Home Engineering


Engineering Topics are list here that are helpful for Mechanical, Electrical, Civil, Electronic, IT, and Computer Science students.

Difference Between CISC And RISC - Use, Characteristics, Advantages

Difference Between CISC And RISC – Use, Characteristics & Advantages

CISC and RISC, both are instruction set-based microprocessors. RISC stands for Reduced Instruction Set Computer and CISC stand for Complex Instruction Set Computer. Here in this article, we have shared the comparison and difference...
Types of Programming Language

Types of Programming Language: Low, Medium, High Level with Examples

Programming language is a collection of instructions that the CPU (Central Processing Unit) assembles to complete a certain task in a computer. Here we have shared types of programming language with examples. This classification...
Manipulators in C++ with Example

Manipulators in C++ (with Examples – setw, setbase, ends, setfill, flush, ws)

Manipulators are special functions that can be included in the I/O statement to alter the format parameters of a stream. To access manipulators, the file iomanip.h should be included in the program. In this...

Multiprocessor: Operating System, Types, Advantages and Limitations

A Multiprocessor system is simply a collection of more than one CPU in a single computer system. Here in this article, we have shared a basic introduction to Multiprocessors. Topics such as Meaning, definition,...
data communication

Data Communication: Types, Components, Characteristics & Functions

Data communication is the electronic exchange of data between two devices across a communication channel like a wire pair cable or Fiber optics. In this article, we have shared all the details about data communication....

Application Layer Protocols: Types & Example (HTTP, DNS, SMTP, FTP)

In this article, we have shared all the basic information about Application Layer Protocols with their types, examples, uses, and functions of protocols in the application layer of the OSI Model. What are Application Layer...

Routing Protocols: Types, Static, Dynamic, Distance Vector, Link-state

Here in this article, we have shared a basic introduction to Routing Protocols. and also, we have discussed types of routing protocols in the easiest way possible. What is Routing Protocol in Computer Networks? Routing Protocols...

Congestion control in Computer Networks: Types and Techniques

Congestion Control is also known as TCP Congestion control. TCP refers to Transmission Control Protocol that uses a network congestion-avoidance algorithm. It includes various aspects of an additive increase and multiplicative decrease scheme, along with...
Types of Memory in Computer

Types of Memory in Computer: RAM, ROM, Cache, Primary & Secondary

Memory is the most important component of any computer system and its normal operation. The memory is divided into categories by the computer system for various functions, and its types of memory in the...
applet life cycle in java

Applet Life Cycle in Java With Example

An applet Life cycle in java is all states of the panel that allows interaction with a Java program. An applet in java may move from one state to another depending upon a set...
physical layer

Physical Layer in OSI Model: Functions, Issues, Protocols & Device

Open System Interconnection (OSI) Model has seven-layer and Physical Layer is the lowest layer and is concerned with wiring and electrical standards. It provides an unreliable bit transmission/reception service to the Data Link layer....
hamming code

Hamming Code – History, Uses, Example, Benefits & Disadvantages

Hamming codes are a family of linear error-correcting codes and it is named after Richard W Hamming. In this article, we have shared the history of Hamming code and its uses in computer science,...

Cyclic Redundancy Check (CRC) for Data Error Detection (With Example)

Bits can be corrupted while being transported over a computer network owing to interference and network difficulties. Errors are caused by corrupted bits, which cause the receiver to receive erroneous data. Parity Check, Checksum,...

Multiplexing (FDM, WDM, TDM): Use, Type, Technique, Computer Networking

We'll go through the notion of multiplexing in computer networks in this tutorial. We have shared all the basic information about MUX used in networking. In this article, You will also learn the definition,...
data link layer

Data Link Layer in OSI Model: Function, Design Issue, Error, Flow Control

Data Link Layer is the second layer of the OSI model in computer networking, OSI is a seven-layer model that refers to the Open Systems Interconnection model. Data Link Layer (DLL) defines the format...
Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol (HTTP): HTTPS Difference, Work, Type, Proxy

HTTP full form is Hypertext Transfer Protocol, which is an application layer network protocol built on top of TCP. HTTP provides a standard for web browsers and servers to communicate. Hypertext Transfer Protocol defines how...
user datagram protocol

User Datagram Protocol: UDP Vs TCP, Work, Header, Use, DDoS Attacks

User Datagram Protocol, in short UDP, is one of the core members of the Internet protocol suite In computer networking. Computer applications can send messages with the help of UDP. It is referred to as...

TCP/IP Model (Internet Protocol Suite): Functions, ICMP, Transport Layer

TCP/IP Model stands for Transmission Control Protocol/Internet Protocol Model. The TCP/IP model contains four layers from the seven layers of the OSI model. Hence it is known as a concise version of the OSI...
recursive function in python

Recursion Function in Python With Examples (Basic Introduction)

Recursion simply means the process of repeating items in a self-similar way. The recursion function in python or any other programming language allows you to call a function inside the same function. When we consider...
Double Hashing

Double Hashing Technique in Python (With Formula & Examples)

Hashing is a mechanism for storing, finding, and eliminating items in near real-time. Double Hashing is accomplished by the use of a hash function, which creates an index for a given input, which can...
Bubble Sort In JAVA

Bubble Sort In JAVA (Algorithm Program Steps With Examples)

The Bubble sort algorithm is one of the most simple sorting algorithms and it is a great learning tool because it is easy to understand and fast to implement. Here we have shared how...
what is innovation

What is Innovation? Meaning, Definition, Types, Field, Process

Innovation is the reasonable utilization of thoughts that outcome in various new kinds of new contributions, similar to items, administrations, cycles, and plans of action, meaning to improve or upset existing applications or make...
Computer Science vs Software Engineering

Computer Science vs Software Engineering: Differences & Scope

There is a big confusion among students about Computer Science vs Software engineering. So here in this article, we have shared key differences and the importance of both fields. Software engineering is a branch of...
System Interrupts

System Interrupts – How To Fix High CPU Usage in Windows?

If you've ever looked through your Task Manager window, you've undoubtedly seen a process called "System interrupts" and then disregarded it. But if it's hogging your CPU and you're wondering what you can do...
Failed To Enumerate Objects In The Container

Failed To Enumerate Objects In The Container – Windows 10 Error [FIX]

If you are facing an error message showing "Failed To Enumerate Objects In The Container" in windows 10, or in windows 8. then this article will guide you on how to fix this Microsoft...
Easiest Programming Language To Learn

Easiest Programming Language To Learn in 2021 (Python)

There are thousands of programming languages created so far and fresher computer students are often confused about which programming language is easy to start. They want to pick the easiest programming language to learn...