Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1519 Articles
Ginni
124K+ Views
Following are the differences between OSI and TCP/IP Reference Model −OSITCP/IPOSI represents Open System Interconnection.TCP/IP model represents the Transmission Control Protocol / Internet Protocol.OSI is a generic, protocol independent standard. It is acting as an interaction gateway between the network and the final-user.TCP/IP model depends on standard protocols about which ... Read More
Ginni
34K+ Views
Handshaking is an I/O control approach to synchronize I/O devices with the microprocessor. As several I/O devices accept or release data at a much lower cost than the microprocessor, this technique is used to control the microprocessor to operate with an I/O device at the I/O devices data transfer rate.The ... Read More
Ginni
6K+ Views
TCP/IP signifies the transmission control protocol/Internet Protocol. It was created by the Defence Advanced Research Projects Agency (ARPA, later DARPA) in the late 1970s.It is a collection of communication protocol. Moreover, it involves collection and methods for managing packet transport, media access, session interaction, data transfer, email and terminal emulation.Advantages ... Read More
Ginni
30K+ Views
Pipelining defines the temporal overlapping of processing. Pipelines are emptiness greater than assembly lines in computing that can be used either for instruction processing or, in a more general method, for executing any complex operations. It can be used efficiently only for a sequence of the same task, much similar ... Read More
Ginni
41K+ Views
An Auxiliary memory is referred to as the lowest-cost, highest-space, and slowest-approach storage in a computer system. It is where programs and information are preserved for long-term storage or when not in direct use. The most typical auxiliary memory devices used in computer systems are magnetic disks and tapes.Magnetic DisksA ... Read More
Ginni
30K+ Views
Tree in which each leaf node describes an operand & each interior node an operator. The syntax tree is shortened form of the Parse Tree.Example1 − Draw Syntax Tree for the string a + b ∗ c − d.Rules for constructing a syntax treeEach node in a syntax tree can ... Read More
Ginni
44K+ Views
Public key cryptography has become an essential means of providing confidentiality, especially through its need of key distribution, where users seeking private connection exchange encryption keys. It also features digital signatures which enable users to sign keys to check their identities. The approach of public key cryptography derivative from an ... Read More
Ginni
26K+ Views
Peripheral devices are those devices that are linked either internally or externally to a computer. These devices are commonly used to transfer data. The most common processes that are carried out in a computer are entering data and displaying processed data. Several devices can be used to receive data and ... Read More
Ginni
37K+ Views
To make the transport services reliable, TCP hosts must establish a connection-oriented session with one another. Connection establishment is performed by using the three-way handshake mechanism. A three-way handshake synchronizes both ends of a network by enabling both sides to agree upon original sequence numbers. This mechanism also provides that ... Read More
Ginni
6K+ Views
The network layer design issues contain the services position to the transport layer, routing packets over the subnet, congestion control, and connection of multiple networks together.The design issues of the network layer are as follows −It is the network layer's goals to support logical services to several users linked to ... Read More