* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Document
Zero-configuration networking wikipedia , lookup
Distributed firewall wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Computer security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Wireless security wikipedia , lookup
Network tap wikipedia , lookup
Computer network wikipedia , lookup
Airborne Networking wikipedia , lookup
Getting Started with Applied Computer Concepts Computing Concepts: Part 2 Computing Concepts – Part 2 1 Objectives • • • • • • • • • Identify network architecture Identify network components Connect to the Internet Navigate the Web Explore telephony and other uses of the Internet Choose e-commerce options Protect yourself online Maintain security Protect your computer and yourself Computing Concepts – Part 2 2 Understanding Networks • Network: two or more computers linked – Share resources – Exchange data • Internet: largest computer network in world Computing Concepts – Part 2 3 Understanding Networks (continued) • Advantages – Sharing resources and data – Reduced hardware and software costs – Centralized data management – Connecting people • Disadvantages – Loss of personal autonomy – Privacy and security threats Computing Concepts – Part 2 4 Identifying Network Architecture Server Printer Router Computer Computer Computing Concepts – Part 2 5 Understanding Client-Server Networks Clients Clients Server Computing Concepts – Part 2 6 Understanding Peer-to-Peer Networks Computing Concepts – Part 2 7 Identifying Network Components • Transmission media – Connect the nodes of a network – Provide a communication channel • Network adapters – Enable nodes to communicate • Software – Manages operations of network Computing Concepts – Part 2 8 Understanding Transmission Media • Data transfer rate or bandwidth – Megabits per second • Wired – Telephone wire – Cable – Fiber optics • Wireless – Radio waves Computing Concepts – Part 2 9 Identifying Network Adapters Wireless network adapter Network interface card (NIC) Computing Concepts – Part 2 10 Understanding Data Transfer • Packets • Network navigation device – Network adapter – Router • Transfers packets between networks • Connect home network to the Internet – Switch • Determines path and final location for data transfer • Network operating system Computing Concepts – Part 2 11 Understanding Home Networking Ethernet: Wireless Ethernet: • Wired • Requires network adapters on nodes • Router and switch required • Radio waves • 802.11 standard or Wi-Fi • Nodes require a wireless network adapter • Wireless router required Computing Concepts – Part 2 12 Connecting to the Internet Speed 56 Kbps 128 Kbps 512 Kbps Type of Connection Dial-up DSL Cable 6 Mbps 3 Tbps Satellite Fiber optic Computing Concepts – Part 2 13 Navigating the Web Computing Concepts – Part 2 14 Searching for Information • Use different search engines • Use a web portal or gateway website • Use a subject directory • Use a metasearch engine • Use Boolean operators Computing Concepts – Part 2 15 Exploring Telephony • Internet telephony • Services • VoIP – Skype • Webcam – Windows Messenger • Microphone/headset – Google Voice – Vonage – Yahoo! Voice Computing Concepts – Part 2 16 Understanding Podcasts, Webcasts, and Blogs • RSS feed –Push technology • RSS newsreaders • RSS symbol Computing Concepts – Part 2 17 Understanding Social Media • Facebook • LinkedIn • Twitter • MySpace Computing Concepts – Part 2 18 Understanding E-commerce Options Type of Business Abbreviation Business to Business Business to Consumer B2B B2C Consumer to Business Consumer to Consumer C2B C2C Computing Concepts – Part 2 19 Protecting Privacy • Collection of data • History file • Spyware – Cookies – Web bugs – Keystroke loggers Computing Concepts – Part 2 20 Protecting Your Electronic Profile • Set up an alternate e-mail • Share only required information • Google yourself Computing Concepts – Part 2 21 Protecting Security • Threats: – Theft of hardware – Theft of software – Viruses • Strategies: – Don’t leave devices unsecured – Don’t use software illegally • Most music isn’t free – Malware – Back up data – Credit card fraud – Regularly scan using anti-virus software – Phishing – E-mail scams – Don’t respond to questionable e-mail Computing Concepts – Part 2 22 Understanding Online Threats • Spam • Trojan horses • Internet fraud • Viruses – Non-delivery of merchandise • Worms – Auction fraud – Credit or debit card fraud • Phishing • Pharming Computing Concepts – Part 2 23 Protecting Yourself and Your Computer • Firewall • Proxy server • Antivirus programs Computing Concepts – Part 2 24 Using Passwords • Strong passwords: – Sufficient length – Variety of characters – Upper and lowercase letters – Numbers – Special characters Computing Concepts – Part 2 25 Avoiding Scams • If it sounds too good to be true, it probably is • Do business with established companies • Check the return policy and customer service policy • Use secured websites for personal information Computing Concepts – Part 2 26 Using Encryption • Hypertext Transfer Protocol over Secured Socket Layer – https • Public key encryption – Public key – Private key Computing Concepts – Part 2 27 Summary • Networking enables communication between computers • The Internet is the world’s largest network • Security and privacy are important issues that all computer users must address Computing Concepts – Part 2 28