- Windows
- Wi-Fi(wireless fidelity)
- Wide Area Network (WAN)
- What things to do when bored on the Internet
- What is VPN?
- What is Virus?
- What Is Telnet?
- What is Ransomware?
- What is operating system?
- What is Network explain in detail
- What is Network sniffing?
- What is Network Enumeration?
- What is MAC Flooding?
- What is ip address
- Define FDD(floppy disk drive)
- What is E-commerce?
- What is DHCP ?
- what is cyber security
- What is Cowpatty?
- What is a Digital Wallet?
- What is a solid state drive (SSD)?
- What is a Browser?
- What is 4G?
- What are the advantage of INTERNET
- URL
- Types of router
- The OSI MODEL
- SOCIAL MEDIA
- Simple Mail Transfer Protocol (SMTP)
- Server
- Search engine
- Safeguarding Your Digital Wallet
- Risks Associated with Digital Wallets
- Protocol
- Popular Digital Wallets
- OPTICAL DISKS
- Online game
- Monitor
- JOYSTICK
- Definition – Internet Service Provider (ISP)
- CONTENTS (CCC)
- Introduction to Cyber Secure User
- What is Http? advantage of http
- How to Installation Windows for PC
- How can you avoid ARP poisoning?
- What is host?Hostname rules and restrictions
- History of RAID
- History of GPS
- Contents
- Graphical User Interface (GUI)
- FTP
- Explain Whois
- Explain Sensitive Data?
- Explain in CUI and GUI
- DNS Types: 3 DNS Query Types
- Define Web page
- Define (World Wide Web) www
- DEFINE WEB DESIGN & WEB DEVELOPMENT
- DEFINE SMS
- Top 5 Rechest People
- Define Scanning.
- ARPANET
- What is Bit
- what is byte
- C Language
- Cloud storage
- Context Diagram
- Cyber Law
- Data modeling
- Database
- Database Administrator
- DBMS(Data Base Management System)
- Decryption
- Domain
- Explain programming language.
- Gateway
- Hotspot (WIFI)
- HTML
- INTRANET
- Meaning of AI
- Meaning of Program Algorithm
- Website Explain in detail.
- Microsoft Office
- Microwave transmission
- Network architecture
- Network Time Protocol (NTP)
- NFC (Near field communication)
- Normalization
- Number System
- Ping
- Plug-in
- Program Logic
- RDBMS
- Remote Desktop Protocol (RDP)
- Explain about ROBOT
- Satellite
- Search engines
- Secure Shell (SSH)
- Secure socket layer (SSL)
- SDLC (System Development Life Cycle)
- Transmission media
- System Analysis
- System
- Transmission Control Protocol/Internet Protocol(TCP/IP)
- Transmission Modes in Computer Networks
- TYPE “C”
- USB On-The-Go (OTG)
- What is an ATM?
- What is Antenna?
- What is encryption?
- What is frequency?
- What is multimedia
- What is Web Hosting?
- Contents scsu
- How to hack the Android Phone
- How to control someone else’s phone from your phone
- VGA(Video Graphics Array)
- HDMI (High-Definition Multimedia Interface)
- Father of computer
- Chipset
- Partition
- What is bus?
- Interface of hard disk
- PID ( product Identification number)
- Introduction of cyber security
- Understanding Data Security
- Operating system security
- Web Browser Concepts
- Electronic Mail
- Social Networking Services
- Mobile Device Security
- Cloud Computing And Associated Threats
- Communicating Securely Over Network Concepts
- Network Security Threats And Solutions
- Preparing For Unforeseen Threats
- Nepali video
- Hacker History
- CEH Interview Question
- Hindi video
- What are the different types of website?
- What is the importance of website?
- Viewing all TCP/UDP Connection and Listening Port
- Define 32 bit and 64 bit.
- Driver Pack Solution (DRP)
- COMPUTRES GAME
- Shortcut keyboard keys
- MAC Address(Media Access Control)
- What is looping?type of loop.
- What is an Array?importance of Array
- What is looping?
- What is Array?Different between Array and Array list.
- What is an operator?
- What is control statement?
- What is function? Advantage of function.
- What is memory?
- What is nested loop?
- What is pointer? Explain the meaning of each of the following declaration.
- What is string?
- What is structure in C++ programming
- Write a program to display the following: 1 12 123 1234 12345
- What is Technology?
- What are the different types of technology?
- What are the features of technology?
