75 Basic Terms Related To Information Technology

Information Technology consists of all forms of technology used to create, store and exchange information in various forms, i.e. it incorporates all computerized and automated information handling including system design…

Classification of Computers

General purpose computers come in many sizes and capabilities. Traditionally, computers were classified by their size, processing speed, and cost. Based on these factors and generations, computers were classified as:…

Computer Generations and Its Types

The term computer generation refers to the development of both the hardware and software technologies. Each step of development in computer is regarded as a new generation of computers. Each…

List of Secondary Storage Devices

It is important to know the difference between secondary storage and a computer’s main memory. The primary (computer’s) memory or commonly known as random access memory (RAM) is the volatile…

List of Computer Output Devices You Need To Know

An output device is an important peripheral to facilitate the communication between user and the computer system because unless we obtain resulting information from the computer we are unable to…

List of Computer Input Devices You Need To Know

An input device is an important peripheral to facilitate the communication between user and the computer system because unless we have a way to provide information to the computer. we…

Cisco Certified Internetwork Expert – CCIE – Part 3

The CCIE Certification is the highest level of achievement for network professionals, certifying an individual as an expert or master. Cisco Systems has since become an unrivaled worldwide leader in…

Top 10 Computer Keyboard Shortcuts

Hello Everyone! You can easily increase your productivity by using computer keyboard shortcuts which actually increase your focus in your work too. For example, to copy any text, you can…

[#13] – Inheritance – Questions

Inheritance is one of the key concept in the Object Oriented Programming language like C++, that enables you to organize classes in a hierarchical form. Just like a child inherits…

[#20] – Introduction to C Programming Language – Questions

C is a general purpose, high-level programming language. Brian Kernighan and Dennis Ritchie created it at AT&T Bell laboratories in 1972 for writing the UNIX operating system. Although developed between…

[#14] – Virtual Functions – Questions

Polymorphism is a very powerful concept that allows the design of amazingly flexible applications. Polymorphism can be defined as one interface multiple methods which means that one interface can be…

[#12] – Operator Overloading and Type Conversion – Questions

Like function overloading, C++ also support a powerful concept called operator overloading. C++ contains a rich set of operators such as +,-,*,>>,<,++ etc which work on built-in types such as…

[Solution] Fix and Recover a corrupt history file in zsh – Linux

If you ever see a message like this upon opening a new shell – “zsh: corrupt history file /root/.zsh_history“. You can easily fix your history file by extracting only the…

[#19] – Classification of Computers – Questions

General-purpose computers come in many sizes and capabilities. Traditionally, computers were classified by their size, processing speed, and cost. Based on these factors, computers were classified as microcomputers, minicomputers, mainframes…

How To Change the MAC Address in Kali Linux with Macchanger

Most people ask themselves whether they can be tracked over the Internet by having their MAC Address or IP address detected by others. It’s true that IP addresses are no…

How to Bypass Mac Filtering on Wireless Networks

MAC address filtering allows only a set list of hardware devices connect. Every device will have a unique MAC address. However, using a sniffer the MAC address of a valid…

Wireless Adapter Packet Injection Test

Wi-Fi Adapters are devices that allow computers to connect to the Internet and to other computers without using wires. A USB WiFi adapter overrides the computer’s built-in wireless functionality, giving…

[Top 30] Checkpoint Firewall Questions with Answers

Checkpoint is a cyber security architecture which offers the perfect combination of proven security, easy deployment, and effective management by consolidating key security applications (firewall, VPN, intrusion prevention, and antivirus…

A Deep Dig Into Penetration Testing of FTP Server

Penetration Testing is an attempt to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible. Penetration testing these days can be executed and performed automatically…

[#11] – Constructors and Destructors – Questions

Initializing a variable is considered very helpful while making programs. We can initialize variables of built-in data types at the time of their declarations. For Example int a = 10;…

Cisco Certified Internetwork Expert – CCIE – Part 2

The CCIE Certification is the highest level of achievement for network professionals, certifying an individual as an expert or master. Cisco Systems has since become an unrivaled worldwide leader in…