
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Sudhir sharma has Published 1149 Articles

sudhir sharma
1K+ Views
Introduction Living in the digital era, we all share an immense amount of data online. With each click and keystroke, our sensitive information is exposed to cyber threats. From banking transactions to social media profiles, our personal information needs robust security measures to protect us from malicious attacks. And that's ... Read More

sudhir sharma
718 Views
Understanding Packet Switching Suppose you’re trying to send an important message or file to a friend on the other side of the world. How does your message travel the vast distances and complex networks in between? Enter packet switching, a clever communication method that breaks down data into bite-sized packets ... Read More

sudhir sharma
1K+ Views
Introduction to P2P File Sharing Fundamentals If you've ever wondered how people share multimedia files with ease, then peer-to-peer file sharing is the answer. In today's digital world, it's easier than ever to access music, videos, documents, and games through P2P technology. But how exactly does this revolutionary process work? ... Read More

sudhir sharma
667 Views
Introduction to Wireless Wide Area Networks (WWAN) In today's world, being connected is very important. We need a way to get information and communicate with people far away quickly. That’s where WWAN comes in! It's a technology that lets us connect wirelessly over large areas. What is WWAN? Wireless Wide ... Read More

sudhir sharma
3K+ Views
Introduction to WPAN technologies and standards In this era of digitalization, communication has become more convenient with the help of ground-breaking technology - Wireless Personal Area Networks (WPANs). This innovation not only brings ease but also enables swift integration between devices in our daily lives. Moreover, recent advancements have been ... Read More

sudhir sharma
459 Views
Introduction to Nslookup The nslookup command is a powerful network administration tool used in Linux for querying Domain Name System (DNS) records efficiently. Whether you are a novice or a professional, this command can help you troubleshoot and test DNS by mapping domain names to IP addresses, as well as ... Read More

sudhir sharma
774 Views
Introduction to Noiseless Channel Protocol In today's fast-paced digital world, the efficiency and reliability of communication networks are crucial for businesses and individuals alike. One important aspect of these networks is the noiseless channel protocol, a set of rules that govern data transfer between devices with minimal interruptions or errors. ... Read More

sudhir sharma
755 Views
Introduction to Next Generation Network (NGN) The digital age has brought about an unprecedented demand for faster, more reliable communication and connectivity. At the heart of this transformation lies the Next Generation Network (NGN), a revolutionary packet-based network designed to meet our ever-growing needs. This cutting-edge technology provides telecommunication services ... Read More

sudhir sharma
519 Views
Introduction In the ever-evolving world of cloud computing, network virtualization has emerged as a powerful solution to optimize resource management and streamline operations. By consolidating multiple physical networks into virtual ones, businesses can achieve unparalleled flexibility, scalability, and enhanced security. If you're eager to learn about how network virtualization in ... Read More

sudhir sharma
330 Views
Introduction to Network Security Toolkit (NST) in Virtual Box In today's digitally connected world, ensuring the security of computer networks is more important than ever. This is where the Network Security Toolkit (NST) in Virtual Box comes into play, offering a comprehensive set of open-source tools for monitoring and securing ... Read More