Computer App Chapter 5
Computer App Chapter 5
1
COMPUTER
NETWORK
“Networking, or computer networking, is the process of
connecting two or more computing devices, such as desktop
computers, mobile devices, routers or applications, to enable the
transmission and exchange of information and resources.”--- IBM
“A Computer Network is a set of two or more computers linked
together via wired cables or wireless networks, such as WiFi, to
communicate, exchange, share, or distribute data, files, and
resources.”
Networking involves association among two or more computers. The
two computers will be connected across the world with the help of
web and networking. There are two forms of modem one is with wires
that have connected inside the computer system and the other is
wireless, that are more comfortable and accessible today
ADVANTAGE OF COMPUTER NETWORK
Resource sharing
Exchange of messages
Remote login ( Access to remote database)
Sharing information at Low Cost
E-Mailing (person-to-person
communication) Storing Files in server allows data to be
shared easily
Entertainment
Fast and Quick backing up of Files
Internet services
Software and resources can be easily
Video conferencing
managed.
Network software has fast installation
3
TYPES OF NETWORK
Based on geographical location computer networks can be divided
into 3:
Local Area Networks (LAN) is a small high-speed network. In LAN
few numbers of systems are interconnected with networking
devicese to create network. As the distance increases between the
nodes or system its speed decreases. So it is limited to a few
meters only.
Networks that cover close geographical areas.
LAN is used to link the devices in a single office, building, or
campus. It provides high speeds over short distances. Systems are
connecting directly to the Network. The LAN is owned by private
people.
TYPES OF NETWORK
WAN is collection of network (or LAN).
This network speed is less than the LAN network speed.
WAN spread over the world may be spread over more than one city
country or continent. Systems in this network are connected
indirectly.
Generally WAN network are slower speed than LAN’s. The WAN
network are owned or operated by network providers.
If it is owned by a single owner then it is called Enterprise network.
MAN (Metropolitan Area Network) is an extension of local area
network to spread over the city.
It may be a single network or a network in which more than one local
area network can share their resources.
APPLICATION OF NETWORK
1. Internet and World Wide Web
In computer networks, we have a global internet, also known as the World Wide Web, that offers us various features
like access to websites, online services, and retrieval of information. With the help of the World Wide Web, we can
browse, and we can do search, and access web pages and multimedia content.
2. Communication
With the help of computer networks, communication is also easy because we can do email, instant messaging, voice
and video calls, and video conferencing, which helps us to communicate with each other effectively.
People can use these features in their businesses and organizations to stay connected with each other.
Computer networks are fundamental to facilitating communication, teamwork, and the effective exchange of
knowledge and resources globally.
LIMITATION OF COMPUTER NETWORK
Although computer networks have many benefits, they also have drawbacks and difficulties that users and
organizations should take into account. Here are a few typical computer network drawbacks:
Security issues: Malware, viruses, hacking, and data breaches are all-too-common security threats. Strong
security measures are needed for networks to protect data and systems.
Complexity: Setting up, running, and maintaining a computer network can be complicated. It can take a lot of
work to manage larger networks effectively.
Cost: Building and running a network can be costly. Hardware, software, maintenance, and security precautions
are all costs.
Reliability Issues: Network interruptions or downtime can be caused by hardware malfunctions, software bugs, or
outside variables like power outages or natural disasters. High network availability demands redundant systems
and backup plans.
10
LIMITATION OF COMPUTER NETWORK
Performance bottlenecks: When dealing with large amounts of data or heavy network traffic, networks
may experience performance problems. Network optimization may be needed to address these
bottlenecks.
Compatibility: Maintaining compatibility between different hardware, operating systems, and software
programs on a network can be difficult. Functionality problems may result from interoperability issues.
Limitations on Bandwidth: On shared or crowded networks, the bandwidth available can affect how
quickly and responsively data transfers occur.
Privacy Concerns: The risk of interception when sending sensitive or private information over networks
raises privacy concerns. To solve this problem, encryption and secure communication protocols are used.
Management and maintenance: Monitoring, troubleshooting, and updates to hardware and software
components are all part of the ongoing network administration and maintenance tasks.
Scalability Challenges: Growing a network to accommodate expansion can be difficult and requires 11
environment
… VIRTUAL SOCIETY
In Digital technology, there are 3 ways a computer system can verify whether
Authentication mechanism are used to satisfy the user that entities, people, data, applications or
One of the most commonly used mechanism for authenticating people has been the password.
