answersLogoWhite

0

📱

Internet

This category contains questions and answers about the World Wide Web and related subjects.

18,762 Questions

What do you mean by internet addressing system?

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[2]

The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address, was developed in 1995.[3] IPv6 was standardized as RFC 2460in 1998,[4] and its deployment has been ongoing since the mid-2000s.

Application of Surveying in Mechanical engineering?

Fixing locations of equipment in a plant area

Levellng of equipment, pipe supports etc.

Checking elevations/height

How many IP addresses can one find in the header of an IP packet?

There are two forms of IP addresses. the first IPv4, consists of numbers from 0 to 255 in each of four groupings separated by a decimal point. 192.168.1.1 for instance which is used for most routers. So the number of addresses will be 255 x 255 x 255 x 255. This is a 32 bit system and provides enough addresses for the population of Earth (plus or minus) as it was back then, over 4 billion. The second format is IPv6 which is a 128 bit system. It can support 3.4×1038 addresses. More than enough for the foreseeable future. So your answer depends on which IP packet standard you mean.

Do you have to be on the Internet to defrag?

No! In fact, it's best that you're NOT online while doing a defrag. Anytime defrag hits a part of a hard drive where the information is changing, defrag restarts doing that portion of the drive. While on the Internet, your PC is constantly sending and receiving files and changing what's on the hard drive. Your defrag will take a lot longer.

Where is your IP address located?

To checkup your IP address:

Command for Windows 2000 / XP / Vista:

Go to Menu Start and select Run. Then, type the following command: cmd /k ipconfig /all

Your IP address will be displayed in an open window after a few seconds.

Command for Windows 95/98:

Go to Menu Start and select Run. Type the following command: winipcfg

Command for Linux:

Type this command in a console as root: ifconfig

in a console as user /sbin/ifconfig

Public IP address:

You can go to the following site: whatismyip

What is the toll free telephone number for Time Warner Cable Internet?

You can contact Time Warner Cable to order high speed internet at the toll-free telephone number 844-538-4997.

How does the internet cross the ocean?

Nearly 100 percent of international data crosses the ocean via undersea cables. They're only about three inches in diameter, but they span entire oceans. Plows dig grooves in the sandy ocean floor, lay the cables in, and the current buries them; some are buried as deep as Mount Everest is high.

This seems insane—it is insane—but we've actually been using ocean-spanning cables since 1866, when the first successful trans-Atlantic telegraph line was laid. In 1956, we started making international phone calls via deep sea cables. Today, there's a system of nearly 300 undersea cables that transport our data.

Oh, and to answer your potential followup question: Even if you're using wifi or phone data, it eventually reaches a physical cable and, if need be, sprints across the ocean.

What are the three types of hackers?

There are thee types of hackers white hat, grey hat, and black hat.

If a white hat hacker finds a fault in a security system ie. a website then they will inform the owner immediately.

Whereas if a grey hat hacker finds a fault he will do what he feels like at the time ie. exploiting the site OR informing the owner.

A black hat hacker if they find a fault will immediately exploit the site for there own beneficial gain ie. advertising and infecting other computers with "viruses" to gain access to more sites.

So a hacker can be many things from protecting systems by informing the owners or Exploiting and stealing data.

The most common name for the destructive type of "hacker" is a "cracker". I always try to refer to a bad hacker as a cracker to avoid confusion.

Also, there is a very important distinction between the three, as to both HOW and WHERE they attempt to break a system or program.

A White Hat (or, more properly, a "computer security specialist" or similar) will NEVER attempt to break into a system that they do not own or do not have explicit permission from the owner to do so. That means, they will usually be hired by a system or software owner to test the security of the said system or software package. They will always report their findings to the owner of the system, though there is somewhat of an ethical responsibility to report any significant (i.e. things that would impact the public) exploits to the community-at-large, if the original owner does not seem to be willing to address the issues - e.g. in case of a coverup of the problem, a White Hat is generally ethically bound to report the problem to the proper authorities, which may include public organizations such as CERT. More concisely, a White Hat is a professional, who abides by professional ethics and performs his or her duties out in the open.

Grey Hat folks generally don't have obvious ill intent (to contradict the previous answer). That is, they're not looking to exploit any problems for personal gain. However, they generally follow an ethic which believes that it is OK to perform intrusion and exploit scans on systems which they DON'T own or have permission to do so. This makes it hard for a target to determine the difference between a Grey and Black Hat hacker, as the initial method of operation looks identical. That said, Grey Hat folks generally report their findings to the target - that is, they'll inform the target as to what security issues they have found. Most Grey Hats will give the target a small window to address the issues; however, a GH will always report the issue to the wider media and security groups, and will NOT consider any information that the target wants to keep private. That is, GH folks seem to see themselves as "defenders of the public good", and that by exposing weaknesses of systems, they will ultimately force folks to be more secure. This is a plausible, but not provably true, scenario. Grey Hat folks are hobbiests and enthusiasts, who generally don't get paid for their work, but pursue it for personal reasons. They generally keep their identities masked (or at least don't usually broadcast them), as much of their work is quasi-illegal.

Black Hat folks, of course, are in it for the money (one way or the other). They're targets will never be informed of breaches, and in fact, most BH folks strive to keep their exploits secret from everyone, as it allows them to sneak in and steal information of value undetected. Black Hat folks are pure criminals.

How does a cable modem connect to the internet?

The Cable Modem is able to take incoming traffic from groups of customs on a certain channel and it routes it to the Internet Service Provider (also known as ISP) for an internet connection. For a more in depth overview of how it works there is an abundance of more information online.

How do you add the Dell start page?

You add the page to favorites and the bar at the top should say make home page.

List two security issues when using the internet?

# Cyber Stalking/Bullying and various types of cyber offense # Hacking.

Etc....

---- Check out the related link for more.

# Cyber Stalking/Bullying and various types of cyber offense # Hacking.

Etc....

---- Check out the related link for more.

What is the advantages of Local Area Network to Wide Area Network?

  • Files can be stored on a central What_are_the_advantages_of_local_area_network(the file server) allowing data to be shared throughout an organization.
  • Files can be backed up more easily when they are all on a central fileserver rather than when they are scattered across a number of independent workstations.
  • Networks also allow security to be established, ensuring that the What_are_the_advantages_of_local_area_networkusers may only have access to certain files and applications.
  • Software and resources can be centrally managed.
  • Network versions of software often allow for their speedy installation on workstations from the What_are_the_advantages_of_local_area_network.
  • Expensive devices such as laser printers or scanners can be shared.
  • Users can access their files from any workstation

How has internet changed retailer and consumer relationship?

Fundamentally, it has opened markets to organisations that would not have been considered in the past. Not forgetting, the potential cost reductions that can be achieved.

To date, there are only a few global organisations (outside of the computer industry) that I believe, have intergrated e-Commerce and the Internet into their business that I would call, "Well On The Way".

Large global organisations do not fully understand computer technology at a very senior level, hence the slow uptake of the opportunities that are presented.

This may have a profound affect on their market position overtime as second and third tier competitors can establish themselves on the same platform and can adopt new and innovative competitive strategies in shorter time-frames, where larger organisations take time.

If your question is from a marketing orientation.

Then e-Commerce and the Internet have removed the major functions of what I would call marketing and not simply referring to marking as promotion.

Customers can in some ways be the loser in the technology revolution.

When was Skype created?

September 2005 by 2 men named Nikalas Zennström & Janus Fiis.

Which companies offer a wireless internet business plan?

Most companies offer internet service that comes into your home through a modem (cable, dsl or satellite are the most common) and then you would need a wireless router to make your home internet wireless. Wireless routers can be bought for reasonable prices at most electronics stores. Some examples of internet providers are AT&T, Qwest, Road Runner, Comcast, Charter, Verizon, and many others.

How can you merge Multiple Internet Connections on single PC at same time?

If it is windows xp or above version. Goto Control Panel > Network Connections. If all your internet connections are listed there, select two or more (including your LAN) and select Bridge connections from the Right Click options menu. This will result an another network bridge which allows other PCs on the LAN to connect to the internet.

