Feedough Community Latest Questions

Manushree Mishra

  1. Mostly, you need to accept the cookies in order to see the content on a website. If you don't allow and accept the cookies then some websites would not let you access their page and some websites may let you access their page but you wouldn't get the relevant and complete content. Hence to get a betRead more

    Mostly, you need to accept the cookies in order to see the content on a website. If you don’t allow and accept the cookies then some websites would not let you access their page and some websites may let you access their page but you wouldn’t get the relevant and complete content. Hence to get a better browsing experience you will have to accept cookies.

    See less
    • 0
Maitya

  1. Social engineering hacking is the art of psychological manipulating and diverting people so that they give up confidential information. Criminals use many social engineering tactics because it comes out to be easier to cheat your natural inclination to trust than it is to discover new ways to hack yRead more

    Social engineering hacking is the art of psychological manipulating and diverting people so that they give up confidential information. Criminals use many social engineering tactics because it comes out to be easier to cheat your natural inclination to trust than it is to discover new ways to hack your software. You must have heard of many phishing attacks where victims are tricked into providing their personal informations or sensitive data by an urgent sounding voice mail that claims to be official, convinces them and makes them suffer severe consequences. Moreover, social engineering exercises are a vital aspect of ethical hacking engagements.

    See less
    • 0
rayon

  1. Can AI do that currently, then no but will it be able to do it in a decade or so then again its a supposable no. We never know what future may hold, although predictions don't say this as its known that AI cannot inspire teamwork, show passion or exhibit empathy because it has no imagination. AfterRead more

    Can AI do that currently, then no but will it be able to do it in a decade or so then again its a supposable no. We never know what future may hold, although predictions don’t say this as its known that AI cannot inspire teamwork, show passion or exhibit empathy because it has no imagination. After all we don’t want to watch robots in rom-coms, its also said that “People don’t want to listen to robots making speeches, leading the company, or giving pep talks. They do want to listen to robots in conversation making friends or earning our lifelong trust. Nor do they want a robot to do tasks like teachers and nurses. We will end up with the inevitable outcome that large numbers of routine jobs will be eliminated and large numbers of empathetic jobs will be created”.
    So yes, not all jobs will be replaced by the AI, it will majorly replace the job which involves repetitive tasks. Worse to worse there would still be jobs for the leaders, entertainers, writers and more of what you know as empathetic jobs. Research and development would still go on and also the AI developers.

    See less
    • 0
Amruta

  1. Google Analytics is a free analytics service that allows you to analyze visitors on your website in depth. Following are some of the uses of Google Analytics: 1. Automatic collection of data: By copying a simple piece of code, Google Analytics starts collecting data from your website. 2. Creating cuRead more

    Google Analytics is a free analytics service that allows you to analyze visitors on your website in depth.
    Following are some of the uses of Google Analytics:
    1. Automatic collection of data: By copying a simple piece of code, Google Analytics starts collecting data from your website.
    2. Creating customized reports: You can choose from the reports that Google creates or create your own custom report from the available data.
    3. Integration with other tools and platforms: Google Analytics provides an easily usable interface. You can use it not only on desktop but on smartphones and tablets as well.
    4. Measure internal site search: Through this you can determine what customers are looking for on your site and where your site is lacking.
    5. To know demographics of your audience: You can know the age, gender and other information using Google Analytics.

    See less
    • 0
rayon

  1. According to a definition on Wikipedia, "In distributed computing, a remote procedure call is when a computer program causes a procedure to execute in a different address space, which is coded as if it were a normal procedure call, without the programmer explicitly coding the details for the remoteRead more

    According to a definition on Wikipedia, “In distributed computing, a remote procedure call is when a computer program causes a procedure to execute in a different address space, which is coded as if it were a normal procedure call, without the programmer explicitly coding the details for the remote interaction.” Broadly speaking, Remote Procedure Call is a protocol that one program can use to request a service from a program located in some another computer on a network without having to understand the network’s details. RPC is used to call other processes on the remote systems like a local system.

    See less
    • 0
Aakash

  1. Red hat hackers are the vigilantes of the hacker Universe. By vigilant I mean, a person who takes the law into his or her own hands. There are like White Hats, in that they halt Black Hats, also known as the eagle-eyed hackers, but these people are so damn scary when they do it. Instead of reportingRead more

    Red hat hackers are the vigilantes of the hacker Universe. By vigilant I mean, a person who takes the law into his or her own hands. There are like White Hats, in that they halt Black Hats, also known as the eagle-eyed hackers, but these people are so damn scary when they do it. Instead of reporting the spiteful hacker, they sue them down by uploading viruses, dosing and accessing their computer to damage and rupture it from the inside out. They anchorage multiple aggressive harsh methods that might force them to get in need of a new computer. They become merciless while dealing with malware actions of the black hat hackers.
    A red hat hacker could be referred to someone who targets Linux systems. Linux is a software that sits underneath all of the other software on a computer, receiving requests from the programs and relaying their requests to the computer’s hardware.

    See less
    • 0
Endive Software

  1. OLX runs on a simple advertising business model. Building an app like OLX isn't that hard. All you need to do is to focus on a listing application with user-generated content and remove the barriers to use like many questions, etc. Here's an article to help you understand OLX's business model - httpRead more

    OLX runs on a simple advertising business model. Building an app like OLX isn’t that hard. All you need to do is to focus on a listing application with user-generated content and remove the barriers to use like many questions, etc.
    Here’s an article to help you understand OLX’s business model –
    https://www.feedough.com/how-does-olx-make-money/

    See less
    • 0
Pallavi Kamat

  1. A middleware is a software which acts as a bridge between the operating system and the applications that work on it.It acts as a translation layer permitting data management and communication between applications. It delivers messaging services by using frameworks like SOAP, REST, JSON, etc.

    A middleware is a software which acts as a bridge between the operating system and the applications that work on it.It acts as a translation layer permitting data management and communication between applications. It delivers messaging services by using frameworks like SOAP, REST, JSON, etc.

    See less
    • 0
usha69

  1. AI or Artificial Intelligence is a branch of computer science. Artificial Intelligence is the science of programming machines to perform activities in a a way that fools the user into believing that task is performed by a human. AI systems typically demonstrate behaviors associated with humans likeRead more

    AI or Artificial Intelligence is a branch of computer science.
    Artificial Intelligence is the science of programming machines to perform activities in a a way that fools the user into believing that task is performed by a human.
    AI systems typically demonstrate behaviors associated with humans like problem solving, thinking, reasoning, etc.
    Examples of AI could be Apple’s Siri, Amazon’s Alexa and others.

    See less
    • 0
Maitya

  1. Remote Procedure Call (RPC) is a powerful technique for constructing distributed and client-server based applications. Majorly RPC is used to call other processes on the remote systems like a local system. RPC is a method of modelling communication between two applications as straightforward functioRead more

    Remote Procedure Call (RPC) is a powerful technique for constructing distributed and client-server based applications. Majorly RPC is used to call other processes on the remote systems like a local system. RPC is a method of modelling communication between two applications as straightforward function calls. Although the applications may be on different machines, an RPC mechanism usually defines a network protocol. It is a format for exchanging messages, a portable way of serializing and deserializing data and specific programming language support.

    See less
    • 0