IT-SECURITY(NETWORKING DEVICES)

NETWORKING DEVICES Computer networking devices are also called network equipment, Intermediate Systems (IS) or interworking Unit (IWU). Common basic networking devices which are very commonly used nowadays are: 1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak … Read more

C Program to Check whether an Alphabet is Vowel or Consonant

c program to check vowel and consonant

C Program to Check whether an Alphabet is Vowel or Consonant This program takes the character value(entered by user) as input and checks whether that character is a vowel or consonant using if-else statement. Since a user is allowed to enter an alphabet in lowercase and uppercase, the program checks for both uppercase and lowercase … Read more

IT-SECURITY(OSI AND TCP/IP MODEL)

OSI AND TCP/IP MODEL OSI stands for Open System Interconnection is a reference model that describes how information from a software application in one computer moves through a physical medium to the software application in another computer. OSI consists of seven layers, and each layer performs a particular network function. OSI model was developed by … Read more

IT-SECURITY(COMPUTER NETWORKING)

BASICS OF COMPUTER NETWORKING Networking is the convenient way of making information accessible to anyone, anytime & anywhere. A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. A computer … Read more

IP Address Program in C

IP address program in c

IP Address Program in C What is IP Address An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.   Let’s Start Writting C program to find IP Address.   #include<stdlib.h> main() { system(“C:\\Windows\\System32\\ipconfig”); system(“pause”); return 0; }  

IT-SECURITY(DATA COMMUNICATION BASICS)

DATA COMMUNICATION BASICS Data Communications is the transfer of data or information between a source and a receiver. The source transmits the data and the receiver receives it. Data communication involved the following like communication networks, different communication services required, the kind of networks available, protocol architectures, OSI models, TCP/IP protocol models etc. Data Communication … Read more

IT-SECURITY(OPERATING SYSTEM BASICS)

OPERATING SYSTEM BASICS An Operating system is basically a intermediary agent between the user and the computer hardware. Manages the computer’s resources (hardware, abstract resources, software) It’s a resource allocator. It is also used to control programs to prevent errors and improper computer use. It is interrupt driven. Users and Processes access the Computer’s resources … Read more

IT SECURITY SERVICES LIFE CYCLE

IT SECURITY SERVICES LIFE CYCLE The IT security services life cycle provides IT security decision makers and managers with a six phase process by which they can select, implement, and manage IT security services. This Topic details the various life-cycle phases and the issues and decisions within each phase.  the security services life cycle has … Read more

Introduction of Internet of Things

What is an Internet of Things (IoT) The Internet of Things(IoT) can be defined as a network of physical objects or people called “things” that are embedded with software, electronics, network, and sensors which allows these objects to collect and exchange data. The goal of IoT is to extend to internet connectivity from standard devices … Read more