- What are the objectives of technology?
- What are the advantage & disadvantage of technology?
- Who is the father of technology?
- Who invented the first technology?
- When was the first technology invented?
- How long has technology been around?
- Why was technology created?
- Who started technology?
- Who made the first computer?
- Who invented technology?
- What are the 4 ages of information technology?
- What are the ages of technology?
- How technology changed our lives?
- How did technology shape human history?
- What is the oldest technology?
- Who invented time?
- Which country invented the most?
- Who is the most famous inventor?
- What are the 5 greatest inventions of all time?
- What was the first digital technology?
- Is technology making our lives easier?
- What technology has changed the world the most?
- The Top 10 Technology Companies
- Animation
- Biometrics
- Bridges
- Crimper
- Top 10 Companies Owned by Samsung
- Face recognition
- Fingerprint recognition
- The World’s Top 10 Hardware Companies
- Google (Global Organization of Oriented Group Language of Earth)
- Computer Hardware Troubleshooting Tools
- Hubs
- IP Terminology
- Iris recognition
- LAN Cable Tester
- LAN Cable Types
- World’s Top 10 Software Companies
- Light Meter
- Loopback Adapter
- Multimeter
- Network Issues
- Networking Devices
- OTDR (Optical Time Domain Reflectometer)
- Punch-Down Tool
- Retina recognition
- Smart Cards
- Software Troubleshooting Tools
- Spectrum Analyser
- Basics subnetting
- Switches
- Telephone
- Tone generator
- Troubleshooting Fibre Cable Issues
- Troubleshooting IP Address Conflicts
- Troubleshooting of bandwidth
- Troubleshooting Wired Connection
- Troubleshooting Wireless Connectivity
- What is signal? Define
- What is website?
- The 8 different types of websites and how to design them
- 12 Popular Types of Websites You Can Create
- What is the use of website in our daily life?
- What is the difference between webpage, website, web server, and search engine?
- Why having a website is important?
- Which is most visited website in world?
- Top 20 websites of 2020
- Internet Protocol (IP)Security
- Mobile Virus
- Protect your Android phone from a virus
- UPS (Uninterruptible power supply)
- Is technology taking over our lives?
- How did science and technology shape the world?
- What is the relationship between history and technology?
- Why is technology important in civilization?
- Which country invented technology?
- Where did digital technology come from?
- Has technology made the world a better place to live?
- Has technology made our life better or worse?
- Which country has the most advanced technology in the world?
- How does technology help the world?
- How technology has changed our lives in a bad way?
- How is science related to technology?
- What is a fact about technology?
- Network Troubleshooting Methodology
- What is future technology?
- How does technology affect us?
- Is technology good for kids?
- Is technology good for society?
- Network Troubleshooting Tips
- Who has the best & most advanced military technology in the world?
- How has technology helped the military?
- How fast is technology advancing statistics?
- Can we live without technology?
- What will happen without technology?
- Address Resolution Protocol (ARP) Poisoning
- Brute Force
- Configuration Vulnerabilities/Weakness
- Deauthentication Attack
- Denial of Service (DoS) Attack
- Insider Threats
- IP Spoofing
- Logic Bomb
- Man-in-the-middle Attack
- Network Threats/Attacks
- Network Vulnerabilities
- Ransomware
- Security Policy Vulnerabilities/Weakness
- Session Hijacking
- Sniffing
- Social Engineering
- Understanding Network Security
- Viruses, Worms and Trojan Horses
- VLAN Hopping
- Wireless Threats
- What is hyperlink?
- Adapter Card
- All-in-One PC
- CMOS
- Benefits of a Computer Network
- Cooling System and Fan
- Define Scanning
- Firmware and Chipset
- Motherboard
- Mouse
- Printer
- STORAGE DEVICE
- Tablet
- 1. What is Megapixel/MP
- What is screen resolution?
- very small computer
- What is BGP?
- What is CCTV CAMERA?
- Internet Control protocol (ICMP)
- File Transfer protocol (FTP)
- Simple Mail Transfer protocol (SMTP)
- Latest 2020 folding mobile
- Drone camera
- What do you mean by Ethical Hacking?
- What is DDoS Attack?
- What are the types of DDoS attacks?
- What is SQL injection?
- What is Footprinting?
- Contents CEH (CERTIFIED ETHICAL HACKER)
- Types of Hacker
- Phase of Hacking
- Hacking
- What is Enumeration
- Social Engineering
- Process of Social Engineering
- General/Basic Computer or PC shortcut key
- The Most Useful Mac Keyboard Shortcuts to Know
- Windows Shortcut Keys
- Keyboard Shortcuts and System Commands for File Explorer
- Keyboard Shortcuts for Finder
- How to Create a Windows Shortcut Key
- MS Excel shortcut keys
- Why is Data Protection So Important?
- DEFINITION OF CYBER SECURITY
- Notepad shortcut keys
- COMMON CYBER SECUTITY THREATS
- Ms Word shortcut keys
- MS Paint shortcut keys
- MS Access shortcut keys
- MS PowerPoint shortcut keys
- Digital Wallet – Future of Payment
- MS Outlook shortcut keys
- What is Data
- Mozilla Firefox shortcut keys
- DIFFERENT BETWEEN DATA & INFORMATION
- What is Data Security?
- Data Security Threats
- What are the Importance of Data Security
- What are the Main Elements of Data Security?
- Securing Windows 10
- Security of Mac OS X
- Securing of Linux (Ubuntu)
- Instant Messaging
- Child Online Safety
- Electronic Mail (Email)
- Email Security:
- E-mail Security Measures
- Encryption
- Social Networking Services
- Social Networking Security Threats
- Facebook Security
- Twitter Security
- Instagram Security
- Mobile Device Security
- Securing iPhone and iPad Devices
- Mobile Antivirus
- Google Chrome shortcut keys
- Mobile Security Tools
- Knowing mobile device threats
- Mobile Phone Antivirus
- Securing Android Device
- SECURING WINDOWS PHONE DEVICES
- What is Cloud Computing?
- Issues Related to Cloud Privacy
- Cloud Computing Services
- Understanding Different Networking Concepts
- Identifying Different Types of Networks
- Setting up a Wireless Network
- Wireless Network Security Threats and Control Measures
- Network Security Threats
- Types of Network Security Threats
- Other Security Threats
- What is Backup?
- Cloud Backup Service Providers
- Backing Up and Restoring Data in Windows 10
- DOS Command Shell Keyboard Shortcuts
- What is a Digital Wallet?
- Popular Digital Wallets
- Risks Associated with Digital Wallets
- Internet Explorer shortcut keys
- Safeguarding Your Digital Wallet
- Tally shortcut keys
- Function Performed by the Operating System
- Identity theft
- Human Based Social Engineering Techniques
- Basic techniques of scanning.
- Introducing Physical Security
- What Is the Cloud?
- About Windows Enumeration
- Linux Basic
- Enumeration with SNMP
- System Hacking
- Password Cracking
- Default password databases
- Manual Password Cracking
- Automated Password Cracking
- Types of scanning
- Photoshop Keyboard Shortcuts for Mac and PC
- Illustrator MAC OS shortcut keys
- Adobe Dreamweaver shortcut keys
- Flash CS5 Shortcuts: Mac
- Adobe Flash shortcut keys
- Adobe CorelDraw shortcut keys
- Corel Painter (Mac) keyboard shortcuts
- Adobe PageMaker 7.0 shortcut keys
- Adobe PageMaker 6.5 shortcut keys
- Amazing Technology
- Adobe PageMaker shortcut keys
- HTML Color Codes
- Full list of ASCII characters, letters, symbols and signs with descriptions:
- Different types of symbol
- How do you use mouse keys?
- Which function key is for mouse?
- How do I turn on my mouse key without a mouse?
- Use Mouse Keys to move the mouse pointer
- Can I use my keyboard as a mouse?
- What is the shortcut key to open screen?
- How do I use my numpad as a mouse?
- How to unlock the cursor on a laptop?
- What is onscreen keyboard?
- What is the use of on screen keyboard?
- How to turn on the onscreen keyboard?
- What is the shortcut key for virtual keyboard?
- What is the shortcut for on screen keyboard?
- How to get the onscreen keyboard without a keyboard?
- Shortcut key for hiding in showing a virtual keyboard
- How did you get the onscreen keyboard on your Sony Smart TV?
- How to take screenshots on laptops?
- Shortcut key to take a screenshot in Windows 10?
- How to use the Print Screen key?
- What is the shortcut to take a screenshot in Windows 7 laptop?
- Where is screenshot saved in laptop?
- How to take a screenshot on laptop without Print Screen button?
- How to take a screenshot on Windows computer?
- What is Print Screen key?
- Tally ERP 9 Short-cut Function keys combination
- What is VAT?
- How to Calculate VAT ?
- What is the formula for VAT in Excel?
- How to take 20% off a price?
- How many types of VAT are there?
- What percentage is VAT?
- What type of tax is VAT?
- How is VAT tax calculated?
- About Swastik software
- What is Tax?
- Types of Tax
- Why is tax so important?
- What is the role of tax?
- How to calculate tax?
- How to calculate tax on a total?
- What is window ?
- What is Ms-Excel ?
- What is Notepad ?
- What is MS Paint ?
- What is MS Access ?
- What is Ms PowerPoint ?
- mobile phone / small computer
- Unix and Linux Enumeration.
- LDAP and Directory Services Enumeration.
- Enumeration Using NTP.
- SMTP Enumeration.
- Enumerating DNS using dnsenum
- Performing flag scan using hping3
- Basic techniques of scanning.
- Defining a Computer
- Desktop computers
- Laptop
- Various PC Components
- Motherboard
- CPU(central processing unit)
- Storage Device
- Power Supply
- Firmware and Chipset
- BIOS
- Computer Case from Factors
- Monitor
- Keyboard
- Printer
- Scanner
- Touchscreen
- Input/Output Devices
- Computer Motherboard Components
- Front Panel Connectors
- Jumper Pins
- CPU Socket
- Power Connectors
- Fan Connectors
- Bus Architecture
- Chipset
- RAM/Memory Slot
- System firmware
- Expansion Card Slots
- Delivery drone
- DISPLAY
- Audio
- Network
- PS/2
- Bluetooth
- Radio Frequency
- Sound Card
- Video Card
- USB Card
- Modem Card
- Storage Card
- Game Pad
- Barcode Reader
- Wireless / Cellular Card
- Exploring Output Devices
- Port
- Motion Sensor
- Touchpad
- Smart Card Reader
- Digital Camera
- Microphone
- Webcam
- Speaker
- Display Device
- Smart TV
- Exploring Different Expansion cards
- Protocol
- Primary Network Types.
- Removing Device
- Exploring physical connection and its characteristics
- Important Terms Associated with Network
- Exploring I/O devices
- Set Top Box
- Exploring Common Input Devices
- Other Important Protocols
- What is MS Outlook ?
- What is MS DOS ?
- What is Tally ?
- What is Chrome ?
- What is Firefox ?
- Comparison between Internet Explorer, Mozilla Firefox and Google Chrome Web Browsers
- What is Internet Explorer ?
- What is Adobe Photoshop ?
- What is Adobe Illustrator ?
- What is Adobe Dreamweaver ?
- What is Adobe Flash ?
- What is Adobe Corel Draw ?
- What is Adobe Page Maker ?
- What is Color code ?
- What is Chat Symbol ?
- What Ascii Code ?
- What is ascii code used for?
- What is ascii code explain with example?
- What is ascii value of A to Z?
- Is ascii 128 or 256?
- What are the disadvantages of Ascii?
- Who invented ascii?
- 10 Reasons to Use Color
- What is the use of Page Maker?
- What are the features of DTP?
- Which software is used in DTP?
- What is PageMaker in DTP?
- What DTP stands for?
- Which is the most popular DTP software?
- What is DTP ?
- What is the use of Corel Draw?
- How do I power an image in Corel Draw?
- What is power clip ?
- What is the use of PowerClip in CorelDRAW explain it?
- What is the use of Adobe Dreamweaver ?
- What is the use of Adobe Flash ?
- What is the use of Adobe Illustrator ?
- What is the use of Adobe Photoshop ?
- Describing Storages
- Primary Storage
- Secondary Storage
- Tertiary Storage
- Exploring RAM and its Types
- Dynamic RAM (DRAM)
- Static RAM (SRAM)
- SDRAM
- Memory Modules
- RAM Configurations
- Compatibility Issues Related to RAM
- Other Storage Devices
- Optical Drives and Media Capacity
- Magnetic Hard Disk Drives
- Solid State Drives (SSD)
- Flash Memory
- Installing and Configuring Storages
- Virtualization
- Virtualization Software
- Supported Platform
- Types of Footprinting
- Using Ping in windows command line
- What Is a Wireless Network?
- Mobile OS Models and Architectures
- Goals of Mobile Security
- Device Security Models
- Countermeasures
- What is the use of Internet Explorer ?
- What is the use of Firefox ?
