Read More about KC

Properties

Computer networks: Facilitate communications Using a network, people can communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. Permit sharing of files, data, and other types of information In a network environment, authorized users may access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks. Share network and computing resources In a networked environment, each computer on a network may access and use resources provided by devices on the network, such as printing a document on a shared network printer. Distributed computing uses computing resources across a network to accomplish tasks. May be insecure A computer network may be used by computer hackers to deploy computer viruses or computer worms on devices connected to the network, or to prevent these devices from normally accessing the network (denial of service). May interfere with other technologies Power line communication strongly disturbs certain[3]forms of radio communication, e.g., amateur radio. It may also interfere with last mile access technologies such as ADSL and VDSL. May be difficult to set up A complex computer network may be difficult to set up. It may also be very costly to set up an effective computer network in a large organization or company. Distributed computing is a field of computer science that studies distributed systems. A distributed system consists of multiple computers that c

mmunicate through a computer network. The computers interact with each other in order to achieve a common goal. A computer program that runs in a distributed system is called a distributed program, and distributed programming is the process of writing such programs.[1] Distributed computing also refers to the use of distributed systems to solve computational problems. In distributed computing, a problem is divided into many tasks, each of which is solved by one or more computers,[2] which communicate with each other by message passing. In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.[1] The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.[2] While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks,[3] they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker,[4] not making a difference between computer criminals (black hats) and computer security experts (white hats).[5] Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.