- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Pranavnath has Published 448 Articles
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
1K+ Views
Repeaters and bridges are both networking devices, both used to extend the range of a network, more specifically bridge provides the facility to combine various LANs (Local Area Networks) to develop a larger LAN. While repeaters are mainly used to amplify signal strength when the signal comes to the repeater ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
775 Views
In an IT field or any company, the computer systems are interconnected to the same server to share information among them. It follows distributed information systems, in which every computer is physically connected and connected to a common network. RPC stands for Remote Procedure Call which is a type of ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
5K+ Views
People are getting connected easily with others using the network for sharing data. The data is transmitted from the sender side to the client side either in a wired or wireless connection and the mode of medium will be guided or unguided. For the wired way of data transmission, the ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
391 Views
Filtering Filtering is the process of validating or screening, whether input data given by the user meets the standard format or not. Content filtering is the process of screening emails or web pages that are undesirable. These operate with predefined patterns that include user text string or image data. Recent ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
113 Views
Pubic Wi-Fi is more dangerous in the early times and now it has included solutions to the risks of Wi-Fi. In the modern world, Wi-Fi is installed in every place to make people have easier access to the internet. Even though it provides the usage of the internet without any ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
92 Views
Hosting When the user or customer wants to host a website or any web application which can be accessed using an Internet connection and this hosting service is done by the server. A server is a system that provides the user with data storage space, resources, software tools, interfaces, etc., ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
395 Views
In the world of cyberattacks, organizations should have a trustable source to make secured file transfers. For this IETF (Internet Engineering Task Force) developed a protocol named the Secured File Transfer Protocol along with the secure shell to have the strongest protection against hackers. Using this protocol, we can avoid ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
2K+ Views
BSS and ESS are terms used in wireless networking to describe different types of wireless networks and their functions. A BSS is a wireless network made up of a group of devices within range of an access point and its AP, while an ESS is a network made up of ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
267 Views
Encryption is a method to protect the incoming message by coding the plain text into an encoded one called the cipher text. The main ideology behind encryption is to protect the data transmitted to be secured from any type of attack. There are typically two types of encryptions namely symmetric ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
Pranavnath
18K+ Views
Cloud Computing provides the facility to a wide range of services stored in the cloud or Internet. The Services provided by cloud computing are computer resources, data storage, applications, servers, developmental tools, and networking protocols. It is most popularly used by IT firms and for business requirements. The term “Cloud ... Read More