Sunday, September 8, 2013

Information And Technology Literacy Phase 1(a)

Running Head : USERNAME AND PASSWORD Username and tidingsWhy do we need our discussion be secret[Name of Author][Affiliation of author]Username and battle crys are practiced to doorway hole-and-corner(prenominal) instruction in the net are of great back up because the both would dis eachow unauthorized viewing and or editing of the selective study contained in a certain electronic network site Usernames and crys drift that the current user is supposedly the received owner of that fib . The correct password for a username is chief(prenominal) to be unplowed secret by its owner in that he has the exactly objurgate to view and do proceeding in his accountCindy should therefrom be aware that Janie should non know her password If ever Janie would know her password , because all the selective information contained in her account could be narked by Janie eve without her admit and at any time she wishes to . Janie could hence view all the confidential matters contained in Cindy s account and worse , Janie may as well efface non just only one partitioning barely even all of Cindy s info . Janie then has besides the countenance to change the password of Cindy s account thus sick the current owner to access the infoAssuming that Janie is a close whiz of Cindy and she has extravagantly trust on her , if Cindy would give her password to her adorer , Janie then has the same privilege to access Cindy s account . though it is not advisable to share person s password , it is middling plus in the sense that if someone has your needed data , then you have the privilege to access it . Cindy would not then be required to go to Janie s house so as Janie could access a roll they both need barely Janie set down dressed t have .

She can then access Cindy s account every(prenominal) time she needs unless Cindy changed her passwordUsername and passwords are of wide use directly not only in the net except also to other means of storing data such as in the case of ATM Cards computers and cell phones . If Cindy has high-pitched regards of her data s confidentiality , then she would never dare to give her password even to her closest friendCommonly , passwords are advised to be the gang of n-characters that is not easily guessed . This is to ensure that no one could someone s data by trying several guesses until he would find the right combinationReferencesPassword Security FAQ (2007Regent UniversityRetrieved October 6 , 2007 fromHYPERLINK http /network .regent .edu / it /helpdesk / memorandum /password .cfm http /www .regent .edu /it /helpdesk /document /password .cfmEC Login : usernames and passwords for everyone (2006SOAPPLAB AucklandRetrieved October 6 , 2007 fromHYPERLINK http /www .soapplab .auckland .ac .nz /info /networking /eclogin .htm http /www .soapplab .auckland .ac .nz /info /networking /eclogin .htmPAGEUsername and Password elf PAGE \ MERGEFORMAT 2Username and Password Page PAGE \ MERGEFORMAT 1...If you want to get a full essay, wander it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.