Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computers Articles
Page 9 of 100
Time Based Access-List
A time-based access list is a network security feature that enables administrators to control traffic flow based on specific time parameters such as time of day, day of week, or date. This advanced filtering mechanism enhances traditional access control lists by adding temporal restrictions to network access policies. How Time-Based Access Lists Work A Time-Based Access Control List (ACL) extends standard ACL functionality by incorporating date and time parameters into traffic filtering decisions. While traditional ACLs filter traffic based solely on source IP, destination IP, protocol, and port numbers, time-based ACLs add temporal conditions to these rules. ...
Read MoreAccess and trunk ports
In computer networking, access and trunk ports are two fundamental types of switch ports that manage network traffic differently. Access ports connect individual end devices to a single VLAN, while trunk ports carry traffic from multiple VLANs between network devices like switches and routers. Understanding these port types is essential for proper VLAN implementation and network segmentation in modern switched networks. Access Ports Access ports are the simplest type of switch port, designed to connect end devices such as computers, printers, and IP phones. Each access port belongs to exactly one VLAN, and all traffic from the ...
Read MoreWhat is Connection less Service?
To send data from one device to another, there should be a connection. The connection can be established to transfer data between devices in two ways: Connection-Oriented Service Connectionless Service Now let us discuss connectionless services in detail. What is Connectionless Service? Connectionless service is a data transmission method where information is sent from source to destination without establishing a dedicated end-to-end connection first. In this approach, data is transferred in one direction without checking if the destination is ready to accept the message or even if it exists. Each data packet is ...
Read MoreWhat are the differences between Fastag and QR Code?
Let us understand the concepts of QR Code and FASTag to comprehend their differences in technology, applications, and functionality. QR Codes A QR code (Quick Response code) is a two-dimensional barcode that can encode over 4, 500 characters of data. These square-shaped barcodes were initially developed in Japan by Masahiro Hara in 1994 for the automotive industry. The primary purpose of QR codes is to store information in a machine-readable format that can be quickly scanned and decoded using smartphones or dedicated scanners. ...
Read MoreWhat are the differences between Barcode and NFC?
Let us understand the concepts of Barcode and Near Field Communication (NFC), two different technologies used for data transfer and identification in various applications. Barcode A barcode is a machine-readable code consisting of parallel lines of varying widths and spacing that represents data in a visual format. A barcode reader decodes the data contained in the barcode and sends it to a computer system. The barcode reader produces a beam of light or laser to scan the barcode, which reflects off the barcode image. A light-sensitive detector in the reader identifies the barcode by recognizing special bars ...
Read MoreWhat are the differences between Wuala and ShareFile?
Let us understand the concepts of Wuala and ShareFile before learning the differences between them. Both were cloud storage services that offered file sharing, synchronization, and backup capabilities, though they targeted different market segments and had distinct approaches to data security and storage. ShareFile ShareFile was launched by Jesse Lipson in 2005 and was later acquired by Citrix Systems in 2011. It is designed as an enterprise-grade file sharing and storage solution that integrates with third-party applications and existing file storage systems. ShareFile enables secure sharing of large files up to 100 GB in size, making it suitable ...
Read MoreWhat is the full form of ARPANET?
The full form of ARPANET is Advanced Research Projects Agency Network. It was developed under the direction of the US Advanced Research Projects Agency (ARPA) and was based on a concept first published in 1967. With the interconnection of four university computers in 1969, the concept became a modest reality. ARPANET was the first network to implement the TCP/IP protocol and represented one of the earliest packet-switched networks. This groundbreaking network became the foundation for the modern-day Internet, establishing fundamental networking principles that continue to power global communications today. ARPANET Structure (1969-1975) ...
Read MoreNamed Pipe or FIFO with example C program
Named pipes, also referred to as FIFOs (First In, First Out), are essential IPC (Interprocess Communication) mechanisms in Unix-like systems. They provide a method for communication between unrelated processes running on the same system. Unlike anonymous pipes, named pipes exist as special files in the filesystem and can be accessed by any process with appropriate permissions. Named pipes follow the FIFO principle, ensuring that data written by one process is read by another process in the same order. This makes them particularly useful for producer-consumer scenarios and process synchronization. Syntax int mkfifo(const char *pathname, mode_t mode); ...
Read MoreDifference between Basic Disk and Dynamic Disk
Both basic disk and dynamic disk are disk configurations available in the Windows Operating System. A basic disk has been available since the early days of DOS and Windows. Dynamic disk was introduced with Windows 2000 and offers more flexible storage management. Basic Disk Basic Disk configuration works on the concept of partitions, partition tables, and logical drives. A disk can have up to four primary partitions, or three primary partitions and one extended partition containing multiple logical drives. The following operations can be performed − Create/Delete primary or extended partitions Create/Delete logical drives within an ...
Read MoreDifferences between Data paths.
A CPU has two main sections: the data section (data path) and the control section. The data path consists of registers, ALU, and interconnection buses that carry out the actual data processing. Data paths are classified into three types based on how instructions are executed − Single Cycle, Multiple Cycle, and Pipeline. Single Cycle Data Path In a single cycle data path, each instruction completes in exactly one clock cycle. The clock cycle must be long enough to accommodate the slowest instruction, which wastes time for simpler instructions. Multiple Cycle Data Path In a multiple cycle ...
Read More