
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1032 Articles

Satish Kumar
752 Views
In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore ... Read More

Satish Kumar
916 Views
In today's digital age, security of computer networks has become paramount. Computer networks are susceptible to a variety of security threats, ranging from unauthorized access to data breaches. To ensure security of computer networks, access control tactics play a crucial role. Access control is process of restricting access to resources ... Read More

Satish Kumar
560 Views
Introduction In computer networking, a network switch is a device that connects network devices together to enable communication within a network. Switches are an essential component of any modern network, and they provide a way to manage network traffic by directing data to appropriate device. Access and trunk ports are ... Read More

Satish Kumar
5K+ Views
Introduction With rapid advancement of technology and growth of internet, network security has become an increasingly important issue. Organizations and individuals alike are constantly at risk of cyber-attacks, and consequences of a successful attack can be devastating. In this article, we will discuss a model for network security that can ... Read More

Satish Kumar
362 Views
Introduction Hashing is an essential aspect of modern cryptography. It is used to encrypt data in a secure and efficient way. Cryptographic hash functions are a type of mathematical function that takes data of any size and converts it into a fixed-size output, which is referred to as a hash. ... Read More

Satish Kumar
1K+ Views
Introduction When it comes to gaming monitors, one of key specifications that is often discussed is refresh rate. A monitor's refresh rate determines how many times per second screen is updated with new information. two most popular refresh rates are 60 Hz and 144 Hz. While many gamers swear by ... Read More

Satish Kumar
1K+ Views
Introduction Computer networking is a critical aspect of modern technology. In today's connected world, almost every organization relies on networking to share data and resources. Networking involves connection of multiple devices, such as computers, servers, printers, and other hardware devices, to facilitate communication and data transfer. Aspiring network engineers and ... Read More

Satish Kumar
548 Views
Introduction The fifth-generation wireless network (5G) is latest standard in mobile communication technology, and it is set to revolutionize way we interact with world around us. It is an upgraded version of fourth-generation (4G) wireless network, with faster internet speeds, lower latency, and higher capacity. 5G network is poised to ... Read More

Satish Kumar
5K+ Views
The Internet of Things (IoT) has emerged as one of most transformative technological innovations of modern era, enabling interconnectivity of devices and machines that we use in our daily lives. IoT has revolutionized way we interact with technology and world around us, paving way for new business models, improved efficiency, ... Read More

Satish Kumar
950 Views
Introduction Mobile communication technology has undergone significant advancements in recent years, and 4G mobile communication technology is one such example. 4G or Fourth-generation mobile communication technology is most recent and advanced version of mobile communication network that provides better speed, capacity, and coverage than its predecessors. It was first introduced ... Read More