Top videos

Here, learn how a little-known 18th-century alliance in the Middle East came to have profound reverberations in our contemporary world. Study the pact between a desert ruler and a religious reformer that initiated a structure of political and religious power that continues to dominate the modern kingdom of Saudi Arabia.

Alvin Muslim Sardar
28 Views ยท 3 months ago

OSN-K Informatika 2024

C# Bootcamp (Udemy)
46 Views ยท 2 years ago

Part 36 of C# .NET Bootcamp: Namespaces in C#

Networking Fundamentals (Udemy)
197 Views ยท 2 years ago

Part 0โฃ5 of Computer Networking Fundamentals: Demarcs and Perimeter Networks

Demarcation and Perimeter Networks

At the end of this episode, I will be able to:

  1. Describe the characteristics and importance of demarcation points and perimeter networks.

Learner Objective: Describe the characteristics and importance of demarcation points and perimeter networks.

Description: In this episode, the learner will explore what demarcation points and perimeter networks are as well as what the importance of these technologies are in networking.


  • Introduction to Network Infrastructure
    • Demarcation point - The physical point that a carrier's network connection ends and a private network starts (think network boundaries). The term demarcation is often abbreviated demarc.
      • Types of demarcation points
        • Residential - These are utilized in homes, either at the first socket (typically the kitchen) or a junction box on the exterior of the house
        • Business - These demarcation points are either installed on the exterior of the building, or the carrier will install a specialized device within the interior of the building at a main distribution frame (think server closet/datacenter)
      • Demarcation wiring runs either overhead or underground
      • A demarc is important to understand in networks today as this marks the point of responsibility for networked components and service. The carrier's network up to the demarc is the responsibility of the carrier, however the demarc point that connect on the residential or business side is the responsibility of the subscriber.
      • Demarc connections can be fiber, coaxial or PSTN lines
    • Perimeter Network (Screened Subnets) - A logical boundary between a privately owned network and the Internet. There are other names for perimeter networks such as demilitarized zone (DMZ), screened subnet and edge network.
      • Purpose
        • Security - A companies internal network must remain secure and not allow public access. Most organizations will install security devices in the perimeter network to control the flow of inbound and outbound traffic such as firewalls, intrusion detection systems (IDSs), intrusion prevention systems, honeypots or devices called unified threat management systems (UTM) which combine all the previous devices' functionality into one centralized device.

Seni Budaya Tingkat SMA
26 Views ยท 3 months ago

Presentasi Kritik Tari

Dion Training CompTIA IT Fundamentals+
23 Views ยท 4 months ago

โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 8 Part 9: Configuring a Wireless Network

Investigate the epochal turning point of the breakup of the Ottoman Empire and the abolition of the Islamic caliphate - Islam's supreme religious authority - after 1300 years. Witness the remapping of the Middle East by the imperial powers of Britain and France, the impact of these changes on the region, and the emergent states of the modern Middle East.

C# Bootcamp (Udemy)
34 Views ยท 2 years ago

Part 48 of C# .NET Bootcamp: Creating Structure data type using struct Keyword in C#

Dion Training CompTIA IT Fundamentals+
30 Views ยท 4 months ago

โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 20 Part 4

Dion Training CompTIA IT Fundamentals+
21 Views ยท 4 months ago

โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 18 Part 5

Dion Training CompTIA IT Fundamentals+
63 Views ยท 4 months ago

CompTIA IT Fundamentals+ Course | Module 2 Part 4: Decimal Notation

Dion Training CompTIA IT Fundamentals+
24 Views ยท 4 months ago

โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 12 Part 8: Removing or Uninstalling Application Software

Eka Sugandi
77 Views ยท 2 years ago

โฃPercobaan Ayunan Bandul - Menentukan besar percepatan Gravitasi

The Art of Debate (The Great Courses)
28 Views ยท 3 months ago

Now that you know when to debate, shift your attention to what to debate. The "proposition"โ€“the idea up for debateโ€“is one of the most important concepts to understand, and in this lecture, you will survey how to structure the proposition most effectively-and consider who is making the ultimate decision.

Understanding Japan A Cultural History
165 Views ยท 3 months ago

Get an engaging introduction to ancient Japanese myths, collectively known as Shintล ("Way of the Gods"). Focusing on the oldest written compilation of Japanese oral tradition, the Kojiki, you'll examine fascinating stories about gods and heroes, the origins of the universe, the Rock Cave of Heaven, rival clans, and more.

Dion Training CompTIA IT Fundamentals+
35 Views ยท 4 months ago

CompTIA IT Fundamentals+ Course | Module 4 Part 7: Internet of Things (IoT) Devices

C# Bootcamp (Udemy)
52 Views ยท 2 years ago

Part 12 of C# .NET Bootcamp: What is C#?

In this lesson you are going to learn about what is C# programming language, how it's created and how it's used for.

Networking Fundamentals (Udemy)
61 Views ยท 2 years ago

Part 14 of Computer Networking Fundamentals: Network Hardware

Network Hardware

At the end of this episode, I will be able to:

  1. Compare and contrast common network hardware.

Learner Objective: Compare and contrast common network hardware

Description: In this episode, the learner will be introduced to common network hardware.


  • Introduction to Network Infrastructure
    • Network Hardware
      • Network adapters - a component that controls network communications for the device it is connect to or integrated into
      • Repeaters/extenders - a network component that regenerates a signal, then re-transmits the signal to propagate the communications farther.
      • Hubs - an older, largely obsolete network connectivity device that acts as a multi-port repeater. These network components do not make decisions on where to send the traffic and can reduce performance.
      • Switches - a network connectivity device that forwards network communications between a series of ports. These devices rely on direct connections and use MAC addresses to determine where to send traffic.
      • Routers - a network connectivity device that forwards traffic between networks based on IP addresses.
      • Firewalls - a network component that is used to secure and control network traffic based on predetermined criteria.
      • Voice Over IP (VoIP) phones - a network device can digitizes voice communications that can be routed across TCP/IP networks.
      • Access points - a network connectivity device that allows wireless clients access to a wired network.
      • Cable modems - a common network connectivity device used to provide Internet access using coaxial media.
      • Dial-up modems - a network connectivity device that modulates and demodulates a digital signal, sent over analog PSTN (public switched telephone network) lines.

The 1683 Ottoman siege of Vienna is often cited as a critical turning point in European history. Investigate the events leading to the siege and battle, witness the dramatic defense of the city under the Polish king Jan Sobieski, and examine both the legacy of the clash and historical misconceptions surrounding it.

Alvin Muslim Sardar
29 Views ยท 3 months ago

OSN-K Informatika 2024




Showing 1 out of 2