Forum Replies Created

Viewing 9 posts - 1 through 9 (of 9 total)
  • Author
    Posts
  • in reply to: What is a Resource? #7188
    haram
    Participant

    a source of supply, support, or aid, especially one that can be readily drawn upon when needed.

    RAM- can slow down your computer if you don’t have enough CPU to do the requested task.

    CPU- The CPU is essentially the brain of a CAD system.

    in reply to: Operating Systems Intro Types #7098
    haram
    Participant

    I will choose windows I can’t choose more cause IDK what to talk about the other things. Windows have many good things because Gaming on Windows is simply better, Beyond just changing your wallpaper and accent color you can do a lot to Windows both functionally and aesthetically. And the Windows software is the best because it has evolved over time.

    in reply to: Image Compression Activity #7037
    haram
    Participant

    Burst length coding is a lossless data compression algorithm. Compresses data by reducing the amount of repetitive, sequential data called start. It does this by saving the number of runs and the data.

    in reply to: Compression File Formats #7035
    haram
    Participant

    1. File compression is the process of reducing the disk space for storing those files.
    -Compressing files allows for faster data transfer.
    -Reduces the disk space required for Internet servers. This allows the server to store more files/information with less disk space.

    2. Compression can be lossy or lossless. Lossless compression means that the image quality remains the same and does not degrade when the file is compressed.

    3. GIF, JPEG, PNG, Mp3 and Mp4, Wav

    in reply to: Encryption #6994
    haram
    Participant

    Symmetric encryption uses a single key that must be shared by the user who needs to receive the message, while asymmetric encryption uses a public / private key pair when communicating the message. Encrypts and decrypts messages.

    in reply to: Networks Virtual and Private #6938
    haram
    Participant

    Authentication.
    Encapsulation Method.
    Tunneling.
    Decryption.

    A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. So you can have a private network. VPN uses encryption to make web browsing private so that ISPs, governments, and no one else can know what users are doing (which is different from the private mode of web browsers). Today, VPN is recognized as an essential security tool to help protect users with antivirus.

    in reply to: Difference between a Variable and a Constant in programming #6532
    haram
    Participant

    Html
    Wml
    Perl
    SGML
    Javascript
    Java
    c/c++
    Xml-web
    PHP

    I think the reason why programming languages are different is that every programming is different so it seems that not every program is the same and there have different skills.

    in reply to: Approaches to online Learning #6416
    haram
    Participant

    Distributing Materials.

    in reply to: Top software failures in recent history #6412
    haram
    Participant

    Google had shocked everyone in 2018 revealing CPUs vulnerabilities — Meltdown and Spectre, which can access private and sensitive data of other programs.

Viewing 9 posts - 1 through 9 (of 9 total)
Scroll to Top