Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Aug 13, 2023 09:58 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Static IP Address Dynamic IP Address It is Provided by ISP It is provided by DHCP (Dynamic ...
Read More »Blog Archives
Describe about different types of security mechanism.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 1 GK SIR Aug 03, 2023 11:12 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Ans. Security mechanisms are methods or techniques used to protect computer systems, networks, data, and information from unauthorized ...
Read More »Q. Define IP Address and subnet mask in computer networking. How to find the IP address and Subnet mask of your computer and network?
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 31, 2023 11:58 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) IP Address| An IP address is a unique address that identifies a device on the internet or a ...
Read More »Q. Write about Identity and Access Control.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 31, 2023 11:47 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) It is a system that limits access to a system or resources It provides control over user validation ...
Read More »Q. Write about spyware.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 31, 2023 10:29 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Spyware (a portmanteau for spying software) is software with malicious behavior that aims to gather information about a ...
Read More »What is a phishing attack?
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 31, 2023 10:22 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Phishing is a type of social engineering attack often used to steal user data, including login credentials and ...
Read More »Write about Social Engineering.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 31, 2023 10:08 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over ...
Read More »Write about Default Gateway.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 31, 2023 09:48 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) A default gateway makes it possible for devices in one network to communicate with devices in another network. ...
Read More »Write about subnet mask?
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 31, 2023 09:39 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network ...
Read More »Differentiate between Intranet and Extranet.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 30, 2023 09:12 AM 0 Answers Networking Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Intranet Extranet Intranet is a private network This is secure than internet but not like intranet Information ...
Read More »