Chapter 2 : The Internet and World Wide Web Internet : world wide collection of networks. Connecting to the internet - Dial-Up Access : use modem to

Size: px
Start display at page:

Download "Chapter 2 : The Internet and World Wide Web Internet : world wide collection of networks. Connecting to the internet - Dial-Up Access : use modem to"

Transcription

1 Chapter 2 : The Internet and World Wide Web Internet : world wide collection of networks. Connecting to the internet - Dial-Up Access : use modem to connect - DSL ( Digital Subscriber Line) : higher-speed internet connection using telephone lines. - Cable Modem : high-speed internet connection through cable TV network. - Fixed Wireless : high-speed internet connection use antenna. - Wi-Fi (wireless fidelity) : use radio signal to wireless devices. - Satellite Modem : high-speed internet via satellite. Internet Address - IP Address - Domain Name - Top-Level Domain (TLD) - Domain Name System (DNS) World Wide Web - WWW or Web : collection of electronic documents - Webpage : document contains text, graphic, and sound - Web server : computer that delivers requested webpage to your computer Types of Webpage - Portal - Blog - News - Wiki - Informational - Online Social Networks

2 - Business/Marketing - Content Aggregator - Educational - Entertainment - Advocacy - Personal Multimedia On The Web 1. Graphic : drawing, chart, photograph. - JPEG : graphical image - GIF : line drawing, single-color - Thumbnail : small or large image of review 2. Animation : motion created by displaying a series of still image in sequence. 3. Audio : music, speech, or any other sound 4. Video : full-motion images played back at various speed. 5. Virtual Reality(VR) : use of computer to stimulate a real environment that appears as a 3D space. Web Publishing 1. Planning Web Site 2. Analyzing and Designing The Web Site 3. Creating Website 4. Deploying a Website 5. Maintaining The Website E-Commerce = a business transaction that occur over the internet. 1. Business to Consumer(B2C) 2. Consumer to Consumer(C2C) 3. Business to Business(B2B)

3 Other Internet Services 1. transmission of messages via computer networks 2. File Transfer Protocol(FTP) : internet that allow you to share files with other computers on internet. 3. Newsgroups and Message Boards : online area in which users have written discussions about a particular subject. 4. Mailing List : every person on the list receives a copy of the message in their mailbox. 5. Chat Rooms : a real-time conversation 6. Instant Messaging : a real-time internet communication service that notifies you. Chapter 3 : The Application Software Application Software : program that designed to make users more produvtive - Package Software : mass produced copyrighted retail software - Custom Software : a tailored-made program developed at a user s request to perform specific functions. - Web-based Software : access and interact from computer that s connected to the internet. - Freeware : no cost and copyrighted program, cannot resell - Public-domain Software : free software, but it is donated for public use and no copyright. - Shareware : copyrighted software distributed free for trial period. Working with Application Software - Desktop : on-screen work area

4 - Icon : small image represent program - Button : graphical that activate to cause a specific action - Pointer : small symbol on screen use to click an object on screen - Menu : contains command - Window : rectangular area of the screen displays a program - Title bar : horizontal space that contains window s name - Dialog box : provide information or request a response - Shortcut menu : context-sensitive menu that displays a list of commonly used commands. Business Software + Word Processing Software - word processor - clipart - margins - word wrap - scrolling - find and search - replace - spelling checker - header - footer + Spreadsheet Software - cell - label - value - formula - function - charting + Database Software = a collection of data which consists of table, record, and field. + Presentation Graphic Software = allow you to create presentation i.e. Microsoft Powerpoint + Note Taking Software

5 = enables users to enter typed text on a page + Personal Information Managers Software (PIM) = calendar, address book, note pad + Project Management Software = allows you to plan a project + Accounting Software = record and report financial transactions Web-Based Software Web Application : software application that exists on a Website. Chapter 8 : Operating Systems and Utility Programs = program that control the operations of the computer and its devices 2 types of system software 1. Operating System : program that contains instruction that coordinate all activities among computer hardware. 2. Utility Programs : a type of system software that perform specific task. Operating System Operating system function 1. starting a computer 2. providing a user interface 3. managing program 4. managing memory 5. schedule job 6. configuring device 7. establishing an internet connection

