Internet use in everyday life There was a time when we used to ask someone that we ca…
spreadsheet Since the early days of mankind, people had to keep track of various thing…
Computer hacking Hacking is defined as entering into a computer system or network wi…
Optical fiber Optical fiber is a very thin type of plastic Glass system. Light sign…
malware Computer systems that have software security flaws create an opportunity for m…
Malicious software If you want to do any work on the computer, it has to be done throu…
A communication satellite floating in space Satellite: Satellites orbit the Earth from…
A lan card Lan Card: The device that is required to connect two or more computers toge…
World 1. The estimated age of the earth is 4500 million years. 2. The area of t…
Bus Topology Bus Topology: In this topology all the computers are connected along a…
In a computer network, many computers are connected together, the phone allows one com…
A Hub A hub is usually used to connect many ICT devices such as computers, printers,…
Newton's Second Law Newton's second law is one of the most important laws in …
Philosophia Naturalis Principia Mathematica Isaac Newton was a British physicist. Ab…
Newton Newton's First Law: Unless an external force is applied, an object at rest…
If two or more computers are connected together through a means of communication, if …
Changes in Earth's atmosphere Changes in Earth's atmosphere over geological …
change of world Earth changes with the flow of time Radioisotope dating of rocks and…
age of the earth The age of the Earth compared to the universe The universe is still …
Cyber Crimes Cyber Crime: Any act against society and law is a crime. And the crimes…
DDos Attack When a person is interviewed on TV, if many people ask the person many q…
Data Interception Almost all of us have seen the irrigation of land from water pumps…
Social Media