Login, Basic Computer Science

Login

Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services of the network, the user identifies self by providing name and a confidential password.

The NOS than allows access only if both the name and password are correct, This process is known as Login. The user is said to be logging into the network. The name which the user uses to enter the network is called the login-ID or login name.

Posted Date: 10/27/2012 8:32:32 AM | Location : United States







Related Discussions:- Login, Assignment Help, Ask Question on Login, Get Answer, Expert's Help, Login Discussions

Write discussion on Login
Your posts are moderated
Related Questions
what is meant by deliverable in strus base applications

Earlier than anything we must describe the file transfer area or DTA. With the intention of sequentially read we use the 14H function of the 21Hinterruption.The register to be read

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Question 1 Explain the importance of graphics in multimedia. What are few of the tips to keep in mind while using graphics for the web? Question 2 Write a long note on co


Product of first n natural numbers - Algorithm Working Procedure : 1. Take n = 8 2. Take I = 1 3. Take PROD = 1 4. Compute PROD = PROD * 1 5. add 1 to 1 6. If I≤ n, complete

For the formation of a program it is necessary to follow five steps: Design of the algorithm, stage the problem to be solved is reputable and the best solution is proposed, creatin

A magazine publisher based in Nairobi has branch in Kisumu, and one in Mombasa. The company has kept in touch by telephone and courier service. Each office is networked. The networ

Digital computer: In the digital computer there are basically two types of input, namely Instructions, and Data from the various radio and non-radio sensors, which will be refe

Library function :   These are the functions supplied with the programming language. The code or definition of library functions does not have to be written in a user program w