Sign In
Not register? Register Now!
Essay Available:
You are here: HomeOther (Not Listed)Technology
Pages:
2 pages/≈550 words
Sources:
No Sources
Level:
APA
Subject:
Technology
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

A Reflection On The Data Communications Class Discussions And Readings (Other (Not Listed) Sample)

Instructions:

The task was to write a reflection on the data communications class discussions and readings.

source..
Content:


Data Communications Reflection
Name
Institution
Professor
Course
Date
As the computer network security advances and reaches a point that has never been reached in history, so do computer networks become more vulnerable than they have ever been. Network and operating system security has come a long way since computers were first introduced. Today, there are more users of the computer, and computer systems have had to support many simultaneous users. The security of computer systems has had to become more complex so that users can be protected from one another. After having gone through the reading assignments, I have chosen the three concepts that interested me the most to be the subject of my refection. These are auditing, system development life cycle, and network modelling.
Auditing is a very important process in data communication in that it can help to deter crime ad to apprehend the criminal after having committed a crime. This, it does through a software program whose work is to monitor every transaction within a system. This concept relates to data communication in that it monitors transactions and records them according to the time when they occurred. Inappropriate transactions have their data scanned and their information retrieved. The best thing about auditing is that there are several computer programs that are available which are good enough to be able to audit all the transactions occurring on the computer system. In addition, there is no waste of money in auditing because if it helps to catch a criminal and prevent crime, the cost of installing it is nothing co

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • A Reflection On The Data Communications Class Discussions And Readings
    Description: As the computer network security advances and reaches a point that has never been reached in history, so do computer networks become more vulnerable than they have ever been...
    2 pages/≈550 words| No Sources | APA | Technology | Other (Not Listed) |
  • How Internet Helped The Victims Find Shelter During Superstorm
    Description: The New York City was adversely affected by the super storm Sandy in 2012. The technology was sensibly used in the situation where the victims were left homeless....
    2 pages/≈550 words| 2 Sources | APA | Technology | Other (Not Listed) |
  • Programming Haskell Functions
    Description: The assignment is all about Haskell GHCI Function Programming, evaluating different question on Haskell GHCI Function Programming....
    6 pages/≈1650 words| APA | Technology | Other (Not Listed) |
Need a Custom Essay Written?
First time 15% Discount!