Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
How did Google get its name?
The Google story began in 1995 when their founders Larry Page and Sergey Brin were in Stanford University. They were always interested to build a search engine “to organize the world’s information and make it universally accessible and useful.”In their own words how Google got its name ...Working from their dorm rooms, they built a search engine that used links to determine the importance of individual pages on the World Wide Web. They called this search engine Backrub. Soon after, Backrub was renamed Google. The name was a play on the mathematical expression for the number 1 followed by 100 ...
Read MoreWhere do waste goes from the ships or boats?
Cruise ships are sometimes carrying 10, 000 and more people on board which amounts to the population of a small town. When they are set for a sail it will be usually 10 days to one month for a commercial ship to touch the land. Meanwhile, they have to take care of food, washing of clothes and disposing of human excreta for that period.Not just human waste, there can be leftover food, bottles, cans, cardboard and everything which has to be handled on the land, has to be handled on the ship too.Where does the waste go from the ships? ...
Read MoreHow can we improve traffic congestion in India?
The number of cars on India's roads has been doubling every 8-10 years—and it's costing the country. A WHO study from 2014 found that 13 of the world's 20 most polluted cities are in India. The country experiences 120, 000 deaths per year due to traffic fatalities, more than any other country.To improve the traffic conditions in India, there are certain things that have to be followed by the Government, private sector and also citizens.City governments in India have to focus on investing in road expansions and overpass construction projects.The public transport services have to be improved, curbing the car ...
Read MoreWhy are there bumps on the F and J keys on a Keyboard?
Did you notice small bumps on the F and J keys on a computer keyboard?? Wonder why they are a part of keyboard design.Actually, the small bumps or ridges found on the F and J keys on a computer keyboard are to help the users to correctly position their left and right hands without having to look at the keyboard. The middle row is called the home row key position. Once you place your left and right index fingers on the F and J keys, accessing the remaining keyboard becomes easy.
Read MoreWhy is Steve Jobs considered as a role model for leaders?
"Innovation distinguishes between a leader and a follower." is one of the Steve Jobs famous Quotes. Steve Jobs is a great role model for many budding entrepreneurs, business people, and great leaders all over the world.Steve has many innovations in his name. He is the co-founder of the Apple company and created one of the most popular, high tech phones in the world. He has started his own company at a very young age.Steve Jobs has shown to the world how to dream and how to achieve your dreams even if there are many obstacles. Students should look up to ...
Read MoreWhat is a Long Straddle in Investment?
Long straddle involves call and put strategy for one particular bond, security or an asset and is utilized by traders as it has potential for maximum benefit and negligible risks. Under this method both long call and long put have the same stock price and expiration date.Important Points BrieflyAn option strategy known as a long straddle is acquiring both a long call and a long put on the same underlying asset with the same expiry date and strike price at the same time.The purpose of a long straddle is to benefit from a very big move in either direction by ...
Read MoreHow to Avoid online Scams on Facebook?
With seven hundred million plus users all over the globe, Facebook is a perfect podium for scam artists. For a scammer, it requires little research on your interest, one simple friend request and once you add them in your friend list, the further process of phishing and scamming runs smoothly.This mega program runs through ‘Social Engineering’, which means understanding common user habit along with behavior and make best use of those to design eye-catching headlines. A simple click on them can redirect you safely to unsafe scam page. There you might be asked to input your login details and personal ...
Read MoreHow Social Media Companies struggle with Internet Stardom?
The internet, the realm of unparalleled possibilities, has exponentially evolved from just another way of communication to a workplace, a concert hall, a television, a newspaper stall, a gaming station, a movie theater, an online classroom, a shopping mall and this list of the various manifestations of the internet refuses to stop.Birth of YouTubeIt all started with the birth of YouTube. Initially, it was just a platform for individuals to upload videos with an intention to share these videos with their loved ones. As YouTube went popular, various individuals started uploading videos on a regular basis. Adding fuel to fire, ...
Read MoreWhat are Welding Defects? – Types, Causes, and Remedies
The irregularities formed in the given weld metal due to wrong welding process or incorrect welding patterns, etc. are known as welding defects.The following table elaborates the different types of welding defects, their causes, and how to prevent these defects −The irregularities formed in the given weld metal due to wrong welding process or incorrect welding patterns, etc. are known as welding defects.The following table elaborates the different types of welding defects, their causes, and how to prevent these defects −Welding DefectCauses of Welding DefectRemediesBlow holeToo fast cooling rate.Wet, unclear or damaged electrode.Too thick base metal.Long or short arc length.Rusted ...
Read MoreWhat is CIA Triad in Information Security?
The CIA Triad is a concept in information security. It guides an organization's data security operations. The 3 letters in CIA stand for confidentiality, integrity, and availability. They are the three pillars of a security architecture. In fact, applying these concepts to any security program is optimal.When working as a triad, the three notions are in conflict with one another. Extensive authentication, for example, helps preserve secrecy and lowers availability since certain persons who have the right to the data may not be able to access it.The three terms are explained below.ConfidentialityConfidentiality refers to the steps made by an organization ...
Read More