6 8. monitoring performance 9. provide file management 10. controlling a network 11. administering security Operating System Utility Programs - file manager : perform functions related to file management - search utility : attempts to locate a file on the computer - image viewer : allows user to display the contents of graphic files - personal firewall : detects and protects personal computer from unauthorized instruction. - uninstaller : remove application - disk scanner : search and remove unnecessary files - backup utility : allow to copy or backup selected files onto another disk Types of Operating System - Proprietary Software : limited to a specific vendor or computer model. - Device-dependent : can run only on a specific type of computer. - Device-independent : run on many types of computer. - Downward-compatible : for earlier version of the OS. - Upward-compatible : runs with new version of OS. 1. Stand-alone OS : OS that works on desktop computer - DOS - Window XP - Window Vista -Mac OS X - UNIX - Linux 2. Network OS - Solaris designed for E-commerce applications

7 3. Embedded OS : OS on most PDA and small device - Window CE - Windows Mobile - Palm OS - Symbian OS Stand-Alone Utility Programs - Anti-virus : detect and remove virus from computer. - Spyware removers : secretly collects information about user. - Internet Filters : remove or block certain items from being displayed. - File Compression Utility : compressed file takes up less storage than original file. - Media Player : allows to view image on the computer. - CD/DVD Burning Software : write text, sound, video on CD/DVD. - Personal Computer Maintenance : repair disk problems and improving computer s performance. Chapter 9: Data Communications and Networking Types of Network 1. Local Area Network (LAN): a network that connects computers and devices in a limited geographical area. 2. Metropolitan Area Network (MAN): a network that connects LAN in a metropolitan area such as city or country. 3. Wide Area Network (WAN): a network that covers a large geographic area. Network Architecture 1. Peer-to-Peer: a simple and inexpensive network that connect less than 10 computers together.

8 2. Client-Server: controls access to network resources and provide a centralized storage area Wired Network: Transmission Media 1. Twisted Pair Cable: consists of one or more twisted paired wires bundled together 2. Coaxial Cable: use in Cable TV because it can be cabled over longer distances than twisted pair cable 3. Fiber Optic Cable : consists of hundreds of thin glass or plastic that use light to transmit signals. Wireless Network: Use Radio frequency to carry the data signals 1. IrDA (Infrared): transmit data wirelessly to each other via infrared light waves. 2. Bluetooth: Technology uses short range radio waves to transmit data between two Bluetooth devices. 3. Radio Frequency Identification: uses radio signals to communicate with a transponder placed on person. 4. Ultra-wideband: use short range radio wave to communicate at high speed 5. WiFi: a family standard for wireless LANs 6. Broadcast Radio: distributes radio signals through the air over long distances 7. Cellular Radio: a form of broadcast radio that is used widely for mobile communications, specifically for cellular telephones. 8. Microwaves: Microwave transmissions involve sending signals from one microwave station to another.

9 9. WiMax: newer network which communicate wirelessly over the air in wide area 10. Communications Satellite: a space station that receives microwave signals from an earth-based station, and broadcasts the signals back over a wide area to any number of earth-based stations. Communication and Navigational Devices Hub/Switch: The central computers that provide a connection point for devices in the network, and all data transfer the hub to another computer. Wireless Access points: allows computers and devices to transfer data wirelessly. Analog Modem: convert digital to analog signal that would allow the user to make a point-to-point connection over a copper-based telephone line. Digital Modem: convert computer digital signal to telecommunication digital signal that would allow you to make a point-to-point connection over a fiber optic cable Routers: connects multiple computers or others routers together and transmits data to its destination on the network. Chapter 10: Managing a Database Qualities of Valuable Information - Accurate information: correct information - Verifiable information: can prove the information is correct or incorrect - Timely information: age suited to its use - Organized information: arranged to suit your need and requirement

10 - Useful information: has meaning to user who receives it - Accessible information: available when you need it - Cost-effective information: give more value than it costs to produce Database approach: Pro and cons Pros 1. Reduce data redundancy 2. Improved Data integrity 3. Shared Data 4. Reduced Development Time 5. Easier Access Cons 1. Use more computing resource-power computer 2. Need data analyst, database administrator and database programmers 3. Data is stored in a single file. It is vulnerable to be tempered and damaged. Data Model 1. Relational Database: store data in tables that consists of rows and columns. 2. Objected-Oriented Database (OODB): store data in objects which are items that contain data. 3. Multidimensional Database (MDDB): store data in dimensions. It can store more than two dimensions of data (hypercube) 4. Data Warehouse: A huge database system that stores and manages the data required to analyze historical and current transactions Database Management Systems 1. Data Dictionary: contains data about each file in the database and 2. Form generator (User Data entry form) 3. Report Generator: allows user to design a report on the screen

11 4. Security with the help of Access privileges: define the activities that a specific user or group of user can perform. 5. Backup and recovery Recovery Utilities: uses the logs and/or backups to restore a database when it is damaged or destroyed. Validation Checks 1. Alphabetic Check: ensure that enter only alphabetic data into a field. 2. Range Check: determines whether a number is within specified range 3. Consistency Check: test if the data in two or more associated fields is logical 4. Completeness Check: verifies a required field contains data Chapter 11: Computer Security, Ethics, and Privacy Computer Viruses 1. Virus: a potentially damaging computer program that affects your computer negatively 2. Worm: a program that copies itself repeatedly in memory or on disk drive until no memory or disk space remains. 3. Trojan Horse: a program that hide within or looks like a legitimate program and will deliberately alters the computer s operations. Protection from viruses, worm, and Trojan horse 1. Trusted source 2. Antivirus program: can identify and remove computer viruses 3. Virus Signature: a known specific pattern of virus code.

12 4. Inoculate: antivirus records information such as file size in a separate inoculation file. 5. Quarantine: a separate area of a hard disk that holds the infected file until you can remove its virus. 6. Beware of virus hoax: an message in the form of a chain letter that request you to send it to others. Other Computer Attack 1. Botnets: internet used as part of a network that attack other networks 2. Denial of service attacks: assault whose purpose is to disrupt computers access to an internet service. 3. Back Doors: program that allow users to bypass security controls when accessing a program. 4. IP Spoofing: a technique intruders use to make their network or internet transmission appear legitimate to a victim computer. Software Theft Software piracy: unauthorized and illegal duplication of copyrighted software. Information Theft : Safeguards against Information Theft 1. Encryption: the process of converting readable data into unreadable characters to prevent unauthorized access. 2. Plaintext: readable data 3. Ciphertext: the encrypted data 4. Encryption Key: the recipient of the data uses to decrypt cipher text. Information Privacy Electronic profiles: customer profile enters in a form in various media.

13 Cookies: a small file that a web server store on your computer. Typically contain data about you, such as user name, and user preferences. Phishing: an official looking that attempts to obtain your personal and financial account. Spyware: a program placed on a computer without the user s knowledge that secretly collects information about the user. Spam: an unsolicited message sent to many recipients at once Privacy Laws: law regarding the storage and disclosure of personal data Social Engineering: gaining unauthorized access or obtaining confidential information by taking advantage of the human nature (lure user and password) Employee monitoring: involves the use of computers to observe, record, and employee s use of computer. Content Filtering: the process of restricting access to certain material on web Health Concerns of Computer Use 1. Repetitive Strain Injury 2. Ergonomic and Workplace Design 3. Computer Addiction 4. Green Computing Chapter 14 : Enterprise Computing Level of users in an organization - Executive Management: focus on the company s overall goals. - Middle Management: applies specific programs and plans - Operational Management: day-to-day activities within the company- making operational decision

14 - Non-Management Employee: production, clerical, and staff personnel. General purpose Information Systems 1. Office Information Systems: increases employee productivity and assist with communications among employee 2. Transaction Processing Systems: captures and processes data from day-today business activities 3. Management Information System: generates accurate, timely, and organized information, so managers and other users can make decision, solve problems. 4. Decision Support System: helps user to analyze data and make decision. By using Internal Source of data and External Source 5. Expert Systems: captures and stores the knowledge of human reasoning and decision making 6. Integrated Information Systems: combined various system into one Enterprise Wide Technologies and Methodologies 1. Portal 2. EDI 3. Data Warehouse 4. Extranet 5. Document Management Systems 6. Workflow 7. Virtual Private Network Enterprise Hardware 1. Redundant Array of Independent Disks 2. Network Attached Storage 3. Enterprise Storage System 4. Blades Servers 5. High-Availability Systems 6. Scalability 7. Utility and Grid Computing 8. Interoperability

15 Back Up Procedure 1. Full Backup: copies all of the files in computer. It provides the best protection against data loss. 2. Differential Backup: copies only the files that have changed since the last full backup. 3. Incremental Backup: copies only the files that have changed since the last full or last incremental backup 4. Selective Backup: allows the user to choose specific files to backup. 5. Continuous Data Protection: a backup plan in which all data is backed up whenever a chance is made Disaster Recovery Plan 1. The emergency plan: steps taken immediately after a disaster strikes 2. The Backup plan: a company uses backup files to resume information processing 3. The Recovery Plan: specifies the action to be taken to restore full information processing operations which differs for each type of disaster. 4. The Test Plan: to assure that the disaster plan is completed, it should be tested.

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Chapter 11 Computers and Society, Security, Privacy, and Ethics Objectives Computers and Society, Security, Privacy, and Ethics Describe the the types of of computer security risks Identify ways to to safeguard against computer viruses, worms, and and Trojan horses

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Chapter 9 Communications and Networks

Chapter 9 Communications and Networks Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications

More information

Lecture 6: Operating Systems and Utility Programs

Lecture 6: Operating Systems and Utility Programs Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3.

Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3. Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3. Instructions 4. Describe the information processing

More information

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two

More information

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy Montgomery College Course Designator/Course Number: CS 11 Course Title: Computer Literacy Course Length: 3 credits 3 5-minute meetings per week or equivalent Course Description: An introduction to the

More information

Discovering Computers 2008. Chapter 3 Application Software

Discovering Computers 2008. Chapter 3 Application Software Discovering Computers 2008 Chapter 3 Application Software Chapter 3 Objectives Identify the categories of application software Explain ways software is distributed Explain how to work with application

More information

Computers and Society: Security and Privacy

Computers and Society: Security and Privacy 1 Chapter 12 Computers and Society: Security and Privacy 2 Chapter 12 Objectives 3 Computer Security: Risks and Safeguards What is a computer security risk? 4 Computer Security: Risks and Safeguards 1

More information

Chapter 3. Application Software. Chapter 3 Objectives. Application Software. Application Software. Application Software. What is application software?

Chapter 3. Application Software. Chapter 3 Objectives. Application Software. Application Software. Application Software. What is application software? Chapter 3 Objectives Chapter 3 Application Software Identify the the categories of of application software Explain ways software is is distributed Explain how to to work with application software Identify

More information

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4. Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Chapter 3. Application Software. Chapter 3 Objectives. Application Software

Chapter 3. Application Software. Chapter 3 Objectives. Application Software Chapter 3 Objectives Chapter 3 Application Software Identify the categories of application software Explain ways software is distributed Explain how to work with application software Identify the key features

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy Chapter 12 Objectives Chapter 12 Computers and Society: and Privacy p. 12.2 Identify the various types of security risks that can threaten computers Recognize how a computer virus works and take the necessary

