Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Search engine optimization (SEO) is the process of improving the quality and quantity of website traffic to a website or a web page from search engines...
    58 KB (5,740 words) - 12:21, 27 June 2024
  • Thumbnail for Free and open-source software
    Free and open-source software (FOSS) is software that is available under a license that grants the right to use, modify, and distribute the software, modified...
    83 KB (7,052 words) - 08:20, 16 June 2024
  • Thumbnail for Floppy disk
    A floppy disk or floppy diskette (casually referred to as a floppy, a diskette, or a disk) is a type of disk storage composed of a thin and flexible disk...
    80 KB (8,664 words) - 22:30, 1 July 2024
  • Thumbnail for Open-source software
    Open-source software (OSS) is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change...
    82 KB (9,432 words) - 00:15, 9 June 2024
  • Thumbnail for Free software
    Free software, libre software, or libreware is computer software distributed under terms that allow users to run the software for any purpose as well as...
    51 KB (5,493 words) - 19:57, 10 June 2024
  • Thumbnail for Computer data storage
    Computer data storage or digital data storage is a technology consisting of computer components and recording media that are used to retain digital data...
    57 KB (6,491 words) - 21:18, 22 May 2024
  • Ransomware is a type of cryptovirological malware that permanently blocks access to the victim's personal data unless a ransom is paid. While some simple...
    103 KB (10,664 words) - 00:22, 25 June 2024
  • Thumbnail for PageRank
    PageRank (PR) is an algorithm used by Google Search to rank web pages in their search engine results. It is named after both the term "web page" and co-founder...
    71 KB (8,783 words) - 02:09, 23 June 2024
  • Thumbnail for Reduced instruction set computer
    In electronics and computer science, a reduced instruction set computer (RISC) is a computer architecture designed to simplify the individual instructions...
    58 KB (6,812 words) - 17:04, 23 June 2024
  • Thumbnail for Diffie–Hellman key exchange
    Diffie–Hellman (DH) key exchange is a mathematical method of securely exchanging cryptographic keys over a public channel and was one of the first public-key...
    47 KB (5,161 words) - 07:11, 6 June 2024
  • Extensible HyperText Markup Language (XHTML) is part of the family of XML markup languages which mirrors or extends versions of the widely used HyperText...
    59 KB (6,964 words) - 13:00, 13 June 2024
  • Google Cloud Platform (GCP), offered by Google, is a suite of cloud computing services that provides a series of modular cloud services including computing...
    50 KB (3,570 words) - 08:47, 21 June 2024
  • Spamdexing (also known as search engine spam, search engine poisoning, black-hat search engine optimization, search spam or web spam) is the deliberate...
    25 KB (2,950 words) - 09:25, 28 May 2024
  • In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the validity...
    37 KB (4,444 words) - 06:13, 6 June 2024
  • Thumbnail for Ogg
    Ogg is a free, open container format maintained by the Xiph.Org Foundation. The authors of the Ogg format state that it is unrestricted by software patents...
    35 KB (3,630 words) - 21:23, 5 June 2024
  • Thumbnail for OpenSUSE
    openSUSE ( /ˌoʊpənˈsuːzə/) is a free and open-source Linux distribution developed by the openSUSE project. It is offered in two main variations: Tumbleweed...
    56 KB (5,424 words) - 09:39, 13 June 2024
  • Non-volatile memory (NVM) or non-volatile storage is a type of computer memory that can retain stored information even after power is removed. In contrast...
    18 KB (1,920 words) - 03:59, 13 June 2024
  • A complex instruction set computer (CISC /ˈsɪsk/) is a computer architecture in which single instructions can execute several low-level operations (such...
    15 KB (1,971 words) - 15:45, 19 January 2024
  • Cryptovirology refers to the study of cryptography use in malware, such as ransomware and asymmetric backdoors.[citation needed] Traditionally, cryptography...
    14 KB (1,453 words) - 01:21, 22 June 2024
  • SUSE Linux (/ˈsuːsə, ˈsuːzə/ SOO-sə, SOO-zə, German: [ˈzuːzə]) is a computer operating system developed by SUSE. It is built on top of the free and open-source...
    32 KB (2,917 words) - 12:49, 20 May 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)