Archives: Theory
Web Browser
The role of a web browser A web browser is a software program which allows the user to request and retrieve web pages (and other resources) from a webserver on the world wide web. Web…
Computer Ethics
Computer ethics refers to a set of principles to regulate the use of computers. Ethics has become an important consideration due to the spread of computerised systems and electronic communications. Computer ethics can be broken…
Secure Sockets Layer
Secure Sockets Layer (SSL) uses authentication and encryption to create a widely used online security protocol. SSL allows data to be sent and received securely over the internet. SSL consists of a digital certificate, hosted…
Hacking and Malware
Hacking Hacking is the illegal access to a computer system without the owner’s consent or knowledge. In an age of networks that never sleep, hacking can be done remotely from anywhere. Hacking poses a real threat to people…
Proxy Servers
Proxy servers act as an intermediary between a user and a web server. Proxy servers have the following main functions: Using cache, they can speed up access to a website by storing the pages after the…
Firewalls
Firewalls are security systems designed to prevent unauthorised access to or from your computer or private network. Firewalls can be implemented in hardware, software or a combination of both. Firewalls sit between the user’s computer and…
The Need for Security
Whether it be personal or commercial, data is really valuable so it is important to keep it safe. Data is sometimes deleted or corrupted accidentally, but this can also happen as the result of malicious actions. Either…
Serial and Parallel Data Transmission
Data transmission can occur in two modes (methods), either serial or parallel. Serial data transmission In serial data transmission, bits are sent sequentially (one after the other) down the same wire (channel). Using a single…
Sign up for Guru News
Popular Tags
Categories
- No categories