Opt-in A comparison table of Opt-in and Opt-out 1. An opt-in framework is one in which an individual should effectively show intrigued or a longing to be a portion of something. 1. An opt-out course of action makes clients a portion of a system and gives them the opportunity to evacuate themselves from it. 2. An opt-in ascension is one in which somebody needs to effectively choose that the individual in question needs to be a piece of a bulletin or other chance. 2. In an opt-out course of action, somebody is naturally qualified as a contact and they become enrolled through another framework. 3. Here, You unequivocally agree to permit information to be incorporated about you. 3. In contrast, data can be accumulated about you except if you explicitly demand it not be. 4. Ordinarily, opt-out is utilized as a term for the administration that's being connected for USAmerican coordinate promoting messages. 5. Opt in mail promoting is known as “authorization-based” 5. Opt out is ordinarily called SPAM. 6. How one's personal information is gathered is imperative - must fall inside 6 legitimate bases. 6. Implicit opt-in, no requirement for explicit assent. 7. Assent must be openly given, educated and unambiguous, and got preceding any information assortment. 7. Opt-out guide companies to not sell information. Opt-out 4. Opt-in is the administration that's utilized beneath European and Canadian information assurance rules. A comparison table of LAN, WAN and VPN SL no. Basis of comparison 1. Stands For 2. 3. 4. 5. 6. 7. LAN WAN Virtual Private Network Covers Nearby regions only Large geographic ranges Covering a few (e.g., homes, (e.g., cities, states, distinctive platforms. workplaces, schools) countries) (e.g., private servers) Definition A local area network A wide area network A VPN is a protected (LAN) may be a (WAN), is an expansive association from bunch of devices network of data that isn't exterior the LAN, inside a geographic attached to a solitary through the web. A zone that share the area. WANs can VPN makes a passage same encourage that utilizes communications line. communication and the encryption algorithms sharing of data from to make sure about around the globe the data from the through a WAN exterior to the interior supplier. of the system. Data LANs have a high WANs have a lower VPN services are transfer information exchange information exchange ordinarily speedier, rates rate. rate contrasted with on the grounds that LANs they can oversee more servers for data exchange capacity for per client Technology Tend to utilize certain WANs will in utilize VPN guarantee to network technologies like secure sends technologies, MPLS, ATM for the encrypted congestion principally Ethernet network over longer over an open system, and Token Ring. separations for example, the Internet. The Secure VPN of technologies are IPsec and SSL. Ownership Ordinarily owned and WANs are not owned ownership of overseen by a single by any one association distinctive VPNs is individual or but or maybe exist part among several organization. beneath collective or subsidiaries conveyed ownership over long separations. Maintenance Since it covers a Keeping up WAN is Though VPN burrows costs moderately little troublesome in view of are genuinely low topographical region, its more extensive upkeep, their LAN is simpler to geological inclusion and maintenance and preserve at generally higher Maintenance support expenses can low expenses. expense. rapidly mount Local Area Network Wide Area Network VPN 8. Bandwidth 9. Connection 10. Congestion High data transfer capacity is accessible for transmission. One LAN can be associated to other LANs over any separate by means of phone lines and radio waves. Low data transfer capacity is accessible for transmission. Computers associated with a wide territory arrange are frequently associated through open systems, for example, the phone framework. Less congested More congested Here, Bandwidth depends on server’s affordable speed. VPN permits you to make a protected association with another system over the Internet. VPNs can be utilized to get to area confined sites. Depends on networks, the more clogged the system is, the less steady VPN association will be. • Bluetooth is a broadcast communications industry determination that depicts how cell phones, computers and different devices can effectively communicate with one another utilizing a short-extend wireless connection. • Bluetooth adapter on all the devices interfacing with each other. • Fairly basic to use and exchanging between devices is simpler. Wi-Fi Bluetooth A comparison table of Bluetooth and Wi-Fi • Wi-Fi is a wireless networking technology, which permits computers and other gadgets to communicate through a wireless signal that are commonly utilized for nearby zone organizing of devices and Web access. • The wireless connector on all the gadgets of the system and a wireless switch. • It is more complicated and requires the setup of hardware and programming. • Short-range wireless technology, about to 10 meters. • • Bluetooth is relatively less secure. • Whereas in Wi-Fi this range is broader than Bluetooth, about to 100 meters. • Bluetooth consumption power is low. • Security highlights are way