Term 2 Week 2 Notes and Activity

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

10 May 2021 Monday Day 5

1. Wide area networks


1.1 Definition of a WAN
 A wide area network (WAN) is a large network of computers that covers a wide area such as a
city, province, country or even the world.
 Communication methods include cables, microwaves, radio waves and satellites.

1.2 The purpose and role of a WAN


 The main purpose of a WAN is to connect LANs together.
 Facilitate communication between users over a large distance.
 Share a central data source

1.3 The WAN called the Internet


The Internet is a huge collection of LANs, servers and computers connected to each other by
communication channels.

2. Internet services
2.1 Real-time messaging
 Real time messaging is also known as instant messaging (IM).
 Users exchange messages immediately, while other systems such as e-mail have a delay.
 Allows users cheaper communication and multiple users at a time.

2.2 Voice over Internet protocol

Page 1 of 10
2.3 File transfer protocol
Internet service used to transfer files over the Internet.

2.4 Cloud and grid computing


 Cloud computing lets you make use of storage and applications facilities that are not necessarily
hosted on your computer.
 Data and applications can be accessed from any computer connected to the Internet.
 Grid computing refers to the use of multiple computer systems as one.
 Grid computing allows processes to happen over the multiple systems that will not be able to
happen on one computer system, saving money.

2.5 File sharing


 Data is stored on servers around the world using the Internet to transfer files.
 Examples include Dropbox and SkyDrive.

Page 2 of 10
11 May 2021 Tuesday Day 6

3 Government Internet services


Citizens can use services over the Internet to save time instead of standing in queues or visiting the
relevant offices.

3.1 Election information


 Election information can be posted on the Internet providing:
 Up to date information
 Facilities to make sure you are registered to vote
 Detailed voting results.

3.2 TV licence repayment


Television licences can be renewed over the Internet instead of people having to drive to specific offices
or other venues where payment can be made.

3.3 Tax returns


In the past taxpayers had to complete returns on paper whereas now it can be done electronically over the
Internet.

Page 3 of 10
12 May 2021 Wednesday Day 6

4 Internet connections and access


4.1 Types of connections
Connection types include wireless and cabled connections.

4.2 Modems and routers


 A modem is a device that connects a computer to the Internet via a telephone line.
 A router is a device that connects two networks together.
 An ADSL modem router is a device where both devices are combined in one.

4.3 Broadband and bandwidth


 Bandwidth: the amount of data that can travel from one point to another over a connection in a
specific time period.
 Broadband: describes a high speed (high bandwidth) connection to the Internet.
 ADSL and 3G are examples of broadband connections.

4.4 Data transmission speeds


Data transmission speed measured in bits per second (bps) and kilobits per second (Kbps).

4.5 Internet service providers


 Company that has a permanent high-speed connection to the Internet.
 The ISP then hires out the bandwidth to customers for a monthly fee.

Page 4 of 10
4.6 CAP and bundles
 A cap is a limit placed on the amount of uploads and downloads a user may make on an Internet
connection


A bundle is similar to a cap in that an operator allows the client a certain amount of data to be used.
After the bundle is finished a user may be charged for data used thereafter.

4.7 Shaped and unshaped accounts


 Shaping allows for certain Internet functions such as browsing and e-mail to be given priority and
activities such as streaming are limited.
 All downloads on an unshaped account get equal priority.

4.8 Downloading and uploading


Downloading is when data is sent away from a computer over the Internet connection and uploading is
when data comes into a system.

4.9 Coverage and access points


Coverage is a term used to describe the area where a connection is available.

4.10 Internet services


Internet services include e-mail, mailing lists, instant messaging, chat rooms, VoIP, FTP and
newsgroups.

Page 5 of 10
5 Social implications
5.1 Right to access and the right to privacy
 Everybody has the right to privacy.
 Only you have the right to access your own work and not anyone else.
 Access rights help to protect data and information from outsiders.

5.2 Internet attacks


5.2.1 DoS attacks
A denial-of-service (DoS) attack is an attack where a computer is bombarded with huge amounts of data
to slow down a computer or network.

5.2.2 Sniffer attacks


 A sniffer is a small program that can read packets of data being sent on a computer or a network.
 Encryption is a process where data is translated into a secret code for secure transmission.

5.3 Computer crimes


Computer crimes include all crimes that are committed by using computers.

5.3.1 Theft of hardware and software


 Process of stealing the actual physical hardware.
 Theft of software includes stealing the installation media.

5.3.2 Identity theft


A process where a criminal uses the personal details (identity) of a person to dishonestly apply for bank
loans, access bank accounts and other criminal activities.

5.3.3 Bandwidth theft


 A person’s username and password is found out and a criminal will then use these details to
access the Internet on the account of the victim.
 Hotlinking is a process where a link on a website links to a file that is hosted on another website.
This limits downloads on the primary website.

5.3.4 Information and data theft


Information such as personal details is stored in databases. These databases are valuable to advertising
businesses to whom criminals then sell them.

5.3.5 Theft of time and services


 When employees use a computer to browse social networking sites or conduct their own personal
matters they are using resources owned by the company without permission.
 This use also leads to time being lost that should have been used for company business.

5.4 Internet-related fraud scams


 A scam is the process in which criminals get people to give them money by tricking them.
 A hoax e-mail is an e-mail that tries to deceive you by using a story that you cannot check is true.

Page 6 of 10
5.5 Computers can be taken over
 A zombie is a computer that has been taken over by a criminal and is being controlled from a
different physical location.
 The criminal can use the computing power and Internet connections of the zombie army to
perform multiple DoS attacks, send spam or spread malware to other computers around the
world.
 Bots are independent programs that perform automated tasks over the Internet.
 Bots perform tasks that are simple and repetitive much faster than humans can
 Bots can be used for malicious purposes such as collecting e-mail addresses from web pages to be
used for spam.

5.6 Misuse of personal information


Information should be private and not be sold or distributed.

Page 7 of 10
13 May 2021 Thursday Day 7

6 Security issues
6.1 Malware and spyware
 Malware is the term we use for harmful software such as viruses, Trojans and worms that
perform unwanted actions on a computer, or generally disrupt the way a computer normally
works.
 Spyware is a type of malware that secretly collects information such as your browsing history or
even redirects websites and slows down the Internet connection.

6.2 Adware
 Adware is any application that displays online advertisements on web pages, e-mail or other
Internet services.
 Adverts can be in the form of banners or pop-ups.

6.3 Pop-ups
A pop-up is an advertisement that opens in a new window, usually displayed on a web page in the user’s
web browser.

6.4 Key logging


Key loggers are examples of spyware that records key combinations such as usernames, passwords and
pin codes.

6.5 Firewall protection


Hardware or software that stops any unauthorised access to or from the network or computer.

6.6 Avoiding security threats


 Avoid security threats by:
 Updating all of the software to avoid security problems
 Using encryption to send important data
 Installing anti-malware software
 Scanning removable devices for threats before use
 Not opening e-mail or e-mail attachments before scanning for malware
 Not visiting websites where threats may possibly be
 Not installing software from unverified developers.

Page 8 of 10
7 Security safety measures

8 The impact of technology on the global community


Technology has created a global village where everybody can communicate and interact as if we live in
one small village.

8.1 Communication
 Communications technologies include:
 E-mails being sent and received almost immediately
 Video conferencing
 Cellphones allowing calls from almost anywhere.

8.2 Banking
Banks allow users to complete banking tasks such as transfers and paying accounts from anywhere using
Internet or cellphone banking.

8.3 Commerce
Businesses have a larger, global market to sell to.

8.4 Social networking


Allows users to keep up to date with their friends.

8.5 Distributed computing power


 Distributed computing power or grid computing is the use of multiple computer systems as if
they were one computer.
 A company can save on costs using this type of processing because a process can make use of
processing power that is not currently in use. Instead of buying a new powerful computer, the
company can use existing unused processing power and storage space.

Page 9 of 10
14 May 2021 Friday Day 7

Term 2 Assessment 1

Questions
1. Why can the Internet be described as a WAN? (1)
2. Name TWO advantages of real-time messaging. (2)
3. Define the term cloud storage. (2)
4. Name TWO advantages for the government with regards to tax return being done
electronically via e-filing on the Internet. (2)
5. Explain what the difference is between a router and a modem by referring to the function
of each. (2)
6. How would the term bandwidth influence your choice of Internet connection? (2)
7. Your new uncapped ADSL Internet connection is soft capped at 50GB per month.
7.1 What does 'soft capped' mean? (2)
7.2 The account is also a shaped account. How could this impact your use of the connection?
(2)
8. Why would a DoS attack be performed? (1)
9. Briefly define each of the following terms:
9.1 Spyware (1)
9.2 Pop-up (1)
9.3 Keylogger (1)
10. What type of software can be used to protect your computer from illegal attempts to
access it via a network or the Internet? (1)
TOTAL MARKS [20]

Page 10 of 10

You might also like