Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Size: px
Start display at page:

Download "Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers."

Transcription

1 Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: Lesson length is subjective and will vary from instructor to instructor. Performance Objective: Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers. Specific Objectives: By the end of this lesson, students will be able to Define a computer system Identify the parts of a network Create a network with the following components: Workstation, Server, Modem, Hub, Switch, and Routers. Define the types of networks including Peer-to-Peer and Client Server (Ethernet, Token Ring, LAN, WAN) Identify the different types of operating systems Identify hackers and common security threats Preparation TEKS Correlations: Principles of Information Technology: (8) The student analyzes network systems. The student is expected to (A) identify hardware associated with telecommunications and data networking such as servers, routers, switches, hubs, and network connectors; (B) identify and describe various types of networks such as peer-to-peer, local area networks, wide area networks, wireless token ring, and Ethernet; (C) identify and describe functions of network operating systems. Instructor/Trainer References:

2 Instructional Aids: HANDOUT: Teen Hacker Article Networks and Hackers Presentation HANDOUT: Networks and Hackers Notes for the Presentation HANDOUT: Lab Assignment HANDOUT: National Treasure Extension Assignment Materials Needed: Instructional aids Paper for students to draw on Color pencils, markers, and/or crayons to draw with Flash cards for students to create review materials National Treasure movie only needed for extension assignment! Equipment Needed: Projector for teacher computer Learner This is an introduction on networks and hackers for students. No previous knowledge is needed. Introduction MI Introduction (LSI Quadrant I): SAY, How many of you have ever logged onto a computer at school, the library, or a home office with more than one computer? ASK, Have you ever wondered how it all works? MI Outline Outline (LSI Quadrant II): Teachers can use the Networks and Hackers Presentation and Handout and Lab. I. Hand out the Teen Hacker Article Handout to the students to read. II. Hand out the Networks and Hackers Notes Handout or advise students to take notes during the presentation. Instructor Notes: I. Hand out this article for the students to read for homework ahead of this lesson. II. Hand out copies of the Network and Hacker Notes to each student, or you can advise each student to get ready to take notes.

3 III. Show the presentation, which covers the following concepts: a. Computer system b. Parts of a network I. Workstation ii. Server Iii. Modem iv. Hub V. Switch vi. Router C. Types of networks I. Peer-to-peer ii. Client server 1. Ethernet 2. Token ring 3. Lan 4. Wan d. Operating systems e. Hackers F. Security threats III. Students should be taking notes as you are showing the Networks and Hackers Presentation. IV. Hand out the Lab Assignment to students. They will create diagrams of the networks based on seniors listed. IV. Students should draw out 3 different types of networks listed on the Lab Assignment. Have them create a legend for the different parts of the network they are trying to draw like a box with the word Router for a router. V. Work through the SOHO portion of the lab together the key listed is one of many solutions. VI. Work through the SOHO setup as a class so that students understand what you are looking for. VII. Student groups need to finish up the Lab Assignment. V. Divide students into groups of two or three. Have them complete the Lab Assignment for the small office and world wide company.

4 VIII. Review for Networks and Hackers Quiz VI. After completion of the lab, have students create flash cards of the important terms to study for the quiz. Application MI Guided Practice (LSI Quadrant III): Do the SOHO portion of the lab as a class. MI Independent Practice (LSI Quadrant III): Hand out the Lab Assignment. Divide students into groups of two or three. Have each group work together on the following SAY, Students, now that you see how we have set up a SOHO, see if you and a partner can come up with one possible solution to the rest of the problems on the Lab Assignment. Summary MI Review (LSI Quadrants I and IV): SAY, Now that we have a good understanding about Networks, we need to study for our quiz. In your groups, each of you needs to create your own set of flash cards to study. Work together as a group to make sure that you do not miss any important concepts or terms. I will need to review these to make sure that I feel you are not missing anything. I would also draw out our SOHO example so that you do not forget it later. Evaluation MI Informal Assessment (LSI Quadrant III):

5 Teacher checks for understanding while going through the SOHO portion of the lab as a class. Review of student-created flash cards MI Formal Assessment (LSI Quadrant III, IV): Completion of the rest of the Lab Assignment done in groups. Networks and Hackers Quiz Extension MI Extension/Enrichment (LSI Quadrant IV): Upon completion of the Networks and Hackers Lesson, have students watch the movie National Treasure. Have students complete the HANDOUT: National Treasure Extension Assignment.

6 Icon MI Teaching Strategies Verbal/ Linguistic Logical/ Mathematical Visual/Spatial Musical/ Rhythmic Bodily/ Kinesthetic Intrapersonal Interpersonal Lecture, discussion, journal writing, cooperative learning, word origins Problem solving, number games, critical thinking, classifying and organizing, Socratic questioning Mind-mapping, reflective time, graphic organizers, color-coding systems, drawings, designs, video, DVD, charts, maps Use music, compose songs or raps, use musical language or metaphors Use manipulatives, hand signals, pantomime, real life situations, puzzles and board games, activities, roleplaying, action problems Reflective teaching, interviews, reflective listening, KWL charts Cooperative learning, roleplaying, group brainstorming, cross-cultural interactions Personal Development Strategies Reading, highlighting, outlining, teaching others, reciting information Organizing material logically, explaining things sequentially, finding patterns, developing systems, outlining, charting, graphing, analyzing information Developing graphic organizers, mindmapping, charting, graphing, organizing with color, mental imagery (drawing in the mind s eye) Creating rhythms out of words, creating rhythms with instruments, playing an instrument, putting words to existing songs Moving while learning, pacing while reciting, acting out scripts of material, designing games, moving fingers under words while reading Reflecting on personal meaning of information, studying in quiet settings, imagining experiments, visualizing information, journaling Studying in a group, discussing information, using flash cards with other, teaching others Naturalist Existentialist Natural objects as manipulatives and as background for learning Socratic questions, real life situations, global problems/questions Connecting with nature, forming study groups with like-minded people Considering personal relationship to larger context

7 Networks and Hackers Notes: Computer System A basic computer system is made up of two parts: (physical equipment that you can touch), and (programs installed on the computer). Computer Networks Computer Networks allow users to over distances. They allow,, and, making them a necessary tool for offices, schools, and homes all over the world. A computer network consists of several the network function correctly as a whole. Network: Parts of a Network, each of which is important to making Workstations These are known as. The computer you use at home or school would be called a workstation in a network. Servers Servers can look like desktop computers; however, most do not look like your normal computer. Servers do not really need, and. What they really need is hard drives. In most schools, when you save your work, you are saving to a server. By doing this, you can access your schoolwork from any computer that is on your school network. Modems A modem is a device that enables computers to they receive from a network or send data in the proper form along a network. Hubs A hub is sort of like a car radio. Every computer that has that section of network (like a radio station) can hear that is being transmitted. All the computers that are connected to that hub receive all the information that goes through it. Usually, if you have a hub, you also have a.

8 Switches A switch is more complex than a hub and works a lot like a two-way radio. In a room full of people, only the person holding the other radio can hear what is being said. It keeps track of which computers are where, and when something comes in, it sends it only to that --not every computer on that section of the network. It is more secure than a hub and faster than a hub, but not as powerful as a router. Routers Routers work a lot like a. Each computer is given its own unique number by the router. When information comes into the router, it is sent along to the correct number, or in this case,. There are more options built into routers than there are available to switches. A router can have the equivalent phone options of. This is beyond a switch s capabilities. Peer- to- Peer Network This is a type of network where the computers in the network share among each other. Every computer on this network is ; all the computers run the same for sharing., and,, and other plugged into, otherwise known as managed by. and are shared by the machine they are Advantages It is to set up a peer-to-peer network initially. You may already own the needed to get a peer-to-peer network setup. This type of network does not require the installation of dedicated or expensive security software.

9 Disadvantages If you have a peer-to-peer network, you need to be aware that on the, such as printers, place a special demand in the network. Also, due to the nature of this type of network, all of the computers on the network provide access to all of the machine s resources. The down side of this is that you can unintentionally expose to all the other users on the network. There is also no or from hackers, viruses, etc. Peer-to-Peer Operating Systems In the peer-to-peer network operating system, each workstation has an operating system that tells them how to with each other. and The two software packages that allow this type of network are called (for MACs) and (for PCs) Client Server Networks Ethernet Ethernet is a type of basis of most LANs. between computers that forms the It also serves as one of the main methods for connecting a computer or network to an. The origin of Ethernet was the idea of connecting several computers together in a network via ; since that time, it has evolved into a much more sophisticated system that uses specialized that connect to a central hub or router to network several computers together.

10 LAN LAN stands for. A local area network is a group of computers that are together that share internet access, file access, applications, storage, and allow computers to share printers and scanners. LAN Issues For a LAN to work properly, a must be installed on the primary computer that is connected to the internet. Each computer connected to the LAN must have an The other issue with a LAN is that they are usually confined in a. installed. WAN WAN stands for. A WAN is a collection of regular that are all interconnected to form one. Oftentimes, schools and even large companies will operate a WAN on premises. Advantages : School networks can be created for students to access files throughout the school district. : Networks speed up the file sharing and saving process. Disadvantages : WANs save money over time, but they are expensive to set up at first. : WANs require maintenance of the network, which costs both money and time. Token Rings Token rings work by sending data from one machine to the next around a until it ends up back where it started.

11 It also uses a special token passing protocol, which means that a machine can only use the network when it has control of the. This ensures that there are no collisions because only one machine can use the network at any given time. Token Ring Issues In order for token rings to work, all computers must check for or tokens. all connected computers must a new leader to a new token. Client/Server Operating Systems Client/Server setup allows the network to centralize functions and applications in or file server. File servers become the of this system and provide well as providing security. to files and resources, as Workstations have to the resources to files on the file servers. Client/Server Operating Systems There are many different kinds of software out there for this type of network. The most popular ones are Advantages This type of network makes it easy to install and. The server can be remotely, and you can have both MACs and PCs on the network. Client/Server operating systems

12 Disadvantages: Client/Servers depend on their servers. When they go down, the will no longer work. There is a hefty for a client/server network. It pays off in the long run, but it requires money to set it up. Large networks will require to maintain a client/server network and to work out the kinks when problems arise. Network Threats Hackers A computer hacker is someone who finds in a computer s security system to break into another machine. Hackers usually collect information on the target computer and then try to find Security Threats The most common threats are into the computer system. : this is unwanted commercial . : can cause your computer to slow down or even destroy your hard drive. : this is software that gets installed on the computer. It can cause annoying pop-ups or even steal information. : hackers steal important information: client information, bank account numbers, etc. Hackers Networks can take steps to protect their networks. The most common are

13 Networks and HackersNotes: KEY Computer System A basic computer system is made up of two parts: hardware (physical equipment that you can touch) and software (programs installed on the computer). Computer Networks Computer networks allow users to connect over distances. They allow file sharing, hardware sharing, and instant communication, making them a necessary tool for offices, schools, and homes all over the world. A computer network consists of several components, each of which is important to making the network function correctly as a whole. Network: Parts of a Network Workstations These are known as desktop computers. The computer you use at home or school would be called a workstation in a network. Servers Servers can look like desktop computers; however, most do not look like your normal computer. Servers do not really need monitors, graphics, and sound cards. What they really need is hard drives. In most schools, when you save your work, you are saving to a server. By doing this, you can access your schoolwork from any computer that is on your school network. Modems A modem is a device that enables computers to interpret data they receive from a network or send data in the proper form along a network. Hubs A hub is sort of like a car radio. Every computer that has that section of network (like a radio station) can hear everything that is being transmitted. All the computers that are connected to that hub receive all the information that goes through it. Usually, if you have a hub, you also have a router. Switches A switch is more complex than a hub and works a lot like a two-way radio. In a room full of people, only the person holding the other radio can hear what is being said. It keeps track of which computers are where, and when something comes in, it sends it only to that specific computer, not every computer on that section of the network. It is more secure than a hub and faster than a hub, but it is not as powerful as a router. Routers Routers work a lot like a telephone system. Each computer is given its own unique number by the router. When information comes into the router, it is then sent along to the correct number, or in this case, computer.

14 There are more options built into routers than there are available to switches. A router can have the equivalent phone options of call screening and caller ID. This is beyond a switch s capabilities. Peer-to-Peer Network This is a type of network where the computers in the network share resources among each other. Every computer on this network is equal; all the computers run the same networking software and file systems for sharing. Printers, scanners, and other external devices are shared by the machine they are plugged into, otherwise known as managed by. Advantages It is less expensive to set up a peer-to-peer network initially. You may already own the software needed to get a peer-to-peer network setup. This type of network does not require the installation of dedicated server hardware or expensive security software. Disadvantages If you have a peer-to-peer network, you need to be aware that shared resources, such as printers, place a special demand on the computers in the network. Also, due to the nature of this type of network, all of the computers on the network provide access to all of the machine s resources. The down side of this is that you can unintentionally expose private files to all the other users on the network. There is also no data security or protection from hackers, viruses, etc. Peer-to-Peer Operating Systems In the peer-to-peer network operating system, each workstation has an operating system that tells them how to store and share resources with each other. The two software packages that allow this type of network are called Appleshare (for MACs) and Windows for Workgroups (for PCs) Client Server Networks Ethernet Ethernet is a type of connection between computers that forms the basis of most LANs. It also serves as one of the main methods for connecting a computer or network to an Internet hub. The origin of Ethernet was the idea of connecting several computers together in a network via coaxial cables; since that time, it has evolved into a much more

15 sophisticated system that uses specialized Ethernet cables that connect to a central hub or router in order to network several computers together. LAN LAN stands for Local Area Network. A local area network is a group of computers that are linked together that share internet access, file access, applications, storage, and allow connected computers to share printers and scanners. LAN Issues For a LAN to work properly, a router must be installed on the primary computer that is connected to the internet. Each computer connected to the LAN must have an Ethernet card installed. The other issue with a LAN is that they are usually confined in a single building. WAN WAN stands for Wide Area Networks. A WAN is a collection of regular local area networks that are all interconnected to form one giant network. Oftentimes, schools and even large companies will operate a WAN on premises. Advantages Flexible Access: School networks can be created for students to access files throughout the school district. Speed: Networks speed up the file sharing and saving process. Disadvantages Expensive to Install: WANs save money over time, but they are expensive to set up at first. Time: WANs require maintenance of the network, which costs both money and time. Token Rings Token rings work by sending data from one machine to the next and so on around a ring until it ends up back where it started. It also uses a special token passing protocol, which means that a machine can only use the network when it has control of the token; this ensures that there are no collisions because only one machine can use the network at any given time. Token Ring Issues In order for token rings to work, All computers must check for lost or duplicate tokens. All connected computers must vote a new leader to create a new token.

16 Client/Server Operating Systems Client/Server setup allows the network to centralize functions and applications in one or more file server. File servers become the heart of this system and provide access to files and resources, as well as providing security. Workstations have access to the resources to files on the file servers. Client/Server Operating Systems There are many different kinds of software out there for this type of network. The most popular ones are Macintosh OSX Microsoft Windows Server Novell UNIX Advantages This type of network makes it easy to install new technology and new elements. The server can be accessed remotely, and you can have both MACs and PCs on the network. Client/Server Operating Systems Disadvantages Client/Servers depend on their servers. When they go down, the network will no longer work. Network Threats There is a hefty investment for a client/server network. It pays off in the long run, but it requires money to set it up. Large networks will require dedicated staff to maintain a client/server network and to work out the kinks when problems arise. Hackers A computer hacker is someone who finds access in a computer s security system to break into another machine. Hackers usually collect information on the target computer and then try to find access into the computer system. Security Threats The most common threats are

17 Spam: this is unwanted commercial . Viruses: can cause your computer to slow down or even destroy your hard drive. Adware/Malware: this is software that gets installed on the computer. It can cause annoying pop-ups or even steal information. Information Threats: Hackers steal important information: client information, back account numbers, etc. Hackers Networks can take steps to protect their networks. The most common are. Installing a firewall Advising caution on the net Making sure the network is password protected, especially if using a wireless network.

