Search
All categories
Results 61 - 81 of about 579
  • Conducting a meeting

    Introduction Meetings are a way of sharing, within a group of individuals, the same level of knowledge of a subject or a problem and of making decisions collectively. Additionally, decisions made collectively, with representatives of the ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • Introduction to power line communications (PLC)

    Introduction to PLC "Power Line Communications" basically means any technology that enables data transfer at narrow or broad band speeds through power lines by using advanced modulation technology. Depending on the country, the institution ... Read more

    Power Line Communications
    October 16, 2008 at 09:43 AM
  • Processor

    Introduction Operation Instructions Registers Cache Memory Control Signals Functional Units Transistor ... Read more

    Computer
    August 21, 2013 at 12:56 AM
  • FAT16 and FAT32

    The FAT16 file system The first file system to be used on a Microsoft operating system was the FAT system, which uses a file allocation table. The file allocation table is actually an index which lists the content of the disk in order to ... Read more

    Computer: maintenance
    October 16, 2008 at 09:43 AM
  • Computer - Introduction to Memory

    The Role of Memory The term "memory" applies to any electronic component capable of temporarily storing data. There are two main categories of memories: internal memory that temporarily memorises data while programs are running. Internal ... Read more

    Computer
    November 1, 2012 at 04:15 PM
  • Hardware Interrupts (IRQ) and Conflicts

    The Concept of Interrupts DMA Base Addresses Hardware Conflicts IRQ Configuration Resolving Hardware Conflicts The Concept of Interrupts Because the processor cannot simultaneously process several pieces of information (it processes one ... Read more

    Computer
    October 29, 2013 at 04:33 PM
  • Introduction to IT Security

    As Internet use is developing, more and more companies are opening their information system to their partners and suppliers. Therefore, it is essential to know which of the company's resources need protecting and to control system access ... Read more

    Security
    February 22, 2018 at 10:09 AM
  • Spreadsheets - Mathematical Functions

    Standard Functions Function Description ABS() This function returns the absolute value of a number. It therefore returns the number, if it is positive, or the opposite (positive) if it is negative ODD(value) Rounds a number up to the ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Creating a local area network

    Why set up a local area network? When you have several computers, it can be convenient to connect them to each other to create a local area network (LAN). Setting up such a network costs very little, contrary to what people may think. Here ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM
  • Computer - ISA, MCA and VLB Buses

    Expansion Bus Expansion buses (sometimes called peripheral buses) are buses that have connectors that allow you to add expansion cards (peripherals) to a computer. There are different types of standard internal buses that are characterised ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • Cryptography - The SET protocol

    Introduction to SET SET (Secure Electronic Transaction) is a protocol that was developed by Visa and MasterCard and that uses the SSL standard. SET is based on the use of an electronic signature from the buyer and a transaction involving ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Network cards

    What is a network card? What is the role of a network card? Preparing data The role of the identifier Other ... Read more

    Computer
    November 7, 2012 at 08:19 AM
  • OOP - Polymorphism

    Definition of polymorphism The word polymorphism comes from Greek and means having several different forms. This is one of the essential concepts of object-oriented programming. Where inheritance is related to classes and (their hierarchy ... Read more

    Object-Oriented Programming
    October 16, 2008 at 09:43 AM
  • RJ11 connector

    RJ11 Plug The RJ11 connector (RJ for Registered Jack) is the most commonly used connector for telephone lines. It is similar to the RJ45 connector, but smaller. When found on a computer, the RJ11 is generally meant for a modem. Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • RTP/RTCP protocols

    Document written by Nico VanHaute, Julien Barascud and Jean-Roland Conca Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • WiMAX - 802.16 - Worldwide Interoperability for Microwave Access

    What is WiMAX ? WiMAX is short for Worldwide Interoperability for Microwave Access. It is a metropolitan wireless standard created by the companies Intel and Alvarion in 2002 and ratified by the IEEE (Institute of Electrical and ... Read more

    Wimax
    October 16, 2008 at 09:43 AM
  • E-mail scams - Fund transfer scams

    Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also given ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Information systems governance (IT Governance)

    The Concept of Governance The term "Governance" specifies the ability of an organization to be able to control and regulate its own operation so as to avoid conflicts of interest related to the division between beneficiaries (shareholders) ... Read more

    Information System
    October 16, 2008 at 09:43 AM
  • The GSM standard

    Introduction to the GSM standard The GSM (Global System for Mobile communications) network is, at the start of the 21st century, the most commonly used mobile telephony standard in Europe. It is a so-called "second generation" (2G) ... Read more

    Mobile phones
    October 16, 2008 at 09:43 AM
  • Introduction to hacking

    Introduction to attacks Any computer connected to a computing network is potentially vulnerable to an attack. An "attack" is the exploitation of a flaw in a computing system (operating system, software program or user system) for purposes ... Read more

    Attacks
    March 5, 2018 at 03:41 AM