Login, Basic Computer Science

Login

Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services of the network, the user identifies self by providing name and a confidential password.

The NOS than allows access only if both the name and password are correct, This process is known as Login. The user is said to be logging into the network. The name which the user uses to enter the network is called the login-ID or login name.

Posted Date: 10/27/2012 8:32:32 AM | Location : United States







Related Discussions:- Login, Assignment Help, Ask Question on Login, Get Answer, Expert's Help, Login Discussions

Write discussion on Login
Your posts are moderated
Related Questions
Question 1 What is Collaboration? Write down the objectives of collaboration Question 2 What is proxy server? Write down the reasons for using proxy server Question

Question 1 Write about Potential Risks to Information Systems Factors to be addressed for making information systems more secure Question 2 Write about the foll



how to start ms power point


QUESTION (i) Define each of the following terms: a) Interlibrary lending b) Manuscript c) Papyrus d) Community profile e) Mauritiana (ii) Explain with example

There is a path between two vertices if there is a series of edges that you can use to travel between them. For example, between vertices 1 and 3 above, there is a path made up of

Two-tiered architecture: This approach basically introduced a database server to replace the file server. The emergence of relational database management systems and graphica

Explain how the internet works