
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ayushi Bhargava has Published 143 Articles

Ayushi Bhargava
2K+ Views
Layer 3 or the Network layer employs IP, or Internet Protocol, which is a connectionless protocol that processes each packet independently, resulting in a lack of transmission dependability. When data is transmitted from one host to another, each packet, even though it belongs to the same session, may travel a ... Read More

Ayushi Bhargava
16K+ Views
Secure Sockets LayerSecure Sockets Layer (SSL) is a standard technique for transmitting documents securely across a network. SSL technology, created by Netscape, establishes a secure connection between a Web server and a browser, ensuring private and secure data transmission. SSL communicates using the Transport Control Protocol (TCP).The term "socket" in ... Read More

Ayushi Bhargava
7K+ Views
SONET is a standardized digital communication protocol that uses a fiber optic medium to transfer huge amounts of data across great distances. Multiple digital data streams are transmitted via optical fiber at the same time utilizing LEDs and laser beams in SONET.Synchronous optical networking (SONET) and synchronous digital hierarchy (SDH) ... Read More

Ayushi Bhargava
7K+ Views
What is an Information System?A formal, sociotechnical organizational system designed to gather, process, store, and disseminate information is known as an information system (IS). Information systems comprise four components from a sociotechnical standpoint − task, people, structure (or roles), and technology.Information systems consist of members that gather, store, and process ... Read More

Ayushi Bhargava
3K+ Views
Many companies have prioritized migration to IPv6 since there is practically no inventory of IPv4 addresses left. However, switching to IPv6 without a lengthy transition procedure is next to impossible. This is due to the fact that IPv6 has never been backward compatible with IPv4. This implies that when hosts ... Read More

Ayushi Bhargava
323 Views
A Sybil Attack subverts a network service's reputation system by establishing a large number of pseudonymous identities and using them to wield disproportionately great power. It's called after Sybil, the protagonist of the novel Sybil, which is a case study of a lady diagnosed with a dissociative identity disorder. Sock ... Read More

Ayushi Bhargava
264 Views
BiometricsBody measurements and computations linked to human traits are referred to as biometrics. Biometric authentication is a type of identification and access control used in computer science. It's also used to track down individuals in groups that are being watched.Individuals are labeled and described using biometric identifiers, which are unique, ... Read More

Ayushi Bhargava
5K+ Views
Restoration failure can be a complicated issue, especially for distributed systems, where there may be multiple participating devices and multiple failure points. It is very instructive to find different roles in the program and ask each one, "What would happen if that part of the program failed?" Designing a reliable ... Read More

Ayushi Bhargava
1K+ Views
What is TCP?The Transmission Control Protocol (TCP) is a network communication protocol that allows data packets to be sent across the Internet.TCP is an OSI transport layer protocol used to connect remote computers by conveying and ensuring message delivery through supporting networks and the Internet.Transmission Control Protocol is a member ... Read More

Ayushi Bhargava
693 Views
Long-Polling, Websockets, Server-Sent Events (SSE), and Comet are some of the ways for the client-side to connect with the server-side in real-time. These are discussed in the next paragraphs.Long PollingThis is a technique in which a client asks for information from a server but does not anticipate a response right ... Read More