• Skip to main content
  • Skip to primary sidebar

Technipages

Tutorials and fixes for smartphone, gadget, and computer problems

  • Topics
    • Android
    • Browsers
    • Gaming
    • Hardware
    • Internet
    • iPhone
    • Linux
    • macOS
    • Office
    • Reviews
    • Software
    • Windows
    • Definitions
  • Product Reviews
  • Downloads
  • About

Definitions

TCP/IP

August 26, 2019 by Jennifer Spencer

Abbreviation for Transmission Control Protocol/Internet Protocol (TCP/IP) is a commonly used phrase to refer to the entire Internet protocol suite. It is by far the most widely used suite of networking protocols, providing the technical foundation for the public Internet as well as for large numbers of private networks (called internets with a small “i” to distinguish them from … [Read more...] about TCP/IP

Technipages Explains TCP/IP

TCP is a connection-oriented Protocol in which before any information or data is exchanged; a connection must be established. TCP ensures an input data is received in the same other as it was sent. The information is firstly broken down and rerouted and received at the destination.

Internet protocol suites are the most widely used of networking protocols, and it is the model for which the public internet and private networks (called internets with a smaller “i’’) which are not linked to the internet, operate.

TCP/IP  is an abbreviated form for Transmission Control Protocol/Internet Protocol, and it is a collective term for the Internet protocol suite. It is used to interconnect network devices on the internet.

TCP/IP protocols were intended as part of the research networks developed by the United States Department of Defense Advanced Research Projects Agency (DARPA). It was designed by 2 DARPA scientists namely Vint Cerf and Bob Kahn, in 1974 after researches which started in 1969.

Common Uses of TCP/IP

  • TCP/IP is the Internet suite developed for the United  States Department of  Defense Advanced Research projects agency in the year 1969
  • TCP/IP is an open protocol suite which can be used by any individual or organization, and it is not owned by any particular institute.
  • TCP/IP is an industry-standard model which can be effectively deployed  in practical networking solutions

Common Misuses of TCP/IP

  • The development of the TCP/IP suite started in the late 90s with no backing or initial research, and there was no prior work before this.
  • TCP/IP does not use the address of a machine connected to it to identify the machine as well, and the identity works simultaneously as its address.

Join

September 16, 2019 by Jennifer Spencer

Join in a relational database management program is a data retrieval operation in which a new data table is built from data in two or more existing data tables. The join operation for relational databases is otherwise known as a natural join, and this type of join is characterized by two relations that are connected with their common attributes. In SQL, an INNER JOIN … [Read more...] about Join

Technipages Explains Join

Join in relation to a relational algebra that looks to combine columns from multiple tables in a relational database. It creates a set that can be saved as a table or used as it is. A join serves the purpose of combining columns from one or more tables by adopting values similar to each. ANSI-standard SQL specifies five types of join namely:

  • Left outer
  • Right outer
  • Full outer
  • Cross

Join works off the back of the relational database management program that uses operates using a process data with an easy-to-understand concept of a table. A relational database is a type of database that functions using a structure that allows users to identify and access data about another piece of data in the database. Data in a relational database is organized into tables.

The relational model was first designed and proposed by Edgar Codd to serve as an alternative for a general model of data, and subsequently promoted by Chris Date and Hugh Darwen among others and was released in 1995.

Common Uses of Join

  • Join has proven to be a very instrumental technique when you want to combine tables.
  • Join is a method of relating databases, and it has proven to be very effective over the years.
  • It would be impossible to separate Join from relational database management.

Common Misuses of Join

  • Join is the only relational model method we have had since the ’90s.

Proxy Server

August 26, 2019 by Jennifer Spencer

A proxy server is a program that stands between an internal network and the external Internet, intercepting requests for information. A proxy is generally part of a broader solution to internal network security called a firewall. The purpose of a proxy is to prevent external users from directly accessing resources inside the internal network or knowing precisely where those … [Read more...] about Proxy Server

Technipages Explains Proxy Server

A proxy makes it hard for cybercriminals and hackers to exploit loopholes in the servers and related application, gaining unpermitted access into the network, this is done by disguising the location of the parent server of the information. Fighting cybercriminals and hackers comes at the cost of having slower performance, configuration troubles on the client who wants to use the external internal.

Before a request from a proxy is completed, the proxy intercepts a request for information, then ascertains whether the request can be fulfilled, and then relays the request to an internal server, during all this while the address of the data is not revealed to the requester of the information.

