Skip to main content

Posts

Showing posts from May, 2019

What is PageRank (PR) ? | Comingfly

What is PageRank (PR) ? PageRank ( PR) is an algorithm used by Google Search to rank websites in their search engine results. PageRank was named after Larry Page, one of the founders of Google. PageRank is a way of measuring the importance of website pages. According to Google: It is not the only algorithm used by Google to order search engine results, but it is the first algorithm that was used by the company, and it is the best-known. Algorithm The PageRank algorithm outputs a probability distribution used to represent the likelihood that a person randomly clicking on links will arrive at any particular page. PageRank can be calculated for collections of documents of any size. It is assumed in several research papers that the distribution is evenly divided among all documents in the collection at the beginning of the computational process. The PageRank computations require several passes, called “iterations”, through the collection to adjust approximate PageRank values to mor

What is Secure Sockets Layer (SSL) Certificate | comingfly

What is Secure Sockets Layer (SSL) Certificate Secure Sockets Layer (SSL) is the predecessor of Transport Layer Security (TLS), which is a cryptographic protocol for secure Internet data transmission. Secure Sockets Layer (SSL) is a standard protocol used for the secure transmission of documents over a network. Developed by Netscape, SSL technology creates a secure link between a Web server and browser to ensure private and integral data transmission. SSL uses Transport Control Protocol (TCP) for communication. In SSL, the word socket refers to the mechanism of transferring data between a client and Server over a network. When using SSL for secure Internet transactions, a Web server needs an SSL certificate to establish a secure SSL connection. SSL encrypts network connection segments above the transport layer, which is a network connection component above the program layer. SSL follows an asymmetric cryptographic mechanism, in which a Web browser creates a public key and

What is Data Access Objects ( DAO) ? | Comingfly

What is Data Access Objects ( DAO) ? Dao stand for data access object . DAO is an application and programming language. DAO available with Microsoft Visual Basic. DAO is a structured data for DATABASE,   when will be working database so access Microsoft DATA.  Which can access all kind of data format in the field INTEGER, LONG, DOUBLE, CHARACTERS, TEXT ETC.   it can also support a sql. DAO is an object that provide an abstract interface to some time of database.  it's turn of domain specific objects and data types. 

Components Of Computer Network | Comingfly

Components Of Computer Network Major components of a computer network are: 1. NIC(National interface card) NIC is a device that helps the computer to communicate with another device. The network interface card contains the hardware addresses, the data-link layer protocol use this address to identify the system on the network so that it transfers the data to the correct destination. There are two types of NIC: wireless NIC and wired NIC. Wireless NIC:  All the modern laptops use the wireless NIC. In Wireless NIC, a connection is made using the antenna that employs the  radio wave technology . Wired NIC:  Cables use the  wired NIC  to transfer the data over the medium. 2. Hub Hub is a central device that splits the network connection into multiple devices. When computer requests for information from a computer, it sends the request to the Hub. Hub distributes this request to all the interconnected computers. 3. Switches Switch is a

Use of Computer Network ? | Comingfly

  Use of Computer Network? Computer Network  is a group of computers connected with each other through wires, optical fibers or optical links so that various devices can interact with each other through a network. The aim of the computer network is the sharing of resources among various devices. In the case of computer network technology, there are several types of networks that vary from simple to complex level.

The Hobbit Story ? | Comingfly

The Hobbit         Bilbo Baggins is a hobbit who enjoys a comfortable and quiet life.  His contentment is disturbed one day when the wizard, Gandalf, and the dwarves arrive to take him away on an adventure.          Bilbo Baggins is a hobbit who enjoys a comfortable, unambitious life, rarely travelling further than the pantry of his hobbit-hole in Bag End.But his contentment is disturbed when the wizard, Gandalf, and a company of thirteen dwarves arrive on his doorstep one day to whisk him away on an unexpected journey ‘there and back again’.           They have a plot to raid the treasure hoard of Smaug the Magnificent, a large and very dangerous dragon…The prelude to The Lord of the Rings, The Hobbit has sold many millions of copies since its publication in 1937, establishing itself as one of the most beloved and influential books of the twentieth century.

My Brilliant Friend Famous story | Comingfly

My Brilliant Friend Now an HBO series, book one in the  New York Times  bestselling Neapolitan quartet about two friends growing up in post-war Italy is a rich, intense, and generous-hearted family epic by Italy’s most beloved and acclaimed writer, Elena Ferrante, “one of the great novelists of our time.” (Roxana Robinson,  The New York Times ) Beginning in the 1950s in a poor but vibrant neighborhood on the outskirts of Naples, Ferrante’s four-volume story spans almost sixty years, as its protagonists, the fiery and unforgettable Lila, and the bookish narrator, Elena, become women, wives, mothers, and leaders, all the while maintaining a complex and at times conflictual friendship. Book one in the series follows Lila and Elena from their first fateful meeting as ten-year-olds through their school years and adolescence.

