0% found this document useful (0 votes)
6 views12 pages

8.1 Computing Presention

The document outlines key concepts related to computer networks, including types such as PAN, LAN, and WAN, and their applications. It discusses the characteristics of copper and fiber-optic cables, advantages and disadvantages of wired and wireless networks, and security measures like firewalls and antivirus software. Additionally, it explains the function of operating systems and utility software in managing computer resources.

Uploaded by

harleenpangu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views12 pages

8.1 Computing Presention

The document outlines key concepts related to computer networks, including types such as PAN, LAN, and WAN, and their applications. It discusses the characteristics of copper and fiber-optic cables, advantages and disadvantages of wired and wireless networks, and security measures like firewalls and antivirus software. Additionally, it explains the function of operating systems and utility software in managing computer resources.

Uploaded by

harleenpangu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Computing : Unit 8.

1  Final project

Made by: Eesha and Harleen


Key facts :
1. Identify different types of network, such as PAN, LAN, and WAN.

2. Identify the type of network that should be used in different scenarios.

3. Describe the uses and characteristics of copper and fibre-optic cables to transmit data.

4. Describe the advantages and disadvantages of wired and wireless networks.

5. Describe the advantages of security features in different types of networks.

6. Describe how echo checks are used to detect errors in transmission.

7. Explain how firewalls protect a network and why they are important.

8. Explain how antivirus and anti-spyware softwares provide protection to keep data secure on a network.

9. Explain the purpose of operating systems.

10. Follow a flowchart that uses conditional statements to illustrate how error checks work.
Personal Area Network PAN
PAN stands for Personal Area Network. It is the smallest type of network,
typically connecting devices in close proximity to an individual. PANs are
useful for connecting devices such as smart watches, headsets, and
wireless headphones. These networks are usually connected via
Bluetooth.

EG An example of a PAN is the connection between a user's smartphone


and their wireless earbuds.
Local Area Network ( LAN)

LAN stands for Local Area Network. It's a type of network that allows devices
to communicate over a small geographic area, such as a single site like a
building, school, or college.

An example of a LAN is a school network where all the computers in the


classrooms, labs, and offices are connected, allowing students and teachers
to share files and access the internet.
Wide area network WAN

A WAN (Wide Area Network) is a network that covers a large geographic area,
connecting multiple smaller networks (like LANs) over long distances. It can span cities,
countries, or even continents.

Example: A router is a device used in WANs to direct data between different networks,
such as connecting a home network to the internet. Also big organizations like banks
connecting different offices across the world.
Uses and Characteristics of Copper and Fibre-Optic
cables Fibre-Optic Cables
Copper Cables
● Transmission Type: Use light signals transmitted
● Transmission Type: Use electrical signals to transmit
through glass or plastic fibers.
data.

● Bandwidth: Higher, supporting faster data rates.


● Bandwidth: Lower compared to fibre optics.

● Distance Capability: Can transmit data over much


● Distance Limitations: Effective over shorter distances;
longer distances without significant loss.
signal degrades over long runs.

● Interference Resistance: Immune to electromagnetic


● Susceptibility: Prone to electromagnetic interference
interference, ensuring stable connections.
(EMI).

● Durability: More resistant to environmental factors and


● Durability: More susceptible to physical damage and
physical damage.
corrosion.

● Cost: Typically more expensive; installation can be


● Cost: Generally less expensive and easier to install.
complex.
● Common Uses: Local area networks (LANs),
● Common Uses: Internet backbone connections, data
telephone lines, and household networking
centers, and high-speed telecommunication networks.
Advantages and Disadvantages of Wired and Wireless Networks
Wired Networks:
Wireless Networks:
Advantages:
Advantages:
1. Faster Speeds: Wired connections are faster with lower
delays. 1. More Flexible: No cables, so you can move around
2. Stable: Less interference and consistent connection. freely.
3. More Secure: Harder for hackers to access without 2. Easy Setup: Quick and simple to install.
physical connections. 3. Easier to Expand: Adding devices is simpler.

Disadvantages:
Disadvantages:
1. Less Mobility: Devices need to be connected by cables.
1. Slower Speeds: Can be slower and have higher
2. Messy Cables: Can be difficult to manage, especially in
delays.
large spaces.
2. Interference: Signals can be disrupted by other
3. Higher Installation Costs: More expensive and
devices.
time-consuming to set up.
3. Less Secure: Easier for hackers to access if not
properly protected.

Which is More Secure?


Wired networks are more secure because physical access is needed to connect. Wireless networks are more
vulnerable to hacking, but can still be secure with proper protection (e.g., using strong passwords and
advanced security settings).
How an Echo Check Tests for Accuracy in Transmission
An echo check is a simple way to test if data is sent correctly over a network.

Steps in an Echo Check Test

1. Send Data: A small piece of data is sent from the source to the receiver.
2. Echo the Data: The receiver immediately sends the data back to the source.
3. Compare: The source compares the original data with the echoed data.
4. Check for Errors: If the two match, the transmission is accurate. If not, there’s an error.

Why It’s Useful:

● Helps find errors in transmission.


● Ensures data is sent correctly.
● Monitors network performance.
Threat: Description: Protection Measures:

1) Malware (Viruses, Worms, Malicious software that can infect Antivirus software: Detects, removes, and
Trojans) devices, causing damage, data prevents malware infections. Regularly
update antivirus definitions. Be cautious about
theft, or system disruption.
downloading files or clicking on links from
untrusted sources.

2) Unauthorized Access Intruders gaining access to a Firewalls: Hardware or software that


network or device without monitors and controls network traffic, blocking
unauthorized access. Strong passwords and
permission.
multi-factor authentication. Access control
lists. Intrusion detection systems.

3) Spyware Software that secretly gathers Anti-spyware software: Detects and


information about a user's activity removes spyware. Be cautious about
installing software from untrusted sources.
and transmits it to a third party.
Regularly scan your system.

4) Phishing The act of capturing data as it Encryption: Encoding data so that it is


travels across a network unreadable without the correct
decryption key. Secure network
protocol
Function of Operating Systems:
An operating system OS) is essential software that manages computer
hardware and software resources and provides a user interface to interact
with the computer. It handles tasks such as memory management, process
management, file system management, and input/output operations. The
OS acts as a bridge between the user and the computer's hardware,
allowing users to run applications, and access files.
What are Utility Softwares?

Utility software comprises programs designed to maintain, manage, and


optimize computer hardware and software, supporting the operating
system's infrastructure rather than directly providing end-user applications.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy