
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 381 Articles for Hardware

2K+ Views
In computer systems, different types of memory devices are used to store data permanently. Both SSD and HDD are such storage devices. SSD and HDD are the most commonly used types of secondary memories. HDD is a traditional storage device, while SSD is a modern storage device. SSD and HDD are quite different from each other. The most fundamental difference between SSD and HDD is that SSD (Solid State Drive) is a storage device that stores data in integrated circuits, whereas HDD (Hard Disc Drive) is a device that stores data magnetically. There are several other differences between SSD and ... Read More

347 Views
Memory corruption vulnerabilities have plagued software for decades, despite efforts by large companies like Apple, Google, and Microsoft to eradicate them. This article presents some basic facts about ASLR, focusing on the Windows implementation. In addition to covering what ASLR accomplishes to improve security posture, we aim to give defenders advice on how to improve the security of their software, and to give researchers more insight into how ASLR works and ideas for investigating its limitations.Memory corruption vulnerabilities occur when a program mistakenly writes attacker-controlled data outside of an intended memory region or outside intended memory’s scope. This may crash ... Read More

1K+ Views
As we know in context of computer/system, the main key feature on which the whole performance get dependent is Memory. It is memory and its allocation which make the system to perform fast and efficient. Now on the basis of organizing of this memory in the system, we can distinguish between Simultaneous and Hierarchical Access Memory Organisations.Following are the important differences between Simultaneous and Hierarchical Access Memory Organisations.Sr. No.KeySimultaneous Access Memory OrganisationsHierarchical Access Memory Organisations1DefinitionSimultaneous Access Memory Organisations is the memory organizing technique in which CPU can interact with multiple memory levels at same time and gets data interaction. This ... Read More

3K+ Views
Both basic disk and dynamic disk are disk configurations available in Windows Operating System. A basic disk is from initial days of DOS, Windows to till date. Dynamic Disk is available from Window 2000 onwards.Basic DiskBasic Disk Configuration works on the concept of partition, partition table, and logical drives. A disk can have up to four partitions or three partitions and one extended partition with multiple logical drives. The following operations can be performed in basic disk configuration.Create/Delete primary/extended partition.Create/Delete logical drives within an extended partition.Format a partition and mark as active.Dynamic DiskDynamic Disk Configuration works on the concept of ... Read More

1K+ Views
Data PathsCPU has two sections, data section and control section. Data section is also called data paths. Registers, ALU and interconnection bus collectively constitutes a data path. Data paths are of three types:Single CycleMultiple CyclePipelineFollowing are some of the important differences between Single Cycle, Multiple Cycle and Pipeline data paths.Sr. No.KeySingle CycleMultiple CyclePipeline1CycleSingle Cycle has one CPI (Clock Cycle Per Instruction).Multiple Cycle has variable CPIs.Pipeline has fixed no. of CPIs.2Instruction divisionIn single cycle, instruction is not divided per CPI.In multiple cycle, an instruction can be divided in arbitrary steps.In pipline, an instruction is divided one step per pipeline stage.3Instruction divisionIn ... Read More

3K+ Views
A SAN is a network of storage devices that can be accessed by multiple servers or computers. It provides a shared pool of storage space. Each computer on the network can access the storage on the SAN as though they were local disks connected directly to the computer. SAN uses SCSI and SATA protocols.NAS are storage devices that are linked to a network and provide file access services to computer systems. These devices generally include an engine that executes the file services and one or more devices on which data is stored. NAS uses file access protocols such as NFS ... Read More

13K+ Views
Preemptive Scheduling is a CPU scheduling technique that works by dividing time slots of CPU to a given process. The time slot given might be able to complete the whole process or might not be able to it. When the burst time of the process is greater than CPU cycle, it is placed back into the ready queue and will execute in the next chance. This scheduling is used when the process switch to ready state.Algorithms that are backed by preemptive Scheduling are round-robin (RR), priority, SRTF (shortest remaining time first).Non-preemptive Scheduling is a CPU scheduling technique the process takes ... Read More

9K+ Views
This article helps us to add a new disk to LVM ( Logical Volume Manager), the very best advantage of LVM over normal disk partitions is its support for “dynamic partitions”; you can create and resize (expand or shrink) LVM volumes dynamically as we needed. There is no limit of the physical disk boundary in LVM logical volumes, so you can create a large LVM volume that spans across multiple smaller physical disks. This flexibility partitioning allows you to manage storage space more efficiently as disk usage change from time to time.If you want to add new disks to an ... Read More

701 Views
In this article, we will learn how to add a new hard disk drive to Linux OS, Assuming the drive is visible to the BIOS, it should automatically be detected by the operating system. Typically, the disk drives in a system is assigned to a device name beginning with ‘hd’ or ‘sd’ followed by a letter to indicate the device number. For example, the first device might be /dev/sda, the second /dev/sdb and so on.The following is the output from a system with only one physical disk drive.# ls /dev/sd* /dev/sda /dev/sda1 /dev/sda2 /dev/sdbThis shows that the disk drive represented ... Read More

360 Views
Apt-get is the command-line utility for dealing with applications and may be considered for the person’s “back-end” to other tools for making use of the APT library.Apt-cache performs a variety of operations on APT’s package.This article explains about -“Basic Commands of APT-GET and APT-CACHE for Package Management”.Apt-getTo get the more options about apt-get, use the following command as shown below –$ apt-get -hThe sample output contains the following options as shown below –update - Retrieve new lists of packages upgrade - Perform an upgrade install - Install new packages (pkg is libc6 not libc6.deb) remove - Remove ... Read More