Recent Topic About Tutorials

Distributed systems

Other Tutorials
A distributed system is defined as a collection of computers connected by a network, and with the appropriate distributed software so that the system is seen by users as a single entity capable of providing computing facilities. Distributed systems are implemented on various hardware platforms, from a few workstations connected by a local area network, to the Internet, with a …

DNS Resolver

Other Tutorials
Whenever we connect to a service on the Internet, be it a website, a mail server, a remote terminal server, or any other service, we usually do so by invoking a domain name. In this article we will talk about the domain name system, or DNS (Domain Name System), and its operation. Now, every connection between us and any service …

Candidate Key

Other Tutorials
We call the candidate key of a relation (or simply key) to the attribute or set of attributes that have the property of uniquely identifying a tuple within the relation. The keys are the basic tuple level addressing mechanism in a relational system, that is, it is the only way, guaranteed by the system, to locate a specific tuple. Let’s …

Binary Code

Other Tutorials
Perhaps one of the most used numbering systems in the world is the binary code, because although it is true that the numbering system that we usually use is the decimal system, the binary code is used by computers and by all devices computers for everyday use. It is for this reason, that this binary language is very important for …

Functional dependence: what is it?

Other Tutorials
The concept of functional dependence appears in several contexts of mathematics and logic and refers to certain mathematical entities can be expressed as mathematical functions of other entities. The concept of functional dependence is a generalization of the concept of linear dependence. It is said that a set of functions is functionally dependent when there is a functional relationship between …

What is a Loopback plug?

Other Tutorials
A loopback plug allows us to test if the Ethernet transmission and reception electronics are working correctly, with it we can easily locate damaged ports in network cards or in a switch. In addition, this tool is necessary for laboratory or test environments, in which we need our Ethernet network adapter to detect connection to the cable and if is …

What are the Functional Testing?

Other Tutorials
The functional tests are usually the last tests that are carried out at the time of giving the pass to production to any type of software. This type of tests are also called “Black Box”, since the “Tester” focuses on analyzing the input and output data to define test cases that will be ready before the start of these. The …

What are VPN Concentrators?

Software
In today’s society, any company needs to be up-to-date on all the topics of networks, computing and technology, to offer a better service to its customers and to have greater security and be protected from computer attacks that may come from outside. In addition, a better network system and better equipment makes it easier for employees to carry out their …

Referential Integrity

Other Tutorials
This topic is one of the most important aspects to add consistency to database designs. Integrity constraints help maintain the semantic consistency of the data. Integrity constraints provide a means of ensuring that modifications made to the database by authorized users do not cause loss of data consistency. That is, they protect the database against accidental damage. One of those …

What is a Domain Controller?

Software
Normally the Windows operating system saves the passwords of the users in a file called SAM in the folder \WINDOWS\system32\config\ So far we’re doing fine: We have a computer that keeps its own passwords on its own hard drive. A domain controller is a computer in which all the passwords of network users are stored centrally. Each computer will still …