Half Wave Rectifier

Manish Kumar Saini
Updated on 03-Nov-2023 13:14:13

31K+ Views

Half Wave Rectifier is a diode circuit which is used to transform Alternating Voltage (AC Supply) to Direct Voltage (DC Supply). A single diode is used in the HWR circuit for the transformation of AC to DC. Half Wave Rectifier circuit allows the one – half cycle of the AC Supply waveform to pass and blocks the other half cycle. Half Wave Rectifier Circuit Diagram The circuit of HWR consists of following three main components − A Diode A Transformer A Load (may be a Resistance) Working of HWR Circuit Positive ... Read More

Differences Between Digital and Analog System

Kiran Kumar Panigrahi
Updated on 03-Nov-2023 13:06:53

35K+ Views

Digital as well as Analog Systems, both are used to transmit signals from one place to another like audio/video. Digital systems use binary format as 0 and 1, whereas analog systems use electronic pulses with varying magnitude to send data. Read through this article to find out more about digital and analog systems and how they are different from each other. What is a Digital System? A system of components like a computer which uses discrete time signals to operate is called a digital system. Digital systems uses such signals that have square shaped waveforms. Digital systems first accept the ... Read More

Create a Shared Directory for All Users in Linux

Pradeep Elance
Updated on 03-Nov-2023 03:46:34

38K+ Views

When multiple users need access to the same set of directories of files then we need to create shared folders to be used by the users. In Linux there is concept of users and groups which can be given certain level of permissions that will enable them to share the data. Below are the steps how to create the shared folders where users can and update the files individually.Step 1 − Create the folder to be sharedAssuming we are setting up the shared folder from scratch, lets create the folder. The -p will create the directory and would ignore any ... Read More

The Diffie-Hellman Key Exchange

Satish Kumar
Updated on 03-Nov-2023 03:44:26

74K+ Views

What is Diffie-Hellman Key Exchange (exponential key exchange)? The Diffie-Hellman key exchange (also known as exponential key exchange) is a method for securely exchanging cryptographic keys over an insecure channel. It is a fundamental building block of many secure communication protocols, including SSL/TLS and SSH. The Diffie-Hellman key exchange works by allowing two parties (Alice and Bob) to agree on a shared secret key over an insecure channel, without any other party being able to intercept the key or learn anything about it. The key exchange involves the following steps − Alice and Bob agree on two large prime ... Read More

What is Lex?

Ginni
Updated on 03-Nov-2023 03:39:01

29K+ Views

It is a tool or software which automatically generates a lexical analyzer (finite Automata). It takes as its input a LEX source program and produces lexical Analyzer as its output. Lexical Analyzer will convert the input string entered by the user into tokens as its output.LEX is a program generator designed for lexical processing of character input/output stream. Anything from simple text search program that looks for pattern in its input-output file to a C compiler that transforms a program into optimized code.In program with structure input-output two tasks occurs over and over. It can divide the input-output into meaningful ... Read More

The Bluetooth Protocol Architecture

Moumita
Updated on 03-Nov-2023 03:33:56

49K+ Views

Bluetooth network technology connects mobile devices wirelessly over a short-range to form a personal area network (PAN). The Bluetooth architecture has its own independent model with a stack of protocols, instead of following the standard OSI model or TCP/IP model. The protocols in the Bluetooth standard can be loosely grouped into the physical layer, data link layer, middleware layer, and application layer as shown in the following diagram − Protocols in the Bluetooth Protocol Architecture Physical Layer − This includes Bluetooth radio and Baseband (also in the data link layer. ... Read More

What is Virtual Memory

Ginni
Updated on 03-Nov-2023 03:27:48

45K+ Views

Virtual memory is the partition of logical memory from physical memory. This partition supports large virtual memory for programmers when only limited physical memory is available.Virtual memory can give programmers the deception that they have a very high memory although the computer has a small main memory. It creates the function of programming easier because the programmer no longer requires to worry about the multiple physical memory available.Virtual memory works similarly, but at one level up in the memory hierarchy. A memory management unit (MMU) transfers data between physical memory and some gradual storage device, generally a disk. This storage ... Read More

Change Azure Subscription in PowerShell

Chirag Nagrekar
Updated on 03-Nov-2023 03:24:32

36K+ Views

To change the azure subscription using PowerShell, we can use the Select-AZSubscription command. When you use this command, you can use either the subscription ID, Subscription Name, or the Tenant ID.ExampleWith Subscription Name,Select-AzSubscription -SubscriptionName 'Visual Studio'With TenantID,Select-AzSubscription -Tenant 'XXXX-XXXXX-XXXXXXX-XXXX'With Subscription ID,Select-AzSubscription -SubscriptionId 'XXXX-XXXXX-XXXXXXX-XXXX'Sometimes on console messages will appear that one or more subscriptions are active. In that case, you can switch the other subscription using the Set-AZContext command and you can use subscription ID or the Name for it.ExampleSet-AzContext -SubscriptionId "xxxx-xxxx-xxxx-xxxx" OrSet-AzContext -SubscriptionName "Visual Studio"

A Protocol Using Go-Back-N

Samual Sam
Updated on 03-Nov-2023 03:15:35

38K+ Views

Go-Back-N protocol, also called Go-Back-N Automatic Repeat reQuest, is a data link layer protocol that uses a sliding window method for reliable and sequential delivery of data frames. It is a case of sliding window protocol having to send window size of N and receiving window size of 1.Working PrincipleGo – Back – N ARQ provides for sending multiple frames before receiving the acknowledgment for the first frame. The frames are sequentially numbered and a finite number of frames. The maximum number of frames that can be sent depends upon the size of the sending window. If the acknowledgment of ... Read More

Operating System as a Resource Manager and Extended Machine

Bhanu Priya
Updated on 03-Nov-2023 03:12:34

37K+ Views

An operating system is the interface between the user and the machine which controls and coordinates the use of the hardware among the various application programs for the various users. Operating System as Extended Machine Let us understand how the operating system works as an Extended Machine. At the Machine level the structure of a computer’s system is complicated to program, mainly for input or output. Programmers do not deal with hardware. They will always mainly focus on implementing software. Therefore, a level of abstraction is supposed ... Read More

Advertisements