Inqilab Patel's Blog
Home
Amazon Stores
Amazon Stores 1
Amazon Stores 2
Amazon Stores 3
Downloads
O Level Computers
A Level Computing
O Level Accounts
Notes, Presentations
DBA
Sunday, 3 May 2015
Calculating Checksum
10:54
No comments
C
HECKSUM
is another way to check if data has been changed or corrupted following
data transmission. Data is sent in blocks and an additional value, the checksum, is
also sent at the end of the block of data.
Email This
BlogThis!
Share to X
Share to Facebook
Newer Post
Older Post
Home
0 comments:
Post a Comment
Subscribe to:
Post Comments (Atom)
Social Profiles
Popular
Tags
Blog Archives
Calendar
Finding and correcting errors in pseudo code
Finding and correcting errors Modify algorithm Suggest improvement by Inqilab Patel It is important to be able to identify error...
Timeline: 50 Years of Hard Drives
By Rex Farrance , PCWorld Over the past five decades, hard drives have...
Polling, Spooling and Interrupt in Operating System
1. Polling: Polling is a process in which Operating System continuously integrates if any peripheral needs attention of OS. 2. ...
Data Encryption
Encryption is the conversion of electronic data into another form, called cipher text, which cannot be easily understood by anyone except...
Error Detection in Algorithm Pseudo Code
There are 8 types of errors in algorithm pseudo code
2 Data (Computer Science)
Data and information Data are the raw facts and figures that we give to a computer as input. Data lack sufficient context and ...
Why Israil kills Palestinian children like cattle?
For all of those who wants to know why the IDF kill Palestinian children like cattle, read some quotes made by Israeli officials and prom...
Computer Architecture & Fetch-Execute Cycle
http://web.eecs.utk.edu/research/cs100modules/module1/index.html Although computers can have many different forms, there are four fun...
Fatima Jinnah An Indian And American Agent
This story is from the Time Magazine datelined Christmas Day 1964. It sheds interesting light on how far back this game of the securi...
Calculating Checksum
C HECKSUM is another way to check if data has been changed or corrupted following data transmission. Data is sent in blocks and an additio...
Amazon
Powered by
Blogger
.
About
About Me
Cambridge Computer Science
View my complete profile
Blog Archive
►
2018
(1)
►
June
(1)
►
2017
(19)
►
September
(3)
►
June
(1)
►
May
(14)
►
January
(1)
►
2016
(30)
►
November
(4)
►
October
(1)
►
July
(3)
►
May
(6)
►
April
(9)
►
March
(3)
►
February
(3)
►
January
(1)
▼
2015
(67)
►
December
(8)
►
November
(8)
►
October
(5)
►
September
(1)
►
August
(3)
►
July
(6)
►
June
(3)
▼
May
(18)
Test Data, Validation & Verification
How to type Sallaho allaehi w aalihi w sallam in o...
My princess!
کارل ڈینکے: ایک 'ہمدرد' قاتل کی کہانی
O Level Computer Science Exam Today
Bits required for colours
Sir Ayaz post for Chemistry P2
فالج کے نوجوان مریضوں میں اضافہ
Post of Sir Ayaz for O Chemistry ATP Students
Data Encryption
Flash Memory (NAND & NOR)
Program and programming languages
Burglar alarm system
Sensors
The role of interrupt and buffer 2
The role of interrupt and buffer 1
Denial of Service (DoS) attacks
Calculating Checksum
►
April
(4)
►
March
(3)
►
January
(8)
►
2014
(92)
►
December
(6)
►
November
(2)
►
October
(1)
►
September
(2)
►
August
(14)
►
July
(17)
►
June
(18)
►
May
(31)
►
March
(1)
►
2012
(6)
►
September
(5)
►
January
(1)
Featured Posts
FaceBook
Total Pageviews
Wikipedia
Search results
Blog Archive
►
2018
(1)
►
June
(1)
►
2017
(19)
►
September
(3)
►
June
(1)
►
May
(14)
►
January
(1)
►
2016
(30)
►
November
(4)
►
October
(1)
►
July
(3)
►
May
(6)
►
April
(9)
►
March
(3)
►
February
(3)
►
January
(1)
▼
2015
(67)
►
December
(8)
►
November
(8)
►
October
(5)
►
September
(1)
►
August
(3)
►
July
(6)
►
June
(3)
▼
May
(18)
Test Data, Validation & Verification
How to type Sallaho allaehi w aalihi w sallam in o...
My princess!
کارل ڈینکے: ایک 'ہمدرد' قاتل کی کہانی
O Level Computer Science Exam Today
Bits required for colours
Sir Ayaz post for Chemistry P2
فالج کے نوجوان مریضوں میں اضافہ
Post of Sir Ayaz for O Chemistry ATP Students
Data Encryption
Flash Memory (NAND & NOR)
Program and programming languages
Burglar alarm system
Sensors
The role of interrupt and buffer 2
The role of interrupt and buffer 1
Denial of Service (DoS) attacks
Calculating Checksum
►
April
(4)
►
March
(3)
►
January
(8)
►
2014
(92)
►
December
(6)
►
November
(2)
►
October
(1)
►
September
(2)
►
August
(14)
►
July
(17)
►
June
(18)
►
May
(31)
►
March
(1)
►
2012
(6)
►
September
(5)
►
January
(1)
Follow this blog
Follow this blog
Followers
0 comments:
Post a Comment