Login, Basic Computer Science


Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services of the network, the user identifies self by providing name and a confidential password.

The NOS than allows access only if both the name and password are correct, This process is known as Login. The user is said to be logging into the network. The name which the user uses to enter the network is called the login-ID or login name.

Posted Date: 10/27/2012 8:32:32 AM | Location : United States

Related Discussions:- Login, Assignment Help, Ask Question on Login, Get Answer, Expert's Help, Login Discussions

Write discussion on Login
Your posts are moderated
Related Questions

Circuit Switching: Many switching techniques are in use. One of them is line or circuit switching in which a communications path is actually established before the message is

Define Levels of Abstraction in a DBMS, explain briefly, Conceptual Schema, Physical Schema, External Schema

what factors might be significant in your decision

Manipulate the following Boolean expression in such a way so that it can be implemented using exclusive-OR and AND gates only. AB''CD'' + A ''BCD'' + AB''C''D + A''BC''D

Question 1 What are the features that Bash shell provides? Question 2 Explain Runlevels Question 3 Discuss the following                           1) Links 2) Doma

Question 1 What is role playing game? Explain the special design issues for sports games Question 2 What do you mean by collusion? Explain its types Question 3 Wri

Mike sells on the average 15 newspapers per week (Monday – Friday). Find the probability that 2.1 In a given week he will sell all the newspapers [7] 2.2 In a given day he will sel