Posts

Showing posts from 2019

DNS

Image
what is DNS DNS is a global system for translating IP address to human-readable domain names. the DNS server takes the hostname and resolves it into a numeric IP address which the web browser can connect to.  purpose   it manages to translate all the inquiries into IP addresses, and like this, it can identify different devices that are connected to the network.  DNS queries A DNS query (also known as a DNS request) is a demand for information sent from a user's computer (DNS client) to a DNS server. In most cases a DNS request is sent, to ask for the IP address associated with a domain name. An attempt to reach a domain is actually a DNS client querying the DNS servers to get the IP address, related to that domain. 1. recursive query   - A recursive query is a kind of query, in which the DNS server, who received your query will do all the job of fetching the answer, and giving it back to you . During this process, the DNS server

client side and server side

Image
what is the client-side?  Client - side  means that the action takes place on the user's (the  client's ) computer (browser). what is jQuery?  jQuery is an open-source Javascript library that simplifies the creation and process of web applications, to make it much easier to use JavaScript on the user website.  The jQuery library contains the following features: HTML/DOM manipulation .   CSS manipulation HTML event methods Javascript  AJAX 3 advantages of jQuery? lightweight (fast browsing) open-source library (free and supported across different application) wide range of plugins (  has a wide range of plugins which are all over the internet. helps developers to create special effects more quickly. ) example of a jquery framework?  jQWidgets  - is an advanced Javascript and HTML5 UI framework. We create UI Components for Angular, Vue.js, React, Web Components, ASP .NET MVC & jQuery a framework based on Javascript for building w

kclothings.org

Image
ISP - Telbru $100 per year https://www.telbru.com.bn/feesandcharges/index.php?= Domain name -  kclothings.store https://namechk.com/ website hosting - price- $7.50 BND website management - CMS, choose 1 picture and reason for choosing https://www.beewits.com/free-cms-alternatives-to-wordpress/ https://magento.com/ Magento   support various layouts, which you can choose when you are in the Design part of creating a new page.

WDD-LO1-server

explain what is a server?  a server store information or resource that will be manage over the internet provide data to other computers identify different web browser?  google chrome, internet explore, opera mini, safari, Firefox and etc. give the purpose of each of the identified server: 1. application server : server that is design to install, operate and host program and associated service for end user, IT service and organizations. 2. proxy server:  it act as a getaway between computer and the internet. to secure data it hide user real IP address from the rest of the world. 3. blade server  used in data center to save space and improve system management. 4. mail server:  it act as virtual post office  store incoming mail and sends out outgoing mail  application that receive and forward email. send and receive email using standard protocol such as SMTP and POP3 5. virtual server  shares hardware and software resources with other operating systems (OS), ve

WD&D (DNS)

Image
1. what is domain names is the website name that address website to access by user use to find and identify website no two website can have same domain name example: facebook.com 2. what is DNS services a phone book of the internet manage, maintain and process DN and their combine record DNS translate DN onto IP address so browser can load the resource on the internet 3. communication protocol to access a website http - (Hyper Text Transfer Protocol) used for transmitting web-page information such as text, graphic image, sound, video and other multimedia files on the WWW. https://techterms.com/definition/http ftp - File Transfer Protocol protocol is a system of rules that network computer use to communicate with one another. use to transfer files between computer on the internet. let user upload and download files https  - hyper text transfer protocol secure secure way to send data between a web server and web browser. (scocn) example of program that use htt

Project management plan

What is project management plan? Describe its importance Project management plan also known as PMP is about an activity that is charge on the specific of the project on track and definitely dealing with and problems and difficulties that will be faced on an organization. This plan act as schedule on an organization, to guide the organization on outline the entire segment of the project, not only that with this plan it also helps them to make a decision by grouping the entire information that they are required to decide if the project is worth. Hence, it provide an analyze any lingering thought that might faces of it, that can leads to be worst or dangerous if there is any mistake that is left without checking. Thus, it can be build numbers of problems throughout the cycle life of the project.   Describe each management plan and discuss its importance. There are a total 7 types of project management plan in order to run a project on an organization which are: 1.        S

