Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Size: px
Start display at page:

Download "Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers."

Transcription

1 Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: Lesson length is subjective and will vary from instructor to instructor. Performance Objective: Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers. Specific Objectives: By the end of this lesson, students will be able to Define a computer system Identify the parts of a network Create a network with the following components: Workstation, Server, Modem, Hub, Switch, and Routers. Define the types of networks including Peer-to-Peer and Client Server (Ethernet, Token Ring, LAN, WAN) Identify the different types of operating systems Identify hackers and common security threats Preparation TEKS Correlations: Principles of Information Technology: (8) The student analyzes network systems. The student is expected to (A) identify hardware associated with telecommunications and data networking such as servers, routers, switches, hubs, and network connectors; (B) identify and describe various types of networks such as peer-to-peer, local area networks, wide area networks, wireless token ring, and Ethernet; (C) identify and describe functions of network operating systems. Instructor/Trainer

2 Instructional Aids: Networks and Hackers Presentation HANDOUT: Networks and Hackers Notes for the Presentation HANDOUT: Lab Assignment and Key; Quiz and Key Materials Needed: Instructional aids Paper for students to draw on Color pencils, markers, and/or crayons to draw with Flash cards for students to create review materials Equipment Needed: Projector for teacher computer Learner This is an introduction on networks and hackers for students. No previous knowledge is needed. Introduction MI Introduction (LSI Quadrant I): SAY, How many of you have ever logged onto a computer at school, the library, or a home office with more than one computer? ASK, Have you ever wondered how it all works? MI Outline Outline (LSI Quadrant II): Teachers can use the Networks and Hackers Presentation and Handout and Lab. I. Hand out the Teen Hacker Article Handout to the students to read. II. Hand out the Networks and Hackers Notes Handout or advise students to take notes during the presentation. Instructor Notes: I. Hand out this article for the students to read for homework ahead of this lesson. II. Hand out copies of the Network and Hacker Notes to each student, or you can advise each student to get ready to take notes.

3 III. Show the presentation, which covers the following concepts: a. Computer system b. Parts of a network I. Workstation ii. Server Iii. Modem iv. Hub V. Switch vi. Router C. Types of networks I. Peer-to-peer ii. Client server 1. Ethernet 2. Token ring 3. Lan 4. Wan d. Operating systems e. Hackers F. Security threats III. Students should be taking notes as you are showing the Networks and Hackers Presentation. IV. Hand out the Lab Assignment to students. They will create diagrams of the networks based on seniors listed. IV. Students should draw out 3 different types of networks listed on the Lab Assignment. Have them create a legend for the different parts of the network they are trying to draw like a box with the word Router for a router. V. Work through the SOHO portion of the lab together the key listed is one of many solutions. VI. Work through the SOHO setup as a class so that students understand what you are looking for. VII. Student groups need to finish up the Lab Assignment. V. Divide students into groups of two or three. Have them complete the Lab Assignment for the small office and world wide company.

4 VIII. Review for Networks and Hackers Quiz VI. After completion of the lab, have students create flash cards of the important terms to study for the quiz. Application MI Guided Practice (LSI Quadrant III): Do the SOHO portion of the lab as a class. MI Independent Practice (LSI Quadrant III): Hand out the Lab Assignment. Divide students into groups of two or three. Have each group work together on the following SAY, Students, now that you see how we have set up a SOHO, see if you and a partner can come up with one possible solution to the rest of the problems on the Lab Assignment. Summary MI Review (LSI Quadrants I and IV): SAY, Now that we have a good understanding about Networks, we need to study for our quiz. In your groups, each of you needs to create your own set of flash cards to study. Work together as a group to make sure that you do not miss any important concepts or terms. I will need to review these to make sure that I feel you are not missing anything. I would also draw out our SOHO example so that you do not forget it later. Evaluation MI Informal Assessment (LSI Quadrant III):

5 Teacher checks for understanding while going through the SOHO portion of the lab as a class. Review of student-created flash cards MI Formal Assessment (LSI Quadrant III, IV): Completion of the rest of the Lab Assignment done in groups. Networks and Hackers Quiz

6 Icon MI Teaching Strategies Verbal/ Linguistic Logical/ Mathematical Visual/Spatial Musical/ Rhythmic Bodily/ Kinesthetic Intrapersonal Interpersonal Lecture, discussion, journal writing, cooperative learning, word origins Problem solving, number games, critical thinking, classifying and organizing, Socratic questioning Mind-mapping, reflective time, graphic organizers, color-coding systems, drawings, designs, video, DVD, charts, maps Use music, compose songs or raps, use musical language or metaphors Use manipulatives, hand signals, pantomime, real life situations, puzzles and board games, activities, roleplaying, action problems Reflective teaching, interviews, reflective listening, KWL charts Cooperative learning, roleplaying, group brainstorming, cross-cultural interactions Personal Development Strategies Reading, highlighting, outlining, teaching others, reciting information Organizing material logically, explaining things sequentially, finding patterns, developing systems, outlining, charting, graphing, analyzing information Developing graphic organizers, mindmapping, charting, graphing, organizing with color, mental imagery (drawing in the mind s eye) Creating rhythms out of words, creating rhythms with instruments, playing an instrument, putting words to existing songs Moving while learning, pacing while reciting, acting out scripts of material, designing games, moving fingers under words while reading Reflecting on personal meaning of information, studying in quiet settings, imagining experiments, visualizing information, journaling Studying in a group, discussing information, using flash cards with other, teaching others Naturalist Existentialist Natural objects as manipulatives and as background for learning Socratic questions, real life situations, global problems/questions Connecting with nature, forming study groups with like-minded people Considering personal relationship to larger context

7 Networks and Hackers Notes: Computer System A basic computer system is made up of two parts: (physical equipment that you can touch), and (programs installed on the computer). Computer Networks Computer Networks allow users to over distances. They allow,, and, making them a necessary tool for offices, schools, and homes all over the world. A computer network consists of several the network function correctly as a whole. Network: Parts of a Network, each of which is important to making Workstations These are known as. The computer you use at home or school would be called a workstation in a network. Servers Servers can look like desktop computers; however, most do not look like your normal computer. Servers do not really need, and. What they really need is hard drives. In most schools, when you save your work, you are saving to a server. By doing this, you can access your schoolwork from any computer that is on your school network. Modems A modem is a device that enables computers to they receive from a network or send data in the proper form along a network. Hubs A hub is sort of like a car radio. Every computer that has that section of network (like a radio station) can hear that is being transmitted. All the computers that are connected to that hub receive all the information that goes through it. Usually, if you have a hub, you also have a.

8 Switches A switch is more complex than a hub and works a lot like a two-way radio. In a room full of people, only the person holding the other radio can hear what is being said. It keeps track of which computers are where, and when something comes in, it sends it only to that --not every computer on that section of the network. It is more secure than a hub and faster than a hub, but not as powerful as a router. Routers Routers work a lot like a. Each computer is given its own unique number by the router. When information comes into the router, it is sent along to the correct number, or in this case,. There are more options built into routers than there are available to switches. A router can have the equivalent phone options of. This is beyond a switch s capabilities. Peer- to- Peer Network This is a type of network where the computers in the network share among each other. Every computer on this network is ; all the computers run the same for sharing., and,, and other plugged into, otherwise known as managed by. and are shared by the machine they are Advantages It is to set up a peer-to-peer network initially. You may already own the needed to get a peer-to-peer network setup. This type of network does not require the installation of dedicated or expensive security software.

9 Disadvantages If you have a peer-to-peer network, you need to be aware that on the, such as printers, place a special demand in the network. Also, due to the nature of this type of network, all of the computers on the network provide access to all of the machine s resources. The down side of this is that you can unintentionally expose to all the other users on the network. There is also no or from hackers, viruses, etc. Peer-to-Peer Operating Systems In the peer-to-peer network operating system, each workstation has an operating system that tells them how to with each other. and Name some software packages that allow this type of network: Client Server Networks Ethernet Ethernet is a type of basis of most LANs. between computers that forms the It also serves as one of the main methods for connecting a computer or network to an. The origin of Ethernet was the idea of connecting several computers together in a network via ; since that time, it has evolved into a much more sophisticated system that uses specialized that connect to a central hub or router to network several computers together.

10 LAN LAN stands for. A local area network is a group of computers that are together that share internet access, file access, applications, storage, and allow computers to share printers and scanners. LAN Issues For a LAN to work properly, a must be installed on the primary computer that is connected to the internet. Each computer connected to the LAN must have an The other issue with a LAN is that they are usually confined in a. installed. WAN WAN stands for. A WAN is a collection of regular that are all interconnected to form one. Oftentimes, schools and even large companies will operate a WAN on premises. Advantages : School networks can be created for students to access files throughout the school district. : Networks speed up the file sharing and saving process. Disadvantages : WANs save money over time, but they are expensive to set up at first. : WANs require maintenance of the network, which costs both money and time. Token Rings Token rings work by sending data from one machine to the next around a until it ends up back where it started.

11 It also uses a special token passing protocol, which means that a machine can only use the network when it has control of the. This ensures that there are no collisions because only one machine can use the network at any given time. Token Ring Issues In order for token rings to work, all computers must check for or tokens. all connected computers must a new leader to a new token. Client/Server Operating Systems Client/Server setup allows the network to centralize functions and applications in or file server. File servers become the of this system and provide well as providing security. to files and resources, as Workstations have to the resources to files on the file servers. Client/Server Operating Systems There are many different kinds of software out there for this type of network. Name some of the most popular ones. Advantages This type of network makes it easy to install and. The server can be remotely, and you can have both non-pcs and PCs on the network. Client/Server operating systems

12 Disadvantages: Client/Servers depend on their servers. When they go down, the will no longer work. There is a hefty for a client/server network. It pays off in the long run, but it requires money to set it up. Large networks will require to maintain a client/server network and to work out the kinks when problems arise. Network Threats Hackers A computer hacker is someone who finds in a computer s security system to break into another machine. Hackers usually collect information on the target computer and then try to find Security Threats The most common threats are into the computer system. : this is unwanted commercial . : can cause your computer to slow down or even destroy your hard drive. : this is software that gets installed on the computer. It can cause annoying pop-ups or even steal information. : hackers steal important information: client information, bank account numbers, etc. Hackers Networks can take steps to protect their networks. The most common are

13 Networks and Hackers Notes: KEY Computer System A basic computer system is made up of two parts: hardware (physical equipment that you can touch) and software (programs installed on the computer). Computer Networks Computer networks allow users to connect over distances. They allow file sharing, hardware sharing, and instant communication, making them a necessary tool for offices, schools, and homes all over the world. A computer network consists of several components, each of which is important to making the network function correctly as a whole. Network: Parts of a Network Workstations These are known as desktop computers. The computer you use at home or school would be called a workstation in a network. Servers Servers can look like desktop computers; however, most do not look like your normal computer. Servers do not really need monitors, graphics, and sound cards. What they really need is hard drives. In most schools, when you save your work, you are saving to a server. By doing this, you can access your schoolwork from any computer that is on your school network. Modems A modem is a device that enables computers to interpret data they receive from a network or send data in the proper form along a network. Hubs A hub is sort of like a car radio. Every computer that has that section of network (like a radio station) can hear everything that is being transmitted. All the computers that are connected to that hub receive all the information that goes through it. Usually, if you have a hub, you also have a router. Switches A switch is more complex than a hub and works a lot like a two-way radio. In a room full of people, only the person holding the other radio can hear what is being said. It keeps track of which computers are where, and when something comes in, it sends it only to that specific computer, not every computer on that section of the network. It is more secure than a hub and faster than a hub, but it is not as powerful as a router. Routers Routers work a lot like a telephone system. Each computer is given its own unique number by the router. When information comes into the router, it is then sent along to the correct number, or in this case, computer.

14 There are more options built into routers than there are available to switches. A router can have the equivalent phone options of call screening and caller ID. This is beyond a switch s capabilities. Peer-to-Peer Network This is a type of network where the computers in the network share resources among each other. Every computer on this network is equal; all the computers run the same networking software and file systems for sharing. Printers, scanners, and other external devices are shared by the machine they are plugged into, otherwise known as managed by. Advantages It is less expensive to set up a peer-to-peer network initially. You may already own the software needed to get a peer-to-peer network setup. This type of network does not require the installation of dedicated server hardware or expensive security software. Disadvantages If you have a peer-to-peer network, you need to be aware that shared resources, such as printers, place a special demand on the computers in the network. Also, due to the nature of this type of network, all of the computers on the network provide access to all of the machine s resources. The down side of this is that you can unintentionally expose private files to all the other users on the network. There is also no data security or protection from hackers, viruses, etc. Peer-to-Peer Operating Systems In the peer-to-peer network operating system, each workstation has an operating system that tells them how to store and share resources with each other. There are software packages that allow this type of network. *Note: Identify and discuss in class. Client Server Networks Ethernet Ethernet is a type of connection between computers that forms the basis of most LANs. It also serves as one of the main methods for connecting a computer or network to an Internet hub. The origin of Ethernet was the idea of connecting several computers together in a network via coaxial cables; since that time, it has evolved into a much more

15 sophisticated system that uses specialized Ethernet cables that connect to a central hub or router in order to network several computers together. LAN LAN stands for Local Area Network. A local area network is a group of computers that are linked together that share internet access, file access, applications, storage, and allow connected computers to share printers and scanners. LAN Issues For a LAN to work properly, a router must be installed on the primary computer that is connected to the internet. Each computer connected to the LAN must have an Ethernet card installed. The other issue with a LAN is that they are usually confined in a single building. WAN WAN stands for Wide Area Networks. A WAN is a collection of regular local area networks that are all interconnected to form one giant network. Oftentimes, schools and even large companies will operate a WAN on premises. Advantages Flexible Access: School networks can be created for students to access files throughout the school district. Speed: Networks speed up the file sharing and saving process. Disadvantages Expensive to Install: WANs save money over time, but they are expensive to set up at first. Time: WANs require maintenance of the network, which costs both money and time. Token Rings Token rings work by sending data from one machine to the next and so on around a ring until it ends up back where it started. It also uses a special token passing protocol, which means that a machine can only use the network when it has control of the token; this ensures that there are no collisions because only one machine can use the network at any given time. Token Ring Issues In order for token rings to work, All computers must check for lost or duplicate tokens. All connected computers must vote a new leader to create a new token.

16 Client/Server Operating Systems Client/Server setup allows the network to centralize functions and applications in one or more file server. File servers become the heart of this system and provide access to files and resources, as well as providing security. Workstations have access to the resources to files on the file servers. Client/Server Operating Systems There are many different kinds of software out there for this type of network. Name some of the most popular ones. (*Note: Discuss this in class) Advantages This type of network makes it easy to install new technology and new elements. The server can be accessed remotely, and you can have both non-pcs and PCs on the network. Client/Server Operating Systems Disadvantages Client/Servers depend on their servers. When they go down, the network will no longer work. Network Threats There is a hefty investment for a client/server network. It pays off in the long run, but it requires money to set it up. Large networks will require dedicated staff to maintain a client/server network and to work out the kinks when problems arise. Hackers A computer hacker is someone who finds access in a computer s security system to break into another machine. Hackers usually collect information on the target computer and then try to find access into the computer system. Security Threats The most common threats are

17 Spam: this is unwanted commercial . Viruses: can cause your computer to slow down or even destroy your hard drive. Adware/Malware: this is software that gets installed on the computer. It can cause annoying pop-ups or even steal information. Information Threats: Hackers steal important information: client information, back account numbers, etc. Hackers Networks can take steps to protect their networks. The most common are. Installing a firewall Advising caution on the net Making sure the network is password protected, especially if using a wireless network.

18 Networks and Hackers Lab Assignment: Case Studies: 1. Together, we are going to draw out a SOHO (Small Office, Home Office) Network. We need to have the following parts in our design: o Desktop computer o Printer o Scanner o Wireless router o A laptop 2. We have a school computer lab that wants a peer-to-peer network created for this lab. They have the following items that need to be in the design: o 15 desktop computers o 5 scanners o 1 color printer o 1 black and white printer 3. Now, come up with your own scenario and solution. See who can be the most creative!

19 Networks and Hackers Lab Assignment: KEY Case Studies: 1. Together, we are going to draw out a SOHO (Small Office, Home Office) Network. We need to have the following parts in our design: o Desktop computer o Printer o Scanner o Wireless router o A laptop Listed below are two versions of what this key can look like. This is just a sample students can draw this out in so many different ways. Wireless Router Wireless Router Desktop Computer Laptop Printer Scanner

20 2. We have a School Computer Lab that wants a peer-to-peer network created for this lab. They have the following items that need to be in the design: o 15 desktop computers o 5 scanners o 1 color printer o 1 black and white printer

21 Networks and Hackers Quiz True/False Indicate whether the statement is true or false. 1 All computer networks are fairly simple, containing only a few components. A True B False 2 A hub is like a car radio. Every computer on that section of the network can hear everything that is being transmitted. A True B False 3 A switch is more powerful than a router. A True B False 4 A WAN is a collection of LANs forming one giant network. A True B False 5 WANs are a cheap investment. A True B False 6 There are many advantages to having a client/server operating system, one of which is that you can have both non-pcs and PCs on the same network. A True B False Multiple Choice Identify the choice that best completes the statement or answers the question. 7 All computer systems are made up of two parts: A Hardware and Firewalls C Servers and Routers B Software and Computers D Hardware and Software 8 A workstation is a A server B desktop computer C Router D None of the Above

22 9 A Modem A is used only for the Internet B is installed on every computer ever made C interprets data from a network D is all you need to make a network. 10 In this type of network, all the connected computers are equal. A Ethernet B Client/Server C D Peer-To-Peer Server/Client 11 The Ethernet came about originally by A telephone cables B coaxial cables C wires D none of the above Multiple Response Identify one or more choices that best complete the statement or answer the question. 12 LANs allow for the following resources to be shared: A Files C Printers B Internet D Scanners 13 The most common security threats are: A Spam B Firewalls C Viruses D Time Bombs Case 14 Draw out a SOHO set that contains the following parts: Desktop Computer Printer Scanner Wireless Router 2 Laptops Photo Printer

23 Networks and Hackers Quiz Answer Section TRUE/FALSE 1 ANS: F That may be true of the SOHO (Small Office, Home Office) networks, but most global companies have WANs with hundreds of networks inside them. They can have thousands of components. 2 ANS: T 3 ANS: F A router is more powerful than a switch. 4 ANS: T 5 ANS: F Actually WANs are a major investment, but they pay off over time. 6 ANS: T MULTIPLE CHOICE 7 ANS: D It is made up of both hardware you can touch and software installed on the computer. 8 ANS: C 9 ANS: C A modem is a device that enables computers to interpret data they receive from a network. 10 ANS: C All of the computers will share resources, and all the computers are equal. In both Ethernet and client/server networks, there is a server who is considered the boss. 11 ANS: B MULTIPLE RESPONSE 12 ANS: A, B, C, D All are allowed to be shared on a LAN 13 ANS: A, C Spam, viruses, adware, and information theft are the most common security threats. CASE 14 ANS: The student should have drawn this out just like the independent practice done as a class. The only parts added are an extra laptop and photo printer.

