Articles [Computer Science]

Here is a simple registry trick to do so to prevent your computer from Pendrive Viruses. Try this trick with care. 1. Go to start --> Run, type Regedit. 2. Go to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlset \ Services \ USBSTOR 3. On the...

It is a part of a graphic softwares. A general graphics programming package gives extension set of graphic function which is used in the high  level programming language like 'C' and 'FORTRAN'. Example of general graphic programming package...

In computer graphics, picture or graphic objects are presented as collection of discreet picture element called as "Pixel". Pixel may be defined as small size object or colors spot that can be display on address on monitor. Any image that is...

The OSI data link layer is intended to frame data from higher layers for transmission across the physical layer. The messageframes are used to mitigate data errors received from thephysical layer. For multinode networks, the data link layer...

Deleted.

Deleted.

Deleted.

Deleted.

The original digest needs to be trusted to be valid in order for the receiver to validate its digest. A way to protect the access to the original digest is to set up a secure database and allow minimum access to it. Another way to protect the...

Deleted.

Powered by CjBlog