Did you notice small bumps on the F and J keys on a computer keyboard?? Wonder why they are a part of keyboard design.Actually, the small bumps or ridges found on the F and J keys on a computer keyboard are to help the users to correctly position their left and right hands without having to look at the keyboard. The middle row is called the home row key position. Once you place your left and right index fingers on the F and J keys, accessing the remaining keyboard becomes easy.
"Innovation distinguishes between a leader and a follower." is one of the Steve Jobs famous Quotes. Steve Jobs is a great role model for many budding entrepreneurs, business people, and great leaders all over the world.Steve has many innovations in his name. He is the co-founder of the Apple company and created one of the most popular, high tech phones in the world. He has started his own company at a very young age.Steve Jobs has shown to the world how to dream and how to achieve your dreams even if there are many obstacles. Students should look up to ... Read More
Long straddle involves call and put strategy for one particular bond, security or an asset and is utilized by traders as it has potential for maximum benefit and negligible risks. Under this method both long call and long put have the same stock price and expiration date.Important Points BrieflyAn option strategy known as a long straddle is acquiring both a long call and a long put on the same underlying asset with the same expiry date and strike price at the same time.The purpose of a long straddle is to benefit from a very big move in either direction by ... Read More
With seven hundred million plus users all over the globe, Facebook is a perfect podium for scam artists. For a scammer, it requires little research on your interest, one simple friend request and once you add them in your friend list, the further process of phishing and scamming runs smoothly.This mega program runs through ‘Social Engineering’, which means understanding common user habit along with behavior and make best use of those to design eye-catching headlines. A simple click on them can redirect you safely to unsafe scam page. There you might be asked to input your login details and personal ... Read More
The internet, the realm of unparalleled possibilities, has exponentially evolved from just another way of communication to a workplace, a concert hall, a television, a newspaper stall, a gaming station, a movie theater, an online classroom, a shopping mall and this list of the various manifestations of the internet refuses to stop.Birth of YouTubeIt all started with the birth of YouTube. Initially, it was just a platform for individuals to upload videos with an intention to share these videos with their loved ones. As YouTube went popular, various individuals started uploading videos on a regular basis. Adding fuel to fire, ... Read More
The irregularities formed in the given weld metal due to wrong welding process or incorrect welding patterns, etc. are known as welding defects.The following table elaborates the different types of welding defects, their causes, and how to prevent these defects −The irregularities formed in the given weld metal due to wrong welding process or incorrect welding patterns, etc. are known as welding defects.The following table elaborates the different types of welding defects, their causes, and how to prevent these defects −Welding DefectCauses of Welding DefectRemediesBlow holeToo fast cooling rate.Wet, unclear or damaged electrode.Too thick base metal.Long or short arc length.Rusted ... Read More
The CIA Triad is a concept in information security. It guides an organization's data security operations. The 3 letters in CIA stand for confidentiality, integrity, and availability. They are the three pillars of a security architecture. In fact, applying these concepts to any security program is optimal.When working as a triad, the three notions are in conflict with one another. Extensive authentication, for example, helps preserve secrecy and lowers availability since certain persons who have the right to the data may not be able to access it.The three terms are explained below.ConfidentialityConfidentiality refers to the steps made by an organization ... Read More
It's difficult to talk about internet security without mentioning a proxy server or a virtual private network (VPN). These two programs give you anonymity while you do your daily internet activity. Both technologies work in the same way to keep you anonymous on the Internet. Proxies and VPNs disguise your internet protocol (IP) from the web host and your target website by rerouting your internet traffic through their servers. The web host only sees the IP address of the proxy or VPN server as you browse the website, while yours remains concealed.Although proxy and VPN anonymity solutions have certain similarities, ... Read More
IP FloodAn IP Flood is a type of malicious assault that can affect a single device or a whole network. This is a Denial of Service (DoS) attack that seeks to prevent a device from performing its usual functions, such as delivering requests or processing data. In an IP flood attack, the system is flooded with data, using all available bandwidth and denying access to genuine users.Fortunately, IP flooding is a well-known form of assault and it is well-documented and hence it can be readily avoided. IP Flooding is a sort of attack in which the victim or system is ... Read More
The resilience of an Information System is its capacity to function in adverse conditions or under stress, while preserving critical operational capabilities. In general, a system is resilient if it continues to fulfil its objective despite hardship (i.e. if it provides required capabilities despite excessive stress that can cause disruptions).Being resilient is vital because, no matter how well-engineered a system is, reality will conspire to disrupt it sooner or later. Residual software or hardware faults will ultimately cause the system to fail to execute a necessary function or to fail to achieve one or more of its quality standards (e.g., ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP