Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Sorry, you do not have a permission to ask a question, You must login to ask question.

Sorry, you do not have a permission to add a post.

Discy Latest Articles

Time Division Multiplexing

Time Division Multiplexing

Let us learn some of the basic information about the time-division multiplexing and different types of multiplexing in it. The time-division multiplexing can be of two types. It can be statistical time division multiplexing and frequency division multiplexing. Before we ...

Code Division Multiple Access

Code Division Multiple Access

Introduction: Code Division Multiple Access(CDMA) is a communication channel used to send the signal through various communication technologies in CDMA serval users can share the bandwidth and also this CDMA acts as interface several users. Every channel has a specific ...

Artificial Intelligence and Machine Learning

Artificial Intelligence and Machine Learning

In the rising technology, many people are dreamed of talking robots, flying rockets. This is where artificial intelligence came into life. Artificial intelligence is nothing but, the work done by humans can be done with the help of artificial intelligence. ...

What is Computer Virus, Types of Computer Virus

What is Computer Virus, Types of Computer Virus

The computer virus is similar to the human affected virus, that affects computer systems. It can pass spread through one computer to the other computer. How can it pass through several computers?. It many through malicious code. The virus can ...

Pipelining in Computer Architecture

Pipelining in Computer Architecture

Let us understand the concept of python in a simple way. A pipelining is usually a process of arrangement. It arranges the elements of the central processing unit to increase the performance. The pipelining concept can increase the overall performance ...

Asynchronous Transfer Mode

Asynchronous Transfer Mode

The Asynchronous transfer mode is shortly called the ATM. The data can be transferred through broadband communication and works at high speed. It uses a new technology called broadband communication. The transfer of data can be based on packet switching. ...

Introduction to Cryptography

Introduction to Cryptography

The term cryptography works to protect the data securely, We normally protect the data to avoid access from unauthorized users. Many people use the cryptography technique to protect the data of corporate secrets and personal data. It protects to avoid ...

Function of OSI Model Layer

Function of OSI Model Layer

Let us know about Function of OSI Model Layer OSI model: Open System Interconnection Model: OSI model defines and is used to understand how data is moved from one computer to another in a computer network in the most basic ...

Latest News & Updates

Discy Latest Articles

What is Network Security

What is Network Security

Table of Contents TYPES OF NETWORK SECURITY SOLUTIONS

Time Division Multiplexing

Time Division Multiplexing

Let us learn some of the basic information about the time-division multiplexing and different types of multiplexing in it. The time-division multiplexing can be of two types. It can be statistical time division multiplexing and frequency division multiplexing. Before we ...

Code Division Multiple Access

Code Division Multiple Access

Introduction: Code Division Multiple Access(CDMA) is a communication channel used to send the signal through various communication technologies in CDMA serval users can share the bandwidth and also this CDMA acts as interface several users. Every channel has a specific ...

Explore Our Blog