MyITLab Helpdesk
what are logical ports
A logical port is a virtual communications gateway that allows a computer to organize requests for information from other networks or computers.
what is an IP address and where I can find the IP address for my computer
An IP address is a unique number identification assigned to each computer, server, or device connected to the Internet. To find your IP address, go to Google and type "what is my IP."
how is an e-mail server different from a communications server
An e-mail server processes and delivers incoming and outgoing e-mail, whereas a communications server handles all communications between the network and other networks, including managing Internet connectivity.
is there an alternative to remembering IP addresses
Yes, you can use a domain name. A domain name is simply a name that takes the place of an IP address, making it easier to remember.
what are web servers
A web server is used to host a website so it will be available through the Internet.
once debugging is done, can the created software program be released
Actually, after debugging, the last step is to test and document the program
once I've defined my problem statement, can I start coding
Actually, after defining the problem statement, the next step in a programming project is for programmers to translate the programs into an algorithm.
how do I create fields in a database
Actually, you can create the fields manually by assigned field names.
what happens after programmers create an algorithm
After programmers create an algorithm, they select a programming language and translate the algorithm into that language.
what are authentication servers
Authentication servers keep track of who is logging on to the network.
how do I get started on creating a database
Before creating a database, you need to know the three main components of a database. These include fields, records, and tables.
when my friend connects to my computer, how is data transferred
Computers communicate efficiently using the communication methodology called packet switching.
but how do computers get the IP address from a domain name
Computers consult the domain name system (DNS) server. The DNS server contains a mapping of domain names with their corresponding IP addresses.
what are decision points
Decision points are points at which the program must choose from different actions, based on the value of its current inputs.
what do file servers do
File servers are used to store and manage files for network users.
what else can hackers do
Hackers can also launch an attack from your computer called a denial of service (DoS) attack. A DoS attack is an attack on a computer system launched from an unprotected computer.
once compilation is done, is the program finished
No, programmers still need to test the code to see whether the program behaves as it should
do database servers manage the network databases
Not really. Database servers provide client computers with access to information stored in a database.
after programmers finish coding, what do they do next
Once the algorithm has been coded into a programming language, the programmers have to run it through a compiler
how do packets travel through the internet
Packets are routed using Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is a suite of protocols used to route packets over the Internet.
once I download or buy the firewall software, how do I get it installed and tested
Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided and the user manual. you can test it by going to such sights as grc.com and running the shieldup test to see if you're safe
does the IP address remain the same or can it change automatically
The IP address changes automatically if your computer has a dynamic IP address. A dynamic IP address is a temporary IP address and is assigned by your ISP when your computer connects to the Internet.
what's the first step in programming
The first step in programming is to define the problem statement.
what are the different types of databases and which is most common
There are relational, object-oriented, and multidimensional databases. Of these, the relational database is most common.
is it important to have a firewall on a home network
To be safe, you should always have a firewall if you plan to connect to the Internet
do I need any special software to use dedicated servers
Yes. You need to install special network operating system (NOS) software on each client computer and server connected to the network to provide the services necessary for them to communicate.
are there different kinds of firewalls
You can buy either a hardware firewall device or special firewall software designed to restrict access to your computer.
what data type can I use for a field if I have to store a page of text
You can use memo fields. They are text fields that are used to hold long pieces of text.
what server is used to store applications
You need to use an application server to store applications. When a client connects to the network and requests an application, the application server delivers the software to the client computer.
how do I create relationships between tables
You use primary and foreign key fields to create relationships between tables.
but how will a firewall help if I'm not exchanging any valuable information over the internet and you don't have any important files on my computer
a firewall protect your computer a screening data coming into the logical port and confirming whether it's from a trusted source. Even if you don't store proprietary files on your computer, a hacker can steal personal information from your computer to commit identity theft.
what is an IED
an integrated development environment is a development tool that helps programmers write, compile, and test their programs
besides committing identity theft, what else can hackers do
hackers can use Trojan horses to gain control of your computer without your knowledge. a trojan horse is a program that appears to be something useful or desirable, but at the same time does something malicious the background without your knowledge
is one table in a database enough to enter all my information in it and store all the fields
no, you need to create different tables and organize data to be stored in them
what if the IPS's web server cannot locate the IP information on the default DNS server
the default DNS server contacts one of the DNS servers. A root DNS server knows the location of all the DNS servers that contain the master listing for an entire top level domain
my office has shifted to a client /server Network and uses one server and the office - is that sufficient
the number and types of servers you need depends on the workload your network experiences
if data is broken into chunks and sent over various routes at the same time, how do you these packets reach their destination
the packets contains destination information in our reassembled when they all reach the destination
but, if I include the primary key of one table and the other table, won't I have two primary keys for a record
when the primary key of one table is included in another table to establish a relationship between the two tables, it is called a foreign key in a related table
what else can I store in a field besides text, numeric values, and contents of a calculation
you can store pictures and video clips using OLE object fields