No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 1 answers

Dev Lohani 4 years, 2 months ago

Understanding the function of the computer is called as computer science
  • 1 answers

Tec Om 4 years, 2 months ago

python is a object oriented programming languages and on the other hand scratch is a block based programming language
  • 1 answers

Meghna Thapar 4 years, 2 months ago

1. Privacy Concerns: 90 percent of devices collected at least one piece of personal information via the device, the cloud or the device’s mobile application. The vast majority of devices collecting information like name, address, date of birth or even health and credit card information. Even worse is the fact that many devices transmit this information across networks without encryption. If users misconfigure their home network, then they are only one step away from exposing this data through wireless networks. Cloud services, which many of these devices use, are also extremely vulnerable. However, it is likely that the majority of these devices actually need personal information to function.

2. Insufficient Authentication/Authorization: 80 percent failed to require passwords of sufficient complexity and length. A huge number of users and devices rely on weak and simple passwords and authorizations. Citing examples of this, HP found that many devices and their cloud components accepted passwords like “1234” or “123456”. Many users that configured accounts with weak passwords also used the same password in the cloud for cloud products. HP points out that a strong

password policy is basic security, but even still most solutions failed.

3. Transport Encryption: 70 percent of devices used unencrypted network services. Transport encryption is where information that is being transferred from one device to another device is encrypted from the outset of any communication. Transport encryption will be crucial given that most of the devices are transmitting data that most people would consider crucial. However, most devices surveyed failed to encrypt data, even when the devices were using the Internet. HP noted that the need for encryption is particularly strong given the amount of information that is being passed between the device, the cloud and mobile applications.

4. Web Interface: 60 percent raised security concerns with their user interfaces. These issues included:
persistent cross-site scripting, poor session management and weak default credentials. From this, hackers were able to identify valid user accounts and take them over using things like password reset features.

5. Insecure Software: 60 percent did not use encryption when downloading software updates. Given the number of software updates that will be required to make everything work together, HP says that it was “alarming” to find that so little of this software was encrypted during downloads. Even worse, some of the downloads that were tested could be intercepted and uploaded into a file system in Linux where the software could be seen or even modified.

  • 1 answers

Meghna Thapar 4 years, 2 months ago

Telnet is a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network (such as the internet). Using telnet client software on your computer, you can make a connection to a telnet server (that is, the remote host). A remote login facility permits a user who is using one computer to interact with a program on another computer. The Internet's remote login service is called TELNET. To use the service, one must invoke a local application program and specify a remote machine.

  • 1 answers

Meghna Thapar 4 years, 2 months ago

A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives and then sends back without changing or altering it. An HTTP cookie is a small piece of data stored on the user's computer by the web browser while browsing a website. Cookies were designed to be a reliable mechanism for websites to remember stateful information or to record the user's browsing activity.

  • 1 answers

Yogita Ingle 4 years, 2 months ago

  • Primary memory is also called internal memory whereas Secondary memory is also known as a Backup memory or Auxiliary memory.
  • Primary memory can be accessed by the data bus whereas Secondary memory is accessed by I/O channels.
  • Primary memory data is directly accessed by the processing unit whereas Secondary memory data cannot be accessed directly by the processor.
  • Primary memory is costlier than secondary memory whereas Secondary memory is cheaper compared to primary memory.
  • Primary memory is both volatile & nonvolatile whereas Secondary memory is always a non-volatile memory.
  • 1 answers

Nidhi Patidar 4 years, 2 months ago

Language processing do the conversion task i.e. from human language (high-level) to machine language (binary form) There are 3 types of language processor :- (1) Compilers - It convert high-level language code to machine code . Advantage of compiler is it saves time . (2) Interpreters- It's work is same as compiler but take more time and therefore preferred less (3) Assemblers - It translates an assembly language program into machine code
  • 1 answers

Yogita Ingle 4 years, 2 months ago

<th>Sr. No.</th> <th>Key</th> <th>System Software.</th> <th>Application Software.</th>
1 Definition System Software is the type of software which is the interface between application software and system. On other hand Application Software is the type of software which runs as per user request. It runs on the platform which is provide by system software.
2 Development Language In general System software are developed in low level language which is more compatible with the system hardware in order to interact with. While in case of Application software high level language is used for their development as they are developed as some specific purpose software.
3 Usage System software is used for operating computer hardware. On other hand Application software is used by user to perform specific task.
4 Installation System software are installed on the computer when operating system is installed. On other hand Application software are installed according to user’s requirements.
5 User interaction As mentioned in above points system software are specific to system hardware so less or no user interaction available in case of system software. On other hand in application software user can interacts with it as user interface is available in this case.
  • 1 answers

Pallavi Prasad 4 years, 2 months ago

There are five types of literals in Java. Integer Literals Boolean Literals Character Literals String Literals Floating Point Literals
  • 1 answers

Yogita Ingle 4 years, 2 months ago

The Internet is a global network of networks while the Web, also referred formally as World Wide Web (www) is collection of information which is accessed via the Internet. Another way to look at this difference is; the Internet is infrastructure while the Web is service on top of that infrastructure. Alternatively, the Internet can be viewed as a big book-store while the Web can be viewed as collection of books on that store. At a high level, we can even think of the Internet as hardware and the Web as software

  • 1 answers

Yogita Ingle 4 years, 2 months ago

IPO stands for Input, Output and Process.
As the name suggests, IPO cycle is the input and output after process of the data. To get output, u have to first give input and then the input needs to be processed to get your desired result,i.e. Output

  • 0 answers
  • 0 answers
  • 1 answers

Yogita Ingle 4 years, 2 months ago

Input devices

An input device can send data to another device, but it cannot receive data from another device. Examples of input devices include the following.

  • Keyboard and Mouse - Accepts input from a user and sends that data (input) to the computer. They cannot accept or reproduce information (output) from the computer.
  • Microphone - Receives sound generated by an input source, and sends that sound to a computer.
  • Webcam - Receives images generated by whatever it is pointed at (input) and sends those images to a computer.

Output devices

An output device can receive data from another device and generate output with that data, but it cannot send data to another device. Examples of output devices include the following.

  • Monitor - Receives data from a computer (output) and displays that information as text and images for users to view. It cannot accept data from a user and send that data to another device.
  • Projector - Receives data from a computer (output) and displays, or projects, that information as text and images onto a surface, like a wall or screen. It cannot accept data from a user and send that data to another device.
  • 1 answers

Meghna Thapar 4 years, 2 months ago

Primary memory is computer memory that is accessed directly by the CPU. This includes several types of memory, such as the processor cache and system ROM. ... RAM, or random access memory, consists of one or more memory modules that temporarily store data while a computer is running. 

There are two key types of primary memory:

  • RAM, or random access memory.
  • ROM, or read-only memory.
  • 1 answers

Yogita Ingle 4 years, 2 months ago

Primary memory is termed as destructive write memory because the memory stored in it is not permanent. Memory is only saved only during the working of the computer and after the work is completed, it gets erased with out the users command. Each time at the time if re-start it get cleared and refreshed.

  • 0 answers
  • 0 answers
  • 0 answers
  • 1 answers

Yogita Ingle 4 years, 2 months ago

Communication processors (CP’s) is used to creating an optimum configuration entails customizing the CP application software according to the operational and functional requirements of the system. This process, called System Generation (SYSGEN), prompts users by a series of questions about the desired configuration and estimates of data traffic.  

Communications servers allow any piece of data communications equipment supporting the EIA-232 standard (terminals, modems, printers, hosts, and personal computers) to attach to a network.

Mg
  • 1 answers

Anjali Thakur 4 years, 2 months ago

Hy
  • 0 answers
  • 1 answers

Meghna Thapar 4 years, 2 months ago

A computer consists of five functionally independent main parts input, memory, arithmetic logic unit (ALU), output and control unit. Input device accepts the coded information as source program i.e. high level language. A computer has four main components: the central processing unit or CPU, the primary memory, input units and output units. Every computer system has the following three basic components: Input unit. Central processing unit. Output unit.

  • 1 answers

Yogita Ingle 4 years, 2 months ago

Advantages in python 'interactive mode':  

  • 'Interactive mode' is great for quickly and conveniently running 'single lines or blocks of code'.
  • In 'interactive mode', we can get the answer 'line by line'.
  • It is 'easy to find an error'.

Disadvantages in python 'interactive mode':

  • It is 'harder to edit longer programs' or even the existing program.
  • We 'cannot write a whole program' in interactive mode.
  • If we 'save the program the instructions' also get saved.  
  • 1 answers

Shreya Rao 4 years, 2 months ago

you will be getting the answer as 10.

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App