Ans : EDIFACT is an EDI standard format developed under UN (United Nations), Hence,EDIFACT is also denoted as UNIEDIFACT. This is the international standard which consists of the following four key elements: • Syntax which defines the message structure• Data Read More …
Author: ignougroup
Ques : Describe designing online shopping E-commerce portal
Ans : • E-commerce vision and strategy: At this stage, the business team lays out thevision and business objectives of online shopping portal application. They also dothe market and competitor surveys and defines the solution strategy. Businessteams also do awareness Read More …
Ques : Describe Key Drivers for M-Commerce
Ans : The following are the key drivers of m-commerce: • Popularity of mobile devices: Hand held devices are quicklyovertaking the traditional desktops and laptops and are becoming theprimary channel for access. • Wireless bandwidth advancements: Mobile devices can nowleverage Read More …
Ques : Describe Cyber Crimes
Ans : Cyber crimes can be classified on the following basis: Against Person • Harassment via e-mails: Repeatedly sending abusive messages via email. • Cyber stalking: Use internet to stalk someone like online harassment andonline abuse.• Email spoofing: Emailing messages Read More …
Ques : What is various steps of SSL handshake:
Ans : 1. SSL client attempts to connect to a SSL server (website secured with SSL)by sending a client hello message. Web server responds with a server hello. Client requests web server to prove its identity. Web server sends a Read More …
Ques : Describe Security Concerns of the Client
Ans : Client security means privacy of the client and integrity of his Computer. Active ContentAmongst various threats, active content is a major area of concern in clientsecurity. Active content is the program embedded transparently in web pageswhich can cause Read More …
Ques : What is advantages of Internet bookshops ?
Ans : AdvantagesSome of the major advantages internet based bookshops are given below: • These bookshops act as databases of a vast amount of information aboutbooks currently available in the market. All Internet users can use thesedatabases and have knowledge Read More …
Ques : What is EFS and Users Management
Ans : One of good or bad point of EFS is that its use does not require any administrativeeffort and keys are created automatically, if the user does not already have a publics key pair to use. Files and Folders Read More …
Ques : What is Encrypting file system (EFS)
Ans : The main benefits of personal computers are that it provides you the flexibility to bootinto multiple Operating Systems for desired use. But this flexibility poses great difficultyin the world of security. In addition to the security risks of Read More …
QUES : DESCRIBE WINDOWS 2000 NETWORK- SECURITY AND MANAGEMENT
Ans : NAT and ICSIn the previous section all of the security systems and methods are for securingoperating system and data on physical hard disk. This security system is of no use if anattacker is able to sniff network packets. Read More …