8.1 Computing Presention
8.1 Computing Presention
1 Final project
3. Describe the uses and characteristics of copper and fibre-optic cables to transmit data.
7. Explain how firewalls protect a network and why they are important.
8. Explain how antivirus and anti-spyware softwares provide protection to keep data secure on a network.
10. Follow a flowchart that uses conditional statements to illustrate how error checks work.
Personal Area Network PAN
PAN stands for Personal Area Network. It is the smallest type of network,
typically connecting devices in close proximity to an individual. PANs are
useful for connecting devices such as smart watches, headsets, and
wireless headphones. These networks are usually connected via
Bluetooth.
LAN stands for Local Area Network. It's a type of network that allows devices
to communicate over a small geographic area, such as a single site like a
building, school, or college.
A WAN (Wide Area Network) is a network that covers a large geographic area,
connecting multiple smaller networks (like LANs) over long distances. It can span cities,
countries, or even continents.
Example: A router is a device used in WANs to direct data between different networks,
such as connecting a home network to the internet. Also big organizations like banks
connecting different offices across the world.
Uses and Characteristics of Copper and Fibre-Optic
cables Fibre-Optic Cables
Copper Cables
● Transmission Type: Use light signals transmitted
● Transmission Type: Use electrical signals to transmit
through glass or plastic fibers.
data.
Disadvantages:
Disadvantages:
1. Less Mobility: Devices need to be connected by cables.
1. Slower Speeds: Can be slower and have higher
2. Messy Cables: Can be difficult to manage, especially in
delays.
large spaces.
2. Interference: Signals can be disrupted by other
3. Higher Installation Costs: More expensive and
devices.
time-consuming to set up.
3. Less Secure: Easier for hackers to access if not
properly protected.
1. Send Data: A small piece of data is sent from the source to the receiver.
2. Echo the Data: The receiver immediately sends the data back to the source.
3. Compare: The source compares the original data with the echoed data.
4. Check for Errors: If the two match, the transmission is accurate. If not, there’s an error.
1) Malware (Viruses, Worms, Malicious software that can infect Antivirus software: Detects, removes, and
Trojans) devices, causing damage, data prevents malware infections. Regularly
update antivirus definitions. Be cautious about
theft, or system disruption.
downloading files or clicking on links from
untrusted sources.