Transmission Control Protocol(TCP) and Internet Protocol(IP) are two of the best known members of the Internet protocol suite, a suite …
OSI reference model
OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a …
Network related technologies and standards
Standards is the common methodology followed by all the developers or the manufactures of the hardware and software parts especially …
Network systems architecture
Network systems architecture was considered as the methods or the layout technique which all the computers are connected to form …
Network topologies
Network topologies Network topology is considered as the layout of a computer network and describe how each node are connected …
Database approaches
Database approaches is a methodology used by the database designer to develop the database for the proposed system. In present …
Data models and database technologies
In past and present, the database is considered as the place which is used to store the collection of data …
Java Virtual Machine
“Java Virtual Machine (JVM) is a specification that provides runtime environment in which java bytecode can be executed. As the …
Data Hiding
“Data hiding is a software development technique specifically used in object-oriented programming (OOP) to hide internal object details (data members). …
Principals of Java Programming
The basic three principles of JAVA are inheritance, polymorphism and encapsulation. All the concepts of JAVA are based on classes …