Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.

Slides:



Advertisements
Similar presentations
Vocabulary words By: Toyre Jones. Electronic mail which allows individuals with an account to send messages to another person with an account.
Advertisements

Chapter Nine Communications and Networks. Objective ONE Discuss the components required for successful communications.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Internet, Intranet and Extranets
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Understanding Computers Ch.8
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
IS Network and Telecommunications Risks
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
E-commerce and Information Technology in Hospitality and Tourism Chapter 3 Connecting to the World Copyright 2004 by Zongqing Zhou, PhD Niagara University.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Basic Data Communication
Your Interactive Guide to the Digital World Discovering Computers 2012 Edited by : Noor Al-Hareqi.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 6 Information System Networks and the Internet.
Chapter 5: Computer Networks
Telecommunications and Networks
NETWORK.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Business Essentials 9e Ebert/Griffin Information Technology for Business chapter thirteen.
CHAPTER 2 COMMUNICATION, NETWORKS, AND THE WWW. WHAT IS COMMUNICATIONS? A process in which two or more computers or devices transfer data, instructions,
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Exploring the Network.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
NETWORKS.
-Electronic mail which allows individuals with an account to send messages to another person with an e- mail account. IRC- internet relay chat was.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Year 10 – Chapter 4 – Computer Networks Lesson 2: Setting up a Network Starter Task – Can you think of reasons to set up a network? Why Use Networks? 1.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Computer network  A network consists of multiple computers connected to each other to share data and resources.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
PowerPoint Presentation by Charlie Cook The University of West Alabama Business Essentials Ronald J. Ebert Ricky W. Griffin Managing Information 55 6e.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Telecommunications and Networks.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
© 2007 Prentice Hall, Inc. All rights reserved.13–1 Chapter 13 Information Technology for Business.
Chapter5 TELECOMMUNICATIONS AND NETWORKS. Content Networking the Enterprise Trends in Telecommunications The Business Value of Telecommunications Networks.
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
Edited by : Noor Al-Hareqi
Edited by : Noor Al-Hareqi
Year 11 – Chapter 4 – Computer Networks
Chapter 1: Explore the Network
Introduction to Computers
Vocabulary 1 Electronic Mail which allows individuals with an account to send messages to another person with an account. IRC: Internet.
Managing Information Systems and Communications Technology
Chapter 6 Telecommunications and Networks.
Department of Computer Science Course : Pre Computer Skills
Review Exam 2.
Online Learning.
Edited by : Noor Al-Hareqi
By Hussein Alhashimi.
NETWORK.
Presentation transcript:

Review 2 Chapters 7, 8, 9

2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand the various topologies and architectures a computer network might use.  Explain the difference between a LAN, a WAN, and a PAN, and between an intranet, an extranet, and the Internet.  Name specific types of wired and wireless transmission media and explain how they transmit data.  Understand what protocols are and what they do.  List several types of networking hardware and explain the purpose of each. Chapter 7

3  Discuss how the Internet evolved and what it is like today.  Describe device and connection options for connecting to the Internet, as well as some considerations to keep in mind when selecting an ISP.  Understand how to effectively search for information on the Internet.  Explain several different types of applications other than web browsing and that require the internet in order to function.  Discuss censorship and privacy and how they are related to Internet use. Chapter 8

4  Explain why computer users should be concerned about network and Internet security.  List several examples of unauthorized access, unauthorized use, and computer sabotage.  Explain how access control systems, firewalls, antivirus software, and encryption protect against unauthorized access, unauthorized use, and computer sabotage.  Discuss online theft, identity theft, Internet scams, spoofing, phishing, and other types of dot cons. Chapter 9