
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1045 Articles for Internet

218 Views
Domain names will always have an extension which is also called a TLD (Top Level Domain).Examplemyworld.com (. Com used for Commercial for-profit websites)myworld.net (. Net used for Network-related domains)myworld.org ( .org used for Non-profit organizations)When we are making websites, we can choose from a wide range of domain extensions. The extensions are originally created for different types of websites each having a specific meaning.We have to choose a domain name extension which fits your business while helping you build a recognizable brand in your industry..comWe use .com domain name because the .com domain name indicates a commercial site. .com is ... Read More

6K+ Views
A protocol is nothing but a set of rules which are followed by the communicating entities for data communication.The protocol depends on the following −Syntax − Syntax is the format of data which is to be sent or received.Semantics − Semantics is the meaning of every section of bits that are transferred.Timings − It refers to the time at which data is transferred as well as the speed at which it is transferred.The communication between the computers in the Internet is defined by different protocols. The protocols TCP (Transmission Control Protocol) and IP (Internet Protocol) build on the basis of ... Read More

409 Views
Let us see the difference between Zoom vs Google Meet vs Webex by comparing their installations, features, strengths and weaknesses.ZoomThe installation requirements for Zoom are as follows −An internet connection (wired/wireless) with a minimum of 600 kbps (up/down) for 1:1 calling and 1 mbps (up/down) for group calling.Speakers and microphone (external or internal or even over Bluetooth).A webcam (built-in or USB plug-in)An internet browser or the zoom applicationA minimum of a single core 1Ghz processor or a dual core processor with 4GB of RAMFeaturesThe features of Zoom are as follows −Built-in tools for screen-sharingSupport for up to 1000 participants and ... Read More

729 Views
Token ring is a physical unidirectional ring, where the systems are connected to the ring through some interface.In the token ring a special frame is called a token which is always circulated on the ring. If a system has to transmit then it needs to acquire the token without a token no system can transmit. Only one system can transmit at a time. Hence it is collision free protocol.The token ring source is responsible for removing the frame from the ring. In normal token ring operation, a station sending information holds the token until the sending data circles the entire ... Read More

2K+ Views
Network is a connection of two or more systems which are used to share resources and information.Network CommunicationFlow of information among the group of members is a communication network. Network helps managers to establish contacts in different patterns through communication flows.The network depends on the magnitude of the organisation, nature of communication channels in the organisation and the number of persons involved in the process. There can be many patterns of communication networks.Function of Communication devicesThe functions of communication networks include the following −It is the way of coordinating the activities of individuals, relationships, groups and other sub-units within the ... Read More

720 Views
Dynamic Host Configuration Protocol (DHCP) is a network management protocol which is used to automate the process of configuring devices on IP networks. Therefore it allows them to use network services like DNS, NTP or any other communication protocol based on UDP or TCP.DHCP snoopingDHCP snooping is a series of techniques in computer networking, which are applied for improving the security of a DHCP infrastructure.When DHCP servicers are allocating IP addresses to the client on the LAN, DHCP snooping can be configured on LAN switches in order to prevent malicious or malformed DHCP traffic, or rogue DHCP servers.Apart from that, ... Read More

5K+ Views
Netcat is a networking utility with the help of TCP/IP protocol which reads and writes data across network connections. Netcat is built as a secure back-end tool and can be used to send files from a client to a server and back directly with other programmes and scripts.At the same time, it's a network debugging and exploration platform rich in features that can define network parameters while also creating a tunnel connection to a remote host.Although Netcat can do many things, its primary objective and most desirable features are as follows −To build a connection from the server to the ... Read More

974 Views
The full form of WWW is World Wide Web which is the internet that we are using nowadays. Tim Berner’s lee, a British scientist in CERN, invented the World Wide Web (WWW) in 1989.Originally it was meant to meet the demand for automatic information sharing between scientists of universities and institutions around the world.Later on the commercial potential in web makes the growth of web in an exponential paced manner. It is kind of a store where all the websites and documents are stored and we access those using different websites and their domains. The resources are transferred to us ... Read More

393 Views
The Full form of AURP is “AppleTalk Update-based Routing Protocol”. AppleTalk tunnelling permits a corporation chairman to associate a minimum of two local internets through an unfamiliar organization framework to shape a huge wide region organization (WAN).ExampleAn AppleTalk WAN may comprise of a minimum of two local AppleTalk internets associated through a tunnel supporting a TCP/IP web. In such an AppleTalk WAN, local internets use AppleTalk protocols, while the unfamiliar organization framework utilizes an alternate protocol family. A tunnel is often either an unfamiliar organization framework or a highlight point interface.There are two kinds of tunnels, double endpoint tunnels and ... Read More

659 Views
Near-me Area Network (NAN) may be a sensible communication network centred around communication between remote devices, for instance, Smartphones and private Digital Assistants then on inside a closeness area. This Near-me Area network is worked over existing actual network foundations.In basic during a Local Area Network (LAN) all of the associated devices are within the same network segment yet if there should arise an event of Near-me Area Network the associated devices over NAN could be utilizing diverse network frameworks.For instance, consider two smartphone clients who are geologically close however utilizing network administrations from various mobile transporters.Regardless of whether the ... Read More