IT JARGON BUSTERS NETWORKING TERMS

Size: px
Start display at page:

Download "IT JARGON BUSTERS NETWORKING TERMS"

Transcription

1 IT JARGON BUSTERS NETWORKING TERMS WAN Wide Area The WAN is associated with connections over a large area. In most circumstances this is referred to as the Internet connection you will have at home or in work. Examples of this are ADSL Broadband, Fibre Broadband (such as BT Infinity), or more advanced connections that go outside of the business. It can also be referred to as the Public LAN Local Area PAN Personal Area VPN Virtual Private DHCP Dynamic Host Control Protocol PoE Power over Ethernet DNS Domain Name System The LAN is a network of computers and devices (such as printers), that are connected over a small area, such as in a home or office. These devices are typically connected either using an Ethernet cable, or by some form of Wireless device. This is referred to as a Private. A PAN is used to connect devices over a very small distance. Examples of this are connecting a laptop to a smartphone using Bluetooth. It is generally only used by one person. A VPN is usually used to connect a remote worker onto a computer network that belongs to a business. Alternatively, it can be used to link more than one sites at different locations together. Essentially, it creates a private link across a public network (e.g. the Internet). DHCP is commonly used in any Router and in Business networks may also be used from a Server. When a device is connected to a network, either by a wired Ethernet cable or wireless, DHCP will allocate the device a unique IP address on the network so that it can communicate in the correct way. Power is sent over an Ethernet (network) cable, to provide power as well as to send data. Essentially this cuts the requirement for a device such as an office phone to use a separate mains power supply. DNS is used to translate human readable names (such as the name of an internal device, or a website), into a machine readable IP address that is either on the local network, or an address on the Internet. Imagine it as a giant phonebook, where it is easier to remember a name as opposed to a number.

2 IP Address Internet Protocol Address IP addresses are unique identifiers of a device such as computer or printer on a. A laptop or printer would contain an Internal IP address. A router would also have a unique IP address, which is part of the Internet. VoIP Voice over Internet Protocol VoIP allows for communication over the Internet Protocol (e.g. the Internet or an Internal ). This can be in the form of Voice (similar to the handset that may be plugged into a BT socket at home), but nowadays contains extended features such as messages and video. Examples of this include Skype or Facetime, but also uses handsets for businesses. NETWORKING HARDWARE Ethernet A cable that is used to connect a device (such as a computer, printer or even a smart TV) to a network device (e.g. router or switch). It can then provide connectivity to the Internet for communication of any kind ( , Web browsing, or video and audio streaming) Switch A switch is used to expand a private network, and allow connection of more devices, whether it is printers or computers or any other device which would use an Ethernet cable. Switches can also incorporate PoE to provide power to office desk phones. The hardware typically has between 5 and 48 sockets available, one of which would need to be connected to a router or another switch to allow connectivity. Router A Router is a piece of hardware that allows connection between a local internal network (private) and an external network e.g. the Internet (public). It will usually be used for many functions such as a Firewall, DHCP, DNS and VPN. Nearly all Broadband providers will use a router of some sort to connect your devices to the Internet. Firewall A firewall is used to monitor and protect a network from unauthorised access. This could be to protect an internal network from attacks outside of the network (from the Internet). The majority of routers will have a firewall built in. Business firewalls will allow for a much greater set of options to block incoming data. Computers can also have a firewall installed for added security.

3 SECURITY Malware Malicious Software Malware is a generic term that is used when relating to viruses, spyware and ransomware. Below are some of the more popular types, but it is inevitable that different types will start to appear. Virus Spyware Trojan Horse Adware A virus is a program that reproduces itself, and attaches itself to other programs that are installed on a Computer. Its main intent is to take control of a Computer to perform tasks that aren't usually carried out, often without the user s knowledge. Spyware is used to gain information about a person or business, and send that information to someone else without the user knowing that it has been sent. A Trojan is used to hack a Computer by misleading the user of the purpose or intent. For example, you may receive a popup to say that you have a virus and to install a program that will fix this. This will actually install further viruses causing more problems, often asking for money to buy the program. The term derives from the Ancient Greeks that used a wooden horse to gain entrance into Troy. Adware is one of the most popular forms of malware, and is software that displays unwanted advertising when browsing online. It is also used to redirect your Internet Browser to a different search engine, with a purpose to generate revenue for the creator of the software. Ransomware Ransomware is a growing form of malware, and as the name suggests holds users ransom to their data unless a fee is paid. It does this by encrypting data such as word and excel documents along with photos, and requires the purchase of Bitcoins to assist in getting these decrypted and back to a usable state. Worm A computer Worm is a malicious piece of software that replicates itself and then spreads itself to other computers that are on a network. The purpose of a Worm can be to slow the network down as it spreads across and pass on the malicious code to others over the Internal, or as an example sending s out the senders of s in Microsoft Outlook as an attached file, therefore going outside of the original.

4 COMPUTER COMPONENTS CPU Central Processing Unit RAM Random Access Memory Commonly referred to as the processor, this is the brains of the Computer, where calculations are carried out. Terms such as Dual core and Quad core are associated with the processor and is the basic calculation component of the Processor RAM is used for storing data once it has been retrieved from a data storage device such as Hard Drive or Solid State Disk, allowing for faster calculations to be carried out. A greater amount of RAM allows for more programs and documents to be opened at once, without affecting performance. Motherboard A motherboard is the main circuit board found in a Computer. It is used to control all of the other components, and the flow of data between these.

5 DATA STORAGE This component found in a PC that holds all of the data. This includes the Operating System files (Such as Windows 10), Any applications (such as Microsoft Word or Excel), and your Personal data (such as Pictures, Music, Videos and documents). HDD Hard Disk Drive It works by using a rotating disk at a high speed of between 5400 and 15000rpm, and a mechanical arm that moves to the area where the data is held, or where it will be stored. Although these drives are very common, their use as the main storage device is declining, and is now being used for a secondary storage device, or as an external device such as a USB External HDD. Typical hard drive sizes are 500GB, 1TB, 2TB, but can reach 8TB per SSD Solid State Drive The SSD is becoming more popular as a choice for data storage. It does not involve the use of a rotating disk or arm, but instead uses flash memory (similar to the memory found in modern smartphones), but at a larger and faster capacity. They run silently, produce less power and are also better at withstanding physical knocks, which make them especially useful in laptops. Popular sizes of SSD are 120GB, 240GB and 480GB but can reach storage sizes of 3.2TB, although the cost significantly raises Flash Memory Flash memory is found in many different forms. This can be either an SD Card used in many digital cameras, MicroSD found in many phones for additional storage, or USB Flash drives (commonly known as USB Sticks). They range in data storage capacity, currently 32GB, 64GB or 128GB are popular given the cost, but 512GB flash memory types are available. If you found this article useful or would like to talk more about how we can help you, your business or enterprise don t hesitate to get in touch on or hello@dynamiq.co

Copyright 2006 Prentice-Hall. All rights reserved. 1

Copyright 2006 Prentice-Hall. All rights reserved. 1 PC Basics CPSC 100 Hardware Software Networking Copyright 2006 Prentice-Hall. All rights reserved. 1 Objectives Identify basic components of a computer (hardware) Gain insight into how computers work (software)

More information

The process by which a user can associate specific permissions to each username.

The process by which a user can associate specific permissions to each username. Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost

More information

The personal computer system uses the following hardware device types -

The personal computer system uses the following hardware device types - EIT, Author Gay Robertson, 2016 The personal computer system uses the following hardware device types - Input devices Input devices Processing devices Storage devices Processing Cycle Processing devices

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Total Mark out of 35

Total Mark out of 35 University of Bahrain College of Information Technology Department of Information Systems ITBIS105 Test 1 Version 1 (35 points) 30 Oct 2013 @ 8:00-9:00 AM Student Name: Section: ID Number: Serial Number:

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Available Instructor Resources Resource File Name Found

Available Instructor Resources Resource File Name Found Instructor s Manual Exploring Computing Concepts 2016, Chapter 1: Getting Started with Computer Concepts Student Data Files Solution Files Answer Keys Matching Multiple Choice Concepts Checks Scorecards

More information

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam CSC 170 Fall 2017 Dr. R. M. Siegfried Study Guide for Final Exam Definitions to know: Lecture #1 1. Data 2. Digitization 3. Bit 4. Byte 5. Binary Numbers 6. How Are Characters Stored? a. ASCII b. Unicode

More information

NHS South Commissioning Support Unit

NHS South Commissioning Support Unit NHS South Commissioning Support Unit ICT Anti-virus Policy This document can be made available in a range of languages and formats on request to the policy author. Version: Ratified by: V.2.1 Alliance

More information

System recommendations for version 17.1

System recommendations for version 17.1 System recommendations for version 17.1 This article contains information about recommended hardware resources and network environments for version 17.1 of Sage 300 Construction and Real Estate. NOTE:

More information

SUMMARIES OF INTERACTIVE MULTIMEDIA

SUMMARIES OF INTERACTIVE MULTIMEDIA SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes

More information

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations 98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low

More information

Aprima 2015 System Requirements

Aprima 2015 System Requirements Aprima 2015 System Requirements APRIMA PRM CLIENT REQUIRED SOFTWARE The following software is required on all client PCs. o o o Microsoft Windows Recommended: Microsoft Windows 8.1 or 10, Pro or Enterprise

More information

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac. CONTENTS 1 2 3 4 5 7 8 Getting connected Ethernet Setup Connecting a Router Logging on Configuring DHCP in Windows Configuring DHCP on a Mac Troubleshooting HELP TIP: Visit support.getwireless.net for

More information

ST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology

ST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology Form 4 ST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology Time: 1hr 30mins Name: Class: Please read the following instructions carefully: 1. Answer

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Vocabulary Bank organized by module

Vocabulary Bank organized by module Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans

More information

CommPortal Communicator Desktop End User Guide 19 Feb 2014

CommPortal Communicator Desktop End User Guide 19 Feb 2014 End User Guide 19 Feb 2014 Integra Hosted Voice Service PC Communicator Desktop End User Guide 19 Feb 2014 21 Feb 20134 End User Guide Contents 1 Introduction... 1-1 1.1 Using this End User Guide... 1-2

More information

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

A network is two or more computers, or other electronic devices, connected together so that they can exchange data. Computer Networks What is a Network? A network is two or more computers, or other electronic devices, connected together so that they can exchange data. For example; a network allows computers to share

More information

KULLEĠĠ SAN BENEDITTU Secondary School, Kirkop

KULLEĠĠ SAN BENEDITTU Secondary School, Kirkop KULLEĠĠ SAN BENEDITTU Secondary School, Kirkop HALF YEARLY EXAMINATION 2016/2017 MARKING SCHEME Year 9 ICT TIME: 1h 30min Question 1 2 3 4 5 6 7 8 9 Global Mark Max. Mark 10 12 26 8 16 6 13 5 4 100 Mark

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

THINGS TO REMEMBER INTRODUCTION TO COMPUTERS

THINGS TO REMEMBER INTRODUCTION TO COMPUTERS PREMIER CURRICULUM SERIES Based on the Sunshine State Standards for Secondary Education, established by the State of Florida, Department of Education THINGS TO REMEMBER INTRODUCTION TO COMPUTERS Copyright

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD GEN2 SERVICES Our cloud infrastructure solutions are made up of a combination

More information

CAO 152C. Intermediate Windows Week 5

CAO 152C. Intermediate Windows Week 5 CAO 152C Intermediate Windows Week 5 From Thursday 2 Homework: users how d you do? Any left-over questions? Set File and Folder Sharing To share a file or folder means to make it accessible by users other

More information

Unit 4 Part A Evaluating & Purchasing a Computer. Computer Applications

Unit 4 Part A Evaluating & Purchasing a Computer. Computer Applications Unit 4 Part A Evaluating & Purchasing a Computer Computer Applications Making Informed Computer Purchasing Decisions Before Buying a Computer Speaking the language of the computer world can be tricky It

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

$ $ $999.99

$ $ $999.99 Products & Systems Our Desktop Systems are custom-built locally, maintained locally, and built for YOU! Why buy a custom-built system from Limes Computing? -All systems are custom-built to YOUR specifications.

More information

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets. Broadband Setup from A to Z Print out all the info below and get to work...have fun!! A word of caution! It is very important that you SECURE your wireless network using WEP or WPA encryption (password).

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

System recommendations for version 17.1

System recommendations for version 17.1 System recommendations for version 17.1 This article contains information about recommended hardware resources and network environments for version 17.1 of Sage 300 Construction and Real Estate. NOTE:

More information

Cambridge International Examinations Cambridge International General Certificate of Secondary Education. Published

Cambridge International Examinations Cambridge International General Certificate of Secondary Education. Published Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 078/12 Paper 1 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published

More information

Easy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc

Easy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc EIT, Author Gay Robertson, 2016 Desktop PC Made up of system unit, keyboard, monitor, mouse Relatively cheap but not portable and take up a lot of space Are versatile You can add extras for speed or storage

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

Positioning Document. DIR-657 Wireless N HD Media Router

Positioning Document. DIR-657 Wireless N HD Media Router DIR-657 Wireless N HD Media Router User scenarios Digital Media enthusiasts that want the most flawless media streaming experience Home users that want to share printers, files and media on their network

More information

Unit 2 Assignment 2. Software Utilities?

Unit 2 Assignment 2. Software Utilities? 1 Unit 2 Assignment 2 Software Utilities? OBJECTIVES Identify software utility types and examples of common software Why are software utilities used? Identify and describe the various networking threats.

More information

How to find your IP address information

How to find your IP address information How to set up a VPN server on Windows 10 Source: https://pureinfotech.com/setup-vpn-server-windows-10/ Here are the step-by-step instructions to set up a VPN server using the built-in Incoming Connection

More information

Ferenc Peták Department of Medical Physics and Informatics 2018

Ferenc Peták Department of Medical Physics and Informatics 2018 Ferenc Peták Department of Medical Physics and Informatics 2018 New bonus system Two bonus points (1%) can be awarded in each lecture if: 1. Providing a valid full name at the Mentimeter test 2. >3 correct

More information

Aprima 2016 SYSTEM REQUIREMENTS

Aprima 2016 SYSTEM REQUIREMENTS Aprima 2016 SYSTEM REQUIREMENTS INTRODUCTION This document defines the system requirements for Aprima PRM 2016. Please be aware that Aprima always uses the latest technology available. For this reason,

More information

Aprima 2016 System Requirements

Aprima 2016 System Requirements Aprima 2016 System Requirements INTRODUCTION This document defines the system requirements for Aprima PRM 2016. Please be aware that Aprima always uses the latest technology available. For this reason,

More information

Elementary Computing CSC M. Cheng, Computer Science 1

Elementary Computing CSC M. Cheng, Computer Science 1 Elementary Computing CSC 100 2014-07-14 M. Cheng, Computer Science 1 CPU and Memory Inside of a computer CPU and RAM Clock Speed & Multi-core Microprocessor How a CPU works Secondary Storage 2014-07-14

More information

CSC 170 Introduction to Computers and Their Applications. Computers

CSC 170 Introduction to Computers and Their Applications. Computers CSC 170 Introduction to Computers and Their Applications Lecture #4 Digital Devices Computers At its core, a computer is a multipurpose device that accepts input, processes data, stores data, and produces

More information

Microsoft Exam Mobility and Devices Fundamentals Version: 6.0 [ Total Questions: 37 ]

Microsoft Exam Mobility and Devices Fundamentals Version: 6.0 [ Total Questions: 37 ] s@lm@n Microsoft Exam 98-368 Mobility and Devices Fundamentals Version: 6.0 [ Total Questions: 37 ] Question No : 1 Your new Windows 8.1 computer is connected to your home wireless network. You want to

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is  Written by Marc Grote Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de What s new in Forefront TMG Beta 2 Part 1 Abstract In this two part article series, I will show

More information

Computer Technology Flash Card 2

Computer Technology Flash Card 2 Computer Technology Flash Card 2 Mouse An input device that allows the user to manipulate objects on the screen by moving the mouse along the surface of a desk. Data Refers to the symbols that represent

More information

MusicOne Stick User Guide (v1.2) User Guide

MusicOne Stick User Guide (v1.2) User Guide User Guide Page 1 Cambron Software 2015 Page 2 Cambron Software 2015 Your Introduction to MusicOne Stick Thank you for purchasing MusicOne Stick Please read through these instructions before using your

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

Networking. Prof. Abdul Hameed

Networking. Prof. Abdul Hameed Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

St. Benedict s High School. Computing Science. Information Systems Design & Development. (Part 2 Computer Systems) National 5

St. Benedict s High School. Computing Science. Information Systems Design & Development. (Part 2 Computer Systems) National 5 Computing Science Information Systems Design & Development (Part 2 Computer Systems) National 5 Hardware & software Learning Intentions After studying this topic you should be able to understand and describe:

More information

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them) Computers are useful machines, but they are generally useless by themselves. Computers are usually part of a system a computer system includes: Hardware (machines) Software (programs, applications) Communication

More information

Computer Performance

Computer Performance Computer Performance Microprocessor At the centre of all modern personal computers is one, or more, microprocessors. The microprocessor is the chip that contains the CPU, Cache Memory (RAM), and connects

More information

CONTENTS IN DETAIL INTRODUCTION

CONTENTS IN DETAIL INTRODUCTION CONTENTS IN DETAIL ACKNOWLEDGMENTS xiii INTRODUCTION xv 1 HOW A NETWORK WILL IMPROVE YOUR LIFE 1 What s a Network?... 2 Sneakernet... 3 Data Networks and What You Can Do with Them... 4 File Sharing...

More information

Introduction... 3 Package Contents... 4 VPN100 LEDs... 5 Connecting your VPN Installing USB drivers... 7

Introduction... 3 Package Contents... 4 VPN100 LEDs... 5 Connecting your VPN Installing USB drivers... 7 Contents Introduction... 3 Package Contents... 4 VPN100 LEDs... 5 Connecting your VPN100... 6 Installing USB drivers... 7 Configuring the VPN100... 9 Using the Web-based User Interface... 9 Choices when

More information

BACK TO BASICS PART I. Hardware & it s Associated Terminology

BACK TO BASICS PART I. Hardware & it s Associated Terminology BACK TO BASICS PART I Hardware & it s Associated Terminology INTRODUCTION The purpose of this session is to review computer hardware & its associated terminology WHY? Everyone on the same page Better understanding

More information

+ SMART WAY THE. to control access to. YOUR property. Janus Access Control. Janus. Operator s Manual. For Version

+ SMART WAY THE. to control access to. YOUR property. Janus Access Control. Janus. Operator s Manual. For Version THE + SMART WAY to control access to YOUR property Janus Access Control Janus Operator s Manual For Version 3.0.0.16 Janus 4 Janus Access Control System Overview At business parks and residential security

More information

1. Introduction. 1.1 Cosmo Specifications

1. Introduction. 1.1 Cosmo Specifications 1. Introduction 1.1 Cosmo Specifications Details CPU Memory Storage Operating System Connectivity Sensor Camera Display Video Formats Description Quad Core 1.3 GHz ARM Cortex A7 Processor 512MB RAM 8 GB

More information

ICT Theory Revision Presentation - Networks and the effects of using them 4.1 Networks. Chapter 4: Networks and the effects of using them

ICT Theory Revision Presentation - Networks and the effects of using them 4.1 Networks. Chapter 4: Networks and the effects of using them Understand how a router works and its purpose Understand the use of other common network devices, including: network interface cards, hubs, bridges, switches, modems Understand the use of WiFi and Bluetooth

More information

Get to know your Modem 1. Modem Technical Overview 3

Get to know your Modem 1. Modem Technical Overview 3 User Manual Get to know your Modem 1 Modem Technical Overview 3 Managing your Modem Settings How to view your Modem settings 5 Understanding the front page 6 Changing your Modem login password 7 Upgrading

More information

Introduction to the Internet. Part 1. What is the Internet?

Introduction to the Internet. Part 1. What is the Internet? Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected

More information

A guide to VoIP for small to medium sized business

A guide to VoIP for small to medium sized business JV Communications Limited //VoIP Telecommunications Company A guide to VoIP for small to medium sized business Contents 1 I want to move my business to VoIP. The things you will need to consider. The key

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

Understanding Routers, Switches, and Network Hardware

Understanding Routers, Switches, and Network Hardware Understanding Routers, Switches, and Network Hardware Rather than start off with a glossary of networking terms and in the process slam you with a technical terms with no easy point of reference let s

More information

Which one of the following terms describes the physical components of a computer system?

Which one of the following terms describes the physical components of a computer system? Which one of the following terms describes the physical components of a computer system? a. Hardware. b. Freeware. c. Software. d. Courseware. Which one of the following can slow down the computers performance?

More information

elc International School

elc International School Subject: COMPUTER SCIENCE (0478) Syllabus 2016 Topics to be covered Section 1: Theory of Computer Science Theory: At the end of the section candidates should be able to Practical: At the end of the section

More information

Grey High School. June COMPUTER APPLICATIONS TECHNOLOGY Grade 10 Paper 2 Written MEMORANDUM

Grey High School. June COMPUTER APPLICATIONS TECHNOLOGY Grade 10 Paper 2 Written MEMORANDUM Grey High School June 2018 COMPUTER APPLICATIONS TECHNOLOGY Grade 10 Paper 2 Written MEMORANDUM TIME: 2 HOURS MARKS: 100 This memorandum consists of 6 pages (cover page included Question 1 1.1 1.2 1.3

More information

The Library Res-Net Troubleshooting Guide

The Library Res-Net Troubleshooting Guide The Library Res-Net Troubleshooting Guide My Res-Net connection is not working If your Res-Net connection is not working then it will be due to one of three things: the computer, the network cable or the

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Preparing for JT Fibre

Preparing for JT Fibre Preparing for JT Fibre What to expect when switching to Fibre JT Fibre for Business Switching to JT Fibre for Business This guide will provide you with further information on the installation process,

More information

Module 1 Concepts of Information and Communication Technology (ICT)

Module 1 Concepts of Information and Communication Technology (ICT) Module 1 Concepts of Information and Communication Technology (ICT) The following is the Syllabus for Module 1, Concepts of Information and Communication Technology (ICT), which provides the basis for

More information

AVANTUS TRAINING PTE LTD

AVANTUS TRAINING PTE LTD [ICDL-CS]: WSQ ICDL Computer Essentials Length Technology Delivery Method : 2 Days : Computers, Microsoft Windows : Instructor-led (Classroom) Course Overview This module sets out essential concepts and

More information

Allan Hancock College Computer Training

Allan Hancock College Computer Training Allan Hancock College Computer Training This document is intended to help you better understand your computer and the network at Allan Hancock College. Computer and Network Terminology Understanding Data

More information

Chapter 1 B: Exploring the Network

Chapter 1 B: Exploring the Network Chapter 1 B: Exploring the Network Types of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan

More information

The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date

The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date 1. A Network consists of 2. A Point-to-Point Topology 3. The Internet is 1. Select the correct answer one computer computers

More information

College of Pharmacy Windows 10

College of Pharmacy Windows 10 College of Pharmacy Windows 10 Windows 10 is the version of Microsoft s flagship operating system that follows Windows 8; the OS was released in July 2015. Windows 10 is designed to address common criticisms

More information

What is Data Storage?

What is Data Storage? What is Data Storage? When we talk about storing data, we mean putting the data in a known place. We can later come back to that place and get our data back again. Writing data or saving data are other

More information

Client Server and Peer to Peer Networks

Client Server and Peer to Peer Networks Client Server and Peer to Peer Networks Client Server Network With a client server network the files will not be stored on the hard drive of each workstation. Instead they will be stored on a computer

More information

Clevertouch Plus Blade PC

Clevertouch Plus Blade PC Manufacturer of the Year 2015 The Clevertouch Pro has a specially designed user interface, powered by Android, and written to be simple and engaging to use. Available in sizes 65", 75" and 84", Clevertouch

More information

The ULTIMATE GUIDE. to Buying Networking Equipment

The ULTIMATE GUIDE. to Buying Networking Equipment The ULTIMATE GUIDE to Buying Networking Equipment 1 Networks allow people to share information, resources and devices. Built with a combination of computer hardware and software,networks vary in their

More information

UU100 EPORTFOLIO ACTIVITY 1

UU100 EPORTFOLIO ACTIVITY 1 UU100 EPORTFOLIO ACTIVITY 1 Semester 2, 2012 University of the South Pacific Laucala Campus Name: Sonam Kumar Student ID: S11074852 Tutor: Mr. Gavin Khan Tutorial: Thursday 3-5pm Activity 1A: ICT Tools

More information

Technology in Action

Technology in Action Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral

More information

Tablet MODECOM FreeTAB1004 IPS X4

Tablet MODECOM FreeTAB1004 IPS X4 MODECOM FreeTAB 1004 IPS X4 new member of Quad-Core family MODECOM FreeTAB 1004 IPS X4 is a tablet PC of outstanding technical parameters, efficiency and design and excellent price. This high-end device

More information

Leading the New Era of WiFi. Nighthawk AC1750 Smart WiFi Router Dual Band Gigabit. Data Sheet R6700

Leading the New Era of WiFi. Nighthawk AC1750 Smart WiFi Router Dual Band Gigabit. Data Sheet R6700 Leading the New Era of WiFi Nighthawk AC1750 Smart WiFi Router is powered by three antennas to extend your WiFi coverage. Blazing-fast combined WiFi speeds up to 450+1300Mbps and 1GHz Dual Core Processor

More information

How much data can a BluRay hold?

How much data can a BluRay hold? COMPUTER HARDWARE ICS2O MR. EMMELL HOW MUCH SPACE ON YOUR USB? How much RAM in your phone? How much data can a BluRay hold? 1 THAT WHOLE B/KB/MB/GB/TB THING THAT WHOLE B/KB/MB/GB/TB THING So how many Bytes

More information

AC1750 Smart WiFi Router ac Dual Band Gigabit

AC1750 Smart WiFi Router ac Dual Band Gigabit Performance & Use AC1750 WiFi 450+1300Mbps speeds High-power external antennas Nighthawk App Easily set up and monitor your home network Circle with Disney - Smart Parental Controls Manage content and

More information

Monsoon System Requirements

Monsoon System Requirements Monsoon System Requirements Hardware System Requirements Click here to see the online version of this document While a number of factors will affect the performance of your Monsoon solution, managing multiple

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

AC1200 Smart WiFi Router

AC1200 Smart WiFi Router Performance & Use AC1200-300+900Mbps speeds High-power external antennas Nighthawk App Easily set up and monitor your home network 880MHz processor delivers high-performance connectivity USB 2.0 port --Wirelessly

More information

Manual Format Flash Drive For Mac And Pc Use Same

Manual Format Flash Drive For Mac And Pc Use Same Manual Format Flash Drive For Mac And Pc Use Same Two Methods:WindowsMac OS X You can also format a flash drive to change the file storage system to make the drive compatible with of your screen notifying

More information

Parts are adapted from Windows 98 by Mark Twain Media, Inc. A Computer System has Hardware and Software

Parts are adapted from Windows 98 by Mark Twain Media, Inc. A Computer System has Hardware and Software Parts are adapted from Windows 98 by Mark Twain Media, Inc. A Computer System has Hardware and Software All the parts--monitor, printer, hard drive, etc.-- cables, cabinets, and programs that make a computer

More information