Qualification > Miscellaneous

All ICT doubts here!

<< < (62/103) > >>

6394:
ok this is wat i m sur abt for laws part u asked:
DATA PROTECTION ACT
8 principles:
 some terms dat u must noe
Data Subject:
This is the person that the data is being collected from or stored about. This could be you!

Data User:
This is any person who needs to access or use the data as part of their job. This could be a secretary who needs to look up your address so that they can send a letter home to your parents. It could be your doctor who needs to know what allergies you have before prescribing you medicine.

Data Commissioner
This is the person who enforces the Data Protection Act.
This is the person that organisations need to apply to in order to gain permission to collect and store personal data.

for laws i wud prefer u 2 go thru this websyt
http://www.teach-ict.com/gcse/theory/dpa/miniweb/pg4.htm

dere r other laws as wel bt i dont noe which ones


HOPE IT HELPED :) :) :) :) :)

6394:

--- Quote from: lana on May 13, 2010, 04:15:16 pm ---can anyone pleease describe what hubs, bridges, switches and proxy servers are and what are they used for
pleease reply quickly
thanks

--- End quote ---

HUBS: a device dat can have a no. of other devices or compu ters connctd to it usually it has 8-16 ports it does not read any of the packets which arrive frm a compu , but jus sends dem on to all the compus on network including the 1 dat sent it

diva_sparkles:

--- Quote from: lana on May 13, 2010, 04:15:16 pm ---can anyone pleease describe what hubs, bridges, switches and proxy servers are and what are they used for
pleease reply quickly
thanks

--- End quote ---

A hub is a device that connects a number of computers together to make a LAN.

The typical use of a hub is at the centre of a star network (or as part of a hybrid network) - the hub has cables plugged into it from each computer. A hub is a ‘dumb’ device: if it receives a message, it sends it to every computer on the network. This means that hub-based networks are not very secure - everyone can listen in to communications. Hubs are pretty much obsolete now (you can't buy them any more), having been superseded by cheap switches.A switch, like a hub, is a device that connects a number of computers together to make a LAN.

The typical use of a switch is at the centre of a star network (or as part of a hybrid network) - the switch has cables plugged into it from each computer.

A switch is a more ‘intelligent’ device than a hub: if it receives a message, it checks who it is addressed to, and only sends it to that specific computer. Because of this, networks that use switches are more secure than those that use hubs, but also a little more expensive.
A proxy server is a computer setup to share a resource, usually an Internet connection.

Other computers can request a web page via the proxy server. The proxy server will then get the page using its Internet connection, and pass it back to the computer who asked for it.

Proxy servers are often used instead of router since additional software can be easily installed on the computer such as anti-virus, web filtering etc.
A bridge is a network device that typically links together two different parts of a LAN. Whereas a router is usually used to link a LAN to a WAN (such as the Internet), a bridge links independent parts of a LAN so that they act as a single LAN.

6394:

--- Quote from: lana on May 13, 2010, 04:15:16 pm ---can anyone pleease describe what hubs, bridges, switches and proxy servers are and what are they used for
pleease reply quickly
thanks

--- End quote ---
evn i dnt noe abt bridges????
switches:
it is a more advance peice of network hardware than a hub with a switch , the data from any comp is transmitted to its destination widout congesting the other ports <unlike hubs>.a switch is capable of learnin the addreses frm the data packes which are sent to it from devices connectd to it . it sends the data packets directly 2 its destination

7ooD:
i have this doubt in the ring network it showed in may 2008 that each computer is connected to one another in a loop or ring in which if one breaks the whole network is affected but here it showed that they are connected to a ring cable http://www.igcseict.info/theory/4/topo/ which if any is broken then the whole network is NOT affected so who is correct??

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version