Skip to content

Category Archives: Computer Subject

RSTP is the more improved and advanced version of STP which is a layer 2 protocol that prevents bridge loops and broadcast storms in local… Read More
Cyclic Redundancy Check(CRC): Cyclic redundancy check is generally called an error detection mechanism because the special numbers are appended with a block of data so… Read More
The Checksum is an error detection method that detected errors in data/message while it is transmitted from sender to receiver. This method is used by… Read More
FTP is a group of standard protocols that allow interconnected or networked computers to transfer files and communicate over the internet. FTP server is basically… Read More
LAN (Local Area Network) is a data communication network that locally connects network devices such as workstations, servers, routers, etc. to share the resources within… Read More
An ethernet cable allows the user to connect their devices such as computers, mobile phones, routers, etc.; to a network that will allow a user… Read More
IP addresses are divided into 5 classes namely, Class A, Class B, Class C, Class D, and Class E. This concept came in around the… Read More
Communication systems use analog signals for communication purposes and these signals tend to deteriorate while traveling through transmission medium because of attenuation, distortion, and noise.… Read More
AFTP (Anonymous File Transfer Protocol) is a network protocol used for transmitting files using TCP-based networks. Anonymous file transfer protocol lets a user move files… Read More
In Default VLAN all switch ports turn into a member of the default VLAN just after the initial bootup of the switch. All these ports… Read More
A loopback address is a distinct reserved IP address range that starts from ends at though is the broadcast address for… Read More
A network protocol is an accepted set of rules that govern data communication between different devices in the network. It determines what is being communicated,… Read More
OSI (Open Systems Interconnection) model is a reference model that describes the movement of information between software applications in different computer systems. It is a… Read More
A security vulnerability in which an infected USB charging station is used to compromise linked devices is known as juice jacking. The flaw takes advantage… Read More
Frame Check Sequence (FCS) refers to extra bits added to the frame for error detection. It is used for HDLC error detection. It is 2… Read More

Start Your Coding Journey Now!