unix command
Linux Lists

Linux Basic Commands:

There are 7 terminals in linux ; 6 terminals are non-GUI and 1 is for GUI access. You can change terminals using Alt+Ctrl+F1- to-F7. Where Alt+Ctrl+F1 or F7 – GUI or $startx Alt+Ctrl+F2 Alt+Ctrl+F3 Alt+Ctrl+F4 Alt+Ctrl+F5 Alt+Ctrl+F6   $cal: To view calendar. Syntax: $cal [option] [date] Where options are preceded by – or — and […]

open
geographic information system Lists

What is GIS?

A geographic information system (GIS) integrates hardware, software, and data for capturing, managing, analyzing, and displaying all forms of geographically referenced information. GIS allows us to view, understand, question, interpret, and visualize data in many ways that reveal relationships, patterns, and trends in the form of maps, globes, reports, and charts. A GIS helps you […]

5g tech to monitor covid19
Artificial Intelligence Lists

Emerging Technologies for mitigating the impact of the COVID-19 pandemic

The role of information communication technology rapidly changes and helping to human society. ICT focus to control and communicate the society to develop awareness and measure related information need to society. Current scenarios ICT helps to control novel coronavirus COVID-19. Worldwide use different technology to control and prevent the COVID-19 daises like contract tracing mobile […]

python
Python

How do you find the area in Python?

#Area of the rectangle  width=int(input(“Enter the width of Rectangle: “)) height=int(input(“Enter the height of Rectangle: “)) area=width*height print(“area of Rectangle is”,area) output Enter the width of Rectangle: 5                                                                                                            Enter the height of Rectangle: 6                                                                                                                 area of Rectangle is 30 #Area of circle  PI=3.14 R=float(input(“Enter the Redious of circle: “)) area=PI*R*R print(“area of circle is”,area) output Enter the Redious of […]

feature post
PHP

Analysis of Web Application Security Context in Nepal

This analysis will be finding out the website/web applications security level and to provide some basic guidelines for protecting our data from unauthorized users. Now a day’s context of Nepal many government sectors, as well as private-sector apps, lose the data. This research type project helps to find out the web security dimension needs to […]

authincator
and Professional Issues in Information Security Lists

Information Security Audit

Security is the main concern of every business Era. Information Security audit which protects the user data and information using international rules and regulation. IS audit reduces the risk of confidential information leaks, increases control over any IT and cybersecurity unit and it also helps to create or improve any business process. Information Security audits […]

int
and Professional Issues in Information Security Lists

What is intellectual property, Trademark , Copyright,Patent ?

Intellectual property is an intrinsic property produced as a result of the artistic and creative works of the mind, which is then interpreted in a form that has a physical existence and possess exclusive property rights. Examples include images, symbols, names, designs, industrial processes, and business methods used in commerce; inventions; artistic, literary and musical […]