Skip to content

Category Archives: Computer Subject

Prerequisite: Cybersecurity The Roles and job titles in the security sector often leads to overlapping of several responsibilities and are customized according to the size… Read More
What is NULL ?In Structured Query Language Null Or NULL is a special type of marker which is used to tell us about that a… Read More
This article is all about Data Encapsulation and Decapsulation in Networking. Both encapsulation and decapsulation processes are simultaneously running over a network in order to… Read More
SFTP (Secure File Transfer Protocol) is the advanced version of FTP(file transfer protocol) which ensures security while transferring files between the organizations/computer. It is also… Read More
Let us try to deeply understand, why IP address is known as “Logical” while, MAC Address is known as “Physical” address.  What is a MAC?… Read More
In this article we are going to design a file transfer protocol server configuration in cisco packet tracer and checking the connectivity for uploading and… Read More
A coaxial cable is an electrical cable with a copper conductor and an insulator shielding around it and a braided metal mesh that prevents signal… Read More
There are a variety of attacks that may be launched against mobile networks, and they are two types i.e.  Out of the mobile network:  public… Read More
1. VLAN :VLAN stands for Virtual Local Area networks and they are defined by 802.1q protocol (it’s a VLAN tagging protocol that allows the ethernet… Read More
1. DAC :DAC is identity-based access control. DAC mechanisms will be controlled by user identification such as username and password. DAC is discretionary because the… Read More
Software products/services are tested multiple times before delivery to ensure that it is providing the required service. Testing before delivery doesn’t guarantee that no problem… Read More
Phishing is a kind of cyberattack that is used to steal users’ information including login details and credit card numbers. Most of the data breaches… Read More
1. Information Technology Infrastructure Library (ITIL) : ITIL stands for Information Technology Infrastructure Library. It is a structure which are designed for systematizing the processing,… Read More
1. Session :A session is used to save information on the server momentarily so that it may be utilized across various pages of the website.… Read More
1. CAT5e :Cat5 or Category 5 cable is a twisted pair cable used in computer networks. The most commonly used variant of Cat5 cable is… Read More

Start Your Coding Journey Now!