Learn web design, computer maintenance, programming, computer architecture, computer networking, electronics, mathematics, art and graphic design.

The Mechanical Universe

Draw with your finger


Learn more at amazon.com

Area of a Quadrilateral Calculator
If you have a regular quadrilateral there are simple formulas to calculate the area. But if you have an irregular quadrilateral you can calculate its area by viewing it as two triangles bucked up against one another. Find the area of each triangle, and then add them together. More ...

The figure and figcaption Tags
The html figure element is a container for an image and optionally for a figcaption element that defines a caption for that image. More ...

Inkscape Exercise: Draw Photorealistic Sphere
Although Inkscape is a 2D drawing application, it is quite capable of drawing photorealistic 3D images. To demonstrate this capability, in this article I show you, step-by-step how to draw a photorealistic sphere. More ...

Inkscape Text on Path
One of the most amazing things Inkscape can do, and one of the easiest, is to place text on a curved path. You can even make the text go in a circle. More ...

Find Your WiFi Password on Windows 10
One of the most common reasons to find your Wi-Fi password is to use it on another PC or device to connect to your Wi-Fi network. Here's how. More ...

Html5 section vs article Element Best Practices
Many new semantic elements where added to HTML5. The purpose of most of these new elements was easily discernible. But a web search reveals that there is much confusion about the relationship between the article and the section element. More ...

Inkscpe Snap Controls Bar
some Inkscape users find snap annoying and so they disable it. Other Inkscape user's could not possibly work without snap. You can convert SVG to STL to print 3D models. But to do that you need accuracy that you cannot achieve without snap. More ...

Introduction to Windows PowerShell
PowerShell is a more powerful replacement for the command shell. this article explains how to run PowerShell and how to create and run PowerShell scripts. More ...

EMI, RFI, EMC, EMS, What's the Difference?
EMI, RFI, EMC, and EMS all refer to different aspects of radio frequency interference which may cause elecronic devices to malfunction. Correcting these problems can be an art and a science. More ...

Windows 10 Disable Aero Snap and Shake
With Aero Snap and Shake Windows does what it wants to do, not what you want it to do. More ...

Introduction to Operating Systems
An operating system is software that acts as an intermediary between a computer user and the computer's applications and hardware. An operating system can be viewed as a resource allocator. Resources might be CPU time, memory space, file storage space, and input/output (I/O) devices. More ...

IPv6 Address Compressor Expander
Enter the IPv6 address in the top text box. Click on the appropriate button: Omit Leading Zeros, Consolidate Zeros Segments, Expand Zeros Segments, Replace Leading Zeros. The formatted address will appear in the bottom text box. More ...

A Handful of Useful Run Commands: calc, notepad, wordpad, voice recorder, control
The Run dialog box which can be opened by pressing the [Windows] + [R] keys. Run dialog box is a rapid way to open programs. Here are some quick and useful Run commands. More ...

Regular Expressions Boundaries
In this article you learn how to controls where a regular expression matches a string, on a word or non-word boundary, at the beginning or end of a string. You also learned about multiline mode. More ...

IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...

Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...


See it at amazon.com

Custom Search