This report based on operating systems and the topic covers generally about the Processor functions, Memory types such as Primary or Secondary, Input & Output e.g. To/From the User & To/From the network, Support Elements, Conclusion and References at the end. For the section Processor student will be gathering information about the Central Processing Unit (CPU).There are two primary manufacturers of computer microprocessors which are Intel and Advanced Micro Devices AMD which lead the...
For the purpose of globalization, the future of mobile communication lies in the third generation 3G as it provides new functionalities with high quality. UMTS, the Universal Mobile Telecommunications System, is a 3G mobile communications technology that offers its services at any time and place. In addition to ensuring communication among people, it allows the use of mobile equipment for any application such as business, entertainment, and different types of services. UMTS stands for an...
Steganalysis had gained popularity in the field of national security, forensic sciences and cyber crime since detection of hidden information ciphertext or plaintext can lead to the avoidance of serious security incidents. Steganography and Steganalysis are very challenging field in Information Technology domain because of the scarcity of important information about the specific requirements and characteristics of a cover medium which can be used to hide secret messages and detect the same....
PART AQ1. The Nyquist theorem is one of the deciding factor in data communication. The fibre optics as well as the copper wires are communication mediums. Do you think the theorem is valid for the fiber optics or for the copper wires. Ans. Nyquist theorem is valid for both fibre optics and copper wires this is because the Niquist theorem is purely depend upon the mathematic function and has not any concern with the transmission media for communication. According to Henry Nyquist, a...
Wireless security is to prevent unauthorized user to access the wireless network or damage the computer by using wireless network. When the wireless technology has been first introduced to the world, it already has few danger methods that will harm the user's desktop or laptop, but that time cracker and hacker don't have any resources to crack or hack a network by using wireless technology. At that time, the wireless network only use by the big company. But now day, wireless network is very...
A database brings convenient to todays working area such as large business company. The main purpose of a database is just similar to handling and keep large amount of files and documents in a large cabinet. However this method takes a large space and will be complicated to control and organized. This is why a database is introduced to keep these data organized to allow users to access, retrieve, and use of the data without any hassle. DBMS or Database Management System is software that used to...
This chapter emphasizes on the development of configurable component, which covers the features within the model. The Configurable ETD system consists of the following functional major components: User Management, ETD Management modules. These two modules are the core functional components for the configurable system. In this segment, the development environment for the Configurable ETD System development is sketched out. It involves the both the software as well as the hardware requirements...
Today storage devices come in many different forms, types and sizes. However, for many decades, storage media has been dominated by magnetic technology. Even magnetic storage devices themselves have evolved over the years: from the first tapes to the 6Gbps Hard Drives of today.What is a hard disk?Basically a hard disk is a sealed container, housing a number of 2-sided disks made of aluminium called platters in a stack formation. Then on each platter an electromagnetic read/write head is...
Virtual Private Network is a network which requires use of public technology like the internet in order to enable various organizations and users a secure access to their personal networks. It provides the same security options that a wired network provides by using a "tunneling" mechanism and encrypting data so that it is secured. In general terms, VPN is a connection established between multiple networking devices by sharing infrastructure and providing a safer and more secure...
Today, the internet environment is much less collegial and trustworthy. With the growth of internet usage and its applications, there are increasing of awareness about the current internet security technology and rise in the number of security breaches and also the fears about engaging in the electronic commerce facilities which the internet offers. There are few various security technologies available for the internet environment such as Encryption, Secure Socket Layer and Firewall. The...