If you would like to know more about Multiple Internet Connections and its advantages like Load Balancing, Redundancy please visit this link to gain knowledge http://www.wanredundancy.org/resources/technology/networks-and-technology/multi-wan-broadband.html

A better option would be to use this

http://www.softpedia.com/progViewOpinions/MultiConnect-98000,.html

I am using it and its good

What initially made the Internet widely accessible?

When the World Wide Web became a part of the internet, it slowly began the growth of the internet to become popular. The World Wide Web was in existence for a number of years before ordinary people began to use it. It was invented in 1989 but popular usage did not really happen until the early and mid 1990s.

Are there any safe chat rooms for a 6 year old kid?

6 year olds should not be in a chatroom.

Children are best served by making friend In Real Life, not in a virtual reality on the internet. NO matter what website your children enter, there may be adults there as well posing as children. I know because I just did it on kidswirl.com, the supposedly best social networking site for kids.

Yes....the best Social Networking Site for kids that we have found is called kidswirl.com . It is very similar to the facebook layout...but designed exclusively for kids! My kids love it! They allow chatting only with friends that you have accepted.

My 6 old sister likes to play on webkinz, because it is safe for her and I'm big and older and I'm watching what she says.

There are some chat rooms for 6 year olds. I would recommend woogiworld, club penguin, panfu.com and dpals. The only one I know kids will enjoy is dpals.

How do you lock desktop icons in place in windows 7?

http://www.youtube.com/watch?v=mu5hlsn2Kf8

No more trouble now. Works on Windows 7 as well!

What would happen if the internet did not exist?

There wouldn't be any cyberbulling, you would lose touch with people you haven't seen, you couldn't be able to stalk people without seeming creepy, you would never be able to meet strangers who you don't know, you would have more time to do nothing, all life would be gone. You would die of boredom. Maybe the obesity rate would go down.

Average monthly bill on landlines?

The least amount averages about 20 to 30 dollars a line . If you have a separate internet broadband provider such as Clear Wire etc. you may want to check out majic jack.com. the average cost of a line with majic jack is $ 1.95 per mo. and all calls are free in and out with unlimited usage.

What is the difference between Electronic commerce and Electronic Data Interchange?

Electronic Data Interchange pre-dates internet e-commerce. EDI facilitates e-commerce.

-Electronic commerce is the process of buying, selling, or exchanging products, services, or information via computer networks.

-electronic data interchange (EDI) is the electronic transfer of specially formatted standard business documents, such as bills, orders, and confirmations, sent between business partners that has pre-dated the internet. It's been around since the late 70's. EDI's are traditionally processed by Value Added Networks (VANs), which are private, third-party managed common carriers that also provide communications services and security.

- VANs can be expensive are relatively expensive and inflexible.

-Since the advent of the internet, corporations are using a combination of internet based EDI or web EDI, as a more affordable option. Recent studies have shown that Web-based EDI experience superior performance, both internally and externally.

- Recently most major retailors are requiring their suppliers to conduct business via regular or Web-based EDI. EDI services are provide by companies such as GXS (gxs.com) and sterling commerce (sterlingcommerce.com).

What does QQ stand for?

QQ originates from Starcraft, where the control for exiting the game was Control + Q + Q, so when raging, people would quit the game by "QQing", Coincidentally, QQ, Q_Q, and Q.Q look like eyes with tears in them, so the original meaning has been forgotten and is now thought to have to do with "crying more" or to "quit crying". qq much? oh! pwned! QQ Dose not mean anything. People use it to mean Quit Crying. QQ Also Started to be used in Call Of Duty 3 Multiplayer. The term Didn't become popular Untill World Of Warcraft Where player's started using it from its underground usage from Call of duty 3 Multiplayer where the term was born.

How do you turn on the Track Changes feature in a word processing document?

  • Select Track Changes from the Tools menu
  • Click the Track Changes button on the Reviewing toolbar
  • Use the Ctrl+Shift+E shortcut key
  • Double-click the TRK button on the status bar

What is an internet avatar?

An avatar is basically a representation of yourself. You can have a picture avatar on AIM, a cartoon Avatar on Skype, or a self-designed Avatar on many Wii games. The word has come to mean a creation/image that represents you.

An avatar is a sort of cartoon-assigned profile which someone can modify at ease until satisfaction, used in some search engines (eg Yahoo) designed to get oneself easily recognised.