Services: Web server, mail-server, ftp-server

Examples of Database Applications

The following are examples of database applications:

- computerized library systems;

- automated teller machines;

- flight reservation systems;

- computerized parts inventory systems.

 

9. Сұрақ: Give definition to Computer networks

Жауап: A computer network is a collection of computers and devices connected via communication devices and transmission media. Computer network is a telecommunication channel through which we can share our data. It is also called data network. The best example of computer network is Internet.

The main purpose of the network - a convenient and fast data exchange (of information) between devices.

Network components:

- End Devices - End Device

- Network Media (medium) - Network environment.

• The network devices that people are most familiar with are called end devices. These devices form the interface between the human network and the underlying communication network

Types of network:

Local-area network (LAN) A network that connects a relatively small number of machines in a relatively close geographical area

Wide-area network (WAN) A network that connects two or more local-area networks over a potentially large geographic distance

• M etropolitan-area network (MAN) The communication infrastructures that have been developed in and around large cities

Types of Networks

Various configurations, called topologies, have been used to administer LANs

Ring topology A configuration that connects all nodes in a closed loop on which messages travel in one direction

Star topology A configuration that centers around one node to which all others are connected and through which all messages are sent

Bus topology All nodes are connected to a single communication line that carries messages in both directions

 

10. Сұрақ: Describe Browsers and search engines, domains

Жауап: When we go to the website, we (or rather, our browser) first sends a request to a web server where you store the files of the requested site, and have a special service (program the HTTP server) processes the request and sends us back the web page file which (web page) and we will see in the browser.

Services: Web server, mail-server, ftp-server.

Alternatively referred to as a web browser, a browser is a software program which helps users to view internet sites and explore content on the WorldWideWeb

. These pieces of content, including pictures, videos, and webpages, are connected using hyperlinks.

Therehavebeenmanydifferentwebbrowsersthathavecomeandgoneovertheyears. Popular web browsers are Internet Explore, Google Chrome, Mozila Firefox, Opera, Yandex and etc.

A search engine is a software program available through the Internet that searches documents and files for key words and returns the results of any files containing those key words. Today, there are thousands of different search engines available on the Internet, each with their own abilities and features. Today, the most popular and well-known search engines are Google, Yandex, Youtube, Rambler, Wikipedia and etc.

For users, a search engine is accessed through a browser on their computer, smartphone, tablet, or another device.

A domain name is a unique name that identifies a website. For example, the domain name of our University is "ayu.edu.kz" Each website has a domain name that serves as an address, which is used to access the website.

The domain code identifies the type of organization. For example:

.com commercial organization

.edu educational institution

.kz Kazakhstan,.ru Russia,.uk-United kingdom,.uz-Uzbekistan,.tr-Turkey

.org Organisation

.gov government of a nation

A domain name canbe a maximum of sixty-three characters with one character minimum, and is entered after the protocol in the URL, as you can see in the following example.

 

11. Сұрақ: Describe IP addressing

Жауап: Internet Protocol Address (or IP Address) is an unique address that computing devices such as personal computers, tablets, and smartphones use to identify itself and communicate with other devices in the IP network. Any device connected to the IP network must have an unique IP address within the network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify an entity.

An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209.IP addresses can be either static or dynamic.

IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and provide a simple and reliable way for remote computers to contact you. Static IP addresses reveal such information as the continent, country, region, and city in which a computer is located; the ISP (Internet Service Provider) that services that particular computer; and such technical information as the preciselatitude and longitude of the country, as well as the locale, of the computer. Many websites provide IP address look-up services to their visitors, free of charge.

12. Сұрақ:   Give definition to information security

Жауап: Information security, information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction is the prevention of experience.

Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerianhexad, which includes confidentiality, possession (or control), integrity, authenticity, availability and utility.

Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.

Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability).

 

13. Сұрақ: Give definition to Computer viruses            

Жауап: The computer virus is the small program written by the programmer of high qualification, capable to self-reproduction and performance of different destructive actions. For today it is known over 50 thousand computer viruses.

A computer virus is a malicious program, which is transmitted from one computer to another, usually over a networks.

A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector  of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless.

Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet, download files, and open attachments.

Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: