
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1217 Articles for MCA

36K+ Views
In digital electronics, both combinational and sequential circuits are the most widely used circuits. These are two broad categories of circuits defined in the digital electronics where one type of circuit is independent of time and other is dependent on time. Read this article to find out more about combinational circuits and sequential circuits and how these two circuits are different from each other. Let's start with a basic overview of combinational and sequential circuits so that it becomes easier to understand how they are different from each other. What is a Combinational Circuit? A combinational circuit is one whose ... Read More

13K+ Views
Both Block cipher and Stream cipher belong to the family of symmetric key ciphers which are the basically encryption methods primarily used for converting the plaintext into ciphertext directly.Go through this article to find out more about the features of block ciphers and stream ciphers and how they are different from each other.What is Block Cipher?A block cipher is a symmetric cryptographic technique that uses a shared, secret key to encrypt a fixed-size data block. During encryption, plaintext is used, and ciphertext is the resultant encrypted text. The plaintext and ciphertext are both encrypted using the same key.A block cipher ... Read More

513 Views
As we know that both DES and AES are the type of symmetric key block cipher which are used in such encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. Now on the basis of characteristics we can distinguish between AES and DES.Following are the important differences between DES and AES ciphers.Sr. No.KeyDES CipherAES Cipher1DefinitionData Encryption Standard also known as DES is a symmetric key block cipher that was introduced in the ... Read More

22K+ Views
Both Synthesized and Inherited Attribute are the part of semantics of a language that provide meaning to its constructs, like tokens and syntax structure. Semantics help interpret symbols, their types, and their relations with each other and its analysis judges whether the syntax structure constructed in the source program derives any meaning or not. Now on the basis of features of attributes we can distinguish between Synthesized and Inherited AttributesFollowing are the important differences between Synthesized and Inherited Attributes.Sr. No.KeySynthesized AttributeInherited Attribute1DefinitionSynthesized attribute is an attribute whose parse tree node value is determined by the attribute value at child nodes.To ... Read More

9K+ Views
In digital electronics, a counter is a sequential logic circuit that consists of a series of flip-flops. As the name suggests, counters are used to count the number of occurrences of an input in terms of negative or positive edge transitions.Based on the way the flip-flops are triggered, counters can be grouped into two categories: Synchronous counters and Asynchronous counters.Read through this article to find out how these two types of counters function and how they are different from each other.What is a Synchronous Counter?If the "clock" pulses are applied to all the flip-flops in a counter simultaneously, then such ... Read More

3K+ Views
The IEEE 802.16 is a set of standards defining the specifications for wireless broadband technology. It has been commercialized as Worldwide Interoperability for Microwave Access (WiMAX) that is responsible for the delivery of last-mile wireless broadband access. It lays down the standards for both physical layer as well as medium access control (MAC) layer for WiMAX.The IEEE 802.16 MAC sublayer is a part of the data link layer. The data link layer of WiMAX is divided into three sublayers as follows −Security sublayer − This is the bottommost layer and is concerned with the security and privacy of the wireless ... Read More

3K+ Views
The IEEE 802.16 set of standards lays down the specifications for wireless broadband technology. It has been commercialized as Worldwide Interoperability for Microwave Access (WiMAX) that is responsible for the delivery of last-mile wireless broadband access.The IEEE 802.16 MAC sublayer is the most important sublayer and concerned with channel management. It has been designed for connection-oriented channel management for point-to-multipoint (PMP) broadband services.The frame format of a generic MAC frame is shown below −The fields are −EC − A single-bit field indicating whether the payload is encrypted.Type − A 6-bit field identifying frame type.CI − A single-bit field denoting the ... Read More

4K+ Views
A Token Bus Network is a network protocol used to transmit data. In a Token Bus Network, a virtual ring is formed between nodes/stations and token is transferred from one station to another in a sequential manner. Each node in a Token Bus Network knows the address of its successor and predecessor and can transmit data if it has the token. A Token Ring Network is similar to a Token Bus Network but it works around the physical ring instead of a virtual ring. A token is passed from one node to another in a sequential manner and each node ... Read More

25K+ Views
Both CSMA/CA and CSMA/CD are network protocols for transmission that operate in the Medium Access Control Layer, however there are significant differences in the way they operate. Read through this article to find out more about CSMA/CA and CSMA/CD and how they are different from each other.What is CSMA/CA?CSMA/CA is a network protocol for carrier transmission that stands for Carrier Sense Multiple Access with Collision Avoidance. It works in the same media access control layer as CSMA/CD. This protocol is effective before the collision.Algorithm of CSMA/CAThe algorithm of CSMA/CA is as follows −When a frame is ready, the transmitting station ... Read More

3K+ Views
Unshielded Twisted Pair or UTP are twisted pair cables that are used to transmit both data and voice, as their frequency range is suitable for transmission. UTPs are more cost-effective and are not needed to be grounded. Shielded Twisted Pair or STP are also a twisted pair cables but are required to be grounded, wants more maintenance, have high data transmission capacity and are costlier than UTP. Read through this article to find out more about UTP and STP cables and how they are different from each other. What are Shielded Twisted Pair (STP) Cables? IBM invented shielded twisted pair ... Read More