Skip to content

Category Archives: Computer Subject

Class Diagram is one among the UML diagram consists of many classes and describes the attributes and relationships among various objects.   Classes: The classes… Read More
Business vertical testing :The business vertical testing is a process in which a product is being used and tested for different business verticals such as… Read More
Regression Testing :Regression testing is done to ensure that enhancements or defect fixes made to the software work properly and do not affect the existing… Read More
Prerequisite: Defect Life Cycle Defect:A defect in a software product is also known as a bug, error or fault which makes the software produce an… Read More
1. Black Box Testing :Black box testing is a type of software testing in which the functionality of the software is not known. The testing… Read More
1. Error Seeding :Error seeding can be defined as a process of adding errors to the program code that can be used for evaluating the… Read More
To represent different perspective of software system different UML diagrams primarily based totally at the UML (Unified Modeling Language) are used. Each perspective focuses on… Read More
SSH stands for “Secure Shell” or “Secure Socket Shell“. It is a cryptographic network protocol that allows two computers to communicate and share the data… Read More
Image classification is one of the supervised machine learning problems which aims to categorize the images of a dataset into their respective categories or labels.… Read More
In this article, we will cover the overview of CUDA programming and mainly focus on the concept of CUDA requirement and we will also discuss… Read More
Data mining refers to extracting or mining knowledge from large amounts of data. In other words, Data mining is the science, art, and technology of discovering… Read More
A theatre is a place where everyone enjoys the movie in public. In this article, let’s see about the typical Indian theatre’s management system along… Read More
NAT(Network Address Translation) is a process that is used for converting a single IP address space into a global one. This works with a router… Read More
Directory Traversal is a vulnerability that allows attackers to access files that are present outside the root directory or outside the home directory of that… Read More
Network Firewalls are the devices that are used to prevent private networks from unauthorized access.  A Firewall is a security solution for the computers or… Read More

Start Your Coding Journey Now!