Skip to content

Category Archives: Computer Subject

IP addresses are divided into 5 classes namely, Class A, Class B, Class C, Class D, and Class E. This concept came in around the… Read More
Communication systems use analog signals for communication purposes and these signals tend to deteriorate while traveling through transmission medium because of attenuation, distortion, and noise.… Read More
AFTP (Anonymous File Transfer Protocol) is a network protocol used for transmitting files using TCP-based networks. Anonymous file transfer protocol lets a user move files… Read More
In Default VLAN all switch ports turn into a member of the default VLAN just after the initial bootup of the switch. All these ports… Read More
A network protocol is an accepted set of rules that govern data communication between different devices in the network. It determines what is being communicated,… Read More
A loopback address is a distinct reserved IP address range that starts from 127.0.0.0 ends at 127.255.255.255 though 127.255.255.255 is the broadcast address for 127.0.0.0/8.… Read More
OSI (Open Systems Interconnection) model is a reference model that describes the movement of information between software applications in different computer systems. It is a… Read More
A security vulnerability in which an infected USB charging station is used to compromise linked devices is known as juice jacking. The flaw takes advantage… Read More
Frame Check Sequence (FCS) refers to extra bits added to the frame for error detection. It is used for HDLC error detection. It is 2… Read More
Skewness is an important statistical technique that helps to determine asymmetrical behavior than of the frequency distribution, or more precisely, the lack of symmetry of… Read More
CDP is a Layer 2 protocol used by Cisco devices; it is used for discovering other directly connected Cisco devices in a network, This allows… Read More
Switching is a technique that is used to transmit data between the networks. It is achieved by using switches that are used to connect multiple… Read More
Database Administrators create databases as per the needs of the company and make sure they function effectively and efficiently. This is a grooming career path… Read More
Data mining is the process of collecting and processing data from a heap of unprocessed data. When the patterns are established, various relationships between the… Read More
The surrogate key is a unique identifier of a row/record in a relational table. It is added to each dimension table which does not include… Read More

Start Your Coding Journey Now!