On online platforms, such as American Online, when platforms clients and users visit a webpage, a server is configured to store such web pages. So when clients request these pages, the server provides the stored copy instead of requesting the same page from the external internet. The downside to this is that the stored pages may be out-of-date even though the clients now see webpages faster and a lighter load on the network.

Common Uses of Proxy Server

  • Connecting to the internet through a proxy server makes it hard for anyone to track because a proxy server makes it hard to pinpoint one’s location
  • Proxy servers act as a stand between a client’s computer system and an external internet for exchange of information and data
  • Nowadays, we use proxy servers for various purpose like sharing internet connection on a local area network and hiding our IP (Internet Protocol addresses)

Common Misuses of Proxy Server

  • Frequently visited pages do not get stored on a proxy server, they are requested anew from the external internet
  • Pages stored on a proxy server are being refreshed continuously to keep them up to date, they don’t get out of date

XML

August 26, 2019 by Jennifer Spencer

Abbreviation for extensible Markup Language is not a declarative markup language like HTML; instead, it is a language for creating markup languages.XML is maintained by the Worldwide Web Consortium (W3C). A slimmed-down version of SGML enables Web authors to create and name their tags so that they can more accurately capture the structure of their data. In a well-structured … [Read more...] about XML

Technipages Explains XML

Extensible Markup Language (XML) is a mark-up language that bridges the gap of formatting of documents between humans and machines. XML includes structured data in a text file in a text file. XML allows its users to create a vocabulary and use the same vocabulary to describe data. XML uses tags (“<” and “>”) to create files that are easy to generate by a computing machine.

Usually, most machines that process structured data store the data on disks from which they can only be used in either a binary format or text format. XML makes it possible for a user to access the data without having to access the software used for generating it. Example of structured documents would include contracts, letters, articles, address books, spreadsheets, technical drawing, financial transaction, memos amidst many others.

XML is currently being developed World Wide Web Consortium (W3C) under the supervision of an XML Working Group, it was initiated in the year 1996, XML being a product of SGML (Standard Generalized Markup Language). The intention being to make SGML easier and also due to the success of HTML which was written in the late 1990s by a CERN physicist Tim Berners Lee. XML is an extension of HTML.

Common Uses of XML

  • XML is a recommendation of the World Wide Web Consortium, and the development of the specification is being supervised by an XML working group.
  • The reason why you can open XML files with several different programs is because it stores data in plain text.
  • Some of the programs that can open XML files are window notepad, any text editor or even any web browser

Common Misuses of XML

  • XML was never meant to tackle any problem the SGML created, and it was a mark-up language of its own
  • The recommendation of the World Wide Web Consortium (W3C) of XML is not being supervised by any XML affiliated group

Encapsulation

August 23, 2019 by Mel Hawthorne

This is the process that data goes through when it's transmitted through a computer by way of protocols. There are different layers of protocols and each of them alters the data a little bit, changing it enough that it will pass the next layer and can then be sent via the network. On the other machine, this process is reverse, and the data is put back into its original 'shape' … [Read more...] about Encapsulation

Technipages Explains Encapsulation

Encapsulation works a little bit like paint does – as data passes through layers of protocols, it changes, little by little. Once it has passed through all of them, it can be transmitted via a network connection like the Internet. Once the data, layered as it is, reaches the other machine, the encapsulation process is reversed, and layer by layer, the data is put back together to the way it was. When that’s done, the data can be used, just like on the original machine.

This process is an important aspect of object-oriented programming – part of that is a ‘rule’ that some things and aspects of data should not be available to other objects. The data can still be moved through communication channels (in this case, usually a network), but it can’t be directly altered or even accessed while in motion. Once reversed, the data is back in its original state.

Common Uses of Encapsulation

  • Encapsulation is an essential aspect of OoP.
  • Data transfer puts data through an encapsulation process.
  • Encapsulation restricts direct access to an objects components and properties.

Common Misuses of Encapsulation

  • Encapsulation protects data against viruses.

Software License

August 26, 2019 by Jennifer Spencer

A contractual agreement between software purchasers and the software publisher that specifies what the purchaser may and may not do with the software. Typically, such licenses include clauses that deny that any sale of goods has taken place; what is being sold is not the software itself, the ownership of which is retained by the software publisher, but rather specific rights to … [Read more...] about Software License

Technipages Explains Software License

Software Licenses is an agreement legally binding guidelines for the use of a software as agreed upon by the Software developer and software user. This bestows the user of the software, the permission to use such software in a pre-defined environment.

Licenses usually come with instructions stating how that the sales of the software only means the right to use the software and not the sale of the proprietorship of the software, which most times would mean using the software on just a computer system.

