Skip to main content

Newer Post or latest post

Li-Fi vs Wi-Fi: A Battle of Light and Waves

Li-Fi vs Wi-Fi: A Battle of Light and Waves Li-fi is a light fidelity device that supports only the infrared and other lighting systems to transfer the data to the device which is used to receive from the sender device. Wifi is a wireless fidelity device that supports the radio waves to transfer the data to the wifi device which is used to receive the wifi signals at the limited ranges due to the device version capacity. Introduction to the computer system and computer applications related topics are listed following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves Let’s discuss the computer system related topic and questions above listed and their answers are following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves There are some points on the computer system and data communication related to the topic of “Li-Fi vs Wi-Fi: A Battle of Light and Waves” following below here: Lifi based data communication system:- Li-Fi is a light based signal data transmission ...

What are security techniques ?

Introduction to the computer system related topic and the topic is following below here:


What are security techniques ?


Let's discuss the computer system related topic is mentioned above and the explained following below here:


What are security techniques?

There are some points on the computer system and security techniques related to the topic of "What are security techniques?" following below here:


Security techniques methods are available applied on the computer system following below here:


What are security techniques? There are some points on the computer system and security techniques related to the topic of "What are security techniques?" following below here:  Security techniques methods are available applied on the computer system following below here:

  • Application software protection makes the security of the computer system
  • Backup method is protect the data of the computer system
  • Access control can also protect the database of the computer system
  • Security wall or Firewall is used to makes security layer of protecting the operating system and resources 


Let's discuss the points above about the computer system and protection of computer systems related to the topic of "What are security techniques?" explanation following below here:


Application software protection makes the security of the computer system

Application software protects the computer system through the application antivirus protection shield applied on the operating system of the computer system.

The application of antivirus software applies the layer on the operating system to protect the database of the computer system which has stored into the memory of the storage device of the computer system.

The antivirus application software applies the layer of the scanning for protection of the database stored into the memory of the storage device of the computer system.

The scanning is a process that works on the database stored into the storage device and computer system that is protected from the malicious files. The malicious files are used to convert the file extension into the same extension for preparation of transmission of the file from the computer system of the user to the server of cybercriminals.


Backup method is protect the data of the computer system

Backup method protects the data of the computer system because the backup method is used to create a back storage for storing the important database which is necessary to store that has value for the user on the computer system.

The database backup is used when the user totally formats all the drives of the storage device on the computer system due to viruses and their corrupted files stored into the memory of the storage device.

Then the backup file and folders are used to provide value application software and other files that have value for the user in the future on the computer system. The database backup is very useful for the user because the backup of the database is stored and collection of the valuable file and application software for the user.


Access control can also protect the database of the computer system

Access control can also protect the database of the computer system that means the access control is a process or method to access the computer system and its database or computer network system and its database using the layer of the application software that applied over the accessing of the operating system when the computer system is turn on and the user interfaces the layer of the access the computer system to open their user account which is created on the computer system on the operating system.

The access control can control the user to access the operating system and database of the and the access control is used for protection of the database of the computer system and computer network system with its database.

The database also can be protected from the access control layer applied on the database application when the login on their account on the database application software. It is protected by the user name and password.


Security wall or Firewall is used to makes security layer of protecting the operating system and resources 

Security Wall or Firewall is used to make a security layer on the operating system and to protect from access the resources through the malicious files when without a security wall these types of malicious files are inserted into the database and corrupt all the valuable files and informative database which is most important for the user on the computer system.

The operating system needs the security layer through the firewall or security wall over the access of the network device or other types of devices which may include viruses or malicious files in the form of database or system files etc.

The security wall or firewall works similarly to the Antivirus application software over the database of the computer system. 

The security wall or firewall scans all types of database which are stored into the memory of storage devices of the computer system such as permanent storage devices or detachable devices, flash drives etc.

Comments

Popular posts from this blog

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

Types of Local Storage in Computer Systems

Describe the different types of local storage of computer systems? The local storage device is a type of memory for the user to keep a database file for a long time to access again and stored as a distributed offline database on the local storage. The local storage device can be pendrive, compact discs, dvd, floppy drive, HDD, SSD, memory card etc. The local storage needs to keep the valuable database file for the user to provide the lost database if suddenly deleted or formatted the whole drive of the computer system. Local storage in computer systems refers to devices or media that store data directly connected to the computer. There are several types, including Hard Disk Drives (HDDs), which use spinning disks and magnetic heads to store data; Solid-State Drives (SSDs), which store data in flash memory, offering faster access times and lower power consumption; and Hybrid drives, which combine elements of both. Other forms of local storage include USB flash drives, SD cards, and CDs/...

Discuss the data replication on the distributed database system?

Discuss the data replication on the distributed database system? The data replica is a term that refers to the data replication means the copy of data into the servers distributed to access the copy of data. The data replication in a distributed database system is a term that provides the benefits for the user to easily access the data from the nearby server provided for the client user from the website. The data can be easily accessible from the server and provide the fast speed with reduces the latency of the data transfer to the client server such as:- if the user access the data from their smartphone device then the data will be fast to load because the nearby server provide the data replicated or copied of data to the user. Data replication in a distributed database system involves creating and maintaining multiple copies of data across different nodes or locations to enhance availability, reliability, and performance. It ensures that users can access data even if a node fails, re...