Basic structure of C programming
To write a C program, we first create functions and then put them together. A C program may contain one or more sections. They are illustrated below.
Notes with worthy tutorials
Delivery: Delivery refers to the way a packet is handled by the underlying network under the control of the network layer. Various delivery concepts are explained below. Connection Types: Delivery of a packet in the network layer is accomplished by either a connection oriented service or a connection-less service. Connection Oriented Service: At first a … Read more
Connecting Devices: Devices that are used to connect other devices are called connecting devices. That is, connecting device is a device that connects. There are 4 types of connecting devices. They are as follows, i. Repeater: A repeater is a device that receives signals and before it become too weak or corrupted the repeater regenerates … Read more
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): This is a wireless network multiple access method defined by IEEE 802.11 standard. CSMA/CA is a modification to CSMA/CD. Collision detection as in CSMA/CD is not applicable for several reason, one reason is Hidden Terminal Problem. To understand this problem, considering that we have three stations 1, … Read more
CSMA/CD (Carrier Sense Multiple Access with Collision Detection): The IEEE 802.3 defines the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the standard access method for traditional Ethernet. Stations in a traditional Ethernet can be connected using a physical bus or star topology, but the logical topology is always a bus. It means that … Read more
To write a C program, we first create functions and then put them together. A C program may contain one or more sections. They are illustrated below.
Computer Threats: A threat, in general, is a person or a thing likely to cause damage or danger. In computer security, a computer threat is a possible danger that might exploit vulnerability to breach security and therefore cause possible harm. A computer threat is any activity that can cause damage to private or any data … Read more
Malware Malicious Software or Malware is any piece of software that disrupts computer operation, steal information, gain access to private systems or display unwanted advertising. Malware causes intentional harm, direct or indirect, to the computer by damaging files etc. or to the user by stealing sensitive information of the user from the computer etc. A … Read more
CPU or central processing unit in computer is an electronic circuitry that carries out the instruction given by a computer program. CPU in computer execute instruction by performing basic arithmetic, logical, control and I/O operations as required per instruction. CPU in computer is considered to be the brain of the computer. The speed and efficiency of a computer mostly depends on it’s CPU.
Motherboard: A motherboard is a printed circuit board (PCB) that holds other modular devices, both required and additional, and facilitate communication among the devices to actually have the computer be functional. Motherboard is like a backbone to a computer system. Components like CPU, RAM, Harddisks along with additional devices like TV Cards, graphics etc. all … Read more
Instruction Set Architecture (ISA): An instruction set is the interface between a computer’s software and its hardware, and thereby enables the independent development of these two computing realms. ISA is the set of basic instructions that a processor understands. ISA includes functional definition of operations, modes, and storage locations supported by hardware and precise description of … Read more