Information Technology consists of all forms of technology used to create, store and exchange information in various forms, i.e. it incorporates all computerized and automated information handling including system design…
Month: June 2021
Classification of Computers
General purpose computers come in many sizes and capabilities. Traditionally, computers were classified by their size, processing speed, and cost. Based on these factors and generations, computers were classified as:…
Computer Generations and Its Types
The term computer generation refers to the development of both the hardware and software technologies. Each step of development in computer is regarded as a new generation of computers. Each…
List of Secondary Storage Devices
It is important to know the difference between secondary storage and a computer’s main memory. The primary (computer’s) memory or commonly known as random access memory (RAM) is the volatile…
Cisco Certified Internetwork Expert – CCIE – Part 3
The CCIE Certification is the highest level of achievement for network professionals, certifying an individual as an expert or master. Cisco Systems has since become an unrivaled worldwide leader in…
Top 10 Computer Keyboard Shortcuts
Hello Everyone! You can easily increase your productivity by using computer keyboard shortcuts which actually increase your focus in your work too. For example, to copy any text, you can…
[#13] – Inheritance – Questions
Inheritance is one of the key concept in the Object Oriented Programming language like C++, that enables you to organize classes in a hierarchical form. Just like a child inherits…
[#14] – Virtual Functions – Questions
Polymorphism is a very powerful concept that allows the design of amazingly flexible applications. Polymorphism can be defined as one interface multiple methods which means that one interface can be…
[#12] – Operator Overloading and Type Conversion – Questions
Like function overloading, C++ also support a powerful concept called operator overloading. C++ contains a rich set of operators such as +,-,*,>>,<,++ etc which work on built-in types such as…
[Solution] Fix and Recover a corrupt history file in zsh – Linux
If you ever see a message like this upon opening a new shell – “zsh: corrupt history file /root/.zsh_history“. You can easily fix your history file by extracting only the…
How To Change the MAC Address in Kali Linux with Macchanger
Most people ask themselves whether they can be tracked over the Internet by having their MAC Address or IP address detected by others. It’s true that IP addresses are no…
How to Bypass Mac Filtering on Wireless Networks
MAC address filtering allows only a set list of hardware devices connect. Every device will have a unique MAC address. However, using a sniffer the MAC address of a valid…
Wireless Adapter Packet Injection Test
Wi-Fi Adapters are devices that allow computers to connect to the Internet and to other computers without using wires. A USB WiFi adapter overrides the computer’s built-in wireless functionality, giving…
[Top 30] Checkpoint Firewall Questions with Answers
Checkpoint is a cyber security architecture which offers the perfect combination of proven security, easy deployment, and effective management by consolidating key security applications (firewall, VPN, intrusion prevention, and antivirus…
[#11] – Constructors and Destructors – Questions
Initializing a variable is considered very helpful while making programs. We can initialize variables of built-in data types at the time of their declarations. For Example int a = 10;…
Cisco Certified Internetwork Expert – CCIE – Part 2
The CCIE Certification is the highest level of achievement for network professionals, certifying an individual as an expert or master. Cisco Systems has since become an unrivaled worldwide leader in…