Skip to content

Category Archives: Computer Subject

Physical Layer is the bottom-most layer in the Open System Interconnection (OSI) Model which is a physical and electrical representation of the system. It consists… Read More
KeyLogger is specifically designed to capture the keystrokes entered by the user. It is one of the most basic software which, may seem harmless, but… Read More
In this article, we are going to know how to write a tool command script to simulate TCP connection between 2 nodes and pass FTP… Read More
In this, we will cover the overview of Protection in OS, it’s need and Goals of protection. And mainly will focus on Protection in OS… Read More
In this, we will discuss the overview of Activity Based Costing, technique, objectives, and a final summary of Activity Based Costing. Let’s discuss each section… Read More
So message passing means how a message can be sent from one end to the other end. Either it may be a client-server model or… Read More
User Datagram Protocol is a Transport Layer protocol. UDP is a part of the Internet Protocol suite, referred to as UDP/IP suite. Unlike TCP, it… Read More
In this article, we will discuss the overview of IP-in-IP Encapsulation and then will discuss the working and its process of encapsulation, and then finally… Read More
Order of Permutation-: For a given permutation P if  Pn= I (identity permutation) , then n is the order of permutation. Let a permutation  and… Read More
Prerequisite – Simplified Data Encryption Standard | Set 1 Simplified Data Encryption Standard is a simple version of Data Encryption Standard having a 10-bit key… Read More
Prerequisite – Virtualization and its Types in Cloud Computing Network Virtualization is a process of logically grouping physical networks and making them operate as single… Read More
The Latex command to put the border (box) around an equation is as \fbox or \boxed Description : \boxed command draws a box around argument.… Read More
In this, we will discuss the overview of PostgreSQL PL/pgSQL and will also cover the CRUD(CREATE, READ, UPDATE, DELETE) operations with the help of the… Read More
A webbing is been set up in the 1970s the Defence Department of the USA called it ARPANET (Advanced Research Project Agency Network). The main… Read More
A Logical Database is a special type of ABAP (Advance Business Application and Programming) that is used to retrieve data from various tables and the… Read More

Start Your Coding Journey Now!