Skip to main content

Posts

Featured Post

Data Mining with Weka -Installation

Weka - Data mining Tool W eka is a tool for big data and data mining. It is used to various classification, experiments, and analysis over large data sets. Installation Guide -weka  You can download Weka from   here   and follow the normal installation procedure. After completion you will get following window, here you can begin your classification or experiment on different data sets with Weka.

Mobile Application Testing

Introduction 1. Hardware based testing: The device including the internal processors, internal hardware, screen sizes,  resolution, space or memory, camera, radio, Bluetooth, WIFI etc.  2. Software or Application testing: The applications that work on mobile devices and their functionality are tested.  I.e. Mobile Application Testing Step of Mobile Application Testing Documentation Testing: Requirement analysis ,Test plan, Test cases  are created Functionality Testing Installation and Running the application Fields: Verify all fields works correctly, Mandatory and optional  fields are displayed differently.  Business Functionalities Testing Interruptions : Notifications, Network, SD Card Insert or remove Constant User Feedback: Progress bar, Network error,  Deleting important info. App Update : App Update process, ensure previous user  data is saved. Device Resource: Memory, Installation on SD Card etc .  3. Usability Testing : Usability tes...

Configure Git For Windows

 Configure Git for Windows  1.   go to https://git-scm.com/downloads    2.  download the software for Windows     3. install Git choosing all of the default options Set up # sets up Git with your name git config --global user.name "<Your-Full-Name>" # sets up Git with your email git config --global user.email "<your-email-address>" # makes sure that Git output is colored git config --global color.ui auto # displays the original state in a conflict git config --global merge.conflictstyle diff3 git config --list Associate with code editor Atom Editor Setup git config --global core.editor "atom --wait" Sublime Text Setup git config --global core.editor "'C:/Program Files/Sublime Text 2/sublime_text.exe' -n -w" VSCode Setup git config --global core.editor "code --wait"

Java Tutorials- While Loops

4. While Loops public class App { public static void main(String[] args) { int process =0;                                               //process starts at 0 while(process<=10){                    //process validation (whlie statement) System.out.println("ID: "+ value);  //Output process as ID process= process+1;                     // process increase by 1 } } } Output: ID: 0  ID: 1  ID: 2  ID: 3  ID: 4  ID: 5  ID: 6  ID: 7  ID: 8 ID: 9  ID: 10

Java Tutorial - (Input) Scanner

3. Scanner import java.util.Scanner; public class App{ public static void main(String[] args) { //create scanner object Scanner input = new Scanner(System.in); //output the prompt System.out.println("Enter a number: "); //wait for the user to enter a number int num = input.nextInt();         //output System.out.println("you entered: "+num); } } Output : User Input Note:1. For: String line = input.nextLine(); and  Double value = input.nextDouble(); And 2. Always save java program as (In this case: App.java) class name.java.

JAVA Eclipse Tutorials - Hello World!

1. First program Install java and Eclipse Then follow the Steps: File-New-Java Project- Enter Project Name- Finish Go to Project Name you Entered -File-New Class- Application public class Application {                                        //Class name same as java file name public static void main(String[] args) {           //Main method String text ="Hello World !";                 //String data type System.out.println(text);                        //print method } } OUTPUT:  Hello World !

Android Permission

System permissions are divided into several protection levels. The two most important protection levels to know about are normal and dangerous permissions: Normal permissions cover areas where your app needs to access data or resources outside the app's sandbox, but where there's very little risk to the user's privacy or the operation of other apps. For example, permission to set the time zone is a normal permission. If an app declares that it needs a normal permission, the system automatically grants the permission to the app. For a full listing of the current normal permissions, see Normal permissions . Dangerous permissions cover areas where the app wants data or resources that involve the user's private information, or could potentially affect the user's stored data or the operation of other apps. For example, the ability to read the user's contacts is a dangerous permission. If an app declares that it needs a dangerous permission, the user has to explic...