Ans: Many data thieves do their work without breaking into computers systems, they intercept message as they travel between computers on networks. Passwords are of little use for hiding electronic mail messages when they are travelling through phone lines or internet gateways still scientific in the name of security. Many networks secure while allowing communication with the rest of the internet. The technical dtails of firwalls vary considerably, but they are all designed to serve the same function to ground against and unauthorized access to an internal network. In effect, a firewall is a gateway with a lock- the lock gate is opened only for information packets that pass one or more security inspections.
09:04:00
Unknown
first year computer science
Related Posts:
Differentiate between switch and router Switch: The switch can not send data out out to internet, or across a WAN. Switch can handle only similar type of network or toplogy. Switch has simple software to handle network activities. The switch… Read More
Define the terms user interface. Distinguish between a command line interface and a graphical user interface?User Interface: A user interface is combination of hardware and software that you use to communicate with and control the computer. Through the user interface, you are able to make selections the computer, request infor… Read More
Short Note-Uses and abuses of Internet An international computer network connecting other networks and computers from companies universities and other institution in order to quick exchange of information is called “Internet”. Internet has its own merits an… Read More
What is the copyright law state its advantages? Copyright: Copyright law is used to cover computer software. It is illegal to make or distribute copies of computer programs without authorization. No other copies may be made without specific authorization from t… Read More
Explain three basic types of instruction code format used in computer Instruction Format: An instruction format defines the layout of bits of an instruction in terms of constituent parts. There are various instruction format's depending upon the architecture of the computer. The types o… Read More