Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Website Articles
Page 10 of 22
Difference Between Hypertext and Hypermedia
In this post, we will understand the difference between hypertext and hypermedia −HypertextIt refers to the system of managing the information related to the plain text.It involves only text.It becomes a part of the link.It is the part of hypermedia.It allows the user to traverse through text in a non-linear fashion.It allows users to move from one document to another in a single click.The user can click on the hypertext or the ‘goto’ links.It helps the user move to the next document.It also helps the user move from one page of a document to the other page.It doesn’t provide a ...
Read MoreHow to find your Current Wifi Password and Secure it?
Do you see your devices connected to your Wifi-network, but presently are you are facing problem recollecting your Wifi password, which you have previously used and connected all your devices with your Wifi network.The reason as to why you may have forgotten your Wifi password is, you would have clicked on the box, which states remember the password. This helps you escape the pain of entering your password every time when you login to your device. Days would have passed and you might not remember what password you have kept for your Wifi-Network. Another reason, as to why many people ...
Read MoreHow to Hide Data on your Smartphone
Your smartphone is your personal device which stores many of your personal files and data. There may be several reasons you would want to hide your data which includes private photos, videos and messages. If you want to hide a file from prying eyes on your smartphone, then it’s incredibly important that you can learn some methods for hiding files or folders so that you can properly store and sort files as needed.There are ways you can hide files on your phone with ease. Some of these methods don’t need any apps while some of them include various apps which ...
Read MoreHow to Track Lost Smartphone with Google?
We live in an era in which we can do a lot more than just calling with our phones, hence the name ‘smartphones’. Calling, messaging, clock, calculator, these were just the mere facilities of the older generation. Now these gadgets can do so much more! Loads of apps, games, e-books, etc. are available to the customer for entertainment and education.Smartphones being such an important part of our lives now, containing so much of our private information have had a huge impact. But what if your phone is lost, well that’s exactly where this article kicks in!We have two different methods ...
Read MoreHow to Secure The SSHD Using Fail2Ban on RHEL 7.x/CentOS 7.x
In this article, we will learn how to install and configure to secure the SSH connection using Fail2ban on CentOS 7, as we all get connected to the servers using the SSH which is secured and SSH will get exposed to the internet to work properly, there may be a risk of being targeted in this way, if we see the logs for these services. We often see the repeated logins using the brute-force attacks.Installing the Fail2banAs the Fail2ban is not available in the official CentOS repository, we need to update and install the package using EPEL project, then we ...
Read MoreImportance of Internships to College Students
There is something in internships that is all the more inescapable than the sweet fragrance of a rose flower – Learning. An adage suggests, “Learning is not preparation for life; Learning is life itself.” Learning in every point of life is cardinal in its own way. When students experience a continuous learning environment, they get an opportunity to explore diverse and unexplored territorial domains. What thus follows is a phantasmagoria of constructive and highly rewarding events. This eventually leads to new ideas. Internships are cherished by students and multiple internships are mandated in a few reputed organizations.Here is a curated ...
Read MoreKnow Your Project Contract Before Signing
Depending upon the nature of business, it is often seen that many organizations outsource some portions of their work to a third party vendor instead of doing on its own. And to define a clear working procedure between the two parties they agree to sign a contract, which is a legal agreement between your organization and the service provider or vendor, where both the parties are bound to abide the terms and conditions stated in the contract.A contract is a mutually agreed legal document where one party is the service provider i.e. seller and the other one is the receiver ...
Read MoreISO The Buzzing Word
Around the industry, everyone is talking about attaining and acquiring ISO standards for their Organizations. ISO has grabbed the market very fast and has become a quality measurement parameter. However, what exactly is ISO and what is the process of attaining this certification?To understand this more effectively, let us first understand what is Quality. Quality can be implied as a measure of degree of excellence. With better quality comes better service and value for money. Quality can mean different things to different people. For some people, Quality can mean doing the right job at the right time, for some Quality ...
Read MoreSnagit Tool: Taking Better Screenshots the Easy Way
A very common need for anyone who works on computers and laptops is taking screenshots of the browser or application window that they are working with. Although the task seems easy, it can be tedious at times. Generally, if you want to take a screenshot you will use the shortcut keys on your Windows system, paste it to Paint and then modify them accordingly. However, this comes with a few drawbacks:You have to use shortcut keys and paste to Paint.You can’t take screenshots of a part of screen (without cropping it in Paint later).If you are taking screenshot of a ...
Read MoreRequirements Gathering By Business Analysts
A great user experience is all about enabling the end users to achieve their objective be it a website, a software system or a product. In order to fulfill their needs, we need to understand their work and the context of their work. The first and basic phase of software development life cycle is requirements gathering. They give clear, concise and agreed set of customer requirements that the software should provide. Business analyst and subject experts are responsible for requirement gathering process.Business customers have a tendency to expect software teams to be mind-readers, and to deliver a solution based on ...
Read More