Search
All categories
Results 101 - 120 of about 578
  • The Scanner

    The Scanner A scanner is an acquisition peripheral for scanning documents, i.e. converting a paper document to a digital image. There are generally three types of scanner: Flat scanners let you scan a document by placing it flat against a ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • Positioning elements in CSS

    Using style sheets along with the and tags, you can specify the location of text or images down to the pixel. This is possible with versions 4 and higher of Netscape and Internet Explorer; however, the technique is still problematic and may ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Information security officer (ISO)

    Information security officer (ISO) An ISO (information security officer) is in charge of setting and a company's security policy. He/she also plays a critical role in informing, advising, and alerting the general management on matters ... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • Hard drive

    The role of the hard drive Structure How it works Block mode 32-bit mode Technical specifications The role of the hard drive The hard drive is the component which is used to permanently store data, as opposed to RAM, which is erased ... Read more

    Computer
    November 7, 2012 at 09:23 AM
  • Session keys

    Advantages of a session key Asymmetric algorithms (which come into play in public-key cryptosystems) make it possible to eliminate problems related to key sharing via a secure channel. However, they remain much less effective (in terms of ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • CD, CD audio and CD-ROM

    The Compact Disc was invented by Sony and Philips in 1981 in order to serve as a high-quality compact audio storage device which allowed for direct access to digital sound tracks. It was officially launched in October 1982. In 1984, the ... Read more

    Computer
    October 7, 2012 at 02:35 PM
  • Smileys (emoticons)

    Why smileys? When typing words on the Internet, it's not always easy to convey feelings, emotions, or concepts like humor to the people you're communicating with. Here's a simple tip for getting the right message across: Use ASCII ... Read more

    World Wide Web
    October 16, 2008 at 09:43 AM
  • Introduction to DOS

    The development of MS-DOS MS-DOS is the most well known operating system, the most commercialised version is that of Microsoft, christened "MS-DOS" (there are other versions such as DR-DOS). MS-DOS was created in 1981 when it was used on ... Read more

    MS Dos
    October 16, 2008 at 09:43 AM
  • Computer - ISA, MCA and VLB Buses

    Expansion Bus Expansion buses (sometimes called peripheral buses) are buses that have connectors that allow you to add expansion cards (peripherals) to a computer. There are different types of standard internal buses that are characterised ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • The concept of objects

    The concept of objects Object-oriented programming consists of arranging data in modular sets of elements of real world information (called a domain. These data elements are called objects. This data is grouped according to the main real ... Read more

    Object-Oriented Programming
    October 16, 2008 at 09:43 AM
  • The Klez virus

    Introduction to the Klez virus Appearing early in 2002, the Klez virus is still everywhere on networks, and the danger it poses is even higher due to the new variations that keep cropping up (like Klez.e, Klez.g, Klez.h, Klez.i, Klez.k, ... Read more

    Viruses and threats
    October 16, 2008 at 09:43 AM
  • The Windows User Interface

    The Taskbar The Windows 9x user interface (9x refers to Windows 95 and Windows 98 together) is characterised by a bar at the bottom of your screen (it may be moved to another edge by left-mouse-clicking on it and dragging it to the desired ... Read more

    Windows
    October 16, 2008 at 09:43 AM
  • E-mail scams - Fund transfer scams

    Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also given ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Error checking

    Error checking Binary encoding is very practical for use in electronic devices such as computers, in which information can be encoded based on whether an electrical signal is present or not. However, this electrical signal may suffer ... Read more

    Encoding
    October 16, 2008 at 09:43 AM
  • Linking two PCs with a null modem cable

    Linking two computers without network cards The best way to link two computers is to use an RJ45 cable to connect the machines' network cards. However, when one or both of the computers has no network card, there is still a fairly easy way ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • IP Address

    What is an IP address? Computers communicate over the Internet using the IP protocol (Internet Protocol), which uses numerical addresses, called IP addresses, made up of four whole numbers (4 bytes) between 0 and 255 and written in the ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • The Printer

    Printers Characteristics Daisy Wheel Printer Dot-Matrix Printer Inkjet Printer and Bubble Jet Printer Laser Printer LED Printer Printer Command Language Print Servers Printers The printer is a peripheral that allows you to make a print-out ... Read more

    Computer
    November 7, 2012 at 08:26 AM
  • Read-only memory (ROM)

    Read-only memory (ROM) There is a type of memory that stores data without electrical current; it is the ROM (Read Only Memory) or is sometimes called non-volatile memory as it is not erased when the system is switched off. This type of ... Read more

    Computer
    November 1, 2012 at 04:15 PM
  • HTML document layout

    HTML document An HTML page is a simple file containing text formatted with HTML tags. Traditionally, the file is given an .htm or .html extension, but a web page may have other extensions as well. A web page can be built from even the most ... Read more

    HTML
    October 16, 2008 at 09:43 AM
  • Network equipment - The hub

    What is a hub? A hub is an element of hardware for centralising network traffic coming from multiple hosts, and to propagate the signal. The hub has a certain number of ports (it has enough ports to link machines to one another, usually 4, ... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM