Login, Basic Computer Science

Login

Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services of the network, the user identifies self by providing name and a confidential password.

The NOS than allows access only if both the name and password are correct, This process is known as Login. The user is said to be logging into the network. The name which the user uses to enter the network is called the login-ID or login name.

Posted Date: 10/27/2012 8:32:32 AM | Location : United States







Related Discussions:- Login, Assignment Help, Ask Question on Login, Get Answer, Expert's Help, Login Discussions

Write discussion on Login
Your posts are moderated
Related Questions
what is Metropolitan area network?

The instructions of the logic functions are: and not, or and xor. These act on the bits of their operators. To make sure the result of the operations we revolve to the cmp and test

If L is a regular language show that L U {a} is regular

Explain about MIDI audio


Dataflow Modeling for DSP Design The necessary components in the research of application-specific computer architectures are: 1) a clearly identified set of problems that can b

write a program of 2 sum and 2 product number in C++ programming language

Application Software:   Application software is designed and developed to accomplish one or more specific task or solve a particular problem.    Application software may be

Storage Mechanism of Magnetic disk: Storage Mechanism: Magnetic disk drives contain metal disks that are coated on both sides with an iron oxide recording material. Several

Server In a network, the resources of computers comprising network are usually shareable. In fact, one of the main objectives of networking is to make the computing resources