• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What is a network?

Extracts from this document...


1) What is a "network"? A network is several computer systems linked together so that facilities such as printers, storage, computer programs, etc. can be shared. 2) What is "local area network" (LAN)? A local area network (LAN) is a group of computers linked together over one small geographical area, usually one building, an office in a building, or across a several buildings on one site. 3) What are "dumb terminals"? Dumb terminals are display and input devices which don't process data and input locally, instead transmitting input to a computer to which it is connected and displaying the resulting output. 4) What is a "server" and what does it do? The file server provides central disk storage for the users of a network. It identifies each user's file separately, and will not allow another user to access them. 5) What is a "web server"? A web server is a computer connected to the Internet. ...read more.


What is the "internet"? What did it used to be? The Internet is the world's largest wide area network and is often referred to as the network of networks. 10) What is the "world wide web" (www)? The world wide web is a part of the internet where a set of multimedia documents (documents that can consist of words, sound, video, images or animation) are connected by way of hyperlinks so you can move from one document to another with a mouse click. 11) What computer language are web pages written in? A webpage is written using HTML (hypertext markup language). 12) Connecting to the internet - what type of hardware device is a "modem" and what does it do? A modem converts the digital signals from a computer into analogue signals that can be sent down a phone line. These analogue signals are then converted back to digital signals by a modem at the receiving end. ...read more.


* You can create an address book of the e-mail addresses of all your friends. * You can create a distribution list. * You can send attachments of any file your computer. * If you want to attach a confidential file, you can add password to the file for security. * You can send copies of a message to many people. * You can forward e-mail you have received to other users. * Messages are automatically date and time stamped. * You can add a different signature to an e-mail, depending on the recipient. 18) List three other ways of accessing the internet. Mobile Phones; Personal Digital Assistants (PDA); Internet TVs or Set Top Boxes; Multimedia Kiosks. 19) What factors affect data transfer speeds when we are accessing the internet? The speed of your modem or the modem at the other end of the communication line; Your phone line; The size of the file being transferred; The amount of memory on your PC; The number of users online at the same time; The site you are visiting may be very busy; The amount of bandwidth available. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Free essay

    Impact of ICT in Community

    Too what extent does it meet their needs? / refer back to their special requirements/needs Mary needs an assistance to tell her the time but she uses a Chrome talking watch instead so she doesn't need anyone to tell the time.

  2. Networks LAN = Local Area Network.

    Network Topologies. Star, Bus and Ring Star Each workstation has its own direct line to the server. Connections to the server are made with hubs or switches. Hubs connect many lines together. Switches allow the network manager to connect certain workstations to specific servers.

  1. Shareware and Its Network Security

    to pay for it if the software was to be bought from a retail store.

  2. Unit 23: Investigating Communications and Networks

    * It is difficult to troubleshoot. * Adding and removing computers disrupts the network. Mesh - In a mesh topology, each computer on network has redundant data paths. The mesh topology provides fault tolerance-if a wire, hub, switch, or other component fails, data can travel along an alternate path.

  1. Information Security.

    If we think of privacy as the legal concept, then security of data is one of the means by which the privacy can be obtained. The implementation of these new laws is likely to produce applications for data security techniques.

  2. Comparing documents

    Both the organisations have used "Dear sir" as their salutation, Wessex Water have placed their salutation below their date. Whereas, Coffee Control have put their salutation at the start of their body text. Wessex Water has started their body text with a subject/subheading, whereas Coffee Control has started their body text straightforward.

  1. OCR GCSE Business & Communication Task 7 Report

    These tools can therefore help to promote my corporate image as well as improve the overall look of my website to allow it to look as kinetically pleasing as possible.

  2. ICT Systems in Everyday Life: Your Local Community

    Content encryption. 2. Security (key) management. 3. Integrity event logging and reporting. EVALUATION INTO THE EXTENT THAT THE TECHNOLOGY MEETS THE COMMUNITIE'S NEEDS: * The advantages of the technology are: * Eliminate print film. We estimate that the annual cost of print film in the Unites States is roughly �350 million.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work