Computer Network Essay

1099 words - 5 pages

This study will be based on the study of the e-banking which was extensively studied by various researchers including Bank Bazaar (2012) which argues that banks in lines offer multiple non-transactional features that are very convenient for customers. And also examine the current state of online banking that is to identify its strengths and weaknesses by Murray (2013) and use the results in the formulation of recommendations to contribute to the knowledge in the chosen field. This explanatory research paper uses mixed methods. The results indicate that although infrastructure is advanced compared to some other regional examples, it was still below Western standards. Some important ...view middle of the document...

This research was based on online banking and how people find both walking in a bank and using it over the internet, in the survey research was used from different people such as Murray (2013) and a few more, for the validation of above mentioned topic, a research survey was conducted. 50 people were asked a questionnaire and their results were analysed after proper treatment. The finding was astonish as younger people where more to used online banking than the older age, questions that was ask was as follows
Questionnaire
a. Have you use internet banking before?
b. Do you use an automated teller machine (ATM)?
c. Do you use telephone banking service (for example, balance inquiry, fund transfer between accounts)?
d. Do you have a mobile app for you banking online?
e. Do you use you internet bank to shop on the internet?
f. How often do you use the online banking per day?
g. Do you still visit branches since you started using online banking?

h. 50 people using online banking
i. 30 people also have traditional bank account and 20 doesn’t
j. 40 people using ATM, 10 people doesn’t
k. 30 people using telephone banking service, 20 doesn’t
l. 40 people use mobile App, 10 people doesn’t
m. 30 people using online banking to shop, 20 people doesn’t
n. 30 people still visit the branch, 20 doesn’t
o. The results that were find was similar to the findings in the people I used for this research, but as the years go people are getting comfortable using online banking to do various transactions on the internet such as bank transfer and shopping.
p. Base on all the information that this research of internet banking, it’s have advantages and dis-advantages, but it is used by the wide world to accessed there account online and the freedom of managing their account is becoming a useful business, it can be used on most if not all of the devices that can go online, mobile, tablets etc.
q. That is as individuals become steadily more marginal in their usage of the Internet, then the adverse impact on Internet banking usage flattens out5. This was our expectation when we began the work. It is often the case that the nonlinear impact of continuous variables is of this form with positive and second derivatives oppositely signed. We are also of the belief that this...

Find Another Essay On computer network

The Life Of A Network & Computer Specialist

1821 words - 8 pages Lee JohnstonConnie WongGen 300February 2, 2004The Life of a Network & Computer SpecialistInformation Technology is an exhilarating profession that requires commitment and hard work. A specialist may sit at a desk or out in the field correcting problems. The problems could consist of fixing programs, technical briefs, and an assortment of other assignments. In the beginning, a specialist starts below an analyst. In several years a specialist

Dell Computer: Organization of a Global Production Network

6388 words - 26 pages INTRODUCTIONIn 2001, Dell Computer became the world's largest personal computer vendor, continuing togain market share and post profits in an industry struggling with slumping sales and billions ofdollars in losses. Dell sells 90% of its PCs directly to the final customer, largely bypassing thereseller channel that accounts for most of the world's PC sales. This direct customer relationshipis the key to Dell's business model, and provides

Computer Power and Network Connectivity

1149 words - 5 pages Quick Preview Figures Full Text Footnotes References Authors Cited By Keywords Corrections SECTION I INTRODUCTION With increasing computing power and pervasive network connectivity, we have seen significant proliferation in mobile handset usage and experienced mobile handset becoming more open and general-purpose computing environments [1]. More and more applications and services have been applied on

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages other's files and see how far they can penetrate into a system. It is pure enjoyment for these hackers to explore a new computer network. It becomes a challenge to gain access to strange, new networks. They often argue that they are only curious and cause no harm by merely exploring, but that is not always the case.Where did my homework files go? Who is making charges to my credit card? Sounds like someone is out for revenge. Computer have become

Acceptable Use Policy (AUP) and Security Audit

863 words - 4 pages Acceptable Use Policy (AUP) and Security Audit In the computing world, the Acceptable Use Policy (AUP) refers to the set of rules that are applied by the manager of a particular computer network or website that helps to restrict the ways in which the website or network can be used (Ciampa, 2012). The AUP documents are normally written for the service providers in order to help reduce any potential legal action taken by a user subscribing to

Network Design

1566 words - 6 pages Network Design Network Design is very important when it comes to implementing a connection between a computer and a server. According to Network world Websites, Network is defined as a “connected collection or devices and end systems, such as computers and servers, that can communicate with each other”(McQuerry). Network carry data in many types of environment, such as homes, small businesses, and large enterprises. Network

Network Administrator

1025 words - 4 pages I have decided to pursue the career of a network system administrator or IT professional. Over the last ten years or so computers have become fundamental parts of everyday life, used for a variety of reasons at home, in the workplace, and at schools. Of course every computer user runs into obstacles from time to time, whether it is the blue screen of death, the forgotten password, or the loss of important data. The explosive use of computers has

Network on different floors

982 words - 4 pages Ground Floor: Customer Service and Marketing Department There are a total of 20 workstations. There are two network printers accessible by all workstations. The Internet is accessible by all workstations. Visitors should be able to access to the wireless internet access, wifi. The network topology best suited for the ground floor is the star topology. A star topology is one where by each work station or computer peripheral are centrally

Overview of Network Security

1050 words - 4 pages Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to

Discovering Computer Networks Today

1964 words - 8 pages techniques for connecting computers and this was the beginning of computer networks. Soon the importance of networks was realized in business organizations and today almost every organization in the world has its own computer network. Educational institutions are also following suit because networking provides a method for effective management and can also help in improving the knowledge of students. Computer networks are becoming the main source of

Computer Networking Security

933 words - 4 pages that the ordinary, average user faces can easily be resolved through basic “home remedies” that technical savvy computer professionals use. Everyone can be a computer networking genius with some basic training. There are several computer networking problems that the most basic user usually has on a regular basis. These range from phishing, viruses, data loss, bad or no security passcodes, disconnection from the network, and operational startup

Similar Essays

Computer Network Management Essay

1391 words - 6 pages The Basics of Network Management In the computer world, networks are the primary means of inter-computer communications. The building and maintenance of a network is the responsibility of the network manager. The network manager must have the expertise to design and implement an appropriate network for his client. The proper design of a network is based on more than a few principles. However, the job of the network manager encompasses

Securing The Computer Network Essay

1251 words - 5 pages going through any sort of electronic device they are passing through some type of communications network. Whether the information is traveling around the world or just across the room to another computer this information is at risk. Safeguards must be implemented to the computers and networks that they use to protect them from viruses, intruders, and system failures. “A computer security risk is any event or action that could cause a loss of or

Characteristics Of Computer Network Media Essay

1519 words - 6 pages Characteristics of Computer Network Media With the emergence of the Ethernet LAN (Local Area Network) introduced in the early 1970s by Xerox, the telecommunications world has welcomed this newfound gift with open arms. Since communications is such a vital aspect of all businesses these days, proper acquaintance with this marvelous technology can greatly enhance your company's productivity and efficiency. In this paper, we will reflect

Bead Bar: Computer Network Design: Network Topology And Architecture

1543 words - 6 pages Bead Bar: Computer Network DesignIntroductionThis essay will outline recommendations for the development of a high-level computer network design for the Bead Bar. The Bead Bar is a company that lets customers create their own bead jewelry. Customers sit at a bar to create their own necklaces, bracelets, and other custom jewelry. Bead Bar has three divisions which consist of:1.Studios2.Franchises3.Bead Bar on BoardThe Studio division keeps track