Computer Communication - Essay Example

Only on StudentShare

Extract of sample
Computer Communication

The communication methods involve many linguistic approaches. This involves the Para linguistic, Non linguistic and Meta linguistics. It is the process of movement of data from one person to another and from one place to another.
Everybody knows that communication is the part of life and it is counted as essential for the transference of information, but they don't know about the methods of communication. People from past, have used many methods for transferring the information's from one place to another or from one person to another. There were so many methods used in the past also for the information transfers in older days due to of lack of communication media. There were no computer technology and internet facilities in the past for the transference of information's. The main method of communication consisted of distance effect cause intention attention duplication by understanding the methods of communication.
In the early days gestures were the basic things for telling someone about the movements, speeches, characters and emotions. But after the development and the introduction of new technology, people left these types of communication methods which were used in the past for the transference of information to another. It was the method of past to use gestures in communication which is also common in animals. ...
Download paper

Summary

Communication is the system of transferring the information from one place to another from one person to another with the help of some media transformation, e.g. with the help of computer, by telephonic system, direct transformation of messages can be made…
Author : johnseva

Related Essays

Computer system Network Security
The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technology advanced in computing, computer systems became targets as well. The need for computer network security system raised when a couple of incidents occurred in the USA. The Federal Bureau of Investigation (FBI) made one of its first arrests related to computer hacking in the early 1980s3. A group of hackers known as the 414s, named after their area code in Milwaukee, Wisconsin, were indicted for attacking 60 different computer systems including the Los Alamos National...
5 pages (1255 words) Essay
Computer Use
The accounts were kept and maintained manually....
10 pages (2510 words) Assignment
Computer Culture
Most of the residential and places of businesses still adhere to that system, but only occasionally. While in some other parts of the world they have already adapt to more advanced system of communication....
5 pages (1255 words) Essay
Computer Aided Manufacturing
CAD have enjoyed much appreciation in the industry because of several reasons including improved design quality, increased productivity, establishment of data base for manufacturing, creation of standards for design and doing away of inaccuracies brought about by hand-copying of several drafting as well as drawings' inconsistency (Introduction to CAD, 2008)....
6 pages (1506 words) Essay
Computer Peripheral Architecture
In this definition, primary devices refer to the computer's main storage device, such as an IDE or SCSI hard drive. Secondary devices, under this definition, are any non-primary storage device, such as a tape drive, writeable CD-ROMs or removable flash drives....
6 pages (1506 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!