All categories
Results 121 - 140 of about 579
  • Style classes (CSS)

    Classes and IDs Classes A web designer might want to assign different styles to the same tags. For this reason, the CSS specifications introduced the concept of classes. The definition of classes is as simple as that of styles. It involves ... Read more

    October 16, 2008 at 09:43 AM
  • Employee Relationship Management (ERM)

    The term "Employee Relationship Management" (acronym ERM), translate as "management of the relationship with the employees" refers to the use of technologies in the management of human resources. This concept is based on client ... Read more

    October 16, 2008 at 09:43 AM
  • The Klez virus

    Introduction to the Klez virus Appearing early in 2002, the Klez virus is still everywhere on networks, and the danger it poses is even higher due to the new variations that keep cropping up (like Klez.e, Klez.g, Klez.h, Klez.i, Klez.k, ... Read more

    Viruses and threats
    April 16, 2018 at 11:43 AM
  • Network tests and diagnostics

    Testing the IP configuration Before doing anything else, you are advised to check the computer's IP configuration. Windows systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP configuration. The ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM
  • Peer-to-peer networking

    Introduction to peer-to-peer architecture In contrast to client-server networks there is no dedicated server in peer-to-peer architecture . Thus each computer in such a network is part server and part client. This means that each computer ... Read more

    November 12, 2012 at 12:43 PM
  • Program structure

    How does a computer program work? A program's behavior depends on the type of language used to write the program. Nonetheless, almost all programming languages are based upon the same principle: The program consists of a set of commands ... Read more

    October 16, 2008 at 09:43 AM
  • The concept of objects

    The concept of objects Object-oriented programming consists of arranging data in modular sets of elements of real world information (called a domain. These data elements are called objects. This data is grouped according to the main real ... Read more

    Object-Oriented Programming
    March 8, 2018 at 09:52 AM
  • Programming languages - Instructions

    What does an instruction look like? The instruction is the key element in the computer as it tells the processor which action should be performed. The instructions which are to be executed are indicated in the source file and the computer ... Read more

    October 16, 2008 at 09:43 AM
  • Information security officer (ISO)

    Information security officer (ISO) An ISO (information security officer) is in charge of setting and a company's security policy. He/she also plays a critical role in informing, advising, and alerting the general management on matters ... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • DBMS models

    The various database models Databases appeared in the late 1960s, at a time when the need for a flexible information management system had arisen. There are five models of DBMS, which are distinguished based on how they represent the data ... Read more

    October 16, 2008 at 09:43 AM
  • The Scanner

    The Scanner A scanner is an acquisition peripheral for scanning documents, i.e. converting a paper document to a digital image. There are generally three types of scanner: Flat scanners let you scan a document by placing it flat against a ... Read more

    October 16, 2008 at 09:43 AM
  • Cryptography - Secure Sockets Layers (SSL)

    Introduction to SSL SSL (Secure Sockets Layers) is a process that manages the security of transactions made on the Internet. The SSL standard was developed by Netscape, together with Mastercard, Bank of America, MCI and Silicon Graphics. ... Read more

    October 16, 2008 at 09:43 AM
  • TMA (Third-Party Application Maintenance)

    Third-party application maintenance The term third-party application maintenance (acronym TMA) refers to outsourcing the maintenance of applications, i.e. entrust all or part of the maintenance of applications to a third-party computer ... Read more

    October 16, 2008 at 09:43 AM
  • Vulnerability scanners - Port scanning

    Port scanning A "vulnerability scanner" (sometimes called a "network analyzer") is a utility program that makes it possible to perform a security audit on a network by scanning for open ports on a given machine or an entire network. The ... Read more

    October 16, 2008 at 09:43 AM
  • PCI Express Bus (PCI-E)

    The PCI Express Bus The PCI Express bus (Peripheral Component Interconnect Express, written PCI-E or 3GIO for "Third Generation I/O"), is an interconnect bus that allows you to add expansion boards to a computer. The PCI Express bus was ... Read more

    November 1, 2012 at 04:17 PM
  • Formatting - Formatting a hard drive

    Before trying to understand formatting, you first need to understand how a hard drive works. Many people do not distinguish low-level formatting (also called physical formatting) from high-level formatting (also called logical formatting). ... Read more

    Computer: maintenance
    October 16, 2008 at 09:43 AM
  • Webmastering - Website Ergonomics

    The Concept of Ergonomics Ergonomics is the use of scientific knowledge about humans (psychology, physiology, medicine) with the aim of improving the workplace environment. Ergonomics is generally characterized by two components: ... Read more

    October 16, 2008 at 09:43 AM
  • Propagation of Radio Waves (802.11)

    Propagation of Radio Waves In order to be able to install a wireless network, and in particular to place the access points so as to get the best range possible, a little background should be given on how radio waves propagate. Radio waves ... Read more

    October 16, 2008 at 09:43 AM
  • Read-only memory (ROM)

    Read-only memory (ROM) There is a type of memory that stores data without electrical current; it is the ROM (Read Only Memory) or is sometimes called non-volatile memory as it is not erased when the system is switched off. This type of ... Read more

    November 1, 2012 at 04:15 PM
  • Installing a network adapter

    Purpose The purpose of this article is to set up a network to enable data exchanges between computers, resource sharing and network games. Is it therefore necessary to install a network card in each computer that may be part of the local ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM