Email attachments hope this helps
Answer:
There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying
Answer:
Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.
Explanation:
We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.
Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload
Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.
Answer:
Five focus areas for Green Computing are:
- Environmental conditions
- Information technology (IT) systems
- Cooling systems
- Electrical systems
- Air management systems
Explanation:
Green computing refers to the art of managing very effectively information technology such that the current level of productivity is maintained or exceeded.
Many of the factors listed above are more typical to data centers.
Data centers are IT systems that consume lots of electricity whilst generating lots of heat.
Sustained over a long period of time, the heat generated will contribute to green-house gases as the cooling system that is required to keep the data houses cool are big.
Hence, the green computing protocol requires where possible, minimal electricity be expended in cooling the data warehouses.
Another suggestion that has been given is for systems and appliances to be shut down when not in use rather than being left on or on standby.
Cheers