General

What is Search Engine Indexing & How Does it Work

How do search engine work In a world before search engines, we had directories and encyclopedia to search for information.  It took a precious amount of time to go through all the listed items. With the advent of search engines, the same search can be accomplished within fractions of a second. A search engine is …

Read more

Computer Network Topology

The key factor in determining the performance of a network is its topology. By topology, it means how a network is organized. Each network consists of different nodes and these nodes are connected to each other with links. The arrangement of these links in different ways results in different kinds of network topologies. These links …

Read more

Transaction Processing

What is transaction Processing: A sort of PC preparing in which the PC behaves rapidly to customer request. Each adjuration is observed as an interchanged. Programmed teller machines for banks are a case of exchange handling. Something contrary to exchange handling is cluster preparing, in which a cluster of adjuration is put away and afterward …

Read more

SQL

What is SQL On the most fundamental level, SQL is a programming language intended for overseeing and questioning social information bases, which were designed during the 1970s and advocated by Oracle. Simply put, social information bases sort out information into lines and segments (like Excel!); in the event that you need to truly know a …

Read more

Referential Integrity

What is Referential Integrity: A part given by social database organisation structures (RDBMS) that shields customers or appeals from entering clashing data. Most RDBMSs have distinctive appropriate uprightness and conclude that you can apply when you make an association between two relations. For example, expect Relation B has a new key that concentrations to a …

Read more

Normalization to 3NF

What is Normalization? Standardization is a database arrangement procedure that lessens data redundancy and gets rid of unpleasant attributes like Insertion, Update and Deletion Anomalies. Normalization rules isolate greater relations into more unobtrusive relations and associations them utilising associations. The explanation behind Normalization in SQL is to get rid of overabundance (excess) data and assurance …

Read more

ACID

What is ACID In digital engineering, in terms of blunders, control disappointments, and multiple injuries, ACID (atomicity, accuracy, seclusion, toughness) is a number of properties of knowledge base exchanges required to guarantee data legitimacy. A sequence of data set operations satisfying the ACID properties (which can be used as a solitary coherent information procedure) is …

Read more

Polymorphism

What is Polymorphism The term polymorphism is independently characterised in four logical orders: science, hereditary qualities, natural chemistry, and software engineering. In the organic setting, polymorphism alludes to the possibility that individuals from a similar populace or state can take on various visual qualities. In hereditary qualities, polymorphism reflects variety in the hereditary coding of …

Read more

Object Oriented Programming

Introduction Object- orientated programming (oop) reflects an effort the way we all think and interact with the real world more closely with programs. In the previous programming types, a programme writer was presented with a computational activity to solve the problem. software design then consists of finding a set of instructions that will perform the …

Read more

Methods of capturing, selecting, managing and exchanging data

Methods of Capturing Data What is data capturing: Data is the road to isolating information from a text and translating it into data that can be detected by a PC. In addition, perhaps more overall, the data collected which indicate that the acquisition of significant material, whether sourced from paper or electronic chronicle, may be …

Read more

Lossy vs Lossless

What is Lossy Compression The lossy compression algorithm is a technology that reduces the file size by deleting unnecessary information. Nobody hates to lose records, but certain types of files are too large to have enough capacity to carry all the original data, so in the first place, we don’t need all that stuff. In …

Read more

Entity relationship modelling

Introduction An E-R model is regularly the outcome of exact rating to explain and depict what is main to measures in a domain of work. It doesn’t draw the work measures; it just presents a work data design in geometrical shape an ER model can beside be imparted in an abuse structure, for example: one …

Read more

Application of Hashing

What is Hashing Hashing is the practice of taking clear text. and converting it into a dissolve of clear text data in such a manner that it is not meant to be decrypted. Hashing ‘s output is defined as a digest of a hash, hash price, or text. Hashing is an interesting field of alphanumeric …

Read more

Symmetric and Asymmetric Encryption

Overview There is an ever current chance of inappropriate access to all kinds of data in today’s cyber globe. Financial and payment system information that tin show consumers’ and customers ‘ personal identification information (pii) or payment card data is most at risk. encryption is important for securing pii and reducing the threats faced every …

Read more

Memory Address Modes

What is Memory Address Mode? The addressing mode is the method by which an instruction operand is specified. The data stored in the operation code is the operand value or the result. A microprocessor’s role is to execute a series of memory-saved instructions to perform a particular task. The following are needed for operations:  The …

Read more

Encapsulation

What is Encapsulation One of the basics of OOP is encapsulation. This applies to the packaging of information with the tools that function on the information. Encapsulation is worn to mask the values or status of a standardised data thing within a folder, avoiding straight entry to them by unauthorised gathering. The idea of encapsulation …

Read more

How to write Computer Algorithm for beginners?

What is Algorithm? An algorithm indicates a progression of steps that play out a specific calculation or errand. Algorithms were initially conceived as a component of arithmetic – “algorithm” originates from the Arabic essayist Muhammad ibn Mūsā al-Khwarizmi, – yet presently the word is emphatically connected with software engineering. Algorithm (articulated from AL to runtime) …

Read more

Procedural Languages

What is Procedural Languages: A procedural programming language is a PC programming tongue that obeys, all together, a great deal of requests. Here we see the examples of PC procedural languages are BASIC, C, FORTRAN and java. Procedural programming language tongues are a segment of the ordinary sorts of programming lingos used by substance and …

Read more

Lexical Analysis

Introduction             In computer science, lexical investigation, lexing or tokenization is the way toward changing over a grouping of characters (as in a software engineer or a page) into an arrangement of tokens (strings with an appointed significance and thus distinguished). a developer that performs lexical investigation might be known as a lexer, tokenizer, …

Read more

Virtual Machines

Overview of virtual machines The virtual machine gives a deliberation of the hidden physical framework to the visitor working framework running on it. You can classify virtual machines into different types based on the level of abstraction provided by VMM and whether the host and guest systems use the same ISA. There are two main …

Read more

The four stages of compilation

Overview Compilation is the way toward changing over source code into object code. This is finished with the assistance of the compiler. The compiler checks the source code for linguistic or basic mistakes, and if there are no blunders in the source code, it creates the objective code. The c gathering measure changes over the …

Read more