|
Subject |
Replies |
Started by |
Views |
Last post |
|
|
UBB Hacks This term falsely gives the impression
that something destructive or malicious
is involved, but when you hear people
talking abo
|
0
|
Tanya
|
1606
|
June 10, 2007, 02:39:29 AM
by Tanya
|
|
|
mail order software mail order software
Mail order
software is software to run your mail
order or Internet business. In response
t
|
0
|
Tanya
|
1607
|
June 03, 2007, 08:04:25 PM
by Tanya
|
|
|
time attendance software time attendance software
Time
attendance software is powerful
management software used to tra
|
0
|
Vatsal
|
1617
|
July 16, 2007, 03:26:36 PM
by Vatsal
|
|
|
Alpha Software receives this label when it is
in the very early stages of development.
Usually full of bugs, so don't
touch it wi
|
0
|
Tanya
|
1621
|
June 10, 2007, 01:02:12 AM
by Tanya
|
|
|
What is NAT ? In computer networking, the process of
network address translation (NAT, also
known as network masquerading or
IP-masquerading)
|
0
|
Shashank Asthana
|
1626
|
November 05, 2006, 12:54:35 PM
by Shashank Asthana
|
|
|
Freeware Unrestricted software that is downloaded
from the net and is completely free to
use. Often paid for using advertising.
|
0
|
Tanya
|
1628
|
June 10, 2007, 01:27:46 AM
by Tanya
|
|
|
Undeletable Pub An anonymous access, public FTP site
where the permission attributes are set
to allow uploads and downloads, but do
not permit d
|
0
|
Tanya
|
1635
|
June 10, 2007, 02:40:09 AM
by Tanya
|
|
|
LED (Light Emitting Diode) LED (Light Emitting Diode)
A
light-emitting diode (LED) is a
semiconductor device that emits
monochromatic lig
|
0
|
Tanya
|
1636
|
June 03, 2007, 08:03:45 PM
by Tanya
|
|
|
spam spam
Unsolicited junk email -
generally advertising for some product
sent wide-scale to a mai
|
0
|
Khushi
|
1637
|
June 17, 2007, 08:48:10 PM
by Khushi
|
|
|
FAQ Stands for Frequently Asked Questions.
|
0
|
Tanya
|
1647
|
June 10, 2007, 01:23:24 AM
by Tanya
|
|
|
What is Hibernation? Hibernation means - An inactive,
dormant, sleeplike state, in which the
total funtions of systems though
inactive, are preserved
|
2
|
Taruna
|
1648
|
January 04, 2007, 01:22:06 AM
by Taruna
|
|
|
Trojans Nasty virus like attachments which can
be merged with executable files. These
are tiny so are unlikely to arouse
suspicion. When
|
0
|
Tanya
|
1654
|
June 10, 2007, 02:37:52 AM
by Tanya
|
|
|
Getright One of the best download managers
available.
|
0
|
Tanya
|
1655
|
June 10, 2007, 01:30:18 AM
by Tanya
|
|
|
Business Intelligence (BI) Business Intelligence (BI) describes the
process of turning data into information
and then into knowledge. The
intelligence beco
|
0
|
Alex
|
1657
|
February 18, 2007, 11:24:41 PM
by Alex
|
|
|
What is the Registry? What is the Registry?
The
Registry is a database used to store
settings and options for
|
0
|
Mark David
|
1657
|
June 12, 2007, 11:43:46 PM
by Mark David
|
|
|
UBB Shorthand for Ultimate Bulletin Board,
currently the most popular script used
for creating warez bulletin boards.
|
0
|
Tanya
|
1658
|
June 10, 2007, 02:38:24 AM
by Tanya
|
|
|
telecom audits telecom audits
There are many
software tracking packages and/or
consulting services that can
|
0
|
Vatsal
|
1659
|
July 16, 2007, 03:24:18 PM
by Vatsal
|
|
|
What is PING ? Ping is a computer network tool used to
test whether a particular host is
reachable across an IP network. Ping
works by s
|
0
|
Shashank Asthana
|
1664
|
October 18, 2006, 02:59:45 PM
by Shashank Asthana
|
|
|
Browser Short for web browser, the software
application you are most likely using to
view this web page. Web browsers are
used to locate
|
0
|
Alex
|
1676
|
February 18, 2007, 11:19:32 PM
by Alex
|
|
|
security software security software
Security software
is a broad term for computer
applications designed so tha
|
0
|
Khushi
|
1677
|
June 17, 2007, 08:43:17 PM
by Khushi
|