computing concepts – part 2 getting started with applied computer concepts computing concepts:...
TRANSCRIPT
1
Computing Concepts – Part 2
Getting Started withApplied Computer
Concepts
Computing Concepts: Part 2
2
Objectives
• Identify network architecture• Identify network components• Connect to the Internet• Navigate the Web• Explore telephony and other uses of the Internet• Choose e-commerce options• Protect yourself online• Maintain security• Protect your computer and yourself
Computing Concepts – Part 2
3
Understanding Networks
• Network: two or more computers linked
–Share resources
–Exchange data
• Internet: largest computer network in world
Computing Concepts – Part 2
Computing Concepts – Part 2 4
Understanding Networks (continued)
• Advantages–Sharing resources and data–Reduced hardware and software costs–Centralized data management–Connecting people
• Disadvantages– Loss of personal autonomy–Privacy and security threats
Computing Concepts – Part 2 5
Identifying Network Architecture Printer
Computer Computer
Server
Router
Computing Concepts – Part 2 8
Identifying Network Components
• Transmission media– Connect the nodes of a network– Provide a communication channel
• Network adapters– Enable nodes to communicate
• Software– Manages operations of network
Computing Concepts – Part 2 9
Understanding Transmission Media
• Data transfer rate or bandwidth– Megabits per second
• Wired– Telephone wire– Cable– Fiber optics
• Wireless– Radio waves
Computing Concepts – Part 2 10
Identifying Network Adapters
Wireless network adapter Network interface card (NIC)
Computing Concepts – Part 2 11
Understanding Data Transfer
• Packets• Network navigation device– Network adapter– Router• Transfers packets between networks• Connect home network to the Internet
– Switch• Determines path and final location for data
transfer
• Network operating system
Computing Concepts – Part 2 12
Understanding Home Networking
Ethernet:• Wired• Requires network
adapters on nodes• Router and switch
required
Wireless Ethernet:• Radio waves• 802.11 standard or Wi-Fi• Nodes require a wireless
network adapter• Wireless router required
Computing Concepts – Part 2 13
Connecting to the Internet
Speed Type of Connection56 Kbps Dial-up128 Kbps DSL512 Kbps Cable6 Mbps Satellite3 Tbps Fiber optic
Computing Concepts – Part 2 15
Searching for Information
• Use different search engines
• Use a web portal or gateway website
• Use a subject directory
• Use a metasearch engine
• Use Boolean operators
Computing Concepts – Part 2 16
Exploring Telephony
• Internet telephony
• VoIP
• Webcam
• Microphone/headset
• Services
– Skype
– Windows Messenger
– Google Voice
– Vonage
– Yahoo! Voice
Computing Concepts – Part 2 17
Understanding Podcasts, Webcasts, and Blogs
• RSS feed
–Push technology
• RSS newsreaders
• RSS symbol
Computing Concepts – Part 2 19
Understanding E-commerce Options
Type of Business AbbreviationBusiness to Business B2BBusiness to Consumer B2CConsumer to Business C2BConsumer to Consumer C2C
Computing Concepts – Part 2 20
Protecting Privacy
• Collection of data
• History file
• Spyware
– Cookies
– Web bugs
– Keystroke loggers
Computing Concepts – Part 2 21
Protecting Your Electronic Profile• Set up an alternate e-mail• Share only required information• Google yourself
Computing Concepts – Part 2 22
Protecting Security
• Threats:– Theft of hardware
– Theft of software
– Viruses
– Malware
– Credit card fraud
– Phishing
– E-mail scams
• Strategies:– Don’t leave devices
unsecured
– Don’t use software illegally• Most music isn’t free
– Back up data
– Regularly scan using anti-virus software
– Don’t respond to questionable e-mail
Computing Concepts – Part 2 23
Understanding Online Threats
• Spam
• Internet fraud – Non-delivery of merchandise
– Auction fraud
– Credit or debit card fraud
• Phishing
• Pharming
• Trojan horses
• Viruses
• Worms
Computing Concepts – Part 2 24
Protecting Yourself and Your Computer
• Firewall
• Proxy server
• Antivirus programs
Computing Concepts – Part 2 25
Using Passwords
• Strong passwords:
– Sufficient length
–Variety of characters
–Upper and lowercase letters
–Numbers
– Special characters
Computing Concepts – Part 2 26
Avoiding Scams
• If it sounds too good to be true, it probably is
• Do business with established companies
• Check the return policy and customer service policy
• Use secured websites for personal information
Computing Concepts – Part 2 27
Using Encryption
• Hypertext Transfer Protocolover Secured Socket Layer – https
• Public key encryption– Public key– Private key