Search
All categories
Results 21 - 42 of about 757
  • Introduction to email

    What is email? Electronic mail (also known as email or e-mail) is one of the most commonly used services on the Internet, allowing people to send messages to one or more recipients. Email was invented by Ray Tomlinson in 1972. Why use ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • Operating Systems - MS-DOS - Commands

    Command Description dir lists the contents of a folder cd changes folder cd .. parent folder md or mkdir creates a new folder deltree deletes a folder and all sub-folders copy, xcopy copies a file move moves a file del deletes a file type ... Read more

    MS Dos
    October 16, 2008 at 09:43 AM
  • Representation of real numbers and integers

    Representing a number in a computer Representing (or encoding) a number means to express it in binary form. Representing numbers in a computer is necessary in order for it to be able to store and manipulate them. However, the problem is ... Read more

    Encoding
    October 16, 2008 at 09:43 AM
  • URL manipulation attacks

    Introduction to URLs The URL (Uniform Resource Locator) of a web application is the vector that makes it possible to indicate the requested resource. It is a string of printable ASCII characters that is divided into five parts: The name of ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Web- Introduction to the World Wide Web

    The "Web," short for "World Wide Web" (which gives us the acronym www), is the name for one of the ways that the internet lets people browse documents connected by hypertext links. The concept of the Web was perfected at CERN (Conseil ... Read more

    World Wide Web
    March 2, 2016 at 05:01 AM
  • DB25 connector

    DB25 plugs The DB25 (originally DE-25) connector is an analog 25-pin plug of the D-Subminiature connector family (D-Sub or Sub-D). As with the DB9 connector, the DB25 is mainly used for serial connections, allowing for the asynchronous ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • Creating a local area network

    Why set up a local area network? When you have several computers, it can be convenient to connect them to each other to create a local area network (LAN). Setting up such a network costs very little, contrary to what people may think. Here ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM
  • Introduction to Spreadsheet Concepts

    What is a Spreadsheet? A spreadsheet (or spreadsheet program) is software that permits numerical data to be used and to perform automatic calculations on numbers contained in a table. It is also possible to automate complex calculations by ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Spreadsheets - The Excel Interface

    Excel Introduction Microsoft Excel is the spreadsheet in the Microsoft Office office suite. To start it, simply click on the appropriate icon in the Start menu (in Windows) or click on an Excel file (that has an .xls file extension). A ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Linux - The Vi editor

    Introduction to Vi Despite its very limited ergonomics, Vi i is one of the most popular text editors texte under Unix type systems (with Emacs and pico). Under Linux, there is a free version of Vi called Vim (Vi Improved). Vi (pronounced ... Read more

    Linux
    October 16, 2008 at 09:43 AM
  • Data transmission - Digital data transmission

    Introduction to digital transmission Digital transmission is the sending of information over a physical communications media in the form of digital signals. Analogue signals must therefore be digitised first before being transmitted. ... Read more

    Data transmission
    October 16, 2008 at 09:43 AM
  • Bluetooth - How it works

    How Bluetooth works Communication principle Establishing connections Bluetooth profiles How Bluetooth works The Bluetooth standard, like WiFi, uses the FHSS technique (Frequency-Hopping Spread Spectrum), which involves splitting the ... Read more

    Bluetooth
    October 29, 2013 at 04:30 PM
  • Leased lines (T1, T2, T3)

    Leased lines "Leased" lines enable transmission of data at medium and high speeds (64 Kbps to 140 Mbps) by point to point or multipoint connection (Transfix service). In Europe, there are five types of lines distinguished according to ... Read more

    Internet Technologies
    October 16, 2008 at 09:43 AM
  • Types of connectors

    5-pin DIN plugs A DIN (or DIN5) connector is a plug with 5 pins, formerly used to connect keyboards to computers: The DIN5 connector has been made obsolete by PS ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • Client / Contractor

    Contractor and Client Client The client refers to the entity that has the need that defines the project objective, schedule, and dedicated budget. The expected result of the project is the creation of a product, called works. The client is ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • Binary encoding

    Introduction to binary In the late 1930s, Claude Shannon showed that by using switches which were closed for "true" and open for "false," it was possible to carry out logical operations by assigning the number 1 to "true" and 0 for "false ... Read more

    Encoding
    July 8, 2014 at 12:00 PM
  • PC Assembly

    Computer Assembly A PC computer is a modular type of computer, it can be assembled using hardware components made by different manufacturers, so as to have a custom built computer according to one's specific needs. The following components ... Read more

    Computer: assembly
    October 16, 2008 at 09:43 AM
  • Introduction to Wi-Fi (802.11 or WiFi)

    Introduction to Wi-Fi (802.11) The IEEE 802.11 specification (ISO/IEC 8802-11) is an international standard describing the characteristics of a wireless local area network (WLAN). The name Wi-Fi (short for "Wireless Fidelity", sometimes ... Read more

    Wifi
    October 16, 2008 at 09:43 AM
  • Private-key (or secret-key) cryptography

    Symmetric encryption Symmetric encryption (also called private-key encryption or secret-key encryption) involves using the same key for encryption and decryption. ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • NAT- Network address translation, port forwarding and port trigg

    The principle of NAT Network address translation or NAT was developed in order to respond to the shortage of IP addresses with IPv4 protocol (in time the IPv6 protocol will respond to this problem). In fact, in IPv4 addressing the number ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM