Skip to content

Category Archives: Computer Subject

1. Computational complexity :Computational complexity, a measure of the number of computing resources(time and space) that a particular algorithm consumes when it runs. The time… Read More
Internet Control Message Protocol (ICMP) is a protocol used for error handling and debugging in the network layer. It is mainly used in network devices… Read More
All network devices such as routers, servers, firewalls, etc. create or prompt logs about statuses and the events that occur. For a small system tracking… Read More
Prerequisite: Software Testing As like design and development, software testing is also one important part of SDLC (Software Development Life Cycle). During the testing phase… Read More
Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S National Institute of Standards and Technology (NIST) in… Read More
Class Diagram is one among the UML diagram consists of many classes and describes the attributes and relationships among various objects.   Classes: The classes… Read More
Business vertical testing :The business vertical testing is a process in which a product is being used and tested for different business verticals such as… Read More
Regression Testing :Regression testing is done to ensure that enhancements or defect fixes made to the software work properly and do not affect the existing… Read More
Prerequisite: Defect Life Cycle Defect:A defect in a software product is also known as a bug, error or fault which makes the software produce an… Read More
1. Black Box Testing :Black box testing is a type of software testing in which the functionality of the software is not known. The testing… Read More
1. Error Seeding :Error seeding can be defined as a process of adding errors to the program code that can be used for evaluating the… Read More
To represent different perspective of software system different UML diagrams primarily based totally at the UML (Unified Modeling Language) are used. Each perspective focuses on… Read More
SSH stands for “Secure Shell” or “Secure Socket Shell“. It is a cryptographic network protocol that allows two computers to communicate and share the data… Read More
Image classification is one of the supervised machine learning problems which aims to categorize the images of a dataset into their respective categories or labels.… Read More
In this article, we will cover the overview of CUDA programming and mainly focus on the concept of CUDA requirement and we will also discuss… Read More

Start Your Coding Journey Now!