Self-Esteem and Success
A person with high self-esteem believes that they are a worthwhile and important person. A person with low self-esteem believes that others are better than them, and that they deserve to treated badly by others. More ...
A JavaScript Function That Returns a Function
Its a fad now in JavaScript to code functions that return functions in order to avoid declaring global variables but the procedure is inefficient and unnecessary. More ...
Windows 10 Shortcut to Turn Laptop Camera On or Off
To prevent hackers from sneaking a look at you, turn your laptop camera off. This article shows you how to place a shortcut on your desktop that you can use to quickly turn your laptop camera on or off. More ...
Fundamental Digital Logic Gates
All the advanced features of the most powerful computers, such as mulicore and parallel processing are done with digital logic. In this article I explain the fundamental concept of digital logic in simple and clear language so that anyone can understand it. More ...
Regular Expression Position Matching
In this article you how to use regular expressions to match characters at the beginning, end, both beginning and end, or at any specified location in a string. More ...
Inkscape Text Kerning
Although Inkscape might be considered a vector drawing application, it is also a powerful typographical design program. Actually Text Kerning is not a good title for this article because in it I will cover all the different typographical adjustments you can make in Inkscape. More ...
Learn Assembly Language Programming on Raspberry Pi 400
One of the easiest ways to learn assembly language programming is on the Raspberry Pi 400. The Raspberry Pi 400 is a complete personal computer built into a compact keyboard. More ...
Introduction to Windows PowerShell
PowerShell is a more powerful replacement for the command shell. this article explains how to run PowerShell and how to create and run PowerShell scripts. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...
Area of an Ellipse Calculator
It's easy to calculate the area of an ellipse because it's similar to calculating the area of a circle ecept instead of Pi times the radius squared, its Pi times the long axis times the short axis. More ...
How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...
How to Draw an Airplane
Drawing an airplane is much easier if you first construct two-point perspective guidelines. This article shows you how to draw an airplane in ten easy steps. More ...
HTML5 Header Element
The header element is one of HTML5's semantic elements. It provides a container for header information. A header element may contain ,logo author, navigation, search, version, copyright, and other such information. More ...
What is a Regular Expression?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. Regular expressions are very powerful, but also difficult to understand and complicated to use. More ...
Area of a Quadrilateral Calculator
If you have a regular quadrilateral there are simple formulas to calculate the area. But if you have an irregular quadrilateral you can calculate its area by viewing it as two triangles bucked up against one another. Find the area of each triangle, and then add them together. More ...
Introduction to Operating Systems
An operating system is software that acts as an intermediary between a computer user and the computer's applications and hardware. An operating system can be viewed as a resource allocator. Resources might be CPU time, memory space, file storage space, and input/output (I/O) devices. More ...

