answersLogoWhite

0

📱

Internet

This category contains questions and answers about the World Wide Web and related subjects.

18,762 Questions

What is the toll free telephone number for Time Warner Cable Internet?

You can contact Time Warner Cable to order high speed internet at the toll-free telephone number 844-538-4997.

How does the internet cross the ocean?

Nearly 100 percent of international data crosses the ocean via undersea cables. They're only about three inches in diameter, but they span entire oceans. Plows dig grooves in the sandy ocean floor, lay the cables in, and the current buries them; some are buried as deep as Mount Everest is high.

This seems insane—it is insane—but we've actually been using ocean-spanning cables since 1866, when the first successful trans-Atlantic telegraph line was laid. In 1956, we started making international phone calls via deep sea cables. Today, there's a system of nearly 300 undersea cables that transport our data.

Oh, and to answer your potential followup question: Even if you're using wifi or phone data, it eventually reaches a physical cable and, if need be, sprints across the ocean.

What are the three types of hackers?

There are thee types of hackers white hat, grey hat, and black hat.

If a white hat hacker finds a fault in a security system ie. a website then they will inform the owner immediately.

Whereas if a grey hat hacker finds a fault he will do what he feels like at the time ie. exploiting the site OR informing the owner.

A black hat hacker if they find a fault will immediately exploit the site for there own beneficial gain ie. advertising and infecting other computers with "viruses" to gain access to more sites.

So a hacker can be many things from protecting systems by informing the owners or Exploiting and stealing data.

The most common name for the destructive type of "hacker" is a "cracker". I always try to refer to a bad hacker as a cracker to avoid confusion.

Also, there is a very important distinction between the three, as to both HOW and WHERE they attempt to break a system or program.

A White Hat (or, more properly, a "computer security specialist" or similar) will NEVER attempt to break into a system that they do not own or do not have explicit permission from the owner to do so. That means, they will usually be hired by a system or software owner to test the security of the said system or software package. They will always report their findings to the owner of the system, though there is somewhat of an ethical responsibility to report any significant (i.e. things that would impact the public) exploits to the community-at-large, if the original owner does not seem to be willing to address the issues - e.g. in case of a coverup of the problem, a White Hat is generally ethically bound to report the problem to the proper authorities, which may include public organizations such as CERT. More concisely, a White Hat is a professional, who abides by professional ethics and performs his or her duties out in the open.

Grey Hat folks generally don't have obvious ill intent (to contradict the previous answer). That is, they're not looking to exploit any problems for personal gain. However, they generally follow an ethic which believes that it is OK to perform intrusion and exploit scans on systems which they DON'T own or have permission to do so. This makes it hard for a target to determine the difference between a Grey and Black Hat hacker, as the initial method of operation looks identical. That said, Grey Hat folks generally report their findings to the target - that is, they'll inform the target as to what security issues they have found. Most Grey Hats will give the target a small window to address the issues; however, a GH will always report the issue to the wider media and security groups, and will NOT consider any information that the target wants to keep private. That is, GH folks seem to see themselves as "defenders of the public good", and that by exposing weaknesses of systems, they will ultimately force folks to be more secure. This is a plausible, but not provably true, scenario. Grey Hat folks are hobbiests and enthusiasts, who generally don't get paid for their work, but pursue it for personal reasons. They generally keep their identities masked (or at least don't usually broadcast them), as much of their work is quasi-illegal.

Black Hat folks, of course, are in it for the money (one way or the other). They're targets will never be informed of breaches, and in fact, most BH folks strive to keep their exploits secret from everyone, as it allows them to sneak in and steal information of value undetected. Black Hat folks are pure criminals.

How does a cable modem connect to the internet?

The Cable Modem is able to take incoming traffic from groups of customs on a certain channel and it routes it to the Internet Service Provider (also known as ISP) for an internet connection. For a more in depth overview of how it works there is an abundance of more information online.

How do you add the Dell start page?

You add the page to favorites and the bar at the top should say make home page.

List two security issues when using the internet?

# Cyber Stalking/Bullying and various types of cyber offense # Hacking.

Etc....

---- Check out the related link for more.

# Cyber Stalking/Bullying and various types of cyber offense # Hacking.

Etc....

---- Check out the related link for more.

What is the advantages of Local Area Network to Wide Area Network?

  • Files can be stored on a central What_are_the_advantages_of_local_area_network(the file server) allowing data to be shared throughout an organization.
  • Files can be backed up more easily when they are all on a central fileserver rather than when they are scattered across a number of independent workstations.
  • Networks also allow security to be established, ensuring that the What_are_the_advantages_of_local_area_networkusers may only have access to certain files and applications.
  • Software and resources can be centrally managed.
  • Network versions of software often allow for their speedy installation on workstations from the What_are_the_advantages_of_local_area_network.
  • Expensive devices such as laser printers or scanners can be shared.
  • Users can access their files from any workstation

How has internet changed retailer and consumer relationship?

Fundamentally, it has opened markets to organisations that would not have been considered in the past. Not forgetting, the potential cost reductions that can be achieved.

To date, there are only a few global organisations (outside of the computer industry) that I believe, have intergrated e-Commerce and the Internet into their business that I would call, "Well On The Way".

Large global organisations do not fully understand computer technology at a very senior level, hence the slow uptake of the opportunities that are presented.

This may have a profound affect on their market position overtime as second and third tier competitors can establish themselves on the same platform and can adopt new and innovative competitive strategies in shorter time-frames, where larger organisations take time.

If your question is from a marketing orientation.

Then e-Commerce and the Internet have removed the major functions of what I would call marketing and not simply referring to marking as promotion.

Customers can in some ways be the loser in the technology revolution.

When was Skype created?

September 2005 by 2 men named Nikalas Zennström & Janus Fiis.

Which companies offer a wireless internet business plan?

Most companies offer internet service that comes into your home through a modem (cable, dsl or satellite are the most common) and then you would need a wireless router to make your home internet wireless. Wireless routers can be bought for reasonable prices at most electronics stores. Some examples of internet providers are AT&T, Qwest, Road Runner, Comcast, Charter, Verizon, and many others.

How can you merge Multiple Internet Connections on single PC at same time?

If it is windows xp or above version. Goto Control Panel > Network Connections. If all your internet connections are listed there, select two or more (including your LAN) and select Bridge connections from the Right Click options menu. This will result an another network bridge which allows other PCs on the LAN to connect to the internet.

If you would like to know more about Multiple Internet Connections and its advantages like Load Balancing, Redundancy please visit this link to gain knowledge http://www.wanredundancy.org/resources/technology/networks-and-technology/multi-wan-broadband.html

A better option would be to use this

http://www.softpedia.com/progViewOpinions/MultiConnect-98000,.html

I am using it and its good

What initially made the Internet widely accessible?

When the World Wide Web became a part of the internet, it slowly began the growth of the internet to become popular. The World Wide Web was in existence for a number of years before ordinary people began to use it. It was invented in 1989 but popular usage did not really happen until the early and mid 1990s.

Are there any safe chat rooms for a 6 year old kid?

6 year olds should not be in a chatroom.

Children are best served by making friend In Real Life, not in a virtual reality on the internet. NO matter what website your children enter, there may be adults there as well posing as children. I know because I just did it on kidswirl.com, the supposedly best social networking site for kids.

Yes....the best Social Networking Site for kids that we have found is called kidswirl.com . It is very similar to the facebook layout...but designed exclusively for kids! My kids love it! They allow chatting only with friends that you have accepted.

My 6 old sister likes to play on webkinz, because it is safe for her and I'm big and older and I'm watching what she says.

There are some chat rooms for 6 year olds. I would recommend woogiworld, club penguin, panfu.com and dpals. The only one I know kids will enjoy is dpals.

How do you lock desktop icons in place in windows 7?

http://www.youtube.com/watch?v=mu5hlsn2Kf8

No more trouble now. Works on Windows 7 as well!

What would happen if the internet did not exist?

There wouldn't be any cyberbulling, you would lose touch with people you haven't seen, you couldn't be able to stalk people without seeming creepy, you would never be able to meet strangers who you don't know, you would have more time to do nothing, all life would be gone. You would die of boredom. Maybe the obesity rate would go down.

Average monthly bill on landlines?

The least amount averages about 20 to 30 dollars a line . If you have a separate internet broadband provider such as Clear Wire etc. you may want to check out majic jack.com. the average cost of a line with majic jack is $ 1.95 per mo. and all calls are free in and out with unlimited usage.

What is the difference between Electronic commerce and Electronic Data Interchange?

Electronic Data Interchange pre-dates internet e-commerce. EDI facilitates e-commerce.

-Electronic commerce is the process of buying, selling, or exchanging products, services, or information via computer networks.

-electronic data interchange (EDI) is the electronic transfer of specially formatted standard business documents, such as bills, orders, and confirmations, sent between business partners that has pre-dated the internet. It's been around since the late 70's. EDI's are traditionally processed by Value Added Networks (VANs), which are private, third-party managed common carriers that also provide communications services and security.

- VANs can be expensive are relatively expensive and inflexible.

-Since the advent of the internet, corporations are using a combination of internet based EDI or web EDI, as a more affordable option. Recent studies have shown that Web-based EDI experience superior performance, both internally and externally.

- Recently most major retailors are requiring their suppliers to conduct business via regular or Web-based EDI. EDI services are provide by companies such as GXS (gxs.com) and sterling commerce (sterlingcommerce.com).

What does QQ stand for?

QQ originates from Starcraft, where the control for exiting the game was Control + Q + Q, so when raging, people would quit the game by "QQing", Coincidentally, QQ, Q_Q, and Q.Q look like eyes with tears in them, so the original meaning has been forgotten and is now thought to have to do with "crying more" or to "quit crying". qq much? oh! pwned! QQ Dose not mean anything. People use it to mean Quit Crying. QQ Also Started to be used in Call Of Duty 3 Multiplayer. The term Didn't become popular Untill World Of Warcraft Where player's started using it from its underground usage from Call of duty 3 Multiplayer where the term was born.

How do you turn on the Track Changes feature in a word processing document?

  • Select Track Changes from the Tools menu
  • Click the Track Changes button on the Reviewing toolbar
  • Use the Ctrl+Shift+E shortcut key
  • Double-click the TRK button on the status bar

What is an internet avatar?

An avatar is basically a representation of yourself. You can have a picture avatar on AIM, a cartoon Avatar on Skype, or a self-designed Avatar on many Wii games. The word has come to mean a creation/image that represents you.

An avatar is a sort of cartoon-assigned profile which someone can modify at ease until satisfaction, used in some search engines (eg Yahoo) designed to get oneself easily recognised.

What does it mean if your IP address is private?

It means that the particular IP address is not visible directly from the Internet.

It is useful when the internet access speed drops to near zero and you do know how many web cateloging companies are tracking every web site you visit. One browser that enable privatge browsing is Safari. The other side of private browsing is that no history of sites visited is recorded on your computer.

What is the role of internet in direct marketing?

Internet marketing is the process of positioning your website so that people or potential customers can find it when they search for a phrase that relates to your company - like "portland shoe store". If done right, your shoe store website would come up on the first page.

Can you browse the internet using MS-DOS?

There are web browsers, e-mail clients, messaging soft, other networking sofware for DOS. The nature of DOS imposes certain restrictions, so Windows, Mac OS X or Linux like experience should not be expected. But basic use is surely possible. [For some details see related links below]

A Website can support?

All of the above. Video , text , picture.