Download presentation
Presentation is loading. Please wait.
Published byTerence Oscar Greene Modified over 9 years ago
1
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1
2
Objectives Identify network architecture Identify network components Connect to the Internet Navigate the Web Explore telephony and other uses of the Internet Choose e-commerce options Protect yourself online Maintain security Protect your computer and yourself Computing Concepts – Part 22
3
Understanding Networks Network: two or more computers linked – Share resources – Exchange data Internet: largest computer network in world Computing Concepts – Part 23
4
Understanding Networks (continued) Advantages – Sharing resources and data – Reduced hardware and software costs – Centralized data management – Connecting people Disadvantages – Loss of personal autonomy – Privacy and security threats Computing Concepts – Part 24
5
Identifying Network Architecture Computing Concepts – Part 25 Printer Computer Server Router
6
Understanding Client-Server Networks Computing Concepts – Part 26 Server Clients
7
Understanding Peer-to-Peer Networks Computing Concepts – Part 27
8
Identifying Network Components Transmission media – Connect the nodes of a network – Provide a communication channel Network adapters – Enable nodes to communicate Software – Manages operations of network Computing Concepts – Part 28
9
Understanding Transmission Media Data transfer rate or bandwidth – Megabits per second Wired – Telephone wire – Cable – Fiber optics Wireless – Radio waves Computing Concepts – Part 29
10
Identifying Network Adapters Computing Concepts – Part 210 Wireless network adapterNetwork interface card (NIC)
11
Understanding Data Transfer Computing Concepts – Part 211 Packets Network navigation device – Network adapter – Router Transfers packets between networks Connect home network to the Internet – Switch Determines path and final location for data transfer Network operating system
12
Understanding Home Networking Ethernet: Wired Requires network adapters on nodes Router and switch required Wireless Ethernet: Radio waves 802.11 standard or Wi-Fi Nodes require a wireless network adapter Wireless router required Computing Concepts – Part 212
13
Connecting to the Internet SpeedType of Connection 56 KbpsDial-up 128 KbpsDSL 512 KbpsCable 6 MbpsSatellite 3 TbpsFiber optic Computing Concepts – Part 213
14
Navigating the Web Computing Concepts – Part 214
15
Searching for Information Use different search engines Use a web portal or gateway website Use a subject directory Use a metasearch engine Use Boolean operators Computing Concepts – Part 215
16
Exploring Telephony Internet telephony VoIP Webcam Microphone/headset Services – Skype – Windows Messenger – Google Voice – Vonage – Yahoo! Voice Computing Concepts – Part 216
17
Understanding Podcasts, Webcasts, and Blogs RSS feed – Push technology RSS newsreaders RSS symbol Computing Concepts – Part 217
18
Understanding Social Media Facebook LinkedIn Twitter MySpace Computing Concepts – Part 218
19
Understanding E-commerce Options Type of BusinessAbbreviation Business to BusinessB2B Business to ConsumerB2C Consumer to BusinessC2B Consumer to ConsumerC2C Computing Concepts – Part 219
20
Protecting Privacy Collection of data History file Spyware – Cookies – Web bugs – Keystroke loggers Computing Concepts – Part 220
21
Protecting Your Electronic Profile Set up an alternate e-mail Share only required information Google yourself Computing Concepts – Part 221
22
Protecting Security Threats: – Theft of hardware – Theft of software – Viruses – Malware – Credit card fraud – Phishing – E-mail scams Strategies: – Don’t leave devices unsecured – Don’t use software illegally Most music isn’t free – Back up data – Regularly scan using anti-virus software – Don’t respond to questionable e-mail Computing Concepts – Part 222
23
Understanding Online Threats Spam Internet fraud – Non-delivery of merchandise – Auction fraud – Credit or debit card fraud Phishing Pharming Computing Concepts – Part 223 Trojan horses Viruses Worms
24
Protecting Yourself and Your Computer Firewall Proxy server Antivirus programs Computing Concepts – Part 224
25
Using Passwords Strong passwords: – Sufficient length – Variety of characters – Upper and lowercase letters – Numbers – Special characters Computing Concepts – Part 225
26
Avoiding Scams If it sounds too good to be true, it probably is Do business with established companies Check the return policy and customer service policy Use secured websites for personal information Computing Concepts – Part 226
27
Using Encryption Hypertext Transfer Protocol over Secured Socket Layer – https Public key encryption – Public key – Private key Computing Concepts – Part 227
28
Summary Networking enables communication between computers The Internet is the world’s largest network Security and privacy are important issues that all computer users must address Computing Concepts – Part 228
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.