Band Baja Baraat - HD Full Hindi Movie part 15

Monday, February 28, 2011

Band Baja Baraat - HD Full Hindi Movie part 14


Band Baja Baraat - HD Full Hindi Movie part 14
Uploaded by metalikeyes. - Check out other Film & TV videos.

Band Baja Baraat - HD Full Hindi Movie part 13


Band Baja Baraat - HD Full Hindi Movie part 13
Uploaded by metalikeyes. - Watch feature films and entire TV shows.

Band Baja Baraat - HD Full Hindi Movie part 12


Band Baja Baraat - HD Full Hindi Movie part 12
Uploaded by metalikeyes. - Watch feature films and entire TV shows.

Band Baja Baraat - HD Full Hindi Movie part 11


Band Baja Baraat - HD Full Hindi Movie part 11
Uploaded by metalikeyes. - Classic TV and last night's shows, online.

Band Baja Baraat - HD Full Hindi Movie part 10


Band Baja Baraat - HD Full Hindi Movie part 10
Uploaded by metalikeyes. - Check out other Film & TV videos.

Band Baja Baraat - HD Full Hindi Movie part 9


Band Baja Baraat - HD Full Hindi Movie part 9
Uploaded by metalikeyes. - Watch feature films and entire TV shows.

Band Baja Baraat - HD Full Hindi Movie part 8


Band Baja Baraat - HD Full Hindi Movie part 8
Uploaded by metalikeyes. - Check out other Film & TV videos.

Band Baja Baraat - HD Full Hindi Movie part 7


Band Baja Baraat - HD Full Hindi Movie part 7
Uploaded by metalikeyes. - Classic TV and last night's shows, online.

Band Baja Baraat - HD Full Hindi Movie part 6


Band Baja Baraat - HD Full Hindi Movie part 6
Uploaded by metalikeyes. - Classic TV and last night's shows, online.

Band Baja Baraat - HD Full Hindi Movie part 5


Band Baja Baraat - HD Full Hindi Movie part 5
Uploaded by metalikeyes. - Full seasons and entire episodes online.

Band Baja Baraat - HD Full Hindi Movie part 4


Band Baja Baraat - HD Full Hindi Movie part 4
Uploaded by metalikeyes. - Watch feature films and entire TV shows.

Band Baja Baraat - HD Full Hindi Movie part 3


Band Baja Baraat - HD Full Hindi Movie part 3
Uploaded by metalikeyes. - Full seasons and entire episodes online.

Band Baja Baraat - HD Full Hindi Movie part 2


Band Baja Baraat - HD Full Hindi Movie part 2
Uploaded by metalikeyes. - Check out other Film & TV videos.

Band Baja Baraat - HD Full Hindi Movie part 1


Band Baja Baraat - HD Full Hindi Movie part 1
Uploaded by metalikeyes. - Full seasons and entire episodes online.

Naina Thag lain ge.wmv


Patiala House Part 1 HQ Hindi Movie Akshay Kumar
Uploaded by findyaar. - Classic TV and last night's shows, online.

Naina Thag lain ge.wmv

[MV] Big Bang - Tonight

Android Tablet on buses in India

Makuchaku's Android ADP1 Unboxing video - India

India unveils $30 tablet PC (Android) - India's iPad

Android Application Development India, Android developers India

Makuchaku's Android ADP1 Unboxing video - India

Samsung Galaxy Spica Android India Phone Review

Federal Reserve and IRS = private corporations!

Ex IRS agent tells it like it is

DORITOS® - Pug Attack -- Crash the Super Bowl 2011 Finalist

SUPERBOWL 2011

Super Bowl 2011 highlights

Best (and Worst) Superbowl Commercials 2011

Super Bowl 2011 Halftime Show - Black Eyed Peas [HQ]

Netflix Prank Call

netflix

Netflix iPad Review

Netflix: Packing DVDs at lightning speed!

Nightline on Netflix

How to Find Streaming Movies on Netflix

Selena Gomez - Magic Music Video

Selena Gomez To Debut New Single "Who Says"

Selena Gomez Brings 'Wizards' to Tokyo

TELL ME SOMETHING Music Video

Selena Gomez & The Scene - A Year Without Rain

Selena Gomez & The Scene - Naturally

Na pohybel Janas - Google

NA POHYBEL JANAS (Wiki LEaked) Leak through

Na Pohybel - Łzy

"SOMEBODY TO LOVE" (SPOOF) JUSTIN BIEBER

"Born This Way" - Lady Gaga

maa baap ko dekh kar bacha darr gaya hai

Saturday, February 26, 2011

funny poem on kalla ran

best funny speach

wedding dance.mp4

Papu cant Dance HD

Kabhi Kabhi Aditi HD

Tera Hone Laga Hoon - APKGK (720p HD Song)

Tu Jaane Na (Full HD Video Song) Ajab Prem Ki Ghazab Kahani [Ranbir Kap...

Hum Jo Chalne Lage - Jab We Met (DVD Quality)

Hum Jo Chalne Lage (Aao Meelon Chalen) - Jab We Met - Shaan

Shahid Kareena kiss in Jab We Met

Jab We Met - Aaoge Jab Tum Ft. Shahid / Kareena

Tumse Hi (Full HD Video Song) | Jab We Met New Hindi Movie Songs [Shahid...

Tune Jo Na Kaha HD Full Video Song New York Feat John Abraham Katrina...

THE HANGOVER 2 Trailer HD

MAN MAKE-UP TUTORIAL

Makeup For Glasses

Basic Concealer Tutorial

Basic Foundation Tutorial

Brighter Larger Looking Eyes - Makeup Tutorial

Brighter Larger Looking Eyes - Makeup Tutorial

Romantic Blush

Perfect Red Lips

Dr. Dre - I Need A Doctor (Explicit) ft. Eminem, Skylar Grey

Beutifull Sidra in bhakkar with Shaher YAr

Wednesday, February 23, 2011

"Rocketeer" - Far East Movement (ft. Jake Bruene)

Monday, February 21, 2011

Pitbull - I Know You Want Me (Calle Ocho) OFFICIAL VIDEO

Sunday, February 20, 2011











  • Pulp & Paper News Service
    Breaking news for the global pulp & paper industry -- try it free
    www.risiinfo.com
  • Free Downloadable Videos
    Download The Most Viewed End Time Free Bible Prophecy Videos Online!
    www.WorldsLastChance.com/Videos
  • Öztaş Packaging
    Paper packaging, paper bag, and twisted handle paper bag producer.
    www.oztasambalaj.com.tr

Britney Spears - Hold It Against Me

Saturday, February 19, 2011

LADY GAGA - Born This Way (Cover)

Friday, February 18, 2011

My today CS101 Paper Feb. 2011 final term.

