Monday, June 17, 2019

Introductory Computer Usage 1 Essay Example | Topics and Well Written Essays - 1000 words

Introductory Computer Usage 1 - Essay ExampleThe other detail of the matter is that people are rarely aware of the technological advancements and their warrantor concerns. Although IEEE has launched WPA and then WPA2 as the new security measures protocols, people seldom use them. WPA2 has turn up hardest to be cracked, still old algorithms are preferred over it. The table shows the percentage of the people (taken from survey by Deloitte, India) who use secure and insecure radio receiver medium.Besides, if the new technology gets implemented, it slows down system performance. Internet is full of ways to teach anyone sniffing techniques and the new tools of Microsoft and Linux which are available on internet without any practice facilitates it. Many of such problems occur due to inappropriate usage of wireless users. Hence, it has become the need of the hour to reduce more than fifty percent of security risks by properly following the instructions associated with it.Must have hear d about the many of u have a blue tooth or shall I say Bluetooth. I am sure many of my readers have this facility. Your mobile phones, PCs, in academic institutes and in the offices, Bluetooth comes in very handy. But what it actually is?It is granting immunity form cables. Now, we can carry our data anywhere without any botheration. Bluetooth wireless technology has fast become one most popular technology. It shows interconnection amongst computers, mobile phones and PDAs. The Bluetooth standard specifies wireless operation in the 2.45 GHz band and supports data rate up to 720Kbps. The designing is done for low power function at a short range with different power classes for multiple ranges (1m, 10m and 100m).Now, the devices which werent possible to connect via a wire can be synchronized using Bluetooth, for example attaching a mobile phone to a car stereo. Data exchange this way is fast and convenient.There are three modes of security in Bluetooth security mode1, security mode 2 and security mode3. Bluetooth enabled mobile devices

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.