Screening Routers

Deleted.

Computer science Interview Questions

Q.1 What is static memory allocation?Ans. When the memory is allocated during the compile time it is known as static memory allocation. Q.2 What is dynamic memory allocation?Ans. When the memory is allocated during the run time it is known as...

Data Link Layer

Deleted.

Computer Network Theory

Deleted

Transmission Control Protocol - continues

Deleted.

Transmission Control Protocol

Deleted.

Educational has more than one purpose. It provides one with knowledge. But the chief purpose with which education is pursued is earning one’s livelihood. Technical education offers both these. This is the age of science. Science has changed the...

NAVIGATION IN WINDOWS XP

How to go to DEVICE MANAGER in windows XP? 1. start---- run---- type "devmgmt.msc", press enter. 2. start---- control panel---- systems---- hardware tab ---- devicemanager. 3. my computer right click---- properties---- hardware tab---- device...

MST- The Minimum Spanning Tree

  Minimum Spanning Trees Hello Readers, In this my new article i am going to spread light on MST which stands for Minimum Spanning Tree. As per my knowldge and after getting knowledge about this topic from here and there, i am trying best to give...

Introduction & Architecture Of Unix

Introduction: As you know that an operating system (a set of program that provide a virtual machine which is easy to use than that a bare machine) plays a vital role in a computer system. There are lots of operating system is available in market...

vi Editor - Unix

“vi” Editor UNIX Editor: An editor is a utility program that is used to make modification to the contents of a file or files. No doubt, editing is one of the most frequently used capabilities of a general purpose system. An editor is designed to...

Computers

This is the age of computers. Science has given us many wonders. One among them is the computers. Computers are a gift to the modern civilization. They have entered every walk of life and have become indispensable.   Charles Babez invented...

Unix The Most Secure Operating system

  Introduction In this article you can read and understand about UNIX.Every IT or CSE Student know that a typical operating system manages the resources of our computer system effectively and efficiently. It receives commands from the...

Shell : The Guide For User In Linux

SHELL Shell – a built-in program that acts as an interface between user and system. Shell program – a series of UNIX commands, often referred as shell scripts. Shell functions – program execution, filename expansion, I/O redirection,...

Computer Q&A for K12 (+2)

  1. What is Encapsulation? (or) Define Encapsulation. The mechanism by which the data and functions are bound together within an object definition is called as ENCAPSULATION. 2. What is abstraction? (or) Define abstraction. v Abstraction...

Following are various number systems in use with their bases: Name of number system : Base Binary : 2 Decimal : 10 Octal : 8 Hexadecimal :...

C-DOT EXCHANGE

  C-DOT EXCHANGE C-DOT MAX Family of exchanges employs T-S-T switching architecture and can be configured from four basic modules: - Base Module Central Module Administrative Module Input-Output Module The base module (B.M.) is the basic...

  Data Fragmentation In a DDB, decisions must be made regarding which site should be used to store which portions of the database. For now, we will assume that there is no replication; that is, each relation- or portion of relation- is to be...

      We Are Computer Dependent Now Computer has practically influenced every field of life. Earlier, computers were used by scientists and engineers for complex calculations and were very costly. Now a days computer are available at every...

The Most Secure OS : Unix

  :: Unix :: Operating System :: Hello Everybody. Today i am going to share about the most secure OS in my article. UNIX is an operating system. It is by and large the most popular operating system existing today. The features and flexibility...

Powered by CjBlog