- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Revathy Nair has Published 20 Articles
Revathy Nair
91 Views
What is Agile Project Development?Agile Project Development is an iterative approach that delivers maximum value in the time and budget allowed against the business. It is quite different from traditional management. Agile empowers professionals to adhere to immediate changes while undergoing a project. These changes are the feedback received after ... Read More
Revathy Nair
156 Views
What is an Agile platform?Agile is a wayto manage a project in the most effective way possible, breaking it up into several phases that go through the process of planning, executing, and evaluating. This is the reason why Agile is also considered an iterative approach to the management of a ... Read More
Revathy Nair
1K+ Views
What is Cyberwarfare?In this twenty-first century, one-third of the world's population has access to technology. These technological changes have led to war among nations, and the nature of war has transformed. So, we can say that the world is entering into a new age of warfare; it is an Internet-based ... Read More
Revathy Nair
4K+ Views
What is Cybercrime?Cybercrime is also known as Computer Crime, which specifically involves a computer and a network. The computer involved could be the guilty or the victim. Cybercrime could be responsible for harming somebody's both financial health and security.Cybercrime can be intercepting or disclosing someone's private information while being sent ... Read More
Revathy Nair
302 Views
What is an Injection Attack?Cyber Hackings can occur due to a security flaw of any site which then leads to the extraction of private information, inserted or deleted data, and destroys operations for the entire website. Injections are one of the oldest and the most dangerous attacks focussing on harming ... Read More
Revathy Nair
379 Views
What is an Agile Methodology?Agile is a wayto manage a project in the most effective way possible with the involvement of software development. It involves teamwork, collaboration, constant feedback, and flexibility to respond to continuous changes. Agile methodology requires a cultural shift in the organization and as its team operates ... Read More
Revathy Nair
366 Views
To develop software and manage numerous projects, government agencies are looking forward to using new ways of working. Agile methodology could prove to be the best approach. Agile focuses on iterative and incremental approaches to work on a project or developing software. Agile is a work process that has been ... Read More
Revathy Nair
125 Views
Is your Website Secure?A website traffic might be protected, but it doesn’t mean that the website is secure. It could be hacked at any moment. Similarly, you might also think that your site has nothing worth being hacked for. However, you could even be hit by ransomware.The security breaches have ... Read More
Revathy Nair
217 Views
What are Phishing Attacks?Phishing attacks are one of the biggest and most frequently faced cyber threats faced by organizations these days. Phishing attacks are scams which are increasing with time and cybercriminals are making huge profits out of them.Phishing attacks are the process of sending duplicitous communications that appear to ... Read More
Revathy Nair
144 Views
Who is an Ethical Hacker?An Ethical Hacker is scrutinized as a security executive who perform security assessment to protect client’s computer or application from potential security risks and vulnerabilities. Organizations employs ethical hackers to protect their computers and other systems in the network from cyberattacks, and any external and internal ... Read More