better. Still, there remain some risk factors. • Connects PCs to devices, such as a printer. Also connects with industrial computerization devices. • Whereas, Wi-Fi consumption power is higher than Bluetooth. • Bluetooth is less adaptable methods as it is support limited users. • Wi-Fi connects with desktop computers, servers, TV, latest mobiles. • Impartially low expense to implement. • Whereas, Wi-Fi provides support for huge number of users. • Bluetooth requires low bandwidth • Comparatively higher cost than Bluetooth. • Wi-Fi requires high bandwidth rather than Bluetooth. A comparison table of Flaming and Spamming Flaming Spamming Flaming is an antagonistic online communication that includes offending messages, or flames, between clients. Spamming is the utilization of electronic informing systems like mails and other advanced conveyance systems and broadcast in media to send undesirable mass messages unusually Flaming is kind of those type of massages that tend to attack an individual personally that regards to Internet gatherings, chat rooms, interpersonal organizations, and game entryways. Spam messages are a type of commercial publicizing intended to flood the mail inbox of clients. Flaming is just planned to assault others using foul language. While Spamming promotes such things that might be helpful to the recipient of the email. A flame war is a trade of flames intentionally between two or more members. Spam is an unprompted email from hidden sources. A flamer has sole thought process to warm up the discussions. Whereas spam is sent to get responses because it can make a profit. Indiscriminate sending of unsolicited mail messages to numerous Web users Sending incredibly crucial, harsh, and frequently indecent email (Receiving sexually expressed) messages or newsgroup presenting on different users on the web. Trump blames Pope Francis for being 'disgraceful' in this flaming reaction to the Pope's remarks on his immigration proposals. A spammer imitates PayPal and notifies you that you won a lottery and If you go to the link which included underneath the message, it will seize your PayPal account that format by the spammer to take your password and withdraw all assets from your account. A comparison table of Handshaking and Roaming Handshaking A phase in a protocol where certain data are shared Within computer processor systems; sometimes as part of communications initiation process. Roaming Roaming leads to a cellular consumer's ability to instantly make and receive phone calls, send and receive information, or activate other Facilities, including mobile data services, while moving beyond the home network's geographic transmission range, through the use of the network accessed. Handshaking occurs when cells (radio tower) interchanged throughout an ongoing call. Roaming usually occurs when a location is changing, or Mobile is Switching Centre. Smartphone will change the channels; it sends and receives during handshaking, but this happens too quickly for customers to notice Roaming focuses on a company and administrative concern to produce higher profits and can be considered a technical problem Following are the main two ways of handshaking: • Source Initiated Handshaking • Destination Initiated Handshaking Details of roaming method vary between aspects of cellular networks, but the process of roaming approaches; Regional or internal, Inter-standards, Inadvertent, Permanent roaming. I decided to wait for the handsets to finish handshaking so That I could proceed the file transfer. If you have a T - mobile telephone and in Australia, trying to make a regular call in Australia by using cell phone will result for both roaming and longdistance rates. A comparison table of Internet, Intranet and Extranet SL Basis of no. comparison Internet Intranet Extranet 1. Definition The Web is the worldwide framework of interconnected computer systems that utilize the Web convention suite (TCP/IP) to connect devices around the world. 2. Users As internet connects globally so it can have numerous more users as a contrast with the number of clients on Intranet. Internet remain less secure since it has zero security level within the firewall. An intranet is a private system that is contained inside a venture. It might comprise of the much-interlinked area locally and furthermore utilize rented lines in the wide-region network. Intranet has restricted network area, so users of Intranet are moreover constrained. An Extranet is really an Intranet that is halfway open to approved outcasts. It is a site permitting outsiders, merchants, providers, and comparable subjects to get to specific resources of an association. An extranet serves to give resources that are made accessible to the approved clients, however not to general society. Though in this, security is actualized through a firewall to separates internet and extranet. 3. Security 4. Size Internet can connect with a huge number of devices. 5. Accessibility Anyone can access anonymously with the internet. 6. Information Internet network contains a diverse source of data and is accessible for all. Internet is not regulated by authority. As it is a global network area, it remains uncensored. 