
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1217 Articles for MCA

545 Views
STP represents Spanning Tree Protocol. It is a link management protocol created to provide a redundant connection that pause switching loops in the STP web. It is a Layer 2 protocol that runs on bridges and switches, which must be allowed on the switch interfaces.In an STP environment, the switches exchange data between themselves using bridge protocol data units (BPDU) and will then accept in on all ports for this BPDU message. Because a bridge is turned on, it necessarily considers that it is the root bridge in the STP tree.The STP application selects a root bridge and evaluates all ... Read More

380 Views
HAN represents the Home Area Network. It is a network that is set up and managed inside a small border, frequently a house or small office/home office (SOHO). It allows the connection and sharing of resources such as the Internet among computers, mobile and some devices over a network connection.The main hub of a HAN is the router. In some cases, the router is linked to a modem, which connects with an ISP. The modem supports an Internet connection to the router, which consecutively supports Internet access to all connected devices inside the home.In larger homes, a HAN can involve ... Read More

1K+ Views
Let us begin by learning about Google.GoogleGoogle represents the Global Organization of Oriented Group Language of Earth. It is a famous search engine defined in Internet-related services and products. Its main service areas are Online advertising technology, cloud computing, search engines, and software. It is a generally used search engine all over the world.Google has several applications like Google Docs, Adwords, Adsense, Youtube, Gmail, etc. Google Chrome is the most popular and worldwide used web browser in the current era. It is a cross-platform browser created and released in September 2008.Originally, it was launched particularly for Windows but next was ... Read More

3K+ Views
HDLC (High-Level Data Link Control) is a bit-oriented protocol that is used for connection over the point-to-point and multipoint connection. This protocol executes the structure of ARQ (Automatic Repeat Request).The HDLC procedure is controlled by ISO. This is applicable for high-speed communication of a high amount of data, something the essential control process cannot provide.The HDLC process has been regulated and created on the SDLC. It can include characters, bit strings of the needed length can also be shared through this process. The unit of data communication is referred to as a frame.A mode in HDLC is the realigning between ... Read More

1K+ Views
Touch Screen is an essential source of input or output device generally layered on top of a computer visual device. A user provides the input or controls the data processing through individual or multi-touch gestures by touching the screen. It allows the user to connect directly with what is shown, instead of using any intermediate device.Touch Screens have made several devices so easier to use. It is generally used in ATMs as the resistive touch screen system. It includes two electrically conductive layers, one of which is resistant and the new one is a conductive layer. These two layers are ... Read More

1K+ Views
Li-Fi represents light-fidelity. It is a networking technology that uses a clear spectrum instead of radio waves. The technology uses a standard LED light bulb to share information. The LED bulbs are appropriated with a chip that inflicts the light for optical data transmission which is accepted by photoreceptors.A LiFi network uses the light from LED lamps to send information to a device, including a computer or tablet. The device has a receiver to select light signals and an address to send light signals back to the lamp using infrared light.The light from the LED lamps transforms intensity lots of ... Read More

797 Views
PBX represents private branch exchange. It is a private mobile network used within an enterprise. It is a business-oriented phone system created to supply effective voice communications among the users of an organization.It is performing as the phone company’s central office within an organization, a PBX facilitates as the exchange point and point for routing calls.PBX enables users to generate their own telephone network inside a company or organisation. With this system, employees can connect internally for collaboration objectives and externally, with users, shareholders, and several contacts using channels such as VoIP or ISDN.Every device linked to the PBX, from ... Read More

404 Views
Let us understand what the Interior Gateway Routing Protocol (IGRP) is.IGRPIGRP represents the Interior Gateway Routing Protocol. It is a protocol that was generally developed for routing by Cisco Systems in the 1980s. The objective of IGRP is to develop IGRP to support a routing protocol to be used with the autonomous system architectures.IGRP uses a sequence (vector) of metrics. Internetwork delay, bandwidth, dependability, and load are all part of the routing decision. The network controller can set the weighting element for each of these metrics. IGRP uses the authority-set or the default weightings to necessarily calculate optimal routes.IGRP supports ... Read More

528 Views
MITM stands for a man-in-the-middle attack. It is a cyber-attack where an attacker transmits and probably alters the connection between two parties who consider they are communicating precisely. This enables the attacker to transmit communication, investigate, and even change what each party is saying.In MITM, it can define a type of cyberattack where an intruder covertly taps transmissions connecting two entities to check or develop traffic therebetween. Malicious ones can use MitM attacks to seize passwords or multiple sensitive data, snoop on the prey, disrupt links, or distort content.Types of MITMThe types of MITM are as follows −Rogue Access PointDevices ... Read More

3K+ Views
MANET stands for Mobile Ad-Hoc Network. It is an infrastructure-less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies which are composed of bandwidth-constrained wireless links.MANET nodes are supplied with wireless transmitters and receivers. At a given time based on the nodes positions and their transmitter and receiver coverage designs and transmission power levels, wireless connectivity in the structure of a random, multi-hop graph or ad-hoc web exists between the nodes. The current applications of MANETs are in defense services, emergency search, and rescue services, meetings, and conventions, and other scenarios ... Read More