24

Lesson Plan. Course Title: Advanced Computer Programming Session Title: Databases. Preparation

Lesson Plan. Course Title: Advanced Computer Programming Session Title: Databases. Preparation Lesson Plan Course Title: Advanced Computer Programming Session Title: Databases Lesson Duration: 2-3 days Performance Objective: Upon completion of this assignment, the student will be able to: identify

More information

Lesson Plan Course Title: Web Technologies Session Title: Website Administration

Lesson Plan Course Title: Web Technologies Session Title: Website Administration Lesson Duration: Approximately 10 hours Performance Objective: Lesson Plan Course Title: Web Technologies Session Title: Website Administration Following the completion of this lesson, students will understand

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Computer Maintenance Session Title: Disaster Recovery and Preventative Maintenance Lesson Duration: 3 to 4 one-hour sessions with 1 additional one-hour session for the exam (Lesson

More information

Lesson Plan. Course Title: Digital and Interactive Media Session Title: College and Career Poster

Lesson Plan. Course Title: Digital and Interactive Media Session Title: College and Career Poster Lesson Plan Course Title: Digital and Interactive Media Session Title: College and Career Poster Lesson Duration: 3 Hours Performance Objective: Upon completion of this assignment, the student will have

More information

Lesson Plan. Course Title: Web Technologies Session Title: Web Site Planning & Design

Lesson Plan. Course Title: Web Technologies Session Title: Web Site Planning & Design Lesson Plan Course Title: Web Technologies Session Title: Web Site Planning & Design Lesson Duration: 3 Hours Performance Objective: Upon completion of the lesson, students will understand how to develop

More information

Lesson Plan. Preparation. TEKS Correlations: 1C: Examine the role of certifications, resumes, and portfolios in the Web Technologies profession.

Lesson Plan. Preparation. TEKS Correlations: 1C: Examine the role of certifications, resumes, and portfolios in the Web Technologies profession. Lesson Plan Course Title: Session Title: Using Online Search Tools to Locate and Evaluate Information. Lesson Duration: 2 hours Performance Objective: Upon completion of the lesson, students will be able

More information

Lesson Plan Course Title: Web Technologies Session Title: Internet Fundamentals & Background

Lesson Plan Course Title: Web Technologies Session Title: Internet Fundamentals & Background Lesson Plan Course Title: Web Technologies Session Title: Internet Fundamentals & Background Lesson Duration: 2 Hours Performance Objective: Upon completion of the lesson, students will have an understanding

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Principles of Information Technology Lesson Duration: 45 Minutes Session Title: Keyboards, Mice, and Other Input Devices Performance Objective: Upon completion of this assignment,

More information

Lesson Plan. Course Title: Computer Programming. Session Title: Software Life Cycle

Lesson Plan. Course Title: Computer Programming. Session Title: Software Life Cycle Lesson Plan Course Title: Computer Programming Session Title: Software Life Cycle Lesson Duration: 2 hours Performance Objective: Upon completion of this assignment, the student will understand the software

More information

Lesson Plan. Course Title: Principles of Information Technology Session Title: Understanding Types & Uses of Software

Lesson Plan. Course Title: Principles of Information Technology Session Title: Understanding Types & Uses of Software Lesson Plan Course Title: Principles of Information Technology Session Title: Understanding Types & Uses of Software Lesson Duration: Approximately 5 hours Performance Objective: Upon completion of this

More information

Lesson Plan. Course Title: Computer Maintenance Session Title: Numbering Systems

Lesson Plan. Course Title: Computer Maintenance Session Title: Numbering Systems Lesson Plan Course Title: Computer Maintenance Session Title: Numbering Systems Lesson Duration: Lesson length is subjective and will vary from instructor to instructor Performance Objective: Upon completion

More information

Lesson Plan. Preparation. 130.272(c). Principles of Information Technology (One-Half to One Credit).

Lesson Plan. Preparation. 130.272(c). Principles of Information Technology (One-Half to One Credit). Lesson Plan Course Title: Principles of Information Technology Session Title: Peripheral Devices Lesson Duration: Will vary from instructor to instructor Performance Objective: Upon completion of this

More information

Lesson Plan. Course Title: Digital and Interactive Media Session Title: Emerging Technologies

Lesson Plan. Course Title: Digital and Interactive Media Session Title: Emerging Technologies Lesson Plan Course Title: Digital and Interactive Media Session Title: Emerging Technologies Lesson Duration: 3 Hours Performance Objective: Upon completion of this assignment the student will be able

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Web Technologies Session Title: Planning & Designing Client Websites Lesson Duration: Varies but would be a minimum of one week. Performance Objective: Upon completion of this

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Computer Maintenance Session Title: Hard Drives Lesson Duration: 90 Minutes Performance Objective: Upon completion of this assignment, the student will be able to recognize a

More information

Lesson Plan. Instructor/Trainer References: Content developer knowledge

Lesson Plan. Instructor/Trainer References: Content developer knowledge Lesson Plan Course Title: Web Technologies Session Title: Website Publishing/Going Live! Lesson Duration: Estimated 90 Minutes and will vary from instructor to instructor Performance Objective: Upon completion

More information

Lesson Plan. Course Title: Advanced Computer Programming Session Title: Project Management Basics