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

Chapter 8 Operating Systems and Utility Programs

Chapter 8 Operating Systems and Utility Programs Operating Systems What are the functions of an? start the computer provide a user interface manage programs Chapter 8 Operating Systems and Utility Programs administer security control a network manage

More information

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems. Chapter 8 Objectives Chapter 8 s and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems

Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems What are Computer Ethics? Computing Issues Moral guidelines that govern use of computers and information systems Part I: Ethics Unauthorized use of computer systems Information privacy Intellectual property

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Chapter 3 Software. Computer Concepts 2013. 3 Chapter Contents. 3 Section A: Software Basics 13-09-27

Chapter 3 Software. Computer Concepts 2013. 3 Chapter Contents. 3 Section A: Software Basics 13-09-27 Chapter 3 Software Computer Concepts 2013 3 Chapter Contents Ø Section A: Software Basics Ø Section B: Office Suites Ø Section C: Installing Software and Upgrades Ø Section D: Buying Software Ø Section

More information

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.) Revised 5/2010 NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.) Course Description Covers computer concepts and Internet skills and uses a software

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

G11_EoT_Solved Quizzes and Worksheets

G11_EoT_Solved Quizzes and Worksheets G11_EoT_Solved Quizzes and Worksheets Part I: Selected Questions What type of hackers is responsible for break into a system to steal credit card details? A. Theft of services B. Theft of information C.

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

System Administrator Guide

System Administrator Guide System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,

More information

10605164 Medical Networks and Operating Systems

10605164 Medical Networks and Operating Systems Western Technical College 10605164 Medical Networks and Operating Systems Course Outcome Summary Course Information Description Instructional Level Total Credits 4.00 Total Hours 108.00 A course studying

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

How to Search the Internet

How to Search the Internet Technology In Action 1 Technology In Action Chapter 3 Using the Internet: Making the Most of the Web s Resources 2 Topics Internet basics Internet data Internet service providers Web browsers URLs Hyperlinks

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE BUILDING PURPOSE In today s society, it is critical for students to be able to use the vast amount of technology available to them. Computer literacy will provide students with skills they need to succeed

More information

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT InternationalLabourOrganization OrganisationinternationaleduTravail OrganizaciónInternacionaldelTrabajo Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions:

More information

How To Manage A Network Safely

How To Manage A Network Safely ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first

More information

Lesson 24 Network Fundamentals

Lesson 24 Network Fundamentals Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define

More information

Sample Career Ladder/Lattice for Information Technology

Sample Career Ladder/Lattice for Information Technology Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

E-Business, E-Commerce

E-Business, E-Commerce E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect

More information

Connecting to the Internet

Connecting to the Internet The Internet & The World Wide Web CIT 100 Norm Downey What is the Internet? A global computer network made up of thousands of privately and public owned computers and computer networks. More than one billion

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Go Wireless. Open up new possibilities for work and play

Go Wireless. Open up new possibilities for work and play Go Wireless Open up new possibilities for work and play Start with 3 pieces A typical home or small-office wireless LAN requires only 3 pieces of hardware. With these 3 pieces, you re ready to get started!

More information

Computer Networks and Internet working

Computer Networks and Internet working Computer Networks and Internet working By completing this module you will be able to understand and learn the following: Computer Networking, Types of Networks and network Services Different Cables used

More information

Telecommunications, the Internet, and Wireless Technology

Telecommunications, the Internet, and Wireless Technology Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks

More information

Living Online. Module C

Living Online. Module C Living Online Module C Unit 7: Getting Connected Living Online The Living Online examination covers aspects of working in an Internet or networked environment, including basic knowledge of networks and

More information

Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE

Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE www.getintegra.com Version 10/10 Integra Telecom, Inc. Thank you for choosing Integra Telecom s DSL High Speed

More information

Fundamentals of Network Security - Theory and Practice-

Fundamentals of Network Security - Theory and Practice- Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring

More information

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation Technology Assessment Checklist for Small Businesses A quick way to help your small-business customers get the best technology. Today's small-business owners want reliable technology that helps them do

More information

Interactive welcome kit. 866.603.3199 Charter-Business.com CB.016.fibCD.0210

Interactive welcome kit. 866.603.3199 Charter-Business.com CB.016.fibCD.0210 CHARTER BUSINESS FIBER INTERNET Interactive welcome kit 866.603.3199 Charter-Business.com CB.016.fibCD.0210 CHARTER BUSINESS FIBER INTERNET 2 Turn your contacts on to affordable, powerful solutions from

More information

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Computer Concepts And Applications CIS-107-TE. TECEP Test Description Computer Concepts And Applications CIS-107-TE This TECEP tests content covered in a one-semester course in computer concepts and applications. It focuses on an overview of computers, including historical

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Computers Are Your Future. 2006 Prentice-Hall, Inc.

Computers Are Your Future. 2006 Prentice-Hall, Inc. Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth

More information

Century Commons' Internet Use

Century Commons' Internet Use Century Commons' Internet Use Please Note: Even though you are unable to access the Internet, the sites below are always available. Open up Internet Explorer and type any of these in your address bar to

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools

Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools Students should use technology and the Internet in an appropriate manner. Technology is an integral part of a student s educational

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

UTMB INFORMATION RESOURCES PRACTICE STANDARD

UTMB INFORMATION RESOURCES PRACTICE STANDARD IR Security Glossary Introduction Purpose Applicability Sensitive Digital Data Management Privacy Implications This abbreviated list provides explanations for typically used Information Resources (IR)

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

Student & Staff Access and Use of Networked Information Resources and Communications

Student & Staff Access and Use of Networked Information Resources and Communications Page 1 of 6 These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive and effective digital citizenship among students and staff. Digital

More information

High-Speed Broadband Internet Guide

High-Speed Broadband Internet Guide High-Speed Broadband Internet Guide Welcome Welcome to SkyBest High-Speed Broadband Internet. SkyBest High-Speed Broadband Internet allows for rapid downloading of large files, such as music and graphics.

More information

Information Technology Grades 11-12. Students will know and be able to: Basic Operations 1.1 (I)

Information Technology Grades 11-12. Students will know and be able to: Basic Operations 1.1 (I) Information Technology Grades 11-12 Basic Operations, Concepts, and Productivity Tools Basic Operations Word Processing Database Students will know and be able to: Identify the platform, version, properties,

More information

Chapter 7A. Functions of Operating Systems. Types of Operating Systems. Operating System Basics

Chapter 7A. Functions of Operating Systems. Types of Operating Systems. Operating System Basics Chapter 7A Operating System Basics Functions of Operating Provide a user interface Run programs Manage hardware devices Organized file storage 2 Types of Operating Real-time operating system Very fast

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Internet Jargon. Address: See Uniform Resource Locator.

Internet Jargon. Address: See Uniform Resource Locator. Internet Jargon Address: See Uniform Resource Locator. Address Bar: Part of the window in Internet Explorer that displays the URL of the web site currently being viewed. This is also the location where

More information

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: 646-151 Doc Type: Q & A with Explanations Total Questions: 50

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: 646-151 Doc Type: Q & A with Explanations Total Questions: 50 Question: 1 Which network security strategy element refers to the deployment of products that identify a potential intruder who makes several failed logon attempts? A. test the system B. secure the network

More information

CamGuard Security System CamGuard Security System Manual

CamGuard Security System CamGuard Security System Manual CamGuard Security System Manual JMC Electron Co.,LTD Brief Introduction... 3 Features... 3 System Requirements... 3 Configuration... 4 Add Camera... 4 Device Options... 4 About Alarm... 5 Alarm Actions...

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Network Technology CMP-354-TE. TECEP Test Description

Network Technology CMP-354-TE. TECEP Test Description Network Technology CMP-354-TE This TECEP tests knowledge of the fundamental concepts of data communications. Topics covered include: network architectures, topologies, media and devices, protocols, types

More information