computer generation types

Computer Generations and Its Types

The term computer generation refers to the development of both the hardware and software technologies. Each step of development in computer is regarded as a new generation…

List of Secondary Storage Devices

It is important to know the difference between secondary storage and a computer’s main memory. The primary (computer’s) memory or commonly known as random access memory (RAM)…

Output Devices Tech Hyme

List of Computer Output Devices You Need To Know

An output device is an important peripheral to facilitate the communication between user and the computer system because unless we obtain resulting information from the computer we…

computer input devices tech hyme

List of Computer Input Devices You Need To Know

An input device is an important peripheral to facilitate the communication between user and the computer system because unless we have a way to provide information to…

computer keyboard shortcuts techhyme

Top 10 Computer Keyboard Shortcuts

Hello Everyone! You can easily increase your productivity by using computer keyboard shortcuts which actually increase your focus in your work too. For example, to copy any…

Hacking Phases Tech Hyme

From Reconnaissance to Covering Tracks – 5 Phases of Ethical Hacking

Hacking is an art or a technique which is used to find the solution for a typical problem by implementing either the legal or illegal ways. It…

Cryptography MD5 Algorithms Types Tech Hyme

Cryptography -Types and Algorithms (MD5 Encrypt and Decrypt)

Cryptography is a tool for protecting information in our computer systems. The art of protecting information by encrypting into an unreadable format, called as cipher text. Only…

ip address tech hyme

About Internet Protocol (IP) Address

TCP/IP networks are interconnected across the world, each computer on the Internet must have a unique address (called an IP address) to make sure that transmitted data…

captcha tech hyme

Captcha And Its Types – With Examples

Whenever you try to register on a website or write a comment on a blog, first you are asked to enter some crazy characters which confuse everyone….

hacking_Security_Tools_Tech Hyme

A to Z – Cyber Security Tools Collection

Cyber Security tools are computer programs and scripts that help you find, exploit and secure vulnerabilities in computer systems, web applications, servers, and networks. There are many…

possible sensitive files tech hyme

Possible Sensitive Files – Vulnerability Scanning Checklist

Vulnerability Assessment is the process of evaluating the efficiency of the security controls of a system by measuring its security level. The scope of the process is…

chrome_safari_techhyme

The best browser Safari or Google Chrome? Find out for yourself!

Hello, followers of the “Tech Hyme” blog. In this article, we will learn about which one is the best browser, Safari or Google Chrome. Follow the article…