Let us understand the concepts of Fastag, Bar Code and Near Field Communication (NFC).FasTagFASTag is an electronic scanner system used for toll collection in India, which is operated by the National Highway Authority of India. It incorporates the Radio Frequency Identification (RFID) technology for doing toll payments either prepaid or from savings accounts which are linked to it or directly toll owner.The RFID enabled sticker which is fixed to a vehicle’s windshield, and a reader at the toll booth are used to scan this card and wirelessly and automatically processes the payment.When we pass a FASTag-enabled toll plaza, we don’t ... Read More
Let us understand the concepts of Quick Response (QR) Code, Bar Code and Near Field Communication (NFC).QR CodeQR code is called as "Quick Response", it allows us to encode or store over 4500 characters in a two-dimensional bar code. These are the "square barcodes" that are initially developed and used in Japan.The main aim of the QR code is to store the information in such a way that the machine (scanner) can be able to read the data present in the code.The sample QR code image is given below −As we can see above all QR codes are made of ... Read More
Let us understand the concepts of antivirus software and endpoint security.Antivirus softwareIt is developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers etc. It is a program, mainly performs functions like to scan, detect and remove viruses from your computer.Examples &mius; Windows Defender, AVG, AVAST, McAfee. Kaspersky etc.Features of an Effective AntivirusThe features of an effective antivirus are as follows −Default-Deny ProtectionAuto Sandbox TechnologyContainment TechnologyHost Intrusion Protection System (HIPS)AdvantagesThe advantages of an effective antivirus are as follows −Virus protectionWeb ProtectionSpam protectionCost effectiveFirewall featureDisadvantagesThe disadvantages of an effective antivirus are as follows −System slowdownSecurity holesMore advertisementsNo ... Read More
Let us understand the concepts of antivirus software and antispyware.Antivirus softwareIt is a program which is designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs mainly perform the function like to scan, detect and remove viruses from your computer.The different versions present in market are as follows −Windows DefenderAVGAVASTMcAfeeKasperskyThe virus is stored in a distinct vicinity referred to as a vault in which it has a different file machine due to which virus impacts it. Users can themselves coach antivirus to delete computer virus, put it in a vault ... Read More
Let's try to understand what reliability challenges for computer networks are.This can be defined as packet loss, bandwidth saturation, and latency, but this type of information would be really unhelpful to those IT companies whose networks are small, and failures not well under- stood & might be limited to rebooting.Five reliability challengesThe reliability challenges for a computer network are as follows −Host IdentificationThe Host ID is the portion of an IP address that uniquely identifies a host on a given TCP/IP network.The smaller networks can be easily configured with the help of manual addressing, but it becomes a serious problem ... Read More
Let us understand the concept of Viber and Whatsapp messenger.ViberIt allows users to send multiple images and videos at a time. One can also block another user. It also has a cross platform typing indicator. One can send longer video messages which will be up to 3 minutes long.Selecting the option of receiving the video calls with video, the app will automatically open the front camera for the conversation.User-Experience for the Viber application is as follows −If we sum up the negative and positive experiences, more than average users are happy with this application.According to them, it is so simple ... Read More
Forensics is a method of science to criminal examinations and can incorporate a wide exhibit of sciences from material science to clairvoyants. A measurable report basically and concisely outlines the substantive proof in a criminal case.Criminological report composing may demonstrate troublesome and overwhelming in light of the fact that it more often than not requests examinations of specialized information, introduced in a comprehensible, simple to-pursue position. By and by, a measurable report basically pursues similar essential principles and conventions expected of any report.Tools for Generation of ReportThe tools used to generate report are as follows −Raw formatRaw format method is ... Read More
Cybercrime is any type of illegal activity that takes place via digital means. Data theft is, of course, one of the most common types of cybercrime, but cybercrime also includes a wide range of malicious activity as well, such as cyberbullying or planting worms or viruses.Cybercrimes are divided into two different categories as follows −Those that cause intentional damageThose that can cause unintentional damage.A cybercrime is a criminal act in which someone targets a computer or a network of devices in order to gain illegal rights, steal data from them, frauds etc.This type of crime is carried out using technology ... Read More
Let us understand the concepts of Wi-Fi and Zigbee.Wi-FiIt is a wireless networking protocol that allows devices to communicate without internet cords. It's technically an industry term that represents a type of wireless local area network (LAN) protocol based on the 802.11IEEE network standard.Wi-Fi is the most popular means of communicating data wireless, within a fixed location.We can find Wi-Fi in the following:Schools, Homes and CollegesCorporate places and Private/Public FirmsRailway/Metro stationsSupermarkets where customers can pay onlineNear restaurants, coffee shops, dine placesThe ZigBee protocolIt is used in the IEEE 802.15 standards and adds the network security as well as framework protocol. ... Read More
In order to understand cluster computing, we have to know what a cluster is.Cluster ComputingA cluster is a collection of computers or groups of computers and to utilize performance of these groups of computers when we start processing problems with these sets of computers is called cluster computing.Cluster computing is a part of parallel computing. In cluster computing we increase processing of our system by connecting computers according to our needs.By the help of Cluster computing we can easily solve complex problems with high speed. In cluster computing utilization of all resources is better than others.Cluster computing design contrasts depending ... Read More
 
 Data Structure
 Data Structure Networking
 Networking RDBMS
 RDBMS Operating System
 Operating System Java
 Java MS Excel
 MS Excel iOS
 iOS HTML
 HTML CSS
 CSS Android
 Android Python
 Python C Programming
 C Programming C++
 C++ C#
 C# MongoDB
 MongoDB MySQL
 MySQL Javascript
 Javascript PHP
 PHP