• Main Menu
    • Transformer

      Transformer

      A transformer transfers electrical energy between two circuits. It usually consists of two wire coils wrapped around a core. These coils are called primary and secondary windings. Energy is transferred by mutual induction caused by a changing electromagnetic field. If the coils have different number of turns around the core, the voltage induced in the

    • Uplink

      Uplink

      Uplink refers to a transmission of data in which data flows from a ground-based transmitter to an orbital satellite receiver. Uplink is used to send data to a satellite in Earth’s orbit in order to make changes to the way the satellite functions or simply redirect data to another ground-based receiver. Uplink is used in

    • Cisco Switch Configuration

      Cisco Switch Configuration

      When executing an inter-network installation, many mechanisms and components are usually involved. Cisco is superior because it is the only inter-networking company with a well made end to end inter-networking solution. Cisco switches makes the LAN more competent by creating multiple collision domains. Each switch port is a split collision domain. With only one device

    • How to Download Music to an iPod

      How to Download Music to an iPod

      Downloading songs to an iPod is very simple. Prior knowledge of iTunes is essential to download songs to iPod player. Users can either purchase them or search for the sites that give the tunes for free. Below is an easy-to-follow procedure for downloading the songs to an iPod. Connect the iPod player to the computer

    • RBOC (Regional Bell Operating Company)

      RBOC (Regional Bell Operating Company)

      RBOC (The Regional Bell Operating Companies) were created as the result of a legal dispute between the US Justice Department and the AT & T Corporation. In 1984, the American Telephone & Telegraph Company split its local operations into 7 autonomous RBOCs that became known as “Baby Bells”. In the beginning, these companies were called

    • Cryptology

      Cryptology

      The field of cryptology includes both the study of and practice of securing information in the presence of untrusted third parties or adversaries. Specifically, it is focused on creating and analyzing the protocols used to subvert attempts by adversaries to gain access to or interrupt the flow of information between trusted parties. Specific focus areas

    • How to Repair a Broken Hard Disk

      How to Repair a Broken Hard Disk

      Broken hard disks can be both a nuisance and a major loss to business and personal affairs whenever files are lost or inaccessible. Fortunately, there are several things users can do to repair a broken hard disk before throwing it out in order to restore lost or inaccessible files.   Let the Hard Disk Cool

    • SAN (Storage Area Network)

      SAN (Storage Area Network)

      A SAN (Storage Area Network) is a network specifically dedicated to the task of transporting data for storage and retrieval. SAN architectures are alternatives to storing data on disks directly attached to servers or on Network Attached Storage (NAS) devices that are connected through general purpose networks. In order to meet the storage system’s demands,

    • QoS (Quality of Service)

      QoS (Quality of Service)

      QoS stands for Quality of Service. QoS is a generic name for a set of algorithms which attempt to provide different levels of quality to different types of network traffic. Queuing One method of implementing QoS is to utilize some sort of advanced queuing algorithm. Simple networks process traffic with a FIFO (First In –

    • IP Address

      IP Address

      An IP (Internet Protocol) address is a unique address that different computers on a computer network use to identify and communicate with one another. An IP address is used as an identifier to find electronic devices connected to one another on a network. Therefore, each device in the network must have its own unique address.

    174 queries in 0.559 seconds.