Archives: Theory

Digital Currencies (Cryptocurrencies)

What is a digital currency? A digital currency is one that only exists electronically.  This means there are no tangible coins or notes you can hold onto or carry around. Why would someone want to…

Trace Tables (Algorithm Dry Runs)

Trace tables are used when performing a dry-run of an algorithm. This could be an algorithm expressed as a flowchart or pseudocode. Trace tables record the outputs for a given set of data, allowing the…

Interrupts

A key feature of any operating system is the ability to handle interrupts. To learn more about operating systems, visit our operating systems page. What is an interrupt? An interrupt is a signal which is…

Counting and Totalling

It is important to understand the difference between totalling and counting. Counting Counting is used to find how many numbers or items there are in a list. Counting can keep track of how many iterations…

Virtual Private Network (VPN)

A virtual private network (VPN) is used to securely access a private network (usually a LAN) from a remote location. VPNs make use of potentially unsafe external (public) communication systems such as the internet. Once…

Computer Network

Connecting stand-alone computers together creates a computer network. Networks can be wired, wireless, or a combination of both. Advantages of computer networks Share data with other users Access your data from other computers File servers…

PANs, LANs and WANs

Networks are often classified as PANs, LANs or WANs. Personal Area Network (PAN) A computer network of devices within close distance of an individual and their work space Examples include interconnecting an individual’s computer, smartphone…

Peer-to-Peer Networks

Peer-to-peer networks are computer networks that do not have a central server controlling the network. Each computer is called a peer, and these peers are connected to one another. No computer has control over another….

Popular Tags

Categories

  • No categories

Archives