How does denial of service attacks have impact in society?
DOS attacks How do the work?
TCP/ip Transport control protocol/internet protocol packets by default make 9 attempts to connect using a SYN packet to a host prior to sending a FIN packet which terminates the connection. Each attempt has a random and static amount of delay added.
A host will allow for an amount of time for each SYN packet from the client to be ACK(nowleged) before continuing with the connection.
Therefore a program which is designed to send SYN packets asking for a connections but never ACK(nowleges) them will use up a connection on the target machine. The default for a HTTP: server is 256 simultaneous users to be connected. Therefore a single machine can use all 256 connection sockets and prevent any legitamate users from connecting. Effectively blocking the server from use. Because of the way TCP/iP works this attack is very difficult to prevent.
How do they affect Society?
Denial of service attacks are used as political statements, vandalism and even industral espionage. It's affect can vary from the mild annoyance of not being able to access a website, to potentially dangerous situations where critical services that use the internet, such as power stations or emergency services can lead to situations that may endanger life and limb.
On many occasions political statements have been made by so called "hacktivism". This takes the form of a website which promotes ideas which the self appointed "hacktivists" take offense, to is swamped with connection requests until the server is brought down or taken offline.
If we think about this action carefully, it is actually contrary to the concept of free speech as the "hactivists" have no right to tell the public what they should, and shouldn't read. The ultimate result of their ideals would end up being a totalitarian state if it were allowed to be continued.
Therefore this type of action is illegal in most countries. The problem is that the Internet is effectively an international communications country or state. For these rules to be effective every sovereign member state of the internet would have to agree to a unified set of rules.
Why should you study computer science?
Here are some reasons:
What computer would fit the needs of a prospective computer science major?
The trend nowadays is for all the heavy computing to occur on the cloud so in my opinion unless you are going to have a need for heavy duty development like game development, the emphasis should be on getting something that is mobile and durable.
How many bits does it take to describe one qubit?
Qubits and bits can not be described in terms of one another.
What are the computer application in various fields of science and management?
-Rapid Prototyping Computers can build scale models for testing designs of mechanisms (google "Rapid Prototyping" for more info.
-CAD
Designs can be made on a computer and viewed from many angles. Google CAD for more info (also, download google SketchUP to try it out)
-Computerised testing
Computers can test the strength and weaknesses of designs before you build them
-Data analysis
Stress testing on scale models produces massive amounts of data, and a computer can then scale them up to the full model (e.g. if a 1:500 scale model of a bridge breaks with 300kg on it, how much will the full siz one be able to take)
-Materials Selection
Computers can rapidly search through libraries of materials to find the best balance of cost, strength and flexibility
Tell me about computer science?
Computer science (or computing science) is the study of the theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. It is frequently described as the systematic study of algorithmic processes that describe and transform information; the fundamental question underlying computer science is, "What can be (efficiently) automated?" Computer science has many sub-fields; some, such as computer graphics, emphasize the computation of specific results, while others, such as computational complexity theory, study the properties of computational problems. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describing computations, while computer programming applies specific programming languages to solve specific computational problems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to people. The general public sometimes confuses computer science with vocational areas that deal with computers (such as information technology), or think that it relates to their own experience of computers, which typically involves activities such as gaming, web-browsing, and word-processing. However, the focus of computer science is more on understanding the properties of the programs used to implement software such as games and web-browsers, and using that understanding to create new programs or improve existing ones.
(x)/(y)=avg
X= Total of Scores.
Y= Total of Students.
Is computer science a challenging subject for people?
As with all other subjects, some people will learn topics in computer science very easily while others struggle with the very same topics.
Which software are downloaded legally and ethically from the internet for free?
Software that can be downloaded free and legally are:
1: Open Source software (Though not all software that is open source is free)
2: Freeware
3: Shareware
4: Software trials
Why do most engineering and computer science programs have mainly guys in them?
Because guys have an interest in technology and have a stronger ability to deal with machines, although girls can be interested in machinery if they choose to but they have to be strong and tough which was also the reason guys join these programs.
asset
Is spiht lossless compression or lossy compression?
Spiht itself is losless when the full bitrate is encoded, however the underlying wavelet transform is often limited by fixed point precision, unless a lossless (integer-based) transform is used.
See this page for more details:
http://www.cipr.rpi.edu/research/SPIHT/spiht1.html
What is the world's fastest computer which works at the rate of 1.75 peta flops?
Supercomputer "Jaguar" was built by the supercomputer manufacturer "Cray" at Oak Ridge National Laboratory. In November 2009 it's performance peaked at 1750 teraflops (1.75 petaflops) making it the fastest computer in the world.
Are the TCP IP model and OSI model examples of reference models?
tcp ip and osi are having their reference models, they are not reference models.......they are network models, defines how does a network works when data is sent from one node to another within a network.
WikiLeaks has revived the debate about freedom of the press, and it has put may people in danger everywhere. It released thousands of classified documents, and cannot be shut down.
Engineering, scientific, medical, biological, and environmental, to name a few.
Data will loss if you put CD or floppy near to a magnet. why?
First of all, don't worry about your CDs or DVDs near magnets. These use "optical" storage techniques, which are not affected by magnets.
"Magnetic" storage - floppy disks, credit cards, hard disk drives - store information by using patterns of magnetization. Basically, they take the information you want to store, and write it onto a special magnetized material. Since this material stores data in the form of magnetization, putting it near a magnet will cause a change in the stored information.
What does xeon processing mean?
Xeon is a processor brand by Intel. It is a multi-core processor brand mean to be run in servers and embedded systems.