Server & It's Types.

• Servers : A server is a computer that shares its resources across the network. It responds to client's requests. Depending upon the services provided by the servers, there are different types of specialized servers. Types of Servers : • File &...

Applications Of The Internet.

• Electronic mail (e-mail) : Using e-mail a user can send text, pictures, sounds, programs or even movies to even movies to any other person on the Internet. • News group : The messages sent to a newsgroup are simply posted or the electronic...

Carbon Footprint

    A carbon footprint reflects the impact of a person’s activities on the environment. Our planet owes its comfortably warm temperatures to greenhouse gases. Solar radiation travels through the atmosphere, strikes Earth’s surface, and is...

What is E-mail & How It Works?

E-mail is the most common use of the Internet. Using e-mail a user can send text, picture, sound, programs or even movies to any other person on the Internet anywhere in the world. Each user on the Internet has a unique address in the format - user...

Bioethics Video Production

    Bioethical decision making requires an understanding of science and technology. Introduction Genetics is a fast-paced branch of science that is changing the way people think and live. Advances in the field of genetics, the branch of biology...

What is Software & It's Types?

Even though the computer is the heart of any information system, it is dead or useless without software. Software brings life to the computer. Computer  have only two legs : Hardware and Software. Without software, hardware is of no use and without...

What is LAN?

LAN stands for 'Local area Network'. It is network which interconnects multiple stations (ex. user or nodes) over a very small area is called LAN. Generally, LAN have users up to 100 only. LAN's are widely used in companies to connect several...

Internet Risk and Dangers to Avoid

Beware identity: in real life, if someone wears the mask you may notice right away. On the web is very simple take on identities other than the real one. So never give addresses, phone numbers or other information that will make it traceable to...

Here is a simple registry trick to do so to prevent your computer from Pendrive Viruses. Try this trick with care. 1. Go to start --> Run, type Regedit. 2. Go to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlset \ Services \ USBSTOR 3. On the...

What is "Protocols" & It's Types.

Protocols are the rules and procedures for communicating. For two computers to communicate, they must speak the same language and agree on the rules of communication. Each protocol has a different purpose and function. When a set of protocols work...

Some Less Known Excel Functions

Most of us use Excel functions and are very much aware of quite a few ones like SUM, COUNT, AVERAGE, VLOOKUP, SUMIF etc. However, there are some of them which are not known to many.   CHOOSE(): This function picks one entity/value from a list,...

PIXEL IN COMPUTER GRAPHIC

In computer graphics, picture or graphic objects are presented as collection of discreet picture element called as "Pixel". Pixel may be defined as small size object or colors spot that can be display on address on monitor. Any image that is...

General programming Package

It is a part of a graphic softwares. A general graphics programming package gives extension set of graphic function which is used in the high  level programming language like 'C' and 'FORTRAN'. Example of general graphic programming package...

Something Knowledge About Cryptography

Deleted.

Deleted.

Network Policy Continues

Deleted.

Network Policy

Deleted.

OSI Data Link Layer

The OSI data link layer is intended to frame data from higher layers for transmission across the physical layer. The messageframes are used to mitigate data errors received from thephysical layer. For multinode networks, the data link layer...

Message Authentication

The original digest needs to be trusted to be valid in order for the receiver to validate its digest. A way to protect the access to the original digest is to set up a secure database and allow minimum access to it. Another way to protect the...

What is Transmission Control Protocol ?

The Transmission Control Protocol (TCP) is the single most widely used transport layer protocol. TCP is used by the majority of the common application layer protocols, including FTP, email (SMTP), Web (HTTP), Telnet, and Secure Shell (SSH). Nearly...

Powered by CjBlog