Search
All categories
Results 81 - 103 of about 578
  • Preparatory phase of a project

    The preparatory phase The term preliminary project is generally used to refer to all preparatory stages necessary for the launch of the project. Thus, the idea is to precisely define the nature of the project in order to finalize the ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • RTP/RTCP protocols

    Document written by Nico VanHaute, Julien Barascud and Jean-Roland Conca Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Network cards

    What is a network card? What is the role of a network card? Preparing data The role of the identifier Other ... Read more

    Computer
    November 7, 2012 at 08:19 AM
  • Operating system

    Description of the operating system Roles of the operating system Components of the operating system Multi-threaded systems Multi-processor systems Embedded systems Real time systems Types of operating system Description of the operating ... Read more

    Operating System
    November 11, 2012 at 06:40 PM
  • Spreadsheets - Worksheets

    The Concept of a Worksheet Spreadsheets display data and formulas in a table form (lines and columns) called a worksheet. A worksheet is made of lines (numbered with numbers) and of columns (numbered with letters). The intersection of a ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • History of the hard drive

    History of the hard drive The first hard drive was invented in early 1956, at the request of the US Air Force, by the company IBM. It was called the RAMAC 305 (with the name standing for Random Access Method of Accounting and Control), a ... Read more

    Computer history
    October 16, 2008 at 09:43 AM
  • OOP - Polymorphism

    Definition of polymorphism The word polymorphism comes from Greek and means having several different forms. This is one of the essential concepts of object-oriented programming. Where inheritance is related to classes and (their hierarchy ... Read more

    Object-Oriented Programming
    October 16, 2008 at 09:43 AM
  • Spreadsheets - Mathematical Functions

    Standard Functions Function Description ABS() This function returns the absolute value of a number. It therefore returns the number, if it is positive, or the opposite (positive) if it is negative ODD(value) Rounds a number up to the ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Risks related to wireless WiFi networks (802.11 or Wi-Fi)

    Lack of security Radio waves intrinsically have the power to propagate in all directions, with a relatively wide range. Because of this, it is very difficult to keep radio broadcasts confined to a limited area. Radio propagation also ... Read more

    Wifi
    October 16, 2008 at 09:43 AM
  • Propagation of Radio Waves (802.11)

    Propagation of Radio Waves In order to be able to install a wireless network, and in particular to place the access points so as to get the best range possible, a little background should be given on how radio waves propagate. Radio waves ... Read more

    Wireless
    October 16, 2008 at 09:43 AM
  • Conducting a meeting

    Introduction Meetings are a way of sharing, within a group of individuals, the same level of knowledge of a subject or a problem and of making decisions collectively. Additionally, decisions made collectively, with representatives of the ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • DNS (Domain Name System)

    What is DNS? Each computer directly connected to the Internet has at least one specific IP address. However, users do not want to work with numerical addresses such as 194.153.205.26 but with a domain name or more specifically addresses ( ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • ISO 9000, ISO 9001 and ISO 9004

    Introduction to ISO Certification Certification is a way to attest, by the intermediary of a third-party certifier, to a company's ability to provide a service, product or system in accordance with client requirements and regulation ... Read more

    Quality
    October 16, 2008 at 09:43 AM
  • FTP commands

    The FTP protocol FTP (File Transfer Protocol) is a protocol — meaning a standard language that lets two machines communicate — used so that computers of different types (or with different operating systems) can transfer files over a ... Read more

    Networking tools
    October 16, 2008 at 09:43 AM
  • Data transmission - Analogue transmission

    The principles of analogue transmission Analogue data transmission consists of sending information over a physical transmission medium in the form of a wave. Data is transmitted via a carrier wave, a simple wave whose only purpose is to ... Read more

    Data transmission
    October 16, 2008 at 09:43 AM
  • Types of computers

    Types of computers There are several families of computers, depending on their format: Mainframes, computers which a great deal of computing power, enormous input-output capabilities and high level of reliability. Mainframes are used by ... Read more

    Computer
    November 1, 2012 at 04:13 PM
  • Spreadsheets - Data Entry

    Cell Content A cell of a worksheet can contain a value or be empty. The value of a cell has two essential characteristics: a type, which means the intrinsic type of the data. There are generally three types of values: numeric values, for ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Introduction to attacks

    Introduction to attacks Any computer connected to a computing network is potentially vulnerable to an attack. An "attack" is the exploitation of a flaw in a computing system (operating system, software program or user system) for purposes ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Data tampering attacks

    Most web application attacks involving soliciting a website with manually entered data to generate an unexpected context. Web application parameters The HTTP protocol, a communication protocol on the web, makes it possible to convey ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Peer-to-peer networking

    Introduction to peer-to-peer architecture In contrast to client-server networks there is no dedicated server in peer-to-peer architecture . Thus each computer in such a network is part server and part client. This means that each computer ... Read more

    Client/Server
    November 12, 2012 at 12:43 PM