Search
All categories
Results 41 - 62 of about 578
  • Introduction to Spreadsheet Concepts

    What is a Spreadsheet? A spreadsheet (or spreadsheet program) is software that permits numerical data to be used and to perform automatic calculations on numbers contained in a table. It is also possible to automate complex calculations by ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • OOP - Inheritance

    The concept of inheritance Inheritance is specific to object-oriented programming, where a new class is created from an existing class. Inheritance (often referred to as subclasses) comes from the fact that the subclass (the newly created ... Read more

    Object-Oriented Programming
    October 16, 2008 at 09:43 AM
  • OOP - Data encapsulation

    The concept of encapsulation Encapsulation is a way of organizing data and methods into a structure by concealing the the way the object is implemented, i.e. preventing access to data by any means other than those specified. Encapsulation ... Read more

    Object-Oriented Programming
    October 16, 2008 at 09:43 AM
  • Web- Introduction to the World Wide Web

    The "Web," short for "World Wide Web" (which gives us the acronym www), is the name for one of the ways that the internet lets people browse documents connected by hypertext links. The concept of the Web was perfected at CERN (Conseil ... Read more

    World Wide Web
    March 2, 2016 at 05:01 AM
  • NAT- Network address translation, port forwarding and port trigg

    The principle of NAT Network address translation or NAT was developed in order to respond to the shortage of IP addresses with IPv4 protocol (in time the IPv6 protocol will respond to this problem). In fact, in IPv4 addressing the number ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • DB9 connector

    DB9 connector The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-Subminiature connector family (D-Sub or Sub-D). The DB9 connector is mainly used for serial connections, allowing for the asynchronous transmission of data ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • Rules for proper email use

    Netiquette Netiquette (a contraction of the words "Net" and "etiquette") refers to the set of rules governing correct behavior on the Internet, in order to respect others and be respected in turn. They serve as guidelines for civility and ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • Client/Server Environment

    Introduction to Client/Server Architecture Numerous applications run in a client/server environment, this means that client computers (computers forming part of the network) contact a server, generally a very powerful computer in terms of ... Read more

    Client/Server
    October 16, 2008 at 09:43 AM
  • Declaring a style sheet (CSS)

    Declaring a style sheet Style sheets are not directly integrated into the W3C's HTML recommendations. For this reason, you need to include elements in the HTML code indicating both the type of document, meaning the version of the HTML and ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Substitution cipher

    Substitution cipher Substitution cipher involves replacing one or more entities (generally letters) in a message with one or more other entities. There are several types of substitution cryptosystems: Monoalphabetic substitution involves ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Risks related to wireless WiFi networks (802.11 or Wi-Fi)

    Lack of security Radio waves intrinsically have the power to propagate in all directions, with a relatively wide range. Because of this, it is very difficult to keep radio broadcasts confined to a limited area. Radio propagation also ... Read more

    Wifi
    October 16, 2008 at 09:43 AM
  • Types of computers

    Types of computers There are several families of computers, depending on their format: Mainframes, computers which a great deal of computing power, enormous input-output capabilities and high level of reliability. Mainframes are used by ... Read more

    Computer
    November 1, 2012 at 04:13 PM
  • General Terms and Conditions of Use

    All Rights Reserved - 2013 - Communitic International Object These General Terms and Conditions are meant to define the ways in which the services of the website CCM.net, hereafter "The Service," are made available, as well as the ... Read more

    Terms of Use
    June 13, 2016 at 11:48 AM
  • WiMAX - 802.16 - Worldwide Interoperability for Microwave Access

    What is WiMAX ? WiMAX is short for Worldwide Interoperability for Microwave Access. It is a metropolitan wireless standard created by the companies Intel and Alvarion in 2002 and ratified by the IEEE (Institute of Electrical and ... Read more

    Wimax
    October 16, 2008 at 09:43 AM
  • Front Office and Back Office

    Front Office/Back Office The terms Front Office and Back Office are generally used to describe the parts of the company (or of its information system) that are dedicated, respectively, to the direct relationship with the client and proper ... Read more

    e-Business
    October 16, 2008 at 09:43 AM
  • WPAN (Wireless Personal Area Network)

    Wireless Personal Area Networks (WPAN) A wireless personal area network (WPAN for short) is a low-range wireless network which covers an area of only a few dozen metres. This sort of network is generally used for linking peripheral devices ... Read more

    Wireless
    October 16, 2008 at 09:43 AM
  • FTP protocol (File Transfer Protocol)

    Introduction to FTP protocol FTP protocol (File Transfer Protocol) is, as its name indicates a protocol for transferring files. The implementation of FTP dates from 1971 when a file transfer system (described in RFC141) between MIT ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • ccmexec - ccmexec.exe

    ccmexec - ccmexec.exe The process ccmexec.exe (Microsoft SMS Agent Host ) is part of the Microsoft SMS (Systems Management Server) suite, which is mainly used to distribute software patches to the machines on a network. The file that ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Information security officer (ISO)

    Information security officer (ISO) An ISO (information security officer) is in charge of setting and a company's security policy. He/she also plays a critical role in informing, advising, and alerting the general management on matters ... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • RTP/RTCP protocols

    Document written by Nico VanHaute, Julien Barascud and Jean-Roland Conca Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM