• Operating Systems—Windows, Unix/Linux, MAC• Applications—Cross-platform, including web, database, Peer-to-Peer, instant messaging, mediaplayers, DNS servers, backup software, and management servers• Network Devices—Network infrastructure devices (routers, switches, etc.), VoIP devices• Human Elements—Security policies, human behavior, personnel issues• Special Section—Security issues not related to any of the above categorieshttp://www.sans.org ...
Foundations: What is a Network?Why do we need a network? What does the network accomplish for us? Foundations: OSIThe OSI Model and layers of network functionality.TCP/IP: Addressing FundamentalsTCP/IP concepts, IP address format, public and private addressing, and address classes. Why having TWO addresses is the key to successful network communication?TCP and UDP When it communicates across the network using TCP ...
IntruderAn Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. In summary, this person attempts to violate Security by interfering with system Availability, data Integrity or data Confidentiality. Active Intruder and Passive IntruderA passive intruder just listens and records the control and data messages on ...
With ever expanding ICT uses enormous amount of provate data collected, processed and stored as part of business operations. It's important that technologists and organisations aware of Data Protection and Privacy Law. Important DefinitionsData Subject: This is the person whose data is stored on systems. They give their personal data to allow organisations to for various needs.Data Controller: This is ...
ICT will become powerful extension of human beings designed to augment intelligence, learning, communications, and productivity.ICT will become intuitive—they will “learn,” “recognize,” and “know” what we want, who we are, and even what we desire.Computer chips will be used everywhere, and they become invisible-embedded in everything from brains and hearts, to clothes and toys.Computers will manage essential global systems, such ...
1) Man machine Coexistence?The development of ICT shall not take the place of man. Machines shall always be a tool for man, not other way.2) Artificial intelligence? (5th Generation Computers)Artificial intelligence (AI) studies and develops intelligent machines and software. It develops intelligents agents which perceives its environment and takes actions that maximize its chances of success.3) Ubiquitous computing? Ubiquitous computing ...
Download A/L ICT 2013 MCQ Model Paper in EnglishDownload A/L ICT 2013 MCQ Model Paper Answers in EnglishDownload A/L ICT 2013 MCQ Model Paper in SinhalaDownload A/L ICT 2013 MCQ Model Paper Answere in Sinhala
Embedded CSS - The <style> Element: CSS # 2You can place CSS embedded in head section<head><style type="text/css" media="screen">Style Rules............</style></head>type="text/css" Specifies the style sheet language as a content-type (MIME type).media="screen"Specify the device that would display the document.Default value is all. This is optional attribute.options =tty, tv, projection, handheld, print, braille,aural, all CSS Overriding Rules :The CSS defined in external styl
SQL (Structured Query Language) is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS). sql IS based upon relational algebra and tuple relational calculus. SQL consists of a data definition language and a data manipulation language. The scope of SQL includes data insert, query, update and delete, schema creation and modification, and data ...
This is more of a O/L ICT Topic, However related to A/L ICT in many ways. Describe how Wireless Technologies, Mobile Computing and Cloud Computing help bridge the digital divide in Society.
Cascading Style Sheets (CSS) is a design language. It simplify the presentation of web pages. CSS take care of the look and feel of a web page. CSS help control the color of the text, the style of fonts, spacing between paragraphs, background images and other effects. CSS enable presenting same content on different devices like mobiles , tabs, Web ...
AJAX : Asynchronous JavaScript and XMLWeb application use a combination of XHTML, CSS, DOM, XML. Gmail is one example of a web application that utilizes AJAX.ElementsHTML Document is made of HTML Elements like <IMG>, <br> Tag. <br>Attributes are additional information of HTML Elements<IMG SRC="abc.jpg" height="230" width="150">CGI Common Gateway InterfaceCGI allows users visiting a web page to send and receive information ...
Through study of this module is a very important as the MCQ paper is quite focused in your knowledge in fundamentals of ICT.The first part covers data, information and knowledge, how you use them and emphasizes the need of technology to manage data. It also asses your knowledge a how ICT is used in society and tool for accessing and ...
This is work of my ICT students 2011-2013. They learned ICT and digital media creation. This short film produced by them totally using ICT. They also won a Microsoft / World World Bank Youth Solutions award to win USD 20,000 to make 10 digital short films. See more of ICT and Youth Developmenthttps://www.facebook.com/childsoldierfilmhttps://www.facebook.com/groups/122199521189763/This kind of information useful to you for ...
In order to answer HTML Question You need to know following HTML Tags by Heart. Basic HTML Document <html><head><title>Title of your </title></head><body>Your Content Is here!</body> </html>Basic Headline Tags<h1>Largest Heading</h1> H1<h2> . . . </h2><h3> . . . </h3><h4> . . . </h4><h5> . . . </h5><h6>Smallest Heading</h6> h6<p>Paragraph.</p><br> (line break)<hr> (
jQuery is a JavaScript Library It simplifies JavaScript programming.Before you start studying jQuery, you should have a basic knowledge of:HTMLCSSJavaScript You can use jQuery library onlineor from your hard drive by including in the header section on your web page.To use jQuery from Google, use one of the following:Google CDN:<head><script src="//ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script></head></pre>The jQuery library contains the following features:H
CSS - HTML - Apple Java - JavaScript - PHP - Web - ToolsAjax BasicsA JavaScript only example of using Ajax.Dojo ExamplesHow to to use Dojo Ajax library.Getting Startedwith Java ScriptExperimenting with JavaScript.JavaScript: NameSpace How to use Javascript namespaces in an HTML.JQuery: Add AttributesThis example shows how to add an attribute to tag with JQuery.JQuery: Click Event ExampleA simple example ...
Blog - Blog is a word that was created from two words: “web log.” Blogs are usually maintained by an individual or a business with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order. "Blog" can also be used as a verb, meaning to maintain or add ...
Social Networking For Dummies from Jeremy Samuel A social network is a social structure made up of a set of social actors (such as individuals or organizations) and a complex set of the dyadic ties between these actors. The social network perspective provides a clear way of analyzing the structure of whole social entities.