Feedough Community Latest Questions

Amruta

  1. Google Analytics is a free analytics service that allows you to analyze visitors on your website in depth. Following are some of the uses of Google Analytics: 1. Automatic collection of data: By copying a simple piece of code, Google Analytics starts collecting data from your website. 2. Creating cuRead more

    Google Analytics is a free analytics service that allows you to analyze visitors on your website in depth.
    Following are some of the uses of Google Analytics:
    1. Automatic collection of data: By copying a simple piece of code, Google Analytics starts collecting data from your website.
    2. Creating customized reports: You can choose from the reports that Google creates or create your own custom report from the available data.
    3. Integration with other tools and platforms: Google Analytics provides an easily usable interface. You can use it not only on desktop but on smartphones and tablets as well.
    4. Measure internal site search: Through this you can determine what customers are looking for on your site and where your site is lacking.
    5. To know demographics of your audience: You can know the age, gender and other information using Google Analytics.

    See less
    • 0
rayon

  1. According to a definition on Wikipedia, "In distributed computing, a remote procedure call is when a computer program causes a procedure to execute in a different address space, which is coded as if it were a normal procedure call, without the programmer explicitly coding the details for the remoteRead more

    According to a definition on Wikipedia, “In distributed computing, a remote procedure call is when a computer program causes a procedure to execute in a different address space, which is coded as if it were a normal procedure call, without the programmer explicitly coding the details for the remote interaction.” Broadly speaking, Remote Procedure Call is a protocol that one program can use to request a service from a program located in some another computer on a network without having to understand the network’s details. RPC is used to call other processes on the remote systems like a local system.

    See less
    • 0
Aakash

  1. Red hat hackers are the vigilantes of the hacker Universe. By vigilant I mean, a person who takes the law into his or her own hands. There are like White Hats, in that they halt Black Hats, also known as the eagle-eyed hackers, but these people are so damn scary when they do it. Instead of reportingRead more

    Red hat hackers are the vigilantes of the hacker Universe. By vigilant I mean, a person who takes the law into his or her own hands. There are like White Hats, in that they halt Black Hats, also known as the eagle-eyed hackers, but these people are so damn scary when they do it. Instead of reporting the spiteful hacker, they sue them down by uploading viruses, dosing and accessing their computer to damage and rupture it from the inside out. They anchorage multiple aggressive harsh methods that might force them to get in need of a new computer. They become merciless while dealing with malware actions of the black hat hackers.
    A red hat hacker could be referred to someone who targets Linux systems. Linux is a software that sits underneath all of the other software on a computer, receiving requests from the programs and relaying their requests to the computer’s hardware.

    See less
    • 0
Pallavi Kamat

  1. A middleware is a software which acts as a bridge between the operating system and the applications that work on it.It acts as a translation layer permitting data management and communication between applications. It delivers messaging services by using frameworks like SOAP, REST, JSON, etc.

    A middleware is a software which acts as a bridge between the operating system and the applications that work on it.It acts as a translation layer permitting data management and communication between applications. It delivers messaging services by using frameworks like SOAP, REST, JSON, etc.

    See less
    • 0
usha69

  1. AI or Artificial Intelligence is a branch of computer science. Artificial Intelligence is the science of programming machines to perform activities in a a way that fools the user into believing that task is performed by a human. AI systems typically demonstrate behaviors associated with humans likeRead more

    AI or Artificial Intelligence is a branch of computer science.
    Artificial Intelligence is the science of programming machines to perform activities in a a way that fools the user into believing that task is performed by a human.
    AI systems typically demonstrate behaviors associated with humans like problem solving, thinking, reasoning, etc.
    Examples of AI could be Apple’s Siri, Amazon’s Alexa and others.

    See less
    • 0
Maitya

  1. Remote Procedure Call (RPC) is a powerful technique for constructing distributed and client-server based applications. Majorly RPC is used to call other processes on the remote systems like a local system. RPC is a method of modelling communication between two applications as straightforward functioRead more

    Remote Procedure Call (RPC) is a powerful technique for constructing distributed and client-server based applications. Majorly RPC is used to call other processes on the remote systems like a local system. RPC is a method of modelling communication between two applications as straightforward function calls. Although the applications may be on different machines, an RPC mechanism usually defines a network protocol. It is a format for exchanging messages, a portable way of serializing and deserializing data and specific programming language support.

