- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1602 Articles
Ginni
56K+ Views
The operands of the instructions can be located either in the main memory or in the CPU registers. If the operand is placed in the main memory, then the instruction provides the location address in the operand field. Many methods are followed to specify the operand address. The different methods/modes ... Read More
Ginni
47K+ Views
There are various storage allocation techniques are as follows −Static AllocationIt is the simplest allocation scheme in which allocation of data objects is done at compile time because the size of every data item can be determined by the compiler.Recursive Subprogram and Arrays of adjustable length are not permitted in ... Read More
Ginni
109K+ Views
Following are the differences between OSI and TCP/IP Reference Model −OSITCP/IPOSI represents Open System Interconnection.TCP/IP model represents the Transmission Control Protocol / Internet Protocol.OSI is a generic, protocol independent standard. It is acting as an interaction gateway between the network and the final-user.TCP/IP model depends on standard protocols about which ... Read More
Ginni
21K+ Views
Handshaking is an I/O control approach to synchronize I/O devices with the microprocessor. As several I/O devices accept or release data at a much lower cost than the microprocessor, this technique is used to control the microprocessor to operate with an I/O device at the I/O devices data transfer rate.The ... Read More
Ginni
3K+ Views
TCP/IP signifies the transmission control protocol/Internet Protocol. It was created by the Defence Advanced Research Projects Agency (ARPA, later DARPA) in the late 1970s.It is a collection of communication protocol. Moreover, it involves collection and methods for managing packet transport, media access, session interaction, data transfer, email and terminal emulation.Advantages ... Read More
Ginni
21K+ Views
Pipelining defines the temporal overlapping of processing. Pipelines are emptiness greater than assembly lines in computing that can be used either for instruction processing or, in a more general method, for executing any complex operations. It can be used efficiently only for a sequence of the same task, much similar ... Read More
Ginni
25K+ Views
An Auxiliary memory is referred to as the lowest-cost, highest-space, and slowest-approach storage in a computer system. It is where programs and information are preserved for long-term storage or when not in direct use. The most typical auxiliary memory devices used in computer systems are magnetic disks and tapes.Magnetic DisksA ... Read More
Ginni
21K+ Views
Tree in which each leaf node describes an operand & each interior node an operator. The syntax tree is shortened form of the Parse Tree.Example1 − Draw Syntax Tree for the string a + b ∗ c − d.Rules for constructing a syntax treeEach node in a syntax tree can ... Read More
Ginni
27K+ Views
Public key cryptography has become an essential means of providing confidentiality, especially through its need of key distribution, where users seeking private connection exchange encryption keys. It also features digital signatures which enable users to sign keys to check their identities. The approach of public key cryptography derivative from an ... Read More
Ginni
21K+ Views
Peripheral devices are those devices that are linked either internally or externally to a computer. These devices are commonly used to transfer data. The most common processes that are carried out in a computer are entering data and displaying processed data. Several devices can be used to receive data and ... Read More