
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 620 Articles for Computer Science

1K+ Views
Semaphores are assorted data types with 2 areas set of procedures and non-negative integers within a waiting list. It is utilized to explain precarious section drawbacks, and through utilizing 2 processes, it shall be explained. Pause and signal are utilized for the technical organization. It may be a variable utilized to control access to a shared supply by manifold threads and escape critical segment drawbacks in a system like a multitasking process. Semaphores permit a random resource count is known as calculating semaphores. Levels of the Operation There are the levels that come with life that may assist with accepting ... Read More

1K+ Views
In the constantly evolving world of technology, it's imperative to stay updated with the latest developments in computer science. With numerous online courses available, it's challenging to determine which courses are worth taking. In this article, we'll discuss the best computer science courses to take in 2023. Artificial Intelligence (AI) Artificial Intelligence is one of the most in-demand fields in computer science. It is the science of creating intelligent machines that can perform tasks that usually require human intelligence. AI involves the use of algorithms and techniques such as machine learning, natural language processing, and robotics. The following courses are ... Read More

1K+ Views
Time to Live (TTL) is a term used in computer science to describe how long a network packet will contain data. It is a value inside the packet header that represents the most router hops a packet may make before being dropped. When a packet travels through a network, it is forwarded from one router to another until it arrives at its final destination. The packet header's TTL value decreases with each router it passes through. The packet is dropped and not transmitted any further when the TTL is 0, halting its endless circulation. Time to Live (TTL) The TTL ... Read More

4K+ Views
Introduction One of the most essential mathematical notations in computer science for determining an algorithm's effectiveness is the Big O notation. The length of time, memory, other resources, as well as a change in input size required to run an algorithm can all be used to evaluate how effective it is. Data structure's Big O Notation provides information about an algorithm's performance under various conditions. In other words, it provides the worst-case complexity or upper-bound runtime of an algorithm. Big O Notation in Data Structure A change in input size can affect how well an algorithm performs. Asymptotic notations, such ... Read More

2K+ Views
In today’s world, who does not use internet and one who uses internet must aware of www, a pragmatic interface that made life easy. In the late 1980s, Sir Tim Berners-Lee was working at the European Organization for Nuclear Research in Geneva, Switzerland, when he created the Web, first time (1989). Since that time, the web application has increasingly become an indispensable resource in the field of computer science, as it has started assisting people in their everyday lives in such areas as education, government services, trade and commerce, employment, health care, etc. What is WWW? It literally stands ... Read More

2K+ Views
Our level of artificial intelligence (AI) maturity, as well as the types of challenges that AI might be able to assist us in resolving, grows in tandem with the ever-increasing volume of data that we produce. This data, along with the incredible computing power that is now available for a price that is affordable, is what is fuels the tremendous growth that has been seen in AI technologies, and it is also what makes deep learning and reinforcement learning possible. In this article, I will explain the difference between Deep Learning and Reinforcement Learning by providing definitions that are clear ... Read More

1K+ Views
Transmission impairment occurs when the received signal is different from the transmitted signal. As we know, a signal can be transmitted as Analog signal or it can be transmitted as a digital signal.In Analog signals due to transmission impairment the resulting received signal gets different amplitude or the shape. In the case of digitally transmitted signals at the receiver side we get changes in bits (0's or 1's).CausesThere are various causes of transmission impairments, which are as follows −NoiseDelay DistortionAttenuation DistortionLet us discuss Delay Distortion.Delay DistortionThis kind of distortion is mainly appearing in case of composite signals in which a ... Read More

3K+ Views
Computer ArchitectureThe architecture defines those attributes of the system apparent to the programmer or those attributes that directly force the program’s logical execution. It manage with the functional behavior of the computer system view by the user.Computer Architecture manages with the system’s programming part, including the multiple bits can define the several data types, input-output methods, approaches for addressing memory, and the computer’s instruction set. The implementation of any program is influenced by these qualities of architecture. The change in a bit or size can lead to a different result for the programmer.Computer OrganizationComputer organization can study the basic computer ... Read More

505 Views
Myrinet is a high-performance, packet-communication, and switching technology. It was produced by Myricom as a high-performance alternative to conventional Ethernet networks. Myrinet switches are multiple-port components that route a packet entering on an input channel of a port to the output channel of the port selected by the packet.Myrinet switches have 4, 8, 12, 16 ports. For an n-port switch, the ports are addressed 0, 1, 2... n - 1. For any switching permutation, there may be as many packets traversing a switch concurrently as the switch has ports. These switches are implemented using two types of VLSI chips such ... Read More

2K+ Views
Ethernet is a packet-switched LAN technology introduced by Xerox PARC in the early 1970s. Ethernet was designed to be a shared bus technology where multiple hosts are connected to a shared communication medium. All hosts connected to an Ethernet receive every transmission, making it possible to broadcast a packet to all hosts at the same time.Ethernet uses a distributed access control scheme called Carrier Sense Multiple Access with Collision Detect (CSMA/CD). Multiple machines can access an Ethernet at the same time. Each machine senses whether a carrier wave is present to determine whether the network is idle before it sends ... Read More