Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Computer Architecture And Organization

Collision Domain

Posted on by

A LAN is network segment (wired or wireless) connecting multiple devices which becomes a network domain. If two devices are transmitting data at the same time in a network domain, they will collide and cause transmission failure due to the collusion of data. This network segment where all devices connecting to it and when transmitting…

Read more

Computing Clock Cycle

Posted on by

A clock cycle also known as machine cycle is the fundamental unit of time in a computer’s CPU. The clock cycle is driven by an internal clock signal within the central processing unit (CPU). The clock cycle is measured in Hertz (Hz). The following are the operations that are performed in a clock cycle. Fetching…

Read more

Instruction Set

Posted on by

An Instruction Set also known as Instruction set architecture (ISA) is the abstract model present in a computing machine that gives the instruction to the CPU present in a computer machine. The computing machine performs the required operations. The Operating System and Applications communicates to the computing hardware to perform an action through the Instruction…

Read more
  • Previous
  • 1
  • 2

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme