ⓘ Free online encyclopedia. Did you know? page 30

Computer security

Computer security is a branch of information technology known as information security which is intended to protect computers. Computer security has three main goals: Integrity: Making sure people cannot change information they should not protecti ...

Computer vision

Computer vision is the subfield of Computer Science that studies how a computer processes visual information to have them interpret what they see. Unlike Computer Graphics which generates images using computers, Computer Vision takes visual infor ...

Computer worm

A computer worm is a kind of malware that is able to copy itself, and spread. Unlike a computer virus, this is done without changing files on a computer, and without affecting the boot sector of media. Worms do not need human help to reproduce. W ...

Computer-generated imagery

Computer-generated imagery is using computer graphics, especially in movies. These images are used for special effects, simulation, and commercials, amongst others. Sometimes the technology is used to produce a static background, which is then me ...

Computing platform

A computing platform is a well defined set of hardware or software that allows application programs to run. Typical platforms include the hardware architecture, the operating system, as well as runtime libraries. The programming language Java is ...

Concatenation

Concatenation is a simple concept from computer science. It is a way of making a new word, by putting together two other Strings. Given the words foo and bar, the two new words foobar and barfoo can be made that way.

Conficker

Conficker is a computer worm that first showed up in October 2008. It targeted the Microsoft Windows operating system. It is not known where the name "conficker" came from. "Internet experts" have guessed that the name comes from a mix between tw ...

Connector

Connector is general name for an electric connector, an electromechanical device for connecting electrical conductors. Examples: Phone connector XLR connector RCA connector

Conservapedia

Conservapedia is a wiki designed for Americans who are conservative Christians. It was created by Andrew Schlafly. Conservapedia is a reaction to what its creators see as a "liberal point of view" in Wikipedia. Conservapedia has articles on many ...

Conspire (software)

Conspire is an IRC client written in C first made in 1999. The newest, or latest version of Conspire is 2.2.14 and was made in 2005. The client is free to use. Conspire is licensed as LGPL. It is based on XChat.

Constant

A constant is something that does not change. Constants are used in maths and computer programming. An important fact to remember in calculus is that the derivative of a constant is always zero.

Contactor

A contactor is an electric device to switch an electric circuit. It is controlled electrically for it to switch on or switch off the circuit. It has a relatively high current rating. The control circuit usually has much lower power level than the ...

Content Scramble System

The Content Scrambling System is a system to encrypt and copy-protect DVDs. Such systems are generally called Digital Rights Management systems. CSS uses symmetric cryptography. It was introduced in 1996; today, it is considered ineffective. In O ...

Context switch

A context switch is the computing process of saving and restoring the state of a CPU such that multiple processes can share a single CPU resource. The context switch is an essential feature of a multitasking operating system. Context switches are ...

Control panel (engineering)

A control panel is a flat surface area which has controlling or monitoring devices. Control panels are used in many places to control and monitor machines. Old control panels use buttons, while modern control panels use touchscreens. An automatio ...

Control system

Control system is a device or system that gives commands to manage the behavior of other devices or systems. The commands can be set or programmed, and the output is determined by the input. A control system is represented by a logic diagram.

Control unit

The control unit is a circuit inside of a computers central processing unit. It controls the activity of all other units in the computer system, giving them directions. Its main job is to get the code from the program, decode it and operate the a ...

Cooling tower

Cooling towers are towers that are used to transfer waste heat to the atmosphere. Cooling towers may use the evaporation of water to remove heat and cool the working fluid to near the wet-bulb air temperature. They may also use only air to cool t ...

Copper wire and cable

A copper wire is a single electrical conductor made of copper. It can be insulated or uninsulated. A copper cable is a group of two or more copper wires bundled together in a single sheath or jacket. Copper wire and cable is used in power generat ...

Copy-on-write

Copy-on-write is a means of optimisation in Computer Science. When several callers ask for the same resource, they can all be given a pointer to the same address. Only when they try to change the resource does a local copy need to be made. This h ...

Corporate network

A corporate network is a group of computers, connected together in a building or in a particular area, which are all owned by the same company or institutions.

Cotton gin

A cotton gin, or a cotton engine is a machine that pulls cotton fibers away from the cotton seeds. The modern cotton gin was invented by the American inventor Eli Whitney.It is significant in American history because after its invention, Southern ...

CP/M

CP/M was an Operating System for computers used in the 1970s and early 1980. Originally, it supported up to 64 kb of main memory. It was command-line based, and came before MS-DOS.

Crash (computing)

A Computer crash is when a computer program stops running normally. The program can be either an application or the computers operating system. The program may freeze or may show a crash report explaining what happened. One, called the Blue Scree ...

Crash Test Dummy

A crash test dummy is a test device that is made to be close to the same shape, size, heaviness, proportions and articulation of the human body. They sometimes have equipment embedded in them that measures data about how hard things are hitting i ...

CraveOnline

CraveOnline is an entertainment website. It is based in Los Angeles and has sales offices in New York, Chicago, and San Francisco. The site is owned by media company AtomicOnline. CraveOnline maintains a network of male-centric sites.

