0% found this document useful (0 votes)
10 views10 pages

COM 122 Intro To Internet

The document outlines a course titled 'Introduction to Internet' at Delta Central College, detailing various topics including the concept and history of the internet, intranets and extranets, peer-to-peer and client-server networks, economic benefits of the internet, and challenges of Voice Over Internet Protocol (VoIP). It includes specific questions for students to answer, covering definitions, advantages, and practical applications related to internet technologies. Additionally, it provides a marking scheme for evaluating student responses.

Uploaded by

Paul Oshos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views10 pages

COM 122 Intro To Internet

The document outlines a course titled 'Introduction to Internet' at Delta Central College, detailing various topics including the concept and history of the internet, intranets and extranets, peer-to-peer and client-server networks, economic benefits of the internet, and challenges of Voice Over Internet Protocol (VoIP). It includes specific questions for students to answer, covering definitions, advantages, and practical applications related to internet technologies. Additionally, it provides a marking scheme for evaluating student responses.

Uploaded by

Paul Oshos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

DELTA CENTRAL COLLEGE OF MANAGEMENT AND

SCIENCES (DECCOMS)
IN AFFILIATION WITH
TEMPLE GATE POLYTECHNIC
ABA, ABIA STATE.
COURSE TITLE: INTRODUCTION TO INTERNET.
COURSE CODE: COM 122 DEPARTMENTS: COMPUTER SCIENCE
TIME ALLOWED: 2 HOURS INSTRUCTIONS: ANSWER FIVE QUESTIONS

QUESTION 1
a. Elaborate on the concept of the internet (7 marks)
b. Give a brief background of the internet (7 marks)
QUESTION 2
a. Define intranet and extranet (6 marks)
b. State four advantages of intranet and four advantages of extranet (8 marks)
QUESTION 3
a. What is peer to peer network (4 marks)
b. Give two advantages of a peer to peer network (2 marks)
c. State five advantages of a client server and three disadvantages of a client server
(8marks)

QUESTION 4
a. The internet have benefitted a lot of nations by its enormous advantages that it offers.
Describe and explain briefly seven economic benefits that are attached to the usage of the
internet in the modern world (14 marks)

QUESTION 5
a. What is a digital library (2 marks)
b. explain a Bullentin Board System (2marks)
c. define the term Voice Over Internet Protocol (2 marks)
d. State eight challenges of VOIP (8 marks)
QUESTION 6
a. Espouse on the idea of an internet café (2 marks)

b. List five steps in setting up a Cybercafe (5 marks)


c. What are the personnel requirements of a cyber-café (4 marks)

d. What is a modem (3 marks)

QUESTION 7
a. List three advantages and disadvantages of wireless broadband (6 marks)
b. what are some of the benefits of wireless internet connection. Name four of them (4 marks)
c. List five obstacles to effective transmission (5 marks)
MARKING SCHEME

1a.
The Internet is a worldwide, publicly accessible series of interconnected computer networks that
transmit data by packet switching using the standard Internet Protocol (IP).It is a "network of
networks" that consists of millions of smaller domestic, academic, business, and government
networks, which together carry various information and services, such as electronic mail, online
chat, file transfer, and the interlinked web pages and other resources of the World Wide Web
(WWW).
It is a global network connecting millions of computers. More than 1000 countries are linked into
exchanges of data, news and opinions. Unlike online services, which are centrally controlled, the
Internet is decentralized by design. Each Internet computer, called a host, is independent. Its
operators can choose which Internet services to use and local services to make available to the
global Internet community.