7. Regulation 8. Policy Intranet is a restricted network which is more secure than internet as it is protected by firewall. Intranet is a small network system that can connect with a few numbers of devices. An intranet is secured by encryption and accessible for authorized users. Intranet contains only a group of data. Intranet is regulated by a organization. Intranet is controlled by organization’s policies. Extranet connects with predetermined number of devices. Extranet is accessible for authorized clients. Extranet contains just an explicit group of information. It is regulated by numerous associations. Extranet is also governed by companies’ contractual agreements. 9. System failure 10. Example System failure is unpredictable for internet. An instance of internet is the System where people use to search words. The efficiency of the system is high because system is overseen by authority. An intranet is perhaps an organization such as Nokia which uses an internal system for its operation. There are multiple Ethernets to monitor the system. An extranet when corporations such as Dell, IBM, and ASUS plan to use the similar network for different business purposes. A comparison table of Computer Libel and Censorship Computer Libel Computer libel is a phrase used to refer defamation that arises in cyberspace, implying through the Internet. This contains false and misleading statements posted by e-mail, message boards, blogs, chat rooms, on websites, or any other Internet-based contact platform about another person. Libel happens if one makes a false statement to another individual or entity that is causing damage to the integrity of that person or entity. Computer libel is a sticky problem, as internet is an unregulated breeding ground for malicious activity to spread. Perhaps libel retains one's freedom of speech, and one may speak about controversial issues by using libel. By acting ethically, and by speaking the truth, we can reduce cyber libel. If someone wrote a blog that Mr. Smith hit his wife, three weeks ago. If this is not valid, then it is false and misleading. Censorship Censorship (using the Internet) is the regulation or restriction of what is available, written, or visible on the Internet. It can be carried out at the behest of states, private companies, regulators or according to their own initiative. Through censorship, national security can be protected by enforcing legislation against hacking and imposing harsh penalties on violators. Whereas censorship helps to prevent malicious activity. In contrast, by enforcing an Internet censorship rule, authoritarian government officials can get rid of their wrong activities. Overall censorship may not be the solution, Illegal censorship should perhaps be legislated in such a way as to provide consistency. China initiated censorship of online usernames. Like, usernames with "Obama" is now being blocked in china. A comparison table of Software security and Data security Different Parameters of Business Ethics Business ethics is perhaps the published and unpublished ethical principles and shared values which govern corporate decisions and behavior. Ethics concerns administrators confront as part of their day-to-day business decisions. There are four parameters of business ethics include: A comparison table of Computer Crime, Hacking and Cyber Theft SL Computer crime no. 1. Computer crime involves Unauthorized use, access, alteration or degradation of hardware, software, data, or network resources 2. Computer Crime refers to illegal activities committed by using a computer. 3. Computer crime involves unauthorized disclosure also copying of software. 4. Using or conspire to unlawfully manipulate computer or network resources to access knowledge or tangible property. Most of the time it considers under cybercrime in Bangladesh. Tampering with access or use to someone else's computer is a computer crime. 5. Hacking Cyber theft Hacking is such attempt to hack a computer device within a machine, or a private network. When many computer crimes include money laundering, is called a cyber-theft. Hacking includes activities that attempt to hack digital devices, including computers, smartphones, tablets, and even whole networks Hacking into a computer network and reading files, but doing nothing to steal or damage Cyber-crime is typically requiring by using of a computer and internet network or cyber space. Anyone who attempts hacking shall be punished either with imprisonment for a period of three years or with fine in Bangladesh. In 2008, Project Chanology; pseudonymous attacks worldwide repositories of Scientology sites. Scientology computers steal private documents and spread them over the Internet. Most are "inside jobs" involving in cyber theft. Unauthorized network entry and computer database switching to cover the tracks of the employees involved Most corporations do not publicize that they were targets or victims of cybercrime The biggest ever distributed loss of service (DDoS) attack did take place in 2016, using more than 1 million connected computers throughout the internet, which were hacked by criminals due to network weakness. References: 1. 2. 3. 4. https://www.insightsassociation.org https://www.floridatechonline.com https://softwarelab.org https://www.roccoresearch.com