Bhanu Priya

Bhanu Priya

1,060 Articles Published

Articles by Bhanu Priya

Page 44 of 106

What are the differences between Microsoft Teams and Skype?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 815 Views

Microsoft Team is a business communication platform which is developed by Microsoft team as a part of the Microsoft 365 family of products. It offers workspace chat, video conferencing, file storage and application integration.Skype is a Microsoft product which offers free video and audio calling which also has the ability to call landlines and smartphones with paid services anywhere in the world. It has a first mover advantage. It came into existence before the Facebook messenger.DifferencesThe major differences between Microsoft Team and Skype are as follows −Microsoft TeamsSkypeThis is a video conferencing and collaboration tool which exists in 2017, Now ...

Read More

What are the critiques of OSI Model and Protocols?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 2K+ Views

Let us see the detailed analysis and assessment of OSI and TCP/IP protocols.TCP/IPIt is a suite of communication protocols which is used to interconnect network devices on the internet. The Transmission Control Protocol/Internet Protocol (TCP/IP) is also used as a communication protocol in a private network.The entire internet protocol suite is a set of rules and procedures by providing end-to-end communications which identify how it should be broken into packets addressed, transmitted, routed and received at the destination.It is defined to make networks reliable, with the ability to recover automatically from the failure of any device on the network.History of ...

Read More

What are the differences between DCS Network and Field Communication Protocol?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 476 Views

Let us begin by understanding the concepts of DCS Network Communication Protocol and the Field Communication Protocol.DCS Network Communication ProtocolGenerally, a system convention characterizes principles and traditions for correspondence between arranging gadgets. It incorporates components for gadgets to recognize and make associations with each other, and in addition designing standards that determine how information is bundled into messages sent and received. A few conventions likewise bolster message affirmation and information pressure intended for dependable and additionally superior system correspondence.Current conventions for PC organizing all by and large utilize parcel changing systems to send and get messages as bundles - messages ...

Read More

What are the Network protocol requirements in the communication process?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 3K+ Views

Network communication is nothing but a conversation between two persons. Let us consider a real life situation, for two people to communicate effectively, the first and foremost requirement is language.If they both do not know a common language communication is simply not possible. They will first say 'Hi', 'How are you' etc and do a handshake.Similar to this, in computer communication, for two computers to effectively communicate we need the following −Set of procedures for handshakingSet of rules for interpreting the data sentSteps for recovery if communication is broken in the middle.Network protocols are a set of standards which facilitate ...

Read More

What are the threats on the Internet?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 2K+ Views

Internet-based threats are Malware programs which can be targeted when we use the Internet. These Web-based threats include a range of malicious software programs which are designed to infect victims' computers.Major Threats on InternetSome of the major threats on internet are as follows −SpamGenerally we received a lot of Emails with' spam ' or Junk folder insinuates that spam emails are huge issues, with more than Half of the emails being siphoned into these folders. Being an annoyance, spam emails are not a direct threat but they contain malware.TrojanTrojan represents harmless computer programmes. So we don't detect them and that's ...

Read More

What are the differences between Skype and Facebook Messenger?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 1K+ Views

Skype is a Microsoft product which offers free video and audio calling which is also having the ability to call landlines and smartphones with paid services anywhere in the world. It has a first mover advantage. It came into existence before the Facebook messenger.Facebook Messenger allows users to play in-app games, make video and audio calls along with sending or receiving payments. It is tied up with the social media platform. It is not a paid service. It is free of cost.DifferencesThe major differences between Skype and Facebook Messenger −SkypeFacebook MessengerSkype doesn’t have stories and it makes a professional feel. ...

Read More

What are the interesting facts about Computer Viruses?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2022 2K+ Views

A computer virus is a malware, which corrupts or destroys our files on the system. The computer virus is not a new thing to us. It was created and started spreading around the 1980's. Virus is a type of malware which is capable of self-replicating itself and spreads from one machine to another.Generally, Computer virus is a program which controls the computer without the knowledge of the user and it runs parallel with the internet. If more devices are connected and all people are using the web obviously threat and security risk are increasing.Types of Computer VirusesSome of the types ...

Read More

Design a TM for an equal number of a’s and b’s must follow a

Bhanu Priya
Bhanu Priya
Updated on 10-Mar-2022 5K+ Views

The Turing machine (TM) is more powerful than both finite automata (FA) and pushdown automata (PDA). They are as powerful as any computer we have ever built.Formal Definition of Turing MachineA Turing machine can be formally described as seven tuples(Q, X, Σ, δ, q0, B, F)Where, Q is a finite set of statesX is the tape alphabetΣ is the input alphabetδ is a transition function: 𝛿:QxX→QxXx{left shift, right shift}q0 is the initial stateB is the blank symbolF is the final state.A Turing Machine (TM) is a mathematical model which consists of an infinite length tape divided into cells on which ...

Read More

What is file hierarchy structure and how does it solve the naming problem?

Bhanu Priya
Bhanu Priya
Updated on 01-Dec-2021 2K+ Views

Linux File Hierarchy Structure is defining the directory structure and the contents of the directory which have been alike to the Unix-like Operating Systems. It is maintained by the Linux Foundation.They are being used for looking at all files and the directories which appear under the root directory. They can be looked upon even if they have been stored on different physical or virtual devices.Even if some of these directories only exist on the particular systems or certain subsystems that can include the OS X, Windows System is installed.ImportanceThe importance of file hierarchy structure is given below −The biggest importance ...

Read More

Differentiate between process switch and mode switch in OS

Bhanu Priya
Bhanu Priya
Updated on 01-Dec-2021 3K+ Views

A process is defined as a program in execution and an entity that represents the basic unit of work to be implemented in the system.Process switchIt is defined as that the processor switches from one thread/process to another thread or process. It makes the contents of the CPU registers and instruction pointer to be saved.For the new task, the registers and instruction pointer are loaded into the processor then the execution of the new process may start/resume.The old programs will not execute further, but the state of that process is saved in memory because when the kernel decides that it ...

Read More
Showing 431–440 of 1,060 articles
« Prev 1 42 43 44 45 46 106 Next »
Advertisements