Search
All categories
Results 61 - 80 of about 579
  • Using Telnet

    Introduction to Telnet Protocols and implementation Running Telnet Commands in Telnet Introduction to Telnet Telnet is a protocol for emulating a remote terminal, which means that it can be used to run commands entered on a keyboard at a ... Read more

    Internet Utilities
    November 12, 2012 at 12:39 PM
  • Spreadsheets - The Excel Interface

    Excel Introduction Microsoft Excel is the spreadsheet in the Microsoft Office office suite. To start it, simply click on the appropriate icon in the Start menu (in Windows) or click on an Excel file (that has an .xls file extension). A ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Spreadsheets - Mathematical Functions

    Standard Functions Function Description ABS() This function returns the absolute value of a number. It therefore returns the number, if it is positive, or the opposite (positive) if it is negative ODD(value) Rounds a number up to the ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • WPAN (Wireless Personal Area Network)

    Wireless Personal Area Networks (WPAN) A wireless personal area network (WPAN for short) is a low-range wireless network which covers an area of only a few dozen metres. This sort of network is generally used for linking peripheral devices ... Read more

    Wireless
    March 5, 2018 at 03:55 AM
  • Spreadsheet - Functions

    The Concept of a Function Spreadsheets generally have a large number of integrated functions for processing data. There are hundreds, categorised as follows: Arithmetic functions that offer basic tools to process numerical data Statistical ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Conducting a meeting

    Introduction Meetings are a way of sharing, within a group of individuals, the same level of knowledge of a subject or a problem and of making decisions collectively. Additionally, decisions made collectively, with representatives of the ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • Routing over the Internet

    Routers Routers are devices which make it possible to "choose" the path that datagrams will take to arrive at the destination. They are machines with several network interface cards each one of which is linked to a different network. So, ... Read more

    Internet (protocols)
    May 24, 2012 at 03:36 PM
  • FAT16 and FAT32

    The FAT16 file system The first file system to be used on a Microsoft operating system was the FAT system, which uses a file allocation table. The file allocation table is actually an index which lists the content of the disk in order to ... Read more

    Computer: maintenance
    October 16, 2008 at 09:43 AM
  • Quality Organization

    Quality Organization Establishing a quality procedure is a comprehensive business project that requires the participation of all employees. Therefore, it is necessary to define a "quality organization" that fits into and hinges on the ... Read more

    Quality
    November 12, 2012 at 03:20 PM
  • HTML document layout

    HTML document An HTML page is a simple file containing text formatted with HTML tags. Traditionally, the file is given an .htm or .html extension, but a web page may have other extensions as well. A web page can be built from even the most ... Read more

    HTML
    October 16, 2008 at 09:43 AM
  • Sound card

    Introduction to sound cards Sound card connectors Introduction to sound cards The sound card (also called an audio card) is the part of a computer which manages its audio input and ouput. ... Read more

    Computer
    November 7, 2012 at 08:29 AM
  • Environment variables

    Environment variables An environment variable is a dynamic value loaded into the memory that can be used by several processes operating simultaneously. On most operating systems, the location of some libraries or of the main system ... Read more

    Operating System
    October 16, 2008 at 09:43 AM
  • Introduction to hacking

    Introduction to attacks Any computer connected to a computing network is potentially vulnerable to an attack. An "attack" is the exploitation of a flaw in a computing system (operating system, software program or user system) for purposes ... Read more

    Attacks
    March 5, 2018 at 03:41 AM
  • Cathode Ray Tube monitor (CRT)

    Cathode ray tube monitor Most monitors (computer screens) use cathode ray tubes (or CRT for short), which are glass vacuum tubes into which an electron gun emits a flow of electrons guided by an electrical field towards a screen covered in ... Read more

    Computer
    April 28, 2009 at 10:40 AM
  • Data transmission - Cabling

    Cabling types Coaxial cable Transceiver: the connection between Thinnet and Thicknet Coaxial cable connectors Twisted pair cabling Unshielded Twisted Pair (UTP) Shielded Twisted Pair (STP) Twisted pair connectors Fibre optics Cabling types ... Read more

    Data transmission
    November 7, 2012 at 08:25 AM
  • MIME (Multipurpose Internet Mail Extensions)

    Introduction to MIME MIME (Multipurpose Internet Mail Extensions) is a standard which was proposed by Bell Communications in 1991 in order to expand upon the limited capabilities of email, and in particular to allow documents (such as ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • Cryptography - Secure Sockets Layers (SSL)

    Introduction to SSL SSL (Secure Sockets Layers) is a process that manages the security of transactions made on the Internet. The SSL standard was developed by Netscape, together with Mastercard, Bank of America, MCI and Silicon Graphics. ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Messaging protocols (SMTP,POP3 and IMAP4)

    E-mail is considered as being the most widely used service on the Internet. So the TCP/IP protocol suite offers a range of protocols allowing the easy management of email routing over the network. The SMTP protocol The POP3 protocol The ... Read more

    Internet (protocols)
    April 16, 2018 at 11:47 AM
  • OOP - Inheritance

    The concept of inheritance Inheritance is specific to object-oriented programming, where a new class is created from an existing class. Inheritance (often referred to as subclasses) comes from the fact that the subclass (the newly created ... Read more

    Object-Oriented Programming
    October 16, 2008 at 09:43 AM
  • OOP - Polymorphism

    Definition of polymorphism The word polymorphism comes from Greek and means having several different forms. This is one of the essential concepts of object-oriented programming. Where inheritance is related to classes and (their hierarchy ... Read more

    Object-Oriented Programming
    October 16, 2008 at 09:43 AM