Skip to main content

Posts

Showing posts from May, 2019

What is PageRank (PR) ? | Comingfly

What is PageRank (PR) ? PageRank ( PR) is an algorithm used by Google Search to rank websites in their search engine results. PageRank was named after Larry Page, one of the founders of Google. PageRank is a way of measuring the importance of website pages. According to Google: It is not the only algorithm used by Google to order search engine results, but it is the first algorithm that was used by the company, and it is the best-known. Algorithm The PageRank algorithm outputs a probability distribution used to represent the likelihood that a person randomly clicking on links will arrive at any particular page. PageRank can be calculated for collections of documents of any size. It is assumed in several research papers that the distribution is evenly divided among all documents in the collection at the beginning of the computational process. The PageRank computations require several passes, called “iterations”, through the collection to adjust approximate PageRank values to mor...

What is Secure Sockets Layer (SSL) Certificate | comingfly

What is Secure Sockets Layer (SSL) Certificate Secure Sockets Layer (SSL) is the predecessor of Transport Layer Security (TLS), which is a cryptographic protocol for secure Internet data transmission. Secure Sockets Layer (SSL) is a standard protocol used for the secure transmission of documents over a network. Developed by Netscape, SSL technology creates a secure link between a Web server and browser to ensure private and integral data transmission. SSL uses Transport Control Protocol (TCP) for communication. In SSL, the word socket refers to the mechanism of transferring data between a client and Server over a network. When using SSL for secure Internet transactions, a Web server needs an SSL certificate to establish a secure SSL connection. SSL encrypts network connection segments above the transport layer, which is a network connection component above the program layer. SSL follows an asymmetric cryptographic mechanism, in which a Web browser creates a public key and ...

What is Data Access Objects ( DAO) ? | Comingfly

What is Data Access Objects ( DAO) ? Dao stand for data access object . DAO is an application and programming language. DAO available with Microsoft Visual Basic. DAO is a structured data for DATABASE,   when will be working database so access Microsoft DATA.  Which can access all kind of data format in the field INTEGER, LONG, DOUBLE, CHARACTERS, TEXT ETC.   it can also support a sql. DAO is an object that provide an abstract interface to some time of database.  it's turn of domain specific objects and data types. 

Components Of Computer Network | Comingfly

Components Of Computer Network Major components of a computer network are: 1. NIC(National interface card) NIC is a device that helps the computer to communicate with another device. The network interface card contains the hardware addresses, the data-link layer protocol use this address to identify the system on the network so that it transfers the data to the correct destination. There are two types of NIC: wireless NIC and wired NIC. Wireless NIC:  All the modern laptops use the wireless NIC. In Wireless NIC, a connection is made using the antenna that employs the  radio wave technology . Wired NIC:  Cables use the  wired NIC  to transfer the data over the medium. 2. Hub Hub is a central device that splits the network connection into multiple devices. When computer requests for information from a computer, it sends the request to the Hub. Hub distributes this request to all the interconnected computers. 3...

Use of Computer Network ? | Comingfly

  Use of Computer Network? Computer Network  is a group of computers connected with each other through wires, optical fibers or optical links so that various devices can interact with each other through a network. The aim of the computer network is the sharing of resources among various devices. In the case of computer network technology, there are several types of networks that vary from simple to complex level.

Home Loan | Comingfly

Home Loan  Features and Benefits Get a home loan up to Rs. 3.5 crore from Bajaj Finserv at lowest interest rate in India with added features like additional top-up loan and doorstep service. Whether you’re looking to purchase your first home, or you want to construct your own house, or if you just want to renovate your current home, our home loan offerings meet all your requirements. You can also reduce your home loan EMIs by transferring your existing home loan to us at lowest rate of interest in India, plus a top up loan up to 50% of your sanctioned home loan amount. So apply online for a Bajaj Finserv Home Loan today, and get instant approval on your Home Loan. Here's a look at different features and benefits of home loans from Bajaj Finserv: Pradhan Mantri Awas Yojna (PMAY) Home Loans get more affordable than ever, with assistance from the Pradhan Mantri Awas Yojna (PMAY) for first-time homeowners. Reduce your Home Loan EMIs with PMAY, b...

