Ayushi Bhargava has Published 145 Articles

What are Long-Polling, Websockets, Server- Sent Events (SSE) and Comet?

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:27:05

466 Views

Long-Polling, Websockets, Server-Sent Events (SSE), and Comet are some of the ways for the client-side to connect with the server-side in real-time. These are discussed in the next paragraphs.Long PollingThis is a technique in which a client asks for information from a server but does not anticipate a response right ... Read More

Web Caching and Conditional GET Statements

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:25:30

980 Views

What is Web Caching?The activity of saving data for reuse, such as a copy of a web page supplied by a web server, is known as web caching.It is cached or saved the first time a user accesses the page, and a cache will deliver the copy the next time ... Read More

What is the difference between Authentication and Authorization?

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:24:53

666 Views

What is Authentication?Authentication is the act of establishing the same claim as users identify on a computer system. As opposed to identification, authenticity is the process of verifying a person's or thing's identification. Personal identification must be validated, the website's validity must be validated with a digital certificate, the relic ... Read More

XMODEM File Transfer Protocol

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:23:14

1K+ Views

XMODEM is a standard file transfer process developed by Ward Christensen in 1977. It sends data-related data blocks and awaits receipt of block receipt. XModem is used in both hardware and software.XMODEM is a half-dup communication protocol with an effective error detection device.It violates the original data in a series ... Read More

What is Wireless Application Protocol (WAP)?

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:22:05

1K+ Views

WAP is a collection of communication protocols meant to standardise how wireless devices, such as mobile phones and radio transceivers, may access the Internet and its services, such as email and newsgroups. Prior to the advent of WAP, Internet connection was available, but various manufacturers utilised different technologies; WAP promised ... Read More

What is E-Governance?

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:21:14

2K+ Views

E-governance offers vital opportunities to employ electronic means to push sensible governance. It applies data technology to government processes and functions to attain easy, ethical, accountable, and clear governance. This includes the dissemination of data, and quick and effective communication.With the formation of a lot of comprehensive and multi-stakeholder approaches, ... Read More

WiMax in Computer Network

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:19:57

2K+ Views

What is WiMAX?WiMAX stands for "Worldwide Interoperability for Microwave Access, " a telecommunications standard that describes fixed and fully mobile Internet access services. The protocol follows some aspects of the IEEE 802.16 Standard.WiMAX products and services are most likely to be found in "last mile" applications. WiMAX enables ISPs and ... Read More

What is a Wireless Local Loop (WLL)?

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:18:08

10K+ Views

Wireless Local Loop (WLL) is a generic word for an access system that connects users to the local telephone company's switch via wireless links rather than traditional copper cables. This system, also known as fixed wireless access (FWA) or fixed radio, provides telephone, facsimile, and data services to business and ... Read More

Working and Types of Smart Card

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:14:45

793 Views

What is a Smart Card?A smart card is a compact microprocessor-based device the size of a credit card that stores and processes data. Smart cards have mostly supplanted conventional magnetic cards since they can store more data and perform more functions. Smart cards are now used in various industries, including ... Read More

What is Vishing (Voice Phishing)?

Ayushi Bhargava

Ayushi Bhargava

Updated on 28-Oct-2021 06:13:33

166 Views

The use of telephony (typically Voice over IP telephony) to perform phishing attacks is known as voice phishing or vishing.Landline telephone services are typically reliable because they are terminated at recognized physical locations and are associated with a bill-payer. However, contemporary Voice over IP (VoIP) technologies like caller ID spoofing ... Read More

Advertisements