Hanyaqusendiri
-
Hurm,,boing glewr r arie niew...x tau r na wat pe hehehe..
-
Second Generation (1956-1963) Transistors Transistors replaced vacuum tubes and ushered in the second generation of computers. The trans...
-
Security Measures If you do not at least have a personal firewall and anti-virus protection then you should not connect your computer to the...
-
Education Teacher use computers to research for teaching materials, participate in online forum and online conferences. Students use compu...
-
{ 4 }Cryptography Information security uses cryptography to transform usable information into a form that renders it unusable by anyon...
-
{ 2 }Firewall To answer that question, some networking background information must first be outlined. I will try not to get too technica...
-
Fifth Generation (Present and Beyond) Artificial Intelligence Fifth generation computing devices, based on artificial intelligence , are...
-
{ 3 }Backup When backing up your data, you will need some offline storage device such as one or more of: Tape Storage Device. Zip...
-
Fourth Generation (1971-Present) Microprocessors The microprocessor brought the fourth generation of computers, as thousands of integr...