Posts

Showing posts from November, 2023

BCA All previous year papers

2nd sem 1st sessional paper   2nd semester 2nd sessional paper 3rd semester 1st sessional 3rd sem 2nd sessional 1st semester 1st sessional paper 1st semester 2nd sessional 1st semester (Even) paper 2nd semester (odd) paper 2nd year 3rd odd semester

Authentication

Basics of Authentication 1.Authentication is the process of confirming the identity of a user or system attempting to access a resource. It ensures that the entity trying to gain access is indeed who or what it claims to be. The basics involve three factors: something you know (like a password), something you have (like a smartphone for two-factor authentication), or something you are (like biometric data - fingerprint, facial recognition). These factors combined form the foundation for various authentication methods used in digital security. Attacking a Password System Attacking a password system involves various techniques aimed at exploiting vulnerabilities to gain unauthorized access. Some common methods include: 1.Brute Force Attack: Trying all possible combinations of characters until the correct password is found. This method requires time but can be effective against weak passwords. 2.Dictionary Attack: Using a list of commonly used passwords or words

Computer organization & Architecture Notes

Image
Computer architecture is the organisation of the components which make up a computer system and the meaning of the operations which guide its function.  Notes 1 Notes 2 Notes 3 Unit 4

Introduction to system security(ISS)

Unit 1   Unit 2

DAA 4th unit

Click on me for 4th unit  

DAA 3rd unit notes

Click on me for 3rd unit  

DAA notes 2nd unit

  Click on me for 2nd unit

DAA notes

Click on me for 1st unit notes  

OS 1&2 unit notes for BCA 2nd year

Image
Click on me   Click on me for os 3rd&4th unit

BCA Operating system notes

Click on me