Virus and Malware

Malware or Preserve Software and Malicious Activities Perverse Software is also known as Malicious software or Malware programs. Malware is short for malicious software. Malware programs are also known as Attacking elements. Perverse software is a program that causes hindrances/disturbances in other programs’ execution in such a way resulting in modification Read more…

Loading

Programming Paradigm

There are following types of Programming Languages/Programming Paradigm are seen in modern times –  (A) Imperative Programming Paradigm (a) Procedural Programming Paradigm (1.) Structured Programming Paradigm (2.) Non-Structured/UnStructured Programming Paradigm (b) Object Oriented Programming Paradigm (B) Declarative Programming Paradigm (i) Functional Programming Paradigm (ii) Logical Programming Paradigm (C) Hybrid Programming Read more…

Loading

Central Processing Unit

Introduction The Central Processing Unit (CPU) is like the Brain of the computer. This is because it takes all major decisions, makes all sorts of calculations, and directs different parts of the computer functions by activating and controlling the operations. The task of performing operations like arithmetic, logical, and non-logical/arithmetic Read more…

Loading

Terminology & Miscellaneous

Node A node is a component or terminal connected to a network. Components like laptops, PDAs(personal digital assistants – a variety of handheld mobile devices), Internet-enabled mobiles, network connecting devices, etc., can be considered as nodes in a computer network. Client  Link for Client details Server Link for Server details Read more…

Loading

Networking Devices

Introduction A typical computer network, either LAN, MAN, or WAN is consists of a large number of communication devices along with communication medium or channels. To build a typical LAN, especially, we need to have computers, communication mediums or channels, NOS(Network Operating System), and networking devices such as Hubs, Switches, Read more…

Loading

Switching Technique

Introduction A switch is used to connect the incoming link to the desired outgoing link and directs the incoming message to the appropriate outgoing link. A communication switch is used to allow/stop the flow of messages through the path connecting the receiver and the transmitter.  The role of a switch Read more…

Loading

Networking Model

Introduction of Networking Model Most of the computer networks today are organized as a series of layers arranged as a stack one upon another. The layering of network model is done in order to divide the workload or division of labour and also to simplify the system design. The functionality Read more…

Loading

Network Topology

Introduction This is also called LAN topology because of these are mostly and mainly implemented in a LAN network. Definition Network topology is the study of geometric or graphical arrangement or mapping or layout of the network elements (may be devices, links, nodes etc.) in a computer network along with Read more…

Loading

Classification of Network

Classification of Computer Networks (A) Based on network physical geographical size/area and the area they cover, computer networks are classified into the following types: – This is one of the most common types of computer networks. (1.) Personal Area Network(PAN)  (2.) Local Area Network(LAN)  (3.) Metropolitan Area Network(MAN) (4.) Wide Read more…

Loading