Software licensing started with the use of cassette and audio tapes which were hard to duplicate, As 8’ and 5 1/4 “gained grounds, it made it easier for the copying of software. Later on ISV (International Software Vendors) started building software which would be bonded to a specific machine through an identifier unique to the machine.  This proved to be a problem as the programs stopped working once customers changed their machine. The software couldn’t be transferred easily to another machine. Eventually, ISV came up with the use of servers that have license delivery systems on them, which limited a number the number of users who could use the software at a time. The emergence of digital communication has made the use of license keys distributed electronically, so does pirate the software. Today Cloud licensing technology is what is being used.

Common Uses of Software License

  • The purchase of software Licenses does not mean the proprietor of the software is selling the ownership of the software
  • International software vendors have been ensuring over the years that software licenses are devoid of fraudulent practices both at the side of the Purchaser and the Proprietor
  • Software licenses are proof that permission has been given to an individual or group of people to use a software

Common Misuses of Software License

  • Software Licenses implies once gotten, a customer has shares in the proprietors profit from the software
  • Software licenses should not hinder customers from purchasing one copy of a program and copying it into multiple computers or machines

Virus

August 26, 2019 by Jennifer Spencer

A program that replicates itself, and in so doing resembles a biological virus, by attaching to other programs and carrying out unwanted and sometimes damaging operations. Although some viruses are relatively benign and are little more than pranks, most are written with malicious intent; at the extreme, they can wipe out all the contents on a computer’s hard disk. Viruses … [Read more...] about Virus

Technipages Explains Virus

A virus is a software program created by a person that replicates between computer systems causing restrictions in computer operations or carrying out unwanted activities of its own accord. The first computer virus ever released was in 1971, and it was written as an experimental self-replicating virus, it is called “Creeper system,” its task was to fill up a computer hard drive until computer operations on the computer was no longer possible.

At the inception of virus programming, the only means of propagation was through the exchange of storage devices such as floppy disks, the aim of exchanging storage devices is mainly to share data or computer software. With the advent of the internet, a better propagating platform is now made available for Virus programmers. A sure way to stay safe from viruses would be to refrain from opening or executing any attachment on an e-mail and also installing and running anti-virus packages.

Common Uses of Virus

  • A virus is a self-initiating software package written with the intent of causing abnormalities in the operation of a computer system
  • Computers are now at higher risks of virus infestation as virus programmers now utilize the internet by sending corrupted emails to unsuspecting people.
  • A virus starts operation from the moment a corrupted file is opened, till it infiltrates other parts of the computer like the program and packages

Common Misuses of Virus

  • A virus spreads by the use of scanners as it also involves the transfer of files between a network of computers
  • A virus can infect hardware such as the keyboard, mouse, monitor, and text-based messages

Packet-Switching Network

August 26, 2019 by Jennifer Spencer

Packet Switching Network is one of two fundamental architectures for the design of a computer network; the other is a circuit- switching network. In a network such as the Internet, no effort is made to establish a single electrical circuit between two computing devices; for this reason, the connection established is often called connectionless. Instead, the sending computer … [Read more...] about Packet-Switching Network

Technipages Explains Packet-Switching Network

Packet switching Network is the building block of the internet; they are digital structures for sending data from a network to another in smaller bits called packets, this helps to reduce the time for transfer of files and also reduce delay in transmission.

When a data is transferred, a computer breaks down the file into packets to aid the transmission of the packets across the network which consumes less time, after the packets are received on the recipient computer, they are then reassembled.

The network IP address is recorded in a “header,” the header contains the network IP address of where the packet was sent from and also its destination network IP address. A header also keeps track of the number of packets a file was broken. After which the packets is relayed to a router machine, a router works out the best connection for a packet. On arrival, with the help of the header, the packets are reassembled. The breaking of the data into packets allows for it to be accessible to all the users in a network.

Common Uses of Packet-Switching Network

  • The success and the benefits of using the internet are all hinged on the Packet Switching Network
  • Packet switching network breaks down data at; they origin computer and re-assembles them at the period destination
  • A router helps the packet switching network to relay packet between computers

Common Misuses of Packet-Switching Network

  • When a packet switching network breaks data into packets, it is mostly not accessible by members of the same network.
  • A packet switching network takes more time to be completed

Pentium 4

August 26, 2019 by Jennifer Spencer

The successor to Intel’s sixth-generation processors, including the Pentium II and Pentium III, this chip heralds the seventh generation of Intel processor technology. What is revolutionary about the is its deep pipelining architecture; it is implemented in 20 stages (compared to 10 in the Pentium III). This enables the chip to run at significantly higher clock speeds than the … [Read more...] about Pentium 4

Technipages Explains Pentium 4

Pentium 4 is a brand by Intel for a whole series of single-core CPUs for desktops, laptops, and entry level servers, it is a seventh-generation CPU, succeeding the sixth generation of Intel processors including Pentium 2 and 3.  The processors were produced from November 20, 2000 to August 8, 2008.

The standing out factor for Pentium 4 being its new chip architecture, which unlike Pentium 3 (implemented in 10 stages) is implemented in 20 stages. This is the underlying mechanism for the rapid processing speed of the chip. Pentium CPU clock rate ranges from 1.3 GHz-3.8 GHz while that of Pentium 3 couldn’t be pushed beyond 1.2 GHz.

This design came at the expense of Pentium 4 only being able to complete fewer executions per clock cycle, and this resulted in Athlon and Pentium 3 processors running faster than Pentium 4 even at their lower speed clock rate.

Intel engineers’ continuously improved Pentium 4 chip’s clock rate until the downside was minimal. Other improvements made on Pentium 4 include system data bus speeds of up to 533 MHz when used with Rambus RDRAM memory, improved branch prediction, two arithmetic-logic units (ALU) that run at twice the chip’s clock speed, and an expanded set of Streaming SIMD Extensions (SSE).

Common Uses of Pentium 4

  • Pentium 4 brand of Intel’s single-core CPUs for desktops, laptops and entry level servers only ran for almost eight years
  • The underlying technology for Pentium 4 lies in its new chip architecture, which is implemented in over 20 stages.
  • Pentium 3 was succeeded by Pentium 4 which was supposed to be better, but it was only able to run few executions per clock cycle; eventually it was improved by Intel engineers

Common Misuses of Pentium 4

  • Athlon and Pentium 3 even though they were executed over 10 stages eventually replaced the Pentium 4 design which was implemented over 20 stages, due to a design flaw
  • Intel engineers only fixed Pentium 4’s trade-off of few executions per clock cycle, no other improvement was made.

Function

August 26, 2019 by Jennifer Spencer

In programming languages, a separate named unit of code that performs a specific calculation or procedure. To use functions, they must be declared in a special area of the program set aside for this purpose. A function includes placeholders, called logical parameters, that will be replaced by real values (actual parameters) when the function is initiated through a call … [Read more...] about Function

Technipages Explains Function

A function in a body of code is an identified smaller piece of code whose position is dependent on the larger body of code. It has a defined role to perform a single specific task. Once a function is written at a point in a program, it is accessible from any part of that same program.

Functions are mainly used because they can be re-used hence save time, functions once they have been declared can be used in as many as possible places and times. Most functions being used, once they have been declared can also be used by other programmers in several different programs. A programmer can compile a list of functions and export them to be used in other programs.

Functions in programming can be traced to the Lambda Calculus system which was developed in the 1930s. Lambda Calculus allows for the provision of a base for evaluating functions and their results. Programming languages that use the Lambda Calculus model are Common Lisp, Scheme, Clojure, Wolfram Language, Racket, and Haskell. Functions in programming are also being utilized by some other programming languages to create a sub-hub in the programming niche for themselves, and examples are XML, SQL, and Lex/Yacc.

Common Uses of Function

  • The main reason a function can be used is that it can be used to avoid repetition of commands within the program
  • Functions and procedures are very similar when functions are initiated, and they return a value, procedures do not.
  • Another reason a function can be used is to help define a logical structure for your program by breaking it into several smaller modules with apparent purposes.

Common Misuses of Function

  • A function even though it’s a defined piece of code  in a much more bigger body of code does not depend on the bigger code
  • Re-usability of a function is highly doubtful as programs do not compile a list of well-known functions.

Next Page »

Primary Sidebar

Recent Posts

  • 3 Ways to Choose All Files in a Folder – Windows 11
  • Apple TV+: How to Erase a Show From the Up Next List
  • How to Change the Profile Picture on Disney+
  • Local Security Policy: What Is It and How to Open It in Windows 11
  • How to Create and Erase an Alarm in Windows 11
  • 10 Best NAS Storage Device for Home and Professional Use
  • PS5 NVMe Requirements You Must Fulfill to Expand PS5 Storage
  • Steam Deck Won’t Turn On: 8 Possible Fixes You Can Try

Who’s Behind Technipages?

Baby and Daddy My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

© Copyright 2023 Guiding Tech Media · All Rights Reserved · Privacy