Data sharing - fundamentals of networks, Computer Networking

Data Sharing

One of the most important uses of networking is to allow the sharing of data. Before networking was common an accounting employee who wanted to prepare a report for his manager, would have to produce it on his PC put it on a floppy disk and then walk it over the manager who would transfer the data to his PC hard disk. True networking allows thousand of employees to share data much more easily and quickly then this. More so it makes possible application that reply on the ability of many people to access and share the same data such as database group software development and much more. Internet and extranet can be used to distribute corporate information between is ties and to business partners.

Posted Date: 3/3/2013 10:41:44 PM | Location : United States







Related Discussions:- Data sharing - fundamentals of networks, Assignment Help, Ask Question on Data sharing - fundamentals of networks, Get Answer, Expert's Help, Data sharing - fundamentals of networks Discussions

Write discussion on Data sharing - fundamentals of networks
Your posts are moderated
Related Questions
FDDI has four specifications: 1. Media Access Control it defines how the medium is accessed 2. Physical Layer Protocol it defines data encoding/decoding procedures 3. Phy

Responses Responses  are sent  from the  server to the client. A responses is a three  digit code that  may be followed by additional textual information.

It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which use

The IP class procedure does not split the 32-bit address space into same size class and the classes do not have the same value of networks. A prefix of n bits gives 2n unique ne

Network Data Storage 1. What is the Small Computer System Interface Architecture 2. Describe the various Fibre Channel standards. 3. What is the difficulties in building

What is Stateful Multi-Layer Inspection (SMLI) They are considered as the third generation of firewall technology and usually combine the facilities of the above two. They are


FIBER MODEMS: LAN methods are discovered to perform within the same building. However most institutions have offices located far apart from one other. DISTANCE LIMITATION A

What is the implication of increasing and decreasing subnet Bits?

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers