0% found this document useful (0 votes)
41 views12 pages

Grade 11 Term 2 Theory Notes

The document provides an overview of Local Area Networks (LAN and WLAN), their definitions, purposes, advantages, and disadvantages. It also covers basic network components, connection types, security measures, usability of web pages, and the implications of unauthorized access and ethical use of networks. Additionally, it introduces new terminologies such as BYOD, Big Data, Cryptocurrency, and Blockchain, along with their definitions and uses.

Uploaded by

mehl.zion
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views12 pages

Grade 11 Term 2 Theory Notes

The document provides an overview of Local Area Networks (LAN and WLAN), their definitions, purposes, advantages, and disadvantages. It also covers basic network components, connection types, security measures, usability of web pages, and the implications of unauthorized access and ethical use of networks. Additionally, it introduces new terminologies such as BYOD, Big Data, Cryptocurrency, and Blockchain, along with their definitions and uses.

Uploaded by

mehl.zion
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Local Area Networks (LAN and WLAN)

Topic Definition Purpose & Uses Advantages Disadvantages


LAN (Local Area A network confined to a small - Sharing resources like printers, - High data - Limited range
Network) geographic area, like a home, files, and internet connections transfer speed - Can become congested
office, or school. within a small area. - Cost-effective for with too many devices
- Typically used in homes and small setups - Security can be a
small offices. - Easy to set up concern
and manage
WLAN (Wireless A wireless version of LAN that - Used in homes, offices, and - No physical - Less secure than wired
Local Area uses radio waves to connect public spaces for wireless wiring required LAN
Network) devices. connectivity. - Flexible, easy to - Prone to interference
move devices - Slower speeds
- Allows more compared to wired LAN
mobility

Basic Components of a Network


Component Definition/Explanation Uses
Workstations and Workstations(Client) are devices (computers) used by - Workstations access shared data and
Servers individuals to access the network. applications.
- Servers provide centralized resources
Servers provide resources and services to the network. (files, emails, websites).
Network Interface Card A hardware component that enables a computer or device - Allows devices to communicate over the
(NIC) to connect to a network. network.
Network Devices for Devices such as routers, switches, hubs, and access - Facilitate communication between
Connection points that help connect devices within a network. devices in the network.
Communication The physical path or wireless spectrum used to transmit - Includes cables (Ethernet, fiber) and
Medium data between devices. wireless signals (Wi-Fi, Bluetooth).
Network Software Software used to manage, monitor, and control network - Includes operating systems, network
operations and devices. monitoring tools, and security software.
Characteristic UTP Cable Fiber Optic Cable
Material Copper Glass or plastic
Data Speed Lower (up to 1Gbps for Cat 6) Much higher (up to 100 Gbps or more)
Distance Limit Up to 100 meters (Ethernet) Several kilometers without signal loss
Cost Relatively cheap Expensive
Installation Easy to install, flexible Complex installation requiring skilled labor
Signal Interference Susceptible to electromagnetic interference Immune to interference
Bandwidth Lower bandwidth capacity Higher bandwidth capacity

Connection Types
Topic Definition Uses Advantages Disadvantages
Wired A connection that uses - Common in LAN setups - Faster speeds - Less mobility
Connection physical cables (e.g., (office, home). - More secure - More difficult to set up and
Ethernet) to connect - Provides stable, fast - Stable connection manage over long distances
devices in a network. connections. with low interference - Physical limitations
Wireless A connection that uses - Common in WLAN - Flexible, mobility- - Slower speeds compared
Connection radio waves to transmit setups (home, cafes, friendly to wired
data (e.g., Wi-Fi). public spaces). - Easier to set up - Less secure
- No physical cables - Vulnerable to interference
required (e.g., walls, networks)
Data The speed at which data - Higher speed is - Faster data - Limited by network
Transmission is sent over a network, necessary for tasks like transmission leads to hardware, infrastructure,
Speed improved user
usually measured in video streaming or large experience. and service provider
Mbps or Gbps. file transfers. - Faster loading times, constraints
reduced buffering

Intranet and Extranet


Topic Definition Uses Advantages Disadvantages
Intranet A private network that is - Used for internal - Secure and private - Limited access
accessible only to an communications, document - Enhances internal - Not accessible by
sharing, communication external users
employees, or authorized users. project collaboration within an - Centralized without VPN
organization. information - May be expensive
management to maintain
Extranet A private network that allows - Used for business-to-business - Allows secure - Security risks when
limited access to external users communication, sharing data and collaboration with not properly
(partners, suppliers, customers) documents securely with external partners managed
for business collaboration. partners. - Facilitates external - Complex to set up
access to specific and mai
resources

Basic Network Security


Topic Definition Uses Preventive Measures
Passwords A string of characters used for authentication to - Secures access to network, - Use strong, complex
ensure that only authorized users access the devices, and systems. passwords (mix of letters,
network or device. numbers, symbols)
- Change passwords
regularly
Usernames A unique identifier for each user in a network or - Used alongside passwords - Use unique usernames for
system. for user identification and each individual
access control. - Ensure usernames cannot
be easily guessed
Access Permissions assigned to users to control what - Ensures that sensitive data - Implement least privilege
Rights resources they can access and how they can is only accessible by access control
interact with them (read, write, execute). authorized personnel. - Regularly review access
permissions for relevance

Usability of Web Pages/Websites (Basic Areas)


Topic Definition Focus Areas for Usability
Web Page Layout and The arrangement of elements (text, images, buttons, etc.) on a - Simple, clean design
Design webpage, ensuring a smooth user experience. - Intuitive navigation
- Responsive design for all
devices
Content The information presented on a website, including text, images, and - Clear, concise, and well-
videos. structured content
- Relevant and updated
information
Navigation The menus, links, and other elements that help users move through - Easy-to-follow navigation
the website efficiently. - Logical organization of pages
Performance The speed at which a web page loads and functions, critical to user - Fast page load time
experience. - Reduced downtime
- Efficient code optimization
Accessibility Ensuring that websites are usable by people with varying abilities and - Text alternatives for images
disabilities. (alt text)
- High contrast text for
readability
- Keyboard navigability
Evaluate Web Pages/Websites
Aspect Definition Considerations Advantages Disadvantages
Readability The ease with which users - Font size, contrast, spacing, - Improves user - Poor readability can
can read and understand and sentence structure all experience and drive users away.
the content on a website. affect readability. accessibility. - Complex language or
- Engages visitors more font styles can deter
effectively. readers.
Navigation The system of menus, links, - Well-organized structure. - Easier for users to find - Confusing or cluttered
and paths that guide users - Intuitive path to key content. information. navigation may frustrate
through the site. - Clear call-to-action buttons. - Enhances user users.
satisfaction. - Poor organization can
- Reduces bounce lead to site
rates. abandonment.
Consistency Ensuring uniformity across - Uniform layout and color - Creates a cohesive, - Inconsistent elements
pages in terms of design, schemes. professional can confuse users.
content, and functionality. - Consistent navigation and appearance. - Compromises the
iconography. - Enhances usability by professional feel of the
- Same tone and language making the site easier website.
across content. to use.
Layout The arrangement of - Logical structure of content. - Improves user - A cluttered layout
elements such as text, - Balance of white space and engagement. makes the website look
images, and buttons on a elements. - A well-organized messy.
webpage. - Proper alignment of text and layout makes the - Overuse of media can
media. website more attractive. slow down load times.
Typography The style and appearance - Font type, size, color, and - Enhances readability. - Poor font choices can
of the text used on the spacing. - Consistent typography make text hard to read.
website. - Readability on different strengthens the brand - Inconsistent use of
devices. image. fonts can disrupt design
- Link to documents (like
Word docs).
Internet of Things (IoT)
Topic Definition Uses Advantages Disadvantages
Internet of A technology where all sort of - Smart homes - Provides - Security concerns
Things (IoT) devicese are increasinly (thermostats, lights, security convenience and (potential for hacking).
connected to internet cameras). automation. - Privacy issues
- Wearable tech - Real-time data (collecting personal
(smartwatches, fitness collection. data).
trackers). - Improves efficiency. - Data overload.
Social Issues and Network Safety/Security
Topic Definition Implications Preventive Measures
Unauthorized Gaining access to a network or system - Hacking, exploitation of weak - Use strong passwords
Access without permission. passwords. and multi-factor
- Data theft or vandalism. authentication.
- Employ regular security
audits.
- Encryption.
Ethical Use of Adhering to appropriate and legal - Unauthorized file sharing, piracy, - Implement Acceptable
Networks behavior when using networks, such as and misuse of resources. Use Policies (AUP).
respecting privacy and intellectual - Encourage responsible
property. use.
- Monitor for violations.
Acceptable Use A document that outlines the guidelines - Ensures responsible and ethical - Promotes safe use of the
Policies (AUP) for users when accessing a network or behavior in the use of school or internet.
service. company networks. - Reduces the risk of legal
issues related to misuse.
1. Internet Usage:
o Employees/students should use the internet for educational or work-related purposes only.
o Access to inappropriate or illegal websites (e.g., adult content, pirated material) is prohibited.
2. Email Use:
o Emails should not be used to send spam, offensive content, or personal messages unrelated to work or study.
o Using the organization's email for illegal activities (such as fraud or harassment) is not allowed.
3. Software Installation:
o Only authorized software should be installed on company or school devices.
o Piracy, or downloading software from unauthorized sources, is strictly prohibited.
4. Data Privacy and Security:
o Users should protect passwords and sensitive data from unauthorized access.
o Sharing personal information or confidential business data is prohibited unless authorized.
5. Social Media Use:
o Employees/students should refrain from sharing company-sensitive information on personal social media accounts.
o Cyberbullying or inappropriate comments about the organization, its employees, or students should be avoided.
6. Device Usage:
o Personal devices may only be connected to the organization's network if approved.
o It is forbidden to use company-owned devices for illegal activities or personal gain.
7. Network Access:
o Only authorized individuals should access the organization's network.
o Users should not attempt to access data or systems they are not authorized to view.

Network Safety and Security Issues


Topic Definition Implications Preventive Measures
Privacy Issues Concerns related to protecting personal - Data breaches, - Encrypt sensitive data.
information and data from unauthorized -loss of sensitive personal - Implement access
access or misuse. information (social security controls.
numbers, health records). - Regular security training
for users.
Spyware Malicious software that secretly monitors - Theft of personal information or - Use antivirus software.
browsing habits. - Regular system
purposes. updates.
- Avoid suspicious
downloads.
Adware Software that displays unwanted ads, - Annoying pop-up ads. - Use ad-blockers.
often in a way that interferes with normal - Potential exposure to malware. - Be cautious about free
browsing activities. software installations.
- Regular malware scans.
Role of Databases Databases store large amounts of data, - Important for organizing and - Implement strong
including personal information and managing data securely. encryption and access
transaction records. controls.
- Regular audits for
unauthorized access.
Respect Privacy & Acknowledging the intellectual property - Avoid piracy, plagiarism, and - Follow copyright laws.
Products of Others and privacy rights of others. unauthorized use of content or - Secure personal data.
data. - Always obtain
permissions for using
others' content.

NEW TERMINOLOGIES Topics


Topic Definition Uses Preventive Measures
BYOD (Bring Your Allowing employees or students to bring their - Used in many schools - Implement strict
Own Device) personal devices to work or school and connect and workplaces to security measures,
them to the network. increase flexibility and including encryption.
productivity. - Regular monitoring of
devices.
Big Data Extremely large datasets that can be analyzed for - Used in business, - Ensure strong data
to review trends. healthcare, social media, privacy and protection
and more to make laws.
informed decisions. - Use effective data
management tools.
- Avoid data overload.
Cryptocurrency vs. Digital or virtual currency that uses cryptography - Used for investment, - Cryptocurrency offers
Normal Currency for security transactions, and as an lower transaction fees.
Examples: alternative to fiat money. - Faster transactions
Bitcoin (BTC) across borders.
Ethereum (ETH)
Litecoin (LTC)
Ripple (XRP)
Key Features of cryptocurrency:
Decentralized: No central authority (like a
government or bank) controls
cryptocurrencies. Instead, they are
governed by decentralized networks.
Blockchain Technology:
Cryptocurrencies use blockchain, which is
Topic Definition Uses Preventive Measures
a transparent, secure, and tamper-proof
ledger of transactions.
Digital Nature: Cryptocurrencies exist
only in digital form and cannot be
physically held (no coins or paper bills).
Anonymity: While transaction details are
recorded on a public ledger, users can
often remain anonymous or
pseudonymous.
Limited Supply: Many cryptocurrencies
have a capped supply (e.g., Bitcoin has a
limit of 21 million coins), which can affect
their value.
Blockchain A decentralized digital ledger used to record - Ensures secure, - Highly secure due to
transactions across multiple computers. transparent, and decentralization.
unalterable transaction - Reduces fraud risk in
records. financial transactions.

You might also like