Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain Usenet and Newsgroups?
In Internet there exists another way to meet people and share information. One such way is through Usenet newsgroups. These are special groups which are set up by people who want to share common interests ranging from current topics to cultural heritages. There are presently thousands of Usenet newsgroups.
Usenet can be considered as another global network of computers and people, which is interwined with Internet. Though Usenet doesn't operate interactively like Internet, instead Usenet machines store the messages sent by users. Unlike mail from mailing lists, news articles don't automatically fill your electronic mailbox. For accessing information on news net, one needs a special type of program known as a newsreader. This program help in retrieving only the news you want from Usenet storage site and display it on your terminal. Usenet is like living thing, New newsgroups gets added, groups which have too much traffic get broken up into smaller specialized groups, groups even can dissolve themselves. Although, all of this occurs based on some commonly accepted rules and by voting. For Usenet, there is no enforcement body; it completely depends on cooperation of its computers users and owners.
Newsgroups are actually meant for interaction of people who share your interests. You can post your own questions and your answers to the questions of others, on the Usenet. One thing, which is worth mentioning here, is that when one is interacting with people on Internet certain mannerism must be adopted. These rules are sometimes known as 'netiquette'. In a face-to-face conversation you can always see a person's facial gestures and hand movements and can determine whether he is teasing or is being sarcastic or sometimes even lying. Though in on-line interaction one can't see the person one is interacting with. Rules of netiquette may help to compensate some of these limitations of this on-line environment.
define conceptual schema
Explain the operation of octal to binary encoder. Ans Octal to binary encoder consists of eight inputs, one for each of eight digits and three outputs which generate the con
Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic
Virtual Private Networks (VPN) In order to encrypt/decrypt all the communication network traffic that passes through the Internet or Intranet, a VPN uses software or hardware.
How is multidimensional arrays defined in terms of an array of pointer? An element in a multidimensional array like two-dimensional array can be shown by pointer expression as
As per the JMS specification, when you are in a transaction, the acknowledge Mode is ignored. If acknowledge() is known as within a transaction, it is ignored.
Functioning of ROLAP happens concurrently with relational databases. Data and tables are stored as relational tables. To hold new information or data new tables are formed. Functio
Buses: Execution of 1 instruction need the following 3 steps to be performed by the CPU: I. Fetch the contents of the memory location pointed at by the computer syst
Explain the number unobtainable tone in strowger telephony with waveforms and the timings. In the following figure illustrates the number unobtainable tone that is continuous
Define word length? Every group of n bits is referred to as a word of information and n is known as the word length.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd