computing concepts – part 2 getting started with applied computer concepts computing concepts:...

28
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1

Upload: terence-oscar-greene

Post on 25-Dec-2015

229 views

Category:

Documents


1 download

TRANSCRIPT

1

Computing Concepts – Part 2

Getting Started withApplied Computer

Concepts

Computing Concepts: Part 2

2

Objectives

• Identify network architecture• Identify network components• Connect to the Internet• Navigate the Web• Explore telephony and other uses of the Internet• Choose e-commerce options• Protect yourself online• Maintain security• Protect your computer and yourself

Computing Concepts – Part 2

3

Understanding Networks

• Network: two or more computers linked

–Share resources

–Exchange data

• Internet: largest computer network in world

Computing Concepts – Part 2

Computing Concepts – Part 2 4

Understanding Networks (continued)

• Advantages–Sharing resources and data–Reduced hardware and software costs–Centralized data management–Connecting people

• Disadvantages– Loss of personal autonomy–Privacy and security threats

Computing Concepts – Part 2 5

Identifying Network Architecture Printer

Computer Computer

Server

Router

Computing Concepts – Part 2 6

Understanding Client-Server Networks

Server

ClientsClients

Computing Concepts – Part 2 7

Understanding Peer-to-Peer Networks

Computing Concepts – Part 2 8

Identifying Network Components

• Transmission media– Connect the nodes of a network– Provide a communication channel

• Network adapters– Enable nodes to communicate

• Software– Manages operations of network

Computing Concepts – Part 2 9

Understanding Transmission Media

• Data transfer rate or bandwidth– Megabits per second

• Wired– Telephone wire– Cable– Fiber optics

• Wireless– Radio waves

Computing Concepts – Part 2 10

Identifying Network Adapters

Wireless network adapter Network interface card (NIC)

Computing Concepts – Part 2 11

Understanding Data Transfer

• Packets• Network navigation device– Network adapter– Router• Transfers packets between networks• Connect home network to the Internet

– Switch• Determines path and final location for data

transfer

• Network operating system

Computing Concepts – Part 2 12

Understanding Home Networking

Ethernet:• Wired• Requires network

adapters on nodes• Router and switch

required

Wireless Ethernet:• Radio waves• 802.11 standard or Wi-Fi• Nodes require a wireless

network adapter• Wireless router required

Computing Concepts – Part 2 13

Connecting to the Internet

Speed Type of Connection56 Kbps Dial-up128 Kbps DSL512 Kbps Cable6 Mbps Satellite3 Tbps Fiber optic

Computing Concepts – Part 2 14

Navigating the Web

Computing Concepts – Part 2 15

Searching for Information

• Use different search engines

• Use a web portal or gateway website

• Use a subject directory

• Use a metasearch engine

• Use Boolean operators

Computing Concepts – Part 2 16

Exploring Telephony

• Internet telephony

• VoIP

• Webcam

• Microphone/headset

• Services

– Skype

– Windows Messenger

– Google Voice

– Vonage

– Yahoo! Voice

Computing Concepts – Part 2 17

Understanding Podcasts, Webcasts, and Blogs

• RSS feed

–Push technology

• RSS newsreaders

• RSS symbol

Computing Concepts – Part 2 18

Understanding Social Media

• Facebook

• LinkedIn

• Twitter

• MySpace

Computing Concepts – Part 2 19

Understanding E-commerce Options

Type of Business AbbreviationBusiness to Business B2BBusiness to Consumer B2CConsumer to Business C2BConsumer to Consumer C2C

Computing Concepts – Part 2 20

Protecting Privacy

• Collection of data

• History file

• Spyware

– Cookies

– Web bugs

– Keystroke loggers

Computing Concepts – Part 2 21

Protecting Your Electronic Profile• Set up an alternate e-mail• Share only required information• Google yourself

Computing Concepts – Part 2 22

Protecting Security

• Threats:– Theft of hardware

– Theft of software

– Viruses

– Malware

– Credit card fraud

– Phishing

– E-mail scams

• Strategies:– Don’t leave devices

unsecured

– Don’t use software illegally• Most music isn’t free

– Back up data

– Regularly scan using anti-virus software

– Don’t respond to questionable e-mail

Computing Concepts – Part 2 23

Understanding Online Threats

• Spam

• Internet fraud – Non-delivery of merchandise

– Auction fraud

– Credit or debit card fraud

• Phishing

• Pharming

• Trojan horses

• Viruses

• Worms

Computing Concepts – Part 2 24

Protecting Yourself and Your Computer

• Firewall

• Proxy server

• Antivirus programs

Computing Concepts – Part 2 25

Using Passwords

• Strong passwords:

– Sufficient length

–Variety of characters

–Upper and lowercase letters

–Numbers

– Special characters

Computing Concepts – Part 2 26

Avoiding Scams

• If it sounds too good to be true, it probably is

• Do business with established companies

• Check the return policy and customer service policy

• Use secured websites for personal information

Computing Concepts – Part 2 27

Using Encryption

• Hypertext Transfer Protocolover Secured Socket Layer – https

• Public key encryption– Public key– Private key

Computing Concepts – Part 2 28

Summary

• Networking enables communication between computers

• The Internet is the world’s largest network

• Security and privacy are important issues that all computer users must address