Lesson Plan. Course Title: Advanced Computer Programming Session Title: Project Management Basics Lesson Plan Lesson Duration: Weeks/Days/Hours/Minutes 3 weeks Performance Objective: Course Title: Advanced Computer Programming Session Title: Project Management Basics Upon completion of this assignment,

More information

Lesson 24 Network Fundamentals

Lesson 24 Network Fundamentals Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Portfolio Information Practicum in Interior Design Lesson Plan Performance Objective Upon completion of this assignment, the student will be able to create a portfolio to document personal knowledge and

More information

Understand VLANs, Wired LANs, and Wireless LANs

Understand VLANs, Wired LANs, and Wireless LANs LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Statistical Process Control (SPC) Tools: Gantt Chart Manufacturing Engineering Lesson Plan Performance Objectives After completing this lesson, students will be able to discuss the purpose of using a Gantt

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency

More information

Lesson Plan. Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media. Performance Objective:

Lesson Plan. Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media. Performance Objective: Lesson Plan Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media Performance Objective: After completing this lesson, the student will understand that Advertising

More information

Lesson Plan - Time Value of Money

Lesson Plan - Time Value of Money Lesson Plan - Time Value of Money Course Title Money Matters Lesson Title Time Value of Money Specific Objective Explain the time value of money Performance Objectives: The learner will Discuss how saving

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Animation Overview of the Industry Arts, AV, Technology, and Communication. Lesson Plan

Animation Overview of the Industry Arts, AV, Technology, and Communication. Lesson Plan Animation Overview of the Industry Arts, AV, Technology, and Communication Lesson Plan Performance Objective Upon completion of this assignment, the student will have a better understanding of career and

More information

Preparation. TEKS Correlations:

Preparation. TEKS Correlations: Lesson Plan Course Title: Principles of Business Management, Finance, and Marketing Session Title: Financial Exchanges Performance Objective (LSI Quadrant 1- Why are we doing this?): The purpose of this

More information

Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses.

Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses. Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses. Veeramani Shanmugam s.veeramani@curtin.edu.my Lenin Gopal lenin@curtin.edu.my Zeya

More information

2016 Frontier Communications. Here s your guide to easy installation. Get the most out of Frontier High-Speed Internet.

2016 Frontier Communications. Here s your guide to easy installation. Get the most out of Frontier High-Speed Internet. 2016 Frontier Communications Here s your guide to easy installation. Get the most out of Frontier High-Speed Internet. Congratulations on choosing Frontier High-Speed Internet. In this guide, you ll find

More information

Lesson Plan. Preparation

Lesson Plan. Preparation 1 Lesson Plan Course Title: Concepts of Engineering and Technology Session Title: Emerging STEM Careers Performance Objective: After completing this lesson, students will be able to research, compare and

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Concepts of Engineering and Technology Session Title: Introduction to Engineering Fundamentals and Civilization - Part 1 Definitions Performance Objective: After completing Part

More information

Networking. Topic 5. Contents

Networking. Topic 5. Contents 97 Topic 5 Networking Contents 5.1 Introduction...................................... 99 5.2 Networks....................................... 99 5.2.1 The development of networks........................

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

Could you use more resources to help you learn & retain info? Do you create your own study aids to ensure you learn the course content?

Could you use more resources to help you learn & retain info? Do you create your own study aids to ensure you learn the course content? STUDY AIDS STUDY AIDS Could you use more resources to help you learn & retain info? Do you create your own study aids to ensure you learn the course content? A student s use of study aids consists of having

More information

Computer Networking. Definitions. Introduction

Computer Networking. Definitions. Introduction Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Lesson Plan. Performance Objective Upon completion of this lesson, each student will create a design plan for a tiny house.

Lesson Plan. Performance Objective Upon completion of this lesson, each student will create a design plan for a tiny house. Tiny Houses: Living Large in a Small Space Practicum of Architectural Design Lesson Plan Performance Objective Upon completion of this lesson, each student will create a design plan for a tiny house. Specific

More information

Credit History and Ratings

Credit History and Ratings Credit History and Ratings Course Title Money Matters Lesson Title Credit History and Ratings Performance Objectives: Understand and manage credit responsibly. Specific Objective : As a result of this

More information

Local Government and Leaders Grade Three

Local Government and Leaders Grade Three Ohio Standards Connection: Government Benchmark A Identify the responsibilities of the branches of the U.S. government and explain why they are necessary. Indicator 2 Explain the structure of local governments

More information

Introduction to Computers & Information Technology

Introduction to Computers & Information Technology 130.272. Principles of Information Technology a. General requirements. This course is recommended for students in Grades 9-10. Introduction to Computers & Information Technology 1 Introduction. Students

More information

In this chapter you will find information on the following subjects:

In this chapter you will find information on the following subjects: 17 1. From XP to Vista Microsoft, the creator of Windows, has published various versions of the Windows operating system over the past two decades. Windows Vista is the latest version, the successor to

More information

Component 4: Introduction to Information and Computer Science

Component 4: Introduction to Information and Computer Science Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science University, funded by the Department of Health

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

Introduction. Network Basics. Workstations. Server. Hub

Introduction. Network Basics. Workstations. Server. Hub Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you

More information

Days. Day 1. Reflection Teacher Responsibilities. Lesson Plans

Days. Day 1. Reflection Teacher Responsibilities. Lesson Plans Days Day 1 Lesson Plans Call the students to the carpet by the number of letters in their names. If your name has less than 5 letters, come to the carpet. If your name has more than 5 letters, come to

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

VPN Access to the NTEN Network

VPN Access to the NTEN Network VPN Access to the NTEN Network 2004 Networking and Telecommunications Engineering By: Leif Thordarson Virtual Private Network Documentation Page ii TABLE OF CONTENTS List of Illustrations and Tables...

More information

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two

More information

801.11n Wireless Broadband Router

801.11n Wireless Broadband Router 801.11n Wireless Broadband Router WNRT-626 Quick Installation Guide Table of Contents Hardware Installation... 4 Web Configuration... 6 Further Configuration... 8 Thank you for purchasing PLANET 801.11n

More information

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet experience friendlier, easier and more cutting edge. 43 Connecting

More information

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 May/June 2010 2 hours

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 May/June 2010 2 hours *865730009* UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education INFORMATION AND COMMUNICATION TECHNOLOGY 047/ Paper May/June 00 hours Candidates

More information

Lesson Plan Careers in Financial Management and Investment Planning

Lesson Plan Careers in Financial Management and Investment Planning Lesson Plan Careers in Financial Management and Investment Planning Course Title: Money Matters Lesson Title: Careers in Financial Management and and Investment Planning Specific Objective: Research and

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

Learning Style Inventory

Learning Style Inventory Learning Style Inventory To better understand how you prefer to learn and process information, place a check in the appropriate space after each statement below, then use the scoring directions at the

More information

Lesson Plan. Course Title: Concepts of Engineering and Technology Session Title: Green Energy Careers

Lesson Plan. Course Title: Concepts of Engineering and Technology Session Title: Green Energy Careers Lesson Plan Course Title: Concepts of Engineering and Technology Session Title: Green Energy Careers Performance Objective: After completing this lesson, students will be able to compare renewable and

More information

Information Technology Career Cluster Networking Systems and Support Course Number: 11.46200

Information Technology Career Cluster Networking Systems and Support Course Number: 11.46200 Information Technology Career Cluster Networking Systems and Support Course Number: 11.46200 Course Description: Wireless? Wired? How do you communicate? Now that students know the fundamental basics,

More information

Windows XP Virtual Private Network Connection Setup Instructions

Windows XP Virtual Private Network Connection Setup Instructions Windows XP Virtual Private Network Connection Setup Instructions Find your My Network Places icon on your desktop or in your control panel under Network and Internet Connections By default, this is NOT

More information

CPEi 800/825 Series. User Manual. * Please see the Introduction Section

CPEi 800/825 Series. User Manual. * Please see the Introduction Section CPEi 800/825 Series User Manual * Please see the Introduction Section Contents Introduction...iii Chapter 1: CPEi 800/825 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the

More information

Network Structure or Topology

Network Structure or Topology Volume 1, Issue 2, July 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Network Structure or Topology Kartik

More information

YOUR GUIDE TO BROADBAND HIGH-SPEED INTERNET ACCESS and HOME NETWORKING

YOUR GUIDE TO BROADBAND HIGH-SPEED INTERNET ACCESS and HOME NETWORKING YOUR GUIDE TO BROADBAND HIGH-SPEED INTERNET ACCESS and HOME NETWORKING SOHOWARE MAKES NETWORKING PERSONAL AND BROADBAND EASY TO UNDERSTAND. SOHOware, the company that invented consumer networking, always

More information

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit) BTEC First Diploma for IT Scheme of Work for Computer Systems unit 3 (10 credit unit) Overview On completion of this unit a learner should: 1 Know the of 4 Be able to. Num of hours Teaching topic Delivery

More information

Local Area Networks: Software and Support Systems

Local Area Networks: Software and Support Systems Local Area Networks: Software and Support Systems Chapter 8 Learning Objectives After reading this chapter, you should be able to: Identify the main functions of operating systems and network operating

More information

WIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.3 Remote Access Labs

WIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.3 Remote Access Labs WIRELESS TRAINING SOLUTIONS by vlogic, Inc L a b 0.3 Remote Access Labs WIRELESS TRAINING SOLUTIONS Hands-on Workshop and Lab Guide Table of Contents Connecting to the Wireless Training Solutions Network

More information

Technology/Internet Usage Workshop

Technology/Internet Usage Workshop Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

ResNet Guide. Information & Learning Services. Here to support your study and research

ResNet Guide. Information & Learning Services. Here to support your study and research ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,

More information

Related KidsHealth Links Articles for Kids:

Related KidsHealth Links Articles for Kids: Grades 3 to 5 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards

More information

4 Setting up Broadband 10 Setting up Fibre Broadband 16 Moving from Broadband to Fibre Broadband

4 Setting up Broadband 10 Setting up Fibre Broadband 16 Moving from Broadband to Fibre Broadband To make your life easier, we ve already set-up your Bright Box wireless router so it will connect to the internet once your broadband is ready. Simply plug it in and connect your device. If you d like

More information

LESSON 7: LEARNING MODELS

LESSON 7: LEARNING MODELS LESSON 7: LEARNING MODELS INTRODUCTION mobility motivation persistence sociological Think about your favorite class. Does the teacher lecture? Do you do experiments or go on field trips? Does the teacher

More information

Higher Computing Networking 1

Higher Computing Networking 1 Networking Briefly state what is meant by a computer network. What does the term topology refer to in this context? What are the ideal goals a network designer should aim for? Compare and contrast a star

More information

Contents. Section A Networking Basics... 1. 1 Learning the Basics... 3. Section B Wired Ethernet Networking... 17

Contents. Section A Networking Basics... 1. 1 Learning the Basics... 3. Section B Wired Ethernet Networking... 17 Contents Section A Networking Basics...................................... 1 1 Learning the Basics............................................. 3 Selecting a network connection........................................

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK DEFINTION & APPLICATIONS DEFINTION: A computer network is defined as the interconnection of two or more computers. It is done

More information

10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING

10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING 10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING PROJECTS Project 10.1 Project 10.2 Project 10.3 Project 10.4 Project 10.5 Project 10.6 Understanding Key Concepts Understanding Wireless Technologies Setting

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Audio Video Production Graphic Manipulations Arts, Audio/Visual Technology, and Communications Lesson Plan Performance Objective Upon completion of this lesson, the student will develop an understanding

More information

802.11n Wireless Broadband Router WNRT-625

802.11n Wireless Broadband Router WNRT-625 802.11n Wireless Broadband Router WNRT-625 Quick Installation Guide Table of Contents Introduction... 3 Package Content... 4 Hardware Installation... 5 Web Configuration... 8 Further Configuration...11

More information

Quick Reference Guide

Quick Reference Guide Welcome to BT Business Total Broadband Quick Reference Guide Follow the steps in this Quick Reference Guide to set up and start using your new BT Business Total Broadband service. The CD will help you

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

How to set up a router to share you broadband connection

How to set up a router to share you broadband connection How to set up a router to share you broadband connection Now that you've broadband at home, here's how to set up a router to connect your Macs and PCs. Shopping for routers is quite a chore especially

More information

N750 WiFi DSL Modem Router Premium Edition

N750 WiFi DSL Modem Router Premium Edition Support Thank you for purchasing this NETGEAR product. After installing your device, locate the serial number on the label of your product and use it to register your product at https://my.netgear.com.

More information

Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point

Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point Scenario Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point Digi Connect WAN and Digi Connect VPN are used for primary remote site connectivity.

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

First of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods.

First of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods. How to get a Internet Connection on your laptop This guide will help you to get an internet connection on your laptop either via Wi-Fi (e.g. in a café or hotel) or via Ethernet (the RJ45 type connector

More information

File Sharing. Peter Lo. CP582 Peter Lo 2003 1

File Sharing. Peter Lo. CP582 Peter Lo 2003 1 File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring

More information

Frequently Asked Questions

Frequently Asked Questions FAQs Frequently Asked Questions Connecting your Linksys router to the Internet 1 What computer operating systems does my Linksys router support? 1 Why can t I connect my computer or device to my router?

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Architectural Design Session Title: The Plumbing Plan Performance Objective: After completing this lesson the students will be able to: (a) explain the purpose and components

More information

Project to set up Wireless Network for Midwest Home Health Agency

Project to set up Wireless Network for Midwest Home Health Agency Project to set up Wireless Network for Midwest Home Health Agency Site Survey Report and Recommendations Submitted by: Asha B. Maghirang 12/8/2011 Midwest Home Health Agency is a home care provider, servicing

More information

Servicom G.R.I.P. Enabling Global Push-to-Talk over BGAN and Fleet Broadband Version 01 30.09.11

Servicom G.R.I.P. Enabling Global Push-to-Talk over BGAN and Fleet Broadband Version 01 30.09.11 Servicom G.R.I.P. Enabling Global Push-to-Talk over BGAN and Fleet Broadband Version 01 30.09.11 Contents 1 Overview... 1 2 Background... 1 3 Key Features... 2 4 Typical Users... 2 5 Benefits to BGAN and

More information

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka What is a network? A computer network is two or more computers connected together using a telecommunication system for the purpose

More information

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE BUILDING PURPOSE In today s society, it is critical for students to be able to use the vast amount of technology available to them. Computer literacy will provide students with skills they need to succeed

More information

Information Technology Career Field Pathways and Course Structure

Information Technology Career Field Pathways and Course Structure Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating

More information

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21 Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................

More information

QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR

QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR Mobile operators are critical to ensuring the overall efficiency and uptime of the production line and play a critical

More information