Skip to main content

Newer Post or latest post

Li-Fi vs Wi-Fi: A Battle of Light and Waves

Li-Fi vs Wi-Fi: A Battle of Light and Waves Li-fi is a light fidelity device that supports only the infrared and other lighting systems to transfer the data to the device which is used to receive from the sender device. Wifi is a wireless fidelity device that supports the radio waves to transfer the data to the wifi device which is used to receive the wifi signals at the limited ranges due to the device version capacity. Introduction to the computer system and computer applications related topics are listed following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves Let’s discuss the computer system related topic and questions above listed and their answers are following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves There are some points on the computer system and data communication related to the topic of “Li-Fi vs Wi-Fi: A Battle of Light and Waves” following below here: Lifi based data communication system:- Li-Fi is a light based signal data transmission ...

What are the 2 types of security being applied to a database?

Introduction to the computer system related topic and the topic is following below here:


What are the 2 types of security being applied to a database?


Let's discuss the computer system related topic is mentioned above and the explained following below here:


What are the 2 types of security being applied to a database?

There are some points on the computer system and database security technology related topic of "What are the 2 types of security being applied to a database?" following below here:


There are two types security method that applied on the database following below here:


  • Low level security such as basic login system 
  • Login system have two types are 
  • username and password
  • Username and two password with robot captcha
  • High level security contain verification confirmation with another key to login the database
  • Using third party site to confirmation the login user on the database


Let's discuss these points listed above about the computer system and database security technology related topic of "What are the 2 types of security being applied to a database?" explanation following below here:


There are two types security method that applied on the database following below here:


Low level security such as basic login system 

Low level security means the security is to protect the database file through the interface of two verification only which is known as login name or user name and password or security key of username.


Low level security such as basic login system

These types of security are common to all security processes on the database security method.

These types of low security methods can be hacked, cracked, and attacked by the cybercriminals to steal the information from the database file by breaking the application software of the database.


Login system have two types are 

username and password

Username is used to provide the interface to enter the user's identification name into the text box and password means to enter the secret security key into the text box of password for verification of the account user using the method of the login system on the database application software.


Username and two password with robot captcha

Username and two passwords are necessary to enter otherwise the account user cannot access the database application to open their database and cannot access without the two password system and username on the database. 

The robot captcha is verification of robot vs human because some robots access the account of the particular user.

In this process the robot captures the process of verification by using the image data to verify by manual process and only can understand their logical questions or pattern drawn at the image data. The human user only can point out the right data from the image data on the robot captcha process of verification.


High level security contain verification confirmation with another key to login the database

High level security contains verification and confirmation methods using the third party sites or devices which are used to verify the account of the user on the database application software to access the database file and their personal database.

High level security increases the security layer on the account of the particular site or portal where the user wants to increase their security on the account on the particular site or portal.

The high level security on the account of a particular site or portal needs these users who have a business account on the particular site or portal because these accounts can be connected to the bank account details or other types of money earning site etc.


Using third party site to confirmation the login user on the database

Using a third party site to confirm the login system of the account user on the database application software using the confirmation system process over the login interface.

That means the third party site is used to confirm the login account by sending the verification code to their server and they receive it to provide to the account of the user and the user can access their account on the third party site to get the code for verification of their account of database application software to open their to access their account on the database server and verify the security process and complete it.

It is a manual process of verification because the manual process is only completed by the genuine user when the user needs to make their account more secure from the other unknown user who wants to access their account.

Comments

Popular posts from this blog

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

Describe the different ways of mobile communication systems for users?

Describe the different ways of mobile communication systems for users? Mobile communication makes it easy to connect with many users through the different types of ways to provide the communication system, share the information to each other and make communication between two or more users through the mobile devices. Such as:- an internet service provides many ways to connect the users in the text, audio, image and video file or data connections sharing the information to each other using these data types to communicate to each other. The user needs to communicate with the other user on the data communication system application software provide the process the data to send the file or message to the user who is connected to the communication application software through their user ID name or email to communicate to share the text or audio file or video file or image file also can be shared into the application software to the user such as:- if the application software provide the chatt...

I am exploring the points on if data centers uses a SAN how it is bigger than SANs?

Is data centers using a SAN and how much are data centers bigger than SANs? The data centers are used to provide the big data analytics for the website and companies to provide the processed data for making different types of informed decisions at a large amount of data processing in the data centers because it is a very big area to install into the building and many buildings if it requires to install into many buildings. The large requirement of data centers installation is necessary because the data centers uses many types of computers, storage devices, network attached storages, network devices such as:- servers, switches, hubs, routers, bridges, repeaters, gateways etc. data cables and different types of network equipment to use in the data centers to make a large area of data processing for the companies uses and major projects for website at larger industrial area for website for data processing. The storage area network is used to provide the high performance of data processing...