Let us first discuss the SDLC, you'd be wonder to hear from me that as far as Software development is concerned there is no practical SDLC to apply. In-fact every software development process propose its own development life cycle model or in other words. There is no any specific SDLC to fit in any development … Read more
The term key used in database has vital importance. It is the one of the unique record in Database with the help of which we can identify the other records, let have an example to understand.
Suppose we are making database for school in which every class should have record. Now to identify one student … Read more
If we say web spoofing than it would be more appropriate, well web spoofing all relate to the Internet hacking and as there are various kinds of Internet hacking and spoofing is one of them.
How web spoofing works? This can be an actual question to ask.
Well in short word web spoofing means making … Read more
Protocol has key role in today's communication world, without protocol it is not possible for one computer to communicate with another computer.
Let have a example from daily life to understand the working of protocol in Internet.
Just Imagine you are in France but you don't know how to speak French. Is it possible for … Read more
Well, to walk in an interview certainly needs some preparation and we can divide this preparation in two categories in general
1. Dress & Personality Preparation
2. Mental Preparation
Dress & Personality preparations varies from culture to culture; for example if you have interview in IRAN and you are wearing a tie, then it can … Read more