Chapter 7: Basics Of Networks
Why are Networks Important?
Networks allow for communication between devices over short and long distances.
Essential for resource sharing, including files, printers, and internet access.
Enable collaborative work, connecting individuals and organizations globally.
Facilitate digital communication and data transfer, impacting business and personal interactions.
Terms of a Network
Node:
Definition: A node is any device connected to a network, such as computers, servers, and routers.
General Terms of a Network
ISP (Internet Service Provider):
ISP is a company that provides customers access to the internet.
They may offer various types of internet connections, including DSL, cable, or fiber.
Types of Network Connections:
Wi-Fi: Wireless connection using radio waves.
Ethernet: Wired connection typically using twisted pair cables.
Fiber Optic: Uses light signals to transmit data at high speeds.
How does a computer send a packet from your computer to the internet?
The process involves layering protocols (OSI Model) that manage data transmission.
Steps:
The application generates data, which is passed to the transport layer.
Data is segmented into packets.
Each packet has a header containing the destination IP address.
The packets are sent over the network, passing through routers that direct them to their destination.
Network Classification
WAN (Wide Area Network):
Covers a broad area (e.g., countries or continents).
Example: The Internet.
LAN (Local Area Network):
Covers a smaller geographical area, such as a home, school, or office building.
Typically high-speed and low-latency connection.
Chapter 8: Managing your Digital Lifestyle
What is Digital Convergence?
Definition: The merging of distinct technologies, industries, or devices into a unified system due to the integration of digital technologies.
Example: The combination of telephone, internet, and television services into a single platform.
What is loT? (Internet of Things)
Definition: A network of interconnected devices that communicate and exchange data over the internet.
Examples: Smart home devices like thermostats, light bulbs, and security cameras.
Intellectual Property
Definition: A category of property that includes intangible creations of the human intellect, such as inventions, literary and artistic works, designs, and symbols.
Significance: Protects creators' rights to benefit from their work, and encourages innovation.
Chapter 9: Protect Your Digital Data and Devices
What is a hacker?
Definition: An individual who uses technical skills to gain unauthorized access to systems or networks.
Types of hackers:
White Hat: Ethical hackers who help reinforce security.
Black Hat: Malicious hackers seeking personal gain.
Grey Hat: Operate between ethical and unethical practices.
Examples of Social Engineering
Techniques used to deceive individuals into providing confidential information:
Phishing: Sending fraudulent emails that resemble those from legitimate sources.
Pretexting: Creating a fabricated scenario to gain information.
Examples of Malware
Viruses: Self-replicating programs that attach themselves to clean files and spread.
Worms: Malicious software that replicates itself to spread to other devices without human action.
Trojan Horses: Malicious programs disguised as legitimate software.
How do you protect yourself (Digital Literacy)
Employ good password practices (complex and unique passwords).
Regularly update software and systems to patch vulnerabilities.
Use antivirus software and perform routine scans.
Be cautious of suspicious emails and messages.
Chapter 10: Programming
What is SDLC (Software Development Life Cycle) vs PLDC (Programming Life Cycle)?
SDLC: Structured process for developing software, includes stages like planning, design, implementation, testing, and maintenance.
PLDC: Focuses on the actual coding process within the broader scope of software development, including debugging and optimizing code.
What is Programming and Why?
Programming is the process of creating a set of instructions that computer systems follow to perform specific tasks.
Purpose: Automation of repetitive tasks, enhancement of productivity, and creation of software solutions.
Information Systems vs Programs:
Information Systems: Comprehensive systems used to collect, store, process, and disseminate information (e.g., customer databases).
Programs: Specific applications that perform a defined task or function (e.g., word processors).
Examples of Programming Languages:
Java: A versatile and widely used programming language.
Python: Known for its readability and efficiency in various applications.
C++: An extension of the C programming language, widely used for system software.
Chapter 11: Database Fundamentals
Why use a Database?
Provides structured data storage that improves data management and retrieval.
Why can’t we just use Excel?
Problems with Excel:
Not suitable for handling large amounts of data due to performance limitations.
Difficult to enforce data integrity and relationships between data.
Main Benefits of Databases:
Efficient: Streamlines data management processes.
Faster: Facilitates quick data retrieval using indexing.
Shared: Allows multiple users to access and work with data simultaneously.
Data Integrity: Ensures accuracy and consistency of data.
Terms related to Relational Database:
Table: A collection of related data entries in rows and columns.
Record: A single entry in a table, representing a unique instance of data.
Field: A specific attribute within a record, defined by its data type.
Primary Key: A unique identifier for a record in a table.
Foreign Key: A field in one table that uniquely identifies a record in another table, establishing a relationship between the two.
Data Types: Define the kind of data a field can hold (e.g., Integer, String, Date).