Skip to main content

What are the disadvantages of data communication?

What are the disadvantages of data communication?

Data communication can be slow through the low capacity of the physical layer to make a data communication model and the mode such as TCP and OSI model.

The data communication system spreads malicious files or corrupted files easily in the network model which increases the security system that is costly for the data communication system.

Users can spread in the data communication system also viral video files that can be a crime for any user who wants to not be shared in the network model or wide network or social media of their private database.

Most of the users spread the privacy data of other users which is a crime without permission of the user.


Introduction to the computer system related topic and the topic is following below here:


What are the disadvantages of data communication?


Let's discuss the computer system related topic is mentioned above and the explained following below here:


What are the disadvantages of data communication?

There are some points on the computer system and the data communication system related to the topic of "What are the disadvantages of data communication?" following below here:


What are the disadvantages of data communication?

  • Viruses and malicious files can be shared in the communication system
  • Need more security system to protect database of user
  • Some latency also creates in the data communication
  • The data communication system can be hacked due to low level security 


Let's discuss the points above about the computer system and the data communication system related to the topic of "What are the disadvantages of data communication?" explanation following below here:


Viruses and malicious files can be shared in the communication system

Viruses are the dangerous files for the database, data, information, files, program files, system files, user files etc. Can be corrupted by the malicious files when the computer system is connected to the data communication model such as TCP or OSI.

Viruses or malicious files can corrupt the user database through the changing of the extension of application software files into the particular extension of malicious files such as .hjk, .gud, xjs. Depends on the extension of the virus file. But viruses can be developed by the crackers or attackers on the internet service and spread malicious files into the data communication model easily if the data communication model has a low security system.


Need more security system to protect database of user

Need more security systems to protect the database of users. Users need more protection to protect the user database which has been saved into the memory of the computer system that is connected to the data communication model.

The data communication system is easy to share all the types of file which is useful for the other user and the other user can steal the database of the user if there is no security layer to access the other user database on the data communication model and the connected computer system.

The cryptography language is useful for the data communication system to share the data from one port to another using the cryptography language using the special characters or group decoded language format to protect the data between data communication systems.

Most hackers, crackers, and attackers can attack the data communication system to steal the information of sharing data.


Some latency also creates in the data communication

Some latency also creates in the data communication system that means the data communication system some latency increases due to high traffic of data transferring systems between the same portals or same medium of connection of two types such as wireless or wired connection medium.

Latency is a measure by the data packets which are transferred to the targeted portal and the time is calculated for a group of data packets or one packet to arrive at their portal or address on the data communication system.

If the time to arrive of data packet to their destination then the latency increases in the network model of data communication system.


The data communication system can be hacked due to low level security

The data communication system can be hacked due to the low level security layer on the data communication system.

The low level of security is the interface of security when the data communication system is accessed by the other unknown user and the user can access using the known username and password then the user database can easily be accessed by the unknown user.

If the security is high level then most of the security model includes username, password, secret code verification, OTP from mobile device verification, finger scanner etc. Depends on the high security level and how much to increase to protect the user database.

Comments

Popular posts from this blog

Discuss the role played by the various components of the CPU

Q Discuss the roles played by the various components of CPU? The CPU is the brain of the computer system. All major calculations, manipulations and comparisons are made by the CPU. The CPU is also responsible for activating and controlling the operations performed by all other units of the computer system. The major components of the CPU are: a) Arithmetic Logic Unit (A.L.U.) b) Control Unit (CU) c) Primary Memory Arithmetic Logic Unit (A.L.U.): What is ALU Arithmetic logic Unit? ALU is a part of the CPU. It is a part to calculate the logical term in the CPU where the term refers to an operation of logical type. It also calculates the arithmetic terms in the CPU where the term refers to an operation of arithmetic type. It is used to direct access through the processor controller. The ALU connected to the input and output peripheral system through the bus with the different types of bus. Such as control bus, data bus etc. ALU is a part of the CPU that can calculate the input...

About the memory and its Classification of the computer Memory

What are the memories in the reference of computer system? What is Computer Memory?:- The memory is the essential for the computer to store the data, instruction and information. Without memory, computers are not be able to store data, instruction etc. The memory is an essential part of a computer system. It is require by the computer system to store information. Memory can be divided into the following two categories types: i) Primary or Main memory ii) Secondary Memory or Permanent memory In this figure I'll show the classification of the memory of computer system peripheral and architecture of organisations Primary Memory or Main memory:- i) Primary memory is the memory which is fastest memory of the computer. ii) It is a small but relatively fast storage unit that stores data and instruction which are used by the CPU (central processing unit). iii) This type or category of a memory is the main memory of the computer.It is a temporary memory and also we ...

What are the three main purpose of an operating system?

What are the three main purpose of an operating system? There are three main purpose of an operating system. 1. The first main purpose is User interface between hardware and users. 2. The second main purpose is to operate the internal parts of the computer properly and systematically using binary code system in the form of 0 and 1. 3. The third main purpose is to provide an environment for development of an application software and program to uses the hardware resources of the computer and connected to the computer parts which provides output to the user, the output from application software is very useful for users. Interface between user and hardware device  The operating system uses all types of interface such as command line interface, batch command interface and Graphical User Interface to interact with users to hardware peripheral devices through the monitor screen. Monitor has a big role making interface between hardware and users. Monitor visualization of all types ...