• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

In order to establish a business properly communication needs are the most important factor. This is internal using the existing computer network. There are different types of connection methods

Extracts from this document...

Introduction

CONNECTION NEEDS OF A SMALL MEDIUM ENTERPRISE Priyanka Regmi Contents Table of contents page 1. Internet Connectivity 3-4 1.1 Types of Connection Methods 3 1.2 Selecting an Internet Service Provider 4 2. Email 5-9 2.1 Spam 5 2.2 Email filters 5-6 2.3 Automatic features and Email filters 6-7 2.4 Email address book distribution lists 7 2.5 Virus Checking 8 2.6 Allow/disable HTML email 8 2.7 Size and type of attachments 9 2.8 Web based Email 9 3. Internet Security and Legal Issues 11-12 3.1 Virus Protection Software 11 3.2 Hackers and Firewall 11 3.3 Spyware 11-12 3.4 Digital Security Certificates 12 4. Internet Access Policy 13 Internet Connectivity In today's tough economy, companies are working even harder than ever to grow their business and control their costs in various items such as telecommunications which includes telephone, internet and similar other such costs in order to manage and grow their customers efficiently and effictevely. In order to establish a business properly communication needs are the most important factor. This is internal using the existing computer network. There are different types of connection methods. Some of them are as follows: Cable Broad band: is the broad band delivered via cable rather than a BT phone line. ...read more.

Middle

Email filters: email filter is the process of email to organize it according to specified criteria. Most often this refers to the automatic process of incoming messages, but the term also applies to the intervention of human intelligence in addition to anti-spam techniques, and to out going email as well as those being received. INCLUDEPICTURE "http://www.palomar.edu/atrc/Training/images/junk01.gif" \* MERGEFORMATINET Automatic features such as out of office response and flags: here you can see the print screen of "out of office assistant". INCLUDEPICTURE "http://messaging.unt.edu/files/out_office2.jpg" \* MERGEFORMATINET You can use the flags to prioritise the emails. For example you can use red flags for important messages. Recommendations: I recommend the SME business to make use of flags because by this one can easily be able to direct their attentions at important emails by the exclamation marks, this shows that the emails is really important to be read by the business. By using the other automatic features one will be able to save the time because by using this feature the original sender will know that the person is not therefore, therefore he doesn't need the send an email to each and every person saying that "he is not currently available in the office". ...read more.

Conclusion

People normally confuse hackers with crackers. Recommendation: I recommend you that for a business like SME you need to install firewall so that to ensure that the business doesn't get affected by virus, and also as recommended above Norton should be installed on the computer, to prevent from virus entering the computer system. Spyware: is software that is installed unreasonably on a personal computer to collect information about a user, their computer or browsing habits without informing the user. Spyware program can collect various types of personal information such as internet surfing habits, such as installing additional software, apart form that Spyware steals information from the user by using computer memory resources. It works is several ways. Recommendation: I recommend that an SME business use offer firewalls and software that can easily protect your system that I have already suggested such a McAfee Security Suite, this software has all the essential software required in order to protect your system from spyware viruses and hackers. Digital security certificates: these are the digital ID within SME that is an attachment to an electronic message used for security purposes. The most common use of digital certificate is to verify that a user sending a message is the one who claims to be and provides the receiver with the means to encode a reply. Recommendation: PAGE PAGE 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Sender of a UDP does not assure the state of UDP message once. If any kind of reliability is needed for the message transmission than it is all implemented in upper layers. IEEE 802 Institute of Electrical and Electronics Engineers 802 is the standard which looks after LAN and metropolitan area networks.

  2. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    As a user of an interface, they way you would perceive a colour would be different, that is why it is important for developers to be considerate when creating an interface. Under perception there are colour, patterns and objects. * Colour: Colour is an extremely important fact in which a

  1. System I designed in order to produce a promotion package for her newly formed ...

    GINOLA DAVID M 03/05/68 TOTTENHAM 22 CARR STEVEN M 27/05/77 TOTTENHAM 20 ANDERTON DARREN M 26/10/71 TOTTENHAM 19 CAMPBELL SOL M 04/12/74 TOTTENHAM 18 ARMSTRONG CHRIS M 03/04/71 TOTTENHAM 23 LES FERDINAND M 03/01/67 TOTTENHAM 2 SANOBAR MANSOOR M 27/12/84 WALSALL 3 HUSSAIN AKHTAR M 06/03/85 WALSALL 4 GANI BODRUL

  2. Introduction of Communication

    is in the shop instead of trying to explain to him what I need I can send him a picture of what I need. Advantages MMS has many advantages over SMS, MMS messages are not size restricted, they can be as large as you need them to be.

  1. Explain the component parts of a computer system - Include both hardware, software and ...

    A local area networks physical layout will vary according to the network technology, hardware configuration and surrounding environment. The physical layout of the network is called the topology. There are three main types of topology shown in the following diagram: Local area network can be linked to each other via telecommunications networks so that they become a wide area network.

  2. Programming Techniques

    The repeat..until loop checks the Boolean condition at the end of the loop and therefore the loop is always performed at least once. For example, Total = 0 Readln(mark) repeat Total = total + mark Writeln('please enter the next mark , -1 to end')

  1. Principles of Software Design & Development - A system needs to be created which ...

    * Establish what drinks are included in the order * Calculate the total of each item together once order is made. * Establish what base for each pizza Storage: * Pizza Size * Pizza Toppings * Pizza Base * Drinks All information is going to be temporarily stored in the RAM.

  2. Small Office Network Implementation - hardware and security.

    Internet and Networking Devices Ethernet Hub Jump to: navigation, search Source - ConceptDraw NetDiagrammer Hubs work at the physical layer (Layer 1) of the OSI (Open System Interconnection) model. Using an Ethernet hub can connect multiple twisted pair or fiber optic Ethernet devices together, making them act as a single segment.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work