English
Türkçe
[email protected]
  • HOME PAGE
  • LESSON
  • QUESTION
  • DATA-BANK
  • BLOG
  • APPS

YouTube Kanalımız

ÇOK YAKINDA SİZLERLE

What is Traceroute?

There are frequently several links established along the road when machines interact with one another over the Internet. This is due to the fact that the Internet is composed of a network of...

212 Network General

What is Social Engineering?

In the context of computer security, social engineering refers to the practice of deceiving individuals into disclosing sensitive information. Phishing, pharming, and other forms of deception fall...

211 Security General Technology

What is Personal Information Manager (PIM)?

A personal information manager is a type of software program that aids in managing all kinds of personal information, including contacts, pictures, and personal journals as well as notes and...

226 Software General

What is Symmetric Digital Subscriber Line (SDSL)?

An example of a DSL internet link is SDSL. It uses copper telephone connections to transmit digital data, similar to ADSL. The definition of "symmetric" states that the capacity used for transfer...

218 Internet General

What is Internet Relay Chat (IRC)?

IRC is a program that enables internet communication between users. Individuals link to an IRC server using a client software in a client/server configuration. IRC applications that are widely used...

247 Internet General

What is Point-to-Point Protocol (PPP)?

PPP is a system that permits data transmission and contact between two endpoints, or locations. PPP was the norm for dial-up connections to Providers for a very long time. PPP links increased as...

216 Internet General Technology

What is Social Media Marketing (SMM)?

SMM stands for social media marketing, or marketing carried out on social networking sites. Although the majority of businesses and groups have their own webpages, it can be challenging to contact...

210 Internet General

What is Spoofing in Internet?

Spoofing is the verb form of prank, ruse, or deception. Consequently, the term "spoofing" in the IT industry alludes to fooling or misleading computer networks or other computer users. This is...

209 Internet General

What is Social Networking?

Social networking is the practice of establishing connections with others, frequently through social media platforms, in order to forge new connections and strengthen current ones. People can...

247 Internet General

What is Transmission System Level 1 (T1)?

A T1 line is a type of telephone line that can handle 24 speech lines for phone service or 1.544 Megabytes of total capacity for Internet connections. T1 lines can travel over coax or fiber optic...

237 Technology

What is Spam Term?

Any unwanted mass communication is referred to as spam. Spam is typically unsolicited email, but it can also be texts, emails, or posts on social media. A spam blocker that automatically identifies...

221 Internet General Security General

What is Static Website?

A static website's online pages contain preset content. Every website has the same information and is written in HTML for all visitors. Static websites are the easiest to create and are the most...

214 Internet General

What is Reciprocal Link?

A reciprocal link is one that two webpages share with each other. Website B, for instance, may add a mutual connection back to Website A if Website A connects to Website B. Two websites will...

224 Internet General

What is Spider Software?

A spider is a piece of software that browses the Internet in order to find and catalog webpages for search engines. Spiders are used by all of the big search engines, including Google, to create...

213 Internet General

What is SYN Flood?

A SYN flood is a form of denial of service (DoS) assault that bombards a computer, such as a web server, with "SYN" communications. The initial stage of creating contact between two computers over...

221 Security General

What is Uniform Resource Identifier (URI)?

A URI uses a standard structure to identify the name and position of a file or resource. The route to the file's subfolder may also be included, along with an array of letters for the title...

218 Internet General

What is Transmission System Level 3 (T3)?

With 672 distinct phone channels and 45 Megabytes of Internet capacity, a T3 line has the same speed as 28 T1 lines in terms of telecoms standards. T3 connections use coax cables to transmit data...

221 Technology

What is TTL?

TTL (Time to Live) is a term used to describe a number of computer networking principles. The portion of the TCP/IP protocol that establishes an expiry timestamp for each data transmission sent...

237 Network General

What is Virtual Private Server (VPS)?

A server built with software virtualization is known as a VPS. Although it was made inside a server, it performs the same tasks as a real server. Multiple virtual private servers can be hosted on a...

196 Hardware General

What is Transport Layer Security (TLS)?

Secure data transmissions are made possible by the data protection technology known as HTTPS. All information sent from one system to another is encrypted (or scrambled) by it. Any outsider trying...

201 Internet General

Total Result : 909
  • 4
  • 5
  • 6
  • 7
  • 8

DATA-BANK CATEGORY

  • .NET ( 40 )
  • C# ( 53 )
  • DevExpress ( 20 )
  • Flutter ( 1 )
  • Go ( 1 )
  • Hardware General ( 142 )
  • HTML ( 8 )
  • Internet General ( 40 )
  • Java ( 150 )
  • JavaScript ( 37 )
  • Kotlin ( 1 )
  • Ms Sql ( 127 )
  • Network General ( 7 )
  • Oracle ( 1 )
  • Python ( 1 )
  • Ruby ( 1 )
  • Security General ( 6 )
  • Software General ( 5 )
  • Swift ( 2 )
  • Technology ( 295 )
  • Unity ( 28 )
  • Visual Basic ( 17 )
  • Visual Studio ( 7 )
© 2012-2023 - All Rights Reserved. Yazilim Ders