Skip to content
Comp Sci Station

Computer Science Resources

Primary Navigation Menu
Menu
  • Home
  • About
  • Contact Us
Secondary Navigation Menu
Menu
  • Computer Architecture
  • Discrete Mathematics
  • Programming
  • IDEs & Text Editors
  • Security
  • Security
  • UI/UX
  • News

Asad Badat

Boot Sector Virus Examples: Famous Infections Overviewed (1981-1997)

2019-03-20
By: Asad Badat
In: Security

Embedded in system memory and spread via physical media, the boot sector virus has a decades-long history since the early days of computing. Boot sector viruses are especially dangerous as they seize control of the computer system before any anti-virus mechanisms can activate. Instances of this virus type have variedRead More →

Inclusion-Exclusion Principle: Examples with Solutions

2018-11-21
By: Asad Badat
In: Discrete Mathematics

A good understanding of the inclusion-exclusion principle in Discrete Mathematics is vital for building a solid foundation in set theory. We discuss several inclusion-exclusion principle examples and solutions. And make use of Venn diagrams to help illustrate and understand our answers. Read More →

cav and clv method of disk access

CAV vs CLV: Brief Notes on their Differences

2018-10-16
By: Asad Badat
In: Computer Architecture

CAV and CLV refer to differing techniques of scanning data on rotating optical storage mediums. We explore their definitions, advantages, disadvantages and differences.Read More →

Types of resources when allocating in project management

Types of Resources in Project Management

2018-10-08
By: Asad Badat
In: Software Project Management

There are generally seven types of resources in project management. We define and discuss these resource categories and provide relevant examples.Read More →

Web Dev News - september 2018

Web Dev News: September 2018 Roundup

2018-10-03
By: Asad Badat
In: News

Web Dev News Roundup for September 2018Read More →

Heuristics: Exploring Visibility of System Status Examples

2018-10-01
By: Asad Badat
In: UI/UX

The most accepted set of heuristics is defined by Jakob Nielson. It features aspects ranging from error prevention and documentation to user freedom and visibility of system status. In this article, multiple visibility of system status examples are explored and discussed.Read More →

Magnetic Tape Storage: Advantages and Disadvantages

2018-04-12
By: Asad Badat
In: Computer Architecture

Magnetic tape storage is not obsolete despite the popularity of disk and cloud technology. In this article, we explain magnetic tape storage advantages and disadvantages and explore their popularity and drawbacks against other common storage mediums.Read More →

how-to-install-packages-in-sublime-text-3

How to Install Packages in Sublime Text 3

2018-02-14
By: Asad Badat
In: IDEs and Text Editors

Sublime Text 3 is famed for its packages which allow heavy productivity and aesthetic overhauls among other features.Installing packages for Sublime Text is a practical must for brand new and even advanced developers. In this step by step tutorial, we learn how to install packages in Sublime Text 3.Read More →

electric-stove-an-embedded-system-daily-life

30 Examples of Embedded Systems in Daily Life

2017-12-04
By: Asad Badat
In: Computer Architecture

Embedded systems refer to the use of software and electronics with a dedicated purpose within a larger system or product. Embedded systems are far more ubiquitous than the general-purpose computer found in almost every home. As such, there are many examples of embedded systems in daily life. Where can embeddedRead More →

Recent Posts

  • Boot Sector Virus Examples: Famous Infections Overviewed (1981-1997)
  • Inclusion-Exclusion Principle: Examples with Solutions
  • CAV vs CLV: Brief Notes on their Differences
  • Types of Resources in Project Management
  • Web Dev News: September 2018 Roundup

FOR DEVELOPERS

https://pixelarity.com/?ref=6925257792

Sitemap | Privacy Policy & Terms of Service