...Nt1110 Lab 10 Research Project E-Commerce Security E-Commerce (Electronic commerce or EC) is the buying and selling of goods and services ort he the transmitting of funds or data, over an electronic network , primarily the internet. These business transactions occur either business to business ,business to consumer ,consumer to consumer or consumer to business. The terms e-commerce and e-business are often used interchangeably. The term e- tail is also sometimes used in reference to transactional processes around online retail. E-commerce is conducted using a variety of applications, such as email, fax, online catalogs and shopping carts , Electronic Data Interchange (EDI),File Transfer Protocol, and Web services. Security is an essential part of any transaction that take place over the internet .Customer will loose his/her faith in E-commerce if its security is compromised. Following are the essentials requirements for safe e-payments/transactions. Confidential-Information should not be accessible to unauthorized person. It should not be intercepted during transmission. Integrity-Information should not be altered during its transmission over the network. Availability-Information should be available wherever and whenever requirement within time limit specified. Authenticity-There should be mechanism to authenticate user before giving him/her access to require information. Non-Repudiability-It is protection against denial of order denial of payment. Once a sender...
Words: 813 - Pages: 4
...The operating system that I am using is windows 7. The service pack in my windows 7 is service pack 1. Windows 7 has many features that make it well windows 7. The first one is Windows Aero, which they tweaked just a little bit from Windows vista to windows 7. The second feature is the gadgets. Unlike windows vista, in windows 7 they do away with the sidebar and just have free floating gadgets on the side of the desktop. The third feature is the modified start menu, which was not changed much from windows vista. The fourth feature is the taskbar, which has been there for quite some time through the years. The final feature is windows explorer, which has added libraries to it. The first feature that has changed a little is windows aero. They didn’t change windows aero much but making some minor changes to the color scheme and graphics. Finally it is much smoother than what is was in windows vista. The second feature that has changed is the gadgets. They tweaked how some of the gadgets looked. Finally they also took away the side bar and made the gadgets free floating, which this makes them look more appealing to the eyes. The third feature that has changed a little is the start menu. They haven’t done much to the start menu over the years. It still helps you navigate through your programs and certain folders and features. You can do all of this without having to dive to deep into your computer. They didn’t change much of the start menu from vista to 7 other than adding some...
Words: 622 - Pages: 3
...Transfer Time 1 Transfer Time and File Size Transfer Time 2 Abstract Calculating Transfer Rate, Transfer Time and File size can be pretty difficult unless one has a basic knowledge of binary numbers and the different types of storage capacities that are out there. In order to figure out how fast a download will take there is some math that needs to be figured out and in this paper I will mention the way to conquer this task. Transfer Time 3 Transfer Time and File Size The very first step to understanding transfer time and file size is to first know that 1 byte is equal to 8 bits as well as what each component is exactly. A bit is defined as:” a single basic unit of information, used in connection with computers and electronic communication”. (Quote, n.d.) A byte is “pronounced ‘bite’, is the next size up basic unit of measurement for information storage, usually consisting of 8 bits”. (Quote, n.d.) The next set of terms that are used is: Kilo (kilobytes) equal to 1,000 bits stated in decimal form or 1,024 bytes stated in binary form. Then we have Mega (megabytes) equal to 1,000,000 decimal bits or 1,048,576 binary bits. Next is one of the bigger bytes and that is Giga (gigabytes) which is equal to 1,000,000,000 decimal bits or 1,073,741,824 binary bits. After figuring out the numbers to these complex bits of information, the next step is to understand the speed of transferring data. This is simply downloading information...
Words: 1000 - Pages: 4
...* NT1110 Computer Structure and Logic * Short Answer 1.1 * Describe the purpose and function of an operating system. Explain at least five differences among Windows, Linux, and Mac OS X operating systems. * An operating system is the basic platform for any computer. This platform is designed act as a translator to peripheral devices perform basic tasking from Input/output devices and maintaining files and directories on the hard drive. In a larger system, the O/S acts as a traffic manager to ensure there are no jams or interferences between programs and users. The O/S also maintains security to prevent access from unauthorized users. * Operating systems provide a software platform to run other programs, or applications. These applications are specific to particular operating systems. There are three main operating system that are used today. They are Windows, MAC O/S x, and Linux. Each operating system uses commands that the user would use to interact with the system. These commands perform simple functions such as copy, rename, delete etc... The user would use a keyboard to enter these commands on the command prompt. Graphical user interfaces (GUI) (Windows and Mac) uses a mouse or pointer to click on objects on the screen. * Windows is an Operating system that allows people to manage files and run software programs on desktop and laptop computers. It also uses a GUI, icons and start menu are the primary ways people use to navigate windows. Windows has...
