Often, using a single routing protocol in an organisation is preferred but there are some conditions in which we have to use multi protocol routing. These condi
Consider a situation when you are not able to access a website and can access other websites. You would want to know if this is a problem with your network, som
If a single administrator wants to access 100 routers and local database of the device is used for username and password (authentication) then the administrator
If a single administrator wants to access 100 routers and local database of the device is used for username and password (authentication) then the administrator
In computing, a server is a computer program or a device that provides functionality for called clients which are other programs or devices. This architecture i
EtherChannel is a port link aggregation technology in which multiple physical port links are grouped into one logical link. It is used to provide high speed lin
Unicode is a universal encoding system to provide a comprehensive character set and was created by the Unicode consortium (a group of multilingual software manu
Supernetting is the opposite of Subnetting. In subnetting, a single big network is divided into multiple smaller subnetworks. In Supernetting, multiple networks
Negative Number Representation Sign Magnitude Sign magnitude is a very simple representation of negative numbers. In sign magnitude the first bit is dedicate
A port is basically a physical docking point which is basically used to connect the external devices to the computer or we can say that A port act as an interfa
Introduction: A computer is an electronic device that manipulates information or data. It has the ability to store, retrieve, and process data. Nowadays, a comp
FLOATING POINT ADDITION AND SUBTRACTION FLOATING POINT ADDITION To understand floating point addition, first we see addition of real numbers in decimal as sa
In computer central processing units, micro-operations (also known as micro-ops) are the functional or atomic, operations of a processor. These are low level in
Registers are the fastest locations in the memory hierarchy. But unfortunately, this resource is limited. It comes under the most constrained resources of the t
Booth algorithm gives a procedure for multiplying binary integers in signed 2’s complement representation in efficient way, i.e., less number of additions/sub
Cache Memory is a special very high-speed memory. It is used to speed up and synchronizing with high-speed CPU. Cache memory is costlier than main memory or dis
Computer performance is the amount of work accomplished by a computer system. The word performance in computer performance means “How well is the computer doi
The 8085 microprocessor is an example of Microcomputer System. A microprocessor system contains : two types of memory that are EPROM and R/WM, Input and Output
MPU communicates with the outside world with the help of some external devices which are known as Input/Output devices. The MPU accepts the binary data from inp
The basic computer has 16-bit instruction register (IR) which can denote either memory reference or register reference or input-output instruction. Memory Refer
Simplified Instructional Computer (SIC) is a hypothetical computer that has hardware features which are often found in real machines. There are two versions of
Following are some of the advanced functions defined in SQL: BIN(): It converts a decimal number to a binary number. Syntax: SELECT BIN(18); Output: BINARY(): I
Computer Graphics Computer graphics are pictures and films created using computers. Usually, the term refers to computer-generated image data created with the h
Data Structures are used to store and manage data in an efficient and organised way for faster and easy access and modification of Data. Some of the basic data