181 Results for networks

Abstract Computer technology and use are more in demand today than ever. In an attempt to accommodate computer users, the amount of computer peripherals and accessories is on the rise. This paper will discuss particular hardware that is on the market today, which is wireless computer networking. Mo...
Networking For my independent study, I have created a network in my house. A network by definition are more than one computer that are linked together electronically via a protocol (common language) so the computers can communicate and share resources. This network improves the day-to-day life...
ABSTRACT Current neural network technology is the most progressive of the artificial intelligence systems today. Applications of neural networks have made the transition from laboratory curiosities to large, successful commercial applications. To enhance the security of automated financia...
The field of network security is a very dynamic, and highly technical field dealing with all aspects of scanning, hacking, and securing systems against intrusions. There are many positions related to this, however, the most common would be that of a Network Security Engineer, a Security Research Ana...
There are many kinds of networks, however this paper will be about networking computers. As we move further and further into the paperless society, the need for people to be connected and able to exchange data just as fast as they could by handing a paper to someone increases. This can be accomplish...
Topology means how a network is set up. Token Ring topology is one of them. It means that several computers are connected in a ring. When one computer wants to send data to another, it has to catch a free token which gives the permission to send data. As soon as one particular machine gets the t...
I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would b...
As more and more people use Internet for pleasure, more and more criminals use it to break into remote computers to steal information, plant viruses, or simply change user names and passwords. In any case, many online computer networks are vulnerable to outside hacker attacks. This can target ho...
Personality Working with computers is a great pleasure for anyone who ever has really discovered how they work. Maintaining computers can broken into a very broad range of duties or jobs. Two of my favorite, Programming and Network Administration, present me with the greatest interest. Comp...
Computer technology not only has solved problems but also has created some, including a certain amount of culture shock as individuals attempt to deal with the new technology. A major role of computer science has been to alleviate such problems, mainly by making computer systems cheaper, faster, mo...
Networking and Telecommunication Management "The AT&T long-distance networks crashes and millions of calls go unanswered. A computer hacker reprograms a switching station and calls to a Florida probation office are shunted to a New York phone-sex hotline. An illegal computer bu...
There are plenty of jobs in the field of computer network management, or any computer field, but every one should be good at or conceptionalize a lot of math and science, a major part of any computer field.When thinking about electronics what comes to ones mind is current, voltage, resistance, power...
Know the names of various WAN technologies·modems ·ISDN (Integrated Services Digital Network) ·DSL (Digital Subscriber Line) ·Frame relay ·ATM (Asynchronous Transfer Mode) ·The T (US) and E (Europe) Carrier Series: T1, E1, T3, E3, etc. ·SONET (Synchronous Optical Network) a printed circuit bo...
The History of the ARPANET Introduction The beginnings of the Internet were initiated by the Advanced Research Project Agency, or ARPA. This was a program funded by the U.S. Department of Defense whose original goal was to improve communication among government officials. As ARPA soon found ...
DATA SECURITY COMPROMISE: Every data transaction which takes place on the internet basically consists of three things - a client, a link and a server. This model can be applied to web commerce, to health care organizations, to government websites, basically to anyone who is offering informatio...
Firewalls Everyday millions of people around the world use the Internet for corporate use, research, and personal uses. If each person uses one computer to access the Net at any one time, that is trillions of bytes of data. People are in danger of being "infected" or "hacked" ...
Computers and computer technology is something that has changed the way some people live, communicate and get their information. In the early beginning, computers were nothing like what we have today. One of the things that was used a very long time ago was just some string with beads on them that h...
The concept of a "global village" or a united community around the world has only in these last few years become a concept widely thought of. However, it seems that the idea of a large-scale sharing of information has long been developing, whether intended or not. The tools of commun...
Net-I - Development ProposalDuring the past two months, several teams of this company's software development unit have been conducting widespread research, specifically targeting administrators of large volume organisational computer networks, as to what problems and difficulties that are often enco...
With the development of the magnificent World Wide Web (WWW) and the migration from mainframe to client-server, the need for increased awareness and security measures has become imperative. Computer crimes account for losses of more than one billion dollars annually. Computer criminals manifest them...
Computer Science In the last decade computers have become a part of everyday life. Whether it be surfing the web or a simple visit to Wal-Mart everyone faces computers daily. Since movies and television portray people who have knowledge of computers as nerds many misconceptions have existe...
Internet, its effects in our lives and the future of the Internet: The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to mo...
Successfully Managing your Techno Life Changing Role of Communication Technology in the Workplace Jagdish Sheth identified four dinstinct forces that are contributing to the changing role of information tec hnology in organizations 1. Intense competition 2. Globalization of business oper...
This paper is about the way information technology effects the business world today. We will also talk about how information came about and how it has evolved over the years. There are also many more innovations we will discuss, such as: programming, networking, cell phones, DSL, internet, etc....
An issue of concern at is Computer privacy. Computer privacy techniques have been developed to protect single computersand network-linked computer systems from accidental or intentional harm. The main reason for protecting these computers is tokeep them from physical loss of data, deception of compu...