In this tutorial, we are going to know how to send emails using Sendgrid in PHP. SendGrid is a customer communication platform marketing email. For PHP, SendGrid also provides its library that can be used for calling the SendGrid API. Here is the Step you… Read More »How to send Emails using Sendgrid in PHP?
In this tutorial, we are going to learn, how to use JWT in Codeigniter for creating API Authorization token. We will use a JWT Class in CodeIgniter for encoding and decoding. Purpose of Authorization token is to an authorized API call to secure access. JWT:- JSON… Read More »How to use JWT in CodeIgniter for creating API Authorization token
In this tutorial, we are going to upload an excel file and parse its data and store it in a database by using SimpleXLSX. SimpleXlsx Class Parse and retrieve data from Excel XLSx files, and put them in an array. We are going to show… Read More »How to upload excel and CSV file in CodeIgniter framework to MySQL
The project name “Employee attendance management system” basically helps the organization to manage the attendance of their employee. This project is developed in PHP on the CodeIgniter framework, the database of this project is in MySQL and the frontend is designed using the bootstrap designing… Read More »Employee Attendance Management System Project
In Php, we can create a unique id in PHP using uniqid() function. This is the best way to generate unique id in PHP, However we can say php generate unique id for mysql, php unique id generator anything. Examples For Creating a Unique Id:- 1.… Read More »How to generate a unique id in PHP?
INTRODUCTION TO COMPUTER STARTING UP THE COMPUTER: BOOTING After switching ON the computer, you generally wait for sometime before the desktop appears on the computer screen. you just sit idle for some time while different messages and the opening screen of windows are displayed. This… Read More »INTRODUCTION TO COMPUTER
COMPUTER CRIME: HACKING/CRACKING As in the case of other systems and fields, there are also crimes related to computers. Computer crimes result from deliberate tampering with data and information. The people who are associated with computer crimes are often called Hackers, Crackers, Virus programmers, Breachers,… Read More »COMPUTER CRIME: HACKING/CRACKING
INTRODUCTION Computers are used nowadays in almost all walks of life. This age is called the age of computers, computers are used in education, business, manufacturing, designing, entertainment, research, and development. They are everywhere, be at homes, schools, shops, offices, railway stations, airports, and hospitals.… Read More »COMPUTER ETHICS, CRIME, AND SECURITY
CONTROL STATEMENTS you have already learnt about counters and Loops. In Qbasic , loops are made with the help of control statements. Control statements are used to control the flow of the program according to your choice.These are very powerful tools for programmers. Qbasic has… Read More »MORE ON QBASIC