- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1259 Articles for Computers
![Pradeep Kumar](https://www.tutorialspoint.com/assets/profiles/483469/profile/60_891162-1657084658.jpg)
35K+ Views
Excel is a strong tool for calculations and data analysis, and it provides a number of formatting options to improve the visual representation of your data. Negative numbers are frequently formatted using brackets, which can make it simpler to identify them from positive values. In this tutorial, we'll look at how to set up Excel to automatically display negative values in brackets step−by−step. We'll go over several approaches, such as leveraging Excel's built−in number formatting features and developing unique formatting rules. By the end of this article, you will be able to present negative values in brackets with ease, giving ... Read More
![Pradeep Kumar](https://www.tutorialspoint.com/assets/profiles/483469/profile/60_891162-1657084658.jpg)
403 Views
In many applications, combo boxes are a common user interface component that offer users a list of options to select from. A combo box by default only shows one column of information, generally a list of items. However, there are scenarios where you may need to display additional information alongside the items in the combo box, such as associated IDs, descriptions, or other relevant details. Based on the programming language or framework you are using; we will cover various methods for displaying multiple columns in a combo box in this tutorial. By the end of this tutorial, you will have ... Read More
![Pradeep Kumar](https://www.tutorialspoint.com/assets/profiles/483469/profile/60_891162-1657084658.jpg)
4K+ Views
With a wide selection of chart types available, Excel is a potent tool for data analysis and visualisation. While making separate charts for various data sets is helpful, there are times when you might wish to group several charts together on a single chart sheet. Combining charts can make it easier to compare and analyse data trends, provide you a thorough perspective, and improve the overall visual impact. In this article, we'll look at a variety of Excel display strategies for numerous charts on a single chart page. This post will walk you through the step−by−step process of producing and ... Read More
![Pradeep Kumar](https://www.tutorialspoint.com/assets/profiles/483469/profile/60_891162-1657084658.jpg)
470 Views
Pie charts are a common and useful approach to show data distribution; however, it can occasionally be difficult to identify each data point precisely. Leader lines are helpful in situations like these. Leader lines make it simpler for readers to recognise and comprehend the values shown in the chart by linking the data labels to their appropriate data slices. You will be guided step−by−step through the process of adding leader lines to your Excel pie chart in this tutorial. This tutorial will provide you with the knowledge and abilities you need to improve the clarity and visual attractiveness of your ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
387 Views
Introduction A time−based access list is a feature in network security tools that enables network administrators to control the traffic through a network based on the time of day, week or month. This type of access list allows administrators to increase security by only permitting specific users or devices to access the network during certain times, while blocking others. Definition of Time−Based Access-List A Time-Based Access−List (ACL) is a set of rules used to filter traffic passing through a router or switch based on date and time parameters. It is an extended version of an Access Control List ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
72 Views
Introduction A Time Access List (TAL) is a security mechanism that provides access control to resources based on time. Essentially, it lets an administrator or system owner specify a list of users who can access particular resources during specified periods. For example, a company might use a TAL to allow employees access to sensitive data only during working hours. The TAL works by restricting access to specific resources at particular times or dates, making sure that only authorized users are granted entry. This process can be incredibly useful for organizations with multiple users who require varying levels of ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
2K+ Views
Introduction Cryptography is the practice of securing information and communication through the transformation of messages into unintelligible formats for unauthorized access. In modern communication, cryptography plays a vital role in ensuring that sensitive data transmitted over networks remains secure. Advances in technology have made it easier to store, transmit and disseminate information making cybersecurity more important than ever before. Definition of Cryptography Cryptography is derived from the Greek word kryptos meaning hidden or secret, and graphia meaning writing. It is the process of securing communication by converting plain text into code or cipher text using encryption algorithms so ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
1K+ Views
Introduction Software testing is an essential aspect of software development that ensures the quality and reliability of a software product. Testing involves executing test cases, which are designed to verify the functionality and behavior of the software. However, in reality, it is not always possible to execute all the test cases due to time and resource constraints. This is where test case prioritization comes into play. Definition of Test Case Prioritization Test case prioritization is a technique used in software testing to determine the order in which test cases should be executed based on their relative importance. ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
253 Views
Introduction In today's world where cyber attacks are becoming more frequent and complex, network security is a top priority for businesses. One of the most common ways to manage network security is through the use of firewalls, with Cisco Adaptive Security Appliance (ASA) being one of the most popular firewalls used in enterprise networks. In this article, we will focus on two protocols that are commonly used to manage ASA: Telnet and SSH. Definition of TELNET and SSH Telnet (TErminal NETwork) is a protocol used for remote access to devices over a network. It allows users to connect ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
411 Views
Introduction In today's world, communication is an integral part of our daily lives. We rely on telecommunication networks to connect with people from different parts of the world, access information and conduct businesses. Telecommunications refers to the exchange or transmission of information between two or more devices through a medium such as wires, cables, or airwaves. The process involves sending and receiving data and voice signals through complex networks that span across cities and countries. In this article, we will take a deep dive into telecommunication networks. Definition of Telecom Networks Telecom Networks refer to the infrastructure ... Read More