Tom Thumb Famous story | Comingfly

Tom Thumb Story Famous story ! Long ago, in the merry days of good King Arthur, there lived a ploughman and his wife. They were very poor, but would have been contented and happy if only they could have had a little child. One day, having heard of the great fame of the magician Merlin, who was living at the Court of King Arthur, the wife persuaded her husband to go and tell him of their trouble. Having arrived at the Court, the man besought Merlin with tears in his eyes to give them a child, saying that they would be quite content even though it should be no bigger than his thumb. Merlin determined to grant the request, and what was the countryman’s astonishment to find when he reached home that his wife had a son, who, wonderful to relate, was no bigger than his father’s thumb!  Long ago, in the merry days of good King Arthur, there lived a ploughman and his wife. They were very poor, but would have been contented and happy if only they could have had a little child.

Home Loan | Comingfly

Home Loan  Features and Benefits Get a home loan up to Rs. 3.5 crore from Bajaj Finserv at lowest interest rate in India with added features like additional top-up loan and doorstep service. Whether you’re looking to purchase your first home, or you want to construct your own house, or if you just want to renovate your current home, our home loan offerings meet all your requirements. You can also reduce your home loan EMIs by transferring your existing home loan to us at lowest rate of interest in India, plus a top up loan up to 50% of your sanctioned home loan amount. So apply online for a Bajaj Finserv Home Loan today, and get instant approval on your Home Loan. Here's a look at different features and benefits of home loans from Bajaj Finserv: Pradhan Mantri Awas Yojna (PMAY) Home Loans get more affordable than ever, with assistance from the Pradhan Mantri Awas Yojna (PMAY) for first-time homeowners. Reduce your Home Loan EMIs with PMAY, b

Business Loans | Comingfly

Bank Term Loans for Small Business A  basic commercial bank loan  is called a bank term loan or a commercial loan. A bank term loan has a particular term or length of maturity and usually a fixed  interest rate . The repayment of the principal of bank term loans are usually  amortized , which means that the principal and interest are set up as equal periodic payments designed to pay off the loan in the specified period of time. In the past, small businesses have lived and died on the strength of bank loans, their primary source of small business financing. During the Great Recession of 2008, this somewhat changed as banks became more reticent to lend and small businesses had to start looking at alternative sources of financing. Types of Bank Term Loans The  American Bankers Association  generally recognizes two types of bank term loans. The first is the intermediate term loan which usually has a maturity of one to three years. It is often used to finance wo

What is Cryptology | Comingfly

What is Cryptology   Cryptology ,  science  concerned with data  communication  and storage in secure and usually secret form. It  encompasses  both  cryptography  and cryptanalysis. The term  cryptology  is derived from the Greek  kryptós  (“hidden”) and  lógos  (“word”). Security obtains from  legitimate  users being able to transform  information  by virtue of a secret key or keys—i.e., information known only to them. The resulting  cipher , although generally inscrutable and not forgeable without the secret key, can be decrypted by anyone knowing the key either to recover the hidden information or to authenticate the source. Secrecy, though still an important function in cryptology, is often no longer the main purpose of using a transformation, and the resulting transformation may be only loosely considered a cipher. Cryptography (from the Greek  kryptós  and  gráphein , “to write”) was originally the study of the principles and techniques by which information could be

What is Cyber Security | Comingfly

What is Cyber Security The Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Description:  Major areas covered in cyber security are: 1)  Application Security 2)  Information Security 3)  Disaster recovery 4)  Network Security Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance. Some basic techniques used for application security are:  a)  Input parameter validation,  b) User/Role Authentication & Authorization,  c)  Session management, parameter manipulation & exception management, and  d)  Auditing and logging. Information security protects information from unauthorized access to avoid identity theft and to protect privacy.

What is Cryptography ? | Comingfly

What is Cryptography ?   Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication. Description:  Earlier cryptography was effectively synonymous with encryption but nowadays cryptography is mainly based on mathematical theory and computer science practice. Modern cryptography concerns with: Confidentiality - Information cannot be understood by anyone Integrity - Information cannot be altered. Non-repudiation - Sender cannot deny his/her intentions in the transmission of the information at a later stage Authentication - Sender and receiver can confirm each Cryptography is used in many applications like banking transactions cards, computer passwords, and e- commerce t

E commerce Uses | Comingfly

E commerce Today Today, in all aspects of our daily lives, the Internet has become an undivided part of our lives, as it has a versatile impact on our social activities. Every day, going to the bank to make cash transactions or withdraw money or go to the market to buy things and essential commodities is now quite difficult since there is no time, the human being has become too busy in his work and, So, in these circumstances, online purchases have become an increasingly integral part of our society, exceeding $ 200 billion in sales only in 2010. The Internet economy is booming. E-commerce sales are expanding by leaps and bounds at a rate of 20% and 25% each year, indicating a far-reaching change in the spending habits of human clients. Internet instead of telephone directories or yellow pages for reviews of convenience products and to obtain updated information for your search and requirements.   A business owner simply can not trust an ad in the phone book, in fact, cust