Friday, February 11, 2011


My today CS101 Paper Feb. 2011 final term.




 




total Qs...52
MCQs....40
short Qs,....12
what is database??? (2)
what is trojan horse??? (3)
flow chart is a form of algorithem....explain???? (2)
what is program methodology>??? (2)
3D rendering??? (2)
what do u mean by FTP???? (3)
user requirements in software lifestyle??? (3)
who is computer professional??? (3)
what are ordered lists??? give codes with tabular representation??? (5)
duty n profit for an architect?? (5)
function argguments??? (5)
aik java ki coding ka tha,,,,, (5)...[wo yaad nahi]


my todays cs101 paper

what is URL?
what are the qualities of a presentation?
what is FTP?
what is IT its fields?
difference between database and DBMS?
whats the function of print preview?





g ye mera paper hai :
WHy we use javascript?
write names of phases of DoS attack.
Errors occur in developing program? write names
in which situation we use inline event handling?
what are the properties , method and event handling of image java script?
write names of 5 key characteristics of internet?
A ⊕ B = A'.B' + A'.B wrong or right? prove it by truth table..
why we use string function in javascript?
What is the mistake in the following coding
student=new array(10)
Local and global variable?
baki yad nahi


Write the names of DOS attack. 2Marks

Write html format to include GIF and JPG images in webpage 2Marks

Differentiate between <td> and <tr> tags 2 Marks

Who array are implemented in java script 2 Marks

Who we can define pixel 3 marks

What is the preferred organizational structure for the organization 3Marks

Differentiate between onFocus and onBlur 3 Marks

What are three basic components of system softwere 3 Marks

Advantages and disadvantages of client-side scripting 5Marks

Briefly describe for layout of presentation 5Marks

Who many members are there in business development team? briefly describe the responsibilities and profile of their 5Marks

Explain the function of ‘+’ operator with the help of example 5 Marks







Why we use string functions in JavaScript?
Explain function arguments with the help of an example?
Write the steps to sort an un-sorted list.
Discuss any two situations which show non-ethical behavior?
. Define the anchor tag with the help of example.
What are Trojan Horses ?
What Is the resturction to use in line in a function
Define anchor tag
Write down three advantages of using Functions in a program.
In JavaScript, what is event handling? What are the two types of events?
What is the mistake in the following coding
Student=new array(10)


Aik bhool gaya Question....... 40 Mcqs thae ... 12 S.Q







most of the MCQ's are from past papers. Please read all the past solved MCQ's and you will 40 out of 40 for sure.

what is event handler explain. write two types of event handler
What is programming methodology
What is computer screen, explain
what is Turing Machine? explain how its works
Explain why global variable is better than local variable (question was something like that)
What is Relational Database, give two example of RDBMS
Write down the five advantages of multimedia presentation

there was one question regarding teamload, I guess it was like write down the responsibilities of teamload

don't remember the rest.

Best of luck for your papers



Why we use string functions in JavaScript?
Explain function arguments with the help of an example? 
Write the steps to sort an un-sorted list.
Discuss any two situations which show non-ethical behavior?
. Define the anchor tag with the help of example.
What are Trojan Horses ?
What Is the resturction to use in line in a function
Define anchor tag
Write down three advantages of using Functions in a program.
In JavaScript, what is event handling? What are the two types of events? 
What is the mistake in the following coding
Student=new array(10)


Aik bhool
gaya Question....... 40 Mcqs thae ... 12 S.Q
...............
Another Paper:

ths z my tioday papr of cs101 11.02.2011......10.30am

The mcqz were of 40 marks and he long n short mixed question were of 40 marks. Total paper was of 80 marks and timing of my paper was 2 hours means 120 minutes.

I don't remember all the questions but those which I know I m going to share with you dear fellows.

1. What is an intelligent system? (2 marks)
2. What is spread sheet? Write two jobs of spread sheet? (3 marks)
3. What are the arguments of a function? Explain with an example? (5 marks)
4. What are Trojan horses? (3 marks)
5. What are semantic errors? (2 marks)
6. If you are going to work on a big project then make a heuristic chart for this? (5 marks)
7. Write the names of the errors that are found during developing a program? (2 marks)
8. Write the properties of u useful web? (5 marks)
9. What do you mean by FTP? (2 marks)
.................

Another Paper:

Write the names of DOS attack. 2Marks

Write html format to include GIF and JPG images in webpage 2Marks

Differentiate between <td> and <tr> tags 2 Marks

Who array are implemented in java script 2 Marks

Who we can define pixel 3 marks

What is the preferred organizational structure for the organization 3Marks

Differentiate between onFocus and onBlur 3 Marks

What are three basic components of system softwere 3 Marks

Advantages and disadvantages of client-side scripting 5Marks

Briefly describe for layout of presentation 5Marks

Who many members are there in business development team? briefly describe the responsibilities and profile of their 5Marks

Explain the function of '+' operator with the help of example 5 Marks
...............

Another Paper:

1. What is a software? Give one example. (2)
2. Write names of DoS attack phases. (2)
3. Why we need Arrays in javascript? (2)
4. Event handeler attribute consists of three steps. Write about each of them. (3)
5. What is meaning of abr. AFU and ALU, whats difference between them? (3)
6. What is dilemma of computing? (5)
7. What steps involve in working of TCP/IP protocol in internet transmission? (5)
8. Write steps to sort an unsorted list. (5)
9. Definefunction, Write atleast three advantages of function.(5)




total Qs...52
MCQs....40
short Qs,....12
what is database??? (2)
what is trojan horse??? (3)
flow chart is a form of algorithem....explain???? (2)
what is program methodology>??? (2)
3D rendering??? (2)
what do u mean by FTP???? (3)
user requirements in software lifestyle??? (3)
who is computer professional??? (3)
what are ordered lists??? give codes with tabular representation??? (5)
duty n profit for an architect?? (5)
function argguments??? (5)
aik java ki coding ka tha,,,,, (5)...[wo yaad nahi]



The mcqz were of 40 marks and he long n short mixed question were of 40 marks. Total paper was of 80 marks and timing of my paper was 2 hours means 120 minutes.

I don’t remember all the questions but those which I know I m going to share with you dear fellows.

