Skip to content
Tuesday, Oct 7, 2025
ICT BYTE Logo

ICT BYTE

Tech News in Nepal | #1 Tech Blog

  • HOME
  • GADGETS
    • MOBILE
    • LAPTOPS
    • SMARTWATCH
    • TABLETS
  • EVENTS
  • NEPAL
    • Banking
    • B.Sc. CSIT
    • BCA
  • MCS
    • 1st Sem
      • Managerial Communication
      • Object Oriented Programming
      • Open Source Technology
      • Design and Analysis of Algorithm
    • 2nd Sem
    • 3rd Sem
    • 4th Sem
  • Hult Prize
  • Utility Tools

Tag: masters of computer science

Cyber Security Vulnerability Assessment
Cyber SecurityMasters of Computer Science

Cyber Security Vulnerability Assessment

Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or…

byICT Byte
Scanning Networks in Cyber Security
Masters of Computer ScienceCyber Security

Scanning Networks in Cyber Security

Network Scanning Concepts Network scanning refers to a set of procedures for identifying hosts, ports, and services in a network.…

byICT Byte
Boot Process in Linux | Understanding Boot process and related System files
Masters of Computer ScienceOpen Source Technology

Boot Process in Linux | Understanding Boot process and related System files

We can distinct boot process in linux in 6 different stages These includes BIOS MBR GRUB Kernel Init Run Level…

byICT Byte
Everything you need to know on “Drafting Orders”
Masters of Computer ScienceManagerial Communication

Everything you need to know on “Drafting Orders”

Drafting Orders The buyers decide to purchase the needed goods from the suppliers. The letter which the buyer sends to…

byICT Byte
Everything you need to know about adjustment letters
Masters of Computer ScienceManagerial Communication

Everything you need to know about adjustment letters

Adjustment Letters Responses to letters of complaint are called adjustment letters. They are of three forms. 100 percent yes. 100…

byICT Byte
Best way to write complaint letters with example
Masters of Computer ScienceManagerial Communication

Best way to write complaint letters with example

Complaint Letters Introduction You need to politely state the problem. Include supporting documents, such as the following: Serial numbers Dates…

byICT Byte
Bad News Letter | Criteria of Writing a Bad-News Letter with example
Masters of Computer ScienceManagerial Communication

Bad News Letter | Criteria of Writing a Bad-News Letter with example

Bad-News Letter Unfortunately, you occasionally will be required to write bad-news letters. These letters might reject a job applicant, deny…

byICT Byte
File permission, changing permission and ownership in Linux
Masters of Computer ScienceOpen Source Technology

File permission, changing permission and ownership in Linux

Linux Authorization For security purpose, LINUX divides authorization in Ownership Permission Ownwership In linux, every file and directory is assigned…

byICT Byte
Steps and techniques of giving interviews
Masters of Computer ScienceManagerial Communication

Steps and techniques of giving interviews

Guidelines/Techniques for Giving Interview ( For Interviewee) Prepare for the Interview. Anticipate questions and form answers. Research about the company. …

byICT Byte
What are the types of the interview? What is interview media?
Masters of Computer ScienceManagerial Communication

What are the types of the interview? What is interview media?

Types of Interviews 1. Structured Versus Unstructured Interviews In structured interview, the interviewer ( or a computer) asks a series…

byICT Byte

Posts navigation

Older posts

Copyright © 2025 ICT BYTE | Expose News by Ascendoor | Powered by WordPress.