Is there a document that explains the basics of online computing?

Is there a document that explains the basics of online computing?

Is there a document that explains the basics of online computing?

No. There is no single document that can explain it all. The world ofonline computing is vast and means different things to differentpeople.

For example, there are private commercial network serviceslike AOL, Prodigy and Compuserve, each of which has its own rules fornavigating and participating. Then there are hundreds, if notthousands, of private bulletin board systems (BBS’s), each of whichare also different. Then there is the Internet — the World Wide Weband newsgroups. How you access these various forms of online computingdepends on the type of provider you are using for your online access,and how you want to participate. Some people prefer to “lurk” (readwhat other people post) or “browse” (passively view Web pages), otherslike to “surf” (more actively navigate the Web) and still others liketo “post” (provide comments and feedback in an online forum).

There are tomes of information that have been written about onlinecomputing, and more recently, about the Internet. Check your locallibrary and browse through some of them to get a better idea of whereyour particular interest might lie. Ask the librarian for some help,you’d be surprised how much they can tell you. And definitely read upon modems, as they are the chief means by which most people accesscyberspace right now.

Share the Post:
data observability

Data Observability Explained

Data is the lifeblood of any successful business, as it is the driving force behind critical decision-making, insight generation, and strategic development. However, due to its intricate nature, ensuring the

Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved