Skip to main content

Posts

Showing posts from July, 2020

What is a Digital Signature ?

Digital Signature Digital Signature can be used to authenticate the generic use to verify the integrity. Digital Signature is also known as 'public key crytography' , which employs an algorithm that uses two different keys, one for creating a digital signature or that transforms data into an unintelligible form while data is transferred (private key) and the other for returning the message to its original form when data is at the genuine recipient end (public key).  __________________________________________________________________________ In Tech and Education today, I told you about Digital signature.  These are a kind of practices for online transaction.  If you want more information, then you follow our website.  And share it so that others can get information.   _____________________________________________________________________________________________

What is Software Piracy ? Fully Explained

Tech and Education What is Software Piracy ? Introduction It is an unauthorized copying, reproduction or  usage of software products. Installation of any copy of the software by making its duplicate without paying the cost to the original developer is known as Software Piracy.     Software piracy also harms the local and national economies as scarce sales of legitimate software results in the loss of tax revenue. There are many types of software piracies that are damaging the software developing companies & the end users too. Some of them are: Soft Loading: It means purchasing a single licence version of the software & then installing the software into several computers resulting in the violation of licence terms. Software Counterfeiting: It occurs when fake copies of a software are produced in such a way that they appear to be authentic. Counterfeit software is commonly produced by using a CD burner to copy the software and by making photocopies of the manual. Software overuse

What is Wi-Fi ?

Wi-Fi(Wireless Fidelity) is a network of wireless connection. It is a mode of communication that established. Wi-Fi networks is established by radio frequency like Bluetooth, but has more power, resulting into a strong connection. Wi-Fi is sometimes called 'Wireless Ethernet'. Wi-Fi connections are commonly established in electronic gazettes including video games consoles, home network, PDAs, tablets, mobile phones, I-Pad, I-Pod etc. A wi-fi enabled device such as a PC or PDA can connect to Internet within a range of (wi-fi) wireless network that is connected to the internet . To form a wireless  computer  network a Wi-Fi adaptor (802.11 b/g) is required with each computer or terminal device. For establishing connection in a local area, access points are installed that increases and coordinates the frequency for transmission and for regularizing the bandwidth of data transfer. Many companies or institutions make their campus as Wi-Fi zone i.e. in which people in the campus ca

What is Data ?

What is data? if you use a computer then you must have heard the word "Data". Data is an important part of the computer on which all work is done. Data is input and output into the computer. The CPU's job is to process the data. This post is an attempt to know what is computer data, data processing and type of data in this post. The career record of any player, number of children in school, population of India, name of someone, all these are called Terms Data. Data is managed, controlled and processed in a computer. What is computer data or information? Data is also called Information or simply say that Information is "Data". Input Processed Data is called Information. Information is important for the user. For example, a news anchor reads "news". This news is information for us. Whereas it is Processed Data for News Anchor. The information is ready by collecting raw data and processing it. You can also understand data or information in this way - as

Digital Footprint

Digital footprint refers to a unique set of digital activities, actions, contributions and communications of an individual that are manifested on the Internet or on platform digital devices. It is also known as Digital Shadow. There are two main classifications for digital footprints i.e. passive and active. A passive digital footprint is created when an individual's digital activities are being traced without permission whereas the active digital footprints are created when a personal data is deliberately shared by a user on a social media, blog etc. Also Read what is hacker what is internet disadvantage of internet If you want to know about anything then you follow our website

Disadvantage of Internet

Cyber Crime:- The Internet provides a huge & diversified platform to work. Some people misuse it and perform illegal and inappropriate actions such as piracy, hacking, plagiarism etc. through the use of the technology. Such antisocial or immoral internet activities are known as cyber-crimes. Almost every country has its own specific cyber-crime control department to deal with cyber-crimes. Spread of Wrong Information:- Internet is an open facility through which sometimes rumors can also be spread. Deterioration of Emotional attachment:- Because of the overuse of the internet and mobile phones for contacting people, there is a sense of disconnection with others in converying the real feelings and due to the lesser face meetings or interactions and the emotional connection between people is fading away. As the people are getting addicted to the Internet, it has led to personal loss too. We find very less quality time to spend and share with family and friends. The youngster are not a

Computer Virus

What is Computer Virus ? A computer virus is a type of unwanted computer program which is developed by miscreants with an intention to infect the files of a computer, to corrupt a database or to hamper the functioning of a computer system. In a computer system, virus does not evolve by itself, it is uploaded in a network or into a storage media. It is communicable i.e. it is transmitted form one computer to another computer or to a network by some medium of transmission like CDs, pen drive, external hard disk, softwares, internet connection, bluetooth, etc. When infected, many viruses replicate by themselves.  There are different types of viruses that infect specific components or specific functioning of a computer system. They can range in severity. Some may cause mild damages while others can severely damage hardware, software or files. Example of some common viruses are iBryte, OneInstaller, Koobface, BrO_AcT, Byte Bandit, Brain, Small.TP, Stealth_C, etc. If you want to know abo

Artificial Intelligence

Artificial Intelligence When we prepare a computer in such a way that it can act like a human's intelligence, it is called artificial intelligence says that when we set a program in a machine that it can work like human so where does he go to artificial intelligence . To understand AI it is necessary to understand these 6 words Visual Perception Speech Recognition Decision Making Language Translation Knowledge Reasoning Ability According to John Macatha's father of Artificial Intelligence, It is the science and engineering of making intelligent machines especially intelligent computer programs.  Artificial Intelligence is a way to build a computer, a computer-controlled robot, or a software intelligence. Things, just as intelligent people think. A.I is studied by the fact that humans how the brain thinks, and how humans learn, decide, and try to solve a problem work, and then the results of this study based on developing intelligent software and system use. The goal of Artific

What is Firewall ?

Firewall A firewall is a network security system designed to prevent an unauthorized access to or form a private network. It acts as a barrier between a trusted network and be implemented in both hardware and software or a combination of both. In a easy way, You can say, In a computer, a firewall is a network security that monitors and controls incoming and outgoing network traffic. Firewall (like moat) must be installed in the server or workstations. It protects the system from unauthorized access and ensures that requests for transaction can be made to a system from an authorized workstation only. What Firewalls Do ?  Basically, firewalls need to be able to perform the following tasks: Act as an intermediary  Defend resources Record and report on events Validate access Manage and control network traffic Types of Firewalls Proxies firewalls/Server A proxies server may acts as a firewall by responding to input packets in the manner of an application, while blocking other packets. Proxy

Web Server

Web server is the principal computer or server that stores contents of different website. It provides data and information to computers on request which are connected to it through the network via internet. In other words, it can be said that it is a computer that stores data and runs software that are designed to send web pages in file format when requested by web browsers. The server is usually a computer of high configuration i.e. with a large storage capacity and high speed processor instruction very fast. Web server is responding for accepting request from client, i.e., web browser and responding in the form of web pages. It accepts connections from web browser all over the internet and when requested send them HTML documents using HTTP protocol. The server computers should have a high speed connection of internet and should be powerful enough to handle multiple simultaneous connections at a time. Some popular web server are Apache, IBM, Lotus, 'Internet Information Server (II

URL (Uniform Resource Locator)

It identifies the location of  web site  or a web page on the  internet . Each  web page   has a unique address called URL that identifies its location on the internet.  Web browsers  utilized the URL to open or to retrieve files on  internet . The format of a URL consists of different parts. http://www.ittalentsearch.org/home/index.htm The http is a Protocol Name. www is the World Wide Web ittalentsearch.org is the Domain Name org is the TLP (Top-Level Domain) home/index.htm is the URL's path to file & folder The first part of the address (URL) indicates the protocol or service being used. It gives information to the browser about the type of  server  to connect to and by which protocol. The second part of the URL is a Full Qualified Domain Name (FQDN) which identifies  web address  running on the  server . The third part is the path name that name that refers to the location of files. The path name is always preceded by single slash "/" after the domain name. The fo

world wide web (www)

The ' World Wide Web ' is a framework for accessing the linked documents spread over millions of computing devices over the internet . WWW was introduced in 1989, by the English Physicist, Sir Tim Berners Lee . The web creators wanted to create a simple way to provide and access different types of document on the network, without having to search through indexes or directories of files or without copying documents from one computers to another before viewing them. To do so, they established a way to 'link' documents that were stored in different computers on the network but under a single from and thus, WWW evolved. The World Wide Web (WWW) is a service of information in combination of text, photographs, graphics, audio, video, etc. that are presented on the internet.     It allows the multimedia and hypertext files to be displayed and linked on the internet. Before WWW, internet was mainly used for obtaining textual information. Due to its distinct features, the popula

Internet:History

HISTORY OF INTERNET In 1991, a network evolved out of an experiment done by the defence agency of United States. The Department of Defence was in a process of doing research and technical developent in the areas where some of the services of defence (Army, Navy, Air force, Marine crops) had clear jurisdiction of operation.   This agency, ARPA (Advanced Research Project Agency), which was later known as DARPA (Defence Advanced Research Project Agency), planned to create a continue to operate even during the emergency or disastrous situations like war. This had led to the development of ARPANET (Advanced Research Project Agency Network) which work to link us scientific and Academic Researchers for exchanging data and messages between one computer to another ARPANET started as a four node network in December 1969.     By 1980's, another federal agency of US named as National Science Foundation (NSF) used ARPANET to connect its five regional  supercomputer  centers located at different

Internet

Introduction We commonly hear about e-mail, web chatting, e-learning, video conferencing, newsgroup, e-commerce, e-reservation etc. Such terms are based on sharing of information among millions of computers around the globe which is commonly termed as "INTERNET" . Internet is Wide Area Network (WAN) of millions of computer that are linked together around the world that share information in the form of data, graphics, sound, software, text, etc as and when required.

