Search
All categories
Results 121 - 140 of about 578
  • Error checking

    Error checking Binary encoding is very practical for use in electronic devices such as computers, in which information can be encoded based on whether an electrical signal is present or not. However, this electrical signal may suffer ... Read more

    Encoding
    October 16, 2008 at 09:43 AM
  • Style classes (CSS)

    Classes and IDs Classes A web designer might want to assign different styles to the same tags. For this reason, the CSS specifications introduced the concept of classes. The definition of classes is as simple as that of styles. It involves ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • IP Address

    What is an IP address? Computers communicate over the Internet using the IP protocol (Internet Protocol), which uses numerical addresses, called IP addresses, made up of four whole numbers (4 bytes) between 0 and 255 and written in the ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Motherboard

    Introduction to motherboards Characteristics Motherboard form factor Integrated components The chipset The CMOS clock and battery The BIOS The processor ... Read more

    Computer
    November 12, 2012 at 12:49 PM
  • Environment variables

    Environment variables An environment variable is a dynamic value loaded into the memory that can be used by several processes operating simultaneously. On most operating systems, the location of some libraries or of the main system ... Read more

    Operating System
    October 16, 2008 at 09:43 AM
  • Cryptography - Secure HTTP

    Introduction to S-HTTP S-HTTP (Secure HTTP) is a process that protects HTTP transactions and is based on an improvement to the HTTP protocol that was made in 1994 by EIT (Enterprise Integration Technologies). It makes it possible to ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • TMA (Third-Party Application Maintenance)

    Third-party application maintenance The term third-party application maintenance (acronym TMA) refers to outsourcing the maintenance of applications, i.e. entrust all or part of the maintenance of applications to a third-party computer ... Read more

    e-Business
    October 16, 2008 at 09:43 AM
  • VPN - Virtual Private Networks

    The concept of virtual private networks Operation of a VPN Tunneling protocols The PPTP protocol The L2TP protocol The IPSec protocol The concept of virtual private networks Local area networks (LANs) are the internal networks of ... Read more

    Introduction to Networks
    November 12, 2012 at 12:44 PM
  • Messaging protocols (SMTP,POP3 and IMAP4)

    Introduction to e-mail E-mail is considered as being the most widely used service on the Internet. So the TCP/IP protocol suite offers a range of protocols allowing the easy management of email routing over the network. The SMTP protocol ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • grpconv - grpconv.exe

    grpconv - grpconv.exe grpconv.exe (grpconv stands for Windows Program Group Converter) is a Windows NT/2000/XP generic process used for converting program groups from older versions of Windows. The process grpconv is not in any way a virus ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Processing of Personal Data - CCM

    Communitic International is responsible for the collection and the processing of personal data. Communitic International is a subsidiary of CCM Benchmark Group. Communitic International is a registered SARL with a capital of 10 000 €, ... Read more

    Terms of Use
    June 16, 2016 at 01:06 PM
  • MAN (Metropolitan Area Network)

    Metropolitan Area Network (MAN) MANs (Metropolitan Area Networks) connect multiple geographically nearby LANs to one another (over an area of up to a few dozen kilometres) at high speeds. Thus, a MAN lets two remote nodes communicate as if ... Read more

    Introduction to Networks
    October 16, 2008 at 09:43 AM
  • DMZ (Demilitarized Zone)

    The Concept of Isolation Firewall systems allow for the definition of access rules between two networks. However, in practice, companies generally have several subnetworks with different security policies. This is why it is necessary to ... Read more

    Protection
    October 16, 2008 at 09:43 AM
  • Spreadsheets - Data Entry

    Cell Content A cell of a worksheet can contain a value or be empty. The value of a cell has two essential characteristics: a type, which means the intrinsic type of the data. There are generally three types of values: numeric values, for ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Employee Relationship Management (ERM)

    The term "Employee Relationship Management" (acronym ERM), translate as "management of the relationship with the employees" refers to the use of technologies in the management of human resources. This concept is based on client ... Read more

    e-Business
    October 16, 2008 at 09:43 AM
  • HTML document layout

    HTML document An HTML page is a simple file containing text formatted with HTML tags. Traditionally, the file is given an .htm or .html extension, but a web page may have other extensions as well. A web page can be built from even the most ... Read more

    HTML
    October 16, 2008 at 09:43 AM
  • GANTT diagram

    Introduction to the GANTT diagram The GANTT diagram is a tool that allows the user to model the planning of tasks necessary to the performance of a project. This tool was invented in 1917 by Henry L. Gantt. Given the relative ease of ... Read more

    Project management
    November 1, 2012 at 03:49 PM
  • Copyright Information

    Legal Notice Creative Commons Deed CCM's Creative Commons License Deed V3.0 Attribution - NonCommercial - ShareAlike 3.0 France You are free: to copy, distribute, display, and perform the work to make derivative works Under the following ... Read more

    Terms of Use
    June 13, 2016 at 11:37 AM
  • DBMS models

    The various database models Databases appeared in the late 1960s, at a time when the need for a flexible information management system had arisen. There are five models of DBMS, which are distinguished based on how they represent the data ... Read more

    Databases
    October 16, 2008 at 09:43 AM
  • Cryptography - The SET protocol

    Introduction to SET SET (Secure Electronic Transaction) is a protocol that was developed by Visa and MasterCard and that uses the SSL standard. SET is based on the use of an electronic signature from the buyer and a transaction involving ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM