Professional Documents
Culture Documents
Savings in design time, as assemblies/modules are simply selected like bought out parts, as
their reliability, cost and quality are documented and easily available.
Modular products enable faster, easier and more efficient customisation of standard products
to unique user needs.
Related to the above point, a popular version of a product can be increased to meet increased
demand in a short period of time.
Modules can be modified or replaced without changing anything else on the product.
Modular design enables quick and easy upgrades (driven by either technology or user
improvement), thus enabling products to evolve.
Modular design resists obsolescence and shortens the redesign cycle. A new generation
product can reuse most of the old modules and change is provided by a few improved
modules.
Flexibility in use, as the way customers use products can change over time.
Modular design delivers shorter learning curves when new employees have to become familiar
with products and the way they work.
Modular design gives businesses the possibility to outsource the assembly of some modules,
therefore freeing-up manufacturing capacity and increasing the number of products delivered
on time.
3.
4. The expansion card (also expansion board, adapter cardor accessory card) in
computing is a printed circuit board that can be inserted into an electrical connector,
or expansionslot on a computer motherboard, backplane or riser card to add
functionality to a computer system via the expansionbus.
5. The two most common types of expansion slots are Peripheral Component
Interconnect (PCI) and Accelerated Graphics Port (AGP).
6. Control BusThe control bus is used by the CPU to direct andmonitor the actions of the
other functional areas of thecomputer. It is used to transmit a variety of individualsignals
(read, write, interrupt, acknowledge, and soforth)
necessary
to
control
and
coordinate theoperations of the computer. The individual signalstransmitted over the control
bus and their functions arecovered in the appropriate functional area description.
Address BusThe address bus consists of all the signals necessaryto define any of the possible
memory address locationswithin the computer, or for modular memories any ofthe possible
memory address locations within a module.An address is defined as a label, symbol, or other
set ofcharacters used to designate a location or register whereinformation is stored. Before
data or instructions canbe written into or read from memory by the CPU or I/Osections, an
address must be transmitted to memoryover the address bus.
Data BusThe bidirectional data bus, sometimes called thememory bus, handles the transfer of
all data andinstructions between functional areas of the computer.The bidirectional
data bus can only transmit in onedirection at a time. The data bus is used to
transferinstructions from memory to the CPU for execution. Itcarries data (operands) to and
from the CPU andmemory as required by instruction translation. The databus is also used
to transfer data between memory andthe I/O section during input/output operations.
Theinformation on the data bus is either written into
7. A power supply unit (PSU) converts mains AC to low-voltage regulated DC power for the internal
components of a computer. Modern personal computers universally use switched-mode power
supplies. Some power supplies have a manual switch for selecting input voltage, while others
automatically adapt to the mains voltage.
Most modern desktop personal computer power supplies conform to the ATX specification, which
includes form factor and voltage tolerances. While an ATX power supply is connected to the mains
supply, it always provides a 5 V standby (5VSB) voltage so that the standby functions on the
computer and certain peripherals are powered. ATX power supplies are turned on and off by a signal
from the motherboard. They also provide a signal to the motherboard to indicate when the DC
voltages are in spec, so that the computer is able to safely power up and boot. The most recent ATX
PSU standard is version 2.31 of mid-2008.
1.
Backups
The most important precaution against any risk of data loss is a full, up-to-date backup.
Tape backup drives are the wisest form of insurance for your computer, and good tape
drives are very inexpensive ($150.00 or less). This will protect you against lightning,
fire, theft, accidental data loss, virus damage, hardware crashes,etc. The two most
important things to remember about backups are 1) Backup regularly - full backups
weekly and partial backups daily is best and 2) Keep a full backup in another location,
such as at home or in a safety deposit box. This way you will not lose your data in a fire
or if the computer is stolen.
Telephone line danger
One potential threat to your computer which most often goes unnoticed is your modem
connection. Surges and power fluctuations can hit your system through your phone line
and cause serious damage. Make sure your power strip or battery backup has telephone
line protection. During a heavy electrical storm, your safest phone line protection is to
disconnect the phone jack from your modem.
Battery backups
A single power outage is not as damaging to your computer as the extreme surges and
drops in power that occur during a blackout, brownout, or just your ordinary lightning
storm. Your computer is very sensitive to power fluctuations - protect yourself against
this. Uninterrrupted Power Supplies (UPS) are available at most any computer store or
Office supply store. The Blackout Buster is a very good battery backup which also
provides surperior protection through your modem/fax/telephone line. The Blackout
Buster retails for $129.00 and is available at Comp USA.
Turn off your computer
Many of our clients are on networks and have made it a habit to keep the computers on
all the time. Monsoon season is the exception to the rule. Whenever a storm or
brownout is expected, your safest strategy is to turn off all computers and monitors.
These precautions can save you a great deal of frustration and loss.
10 Occupational Health and Safety Procedure (OHS) this is about Safety and
Anti-Static Rules
1. When possible, try to avoid working in carpeted areas. Carpeting greatly increases
static buildup within your body.
2. Personal protective equipment are correctly used.
4.
5. To format your hard disk during Windows Vista installation, you'll need to start, or
boot, your computer using the Windows Vista installation disc or USB flash drive. Turn
on your computer so that Windows starts normally, insert the Windows Vista installation
disc, and then shut down your computer.
6.
Advantages of NTFS
It is recommended that you format all Windows 2000 partitions with NTFS except multipleboot configurations where non-Windows 2000 and non-Windows NT startups are necessary.
Formatting your Windows 2000 partitions with NTFS instead of FAT allows you to use
features that are available only on NTFS. These include:
Recoverability The recoverability designed into NTFS is such that a user should seldom
have to run a disk repair program on an NTFS volume. NTFS guarantees the consistency of
the volume by using standard transaction logging and recovery techniques. In the event of a
system failure, NTFS uses its log file and checkpoint information to automatically restore the
consistency of the file system. For more information about recovering your system, restoring
data, and creating an emergency repair disk (ERD) see "Repair, Recovery, and Restore" in
this book.
Compression Windows 2000 supports compression on an individual file basis for NTFS
volumes. Files that are compressed on an NTFS volume can be read and written by any
Windows-based application without first being decompressed by another program.
Decompression happens automatically during the read of the file. The file is compressed
again when it is closed or saved.
In addition, formatting your volumes with NTFS instead of FAT16 or FAT32 provides the
following advantages:
There are some Windows 2000 operating system features that require NTFS.
Faster access speed. NTFS minimizes the number of disk accesses required to find a
file.
File and folder security. On NTFS volumes, you can set file permissions on files and
folders that specify which groups and users have access to them, and what level of
access is permitted. NTFS file and folder permissions apply both to users working at
the computer where the file is stored and to users accessing the file over the network
when the file is in a shared folder. With NTFS you can also set share permissions that
operate on shared folders in combination with file and folder permissions.
7.
4
1. A device driver is a program that controls a particular type of device that is attached to
your computer. There are device drivers for printers, displays, CD-ROM readers, diskette
drives, and so on. When you buy an operating system, many device driversare built into
the product.
4. In computing, a plug and play device or computer bus, is one with a specification that
facilitates the discovery of a hardware component in a system without the need for physical
device configuration or user intervention in resolving resource conflicts.
5. This is basis for the restart, its only when booting that Windows can guarantee not one
program was using the drivers files.
6. In a computer, an interrupt request (or IRQ) is a hardware signal sent to the processor that
temporarily stops a running program and allows a special program, an interrupt handler, to
run instead.
To access Disk Management in Windows Vista and Windows 7 please follow the
instructions below:
From the Start Menu or from the Desktop, right-click on the Computer icon and
choose Manage from the menu. ...
Click on Disk Management, which appears in the left-hand side under the
heading Storage.
5
1. A user account is a collection of information that tells Windows which files and folders you
can access, what changes you can make to the computer, and your personal preferences,
such as your desktop background or screen saver.
Fix it
Disable or remove browser extensions and toolbars you don't really need:
Firefox: Hit the menu button on the far right, select Add-ons / Extensions, then select disable or
remove for each item on the list.
Chrome: Right-click on any extension button / Manage Extensions, then uncheck the box to disable
a particular item, or click the trash can to wave it goodbye.
Safari: Hit Safari (top left) / Preferences / Security / Extensions, then select an item to uninstall. You
can also turn off all Extensions here.
Internet Explorer: Tools / Manage add-ons / Show All add-ons, then select the offender(s), and click
disable or remove.
Fix it
Run a hard drive check, says Silverman. He recommends installing a program called HDTune that
runs a health check on your hard drive to diagnose it healthy or ailing. Avoid dropping, throwing or
otherwise causing impact to the hard drive to extend its lifespan.
Fix it
Shut 'em down. For Macs, Windows 10, Windows 7 and eariler versions of Windows, you can close
the programs from the file menu. In Windows 8, programs are built so that they run in the
background for a while, then automatically shut down. But if you want to manually shut one down
and ensure all associated files shut down with it, drag from the top of the screen to the bottom, and
hold there until the icon flips over.
Having multiple browsers open can slow down the works, just like if you had 20-plus tabs open,
Silverman says. Extra slow points if any tabs are also auto-refreshing (say, a live blog).
What's more, having a glut of browser tabs full of supposedly crucial information doesn't exactly help
our efficiency or mindfuless
Fix it
Bookmark those necessary links (for organization's sake, in a Bookmarks folder titled To Read)
and shut those tabs down. Even better, One-Tab for Chrome and Firefox does the work for you,
compiling all your open tabs into a simple list on a single tab, which can then be accessed as
needed.
Fix it
Check how much processing power programs and processes are using by heading into Task
Manager (Windows; Ctrl+Alt+Delete) or Activity Monitor (Mac; in Applications / Utilities). For both,
click the CPU tab to order the programs by how much processing power they're taking up. If a
program that you're not actively using is still up there in the top few programs, you can select to quit
the process.
And, when it comes to browsers, Internet Explorer is especially heavy on your computer, Silverman
says. You don't have to run it but don't remove it [if you got it bundled with your Windows PC] it
could cause problems as it's very tied to the operating system, he says. Instead, he suggests the
lighter, more secure Chrome.
Fix it
Head into your antivirus settings and configure it to scan late at night when you aren't using the
computer, says Silverman. (However, that feature may not be available on some free antivirus
programs which makes a good case for upgrading.)
Fix it
Run a malware scan. The best free one we like is Avast, Silverman says. For more free and paid
options, check out our Techlicious top picks for security software programs for Windows PCs
and Macs.
Fix it
Mac: Applications / Systems Preferences / User Groups / Login Items, then uncheck unneeded
programs. Delete desktop icons you don't use by trashing them or, in the case of files you've saved
to desktop for convenience, reorganizing to the appropriate folder.
Windows 8 and 10: Windows key + X / Task Manager / Startup tab, then right-click on the programs
you want to remove and select Disable.
Windows 7 and older: Start button, then search for System Configuration. Go to Startup tab, then
uncheck each of the programs if you don't want starting when the system boots up.
Fix it
Deep clean your computer of unnecessary files from unused programs to defunct downloads and
temporary files.
It's good to remove bloatware Toshiba, Lenovo and other PC manufacturers put their own
software on computers that are supposed to run utilities or cleanup, Silverman says. And in terms of
that ancient computer cleaning ritual defragging, that really only works on Windows XP computers
and older, says Silverman. System backups and restore points also can take up a huge amount of
space, so dont keep more backup versions than you really need.
Fix it
Windows 7 and older: Start / Control Panel / Performance Information and Tools / Adjust Visual
effects, then click adjust for best performance or manually choose which effects you'd like to keep.
Windows 8 and 10: Windows key + X / System / Advanced System Settings / Performance Settings
/ then select as above.
Mac: System Preferences / Dock, then for minimizing applications, change that super-swish Genie
effect to a utilitarian Scale effect (basically just disappearing). Uncheck Animate Opening
Applications.
Fix it
Dust off the ol', um, dust. If it's really severe, you can use a vacuum cleaner (carefully) or a canister
of compressed air.
Fix it
Silverman recommends a minimum of 2GB of RAM, or 4GB if you do graphics-heavy work on your
computer. Fortunately, upgrading the RAM on your PC is inexpensive and a task most people can
handle themselves. To learn what RAM upgrade options are available for your computer,
try Kinston's memory options tool.
Outlook, background processes are still running, Silverman says. You could 'end task', but a lot of
folks are not that savvy about which one to end.
Instead of manually digging into Task Manager (Windows) or Activity Monitor (Mac) to divine the
root(s) of the sluggishness, restarting flushes out the system, a panacea for those rogue, resourcehogging programs and a clean slate free of files and fragments.
Fix it
Bite the bullet and shut things down. You even get the added benefit of having critical system
updates applied that can only happen during a reboot.
Utility software, along with operating system software, is a type of system software used to
support the computer infrastructure, distinguishing it from application software which is
aimed at directly performing tasks that benefit ordinary users.
