Skip to main content

Posts

Showing posts from February, 2013

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

List of Top Social Exchange sites

Top Social Exchange Sites Social Networking sites like FaceBook, Twitter, YoutTube have grown day by day and become major part of the internet. Most of the internet user have account on such Social Networking sites and uses that sites. According to the Alexa after Google the most visited sites are FaceBook and YouTube, Twitter also comes after that. So good presence on Social Networking sites is most important for Search Engine Optimization(SEO) of any websites or blogs. For the strong presence in Social Networking Sites we can use Social Exchange sites. I have presented here a list of Top Social Exchange sites.   Addmefast:    It is the most used and top social exchange site in which you can exchange for most of the social networks like Facebook page like, Facebook share, Facebook post like, Twitter tweets, Twitter Re-tweets, Twitter Followers, Google Circle, YouTube views, YouTube likes, Pinterest like, Pinterest repin, Stumbler Followers, Soundcloud Followers and many...

The secret about that data received by the Facebook from you

Facebook receive variety of various kinds of data concerning you, that you would like to understand what data they collect concerning you. So, i'm writing here some data concerning this. Collects your data that is that the data that is needed once you sign on for the positioning like your name, email address, birthday, and gender.  The data you decide on to share on Facebook, like once you post a standing update, transfer a photograph, or investigate a friend's story.  Receive information concerning you whenever you move with Facebook, like once you examine another person's timeline, send or receive a message, explore for a friend or a Page, click on, read or otherwise move with things, use a Facebook mobile app, or purchase Facebook Credits or build different purchases through Facebook.  Once you post things like photos or videos on Facebook, they'll receive extra connected information (or metadata), like the time, date, and place you took the picture or video.  Rec...

Top 12 things needs to know by the Facebook user

1. You may not post unauthorized commercial communications (such as spam) on Facebook .  2. You may not collect users' content or data, or otherwise access Facebook, exploitation machine-driven           means that (such as gather bots, robots, spiders, or scrapers) while not Facebook's previous permission. 3. You may not interact in unlawful multi-level selling, like a scheme, on Facebook. 4. You may not transfer viruses or alternative malicious code . 5. You may not solicit login data or access associate degree account happiness to some other person. 6. You may not bully, intimidate, or harass any user. 7. You may not post content that: is hate speech, threatening, or pornographic; incites violence; or contains status or graphic or gratuitous violence. 8. You may not develop or operate a third-party application containing alcohol-related, chemical analysis or alternative mature content (including advertisements) while not acceptable age-based...

MCQ of Computer networking test with answer set-7

1. The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF)                                  ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A)  i only B) i, and ii only C) i and iii only D) All i, ii and iii 2. FTP server listens to connections on port ……………………. A) 19 and 20 B) 20 and 21 C) 21 and 22 D) 20 and 22 3. Which of the following operations can be performed by using FTP. i) Connect to a remote host                        ii) Select directory iii) Define the transfer mode                      iv) List file available A) i, and ii only B) i, ii and iii only C) ii...

Solved MCQ of Computer Networking test set-6

1. ………………….. is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR          2. Which of the following are Gigabit Ethernets? A) 1000 BASE-SX B) 1000 BASE-LX C) 1000 BASE-CX D) All of above 3. ………………….. is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s. A) Ethernet B) Fast Ethernet C) Gigabit Ethernet D) All of the above 4. …………… is another kind of fiber optic network with an active star for switching. A) S/NET B) SW/NET C) NET/SW D) FS/NET 5. The combination of ……………. And ………….. is often termed the local address of the local portion of the IP address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number D) All of the above 6. ………………….. implies that all subnets obtained from the same subnet mask. A) S...

MCQ of Internet Security with answer set-2

1.  The primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL 2. The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL 3. In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above 4. The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec  5. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol 6. While init...

Solved MCQ of Internet Security set-1

1. Which of the following are the solutions to network security? i) Encryption                                       ii) Authentication iii) Authorization                               iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv 2. …………… is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation 3. The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering                    ...