
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1163 Articles for Computers

1K+ Views
As we know in context of computer/system, the main key feature on which the whole performance get dependent is Memory. It is memory and its allocation which make the system to perform fast and efficient. Now on the basis of organizing of this memory in the system, we can distinguish between Simultaneous and Hierarchical Access Memory Organisations.Following are the important differences between Simultaneous and Hierarchical Access Memory Organisations.Sr. No.KeySimultaneous Access Memory OrganisationsHierarchical Access Memory Organisations1DefinitionSimultaneous Access Memory Organisations is the memory organizing technique in which CPU can interact with multiple memory levels at same time and gets data interaction. This ... Read More

37K+ Views
The process of sending data between two or more digital devices is known as data transmission. Data is transmitted between digital devices using one of the two methods − serial transmission or parallel transmission.In serial transmission, data bits are sent one after the other across a single channel. Parallel data transmission distributes numerous data bits through various channels at the same time.What is Serial Transmission?A serial transmission transfers data one bit at a time, consecutively, via a communication channel or computer bus in telecommunication and data transmission. On the other hand, parallel communication delivers multiple bits as a single unit ... Read More

22K+ Views
Both Synthesized and Inherited Attribute are the part of semantics of a language that provide meaning to its constructs, like tokens and syntax structure. Semantics help interpret symbols, their types, and their relations with each other and its analysis judges whether the syntax structure constructed in the source program derives any meaning or not. Now on the basis of features of attributes we can distinguish between Synthesized and Inherited AttributesFollowing are the important differences between Synthesized and Inherited Attributes.Sr. No.KeySynthesized AttributeInherited Attribute1DefinitionSynthesized attribute is an attribute whose parse tree node value is determined by the attribute value at child nodes.To ... Read More

7K+ Views
Both Magnetic Tape and Magnetic Disk are the type of non-volatile magnetic memory and used to store the data. On the basis of architecture and features we can distinguish between both Magnetic Tape Memory and Magnetic Disk Memory. Following are the important differences between Magnetic Tape Memory and Magnetic Disk Memory.Sr. No.KeyMagnetic Tape MemoryMagnetic Disk Memory1DefinitionMagnetic tape is type of non-volatile memory uses thin plastic ribbon is used for storing data and as data use to be stored on ribbon so data read/write speed is slower due to which is mainly used for data backups.On other hand Magnetic Disk is ... Read More

11K+ Views
What is Routing? The process of determining a path for traffic inside a network or across or across different networks is known as routing. Routing occurs in a wide range of networks, including circuit-switched networks like the public switched telephone network (PSTN) and computer networks like the Internet. Routing is the higher-level decision-making in packet switching networks that sends network packets from their source to their destination through intermediate network nodes using particular packet forwarding techniques. The passage of network packets from one network interface to another is known as packet forwarding. Routers, gateways, and other network hardware devices are ... Read More

14K+ Views
Viruses, Worms, and Trojan Horses are types of malicious software that infiltrate a system and try to create havoc, however what sets them apart is the way they attack, spread, and replicate. Read though this article to get an overview of how a virus is different from a worm, and what exactly is a Trojan Horse. What is a Virus? A virus is malicious software (malware) made up of little bits of code attached to legitimate programs. When that software is launched, the virus is launched as well. Viruses are malicious programs that infect computer files and spread ... Read More

860 Views
As we know that Cryptography comprises of two processes which are namely as encryption and decryption performed at sender and receiver end respectively. Basically Cryptography is practiced or implemented for doing secure communication between sender and receiver in the public environment in such a manner that other than these two parties no one could get or understand the message that is delivered.On the basis of type of encryption and decryption of the message we can distinguish between Classical and Quantum Cryptography as follows −Sr. No.KeyClassical CryptographyQuantum Cryptography1BasisIn Classical Cryptography encryption and decryption is done on the basis of mathematical computation.On ... Read More

3K+ Views
Both basic disk and dynamic disk are disk configurations available in Windows Operating System. A basic disk is from initial days of DOS, Windows to till date. Dynamic Disk is available from Window 2000 onwards.Basic DiskBasic Disk Configuration works on the concept of partition, partition table, and logical drives. A disk can have up to four partitions or three partitions and one extended partition with multiple logical drives. The following operations can be performed in basic disk configuration.Create/Delete primary/extended partition.Create/Delete logical drives within an extended partition.Format a partition and mark as active.Dynamic DiskDynamic Disk Configuration works on the concept of ... Read More

1K+ Views
Data PathsCPU has two sections, data section and control section. Data section is also called data paths. Registers, ALU and interconnection bus collectively constitutes a data path. Data paths are of three types:Single CycleMultiple CyclePipelineFollowing are some of the important differences between Single Cycle, Multiple Cycle and Pipeline data paths.Sr. No.KeySingle CycleMultiple CyclePipeline1CycleSingle Cycle has one CPI (Clock Cycle Per Instruction).Multiple Cycle has variable CPIs.Pipeline has fixed no. of CPIs.2Instruction divisionIn single cycle, instruction is not divided per CPI.In multiple cycle, an instruction can be divided in arbitrary steps.In pipline, an instruction is divided one step per pipeline stage.3Instruction divisionIn ... Read More

2K+ Views
What is Topology?Network Topology is the way network links and nodes are connected with each other. The physical signal transmission medium is referred to as network topology. On the other hand, "logical network topology" refers to how the data flows through a network among the connected devices, regardless of their physical link.In this article, we will compare and contrast the different features of two network topologies − Ring Topology and Mesh Topology. Read through this article to find out how Ring Topology differs from Mesh Topology.What is Mesh Topology?A mesh network is a sort of local network structure that is ... Read More