Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

The five to seven most important things about computer networks that should be understood by everyone who uses one - Essay Example

Comments (0) Cite this document
It has been said that artificial intelligence usually beats natural stupidity, and it does seem that in many cases the computer has gotten smarter than the user. Almost everyone has heard an amusing anecdote about people that call tech support for some unbelievable reason such as the user that placed his jacket over his computer because it was 'frozen' (Mears & Dubie, 2006)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
The five to seven most important things about computer networks that should be understood by everyone who uses one
Read TextPreview

Extract of sample "The five to seven most important things about computer networks that should be understood by everyone who uses one"

Download file to see previous pages Every computer user should have a basic understanding of the 'Error Message'. The man that got his first computer with AOL spent most of his afternoon running down his driveway when the computer kept announcing that, 'You've got mail'. It took almost as long as the user who spent hours looking for the 'Any' key when the message said "Press Any Key To Continue". All this time could have been saved by requiring new computer users to take a short course in computer messages.
Understanding the error messages is almost as important as learning to communicate with the technical people. An important time saving tip for computer users would be to invest in a tech support to English dictionary. Learning the basic lingo of the geek squad would be invaluable in improving communications (Strange user requests, 2006). Users may tend to interpret tech support literally and confuse the meaning of everyday words such as 'frozen', 'mouse', or 'boot'. Who knows what 'LAN', 'OS', or 'USB' stands for A quick reference card placed near the computer screen could help the user decode the special language of tech support.
Reducing calls to tech support could also be accomplished by giving computer users a basic course in hooking up a computer and eliminating static electricity. If a keyboard does not respond, there is some likelihood that the cable has come disconnected. The simplest and most common cables are the power cord, mouse, LAN cable, and keyboard. It would be a simple task to check these before using the scarce resources of tech support. In addition, static electricity has been cited a primary cause of computer lockup or failure (Miastkowski, 2002). A few minutes of instruction on reducing the risk of static could potentially save thousands of dollars worth of computing equipment.
While some computer knowledge will save time and money, there are other things that a user should know to keep their information secure. Using passwords on key information is mandatory, but is of little use if the password is given out to fellow employees or friends. In addition, the password should be something that is not easily deciphered. It is also critical to know what to put a password on. Network users will often be unaware that many of their personal files may be accessed by any user on the network. Users should have an understanding of how a basic network operates and where the information is stored. This would help users understand just how vulnerable their private information can be on a network.
Simple passwords and a basic understanding of computer networks can eliminate the threat from prying eyes. However, it can do little to dissuade the dangers posed by the malicious hacker. Users need to be fully aware of the threat posed by viruses, spyware, and other forms of 'mal-ware'. Security software needs to be installed and updated regularly. Out of date security software is vulnerable to attacks from the latest version of a virus. Users also must be sure that the software is active and the firewall is turned on. Hackers that take advantage of systems that are not running security software can do irreparable harm to an individual or a corporation.
In conclusion, the tips listed for basic computer skills may seem blatantly obvious to any intermediate level user. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“The five to seven most important things about computer networks that Essay”, n.d.)
Retrieved from
(The Five to Seven Most Important Things about Computer Networks That Essay)
“The Five to Seven Most Important Things about Computer Networks That Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The five to seven most important things about computer networks that should be understood by everyone who uses one

Computer Communications & Networks

...? Computer Communications & Networks Table OF Contents Introduction ………………………………………... Page 3 X-Stream Server ………………………………………… Page 4 Routing ………………………………………… Page 7 Conclusion …………………………………………… Page 8 References ……………………………………………. Page 10 Introduction Today, the Internet provides numerous opportunities for humans to communicate and exchange information. Apart from various advancements such as web2.0, the semantic web and virtual and augmented reality, fundamental concepts and protocols that are used to transfer and deliver a data packet is the same. However, in order to examine the processes, methods and techniques, we must first understand the TCP/IP protocol suite itself. Considering Internet Protocol (IP) first is vital because...
8 Pages(2000 words)Essay

Computer Communications & Networks

... and half duplex (James F. Curose & Keith W. Ross, 2000). Network Layer The inputs of this layer incorporate logical addressing in order to route data to the relevant destination. Routing carries out by intelligent network devices called routers. Routers forward packets of data across an internetwork to the relevant destination by utilizing the Internet Protocol (IP) (IP Router. 2007). Likewise, from the X stream, routers redirect data to the home computer. However, different protocols can be used by the router to choose the shortest and suitable path for robust communication In order to examine the IP v4 packet header; Exhibit 4 demonstrates all the parameters along with the comparison of IPv4 and IPv6. Exhibit 4 IPv4/IPv6 Packet Header...
10 Pages(2500 words)Lab Report

Computer Communications & Networks

The devices are called end devices or more correctly hosts; which are either the destinations or sources of information transmitted via a network so accessing a network or site remotely involves three elements; a source or sender, a destination and a medium which is the channel through which the data is transmitted. The data transmitted can be in the form of text, graphics, voice or video which are converted into a language the computer understands called binary bits (data is transmitted as a zero or a one: 0I). The bits are then ‘programmed’ or coded into signals or data packets that can be transmitted through a medium over a network. Now sending data as one continuous stream will mean that no other data or devices can use the m...
8 Pages(2000 words)Lab Report

Computer networks

...?Local Area Network Information and communication technology ICT has facilitated us with endless communication interfaces and opportunities. Likewise, a skeleton for transfer and exchanging blood within different parts of the body is considered veins. Similarly, for exchanging and communicating data within different computers and applications, computer network is an essential component. There are various types of computer networks such as Local Area Network, Wide Area Network and Metropolitan Area Network. These networks operates on different topologies, however, star topology is generally adopted by organizations because it supports centralized administration and management. Likewise, enterprise wide applications such as, enterprise...
14 Pages(3500 words)Essay

Computer networks

IP version 4. The protocol operates the network layer that is a third layer of the Open System Interconnection (OSI) model. Likewise, network layer incorporates addressing information and control information that enables data packets to be routed within the computer network ("Internet Protocol Version 6." 255-255). Moreover, IP version 6 is also considered or called as the next generation IP, as specified by the IEFT: RFC 2460 ("Internet Protocol Version 6." 255-255). However, the primary reason for upgrading the IP version 4 to IP version 6 is address space limitations. Moreover, other issues such as performance, security and auto configuration are considered secondary (Loshin 305). Likewise, address space limitations are linked...
14 Pages(3500 words)Essay

Computer Communications & Networks

... is associated with Ethernet, token ring etc. for accessing the X stream from a remote location, we will discuss the insights of these five layers of the TCP/IP model. Moreover, Figure 1 also illustrates the resemblance of each layer of TCP/IP to the OSI model. Figure 1 TCP/IP and OSI Model Image retrieved from: (Clarke, n.d) Figure 1.2, demonstrates the functionality of each layer in order to exchange data from the home computer and the X stream server. The application layer will use FTP, HTTP, SMTP for initiating request and forwarding it to the next layer i.e. the transport layer. The transport layer builds the header and data before sending it via TCP or UDP. Likewise, the next layer i.e. the network layer assigns the IP address...
7 Pages(1750 words)Lab Report

Computer Networks

.... EVALUATION & FUTURE RECOMMENDATIONS Critically evaluate your chosen network and make suitable recommendations for its development with respect to three of the following criteria: A. Performance For the call center the performance is very important factor as the service has to be provided just in time. High and accurate performance is provided to the clients so that they should not be kept waiting for the information. It is achieved using the technology of pinging. The call is forwarded to the particular system if it is physically connected to the system and is upright in the position to receive the call successfully. If the pinging is not returned then the call is not allotted to that particular system and is moved forward in the line...
9 Pages(2250 words)Essay

Most Important Things In Human Life

...Most Important Things In Human Life Before answering the question what is important in life, the question what is life should be answered. Even though the science and technology has advanced a lot, still science has no idea about the origin of life or life after death. Only religions have answers to the above questions. Even though people have different interpretations about the meaning of life or life before and after death, most of them have similar ideas about what is important in life. For some people, getting rich is the meaning of life. For some others, acquiring a better social status is important in life. But many people have accepted that personal relationships as the most important thing in life. Man is a social animal...
2 Pages(500 words)Essay

Computer networks

... that was received. This is the same situation that happens in a basic acknowledgement. In this mode, the acknowledgement specifies the SACK blocks and they are then conveyed through starting and ending sequence numbers. Question 2 In trying to locate a certain server on the internet, a computer communicates to a series of DNS servers around the internet. The process involves the domain resolver determining the most appropriate domain name through queries that start with the top level label of the domain. The process entails some steps as follows; - On sending the message after the composition, the email client connects to the domains SMTP server The senders email communicates SMTP with email address of the recipient. It hands over...
4 Pages(1000 words)Essay

Computer Networks

...Computer networks Q1. Some of the computer applications that require connection oriented service include the remote login, file transfer and video on demand (Tanenbaum, Andrew, 13). Some of the examples of where the connectionless service is best include the electronic transfer of money, the verification of credit cards and most of remote database access. Q2. The main reason for inventing the new abstract ID is because the process IDs is usually OS specific. This would make the protocols to become independent. The second reason for using the new abstract IDs is that one channel is capable of establishing multiple channels of communication. It is impossible to distinguish these channels when using the single process IDs (Tanenbaum, Andrew...
1 Pages(250 words)Essay

August Wilson as One of the Greatest African American Playwrights

Born in 1945, August Wilson was raised in Pittsburg, Pennsylvania. He lived in a two-room apartment behind a grocery store on Bedford Avenue. At fifteen he quit high school, choosing to educate himself at the Carnegie Library. After working a bunch of assorted jobs, he began writing poems at twenty. Being raised in a time of segregation, then coming of age in the era of the Civil Rights Movements must have affected him deeply. Just from reading Ma Rainey’s Black Bottom, the reader can see the racial oppression Mr Wilson must have felt throughout his life being an African American male.
Ma Rainey’s Black Bottom opened on April 6, 1984, at the Yale Repertory Theater in New Haven, Connecticut. The cast included Richa...
9 Pages(2250 words)Coursework

Appraisal of the Work's Reviews about Medicine

The authors have referred to appropriate and adequate works. The author referred to an explicit range of databases and periodicals. A wide period range was covered as literature review was done of proceedings of the Society or Pediatric Research from 1990 to May 2006.No language restrictions were set as the author referred to the translated version of one trial published in German (Schrod 1993) as well. References of included studies were also reviewed. The literature review also included Grey literature identified by hand searching the proceedings the Society for Pediatric Research Conference published from 1990 to May 2006.
The relevance of the studies included was partial. The standard search strategy of the Cochrane Neona...
14 Pages(3500 words)Literature review

Plato as One of Historys Greatest Contributors

... thoughts according to Plato. Admittedly, this is a fine line of distinction as action typically follows thought, but it remains an important distinction nonetheless as thought does not always precede action and action can take place without full agreement in thought. In determining who should be leader, it becomes obvious through this story that the uneducated individual would not have the ability to reach the deep level of thought required to be an effective leader. Instead, the leader must be someone who has been encouraged to step outside of the cave, have a long enough look around to discern the true aspect of things and then follow the call to assist his former cave-mates. Epistemology In the Allegory of the Cave and thanks...
12 Pages(3000 words)Case Study

Can One Person Make a Difference in an Organization

Each individual has something to contribute but at times one person can make a difference to an organization.
Technology today has made it possible to retain and conserve knowledge and transmit it to other people in an organization. The knowledge that has been created by a single individual can be a powerful weapon when retained, transmitted, disseminated and applied. According to Nonaka, new knowledge begins with an individual (Chaston, Badger & Sadler-Smith, 1999). When the new knowledge is generated it is merged with the existing knowledge and new knowledge from other sources and provides the basis for new products and processes. Thus knowledge has been classified into two categories – explicit and tacit. Explici...
6 Pages(1500 words)Case Study

The Times and The Guardian as the Most Influenced Media

The broadsheets are probably the most famous to readers overseas. Media is one of the fastest-growing industries in the UK. And among them, a newspaper is one of the major media businesses in the UK. The media industry in the UK is expected to be ₤ 84 billion in 2010. In 1985, this industry was only ₤ 7 billion. (“UK Mediaphile 2010: UK media market could be worth £84 billion by 2010”, 2009) and in 50 percent of the media market was of print media, that is, mainly newspapers. However, the scenario has changed now, according to some study, it is expected that in 2010 only 16 percent of the whole media industry will comprise of newspaper or basically print media. A major chunk will move towards electronic media suc...
10 Pages(2500 words)Case Study

What Are the Most Important Factors in Explaining the Rise of the Modern State

Though the existence of the state can be felt in different walks of everyday life, yet it is an intangible whose nature is impossible to grasp. As a political institution, state embodies the concept of sovereignty. Devetak (2007) describes it as a political unit or a country that possesses sovereignty. State can thus be described as a single, unified whole confined within territorial borders. The state is built in a core geographical area with allowances to a certain extent on the boundaries. According to Strayer (1970), a state exists in the hearts and minds of the people. The collective personality of the state renders it immortal. The state is a multi-faced concept that is fuzzy around its edges. Consequently, we cannot develop...
6 Pages(1500 words)Essay

Computer Privacy Issue

The requirement has increased because there are unscrupulous computer attacks and private details are being stolen now more and more. These malicious data attacks have left the computers worldwide at a risk and hence the need to have privacy is of fundamental significance. If these privacy regimes are not taken care of, one could guarantee that problems would come about quickly and the computer networks would crash down instantly, thus providing fatal for the businesses and individuals alike. It goes to show without any doubt that privacy forms up as the most essential ingredient of success within a business entity and any organization would absolutely cherish the idea of having privacy within their networks to keep away the negat...
6 Pages(1500 words)Essay

Analysis of the Methods of 3 Research Papers about Child Abuse

Research ethics was maintained as the identity of the individuals participating was kept secret. As far as the validity of the study was concerned, the researchers attempted to use content validity in order to get an accurate response. The content validity focused on measuring off the ethnicities and gender percentages within the area and attempting to get a random sample of individuals via the phone. Their approach to random calling allowed for a significant random sample in the study. There were a few issues, however, with this type of approach. Those answering the phone sometimes were not always the desired individual, and not all of the desired people were surveyed. Different replacements did have to be used, and the attempt w...
6 Pages(1500 words)Literature review

Airbus A 380: SWOT and Porters Five Forces Analysis

...INTTRODUCTION This paper is about the European Aero manufacturer, Airbus and its latest offering, the Airbus A 380. Much has been written about theAirbus A 380 and how it is the next generation of aircraft that makes it easier for long haul flights to carry more passengers with fewer or no stops enroute. After the Airbus A 380 was introduced, many called it a revolution in air travel with its emphasis on luxury travel as well as better amenities for economy class travel. In this paper, I look at the Airbus 380 from a critical perspective by analyzing the competition and using tools like SWOT and Porter’s Five Forces. STRATEGIC POSITION In this section, I look at the strategic position of Airbus in the context of the parameters that have...
6 Pages(1500 words)Case Study

Analysis of Articles about Climate Change

...). This was for the first time that humanity was realizing that CO2 was the major gas responsible for about half the creation of greenhouse effect. The report also called for a conscious reduction of such gas emissions by controlling human activities that caused them. The report was very precise in terms of the prediction about temperature enhancement. The projection of the available data into the future years led the authors (Houghton, Jenkins and Ephirams, 1990) of this study to predict that global mean temperature will increase by 0.3 oC per decade during the 21st century. The shocking part of this prediction was that this kind of a temperature increase had never happened within the time span of past 10,000 years (Houghton, Jenkins...
6 Pages(1500 words)Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic The five to seven most important things about computer networks that should be understood by everyone who uses one for FREE!

Contact Us