Skip to main content

Newer Post or latest post

what is data cable? Types of cables, uses of data cables, importance of data cable explained!

Introduction of data cables Data cable is an important part of computer network model . From smartphone to supercomputer connections and wide range network uses and network models. It helps in network model in different types of topology models also. But we discuss what exactly called a data cable? How it is working with network model? Why these data cables are so important? In this guide, I will provide some information about the definitions, types, uses of data cables on network model with easy explanation of data cable covered topics. What is data cable? [Definition] A data cable is a wire that can transfer the data from one to another computer system. It connects to the ports available on the computer system. The user can transfer the data from one computer to another data cable connection. If two computers are connected then:- In according to data cable male port:- Port 1:- the male port of data cable is used to receive the data from the sender computer. Port 2:- th...

Computer security system and What happens when a computer is augmented with a security system?

What happens when a computer is augmented with a security system?

The computer system is a complex device and electronic machines that provide the computed value to the user on the output device.

Here the computer system has a logical system which is known as a security interface for the end user when the user accesses the computer operating system.

The user can access their account on the operating system when the user verifies the details which had the user saved to verify when the user accesses their account on the operating system on the computer.

When the user access they can increases the security system on the computer on the operating system that means it secured their database in the high security feature such as eye scanned database verification, finger pattern database verification, whole hand patter scan database verification to verify the user is matched their database to access their account on the operating system on the computer.


Introduction to the computer system related topic of computer security system and the question is below here:


What happens when a computer is augmented with a security system?


Let's discuss the computer security system related topic of "What happens when a computer is augmented with a security system?" explained below here:


In this topic the user has to learn about the computer system security increases and its reasons.

The user can access the computer system through their account that has been created on the particular operating system on the computer system.

The account need to verify the username and password or only used if you have created only one account on the operating system on the computer.

The password must be in the alphabets and numerical data with some special characters that some user allow to verify the password during the login system of the operating system on the computer.

The login system mostly contained the username and password system to verify but some option was provided to the user to verify the image portion clicking system where the user selects to click then verify the image data and then the operating system allows access to the account on the operating system on the computer system.



In this image shows the diagram of operating system security for the account user on the operating system on the computer to access their account using the security passing through showing the interface as above in the diagram. Computer security system and What happens when a computer is augmented with a security system?
In this image shows the diagram of operating system security for the account user on the operating system on the computer to access their account using the security passing through showing the interface as above in the diagram.

For example:- If you have a username like sam_age and the password is '1gj75&@io' which is the most strong password to login and verify the password in the login system on the operating system on the computer. Where the user can guess the password, crack the account login of any user they have an idea and analysis of activities etc. To crack the password but this is the strong password that cannot be guessed by the other.


What happens when a computer is augmented with a security system?

There are some points on the computer system and security of computers related to the topic of "What happens when a computer is augmented with a security system?" following below here:


  • It increases the security on the computer system account user on database of computer
  • It is difficult to access if the user forgotten their security code in the account of operating system
  • Network security also can protect the data from the unknown access of user
  • Database of storage device is protected by the features of operating system


Let's discuss the points above about the computer system and security feature of computer related to the topic of "What happens when a computer is augmented with a security system?" explanation following below here:


It increases the security on the computer system account user on  database of computer

Account user on the operating system is a protection setup on the computer system which protects from the unknown user who can access without a security layer applied on the operating system to operate the computer system.


In the image shows the account user n allow to access their account through password verification by the operating system. It increases the security on the computer system account user on  database of computer
In the image shows the account user n allow to access their account through password verification by the operating system.


The account needs mostly two types of attributes such as username and password to access the account which is created in the operating system database on the computer system.

The operating system is used to provide the option to make an account on the operating system or system software to access the user using their account on the computer system to operate the computer system and database which has been stored in the storage device of the computer system.


It is difficult to access if the user forgotten their security code in the account of operating system

It is difficult to access if the user forgot their security code in the account of the operating system. That means there is a rare chance to access the operating system if the security code is forgotten because the operating system is not currently online to access with the internet service on the computer system.

The forgotten option is mostly worked in the online service of computer systems and can recover the password data of the account of a particular user on the operating system on the computer system.

The account user can access to open the operating system in safe mode which mostly all operating systems provide for emergencies to break the password offline method on the computer system.


Network security also can protect the data from the unknown access of user

Network security also can protect the data from the unknown access of the user that means the network security is used to protect the database which is currently used on the transmission of the data in the network architecture or model on the wide area, local area, metropolitan area etc. According to the range of the computer network system to share the database in the network model for a specific purpose of the department.


In this image shows the diagram of computer network system that need to accessed by the client user through the security interface as shown above in the diagram. Network security also can protect the data from the unknown access of user
In this image shows the diagram of computer network system that need to accessed by the client user through the security interface as shown above in the diagram.


Every department has different types of databases which are sensitive to sharing and need to study about the database. So it is necessary to protect from the other user who cannot access the database such as object based file, relational based files, flats files etc.


Database of storage device is protected by the features of operating system

On the database security is applied using the control language command of the database query language on the relational database model. In the memory storage device of the computer system the operating system also provides the security feature to protect the object based file on the computer of the user who can protect their database which has been in the memory of the permanent storage device of the computer system.


In the image shows diagram of the database which is secured by the operating system feature.
In the image shows diagram of the database which is secured by the operating system feature.

The operating system provides the folder to secure the file which is contained in the folder and applies the feature of the password to open the document.

Similarly, folders have also applied the feature to open a folder after the verification of the password is right to access and confirm the password.

Comments

Popular posts from this blog

About the memory and its Classification of the computer Memory

"Hi everyone, I'm Rudra, a CS engineer and passionate blogger. Welcome to my post on [About the memory and its Classification of the computer Memory. ], where I'll share insights on Information Technology and Computer Science education. My goal is to provide helpful information and answer your questions. Feel free to ask me anything in the comments below. Let's dive into today's topic…🙂” What are the memories in the reference of computer system? What is Computer Memory?:- The memory is the essential for the computer to store the data, instruction and information. Without memory, computers are not be able to store data, instruction etc. The memory is an essential part of a computer system. It is require by the computer system to store information. Memory can be divided into the following two categories types: i) Primary or Main memory ii) Secondary Memory or Permanent memory In this figure I'll show the classification of the memory of computer s...

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

how the track ball is differ from the mouse and joystick

What are the differences between trackball, mouse and joystick devices? The differences are according to the track ball device verse mouse and joystick Trackball The track ball is a pointing device which contains a ball over the device or above the device. The track ball is a statics device that cannot move from one place to another. The track ball gives you a stability to use the device without moving the whole and just move the ball or roll the on the device. It uses as input device that depends on finger and thumbs only to moves the ball. It is slower than mouse due to cause the dependency the finger and thumb to move the ball to track the path of the pointer. What is trackball used for? The trackball is an input device which is used to provide 2 dimensions to move the ball over the device the ball is attached to. The trackball is used to move the pointer of the operating system where the ball is moved according to the position of the 2 dimensions x and y axis on the...