
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1522 Articles

Ginni
16K+ Views
One-Pass CompilerOne pass compiler reads the code only once and then translates it. The one-pass compiler passes only once through the parts of each compilation unit. It can translate each part into its final machine program. In the one-pass compiler, when the line source is processed, it is scanned and ... Read More

Ginni
81K+ Views
Both compilers and interpreters are the language processors used to convert software codes written in high-level language into machine language codes. Compilers and interpreters are types of system software. They are required because a computer cannot process a code written in high-level programming language like C, C++, Java, etc. Therefore, ... Read More

Ginni
914 Views
RAM is an element of the main memory that is directly usable by the CPU (Central Processing Unit). Memory can save programs and information during computer operations. The major technology used for the main memory depends on semiconductor integrated circuits.The feature of RAM is that it is volatile. A RAM ... Read More

Ginni
3K+ Views
There are various classification of security attack is as follows − Cryptanalytic attacks These attacks are combination of statistical and algebraic techniques objective at make sure the secret key of a cipher. These technique inspect the numerical properties of the cryptographic algorithms and aims at discovering distinguishers of the output ... Read More

Ginni
5K+ Views
There are various applications of cryptography which are as follows − Secrecy in Transmission Some existing secrecy systems for transmission access a private key system for converting transmitted data because it is the quickest approach that functions with rational guarantee and low overhead. If the multiple conversing parties is minute, ... Read More

Ginni
3K+ Views
Cryptography is an automated mathematical tool that plays an important role in network security. It supports the confidentiality and integrity of information and provide authentication and non-repudiation to the users. Cryptography is frequently used in distributed applications to transfer recognition and authentication information from one system to another over a ... Read More

Ginni
2K+ Views
Cryptography supports a number of security aims to provide the privacy of information, non-alteration of information and so on. Because of the high security benefit of cryptography it is broadly used today. There are the various goals of cryptography which are as follows − Confidentiality Information in computer is sent ... Read More

Ginni
2K+ Views
Introduction to Cryptography in Network SecurityCryptography is an automated numerical tool that plays an essential role in network security. It provides the confidentiality and integrity of data and supports authentication and non-repudiation to the users.Cryptography and User AuthenticationCryptography can play some multiple roles in user authentication. Cryptographic authentication systems support ... Read More

Ginni
3K+ Views
Business Intelligence is a collection of procedures, mechanisms, and technologies that modifies raw data into significant information that drives cost-effective business services. It is a collection of software and services to modify data into actionable intelligence and recognition. Business Intelligence (BI) has an unambiguous impact on an organization’s methods, tactical ... Read More

Ginni
4K+ Views
The physical layer meets all these requirements out. The set of rules and procedures for interaction between physical layers are called Physical layer protocols. The layer provides a physical connection different from the physical transmission path because it is at the bit level while the transmission path is at the ... Read More