PERVERSE SOFTWARE: Perverse means contrary to what is acceptable and expect able. A perverse software is a program which causes trouble in the execution of ...
Computer accepts data through various input devices. The control unit controls its entire operation including its input and output devices. After the data is ...
Magnetic Memory: The limitations of primary storage devices like limited data storage capacity, high cost and volatile nature, some inexpensive data storage ...
Memory Hierarchy: CPU registers are at the top and a fast cache memory is there between the CPU and main memory. The hard disk is used by the technique of ...
Evolution of Computer Generations. The modern computer took its shape with the advent of time. It was around 16th century when the evolution of computer ...
Origin of Computer: The computers were invented to compute, and the basic role of computers was to calculate, or to perform lengthy calculations in ...
Classification of computer based on technology: Analog Computers: An analog computer can perform arithmetical operations by using some variable physical ...
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer. A driver provides a ...
Debugger: As its name suggests the debugger is used to test and debug programs. The debugger allows a user to test a program step by step, so that the problem ...
OSI Layers model has seven layers Application, Presentation, Session, Transport, Network, data link and physical. PHYSICAL LAYER: The physical ...
Open-source software development Model: Open-source software development can be divided into several phases. A diagram displaying the process-data ...
Linker: There are certain programs which are large its size and cannot be executed at one go simultaneously. Such programs are divided into subprograms ...