![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|||||||||||||||||||||||
|
Icon sizes: 256x256, 128x128, 48x48, 32x32, 24x24, 16x16 File formats: ICO, GIF, PNG, BMP ![]() ![]() ![]() ![]() The Users In A Computing EnvironmentThe following article is about how different users are connected to each other in a network through the computers. They can easily share information among them and can also share other resources. One user is restricted to its own view which would be totally different than the way information is displayed to other usersThere are many users who are connected to each other through a network of computers. Theses people easily communicate with each other and can share different kinds of information as well as the resources with each other. In a computing environment there is a different view for each user which is totally different from the way the information is displayed to others. Everyone using these computers is called a user of the computer and if they are present in a network then they are attached with each other through one main computer which is called the server. The server is responsible for allocating different resources to different users and it is the responsibility of the server to provide all the services that are demanded by any user. While using these computers, each user might have different requirements and needs. In order to deal with all of them and to provide each of them the kind of information which he needs, there are different views made so that they can easily get the information which is relevant to only them and is not related to any other user. The users have complete liberty in their own view but at the same time they are restricted from entering into anyone else’s area. Total security is maintained for keeping the information of all people safe from each other and also from the intruders who try to do harm to the data and important information of other people. The computing environment is fun and somewhat complicated at the same time. Although there are many precautionary security measures taken by the server administrator or the system admin but still some users try to get into the logins of other users so as to take out their information and then use it for the wrong purposes. When we are using the computers and are using them in a public place especially, we should be very careful about it. One must not leave the computers logged with its own username or passwords as they would invite the intruders to do harm with your name. You should be very careful while using the computers. ![]()
| Copyright © 2009-2022 Aha-Soft. All rights reserved. |
|