
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1522 Articles

Ginni
174 Views
Collection is the crucial knowledge that can help incident responders in learning the process of attack and tracing the attacker. Thus, the incident responders ought to apprehend where they will discover the proof and the method to collect it.This section describe about collecting and protective proof, collecting physical evidence, managing ... Read More

Ginni
313 Views
Use and reveal personal information simply for the primary goals for which it was composed or a related reason the person would sensible expect. It can use for some specific secondary purposes without approval is allowed.This principle positions limits on the need of personal data for secondary reasons. Simply, use ... Read More

Ginni
469 Views
Openness is the technical method includes transparent Internet standards development where someone can participate on a similar basis, and open nonproprietary protocols that anyone can execute. It supports more opportunity for variety of thought. Openness is also the ability to create and set up Internet applications and services without approval.Openness ... Read More

Ginni
425 Views
Freedom of Information − Freedom of Information (FOI) is a concept that broadly define the principle that individuals and the public at-large have the right to access information that is relevant to their interests.The United Nations identifies freedom of information as a basic human right. The UN argues that FOI ... Read More

Ginni
321 Views
Access and correction is generally managed under the provisions of the Information Act. It is important to discriminate freedom of information from information privacy. This principles contains the following which are as follows −If an individual demands an agency having personal information concerning the individual for access to the personal ... Read More

Ginni
345 Views
A unique identifier is generally a number allocated to an individual to recognize the person for the reasons of an agency services. For example, a tax file number, drivers licence number, data set identifier.This principle confine the sharing of unique identifiers among agencies. It provides a safeguard against the creation ... Read More

Ginni
601 Views
Sensitive information is the classified information that should be protected and is inaccessible to external parties unless specifically granted permission. The data can be in physical or electronic form, but sensitive information is regarded as private information or data. An ethical or legal reason can warrant the need to have ... Read More

Ginni
249 Views
Transporter data flows are digitally encoded units of data in which the transfer, storage, or processing takes place in more than one union state. The information can be moved physically by magnetic media, such as tapes, disks, or transmitted electronically over a terrestrial line, submarine cable, or satellite connection.The significant ... Read More

Ginni
729 Views
There are several Information Privacy Principles (IPPs) which cover the whole life cycle of information from compilation and managing to storage and removal. The IPPs direct how this Department should handle personal data. It is required to be maximize our practices in line with the IPPs and beside our specific ... Read More

Ginni
248 Views
There are several terms for privacy which are as follows −Access Control − It is the prevention of unauthorized access of information assets. It is the policy rules and deployment methods which control use to information systems, and physical access to premises.Access − The ability or the resources essential to ... Read More