Management Information System (MIS)
Management Information System (MIS) is one of the five major Computer Based Information Systems (CBIS). Its purpose is to meet the general information needs of the managers in firm or organization. MIS is a computer based system that makes information available to users with similar needs. Management Information System (MIS) consists of following three pillars: Management, Information, and System. These are explained as following below....
read more
Code- Scheduling Constraints
Data dependence analysis is used to determine the order of execution of instructions. It is used to determine the order of execution of instructions because it gives an indication of how much effort will be required for a particular instruction to be executed at any given time. A data-dependent instruction can only be executed after all its dependent instructions have been completed....
read more
History of Computer Games
A game is a form of interactive entertainment where players must overcome challenges, by taking actions that are governed by rules, in order to meet a victory condition....
read more
Discrete Mathematics Tutorial
Discrete Mathematics is a branch of mathematics that is concerned with “discrete” mathematical structures instead of “continuous”. Discrete mathematical structures include objects with distinct values like graphs, integers, logic-based statements, etc. In this tutorial, we have covered all the topics of Discrete Mathematics for computer science like set theory, recurrence relation, group theory, and graph theory....
read more
Image Edge Detection Operators in Digital Image Processing
Edges are significant local changes of intensity in a digital image. An edge can be defined as a set of connected pixels that forms a boundary between two disjoint regions. There are three types of edges:...
read more
What is Persistent Storage?
Any data storage system that keeps data after its power is turned off is said to be using persistent storage. It’s also known as nonvolatile storage at times. Persistent storage in the context of containerization refers to storage volumes that are accessible after a container has stopped running. These volumes are typically connected to stateful applications like databases. Ephemeral storage volumes, which are linked to stateless apps that live and die with containers, can be contrasted with persistent storage volumes....
read more
Age of AI-based recruitment… What to expect?
The world is always heading towards a better future and artificial intelligence helps in making it simpler to achieve it. To improve the quality of professionals hired, organisations are constantly in search of better ways to hire and technology has proved to be a boon to identify the right candidates from a large pool of applicants. Just as the hiring process evolved from newspaper ads to online portals and social media sites, the next big wave is automation in hiring....
read more
VLOOKUP On Multiple Criteria Columns Using Helper Method & CHOOSE Function
In this article, we will see how we can combine multiple values, and use them as lookup criteria for searching specific value(s) in the excel dataset. For this purpose, we will use the VLOOKUP formula, the most basic formula to perform a lookup for value(s) on excel. We will see a modified form of VLOOKUP to perform a lookup using multiple values....
read more
Difference between Sequential Organization and Linked Organization
Data structures are used to store and organize data in a way that makes it easy to access, modify, and analyze....
read more
PROM Full Form
PROM stands for Programmable Read-Only Memory...
read more
LAN Switch Modes of Operation
Switching the LAN uses the hardware area as the basis for independent transmission and filtering. The LAN switch types determine how the frame is processed when the frame reaches the switch hole. In fact, the type of switch modes plays an important role when the application requirements of the application are ultimately the key that the customer feels. This delay varies and depends on the type of switch mode on which it operates. The first step in the operating concept of the switch is to get the Ethernet interface from the transmission point. Depending on the type of switch used, the voice needs to detect and test a different number of bytes before proceeding to the next operating step and finally switching the outlet to the outlet or holes. There are two main switching modes based on the Cisco switch:...
read more
How to Format a Write–Protected Pen Drive?
When you receive the error “The disk is write-protected“, it means you tried formatting your Pendrive but were not able to. This may be due to external software or encryption that was probably used to lock the contents of the Pendrive and the contents within the drive are read-only. In this case, the computer does not allow you to format, edit, or modify contents of the Pendrive in any way....
read more