1b.
HISTORICAL BACKGROUND OF THE INTERNET
The USSR's launch of Sputnik spurred the United States to create the Advanced Research Projects
Agency, known as ARPA, in February 1958 to regain a technological lead.The sputnik was a
series of robotic spacecraft missions launched by the Soviet Union.The first of these, Sputnik 1,
launched the first man-made object to orbit the Earth. That launch took place on October 4, 1957
as part of the International Geophysical Year and demonstrated the viability of using artificial
satellites to explore the upper atmosphere.The surprise launch of Sputnik 1, coupled with the
spectacular failure of the United States' first two Project Vanguard launch attempts, shocked the
United States, which responded with a number of early satellite launches, including Explorer 1,
Project SCORE, and Courier 1B. The Sputnik crisis also led to the creation of the Advanced
Research Projects Agency (renamed the Defense Advanced Research Projects Agency in 1972):
DARPA, and NASA, and an increase in U.S. government spending on scientific research and
education.
In 1969, ARPA, a part of the Department of Defense (DOD), awarded a contract to the firm of Bolt
Beranek and Newman (BBN) to construct a computer network. The network was used to link
researchers at universities with defense contractors, researchers, scientists and military
contractors so that they can share information an]d resources. This network was called the
INTRANET AND EXTRANET

2a. INTRANET
An Intranet is a private network that is contained within an enterprise.
It is a private computer network that uses Internet protocols and network connectivity to securely
share part of an organization's information or operations with its employees. Sometimes the term
refers only to the most visible service, the internal website. The same concepts and technologies
of the Internet such as clients and servers running on the Internet protocol suite are used to build
an intranet. HTTP and other Internet protocols are commonly used as well, such as FTP.
Briefly, an intranet can be understood as "a private version of the Internet," or as a version of the
Internet confined to an organization. An intranet can also be used to facilitate working in groups
and for teleconferences.
2b.
ADVANTAGES OF INTRANETS
· Workforce productivity: Intranets can help users to locate and view information faster and
use applications relevant to their roles and responsibilities. With the help of a web browser
interface, users can access data held in any database the organization wants to make available,
anytime and - subject to security provisions - from anywhere within the company workstations,
increasing employees' ability to perform their jobs faster, more accurately, and with confidence
that they have the right information. It also helps to improve the services provided to the users.
· Time: With intranets, organizations can make more information available to employees on a
"pull" basis (i.e. employees can link to relevant information at a time which suits them) rather
than being deluged indiscriminately by emails.
· Communication: Intranets can serve as powerful tools for communication within an
organization, vertically and horizontally. From a communications standpoint, intranets are useful
to communicate strategic initiatives that have a global reach throughout the organization. The
type of information that can easily be conveyed is the purpose of the initiative and what the
initiative is aiming to achieve, who is driving the initiative, results achieved to date, and who to
speak to for more information. By providing this information Business operations and
management: on the intranet, staffs have the opportunity to keep up-to-date with the strategic
focus of the organization.

· Web publishing allows 'cumbersome' corporate knowledge to be maintained and easily


accessed throughout the company using hypermedia and Web technologies. Examples include:
employee manuals, benefits documents, company policies, business standards, news feeds, and
even training, can be accessed using common Internet standards (Acrobat files, Flash files, CGI
applications). Because each business unit can update the online copy of a document, the most
recent version is always available to employees using the intranet.
Intranets are also being used as a platform for developing and deploying applications to support
business operations and decisions across the inter-networked enterprise.
· Cost-effective: Users can view information and data via web-browser rather than maintaining
physical documents such as procedure manuals, internal phone list and requisition forms.
· Promote common corporate culture: Every user is viewing the same information within the
Intranet.
· Enhance Collaboration: With information easily accessible by all authorized users, teamwork
is enabled.
· Cross-platform Capability: Standards-compliant web browsers are available for Windows,
Mac, and UNIX.
2a.
EXTRANET
Intranets differ from "Extranets" in that the former are generally restricted to employees of the
organization while extranets can generally be accessed by customers, suppliers, or other
approved parties.
An extranet is a private network that uses Internet protocols, network connectivity, and possibly
the public telecommunication system to securely share part of an organization's information or
operations with suppliers, vendors, partners, customers or other businesses.
An extranet can be viewed as part of a company's Intranet that is extended to users outside the
company (e.g.: normally over the Internet).
It has also been described as a "state of mind" in which the Internet is perceived as a way to do
business with a pre-approved set of other companies business-to-business (B2B), in isolation from
all other Internet users. In contrast, business-to-consumer (B2C) involves known server(s) of one
or more companies, communicating with previously unknown consumer users.
An extranet requires security and privacy. These can include firewalls, server management, the
issuance and use of digital certificates or similar means of user authentication, encryption of
messages, and the use of virtual private networks (VPNs) that tunnel through the public network.
2b.
ADVANTAGES OF EXTRANET
· Exchange large volumes of data using Electronic Data Interchange (EDI)
· Share product catalogs exclusively with wholesalers or those "in the trade"
· Collaborate with other companies on joint development efforts
· Jointly develop and use training programs with other companies
· Provide or access services provided by one company to a group of other companies, such as
an online banking application managed by one company on behalf of affiliated banks
Share news of common interest exclusively