Re-use of passwords can be prevented by time stamping or by using passwords only once. 16
VIRTUAL IDENTITY
Virtual identity refers to the online representation of an individual or entity in the digital world.
Virtual identities can include usernames, profiles, or any other form of online representation that
which thieves hijack your Name and identity and use your good credit rating to get cash.
To do these, what they need is simply knowing your individual credentials such as full name
Distance learning is the use of computer and/or video networks to teach courses
Until recently, distance learning has been largely outside the mainstream of
campus life.
That is, it concentrates principally on part time students, those who cannot easily
We can view items by category [snack foods], item [cookies], or by brand and pursue items
on sale.
We can request that items be arranged alphabetically by brand, price per unit, package size,
In the minds of the busy people who shop online, the cost of the e-service is easily offset by
Now big foreign companies are eliminating offices and allowing employees to work from
any location they choose.
Virtual offices are possible because of cellular telephones, fax machines, portable
computers, and other mobile computing and communication devices.
Virtual offices help to:
To reduce office space
Eliminate office infrastructure and cost
Eliminate real estate costs
Eliminate unwanted traveling time to the office 20
ISSUES AND ETHICS IN IT
21
ETHICS
Simply if we define” ethics are moral standards that help to guide, behavior,
24
COMMON TYPES OF COMPUTER CRIMES
DATA DIDLING Changing data and information before they enter a system
DATA LEAKAGE Erasing or removing data and files from a system without indicating that they
were removed or leaving any trace, they ever existed.
LOGIC BOMB A program designed to execute when certain conditions occur. Designed to
sabotage system data, programs or processing [refer time bomb]
TIME BOMB A program designed to execute on a specific date and time. The program
monitors the computer’s internal clock or calendar. When the preset date
arrives, the program comes to life causing its damage.
TRAPDOOR An illicit and unknown point of entry into a program or network that can be
used to gain access to the system
TROJAN HORSE A program that appears to do one thing, but actually does something very
different.
COMPUTER CRIMES….
All these crimes are committed through intrusion, forced and unauthorized
Hackers
Crackers
Viruses 26
COMPUTER CRIMES----
Hackers
A hacker is a person who gains access to a system illegally.
Hackers usually gain access to a system through a network, but sometimes they will physically
enter a computer or network facility.
Techniques helpful in deterring intrusion by hackers
Change access passwords frequently
Allow workers access to only the system functions they need to use
Permit workers to access only the data that they need to use
Encrypt data by scrambling or coding information.
27
Crackers
malicious purposes.
for financial gain, shut down hardware, pirate software, destroy and etc.
28
HACKERS VS CRACKERS
In the context of computer security, hackers and crackers are often used interchangeably, but
Generally, hackers refer to individuals who have advanced technical skills and knowledge in
Black hat hackers are individuals who engage in unethical and illegal activities related to
computer security.
Ethical hackers, also known as white-hat hackers, work to enhance security and protect 29
On the other hand, crackers are individuals who use their technical skills for
malicious purposes.
Crackers are often associated with illegal activities, such as identity theft,
It's important to note that not all hackers are crackers, as hacking itself is a
neutral term that can be used for both good and bad purposes. 30
COMPUTER VIRUSES AND WORMS
VIRUS: A hidden program that alters, without the user’s knowledge, how a
computer operates or modifies the data and program stored on the computer.
31
…COMPUTER VIRUSES AND WORMS
A virus is a typical program that attaches itself to a computer system and destroys or corrupts
data.
Viruses are passed in three ways
By diskette [copying ]
By network [data sharing]
By internet [ e-mail ]
Some worms erase, destroy, and change the data.
WORMS: A Worm is a program that copies itself repeatedly into memory or on to a disk
drive until no more space is left. 32
VIRUSES VS WORMS
Viruses and worms are both types of malicious software (malware), but they differ in how
A virus is a type of malware that attaches itself to a host file or program and replicates
Viruses often need human action to spread, such as executing an infected file or opening
On the other hand, worms are standalone malware programs that can replicate and spread 33
Both viruses and worms can cause significant damage to computer systems
34
METHODS OF VIRUS DETECTION
To protect against them, companies must buy and use virus detection software. There are
Scanning programs – search the computer and main memory to detect a virus
Detection Programs – monitor processing activities and signal the user when a virus tries to
Digital signature encryption – uses a mathematical coding scheme designed to foil a virus’s
35
QUESTION?
36