Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
what are the types of security features employed in client server kinds of networksecurity features employed in client-server types of network are as
explain about the network securitynetwork security implies the protection of networks and their services through unauthorized access destruction or
what are the uses of ramps rampsit is a network planning method which makes the most efficient use of manpower cash resources and materials among
what are the uses of routerroutera router is used to transfer or route data among two or more similar networks this determines the next network point
what is the use of digital switch digital switchthis is a device which handles digital signals generated at or passed via a telephone companyrsquos
what are the advantages offered by data miningadvantages offered through data mining are given belowa facilitates discovery of knowledge through
illustrated three stages of data mining processstage 1 exploration this stage generally starts along with data preparation that may involve cleaning
how many types of stages include in process of data mining the process of data mining comprised three stages as given belowa the initial explorationb
how many types of keys used to encrypt and decrypt data in secure sockets layertwo forms of keys are used as ciphers to decrypt and encrypt data
how is secure sockets layer relied on the certificatesthe secure sockets layer standard is not a single protocol but quite a set of accepted data
give explanation about the use of ssl to secure the networkssl stands for secure sockets layer is a protocol developed through netscape for
how many methods used to control traffic flowing into and out of the network by firewallfirewalls utilize one or more of three ways to control
describe briefly how firewalls prevent network a firewall is only a program or hardware device which filters the information coming via the internet
what is the functionality of remote loginremote login gives similar functionality of telnet along with the added functionality of not involving a
what is interference of light explain the nessicity of coharent source for obtaining sustain interference
what is software interrupt a software interrupt is initiated by implementing an instruction software interrupt is a special call
what is a microinstructioneach word in control memory having within it a microinstruction the microinstruction specifies one or more
explain auto increment and auto decrement mode the register is incremented or decremented after or before its value is used to access memory
what is instruction cyclea program residing in the memory unit of the computer having of a sequence of instructions the program is implemented in
explain the difference between a subroutine amp macroit is inefficient to have to write code for standard routines for instance reading a
what is software and hardware interruptthe software interrupts are program instructions these instructions are inserted at desired location in a
what is micro operationa micro operation is an elementary operation performed with the data kept in registers 1 register transfer microoperation
explain the significance of different fields of an instructionan instruction is a command given to a computer to perform a particular operation on
explain about flip-flops flip-flops are also called bistable multivibrator a flip-flop is capable of storing 1 bit of binary data it has
what is fish bone diagram or explain ishikawa diagram fish bone diagram is also known as ishikawa diagram or cause and effect diagramit is known as