3a.
Peer-to-Peer
· Peer-to-Peer networks (P2P) are the simplest of all LAN set-ups.
· Not only are they easy to configure and require few resources, they are also inexpensive to
implement.
· Peer-to-Peer, also called P2P networks, are the most direct method of connecting computers,
requiring only a network cable for the simplest of networks

3b.
Advantages of a peer-to-peer Network
· Less initial expense - No need for a dedicated server.

3c.
ADVANTAGES OF A CLIENT/SERVER NETWORK
· Centralized - Resources and data security are controlled through the server.
· Scalability - Any or all elements can be replaced individually as needs increase.
· Flexibility - New technology can be easily integrated into system.
· Interoperability - All components (client/network/server) work together.
· Accessibility - Server can be accessed remotely and across multiple platforms.

DISADVANTAGES OF A CLIENT/SERVER NETWORK


· Expense - Requires initial investment in dedicated server.
· Maintenance - Large networks will require a staff to ensure efficient operation.
· Dependence - When server goes down, operations will cease across the network
4a.
The economic benefits of the Internet
· The economies of the world are increasingly powered by the creation, use and transmission of
information and entertainment content in digital format.
· The deployment of Internet infrastructure impacts the economy both directly and indirectly.
· The effects of broadband technology on the economy are much more far-reaching than the
direct benefit created by capital investment in deployment and the manufacturing of the
components such a network requires.
· The most significant economic benefits do not come from the deployment of the technology,
but in its use.
· As Internet penetration increases, there will be resulting demand for computer and
home network equipment, software applications, wireless devices and other equipment.

· Like all infrastructure investment, the economic impacts of Internet will also include the
increased productivity and innovation that it fosters.
· The full economic impact of widespread Internet deployment and adoption cannot be
captured in even the most sophisticated econometric modelling.
· The Internet provides increases in employment and economic activity
· A study sponsored by Cisco Systems found that full implementation of currently underway or
planned Internet business solutions could result in over $528 billion in cost savings to U.S.
businesses though 2010. Additionally, this study finds that these solutions could result in a
cumulative increase of over $1.5 trillion in revenue to businesses resulting from implementation
of Internet business solutions.
· The wide-ranging deployment of Internet infrastructure will have the direct effect of
employing thousands of people: to manufacture, sell, purchase, install, manage, and maintain the
equipment and facilities, as well as the resulting services.

5a.
A digital library is a library in which collections are stored in digital formats (as opposed to print,
microform, or other media) and accessible by computers.
5b.
A Bulletin Board System, or BBS, is a computer system running software that allows users to
connect and login to the system using a terminal program.

5c.
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for
delivery of voice communications over the Internet or other packet-switched networks.

5d.

VoIP challenges:

· Available bandwidth
· Network Latency
· Packet loss
· Jitter
· Echo
· Security
· Reliability
· In rare cases, decoding of pulse dialing

6a.
An Internet cafe or cyber-cafe is a place where one can use a computer with Internet access,
most for a fee, usually per hour or minute; sometimes one can have unmetered access with a
pass for a day or month, etc. It may serve as a regular café as well, with food and drinks being
served.

