
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satadru Jati has Published 19 Articles

Satadru Jati
568 Views
Multiplexing could be used in computer systems to transmit different signals or information streams over a single communication channel. It permits numerous clients or gadgets to share the same transmission medium proficiently. Importance on Multiplexing Channel sharing is vital in computer systems to optimize the utilization of accessible assets. It ... Read More

Satadru Jati
391 Views
Introduction to Near Field Communication (NFC) Near Field Communication (NFC) may be a short-range remote communication technology that permits two electronic gadgets to set up communication when they are set in the near vicinity, ordinarily inside some centimeters. NFC is an expansion of Radio Recurrence Distinguishing Proof (RFID) innovation and ... Read More

Satadru Jati
2K+ Views
The travelling salesman problem is a popular topic in AI and operational research. Since its first articulation, a plethora of publications have been written providing various solutions to this problem. Furthermore, a slew of novel formulations has been presented by associated practitioners in an attempt to broaden the application of ... Read More

Satadru Jati
3K+ Views
Recently, graph-based representations have gained enormous popularity for simulating real-world data. Cliques are a key issue in graph theory that is used to solve numerous mathematical issues and create graphs. Cliques are extensively researched in the field of computer science, with the clique problem assessing if a clique having a ... Read More

Satadru Jati
424 Views
What is SSL Certificate An SSL (Secure Attachments Layer) certificate may be an advanced certificate that authenticates and confirms the character of an online site or a server and empowers secure communication between a client (such as a web browser) and the server. SSL certificates utilize encryption to ensure touchy ... Read More

Satadru Jati
340 Views
Introduction on Multimedia Forensics Mixed media forensics is the logical thinking of analyzing and recognizing altering in advanced interactive media information, counting pictures, recordings, and sound recordings. With the broad utilization of progressive media and the ease of control, mixed media forensics has become progressively critical in guaranteeing the realness ... Read More

Satadru Jati
211 Views
Multi-factor Authentication: What is it? Users must submit additional information in addition to their passwords when using the multi-factor authentication (MFA) method of account login. In addition to the username and password, users could be required to input a code provided to their email address, respond to a confidential question, ... Read More

Satadru Jati
318 Views
What is SDN? SDN (Program Characterized Organizing) may be an arranged engineering that isolates the control plane and information plane of an organized, empowering, centralized organize administration and arrangement for more prominent adaptability, skill, adaptability, and disentangled organized administration. What is SDN WAN? SD-WAN (Computer program Characterized Wide Region Organizing) ... Read More

Satadru Jati
256 Views
The networking interface for TCAP-based services is SCCP and MTP, working in combination. The subsystem is the collection of services SCCP offers its customers for each element within an SS7 network. SCCP The Signalling Connection Control Part (SCCP), which is used in SS7 (SS7-Signaling System 7) Telecommunications Networks, acts as ... Read More

Satadru Jati
159 Views
Scareware and worms are two forms of malicious software capable of harming a person's device. A worm is comparable to a virus, but unlike a virus, it does not need a host program for execution. About Scareware Scareware is a malicious technique that tricks users into perceiving they must download or ... Read More