الخميس، 28 فبراير 2013

List of Top Social Exchange sites

Top Social Exchange SitesSocial Networking sites like FaceBook, Twitter, YoutTube have grown day by day and become major part of the internet. Most of the internet user have account on such Social Networking sites and uses that sites. According to the Alexa after Google the most visited sites are FaceBook...

الثلاثاء، 26 فبراير 2013

The secret about that data received by the Facebook from you

Facebook receive variety of various kinds of data concerning you, that you would like to understand what data they collect concerning you. So, i'm writing here some data concerning this.Collects your data that is that the data that is needed once you sign on for the positioning like your name, email address, birthday, and gender. The data you decide on to share on Facebook, like once you post...

Top 12 things needs to know by the Facebook user

1. You may not post unauthorized commercial communications (such as spam) on Facebook. 2. You may not collect users' content or data, or otherwise access Facebook, exploitation machine-driven           means that (such as gather bots, robots, spiders, or scrapers)...

الأربعاء، 6 فبراير 2013

MCQ of Computer networking test with answer set-7

1. The examples of Interior Gateway Protocols (IGP) are.i) Open Short Path First (OSPF)                                  ii) Routing Information Protocol (RIP)iii) Border Gateway Protocol (BGP) A)  i onlyB) i, and ii onlyC) i and iii onlyD)...

الثلاثاء، 5 فبراير 2013

Solved MCQ of Computer Networking test set-6

1. ………………….. is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.A) FDDIB) FDDTC) FDDRD) FOTR         2. Which of the following are Gigabit Ethernets?A) 1000 BASE-SXB) 1000 BASE-LXC) 1000 BASE-CXD) All of above3. ………………….. is a collective term for a number of Ethernet Standards that carry traffic at...

الاثنين، 4 فبراير 2013

MCQ of Internet Security with answer set-2

1.  The primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity.A) SSLB) ESPC) TSLD) PSL2. The ……………. is used to provide integrity check, authentication and encryption to IP datagram.A) SSLB) ESPC) TSLD) PSL3. In ……………………. mode, a common technique in packet-switched networks...

الأحد، 3 فبراير 2013

يتم التشغيل بواسطة Blogger.