Skip to main content

A C Roynon

  • Blog
  • About
  • Contact
  • Links

Tag: computer systems

What is a Firewall?

25th March 202025th January 2020 acroynon Leave a comment

A firewall is a network security system that is used to monitor and filter incoming and outgoing network traffic on a network or host basis. Firewalls are usually used to create a barrier between a trusted network and an untrusted … Click to read more

The Difference Between a LAN and a WAN

20th March 202025th January 2020 acroynon Leave a comment

The difference between a Local Area Network (LAN) and a Wide Area Network (WAN) is the expanse and physical size of the network. If you’re unsure what a computer network is or need a refresher on what makes a computer … Click to read more

Data vs. Information

16th December 201912th October 2019 acroynon Leave a comment

Data and information are often confused or used interchangeably when in fact they have two different meanings. Information refers to stuff that is readable and understandable by a human, it is human-readable. Such as a plain text password or a … Click to read more

What is Encoding?

9th December 201912th October 2019 acroynon Leave a comment

Encoding is the process of transforming the format of information into a different format required for consumption by a different program or service. This can be compared to translating natural languages, like English or French, so that the other person … Click to read more

What is Encryption?

2nd December 201912th October 2019 acroynon Leave a comment

Encryption is the process of securing information and translating it into unreadable data. Encryption is a two-way process, which means anything that is encrypted can be decrypted too. It is often used to secure users’ passwords or to secure sensitive … Click to read more

What is Phishing?

25th November 201911th January 2020 acroynon Leave a comment

Phishing is a malicious attempt of getting someone’s private login details to a service or application. A phishing attack will be comprised of three parts, the initial entrance, the malicious mock website, and the saved details. You have probably seen, … Click to read more

Concurrency vs. Parallelism

18th November 201913th October 2019 acroynon Leave a comment

Concurrency and parallelism are two distinct words with distinct meanings that are often misused or confused. They both refer to the execution of multiple tasks and how multi-tasking is handled by the computer.

Parallelism is true multi-tasking, where two or … Click to read more

Ethernet Cables Explained

11th November 201911th October 2019 acroynon Leave a comment

Ethernet cables are used within networking to connect computers to devices or other computers. Ethernet cables can be found plugged into routers, or into a client computer to supply network and internet access. They have a small plastic connector clip … Click to read more

What is a Network Packet?

4th November 201911th October 2019 acroynon Leave a comment

A network packet is a formatted unit of data that is sent through a packet-switched network. A packet will contain the data that is sent through the network as well as information about that data and other metadata to help … Click to read more

The TCP/IP Model

28th October 201921st August 2019 acroynon Leave a comment

TCP/IP stands for Transmission Control Protocol / Internet Protocol. It is basically a protocol or set of rules, that was developed by the Department of Defence (DoD) in 1974 about how to send data from computer to another computer across … Click to read more

Posts navigation

1 2 Older posts
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Privacy Policy

Popular

  • Relational Databases Explained
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP
  • What is Encryption?
  • The TCP/IP Model
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 5
  • What is Programming Syntax?
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 8
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 3
  • Concurrency vs. Parallelism
  • JavaScript Spread Operator Explained
  • What is a Database?
  • What is PHP?
  • Functions in JavaScript
  • Open-Closed Principle
  • Ethernet Cables Explained

Recent

  • Dependency Inversion Principle
  • Interface Segregation Principle
  • Liskov Substitution Principle
  • Open-Closed Principle
  • Single Responsibility Principle (SRP)
  • The SOLID Principles
  • What is a Firewall?
  • What is Steganography?
  • The Difference Between a LAN and a WAN
  • JavaScript Destructuring Explained
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 11
  • JavaScript Spread Operator Explained
  • JavaScript Arrow Functions Explained
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 10
© A C Roynon - Copyright 2021