Business Loans | Comingfly

Bank Term Loans for Small Business A  basic commercial bank loan  is called a bank term loan or a commercial loan. A bank term loan has a particular term or length of maturity and usually a fixed  interest rate . The repayment of the principal of bank term loans are usually  amortized , which means that the principal and interest are set up as equal periodic payments designed to pay off the loan in the specified period of time. In the past, small businesses have lived and died on the strength of bank loans, their primary source of small business financing. During the Great Recession of 2008, this somewhat changed as banks became more reticent to lend and small businesses had to start looking at alternative sources of financing. Types of Bank Term Loans The  American Bankers Association  generally recognizes two types of bank term loans. The first is the intermediate term loan which usually has a maturity of one to three yea...

What is Cryptology | Comingfly

What is Cryptology   Cryptology ,  science  concerned with data  communication  and storage in secure and usually secret form. It  encompasses  both  cryptography  and cryptanalysis. The term  cryptology  is derived from the Greek  kryptós  (“hidden”) and  lógos  (“word”). Security obtains from  legitimate  users being able to transform  information  by virtue of a secret key or keys—i.e., information known only to them. The resulting  cipher , although generally inscrutable and not forgeable without the secret key, can be decrypted by anyone knowing the key either to recover the hidden information or to authenticate the source. Secrecy, though still an important function in cryptology, is often no longer the main purpose of using a transformation, and the resulting transformation may be only loosely considered a cipher. Cryptography (from the Greek  kryptós  and...

What is Cyber Security | Comingfly

What is Cyber Security The Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Description:  Major areas covered in cyber security are: 1)  Application Security 2)  Information Security 3)  Disaster recovery 4)  Network Security Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance. Some basic techniques used for application security are:  a)  Input parameter validation,  b) User/Role Authentication & Authorization,  c)  Session management, parameter manipulation & exception management, and  d)  Auditing and logging. Information security protects information from unauthori...

What is Cryptography ? | Comingfly

What is Cryptography ?   Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication. Description:  Earlier cryptography was effectively synonymous with encryption but nowadays cryptography is mainly based on mathematical theory and computer science practice. Modern cryptography concerns with: Confidentiality - Information cannot be understood by anyone Integrity - Information cannot be altered. Non-repudiation - Sender cannot deny his/her intentions in the transmission of the information at a later stage Authentication - Sender and receiver can confirm each Cryptography is used in many applications like banking transactions cards, computer passwords, and e- c...

E commerce Uses | Comingfly

E commerce Today Today, in all aspects of our daily lives, the Internet has become an undivided part of our lives, as it has a versatile impact on our social activities. Every day, going to the bank to make cash transactions or withdraw money or go to the market to buy things and essential commodities is now quite difficult since there is no time, the human being has become too busy in his work and, So, in these circumstances, online purchases have become an increasingly integral part of our society, exceeding $ 200 billion in sales only in 2010. The Internet economy is booming. E-commerce sales are expanding by leaps and bounds at a rate of 20% and 25% each year, indicating a far-reaching change in the spending habits of human clients. Internet instead of telephone directories or yellow pages for reviews of convenience products and to obtain updated information for your search and requirements.   A business owner simply can not trust an ad in the phone book, in fact, ...

Impact of Sports in politics. | Comingfly

Impact of Sports in politics. OBJECTIVE:--                               Politics  and  sports  and  sports  diplomacy describes the use of  sport  as a means to  influence  diplomatic, social, and  political relations.  Sports  diplomacy may transcend cultural differences and bring  people  ..... A  study  of elections has shown that the result of  sports  events can  affect  the ..... " Celebrities  add color to  politics ".                   Celebrity influence  in  politics , also referred to as " celebrity politics ," or " political  star power," is the act of a prominent  person ... Social media is one of the most common areas for  celebrities  to  discuss  specific issues or current ...  Celeb...