
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1217 Articles for MCA

1K+ Views
What is a Smart Card?A smart card is a compact microprocessor-based device the size of a credit card that stores and processes data. Smart cards have mostly supplanted conventional magnetic cards since they can store more data and perform more functions. Smart cards are now used in various industries, including retail, public transportation, and security.Smart card manufacturers can put small circuits and circuitry on a printed card using modern technologies such as electron beam lithography. As data storage technology progresses, manufacturers will continue to increase the functionality of smart cards by working with nanoscale components of these cards.It is feasible ... Read More

289 Views
The use of telephony (typically Voice over IP telephony) to perform phishing attacks is known as voice phishing or vishing.Landline telephone services are typically reliable because they are terminated at recognized physical locations and are associated with a bill-payer. However, contemporary Voice over IP (VoIP) technologies like caller ID spoofing and automated systems (IVR) are frequently used by vishing criminals to evade detection by law enforcement authorities. Voice phishing is commonly used to acquire credit card numbers or other personal information from individuals for use in identity theft operations.Voice phishing assaults are often carried out via automated text-to-speech systems that ... Read More

3K+ Views
The World Wide Online (WWW), often known as the Web, is an information system in which Uniform Resource Locators (URLs) are used to identify documents and other digital resources. URLs, such ashttps://www.tutorialspoint.com/, which can be connected together via hyperlinks and are accessible over the Internet.Hypertext Transport Protocol (HTTP) is used to transport Web resources, which are accessed by users via a web browser and published by a web server. The World Wide Web is not the same as the Internet, which is built on the same technology as the Web and predates it by more than two decades in certain ... Read More

5K+ Views
What is a Backbone Network?A backbone is a component of the computer network infrastructure that connects multiple networks and provides a conduit for data to flow between them. A backbone may connect different local area networks in workplaces, campuses, or buildings. When numerous local area networks (LANs) are linked across a large region, the result is a wide area network (WAN) or metropolitan area network (MAN) if it serves the entire city.A backbone is a series of passageways that other significant networks connect to for long-distance communication on a massive scale. Various networking technologies collaborate as connecting points or nodes. ... Read More

20K+ Views
Tunnelling is a protocol for transferring data securely from one network to another. Using a method known as encapsulation, Tunnelling allows private network communications to be sent across a public network, such as the Internet. Encapsulation enables data packets to appear general to a public network when they are private data packets, allowing them to pass unnoticed.Note − Port forwarding is another name for Tunnelling.When data is tunnelled, it is split into smaller parts called packets, as it travels through the tunnel. The packets are encrypted via the tunnel, and another process known as encapsulation takes place. For transmission, private ... Read More

562 Views
Cross-Site Request ForgeryCross-Site Request Forgery (CSRF) is an Internet exploit that involves a trusted website user issuing unauthorized commands. In contrast to cross-site scripting, which exploits the user's trust for a website, CSRF leverages a website's trust for a specific user's browser. Session riding or a one-click attack are other terms for the same thing.The "GET" command of a browser is commonly used as the exploit point in a CSRF. To inject commands into a specific website, CSRF employs HTML tags like "IMG." A particular user of the website is then engaged as both a host and an unintentional accomplice. ... Read More

2K+ Views
Electronic mail (email) is a digital messaging system that allows users to send and receive messages via the Internet. Email communications are sent and received by email servers, available from all Internet Service Providers (ISP).Emails are sent between two separate server folders: the senders and the recipients. A sender saves, transmits, or forwards email messages, whereas a recipient accesses an email server to view or download emails.Types of Email AttacksIn this article, we will take a look at some methods in which cybercriminals use emails to attack vulnerable users.PhishingPhishing is a type of deception. Cybercriminals utilize email, instant messaging, and ... Read More

162 Views
When it is required to remove row with custom list element, a list comprehension and the ‘any’ operator are used.ExampleBelow is a demonstration of the samemy_list = [[14, 3, 11], [66, 27, 8], [31, 12, 21], [11, 16, 26]] print("The list is :") print(my_list) check_list = [3, 10, 19, 29, 20, 15] print("The check list is :") print(check_list) my_result = [row for row in my_list if not any(element in row for element in check_list)] print("The result is :") print(my_result)OutputThe list is : [[14, 3, 11], [66, 27, 8], [31, 12, 21], [11, 16, 26]] The check ... Read More

422 Views
Let us understand what an ultra-dense network is.Ultra-Dense NetworkThe dense networks deliver the best of the user experience to the users. This type of network allows the users to get the best result by the use of the densification. The density here can be the absolute or relative density in the networks.The user density networks increase the density too potentially beyond its range to fulfill the customer demand. In the user defined network, the capacity grows as the capacity of the base station also increases. This type of network provides users with the best of experience with the densification approach.In ... Read More

2K+ Views
BGP stands for Border gateway protocol. It is used to exchange the routing information between the networks. It makes the internet work. It always selects the local path preference. Because of the below reasons it is choosing the path than the best path.- Firstly RIP (Routing Information Protocol) selects the path with lowest hop count.- OSPF (Open Shortest Path First) selects the path with the lowest cost. This is more important.- The best path in internet depends on how we are forwarding the traffic and to which autonomous system instead of the shortest path.- Higher local preference path is preferred.-Shortest ... Read More