Thursday, 16.01.2025, 22:51
Welcome Guest | RSS
Main | Articles | Registration | Login
Site menu
Categories of articles
Computers technology [3237]
Web development [2567]
Arts and entertainment [1854]
Music [492]
Poetry [2074]
Businnes [7012]
Entry form
Search
Statistics

Total online: 5
Guests: 5
Users: 0

All articles about everything
Main » Articles » Computers technology

Materials in this category: 3237
Shown materials: 561-570
Pages: « 1 2 ... 55 56 57 58 59 ... 323 324 »

Sort by: Date · Name · Rating · Comments · Views
One of the really cool parts aspects of Microsoft Excel is the functions Microsoft has created for you to use. This means that rather than have to develop a function from scratch you can use pre-built ones to do a plethora of tasks like Building your own Mortgage Calculator. The Mortgage Calculator or PMT function is just one of many Financial Functions available.
Computers technology | Views: 45 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

The steps below are general Ethernet cat5 cable construction guidelines. They will work for making any category of network cables. For our example we will be making a category 5e patch cable. A key point to remember in making Ethernet patch cords is that the �twists� in the individual pairs should remain entwined as long as possible until they reach the RJ-45 plug termination. The twisting of the pairs in the network cable is what helps to ensure good connectivity and keeps cross-talk interference to a minimum.
Computers technology | Views: 72 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

Spyware is a kind of software that monitors the different activities of a user, without his consent or knowledge. Spyware is a major threat and menace to your productivity as well as privacy. Many PC's are affected with spyware and it greatly hampers their performance. Spyware can spy on your personal information, the software installed in your computer and the web pages that you visit. Sometimes spyware can even hack your username and password. Spyware is a big menace fo...
Computers technology | Views: 37 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

There has been an increasing amount of emphasis in recent times on the subject of keeping the information on your computer safe. The terms Back-Up, Archive, Data Storage and Security being mentioned frequently, but what is all about?
Computers technology | Views: 37 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

It is no secret that servers can take up a lot of floor space, and power. As a result, they can sometimes seem inconvenient. One way to save space and power is to consolidate servers. Server consolidation is very important in order to ease some of the frustrations of overdue consolidation processes.
Computers technology | Views: 53 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

In buying my own personal notebook computer, I was faced with a myraid of questions. Just what make and model will meet my number crunching and stock market analysis needs? What are the considerations from portability, accessibility and upgrading of the notebook computer?
Computers technology | Views: 41 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

Understand how hackers gain control of your computer and simple tips and strategies to reduce the chance of your computer being hacked.
Computers technology | Views: 41 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

Wireless networks work using radio waves instead of wires to transmit data between computers. That's the simple version. If you're curious to know what's going on in more detail, then it's all explained in this article. Ones and Zeros. I'm sure you know that computers transmit data digitally, using binary: ones and zeros. This is a way of communicating that translates very well to radio waves, since the computer can transmit ones and zeros as different kinds of beep. Th...
Computers technology | Views: 32 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

Along with Content Storage, Preservation, and Delivery, Capture is one of the key components of Enterprise Content Management. This article will explore the ways content is captured in ECM systems.
Computers technology | Views: 40 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

Those of us plagued by the onslaught of tens if not hundreds of unwanted emails greeting us as we open up our email accounts have some hope for respite in the form of Bayesian spam filters.
Computers technology | Views: 38 | Автор: admin | Date: 22.03.2009 | Rating: 0.0/0 | Comments (0)

Website builderuCozCopyright MyCorp © 2025