Tuesday, October 1, 2013
How can firewalls secure a network?
Posted by
Sunflower
at
10/01/2013 07:30:00 AM
0
comments
Labels: Application layer, attacks, Communication, Control, Data, Firewalls, Hardware, Layers, Network, Network layer, Networking, Packets, Protocols, Secure, Security, Software, System, Threats, traffic
![]() | Subscribe by Email |
|
Sunday, September 15, 2013
What is inter-network routing?
Posted by
Sunflower
at
9/15/2013 02:16:00 PM
0
comments
Labels: Address, Bridge, Destination, Functionality, Gateways, Hardware, Host, Inter-network Routing, Network, Networking, Packets, Performance, Protocols, Route, Routers, Routing, Software, Switch, System, Units
![]() | Subscribe by Email |
|
Saturday, September 7, 2013
Explain the concept of inter-networking?
- OSI or the open system
interconnection model: This model comes with 7 layer architecture that
covers the hardware and the software interface.
- TCP/ IP model: The
architecture of this model is somewhat loosely defined when compared with
the OSI model.
Posted by
Sunflower
at
9/07/2013 11:06:00 PM
0
comments
Labels: device, Gateways, Hardware, Inter-networking, Interface, Internet, LAN, Layers, Link, Networking, Networks, Packets, Protocols, Route, Router, Routing, Software, Switch, Technology, WAN
![]() | Subscribe by Email |
|
Monday, June 24, 2013
Explain the page replacement algorithms - FIFO, LRU, and Optimal
Posted by
Sunflower
at
6/24/2013 11:30:00 AM
0
comments
Labels: Algorithms, Disk, Entries, FIFO, Hardware, Implementation, Items, LRU, Memory, Operating System, Optimal, OS, Page Fault, Page Replacement, pages, Paging, Queue, Replacement, Software, Swap
![]() | Subscribe by Email |
|
Thursday, June 20, 2013
Explain the single and multiple partition techniques?
- Single
partition techniques
- Multiple
partition techniques
Posted by
Sunflower
at
6/20/2013 05:54:00 PM
0
comments
Labels: Advantages, Allocation, Blocks, Dynamic, Hardware, Information, Management, Memory, Multiple Partition, Partition, Registers, Single Partition, Software, Static, Storage, System, Techniques
![]() | Subscribe by Email |
|
Thursday, June 6, 2013
Explain the structure of the operating systems.
About Operating System
Structure of Operating Systems
Posted by
Sunflower
at
6/06/2013 01:15:00 PM
0
comments
Labels: Communication, Components, Data, Errors, files, Hardware, Information, Interface, Memory, Network, Operating System, OS, peripherals, Processor, Programs, Resources, Software, Structure
![]() | Subscribe by Email |
|
Thursday, May 30, 2013
What are the various Desk Scheduling methods?
About Disk Scheduling
- User processes: The functions
of this layer including making I/O calls, formatting the I/O and spooling.
- Device independent software: Functions are naming, blocking, protection, allocating and buffering.
- Device drivers: Functions
include setting up the device registers and checking their status.
- Interrupt handlers: These
perform the function of waking up the I/O drivers up on the completion of
the I/O.
- Hardware: Performing the I/O
operations.
Algorithms for Scheduling Disk Requests
Ways to attach to a disk
Posted by
Sunflower
at
5/30/2013 01:09:00 PM
0
comments
Labels: Algorithms, device, Disk, Disk Drive, Disk Scheduling, Hardware, Input, Interrupts, Layers, Logical, Methods, Output, Performance, Process, Requests, Scheduling, Software, Time, User, Wait
![]() | Subscribe by Email |
|
Wednesday, May 29, 2013
Explain the various File Access methods?
What are access methods?
Benefits of File Access Methods
Some File/Storage Access Methods
Posted by
Sunflower
at
5/29/2013 07:04:00 PM
0
comments
Labels: Access, API, Application, Benefits, Data, Device driver, Devices, Disk, File Access Methods, files, Hardware, Input, Interface, Methods, Operating System, Output, Security, Storage, Tape, Transfer
![]() | Subscribe by Email |
|