Skip to content

Category Archives: Computer Subject

Cyber Security is the branch of technology that deals with the security of using the internet. Technology is an essential part of today’s generation, it… Read More
A Firewall is hardware or software to prevent a private computer or a network of computers from, it acts as a filter to avoid unauthorized… Read More
X.509 is a digital certificate that is built on top of a widely trusted standard known as ITU or International Telecommunication Union X.509 standard, in… Read More
In general terms, “Mining” is the process of extraction. In the context of computer science, Data Mining can be referred to as knowledge mining from… Read More
Electronic signature or e-sign is the modern technology method of signing the documents or say any data/content by putting the signature through the digital device.… Read More
All IP datagrams must have the standard 20-byte header, which contains key information such as the source and destination address of the datagram, fragmentation control… Read More
IPsec might be a gaggle of protocols that square measure used along to line up encrypted connections between devices. It helps keep knowledge sent over… Read More
Spoofing is a completely new beast created by merging age-old deception strategies with modern technology. Spoofing is a sort of fraud in which someone or… Read More
Hot-swapping allows the removal or insertion of components to the computer without shutting down or rebooting the system. It is also called “hot insertion”. In… Read More
Complex analysis is a branch of mathematics that deals with complex numbers, their functions, and their calculus. In simple terms, complex analysis is an extension… Read More
The first depth search of the graph visits all the nodes in the graph once, starting with the entry point and visiting the nodes as… Read More
TCP is one of the important protocols of the network protocol suite. TCP is a connection-oriented and reliable data transmission protocol. TCP uses MTU (Maximum… Read More
Frame Relay sends information in packages called frames via a shared Frame Relay network. Each frame contains all the information needed to move it to… Read More
A dependency graph is used to represent the flow of information among the attributes in a parse tree. In a parse tree, a dependency graph… Read More
AIMD is a feedback control algorithm, it is used by TCP protocols in the transport layer of the TCP/IP stack. The AI phase is responsible… Read More

Start Your Coding Journey Now!