1.) 1994; Vincent, J . 2008; Kozík,T and

Explain Netiquette

Definition – the new rules of etiquette have
been stabilised into a term NETIQUETTE. The word netiquette was created by
combining words NET and ETIKETA (a set of rules of social behaviour and
habits). Netiquette constitutes the rules of the behaviour of users on a
network. Although the netiquette is merely “an unwritten set of
rules”, people not using it can be understood as a type of disrespect. (Kozík,T and Slivová,J. , 2014)

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Three rules of Netiquette

One can research a topic before
asking a question to an expert or correct a work before posting use spell check
and check grammar through correctness and care with
both your language form. (Vincent, J , 2008)  Etc, proofread and check for errors always
spell check your email, proofread for errors, capitalize your sentences, and
use appropriate punctuation and grammar. (Kallos, J. 2004)


Knowing more than others, or
having more power than they do, does not give you the right to take advantage
of them. For example, sysadmins should never read private email etc, system
administrators should not abuse their power by taking advantage of it. (Shea, V. 1994; Vincent, J . 2008; Kozík,T and Slivová,J. , 2014 )




a newbie sometime, so if you feel that you must point out an error to someone,
do so politely (Shea, V. 1994; Vincent, J . 2008; Kozík,T and
Slivová,J. , 2014 )


Describe two types of Internet
Access Providers

ISP- Internet Service Provider which first began to emerge
in the late 1980s and early 1990s, these providers connect customers to
customers of other service providers by way of networks (xfinity, 2017) connect
end-users and businesses to the public Internet. They compete on price,
performance, reliability, etc. but they also must cooperate with each other to
provide global connectivity to all other attachments on the Internet. (Norton, B,
W. 2001)


WIP- Wireless Internet service provider is an Internet service provider with a network based on wireless networking.
Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment
designed to operate over open 900 MHz,
2.4 GHz,
4.9, 5, 24, and 60 GHz bands or licensed frequencies in the UHF band, LMDS, and other bands from 6Ghz to 80Ghz. (Shelly, G,
B. 2008)

3.)    Explain
the purpose of a Website

The main purpose of a Website: Different kinds of
websites have different purposes depending on who the intended audience is. Respondents
in our survey selected two purposes well above the rest: to provide information
to current and potential clients (30%) and to promote and market the
organization (27%). These two purposes accounted for more than the rest
combined (see Graph 9). What this tells us is that the Web is considered primarily
a means of communication, first to inform and second to promote. (Bauer, M.

4.)    Suggestion
of a browser with justifications

Uber may
consider the following recommendations to improve the security, time management
and storage to their organization.


Cloud Storage

cloud software product which provides features common in larger public StaaS
products while being a freely available software package is ownCloud, which has
seen rapid development and is now one of the major open source StaaS products.
For example, Google Trends shows a significant rise in popularity for the search term “own-cloud” in the last two years (Martini, B and Choo,
K, K, Y. 2013).


The severity
of vulnerabilities. By sandboxing their rendering
engine, browsers can reduce the severity of vulnerabilities. Sandboxes limit
the damage that can be caused by an attacker who exploits a vulnerability in
the rendering engine.

The window
of vulnerability. Browsers can reduce this window by
improving the user experience for installing browser updates, thus minimizing
the number of users running old versions that lack security patches.

frequency of exposure. By warning
users before they visit known malicious sites, browsers can reduce the
frequency with which users interact with malicious content.  (Reis, C and Barth, A and Pizanol, C. 2009)


I'm Simon!

Would you like to get a custom essay? How about receiving a customized one?

Check it out