
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Bhanu Priya has Published 1449 Articles

Bhanu Priya
648 Views
Let us understand the concept of Viber and Whatsapp messenger.ViberIt allows users to send multiple images and videos at a time. One can also block another user. It also has a cross platform typing indicator. One can send longer video messages which will be up to 3 minutes long.Selecting the ... Read More

Bhanu Priya
1K+ Views
Forensics is a method of science to criminal examinations and can incorporate a wide exhibit of sciences from material science to clairvoyants. A measurable report basically and concisely outlines the substantive proof in a criminal case.Criminological report composing may demonstrate troublesome and overwhelming in light of the fact that it ... Read More

Bhanu Priya
2K+ Views
Cybercrime is any type of illegal activity that takes place via digital means. Data theft is, of course, one of the most common types of cybercrime, but cybercrime also includes a wide range of malicious activity as well, such as cyberbullying or planting worms or viruses.Cybercrimes are divided into two ... Read More

Bhanu Priya
2K+ Views
Let us understand the concepts of Wi-Fi and Zigbee.Wi-FiIt is a wireless networking protocol that allows devices to communicate without internet cords. It's technically an industry term that represents a type of wireless local area network (LAN) protocol based on the 802.11IEEE network standard.Wi-Fi is the most popular means of ... Read More

Bhanu Priya
3K+ Views
In order to understand cluster computing, we have to know what a cluster is.Cluster ComputingA cluster is a collection of computers or groups of computers and to utilize performance of these groups of computers when we start processing problems with these sets of computers is called cluster computing.Cluster computing is ... Read More

Bhanu Priya
2K+ Views
Let us understand the concepts of FDMA and CDMA before learning the differences between them.FDMA (frequency division multiple access)It is the division of the frequency band allocated for wireless cellular telephone communication into 30 channels, each of which can carry a voice conversation or, with digital service, carry digital data.FDMA ... Read More

Bhanu Priya
234 Views
Mobile security, or cell phone security, has turned out to be progressively imperative in portable computing. Of specific concern is the security of individual and business data now put away on cell phones.ThreatsA cell phone client is presented to different dangers when they utilize their phone. The dangers can disturb ... Read More

Bhanu Priya
2K+ Views
A real-time system means the system is subjected to real-time that means the response should be guaranteed within a specified timing constraint or system should meet the specified deadline.For example − Flight control system, real-time monitors etc.Features of Real-time SystemThe features of real-time system are as follows −Reliability − The system ... Read More

Bhanu Priya
6K+ Views
Phishing is a type of social engineering attack which is often used to steal user data, including login credentials and credit card numbers and sensitive information without their knowledge that it is being extracted from them.The goal of a phishing attempt is to trick the recipient into taking the attacker’s ... Read More

Bhanu Priya
5K+ Views
Generally a network service is an application which runs at application layer and above and is used in computer networking.Network service provides data Storage, manipulation, presentation, communication. This is implemented using client-server architecture or peer-to-peer architecture.Service Interface is used to implement a Service-Oriented Architecture (SOA). This is implemented to achieve ... Read More