18 Networks and Hackers Lab Assignment: Case Studies: 1. Together, we are going to draw out a SOHO (Small Office, Home Office) Network. We need to have the following parts in our design: o Desktop computer o Printer o Scanner o Wireless router o A laptop 2. We have a school computer lab that wants a peer-to-peer network created for this lab. They have the following items that need to be in the design: o 15 desktop computers o 5 scanners o 1 color printer o 1 black and white printer 3. Now, come up with your own scenario and solution. See who can be the most creative!

19 Networks and Hackers Lab Assignment: KEY Case Studies: 1. Together, we are going to draw out a SOHO (Small Office, Home Office) Network. We need to have the following parts in our design: o Desktop computer o Printer o Scanner o Wireless router o A laptop Listed below are two versions of what this key can look like. This is just a sample students can draw this out so many ways. Wireless Router Wireless Router Desktop Computer Laptop Printer Scanner

20 2. We have a School Computer Lab that wants a peer-to-peer network created for this lab. They have the following items that need to be in the design: o 15 desktop computers o 5 scanners o 1 color printer o 1 black and white printer

21 Networks and Hackers Quiz True/False Indicate whether the statement is true or false. 1 All computer networks are fairly simple, containing only a few components. A True B False 2 A hub is like a car radio. Every computer on that section of the network can hear everything that is being transmitted. A True B False 3 A switch is more powerful than a router. A True B False 4 A WAN is a collection of LANs forming one giant network. A True B False 5 WANs are a cheap investment. A True B False 6 There are many advantages to having a client/server operating system, one of which is that you can have both Macs and PCs on the same network. A True B False Multiple Choice Identify the choice that best completes the statement or answers the question. 7 All computer systems are made up of two parts: A Hardware and Firewalls C Servers and Routers B Software and Computers D Hardware and Software 8 A workstation is a A server B desktop computer C Router D None of the Above

22 9 A Modem A is used only for the Internet B is installed on every computer ever made C interprets data from a network D is all you need to make a network. 10 In this type of network, all the connected computers are equal. A Ethernet B Client/Server C D Peer-To-Peer Server/Client 11 The Ethernet came about originally by A telephone cables B coaxial cables C wires D none of the above Multiple Response Identify one or more choices that best complete the statement or answer the question. 12 In a peer-to-peer network, the most common types of operating software used are A AppleShare C UNIX B Windows for Workgroups D Novell 13 LANs allow for the following resources to be shared: A Files C Printers B Internet D Scanners 14 The most common security threats are: A Spam B Firewalls C Viruses D Time Bombs Case 15 Draw out a SOHO set that contains the following parts: Desktop Computer Printer Scanner Wireless Router 2 Laptops Photo Printer

23 Networks and Hackers Quiz Answer Section TRUE/FALSE 1 ANS: F That may be true of the SOHO (Small Office, Home Office) networks, but most global companies have WANs with hundreds of networks inside them. They can have thousands of components. 2 ANS: T 3 ANS: F A router is more powerful than a switch. 4 ANS: T 5 ANS: F Actually WANs are a major investment, but they pay off over time. 6 ANS: T MULTIPLE CHOICE 7 ANS: D It is made up of both hardware you can touch and software installed on the computer. 8 ANS: C 9 ANS: C A modem is a device that enables computers to interpret data they receive from a network. 10 ANS: C All of the computers will share resources, and all the computers are equal. In both Ethernet and client/server networks, there is a server who is considered the boss. 11 ANS: B MULTIPLE RESPONSE 12 ANS: A, B UNIX and Novell are for client/server networks. 13 ANS: A, B, C, D All are allowed to be shared on a LAN 14 ANS: A, C Spam, viruses, adware, and information theft are the most common security threats. CASE 15 ANS: The student should have drawn this out just like the independent practice done as a class. The only parts added are an extra laptop and photo printer.

24 National Treasure Extension Assignment Write a one-page essay containing one or two paragraphs discussing the following: o Discuss the security measures used today to protect the Declaration of Independence and their effectiveness. o Discuss the security measures used in the 1700s to protect the location of the map and their effectiveness. o Include in both discussions (where applicable) the use of the following physical security access control measures: Lock Conduit Card key Video equipment Security card Biometric Passwords Symmetric encryption o The essay must contain at least four examples of the above control measures of physical security access with supporting sentences. The essay needs to be at least one page, double-spaced, with 12-point Times New Roman font. All margins need to be one inch. The title and header with your name needs to be 12-point Times New Roman font as well. The essay can contain one or two paragraphs.

25

26

Lesson Plan. Course Title: Web Technologies

Lesson Plan. Course Title: Web Technologies Lesson Plan Course Title: Web Technologies Lesson Duration: 2 hours Session Title: Website Forms / Data Acquisition (NOTE: This lesson should follow the HTML Scripting Lesson) Performance Objective: Upon

More information

Lesson Plan. Course Title: Digital Interactive Media Session Title: Master Pages

Lesson Plan. Course Title: Digital Interactive Media Session Title: Master Pages Lesson Plan Course Title: Digital Interactive Media Session Title: Master Pages Lesson Duration: 7.5-8 hours. Lesson length is subjective and will vary from instructor to instructor. Performance Objective:

More information

Lesson Plan. Course Title: Principles of Information Technology Session Title: Intro to Databases Lesson Duration: Varies dependent upon instructor

Lesson Plan. Course Title: Principles of Information Technology Session Title: Intro to Databases Lesson Duration: Varies dependent upon instructor Lesson Plan Course Title: Principles of Information Technology Session Title: Intro to Databases Lesson Duration: Varies dependent upon instructor Performance Objective: Upon completion of this lesson,

More information

Lesson Plan. Session Title: Cutting Edge Technology

Lesson Plan. Session Title: Cutting Edge Technology Lesson Plan Course Title: Principles of Information Technology Lesson Duration: 7 hours Session Title: Cutting Edge Technology Performance Objective: Upon completion of this assignment, the student will

More information

Lesson Plan. Course Title: Digital and Interactive Media. Session Title: Introduction to Publishing Layouts

Lesson Plan. Course Title: Digital and Interactive Media. Session Title: Introduction to Publishing Layouts Lesson Plan Course Title: Digital and Interactive Media Lesson Duration: 24 Hours Session Title: Introduction to Publishing Layouts Performance Objective: Upon completion of this assignment, the student

More information

What is a Network? A connection of two or more computers so that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources. NETWORKS What is a Network? A connection of two or more computers so that they can share resources. Network Benefits Remote access Sharing files & resources Communication Cost Maintenance Communication

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

The Features and Uses of Computer Networking. Unit 11 Task 1

The Features and Uses of Computer Networking. Unit 11 Task 1 The Features and Uses of Computer Networking Unit 11 Task 1 Features Office Network Peer to peer A peer to peer network is mostly used in homes or small businesses. The network consists of two or more

More information

Computer Networks. Cables Radio signals (wireless/wifi) Telephone lines Satellite links (Long distance)

Computer Networks. Cables Radio signals (wireless/wifi) Telephone lines Satellite links (Long distance) COMPUTER NETWORKS Computer Networks A network is two or more computers connected together to allow them to share information and resources. Network connections are created by Cables Radio signals (wireless/wifi)

More information

Stratford School Academy Schemes of Work

Stratford School Academy Schemes of Work Number of weeks (between 6&8) Content of the unit Assumed prior learning (tested at the beginning of the unit) 6 This is a theoretical unit covering the basic principles and architecture of local and wide

More information

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network 87-01-01 DATA SECURITY MANAGEMENT NETWORK TECHNOLOGIES FOR INFORMATION SECURITY PRACTITIONERS: PART 1 Chris Hare INSIDE What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches;

More information

Unit A: Computer and Internet Basics

Unit A: Computer and Internet Basics Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.

More information

Networking. Networking. How Home Networking Works

Networking. Networking. How Home Networking Works Networking Networking How Typical Home Networking Works Bandwidth - of a connection is the width of it or the amount of data that can fit through it. Broadband - is a term used today to describe almost

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Computer Overview. A computer item you can physically see or touch. A computer program that tells computer hardware how to operate.

Computer Overview. A computer item you can physically see or touch. A computer program that tells computer hardware how to operate. Hardware Computer Overview A computer item you can physically see or touch. Software A computer program that tells computer hardware how to operate. Information Technology (IT) The broad subject related

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

New Perspectives on Word 2016 Instructor s Manual 1 of 10

New Perspectives on Word 2016 Instructor s Manual 1 of 10 New Perspectives on Word 2016 Instructor s Manual 1 of 10 New Perspectives Microsoft Office 365 And Word 2016 Introductory 1st Edition Shaffer SOLUTIONS MANUAL Full download at: https://testbankreal.com/download/new-perspectives-microsoft-office-365-

More information

ICAU1128B: Operate a Personal Computer Student Handbook

ICAU1128B: Operate a Personal Computer Student Handbook ICA20105 Certificate II in Information Technology ICAU1128B: Operate a Personal Computer Student Handbook Modification History Competency Handbooks ICA20105: Cert II in Information Technology: ICAU1128B

More information

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy? Unit 9 Tech savvy? Lesson A Tech support 1 I have no idea why... A Unscramble the questions. 1. which battery / Do you know / should / buy / I? Do you know which battery I should buy? 2. they / where /

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices

More information

Networks: Communicating and Sharing Resources

Networks: Communicating and Sharing Resources Networks: Communicating and Sharing Resources 1 Local Area Networks Client/server networks o Made up of one or more file servers and clients (any type of computer) o Client software enables requests to

More information

Assignment 1 What is a Computer?

Assignment 1 What is a Computer? Assignment 1 What is a Computer? Hello, I'm PC. Read about the computer. Answer the questions. A computer is a tool that runs programs. The computer is sometimes called a "personal computer" or PC for

More information

This guide will show you how to create a basic multi-media PowerPoint presentation containing text, graphics, charts, and audio/video elements.

This guide will show you how to create a basic multi-media PowerPoint presentation containing text, graphics, charts, and audio/video elements. This guide will show you how to create a basic multi-media PowerPoint presentation containing text, graphics, charts, and audio/video elements. Before starting the steps outlined in this guide, it is recommended

More information

ICT Theory Revision Presentation - Networks and the effects of using them 4.1 Networks. Chapter 4: Networks and the effects of using them

ICT Theory Revision Presentation - Networks and the effects of using them 4.1 Networks. Chapter 4: Networks and the effects of using them Understand how a router works and its purpose Understand the use of other common network devices, including: network interface cards, hubs, bridges, switches, modems Understand the use of WiFi and Bluetooth

More information

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

A network is two or more computers, or other electronic devices, connected together so that they can exchange data. Computer Networks What is a Network? A network is two or more computers, or other electronic devices, connected together so that they can exchange data. For example; a network allows computers to share

More information

Running head: PROJECT PART VII: FINAL PROJECT PAPER WITH FINAL 1

Running head: PROJECT PART VII: FINAL PROJECT PAPER WITH FINAL 1 Running head: PROJECT PART VII: FINAL PROJECT PAPER WITH FINAL 1 Project Part VII: Final Project Paper with Final Budget Recommendations Sharon C. Perelman Northwestern University School of Continuing

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices Technology in Action Chapter 7 Networking: Connecting Computing Devices 1 2 Chapter Topics Networking fundamentals Network architecture Network components Peer-to-peer networks Ethernet networks Power-line

More information

Introduction to the Internet. Part 1. What is the Internet?

Introduction to the Internet. Part 1. What is the Internet? Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected

More information

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node Topic 2 focuses on networking. It covers: Definition of a network. Characteristics and functions of network devices. Specification of local area network (LAN). Network software. Application software. Basic

More information

Parts of a Computer. In this lesson you will learn about the main parts of a computer. CPU. Monitor. Mouse. Keyboard. Lesson 2

Parts of a Computer. In this lesson you will learn about the main parts of a computer. CPU. Monitor. Mouse. Keyboard. Lesson 2 Lesson 2 m Parts of a Computer In this lesson you will learn about the main parts of a computer. Tejas and Jyoti were in the computer room, looking at one of the computers. They were trying to see how

More information

CHAPTER 8 NETWORKS: COMMUNICATING AND SHARING RESOURCES

CHAPTER 8 NETWORKS: COMMUNICATING AND SHARING RESOURCES CHAPTER 8 NETWORKS: COMMUNICATING AND SHARING RESOURCES This chapter focuses on the fundamentals of computer networking. As students continue on their journey toward computer fluency, they will need to

More information

Remote Access Synchronization DL Parent

Remote Access Synchronization DL Parent Remote Access Synchronization DL Parent 205 Distance Learning Features Switched-On Schoolhouse 2008 School Edition has two optional distance learning features available: SOS Remote Access and SOS Synchronization.

More information

Client Server and Peer to Peer Networks

Client Server and Peer to Peer Networks Client Server and Peer to Peer Networks Client Server Network With a client server network the files will not be stored on the hard drive of each workstation. Instead they will be stored on a computer

More information

Brief Summary of the Chapter: CHAPTER 1 NETWORKING AND OPEN STANDARDS In this chapter we are going to study about computer Networks, associated terminology and related concept along with network devices.

More information

PAF Chapter Junior Section Name : Class: 5 Sec: Date: SECTION - A

PAF Chapter Junior Section Name : Class: 5 Sec: Date: SECTION - A ICT CLASS-5 COMPREHENSIVE WORKSHEET Mid Term Session 2015-16 The City School PAF Chapter Junior Section Name : Class: 5 Sec: Date: Q1. Encircle any one correct option. i.) SECTION - A is an electronic

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this

More information

CompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan

CompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan Course Outline CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Chapter Objectives 1 of 2. Chapter 3. The Operating System. Chapter Objectives 2 of 2. The Operating System. The Operating System

Chapter Objectives 1 of 2. Chapter 3. The Operating System. Chapter Objectives 2 of 2. The Operating System. The Operating System Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Chapter 3 Application Productivity Tools for Educators Chapter Objectives 1 of 2 Explain the role of

More information

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory ) Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin

More information

Unit 11 Computer Networks P1 M1 D1 Deadline:29/09/2016. By Sarah Ameer

Unit 11 Computer Networks P1 M1 D1 Deadline:29/09/2016. By Sarah Ameer Unit 11 Computer Networks P1 M1 D1 Deadline:29/09/2016 By Sarah Ameer P1- Uses and features of a computer Network What is a computer network? This is group of computer systems which are linked together

More information

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs.

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs. Course Outline CompTIA Network+ N10-006 ucertify Course & Labs 06 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Networks. Computer Technology

Networks. Computer Technology Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication

More information

Chapter 8 Communications and Networks

Chapter 8 Communications and Networks Chapter 8 Communications and Networks Today Group work Review the 6 parts of the IT model Communications and networks Discussion Think about it Imagine a traveling business person. This person s company

More information

Applied Information and Communication Technology Assessment Unit A2 13

Applied Information and Communication Technology Assessment Unit A2 13 71 Centre Number Candidate Number ADVANCED General Certificate of Education January 2012 Applied Information and Communication Technology Assessment Unit A2 13 assessing Unit 13 : Networking and Communications

More information

WIREFRAMING 101. Essential Question: Can We Possibly Build an App? Learning Targets: Lesson Overview

WIREFRAMING 101. Essential Question: Can We Possibly Build an App? Learning Targets: Lesson Overview WIREFRAMING 101 Essential Question: Can We Possibly Build an App? Learning Targets: Students will: Use wireframing to create a design for an app for mobile devices. Collaborate to make decisions about

More information

The process by which a user can associate specific permissions to each username.

The process by which a user can associate specific permissions to each username. Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost

More information

Computer Science Department 2 nd semester- Lecture13

Computer Science Department 2 nd semester- Lecture13 Network Devices: The network devices (connecting devices) are divided into five different categories based on the layer in which they operate in a network. NIC (Network Interface Card) is used to enable

More information

Pearson CompTIA: Network+ (Course & Lab) Course Outline. Pearson CompTIA: Network+ (Course & Lab) 15 Jul 2018

Pearson CompTIA: Network+ (Course & Lab) Course Outline. Pearson CompTIA: Network+ (Course & Lab)  15 Jul 2018 Course Outline Pearson CompTIA: Network+ (Course & Lab) 15 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

Inside Internet. Fig.1

Inside Internet. Fig.1 DVD Inside buying computers!! Games! Computer First edition 2010 BOOK 6 1 Thinking kills s Applications Inside Internet Computer Level 6 Aim: In this lesson, you will learn: Tejas: We had only one computer

More information

CPU. Monitor. Keyboard. Moz: Good questions! Let us learn about each of these parts.

CPU. Monitor. Keyboard. Moz: Good questions! Let us learn about each of these parts. Moz: Good questions! Let us learn about each of these parts. CPU CPU (central processing unit) is the most important part of a computer. It is like the brain. It does all the tasks that we want the computer

More information

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better

More information

IT 2004 Data Communication & Networking

IT 2004 Data Communication & Networking IT 2004 Data Communication & Networking Week 4 Network Topology, Architecture & Access Methods P.G.R Nayomi Gamlath MSc(Pdn), BSc (Rajarata) ATI -Kurunegala Why networks? To share resources (such as printer,

More information

Cambridge Nationals R001. Revision help (LO1)

Cambridge Nationals R001. Revision help (LO1) Cambridge Nationals R001 Revision help (LO1) Portable devices These are electronic devices that can be carried easily. Examples include: Laptops Netbooks Mobile phones Tablets (Ipad, Android Tablet) handheld

More information

UNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK TOPOLOGIES AND LAYOUT

UNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK TOPOLOGIES AND LAYOUT UNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK TOPOLOGIES AND LAYOUT NETWORK TOPOLOGY Network Topology refers to layout of a network and how different nodes in a network are connected to each other

More information

Video. Objectives. Vocabulary. Pedagogical Implications. Classroom Integration

Video. Objectives. Vocabulary. Pedagogical Implications. Classroom Integration Video Objectives learning about resources for podcasting, and adding visuals to audio material Vocabulary podcast mp3 vodcast aggregator Pedagogical Implications Podcasts are audio or video files that

More information

Chapter 10: Local Area Networks

Chapter 10: Local Area Networks Chapter 10: Local Area Networks MULTIPLE CHOICE 1. CSMA stands for: a. Client-Server Multi-Access c. Carrier Server Master Application b. Carrier Sense Multiple Access d. none of the above 2. The CD in

More information

Not long ago, home local area networks were proof of their owner s geekhood. They were very

Not long ago, home local area networks were proof of their owner s geekhood. They were very 03 54473X Ch01.qxd 12/24/03 8:35 AM Page 3 Chapter 1 What Is a LAN? Not long ago, home local area networks were proof of their owner s geekhood. They were very expensive, cantankerous, difficult to set

More information

Frequently Asked Questions

Frequently Asked Questions FAQs 10010410NC-RR Frequently Asked Questions Connecting Your Valet to the Internet 1 What computer operating systems does the Valet/Valet Plus support? 1 Why can t I connect my computer or device to my

More information

Lines of Symmetry. Grade 3. Amy Hahn. Education 334: MW 8 9:20 a.m.

Lines of Symmetry. Grade 3. Amy Hahn. Education 334: MW 8 9:20 a.m. Lines of Symmetry Grade 3 Amy Hahn Education 334: MW 8 9:20 a.m. GRADE 3 V. SPATIAL SENSE, GEOMETRY AND MEASUREMENT A. Spatial Sense Understand the concept of reflection symmetry as applied to geometric

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Math Practicum in Information Technology Lesson Plan Performance Objective Upon completion of this lesson, each student will be able to convert between different numbering systems and correctly write mathematical

More information

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communication. Chapter # 1: Introduction. By: William Stalling Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications

More information

The Basics of Computer Networking. David Phenix Computing in the Modern World 1 st Period

The Basics of Computer Networking. David Phenix Computing in the Modern World 1 st Period The Basics of Computer Networking David Phenix Computing in the Modern World 1 st Period The Computer Network Arguably, the greatest advancement in technology and communication over the past 20 years has

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

CONTENTS IN DETAIL INTRODUCTION

CONTENTS IN DETAIL INTRODUCTION CONTENTS IN DETAIL ACKNOWLEDGMENTS xiii INTRODUCTION xv 1 HOW A NETWORK WILL IMPROVE YOUR LIFE 1 What s a Network?... 2 Sneakernet... 3 Data Networks and What You Can Do with Them... 4 File Sharing...

More information

Parts of Computer hardware Software

Parts of Computer hardware Software Parts of Computer Parts of Computer If you use a desktop computer, you might already know that there is not any single part called the "computer." A computer is really a system of many parts working together.

More information

Valuable points from Lesson 6 Adobe Flash CS5 Professional Classroom in a Book

Valuable points from Lesson 6 Adobe Flash CS5 Professional Classroom in a Book Valuable points from Lesson 6 Adobe Flash CS5 Professional Classroom in a Book You are expected to understand and know how to use/do each of these tasks in Flash CS5, unless otherwise noted below. If you

More information

Experience SprintSpeed. Everything you want right on your phone.

Experience SprintSpeed. Everything you want right on your phone. Experience SprintSpeed. Everything you want right on your phone. Speed is beautiful. It s an exciting time: With a device that fits in your pocket, Sprint lets you connect with friends, listen to your

More information

Everyone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer.

Everyone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer. Purpose - Why the Client Needs the Network: The client needs the network for their office in a nearby town for their small company Mesh Networking Solutions. These people are all using stand-alone computer

More information

TWO Internet Set-up Instructions

TWO Internet Set-up Instructions Purpose Of This Document This document describes the items needed, and configuration of those items, for connection of TWO workstations to the Internet. The workstations will also need to be networked

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Word processing and spreadsheet applications are among the most

Word processing and spreadsheet applications are among the most In This Chapter Chapter 1 Starting Out with iwork 09 Leaving the past behind The iwork timesavers: Do it once, do it right, and reuse it Word processing and spreadsheet applications are among the most

More information

Some Quick Terms Before we move ahead, we need to touch on a few key terms used throughout the book.

Some Quick Terms Before we move ahead, we need to touch on a few key terms used throughout the book. Getting Started Welcome to the official Apple Pro training course for Motion, Apple Computer s revolutionary real-time-design motion graphics application. This book provides a comprehensive guide to designing

More information

Unit 11: Computer Networks

Unit 11: Computer Networks Unit 11: Computer Networks Level: 1 and 2 Unit type: Mandatory or Optional specialist Guided learning hours: 60 Assessment type: Internal Unit introduction Computer networking is an important part of our

More information

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved. Unit 10 Networks Copyright 2005 Heathkit Company, Inc. All rights reserved. The basic components of a network: Connections (Physical Medium) Protocols (Common language) Services (Clients, Servers, and

More information

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs. CompTIA Network+ N Pearson ucertify Course and Labs

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs.  CompTIA Network+ N Pearson ucertify Course and Labs Course Outline CompTIA Network+ N10-007 Pearson ucertify Course 06 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

::The Art of Multimedia:: Assignments*

::The Art of Multimedia:: Assignments* ::The Art of Multimedia:: Assignments* Session 1: January 25 th Assignment: What is Multimedia? 500 word-essay So what exactly is multimedia? Looking at the actual term multimedia literally means multiple

More information

Technology in Action

Technology in Action Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral

More information

Semester. DEPARTMENT: _ Mathematics COURSE: PC Hardware

Semester. DEPARTMENT: _ Mathematics COURSE: PC Hardware DEPARTMENT: _ Mathematics COURSE: PC Hardware Semester 1 Path to PC Technician 2 The Visible PC, Networks, Windows, Mac, and Linux Operating Systems 3 Inside the PC: Processors, Ram, Motherboards, Power

More information

NOTE: In this chapter universal key commands are used unless JAWS key commands are specified.

NOTE: In this chapter universal key commands are used unless JAWS key commands are specified. Copyright 2009 BOSMA Enterprises Chapter 19 Internet Setup and General Use Terms NOTE: In this chapter universal key commands are used unless JAWS key commands are specified. Key Terms Internet: Imagine

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information

Accessing CharityMaster data from another location

Accessing CharityMaster data from another location Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto

More information

Applied Networks & Security

Applied Networks & Security Applied Networks & Security Introduction with Critical Analysis http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Winter 2006/2007 John Kristoff - DePaul University 1 Critical

More information

CompTIA Network+ N (Course & Labs) Course Outline. CompTIA Network+ N (Course & Labs) 14 Mar

CompTIA Network+ N (Course & Labs) Course Outline. CompTIA Network+ N (Course & Labs) 14 Mar Course Outline CompTIA Network+ N10-007 (Course & Labs) 14 Mar 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Form 4 ICT Literacy Modules Methodist Boys School Kuala Lumpur 1.0 PROCESSING DATA

Form 4 ICT Literacy Modules Methodist Boys School Kuala Lumpur 1.0 PROCESSING DATA 1.0 PROCESSING DATA 1. Name of module: 1.1 How computer processes data? 2. Learning outcomes: Students should be able to: a) understand and state how computer process data b) list down processing components

More information

Objective: Analyze and classify triangles based on side length, angle measure or both.

Objective: Analyze and classify triangles based on side length, angle measure or both. NYS COMMON CORE MATHEMATICS CURRICULUM Lesson 13 4 4 Lesson 13 Objective: Analyze and classify triangles based on side length, angle measure or Suggested Lesson Structure Fluency Practice Application Problem

More information

Digital Safety and Digital Citizenship

Digital Safety and Digital Citizenship Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself

More information

Starting from. An Introduction to Computing Science by Jeremy Scott LEARNER NOTES

Starting from. An Introduction to Computing Science by Jeremy Scott LEARNER NOTES Starting from An to Computing Science by Jeremy Scott LEARNER NOTES You have probably already used several computers today without realising it. If you have sent a text, been driven in a car, or checked

More information

E-Learning. Meeting Solutions

E-Learning. Meeting Solutions E-Learning Meeting Solutions Teach and train more people, more often for less online with MCI Conferencing e-learning solutions and watch how quickly your company can gain the competitive advantage. These

More information

APPENDIX A. Answer: D Reference: Hardware Basics Difficulty: Easy. Answer: A Reference: Hardware Basics Difficulty: Easy

APPENDIX A. Answer: D Reference: Hardware Basics Difficulty: Easy. Answer: A Reference: Hardware Basics Difficulty: Easy APPENDIX A Multiple Choice: 1. A desktop computer is also known as a: A. Palm Pilot. B. laptop. C. mainframe. D. PC. Answer: D Reference: Hardware Basics Difficulty: Easy 2. The physical parts of a computer

More information

The Internet software layers

The Internet software layers 1 2 The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF Ethernet, Wireless LAN, Token Ring Twisted pair, coaxial, microwave, optical fiber 3 4 Ethernet 1973 Xerox s researcher

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information