Posted on

Write short notes on the following:

(a) Fire Wall It is the first line of defense for any computer system or network. All packets that enter the network should come though this point. A modern firewall is a system of applications and hardware working together. A sophisticated firewall performs a combination of packet filtering  network address translation and proxy services. FIrewalls…

Read more

Posted on

basic purpose and name the OSI layer where the following devices will be operating:

(1) repeater  Repeaters: repeters also called regenerator, are physical hardware device. They connet two network segments and broadcast packets between them they have the primary function to regenerate the electrical signal: ·         Reshaping the wavefrom ·         Amplifying the waveform ·         Retiming the singnal, to avoid collision on the network As signal travels along a cable,…

Read more

Posted on

With the help of an example for each, write the usage and syntax for the following LINUX commands.

(1)cAT[OPTIONS] FILE  –  concatenate (list) a file (2) diff [option] file1 file2  – compare the two files and display the differnces (text files only) (3) sort [option] file  –  read commands form the file and execute them in the current shell. source: C shell, :Bpurne charc (4)cmp[option] file1 file2  –  compress file and save it…

Read more

Posted on

Explain the following with reference to domain name system(DNS):

(1) DNS architecture Name SERVERS are server programs, which hold information about the domain tree’s structure and set information. A name server may cache structure or set information about any part of the domain tree, but in general a particular name name server has complete information about a subset of the domain space and pointers…

Read more

Posted on

List and expain the characteristics of MOdern operating systems.

·         To provide an enviroment for a computer user to execute programs on computer hardware in a convenient and efficient manner. ·         To allocate the separate resources of the computer as needed to solve the problem given. The allocation process should be as fair and efficient as prossible Following are the characteristics: Open graphics library(Open…

Read more

Posted on

Explain the various computer security classification recognised by trusted computer system Evaluation criteria (TCSEC)

Trusted computer system evaluation criteria is a united states government Department of Defense standard that sets basic requirement for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evalute, classify and select computer system being considered for the processing, storage and retrieval or classified information. Divisions and…

Read more

Posted on

Explain the memory management concepts in LINUX o/s.

The memory management subsystem is one of the most important parts of the operating system. The memory management subsystem includes: Protection: Each process in th system has its own virtual address space. These virtual address space are compeletly separate from each other and so a process running one application cannot affect another. large address space: …

Read more

Posted on

Explain the following with refrence to WINDOWS 2000 O/S:

(1) Trust Relationships and Work Groups Trust Relationships: Trust relationship refers to a line between two domains, where one domain is referred to as the trusting domain and other the trusted domain. Trusting domain lets the trusted domain logon. User accounts and groups that are defined for a trusted domain can access trusting domain resource even…

Read more