Cameron is Application layer which basically provides application
is a machine language that humans can’t program correctly. In this language
everything is written in binary. The reason why this is so user friendly is
because the language is very low-level programming languages, because it’s so
close to machine code.
between high level and low level programming. High level languages uses an
independent platform uses programs written in High Level language can run on
different hardware or with different configuration. Now for low level language
platform is a dependent that uses Low Level written language that can run on
the same hardware with same configuration but you cannot run them on hardware
that has different configuration.
My daily life
without the internet would be so different. I honestly don’t know what I would
do without the internet as bad as that sounds. Almost all of my daily
activities have something to do with the internet. So I would have to stay
again without the internet I would be in some trouble.
The first protocol
of internet communication is Physical layer with does binary digits bits on a
physical communication channel. Number two is Data link Layer with creates a
bit pipe with two machines that are connected by a communication link. Number
three is Network layer which uses two layers for protocol stack to enable to
transmit code to create addressing scheme for all networks. Number four is
transport layer has a large multistory office that builds tenants like for
example John Smith 329 Main St. Greenville,
South Carolina. Number five is Application layer which basically provides
application to programs and users.
The things that I
would implement is an antivirus protects against viruses, and worms. I would
also spyware which is a defender that prevents malware types from infecting
your computer or laptop. There are also antivirus you can download to your computer
or laptop to help fight viruses as well.
In the last 12
months there was a virus that stole thousands of emails from Target costing
them a lot of money. According to https://www.whoishostingthis.com “The
Klez virus, for example, stole confidential emails and spreads them around the
web via mass emails, in some instances costing millions of dollars in damages
due to jamming networks with mass emailing. In another
famous instance, hackers used viruses to steal 40 million credit card numbers
from Target, costing the company $148 million dollars to recover.” There are
thousands of hackers that hack these big company every year costing them
millions or even billions every year. This virus stood out to me the most
because I shop at Target a lot.