• Skip to main content
  • Skip to primary sidebar
  • Computer Architecture
  • Computer Networks
  • DBMS
  • OS
  • Software Engineering
  • Security
  • OOT
binary-terms-logo

Binary Terms

The Computer Science & IT Guide

Class Model

Class model defines the structure of the entire system by identifying the static structure of objects in that system. A class model defines attributes and operations for the objects of each class and also the relationship between the objects in the systems. A class model prepares the platform for the other two models i.e. the state model and interaction model. Class model is … [Read more...] about Class Model

Object Oriented Development

When we talk about the object oriented development, we are actually considering the life cycle of software which include analysis, design and implementation of the software. Object oriented development focuses on identifying and organizing the application concept instead of the implementation of the software. In this section, we will study the object oriented development … [Read more...] about Object Oriented Development

Object Orientation

Object Orientation is the software engineering concept which represents the software as a cluster of distinct objects. Each object comprises both data structure i.e. it’s storage structure and functioning i.e. its behaviour. In object orientation concept data structure and behaviour of each object is tightly coupled. The object orientation concept is broadly classified into … [Read more...] about Object Orientation

Public Key Cryptography

Public Key Cryptography is a cryptographic technique that involves 'two distinct keys' for encryption and decryption. That's why it is also known as asymmetric-key cryptography. The public key cryptography is totally based on the 'invertible mathematical' function which makes it different from the conventional symmetric key cryptography. It is not that symmetric key … [Read more...] about Public Key Cryptography

RSA Algorithm in Cryptography

RSA is a first successful public key cryptographic algorithm. It is also known as an asymmetric cryptographic algorithm because two different keys are used for encryption and decryption. RSA is named after Rivest, Shamir and Adleman the three inventors of RSA algorithm. The algorithm was introduced in the year 1978. In this section, we will discuss, RSA algorithm along with … [Read more...] about RSA Algorithm in Cryptography

« Previous Page
Next Page »

Primary Sidebar

Most Searched Terms

  • Directory Structure
  • Contiguous Memory Allocation
  • Addressing Mode and its Types
  • Pipelining
  • Vector Processing
  • Register Organization
  • Direct Memory Access (DMA)
  • Process Control Block (PCB)
  • Swapping in Operating System
  • Relational Data Model

Recent Additions

  • Types of Processors
  • Demand Paging in Operating System
  • Agents and Environment in Artificial Intelligence
  • Array Processor in Computer Architecture
  • Deadlock Avoidance in Operating System
  • Fragmentation in Operating System
  • Assembly Language in Computer
  • Control Signals in Computer Architecture
  • Memory Hierarchy in Computer Architecture
  • Ethernet in Computer Networks

Categories

  • Artificial Intelligence
  • Cloud Computing
  • Compiler Design
  • Computer Architecture
  • Computer Networks
  • Data Warehouse and Mining
  • DBMS
  • Object Oriented Technology
  • Operating System
  • Security
  • Software Engineering

Copyright © 2026 · Binary Terms · Contact Us · About Us · Privacy