Search
All categories
Results 41 - 60 of about 579
  • ASCII Code

    Data coding What is ASCII code? ASCII Character Chart Extended ASCII Character Chart EBCDIC code Unicode Data coding Morse code was the first code used for long-distance communication. Samuel F.B. Morse invented it in 1844. This code is ... Read more

    Encoding
    November 12, 2012 at 12:40 PM
  • FTP protocol (File Transfer Protocol)

    Introduction to FTP protocol FTP protocol (File Transfer Protocol) is, as its name indicates a protocol for transferring files. The implementation of FTP dates from 1971 when a file transfer system (described in RFC141) between MIT ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Introduction to Microsoft Windows

    History of Windows Windows is the operating system sold by the Seattle-based company Microsoft. Microsoft, originally christened "Traf-O-Data" in 1972, was renamed "Micro-soft" in November 1975, then "Microsoft" on November 26, 1976. ... Read more

    Windows
    March 8, 2018 at 09:54 AM
  • Client/Server Environment

    Introduction to Client/Server Architecture Numerous applications run in a client/server environment, this means that client computers (computers forming part of the network) contact a server, generally a very powerful computer in terms of ... Read more

    Client/Server
    October 16, 2008 at 09:43 AM
  • Operating Systems - MS-DOS - Commands

    Command Description dir lists the contents of a folder cd changes folder cd .. parent folder md or mkdir creates a new folder deltree deletes a folder and all sub-folders copy, xcopy copies a file move moves a file del deletes a file type ... Read more

    MS Dos
    October 16, 2008 at 09:43 AM
  • Linux - The Vi editor

    Introduction to Vi Despite its very limited ergonomics, Vi i is one of the most popular text editors texte under Unix type systems (with Emacs and pico). Under Linux, there is a free version of Vi called Vim (Vi Improved). Vi (pronounced ... Read more

    Linux
    October 16, 2008 at 09:43 AM
  • Private-key (or secret-key) cryptography

    Symmetric encryption Symmetric encryption (also called private-key encryption or secret-key encryption) involves using the same key for encryption and decryption. ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Declaring a style sheet (CSS)

    Declaring a style sheet Style sheets are not directly integrated into the W3C's HTML recommendations. For this reason, you need to include elements in the HTML code indicating both the type of document, meaning the version of the HTML and ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Leased lines (T1, T2, T3)

    Leased lines "Leased" lines enable transmission of data at medium and high speeds (64 Kbps to 140 Mbps) by point to point or multipoint connection (Transfix service). In Europe, there are five types of lines distinguished according to ... Read more

    Internet Technologies
    October 16, 2008 at 09:43 AM
  • Introduction to power line communications (PLC)

    Introduction to PLC "Power Line Communications" basically means any technology that enables data transfer at narrow or broad band speeds through power lines by using advanced modulation technology. Depending on the country, the institution ... Read more

    Power Line Communications
    October 16, 2008 at 09:43 AM
  • Cathode Ray Tube monitor (CRT)

    Cathode ray tube monitor Most monitors (computer screens) use cathode ray tubes (or CRT for short), which are glass vacuum tubes into which an electron gun emits a flow of electrons guided by an electrical field towards a screen covered in ... Read more

    Computer
    April 28, 2009 at 10:40 AM
  • Client / Contractor

    Contractor and Client * ==Client== The client refers to the entity that has the need that defines the project objective, schedule, and dedicated budget. The expected result of the project is the creation of a product, called works. The ... Read more

    Project management
    March 15, 2018 at 03:41 PM
  • Data transmission - Cabling

    Cabling types Coaxial cable Transceiver: the connection between Thinnet and Thicknet Coaxial cable connectors Twisted pair cabling Unshielded Twisted Pair (UTP) Shielded Twisted Pair (STP) Twisted pair connectors Fibre optics Cabling types ... Read more

    Data transmission
    November 7, 2012 at 08:25 AM
  • The HTTP protocol

    Introduction to the HTTP protocol Since 1990 HTTP protocol (HyperText Transfer Protocol) has been the most widely used protocol on the Internet. Version 0.9 was only intended to transfer data over the Internet (in particular Web pages ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Introduction to Spreadsheet Concepts

    What is a Spreadsheet? A spreadsheet (or spreadsheet program) is software that permits numerical data to be used and to perform automatic calculations on numbers contained in a table. It is also possible to automate complex calculations by ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • ccmexec - ccmexec.exe

    ccmexec - ccmexec.exe The process ccmexec.exe (Microsoft SMS Agent Host ) is part of the Microsoft SMS (Systems Management Server) suite, which is mainly used to distribute software patches to the machines on a network. The file that ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Creating an RJ45 crossover cable

    What's an RJ45 plug? A network card may have several types of connectors, with the most common being: An RJ45 connector; A BNC connector (coaxial cable). The RJ-45 is the one which interests us here, as it it the most widely used. The ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • Computer - Introduction to Memory

    The Role of Memory The term "memory" applies to any electronic component capable of temporarily storing data. There are two main categories of memories: internal memory that temporarily memorises data while programs are running. Internal ... Read more

    Computer
    November 1, 2012 at 04:15 PM
  • WPAN (Wireless Personal Area Network)

    Wireless Personal Area Networks (WPAN) A wireless personal area network (WPAN for short) is a low-range wireless network which covers an area of only a few dozen metres. This sort of network is generally used for linking peripheral devices ... Read more

    Wireless
    March 5, 2018 at 03:55 AM
  • Messaging protocols (SMTP,POP3 and IMAP4)

    E-mail is considered as being the most widely used service on the Internet. So the TCP/IP protocol suite offers a range of protocols allowing the easy management of email routing over the network. The SMTP protocol The POP3 protocol The ... Read more

    Internet (protocols)
    April 16, 2018 at 11:47 AM