• Information and Resource Sharing - Computer networks allow organizations having units which are placed apart from each other, to share information in a very effective manner. Programs and software in any computer can be accessed by other computers linked to the network. It also allows sharing of hardware equipment, like printers and scanners among varied users.
• Retrieving Remote Information - Through computer networks, users can retrieve remote information on a variety of topics. The information is stored in remote databases to which the user gains access through information systems like the World Wide Web.
• Speedy Interpersonal Communication - Computer networks have increased the speed and volume of communication like never before. Electronic Mail (email) is extensively used for sending texts, documents, images, and videos across the globe. Online communications have increased by manifold times through social networking services.
• E-Commerce - Computer networks have paved way for a variety of business and commercial transactions online, popularly called e-commerce. Users and organizations can pool funds, buy or sell items, pay bills, manage bank accounts, pay taxes, transfer funds and handle investments electronically.
• Highly Reliable Systems - Computer networks allow systems to be distributed in nature, by the virtue of which data is stored in multiple sources. This makes the system highly reliable. If a failure occurs in one source, then the system will still continue to function and data will still be available from the other sources.
• Cost–Effective Systems - Computer networks have reduced the cost of establishment of computer systems in organizations. Previously, it was imperative for organizations to set up expensive mainframes for computation and storage. With the advent of networks, it is sufficient to set up interconnected personal computers (PCs) for the same purpose.
• VoIP - VoIP or Voice over Internet protocol has revolutionized telecommunication systems. Through this, telephone calls are made digitally using Internet Protocols instead of the regular analog phone lines.
Titany answered the question on November 30, 2021 at 11:51
- Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection(Solved)
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
Date posted: November 30, 2021. Answers (1)
- Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology(Solved)
Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology
Date posted: November 30, 2021. Answers (1)
- Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays(Solved)
Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays
Date posted: November 30, 2021. Answers (1)
- Outline two weaknesses of CSMA/CD(Solved)
Outline two weaknesses of CSMA/CD
Date posted: November 30, 2021. Answers (1)
- User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP(Solved)
User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP
Date posted: November 30, 2021. Answers (1)
- Explain three functions of a data link layer in OSI reference model(Solved)
Explain three functions of a data link layer in OSI reference model
Date posted: November 30, 2021. Answers (1)
- Difference between broadcast and collision domains as used in data transmission(Solved)
Difference between broadcast and collision domains as used in data transmission
Date posted: November 30, 2021. Answers (1)
- Routing information protocol (RIP) is contemporary routing protocol. Explain features of this protocol that influence its adoption(Solved)
Routing information protocol (RIP) is contemporary routing protocol. Explain features of this protocol that influence its adoption
Date posted: November 30, 2021. Answers (1)
- Differentiate between pre-shared key and digital signature
(Solved)
Differentiate between pre-shared key and digital signature
Date posted: November 30, 2021. Answers (1)
- Explain uses of internet in business firms(Solved)
Explain uses of internet in business firms
Date posted: November 30, 2021. Answers (1)
- TCP/IP protocol is widely used in networks due to its strengths. Explain three of these strengths to justify the statement(Solved)
TCP/IP protocol is widely used in networks due to its strengths. Explain three of these strengths to justify the statement
Date posted: November 30, 2021. Answers (1)
- ) Copper cables are prone to cross talk. Explain two measures that could be used to mitigate this impairment(Solved)
) Copper cables are prone to cross talk. Explain two measures that could be used to mitigate this impairment
Date posted: November 30, 2021. Answers (1)
- Dina investigated the disadvantages of time-division multiplexing (TDM) in circuit data connection. Explain two disadvantages that she could have established(Solved)
Dina investigated the disadvantages of time-division multiplexing (TDM) in circuit data connection. Explain two disadvantages that she could have established
Date posted: November 30, 2021. Answers (1)
- Distinguish between multicast and broadcast IP addresses(Solved)
Distinguish between multicast and broadcast IP addresses
Date posted: November 30, 2021. Answers (1)
- Outline two parts of to a point point protocol (PPP)(Solved)
Outline two parts of to a point point protocol (PPP)
Date posted: November 30, 2021. Answers (1)
- Explain two characteristics of a Storage Area Network(Solved)
Explain two characteristics of a Storage Area Network
Date posted: November 30, 2021. Answers (1)
- Access Points (AP) are critical in wireless networks. Describe two types of AP that are likely to be used(Solved)
Access Points (AP) are critical in wireless networks. Describe two types of AP that are likely to be used
Date posted: November 30, 2021. Answers (1)
- Computer networks are vulnerable to various types of physical threats. Outline four types of these threats(Solved)
Computer networks are vulnerable to various types of physical threats. Outline four types of these threats
Date posted: November 30, 2021. Answers (1)
- Rene was required to select a network operating system (NOS) for his company’s network. Explain two categories of NOS that he could make his choice(Solved)
Rene was required to select a network operating system (NOS) for his company’s network. Explain two categories of NOS that he could make his choice
Date posted: November 30, 2021. Answers (1)
- Explain the following terms as used in the internet
i) add on
ii)URL
(Solved)
Explain the following terms as used in the internet
i) add on
ii)URL
Date posted: November 30, 2021. Answers (1)