Learn about external fragmentation in the operating system with a practical example.
Also find me here:
Baeldung Author
Subham Datta
I'm currently pursuing Ph.D. degree in Computer Engineering from the University of Cyprus. I'm also working at KIOS Research and Innovation Center of Excellence. My research area includes Cyber Security, Algorithms, Machine Learning. In my free time, I love watching cricket and movies.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Networking (35)
- OS (24)
- Security (23)
- Algorithms (23)
- Trees (11)
- Graphs (8)
- Programming (7)
- Math and Logic (7)
- Data Structures (7)
- Path Finding (4)
- Sorting (2)
- Software Architecture (2)
- Graph Traversal (2)
- Core Concepts (2)
- Artificial Intelligence (2)
- Web (1)
- Searching (1)
- Machine Learning (1)
- Concurrency (1)
What Is State Space Search?
Filed under Artificial Intelligence
Explore the state space search concept in detail with an example.
What Is the Difference Between Standard VLAN and Extended VLAN?
Filed under Networking
Explore two variants of virtual local area networks (VLAN): standard and extended VLAN.
Defining Multiobjective Algorithms and Pareto Frontiers
Filed under Algorithms
Explore multiobjective algorithms and Pareto frontiers with examples.
What Is the Difference Between Keyword and Reserved Word?
Filed under Programming
Explore the importance of keywords and reserved words.
Octet String: What Is It?
Filed under Networking
Explore the basics of octet string along with the applications.
What Is an Eavesdropping Attack?
Filed under Security
Explore eavesdropping attacks with a practical example.
Cryptography: Rail Fence Technique
Filed under Security
Explore the rail fence cryptography technique with an example.
Genetic Algorithms: Crossover Probability and Mutation Probability
Filed under Algorithms
Explore two crucial steps in a genetic algorithm: crossover and mutation.