Skip to main content

Posts

Lesson 2- Protecting Yourself Online - ppt download

Lesson 2- Protecting Yourself Online - ppt download : Objectives Determine the strength of passwords Protect against identity theft Determine how to remain safe on public networks Evaluate online threats Protect against malware/hacking
Recent posts

EDP LECTURE 2

                                              MARWARI COLLEGE,RANCHI                                        (UNDER RANCHI UNIVERSITY,RANCHI) NAME :RAJU MANJHI SUB: EDP SEM : V (IT/CA/CM) ________________________________________________________________________________ characteristics of entrepreneur An entrepreneur has to have mental ability, which consists of intelligence and creative thinking. He must be reasonably intelligent and should have creative thinking and should be able to engage in analysis of various problems and situations in order to deal with them. He should be able to anticipate the situation in order to prepare for tomorrow. (Creative thinking: think differently.) . He must have a clear objective of the nature of the business, the nature of the goods to be produced, and the activities to be undertaken. He may have the objective to establish, to make profit, or to render service. Business secrecy: This is very
    MARWARI COLLEGE RANCHI                                                (UNDER RANCHI UNIVERSITY ,RANCHI) RAJU MANJHI  DEP. OF B.Sc(CA) ,MCR ________________________________________________________________________________ SEMESTER : VI BCA/IT/BCM  SUBJECT : EDP SESSION:18-21 TOPIC : DEFINITION OF EDP : Entrepreneurship 1.         Concept:             Entrepreneurship is derived from French root, which means to undertake. But people today call it by various names - adventuresome (to start something different from others), risk taking, thrill seeking (much of up’s and down’s), innovating (something new). Hence the word entrepreneurship in today’s concept can be called an event of adventuresome which takes risks, seeks thrills and innovative. I.          According to Higgins: Entrepreneurship is the function of seeking investment and production opportunity, organizing an enterprise to undertake a new function process, raising capital, hiring labor, arranging supply of raw materials, fin

Lecture 5 (BCM)

Benefits of Using Proxy Servers 1. Your IP Address Is Hidden One of the best proxy server advantages – by using a proxy, the website you access will not be able to log your real IP address, as it will log the proxy server’s IP address instead. Yes, that means you’re somewhat anonymous when you browse online. D on’t forget –   your IP address   ca n tell someone a lot about yourself, like what country and city you are from. Crafty cyber criminals can even go the extra mile and use your IP address to find out things like who your ISP is, what your zip code is, and even what street you live on.   How would a hacker get access to your IP address, you ask? Sadly, a data breach or leak on a website you visit could be enough for them to get their hands on this info. So, something like this is definitely useful nowadays. 2. You Can Access Geo-Blocked or Restricted Content Unfortunately, a lot of online content is actually hidden behind  geo-restrictions  – mostly because of net

Lecture 4(BCM VI)

What Is the Purpose of a Proxy Server?   A proxy server is a special type of network node that alters packets that pass through it, masking their IP addresses and making it seem that the packets originated at the proxy system. Proxy servers may be a natural part of your network architecture, or they may be third-party servers that provide anonymity to their users. Using a proxy can help mask your activities online from prying eyes, but it can also open up your business's computer network to a host of security threats. Networking In some cases, a proxy server may be required due to your networking configuration. If you have multiple PCs in your home, the router provided by your Internet service provider serves as a sort of proxy for your system. All outgoing traffic first travels to the router, which serves as your connection to the outside world. From the perspective of the Internet, all your traffic seems to come from a single IP address, no matter how many machines you co