6b.
ep 1:
Raise money. If this is your first venture, you will need to ask people to invest, and/or get loans so
that you can to start out your business. It is extremely important to have in place a well prepared
Business Plan to show potential investors and the bank. Nobody will invest in something that you
are not clear about 100%. Think of all the angles and if you don't know the answers up front, find
out before you seek investment funding. It is really important to address such questions as:

· The market being targeted


· The profits expected
· The expenses expected
· The market demand for your café in your chosen location
Step 2:
Choose a suitable location that will attract customers. Areas that will be likely to attract customers
include being near a school or tourist destination. Travelers are always in need of internet
resources. Places that have a heavy load of people willing to stop (for example, around other
cafés, small shops etc.) are also good.
Step 3:
Obtain permits. In order to combat terrorism, Advance Fee Fraud crimes, and Copyright violations
by clients Nigerian government requires registration of all Cybercafé with Economic and Financial
Crime Commission (EFCC) and Nigerian Communications Commission (NCC).
Step 4:
Choose your ISP. Most likely you will need to get a business grade internet connection to provide
enough bandwidth for your café. Talk to an engineer at the ISP about the possibilities and ask
what special deals are offered for businesses.
Step 5:
Hire a designer to design the layout. Hire a carpenter to build all the necessary furniture or buy all
the computer tables. If you are having an eating/drinking area, work with the carpenter and
designer to ensure that computing equipment is kept safe from beverage and food preparation
and consumption.
Step 6:
Purchase all the necessary equipment such as computers, network cable, router, scanner, printer,
crimping tools and RJ 45 jacks. A network attached color laser printer is expensive but might be
appropriate for your café. Also purchase any food and beverage preparation items if you are
including these. Think coffee making facilities, plates and cups, microwave or other ovens etc.
Step 7:
Hire an electrician and set up all the necessary wiring.
Step 8:
Add Value by considering other elements customers are likely to seek. Printing, photocopying,
disk sale and loading, photo sending etc. are just some possible value-adding items that will set
you apart from competitors and drive customers to your café in place of others.
Step 9:
Install all the items.
Step 10:
Put up your prices and times on the wall in clear print. For example, N10 flat fee and N20 for
every minute after that or whatever works out best given your ISP deal and the need to cover
overheads wages and make some profit.
Step 11:
Set up the network or hire somebody to do it for you.
Step 12:
Manage your software effectively. Each computer is likely to have a Windows OS key, Microsoft
Office key, any games installed will also have keys.
Step 13:
Record all the serial numbers and model numbers of each computer. Store all the information in
a secure place online.
Step 14:
Firefox and Internet Explorer are the most popular and practical browsers. Not far behind in
Opera and Safari.
Step 15:
You need some form of virus protection for all your computers.
Most routers have a firewall, if yours does not, install one. Firewalls will help protect your
network from worms, viruses and outside attacks.
Step 16:
Install some sort of basic network traffic monitors. While you don't want to invade your
customer's privacy you do want to keep an eye out if one of your customers is using your
legitimate business to send out spam.
Step 17:
The cafe computers will probably have spyware on them frequently; make it a habit to run anti
spyware programs often.
Step 18:
Install a cybercafé billing and management software with the following features:
- Computer usage billing and control
- Printing and POS billing
- Detailed reports, which can be sent by email
- Highly sophisticated pricing settings
- Employee password-protected accounts with individual user rights
- Client module has a very user-friendly Windows-like interface! Customers don't have to
spend time figuring it out.
- Comprehensive client PC security
- Client PCs are locked between sessions
- Automatic PC Hardware and Software audit
- Records PC inventory changes to a special log
- In case of specified critical changes, automatically sends email alerts
- Users are required to log in before accessing the server system ensuring
complete information privacy
- Shows a detailed report about each individual computer as well as overall statistical data
for all computers
- Remote administration via a web-based interface with any browser
Step 19:
Employ the right personnel

6c.
Personnel requirements of a Cyber-cafe
1. Network administrator is a modern profession responsible for the maintenance of
computer hardware and software that comprises a computer network. This normally includes the
deployment, configuration, maintenance and monitoring of active network equipment. A related
role is that of the network specialist, or network analyst, who concentrate on network design and
security.
2. Cleaners
3. Good manager with computer skills
4. Operators

6d.
What is a MODEM?

Modem (from MOdulator-DEModulator) is a device that modulates an analog carrier signal to


encode digital information, and also demodulates such a carrier signal to decode the transmitted
information.
7a.

ADVANTAGES OF WIRELESS BROADBAND


· High bandwidth.
· Access the web on the move.
· High media profile makes advice easy to come by.
DISADVANTAGES OF WIRELESS BROADBAND
· Still in its infancy, so availability is limited.
· Setting up a wireless network requires substantial technical knowledge.
· Some security concerns persist about wireless technology.

7b.
Benefits of Wireless Internet connection
A wireless internet connection is very fast and stable as opposed to other broadband solutions.
Wireless internet does not need to be connected to any main phone line hence the line would be
freed for other uses. To connect to wireless internet would just be a matter of setting up a long
range antenna which will establish a connection as soon as it can pick up our signal.
Wireless internet is also very affordable as opposed to prices 5 years ago and is also very easy to
install. It is just a matter of installing all the hardware and software and you'll be ready to access
the internet. Wireless networks are also very efficient. In some instances Wireless Internet has
proven to be faster than a broadband connection. Most broadband solutions offer a fixed
download/upload ratio, but with wireless, the speed at which you download can be the same as
what you upload. Hence you are not restricted to fast download speeds and slow upload speeds.
This makes wireless versatile and a worthwhile solution for businesses in demand of fast internet
access.
·
Economic Network Costs
Global Availability
Site Relocation and Addition
Flexibility & Expansion
VSAT Bands

Wireless
·· Radio Frequency Internet Connection
· Wireless Internet is achieved by sending data on a radio frequency rather than the
conventional way through copper wiring (phone lines). This is achieved by using a long range
antenna and a wireless network card.
·
· The antenna will pick up radio waves from a Wireless Internet access point and send data
to your server terminal through a Wireless Network Card.
·
· This network interface differs from the conventional Ethernet network card as it is
responsible for converting radio wave signals to manageable computer data.
·
· This concept works similar to watching TV or listening to the radio. As soon as your
hardware is up and running a connection would be established. Your computer would then be
able to send and receive information on this network.
·
· For wireless Internet to be fully operational a line of sight must be visible between the
antenna and our access point.
·
· Distance depends on how powerful the antenna is, but typically the closer an antenna is to
an access point, the better the reception will be. Hence the transfer speed would be greater.

Wireless Internet Locations


· To be able to establish a wireless internet connection, an antenna must be within 22kms and
in the line of sight of an access point.
· You will need to contact your ISP and discuss your location, specifically whether you are in one
of their coverage areas or not.
Costs of Wireless Internet
· The cost for Wireless internet depends on the transfer speed of your connection and how
much data you wish to download.
· A Setup fee consisting of an Access Point, Antenna, Mast, Mounting Kit, labour to install and
configure Cable and sundries will also be paid.

7c.
Obstacles to Effective Transmission
· If you are located more than 2 miles from a cell, the wireless Internet connection will require a
direct radio line of sight. As a general rule, if you cannot get a direct radio line of sight from your
location to an access point, you can't get wireless access.
· Busy lines while trying to establish phone connection with ISP

· Congestion of bandwidth leading to slowing down of speed


· Bad Weather conditions
· Outages from ISP during Maintenance
· Power failure

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy