Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
advantages offered by data mining1 facilitates discovery of knowledge from big massive data sets2 can be used within dissimilar application
discuss the process of data mining the process of data mining having of three stages1the initial exploration2 model building or pattern
explain the use of ssl to secure the network ssl secure sockets layer is a protocol developed by netscape for transferring private documents by
firewalls use one or more of three methods to control traffic flowing in and out of the network packet filtering - packets small chunks of data
explain briefly how firewalls protect network a firewall is simply a program or hardware device that filters the information
remote login a login that permits a user terminal to connect to a host computer by a network or direct telecommunications link and to interact
http hyper text transfer protocol the www protocol that performs the request and regain functions of a server generally seen as the first part of a
telnetit is a terminal emulation program for tcpip networks like as the internet the telnet program runs on your computer and attaches your pc to a
b2c -business to consumer this is where the consumer admittance the system of the supplier it is still a two-way function but is usually complete
some of the advantages of b2b arei enhanced customer satisfaction codeii enhanced inventory systemiii simple and cost effective marketingiv
b2b - business to business it is a mode of conducting business among two or more companies over the internet rather than more traditional
what are the benefits of using e-commercebasic benefits of e-commercethe main benefits are enhancing sales and reducing costs the other advantages
define e-commercethe term electronic commerce has develop from electronic shopping to imply all aspects of business and market processes enabled by
the mercantile process model consists of which of the pahasesthe pre-purchase phasepurchase consummation phasepost-purchase interaction
firewalls operate bycreening packets tofrom the network and give controllable filtering of network
hubs are present in the network to interconnect the lan with
ldap stands for ldap- light weight directory access
a router is used todistributes information among
a firewall issoftware or hardware used to separate a private network from a public
the methods of payment for online consumers area electronic cash b creditdebitc electronic
smtp is aprotocol used for transferring message among end user amp mail server
the concept of electronic cash is to implement payment byusing computers over network
secret-key encryption is also called asprivate
html is ahyper text markup language and it is scripting
tool that is used to transfer datafiles among computers on the internet tcp transfer control