• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What is a network?

Extracts from this document...

Introduction

1) What is a "network"? A network is several computer systems linked together so that facilities such as printers, storage, computer programs, etc. can be shared. 2) What is "local area network" (LAN)? A local area network (LAN) is a group of computers linked together over one small geographical area, usually one building, an office in a building, or across a several buildings on one site. 3) What are "dumb terminals"? Dumb terminals are display and input devices which don't process data and input locally, instead transmitting input to a computer to which it is connected and displaying the resulting output. 4) What is a "server" and what does it do? The file server provides central disk storage for the users of a network. It identifies each user's file separately, and will not allow another user to access them. 5) What is a "web server"? A web server is a computer connected to the Internet. ...read more.

Middle

What is the "internet"? What did it used to be? The Internet is the world's largest wide area network and is often referred to as the network of networks. 10) What is the "world wide web" (www)? The world wide web is a part of the internet where a set of multimedia documents (documents that can consist of words, sound, video, images or animation) are connected by way of hyperlinks so you can move from one document to another with a mouse click. 11) What computer language are web pages written in? A webpage is written using HTML (hypertext markup language). 12) Connecting to the internet - what type of hardware device is a "modem" and what does it do? A modem converts the digital signals from a computer into analogue signals that can be sent down a phone line. These analogue signals are then converted back to digital signals by a modem at the receiving end. ...read more.

Conclusion

* You can create an address book of the e-mail addresses of all your friends. * You can create a distribution list. * You can send attachments of any file your computer. * If you want to attach a confidential file, you can add password to the file for security. * You can send copies of a message to many people. * You can forward e-mail you have received to other users. * Messages are automatically date and time stamped. * You can add a different signature to an e-mail, depending on the recipient. 18) List three other ways of accessing the internet. Mobile Phones; Personal Digital Assistants (PDA); Internet TVs or Set Top Boxes; Multimedia Kiosks. 19) What factors affect data transfer speeds when we are accessing the internet? The speed of your modem or the modem at the other end of the communication line; Your phone line; The size of the file being transferred; The amount of memory on your PC; The number of users online at the same time; The site you are visiting may be very busy; The amount of bandwidth available. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. ICT Systems in Everyday Life: Your Local Community

    History has shown that encryption systems ultimately are broken. This could severely curtail the international box office and other ancillary markets. * Harmonizing the experience. One big industry concern is that the look and feel of digital projection will not differ significantly from HDTV shown on a big screen TV.

  2. Information Security.

    * Cross-site scripting * Email spoofing * Email-borne viruses * Hidden file extensions * Chat clients * Packet sniffing * Trojan horse programs Trojan horse programs are a common way for intruders to trick networks users into installing "back door" programs.

  1. Free essay

    Impact of ICT in Community

    * The Comprehensive online and context sensitive help. * Reads or spells out any text on screen: documents, menus, web pages, emails. * Read icons and Internet graphics labels and announces font and style information.] * Talks as you type, by character, by word or both.

  2. Unit 23: Investigating Communications and Networks

    But it allows the receiver to prioritize messages. In comparison the telephone is a rude device that interrupts you and demands immediate attention, no matter what you are doing. Another advantage is that when email is saved, it leaves a written record of exchanges that can be built into a substantial information database.

  1. OCR GCSE Business & Communication Task 7 Report

    Other annoyances involved in email can be the persistent receiving of pornography, racism or cyber bullying which can result in humiliation. We can prevent this by ensuring police are aware of this annoyance, but to further minimise the chance of email annoyance, I can install and use antivirus software, firewall and pop-up blockers.

  2. Computer Networks and Distributed Systems - Wireless network of devices: General packet radio services ...

    due to the limitations in speed of Circuit Switched Data (9.6 kbps) and message length of the Short Message Service (160 characters). * Will fully enable the Internet applications you are used to on your desktop from web browsing to chat over the mobile network.

  1. Sales Promotion and Advertising Plan for the Web site www.sniegaklubs.lv.

    and do not want accept anything that is not "made in Estonia". That is why Sniegaklubs will try to find local partners to work with and to make the Estonian Web site look and sound real Estonian. In Lithuania, situation regarding snowboarding and skiing information is even worse.

  2. Connecting your LAN to the outside world.

    All you have to do is connect to their network, and they, in turn, provide the connection to the Internet, which is just how it works when you want to gain personal access.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work