Web Address or Domain Name System

Web Address is the unique name for identifying a website on internet. On internet, there are numerous  web sites ; it is only with the help of web address, that we can find a particular  web site .   Text based addressing system on internet is called Domain Name System (DNS) . In this system, each  website  has a unique name such as: orcale.com, cbse.nic.in, etc. That last three letters of the web address is known as Top Level Domain (TLD) that provides information about the root of the domain for the type of organization to which the address belongs to. It is alphabetical and helps to identify an address in Domain Name System.  Some common Top Level Domains are:

Web browser

A   web browser is an application software that helps a user to navigate through different  web site   on internet and display web pages . The user request a page from web server with the help of web browser. After receiving the request through the web browser, the web server makes it available for web browser to display the page. web browsers can also display animated images, play sound and video, provide secure connections and much more. Some common web browsers are  'Google Chrome', 'Apple Safari', 'Internet Explorer', 'Netscape Navigator', 'Mozilla Firefox', 'Opera', etc. Many web browser are upgrade frequently with enhanced features. If you want to know about anything then you follow our website

What is Website | What was the first website?

A  location on the web server whose an individual or a company or any organization uploads its information is known as website . A website is a collection of one or more  web pages  which display information with the help of web browser. A website can be compared to a book which contains different chapters in the form of  web pages . The first page of website is known as 'Home page' . The pages on a website are linked to one another and a person can navigate to any page by clicking on the links called 'Hyperlinks' . Websites are hosted on the web server on rental basis by the 'Internet Service Provider'. In order to access them every website is provider with a unique name. The website may be owned by individuals, agencies, companies, collages, universities, government bodies, etc.  DO YOU KNOW ? Tim Berners-Lee has created the first website. It's URL is http://info.cern.ch . The first online website was launched in 1991. If you want to know about anything

what is web page ?

A web page is a document of information that can be accessed and viewed through a web browser. A web page is generally contained in a website and constitutes as a source of information that floats in the world wide web (www) . The information is usually code in HTML web page may be retrieved from a local host computer or from a remote computer with the help of internet. Web pages are requested and served from web server using protocol (HTTP). Web page may consist of static pages (which are stored within a file system of web server) and/or dynamic pages (which contain files of run-time nature i.e. which facilitates online data transformation). Web pages may contain information in the form of text, images, pictures, sound, audio, video, etc. If you want to know about anything then you follow our website

CLOUD COMPUTING

Cloud computing is a concept that enables sharing of computing resources rather than having local servers or personal devices to handle applications.   It means storing and accessing data and programs over Internet that can be utilized by different users rather than keeping  Server at the host end.

Super Computer

A  supercomputer  is a  computer  with a high level of performance as compared to a general-purpose  computer . The performance of a  supercomputer  is commonly measured in floating-point operations per second (FLOPS) instead of million instructions per second (MIPS). Distinguishing Features Supercomputers have certain distinguishing features. Unlike conventional computers, they usually have more than one  CPU (central processing unit), which contains circuits for interpreting program instructions and executing arithmetic and logic operations in proper sequence. The use of several CPUs to achieve high computational rates is necessitated by the physical limits of circuit technology. Electronic signals cannot travel faster than the speed of light, which thus constitutes a fundamental speed limit for signal transmission and circuit switching. This limit has almost been reached, owing to miniaturization of circuit components, dramatic reduction in the length of wires connecting circuit boa

SERVER

A Server is a computer that provides data to other computers. It may serve data to systems on a local area network ( LAN ) or a wide area network ( WAN ) over the internet. In the client/server programming model, a server program awaits and fulfills requests from client programs, which might be running in the same or other computers. A given application in a computer might function as a client with requests for services from other programs and as a server of request from other programs.  Many types of server exists, including web server , mail server , and file servers . Each types runs software specific to the purpose of the server. For example, a web server may run Apache HTTP server or Microsoft IIS , which both provide access to websites over the Internet.  A mail server may run a program like Exim or iMail, which provides SMTP services for sending and receiving email. A file server might use Samba or the operating system's built-in fill sharing services to share files over a

Hacker

What is hacker ? The person engaged in such activities is called a  'Hacker'   A hacker may intrude and damage the security features of a computer network to accomplish their goal. Some common types of hacking are website hacking, network hacking, account hacking, etc. TYPES OF HACKER The security community has informally used references to hat color as a way different types are identified usually divided into three types: white hat hacker, black hat hacker, gray hat hacker.   White hat hacker ,   The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems. Black hat hacker ,  A black hat hacker is a hacker who violates computer security for personal gain or maliciousness. Also, Black Hat hackers are criminals who break into computer networks with malicious intent. They may also