Search results
Appearance
- This is a list of TCP and UDP port numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User...314 KB (12,881 words) - 19:58, 2 November 2024
- Distributed computing is a field of computer science that studies distributed systems, defined as computer systems whose inter-communicating components...51 KB (5,737 words) - 08:15, 4 October 2024
- In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...15 KB (1,788 words) - 20:42, 10 September 2024
- In computing, a parallel port is a type of interface found on early computers (personal and otherwise) for connecting peripherals. The name refers to the...35 KB (3,902 words) - 07:04, 9 September 2024
- HFS Plus or HFS+ (also known as Mac OS Extended or HFS Extended) is a journaling file system developed by Apple Inc. It replaced the Hierarchical File...32 KB (3,424 words) - 15:58, 5 July 2024
- Desktop Window Manager (DWM, previously Desktop Compositing Engine or DCE) is the compositing window manager in Microsoft Windows since Windows Vista that...17 KB (2,198 words) - 02:35, 3 November 2024
- Audio quality comparison 8-bit μ-law 8-bit linear PCM 16-bit linear PCM Problems playing these files? See media help. The μ-law algorithm (sometimes written...10 KB (1,095 words) - 14:57, 26 October 2024
- The PowerBook (known as Macintosh PowerBook before 1997) is a family of Macintosh laptop computers designed, manufactured and sold by Apple Computer from...25 KB (3,191 words) - 04:24, 20 October 2024
- The following tables compare general and technical information for a number of file systems. Note that in addition to the below table, block capabilities...140 KB (5,211 words) - 04:38, 10 October 2024
- Web analytics is the measurement, collection, analysis, and reporting of web data to understand and optimize web usage. Web analytics is not just a process...44 KB (6,065 words) - 15:06, 23 October 2024
- In computing, a core dump, memory dump, crash dump, storage dump, system dump, or ABEND dump consists of the recorded state of the working memory of a...22 KB (2,659 words) - 14:51, 14 October 2024
- In computer programming, indentation style is a convention, a.k.a. style, governing the indentation of blocks of source code. An indentation style generally...49 KB (5,769 words) - 23:44, 20 October 2024
- NLS (oN-Line System) was a revolutionary computer collaboration system developed in the 1960s. It was designed by Douglas Engelbart and implemented by...18 KB (2,163 words) - 21:43, 19 October 2024
- A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of...22 KB (2,599 words) - 12:34, 14 October 2024
- In computing, configuration files (commonly known simply as config files) are files used to configure the parameters and initial settings for some computer...13 KB (1,314 words) - 17:46, 8 July 2024
- In computer interface design, a ribbon is a graphical control element in the form of a set of toolbars placed on several tabs. The typical structure of...25 KB (2,531 words) - 20:45, 21 October 2024
- Metalink is an extensible metadata file format that describes one or more computer files available for download. It specifies files appropriate for the...17 KB (1,398 words) - 07:52, 21 August 2024
- In computing, reactive programming is a declarative programming paradigm concerned with data streams and the propagation of change. With this paradigm...28 KB (3,520 words) - 22:59, 26 October 2024
- Dynamic Infrastructure is an information technology concept related to the design of data centers, whereby the underlying hardware and software can respond...8 KB (839 words) - 20:59, 17 October 2024
- Short-circuit evaluation, minimal evaluation, or McCarthy evaluation (after John McCarthy) is the semantics of some Boolean operators in some programming...20 KB (1,476 words) - 17:34, 28 April 2024