123ArticleOnline Logo
Welcome to 123ArticleOnline.com!

ALL >> Computers

Archived Articles about Computers

Page: << <    1891  1892  1893 [1894]  1895  1896    > >>

Define Anonymous Surfing    By: Lisa McDonald
Anonymous surfing is browsing web sites privately. Anonymous surfing encompasses two different forms of privacy. Lisa McDonald writes on topics such as Anonymous Proxy , Anonymous Proxy List and Anonymous Remailer for The Tech FAQ.(read entire article)(posted on: 2008-07-06)
View : 248 Times

How To Flush Dns    By: Brent Thomas
Ocassionally a systems "cache" of DNS addresses becomes corrupt. It therefore, becomes necessary to clean up your systems' DNS cache. Brent writes on topics such as Flush DNS, DNS Servers, and Reverse DNS for The Tech FAQ.(read entire article)(posted on: 2008-07-05)
View : 266 Times

Unix Signals    By: Brad Thorn
A Unix signal can be defined as a message that is sent to a process that is currently running. Brad writes on topics such as Unix Signals, Signal Quality, and Signal to Noise Ratio for The Tech FAQ.(read entire article)(posted on: 2008-07-05)
View : 253 Times

The Arp Cache    By: Lauren Duff
The Address Resolution Protocol is designed to ease communication in TCP/IP networks through accelerated methods of finding host hardware addresses when the network layer is known. Lauren writes on topics such as ARP, ARP Cache, and Clearing the ARP Cache for The Tech FAQ.(read entire article)(posted on: 2008-07-05)
View : 263 Times

How Does A Token Ring Work    By: James Smith
Token Ring is a type of a local area network (LAN) technology first thought out by an IBM developer, Olof Söderblom, in the 1960s. Its US patents were first credited in 1981 and was later promoted by IBM throughout the early 1980s. Then, it was popularized by IBM when its Token Ring architecture was founded on active multi-station access units (MSAUs or MAUs) and the IBM Structured Cabling System. The Institute of Electrical and Electronics Engineers also standardized the Token Ring as IEEE 802.5. Although very successful in its early days, with the introduction of 10-BASE-T (Ethernet) and the EIA/TIA 5638 cabling standard, its popularity and name fell by the early 1990s. IBM tried to revive it through an intense marketing campaign as it tried to outdo Ethernet in terms of performance and reliability, but was unable to match its adequately priced competition. Today, IBM no longer supports, promotes, or uses the Token Ring. James Smith writes on topics such as Token Ring , Asynchronous Transfer Mode and Lan Switches for The Tech FAQ.(read entire article)(posted on: 2008-07-05)
View : 272 Times

What Are Police Scanner Codes    By: Robert Davis
A police scanner is basically just another type of a radio scanner. These special scanners can give and receive wireless radio signal transmissions and is becoming more and more of a household item. Police scanners are mainly used for both safety and business purposes. Unlike a FM or an AM radio signal which can only pick up their respective signals, the scanner will pick up a wide variety of signals and a number of them simultaneously too, allowing an easy check up on the various channels. Therefore, the term “police scanners” is simply a scanner that is tuned into the radio broadcasts done by the region’s police department. Robert Davis writes on topics such as Police Scanner Codes , Mobile Telephone Systems and Radio for The Tech FAQ.(read entire article)(posted on: 2008-07-05)
View : 227 Times

How To Convert Millimeters (mm) To Inches (in)    By: Jane Thomas
To convert a unit from millimeters to inches, multiple steps are necessary as the two units are in a different system of units. Millimeters is in a number form, 1 x 10-3 meters (the standard unit of length), and is one of the metric unit systems and a part of the International System of Units (SI). On the other hand, an inch is a unit of length in a few systems such as in the English units, Imperial units, and the United States customary units. It is basically 1/36th of a yard or 1/12th of a foot. Jane Thomas writes on topics such as Convert Millimeters to Inches , Cryptology and Passwords for The Tech FAQ.(read entire article)(posted on: 2008-07-05)
View : 241 Times

How Can I Login To My Linksys Router    By: Susan Miller
Usually, if the router is still in its factory default settings and just out of the box, logging into your Linksys router is easy. Susan Miller writes on topics such as Setup Linksys Router , Forgot Linksys Router Password and How Do I upgrade Linksys Firmware for The Tech FAQ.(read entire article)(posted on: 2008-07-05)
View : 274 Times

History Of Six Sigma    By: Jonathan Simpson
Initially developed by Motorola (and current Motorola’s registered service mark and trademark), the Six Sigma is a business management strategy. It is widely adopted in today’s many industries. By using various management methods such as statistical methods, the Six Sigma tries find and delete any defects or errors during the manufacturing and business process. The strategy is also responsible for training a group of quality management method experts. Similar to some other business management methods, the Six Sigma project teams always have a specific plan with milestones along with a clear financial target. Jonathan Simpson writes on topics such as What is Six Sigma , What is DMAIC and What is DMADV for The Tech FAQ.(read entire article)(posted on: 2008-07-05)
View : 302 Times

What Is Computer Temperature    By: Dylan Conrad
A computer temperature, as the name clearly states, is the temperature of your computer. This is largely a sum of various devices giving off heat within the system. These can include the hard drives, graphic cards, CD-ROMs, power supplies, and the CPU, which gives off the most heat. The heat from these hardwares can have multiple negative effects on the machine, ultimately decreasing the life span of the computer. Dylan Conrad writes on topics such as How Do I Monitor CPU Temperature , How Important is CPU Speed and What is Athlon for The Tech FAQ.(read entire article)(posted on: 2008-07-05)
View : 251 Times


Page: << <    1891  1892  1893 [1894]  1895  1896    > >>

See As RSS




Login To Account
Login Email:
Password:
Forgot Password?
New User?

Sign Up Newsletter
Email Address: