Digital Signatures

March 26, 2019 antony 0

Digital signatures are very much like handwritten signatures, they are proof of authenticity. Digital signatures are one of the three data protection methods of authentication. […]

Centralised vs Distributed Databases

March 22, 2019 antony 0

Relational Database Management Systems (RDBMS) support centralised and distributed databases. A centralised database system is in one location (head office, data centre) and accessed from […]

ICT Code of Conduct

March 14, 2019 antony 0

An ICT (Information, Communication and Technology) Code of Conduct is an agreement between a business and its employees. It outlines the expectations of how employees […]

Role of Drivers

March 12, 2019 antony 0

A computer driver (or device driver) acts as an interface between an Operating System and a hardware device. Each hardware device (mouse, keyboard, graphics card, […]

Types of Operating Systems

March 11, 2019 antony 0

When referring to types of Operating Systems in this course you do not refer to “Windows”, “Linux”, “Mac OSX” etc. We refer to the category […]

Network performance

July 9, 2018 antony 0

There are a number of factors that affect the performance of a network. Bandwidth Bandwidth is how much data is transferred over time.  It is […]