Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Primary source papers
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Primary source papers
Table of contents:
Aims: 2
Methodology: 3
Findings 4
Internet Security and Confidentiality: 4
User authentication: 4
Anti-virus protection: 4
Encryption: 5
Fire walls: 5
The range of service offered by ISPs: 6
The cost of the different packages: 6
Functionality: 6
Capacity: 6
Internet Connection and Access Methods: 7
Three broadband packages: 9
Vodafone simply broadband: 10
Unlimited 70Mb & Talk (Anytime) 10
Recommendation: 11
Conclusion: 12
Bibliography: 13
Aims:
My aims are to require my evidence that will show me to understand of broad range of my learning outcomes in my project brief.
I will have to show the use of the software browser package. I will do my research using search engines to find out about:
• Security and confidentiality on the Internet
• Range of services are offered by ISPs
• Methods of the Internet connection for home and business users
• Based on my analysis of the findings, I will recommend the methods of connecting to Internet.
I will produce a report of the findings including the details of my Methodology, findings and URLs of websites used in the bibliography.
Methodology:
For this research, I used primary and secondary sources to carry out my report for this information.
Then I asked used primary sources to ask people, shops about the broadband packages, in the meanwhile, when I was asking about broadband packages, I used secondary sources to look up more website on broadband packages.
My secondary research was some websites on where I got my information, also I listed the websites.
The internet can sometimes be wrong, so don’t believe in everything, but most of the time the internet is the best method of researching but you will have to be careful wit...
... middle of paper ...
...et/contents/713-isp-internet-service-providers [Accessed: 9 Mar 2014].
Makeitsecure.org. 2014. makeITsecure. [online] Available at: http://www.makeitsecure.org/en/index.html [Accessed: 18 Mar 2014].
Makeitsecure.org. 2014. Top Tips - Make IT Secure. [online] Available at: http://www.makeitsecure.org/en/top-tips.html [Accessed: 13 Mar 2014].
Uswitch.ie. 2014. Compare Broadband Packages - Broadband Package Comparison - uSwitch.ie. [online] Available at: http://www.uswitch.ie/broadband/packages/ [Accessed: 2 Mar 2014].
Wikipedia. 2014. Firewall (computing). [online] Available at: http://en.wikipedia.org/wiki/Firewall_(computing) [Accessed: 20 Mar 2014].
windows.microsoft.com. 2014. What is encryption? - Microsoft Windows Help. [online] Available at: http://windows.microsoft.com/en-ie/windows/what-is-encryption#1TC=windows-7 [Accessed: 18 Mar2014].
In order to complete this assignments I need to gather as much information as I can from different sources, such as course notes, internet and a Newspaper.
Secondary sources of literature are primarily written by journalists and does not report an original finding, but rather relies on an original source to provide information that can be used as background material. To use it correctly, one must first distinguish it from primary sources and understand that secondary sources alone cannot sufficiently and
To collect my information I used a variety of sources and methods. These consisted of:
The information for this report was gathered from several Web sites and the main points of this report are discussed as follows:
The Methodology used to gather information for this paper was found through various sources. The sources used are all verifiable and established informational resources including (but not limited to) the following; course textbooks, books, journals, and online databases.
Fiber-optic wiring provides the fastest connection times, and high speed capabilities, this is also known as broadband technology. Broadband technology is not available in all areas. It is mostly centralized to high-income, and business areas that are capable of paying higher costs for the advanced technology. Rural and lower-income areas are not receiving these same capabilities as o...
In a couple of sentences, explain the significance of this source and why it should be included in your research.
If you want to discuss any of the content from the report please contact me.
I started my research by looking for information that would
Now that we are living in an ever changing world, technology is viewed as the most resourceful tool in keeping up with the pace. Without the use of technology, communication would be limited to using mail for delivery and encyclopedias for research. Although technology has improved the way we communicate and find information for research, the information is not always valid. Unfortunately, for those of us who use the internet for shopping, research, or reading articles of personal interest the information is not treated the same as a your magazine or book. While such literature is reviewed by an editorial staff, internet literature or information can be published by anyone. In order to reap the full benefit of having the use of technology for any purpose, there are five basic criteria’s one must keep in mind as an evaluating tool for deciding whether or not the particular website is a reliable source for information.
Neville, Anne. "Working to Provide a Better National Broadband Map." NTIA Blog. National Telecommunications and Information Administration, 20 Feb 2014. Web. 25 Feb. 2014. .
As the popularity of the Internet continues to grow at an exponential rate, easy and affordable access is quickly becoming a necessity of life.
In this new era of the Internet, most people use the Internet to acquire information of one kind or other. But what these people are not aware of is that the Internet is collecting information about them. Every time we get onto the Internet there might be a compromise of privacy of our personal information. The information flows both ways. With every clock of the mouse on a hyperlink, or an addition to the mailing list, someone out there might be gathering information about us. This raises the seriousness of privacy of our information on the Internet.
During my investigation, I found a multitude of sources. I chose to use four of them because they will help me best in explaining my own thoughts. I found a couple of interesting articles on the internet, and these sources were generally
Currency Fluctuation, What is Currency Fluctuation, 2014. Available at: http://www.wisegeek.org/what-are-currency-fluctuations.htm Retrieved at 6th April 2014