
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ayushi Bhargava has Published 143 Articles

Ayushi Bhargava
2K+ Views
What is Proprietary Information?Proprietary information, often known as a trade secret, is the knowledge that a business intends to keep private. Secret formulae, procedures, and methods employed in manufacturing might all be considered proprietary knowledge. It may also comprise its business and marketing strategy, compensation structure, client lists, contracts, and ... Read More

Ayushi Bhargava
1K+ Views
What does it mean to be Open Source?"Open source" is a philosophy that encourages the open use and distribution of a finished product, most commonly software or a program. Still, it can also include the implementation and design of other objects. Because of the need to rewrite vast volumes of ... Read More

Ayushi Bhargava
5K+ Views
Red teaming and blue teaming are a form of ethical hacking technique which involve companies hiring highly trained cybersecurity experts to infiltrate their computer systems, networks, and servers. While many businesses regard prevention to be the gold standard in security, detection and remediation are also critical components of total defensive ... Read More

Ayushi Bhargava
1K+ Views
What is Obfuscation?Obfuscation is the process of making something difficult to comprehend. Programming code is frequently obfuscated to protect individual property or confidential info and prevent an intruder from reverse engineering a proprietary software application.One form of obfuscation is to encrypt all or some of a program's code. Other ways ... Read More

Ayushi Bhargava
271 Views
What is Cyber Security?The beginning of the digitalization era has provided many options for everyone, particularly businesses and enterprises, from mobile banking to online purchasing to reading news and books. Everything is only a click away, but everything comes at a cost. The more you link to digital assets, the ... Read More

Ayushi Bhargava
1K+ Views
What is a Logic Bomb?A logic bomb is a sort of malware that infiltrates software, a computer network, or an operating system with malicious code with the objective of inflicting harm to a network when particular circumstances are fulfilled. It is used to decimate a system by emptying hard drives, ... Read More

Ayushi Bhargava
918 Views
The technique of protecting computers, servers, mobile devices, electronic systems, networks, and data against hostile intrusions is known as cyber security. It's also known as electronic information security or information technology security. Cyber attackers can utilize sensitive data to steal information or get access to a person's or company's bank ... Read More

Ayushi Bhargava
1K+ Views
What is Netiquette?Netiquette is an abbreviation for Internet manners or etiquette, which are principles for polite communication in the internet environment. It covers correct email and internet communication etiquette, among other things. The goal of netiquette, like conventional etiquette, is to help establish a friendly, comfortable, and productive environment for ... Read More

Ayushi Bhargava
193 Views
There was a time, long ago, when a phone's sole purpose was to allow us to make calls, send a few texts, and play Snake. However, now that so much of our data-rich lives are contained within the shells of our smartphones, it's more crucial than ever to keep all ... Read More

Ayushi Bhargava
2K+ Views
Applications and drivers continuously remind users that they are out of the current updates. They always seem to pop up just as you're about to conclude something important.New updates often seem to arrive at the most inconvenient moments. Usually, the easiest option is to ignore. They can be annoying, but ... Read More