Found 1112 Articles for Internet

What is the difference between Authentication and Authorization?

Ayushi Bhargava
Updated on 28-Oct-2021 06:24:53

706 Views

What is Authentication?Authentication is the act of establishing the same claim as users identify on a computer system. As opposed to identification, authenticity is the process of verifying a person's or thing's identification. Personal identification must be validated, the website's validity must be validated with a digital certificate, the relic must be carbon dated, and the product or document must not be counterfeit.The process of determining the claimed user is known as authentication. This is the first stage of the security procedure. Completing the authentication procedure in less than or equal to −The password − The most popular authentication factors ... Read More

XMODEM File Transfer Protocol

Ayushi Bhargava
Updated on 28-Oct-2021 06:23:14

2K+ Views

XMODEM is a standard file transfer process developed by Ward Christensen in 1977. It sends data-related data blocks and awaits receipt of block receipt. XModem is used in both hardware and software.XMODEM is a half-dup communication protocol with an effective error detection device.It violates the original data in a series of packets sent to the recipient and other information that allows the recipient to determine whether the packets have been received correctly.Marked files are completed with the end-of-file character sent behind the last block. This character is not in the packet but is sent as a single byte.Since the lengths ... Read More

What is Wireless Application Protocol (WAP)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:22:05

1K+ Views

WAP is a collection of communication protocols meant to standardise how wireless devices, such as mobile phones and radio transceivers, may access the Internet and its services, such as email and newsgroups. Prior to the advent of WAP, Internet connection was available, but various manufacturers utilised different technologies; WAP promised compatibility across these technologies.WAP was created in 1997 at the WAP Forum by Ericsson, Motorola, Nokia, and Unwired Planet (now Phone.com). The WAP Forum was renamed the Open Mobile Alliance in 2002. (OMA).Operation of the WAPWAP is an acronym for a collection of protocols. WAP hardware, such as WAP-enabled web ... Read More

What is E-Governance?

Ayushi Bhargava
Updated on 28-Oct-2021 06:21:14

2K+ Views

E-governance offers vital opportunities to employ electronic means to push sensible governance. It applies data technology to government processes and functions to attain easy, ethical, accountable, and clear governance. This includes the dissemination of data, and quick and effective communication.With the formation of a lot of comprehensive and multi-stakeholder approaches, e-governance continues to incorporate electronic interactions, particularly interactions from government and non-governmental organizations.Benefits of e-GovernanceFollowing are some of the benefits of applying e-Governance −Reduced corruptionHigh transparencyIncreased convenience Growth of GDPDirect involvement of componentsReduction of total costsParticipating in the scope of the Government of e-overnight, the government plans to increase the ... Read More

WiMax in Computer Network

Ayushi Bhargava
Updated on 28-Oct-2021 06:19:57

2K+ Views

What is WiMAX?WiMAX stands for "Worldwide Interoperability for Microwave Access, " a telecommunications standard that describes fixed and fully mobile Internet access services. The protocol follows some aspects of the IEEE 802.16 Standard.WiMAX products and services are most likely to be found in "last mile" applications. WiMAX enables ISPs and carriers to deliver Internet access to homes and businesses without the need for physical cabling (copper, cable, etc.) to reach the customer's location.Difference between WiMAX and WiFiWiMAX is sometimes compared to WiFi because both technologies rely on wireless Internet connectivity and are complementary.Following are some of the major differences between ... Read More

What is a Wireless Local Loop (WLL)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:18:08

10K+ Views

Wireless Local Loop (WLL) is a generic word for an access system that connects users to the local telephone company's switch via wireless links rather than traditional copper cables. This system, also known as fixed wireless access (FWA) or fixed radio, provides telephone, facsimile, and data services to business and residential subscribers using analog or digital radio technology.WLL systems enable the rapid deployment of basic phone service in areas where geography or telecommunications development makes traditional wireline service prohibitively expensive.WLL systems are easy to integrate with a modified public telephone network (PSTN), and they can usually be installed within a ... Read More

Working of Different layers in Computer Network

Ayushi Bhargava
Updated on 21-Nov-2022 05:36:17

236 Views

Have you ever wondered how different layers of the network work together to send messages? Before going into details, let us first understand some basic terms.Address Resolution Protocol (ARP) request is a protocol that converts IP addresses to MAC addresses.A routing table  is a set of rules, usually displayed in tabular format, used to determine the routing location of data packets transmitted over an Internet Protocol (IP) network.In a typical network, the host device or main computer has all the layers and on the other hand, the router has a network, data link layer and a physical layer.ExampleAssuming that we ... Read More

Working and Types of Smart Card

Ayushi Bhargava
Updated on 28-Oct-2021 06:14:45

883 Views

What is a Smart Card?A smart card is a compact microprocessor-based device the size of a credit card that stores and processes data. Smart cards have mostly supplanted conventional magnetic cards since they can store more data and perform more functions. Smart cards are now used in various industries, including retail, public transportation, and security.Smart card manufacturers can put small circuits and circuitry on a printed card using modern technologies such as electron beam lithography. As data storage technology progresses, manufacturers will continue to increase the functionality of smart cards by working with nanoscale components of these cards.It is feasible ... Read More

What is Vishing (Voice Phishing)?

Ayushi Bhargava
Updated on 28-Oct-2021 06:13:33

174 Views

The use of telephony (typically Voice over IP telephony) to perform phishing attacks is known as voice phishing or vishing.Landline telephone services are typically reliable because they are terminated at recognized physical locations and are associated with a bill-payer. However, contemporary Voice over IP (VoIP) technologies like caller ID spoofing and automated systems (IVR) are frequently used by vishing criminals to evade detection by law enforcement authorities. Voice phishing is commonly used to acquire credit card numbers or other personal information from individuals for use in identity theft operations.Voice phishing assaults are often carried out via automated text-to-speech systems that ... Read More

World Wide Web (WWW)

Ayushi Bhargava
Updated on 28-Oct-2021 06:12:14

2K+ Views

The World Wide Online (WWW), often known as the Web, is an information system in which Uniform Resource Locators (URLs) are used to identify documents and other digital resources. URLs, such ashttps://example.com/, which can be connected together via hyperlinks and are accessible over the Internet.Hypertext Transport Protocol (HTTP) is used to transport Web resources, which are accessed by users via a web browser and published by a web server. The World Wide Web is not the same as the Internet, which is built on the same technology as the Web and predates it by more than two decades in certain ... Read More

Advertisements