Personal Information
Organização/Local de trabalho
Peshawar, KPK Pakistan
Setor
Education
Sobre
I'm working as Lecturer Computer Science at Higher Education Department KP
Marcadores
computer skills
what is computer
computer
ajax vs json
ajax tutorials
what is ajax
how to use ajax in web
ajax technology
what is computer generation
fifth generation of computer
fourth generation of computer
third generation of computer
second generation of computer
ist generation of computer
5th generation of computer
4th generation of computer
3rd generation of computer
2nd generation of computer
1st generation of computer
generations of computer
generation of computer
types of computer
components of computer
uses of computer
computing
history of computer
safe from email hacking
law of ellipses
physics law of keplers
law of harmonies
law of equal areas
third law of kepler
second law of kepler
ist law of kepler
3rd law of kepler
2nd law of kepler
kepler
keplers
how hack email
strategy of email prevention
how to make email secure
email prevention
email prevention techniques
email
quality factors attributes
mclls
mccall's
limitations of architecture
components
attributes
architecture
design
ajax
Ver mais
Apresentações
(4)Documentos
(3)Gostaram
(2)Report Writing: Basic- The Structure and Components
Parveen Kumar Sharma
•
Há 9 anos
Recursion in c++
Abdul Rehman
•
Há 6 anos
Personal Information
Organização/Local de trabalho
Peshawar, KPK Pakistan
Setor
Education
Sobre
I'm working as Lecturer Computer Science at Higher Education Department KP
Marcadores
computer skills
what is computer
computer
ajax vs json
ajax tutorials
what is ajax
how to use ajax in web
ajax technology
what is computer generation
fifth generation of computer
fourth generation of computer
third generation of computer
second generation of computer
ist generation of computer
5th generation of computer
4th generation of computer
3rd generation of computer
2nd generation of computer
1st generation of computer
generations of computer
generation of computer
types of computer
components of computer
uses of computer
computing
history of computer
safe from email hacking
law of ellipses
physics law of keplers
law of harmonies
law of equal areas
third law of kepler
second law of kepler
ist law of kepler
3rd law of kepler
2nd law of kepler
kepler
keplers
how hack email
strategy of email prevention
how to make email secure
email prevention
email prevention techniques
email
quality factors attributes
mclls
mccall's
limitations of architecture
components
attributes
architecture
design
ajax
Ver mais