Advert

How to Backup an iPhone

Last edited by . Total of no comments in the discussion.

The iPhone has become one of the more popular mobile phones used in the world over the past several years. A common task that iPhone users take on is conducting a backup of the iPhone. In order to backup the phone, iPhone users can use iTunes to create a backup of the data stored on it while conducting a sync with the computer. This backup can be used to restore the phone or to transfer the information to a new phone. Starting with iOS 4 and later, encrypted backups can Read More

Share on:

Folder Locker

Last edited by . Total of no comments in the discussion.

Computers have provided modern society with many different luxuries that were never available before. Users are able to download new files in a matter of minutes, access the Internet, and store many different files on their computers. With this ability to store information, however, comes the responsibility of guarding it. As computers are widely accessible to anyone who sits down in front of one, the primary user of that computer may need to protect certain information that he/she does not want others to see. This article will list a number Read More

Share on:

Understanding ISA Server Client Types

Last edited by . Total of no comments in the discussion.

ISA Server Client Types Overview The different ISA Server client types are: Firewall client: These are client computers on which Firewall Client software is installed and enabled. SecureNAT client: These are client computers that have no Firewall Client software installed and enabled. Web Proxy client: These are client Web applications which are set up to use the ISA Server computer. You have to consider the needs of the organization before you install any client software: You have to determine which applications and services your internal clients need to access. You Read More

Share on:

IP Address Classes

Last edited by . Total of 37 comments in the discussion.

IP Address classes were the original organizational structure for IP addresses. The specific address class would determine the maximum potential size for a computer network. The address class would define which of the specific bits of the address would be used to identify the network and network identification, the bits to identify the host computer and host ID, and total number of host subnets permitted per network. Five total classes of IP addresses were defined, class A through E. Although the IP class term will commonly be used to describe Read More

Share on:

Who Invented the Bullet Proof Vest?

Last edited by . Total of 1 comment in the discussion.

Body armor has been in use by military forces since the early middle ages. Armor of metal, leather, cloth padding, silk and other plant material has been intrinsic to military actions since that time. The bullet proof vest, however, is a more recent invention with the specific design intent of protecting its wearer from firearm projectiles. Modern firearm projectiles proved to be difficult to stop due to the new materials of manufacture, high velocities, and rate of fire increases. Although individuals have been creating and utilizing makeshift means to protect Read More

Share on:

Who Invented the Television?

Last edited by . Total of no comments in the discussion.

Who invented the television is a hotly debated question. The invention of the television grew out of the invention of the radio. Since you can easily send sound through the air waves many inventors starting thinking of the possibility of not only sound being sent through the airwaves, but also images. On December 2, 1922, Edwin Berlin who is the patent holder of numerous technologies including the transmission of photographs or images by wire, by radar device and by fiber optics demonstrated in Sorbonne France a mechanical device that is Read More

Share on:

Operator Overloading – Introduction

Last edited by . Total of no comments in the discussion.

Operators like + (plus), – (minus), * (multiply), / (divide) work very well with data types such as int, float, etc. But when it comes to user defined data types these operators do not work on their own. To make them work, we need to define special functions that tell the operators how to handle the operands of the user defined class. These special functions are known as operator functions. The general form of an operator function is: return_type classname :: operator op(arg) { ——— function body ——— } Where Read More

Share on:

Who Invented the Microphone?

Last edited by . Total of 3 comments in the discussion.

A microphone is a device that converts acoustic power into electric power. Both the acoustic power and the electric power have similar wave characteristics that convert sound waves into electric voltages that eventually convert back into sound waves through speakers. Microphone were used with the first telephones, and then with radio transmitters soon after. Sir Charles Wheatstone was the first person to come up with the word “microphone” in 1827, but even so, it was Emile Berliner who invented the first microphone in 1876. Emile Berliner was born in Hanover, Read More

Share on:

What is a GPT Protective Partition?

Last edited by . Total of no comments in the discussion.

A GPT protective partition is a partition on a hard drive that a GUID Partition Table protects. A partition is a continuous area of storage space on a hard drive that is separated from the rest of the hard drive and acts as its own storage device. A GPT protective partition cannot be deleted or reformatted, but can be much larger than partitions that the Master Boot Records (MBR) generate. GPT protective partitions arise from creating partitions on a hard drive that GPT manages. While GPT protective partitions are useful Read More

Share on:

Distance Vector Routing Protocol

Last edited by . Total of 5 comments in the discussion.

Routing Protocols Whenever different networks connect with each other to communicate and to share the data and resources, it is called internetworking. For internetworking, routers must be used on each network or at backbone to route the packets. To route a packet, a router needs to know: Destination Addresses Sources it can learn from Possible routes Best route Maintain and Verify the routing information Routers must learn the destinations that are not directly connected. For this purpose, routing must enabled on the routers. Routing uses a route that a network Read More

Share on: