- 32
- 234 698
Muabi Tech
South Africa
Приєднався 8 лип 2020
Muabi Tech is based in Cape Town, South Africa. started with an aim of spreading technical knowledge focused on Computers. Networks, and Network Security with animated videos. IT FeedBack help students and non-techies to understand complex tech with animated videos.
Thank you for stopping by.
Thank you for stopping by.
Designing Your YouTube Profile Picture in Photoshop✔✔ | Tech
SUBSCRIBE FOR MORE!
▶️ tinyurl.com/buyrzbre
▶️ tinyurl.com/buyrzbre
Переглядів: 938
Відео
What Is WiFi-6 | Its Features | Tech
Переглядів 1962 роки тому
SUBSCRIBE FOR MORE! ▶️ tinyurl.com/buyrzbre The term “Wi-Fi” was created by the nonprofit Wi-Fi Alliance and refers to a group of wireless networking protocols that are based on the IEEE 802.11 network standard. Wi-Fi has been around since the late ‘90s but has improved dramatically in the last decade. To make the differences between each generation more obvious, the Wi-Fi alliance recently ado...
32-Bit vs 64-Bit: What's the Difference | Tech
Переглядів 21 тис.2 роки тому
SUBSCRIBE FOR MORE! ▶️ tinyurl.com/buyrzbre When it comes to computers, the difference between 32-bit and a 64-bit is all about processing power. Computers with 32-bit processors are older, slower, and less secure, while a 64-bit processor is newer, faster, and more secure. Your computer’s central processing unit (CPU) functions like the brain of your computer. It controls all the communication...
What is an IP Address | Tech
Переглядів 712 роки тому
SUBSCRIBE FOR MORE! ▶️ tinyurl.com/buyrzbre An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.
Metaverse Explained | How To Make Money With The Metaverse | Tech
Переглядів 972 роки тому
SUBSCRIBE FOR MORE! ▶️ tinyurl.com/buyrzbre A metaverse is a network of 3D virtual worlds focused on social connection. In futurism and science fiction, the term is often described as a hypothetical iteration of the Internet as a single, universal virtual world that is facilitated by the use of virtual and augmented reality headsets. The term "metaverse" has its origins in the 1992 science fict...
What Is Botnet | What They Do | Tech
Переглядів 2482 роки тому
SUBSCRIBE FOR MORE! ▶️ tinyurl.com/buyrzbre A botnet is a number of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software. The word "botnet" is a po...
What Is a Computer | Types Of Computers | Tech
Переглядів 672 роки тому
SUBSCRIBE FOR MORE! ▶️ tinyurl.com/buyrzbre A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. A computer is designed to execute applications and provides a variety of solutions through integrated hardware and software components. It works with the hel...
Automated Teller Machine - Explained | Tech
Переглядів 4,9 тис.2 роки тому
SUBSCRIBE FOR MORE! ▶️ tinyurl.com/buyrzbre An ATM, which stands for automated teller machine, is a specialized computer that makes it convenient to manage a bank account holder’s funds. It allows a person to check account balances, withdraw or deposit money, print a statement of account activities or transactions, and even purchase stamps. ATMs were first used in London in 1967, and after 50 y...
What is a Firewall | How it works | Tech
Переглядів 4323 роки тому
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet. SUBSCRIBE FOR MORE! ▶️ tinyurl.com/buyrzbre
OSI Model (Part 2) - Presentation Layer | Tech
Переглядів 8903 роки тому
Presentation Layer is the layer of the ISO Open Systems Interconnection (OSI) model that establishes context between application-layer entities, in which the higher-layer entities may use different syntax and semantics if the presentation service provides a mapping between them. If a mapping is available, presentation service data units are encapsulated into session protocol data units, and pas...
OSI Model (Part 1) - Application | Tech
Переглядів 673 роки тому
Application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network. The application layer abstraction is used in both of the standard models of computer networking: the Internet Protocol Suite (TCP/IP) and the OSI model. Although both models use the same term for their respective highest level layer, the d...
What is a Mac Address | Types of Mac Addresses | Tech
Переглядів 2,7 тис.3 роки тому
A media access control address (MAC address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking technologies, including Ethernet, Wi-Fi, and Bluetooth. Within the Open Systems Interconnection (OSI) network model. MAC addresses are used in the medium access...
