cancel
Showing results for 
Search instead for 
Did you mean: 

General Technical Knowledge Base

Sort by:
DVB-T is a variant of Digital Video Broadcasting (DVB) used for radio transmission of digital radio and television signals via terrestrial (earthbound) paths.
View full article
A laptop is a small, portable personal computer with a "clamshell" form factor.
View full article
The service set identifier (SSID) defines a service set or extended service set.
View full article
DISM is a Software-Tool.
View full article
Small Computer System Interface (SCSI) refers to standardized protocols for controlling communication between computers and peripheral devices.
View full article
Motion interpolation or motion-compensated frame interpolation (MCFI) is a form of video processing.
View full article
DirectX provides a collection of application programming interfaces.
View full article
A computer virus is malware.
View full article
Adobe Acrobat is a family of application software and Web services developed by Adobe Systems.
View full article
A computer is a device that can be instructed to carry out arbitrary sequences of arithmetic or logical operations automatically.
View full article
Explanation of terms and references to LTE.
View full article
In this glossary we explain the memory effect to you.
View full article
Electrical circuit fuse.
View full article
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable.
View full article
iSCSI is a procedure that enables the use of the SCSI protocol via TCP.
View full article
LAN is used for communication between devices.
View full article
Progressive Web App (PWA) is a term used to denote web apps that use the latest web technologies.
View full article
Coaxial cables, are two-pole cables with a concentric structure.
View full article
UMTS is a third generation mobile cellular system for networks based on the GSM standard.
View full article
The Transmission Control Protocol (TCP) is a network protocol that defines how data is exchanged between network components.
View full article
Top Contributors