Rating
TCP & UDP PROTOCOLS
TCP & UDP Protocols
TCP & UDP Protocols
As you know every computer or device on the Internet must have a unique number assigned to it called the IP address. This IP address is used to recognize your particular computer out of the millions of other computers connected to ...
Rating
Sustaining IT Value for the Organization
Sustaining IT Value for the Organization
Introduction
In today's business world, IT plays a very significant part in the day to day operations of an organization. Every day organizations require greater involvement of IT services. Even if, IT is not the business of an organization, still ...
Rating
MANAGEMENT OF IT GOVERNANCE
Management of IT Governance
Management of IT Governance
Introduction
Due to the progressively more dependence on the computer for nearly all things, appropriate management of Information Technology has not been seen as more significant as it has become today. Devoid of fine Information Technology supervision nearly all conceivable catastrophes could ...
Rating
RELATION BETWEEN TCP/IP AND INTERNET
Relation between TCP/IP and Internet
Relation between TCP/IP and Internet
IP packets, in addition to information, consist of a header containing the IP address of the sender (your computer) and the recipient (the computer you want to achieve) and a number of control determined by the information packed ...
Rating
Understanding Individual
Understanding Individual
Introduction
We are all psychologist to some extent whether or not we have received specialized education in the subject. When one of our friends goes to a number of parties, we say that he does it because he is outgoing. What we are doing in this case is using ...
Rating
Internet Jihad
Internet Jihad
Introduction
Internet Jihad is spreading in all parts of the world by different terrorist groups. They take the advantage of social media and latest technology. As we know that, technology is advancing day by day and, each day brings new ideas with certain risks. Internet jihad, cyber terrorism, money ...
Rating
Technology and Privacy
Introduction
The Patriot Act in the United States, is the most strict and forceful weapon against terrorism and international organized crime. This Act is largely based on the resolutions of the fiftieth general assembly and of resolutions 1373 and 1390, the United Nations in New York, the act ...
Rating
Evolution of Operating Systems
Evolution of Operating Systems
Introduction
An operating system is defined as a program used to develop a means of interaction between computer and its user or it simplifies the interaction to an easily understandable level. An operating system controls the communication between computer and peripheral devices such as keyboards, ...
Rating
CLOUD COMPUTING
Cloud Computing
Cloud Computing
Introduction
The evolution of information technologies and means of communication is unstoppable and every day are made ??available to citizens with new tools solutions, and increasingly sophisticated and integrated with the Internet, allowing to meet growing needs of computerization and communication. In this framework, cloud computing is ...
Rating
OPERATIONS SYSTEM
Operations System
Operations System
Introduction
Morrison is the trademark of Wm Morrison Supermarkets plc, which is the United Kingdom's fourth leading hypermarket chain. The company is also operating its subsidiaries. The corporation has its head office in Bradford which is where the company formed. William Morrison began with an egg and butter ...