• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Download services

Extracts from this document...


Download services There are many types of download service on Internet that include the ability to download music, films, software and upgrades. Music and film downloads are generally aimed at teenagers and young adults because they are more likely to download music onto IPod or MP3 player and watching the new movies which has come out on cinema. Software and upgrades are aimed at a wider audience. The download website call http://www.download.com/ has contains a wealth of downloadable material. Microsoft Download Services Microsoft Window XP has a program can provide automatic download service called Automatic Updates. It used to regularly update the users computer with the latest update from Microsoft. This is can help users to improve the security and reliability of Windows XP, it also reduce the error happen which will possible occurs in future. www.microsoft.com Benefits of Automatic Updates * It can improve computer's health and security. * Microsoft Update is easy to set up and use, because download and install updates can be automatically. * Microsoft releases new drivers and software that increase the performance and functionality of your Windows-based computer. Drawback of Automatic Updates * Every time after install the last update, the computer will asking to restart for getting the effect work, if people are doing work it will wasting time * Sometime it will install some useless program into people computer The picture above is showing the Automatic Updates has downloaded the updates and asking users to install it. Software Many software applications are now available to download, update or upgrade from the Internet. ...read more.


The software is using peer to peer method is such as Kazaa, eDonkey, Limewire, Bitcomet or abc torrent etc. In most of these networks, ordinary Internet users trade files by directly connecting one-to-one. The advantage here is that files can be shared without having access to a proper server and because of this there is little accountability for the contents of the files. Hence, these networks tend to be very popular for illicit files such as music, movies, pirated software, etc. Typically, a downloader receives a file from a single source, however the newest version of some clients allow downloading a single file from multiple sources for higher speeds. The problem discussed above of popular downloads is somewhat mitigated, because there's a greater chance that a popular file will be offered by a number of peers. The breadth of files available tends to be fairly good, though download speeds for obscure files tend to be low. Another common problem sometimes associated with these systems is the significant protocol overhead for passing search queries amongst the peers, and the number of peers that one can reach is often limited as a result. Partially downloaded files are usually not available to other peers, although some newer clients may offer this functionality. Availability is generally dependent on the goodwill of the users, to the extent that some of these networks have tried to enforce rules or restrictions regarding send/receive ratios. I want to talk about the BitComet software. BitComet is a p2p file-sharing freeware fully compatible with BitTorrent, which is one of the most popular p2p protocol designed for high-speed distribution of 100MB or GB sized files. ...read more.


The drawbacks are that you don't always get the file you think you have downloaded and you may download a virus instead of the file. If users have a slow connection then the file download could take a long time. People would possible download the illegal music/film/software from Internet and that also lead the no people would buy the original music/film/software. Conclusion The internet is a world wide resource for information, by the year and year, amount of users increasing. The Internet could only grow large and large. So the new Internet services would appear all the time. However, there are many benefits from the internet, but there are also same amount of drawbacks. Download service can help people update their computer at home, and download the school work via e-mail. But there are many people using the peer to peer technology to download the illegal music or movies through Internet, it cause many company who selling music CD or DVD losing profit, so this is a drawback of download service. The internet is the world's greatest resource, all the information in the Internet can be spread easily in short period of time and it also same to the problems such as new viruses. Over the last 10 years the Internet has been a major contributor to the revolution we have witnessed in new Technologies. It also becomes part of our life, without it we go back to the "Stone Age", because we need to use pen and paper to do all the work out. ?? ?? ?? ?? Page 1 of 9 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Illegal music downloads. This Essay will treat and analyze main points of advantages ...

    However, consumers justify, that music albums are too expensive and buying them in order to listen to only one or two songs is ridiculous. Moreover, consumers downloading media files from the Internet are able to choose from various types of digital music and burn it all onto one CD or

  2. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    for their benefit; the data could range from names, D.O.B to bank account details. Hackers can find many different ways to strike, externally they can use a physical approach for instance they would use tools to hack into the an external piece of software such as an external hard drive

  1. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    The chapters I used were nine until thirteen; it gave me a lot of information regarding computer misuse. I found so much information in those five chapters that I did not found on the internet, and after reading those chapters I certainly understood the assignment much better, as everything, which was asked in the assignment brief, was in the book.

  2. The Sullivan's matrix report

    These cultures are mostly found as combinations in organisations. Organisations have different information assets and their staff members have different information needs. Therefore, in order to use these information assets appropriately you need a customised culture which is aligned to the information needs of the organisation.

  1. Local area networks (LANs).

    Cables come in different standards: Ethernet, Token Ring, and ARCnet. Ethernet is, by far, the most commonly used standard in the world. It's implementation consists of 10Base5, 10Base2, 10BaseT, 100BaseT, and 10BaseF. The first number represents the bandwidth of the cable.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    Anti virus programs and hardware have been developed to combat viruses. They work by searching for evidence of a virus program (by checking for appearances or behaviour that are characteristic of computer viruses), then finds infected files, and thus remove the virus.

  1. How a particular organisation can take advantage of IT developments

    Another software that could benefit Golita immensely is the Custom software also known as Bespoke software. This can help Golita for budget or project managing. Microsoft Word could be implemented as well to keep track of things such as: which item has been posted and what day and time as

  2. Computer Networks.

    Internet service providers such as CompuServe and AOL are types of private WAN. 3. Components Workstations A workstation is either a stand-alone computer or a dumb terminal (no processing power of its own) connected to a network. Each workstation has a network card which fits into an expansion slot inside its casing.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work