Tuesday, May 7, 2019
Introductory Computer Usage 1 Essay Example | Topics and Well Written Essays - 1000 words
Introductory Computer Usage 1 - Essay ExampleThe other fact of the progeny is that people are rarely aware of the technological advancements and their security concerns. Although IEEE has launched WPA and then WPA2 as the new-made security protocols, people seldom use them. WPA2 has proved hardest to be cracked, still old algorithms are preferred all over it. The table shows the percentage of the people (taken from survey by Deloitte, India) who use secure and insecure wireless medium.Besides, if the new technology gets implemented, it slows down system per recoilance. Internet is full of ways to teach any cardinal sniffing techniques and the new tools of Microsoft and Linux which are unattached on internet without any charge facilitates it. Many of such problems occur due to inappropriate habitude of wireless users. Hence, it has become the need of the hour to reduce more than fifty percent of security risks by properly following the instructions associated with it.Must set o ut heard about the many of u gravel a blue tooth or shall I say Bluetooth. I am sure many of my readers have this facility. Your mobile phones, PCs, in academic institutes and in the offices, Bluetooth comes in very handy. But what it actually is?It is freedom form cables. Now, we can carry our data anywhere without any botheration. Bluetooth wireless technology has fast become one most popular technology. It shows interconnection between computers, mobile phones and PDAs. The Bluetooth standard specifies wireless operation in the 2.45 gigahertz band and supports data rate up to 720Kbps. The designing is done for low power consumption at a short range with different power classes for multiple ranges (1m, 10m and 100m).Now, the devices which werent possible to connect via a wire can be synchronized using Bluetooth, for example attaching a mobile phone to a car stereo. Data exchange this way is fast and convenient.There are three modes of security in Bluetooth security mode1, securit y mode2 and security mode3. Bluetooth enabled mobile devices
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.