- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1301 Articles for MCA
![Nitin Sharma](https://www.tutorialspoint.com/assets/profiles/134888/profile/60_107635-1568620292.jpg)
16K+ Views
Both Synthesized and Inherited Attribute are the part of semantics of a language that provide meaning to its constructs, like tokens and syntax structure. Semantics help interpret symbols, their types, and their relations with each other and its analysis judges whether the syntax structure constructed in the source program derives any meaning or not. Now on the basis of features of attributes we can distinguish between Synthesized and Inherited AttributesFollowing are the important differences between Synthesized and Inherited Attributes.Sr. No.KeySynthesized AttributeInherited Attribute1DefinitionSynthesized attribute is an attribute whose parse tree node value is determined by the attribute value at child nodes.To ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
8K+ Views
In digital electronics, a counter is a sequential logic circuit that consists of a series of flip-flops. As the name suggests, counters are used to count the number of occurrences of an input in terms of negative or positive edge transitions.Based on the way the flip-flops are triggered, counters can be grouped into two categories: Synchronous counters and Asynchronous counters.Read through this article to find out how these two types of counters function and how they are different from each other.What is a Synchronous Counter?If the "clock" pulses are applied to all the flip-flops in a counter simultaneously, then such ... Read More
![Moumita](https://www.tutorialspoint.com/assets/profiles/13507/profile/60_122499-1557898491.jpg)
2K+ Views
The IEEE 802.16 is a set of standards defining the specifications for wireless broadband technology. It has been commercialized as Worldwide Interoperability for Microwave Access (WiMAX) that is responsible for the delivery of last-mile wireless broadband access. It lays down the standards for both physical layer as well as medium access control (MAC) layer for WiMAX.The IEEE 802.16 MAC sublayer is a part of the data link layer. The data link layer of WiMAX is divided into three sublayers as follows −Security sublayer − This is the bottommost layer and is concerned with the security and privacy of the wireless ... Read More
![Moumita](https://www.tutorialspoint.com/assets/profiles/13507/profile/60_122499-1557898491.jpg)
2K+ Views
The IEEE 802.16 set of standards lays down the specifications for wireless broadband technology. It has been commercialized as Worldwide Interoperability for Microwave Access (WiMAX) that is responsible for the delivery of last-mile wireless broadband access.The IEEE 802.16 MAC sublayer is the most important sublayer and concerned with channel management. It has been designed for connection-oriented channel management for point-to-multipoint (PMP) broadband services.The frame format of a generic MAC frame is shown below −The fields are −EC − A single-bit field indicating whether the payload is encrypted.Type − A 6-bit field identifying frame type.CI − A single-bit field denoting the ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
3K+ Views
A Token Bus Network is a network protocol used to transmit data. In a Token Bus Network, a virtual ring is formed between nodes/stations and token is transferred from one station to another in a sequential manner. Each node in a Token Bus Network knows the address of its successor and predecessor and can transmit data if it has the token. A Token Ring Network is similar to a Token Bus Network but it works around the physical ring instead of a virtual ring. A token is passed from one node to another in a sequential manner and each node ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
21K+ Views
Both CSMA/CA and CSMA/CD are network protocols for transmission that operate in the Medium Access Control Layer, however there are significant differences in the way they operate. Read through this article to find out more about CSMA/CA and CSMA/CD and how they are different from each other.What is CSMA/CA?CSMA/CA is a network protocol for carrier transmission that stands for Carrier Sense Multiple Access with Collision Avoidance. It works in the same media access control layer as CSMA/CD. This protocol is effective before the collision.Algorithm of CSMA/CAThe algorithm of CSMA/CA is as follows −When a frame is ready, the transmitting station ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
2K+ Views
Unshielded Twisted Pair or UTP are twisted pair cables that are used to transmit both data and voice, as their frequency range is suitable for transmission. UTPs are more cost-effective and are not needed to be grounded. Shielded Twisted Pair or STP are also a twisted pair cables but are required to be grounded, wants more maintenance, have high data transmission capacity and are costlier than UTP. Read through this article to find out more about UTP and STP cables and how they are different from each other. What are Shielded Twisted Pair (STP) Cables? IBM invented shielded twisted pair ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
1K+ Views
What is Topology?Network Topology is the way network links and nodes are connected with each other. The physical signal transmission medium is referred to as network topology. On the other hand, "logical network topology" refers to how the data flows through a network among the connected devices, regardless of their physical link.In this article, we will compare and contrast the different features of two network topologies − Ring Topology and Mesh Topology. Read through this article to find out how Ring Topology differs from Mesh Topology.What is Mesh Topology?A mesh network is a sort of local network structure that is ... Read More
![Ajay yadav](https://www.tutorialspoint.com/assets/profiles/152707/profile/60_183870-1577075932.jpg)
70K+ Views
Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.Port scanning – Enumerating the open ports on target hosts.OS detection – Determining the operating system and hardware characteristics ... Read More
![Moumita](https://www.tutorialspoint.com/assets/profiles/13507/profile/60_122499-1557898491.jpg)
511 Views
Orthogonal frequency division multiple access (OFDMA) is a multi-user version of digital data modulation scheme OFDM (orthogonal frequency division multiplexing). In OFDM, a single stream of data is divided into several separate sub-streams for transmission via multiple channels. OFDM uses the principle of frequency division multiplexing (FDM), where the available bandwidth is divided into a set of sub-streams having separate frequency bands.In OFDMA, multiple access is achieved by assignment of different subsets of subcarriers to individual stations. This permits transmission to go on simultaneously at lower data rate from several stations.The stations assigned to a given subcarrier alternate between sending ... Read More