- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Sudhir sharma has Published 1206 Articles
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
942 Views
PeStudio is a popular and powerful software analysis tool that allows users to analyze executable files for various Windows operating systems. The software was developed by the Belgian company, Marc Ochsenmeier, and is widely used by malware analysts, software developers, and security researchers around the world. We will provide an ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
559 Views
Fibre Channel Protocol (FCP) is a communication protocol designed to provide fast and dependable data transfers between servers and storage devices in storage area networks (SANs). History of FCP FCP was first introduced in the early 1990s as a outcome of a deal between the tech giants among IBM, HP, ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
605 Views
A network hub is a common networking device that allows multiple devices to communicate with each other. Hubs are used in local area networks (LANs) to connect devices together, such as computers, printers, and servers. This article will explore the basics of network hubs, including how they work, the different ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
5K+ Views
Radio broadcasting has come a long way since its inception over a century ago. From analog to digital, radio broadcasting has evolved to provide listeners with high-quality audio that can be received on a variety of devices. One of the latest advances in radio broadcasting is Digital Audio Broadcasting (DAB), ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
678 Views
Spread Spectrum Communication, a technique used to enhance the reliability and security of wireless transmissions. Spread spectrum communication involves spreading a signal over a wide range of frequencies, which makes it difficult for unauthorized users to intercept or jam the signal. This technique employs different methods to spread the signal, ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
417 Views
When computers communicate over the internet, they follow a set of rules and protocols to ensure that data reaches its intended destination. These protocols outline how data is sent, received, and processed by computers, and are necessary for ensuring that the communication is successful. Transmission Control Protocol (TCP) is a ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
3K+ Views
Architecture in networking refers to the way a network is designed and organized, serving as the blueprint for the interaction and cooperation between different components and systems. Effective network architecture is crucial for a successful network setup and requires careful planning and design. When it comes to classifying network architecture, ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
2K+ Views
Encrypting sensitive information is like locking up your valuables in a strongbox, making sure that only those with the key can access it. And one tried and true method for doing so is the Symmetric Cipher Model, also known as Secret Key Cryptography. This encryption model is like having a ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
403 Views
An IP address is like a digital fingerprint, revealing your location and identity online. But just like how you can put on a disguise to hide your physical identity, you can also conceal your IP address to protect your privacy and security. Here are a few methods to do so ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
sudhir sharma
93 Views
In this problem, we are given two arrays arr[] and del[]. Our task is to find the smallest after deleting given elements.We will be deleting values from the array arr[] that are present in del[]. And then print the smallest value after deletion.Let’s take an example to understand the problem, ... Read More