Disk Defragmenter is a tool that rearranges the data on your volume and
reunites fragmented data so your computer can run more efficiently. In this
version of Windows, Disk Defragmenter runs on a schedule so you don't have
to remember to run it, although you can still run it manually or change the
schedule it uses
Antivirus software was originally developed to detect and remove computer viruses,
hence the name. However, with the proliferation of other kinds of malware, antivirus
software started to provide protection from other computer threats. In particular,
modern antivirus software can protect from: malicious browser helper
objects (BHOs), browser
hijackers,ransomware, keyloggers, backdoors, rootkits, trojan horses, worms,
malicious LSPs, dialers, fraudtools, adware andspyware.
Operating system. An operating system (OS) is system software that manages computer
hardware and software resources and provides common services for computer programs.
The operating system is a component of the system software in a computer system.
Application programs usually require an operating system tofunction.
BitLocker To Go
Microsoft added BitLocker internal hard drive encryption in Vista to protect data on stolen
laptops. In Windows 7, the feature has been extended to protect external hard drives and USB
thumb drives. Called "BitLocker To Go", the feature, available only in Windows 7 Enterprise and
Ultimate editions, allows external storage devices to be restricted with a passphrase set by IT
before users have permission to copy data to them.
This should give enterprises the same confidence in USB external drives that they have in
regular hard drive encryption. And with the growing amount of USB devices being used by
enterprises, encrypting them has become a necessity.
Internet Explorer 8 for safer browsing
Although you can use Internet Explorer 8 with Windows XP or Vista, the latest version of IE
comes loaded on Windows 7 machines. Despite its recent browser market share dips, IE8 does
offer improved security features for both consumers and enteprises.
For consumers, the two standouts are: InPrivate Browsing, where data about your browsing
session is not stored and temporary Internet files, web address history, cookies and passwords
are all disabled and Protected Mode, which protects you from drive-by downloads that can
happen just from visiting a website.
Related
Microsoft Windows 7 OS
SPONSORED
Strategies for successfully adopting Hadoop
Advertisement
Some security features in IE8 that IT pros can utilise are: SmartScreen Filter, which
uses a red warning screen to prevent you from visiting unsafe sites and ClickJack
Prevention, which allows IT pros to insert a tag that blocks clickjacking, a type of
cross-site scripting that uses embedded code to trick users into clicking on a link
that appears normal (aka dummy button) but is concealing a hidden malicious link.
Microsoft Security Essentials
Microsoft Security Essentials, released last September, is a free program that
provides basic defense against viruses, spyware, rootkits and trojans. Though it
doesn't offer the comprehensive protection that paid security suites from Symantec,
McAfee and Kaspersky do, MSE has been hailed for its realtime virus protection,
organised interface and low resource usage. And its price is very attractive.
MSE may not qualify as a full replacement for Norton and McAfee products, but
along with Windows Defender for anti-spyware protection and Windows Firewall,
both of which have been enhanced in Windows 7, MSE facilitates non-intrusive virus
protection that will not bog down your computer.
AppLocker
Like BitLocker, AppLocker is an enterprise-only Windows 7 feature and its purpose is
to protect users from running unauthorised software that could lead to malware
infections. For safety, Microsoft recommends that enterprises run in standard user,
meaning there are no administrative rights to users at all.
But if IT managers do give administrative rights to users, AppLocker can safeguard
against users running suspicious types of software. It allows IT to specify which
applications can run on employees' desktops, blocking potentially harmful software
and allowing the applications and programs that users need.
More control of UAC
Vista users complained mightily about the security feature UAC (user account
control,) because of its frequent popup prompts seeking confirmation before
allowing programs to open. The resulting problem: many users just turned UAC off,
making them more vulnerable to security threats.
In Windows 7, UAC has more flexibility. The number of applications and tasks that
trigger UAC prompts has been reduced (no more prompts when you try to change
the date and time). Also, Microsoft has dropped the "on or off only" approach of
Vista. You are free to adjust UAC levels using a slider with four settings: Never
notify, only notify me when programs try to make changes to my computer, always
notify me, always notify me and wait for my response.
Even when the slider is set to "Never Notify" some UAC protections will still be in
effect, including Protected Mode in Internet Explorer.
Backing up data
In the Backup and Restore Center - accessed by opening Control Panel and clicking
"Back Up Your Computer" from the System and Security category - you can let
Windows 7 choose what to back up or you can select the individual folders, libraries
and drives yourself. Backups are created on a regular schedule, but you can change
the schedule and you can manually create a backup at any time.
Once you set up a backup, Windows 7 keeps track of the files and folders that are
new or modified and adds them to your backup. You can back up files to an external
hard drive, your network, or a DVD. The Backup and Restore feature comes with all
editions of Windows 7, but if you want to back up to a outside network location like
your company's server, you'll need Windows 7 Professional, Enterprise or Ultimate.
1. Data Mapping and Access: - DBMS defines the way to map any two related tables by
means of primary key foreign key relationship. Primary key is the column in the table
which responsible for uniquely identifying each record in the table. Foreign key is the
column in the table which is a primary key in other table and with which the entries in the
current table are related to other table.
For example, in the new database system, we can Student and Student_Report table as
follows.
STUDENT_ID is the unique using which we can identify each student and hence it forms a
primary key in STUDENT table. Similarly, REPORT_ID is the primary key in the
STUDENT_REPORT table. STUDENT_ID in the STUDENT_REPORT table is the foreign
key. It links STUDENT and STUDENT_REPORT tables.
Because of such mapping, it becomes each for the programmer to search for related
tables, join them, and fire the query as per the requirement. This reduces the time
consumed while searching and mapping these tables. Even when there is large amount of
data, the time consumed to retrieve, insert, update or delete is very less. Hence there is
no data isolation in the system.
Note: Mapping of tables is usually done when they are created.
2. Data Redundancy: - By the introduction of primary key in the table, data redundancy
problem is reduced to great extent. As we saw, primary key is the unique column for each
record, when there is a re-entry of same record, it does not allow saving such records.
DBMS has strong designing techniques like normalization which makes sure the same
copy of data is not stored in same table or in multiple tables. It makes sure all the
informations are stored only once in the database tables.
We can see the difference in the way data is being stored in the file and database system.
Primary key, foreign keys are defined; unnecessary columns are removed from the
STUDENT_REPORT table in the database system. These are missing in the file
processing system.
3. Data Independence and Consistency: - DBMS defines a standard to represent the data
in the form of rows and columns. It also stores the information about the tables, columns,
keys, storage space, used space, available space etc separately from the logical data.
Hence they totally independent of the way they are stored and the data being stored. Any
changes to the physical storage (like disks, tapes etc) or structure, does not harm the data
being stored. Since DBMS defines each columns and rows at the beginning itself and
controls the way data being entered, there is no affect on the programs or any other tables
or data. Hence the consistency of the data also maintained.
If there is a change in the address of any student, we just have to update it in the Student
table. There is no other place his information is being stored. Hence it maintains the
consistent data in the database.
Suppose there is a new column addition to STUDENT table, say DOB. This will change
the metadata to reflect additional column in the table structure. It will hardly affect the
application unless until there is a new requirement to have transaction with DOB. Hence
data independence is also assured in the database.
4. Security: - DBMS allows different levels of access to different users based on their roles.
In the school database, individual students will have access to their data alone, while their
teachers will have access to all the students whom they are teaching and for the subjects
that they are teaching. Class teacher will be able to see the reports of all the students in
that class, but not other classes.
Similarly, in a banking system, individual account holder will have Read-Only access to
their account. While accountant can update, individual account details for each of their
transaction.
All these levels of security and access are not allowed in file system.
5. Integrity: - DBMS allows having restrictions on individual columns. It would be defined
while designing the table itself. If we want to enter salary of an employee within the range
10000 to 40000, we can impose this while designing the table by using CHECK constraint.
When salary is entered, it will automatically check for the range specified.
CREATE TABLE EMPLOYEE .. CONSTRAINT chk_salary CHECK (salary>10000
AND salary <40000)
6. Atomicity: - DBMS makes sure either the transaction is fully complete or it is rolled back
to the previous committed state. It does not allow the system to be in a partially committed
state. In our example above, DBMS commits marks change transaction before calculating
the total. If there is any crash or shutdown of the system, before committing the marks,
then updated marks will be rolled back to the original marks. Hence it makes sure
atomicity of the transaction is achieved.
7. Concurrent Access: - DBMS provide access to multiple users to access the database at
the same time. It has its own mechanism to have concurrency accesses and hence avoid
any incorrect data in the system.