Crayon

Crayons are writing tools made with colored wax, water, and citric acid or chalk. Young children often use them to draw. Some adult artists use them too. They melt at a low temperature so they can be used in crayon-drip art. One very well-known b ...

Croatian Wikipedia

The Croatian Wikipedia is the Croatian language edition of Wikipedia. This edition was started in February 2003. As of October 2015, it is the 41st largest edition of Wikipedia by number of articles. As of May 2013, it has over 137.000 articles. ...

Cross-platform

Cross-platform software is a type of software that can run on many different operating systems or computer architectures. Together, the combination of an operating system and computer architecture is commonly referred to as a platform. Microsoft ...

CrossOver

CrossOver is the collective name for four commercial programs developed by CodeWeavers that allow using Windows programs on Mac OS X and Linux. The programs include "CrossOver Linux", "CrossOver Mac", "CrossOver Games" and "CrossOver Games Linux" ...

Crumple zone

Crumple zones in a car help to reduce the impact of force on the people in the car when the car crashes into a solid object or another vehicle. The car is designed to crumple in a way so it absorbs energy to decelerate for longer and so reduce th ...

CryptoLocker

CryptoLocker is a file encrypting ransomware. It first appeared in September 2013. It was transferred using email attachments and botnets. The ransomware encrypts most files on the computer, using an RSA encryption.After infection Cryptolocker sc ...

Crystal radio

A crystal radio, sometimes called a crystal set, is a very simple AM radio receiver, that does not need batteries to work. A long wire antenna gathers enough of the radio signals from nearby transmitters to power a crystal diode, which demodulate ...

Cuckoo clock

A cuckoo clock is a kind of clock. Cuckoo clocks have a case made of wood that looks like a small house. It gets its name because at the start of every hour, a small door on the clock open up and a little wooden bird comes out. The clock then mak ...

Cursor

A cursor is a shape on a computer screen that shows where actions made with the keyboard or mouse will make a change. There are 2 types of cursor that most people will use. The Mouse cursor: The pointer on the screen which the person using the co ...

Cutaway

A cutaway in movieing is a camera shot that interrupts the program. Its subjects are related. It is going on at the same time as the main action of the program.

Cuvette

A cuvette is a kind of laboratory glassware, usually a small tube of circular or square cross shape, closed at one end and open at the other, made of plastic, glass, or optical grade quartz and made to hold samples for spectroscopic experiments. ...

CyanogenMod

CyanogenMod is an operating system for many smartphones and tablet computers. It is based on the Android operating system. This means all of Androids programs can be used with CyanogenMod. Because it is Open sourced it can be changed. It provides ...

Cyber high school

Cyber high school is a high school on the internet. It teaches students over the Internet. It means that a high school student has the option of receiving their education at home.

Cyberbullying

Cyberbullying is the misuse of electronic information and mass media, such as e-mail, SMS, weblogs, cellphones and defamatory websites, to harass or attack a person or a group. It can cause emotional damage. Cyberbullying can include sending thre ...

Cyberphobia

Cyberphobia is a fear of working with computers. People who have cyberphobia are afraid or not able to learn new technologies. It is a type of specific phobia. It was first used in 1985.

Czech Wikipedia

The Czech Wikipedia is the Czech-language edition of Wikipedia. This edition was started in November 2002. It is the 26th largest edition. As of August 2014, it has over 302.000 articles.

Dailymotion

Dailymotion is the worlds largest independent video sharing website. It is based in Paris, France. Dailymotion was started March 15, 2005 by Benjamin Bejbaum and Olivier Poitrey.

Danish Wikipedia

The Danish Wikipedia is the Danish-language edition of Wikipedia. This edition was started in February 2002. It is the 35th largest edition. As of July 2014, it has over 190.000 articles.

DarkBASIC

DarkBASIC is a programming language that is very easy to create games in so people do not need to worry about DirectX. People now use the more powerful DarkBASIC Professional.

Darlington transistor

A Darlington transistor, sometimes called "Darlington pair" is a transistor circuit that is made from two bipolar transistors. Sidney Darlington invented it at Bell Labs. It is like a transistor but it has much higher ability to gain current. The ...

Darwin (operating system)

Darwin is a free, open source, Unix operating system made by Apple Inc. It is named after Charles Darwin. Darwin is used as the base of Mac OS X, but it cannot run Mac OS X programs by itself.

Data Base Task Group

The Data Base Task Group was a working group founded in 1965 by the Cobol Committee, formerly Programming Language Committee, of the Conference of Data Systems Language. In April 1971, The DBTG published a report containing specifications of a Da ...

Data center

Data center is a special building or room built to house a lot of running computer servers. It provides fast network connections between servers to communicate and process a lot of data, and some for talking to the outside world. There are coolin ...

Free and no ads
no need to download or install

Pino - logical board game which is based on tactics and strategy. In general this is a remix of chess, checkers and corners. The game develops imagination, concentration, teaches how to solve tasks, plan their own actions and of course to think logically. It does not matter how much pieces you have, the main thing is how they are placement!

online intellectual game →