Electronic devices and network technology plays an important role in our life. Wi-Fi technology is wireless local area network technology which allow electronic device to access internet. Whereas Li-Fi technology is a light based communication technology that delivers a high-speed, bidirectional network and mobile communication. This article deals how these technology works and what is the main difference between Li-Fi and Wi-Fi technology.
The International Mobile Equipment Identity or IMEI is a device identification number mentioned below the battery of every mobile phone device for the identification of the particular mobile device. This number is different in every mobile device. IMEI number tells that where the mobile device is made and what is the model number of the device.
TRAI is Telecom Regulatory Authority of India. Its main purpose is to regulate telecommunication services, adjudicate disputes, dispose appeals and protect the interest of the service providers as well as consumers. It establishes standards for Quality of Services (QoS) and supervise how service providers share revenue. This article deals with the role of TRAI, its functions and how it works.
The Black Box or Flight Data Recorder of an Airplane is an instrument which records all the activities of the airplane during its flight. From the security point of view, this box is generally kept at the back side of the airplane.
Cyber Crime is an unlawful act where the computer is used as a tool or target or both. These days Cyber Crime is a fast-growing area of crime. Apart from other countries in India also the rate of incidence of cyber crime is increasing day by day. Main focus in this article is what cyber crime is, how it is increasing, types of cyber crime, cyber laws, and what all measures are taken by the government to curb it etc.
Computer is the backbone of all the industries, organisations and human life. In the recent exams almost 3 to 5 questions are asked related to computer. So to fulfill this requirement of the aspirants we are providing some important Computer Abbreviation for competitive Exams.
Computer security is a branch of computer technology known as information security as applied to computers and networks.
Malicious software, better known as malware, is usually spread through e-mail and over the Internet.
Application software is a program or group of programs designed for end users.
Data mining (the analysis step of the "Knowledge Discovery in Databases" process, or KDD) is a field at the intersection of computer science and statistics, and is the process that attempts to discover patterns in large data sets.
A computer is a general purpose device that can be programmed to carry out a finite set of arithmetic or logical operations.
With over a million types of robots, their presence is seen in almost every industry
Robots can be described as mechanical devices that are capable of performing a variety of complex human tasks
The word ‘robot’ is derived from the Czech word ‘robota’
The Internet is not owned or funded by any one institution, organization, or government. It has no CEO and is not a commercial service. Its development is guided by the Internet Society (ISOC), composed of volunteers.
The marvels of electronic miniaturization that are modern PCs are a relatively recent development. They are the descendants of vacuum- tube devices introduced in the early 20th century.