Words: 372 - Pages: 2
...Matt Bristow NT-1110 Unit 6 Research Paper NAS Devices NAS is an acronym for Network-Attached Storage. It is basically a file-level computer built for data storage connected to a computer network providing data access to any computer connected to that network. The speed for any particular NAS device varies from 1 gigabit all the way up to 10 gigabits depending on what upgrades a pc has such as an upgraded network cards. The capacity range for NAS devices also depend solely on the budget set forth. It can be a low range system with 500 gigabytes, all the way up to a wallet-busting 16 terabytes. The fault tolerances when set at RAID 10 are the most stable since more devices can fail while protecting against any potential data loss. The advantages of an NAS device are that since it is a dedicated file storage device, accessing said data is a lot faster than typical in-pc hard drives. Another advantage would be the amount of storage you're capable of having. It far outpaces pc's in storage capabilities because all it is built for is storage. For a family with a lot of pictures or videos, the advantages are that any computer connected to the NAS device can access them. It's a library for any media/documents/or anything else you can think of that can be accessed at any time by any pc connected to it. They might be pricey for a casual pc user but when dealing with multiple pc's connected to a single network, an NAS device would be the perfect option when space becomes an...
Words: 274 - Pages: 2
...1. The system bus and I/O bus carry four different types of signals throughout the computer. Which of the following are the signals? (Choose all that apply.) A, B, C & E – The four different types of signals carried out by the system bus and I/O bus are data, power, control and address. 2. Which of the following are considered expansion slots? (Choose all that apply.) A & C – Expansion slots are PCI and AGP. 3. Which of the following can you use with SCSI (Small Computer Systems Interface)? (Choose all that apply.) A, B, C & D – You can use hard drives, scanners, laser printers and dvd-roms with small computer interfaces. 4. Which of the following are in the ATX family of motherboards? (Choose all that apply.) A, B & C – ATX, mini-ATX and FlexATX are all part of the ATX motherboard family. 5. Which of the following are considered integrated I/O ports? G – Serial ports, parallel ports, USB ports, PS/2 mouse and keyboard, audio ports and Ethernet ports are all types of I/O ports. 6. To connect speakers to the sound card, which of the following must you use? D – You must use a 1/8inch mini-jack cable to connect speakers to a sound card. 7. How many pins are DDR SDRAM two-section memory slots designed for? B – DDR SDRAM two-section memory slots are designed for 184 pins. 8. Which or the following is a common speed for PCI? A – 33MHz is a common speed for PCI. 9. Which of the following expansion bus technologies would be described as x16 (spoken as “by sixteen”)? C...
Words: 492 - Pages: 2
...A port expander is a hardware device that can allow multiple devices to be attached to one port on a computer via either internal or external. An internal port expander is one that is already inside of a computer or one that you can physically put inside the computer yourself, also can be located on the mother board of the CPU. An external expander is one that you can buy and just attach to the outside of the computer in an I/O port to allow the use of multiple devices as well. The advantages of this hardware is that one can use multiple devices through just one port just like one could use a multi plug extension cable to attach many different items. The disadvantage is the running speed isn’t changed at all and depending on the amount of items you have connected can run the speed down on such an expander, another disadvantage could also be the price while some expanders are quite cheap others can be very costly as well. Port expanders can be often generic, however, there are few that are computer specific the reasoning behind this is that with computer specific expanders one would have to know the type of motherboard inside the computer that would be having the expander put inside, external expanders would be the ones that are generic because they can run through ports already in the computer such as the I/O port. Different types of ports available in expander hardware are the addition of Ethernet cable ports, also ports for additional mice if needed, there is also...
