Top videos
Part 05 of C# .net Bootcamp.
In this lesson, we are goiing to learn about how to install Microsoft Visual Studio Code, especially when you are user of macOS and Linux operating systems. Windows version can be viewed on previous video.
Learn how the end of Greek unity brought down the astonishing political and cultural successes of the early 5th century, culminating in one of the most shameful episodes in Greek history: the trial and execution of one of its greatest thinkers, Socrates.
The best debaters understand the need for strategic flexibility, and concessions are one of the most powerful strategic moves in the playbook. As you will find out in this lecture, conceding points allows you to focus on your best arguments, or get out of a difficult spot, or even set a trap for your opponent.
Part โฃ49 of C# .NET Bootcamp: Passing Value-type Parameter in C#
Investigate the phenomenon of the British East India Company, a militarized trading organization of astonishing power and reach. Learn about the Company's seizure of the strategic Yemeni port of Aden, which became a trading center of global importance, heralding Britain's century-spanning imperial presence in the Middle East.
Part 08 of Computer Networking Fundamentals: Network Topologies
Network Topology
At the end of this episode, I will be able to:
- Compare and contrast network topologies.
Learner Objective: Compare and contrast network topologies.
Description: In this episode, the learner will explore different network topologies such as bus, ring, star, mesh and hybrid network topologies.
- Introduction to Network Infrastructure
- Network Topology - This defines the arrangement of network elements such as nodes, connectivity devices, connections and how these relate to one another as well as the flow of the data. There are two way to depict topologies, physical and logical.
- Physical topology - describes the tangible arrangement and aspects of the network elements.
- Logical topology - describes the flow of the data across a network's elements.
- Types
- Bus - a topology in which all devices on the network are connected to a central network media (bus) such as coaxial cabling. This type of topology has been phased out due to performance and scalability issues.
- Ring - a topology in which all devices are connected to a network media with and upstream and downstream "neighbor" forming a circle. In LAN-based communications, ring-based topologies have been phased out (Token Ring, Fiber Distributed Data Interface or FDDI), however in WAN-based technologies they are still used (SONET).
- Star - a common topology in modern networks in which all devices are connected to a centralized device forming a star pattern.
- Mesh - a complex network topology in which all devices have multiple connections to every other device. This topology is very resilient to connection failures.
- Hybrid - a topology that combines characteristics of more than one of the other topologies.
- Network Topology - This defines the arrangement of network elements such as nodes, connectivity devices, connections and how these relate to one another as well as the flow of the data. There are two way to depict topologies, physical and logical.
โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 20 Part 5
Module 2 Part 3: โฃInput and Output Devices
Module 5 Part โฃ4: Internet Structure and Security Basics
โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 10 Part 5: Command Prompt and PowerShell
โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 15 Part 10: Object-Oriented Programming (OOP)
Conclude your survey of the Islamic Golden Age with a big-picture look at what followed, including the rise of the Ottoman Empire, the Black Death, and the emergence of gunpowder. While golden ages must inevitably subside, this final lecture gives you the opportunity to reflect on one of the most stunning eras in all of human history.
In the late 500s, Japan began an unprecedented project of state building that evolved into the highly centralized, emperor-led Ritsuryล state. As you examine the state's laws and accomplishments, you'll uncover how this political centralization was actually inspired by - and responded to - the emergence of powerful states in China and Korea.
Module 6 Part โฃ3: Authentication, Encryption, and Secure Communication
Module 6 Part โฃ4: Social Engineering, Backup, and Anti-malware
Module 7 Part โฃ5: Digital Etiquette and Emerging Skills
CompTIA IT Fundamentals+ Course | Module 3 Part 3: โฃIntellectual Property
Part 28 of C# .NET Bootcamp: โฃIteration Statements
In this lesson you will learn about iteration statements and how to use them.
โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 12 Part 7: Software Installation Methods