Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
what are the internal threatsinternal security problems are probably the most common one never knows what someone is going to do even the most loyal
categories to access the intranet persons who can find access to the intranet can be put into three categories1 those who can enter the site2
how to prevent the data from hackersin order to prevent intruders from entering the house it is necessary for the house owner to look after the
latest internet and intranet technologieseven though the security capabilities of the latest internet and intranet technologies have enabled the
define about the term - hackersevery time technology updates itself new techniques evolve at the same time thieves or intruders in the information
state the security concernsthe history of security concerns is not new they have been of great worry to man and for many centuries man has been
determine the objectives of computer securitythough computerisation helps a lot in proper organisation of experience it also opens a pandoras box
determine the benefits of security on internet or intranetsecurity has long been seen as a major threatening point in the implementation of the
describe any good security technologya good security technology should be powerful enough to support the features that the administrators need
state the example of intranet securityimagine a situation when a company develops a major new product secretly using its intranet hackers break the
what is intranet securityevery company starts its operations with a genuine and honest thinking as time passes based on the needs of its employees as
determine the term- web server and webmasterweb server a host computer that stores web pages and responds to requests for viewing web servers
differentiate between web and web pageweb or net the world wide web a server consisting of a hypermedia system linking sounds text pictures video
what is uniform resource locator address of location for accessing web pages clicking on an icon or hot text is the most common means of accessing
determine about the tcpip stands for transmission control protocolinternet protocol this is the group of protocols that define the internet and
illustrate the term- search engine and surfingsearch engine software used to find information on the web examples are google lycos and yahooserver a
discuss about the jpeg and ldapjpeg stands for joint photographic experts group a standard format of storing digitized colour or
explain the working of isdn stands for integrated services digital network it is a way to move more data over existing regular phone lines isdn is
full form of httpd it stands for http daemon httpd is the program run on a unix platform to establish a web server on other platforms such as
what is daemon a daemon is a unix background process that implements the server side of a protocol daemons are unique to unix for example ftp stands
determine the use of icon a small picture or graphic used to represent a location in the inter- or intranet for example a flow-chart graphic to take
diiferentiate between html and httphypertext markup language html the language used in writing pages for the world wide web knowledge of not html is
enumerate about the home page and hot linkshome page the primary web page for an individual or organisation these pages link to other related
define the term - graphics interchange format a type of graphics file found frequently on the net a picture of a vice-president for example may
explain the term ftp file transfer protocol a very common method of moving files between two internet sites ftp is a special way to log in to another