What is web Browser? A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web . An information resource is identified by a Uniform Resource Identifier (URI/URL) that may be a web page , image, video or other piece of content. [1] Hyperlinks present in resources enable users easily to navigate their browsers to related resources. Although browsers are primarily intended to use the World Wide Web, they can also be used to access information provided by web servers in private networks or files in file systems . The most popular web browsers are Chrome , Edge (preceded by Internet Explorer ), Safari , Opera and Firefox . What is Web Address ? A web address, also known as a URL (uniform resource locator), is an Internet or intranet name that points to to a location where a file, directory or website pa
Posts
Security Measures
- Get link
- X
- Other Apps
DATA BACKUP A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss. Data loss can be caused by many things ranging from computer viruses to hardware failures to file corruption to fire, flood, or theft (etc). If you are responsible for business data, a loss may involve critical financial, customer, and company data. If the data is on a personal computer, you could lose financial data and other key files, pictures, music, etc that would be hard to replace. As part of a data backup plan, you should consider the following: What data (files and folders) to backup What compression method to use How often to run your backups What type of backups to run* What kind of media on which to store the backups Where to store the backup data for safekeeping 2. Cryptography Cryptography includes techniques such as microdots, merging words with images, and other ways to hide
Types Of Computer Security Risks
- Get link
- X
- Other Apps
A computer security risk is any action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. types of security risk s ; (a) Malware : Malware is malicious software, which are programs that act without a user’s knowledge and deliberately /purposely alter the computer’s operations. Types of Malware : *Computer viruses : A potentially damaging program that affects, or infects a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission *Worms : P rogram that copies itself repeatedly, for example in memory, using up resources and possibly shutting down the computer, device or network. * Trojan Horses : P rogram that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or device. (b ) Hardware Theft poses les
What is Computer Ethics ?
- Get link
- X
- Other Apps
COMPUTER ETHICS is the moral guidelines that govern the use of computers , mobile devices and information systems . Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artific
Rules Of Netiquette
- Get link
- X
- Other Apps
Introduction Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online environment. Consider the following "rules," adapted from Virginia Shea's The Core Rules of Netiquette , whenever you communicate in the virtual world. Rule 1: Remember the Human When communicating electronically, whether through email, instant message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else had written it?" Rule 2: Adhere to the same standards of behavior online that you follow in real life While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your bes