This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Yoga

Computer Network

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Computer Network

       A computer network is a set of interconnected that transmits, receive, and exchange data and also video traffic. Some of the computer nodes include modem or servers, and they help endpoint users to share resources and communicate. They are found in offices, homes, and government administration.

Types of Computer networks

LAN (Local Area Network)

Local Area Network is a group of computers connected in a small area such as building; office.LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable, etc. It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and Ethernet cables. The data is transferred at an incredibly faster rate in the Local Area Network. Local Area Network provides higher security.

PAN (Personal Area Network)

Personal Area Network is a network arranged within a person, typically within a range of 10 meters. Personal Area Network is used for connecting the computer devices of personal use is known as Personal Area Network. Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area Network. Personal Area Network covers an area of 30 feet. Personal computer devices that are used to develop the private area network are the laptop, mobile phones, media player, and play stations. An example of a Personal Area Network is wired personal area network that is developed by using technologies such as Wi-Fi or Bluetooth.

WAN (Wide Area Network)

A Wide Area Network is a network that extends over a large geographical area such as states or countries. A Wide Area Network is quite a bigger network than the LAN. A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fiber optic cable, or satellite links. The internet is one of the biggest WAN in the world. A Wide Area Network is widely used in the field of Business, government, and education. An example of WAN includes Mobile Broadband, which is a 4G network that is widely used across a region or country.

Types of Computer viruses

Computer virus

         Computer viruses are among the common types of infections around. Computer viruses are pieces of software intended to be spread from one computer to another and are often attached to emails or can be downloaded from various websites. Viruses are known to send spam, disable your security settings, corrupt and steal data from your computer, including personal information such as passwords.

Rogue security software

Rogue malicious software that misleads users to believe there is a computer virus installed on their computer or that their security measures are not up to date. Then they offer to install or update users’ security settings. They’ll either ask you to download their program to remove the alleged viruses, or to pay for a tool. Both cases lead to actual malware being installed on your computer.

Trojan horse

“Trojan,” is a malicious bit of attacking code or software that tricks users into running it willingly, by hiding behind a legitimate program. They are usually spread through emails or clicks on a false advertisement. Once on your computer, they steal essential information.

Computer worm

Computer worms are pieces of malware programs that replicate quickly and spread from one computer to another. The infection spreads from an infected computer by sending itself to all of the computer’s contacts, then immediately to the connections of the other machines.

Rootkit

A rootkit is a collection of software tools that enables remote control and administration-level access over a computer or computer network. Once remote access is obtained, the rootkit can perform several malicious actions; they come equipped with keyloggers, password stealers, and antivirus disablers.

 

 

 

Reference

Top 10 Common Network Security Threats Explained(2018) Retrieved from

https://securitytrails.com/blog/top-10-common-network-security-threats-explained

Two Types of Networks: LANs and WANs (2012) Retrieved from

Two Types of Networks: LANs and WANs

 

Computer Network Types Retrieved from

https://www.javatpoint.com/types-of-computer-network

 

 

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask