(a) Fire Wall It is the first line of defense for any computer system or network. All packets that enter the network should come though this point. A modern firewall is a system of applications and hardware working together. A Read More …
Category: Uncategorized
Explain the following with reference to “hardening” in WINDOWS 2000 O/S:
(1) Hardening the O/S and application code MIcrosoft peridically ditributes large updates to its OS in the form of service packs. Service Packs include all the major and minor fixes up. microsoft also distributes intermediate updates to their operating systems Read More …
basic purpose and name the OSI layer where the following devices will be operating:
(1) repeater Repeaters: repeters also called regenerator, are physical hardware device. They connet two network segments and broadcast packets between them they have the primary function to regenerate the electrical signal: · Reshaping the wavefrom · Amplifying the waveform · Read More …
Write a shell script to convert all the lower case letters of a (text) file to upper case.
************************* if test $# -ne2 then echo Invalid number of parameters else cat $1 tr'[a-z]’ ‘[A-Z]’ **************************
With the help of an example for each, write the usage and syntax for the following LINUX commands.
(1)cAT[OPTIONS] FILE – concatenate (list) a file (2) diff [option] file1 file2 – compare the two files and display the differnces (text files only) (3) sort [option] file – read commands form the file and execute them in the current Read More …
Explain the following with reference to domain name system(DNS):
(1) DNS architecture Name SERVERS are server programs, which hold information about the domain tree’s structure and set information. A name server may cache structure or set information about any part of the domain tree, but in general a particular Read More …
List and expain the characteristics of MOdern operating systems.
· To provide an enviroment for a computer user to execute programs on computer hardware in a convenient and efficient manner. · To allocate the separate resources of the computer as needed to solve the problem given. The allocation process Read More …
Explain the various computer security classification recognised by trusted computer system Evaluation criteria (TCSEC)
Trusted computer system evaluation criteria is a united states government Department of Defense standard that sets basic requirement for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evalute, classify and select Read More …
List and explain the various networking topologies.
A network topology refers to the physical layout of the network in which all the devices are connected. This includes all the hardware that makes up the network. The points of connection to the network by the stations are called Read More …
Explain the memory management concepts in LINUX o/s.
The memory management subsystem is one of the most important parts of the operating system. The memory management subsystem includes: Protection: Each process in th system has its own virtual address space. These virtual address space are compeletly separate from Read More …