
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1217 Articles for MCA

290 Views
Let us understand the concept of flutter.FlutterFlutter is a cross-platform UI toolkit that enables us to generate fast, magnificent, inherently compiled applications for mobile, net, and desktop using Dart programming languages. It develops the app with one programming language and an individual codebase. It is free and open-source. Google created it in May 2017 and is supervised by an ECMA standard. It is an increasing technology in popularity to pass superior native experiences.The main characteristic of Flutter is its quick and persistent response towards changing something. These changes can be associated with changes in code on hardware, emulators, and simulators. ... Read More

2K+ Views
Let us begin by understanding the concept of checksum.ChecksumA checksum is a value that can verify the integrity of a document or a data transfer. Checksums are generally used to compare two sets of data to create sure they are equal.There are various common applications that contain verifying a disk image or testing the integrity of a downloaded file. If the checksums don't match those of the original documents, the data can have been changed or corrupted.A checksum can be calculated in several different ways, using different algorithms. For example, a basic checksum can simply be the multiple bytes in ... Read More

2K+ Views
Firstly, let us learn about laptops.LaptopA laptop is a computer designed for flexibility. It is a lightweight computer that generally weighs 4-8 pounds (2 to 4 kilograms), based on display size, hardware, and multiple factors. A laptop computer is also called a notebook.Laptop computers can be modified into desktop computers. All peripheral devices including printers, scanners, and external drives are smoothly connected to the docking station so the laptop is only required to be plugged into the station and turned on.Even regular keyboards and displays can be used with a laptop with the right hardware and software configurations.Switching between a ... Read More

419 Views
Let us begin by understanding what a trademark is.TrademarkA Trademark is represented as a “brand” or “logo”. A trademark is a set of letters, words, sounds, or designs that categorize one company’s goods or services from those of others in the forum. Trademark protection is applicable for specific names, symbols, devices, or words that will be used in connection with a good or service. Technically, if a specific mark is related to a service, it is known as a "service mark, " but a trademark is generally used to define both marks related to services and goods.The goal of trademarks ... Read More

1K+ Views
Let us begin by learning about the internet.InternetThe Internet is the biggest network that connects millions of computers worldwide. It is a team of a network including public, private, government, universities, school, and other academic and business networks linked by several technologies including wireless, optical, and electronic.Internet usage is the calculation (defined in bytes, kilobytes, megabytes, or gigabytes) of the amount of data streaming through your computer and the Internet network for a specific time. These data are shared in both directions such as from the Internet network to your device (download), and from your device to the Internet network ... Read More

702 Views
Let us begin by understanding what an IP Camera is.IP CameraIP camera is a network digital camera that need the Internet Protocol (IP) and has its IP address. An IP camera is used when defining video surveillance cameras.An IP camera uses an Ethernet cable and sends a digital signal. This type of camera can be simply networked and can send a signal to a network video recorder (NVR) placed on a local or remote network.IP cameras tend to capture better quality pictures, which is especially beneficial in the case of transferring targets, as frame rates can be adjusted according to ... Read More

597 Views
Let us understand what a hardware firewall is.Hardware FirewallHardware firewalls are frequently built within the base of broadband routers and are an essential part of a network setup, particularly on a broadband connection. A hardware firewall can be very adequate with minimal or no configuration and can guard each device on the local network. It facilitates packet filtering to test a packet’s header for source and destination analysis, which data is then compared with a group of pre-defined security rules.The packet will be forwarded if it meets the rules or is dropped. Although any user with some computer knowledge can ... Read More

396 Views
Let us begin by learning about VPN.VPNVPN stands for the virtual private network. It is an encrypted connection over the web from a device to a network. The encrypted connection supports that sensitive information is safely communicated. It avoids an unauthorized person from eavesdropping on the traffic and enables the user to organize work remotely. VPN technology is broadly used in corporate environments.A VPN protects your IP address by allowing the network to redirect it through a particularly configured remote server run by a VPN host. This defines that if you surf online with a VPN, the VPN server becomes ... Read More

1K+ Views
Anycast is a method for routing network traffic where the sender distributes packets to a destination that is adjacent to it in terms of network topology. The features of Anycasting is that the networking approach can allow for messages to be shared to a team of receivers that all have the similar destination address.The Anycast method is one address and routing methodology compared with others including unicasting. Unicast facilitates a one-to-one connection between a server and a destination address. There are different procedures like multicast and broadcast that send signals from one point to multiple points.Anycasting is ruled by the ... Read More

2K+ Views
Let us begin by understanding what WEP is.WEPWEP stands for Wired Equivalent Privacy. It is the generally used Wi-Fi security protocol in the world. WEP was produced as a Wi-Fi security requirement in 1999, September.The first form of WEP was not especially strong, even for the time they were launched, because U.S. regulation on the export of several cryptographic technologies led to manufacturers confining their devices to only 64-bit encryption. When the condition was lifted, it was raised to 128-bit. In spite of the introduction of 256-bit WEP, 128-bit remains one of the most common implementations.WEP was destined to support ... Read More