Posted inOS The Four Necessary Conditions for Deadlock Posted by By York 2025-04-19 Concept: A phenomenon where multiple concurrent processes wait for each other due to competing for…
Posted inMemory The Difference Between Heap and Stack Posted by By York 2025-04-18 Stack and Heap in Computer Memory Management Heaps and stacks are two important concepts in…
Posted inNet What’s the Difference Between TCP and UDP? Posted by By York 2025-04-14 Both TCP and UDP are transport layer protocols used for transmitting data between hosts, but…
Posted inNet OS What is IO Multiplexing? Posted by By York 2025-03-29 I/O multiplexing is a mechanism that allows a program to monitor multiple file descriptors simultaneously…
Posted inAlgo How to Design a Good Hash Function? Posted by By York 2025-03-23 Hash Function A hash function,is a function that maps data of arbitrary length to a…
Posted inNet Let’s Talk About TCP’s Three-Way Handshake Posted by By York 2025-03-23 TCP (Three-Way Handshake) The TCP three-way handshake refers to a three-step interaction process between a…
Posted inNet The Difference Between HTTP and HTTPS Posted by By York 2025-03-21 HTTP (Hypertext Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure) are two protocols used for…
Posted inAlgo How to Implement Binary Tree Traversal? Posted by By York 2025-03-18 Binary trees are fundamental data structures in computer science, and traversing them efficiently is a…
Posted inMemory The Difference Between malloc and new Posted by By York 2025-03-16 Memory Allocation and Initialization Both malloc and new allocate memory on the heap, but: malloc…
Posted inMemory Why Do We Need Virtual Memory? Posted by By York 2025-02-17 Introduction to Virtual Memory In operating systems, all running programs must first be received by…