Ask questions which are clear, concise and easy to understand.
Ask QuestionPosted by Yanika Bhardwaj 4 years, 2 months ago
- 1 answers
Posted by Success Revenger 4 years, 2 months ago
- 0 answers
Posted by Lakshay Kaushik 4 years, 2 months ago
- 1 answers
Tec Om 4 years, 2 months ago
Posted by Pallavi Prasad 4 years, 2 months ago
- 1 answers
Meghna Thapar 4 years, 2 months ago
1. Privacy Concerns: 90 percent of devices collected at least one piece of personal information via the device, the cloud or the device’s mobile application. The vast majority of devices collecting information like name, address, date of birth or even health and credit card information. Even worse is the fact that many devices transmit this information across networks without encryption. If users misconfigure their home network, then they are only one step away from exposing this data through wireless networks. Cloud services, which many of these devices use, are also extremely vulnerable. However, it is likely that the majority of these devices actually need personal information to function.
2. Insufficient Authentication/Authorization: 80 percent failed to require passwords of sufficient complexity and length. A huge number of users and devices rely on weak and simple passwords and authorizations. Citing examples of this, HP found that many devices and their cloud components accepted passwords like “1234” or “123456”. Many users that configured accounts with weak passwords also used the same password in the cloud for cloud products. HP points out that a strong
password policy is basic security, but even still most solutions failed.
3. Transport Encryption: 70 percent of devices used unencrypted network services. Transport encryption is where information that is being transferred from one device to another device is encrypted from the outset of any communication. Transport encryption will be crucial given that most of the devices are transmitting data that most people would consider crucial. However, most devices surveyed failed to encrypt data, even when the devices were using the Internet. HP noted that the need for encryption is particularly strong given the amount of information that is being passed between the device, the cloud and mobile applications.
4. Web Interface: 60 percent raised security concerns with their user interfaces. These issues included:
persistent cross-site scripting, poor session management and weak default credentials. From this, hackers were able to identify valid user accounts and take them over using things like password reset features.
5. Insecure Software: 60 percent did not use encryption when downloading software updates. Given the number of software updates that will be required to make everything work together, HP says that it was “alarming” to find that so little of this software was encrypted during downloads. Even worse, some of the downloads that were tested could be intercepted and uploaded into a file system in Linux where the software could be seen or even modified.
Posted by Pallavi Prasad 4 years, 2 months ago
- 1 answers
Meghna Thapar 4 years, 2 months ago
Telnet is a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network (such as the internet). Using telnet client software on your computer, you can make a connection to a telnet server (that is, the remote host). A remote login facility permits a user who is using one computer to interact with a program on another computer. The Internet's remote login service is called TELNET. To use the service, one must invoke a local application program and specify a remote machine.
Posted by Pallavi Prasad 4 years, 2 months ago
- 1 answers
Meghna Thapar 4 years, 2 months ago
A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives and then sends back without changing or altering it. An HTTP cookie is a small piece of data stored on the user's computer by the web browser while browsing a website. Cookies were designed to be a reliable mechanism for websites to remember stateful information or to record the user's browsing activity.
Posted by Himanshu Choudhary 4 years, 2 months ago
- 1 answers
Yogita Ingle 4 years, 2 months ago
- Primary memory is also called internal memory whereas Secondary memory is also known as a Backup memory or Auxiliary memory.
- Primary memory can be accessed by the data bus whereas Secondary memory is accessed by I/O channels.
- Primary memory data is directly accessed by the processing unit whereas Secondary memory data cannot be accessed directly by the processor.
- Primary memory is costlier than secondary memory whereas Secondary memory is cheaper compared to primary memory.
- Primary memory is both volatile & nonvolatile whereas Secondary memory is always a non-volatile memory.
Posted by Himanshu Choudhary 4 years, 2 months ago
- 1 answers
Nidhi Patidar 4 years, 2 months ago
Posted by Himanshu Choudhary 4 years, 2 months ago
- 1 answers
Yogita Ingle 4 years, 2 months ago
1 | Definition | System Software is the type of software which is the interface between application software and system. | On other hand Application Software is the type of software which runs as per user request. It runs on the platform which is provide by system software. |
2 | Development Language | In general System software are developed in low level language which is more compatible with the system hardware in order to interact with. | While in case of Application software high level language is used for their development as they are developed as some specific purpose software. |
3 | Usage | System software is used for operating computer hardware. | On other hand Application software is used by user to perform specific task. |
4 | Installation | System software are installed on the computer when operating system is installed. | On other hand Application software are installed according to user’s requirements. |
5 | User interaction | As mentioned in above points system software are specific to system hardware so less or no user interaction available in case of system software. | On other hand in application software user can interacts with it as user interface is available in this case. |
Posted by Adeeb Raza 4 years, 2 months ago
- 1 answers
Pallavi Prasad 4 years, 2 months ago
Posted by Pallavi Prasad 4 years, 2 months ago
- 1 answers
Yogita Ingle 4 years, 2 months ago
The Internet is a global network of networks while the Web, also referred formally as World Wide Web (www) is collection of information which is accessed via the Internet. Another way to look at this difference is; the Internet is infrastructure while the Web is service on top of that infrastructure. Alternatively, the Internet can be viewed as a big book-store while the Web can be viewed as collection of books on that store. At a high level, we can even think of the Internet as hardware and the Web as software
Posted by Vedha ..... 4 years, 2 months ago
- 1 answers
Yogita Ingle 4 years, 2 months ago
IPO stands for Input, Output and Process.
As the name suggests, IPO cycle is the input and output after process of the data. To get output, u have to first give input and then the input needs to be processed to get your desired result,i.e. Output
Posted by Vedha ..... 4 years, 2 months ago
- 0 answers
Posted by Vedha ..... 4 years, 2 months ago
- 0 answers
Posted by Vedha ..... 4 years, 2 months ago
- 1 answers
Yogita Ingle 4 years, 2 months ago
Input devices
An input device can send data to another device, but it cannot receive data from another device. Examples of input devices include the following.
- Keyboard and Mouse - Accepts input from a user and sends that data (input) to the computer. They cannot accept or reproduce information (output) from the computer.
- Microphone - Receives sound generated by an input source, and sends that sound to a computer.
- Webcam - Receives images generated by whatever it is pointed at (input) and sends those images to a computer.
Output devices
An output device can receive data from another device and generate output with that data, but it cannot send data to another device. Examples of output devices include the following.
- Monitor - Receives data from a computer (output) and displays that information as text and images for users to view. It cannot accept data from a user and send that data to another device.
- Projector - Receives data from a computer (output) and displays, or projects, that information as text and images onto a surface, like a wall or screen. It cannot accept data from a user and send that data to another device.
Posted by Lujian Rongmei 4 years, 2 months ago
- 1 answers
Meghna Thapar 4 years, 2 months ago
Primary memory is computer memory that is accessed directly by the CPU. This includes several types of memory, such as the processor cache and system ROM. ... RAM, or random access memory, consists of one or more memory modules that temporarily store data while a computer is running.
There are two key types of primary memory:
- RAM, or random access memory.
- ROM, or read-only memory.
Posted by Love Isme 4 years, 2 months ago
- 1 answers
Yogita Ingle 4 years, 2 months ago
Primary memory is termed as destructive write memory because the memory stored in it is not permanent. Memory is only saved only during the working of the computer and after the work is completed, it gets erased with out the users command. Each time at the time if re-start it get cleared and refreshed.
Posted by Yanshika Choudhary 4 years, 2 months ago
- 0 answers
Posted by Shivam Jaiswal 4 years, 2 months ago
- 0 answers
Posted by Shivam Jaiswal 4 years, 2 months ago
- 0 answers
Posted by Shivam Jaiswal 4 years, 2 months ago
- 0 answers
Posted by Shivam Jaiswal 4 years, 2 months ago
- 0 answers
Posted by Anjali Thakur 4 years, 2 months ago
- 1 answers
Yogita Ingle 4 years, 2 months ago
Communication processors (CP’s) is used to creating an optimum configuration entails customizing the CP application software according to the operational and functional requirements of the system. This process, called System Generation (SYSGEN), prompts users by a series of questions about the desired configuration and estimates of data traffic.
Communications servers allow any piece of data communications equipment supporting the EIA-232 standard (terminals, modems, printers, hosts, and personal computers) to attach to a network.
Posted by S. Mothi Sree Sannapaneni 4 years, 2 months ago
- 1 answers
Posted by Gadipelli Pravalika 4 years, 2 months ago
- 0 answers
Posted by Monisha Moni 4 years, 2 months ago
- 0 answers
Posted by Aryan Walia 4 years, 2 months ago
- 1 answers
Meghna Thapar 4 years, 2 months ago
A computer consists of five functionally independent main parts input, memory, arithmetic logic unit (ALU), output and control unit. Input device accepts the coded information as source program i.e. high level language. A computer has four main components: the central processing unit or CPU, the primary memory, input units and output units. Every computer system has the following three basic components: Input unit. Central processing unit. Output unit.
Posted by Rakesh Rakesh 4 years, 2 months ago
- 1 answers
Yogita Ingle 4 years, 2 months ago
Advantages in python 'interactive mode':
- 'Interactive mode' is great for quickly and conveniently running 'single lines or blocks of code'.
- In 'interactive mode', we can get the answer 'line by line'.
- It is 'easy to find an error'.
Disadvantages in python 'interactive mode':
- It is 'harder to edit longer programs' or even the existing program.
- We 'cannot write a whole program' in interactive mode.
- If we 'save the program the instructions' also get saved.
Posted by Khushi Joon 4 years, 2 months ago
- 1 answers
myCBSEguide
Trusted by 1 Crore+ Students
Test Generator
Create papers online. It's FREE.
CUET Mock Tests
75,000+ questions to practice only on myCBSEguide app
Dev Lohani 4 years, 2 months ago
1Thank You