Data Center Lists

Data Center and Disaster Recovery Design guidelines

A data center, as defined in TIA/EIA-942, Telecommunications Infrastructure Standard for Data Centers is a building or portion of a building whose primary function is to house a computer room and its support areas. The main functions of a data center are to centralize and consolidate information technology (IT) resources, house network operations, facilitate business, and […]


Vector Addition and Subtraction

This is the solution for 2010 fall 4(b), 2007 Spring 4(b), 2010 Spring 3(b OR) PU BCA #include<iostream> using namespace std; class vector { float x;//real part float y;//imaginary part public: vector(){}//constuuctor 1 vector(float i,float j) { x=i; y=j; } vector operator+(vector); vector operator-(vector); void display(void); void display2(void); }; vector vector::operator+(vector c) { vector temp; […]

unix command
Linux Lists

Linux Basic Commands:

There are 7 terminals in linux ; 6 terminals are non-GUI and 1 is for GUI access. You can change terminals using Alt+Ctrl+F1- to-F7. Where Alt+Ctrl+F1 or F7 – GUI or $startx Alt+Ctrl+F2 Alt+Ctrl+F3 Alt+Ctrl+F4 Alt+Ctrl+F5 Alt+Ctrl+F6   $cal: To view calendar. Syntax: $cal [option] [date] Where options are preceded by – or — and […]

geographic information system Lists

What is GIS?

A geographic information system (GIS) integrates hardware, software, and data for capturing, managing, analyzing, and displaying all forms of geographically referenced information. GIS allows us to view, understand, question, interpret, and visualize data in many ways that reveal relationships, patterns, and trends in the form of maps, globes, reports, and charts. A GIS helps you […]

5g tech to monitor covid19
Artificial Intelligence Lists

Emerging Technologies for mitigating the impact of the COVID-19 pandemic

The role of information communication technology rapidly changes and helping to human society. ICT focus to control and communicate the society to develop awareness and measure related information need to society. Current scenarios ICT helps to control novel coronavirus COVID-19. Worldwide use different technology to control and prevent the COVID-19 daises like contract tracing mobile […]


How do you find the area in Python?

#Area of the rectangle  width=int(input(“Enter the width of Rectangle: “)) height=int(input(“Enter the height of Rectangle: “)) area=width*height print(“area of Rectangle is”,area) output Enter the width of Rectangle: 5                                                                                                            Enter the height of Rectangle: 6                                                                                                                 area of Rectangle is 30 #Area of circle  PI=3.14 R=float(input(“Enter the Redious of circle: “)) area=PI*R*R print(“area of circle is”,area) output Enter the Redious of […]

feature post

Analysis of Web Application Security Context in Nepal

This analysis will be finding out the website/web applications security level and to provide some basic guidelines for protecting our data from unauthorized users. Now a day’s context of Nepal many government sectors, as well as private-sector apps, lose the data. This research type project helps to find out the web security dimension needs to […]

and Professional Issues in Information Security Lists

Information Security Audit

Security is the main concern of every business Era. Information Security audit which protects the user data and information using international rules and regulation. IS audit reduces the risk of confidential information leaks, increases control over any IT and cybersecurity unit and it also helps to create or improve any business process. Information Security audits […]