Download Document

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Zero-configuration networking wikipedia , lookup

Net bias wikipedia , lookup

Distributed firewall wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Computer security wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Computer network wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Getting Started with
Applied Computer
Concepts
Computing Concepts: Part 2
Computing Concepts – Part 2
1
Objectives
•
•
•
•
•
•
•
•
•
Identify network architecture
Identify network components
Connect to the Internet
Navigate the Web
Explore telephony and other uses of the Internet
Choose e-commerce options
Protect yourself online
Maintain security
Protect your computer and yourself
Computing Concepts – Part 2
2
Understanding Networks
• Network: two or more computers
linked
– Share resources
– Exchange data
• Internet: largest computer network
in world
Computing Concepts – Part 2
3
Understanding Networks (continued)
• Advantages
– Sharing resources and data
– Reduced hardware and software costs
– Centralized data management
– Connecting people
• Disadvantages
– Loss of personal autonomy
– Privacy and security threats
Computing Concepts – Part 2
4
Identifying Network Architecture
Server
Printer
Router
Computer
Computer
Computing Concepts – Part 2
5
Understanding Client-Server
Networks
Clients
Clients
Server
Computing Concepts – Part 2
6
Understanding Peer-to-Peer Networks
Computing Concepts – Part 2
7
Identifying Network Components
• Transmission media
– Connect the nodes of a network
– Provide a communication channel
• Network adapters
– Enable nodes to communicate
• Software
– Manages operations of network
Computing Concepts – Part 2
8
Understanding Transmission Media
• Data transfer rate or bandwidth
– Megabits per second
• Wired
– Telephone wire
– Cable
– Fiber optics
• Wireless
– Radio waves
Computing Concepts – Part 2
9
Identifying Network Adapters
Wireless network adapter
Network interface card (NIC)
Computing Concepts – Part 2
10
Understanding Data Transfer
• Packets
• Network navigation device
– Network adapter
– Router
• Transfers packets between networks
• Connect home network to the Internet
– Switch
• Determines path and final location for data
transfer
• Network operating system
Computing Concepts – Part 2
11
Understanding Home Networking
Ethernet:
Wireless Ethernet:
• Wired
• Requires network
adapters on nodes
• Router and switch
required
• Radio waves
• 802.11 standard or Wi-Fi
• Nodes require a wireless
network adapter
• Wireless router required
Computing Concepts – Part 2
12
Connecting to the Internet
Speed
56 Kbps
128 Kbps
512 Kbps
Type of Connection
Dial-up
DSL
Cable
6 Mbps
3 Tbps
Satellite
Fiber optic
Computing Concepts – Part 2
13
Navigating the Web
Computing Concepts – Part 2
14
Searching for Information
• Use different search engines
• Use a web portal or gateway website
• Use a subject directory
• Use a metasearch engine
• Use Boolean operators
Computing Concepts – Part 2
15
Exploring Telephony
• Internet telephony
• Services
• VoIP
– Skype
• Webcam
– Windows Messenger
• Microphone/headset
– Google Voice
– Vonage
– Yahoo! Voice
Computing Concepts – Part 2
16
Understanding Podcasts, Webcasts, and
Blogs
• RSS feed
–Push technology
• RSS newsreaders
• RSS symbol
Computing Concepts – Part 2
17
Understanding Social Media
• Facebook
• LinkedIn
• Twitter
• MySpace
Computing Concepts – Part 2
18
Understanding E-commerce Options
Type of Business
Abbreviation
Business to Business
Business to Consumer
B2B
B2C
Consumer to Business
Consumer to Consumer
C2B
C2C
Computing Concepts – Part 2
19
Protecting Privacy
• Collection of data
• History file
• Spyware
– Cookies
– Web bugs
– Keystroke loggers
Computing Concepts – Part 2
20
Protecting Your Electronic Profile
• Set up an alternate e-mail
• Share only required information
• Google yourself
Computing Concepts – Part 2
21
Protecting Security
• Threats:
– Theft of hardware
– Theft of software
– Viruses
• Strategies:
– Don’t leave devices
unsecured
– Don’t use software illegally
• Most music isn’t free
– Malware
– Back up data
– Credit card fraud
– Regularly scan using
anti-virus software
– Phishing
– E-mail scams
– Don’t respond to
questionable e-mail
Computing Concepts – Part 2
22
Understanding Online Threats
• Spam
• Trojan horses
• Internet fraud
• Viruses
– Non-delivery of merchandise
• Worms
– Auction fraud
– Credit or debit card fraud
• Phishing
• Pharming
Computing Concepts – Part 2
23
Protecting Yourself and Your
Computer
• Firewall
• Proxy server
• Antivirus programs
Computing Concepts – Part 2
24
Using Passwords
• Strong passwords:
– Sufficient length
– Variety of characters
– Upper and lowercase letters
– Numbers
– Special characters
Computing Concepts – Part 2
25
Avoiding Scams
• If it sounds too good to be true, it probably is
• Do business with established companies
• Check the return policy and customer service policy
• Use secured websites for personal information
Computing Concepts – Part 2
26
Using Encryption
• Hypertext Transfer Protocol
over Secured Socket Layer
– https
• Public key encryption
– Public key
– Private key
Computing Concepts – Part 2
27
Summary
• Networking enables communication between
computers
• The Internet is the world’s largest network
• Security and privacy are important issues that
all computer users must address
Computing Concepts – Part 2
28