Discy Latest Questions

How is their personal life, family life, friends, work environment and everything that you can think that a programmer does throughout the day?

  1. Hacking is an attempt to exploit a computer system or a private network inside a computer to gain access. Simply put, it is an unauthorised access to commit fraudulent activities or control over computer network security systems for some illicit purpose. Point to be noted that breaking a security syRead more

    Hacking is an attempt to exploit a computer system or a private network inside a computer to gain access. Simply put, it is an unauthorised access to commit fraudulent activities or control over computer network security systems for some illicit purpose. Point to be noted that breaking a security system requires more intelligence and expertise than actually creating one.
    The famous term computer “virus” originated to describe machine code command inserted into a computer’s memory that, on execution, copies itself into other programs and files on the computer. Depending on the hacker’s intentions, the design of a virus can merely be an inconvenience or have very serious consequences up to a potential catastrophe.
    So concluding that hacking is the catch-all term for any type of misuse of a computer to break the security of another computing system to steal data, corrupt systems or files, commandeer the environment or disrupt data-related activities in any way by different means.

    See less
    • 0

  1. By the definition: A blue hat hacker is someone outside computer security consulting firms who bug tests a system prior to its launch, looking for exploits so they can be closed. Generally, Blue Hat Hacker also refers to the security professional invited by Microsoft to find vulnerabilities in WindoRead more

    By the definition: A blue hat hacker is someone outside computer security consulting firms who bug tests a system prior to its launch, looking for exploits so they can be closed.
    Generally, Blue Hat Hacker also refers to the security professional invited by Microsoft to find vulnerabilities in Windows. The term has also been associated with the annual security conference by Microsoft, the unofficial name coming from the blue color associated with Microsoft employee badges.

    See less
    • 0

  1. OLX runs on a simple advertising business model. Building an app like OLX isn't that hard. All you need to do is to focus on a listing application with user-generated content and remove the barriers to use like many questions, etc. Here's an article to help you understand OLX's business model - httpRead more

    OLX runs on a simple advertising business model. Building an app like OLX isn’t that hard. All you need to do is to focus on a listing application with user-generated content and remove the barriers to use like many questions, etc.
    Here’s an article to help you understand OLX’s business model –
    https://www.feedough.com/how-does-olx-make-money/

    See less
    • 0

  1. Big data refers to large sets of structured, unstructured and semi-structured data which has the potential to be mined and analyzed to determine patterns and trends . Big data is characterized by the following: 1. Volume: Large amount of data from various sources. 2. Velocity: Data is being generateRead more

    Big data refers to large sets of structured, unstructured and semi-structured data which has the potential to be mined and analyzed to determine patterns and trends .
    Big data is characterized by the following:
    1. Volume: Large amount of data from various sources.
    2. Velocity: Data is being generated at high speed and should be dealt with in near real time.
    3. Variety: Data can be in different formats.
    4. Variability: Data can be highly inconsistent.
    5. Complexity: Since data comes from multiple sources, complexity of linking, matching and cleaning data increases.

    See less
    • 0

  1. There sure are some disadvantages of cloud computing, with one of them being very common and popular, which is network dependency, basically if there is no internet connection in your place, or the internet path to the cloud provider is in trouble, automatically access to your cloud computing machinRead more

    There sure are some disadvantages of cloud computing, with one of them being very common and popular, which is network dependency, basically if there is no internet connection in your place, or the internet path to the cloud provider is in trouble, automatically access to your cloud computing machine will be disconnected. There is also a risk of data confidentiality as this data can be accessed by other people on the same platform. Cloud computing is also vulnerable in a case of an attack. The system is online and each component that is on cloud computing can be exposed to a wide range, this is a wide open opportunity for attacks on data or activities stored on the server.

    See less
    • 0

  1. To be honest, cloud computing is no piece of cake, it involves a lot of time and practice to master this domain. So yes, its not easy to learn. Even if you have a coding background , you may still require to put a lot more effort into its learning. You can learn basics of eat easily, like building aRead more

    To be honest, cloud computing is no piece of cake, it involves a lot of time and practice to master this domain. So yes, its not easy to learn. Even if you have a coding background , you may still require to put a lot more effort into its learning. You can learn basics of eat easily, like building a platform for cloud computing or likewise but gaining the actual knowledge which will give you the edge and make you competent to use it is not easy at all. It would require around 4 years to complete the course of cloud computing and if you are ready to give in your all and accelerate the course then too it would require around 2 to 2.5 years.

    See less
    • 0

  1. There are three different ways in which you can avail cloud computing services. They are public cloud, private cloud and hybrid cloud. 1. Public Cloud: These are services provided and managed completely by third party vendor over the internet. Anyone can avail service from these vendors. All the harRead more

    There are three different ways in which you can avail cloud computing services. They are public cloud, private cloud and hybrid cloud.
    1. Public Cloud: These are services provided and managed completely by third party vendor over the internet. Anyone can avail service from these vendors. All the hardware or software resources that you wish to avail will be managed completely by this third party vendor.
    Microsoft Azure is an example of public cloud.
    2. Private Cloud: These are services used exclusively by a single business or organization. These are services that are on local network and not public. It is hosted within the organizations site or a third party hosts it locally.
    3. Hybrid Cloud: This is a combination of public and private cloud. Some resources are held locally and some are on public cloud. This gives more flexibility to your business.

    See less
    • 0

  1. According to a definition on Wikipedia, "An HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing." Simply speaking we can say that, cRead more

    According to a definition on Wikipedia, “An HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user’s computer by the user’s web browser while the user is browsing.” Simply speaking we can say that, cookies are like normal files which contain small pieces of data that could be like a username and password which are exchanged between a user’s computer and a web server in order to identify specific users and to improve their browsing experience.

    See less
    • 0