Current Affair (GK) of 28 July 2015 In English For Banking Exams
Dr. APJ Abdul Kalam, former President of India, Dies in Shillong
Former President of India and renowned scientist APJ Abdul Kalam died after he was hospitalized in a very critical condition at a private hospital in Meghalaya's capital Shillong on Monday.
Kalam 84, arrived at the Indian Institute of Management (IIM), Shillong, at 6pm to deliver lecture to post graduate students of the institute.
He reached Shillong by road from Guwahati. He was supposed to addressed the students till 10.40pm on the same day.
After he reached IIM-Shillong, he collapsed around 7pm while delivering lecture to students and was rushed to a nearest private hospital.
An IIM-Shillong faculty said that Kalam has been visiting the institute for last three years to address the students. This year it was Kalam's third visit to IIM-Shillong.
Kalam was the 11th President of India and held the post from July 25, 2002 to July 25, 2007.
He was a renowned scientist and is considered to be the main brain behind India's space launch vehicle (SLV) and missile programme.
Assam and Nagaland governor, PB Acharya said that the nation has suffered a great loss in the demise of Kalam. Acharya said that Kalam is not only a former president but also a highly respected scientist internationally.
The government has declared a 7-day national mourning as a mark of respect for the departed former President.
Unlike operating systems, such as Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly.
The two major types of network operating systems are
The Physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstation. Logical topology was discussed in the Protocol chapter.
Wireless networks are much more susceptible to unauthorized use than cabled networks. Wireless network devices use radio waves to communicate with each other. The greatest vulnerability to the network is that rogue machines can " eves-drop" on the radio wave communications. Unencrypted information transmitted can be monitored by a third-party , which with the right tools (free to download), could quickly gain access to your entire network, steal valuable passwords to local servers and online services, alter or destroy data, and /or access personal and confidential information stored in your network servers. To minimize the possibility of this, all modern access points and devices have configuration options to encrypt transmissions. These encryption methodologies are still evolving, as are the tools used by malicious hackers, so alway use the strongest encryption available in your access point and connecting devices.