
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1522 Articles

Ginni
58K+ Views
There are various storage allocation techniques are as follows −Static AllocationIt is the simplest allocation scheme in which allocation of data objects is done at compile time because the size of every data item can be determined by the compiler.Recursive Subprogram and Arrays of adjustable length are not permitted in ... Read More

Ginni
122K+ Views
Following are the differences between OSI and TCP/IP Reference Model −OSITCP/IPOSI represents Open System Interconnection.TCP/IP model represents the Transmission Control Protocol / Internet Protocol.OSI is a generic, protocol independent standard. It is acting as an interaction gateway between the network and the final-user.TCP/IP model depends on standard protocols about which ... Read More

Ginni
33K+ Views
Handshaking is an I/O control approach to synchronize I/O devices with the microprocessor. As several I/O devices accept or release data at a much lower cost than the microprocessor, this technique is used to control the microprocessor to operate with an I/O device at the I/O devices data transfer rate.The ... Read More

Ginni
6K+ Views
TCP/IP signifies the transmission control protocol/Internet Protocol. It was created by the Defence Advanced Research Projects Agency (ARPA, later DARPA) in the late 1970s.It is a collection of communication protocol. Moreover, it involves collection and methods for managing packet transport, media access, session interaction, data transfer, email and terminal emulation.Advantages ... Read More

Ginni
28K+ Views
Pipelining defines the temporal overlapping of processing. Pipelines are emptiness greater than assembly lines in computing that can be used either for instruction processing or, in a more general method, for executing any complex operations. It can be used efficiently only for a sequence of the same task, much similar ... Read More

Ginni
39K+ Views
An Auxiliary memory is referred to as the lowest-cost, highest-space, and slowest-approach storage in a computer system. It is where programs and information are preserved for long-term storage or when not in direct use. The most typical auxiliary memory devices used in computer systems are magnetic disks and tapes.Magnetic DisksA ... Read More

Ginni
30K+ Views
Tree in which each leaf node describes an operand & each interior node an operator. The syntax tree is shortened form of the Parse Tree.Example1 − Draw Syntax Tree for the string a + b ∗ c − d.Rules for constructing a syntax treeEach node in a syntax tree can ... Read More

Ginni
42K+ Views
Public key cryptography has become an essential means of providing confidentiality, especially through its need of key distribution, where users seeking private connection exchange encryption keys. It also features digital signatures which enable users to sign keys to check their identities. The approach of public key cryptography derivative from an ... Read More

Ginni
26K+ Views
Peripheral devices are those devices that are linked either internally or externally to a computer. These devices are commonly used to transfer data. The most common processes that are carried out in a computer are entering data and displaying processed data. Several devices can be used to receive data and ... Read More

Ginni
36K+ Views
To make the transport services reliable, TCP hosts must establish a connection-oriented session with one another. Connection establishment is performed by using the three-way handshake mechanism. A three-way handshake synchronizes both ends of a network by enabling both sides to agree upon original sequence numbers. This mechanism also provides that ... Read More