1.      What is an intelligent system? (2 marks)
2.      What is spread sheet? Write two jobs of spread sheet? (3 marks)
3.      What are the arguments of a function? Explain with an example? (5 marks)
4.      What are Trojan horses? (3 marks)
5.      What are semantic errors? (2 marks)
6.      If you are going to work on a big project then make a heuristic chart for this? (5 marks)
7.      Write the names of the errors that are found during developing a program? (2 marks)
8.      Write the properties of u useful web? (5 marks)
9.      What do you mean by FTP? (2 marks)

-------------------------------------------
  1. What is an intelligent system? (2 marks)
  2. What is spread sheet? Write two jobs of spread sheet? (3 marks)
  3. What are the arguments of a function? Explain with an example? (5 marks)
  4. What are Trojan horses? (3 marks)
  5. What are semantic errors? (2 marks)
  6. If you are going to work on a big project then make a heuristic chart for this? (5 marks)
  7. Write the names of the errors that are found during developing a program? (2 marks)
  8. Write the properties of u useful web? (5 marks)
  9. What do you mean by FTP? (2 marks)



*My today CS101 Paper*
* *
*Total 52 Question:*
*40 MCQ’s*
*12 Subjective.*
* *
*7 remember me so I write down & left I forget*
* *
* *
*What is database?     2 *
* *
*What is Good Programming Methodology?          2*
* *
*Difference global variable is better than local variable?       3*
* *
*Difference Logic- or time-bombs         3*
* *
*Use of Simple Mail Transfer Protocol?           3*
* *
*who is computer professional             3***
* *
*Difference between ALU & FLU            5*
* *
*Why the trend of short term working, Explain?       5*






Question # 1 of 10 (
Start time:
01:58:03 AM )
Total Marks: 1
In a System having many parts to be designed, one should always do the _____ first.
Select correct option:
Simple part
Development part
Quality part
None of the given
What step\steps is\are not correct in following sorting algorithm? Step 1 Repeat the following steps while the list is sorted: Step 2 Start with the first object in the list Step 3 Swap it with the one next to it if they are in the correct order Step 4 Repeat the same with the next to the first object Step 5 Keep on repeating until you reach the last object in the list
Select correct option:
Step 1
Step 3 and Step 2
Step 4
Step 1 and Step 3
Question # 3 of 10 (
Start time: 02:00:06 AM )
Total Marks: 1
In programming Software methodology ____________ is also called top down design.
Select correct option:
Object oriented design
Structured design
Flow Chart design
Use case design
Question # 4 of 10 (
Start time: 02:00:41 AM )
Total Marks: 1
Good navigation should be invisible until it is
Select correct option:
Clicked
Browsed
Wanted
Searched
Objects are modified with ______ that are associated with that object – e.g. a resize a Window with resizeTo(150, 200)
Select correct option:
Properties
Events
Methods
All of the above
Question # 6 of 10 (
Start time: 02:03:39 AM )
Total Marks: 1
A data value that appears directly in a statement is known as _________
Select correct option:
Numeric Literals
String Literals
JavaScript Literals
None of the given
Question # 7 of 10 (
Start time: 02:05:00 AM )
Total Marks: 1
______ are names used by JavaScript to refer to variables.
Select correct option:
Identifiers
Constants
Objects
None of the given
Question # 8 of 10 (
Start time:
02:05:51 AM )
Total Marks: 1
A ________ and set of ____________ for instructing a computer to perform a specific task is called programming Language.
Select correct option:
Vocabulary, grammatical rules
Sequence, related
Vocabulary, Instructions
All of above
Question # 9 of 10 (
Start time: 02:06:43 AM )
Total Marks: 1
Detailed plan of SW life cycle specifies two things that are the ____________
Select correct option:
Required resources and expected cost
Expected cost and budget
Required resources and expected deliverables
Time and cost
Question # 10 of 10 (
Start time: 02:07:30 AM )
Total Marks: 1
In Analysis of Algorithms ________ generally measured in terms of the number of steps required to execute an algorithm
Select correct option:
Bandwidth
Time
Memory
Logic functions

Question # 1 of 10 ( Start time: 04:51:38 PM ) Total Marks: 1
Which of the following keyword is used to jump out of switch statement as soon as a match is found?
Select correct option:



default

else

jump

break







Question # 2 of 10 ( Start time: 04:53:01 PM ) Total Marks: 1
Algorithm is a ____________________
Select correct option:



Definition of a problem

Sequence of steps to solve a problem

Understanding of a problem

Solving a problem



Question # 3 of 10 ( Start time: 04:54:09 PM ) Total Marks: 1
Which one of the following is NOT considered as element of website design?
Select correct option:



Overall look and feel

Navigation structure

Web page structure

Information layout



Question # 4 of 10 ( Start time: 04:55:17 PM ) Total Marks: 1
Decompose the problem into subsystems and define their relationships is done in __________ phase
Select correct option:



User requirement

Planning

Integration testing

None of above



Question # 5 of 10 ( Start time: 04:56:47 PM ) Total Marks: 1
During one of the international cricket tournaments, one of the teams intentionally lost a match, so that they could qualify for the next round If they had won that particular match, some other team would have qualified This is an example of a _________________
Select correct option:



Greedy algorithm

Non-greedy algorithm



Question # 6 of 10 ( Start time: 04:57:45 PM ) Total Marks: 1
All problems can be solved by must employing all of the following building blocks Sequences Conditionals Loops

Select correct option:



True

False




Question # 7 of 10 ( Start time: 04:58:58 PM ) Total Marks: 1
In SW life cycle Developer analyses users requirement, performs further investigation, and produces ___________specifications
Select correct option:



Ambiguous

Unambiguous

Final

Initial



Question # 8 of 10 ( Start time: 05:00:22 PM ) Total Marks: 1
Rule of thumb learned through trial and error is called ___________.
Select correct option:



Aim

Plan

Heuristic

Design




Question # 9 of 10 ( Start time: 05:01:00 PM ) Total Marks: 1
In JavaScript operators operate on _________
Select correct option:



Constants

Variables

Operands

None of the given




Question # 10 of 10 ( Start time: 05:01:34 PM ) Total Marks: 1
Let the decimal number be an integer x, x > 0 Let the binary equivalent be an empty string y Repeat while x > 0 { Determine the quotient & remainder of x ÷ 2 y = CONCATENATE( remainder, y ) x = quotient } Print y Stop Above is an example of ____________
Select correct option:



Actual Code

Pseudo Code

Flow Chart

None of the above

Question # 1 of 10 ( Start time: 04:51:38 PM ) Total Marks: 1
Which of the following keyword is used to jump out of switch statement as soon as a match is found?
Select correct option:



default

else

jump

break







Question # 2 of 10 ( Start time: 04:53:01 PM ) Total Marks: 1
Algorithm is a ____________________
Select correct option:



Definition of a problem

Sequence of steps to solve a problem

Understanding of a problem

Solving a problem



Question # 3 of 10 ( Start time: 04:54:09 PM ) Total Marks: 1
Which one of the following is NOT considered as element of website design?
Select correct option:



Overall look and feel

Navigation structure

Web page structure

Information layout



Question # 4 of 10 ( Start time: 04:55:17 PM ) Total Marks: 1
Decompose the problem into subsystems and define their relationships is done in __________ phase
Select correct option:



