Windows XP is anoperating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, and media centers. It was released in 2001. The name "XP" is short for "eXPerience."[3] Windows XP is the successor to both Windows 2000 Professional and Windows Me, and is the first consumer-oriented operating system produced by Microsoft to be built on theWindows NT kernelandarchitecture. Windows XP was first released on October 25, 2001, and over 400 million ...
1) In a multiprogramming and time sharing environment, several users share the system simultaneously. This situation can result in various security problems. What are two such problems? Can we ensure the same degree of security in a time shared machine as in a dedicated machine? Explain your answer. Ans 1. A) Problems Stealing or copying a user's files; Writing over another program's (belonging to another user or to the OS) area in memory; Using system resources (CPU, disk space) without prop...
Wireless network generally can be defined as a network which is set up by using radio signal frequency to communicate among computers and other network devices. Wireless networks known as WiFi network or WLAN. As a network grows and expands wireless networks are extremely popular and easy to setup feature and no cabling involved. There are two main components to access the wireless network which are wireless router or access point and wireless clients. Wireless network normally used in 802.11...
Although most of the people think that there is nothing to do a research in the area of computer virus protection, there are more and more things to research as everyday more than 200 computer malware are created by the virus creators. In the modern world most of the people are using computers in their day-to-day activities. So it is more important to have knowledge of computer viruses and protecting the computers from those viruses. \begin{sloppypar} \end{sloppypar} Identifying what the comp...
Recently, the uses of digital photogrammetry became more popular and now it had made photogrammetric technique became easier, quicker and cheaper. This study discuss about the capabilities of different photogrammetric software to build 3D mapping. The studies area will carry out on Shah Alam city and possible to cover around UiTM. Next data will be using Ground Control Point (GCP) using GPS. Since using two different of photogrammetric software, it involves processing the image such as aerial...
INTRODUCTION: The study of under Earth's by calculating vibrations on the Earth's surface. Seismology can either be passive or active. The passive is by just listening to vibrations caused by earthquakes and volcanic activity where as the active one is by using small explosive charges to send vibrations into the ground. Today, most of the seismograms are registered digitally to make interpretation easily by the computers. Seismograms are essential for calculating earthquakes using the Richter...
Radio communications often need a more elaborated model to reduce fading effects, which affect the power of the signal. This attenuation of the signal is mainly due to an environment of propagation rich in echoes and thus characterized by many multi-paths, but also to the relative movement of the transmitter and involving receiver causing channel temporal variations. Transmission channels types Binary Symmetric Channels BSC The binary symmetric channel (BSC) is a discrete channel of which alp...
This lab is particularly required the student to connect multiple network and liked them together as they can access to each other. From the previous lab, it had been clearly stated how to connect two network by using crossover cable. In the further question, it is require us to connect three networks by using 2 crossover cables by using an addition NIC in one of the PC 1. There are few command we use during lab session for example ping <IP address> is use to ping the other PC in the ne...
Abstract-New networking protocols are desired essentially in future Optical Wide Area Network (OWAN) environments to meet increasing demands of communication with low latency and high bandwidth. In this paper, a simulation study based on 100 nodes random topology is conducted to observe packet delay patterns and efficient link utilization for two session traffic sources Exponential and CBR (Constant Bit Rate), with number of wavelengths (16, 32, 48 and 64) while varying packet sizes ranging f...
1 Introduction Steganography is the art and science of writing hidden messages in such a way that no one except from the intended recipient knows of the existence of the message. Steganography literally means "covered message" and involves transmitting secret messages through seemingly innocuous files. In terms of "Digital steganography", a file can be hidden inside another file. Current digital techniques do not tend to take the cover (where the message is hidden) into account, and thus leav...