How to Save Health When You Spend Much Time at the Computer
| |

Keeping fit and healthy is a popular topic in modern digital era. Every day we kill our nerves, sight, posture, joints, and even stomach just sitting at the computer. No matter if you work at your architectural project at the … Read More

Computer Quiz
| |

Test your general knowledge in computers

Computer programming in two minutes – JavaScript
| |

JavaScript is a language executed by the web browser to display a web page (it is mostly used for that). Create the HTML document (the file name usually ends with .html) and open it with a browser. <!DOCTYPE html PUBLIC … Read More

Computer bugs
| |

(Photo of first computer bug.) A computer bug is a fault in a computer program which prevents it from working correctly. Bugs arise from mistakes in either a program’s source code or its design. It is said that there are … Read More

Computer forensic investigations
| |

Forensic investigation of computer systems has a number of features that differentiate it fundamentally from other types of investigations. Forensic investigation of computer systems can be defined as: Using scientific and safe of insurance tightening, validation, identification, analysis, interpretation, documentation … Read More

Appliance vs computer
| |

The term information appliance was coined by Jef Raskin around 1979.[1][2] As later explained by an influential Donald Norman’s The Invisible Computer,[3] the main characteristics of IA, as opposed to any normal computer, were: designed and pre-configured for a single … Read More

Telegraphy
| |

Telegraphy is the long distance transmission of written messages without physical transport of letters. This definition includes recent forms of data transmission such as fax, email, and computer networks in general. (A telegraph is a machine for transmitting and receiving … Read More

Information technology
| |

Information technology (IT), as defined by the Information Technology Association of America (ITAA), is “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware.”[1] IT deals with the use of electronic computers … Read More

Effects and behaviors of spyware
| |

Many Internet Explorer add-on toolbars monitor the user’s activity. When installed and run without the user’s consent, such add-ons count as spyware. Here multiple toolbars (including both spyware and innocuous ones) overwhelm an Internet Explorer session. A piece of spyware … Read More

Routes of infection with spyware
| |

Spyware does not directly spread in the manner of a computer virus or worm: generally, an infected system does not attempt to transmit the infection to other computers. Instead, spyware gets on a system through deception of the user or … Read More

Closed captions
| |

The “CC in a TV” symbol Jack Foley created, while senior graphic designer at Boston public broadcaster WGBH that invented captioning for television, is public domain so that anyone who captions TV programs can use it. Closed captioning is the … Read More

1 2