Pages

Friday, November 25, 2011

What is Malware

A Malware is malicious (with harmful intent) software or a program (which can be any code, scripts etc…). A Malware can result in leaking the information of the user’s system or can track each and every activity which is being performed on the web Browser or can redirect the control to some UN-advisable web sites. These are usually poorly programmed and can cause the user’s Computer to respond really slowly as compared to its actual speed. View More....

What is Ethernet

Ethernet is a physical and data link layer used for local area networks (LAN's). Ethernet was invented by engineer Robert Metcalfe​. The movement of Ethernet cables is limited and is up to about 100 meters, but Ethernet networks can be easily extended to connect an organization’s office building using network Device Bridge. View More...

Thursday, November 24, 2011

What is Encryption

Encryption is the conversion of data into a secret code which is called cipher text that cannot be easily understood by any unauthorized person.It is one of the most effective ways to achieve data security. A file after passing through encryption process is called an encrypted file andto read this encrypted file, the user must have access to a secret key or password that enables the user to decrypt it. (Decryption is the process of converting encrypted data back into its original form, so it can be understood). The unencrypted data is called plain text. View More....

What Is Defragmenting a Computer

De-fragmentation (also known as ‘def-rag’) is a process that reduces the amount of fragmentation in file system i.e. it re-arranges the files on the disk. Fragmentation happens to a hard drive over a period of time as the user continues to change, save or delete files. These changes are often stored at a location on the hard disk that is different from the original file and so the additional changes are. Both the file and the hard disk itself become fragmented, and results in slowing down of Computer as it has to look in many different places to open a file. View More...

What is Computer Hacking

Computer Hacking refers to the technique or process by which a Hacker gains access to a computer system. Hacker refers to a person who enjoys learning the details of computer systems and also tries to expand his or her capabilities. A Hacker targets or finds out the loop holes in the computer system and tries to gain access over that particular computer system through these loop holes. A hacker must be able to exploit a weakness or vulnerability (i.e. loop holes in the system by which the computer can be affected) in a computer system. View More....

What is an Encryption Key

An Encryption key is used to perform encryption. Encryption is the process of transforming information into unreadable code with the help of cipher (a kind of Algorithm) that any unauthorized user cannot understand. A key is basically a string of digits. Encryption key can act as a password when a user tries to connect to a wireless network. This key is then called WEP (Wired Equivalent Privacy) key which is just encryption key. It acts as a security measure and provides security for the network by allowing only authorized persons to connect. Decryption (which is opposite of encryption) uses a decryption key. View More...

What is a Web Browser

A Web Browser is Computer software (set of programs) that allows the user to access webpages when connected to the internet. Web browser also helps in redirecting the user from one website to another and displays the pages for the users. Web browsers are able to make HTTP requests and parse the HTML contents to the users in such a manner that they can understand. It helps a user to interact with HTML documents hosted by Web Servers. View More....

Wednesday, November 23, 2011

What is a VGA Driver

VGA in the term VGA Driver stands for Video Graphics Array. VGA driver is a type of device driver that controls a VGA video device. It is located on the Computer. Most of the computers are re- installed with this device while the computers which are not having this device can get it assembled afterwards also. Basically a driver is a type of application software (software is categorized as application software and system software) which runs between the operating system and the hardware so that it can control the data that is flowing between these two. Any peripheral hardware attached to the computer is always controlled with the help of a driver. VGA driver is native to the operating system while some drivers are written by the device manufacturer and are specific to that particular device and cannot be used to control other devices. View More....

What is a Social Networking Site

Social Networking Sites are the sites that enable the users to create public profiles within that website only. The user can form relationships with other users who have also created their public profiles within that particular website only. Social Networking Sites have exploded across the internet at a very high rate. Social Networking Sites can be used to describe any community based web sites, some technical discussion forums, and chat rooms and can be any other social space. View More...

What is a Modem

A Modem (also called Modulator-Demodulator) is an electronic device which is used to link a user’s home network to the Internet. This link is established with the help of Internet Service Provider (ISP). It actually acts as a bridge between Computer and telephone lines. It converts signals and is also known as a device that allows communication. Modems convert analog data into digital data and also perform the reverse so it can be transmitted. Analog Data is transmitted over phone lines and Digital data is read by the computers. This means that the modem translates computer data into the language used by telephones and then reverses the process to translate the responding data back into computer language. View More...

What is a Hacker

Hacker refers to a person who enjoys learning the details of Computer systems and also tries to expand his or her capabilities by gaining access over other’s computer systems. A Hacker targets or finds out the loop holes in the computer system and tries to gain access over that particular computer system through these loop holes. A hacker must be able to exploit a weakness or vulnerability (i.e. loop holes in the system by which the computer can be affected) in a computer system. View More...

What is a Fire Wire Port

Fire Wire port is used to transfer data between Computer and peripherals with the help of a specific cable. It acts as an interface. The computer system may be able to connect too many different types of Fire Wire devices which can be printers, external hard drives, digital camera etc… But it depends upon the ports which the computer system and peripheral devices supports. View More...

Tuesday, November 22, 2011

What is a Database Management System

Database contains collection of interrelated data. It is a set of programs to access the data. Database Management System (DBMS) is a program that allows one or more Computer users to create and access data in a database. Database Management System contains information about a particular enterprise. Database Management System provides an environment that is both convenient and efficient to use. View More...

What are the Different Ways to Backup Data

There are a number of ways by which the user’s data such as important documents, pictures, videos and other stuff as well can be backed up. These ways are:
By Using an External Drive – The external hard disk can be attached to the PC by the user through the U.S.B (universal serial bus) port and the data which is important to the user can be copied to the external drive. External Drives are portable and are also very sleek which makes them easy to take from one place to another. Now External drives are also coming with Fire Wire ports (which results in much faster data transfer). View More....

Monday, November 21, 2011

What are Some Different Types of Internet Crimes

There are a variety of crimes available which are resulted through the internet. This pool of crimes is getting much denser day by day and is performed mostly by the hackers or the crackers on the internet. Internet crimes are the criminal activities which are directly related to the use of computers and also include illegaltrespassing into the Computer system or other's database through internet. View More....

How Do Computers Work

The user provides input to the Computer when it is turned on. The input is provided to the computer with the help of input devices. The Input Devices forwards the request to the CPU (i.e. the Central Processing Unit). The CPU start up certain programs and turns on some hardware devices so that more inputs can be received from the user. This process is also called booting up of a computer system. View More...

What is the Difference between a Serial and Parallel Port

A Serial connection is a sequential one way connection over a wire while a Parallel connection is a way to speed up the connection by allowing the transfer of more data at the same time in the same direction and over multiple wires. View More...

What is MHz

MHz stands for Megahertz. Megahertz is an enhancement of hertz only. The term hertz was named on Heinrich Rudolf Hertz​ (contributed to study of electromagnetism). The abbreviations are written as Hz and MHz (i.e. mentioned in capitals) for the terms hertz and megahertz. The term megahertz itself can be broken into two terms i.e. ‘mega’ and ‘hertz’ which mean ‘million’ and ‘cycles’ respectively. Hertz is basically a unit which is used to measure frequency when a person is using the International System of Units. While the term megahertz acts an extension to the term hertz only, actually megahertz means (or is equal to) 1 million hertz where hertz were considered as cycles. So the term megahertz means 1 million cycles per second. View More...

What is L2 Cache

Cache Memory acts as a high speed buffer between the RAM and CPU. Cache RAM operates at higher clock frequencies than normal RAM. This allows the data to be read more quickly from the cache than the main memory.Cache memory functions as a “near store” of RAM i.e. these are the stores which the CPU can always be supplied from. There are at least two close stores which are called Level 1, Level 2 cache (Level 3 cache is also sometimes there e.g. in Intel Itanium processors, Level 3 cache is there). The cache memory ensures that data is constantly fetched from the RAM so that CPU does not sit idle. View More....

