Skip to main content

Posts

Showing posts from February, 2025

Newer Post or latest post

Describes the 4 types of basic security applied on the computer system for the end user?

Describes the 4 types of basic security applied on the computer system for the end user? The security is used to work on the logical level protection applied by the application, operating system or database program or network used antivirus to protect the database saved into the storage device of the personal or official used computer system. The database included a sensitive database for personal information or an official database related to the business model to protect from the unknown access of the user. The security protection is necessary available on the application to protect the data of the user of their personal database or official database depends on the protection level and quality of security model such as:- a username is only used to verify without any password then this is a low level of security layer on the user account to access it on the application software. The other password layer is used to make a strong security model to verify the user account which provides ...

Describes the 4 types of basic security applied on the computer system for the end user?

Describes the 4 types of basic security applied on the computer system for the end user? The security is used to work on the logical level protection applied by the application, operating system or database program or network used antivirus to protect the database saved into the storage device of the personal or official used computer system. The database included a sensitive database for personal information or an official database related to the business model to protect from the unknown access of the user. The security protection is necessary available on the application to protect the data of the user of their personal database or official database depends on the protection level and quality of security model such as:- a username is only used to verify without any password then this is a low level of security layer on the user account to access it on the application software. The other password layer is used to make a strong security model to verify the user account which provides ...

Describe the points on the ICT products used as hardware from the users?

Describe the points on the ICT products used as hardware from the users? The hardware used in the ICT such as:- network device which is the main device for communication system for sharing information to each other and the input devices and output device to provide the information and communication according to the medium. The medium for communication like a website or web application that provides different types of service for communication to the users. The network device is used to make a network model to provide the connection between many computers system to provide the service of data sharing to each other if their connection is properly work for sharing protocols in the network model used in the network device such as:- switch is a more intelligent network device to allow the IP address to access of the computer system to share the database file on the network model. The user can access the IP address of the other computer system which is connected to the switch network device ...