4 Digital Analog Computers use digital signals—0s and 1s, off and on. All the data that a computer processes is a series of0s and 1s.Each signal is a bit.AnalogBut most phenomena in life are analog.Analog signals use wave variations.Sound, light, and temperature are analog forms.Traditional TV and radio use analog signals.Humans’ vision operates in analog mode.But analog data can be converted into digital form. Even though digital data is not as exact as analog data, it is easier to manipulate.
5 For data transmission over telephone lines and cables, modems are needed to convert analog data into digital data that computers can use.Modem is short for modulate/demodulate. Modems modulate (convert) a computer’s digital data to analog data, transmit it, then demodulate (reconvert) it back to digital data for the receiving computer.
9 A network is a system of interconnected computers, telephones, and/or other communications devices that can communicate with one another and share dataBenefits of NetworksShare peripheral devices, such as printers,scanners, disk drivesShare programs and dataBetter communications, includingAccess to shared databases
10 Some disadvantages of networks: Expense: The initial set up cost of a computer network can be high depending on the number of computers to be connected and the number of connecting devices and NICs .Security Issues: If a computer is on a network, a computer hacker can get unauthorized access by using different tools.Rapid Spread of Computer Viruses: If any computer system in a network gets affected by computer virus, there is a possible threat of other systems getting affected, too.Dependency on the Main File Server: If the main file server of a computer network breaks down, the entire system can become useless.
11 Main types of networksA wide area network (WAN) is a communications network that covers a wide geographic area, such as a country or the world. The best example of a WAN is the Internet.A metropolitan area network (MAN) is a communications network covering a city or a suburb. Many cellphone systems are MANs.A local area network (LAN) connects computers and devices in a limited geographic area, such as one office, one building, or a group of buildings close together. Philadelphia network is an example of LAN.(continued)
13 How Networks Are Structured: 1. Client/ServerConsists of clients, which are computers that request data, and servers, which are computers that supply data.2. Peer-to-Peer (P2P)All computers on the network are “equal” and communicate directly with one another, without relying on servers
15 Intranets & Extranets: use the Internet as their base Intranets—use infrastructure and standards of the Internet and the web, but for an organization’s internal use onlyExtranets—similar to intranets but allows use by selected outside entities, such as suppliers
16 Network linking devices: Switch— A device that connects computers to a network; sends data only to intended recipientsBridge—Interface device that connects same type of networksGateway—Interface device that connects dissimilar networksRouter—Device that directs messages among several networks, wired and/or wirelessBackbone—Main Internet highway that connects all networks in an organization; includes switches, gateways, routers, etc.
17 Network topologies: Bus, Ring, Star, Mesh Bus – all nodes are connected to a single wire or cableRing – all nodes are connected in a continuous loopStar – all nodes are connected through a central hostMesh – messages sent to the destination can take any possible shortest, easiest route to reach its destination. There must be at least two paths to any individual computer to create a mesh network. (Wireless networks are often implemented as a mesh, and the Internet is a mesh.)
23 Problem: Internet was begun to foster collaboration among universities and scientists. They trusted one another. No security was built into the Internet.Problem: The Internet is open-access and is used by criminals who take advantage of the lack of built-in safeguards.Problem: Most people connect to the Internet and use their computers in LANs. All it takes is one computer on a LAN that has been compromised for all computers on it to be vulnerable to malware and other threats.
24 Cyberthreats Denial of Service Attacks Viruses Consist of making repeated requests of a computer or network device, thereby overloading it and denying access to legitimate usersUsed to target particular companies or individualsVirusesDeviant program that hides in a file or a program on a disk, flash memory drive, in an , or in a web link that causes unexpected effects such as destroying or corrupting data
25 Cyberthreats (continued) Trojan HorsesPrograms that pretend to be a useful program such as a free game or a screensaver but that carry viruses or malicious instructions that damage your computer or install a backdoor or spywareBackdoors and spyware allow others to access your computer without your knowledgeWormsA program that copies itself repeatedly into a computer’s memory or disk driveMay copy itself so much it crashes the infected computer
26 Cyberthreats (continued) How they spreadVia attachmentsBy infected disks and flash drivesBy clicking on infiltrated websitesBy downloading infected files from websitesFrom one infected PC on a LAN to another
27 Cybervillains Hackers are either Computer people who enjoy learning about programming and computersPeople who gain unauthorized access to computers or networks, often for fun or just to see if they can
28 Online Safety Use antivirus software, and keep it current Install a firewall to monitor network traffic and filter out undesirable types of traffic and undesirable sitesDon’t use the same password for multiple sitesDon’t give out any password informationUse robust passwords:Minimum 8 characters with letters, numbers, characters4cats is not a good password; is safer
29 Online Safety (continued) Install antispyware softwareBack up your data, so if your PC is attacked and must be reformatted, you can restore your dataNever download from a website you don’t trustConsider biometric authentication
30 Online Safety (continued) Biometrics: science of measuring individual body characteristicsUsed in security devicesExamples; hands, fingerprints, iris recognition, face recognition, voice recognitionNow available on laptops
Your consent to our cookies if you continue to use this website.