All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Current Events in Computer Networking, Article Review Example

Pages: 3

Words: 932

Article Review

Sharing Digital Micrographs and Other Data Files between Computers

The rapid development of the computer networking solutions facilitates the transfer of data and images between computers. Unfortunately, the overall process of moving data files from one computer to another is not so simple. The use of data and information carriers like DVDs and flash memory cards is not always the best solution to the data transfer issues. In his article, Entwistle recommends that, when possible, computer networks be used to exchange data. The author discusses the major advantages and disadvantages of various data transfer routes and emphasizes the importance of computer networking for effective information exchange.

Entwistle asserts that moving data files between computers is easy: when computers are in close proximity to one another, the use of local networks seems the best way to transfer data between them (111). However, the incompatibility of Microsoft Windows and Apple operation systems makes it difficult for non-professionals to set up networks that allow transferring uncompressed image files between computers (Entwistle 111). Certainly, individuals can readily use disks and data cards to transfer their images from one computer to another; however, disks and data cards have limited information capacity (Entwistle 113). Moreover, when used for multiple data recording, CDs and DVDs make it difficult for users who have older computers to read the results (Entwistle 113). In this situation, computer networking seems the best way for users to share multiple data files and images with other users.

Here, the use of local networks, wide area networks and FTPs provide users with unique data sharing opportunities. Entwistle believes that FTP is the most efficient way of moving data from one computer to another (116). However, to use an FTP, users and their computers must meet a number of conditions: both the donor and the recipient computer must have a relatively fast network link; the donor computer must be under the FTP Server control or be an FTP server; the exchange process must not comprise the security of any computer in the FTP network; and the recipient computer must have an FTP browser (Entwistle 116). This information can be readily used by non-professionals and computer networking experts, who seek to design efficient data exchange networks. The current pace of technological development can easily leave FTP networks behind more advanced networking solutions. Yet, FTPs are still among the most productive approaches to data transfer. Modern experts must be prepared to deal with numerous technical and data transfer challenges, including the problems that are traditionally associated with the incompatibility of various operation systems.

Ethics and the Internet: Appropriate Behavior in Electronic Communication

That computer networking is associated with a variety of ethical issues is difficult to deny. Actually, the current pace of technological advancement makes it more and more difficult for computer experts to meet even the basic ethical norms and standards. The Internet and computer networking are the sources of the major ethical challenges, because individuals and businesses that are linked by means of computer networks have an opportunity to access small and large databases and sources of information. Langford is correct in that the Internet is a fully functioning anarchy, because Internet users are much against any form of external control (92). The Internet is believed to be the area of unlimited information freedom and a medium of anonymous information exchange; as a result, technical abuse and personal ethical dilemmas have become the distinctive features of the postmodern networking reality (Langford 92).

Langford divides the most common ethical issues into technical and personal: the former relate to the abuse of technical privileges and knowledge, whereas personal issues are about individual actions, which do not result in technical abuse but display dubious attitudes toward ethical standards and norms (96). The most important personal ethical issues in computer networking include inappropriate distribution of information, misunderstanding of the medium and inappropriate responses (Langford 96). The most common forms of technical abuse include but are not limited to unauthorized access to personal mail, unauthorized access to files and other electronic materials, and unauthorized use of superuser privileges (Langford 97). In computer networks, the most common personal examples of unethical behavior are spamming and individual access to inappropriate material; public broadcasting of inappropriate material and unauthorized use of copyrighted material are the two most important forms of technical abuse in computer networks (Langford 101).

These ethical dilemmas continue to plague the networking community for a variety of reasons. First, the Internet and censorship are virtually incompatible. Second, given the global coverage of the Internet networks, local and national legislation in the networked reality simply does not work (Langford 104). Policing the Internet is technically impossible and any form of enforcement would be quite unpractical (Langford 105). Langford confirms the growing need for appropriate ethical education (106). The author is confident that “letting loose new users on the Internet without training or education is perhaps analogous to letting loose new drivers without instruction” (107). Moreover, the information presented by Langford has far reaching implications for professionals in computer networking. Actually, the way Langford describes the current state of ethical issues turns computer networking into an infinite source of technical and personal challenges. Education alone cannot suffice to make networks safer and more ethical; computer networking experts must be aware of these issues, to be able to address them in the process of creating productive computer networks and to make networks technically less vulnerable to these ethical threats.

Works Cited

Entwistle, A. “Sharing Digital Micrographs and Other Data Files Between Computers.”

Biotechnic & Histochemistry, 79.3-4 (2004): 111-120. Print.

Langford, D. “Ethics and the Internet: Appropriate Behavior in Electronic Communication.”

Ethics & Behavior, 6.2 (1996): 91-106. Print.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Article Review Samples & Examples

Recess Debate, Article Writing Example

Playtime, including recess, has long been considered essential to childhood growth, allowing for physical exercise, socialization, and imaginative play. Nevertheless, there has been a new [...]

Pages: 3

Words: 758

Article Review

Three Ways Ceos Can Lay the Foundation for Leadership Development, Article Review Example

The article espouses the need for CEOs to establish team leaders. The journey toward becoming a CEO is quite long and requires dedication and hard [...]

Pages: 4

Words: 971

Article Review

Analyzing Political Violence During Contention I, Article Review Example

Analyzing Political Violence during Contention I Political violence happens when a state conflicts with another country that violates or threatens the freedom of its civilians. [...]

Pages: 6

Words: 1763

Article Review

Common Cold Defending Children Against COVID-19, Article Review Example

The primary risk for SARS-CoV-2 severity clinically is a person’s biological age (O’Driscoll et al., 2020). Although comorbidities become more intense with age, increasing the [...]

Pages: 4

Words: 1228

Article Review

Hero Narrative Reading Strategy, Article Review Example

Several models can be implemented to enhance reading results and communicative purposes. Hero narrative strategy is based on the communicative strategy for instructing college students [...]

Pages: 3

Words: 943

Article Review

Website Reviews on the Myth of Minotaur, Article Review Example

Among the ancient Greek narratives on myths is where we draw the myth about Minotaur. Myths are historical events believed to have occurred in the [...]

Pages: 3

Words: 693

Article Review

Recess Debate, Article Writing Example

Playtime, including recess, has long been considered essential to childhood growth, allowing for physical exercise, socialization, and imaginative play. Nevertheless, there has been a new [...]

Pages: 3

Words: 758

Article Review

Three Ways Ceos Can Lay the Foundation for Leadership Development, Article Review Example

The article espouses the need for CEOs to establish team leaders. The journey toward becoming a CEO is quite long and requires dedication and hard [...]

Pages: 4

Words: 971

Article Review

Analyzing Political Violence During Contention I, Article Review Example

Analyzing Political Violence during Contention I Political violence happens when a state conflicts with another country that violates or threatens the freedom of its civilians. [...]

Pages: 6

Words: 1763

Article Review

Common Cold Defending Children Against COVID-19, Article Review Example

The primary risk for SARS-CoV-2 severity clinically is a person’s biological age (O’Driscoll et al., 2020). Although comorbidities become more intense with age, increasing the [...]

Pages: 4

Words: 1228

Article Review

Hero Narrative Reading Strategy, Article Review Example

Several models can be implemented to enhance reading results and communicative purposes. Hero narrative strategy is based on the communicative strategy for instructing college students [...]

Pages: 3

Words: 943

Article Review

Website Reviews on the Myth of Minotaur, Article Review Example

Among the ancient Greek narratives on myths is where we draw the myth about Minotaur. Myths are historical events believed to have occurred in the [...]

Pages: 3

Words: 693

Article Review