annuler
Affichage des résultats de 
Rechercher plutôt 
Vouliez-vous dire : 

General Technical Knowledge Base

Trier par :
Jack plugs, also known as line plugs in communication technology for headphones, are two-pole and multi-pole coaxial connectors that are widely used worldwide.
Afficher l'article complet
DVB-T is a variant of Digital Video Broadcasting (DVB) used for radio transmission of digital radio and television signals via terrestrial (earthbound) paths.
Afficher l'article complet
Slimline SATA is a special form of SATA connector, especially for slimline devices.
Afficher l'article complet
In information technology, interfaces are the connections between separate systems.
Afficher l'article complet
Dolby Digital is the name for audio compression technologies developed by Dolby Laboratories.
Afficher l'article complet
Tagged Command Queuing (TCQ) is a feature that was originally introduced with the SCSI-2 and later with the ATA-4 specification.
Afficher l'article complet
A network-based storage system consisting of HDDs.
Afficher l'article complet
Fibre Channel is a standard interface from the field of storage networks.
Afficher l'article complet
Wi-Fi or WiFi is a technology for wireless local area networking with devices based on the IEEE 802.11 standards.
Afficher l'article complet
mSATA was specified to allow for smaller memory.
Afficher l'article complet
Firmware is a predefined, hardware-bound software.
Afficher l'article complet
A computer virus is malware.
Afficher l'article complet
Malware (malicious programs) are used to steal data or damage hardware and software.
Afficher l'article complet
Malicious program for monitoring input.
Afficher l'article complet
A worm is a program that reproduces itself without the help of other programs.
Afficher l'article complet
A supposedly useful program with hidden functions that the user knows nothing about.
Afficher l'article complet
GUIs are visual interfaces for operating devices.
Afficher l'article complet
Backup (data protection) refers to the copying of data with the intention of being able to copy it back in case of data loss.
Afficher l'article complet
Cryptography is the encryption of information of any kind.
Afficher l'article complet
ACL is a software technique for limiting access to data and functions by operating systems and application programs.
Afficher l'article complet
Principaux contributeurs