Search
All categories
Results 101 - 128 of about 578
  • MIME (Multipurpose Internet Mail Extensions)

    Introduction to MIME MIME (Multipurpose Internet Mail Extensions) is a standard which was proposed by Bell Communications in 1991 in order to expand upon the limited capabilities of email, and in particular to allow documents (such as ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • Quality - Process Management

    The Concept of Processes The process model consists in considering a company's goal to be to provide products and/or services that meet client expectations. Thus, the company is modeled as a series of processes that allows the company to ... Read more

    Quality
    October 16, 2008 at 09:43 AM
  • Graphics cards - Video cards

    2D Accelerator Cards A graphics card, sometimes called a graphics adapter, video card or graphics accelerator, is a computer component which converts digital data into a graphical form which can be displayed on a monitor. The initial role ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • Types of computers

    Types of computers There are several families of computers, depending on their format: Mainframes, computers which a great deal of computing power, enormous input-output capabilities and high level of reliability. Mainframes are used by ... Read more

    Computer
    November 1, 2012 at 04:13 PM
  • Computer - ISA, MCA and VLB Buses

    Expansion Bus Expansion buses (sometimes called peripheral buses) are buses that have connectors that allow you to add expansion cards (peripherals) to a computer. There are different types of standard internal buses that are characterised ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • Propagation of Radio Waves (802.11)

    Propagation of Radio Waves In order to be able to install a wireless network, and in particular to place the access points so as to get the best range possible, a little background should be given on how radio waves propagate. Radio waves ... Read more

    Wireless
    October 16, 2008 at 09:43 AM
  • Network tests and diagnostics

    Testing the IP configuration Before doing anything else, you are advised to check the computer's IP configuration. Windows systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP configuration. The ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM
  • History of the Internet

    The revolutionary idea In 1962, as Communism grew stronger, the US Air Force asked a small team of researchers to create a military communications network that could withstand a nuclear strike. The concept of this network relied on a ... Read more

    Computer history
    October 16, 2008 at 09:43 AM
  • Establishing a Quality Procedure

    Establishing a Quality Procedure Improving quality (reducing bad quality and improving work processes) in a company requires reflection by both the management and all the employees in order to define the reachable goals in terms of quality ... Read more

    Quality
    October 16, 2008 at 09:43 AM
  • Spreadsheets - Mathematical Functions

    Standard Functions Function Description ABS() This function returns the absolute value of a number. It therefore returns the number, if it is positive, or the opposite (positive) if it is negative ODD(value) Rounds a number up to the ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • E-mail scams - Fund transfer scams

    Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also given ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Agile Methods (RAD, XP)

    Agile methods "Agile methods" software development (also called Agile Modelling denoted AG for short) reduce software lifecycle time (thus speeding up development) by firstly developing a prototype version, then integrating functionality ... Read more

    Software engineering
    October 16, 2008 at 09:43 AM
  • FTP commands

    The FTP protocol FTP (File Transfer Protocol) is a protocol — meaning a standard language that lets two machines communicate — used so that computers of different types (or with different operating systems) can transfer files over a ... Read more

    Networking tools
    October 16, 2008 at 09:43 AM
  • Execution phase of a project

    Execution phase Preparation Before beginning the execution of the work, it is necessary to take the time to break the project down into tasks in order to plan the performance of these tasks and determine what resources need to be mobilized ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • Data transmission - Analogue transmission

    The principles of analogue transmission Analogue data transmission consists of sending information over a physical transmission medium in the form of a wave. Data is transmitted via a carrier wave, a simple wave whose only purpose is to ... Read more

    Data transmission
    October 16, 2008 at 09:43 AM
  • The Sasser worm

    Introduction to the Sasser virus Appearing in May 2004, the Sasser virus (also known as the W32/Sasser.worm, W32.Sasser.Worm, Worm.Win32.Sasser.a, Worm.Win32.Sasser.b or Win32.Sasser) is a virus which exploits a security hole in the LSASS ... Read more

    Viruses and threats
    October 16, 2008 at 09:43 AM
  • Webmastering - Website Ergonomics

    The Concept of Ergonomics Ergonomics is the use of scientific knowledge about humans (psychology, physiology, medicine) with the aim of improving the workplace environment. Ergonomics is generally characterized by two components: ... Read more

    Webmastering
    October 16, 2008 at 09:43 AM
  • Positioning elements in CSS

    Using style sheets along with the and tags, you can specify the location of text or images down to the pixel. This is possible with versions 4 and higher of Netscape and Internet Explorer; however, the technique is still problematic and ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Intrusion detection systems (IDS)

    Introduction to intrusion detection systems An IDS (Intrusion Detection System) is the term for a mechanism which quietly listens to network traffic in order to detect abnormal or suspicious activity, thereby reducing the risk of intrusion ... Read more

    Intrusion detection
    October 16, 2008 at 09:43 AM
  • Hard drive

    The role of the hard drive Structure How it works Block mode 32-bit mode Technical specifications The role of the hard drive The hard drive is the component which is used to permanently store data, as opposed to RAM, which is erased ... Read more

    Computer
    November 7, 2012 at 09:23 AM