SlideShare a Scribd company logo
COMPUTER NETWORK
THE BENEFITS AND DISADVANTAGE OF COMPUTER NETWORK
WHAT IS A COMPUTER NETWORK?
• A network is a group of computers (or a group of smaller networks) that are
connected to each other by various means, so that they may communicate with
each other. The internet is the largest network in the world.
WHAT ARE THE BENEFITS OF COMPUTER
NETWORK?
1. Hardware resource sharing
Networks are able to share one resource, such as a printer, for
numerous computers. This allows many individual computers to access a
single network resource. This saves money and space for the organization
2. Data sharing
Once networks were setup, people found that the next best thing
was the ability to easily share documents. The type of server that stores files
is called a file server. Data can be in the form of text, images, numbers or
characters
WHAT ARE THE BENEFITS OF COMPUTER
NETWORK?
3. Enhance communication
People in distant place can communicate in real time. Gone of the days of snail
mail, where your message can take days before it reaches the receiver. With email
and chat , communication can be done in a flash.
4. Work better
Many organizations use networks for many purposes such as making
schedule for colleagues, pick up days for meetings (when everybody will be able to
attend) and provide useful online connections for network-linked employees.
Employees can communicate on a network with other employees through email.
WHAT ARE THE BENEFITS OF COMPUTER
NETWORK?
5. Shared Programs
Server or Network based programs are programs that are loaded onto an
online server or network as opposed to directly onto the individual computers. This
program can therefor be accessed by any computer possessing the correct amount
of bandwidth and system specifications. In short it uses the server as an application
server.
6. It boost storage capacity
Increasing storage capacity - you can access files and multimedia, such as
images and music, which you store remotely on other machines or network-
attached storage devices.
DOES COMPUTER NETWORK HAVE A
DISADVANTAGE?
1. Security threat
With the large number of people that connects to the network, there is a high
possibility that an illegal activity may occur such as; data piracy, hacking, illegal sharing
of resources etc.
2. Lack of Robustness
If the main server of the network will breakdown , the entire system would be
useless. People can’t connect and access network resource if the system will be down.
3. Virus and Malwares
Virus and malwares were shared in the network. Those network with weak
security is an easy target for malwares and virus that will spread in your network to hack
information , or just to bring down the system.
DOES COMPUTER NETWORK HAVE A
DISADVANTAGE?
4. Undesirable behavior
It has been observed that providing users with internet connectivity has fostered undesirable
behavior among them. Considering that the web is a minefield of distractions—online games,
humor sites and even porn sites—workers could be tempted during their work hours. The huge
network of machines could also encourage them to engage in illicit practices, such as instant
messaging and file sharing, instead of working on work-related matters. While many organizations
draw up certain policies on this, they have proven difficult to enforce and even engendered
resentment from employees.
5. Requires highly technical skills
For a computer network to work efficiently and optimally, it requires high technical skills and
know-how of its operations and administration. A person just having basic skills cannot do this job.
Take note that the responsibility to handle such a system is high, as allotting permissions and
passwords can be daunting. Similarly, network configuration and connection is very tedious and
cannot be done by an average technician who does not have advanced knowledge.
CONCLUSION
Computer network offers a lot from increase productivity in the workplace, instant
communication and recreation in any form etc., but let us bear in mind that there
are people who used it negatively to gain something or to disrupt production.
ASSIGNMENT
Direction:
Submit a document containing a picture of You utilizing computer network and it’s
advantage. Include a 2-paragraph discussion depicting the impact of network to
your life. Submit your work to my email amoso@mlgcl.edu.ph on January 27, 2021

More Related Content

What's hot

Internet basics
Internet basicsInternet basics
Internet basicsosuchin
 
Internet technology and web engineering
Internet technology and web engineeringInternet technology and web engineering
Internet technology and web engineering
Professor Lili Saghafi
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
niniogolo
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
jatin batra
 
File Sharing
File SharingFile Sharing
File Sharing
Abhishek Tiwari
 
Int 2 networks 2010
Int 2 networks 2010Int 2 networks 2010
Int 2 networks 2010iarthur
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
Jason Roy
 
internet ,
internet ,internet ,
internet ,
chetan handa
 
All about email
All about emailAll about email
All about emailestefana4
 
Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmato
Stefano Penge
 
Intro To Internet
Intro To InternetIntro To Internet
Intro To Internet
Christian County Library
 
Basic Internet Concepts
Basic Internet ConceptsBasic Internet Concepts
Basic Internet ConceptsKiran Budhrani
 
Internet basics
Internet basicsInternet basics
Internet basics
cetrosoft
 

What's hot (20)

G(1)
G(1)G(1)
G(1)
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Internet technology and web engineering
Internet technology and web engineeringInternet technology and web engineering
Internet technology and web engineering
 
Mohamme d hamed
Mohamme d hamedMohamme d hamed
Mohamme d hamed
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
Ali abdullah
Ali abdullahAli abdullah
Ali abdullah
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
File Sharing
File SharingFile Sharing
File Sharing
 
Int 2 networks 2010
Int 2 networks 2010Int 2 networks 2010
Int 2 networks 2010
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
 
internet ,
internet ,internet ,
internet ,
 
All about email
All about emailAll about email
All about email
 
All about email
All about emailAll about email
All about email
 
Mayed
MayedMayed
Mayed
 
Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmato
 
Intro To Internet
Intro To InternetIntro To Internet
Intro To Internet
 
Basic Internet Concepts
Basic Internet ConceptsBasic Internet Concepts
Basic Internet Concepts
 
Internet Technology Basics
Internet Technology BasicsInternet Technology Basics
Internet Technology Basics
 
It ( role of it)
It ( role of it)It ( role of it)
It ( role of it)
 
Internet basics
Internet basicsInternet basics
Internet basics
 

Similar to Computer network introduction

Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
LIKHIT16
 
Computer networking
Computer networkingComputer networking
Computer networkingjlunceford12
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
Alithea Barbosa
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
AnneilynLeal
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Networking and internet
Networking and internetNetworking and internet
Networking and internet
Dr. Priyamvada Saarsar
 
Computer network
Computer networkComputer network
Computer network
toobasharif
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentation
Gambari Amosa Isiaka
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
Jyoti Kumari
 
Unit I Networking.pptx
Unit I Networking.pptxUnit I Networking.pptx
Unit I Networking.pptx
Ujwala Junghare
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
shubhangisonawane6
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORK
imtiazalijoono
 
What is a network
What is a networkWhat is a network
What is a network
Rowan Nave
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
Write My Thesis Paper Thornton
 
networking concepts
networking conceptsnetworking concepts
networking concepts
mtguillermo
 
4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321) 4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321)
ghayour abbas
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
Imoh Etuk
 

Similar to Computer network introduction (20)

Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Networking and internet
Networking and internetNetworking and internet
Networking and internet
 
Computer network
Computer networkComputer network
Computer network
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentation
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
Unit I Networking.pptx
Unit I Networking.pptxUnit I Networking.pptx
Unit I Networking.pptx
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORK
 
What is a network
What is a networkWhat is a network
What is a network
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
 
networking concepts
networking conceptsnetworking concepts
networking concepts
 
4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321) 4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321)
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
 

More from MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Computer network introduction

  • 1. COMPUTER NETWORK THE BENEFITS AND DISADVANTAGE OF COMPUTER NETWORK
  • 2. WHAT IS A COMPUTER NETWORK? • A network is a group of computers (or a group of smaller networks) that are connected to each other by various means, so that they may communicate with each other. The internet is the largest network in the world.
  • 3. WHAT ARE THE BENEFITS OF COMPUTER NETWORK? 1. Hardware resource sharing Networks are able to share one resource, such as a printer, for numerous computers. This allows many individual computers to access a single network resource. This saves money and space for the organization 2. Data sharing Once networks were setup, people found that the next best thing was the ability to easily share documents. The type of server that stores files is called a file server. Data can be in the form of text, images, numbers or characters
  • 4. WHAT ARE THE BENEFITS OF COMPUTER NETWORK? 3. Enhance communication People in distant place can communicate in real time. Gone of the days of snail mail, where your message can take days before it reaches the receiver. With email and chat , communication can be done in a flash. 4. Work better Many organizations use networks for many purposes such as making schedule for colleagues, pick up days for meetings (when everybody will be able to attend) and provide useful online connections for network-linked employees. Employees can communicate on a network with other employees through email.
  • 5. WHAT ARE THE BENEFITS OF COMPUTER NETWORK? 5. Shared Programs Server or Network based programs are programs that are loaded onto an online server or network as opposed to directly onto the individual computers. This program can therefor be accessed by any computer possessing the correct amount of bandwidth and system specifications. In short it uses the server as an application server. 6. It boost storage capacity Increasing storage capacity - you can access files and multimedia, such as images and music, which you store remotely on other machines or network- attached storage devices.
  • 6. DOES COMPUTER NETWORK HAVE A DISADVANTAGE? 1. Security threat With the large number of people that connects to the network, there is a high possibility that an illegal activity may occur such as; data piracy, hacking, illegal sharing of resources etc. 2. Lack of Robustness If the main server of the network will breakdown , the entire system would be useless. People can’t connect and access network resource if the system will be down. 3. Virus and Malwares Virus and malwares were shared in the network. Those network with weak security is an easy target for malwares and virus that will spread in your network to hack information , or just to bring down the system.
  • 7. DOES COMPUTER NETWORK HAVE A DISADVANTAGE? 4. Undesirable behavior It has been observed that providing users with internet connectivity has fostered undesirable behavior among them. Considering that the web is a minefield of distractions—online games, humor sites and even porn sites—workers could be tempted during their work hours. The huge network of machines could also encourage them to engage in illicit practices, such as instant messaging and file sharing, instead of working on work-related matters. While many organizations draw up certain policies on this, they have proven difficult to enforce and even engendered resentment from employees. 5. Requires highly technical skills For a computer network to work efficiently and optimally, it requires high technical skills and know-how of its operations and administration. A person just having basic skills cannot do this job. Take note that the responsibility to handle such a system is high, as allotting permissions and passwords can be daunting. Similarly, network configuration and connection is very tedious and cannot be done by an average technician who does not have advanced knowledge.
  • 8. CONCLUSION Computer network offers a lot from increase productivity in the workplace, instant communication and recreation in any form etc., but let us bear in mind that there are people who used it negatively to gain something or to disrupt production.
  • 9. ASSIGNMENT Direction: Submit a document containing a picture of You utilizing computer network and it’s advantage. Include a 2-paragraph discussion depicting the impact of network to your life. Submit your work to my email amoso@mlgcl.edu.ph on January 27, 2021