Presentation is loading. Please wait.

Presentation is loading. Please wait.

Review for the Final Exam. Data Communication Device (Modem) Computers present within a building or a campus can be directly connected by cables. Steps.

Similar presentations


Presentation on theme: "Review for the Final Exam. Data Communication Device (Modem) Computers present within a building or a campus can be directly connected by cables. Steps."— Presentation transcript:

1 Review for the Final Exam

2 Data Communication Device (Modem) Computers present within a building or a campus can be directly connected by cables. Steps of Development In the year 1969, the Department of Defence (DOD) of the United States started a network called ARPAnet. (Advanced Research Projects Administration network) FTP or File Transfer Protocol is used to transfer files between two computer acting as hosts. In other word. FTD downloads files published from any remote server that is connected to the Internet. The process of converting digital pulses to an analogue signal is called modulation. And the process of re- converting an analogue signal to digital pulses is called demodulation. The device that accomplishes the modulation – demodulation process is called modem.

3 The Internet Protocol (IP) addressing system is deployed to keep track of the users connected to the Internet. AbbreviationWhat it represents.comCommercial organizations.eduEducational Institutions.govGovernment departments.netNetworking organization.acAcademic.ukUnited Kingdom.aeUnited Arab Emirates..thThailand

4 The World Wide Web is series of servers that are interconnected by a method known as hypertext. Homepage refers to the index page of any organization or information resource. Accessing the Internet Dedicated access allows users to remain connected to the Internet all the time Only large organizations or university use this type of connection. Dial up access is accomplished with the help of Internet Service Provider (ISP). Your computer is connected to the Internet through a telephone line. Broadband access is accomplished via telephone line cable or wireless signals.

5 LANs are computer networks confined to a localized area such as an office complex, a factory or a school. WANs are spread across a city, a country, several countries and even continents. WAN is thus a group of linked computers that are separated by large distances. Network two or more computers are connect together such that they work together helping the users to share components like hardware, software and data. Nodes and server The user terminals connected to the network are called nodes or workstations. The computer that manages sharing of the resources among the nodes is called server. Software Network operating system This specialized operating system manages and coordinates the different hardware component of the network.

6 Networking Topology -Classroom : The chairs and tables are arranged in rows and columns. The makes sure that teacher can see and address all the students. -Library : Chairs are put around a table and there would be many such sets. As there is no requirement for interaction with the class as a whole, the class can be divided into smaller groups. Star Topology : This is the central control for the entire network. All the nods communicate by passing data through the hub. Bus or linear Topology: In this the server is present at one end of the cable line. Ring Topology: In this arrangement the nodes are connected in a closed loop such that each node is connected to two such nodes on either side. Tree Topology: The central root node is connected to some nodes which are at a lower level. These nodes in turn are connected to some more nodes at a level yet lower level. This sets up a hierarchical network.

7 Mesh Topology: The nodes are connected to one or more nodes. At the extreme level every node can be connected to every other node in the network. Network Architecture refers to the design of the network. There are two ways in which networks can be designed peer to peer and client server. Peer to peer: The work is distributed among the nodes, all of which enjoy the same level of privileges. They communicate without the necessity of a coordinating central authority. Client server: Multiple clients connect to a central server which provides services to the clients. This is how the librarian work. The two main types of networks are Local Area Network (LAN) and Wide Area Network (WAN). LANs are computer networks confined to a localized area. WAN is a group of computers that are separated by large distances and linked together.

8 - A network confined to a city is know as Metropolitan Area Network. -The user terminals connected to the network are called nodes or workstations the computer that manages all nodes is known as the server. -The network architecture can be peer to peer or client server. Problem Solving Methods Problems that are solved using ca computer are very similar to mathematical problem. A step by step approach is the best way to arrive at a solution. The steps are as follows 6 steps. -A computer program takes input, process it and produces output. -The steps to solve a problem are: understand the problem, analyze the problem, generate possible solutions, select the efficient solution, implement the solution and evaluate the solution. -Algorithms and flowcharts are important tools that help to write computer programs for problem solving.

9 -Flowchart is the graphical representation of an algorithm it uses standard symbols. -In computer programming the memory locations are called variables; each location stores a number. -Rules for good behavior while working on the computer and Internet are called Netiquettes. -We should always uses polite language in email messages and postings in websites. -Spellchecker automatically checks spellings in an email message. -Plagiarism as to copy another person’s idea, words or works, and pretend that they are your own. -Internet is like a huge library. Appropriate use of a search engine can make sure that you can reach the required website in the shortest period of time. -The addiction effects are negative in nature and have a bad impact. All these can lead to failing physical and mental health. Backache and other pains that arise due to bad postures, sleep disorders.

10 -The set of instructions is called program. Programs are called the software component of a computer system. -The electronic components of a computer system are called hardware. -Assemblers compilers and Interpreters most programs are written u sing high level language. - Business applications these are meant for managing and monitoring business operations. Enterprise Resource Planning (ERP) is an example of an integrated application. -The virus is a set of instructions that carries out actions to have a destructive impact on your computer systems. -Word processor are equipped with a feature called Mail Merge. -Utility program is a software that protects against viruses. -Licensed software is required for using such software legally.

11


Download ppt "Review for the Final Exam. Data Communication Device (Modem) Computers present within a building or a campus can be directly connected by cables. Steps."

Similar presentations


Ads by Google