
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 86 Articles for Science & Technology

948 Views
UNIX copyrighted Operating system which is used by IBM AIX, Sun Solaris and HP-UX etc., Most of the UNIX systems are commercial in nature.Linux is considered as UNIX clone. But the traditional companies won't accept "Unix-like" but want the Unix trademark. Linux Is Just a Kernel and not the complete Operating system.When it comes to administration, Linux is considered as most user-friendly operating systems. Unix and Linux use a different set of tools for back up of data. However, they both share some common tools such as tar, dump/restore, and cpio etc.

183 Views
Here are some of the latest Apple products unveiled at Worldwide Developers Conference (WWDC) in June 2017.iMac ProApple introduced a brand new model for existing iMac which is focused on offering strong performances.All new iMac pro comes out with a 27-inch screen with 5K display and space gray finish.Now, the iMac will feature Intel Xenon processors with 8, 10 and 18 core options. It also comes with 128GB memory and one TB of storage space. It has 3 USB-c ports and includes new Radeon Vega graphics. It will be priced around 5000USD.iMacApple also announces upgrades for existing iMac systems. All ... Read More

637 Views
A procedure should be followed for encrypting an MS word document. Encryption is nothing but protecting your document from a third party. First, let us look into the definition of encryption.What is Encryption? How do we use Encryption?The word encryption is derived from the Greek word Kryptos means hidden or a secret.There are certain algorithms to use encryption like RSA algorithms and Diffie-Hellman key exchange algorithms.These algorithms led to the use of encryption in commercial and consumer realms to protect data.The password is the best example of encryption.Encryption is used in sending data across all the networks and ATM is ... Read More

179 Views
Smartphones are useful for many purposes and one of the less typical use cases are digitizing documents. There are many scanning applications in Android and choosing between those applications is a tough choice. Google play store provides ‘n’ number of scanning applications with different features.In recent times many high-end mobiles have been launched which provide best camera quality which as equal an iPhone camera or DSLR camera quality. But the problem with them is we cannot convert the captured images into PDF and Word formats. We need specific converters for changing the type of image file into the desired format.The ... Read More

666 Views
A procedure should be followed for encrypting an MS Excel. Encryption is nothing but protecting your document from a third party. First, let us look into the definition of encryption.What is Encryption?The word encryption is derived from the Greek word Kryptos means hidden or a secret.There are certain algorithms to use encryption like RSA algorithms and Diffie-Hellman key exchange algorithms.These algorithms led to the use of encryption in commercial and consumer realms to protect data.The password is the best example of encryption.Encryption is used in sending data across all the networks and ATM is also one of the examples for ... Read More

3K+ Views
Microsoft Office provides you with a feature of encrypting or protecting your powerpoint presentations from opening and modifying by other people. Even if you allow others to change your document, still you can restrict the changes others can do to your document.The only hitch is Microsoft cannot retrieve your forgotten passwords. So be careful with your passwords.The encryption offered by Microsoft is very strong. In a word document, you need not to change the encryption length unless you have a specific reason to alter the settings. Microsoft uses AES with a 128bit key, plus SHA1 salt and cipher block chaining ... Read More

307 Views
Well, if you are looking to learn a programming language for your career growth and advancement there are many programming languages out there. There are hundreds of programming languages on the web which can be learned online itself. There is no particular programming language which will help you in your career growth.Programming languages are dynamic in nature and one has to adopt any new technology by learning new programming languages. Of course, there are some popular programming languages which will help you in terms of career growth.SQLSQL(Structured Programming Language) is a popular programming language in the present scenario.It has been ... Read More

232 Views
Information Technology Infrastructure Library (ITIL) is the framework that is designed to standardize the planning, selection, and delivery of IT services to a business. The goal of ITIL is to improve efficiency and also achieve predictable goals or targets. An ITIL enables an IT professional to be a business service partner, not just back-end support.ITIL Foundation ExaminationIt is a closed book examination.It consists of 40 questions.Each question has multiple choices.One mark is allotted for the correct answer.The duration of the exam is one hour.One has to score 65% of the marks to pass the examination i.e minimum 26 questions must ... Read More

942 Views
In the present day fast-forward culture, everything should happen at jet speed. People do businesses across continents and Airplanes are a very convenient way to travel. But many people are not delighted to travel above 35, 000 feet up in the air.How High can a Plane FlyEvery airplane has a certified maximum altitude. The highest certified altitude of an airliner was Concorde's 60, 000 feet. Many of the corporate jets can fly at 51, 000 feet.Regular passenger international flights fly between 35000 to 42000 feet. That is considered as optimum height. "Each individual aircraft has an optimum altitude (for minimum ... Read More

279 Views
In this digital world, life has become very easy. Gone are the days to reach out to your TV remote to change the channel. Turn your mobile into a Universal remote control using some very accessible and simple apps and enjoy operating your smart TV, home theatre systems and streaming boxes without putting down your mobile.There are a number of apps that you can download directly to your smartphone or Android devices with IR blasters. The Android phones with these IR blasters can enable the mobile to communicate with any device that takes the command via infrared light beams. There ... Read More