Css

Cards (35)

    1. Dynamic Configuration:
    Dynamic configuration refers to the ability of a system or software to adjust its settings, parameters, or configurations during runtime or while it's running. This allows for flexibility and adaptability without requiring manual intervention or stopping the system.
    1. Sharing a Folder on a Server PC:Sharing a folder on a server PC involves these basic steps:
    • First, create the folder you want to share.
    • Right-click on the folder and select "Properties."
    • In the Properties window, go to the "Sharing" tab.
    • Click on "Advanced Sharing..."
    • Check the box that says "Share this folder."
    • You can also set permissions for who can access the shared folder.
    • Click "Apply" and then "OK" to save the changes.
    1. Sharing a Folder on a Server PC:Sharing a folder on a server PC involves these basic steps:
    • First, create the folder you want to share.
    • Right-click on the folder and select "Properties."
    • In the Properties window, go to the "Sharing" tab.
    • Click on "Advanced Sharing..."
    • Check the box that says "Share this folder."
    • You can also set permissions for who can access the shared folder.
    • Click "Apply" and then "OK" to save the changes.
  • Challenges in Dynamic Configuration
    • Ensuring security: Allowing dynamic changes while maintaining system security can be tricky, as you need to authenticate and authorize users appropriately
    • Handling conflicts: If multiple users try to change configurations simultaneously, conflicts can arise that need to be resolved gracefully
    • Testing and validation: Ensuring that dynamic changes don't break the system and that they work as intended under various scenarios requires comprehensive testing and validation procedures
    • Performance impact: Dynamic configuration mechanisms can sometimes introduce performance overhead, so optimizing their implementation is important
  • Cybercrime
    Criminal activities carried out by means of computers or the Internet
  • Types of unlawful deeds under cybercrime
    • Cybersquatting
    • Cybersex
    • Child pornography
    • Identity theft
    • Illegal access to data
    • Libel
  • RA no. 10175
    The Cybercrime Prevention Act of 2012, a law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and the internet
  • Cybercrime offenses included in the Cybercrime Prevention Act of 2012 include cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel
  • Cybercrime
    Relating to, or involving computers or computer networks (such as the internet)
  • Cyber world
    The virtual computer world, and more specifically, an electronic medium used to form a global computer network to facilitate online communication
  • Cyberbullying
    The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
  • Hacking
    The practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective
  • Hackers
    Individuals who engage in computer hacking activities
  • Phishing
    The attempt to obtain sensitive information such as usernames, passwords and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication
  • Piracy
    The practice of illegally copying and selling digital music, video, computer software and more
  • Identity theft
    The deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss
  • Types of libel
    • Libel (written)
    • Slander (verbal)
  • Cybersex
    A virtual sex encounter in which two or more people (connected remotely via internet) send each other sexually explicit contents or sexually explicit acts
  • Child pornography
    A form of child sexual exploitation
  • Cybersquatting
    Registering, trafficking in, or using an internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else
  • Copyright
    A legal device that gives the creator of a literacy, artistic, musical or other creative work the sole to publish and sell that work
  • Copyright infringement
    Violation of copyright
  • Plagiarism
    An act or instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author's work as one's own, as by not crediting the original author
  • Fair use
    A legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee
  • Netiquette
    The correct or acceptable way of communicating on the internet
  • Network topology

    The arrangement of nodes in a computer network to enable communication
  • Network topologies

    • Bus
    • Star
    • Ring
    • Mesh
    • Hybrid
  • Understanding network topologies
    1. Understand various network topologies
    2. Understand advantages and disadvantages of bus, star, ring, mesh and hybrid topologies
  • Physical topology

    The physical placement of nodes in a network
  • Logical topology

    How data flows between nodes in a network
  • Bus topology

    • Common transmission medium
    • All nodes connected to transmission medium
    • Data transmitted is received by all nodes
  • Ring topology

    • Nodes are peer-to-peer
    • Unidirectional communication
    • Uses a token to control access
  • Star topology

    • All nodes connected to a central hub/switch
    • Central node controls communication
  • Mesh topology

    • Each node directly connected to every other node
    • Provides 100% fault tolerance
  • Hybrid topology
    A combination of two or more different network topologies