Saturday, November 19, 2011

What Is a WAN Port

A Wan port is the Portal (Web portals provide users with functionality such as search and navigation capabilities and information management) by which information passes back and forth between the Lan and the WAN.
The Wan port is mostly found on a network router. A home router consists of one WAN port and four LAN ports. In home and small business, a WAN port is basically an Ethernet port which is placed on the router and it is wired to its counterpart port on a cable or DSL Modem. In Large enterprises, a WAN port may be linked with some wide area network service. View More....

What is Cat-5 Cable

Cat-5 cable is an Ethernet Network Cable standard. This standard is defined by the Electronic Industries Association and Telecommunications Industry Association (EIA/TIA). Cat-5 cable is a twisted pair cable and is used for carrying signals. It is the fifth generation of twisted pair Ethernet technology. It is the most popular of all twisted pair cables in use today. View More....

What Is a SSD

SSD – Solid State Drive is a USB 2.0 storage drive (also considered as the new kind of hard drive) is based on semi- conductor flash memory. These drives are built around high performance flash memory. These are non- volatile memory and hence the content which is there on the memory will not be lost even when the power is switched off. View More....

What is a Mail Server

A mail server is an application that receives incoming e-mail from the local users and remote senders’ and forwards outgoing e-mail for delivery by. Mail Server is also known as Mail Transfer Agent (MTA) or a Mail router/Internet Router). A Computer dedicated to run such type of applications is also called a Mail Server. It is considered as the heart of any Email system.
View More....

What is Wi-Fi

The only connectivity options that we had during the early times were that of rigid but robust static connections where a pc is connected to the internet via the fixed wired connection. Thou this technology is most used, most efficient and most secured but the biggest disadvantage of this technology is that the user has to be rigid to a particular location, and cannot move to an alternative location with his network working. This caused lots of problems to the users who have to move frequently in a campus. View More....

What is SATA or Serial ATA

Faster responses to the requests are what are required from a machine. To make it possible new devices, infrastructure and the technologies are being into their development phase. Talking about the technological advancement it can be seen that the trends have been changed a lot. Now the users hate those traditional systems which took seconds even sometimes minutes to respond, and the higher efficiency technology though were available, but the problem was they were very costly and were confined to the people who could invest highly on them. View More...

What is Online Data Storage

Web the most complicated work place for the administrators, and same the Web least complicated and the best utility that the people across the world could get. Everyone likes the utility which comes for free (If we could skip the internet connectivity cost). Take for instance it estimation could be made it can be found out that every person in this world who has basic knowledge of the web or the internet. Big names like Google, Microsoft, Yahoo provides and unlimited space on their servers and that for free. View More....

Friday, November 18, 2011

What is NAT

NAT Network Address Translation is a very important concept in the field of the Networking. In the field of networking two of the most important troubleshooting problems are of IP address depletion and Hiding the Original IP address from sniffers. View More....

What Is DDR RAM

RAM the Random Access Memory is the deciding factors for the amount of multiprogramming that is possible in a system. For any application or program to process or execute that application is first brought into the RAM and after that memory and processors are assigned to it. No any application can be rendered without being bringing it into the RAM. For this purpose only the RAM is known as the Main memory of the Computer. More is the amount of RAM more would be the capability of the system to support complex processes like multiprogramming, multi-threading and multiprocessing.View more...

What is an Application Server

Business continuity is what is demanded from the current business standards. Every client and organization wants that there business or the application must be available for 24X7X365. Reputation and the business of the organization depend on the fact that its services are seamlessly available to the clients whether the services are for reading or writing.View more...

What Is HTML

HTML (Hyper Text Markup Language​) is a markup language that is used for the purpose of the web development. The HTML language consists of pre-defined tags that are used to build a web page. The things which we want to display on the web page in different format, sizes, color, spacing arrangement all are done using the pre-defined tags of the HTML. To render the HTML code into a web page representing a logical arrangement and sense we require a tool which is known as the web browser.A browser is software which interprets the tags of HTML and generates a web page out of it. View More...