0% found this document useful (0 votes)
21 views4 pages

8th Notes Chapter 1 Continue (11 May 2024)

Uploaded by

unknown458012
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views4 pages

8th Notes Chapter 1 Continue (11 May 2024)

Uploaded by

unknown458012
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

ACADEMIC YEAR 2024-2025

Notes

Grade :8 Subject : Computer


Lesson: 1.

Network devices, also known as networking hardware, are physical


devices that allow hardware on a computer network to communicate
and interact with one another. Some network devices are:
• NIC: NIC or network interface card is a network adapter that is
used to connect the computer to the network. It is installed in the
computer to establish a LAN.
• Hub: A hub is a device that is used to connect computers in a
network. In a hub, when one computer sends data on the network,
the hub simply forwards the packets to all the other computers
connected to it.
• Switch: A switch is a device that is also used to connect computers
in a network. However, a switch is a more intelligent device than a
hub. Unlike a hub, the switch sends the incoming data to the
desired destination only.
• Router: A router is a network device that connects two or more
networks. It is commonly used to connect a computer or a network
to the Internet. Lines from different networks are connected to a
router. Wireless routers are also available.
Protocols : A network protocol is a set of rules that govern data
communication between different devices in the network. It determines
what is being communicated, how it is being communicated, and when
it is being communicated.

• HTTP (Hyper Text Transfer Protocol): It is a protocol used between


a web server and a web browser for transferring HTML pages.
• TCP/IP (Transmission Control Protocol/Internet Protocol): TCP is a
protocol that is used along with the IP to send data over the
Internet. The information is transmitted across the Internet in the
form of bundles called packets TCP is responsible for dividing the

(1)
data into packets before they are sent and for reassembling the
packets when they arrive at the destination. IP is a set of
specifications that determines the best route for the packets across
the Internet so that the packets reach their destination address.
• HTTPS (Hyper Text Transfer Protocol Secure): HTTPS is an extension
of HTTP. It is encrypted to ensure secure communication over
internet.

Packet switching in networks:

Packet switching is the transfer of small pieces of data across various


networks. These data chunks or “packets” allow for faster, more efficient
data transfer.

Often, when a user sends a file across a network, it gets transferred in


smaller data packets, not in one piece. For example, a 3MB file will be
divided into packets, each with a packet header that includes the origin IP
address, the destination IP address, the number of packets in the entire
data file, and the sequence number.

NETWORK SECURITY
A computer on a network can be accessed by many users. Security
measures have to be taken to protect networks from unauthorized access
and to prevent data or information theft.

Threats to Computer
Files can be shared between the computers on a network. This makes a
computer vulnerable to attacks by viruses, worms, Trojan horses and so
on that can easily spread because of the underlying network. Some
common threats are:

(2)
• Trojan Horse : A computer program that appears to be a useful
software but actually causes damage once installed or executed
onto your computer system is known as a Trojan horse or a Trojan.

• Data Theft: It is a very serious problem for computer networks.


People break into computer networks to either disrupt their
functioning or to steal confidential information. Hackers are the
computer experts who can break into computer systems and
networks. There are two types of hackers—white hackers and black
hackers.
• White hackers: study and break into networks to find and fix
security loopholes. They offer their to corporations, public
organizations and educational institutions to make their networks
more secure.
• Black hackers or crackers: have a criminal intention. Some
examples are cracking bank accounts in order to transfer money to
their own accounts.

Computer Security:

• Antivirus software is a set of programs that can prevent, detect,


remove, and search for different viruses or other malware software
like worms, trojan, adware, etc. Basically, the computer devices use
this software but, it also works on networks and IT systems.
Furthermore, it is not sufficient to just install this software rather, we
also have to update them from time to time.
• Firewall: A firewall is used to prevent unauthorised access to a
computer network. A firewall can be implemented as a software, a
hardware or a combination of both.

(3)
Mobile networks:
Starting with the 1G (First generation) networks that used analog
technology and offered only voice-based services, the wireless
communication technology has evolved to 4G (fourth generation) and 5G
(fifth generation) network that offer stable connectivity with extremely high
speeds.

(4)

You might also like