Question

In: Computer Science

Computer networking is a reality today. Smartphones, televisions, even devices such as pacemakers and thermostats are...

Computer networking is a reality today. Smartphones, televisions, even devices such as pacemakers and thermostats are now wirelessly connected. Perhaps a better way to understand the importance of networking is to consider what sort of business cannot benefit from networking.

For the first part of the discussion, the challenge is to provide an industry or type of business that would not benefit from computer networking. This may be hard, but be creative. Don't worry about being correct, because in the reply to this discussion, think about the business or industry suggested by a fellow student and consider how computer networking might still be used as a benefit.

Solutions

Expert Solution

In my opinion, I believe the business which would not benefit from computer networking is the business in which manpower is required, i.e., labour work. Although, machines can be used to reduce manpower to some extent, but still manpower will be required to operate those machines. To make sure the whole network system is working properly, human intervention is required. So basically, the human jobs can be reduced to some extent but not completely using networking.

In this type of business, Computer Networking can be used as a benefit by automating some jobs which are done routinely same everytime without any changes. But for things which require reasoning and rational thinking, for those jobs automation cannot be done and also for keeping track whether all the things are working properly or not, human help is required. So we can say, the business in which manpower is required, that business cannot be totally benefitted with computer networking.

Hope I answered your question.


Related Solutions

What are the three phases (generations) of computer networking called? Also, is a centralized networking one?
What are the three phases (generations) of computer networking called? Also, is a centralized networking one?
Files and folders; we all use them today on our varying computer devices. 1. State briefly...
Files and folders; we all use them today on our varying computer devices. 1. State briefly what you understand a file extension to be and what its purpose is. 2. Identify three file extensions that you see and which software applications may have created them. 3. Reason to have our files and folders properly managed. Formulate your discussion points/posting comprising 400 – 600 words based on the above questions
What do you believe are the potential uses of mobile devices (for example, smartphones or tablets)...
What do you believe are the potential uses of mobile devices (for example, smartphones or tablets) in assessment? What are the pros and cons of such technology?
Assess the most important criteria for selecting networking devices at the core, access, and distribution layers...
Assess the most important criteria for selecting networking devices at the core, access, and distribution layers in a campus network; explain the 2-3 selection criteria that you feel are most critical in a campus network. Analyze and explain the primary security technologies and devices typically employed in a campus network.
What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What...
What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What qualities of apps make them a vulnerable security point in smartphone use Are apps more or less likely to be subject to threats than traditional P C software programs?
Besides smartphones, come up with an example of a good that has increased or even decreased...
Besides smartphones, come up with an example of a good that has increased or even decreased in quality over time while the price has remained relatively constant. Explain how the change in quality could bias CPI.
Social media users use a variety of devices to access social networking; mobile phones are increasingly...
Social media users use a variety of devices to access social networking; mobile phones are increasingly popular. However, is there a difference in the various age groups in the proportion of social media users who use their mobile phone to access social networking? A study showed the following results for the different age groups, assume that 200 social media users for each age group were surveyed. ORIGINAL DATA ACCESS TO SOCIAL MEDIA 18-34 35-64 65+ TOTAL YES 118 72 26...
Is the spirit and intent of Title IX written in 1972 is a reality today? Why...
Is the spirit and intent of Title IX written in 1972 is a reality today? Why or why not?
For at least five of these uses of computer networking, use the Internet or other sources...
For at least five of these uses of computer networking, use the Internet or other sources to identify the market-leading software applications used to obtain the required functionality (for example, to serve web pages, the market-leading software is the Apache web server). In a table, provide the following information for the five uses: the application (use) category, the market-leading software application in the category, and a paragraph or two about the strengths of the selected software application. (You can use...
Covid-19 infection has become a reality to live with, and even if a vaccine becomes available...
Covid-19 infection has become a reality to live with, and even if a vaccine becomes available it may not prevent the spread of the infection. This scenario has given rise to new norms for regular life and work/study. Please provide your views on: a) What are the new norms, and how will these affect daily life styles and learning/work practices?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT