Kioskea
Recherche
Search
All topics
Results 1 - 23 of about 778
  • Creating an RJ45 crossover cable

    ... one which interests us here, as it it the most widely ... used are called twisted pairs, as they are made up of ... Read more

    Cables and connectors
    October 16, 2008 09:43 AM
  • Types of networks

    Different types of networks LAN MANs WANs Different types of networks Different types of (private) networks are distinguished based on their size (in terms of the number of machines), their data transfer speed, and their reach. Private ... Read more

    Introduction to Networks
    October 29, 2013 04:11 PM
  • Computer bus - What is it?

    Definition Characteristics Architecture The primary buses Chipset Definition A bus, in computing, is a set of physical connections (cables, printed circuits, etc.) which can be shared by multiple hardware components in order to ... Read more

    Computer
    October 29, 2013 04:32 PM
  • Data transmission - Transmission modes

    ... flows in only one direction, from the transmitter to the receiver ... (for example, from your computer to the printer or from the mouse ... Read more

    Data transmission
    November 8, 2012 12:42 PM
  • How email works (MTA, MDA, MUA)

    ... Email, as simple as it is to use, relies ... sent, the message is routed from server to server, all the ... Read more

    Email
    October 16, 2008 09:43 AM
  • Creating a local area network

    Why set up a local area network? When you have several computers, it can be convenient to connect them to each other to create a local area network (LAN). Setting up such a network costs very little, contrary to what people may think. ... Read more

    Network configuration
    October 16, 2008 09:43 AM
  • Networking - 3-Tier Client/Server Architecture

    ... split up between: A client, i.e. the computer, which requests ... The application server (also called m Read more

    Client/Server
    October 16, 2008 09:43 AM
  • Structure of an email (Headers and bodies)

    ... act as a mail sorting office. The header begins with a From ... 's settings, such as the sender, the recipient, the date, etc. Each ... least the three following headers: From: The sender's email address ... Read more

    Email
    October 16, 2008 09:43 AM
  • Spreadsheet - Formulas

    ... a formula is done by selecting a cell and by using ... Read more

    Spreadsheet
    October 16, 2008 09:43 AM
  • Data transmission - Cabling

    Cabling types Coaxial cable Transceiver: the connection between Thinnet and Thicknet Coaxial cable connectors Twisted pair cabling Unshielded Twisted Pair (UTP) Shielded Twisted Pair (STP) Twisted pair connectors Fibre optics Cabling ... Read more

    Data transmission
    November 7, 2012 08:25 AM
  • DTS (Digital Theater Sound)

    DTS standard More information DTS standard DTS (Digital Theater Sound) is a digital sound coding standard created by Universal. Compared with the Dolby Digital standard, DTS uses four times less compression and digitises sound at 20 bits ... Read more

    Audio
    November 12, 2012 02:14 PM
  • Introduction to encryption with DES

    DES, secret-key decryption On 15 May 1973, the NBS (National Bureau of Standards, now called NIST - National Institute of Standards and Technology) published a request in the Federal Register for an encryption algorithm that would meet ... Read more

    Cryptography
    October 16, 2008 09:43 AM
  • Private-key (or secret-key) cryptography

    ... unintelligible. The slightest algorithm (such as an exclusive OR) can make ... (there being so such thing as absolute security). However, in the ... keys that are at least as long as the message to be ... Read more

    Cryptography
    October 16, 2008 09:43 AM
  • WiFi modes of operation (802.11 or Wi-Fi)

    ... available in numerous formats, such as PCI cards, PCMCIA cards, USB ... Read more

    Wifi
    October 16, 2008 09:43 AM
  • Front Office and Back Office

    ... direct contact with them, such as the marketing, user support, or ... Read more

    e-Business
    October 16, 2008 09:43 AM
  • OOP - Data encapsulation

    ... way the object is implemented, i.e. preventing access to data ... place. By preventing the user from directly modifying attributes, and forcing ... Read more

    Object-Oriented Programming
    October 16, 2008 09:43 AM
  • Random access memory (RAM or PC memory)

    Types of random access memory Operation of the random access memory RAM module formats DRAM PM DRAM FPM DRAM EDO SDRAM DR-SDRAM (Rambus DRAM) DDR-SDRAM DDR2-SDRAM summary table Synchronization (timings) Error correction Parity bit ECC ... Read more

    Computer
    November 12, 2012 03:33 PM
  • NAT- Network address translation, port forwarding and port trigg

    The principle of NAT Network address translation or NAT was developed in order to respond to the shortage of IP addresses with IPv4 protocol (in time the IPv6 protocol will respond to this problem). In fact, in IPv4 addressing the number ... Read more

    Internet (protocols)
    October 16, 2008 09:43 AM
  • Intranet and Extranet

    ... a local network, i.e. only accessible from workstations of a local ... that are invisible (or inaccessible) from the outside. It involves the ... (using TCP/IP) protocols such as, for example, the use of ... Read more

    e-Business
    October 16, 2008 09:43 AM
  • Serial port and parellel port

    ... input-output interface (sometimes known as I/O interface). Serial port Serial ... after the other (refer to section on data transmission for a ... Read more

    Computer
    October 16, 2008 09:43 AM