A Reflection On The Data Communications Class Discussions And Readings (Other (Not Listed) Sample)
The task was to write a reflection on the data communications class discussions and readings.source..
Data Communications Reflection
As the computer network security advances and reaches a point that has never been reached in history, so do computer networks become more vulnerable than they have ever been. Network and operating system security has come a long way since computers were first introduced. Today, there are more users of the computer, and computer systems have had to support many simultaneous users. The security of computer systems has had to become more complex so that users can be protected from one another. After having gone through the reading assignments, I have chosen the three concepts that interested me the most to be the subject of my refection. These are auditing, system development life cycle, and network modelling.
Auditing is a very important process in data communication in that it can help to deter crime ad to apprehend the criminal after having committed a crime. This, it does through a software program whose work is to monitor every transaction within a system. This concept relates to data communication in that it monitors transactions and records them according to the time when they occurred. Inappropriate transactions have their data scanned and their information retrieved. The best thing about auditing is that there are several computer programs that are available which are good enough to be able to audit all the transactions occurring on the computer system. In addition, there is no waste of money in auditing because if it helps to catch a criminal and prevent crime, the cost of installing it is nothing co
- Data Curation at Scale: the Data Tamer SystemDescription: This was a review of a research paper that i had to write for a masters student. This was a academic assignment that i completed in past...1 page/≈550 words| APA | Technology | Other (Not Listed) |
- Research and Describe Drones Operated By Onboard ComputersDescription: Drones are operated either remotely by humans or are either completely automated hence are operated by onboard computers....4 pages/≈1100 words| 4 Sources | APA | Technology | Other (Not Listed) |
- A Reflection On The Data Communications Class Discussions And ReadingsDescription: As the computer network security advances and reaches a point that has never been reached in history, so do computer networks become more vulnerable than they have ever been...2 pages/≈550 words| No Sources | APA | Technology | Other (Not Listed) |