Words: 373 - Pages: 2
...Unit 3 Assignment 1 Video Clip 1.07 Serial Parallel & Game Ports * Serial ports – 9 or 25 pins (male) * Parallel ports – 25 pins (female) * Game ports – 15 pins (female) Mouse – serial connector (old), PS/2, or USB/wireless Keyboard – 5-pin DIN (old), PS/2 or USB/wireless Network Inteface card – converts parallel communication to serial (RJ-45 connector) Modem – connects to phone line (56k), converts analog to digital & vice versa (RJ-11 connector). Video – VGA, DVI, or S-video SCSI – narrow (50-pin Type A), wide (68-pin, type P) IEEE 1394 (firewire) – serial, fast, hot swappable, used for streaming media, expected to replace SCSI Multimedia – Microphone, speakers, earphones, color coded. Video 1.09 CRT Monitor (old) & LCD Monitor (new) CRT – Cathode Ray Tube LCD – Liquid Crystal Display Contrast Ratio – Ratio of purest white to purest black Dot pitch – CRT – Distance between phosphorescent dots Pixel Pitch – LCD – Addressable pixels on screen, same as resolution. Resolution – Both CRT & LCD – Addressable points on screen. PCI Express – twice as fast as AGP Video 1.10 RAID – Redundant Array of Independent Disks Fault tolerance – real time copies of data, and data is not lost if hard drive fails. RAID – protect data in real time. RAID 0 – Striped Volume – faster speeds, no fault tolerance. Requires two or more drives, max 32 drives, CPU writes data evenly among drives, each disk has partial copy. RAID 1 – Mirrored Volume...
Words: 487 - Pages: 2
...Security Introduction Security introduction is what the first video is about; it tells us what topics the next seven videos will cover. * Local Security Policy * Physical Security * Firewall * Wireless Security * Authentication * Encryption * Viruses Physical Security & Authentication In this video we learn about how to secure your computer and servers theft or tampering. You would do this by locking and controlling access to servers and locking computer cases as well. To protect them even further you should put server locations in high traffic areas, and create administrative alerts with audible alarms. You should also store backup in a separate and secure location, and lock user operating systems. Always physically destroy hard drives. This video also teaches us about CMOS password and how to set them up. We can create limits to the access through CMOS with full, limited, view only, and no access. We also learn about password protecting the hard drive. * Physical Security * Authentication * CMOS Password * Kerberos-Method used to encrypt passwords What I learned from this video is that companies go through great lengths to protect their computers and servers from intrusion. This video was basic and straight forward and not confusing at all, if anything its confusing that we should have to do so much to secure our files. I guess this information would best be used if you working for security...
Words: 613 - Pages: 3
...Security Introduction Security introduction is what the first video is about; it tells us what topics the next seven videos will cover. * Local Security Policy * Physical Security * Firewall * Wireless Security * Authentication * Encryption * Viruses Physical Security & Authentication In this video we learn about how to secure your computer and servers theft or tampering. You would do this by locking and controlling access to servers and locking computer cases as well. To protect them even further you should put server locations in high traffic areas, and create administrative alerts with audible alarms. You should also store backup in a separate and secure location, and lock user operating systems. Always physically destroy hard drives. This video also teaches us about CMOS password and how to set them up. We can create limits to the access through CMOS with full, limited, view only, and no access. We also learn about password protecting the hard drive. * Physical Security * Authentication * CMOS Password * Kerberos-Method used to encrypt passwords What I learned from this video is that companies go through great lengths to protect their computers and servers from intrusion. This video was basic and straight forward and not confusing at all, if anything its confusing that we should have to do so much to secure our files. I guess this information would best be used if you working for security...
Words: 613 - Pages: 3
...Assignment 1.1 History timeline of the computer • 1939 Hewlett-Packard is founded. David Packard and Bill Hewlett found Hewlett-Packard in a Palo Alto, California. Their first product was the HP 200A Audio Oscillator, which rapidly becomes a popular piece of test equipment for engineers. • 1940 The Complex Number Calculator (CNC) is completed. George Stibitz demonstrated the CNC at an American Mathematical Society conference at Dartmouth College. Stibitz performed calculations remotely on the CNC using a Teletype connected via special telephone lines. This is the first demonstration of remote access computing. • 1941 Konrad Zuse finishes the Z3 computer. Using 2,300 relays, the Z3 used floating point binary arithmetic and had a 22-bit word length. • 1942 The Atanasoff-Berry Computer (ABC) is completed. The ABC was designed and built by Professor John Vincent Atanasoff and graduate student Cliff Berry between 1939 and 1942. • 1944 Harvard Mark-1 is completed. Created by Howard Aiken, and designed and built by IBM, the Harvard Mark-1 was a room-sized relay-based calculator. This machine had a fifty-foot long camshaft that synchronized the machine’s thousands of component parts. • 1946 The first glimpse of the ENIAC, a machine built by John Mauchly and J. Presper Eckert that improved by 1,000 times on the speed of its contemporaries. • 1949 Maurice Wilkes assembled the EDSAC, the first practical stored-program computer, at Cambridge University. For programming the EDSAC...
Words: 461 - Pages: 2
...Unit 10 Analysis: Repair Shop The pros are: • The users personal files will be saved • The user will have a fresh start and a chance to take preventative measures to avoid future problems • All of the users data will be backed up The cons are: • The user may have to pay to reinstall certain programs • The user will have to reinstall old programs The user with the new computer will not likely be affected as much as the user who has ran their computer for several years. The new user will not have accumulated many personal files or documents and most of the data will consist of factory programs and settings. Recent cache memory should be the only noticeable effect. The user with several years of use of his computer would be ore affected as over the years, he/she may have accumulated many personal files, documents and applications. Of course all of his personal data should be backed up by the computer shop and placed on a CD for later installation, however many programs and applications will be affected. Any changes or personalization’s made to the programs and applications will be lost as they will have to be reinstalled as new applications. The user may also have to pay for some of the applications again. The user who mostly browses the internet and uses email will more than likely only have accumulated cache memory as opposed to the business professional who may have stored important documents and programs on his computer. The email will not be affected as...
Words: 322 - Pages: 2
...Michael Hoss NT 1110-E3 Video Summaries: Unit 8 3.06 This video described the different operating modes and explained how they functioned. It also broke down the different operating system components; such as, the shell, the Kernel, and the registry. It also explained how the user interface interacts with the hardware through Kernel mode. * Real mode * Shell * API | * Protected mode * Kernel * HAL | * Long mode * Registry | 3.08 This video described the different installation types and the steps to install new operating systems on a computer. It also stated the advantages and disadvantages of a clean installation vs. an upgrade. Finally, it presented the different upgrade pathways of 9 x 05’ vs. NT OS’. * Clean install * Winnt.exe | * Dual boot * Winnt32.exe | * Upgrade | 3.22 This video described what driver signing means, and how unsigned drivers might affect your device. It also showed different steps to access the driver signing options, and what each choice did. It finally told you how to check the verification of your system’s drivers. * Driver signing * Signature verification | * Signed drivers | * Unsigned drivers | 3.23 This video described the uses for which you might change/add a hardware profile, and how to do it. It showed step by step instructions on how to add a profile and after restarting, how to use the device manager to enable/disable devices for that profile. * Device manager |...
Words: 413 - Pages: 2
...Windows 8 is a Microsoft operating system that is designed for home users as well as for business purpose. Its development started even before its predecessor’s release Windows 7 in 2009.Windows 8 is a system that is particularly orientated to touchscreen hardware. There are some important changes and additives that make it look and differently than the users are used to. For example, the Start menu is completely substituted by a Start screen that can be taken away from the desktop easily by touch screen pen and also by just a normal mouse or keyboard key combination. It contains all the important applications also the ones that are active at the moment. All the icons in the old version of the operating system are changed into tiles that can be juggled with. It can stay constantly on the screen or can be hidden.And now the most important that users expect to hear – when will it be available for the public and for what price? The official release date is the 26th of October, 2012. It was preceded by three pre-release editions while still being developed and tested for the period of the 13th of September 2011 until 31st of May 2012. There will be four editions issued on the market – two general editions just for conventional use, one Pro release of Windows most ardent devotees and Enterprise edition which is for business purposes. ² Windows 8 is the current release of the Windows operating system, produced by Microsoft for use on personal computers, including home and business...
Words: 327 - Pages: 2
...WEEK 8, ASSIGNMENT 2Ireti Kayode Strayer University | | CIS 175 Dr. William McConnell12/03/2013 | | | | | Ocper, Inc. Server Proposal Given Ocper, Inc.’s expanding network scenario there is a clear need to maximize the available resources between employees then it is appropriate to add additional servers to facilitate the sharing of files as well as the configuration of remote access services to allow for remote and secure working. In order to complement the existing network scenario this proposal is based around the configuration and deployment of Microsoft Windows Server 2012 as the network operating system. This is a stable and secure server environment which will allow the designated services to be configured and will equally allow for scalability while at the same time decreasing the overall maintenance and administration to support the network and associated servers. Given the size of the current organization and the IT systems at present, Windows Server 2012 Standard edition would be the most appropriate version for deployment as this will also keep the up-front costs down to a minimum – there is no requirement for the Enterprise Edition whose features will not be required in this implementation. One of the critical roles for the new server implementations will be that of a File Server capability – this can be easily configured within the Ocper, Inc. network through a Static IP address being assigned to this machine and then the...
Words: 630 - Pages: 3