What is a Topology?

What is a Topology? A topology is the shape of a local area network or communications system. Topologies are either physical or logical. A physical topology is the layout of the network and how each node is connected to the network. This shows how the devices on a network are arranged and how they communicate with each other. A logical topology is the way the node (computer) communicates with the network and the way data is sent to each of the nodes. . What is a Bus topology? A bus topology is single cable that provides the network. This is called the central cable because it provides the network for all the nodes (computers). .2 Advantages of a bus topology? The advantages of a bus topology are that it is not very expensive to implement because a minimum length of cable is required to create the network. Another advantage of the bus topology is that computers can be added and removed without affecting the rest of the network. .3 Disadvantages of a bus topology? The disadvantages of a bus topology are that it is unreliable and the fastest computers delay the slower computers communication with the network. A break in the network will cause the whole network not to work. The performance of the network is decreased when more computers are added. .4 Where are bus networks used? Bus network are usually used at home when networking two computers together so that you

  • Word count: 853
  • Level: AS and A Level
  • Subject: ICT
Access this essay

The impact of ICT on an adult in full-time employment and the effects on his/her working style

The impact of ICT on an adult in full-time employment and the effects on his/her working style The person that I interviewed is a recent graduate, he has been living in Stafford for less than a year and works for the County Council in the financial area of Social Services. Work His work wholly revolves around I.T, mainly using financial system's, the Internet of which the majority is e-mail, Microsoft Word, Excel and Outlook Express. All the computers are run off servers which are most probably similar to the ones used in our school and the Internet is run through an Intranet (the Internet run through a network) which also runs the website which is used for people to find out about everything the council does from charity funding to social care for fostering and domiciliary patients, it also contains phone numbers etc. for schools, local council offices and other services as well as government regulations and policies. It also has message boards which can only be used by employees all though it is used as a buying and selling forum. There are a lot of restrictions on the network as well in the form that everyone has there own password for every piece of software that they use and they are restricted to the areas that they work in, an example of this is if he tried to get into an area that contained information about people enquiring about fostering and/or adoption then

  • Word count: 803
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Tatton Homes ltd. ICT Systems Report

Tatton Homes ltd. ICT Systems Report Current IT used by Tatton Homes Ltd At current tatton homes has a small Local Area Network (LAN) consisting of twelve PC's and four printers. The software on the network includes: * Word Processing * Desktop Publishing (DTP) * Accounting * Payroll * Database * Spreadsheet * Computer Aided Design (CAD) Scott Lyons and his technician deal with faults with software or hardware Recommendations for improvements The Tatton Homes Ltd. system at current could be improved by converting the LAN to a wireless network (WLAN) this will make the office less complicated and make it simpler for employee to access the network on mobile devices the company would need a fast internet connection for the two offices to communicate together possible a T1 Connection also employees could work from home but would need a satellite connection to keep the laptop wireless. The company would need laptops and mobile phones with wireless technology, as most of the work is on site thus Employees will be out of the office regularly, so having laptops that could receive information from a wireless internet is essential. A new technology WI-FI could satisfy this need. 3G mobile phones could be a good idea as they have video conferencing and a high-speed Internet connection. High-powered computers with 3D rendering software could be a good idea for 3D software

  • Word count: 763
  • Level: AS and A Level
  • Subject: ICT
Access this essay

William H. Gates.

William H. Gates Chairman and Chief Executive Officer Microsoft Corporation William (Bill) H. Gates III is co-founder, chairman and chief executive officer of Microsoft Corporation, the world's leading provider of software for personal computers. Bill Gates was born on October 28, 1955. He and his two sisters grew up in Seattle. Their father, William H. Gates II, is a Seattle attorney. Mary Gates, their late mother, was a schoolteacher, University of Washington regent and chairwoman of United Way International. Gates attended public elementary school before moving on to the private Lakeside School in North Seattle. It was at Lakeside that Gates began his career in personal computer software, programming computers at age 13. In 1973, Gates entered Harvard University as a freshman, where he lived down the hall from Steve Ballmer, who is now Microsoft's president. While at Harvard, Gates developed a version of the programming language BASIC for the first microcomputer - the MITS Altair. BASIC was first developed by John Kemeny and Thomas Kurtz at Dartmouth College in the mid-1960s. In his junior year, Gates dropped out of Harvard to devote his energies full-time to Microsoft, a company he had started in 1975 with his boyhood friend Paul Allen. Guided by a belief that the personal computer would be a valuable tool on every office desktop and in every home, they began

  • Ranking:
  • Word count: 728
  • Level: AS and A Level
  • Subject: ICT
Access this essay

A Day On The Job

A Day On The Job Working for the Jackson Hewitt Help disk is no easy task. It takes hard work and dedication as well as mental stability to complete the daily tasks presented before you. Although not every call is difficult, dealing with some of the franchisees takes a great deal of tolerance. Some of them believe that you as a technician are responsible for every problem that occurs on their system. Most fail to realize that computer problems are inevitable and we are here to help resolve the major issues, which occur as a result of the Jackson Hewitt programs. Being a computer tech is no easy task. You have to be able to envision the problem at hand and resolve it without actually being there. Not a day goes by that does not consist of at least one "why" call. Why did that happen? Why does the programs have errors? It is hard to explain to an "end user that problems occur with all software applications. One thing that helps the day seem to pass faster is the fact that we are like a family here. If someone has a problem, there is always at least one supervisor they can talk to, who can relate to what's going on. If you don't have a sense of humor there is no need to apply with this help desk. The daily routine is to joke around with each other in the same manner brothers and sisters would. Not one person who was lacking "people skills" has lasted at this help

  • Word count: 596
  • Level: AS and A Level
  • Subject: ICT
Access this essay

High-tech crime (computer crime) is the use of technology to commit a crime. It is the biggest tech related threat to the society.

Tariq Ameer #116 ITGS 11-H Sept. 15, 2011 Write a 2-page essay about what is biggest technology related threat to the society. High-tech crime (computer crime) is the use of technology to commit a crime. It is the biggest tech related threat to the society. According to the 2011 Norton Cybercrime Report, in 2010 more than 430 million adults were victimized at a cost of US$388-billion in direct and indirect losses from computer crime world wide. The direct financial losses from cybercrime stood at US$114 billion, while US$274 billion was the value of time that victims spent in solving the crimes [1]. High-tech crimes include identity theft, cyber-stalking, hacking confidential systems, pyramid schemes, planting harmful viruses, and many others. Identity theft is a form of fraud in which someone pretends to be someone else by assuming that person's identity. There are five types of identity theft criminal, financial, medical, child, and identity cloning. Criminal identity theft is when a criminal identifies himself as another person when the police arrest him. Not only does the criminal escape, but also he victim may encounter problems for months and even years because of the incorrect criminal records. Financial identity theft is using another person’s identity credit, goods, and services. Medical Identity theft is using a person’s name or insurance information to

  • Word count: 592
  • Level: AS and A Level
  • Subject: ICT
Access this essay

What are the advantages and disadvantages For B.m.c.s in using a LAN rather than separate P.c's?

What are the advantages and disadvantages For B.m.c.s in using a LAN rather than separate P.c's? There are many advantages and disadvantages to using a Local area network rather than separate p.c's, I my report I aim to identify why schools and other originations use a local area network rather than separate P.c's. A LAN is used in school to connect all pc's to the main server, which then can connect, for example pc 1 to pc 10, No communication lines are needed to create the LAN as cabling is used, the cabling used to connect the pc's are coaxial cables or fibre optic cables. Mainly Coaxial cables are used in one building that won't experience much interference, as they are relatively cheap when compared to the other alternative. Fibre optic cabling is used when the LAN may experience interference such as over a car park or public road. The advantages of using a LAN rather than having separate stand-alone computers in school are that: * There are no expensive telephone bills due to not using telecommunication lines to link the computers together. * Hardware devices such as printers and scanners are shared which saves a large amount of money. * Software only has to be brought once but the school or organisation must hold a licence to run it on more than one computer. This saves a large amount of money as to buy software for each computer in the school would

  • Word count: 564
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Legislation regulating E-Commerce

Data Protection Act 1998 This is the act that deals with the customer details that can be collected or stored on paper and electronically. In e-commerce when the user enters all the personal details such as name, address, telephone number, e-mail address and etc. According to this data protection act, the customer has a right to avoid from sending his/her details to a third party. Computer Misuse Act 1990 This act is a law that works against illegal activities such as: hacking, misuse software's or helping person to get access to someone else's computer. This act prosecutes hacking or attacking a computer with viruses. According to computer misuse act there are three new offences such as: * unauthorised access to computer programs or data * unauthorised access with the intent to commit further offences * unauthorised modification of computer material In an e-commerce website, Computer misuse act can be used to prevent the website getting hacked by hackers. For example when a user gets registered with an e-commerce website such as Amazon where you have to put all the details including the card details. So if someone hacks into the amazons account, he/she can order products and it will add to the customer's account. This can lead to unauthorised crimes. Consumer Credit Act 1974 This is another important act in e-commerce related to payments by the customers and

  • Ranking:
  • Word count: 540
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Benefits of a Network

Benefits of a Network There are two types of networks LAN (local area network). LAN networks on the other hand usually only cover small areas of one to several KM. Although this may seem like a large area it is still considered small or local. WAN (wide area network) networks are characterized by the distance the transverse and the fact that they will always be attached to a common carrier of some type, either the good old AT&T or one of the more that 100 common carriers available in any metropolitan area. These are the networks that you find in schools and offices for example our school network, which is a LAN network covers a large area but is contained on one site. There may be many computers on the network and even several servers but they are always on the one site. The servers serve up information and programs as people working at the network stations request them. It is common to share printers and other output devices, so that saves the organisation money. The software used on the network is also shared. An organisation has to pay a network license fee for the software but this still works out cheaper than buying software for each individual machine. It also allows email, which is the way that much day-to-day communication takes place. But it's not all good. The organisation has to pay technical staff to maintain the network. User accounts need to be added and

  • Word count: 504
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Today piracy is one the of biggest problem in the world

Why pirate a software: Today piracy is one the of biggest problem in the world. It is getting less in very time-consuming way, Original soft ware companies are not trying enough to support more sales by customized coupons, pricing that supply to individual customers, capacity discounts, license options and more. Original soft ware companies are not trying enough to switch more shoppers into buyers first-time visitor special offers, voucher, bundles, and cross-sell messages. Original soft ware companies are not trying to build up customer relationships and develop the business with targeted e-mail promotion. They are not able to increase customer satisfaction by giving the (peace of mind) assurance and a backup which version is obtainable at all times. In most of the poorer countries there is a big problem of there own currency because there currency value is very low it's very hard to for a middle class or poor person to buy legal software. The software which is legal can also provide evidence that it is costly in more than one ways. Users have to pay high price each time they upgrade. The price is very high in poorer nation that's why people buy most of the pirate's software at there. Governments haven't took extreme actions to put an end to illegal copying. People are enthusiastic to low-priced entertainment so they will not pay outside what they already are,

  • Word count: 447
  • Level: AS and A Level
  • Subject: ICT
Access this essay