3. Lost or stolen devices are also a severe threat. Media Access Control addresses
are, therefore, a poor method of network authentication. Instead, rely on deviceindependent authentication, such as user names and passwords, with integration
with existing network directories or authentication schemes. Wireless LANs are a
natural extension to RSA SecurID token deployments.
4. 3. Wireless data requires data encryption.
5. Built-in wireless LAN encryption (such as Wired Equivalent Privacy) is weak.
Instead, use virtual private network technologies such as IPsec with triple DES to
protect data. Avoid proprietary schemes in order to assure maximum
interoperability.
6. 4. Limit or control where wireless LAN traffic can go.
7. If the wireless LAN is to be used for a selected purpose, such as to access an
enterprise resource planning system, then place specific packet filters on the
wireless LAN to allow only that access.
8. 5. Don't place APs on desks or other places that can be easily accessed.
9. Unscrupulous visitors or careless employees can easily move, replace or reset
the APs. Security can't be assured in such insecure locations. Instead, move
management and security to the wiring closet.
10. 6. Actively monitor AP configurations.
of
protection
implementation
are
and
link
implications.
encryption
Two
and
general
modes
end-to-end
of
encryption
encryption. Link
6. Port scanner is an application designed to probe a server or host for open ports. This is often
used by administrators to verify security policies of their networks and by attackersto identify
services running on a host and exploit vulnerabilities.
A virtual private network also known as a VPN is a private network that
extends across a public network or internet. It enables users to send and receive
data across shared or public networks as if their computing devices were directly
connected to the private network.
.
3. Why is Information Security important?
Data held on IT systems is valuable and critical to the business of the
University. We all rely on IT to store and process information, so it is essential
that we maintain Information Security.
The purpose of information security policies is to preserve:
Confidentiality
Data is only accessed by those with the right to view the data.
Integrity
Data can be relied upon to be accurate and processed correctly.
Availability
Data can be accessed when needed.
Failure to comply with the requirements of these Information Security
Guidelines may lead to disciplinary action.
2.
1. Encryption is the most effective way to achieve data security. To read
anencrypted file, you must have access to a secret key or password that enables you to
decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher
text.
2.
In the times of Julius Caesar was used only the shift of 3 characters, but nowadays the
term Caesar cipher refers to all variants (shifts) of this cryptosystem.
2. Private networks are formed by computers connected to each other but not
to external networks or the Internet. Each computer in a private network occupies a
private IP address space, meaning that no computer outside the network can find
that address or communicate with that computer. Although the configuration is
unusual in small businesses, it is used by some operations handling confidential or
highly sensitive information, with a series of advantages and disadvantages for the
small business.
Advantage: Security
The Internet is full of great content, but it also contains its fair share of
malicious applications and users -- everything from Trojans and viruses to worms
and hackers. The obvious advantage of a private network is that, by not being
connected to external networks or the Internet at large, a private network is simply
not exposed to these threats. With the average data breach costing an organization
$6.6 million in lost business and repair costs, according to a study by the Ponemon
Institute, the security of a private network can be a valuable advantage to a small
business dealing with sensitive content.
6.1
6.3
A specialised operating system for a network device such as a router, switch or firewall.
An operating system oriented to computer networking, to allow shared file and printer
access among multiple computers in a network, to enable the sharing of data, users, groups,
security, applications, and other networking functions.[1] Typically over a local area
network (LAN), or private network. This sense is now largely historical, as common operating
systems generally now have such features included.
8.1
Malicious software, commonly known as malware, is any software that brings
harm to a computer system. Malware can be in the form of worms, viruses, trojans,
spyware, adware and rootkits, etc., which steal protected data, delete documents or
add software not approved by a user.
8.2
8.4
Trusted Operating System (TOS) generally refers to an operating system that provides
sufficient support for multilevel security and evidence of correctness to meet a particular set of
government requirements
3.1A hash function is any function that can be used to map data of arbitrary
size to data of fixed size. The values returned by a hash function are called hash
values, hash codes, hash sums, or simply hashes. One use is a data structure called
a hash table, widely used in computer software for rapid data lookup.
2
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital
message or documents. A valid digital signature gives a recipient reason to believe that the message
was created by a known sender, that the sender cannot deny having sent the message
(authentication and non-repudiation), and that the message was not altered in transit (integrity).
Digital signatures are a standard element of most cryptographic protocol suites, and are commonly
used for software distribution, financial transactions, contract management software, and in other
cases where it is important to detect forgery or tampering.