Security Vulnerability test - vulnerability scanning

 Network Scanning  Describe the test and purpose of the test?  Network scanning refers to the use of a computer network to gather information regarding computing systems. Network scanning is mainly used for security assessment, system maintenance, and also for performing attacks by hackers. the purpose of network scanning is:  Recognize filtering systems between the user and the targeted host Reduces the fallout from security breaches, including legal action that can steal your private information.  to prevent malicious attack   Discuss how it works? Methods of Port Scanning Refers to the process of sending packets to specific ports on a host and analyzing the responses to learn details about its running services or locate potential vulnerabilities. Once available hosts on a network have been found via networking scanning, port scanning can be used to discover the services in use on specific ports. In general, port scanning attemp

Security - organizational security

Image
the problem affects organization security?  https://borneobulletin.com.bn/local-duo-charged-with-gang-robbery/ MasBahta Salon Problem?  involved in the robbery at the convenience shop on June 30, 2018 took place in Tutong District  the action caught on CCTV camera  Mohd Faizal bin Rosli,  also known as Boy Mulaut Saiful Irwan bin Haji Simpol, also known as Bincut what they do?  two unknown men entered the convenience shop from the backside and threatened two foreigners with a steel bar. suspects stole Easi Cards, Power Cards, two mobile phones, shampoos, hair extension and cash amounting to over BND1,000 from the shop. two unknown men entered the convenience shop from the backside and threatened two foreigners with a steel bar. how to reduce the risk? provide sensor detection provide access control for physical entry such as swipe card for each employee starter & leaver policy Why choosing the type of security?  reduce the loss of i

activity for MSCP

Zara Online Shopping Website (Hazwan, Aiman, Khai, Farah) 1.  Project conception and initiation Propose a plan for a shopping website Client: Clothing store Zara The time frame of the project: 4 - 7 Months The advantage of creating a shopping website to Zara Promote business worldwide online Expand their business online For the convenience of the customers, who want to shop online Cheaper than setting up a branch Open 24/7 Provide shipping for busy customers so they don't have to go shopping. No crowd 2.  Project definition and planning Resources Computer Software Labour Specialist - professional labour Domain: www.zara.com Budget: ~$10,000 Schedule Planning - about 1 month (1 April - 1 May) Designing website - about 1 month (1 May - 1 June) Content writing & assembly - about 1 month (2 June - 2 July) Develop website- about 2 months (4 July - 4 September) Testing the website - about 2 weeks (5 September - 19 September) 33. Project Lau

Managing a Successful Computing Project

Explain Project management Project management is about knowing what the aims of the subject or goals are, in order for them to achieve the what they are going to explain that is related, the information they need to gather, managing the time length in order to reach that specific goal.  Identifies the key stages of project management  1. initiation                      - contain the process that helps the project concept description statement that includes the objectives of the purpose and the outcome details of the subject.   2. Planning                     - the process in the planning group is in creating the plans and also the objectives in order to accomplish the project. that give the person the concept that they need such as definition, task and cost. 3. Execution                     - it consists of the process that will be required in order to carry out work of the project. that carry  out the project activities according to user plan. During this ke

Group Activity - security

Image
Group Activity (Wed, 10/4/2019) Group name: Farhana, Norros, Hafizah & Khairah 1. Research latest news or article where unauthorized system occurs.  Marriot Starwood hacking Exposes Data of Up 500 Million Guest By Nicole Perlroht, Amie Tsang and Adam Satariano  (30 November 2018 ) - data being exposed was the customer's passport numbers.   - over 300 million guests stayed from 2014 was being exposed. - the hacker uses the guest's information to his advantage by using someone else ID to open fraudulent accounts in their name. 2. videos showing security risk for both unauthorized access to data and equipment   3. in what way can IT be used to detect unauthorized access  advantages of having security  -theft prevention -build user confidence  -protecting personal information -real-time monitoring -protect from virus disadvantages of not having a security system  - steal data that can lead to business loss - anyone can use the system - du