• A suite of protocols developed by Apple for computer networking. It was included in the original Macintosh (1984) and is now deprecated by Apple in favor of TCP/IP networking. more »
    A suite of protocols developed by Apple for computer networking. It was included in the original Macintosh (1984) and is now deprecated by Apple in favor of TCP/IP networking. more »
  • The subnet mask is used in conjunction with the network address to determine which part of the address is the network address and which part is the host address. more »
    The subnet mask is used in conjunction with the network address to determine which part of the address is the network address and which part is the host address. more »
  • Tagged Image File Format (TIFF) is a variable-resolution bitmapped image format. TIFF describes image data that typically come from scanners. TIFF images make use of tags, keywords defining the characteristics of the image that is included in the file.… more »
    Tagged Image File Format (TIFF) is a variable-resolution bitmapped image format. TIFF describes image data that typically come from scanners. TIFF images make use of tags, keywords defining the characteristics of the image that is included in the file.… more »
  • An Internet Service Provider is a company that lets you access the Internet from your home or office by using a DSL modem, a cable modem or any other device (including sattelite links, etc.). They are a gateway between the connection that goes into your… more »
    An Internet Service Provider is a company that lets you access the Internet from your home or office by using a DSL modem, a cable modem or any other device (including sattelite links, etc.). They are a gateway between the connection that goes into your… more »
  • FTP is a protocol for transferring files over TCP/IP networks such as the Internet. To transfer files, you need to connect to an FTP server with some FTP client software. FTP can be used to transfer very large files, especially files that are too… more »
    FTP is a protocol for transferring files over TCP/IP networks such as the Internet. To transfer files, you need to connect to an FTP server with some FTP client software. FTP can be used to transfer very large files, especially files that are too… more »
  • Term used for a toner usage measurement on laser printing. For example, 5% coverage means that an A4 sided paper has about 5% image or text on it. So, if the paper or original has complicated images or lots of text on it, the coverage will be higher and… more »
    Term used for a toner usage measurement on laser printing. For example, 5% coverage means that an A4 sided paper has about 5% image or text on it. So, if the paper or original has complicated images or lots of text on it, the coverage will be higher and… more »
  • The Digital Living Network Alliance (DLNA) is a standard that allows devices on a home network to share information with each other across the network. more »
    The Digital Living Network Alliance (DLNA) is a standard that allows devices on a home network to share information with each other across the network. more »
  • HTML is the language used to create web pages such as the one you are currently looking at. HTML is a standard normalized by the W3C. more »
    HTML is the language used to create web pages such as the one you are currently looking at. HTML is a standard normalized by the W3C. more »
  • A network protocol used by a network client to obtain its IP address automatically. This is usually done during the bootstrap process of computers or operating systems running on them. The BOOTP servers assign the IP address from a pool of addresses to… more »
    A network protocol used by a network client to obtain its IP address automatically. This is usually done during the bootstrap process of computers or operating systems running on them. The BOOTP servers assign the IP address from a pool of addresses to… more »
  • Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE 802.11 standard to provide the same level of security as the one of a wired LAN. WEP provides security by encrypting data sent wirelessly so that it is protected as it is… more »
    Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE 802.11 standard to provide the same level of security as the one of a wired LAN. WEP provides security by encrypting data sent wirelessly so that it is protected as it is… more »