Transmission Mode

Pranavnath
Updated on 28-Mar-2023 17:22:31

6K+ Views

Communication is defined as the transfer or sharing of data between any two individuals through a medium and the medium can be wired or wireless. In a computer network, the OSI (Open System Interconnection) model has seven layers for the communication networks. The First layer of OSI is the Physical layer that uses the Transmission mode for transferring the raw data to other devices using a physical medium. Transferring modes refer to the process of transferring data from one point to the other point or device over a particular network. The Channel between the two devices can be buses or ... Read More

Types of Network Topology

Pranavnath
Updated on 28-Mar-2023 17:19:36

1K+ Views

The topology means that the elements are arranged in a particular order. They are divided into two type’s namely physical and logical topology. The nodes in the network are connected physically and the information flows through the network logically. In a computer network, the node is a point that connects data from one device to another and is used to transfer and receive information. Some of the physical nodes in the network are printers, routers, and wireless base stations and they provide an overall map of the network. There are also some logical nodes like the servers that include information ... Read More

Types of Viruses

Pranavnath
Updated on 28-Mar-2023 17:17:24

9K+ Views

The Virus is a type of code that enters the system along with any file or programs and carries out malfunctions in the system. The virus-affected program will be a replica of the existing program. They enter the system through any file and when the file runs, parallelly the virus also runs in the background. There are many ways in which the virus gets into the system. Some of them are through mail attachments, by clicking inappropriate advertisements, and by downloading any software, or files from unauthorized websites. The main objective of viruses is to spread them along different hosts. ... Read More

Types of Internet Connection

Pranavnath
Updated on 28-Mar-2023 17:15:06

4K+ Views

In this article, we will discuss the various types of internet connections. The Internet provides customers to access and transfer data between users worldwide. Internet connections vary according to the area, availability, and usage. The benefits of having Internet connections help people to access any people easily and quickly. Some of the ways to connect using the internet connection are Wifi (Wireless Fidelity), Broadband, Wired, and Digital Subscriber Lines (DSL). There are huge ways to connect our local system, mobile phones, or tabs to the internet with different Internet connection types. Types of Internet Connection There are many ways to ... Read More

Trojan Horse and Trap Door

Pranavnath
Updated on 28-Mar-2023 17:12:31

3K+ Views

A threat is designed by hijackers to change the behavior of the process. The threat can reach the system through any path to our system or any organization sever. When the attack happens, it leads to the corruption of data, the stealing of personal information, and the loss of data. The Trojan horse and trap door are some of the program threats which need to be avoided for the proper functioning of the system. So it is a great deal to protect the system from program threats. The protection of files and other resources from misusing the data is important. ... Read More

Types of Cyber Attacks

Pranavnath
Updated on 28-Mar-2023 17:10:05

1K+ Views

In the digital world, everybody is accessible to applications, digital systems, and software. We get the details of the things we want easily on the internet today, so it is a positive change in our lives. But compared to the positive one, we should deal with the negative thing also. And the main challenge is cyber-attacks. It has been increasing every year when people try to access vulnerable sites. The main objective of cyber-attacks is data manipulation, stealing of data, and decreasing the performance of the system. There are many types of cyber-attacks and some of them are given here. ... Read More

Ion Exchange Chromatography: Principle, Steps, and Uses

Anusha Karthik
Updated on 28-Mar-2023 17:08:50

3K+ Views

Introduction Ion exchange chromatography is a powerful technique for separating and purifying proteins, peptides, nucleic acids, and other charged biomolecules based on their net charge. The technique involves the use of a stationary phase consisting of a resin with fixed charged groups that bind to the target molecules based on their charge characteristics. The principle of ion exchange chromatography is based on the differential affinity of biomolecules for the charged groups on the resin, which enables selective separation of the target molecule from a complex mixture of biomolecules. The content below elaborates the principle, steps, and uses of ion ... Read More

Top 10 Common Security Log Sources

Pranavnath
Updated on 28-Mar-2023 17:07:24

1K+ Views

In this article, we will see the top 10 common security log sources that are being developed and used by companies. Log Sources are a type of data source that creates an event log in an organization. The log is nothing but the records with data. An event log is a tool that has software and hardware-related information. When any security threat occurs, these logs help the security specialists to use this information in the event logs for security management. Event logs are generated in a computer system that has the stuff for identifying the bugs, risks, or threats. Every ... Read More

Importance of Protoplast Culture in Plant Regeneration

Anusha Karthik
Updated on 28-Mar-2023 16:42:33

1K+ Views

Introduction Protoplast culture is a laboratory technique that involves the isolation of the plant cell from the cell wall. The protoplasts can then be cultured in vitro, allowing for the study of cellular processes, including cell division, differentiation, and regeneration. Protoplast The technique has many applications in plant biotechnology, including the production of new crop varieties, genetic engineering, and the production of plant secondary metabolites. Below we shall look at the importance of protoplast culture in plant regeneration and how it is used to produce new plants. What Are Protoplasts? Protoplasts are cells that have had their cell walls ... Read More

Handling and Sterilization of Plant Material

Anusha Karthik
Updated on 28-Mar-2023 16:31:22

662 Views

Introduction Handling and sterilization of plant material is an important aspect of any laboratory or plant research facility. Plant material, such as leaves, stems, and seeds, can be contaminated with microbes and other pathogens that can affect the results of research. To ensure the accuracy and reliability of research, it is important to properly handle and sterilize the plant material. In this tutorial, we will discuss various methods of handling and sterilization of plant material. Part 1: Handling of Plant Material Handling of plant material involves the proper collection and preparation of the sample for sterilization. Before collecting plant ... Read More

Advertisements