Courses
Tutorials
Interview Prep
DSA
Practice Problems
C
C++
Java
Python
JavaScript
Data Science
Machine Learning
Courses
Linux
DevOps
Similar Topics
Web Technologies
32.1K+ articles
DSA
20.4K+ articles
Python
19.6K+ articles
Computer Networks
3.4K+ articles
cryptography
191+ articles
Transport Layer
15+ articles
Application Layer
14+ articles
routing
12+ articles
Computer-Networks-MAQ
1+ articles
computer network - data transmission
1+ articles
Computer-Networks
5 posts
Recent Articles
Popular Articles
Transport & Application Layer Interview Questions - Computer Networks
Last Updated: 14 April 2026
The transport and application layers are crucial components of the TCP/IP model, ensuring reliable communication and enabling user-level network services. The transport la...
read more
Computer Networks
Transport Layer
Application Layer
Computer-Networks
Routing & Switching Interview Questions - Computer Networks
Last Updated: 01 September 2025
Routing and switching are functions of computer networks that determine how data travels from source to destination. Switching operates within a network to forward frames ...
read more
Computer Networks
routing
Computer-Networks
Data Transmission Interview Questions - Computer Networks
Last Updated: 01 September 2025
Data transmission refers to the process of sending digital or analog data between devices over a communication medium. It involves concepts like transmission modes (simple...
read more
Computer Networks
Computer-Networks-MAQ
Computer-Networks
computer network - data transmission
Distributed Objects Computing: The next generation of client-server computing
Last Updated: 10 June 2025
Software technology is in the midst of a major computational shift towards distributed object computing DOC. Distributed computing is poised for a second client-server rev...
read more
Computer Networks
Computer-Networks
What is Cross Site Request Forgery (CSRF)
Last Updated: 19 September 2025
Cross-Site Request Forgery (CSRF) is a critical web vulnerability that allows attackers to trick authenticated users into performing unintended actions, such as changing a...
read more
Computer Networks
cryptography
Computer-Networks