• عن المدونة
  • الفهرس
  • اتصل بنا
  • سياسة الخصوصية
القائمة

Prof 5Tech

القائمة
  • المقالات
  • تطوير المواقع
    • اضافات بلوجر
    • قوالب بلوجر
    • ووردبريس
  • البرمجة
  • السيو
  • التصميم
  • الربح من الانترنت
  • مواقع اجتماعية
    • فيس بوك
    • التويتر
    • يوتيوب
  • الهواتف
    • اندرويد
    • الايفون
    • الويندوز فون

اعلان 728x90

Archive for فبراير 2013
The secret about that data received by the Facebook from you

The secret about that data received by the Facebook from you

Jack Isaac 9:45 ص اضافة تعليق
Jack Isaac
Facebook receive variety of various kinds of data concerning you, that you would like to understand what data they collect...
Top 12 things needs to know by the Facebook user

Top 12 things needs to know by the Facebook user

Jack Isaac 7:22 ص اضافة تعليق
Jack Isaac
1. You may not post unauthorized commercial communications (such as spam) on Facebook. 2. You may not collect users'...
MCQ of Computer networking test with answer set-7

MCQ of Computer networking test with answer set-7

Jack Isaac 12:13 م اضافة تعليق
Jack Isaac
1. The examples of Interior Gateway Protocols (IGP) are.i) Open Short Path First (OSPF)                                 ...
Solved MCQ of Computer Networking test set-6

Solved MCQ of Computer Networking test set-6

Jack Isaac 12:28 م اضافة تعليق
Jack Isaac
1. ………………….. is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.A)...
MCQ of Internet Security with answer set-2

MCQ of Internet Security with answer set-2

Jack Isaac 12:03 م اضافة تعليق
Jack Isaac
1.  The primary goal of the ………………….. protocol is to provide a private channel between communicating application, which...
Solved MCQ of Internet Security set-1

Solved MCQ of Internet Security set-1

Jack Isaac 11:50 ص اضافة تعليق
Jack Isaac
1. Which of the following are the solutions to network security?i) Encryption                                      ...
MCQ of Computer Security with answer set – 2

MCQ of Computer Security with answer set – 2

Jack Isaac 9:54 ص اضافة تعليق
Jack Isaac
1. …………….. are used in denial of service attacks, typically against targeted web sites.A) Worm B) ZombieC) VirusD) Trojan...
Pages 1 of 25 1234567التاليالسابق
الاشتراك في: الرسائل (Atom)
Prof5Tech. يتم التشغيل بواسطة Blogger.

مواضيع الاسبوع

المتابعون

Navigation List

التسميات

  • Artificial Intelligence(AI)
  • Backlinking
  • Basic IT
  • Best List
  • Blogging Tips
  • C
  • C#
  • C++
  • Computer Architecture
  • Computer Fundamental
  • Computer Security
  • Computer/IT Officer Exam
  • CSS
  • Data Mining and Warehousing
  • Data Recovery Tools
  • Data Structure
  • Database Management System
  • E-commerce
  • E-government
  • Internet & Web Designing
  • IT Law
  • IT Tips and Tricks
  • IT Tutorials
  • Java
  • JavaScript
  • Keyword Research Tools
  • MIS
  • Multiple Choice Question (MCQ)
  • Networking
  • Online Earning
  • Online IT Jobs
  • Operating System
  • Oracle Forms and Reports
  • Programming Guide
  • Programming Language
  • SEO
  • Social Networking Sites
  • Software Download
  • Software Engineering
  • System Analysis and Design
  • Top List
  • VB.Net

التسميات

  • Artificial Intelligence(AI)
  • Backlinking
  • Basic IT
  • Best List
  • Blogging Tips
  • C
  • C#
  • C++
  • Computer Architecture
  • Computer Fundamental
  • Computer Security
  • Computer/IT Officer Exam
  • CSS
  • Data Mining and Warehousing
  • Data Recovery Tools
  • Data Structure
  • Database Management System
  • E-commerce
  • E-government
  • Internet & Web Designing
  • IT Law
  • IT Tips and Tricks
  • IT Tutorials
  • Java
  • JavaScript
  • Keyword Research Tools
  • MIS
  • Multiple Choice Question (MCQ)
  • Networking
  • Online Earning
  • Online IT Jobs
  • Operating System
  • Oracle Forms and Reports
  • Programming Guide
  • Programming Language
  • SEO
  • Social Networking Sites
  • Software Download
  • Software Engineering
  • System Analysis and Design
  • Top List
  • VB.Net

المساهمون

  • Jack Isaac
  • Jack

نموذج الاتصال

الاسم

بريد إلكتروني *

رسالة *

أرشيف المدونة الإلكترونية

  • ◄  2016 (8)
    • ◄  يوليو (2)
    • ◄  أبريل (5)
    • ◄  مارس (1)
  • ◄  2015 (84)
    • ◄  أغسطس (1)
    • ◄  يوليو (8)
    • ◄  يونيو (12)
    • ◄  مايو (2)
    • ◄  أبريل (1)
    • ◄  مارس (5)
    • ◄  فبراير (20)
    • ◄  يناير (35)
  • ◄  2014 (78)
    • ◄  ديسمبر (32)
    • ◄  نوفمبر (4)
    • ◄  سبتمبر (4)
    • ◄  أغسطس (11)
    • ◄  يوليو (7)
    • ◄  يونيو (2)
    • ◄  مايو (3)
    • ◄  أبريل (1)
    • ◄  مارس (2)
    • ◄  فبراير (7)
    • ◄  يناير (5)
  • ▼  2013 (136)
    • ◄  ديسمبر (9)
    • ◄  نوفمبر (6)
    • ◄  أكتوبر (3)
    • ◄  سبتمبر (6)
    • ◄  أغسطس (16)
    • ◄  يوليو (8)
    • ◄  يونيو (12)
    • ◄  مايو (11)
    • ◄  أبريل (13)
    • ◄  مارس (28)
    • ▼  فبراير (7)
      • The secret about that data received by the Faceboo...
      • Top 12 things needs to know by the Facebook user
      • MCQ of Computer networking test with answer set-7
      • Solved MCQ of Computer Networking test set-6
      • MCQ of Internet Security with answer set-2
      • Solved MCQ of Internet Security set-1
      • MCQ of Computer Security with answer set – 2
    • ◄  يناير (17)
  • ◄  2012 (64)
    • ◄  ديسمبر (16)
    • ◄  نوفمبر (21)
    • ◄  أكتوبر (24)
    • ◄  سبتمبر (3)

الاقسام

  • Artificial Intelligence(AI)
  • Backlinking
  • Basic IT
  • Best List
  • Blogging Tips
  • C
  • C#
  • C++
  • Computer Architecture
  • Computer Fundamental
  • Computer Security
  • Computer/IT Officer Exam
  • CSS
  • Data Mining and Warehousing
  • Data Recovery Tools
  • Data Structure
  • Database Management System
  • E-commerce
  • E-government
  • Internet & Web Designing
  • IT Law
  • IT Tips and Tricks
  • IT Tutorials
  • Java
  • JavaScript
  • Keyword Research Tools
  • MIS
  • Multiple Choice Question (MCQ)
  • Networking
  • Online Earning
  • Online IT Jobs
  • Operating System
  • Oracle Forms and Reports
  • Programming Guide
  • Programming Language
  • SEO
  • Social Networking Sites
  • Software Download
  • Software Engineering
  • System Analysis and Design
  • Top List
  • VB.Net

مواضيع الشهر

تابعنا على

Find Us On Facebook

Ad 2

المشاكات الشائعة

  • Roles of JAD Group Members
    The roles of JAD group members as a project sponsor, project leader, timekeeper and clients are described below. Project Sponsor - remember...
  • MCQ of Operating System with answer set-2
    1. The first batch operating system was developed in the ................. by General Motors for use on an IBM 701. A) mid 1940's B) mid...
  • Java Objective Questions with Answers set-9
    1. In java a ....................... is a sequence of characters. Schema of the general architecture of a program running in a Java Virtual ...
  • The list of social bookmarking sites
    Here are the list of top social bookmarking sites for bookmarking for your sites or blogs which                   helps to increase the PR ...
  • Top 10 List of Best Job Search Sites
    Top 10 List of Best Job Search Sites
    Finding a best job that can best match to your academic qualification and your skill may be the difficult task, if you don't select the ...
  • What are the Different Ways to Redirect Page in JavaScript?
    What are the Different Ways to Redirect Page in JavaScript?
    When you click on a link or type the URL to go to one page but sometimes it may go to another page internally due to page redirection on tha...
  • How to write a program in C using for Loop?
    How to write a program in C using for Loop?
    For loop is the most popular looping structure in C programming language . It does required number of repetitions for the execution of block...
  • Easy Methods to Increase Your Website Speed
    Website speed is the most important factor for SEO. It also affects the popularity of your site, about every 25% of the visitors of the site...
  • How to Get and Set Element Attributes using jQuery
    Some of the simplest and most common, operations on jQuery objects are those that get or set the value of HTML attributes, CSS styles, eleme...
  • Solved MCQ on Physical Layer in OSI Reference Model set-1
    1) Which of the following is/are the applications of twisted pair cables ...... A. In the local loop B. In the DSL line C. In the ISDN Netwo...

اخر المعلقين

احدث مواضيعنا

  • Roles of JAD Group Members
    The roles of JAD group members as a project sponsor, project leader, timekeeper and clients are described below. Project Sponsor - remember...
  • MCQ of Operating System with answer set-2
    1. The first batch operating system was developed in the ................. by General Motors for use on an IBM 701. A) mid 1940's B) mid...
  • Java Objective Questions with Answers set-9
    1. In java a ....................... is a sequence of characters. Schema of the general architecture of a program running in a Java Virtual ...
  • The list of social bookmarking sites
    Here are the list of top social bookmarking sites for bookmarking for your sites or blogs which                   helps to increase the PR ...
  • Top 10 List of Best Job Search Sites
    Finding a best job that can best match to your academic qualification and your skill may be the difficult task, if you don't select the ...
  • What are the Different Ways to Redirect Page in JavaScript?
    When you click on a link or type the URL to go to one page but sometimes it may go to another page internally due to page redirection on tha...
  • How to write a program in C using for Loop?
    For loop is the most popular looping structure in C programming language . It does required number of repetitions for the execution of block...
  • Easy Methods to Increase Your Website Speed
    Website speed is the most important factor for SEO. It also affects the popularity of your site, about every 25% of the visitors of the site...
  • How to Get and Set Element Attributes using jQuery
    Some of the simplest and most common, operations on jQuery objects are those that get or set the value of HTML attributes, CSS styles, eleme...
  • Solved MCQ on Physical Layer in OSI Reference Model set-1
    1) Which of the following is/are the applications of twisted pair cables ...... A. In the local loop B. In the DSL line C. In the ISDN Netwo...

اخر المواضيع

2025 جميع الحقوق محفوظة لموقع المطور سياسة الخصوصية | الفهرس | اتصل بنا
Created by Arlina Design