Full Adder with NAND Gates

Manish Kumar Saini
Updated on 26-Dec-2022 17:56:04

32K+ Views

In digital electronics, there are different types of logic circuits used to perform different kinds of arithmetic operations. One of them is adder. Adder (or Binary Adder) is a combinational logic circuit that performs the addition of two or more binary numbers and gives an output sum. There are two types of adders present namely, half adder and full adder. Since, adder are logic circuits, thus they are implemented using different types of digital logic gates such as OR gate, AND gate, NOT gate, NAND gates, NOR gates, etc. In this article, we will discuss the Full Adder Realization using ... Read More

Adders and Subtractors in Digital Electronics

Manish Kumar Saini
Updated on 26-Dec-2022 17:39:27

32K+ Views

In digital electronics, adders and subtractors both are the combinational logic circuits (a combinational logic circuit is one whose output depends only on the present inputs, but not on the past outputs) that can add or subtract numbers, more specifically binary numbers. Adders and subtractors are the crucial parts of arithmetic logic circuits in processing devices like microprocessors or microcontrollers. In this article, we will discuss adders and subtractors in detail. What is an Adder? We have different types of digital devices like computers, calculators that can perform a variety of processing functions like addition, subtraction, multiplication, division, etc. The ... Read More

3 Variable K-Map in Digital Electronics

Manish Kumar Saini
Updated on 26-Dec-2022 17:31:17

9K+ Views

A K-Map or Karnaugh Map is a graphical method that used for simplifying the complex algebraic expressions in Boolean functions. This method avoid the use of complex theorems and equations manipulations. A K-Map is basically a special form of a truth table that can easily map out the values of parameters and gives a simplified Boolean expression. K-Map method is best suited for such Boolean functions that have two to four variables. However, it can be used for Boolean functions having five or six variables as well, but its process becomes more difficult with the increased number of variables in ... Read More

How Hackers Exploit Crypto Wallets

Uday Mitra
Updated on 26-Dec-2022 17:18:26

694 Views

Cryptocurrency is a digital currency that is widely popular due to its nature of making money quickly or getting a complete loss; people are crazy about cryptocurrency and want to make money from it. Due to its popularity, hackers exploit new or existing users with malware viruses, bugs, and miscommunication. We will learn how hackers use bugs and malware and how to defend themselves. What is cryptocurrency? Cryptocurrency is a digital currency that is highly encrypted, decentralized in nature, and secured by cryptography. Since transactions are verified via encryption, cryptocurrency has earned its name. This implies that storing, transmitting, and ... Read More

Salary of an Ethical Hacker

Uday Mitra
Updated on 26-Dec-2022 17:14:09

313 Views

Today, in this era of advanced technologies, cybercrimes or cyber threats have impacted a lot on any company's data security or data protection. Hackers do unauthorized access to the data of computers and smartphones and intervene the data privacy. Many companies face severe data theft challenges worldwide, leading to substantial business losses.To stop these malicious attacks, IT professionals are permitted to deal with this vulnerable task to protect the data of companies and individuals. Ethical Hackers are professionals with technical skills in detecting these malicious attacks and resolving the issues.The prime responsibilities of ethical hackers are to define and categorize ... Read More

What is Spoofing? Definition, How it Works and Protection Methods

Uday Mitra
Updated on 26-Dec-2022 17:08:48

453 Views

At present, different types of cybercrimes are getting developed, and these are the prime cause of data loss in an organization. Among these, Spoofing is another harmful cybercrime where it becomes easy for criminals to disguise phone calls and email addresses. Key facts to know about Spoofing Cybercriminals use spoofing to hack the confidential information of an individual and organizations. Here all need to understand the critical features of Spoofing. It is the process through which hackers can divulge all personal information. Hackers can get all the information through email, caller IDs, and GPS services. Hence it is suggested to ... Read More

Lapsus Cyber Attacks: How Ethical Hackers Can Help

Uday Mitra
Updated on 26-Dec-2022 16:57:42

254 Views

An ethical hacker is a specialist with in-depth technical knowledge and talents specifically skilled at identifying and exploiting flaws in target systems. The proprietors of the designs have permitted him to work. An ethical hacker's goal is to evaluate the security posture of a target organization or system, and they must abide by the laws of the target owner and the company. It's like a secret shopper. They go into stores covertly to look for issues and give comments on what needs to be fixed. To test a store's security, secret shoppers may even simulate thefts. Similarly, firms that wish ... Read More

Compare Two Arrays for Equality in Perl

Mukul Latiyan
Updated on 26-Dec-2022 16:44:26

3K+ Views

In Perl, there are two ways to check if two arrays are equal. We can compare two arrays in Perl with the help of "Storable freeze" function or by creating our own custom function. In this tutorial, we will explore both these approaches with the help of examples. Example 1 Let's first explore the "Storable freeze" code and understand how it works. Consider the code shown below. use Storable qw/freeze/; use strict; $Storable::canonical = 1; my @countriesOne = ('India', 'China', 'Russia', 'USA', 'Germany'); my @countriesTwo = ('India', 'China', 'Russia', 'USA', 'Germany'); my @countriesThree = ... Read More

Check If a Variable Has a Numeric Value in Perl

Mukul Latiyan
Updated on 26-Dec-2022 16:42:44

4K+ Views

Suppose we get a variable at runtime in Perl and we want to check if the value that it contains is numeric or not, then we can use the two approaches shown in this tutorial. We will use two simple examples to demonstrate how it works. Example  The most basic approach is to use the length and do keywords and then ignore the warnings. Consider the code shown below for the same. $x = 100; if (length(do { no warnings "numeric"; $x & "" })){ print "x is numeric"; } else { print ... Read More

Cyber Security Framework: Types, Benefits, and Best Practices

Uday Mitra
Updated on 26-Dec-2022 16:41:06

753 Views

Nowadays, safeguarding precious data from cybercriminals has never been so essential in this modern world. An organization has vast data, and it is challenging to manage all that without a structured plan. Any organization's IT professionals cannot do it on their own. Hence, they rely on something called Cyber Security Framework. We will discuss many of these Cyber Security Frameworks here, and you'll walk away knowing all the core concepts of these frameworks. What is a Cyber Security Framework? These documents describe guidelines, standards, and best practices for cyber security risk management. These frameworks reduce an organization's exposure to weaknesses ... Read More

Advertisements