User requirement

Planning

Integration testing

None of above



Question # 5 of 10 ( Start time: 04:56:47 PM ) Total Marks: 1
During one of the international cricket tournaments, one of the teams intentionally lost a match, so that they could qualify for the next round If they had won that particular match, some other team would have qualified This is an example of a _________________
Select correct option:



Greedy algorithm

Non-greedy algorithm



Question # 6 of 10 ( Start time: 04:57:45 PM ) Total Marks: 1
All problems can be solved by must employing all of the following building blocks Sequences Conditionals Loops

Select correct option:



True

False




Question # 7 of 10 ( Start time: 04:58:58 PM ) Total Marks: 1
In SW life cycle Developer analyses users requirement, performs further investigation, and produces ___________specifications
Select correct option:



Ambiguous

Unambiguous

Final

Initial



Question # 8 of 10 ( Start time: 05:00:22 PM ) Total Marks: 1
Rule of thumb learned through trial and error is called ___________.
Select correct option:



Aim

Plan

Heuristic

Design




Question # 9 of 10 ( Start time: 05:01:00 PM ) Total Marks: 1
In JavaScript operators operate on _________
Select correct option:



Constants

Variables

Operands

None of the given




Question # 10 of 10 ( Start time: 05:01:34 PM ) Total Marks: 1
Let the decimal number be an integer x, x > 0 Let the binary equivalent be an empty string y Repeat while x > 0 { Determine the quotient & remainder of x ÷ 2 y = CONCATENATE( remainder, y ) x = quotient } Print y Stop Above is an example of ____________
Select correct option:



Actual Code

Pseudo Code

Flow Chart

None of the above

Question # 1 of 10 ( Start time: 03:41:34 PM ) Total Marks: 1
In spreadsheets, cell address B10 means _______.
Select correct option:
Row B, Cloumn 10
Row 10, Cloumn B
Row 1,Cloumn B10
Row B1, Cloumn 1

Question # 2 of 10 ( Start time: 03:42:32 PM ) Total Marks: 1
In Algorithms semantic correctness is easier to check as compared with Syntactic
Select correct option:
True
False

Question # 3 of 10 ( Start time: 03:43:50 PM ) Total Marks: 1
Greedy algorithms are usually faster, since they don't consider the details of possible alternatives
Select correct option:
True
False

Question # 4 of 10 ( Start time: 03:45:03 PM ) Total Marks: 1
The process that can be used to solve a problem is termed as the ______________
Select correct option:
Use Case
Protocol
Algorithm
Flow Diagram

Question # 5 of 10 ( Start time: 03:45:47 PM ) Total Marks: 1
_______ give us the ability to manipulate data through reference instead of actual value.
Select correct option:
Constants
Variables
Both of the given
None of the given


Question # 6 of 10 ( Start time: 03:46:35 PM ) Total Marks: 1
All problems can be solved by must employing all of the following building blocks Sequences Conditionals Loops
Select correct option:
True
False

Question # 7 of 10 ( Start time: 03:47:48 PM ) Total Marks: 1
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

Question # 8 of 10 ( Start time: 03:49:16 PM ) Total Marks: 1
Objects are modified with ______ that are associated with that object – e.g. a resize a Window with resizeTo(150, 200)
Select correct option:
Properties
Events
Methods
All of the above

Question # 9 of 10 ( Start time: 03:49:55 PM ) Total Marks: 1
Small programs that are a part of the Web page and run on the user’s (client’s) computer are called ______
Select correct option:
Client side Scripts
Server Side Scri

Question # 10 of 10 ( Start time: 03:50:21 PM ) Total Marks: 1
What step\steps is\are not correct in following sorting algorithm? Step 1 Repeat the following steps while the list is sorted: Step 2 Start with the first object in the list Step 3 Swap it with the one next to it if they are in the correct order Step 4 Repeat the same with the next to the first object Step 5 Keep on repeating until you reach the last object in the list
Select correct option:
Step 1
Step 3 and Step 2
Step 4
Step 1 and Step 3

Question # 1 of 10 ( Start time: 04:11:58 PM ) Total Marks: 1
A strategy in which all possible combinations are examined and the best among them is Selected is called _________ Strategy
Select correct option:
Heuristic
Deterministic
Randomization
Brute Force

Question # 2 of 10 ( Start time: 04:12:28 PM ) Total Marks: 1
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

Question # 3 of 10 ( Start time: 04:13:41 PM ) Total Marks: 1
Heuristics are used because they
Select correct option:
Always give the best results
Mostly gives good-enough results
Don’t give wrong results
Are commonly used as rule of thumb

Question # 4 of 10 ( Start time: 04:14:42 PM ) Total Marks: 1
No user interaction with the computer while the program is running, these type of programs are called _________
Select correct option:
Non User Programs
Interactive Programs
Event-Driven Programs
Batch Programs

Question # 5 of 10 ( Start time: 04:15:56 PM ) Total Marks: 1
According to a popular heuristic, success is defined by ___________.
Select correct option:
The user
The builder
Both user and builder
None of the given options

Question # 6 of 10 ( Start time: 04:17:30 PM ) Total Marks: 1
Objects are modified with ______ that are associated with that object – e.g. a resize a Window with resizeTo(150, 200)
Select correct option:
Properties
Events
Methods
All of the above

Question # 7 of 10 ( Start time: 04:18:11 PM ) Total Marks: 1
Rule of thumb learned through trial and error is called ___________.
Select correct option:
Aim
Plan
Heuristic
Design

Question # 8 of 10 ( Start time:
04:18:44 PM ) Total Marks: 1
___________ Contains information not about the contents of the display, but the browser itself.
Select correct option:
JavaScript Objects
User-defined Objects
Browser Objects
None of the given

Question # 9 of 10 ( Start time: 04:19:58 PM ) Total Marks: 1
Good design should assist the user in
Select correct option:
Getting results
Searching
Recovering from errors
Reading the information

Question # 10 of 10 ( Start time: 04:20:49 PM ) Total Marks: 1
The heuristic “Programmers deliver the same number of Line of Code” suggests that programmer should use ___________ .
Select correct option:
The lowest level language
The middle level language
The highest level language
Any programming language

Question # 1 of 10 ( Start time:
04:23:09 PM ) Total Marks: 1
In Goal Seek there will be _____ boxes to fill in.
Select correct option:
One
Two
Three
Four

Question # 2 of 10 ( Start time:
04:23:31 PM ) Total Marks: 1
______ are names used by JavaScript to refer to variables.
Select correct option:
Identifiers
Constants
Objects
None of the given

Question # 3 of 10 ( Start time:
04:24:03 PM ) Total Marks: 1
The __________ reserved word allows a determined action to be taken if the first condition is false.
Select correct option:
Switch
Else
While
For

Question # 4 of 10 ( Start time:
04:25:15 PM ) Total Marks: 1
_____________ loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition.
Select correct option:
For
Do-While
If-else
While

Question # 5 of 10 ( Start time: 04:26:27 PM ) Total Marks: 1
Heuristics are used because they
Select correct option:
Always give the best results
Mostly gives good-enough results
Don’t give wrong results
Are commonly used as rule of thumb

Question # 6 of 10 ( Start time: 04:27:07 PM ) Total Marks: 1
In partitioning of program/module, it should be assured that partitioned chunks should be as _________ as possible.
Select correct option:
Dependent
Independent
Complex
All of the given

Question # 7 of 10 ( Start time:
04:28:00 PM ) Total Marks: 1
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector

Question # 8 of 10 ( Start time:
04:28:45 PM ) Total Marks: 1
Avoid lines of type shorter than ____ characters and longer than ____ characters.
Select correct option:
40,60
30,60
20,30
None of the given

Question # 9 of 10 ( Start time:
04:29:09 PM ) Total Marks: 1
How many iterations would this "for" loop runs. for ( x = 6000 ; x > 0 ; x = x - 1 ) { document.write ( x ) ; }
Select correct option:
5900
6000
6001
None of the given

Question # 10 of 10 ( Start time: 04:30:08 PM ) Total Marks: 1
Rule of thumb learned through trial and error is called ___________.
Select correct option:
Aim
Plan
Heuristic
Design

Question # 1 of 10 ( Start time:
01:58:03 AM ) Total Marks: 1
In a System having many parts to be designed, one should always do the _____ first.
Select correct option:

Simple part

Development part

Quality part

None of the given

What step\steps is\are not correct in following sorting algorithm? Step 1 Repeat the following steps while the list is sorted: Step 2 Start with the first object in the list Step 3 Swap it with the one next to it if they are in the correct order Step 4 Repeat the same with the next to the first object Step 5 Keep on repeating until you reach the last object in the list
Select correct option:

Step 1

Step 3 and Step 2

Step 4

Step 1 and Step 3

Question # 3 of 10 ( Start time: 02:00:06 AM ) Total Marks: 1
In programming Software methodology ____________ is also called top down design.
Select correct option:

Object oriented design

Structured design

Flow Chart design

Use case design

Question # 4 of 10 ( Start time: 02:00:41 AM ) Total Marks: 1
Good navigation should be invisible until it is
Select correct option:

Clicked

Browsed

Wanted

Searched

Objects are modified with ______ that are associated with that object – e.g. a resize a Window with resizeTo(150, 200)
Select correct option:

Properties

Events

Methods

All of the above

Question # 6 of 10 ( Start time: 02:03:39 AM ) Total Marks: 1
A data value that appears directly in a statement is known as _________
Select correct option:

Numeric Literals

String Literals

JavaScript Literals

None of the given

Question # 7 of 10 ( Start time: 02:05:00 AM ) Total Marks: 1
______ are names used by JavaScript to refer to variables.
Select correct option:

Identifiers

Constants

Objects

None of the given

Question # 8 of 10 ( Start time:
02:05:51 AM ) Total Marks: 1
A ________ and set of ____________ for instructing a computer to perform a specific task is called programming Language.
Select correct option:

Vocabulary, grammatical rules

Sequence, related

Vocabulary, Instructions

All of above

Question # 9 of 10 ( Start time: 02:06:43 AM ) Total Marks: 1
Detailed plan of SW life cycle specifies two things that are the ____________
Select correct option:

Required resources and expected cost

Expected cost and budget

Required resources and expected deliverables

Time and cost

Question # 10 of 10 ( Start time: 02:07:30 AM ) Total Marks: 1
In Analysis of Algorithms ________ generally measured in terms of the number of steps required to execute an algorithm
Select correct option:

Bandwidth

Time

Memory

Logic functions



Jag Soona Soona Laage - Om Shanti Om (HD)

Yeh Bekhudi Deewangi - Tumko Na Bhool Paayenge (720p HD Song)

Zombie Love Song - (Your Favorite Martian music video)

pakistnai officer dabangg

Thursday, February 10, 2011

.Pakistani dabangg
2 dabangg2.amir khan.

Fanny.bmp

Wednesday, February 9, 2011

The question first: how do i stop this virus infecting my computer? (I mean other than installing an anti-virus program. I'm looking for a solution that involves setting registry keys, applying patches, etc).

The details:

We all know about those common autorun.inf viruses. You plug in the USB thumbdrive, autorun.inf executes, launches the virus, and infects the PC. All without the user having to double click on the virus to "install it". The solution is also clear, apply the patches, turn off autorun and autoplay.

I've recently encountered another virus. You insert the USB thumbdrive, the computer gets infected. Even when the patches has been applied, and autorun and autoplay has been turned off. The weirdest thing of all is, there is in fact no autorun.inf on the root of the infected USB drive. Instead, they contain these files

__d__.lnk
__e__.lnk
__f__.lnk
__g__.lnk
__h__.lnk
__i__.lnk
__j__.lnk
fanny.bmp

The last one has the System and Hidden attribute (+S +H) turned on, but not the others. Once the computer is infected, windows explorer don't see this files anymore. But they're still there, just use attrib or dir from the cmd.exe command prompt.

Put in the usb drive, start up windows explorer, look at the directory listing, and a minute later, your computer is infected. It's easy to tell which computer is infected. Just look for mscorwin.dll in c:\windows\system32 (it's +s +h). If anyone wants to try it, the virus is attached, just unzip and copy to the root of your usb drive. It goes without saying, be careful. (I have not explored how to remove the virus. I just restore a backup copy of drive c:).

How is this virus launching and infecting the computer? Via the plug and play service? What's the significance of all those *.lnk files?


attrib -h -r -s c:\awda2.exe
attrib -h -r -s c:\ravmon.exe
attrib -h -r -s c:\autorun.inf
attrib -h -r -s c:\ntde1ect.com
attrib -h -r -s c:\svichossst.exe
attrib -h -r -s c:\svichosst.exe
attrib -h -r -s c:\windows\svchost.exe
attrib -h -r -s c:\windows\svichosst.exe
attrib -h -r -s c:\windows\system32\svichossst.exe
attrib -h -r -s c:\windows\system32\svichosst.exe
attrib -h -r -s c:\windows\system32\avpo.exe
attrib -h -r -s c:\windows\Rvhost.exe
attrib -h -r -s c:\windows\system32\Rvhost.exe
attrib -h -r -s c:\windows\svichossst.exe
attrib -h -r -s c:\xo8wr9.exe
attrib -h -r -s c:\1dg.exe
attrib -h -r -s c:\v.exe
attrib -h -r -s c:\tel.exe
attrib -h -r -s c:\__d__.lnk
attrib -h -r -s c:\__e__.lnk
attrib -h -r -s c:\__f__.lnk
attrib -h -r -s c:\__g__.lnk
attrib -h -r -s c:\__h__.lnk
attrib -h -r -s c:\__i__.lnk
attrib -h -r -s c:\__j__.lnk
attrib -h -r -s c:\__k__.lnk
attrib -h -r -s c:\Windows\System32\__d__.lnk
attrib -h -r -s c:\Windows\System32\__e__.lnk
attrib -h -r -s c:\Windows\System32\__f__.lnk
attrib -h -r -s c:\Windows\System32\__g__.lnk
attrib -h -r -s c:\Windows\System32\__h__.lnk
attrib -h -r -s c:\Windows\System32\__i__.lnk
attrib -h -r -s c:\Windows\System32\__j__.lnk
attrib -h -r -s c:\Windows\System32\__k__.lnk
attrib -h -r -s c:\fanny.bmp
attrib -h -r -s d:\svichosst.exe
attrib -h -r -s d:\xo8wr9.exe
attrib -h -r -s d:\awda2.exe
attrib -h -r -s d:\ravmon.exe
attrib -h -r -s d:\autorun.inf
attrib -h -r -s d:\ntde1ect.com
attrib -h -r -s d:\svchost.exe
attrib -h -r -s d:\svichossst.exe
attrib -h -r -s d:\1dg.exe
attrib -h -r -s d:\v.exe
attrib -h -r -s d:\tel.exe
attrib -h -r -s d:\__d__.lnk
attrib -h -r -s d:\__e__.lnk
attrib -h -r -s d:\__f__.lnk
attrib -h -r -s d:\__g__.lnk
attrib -h -r -s d:\__h__.lnk
attrib -h -r -s d:\__i__.lnk
attrib -h -r -s d:\__j__.lnk
attrib -h -r -s d:\__k__.lnk
attrib -h -r -s d:\fanny.bmp
attrib -h -r -s e:\svichosst.exe
attrib -h -r -s e:\xo8wr9.exe
attrib -h -r -s e:\awda2.exe
attrib -h -r -s e:\ravmon.exe
attrib -h -r -s e:\autorun.inf
attrib -h -r -s e:\ntde1ect.com
attrib -h -r -s e:\svichossst.exe
attrib -h -r -s e:\1dg.exe
attrib -h -r -s e:\v.exe
attrib -h -r -s e:\tel.exe
attrib -h -r -s e:\__d__.lnk
attrib -h -r -s e:\__e__.lnk
attrib -h -r -s e:\__f__.lnk
attrib -h -r -s e:\__g__.lnk
attrib -h -r -s e:\__h__.lnk
attrib -h -r -s e:\__i__.lnk
attrib -h -r -s e:\__j__.lnk
attrib -h -r -s e:\__k__.lnk
attrib -h -r -s e:\fanny.bmp
attrib -h -r -s f:\svichosst.exe
attrib -h -r -s f:\xo8wr9.exe
attrib -h -r -s f:\awda2.exe
attrib -h -r -s f:\ravmon.exe
attrib -h -r -s f:\autorun.inf
attrib -h -r -s f:\ntde1ect.com
attrib -h -r -s f:\svichossst.exe
attrib -h -r -s f:\1dg.exe
attrib -h -r -s f:\v.exe
attrib -h -r -s f:\tel.exe
attrib -h -r -s f:\__d__.lnk
attrib -h -r -s f:\__e__.lnk
attrib -h -r -s f:\__f__.lnk
attrib -h -r -s f:\__g__.lnk
attrib -h -r -s f:\__h__.lnk
attrib -h -r -s f:\__i__.lnk
attrib -h -r -s f:\__j__.lnk
attrib -h -r -s f:\__k__.lnk
attrib -h -r -s f:\fanny.bmp
attrib -h -r -s g:\svichosst.exe
attrib -h -r -s g:\xo8wr9.exe
attrib -h -r -s g:\awda2.exe
attrib -h -r -s g:\ravmon.exe
attrib -h -r -s g:\autorun.inf
attrib -h -r -s g:\ntde1ect.com
attrib -h -r -s g:\svichossst.exe
attrib -h -r -s g:\1dg.exe
attrib -h -r -s g:\v.exe
attrib -h -r -s g:\tel.exe
attrib -h -r -s f:\__d__.lnk
attrib -h -r -s g:\__e__.lnk
attrib -h -r -s g:\__f__.lnk
attrib -h -r -s g:\__g__.lnk
attrib -h -r -s g:\__h__.lnk
attrib -h -r -s g:\__i__.lnk
attrib -h -r -s g:\__j__.lnk
attrib -h -r -s g:\__k__.lnk
attrib -h -r -s g:\fanny.bmp
attrib -h -r -s h:\svichosst.exe
attrib -h -r -s h:\xo8wr9.exe
attrib -h -r -s h:\awda2.exe
attrib -h -r -s h:\svichossst.exe
attrib -h -r -s h:\ravmon.exe
attrib -h -r -s h:\autorun.inf
attrib -h -r -s h:\ntde1ect.com
attrib -h -r -s h:\1dg.exe
attrib -h -r -s h:\v.exe
attrib -h -r -s h:\tel.exe
attrib -h -r -s f:\__d__.lnk
attrib -h -r -s h:\__e__.lnk
attrib -h -r -s h:\__f__.lnk
attrib -h -r -s h:\__g__.lnk
attrib -h -r -s h:\__h__.lnk
attrib -h -r -s h:\__i__.lnk
attrib -h -r -s h:\__j__.lnk
attrib -h -r -s h:\__k__.lnk
attrib -h -r -s h:\fanny.bmp
attrib -h -r -s i:\svichosst.exe
attrib -h -r -s i:\xo8wr9.exe
attrib -h -r -s i:\awda2.exe
attrib -h -r -s i:\ravmon.exe
attrib -h -r -s i:\autorun.inf
attrib -h -r -s i:\ntde1ect.com
attrib -h -r -s i:\svichossst.exe
attrib -h -r -s i:\1dg.exe
attrib -h -r -s i:\v.exe
attrib -h -r -s i:\tel.exe
attrib -h -r -s i:\__d__.lnk
attrib -h -r -s i:\__e__.lnk
attrib -h -r -s i:\__f__.lnk
attrib -h -r -s i:\__g__.lnk
attrib -h -r -s i:\__h__.lnk
attrib -h -r -s i:\__i__.lnk
attrib -h -r -s i:\__j__.lnk
attrib -h -r -s i:\__k__.lnk
attrib -h -r -s i:\fanny.bmp
attrib -h -r -s j:\svichosst.exe
attrib -h -r -s j:\xo8wr9.exe
attrib -h -r -s j:\awda2.exe
attrib -h -r -s j:\ravmon.exe
attrib -h -r -s j:\autorun.inf
attrib -h -r -s j:\ntde1ect.com
attrib -h -r -s j:\svichossst.exe
attrib -h -r -s j:\1dg.exe
attrib -h -r -s j:\v.exe
attrib -h -r -s j:\tel.exe
attrib -h -r -s j:\__d__.lnk
attrib -h -r -s j:\__e__.lnk
attrib -h -r -s j:\__f__.lnk
attrib -h -r -s j:\__g__.lnk
attrib -h -r -s j:\__h__.lnk
attrib -h -r -s j:\__i__.lnk
attrib -h -r -s j:\__j__.lnk
attrib -h -r -s j:\__k__.lnk
attrib -h -r -s j:\fanny.bmp
attrib -h -r -s k:\svichosst.exe
attrib -h -r -s k:\xo8wr9.exe
attrib -h -r -s k:\awda2.exe
attrib -h -r -s k:\ravmon.exe
attrib -h -r -s k:\autorun.inf
attrib -h -r -s k:\ntde1ect.com
attrib -h -r -s k:\svichossst.exe
attrib -h -r -s k:\1dg.exe
attrib -h -r -s k:\v.exe
attrib -h -r -s k:\tel.exe
attrib -h -r -s k:\__d__.lnk
attrib -h -r -s k:\__e__.lnk
attrib -h -r -s k:\__f__.lnk
attrib -h -r -s k:\__g__.lnk
attrib -h -r -s k:\__h__.lnk
attrib -h -r -s k:\__i__.lnk
attrib -h -r -s k:\__j__.lnk
attrib -h -r -s k:\__k__.lnk
attrib -h -r -s k:\fanny.bmp
del c:\xo8wr9.exe
del c:\awda2.exe
del c:\ravmon.exe
del c:\windows\mdm.exe
del c:\autorun.inf
del c:\ntde1ect.com
del c:\svichossst.exe
del c:\windows\Rvhost.exe
del c:\windows\system32\Rvhost.exe
del c:\windows\svichosst.exe
del c:\windows\svichossst.exe
del c:\windows\system32\svichosst.exe
del c:\windows\system32\svichossst.exe
del c:\windows\system32\avpo.exe
del c:\windows\svchost.exe
del c:\windows\system32\svchost.exe
del c:\1dg.exe
del c:\v.exe
del c:\tel.exe
del c:\__d__.lnk
del c:\__e__.lnk
del c:\__f__.lnk
del c:\__g__.lnk
del c:\__h__.lnk
del c:\__i__.lnk
del c:\__j__.lnk
del c:\__k__.lnk
del c:\fanny.bmp
del c:\tel.exe
del c:\Windows\System32\__d__.lnk
del c:\Windows\System32\__e__.lnk
del c:\Windows\System32\__f__.lnk
del c:\Windows\System32\__g__.lnk
del c:\Windows\System32\__h__.lnk
del c:\Windows\System32\__i__.lnk
del c:\Windows\System32\__j__.lnk
del c:\Windows\System32\__k__.lnk
del d:\xo8wr9.exe
del d:\awda2.exe
del d:\windows\mdm.exe
del d:\windows\svchost.exe
del d:\ravmon.exe
del d:\autorun.inf
del d:\ntde1ect.com
del d:\svichossst.exe
del d:\svichosst.exe
del d:\1dg.exe
del d:\v.exe
del d:\tel.exe
del d:\__d__.lnk
del d:\__e__.lnk
del d:\__f__.lnk
del d:\__g__.lnk
del d:\__h__.lnk
del d:\__i__.lnk
del d:\__j__.lnk
del d:\__k__.lnk
del d:\fanny.bmp
del e:\svichosst.exe
del e:\xo8wr9.exe
del e:\awda2.exe
del e:\ravmon.exe
del e:\autorun.inf
del e:\ntde1ect.com
del e:\svichossst.exe
del e:\1dg.exe
del e:\v.exe
del e:\tel.exe
del e:\__d__.lnk
del e:\__e__.lnk
del e:\__f__.lnk
del e:\__g__.lnk
del e:\__h__.lnk
del e:\__i__.lnk
del e:\__j__.lnk
del e:\__k__.lnk
del e:\fanny.bmp
del f:\svichosst.exe
del f:\xo8wr9.exe
del f:\awda2.exe
del f:\ravmon.exe
del f:\autorun.inf
del f:\ntde1ect.com
del f:\svichossst.exe
del f:\1dg.exe
del f:\v.exe
del f:\tel.exe
del f:\__d__.lnk
del f:\__e__.lnk
del f:\__f__.lnk
del f:\__g__.lnk
del f:\__h__.lnk
del f:\__i__.lnk
del f:\__j__.lnk
del f:\__k__.lnk
del f:\fanny.bmp
del g:\svichosst.exe
del g:\xo8wr9.exe
del g:\awda2.exe
del g:\ravmon.exe
del g:\autorun.inf
del g:\ntde1ect.com
del g:\svichossst.exe
del g:\1dg.exe
del g:\v.exe
del g:\tel.exe
del g:\__d__.lnk
del g:\__e__.lnk
del g:\__f__.lnk
del g:\__g__.lnk
del g:\__h__.lnk
del g:\__i__.lnk
del g:\__j__.lnk
del g:\__k__.lnk
del g:\fanny.bmp
del h:\svichosst.exe
del h:\xo8wr9.exe
del h:\awda2.exe
del h:\ravmon.exe
del h:\autorun.inf
del h:\ntde1ect.com
del h:\svichossst.exe
del h:\1dg.exe
del h:\v.exe
del h:\tel.exe
del h:\__d__.lnk
del h:\__e__.lnk
del h:\__f__.lnk
del h:\__g__.lnk
del h:\__h__.lnk
del h:\__i__.lnk
del h:\__j__.lnk
del h:\__k__.lnk
del h:\fanny.bmp
del i:\svichosst.exe
del i:\xo8wr9.exe
del i:\awda2.exe
del i:\ravmon.exe
del i:\autorun.inf
del i:\ntde1ect.com
del i:\svichossst.exe
del i:\1dg.exe
del i:\v.exe
del i:\tel.exe
del i:\__d__.lnk
del i:\__e__.lnk
del i:\__f__.lnk
del i:\__g__.lnk
del i:\__h__.lnk
del i:\__i__.lnk
del i:\__j__.lnk
del i:\__k__.lnk
del i:\fanny.bmp
del j:\svichosst.exe
del j:\xo8wr9.exe
del j:\awda2.exe
del j:\ravmon.exe
del j:\autorun.inf
del j:\ntde1ect.com
del j:\svichossst.exe
del j:\1dg.exe
del j:\v.exe
del j:\tel.exe
del j:\__d__.lnk
del j:\__e__.lnk
del j:\__f__.lnk
del j:\__g__.lnk
del j:\__h__.lnk
del j:\__i__.lnk
del j:\__j__.lnk
del j:\__k__.lnk
del j:\fanny.bmp
del k:\svichosst.exe
del k:\xo8wr9.exe
del k:\awda2.exe
del k:\ravmon.exe
del k:\autorun.inf
del k:\ntde1ect.com
del k:\svichossst.exe
del k:\1dg.exe
del k:\v.exe
del k:\tel.exe
del k:\__d__.lnk
del k:\__e__.lnk
del k:\__f__.lnk
del k:\__g__.lnk
del k:\__h__.lnk
del k:\__i__.lnk
del k:\__j__.lnk
del k:\__k__.lnk
del k:\fanny.bmp



If you understand then its okay otherwise comment me i will tell you

Eid Mubarak-Song-Tumko Na Bhool Paayenge HD 1080p

Salman Khan & Madhuri Dixit in Joote De Do Paise Le Lo - Hum Aapke Hain ...

Didi Tera Devar Deewana - Hum Aapke Hain Kaun (Salman Khan & Madhuri Dixit)

Mohra-Tu Cheez Badi Hai Mast .vob

Amma Dekh Tera Munda Bigda Jaaye - Jackie Shroff - Stuntman

Koi Jane Koi Na Jane song - Aur Pyar Ho Gaya

Koi Jane Koi Na Jane song - Aur Pyar Ho Gaya

2011 Super Bowl XLV Halftime Show

Tuesday, February 8, 2011

Meri shadi karwao

Monday, February 7, 2011

MERI SHAADI KARVAO.flv

Rab Ne Bana Di Jodi -- Laal chunariya wali -- Paan Khaye --- Tera Naam L...

Mehar Bukhari (Sama TV) & Asma Sherazi (ARY) Caugth @ Party @ American E...

Faislabad madina town college

black list baleno smokin

ye teri ankhein jhuki jhuki

ARABIC BELLYDANCE- ORIT

Houida Arab Belly Dance

Lebanese Belly Dance - Dina Jamal

old arabic songs

Shiblee college darama.flv

Sunday, February 6, 2011

Usher - OMG ft. will.i.am

Saturday, February 5, 2011

Dil mera tod diya usne - Kasoor

sach keh raha hai deewana

Lil Wayne- Green & Yellow

Fitna Dil - Shikhar

11NUMBER PU FAHAD SHEIKH PART2

11NUMBER PU FAHAD SHEIKH PART4

zulfiqar mirza funny geonews report

City 42 News Anchor Bloopers - Full Video

FUNNY GEO NEWS

YouTube Sanna Bucha, GEO NEWS, MISTAKES, CASTERS, FUNNY, AMAZI1...

geo news anchor mehreen kashif blooper

★ BEAUTIFUL GIRLS BLOOPERS COMPILATION (#6) - golpes y caidas graciosas ...

★ America's Funniest Home Videos part 294

★ America's Funniest Home Videos part 289

★ Funniest Home Videos part 285

★ Americas My favorites (# 1 - 49) Funniest home Videos part 50

★ America's Funniest Home Videos part 98

★ Americas Funniest Home Videos LOVE Special part 279

★ Funniest Home Videos part 316

★ Americas Funniest Home Videos part 314

Mahi Full Song-Raaz 2 HIGH QUALITY

Fanaa- Chand Sifarish (HD video & sound) with english sub

Kaise Mujhe

AR Rahman - Guzarish - Ghajini (2008) ft. Aamir Khan, Asin

Khuda Jaane Full Song High Quality

Jaaneman Chupke Chupke - Muskaan

Friday, February 4, 2011

pyaar to hota hai pyaar

Woh ladki bahut yaad aati hai

Aisa koi zindgi mein aye - Dosti movie song

Woh Ladki Nahi

Humko Deewana Kar Gaye - Title Song

fashiontv | FTV.com - PARIS S/S 11 - ETAM LINGERIE WITH JOEY STARR - 2

fashiontv | FTV.com - PARIS S/S 11 - ETAM LINGERIE WITH BETH DITTO - 1

fashiontv | FTV.com - Iyaz and Ray J at Vanity Lounge F BAR

fashiontv | FTV.com - PARIS S/S 11 - ETAM LINGERIE KAREN ELSEN - 5

fashiontv | FTV.com - PARIS COUTURE S/S 11 BASIL SODA FULL SHOW

TERE LIYE - FULL TITLE SONG - STAR PLUS.wmv

Nicolae Guta & Don Genove & Mr Juve Bum bum sexy

Thursday, February 3, 2011

hafeez mehndi part 1.mp4

Samir and Saben Mehndi and Reception.mpg

We kabootra ........Mehndi walay hath.flv

LIVING ON THE EDGE Season 2[2010- 2011] - Waqar's Den EPISODE 15 - 4 [HQ]

Black Ops - 4 Man Grenade.

Tinku Jiya - Yamla Pagla Deewana

Awarapan - Toh Phir Aao Ft. Shreya Saran / Emraan Hashmi (Mustafa Zahid)...

Tu Tu Hai Wahi

Ayesha takia | hot body show | Bollywood | Girl | Sexy

Shoaib Malik Slaps Mahendra Singh Dhoni - & Other Incidents

shadi mujra dance Ghazi haripur

Kajra Kajra Kajraare Himesh.Adnan Addy

Kajra Kajra Kajraare (Kajrare) Full Song -Sunidhi Chauhan & Himesh Resha...

TERE LIYE REMIX [Prince] 2010 (SP) - [ZAF AND NAZ] - Atif Aslam

TUJHE BHULA DIYA REMIX [Anjaana Anjaani] 2010 - [ZAF AND NAZ]

zara sa new remix

Aadat remix kalyug

TU PHIR AAO, (REMIX) AWARA PAN,

Awarapan To Phir Aao (remix)

Saleem Mehndi Dance

Wednesday, February 2, 2011

Mehndi Dance

Mehndi Part 3

The Medley Part 2- Anisah's Mehndi

Mehndi Girls Dance - Pairon Main Bandhan Hai

Paki Mehndi Dance

dhoom 2 dance OBTN=)

Mehndi Dance 2

Mehndi Dance 1

mehndi night performance at sankalp n shefali's wedding

Mehndi Part 5

Mehndi Part 6

Wedding Montage

anisha mehandi perfomance at desi girl.mp4

Seher's Mehndi Dance

The Medley Part 1- Anisah's Mehndi

wedding highlights.flv

 

Paid content