General

Polymorphism

What is Polymorphism The term polymorphism is independently characterised in four logical orders: science, hereditary qualities, natural chemistry, and software engineering. In the organic setting, polymorphism alludes to the possibility that individuals from a similar populace or state can take on various visual qualities. In hereditary qualities, polymorphism reflects variety in the hereditary coding of …

Read morePolymorphism

Object Oriented Programming

Introduction Object- orientated programming (oop) reflects an effort the way we all think and interact with the real world more closely with programs. In the previous programming types, a programme writer was presented with a computational activity to solve the problem. software design then consists of finding a set of instructions that will perform the …

Read moreObject Oriented Programming

Lossy vs Lossless

What is Lossy Compression The lossy compression algorithm is a technology that reduces the file size by deleting unnecessary information. Nobody hates to lose records, but certain types of files are too large to have enough capacity to carry all the original data, so in the first place, we don’t need all that stuff. In …

Read moreLossy vs Lossless

Entity relationship modelling

Introduction An E-R model is regularly the outcome of exact rating to explain and depict what is main to measures in a domain of work. It doesn’t draw the work measures; it just presents a work data design in geometrical shape an ER model can beside be imparted in an abuse structure, for example: one …

Read moreEntity relationship modelling

Application of Hashing

What is Hashing Hashing is the practice of taking clear text. and converting it into a dissolve of clear text data in such a manner that it is not meant to be decrypted. Hashing ‘s output is defined as a digest of a hash, hash price, or text. Hashing is an interesting field of alphanumeric …

Read moreApplication of Hashing

Symmetric and Asymmetric Encryption

Overview There is an ever current chance of inappropriate access to all kinds of data in today’s cyber globe. financial and payment system information that tin show consumers’ and customers ‘ personal identification information (pii) or payment card data is most at risk. encryption is important for securing pii and reducing the threats faced every …

Read moreSymmetric and Asymmetric Encryption

Memory Address Modes

What is Memory Address Mode? The addressing mode is the method by which an instruction operand is specified. The data stored in the operation code is the operand value or the result. A microprocessor’s role is to execute a series of memory-saved instructions to perform a particular task. The following are needed for operations:  The …

Read moreMemory Address Modes

Encapsulation

What is Encapsulation One of the basics of OOP is encapsulation. This applies to the packaging of information with the tools that function on the information. Encapsulation is worn to mask the values or status of a standardised data thing within a folder, avoiding straight entry to them by unauthorised gathering. The idea of encapsulation …

Read moreEncapsulation

Assembly Language

What is Assembly Language In registering programming, low level computing construct (or building specialist language), routinely abbreviated ASM, is any of the low level programming languages where there is a very strong correspondence between the rules in the language and the designing’s machine code bearings. Since get together depends upon the machine code headings, each …

Read moreAssembly Language

Procedural Languages

What is Procedural Languages: A procedural programming language is a PC programming tongue that obeys, all together, a great deal of requests. Here we see the examples of PC procedural languages are BASIC, C, FORTRAN and java. Procedural programming language tongues are a segment of the ordinary sorts of programming lingos used by substance and …

Read moreProcedural Languages

Lexical Analysis

Introduction             In computer science, lexical investigation, lexing or tokenization is the way toward changing over a grouping of characters (as in a software engineer or a page) into an arrangement of tokens (strings with an appointed significance and thus distinguished). a developer that performs lexical investigation might be known as a lexer, tokenizer, …

Read moreLexical Analysis

Virtual Machines

Overview of virtual machines The virtual machine gives a deliberation of the hidden physical framework to the visitor working framework running on it. You can classify virtual machines into different types based on the level of abstraction provided by VMM and whether the host and guest systems use the same ISA. There are two main …

Read moreVirtual Machines

The four stages of compilation

Overview Compilation is the way toward changing over source code into object code. This is finished with the assistance of the compiler. The compiler checks the source code for linguistic or basic mistakes, and if there are no blunders in the source code, it creates the objective code. The c gathering measure changes over the …

Read moreThe four stages of compilation

Syntax Analysis

Overview of syntax analyzer: A data planning system inputs character string data including kanji characters and identifying with phonetic data by entering phonetic data. A data device successively inputs phonetic data and sentence end data. A change section joins a change processor, a syntactic analyzer, and a need demand alternator The change processor progressively changes …

Read moreSyntax Analysis

Code Generation

Overview A calculation is stated to interpret a generally low level moderate portrayal of a plan into gathering code or machine program for an objective PC. The calculation is table navigation. A development calculation is utilized to deliver the bar from the utilitarian depiction of the objective machine. This technique creates top-notch code for some …

Read moreCode Generation