- Top 5 reasons in using Google Chrome
- What is the use of Google Chrome ?
- Advantages and Disadvantages of Google Chrome
- What is the use of Tally ?
- What are the advantages of tally?
- Why is tally important?
- What is the use of MS DOS ?
- Features of MS Access
- What is the use of MS Outlook ?
- What is the use of MS PowerPoint ?
- What are the different uses of Microsoft PowerPoint?
- What is the use of MS Access ?
- What are the features of MS Paint?
- What is Microsoft Word used for?
- What are the core values of Microsoft?
- What is the mission of Microsoft?
- What is the use of Notepad ?
- What is the use of MS Excel ?
- Why Excel is important?
- What is web search engine ?
- What is a search engine?
- How search engines work ?
- What is a search engine algorithm?
- What are the most popular search engines ?
- Is DuckDuckGo owned by Google?
- Which search engine is safest?
- What is illegal on the internet?
- Can a Google search be illegal?
- What are the benefits of website?
- What is Facebook ?
- What is the main purpose of Facebook?
- What are the disadvantages of Facebook?
- What are the top 10 benefits of Facebook?
- What is difference between Facebook and Facebook Lite?
- What is Facebook Lite ?
- What is Instagram ?
- What is the main purpose of Instagram?
- What is difference between Instagram and Facebook?
- Why Is Instagram so popular ?
- Why did Mark Zuckerberg buy Instagram?
- Who is the CEO of Instagram?
- Installing a Storage Device
- Understanding Processors
- AMD Processors and Sockets
- Intel Processors and Sockets
- CPU Architecture
- Characteristics of CPU
- Cooling Systems
- Installing and Upgrading CPU
- Upgrading an Intel CPU
- Upgrading an AMD CPU
- What is a BIOS and UEFI?
- BIOS Component Information
- BIOS System Setup Utilities
- BIOS Built-in Diagnostics and Monitoring
- Monitoring
- Securing and Upgrading Firmware
- Using nslookup in windows command line
- Process of System hacking
- Using Refog keylogger
- Rootkits
- PCs Used in Businesses
- Standard Client
- Thin Client
- Workstation
- Home Use PCs
- Home Server
- Gaming PC
- Importance of Power Supply
- Electricity Circuits
- Identifying Power Supply
- Connector Types
- Subjects Class 12
- Subject Class 11
- Subject Class 10
- CONTENTS CLASS 11
- Trojans
- Behaviour of Trojans Infected Target
- Types of Trojans
- Working of a Trojan
- Tools for Creating Trojans
- Infection Techniques
- Honeypot Attacks
- Firewall
- Honeypot
- Cryptography
- Session Hijacking
- IP Spoofing
- DNS Spoofing
- Network Session Hijacking
- TCP/IP Session Hijacking
- UDP Session Hijacking
- Introducing of SQL INJECTION
- Botnet
- Steps for performing DDoS Attack
- Web Applications
- Web Server
- Buffer Overflow
- Denial-of-Service Attack
- Effects of the Denial of Service
- Web Application Testing using Tools
- Uses of Internet
- WPscan
- Web Application Attack Phase
- Web Browser
- URL(Uniform Resource Locator)
- Messenger Services
- What is printer?
- Types of Printers
- Digital Signature
- Non-Impact Printers
- 3D Printer
- Virtual Printer
- Printing a Test Page
- Hash Functions
- Managing the Print Spooler
- Concept of Protocol
- Inkjet Printer Problems
- Secure Sockets Layer (SSL)
- Upgrading Printers
- Switched Network Sniffing
- ARP Poisoning
- MAC Spoofing
- Impact Printers
- Detecting Sniffing Attacks
- Setting Browser Properties
- Inkjet Printer Problems
- Packet Analysis
- Sniffing Tools
- Using a Sniffer
- Setup Network Connection
- Type of sniffing
- IPsec
- Active Sniffing Techniques
- ARP Spoofing
- Steps Involved in Session Hijacking
- Type of Session Hijacking
- Steganography
- Uses of Email
- Steganography Process
- Web Based Email and POP Email
- Methods of Session Hijacking
- Terms Associated With Steganography
- Watermarking
- Steganalysis
- Using Quickstego
- Steganography using tools
- Steganalysis Attacks
- Steganography Methods
- Session Hijacking tools
- DDoS Tools
- What Is the Impact of Social Engineering?
- Types of Phishing Attacks
- Social Engineering Toolkit (SET)
- Prevention of Social Engineering
- Phishing Process
- 25-pair cable
- Apache Web Server
- 66 Block Connector
- Internet Information Server (IIS)
- 100-pair cable
- 110 Block Connector
- Demarc Extension
- Demarc
- Intermediate Distribution Frame
- Main Distribution Frame
- Vulnerabilities of Web Servers and Applications
- Patch Panels
- Searching Engine
- DNS(Domain Name Servers)
- Website
- Web page
- Internet
- Web Browser
- Smart Jack
- Vertical and horizontal cross connects
- Wiring Distribution Components
- Introduction of malware
- Categories of Malware
- Viruses
- Kinds of Viruses
- Worms
- The Functioning of Computer Worms
- Spyware
- Methods of Spyware Infection
- Adware
- Scareware
- Ransomware
- Sniffing
- Tools which are used for sniffing are known as sniffer
- computer full form
- History of Computers
- Characteristics of Computer
- Risks of E-Governance
- Benefits of E-Governance
- E-Governance
- Scope of E-Governance
- Concept of Data Processing
- Stage of Data Processing
- Advantages of Networking
- Architectural Model
- Bandwidth
- Basic of Networking
- Broadband over Power Line
- Characteristics of a Network
- Coaxial Cable
- Common Cable Properties
- Complicated and Expensive Network Software
- Costly and Complex Wiring
- Crossover Cable
- Data Rate
- Disadvantages of Networking
- Distance
- Duplex
- Enhancing Communication
- Ethernet
- Exploring CSMA/CD
- Fast Ethernet
- Fiber Distributed Data Interface (FDDI)
- Fiber Optic Cable
- Frequency
- Gigabit Ethernet
- Improving Person-to-Person Communication
- Introduction network cabling
- Introduction to networking
- Introduction type of networking
- Lack of Data Security and Privacy
- Local Area Network (LAN)
- Media Converters
- Metropolitan Area Network (MAN)
- Multi-Mode Fiber
- Need for Networking
- Network Cable Types
- Network Topology
- Networking cables
- NIC (Network interface card)
- Noise Immunity
- NOS (Network Operating System)
- Protocol
- Repeaters
- Screened Twisted-Pair Cable
- Serial Cables
- Server Crashing
- Sharing Files
- Sharing Resources
- Shielded Twisted-Pair Cable
- Single-Mode Fiber
- Standard Ethernet
- Straight-Through Cable
- Thicknet
- Thinnet
- Token Bus
- Token Ring
- Twisted-Pair Cable
- Unshielded Twisted-Pair Cable
- Wide Area Network (WAN)
- Wiring Standards
- 568A
- 568B
- The Physical layer
- The Data Link layer
- The Network layer
- The Transport layer
- The Session layer
- The Presentation layer
- The Application layer
- Wireless Network
- Wireless Security Standard
- Computer Based Social Engineering
- Kali Linux Command
- Mi Note 8 has good 6GB RAM or 4GB RAM.
- Advantages of Wireless Networking
- Disadvantages of Wireless Networking
- Discussing NAT
- Discussing Software Requirements to Setup a Wireless Network
- DNAT (Dynamic NAT)
- Domain Name Space
- Exploring Different Layers of TCP/IP Protocol Suite
- Exploring Different Types of Wireless networking Models
- Exploring Different Types of Wireless Networks
- Exploring DNS
- Exploring Hardware Requirements to Setup a Wireless Network
- Exploring IPv6 Addressing
- Exploring the Need for IPv6
- HomeRF
- IEEE 802.11
- IEEE 802.11a
- IEEE 802.11b
- IEEE 802.11g
- IEEE 802.11n
- IEEE 802.16 (WiMAX)
- IEEE 802.16a (WIMAX)
- Introduction (TCP/IP)
- Mobile Computing
- Name Space
- Network Models
- Role of a Server in Networking
- SNAT (Static NAT)
- The AP Wireless Networking Model
- The Application Layer
- The Application server
- The Bluetooth Technology
- The Client/Server Architecture
- The Client/Server Network
- The Database Server
- The File Server
- The FTP Server
- The Hybrid Network
- The Internet Layer
- The IR Technology
- The MAC Address Filtering Technology
- The Mail Server
- The Network Interface Layer
- The P2P Wireless Networking Model
- The Peer-to-Peer Network
- The Print Server
- The Proxy Server
- The Radio Waves Technology
- The SSID Technology
- The Three-Tier Architecture
- The Transport Layer
- The Two-Tier Architecture
- The Web Server
- The WEP Technology
- The WPA 2 Technology
- The WPA Technology
- Troubleshooting Problems of a Wireless Network
- Types of Servers
- Understanding Different Wireless Technologies
- Understanding the Basics of Wireless Networking
- Understanding the IP Address
- Understanding Wireless Network Security
- Wireless Access Point
- Wireless Antennae
- Wireless Bridge
- Wireless Networking Standards
- Wireless Repeater
- WLAN
- WPAN
- WWAN
- Wireless Adapter
- Introduction wireless networking
- Exploring Different Layers of TCP/IP Protocol Suite
- Content Principles of Accounting-XI
- Introduction of troubleshooting tools
- Protocol Analyzer
- Throughput Tester
- Connectivity Software
- Enabling Telnet in Windows 7
- Resolving Names with the Hosts Table
- Secure Shell Better Than Telnet
- The Address Resolution Protocol
- The ARP Utility
- The ipconfig Command
- The nbtstat Utility
- The nslookup Utility
- The pathping Command
- The ping Command
- The route Command
- The Traceroute Utility
- Understanding Telnet Utility
- Using –r Option
- Using –e option netstat
- Using -p Option
- Using -a Option
- Using –a Option
- Using -c Option
- Using –e option
- Using -r Option
- Using –s option
- Using -S Option
- Using -R Option
- Using –n option netstat
- Windows ARP Table
- Computer speed and Measurements Unit
- Application of computer
- Boolean function and logic function
- Functions of Operating System
- Logic gates
- AND Gate
- OR Gate
- NOT gate
- NAND Gate
- NOR Gate
- XOR Gate
- XNOR Gate
- Universal gates
- PEN DRIVE
- Memory Card
- USB PORTS
- First generation computer
- Second generation computer
- Third generation computer
- Fourth generation computer
- Fifth generations computer
- Generation of Computer
- Basis principle of computers
- Computer Architecture and Computer Organization
- Light pen
- OCR (Optical Character Recognition)
- Trackball
- External Storage Device
- What is Software Vulnerabilities
- Serial port
- Parallel port
- What is Vulnerabilities
- what is Exploits
- exploitation is to gain access
- exploitation in denying access
- Graphic card
- National and Global Security
- Database Query Languages
- what is web exploits
- Ghost Phisher Installation Method or Features
- Basic Termux command
- Basic Kali Linux Command
- What is Steganography? explain in Process
- Passive Sniffing Techniques
- kali Linux Top 10 Tool .
- Terms Associated with Wireless Technology
- Site Cloning Using Social Engineering Toolkit
- History of computer mechanical calculating era, mechanical era, Electronic era
- On the basis of brand , IBM PC IBM compatible and apple Machine
- UNIX
- Fire Wire or IEEE 1394
- Magnetic ink Character Recognition (MICR)
- Microprocessor components of Microprocessor
- Software
- System software
- Application software
- Computer virus
- Setup Network Connection
- Concepts of System Buses
- Word processor
- Type of word processing
- Basic terms of word processing
- What is a web app?
- What is web service?
- What is the different between web coding and web development?
- What is JQuery Mobile?
- What is different between Web site and Web service?
- Define term java?
- Define term XML
- Explain the hierarchy of HTML document.
- What do you mean by Image Map?
- What is cookie?
- What is a mobile web App?
- What is Apache Tomcat?
- What is a mobile web App?
- What is a cascading style sheet?
- What do you mean by java Beans?
- What is silverlight? Why it is introduced?
- What is Deep Zoom technology in silverlight?
- What is the use of the MediaPlayer server control in ASP.NET?
- What is the functionality provided by the silverlight server control in ASP.NET?
- What is the role of customizers?
- What is a servlet?
- Different between the ServletContext and ServeltConfig objects.
- What is session?
- List the session tracking techniques.
- How cookies are used to track a session?
- Privacy Policy
- What is a compiler?
- Recovery System
- Setup Network Connection
- What is a mobile web App?
- What is a servlet?
- History of computer. Generation of computer
- Components of a computer
- What is an Input Device?
- What is Pointing Devices?
- What is mouse? Types of Mouse.
- What is Graphics Tablet
- What is MICR(Magnetic ink Character Recognition)
- Output Devices
- Data Representation
- Data Type
- Concept of Hardware and Software
2020-04-28