
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Bhanu Priya has Published 1449 Articles

Bhanu Priya
2K+ Views
A cyber-crime is a criminal act in which someone targets a computer or a network of devices in order to gain illegal rights, steal data from them, frauds etc. This type of crime is carried out using technology which primarily takes place online.Some cyber-crime includes the following −HarassmentCyber-stalkingBullyingTypes of Cyber-crimesThe ... Read More

Bhanu Priya
151 Views
Let us understand the concepts of Yandex Disk and Zetta before learning the differences between them.Yandex DiskYandex is a Russian company which is famous for its Yandex search engine. It is one of the biggest technology companies which provide various kinds of products and services. It is also popular for ... Read More

Bhanu Priya
128 Views
Let us understand the concepts of Amazon Drive and TitanFile before learning the differences between them.Amazon DriveAmazon is one of the most used online retail businesses started in the year 1994 as an online bookstore. Now it has become the world’s one of the largest online retail businesses that is ... Read More

Bhanu Priya
130 Views
Let us understand the concepts of CloudMe and ZumoDrive before learning the differences between them.ZumoDriveIt was owned by Zecter in the year 2009 and is the hybrid cloud storage which is used to store all your media. It is supported by Windows, macOS, Linux, iOS, Android, webOS operating system.It is ... Read More

Bhanu Priya
257 Views
Let us understand the concepts of Phishing and Spear Phishing before learning the differences between them.PhishingIt is generally done to obtain sensitive information like credit card pins, email id password, social messaging site password .It is a technique or method by which the attacker tries to access the data of ... Read More

Bhanu Priya
813 Views
The full form of WPS is WIFI Protected Setup and it is a newly invented method. In this method a new device is added to the wireless network access point using just a Password or a Pin or simply by clicking a button.When a user pushes a button on the ... Read More

Bhanu Priya
3K+ Views
The Long Term evolution is one of the standards for high speed wireless communication for mobile devices and data terminals based on the GSM and HSPA technologies. It helps in increasing the capacity and speed by using a different radio interface with core network improvement.LTE is an upgrade path for ... Read More

Bhanu Priya
8K+ Views
Let us understand the concepts of twisted pair cable, optical fiber cable and coaxial cable before learning the differences between them.Twisted Pair CableTwisted pair cable is made up of two insulated conductor wires twisted together.AdvantagesThe advantages of Twisted Pair cable are as follows −Inexpensive and readily available.FlexibleLight WeightEasy to setup ... Read More

Bhanu Priya
288 Views
Let us understand the concepts of Malware and Spyware before learning the differences between them.SpywareIt is a software program which can be installed on some user's personal computer or organization without their knowledge to gather personal information or view their browsing activities.We can defend Spyware by doing proper internet browsing, ... Read More

Bhanu Priya
115 Views
Let us understand the concepts of Wasabi and Box before learning the differences between them.BoxBox is the Secure Content Cloud, easy-to-use platform that is built for the entire content lifecycle, from starting of file creation and sharing, to co-editing, signature, classification, and retention. We can work securely from anywhere.It was launched ... Read More