Page 36 - CITS - Computer Software Application -TT
P. 36

COMPUTER SOFTWARE APPLICATION - CITS




           Here is how it works:
           1  User Input - When you enter a domain name (eg, www.example.com) into your web browser, your device
              needs to know the IP address associated with that domain to establish a connection.
           2  DNS Query - Your device sends a DNS query to a DNS resolver (typically provided by your Internet Service
              Provider or a third-party service), asking for the IP address of the domain.
           3  DNS Resolving Process - The DNS resolver doesn’t have the IP address cached in most cases, so it begins
              a process to find the IP. It first checks its cache to see if it has recently resolved this domain. If not, it proceeds
              to find out that information.
           4  Authoritative DNS Server - The authoritative DNS server for the domain holds the information about the
              domain’s IP address (and potentially other records like mail server settings). It answers to the resolver’s query
              with the required IP address.
           5  Response to User - The resolver receives the IP address from the authoritative server and caches it for future
              use. It then sends back the IP address to your device.
           6  Establishing Connection - With the IP address in hand, your device can now establish a connection with the
              web server hosting the website you want to visit

           7  Recursive Query - If the resolver does not have the answer, it sends a series of queries to different DNS
              servers. It begins by asking the root DNS servers for information about the top-level domain (TLD), then
              proceeds to the authoritative DNS servers responsible for the TLD. These authoritative servers direct the
              resolver to the DNS servers responsible for a specific domain (e.g., example.com).

            Multimedia Applications

           Multimedia applications are software programs or tools that integrate different forms of media, such as text, audio,
           video, images, and animations, to create interactive and engaging content.

           These  applications  enable  users  to  create,  manipulate,  and  share  multimedia  content  for  various  purposes
           including entertainment, education, communication, and artistic expression.
           Here are some common types of multimedia applications

           1  Video Editing Software
           2  Audio Editing Software
           3  Image Editing Software
           4  Presentation Software
           5  Gaming Applications
           6  Web and Mobile Apps

           7  Virtual Reality (VR) and Augmented Reality
           8  Video Conferencing and Communication Apps

            Security, Monitoring & Control

           Security, monitoring, and control are critical aspects of information technology and network management. These
           components help organizations protect their data, assets, and systems, detect and respond to security threats,
           and maintain the overall health and performance of their IT infrastructure.
           Here’s an overview of each of these areas

           Security:
           •  Security involves protecting systems, data, and resources from unauthorized access, attacks, and potential
              threats.
           •  It encompasses various measures and practices aimed at preventing, detecting, and responding to security
              breaches.



                                                           23

                              CITS : IT&ITES - Computer Software Application - Lesson 01-17
   31   32   33   34   35   36   37   38   39   40   41