography of Albert Einstein

SCIENTIFIC PAPERSOn 30 April 1905, Einstein completed his thesis, with Alfred Kleiner, Professor of Experimental Physics as a result, Einstein was awarded a PhD by the University of Zurich with his...

Articles > Reference & Education > Science Jan 29, 2019
China Launch Own Gps | China's Rise | Global Positioning System (Gps)

China Launch Own GPS | China's Rise | Global Positioning System (GPS)CHINA'S RISEChina's remarkable achievement: After America's GPS, Russia's Glonass and Europe's Galileo, China's BDS (rolled out...

Articles > Technology & Science > GPS Jan 13, 2019
Define Macros? Use of Macros in I/C Instructions ||

Many assemblers support predefined macros, and other support programmer-defined (and repeatedly re-definable) macros involving sequence of text line in which variables and constants are embedded. this...

Articles > Computers > E-Learning Jan 06, 2019
How to Become a Hacker: Steps by Step to Pro Hacker||

Here are some guidance to start learning ethical hacking as a beginner.Learn To Program In 'C':C programming being one of the most powerful languages in computer programming. It is necessary to really...

Articles > Computers > Other Jan 08, 2019
How to Use Google for Hacking | Google is a Hacking Tool | Google Dorks?

How to use Google like a pro using Google DorkingWe know how Iranian Hackers were able to glean information from Google about the dams in US cities in order to infiltrate and flood the cities. The...

Articles > Computers > Other Jan 17, 2019
Learn About 'C' Language & Python Language.

''C'' language : History of "C" language | Why name "C" was given to Language?Definition & History of "C" Language : C is a general-purpose language which has been closely associated with the UNIX...

Articles > Computers > Programming Jan 08, 2019
Ozone Layer Depletion Caused by Chloroform, Can Montreal Protocol Save Earth? Impact of Vsl's on Ozo

CHLOROFORM IS DESTROYING OZONE LAYERThe United Nations announced some much needed, positive news about the environment: The ozone layer, which shields the Earth from the sun's harmful ultraviolet...

Articles > Reference & Education > Science Jan 18, 2019
Wanna Be a Hacker? but Don't Know How to Start?

Want to become best hacker or computer professional list? Here in one post I clear all your confused that how to best become a Ethical hacker. First of all learn all basic computer fundamentals you...

Articles > Computers > Programming Jan 16, 2019
What is Financial Year? Should India Change It's Financial Year?

BASICSJanuary 1st marked the beginning of a brand new year. For the government, many businesses, investors and taxpayers in India, it is the year beginning from April I that matters.YEAR END...

Articles > Finance > Other Jan 08, 2019
What is Network Protocols? and It's Types and Work | What is Nfs ||

Network Protocol Protocol refer to the set of rules applicable for a network. The protocol defines standardized format for the data packet to be transmitted through the network.Types of...

Articles > Computers > Information Technology Jan 08, 2019
What is Object Oriented Programming (Oop's) & It's Features||

Object Oriented Programming (OOP) : OOP allows decomposition of problem into a number of entities called object and then build data & functions around these objects.The data of an object can be...

Articles > Computers > Programming Jan 08, 2019
What is U.s. Government Shutdown? | What Happen in Government Shutdown.

WHAT JUST HAPPENED?The US federal government entered a partial shutdown, suspending funding for many agencies.WHAT IS A GOVERNMENT SHUTDOWN?Much of the federal government gets its funding from annual...

Articles > News & Society > Politics Jan 15, 2019
Write About CD-Rom and the Multimedia Highway?

Multimedia require large amount t of digital memory when stores in an end users library, or large amounts of bandwidth when distributed over wires, glass Fiber, or airwaves on network. The greater the...

Articles > Computers > Information Technology Jan 10, 2019
1 2

Author Bio

I.m studying of Computer Application. I thick you should you know about the All types of Hackers are in our world. It's is a educational article.