    See less
    • 0
rayon

  1. You will get a lot of clear or not so clear signs if hacked. Hacking could be in terms of some personal information to hacking of your bank account. One of the example is if your browser is suddenly showing toolbars you don’t recognize and clearly didn’t install, it’s almost sure that your computerRead more

    You will get a lot of clear or not so clear signs if hacked. Hacking could be in terms of some personal information to hacking of your bank account. One of the example is if your browser is suddenly showing toolbars you don’t recognize and clearly didn’t install, it’s almost sure that your computer has been compromised.
    These unwanted toolbars can be extremely annoying. They can mess with your browser settings and, for example, change your standard homepage to a spammy website.
    There are quite a few software tools that install additional software on your PC – especially free software, which often asks the user’s permission to install third-party software. It does mean you are being hacked.
    Another example is redirecting. Redirecting users to certain websites is a lucrative business for hackers. They’re paid to redirect users to these sites, so once a user opens a URL, it will automatically redirect them to a different website without their permission.
    This could also be done without the site owner’s consent, so they don’t actually realize the clicks are being forced by hackers.
    A fake warning message by your antivirus software – or any other protection software, for that matter – is one of the most certain signs that tell you’ve hacked.
    I think most avid social media and Skype users have been introduced to the phenomenon of receiving weird messages from a friend or a person on their contact list. Generally, the hacker is using your account to send out a message to all of your friends with either a link that will instantly start the download of a malicious file or redirect them to a malicious site.
    If you lose money without transferring funds yourself, it’s a clear sign that someone hacked into your device and compromised your bank account. Its not surprising if the hacker was able to transfer all of your funds to a different account or make purchases on a website.

    See less
    • 0
prashanth0011

  1. Big data refers to large sets of structured, unstructured and semi-structured data which has the potential to be mined and analyzed to determine patterns and trends . Big data is characterized by the following: 1. Volume: Large amount of data from various sources. 2. Velocity: Data is being generateRead more

    Big data refers to large sets of structured, unstructured and semi-structured data which has the potential to be mined and analyzed to determine patterns and trends .
    Big data is characterized by the following:
    1. Volume: Large amount of data from various sources.
    2. Velocity: Data is being generated at high speed and should be dealt with in near real time.
    3. Variety: Data can be in different formats.
    4. Variability: Data can be highly inconsistent.
    5. Complexity: Since data comes from multiple sources, complexity of linking, matching and cleaning data increases.

    See less
    • 0
Amruta

Explain with examples

  1. 1. IaaS or Infrastructure as a Service: IaaS is a self service model for monitoring and controlling local data centers, storage, network and networking devices. Instead of buying infrastructure like data centers or hardware for you business, you can avail services from IaaS providers on subscriptionRead more

    1. IaaS or Infrastructure as a Service: IaaS is a self service model for monitoring and controlling local data centers, storage, network and networking devices. Instead of buying infrastructure like data centers or hardware for you business, you can avail services from IaaS providers on subscription basis.
    Example of IaaS providers are AWS, Microsoft Azure, etc.
    2. PaaS or Platform as a Service: This service is used as a medium for developing applications without having to install the software on your desktop locally. It makes the development, testing, deployment and maintenance of applications easy and quick.
    One example of PaaS is Force.com by Salesforce.
    3. SaaS or Software as a Service: It has the major users of the cloud market. SaaS uses web to deliver applications hosted and managed by third party vendor and whose interface is accessed on the client side. Because of SaaS, applications can be accessed from anywhere and on any device connected to the web.
    SaaS examples are Salesforce, Cisco WebEx, Google Apps, etc.
    You can read this article for more undersatanding: https://apprenda.com/library/paas/iaas-paas-saas-explained-compared/

    See less
    • 0
Maitya

  1. No http is not a RPC. It could be noted that RPC is not a protocol, it's a principle that is also used in SOAP while SOAP is an application protocol that uses HTTP. Although RPC uses the HTTP protocol which is again not necessary. RPC is a standard to call code remotely whereas HTTP is just a data tRead more

    No http is not a RPC. It could be noted that RPC is not a protocol, it’s a principle that is also used in SOAP while SOAP is an application protocol that uses HTTP. Although RPC uses the HTTP protocol which is again not necessary. RPC is a standard to call code remotely whereas HTTP is just a data transfer protocol. REST calls are there, which work only over HTTP.

    See less
    • 0