N left click space right-down arrow enter page down
Advance to the next slide
19
New cards
P Backspace left-up arrow page up
Return to the previous slide
20
New cards
Right click
Popup menu/previous slide
21
New cards
escp
End slide show
22
New cards
Data
consist of raw facts and figures.
23
New cards
Information
the process form of data. Data is not certain while information is certain.
24
New cards
DATA COMMUNICATION
Electronically transmission of data from one place to another by using a medium.
25
New cards
DATA COMMUNICATION
The transmission of digital data between two or more computers and a computer network or data network is a telecommunications network that allows computers to exchange data.
26
New cards
Sender Medium Receiver
3 Components of Data Communication
27
New cards
DATA TRANSMISSION MODES
The way of transmission of data from one place to another
28
New cards
Simplex Mode Half duplex Mode Full duplex Mode
3 Transmission Modes
29
New cards
Simplex Mode
- Data can flow only in one direction - Not moved in both direction, one way street - Not perform both action either send or receive data - Direction of flow not changes.
30
New cards
Half duplex Mode
- Data can flow in both directions but not at same time - One way at a time - Device with half duplex mode can send and receive data but not at the same time.
31
New cards
Full duplex Mode
- Data can flow in both directions simultaneously - Fast speed
32
New cards
Digital Data Transmission Analog Data Transmission
2 Forms of Data Transmission
33
New cards
Analog Data Transmission
- In the form of wave called carrier wave - The number of wave repeats during a specific time known as frequency - The height of carrier wave is called amplitude
34
New cards
Digital Data Transmission
- Digital Signals are transmitted in sequence of voltage - Represented in binary forms
- Data is transmitted block by block. No gap in data that’s why it is faster.
37
New cards
Asynchronous Transmission
- Data is transmitted character by character. There is regular gap between characters in data transmission.
38
New cards
COMPUTER NETWORK
- It is a set of two or more computers connected through to share information and other resources. - A system of interconnected computers and computerized peripherals such as printers. - This interconnection among computers facilitates information sharing among them. Computers may connect to each other by either wired or wireless media.
39
New cards
Personal Area Network Local Area Network Metropolitan Area Network Wide Area Network Internetwork
5 Computer Network Types
40
New cards
Internetwork
It is the largest network in existence on this planet.
41
New cards
Wide Area Network
this network covers a wide area which may span across provinces and even a whole country
42
New cards
Metropolitan Area Network
generally expands throughout a city such as cable TV network.
43
New cards
Local Area Network
A computer network spanned inside a building and operated under single administrative system is generally termed as __________. It usually covers an organization’s offices, schools, college/universities etc.
44
New cards
Personal Area Network
is smallest network which is very personal to a user.
45
New cards
Network Topology
is the way computer systems or network equipment connected to each other.
46
New cards
Point-to-point Bus Topology Star Topology Ring Topology Mesh Topology Tree Topology Daisy Chain Hybrid Topology
8 types of Computer Network Topologies
47
New cards
Point-to-point
contain exactly two hosts
48
New cards
Bus Topology
all devices share a single communication line or cable.
49
New cards
Star Topology
are connected to a central device, known as Hub device, using a point-to-point connection.
50
New cards
Ring Topology
each host machine connects to exactly two other machines, creating a circular network structure.
51
New cards
Mesh Topology
In this type of topology, a host is connected to one or two or more than two hosts
52
New cards
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in use present day.
53
New cards
Daisy Chain
This topology connects all its hosts in a linear fashion. Similar to Ring topology, all hosts in this topology are connected to two hosts only, except the end hosts.
54
New cards
Hybrid Topology
A network structure whose design contains more than one topology
55
New cards
INTERNET
is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals
56
New cards
access provider
is a business that provides individuals and organizations access to the Internet free or for a fee.
57
New cards
IP address
is a number that uniquely identifies each computer or device connected to the Internet
58
New cards
domain name
is the text version of an IP address
59
New cards
DNS server
translates the domain name into its associated IP address
60
New cards
World Wide Web
consists of a worldwide collection of electronic documents
61
New cards
Web site
is a collection of related Web pages and associated
62
New cards
Web server
is a computer that delivers requested Web pages to your computer
63
New cards
Web 2.0
refers to Web sites that provide a means for users to interact
64
New cards
Web browser or browser
allows users to access Web pages and Web 2.0
65
New cards
home page
is the first page that a Web site displays
66
New cards
links
Web pages provide _____ to other related Web pages
67
New cards
Downloading
is the process of receiving information
68
New cards
URL or Web address
A Web page has a unique address called a _____
69
New cards
Tabbed browsing
allows you to open and view multiple Web pages in a single Web browser window
70
New cards
Multimedia
refers to any application that combines text with graphics, animation, audio, video, and virtual reality
71
New cards
Graphics
– is a digital representation of nontext information
72
New cards
Tumbnail
is a small version of a larger graphic
73
New cards
Animation
is the appearance of motion created by displaying a series of still images in sequence
74
New cards
Audio
includes music, speech, or any other sound. You listen to audio on your computer using audio player
75
New cards
Streaming
is the process of transferring data in a continuous and even flow.
76
New cards
Video
consist of images displayed in motion
77
New cards
Virtual Reality
is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.
78
New cards
1. Business to consumer (B2C) 2. Business to Business (B2B) 3. Consumer to consumer (C2C)
3 Types of e-commerce
79
New cards
E-mail
is the transmission of messages and files via a computer network
80
New cards
e-mail program
allows you to create, send, receive, forward, store, print, and delete email messages
81
New cards
mailing list
is a group of e-mail names and addresses given a single name
82
New cards
Subscribing
adds your e-mail name and address
83
New cards
Unsubscribing
removes your name
84
New cards
Instant messaging (IM)
is a real-time Internet communications service
85
New cards
chat
is a real-time typed conversation that takes place on a computer
86
New cards
chat room
is a location on an Internet server that permits users to chat with each other
87
New cards
VoIP (Voice over IP)
enables users to speak to other users over the Internet. Also called Internet TELEPHONY
88
New cards
newsgroup
is an online area in which users have written discussions about a particular subject
89
New cards
message board
is a Web-based type of discussion group
90
New cards
FTP (File Transfer Protocol)
is an Internet standard that permits file uploading and downloading with other computers on the Internet
91
New cards
Netiquette
is the code of acceptable Internet
92
New cards
SECURITY
We must secure our computers with technology in the same way that we secure the doors to our homes,
93
New cards
SAFETY
We must act in ways that help protect us against the risks that come with internet use.
4 PRIMARY ONLINE RISKS AND THREATS To Personal Information
96
New cards
Viruses/Worms
Software programs designed to invade your computer and copy, damage, or delete your data.
97
New cards
Computer Virus
Affects a computer negatively by altering the way the computer works
98
New cards
Worms
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
99
New cards
Trojans
- Viruses that pretend to be helpful programs while destroying your data, damaging your computer and stealing your personal information - A malicious program that hides within or looks like legitimate program
100
New cards
Rootkit
Program that hides in a computer and allows someone from a remote location to take full control