Clients vs Servers | Tech
Переглядів 6543 роки тому
Server-side refers to operations that are performed by the server in a client-server relationship in computer networking. Typically, a server is a software program, such as a web server, that runs on a remote server, reachable from a user's local computer or workstation. Client-side refers to operations that are performed by the client in a client-server relationship in a computer network. Typi...
FTP (File Transfer Protocol), SFTP, TFTP Explained. | Tech
Переглядів 11 тис.3 роки тому
FTP (File Transfer Protocol), SFTP, TFTP Explained. | Tech
IP Address Explained - part 1| Tech
Переглядів 1,3 тис.4 роки тому
IP Address Explained - part 1| Tech
How Facebook Earns Money from its Users | Tech
Переглядів 1914 роки тому
How Facebook Earns Money from its Users | Tech
Good job. how can I get a dedicated smtp server ?
My Google is coming up yahoo
It is good job buy make the ai voice better
Thanks
0:46 not 4 billion it's 16 billion
Amazing Good Job 😊😊
Thanks 😊 🫂
ua-cam.com/video/48rz8udZBmQ/v-deo.html
Fuck virus
Thanks for this bro cs exam nearing 😂😂😂 💻💻🖥️🖥️🖱️
It's a pleasure 🙏🏾 comrade
Thank you bro 🎉😊
You're welcome @Anime_tamil_55
While it is true that a 64 bit CPU can address more memory than a 32 bit CPU, it is still limited to 2^48 and not 2^64 bytes of memory. The address registers can hold 64 bit addresses but the hardware only uses the lower 48 bits for actual addresses. Another advantage of a 64 bit CPU is that all of the internal CPU registers are 64 bits so it can natively perform 64 bit arithmetic operations.
And did sis sis skta skc Diya woh anku moh kab
靠,学个习要练英语就算了,关键这口音好魔性
cool video)
Thanks 😊
fire video brother🔥🔥🔥
Thanks broh
Do not use a Robot Voice for future videos, it is evident and annoying. 🫣
Full form of VIRUS-- VERY IMPORTANT RUSSIAN UNDERGOING SEX 😂😂😅😅😅
it's why you don't make friends on discord or use discord
💯💯💯
Thanks for sharing this 🙌
🙏🏾🙏🏾🙏🏾 it's a pleasure
Thank you very much 😊😊😊😊
Out Use Vaccum a the virus can
👊🏼👍🏾
NOW'S YOUR CHANCE TO BE A [BIG SHOT]
👊🏼👍🏾
nice
Thanks 💯
👍
Very helpful, thank you!
You're welcome @Spencer
Educational 🤗🤗🤗🤗
🤗
Between WAN and Firewall or between WAN and LAN ?
DMZ is Should be WAN and SERVER, So 2firewalls should be Configured in that network 1 . External Firewall 2. Internal Firewall
Too bad my wifi is next level potato 11.0 kilobytes a second someone kill me😐
interesting video ua-cam.com/video/shF7ZmhbFrk/v-deo.html
🙌🙌🙌🙌🙌🙌🙌🙌
Thx sir it was really helpful
6 year old me trying to download free Minecraft
😂
Your name is Humaira ?
Me too bro it always says "this may harm your device" but I be like: LIKE hell I care!!! But my phone smarter than me it usually ends up deleting the app by the next day. :(
@@katherine_thru092-of2rm is it ur new Google Account?
hahahaha i am dead laughing at this overused joke for the billionth time
Couldn't you use your own voice?
Will buy a professional mic soon with noise cancelation
@@muabitech If we can understand you properly, it's good enough in my view.
vai kisu buji nai ?oi rokom t pailen koi ? voice thakla aro vlo hoto 🙂
Audio will be better in future videos I promise
i made a computer virus disables mouse lads computer and deleteds system 32
💯👍🏾👊🏼
Can your wi-fi provider know when you use M.A.C to get connected
class 7 Hamdan zerrak sufiyan
konkon pehchana
Thanks
Explain how devices get their MAC or IP address.
this vid gave me the goosbumps
Thank u so much
You’re welcome Lady
Trojan horse make a video pls
👌👌👌
Awesome explanation
Great 👍 thanks man
👍👍👍🎁🎁
In terms of processing
Educational like it
emotional like it more
Nice vid though
I’d rather go for 32 bit