- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 498 Articles for Computer Engineering

Updated on 10-Aug-2022 08:23:03
Circuit switching and Message switching are both telecommunication techniques that are used to transfer data from a source to a destination with minimal loss in transmission.Circuit switching is a way of constructing a dedicated network in which two network nodes create a dedicated communications channel before connecting. In message switching, the source and destination nodes are not connected; the intermediate nodes are in charge of data transfer.Read through this article to find out more about Circuit switching and Message switching and how they are different from each other.What is Circuit Switching?In circuit switching, networks create dedicated transmission channels. While other ... Read More 
Updated on 09-Jun-2020 08:26:35
As we know that both DES and AES are the type of symmetric key block cipher which are used in such encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. Now on the basis of characteristics we can distinguish between AES and DES.Following are the important differences between DES and AES ciphers.Sr. No.KeyDES CipherAES Cipher1DefinitionData Encryption Standard also known as DES is a symmetric key block cipher that was introduced in the ... Read More 
Updated on 22-Aug-2022 14:20:11
In digital electronics, a counter is a sequential logic circuit that consists of a series of flip-flops. As the name suggests, counters are used to count the number of occurrences of an input in terms of negative or positive edge transitions.Based on the way the flip-flops are triggered, counters can be grouped into two categories: Synchronous counters and Asynchronous counters.Read through this article to find out how these two types of counters function and how they are different from each other.What is a Synchronous Counter?If the "clock" pulses are applied to all the flip-flops in a counter simultaneously, then such ... Read More 
Updated on 23-Jan-2020 12:31:33
When I say machine learning, it reminds me a subject for the B.Tech Mechanical stream. No this is not a session of machine learning or it’s not related to your regular subject knowledge. The topic remains the same but it’s still different. So before we go to the point why should we be bothered about what is machine learning. We should now see what is machine learning actually.What is Machine Learning?Machine learning is a subcategory or to a say, a type of artificial intelligence (AI) which gives computers, a privilege to learn without being explicitly programmed. It mainly focuses on ... Read More 
Updated on 14-Dec-2022 18:09:27
Computer software is a set of instructions or programs instructing the computer to do specific tasks. Software is basically a generic term used to describe computer programs. In general, scripts, applications, programs and a set of instructions are all terms often used to describe a software. On the basis of language in which software is developed and platform which is required for its execution, we can group different types of software into two categories: System Software and Application Software. Read through this article to find out more about System Software and Application Software and how they are different from ... Read More 
Updated on 22-Aug-2022 14:33:27
Both VPN and Proxy are used to connect to a remote system where one can access the host system from a remote location. However, VPNs are superior than Proxy servers because a VPN can protect your privacy and security by routing your traffic via a secure VPN server and encrypting it. A Proxy, on the other hand, just routes your traffic via a mediating server and it does not provide any additional security.Read through this article to find out more about VPN and Proxy and how they are different from each other.What is a Virtual Private Network (VPN)?A virtual private ... Read More 
Updated on 09-Jan-2020 10:19:23
QoS traffic scheduling is a scheduling methodology of network traffic based upon QoS (Quality of Service). Here, the frames or packets are mapped to internal forwarding queues based on its QoS information, which are then services according to a queuing scheme.Typically, multiple queues are present each with different priority levels. The scheduler decides the type of treatment to be given to the traffic in each queue. When traffic is available, the scheduler maps it to the appropriate queue. For example, video and voice traffic are kept is queued with higher priority than background traffic.Notable QoS Traffic Scheduling MethodsWeighted Round Robin ... Read More 
Updated on 09-Jan-2020 10:17:46
Worldwide Interoperability for Microwave Access (WiMAX), is a wireless microwave technology based on the IEEE 802.16 standards. It was originally published in 2001 by WiMAX forum, the version which is now called fixed WiMAX. It is similar to Wi-Fi, though it provides higher data rates up to 1 Gbps even at distances of 30 miles.WiMAX forum defines WiMAX as – A standards-based technology enabling the delivery of last-mile wireless broadband access as an alternative to cable and DSL.Features of WiMAXWiMAX is a coalition of wireless industry based upon IEEE 802.16 standards.It aims for the advancement of broadband wireless access (BWA) ... Read More 
Updated on 09-Jan-2020 10:16:11
IEEE 802.16 is a standard that defines Wireless Interoperability for Microwave Access (WiMAX), a wireless technology that delivers network services to the last mile of broadband access.The IEEE 802.11 standard that lays down the specifications of the wireless local area networks (WLAN) or Wi-Fi, that connects wireless devices within a limited area.The following chart gives a comparison between 802.16 and 802.11 −FeatureIEEE 802.16IEEE 802.11TechnologyDefines WIMAX.Defines WLANs or WiFi.Application AreaLast-mile of broadband wireless access.Limited area forming wireless LANs.Versions of the Standard802.16a, 802.16d, 802.16e, 802.16m etc.802.11a, 11b, 11g, 11n, 11ac, 11ad etc.Domain of UsageIt is used for a wide area mostly outdoors.It ... Read More 
Updated on 09-Jan-2020 10:13:47
Dynamic Frequency Selection (DFS) is a technique used in IEEE 802.11 wireless networks or WiFi that permits devices to dynamically switch the operating frequency of transmission in order to avoid interference with other devices.FeaturesDFS is a legal mandate for all IEEE 802.11 devices which share 5 GHz radio spectrum with radar.DFS was adopted in IEEE 802.11h standard for wireless transmissions. It came up in 2003, when the wireless network started using 5 GHz band that is primarily used by radar systems.The objective of DFS is to prevent co-channel interference of signals between the primary user, i.e. radar systems, and the ... Read More Advertisements