NotesWhat is notes.io?

Notes brand slogan

Notes - notes.io

Computer System
A collection of related components made up of two parts: hardware (physical equipment that you can touch) and software (programs installed on the computer)
2
Computer Networks
This allows users to connect over distances. They allow file sharing, hardware sharing, and instant communication, making them a necessary tool for offices, schools, and homes all over the world.

It consists of several components, each of which is important to making the network function correctly as a whole.


3
Workstations
These are known as desktop computers.


The computer you use at home or school would be called a this in a network
4
Servers
*These can look like desktop computers; however, most do not look like your “normal” computer.
*They do not really need monitors, graphics and sound cards.
*What they really do need is hard drives.
*In most schools, when you save your work, you are saving to one of these.
*By doing this, you can access your school
work from any computer that is on your
school network.
5
Modem
a device that enables computers to interpret data they receive from a network or send data in the proper form along a network
6
Hub
This is sort of like a car radio. Every computer that has that section of network (like a radio station) can hear everything that is being transmitted.


All the computers that are connected to this receive all the information that goes through it.


Usually, if you have a this, you also have a router.
7
Switch
This is more complex than a hub and works a lot like a two-way radio. In a room full of people, only the person holding the other radio can hear what is being said.
It keeps track of which computers are where, and when something comes in, it sends it only to that specific computer, not every computer on that section of the network.. It is more secure than a hub, andfaster than a hub, but not as powerful
as a router.
8
Router
This works a lot like a telephone system. Each computer is given its own unique number by the this. When information comes into this device, it is then sent along to the correct number—or in this case, computer.
There are more options built into this than there are available to switches. This can have the equivalent phone options of call screening and caller ID. This is beyond a switch’s capabilities
9
Peer to Peer Network
This is a type of network where the computers in the network share resources among each other.
Every computer on this network is equal; all the computers run the same networking software and file systems for sharing.
Printers, scanners, and other external devices are shared by the machine they are plugged into, otherwise known as managed by.
10
Cons of Peer to Peer Networks
shared resources, such as printers, place a special demand on the computers in the network.
Due to the nature of this type of network, all of the computers on the network provide access to all of the machine’s resources. The down side of this is that you can unintentionally expose private files to all the other users on the network.
There is also no data security or protection from hackers, viruses, etc.
11
Peer to Peer Operating Systems
Each of the workstations has an operating system that tells it how to store and share resources with the others.
The two software packages that we may use that allow this type of network are called
1. Appleshare (for MACs)
2. Windows for Workgroups (for PCs)
12
Ethernet
A type of connection between computers that forms the basis of most LANs.
It serves as one of the main methods for connecting a computer or network to an Internet hub.

It has evolved into a much more sophisticated system that uses specialized cables that connect to a central hub or router in order to network several computers together.
13
LAN
Stands for Local Area Network.
It is a group of computers that are linked together that share internet access, file access, applications, storage, and allows connected computers to share printers and scanners.
14
WAN
This stands for Wide Area Networks.
It is a collection of regular local area networks that are all interconnected to form one giant network.
Oftentimes, schools and even large companies will operate a WAN on premises.
15
Advantages of a WAN
Flexible access: School networks can be created for students to access files throughout the school district.


Networks speed up the file sharing and saving process.


16
Disadvantages of a WAN
These are expensive to install: They save money over time, but they are expensive to set up at first.


They require maintenance of the network, which costs both money and time.
17
Token Ring
standard specifies that computers and devices on the network share or pass a special signal in a unidirectional manner and in a preset order.
18
Token Ring Issues
In order for these to work,
all computers must check for lost or duplicate tokens
All connected computers must “vote” a new leader to create a new token
19
Client Server Operating Systems
This setup allows the network to centralize functions and applications in one or more file servers.
File servers become the “heart” of this system and provide access to files and resources, as well as providing security.
Workstations have access to the resources to files on the file servers.
20
The most popular Client Server OS
Macintosh OSX
Microsoft Windows Server
Novell
UNIX
21
Advantages of Client Server OS
This type of network makes it easy to install new technology and new elements.
The server can be accessed remotely, and you can have both MACs and PCs on a network.
22
Disadvantages of Client Server OS
They depend on their servers. When they go down, the network will no longer work.
There is a hefty investment. It pays off in the long run, but it requires money to set it up.
Large networks will require dedicated staff to maintain this and to work out the “kinks” when problems arise.
23
Hackers
Someone who finds access in a computer’s security system to break into another machine.
They usually collect information on the target computer and then try to find access into the computer system.
24
Security Threats
Spam
Adware
Information Threats
25
Spam
unwanted commercial e-mail

26
Virus
This can cause your computer to slow down or even destroy your hard drive.

27
Adaware
This is software that gets installed on the computer. It can cause annoying pop-ups or even steal information.
28
Information Threats
hackers steal important information: client information, back account numbers, etc.
29
Steps to protect yourself from Hackers

1. Install a firewall
2. Be aware and cautios on the net
3. Make sure that the network is password protected, especially if using a wireless network.
30
Firewall
hardware and/or software that guards a private network by analyzing the information leaving and entering the network and then blocks unauthorized or suspicious content
     
 
what is notes.io
 

Notes.io is a web-based application for taking notes. You can take your notes and share with others people. If you like taking long notes, notes.io is designed for you. To date, over 8,000,000,000 notes created and continuing...

With notes.io;

  • * You can take a note from anywhere and any device with internet connection.
  • * You can share the notes in social platforms (YouTube, Facebook, Twitter, instagram etc.).
  • * You can quickly share your contents without website, blog and e-mail.
  • * You don't need to create any Account to share a note. As you wish you can use quick, easy and best shortened notes with sms, websites, e-mail, or messaging services (WhatsApp, iMessage, Telegram, Signal).
  • * Notes.io has fabulous infrastructure design for a short link and allows you to share the note as an easy and understandable link.

Fast: Notes.io is built for speed and performance. You can take a notes quickly and browse your archive.

Easy: Notes.io doesn’t require installation. Just write and share note!

Short: Notes.io’s url just 8 character. You’ll get shorten link of your note when you want to share. (Ex: notes.io/q )

Free: Notes.io works for 12 years and has been free since the day it was started.


You immediately create your first note and start sharing with the ones you wish. If you want to contact us, you can use the following communication channels;


Email: [email protected]

Twitter: http://twitter.com/notesio

Instagram: http://instagram.com/notes.io

Facebook: http://facebook.com/notesio



Regards;
Notes.io Team

     
 
Shortened Note Link
 
 
Looding Image
 
     
 
Long File
 
 

For written notes was greater than 18KB Unable to shorten.

To be smaller than 18KB, please organize your notes, or sign in.