Ginni has Published 1522 Articles

What is techniques of storage allocation in compiler design?

Ginni

Ginni

Updated on 31-Oct-2023 13:50:45

58K+ Views

There are various storage allocation techniques are as follows −Static AllocationIt is the simplest allocation scheme in which allocation of data objects is done at compile time because the size of every data item can be determined by the compiler.Recursive Subprogram and Arrays of adjustable length are not permitted in ... Read More

Difference between OSI and TCP/IP Reference Model

Ginni

Ginni

Updated on 31-Oct-2023 04:19:48

122K+ Views

Following are the differences between OSI and TCP/IP Reference Model −OSITCP/IPOSI represents Open System Interconnection.TCP/IP model represents the Transmission Control Protocol / Internet Protocol.OSI is a generic, protocol independent standard. It is acting as an interaction gateway between the network and the final-user.TCP/IP model depends on standard protocols about which ... Read More

What is Handshaking?

Ginni

Ginni

Updated on 31-Oct-2023 03:59:02

33K+ Views

Handshaking is an I/O control approach to synchronize I/O devices with the microprocessor. As several I/O devices accept or release data at a much lower cost than the microprocessor, this technique is used to control the microprocessor to operate with an I/O device at the I/O devices data transfer rate.The ... Read More

Explain the advantages and disadvantages of the TCP/IP model

Ginni

Ginni

Updated on 31-Oct-2023 03:37:33

6K+ Views

TCP/IP signifies the transmission control protocol/Internet Protocol. It was created by the Defence Advanced Research Projects Agency (ARPA, later DARPA) in the late 1970s.It is a collection of communication protocol. Moreover, it involves collection and methods for managing packet transport, media access, session interaction, data transfer, email and terminal emulation.Advantages ... Read More

What is Pipelining in Computer Architecture?

Ginni

Ginni

Updated on 31-Oct-2023 02:53:19

28K+ Views

Pipelining defines the temporal overlapping of processing. Pipelines are emptiness greater than assembly lines in computing that can be used either for instruction processing or, in a more general method, for executing any complex operations. It can be used efficiently only for a sequence of the same task, much similar ... Read More

What is Auxiliary Memory?

Ginni

Ginni

Updated on 26-Oct-2023 03:37:50

39K+ Views

An Auxiliary memory is referred to as the lowest-cost, highest-space, and slowest-approach storage in a computer system. It is where programs and information are preserved for long-term storage or when not in direct use. The most typical auxiliary memory devices used in computer systems are magnetic disks and tapes.Magnetic DisksA ... Read More

What is Syntax Tree?

Ginni

Ginni

Updated on 26-Oct-2023 03:28:34

30K+ Views

Tree in which each leaf node describes an operand & each interior node an operator. The syntax tree is shortened form of the Parse Tree.Example1 − Draw Syntax Tree for the string a + b ∗ c − d.Rules for constructing a syntax treeEach node in a syntax tree can ... Read More

What are the principles of Public key Cryptosystem in Information Security?

Ginni

Ginni

Updated on 22-Oct-2023 02:29:38

42K+ Views

Public key cryptography has become an essential means of providing confidentiality, especially through its need of key distribution, where users seeking private connection exchange encryption keys. It also features digital signatures which enable users to sign keys to check their identities. The approach of public key cryptography derivative from an ... Read More

What are Peripheral Devices?

Ginni

Ginni

Updated on 21-Oct-2023 13:50:30

26K+ Views

Peripheral devices are those devices that are linked either internally or externally to a computer. These devices are commonly used to transfer data. The most common processes that are carried out in a computer are entering data and displaying processed data. Several devices can be used to receive data and ... Read More

What is the TCP Connection Establishment?

Ginni

Ginni

Updated on 21-Oct-2023 13:27:33

36K+ Views

To make the transport services reliable, TCP hosts must establish a connection-oriented session with one another. Connection establishment is performed by using the three-way handshake mechanism. A three-way handshake synchronizes both ends of a network by enabling both sides to agree upon original sequence numbers. This mechanism also provides that ... Read More

Advertisements