0% found this document useful (0 votes)
14 views

AIO 04 Instructor Manual

ict

Uploaded by

Hamid Raza Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

AIO 04 Instructor Manual

ict

Uploaded by

Hamid Raza Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Instructor’s Manual Materials to Accompany

GO! ALL IN ONE COMPUTER CONCEPTS & APPLICATIONS - CHAPTER 4


NETWORKS, SECURITY, AND PRIVACY
INSTRUCTOR SUPPLEMENTS AVAILABLE
You can find all supplements for this textbook on the Instructor Resource Center (IRC), available at
http://www.pearsonhighered.com/navigateit.

Instructor Resources for Chapter 4

Annotated Solution Files

Answer Keys to Matching and Multiple Choice Questions

Audio PowerPoint Presentation

IC3 Prep Quiz

Image Library

Instructor Manual

PowerPoint Lecture

Prepared Exams by Application

Prepared Exams by Project

Prepared Exams by Chapter

Scoring Rubrics

Scripted Lectures

Solution Files

Solution PDF Files

Student Data Files

Transition Guide

Test Bank

Videos available in MyLab IT (Application Intro Videos, GO! to


Work Videos, GO! Walk Thru Project Videos, GO! Learn How
Videos, IT Sims, Tech to GO!, Before You Buy, Soft Skills Videos,
Student Training Videos)

with All in One Computer Concepts & Applications Page 1


OBJECTIVES
Objective 1: Discuss the Importance of Computer Networks
Client A computer or other device that connects to, or requests services from, a computer called a
server.

Client-server network A network that has at least one server at its center; users log in to the network
instead of their local computers and are granted access to resources based on that login.

Computer network Two or more computers that share resources.

Infrastructure as a Service (IaaS) Part of cloud computing; the use of internet-based servers.

Network resource Software, hardware, or files shared among computers on a network.

Peer-to-peer network (P2P) A network that does not require a network operating system, in which
each computer is considered equal; each device can share its resources with every other device, and
there is no centralized authority.

Router A device that connects two or more networks.

Server A multi-user computer system that provides services, such as internet access, email, or file and
print services, to client systems.

Server virtualization Running multiple versions of server software on the same computer.

Workgroup Computers in a peer-to-peer network.

TEACHING NOTES
Computer networks save both time and money and make it easier to work, which increases
productivity.
Teaching Tips
Discuss peer-to-peer networks. Discuss the pros and cons of P2P networks. Discuss how many devices
can be included in a home network.
Discuss a client-server network. Ask students to discuss the different types of networks they have
already used and how they have changed.
Discuss server virtualization and Infrastructure as a Service (IaaS).
Objective 2: Compare Different Types of LANs and WANs
Bluetooth A technology that connects peripherals wirelessly at short range.

with All in One Computer Concepts & Applications Page 2


Bus topology A local area network topology in which the nodes are all connected using a single cable;
the data travels back and forth along the cable, which is terminated at both ends.

Cellular network A network that uses cell towers to transmit voice and data over large distances. Also
called a mobile network.

Encryption The conversion of unencrypted, plain text into code called ciphertext.

Enterprise network A large network that has multiple local area networks located in the same location.

Ethernet Standards that define the way data is transmitted over a local area network.

Local area network (LAN) A network that has all connected devices or nodes located in the same
physical location.

Metropolitan area network (MAN) A network that covers a single geographic area.

Personal area network (PAN) A small network that consists of devices connected by Bluetooth.

Ring topology A local area network topology in which the devices are connected to a single cable; the
ends of the cable are connected in a circle, and the data travels around the circle in one direction.

Standards Specifications that have been defined by an industry organization, which ensure that
equipment that is made by different companies will be able to work together.

Star topology A local area network topology in which every node on the network is attached to a
central device such as a switch or wireless access point.

Storage area network (SAN) A network between the data storage devices and the servers on a
network that makes the data accessible to all servers in the SAN; regular users are not part of the SAN
but can access the information through the local area network servers.

Switch Network device that connects multiple devices on a local area network and uses address
information to send data packets only to the port to which the appropriate device is connected.

Topology The physical layout of a local area network.

Virtual private network (VPN) Creates a private network through the public network—the internet—
enabling remote users to access a local area network securely without needing dedicated lines.

Wide area network (WAN) A network that spans multiple locations and connects multiple local area
networks over dedicated lines by using routers.

Wireless LAN (WLAN) A network that uses Wi-Fi to transmit data.

with All in One Computer Concepts & Applications Page 3


TEACHING NOTES
Networks come in many different shapes and sizes.
Teaching Tips
Discuss personal area networks and how they are limited by the range of Bluetooth. Discuss the
common devices that use Bluetooth. Discuss how a wireless LAN or WLAN differs from a PAN. What are
the pros and cons of a LAN or WLAN?
Review the most common LAN topologies—bus, ring, and star—and discuss the pros and cons of each
of these topologies.
Discuss a WAN, and how WAN technologies are slower and more expensive than LAN technologies.
Objective 3: List and Describe Network Hardware
Ad hoc network A network created when two wireless devices connect to each other directly.

Ethernet adapter A wired network adapter.

Firewall A device or software that blocks unauthorized access to a network or an individual computer.

IEEE 802.11 standards The standards that define the way data is transmitted over a Wi-Fi network.

Infrastructure wireless network A wireless network in which devices connect through a wireless access
point.

Modem Analog device that connects to the internet; short for modulator-demodulator.

Network adapter A communication device that establishes a connection with a network; may be
onboard, an expansion card, or a USB device, and may be wired or wireless.

Optical network terminal (ONT) The device that connects a fiber optic network to the internet.

Wireless access point (WAP) A device that enables wireless devices to join a network.

Wireless adapter A network adapter used to connect to Wi-Fi networks.

Wireless mesh network A way to expand a wireless network by adding mesh nodes—small radio
transmitters that function in the same way as a wireless router—throughout the building.

TEACHING NOTES
Every network has two major components: hardware to create the physical connections between
devices and software to configure the resources and security.
Teaching Tips

with All in One Computer Concepts & Applications Page 4


Review network adapters and discuss the different types of network adapters to ensure students
understand how devices connect.
Discuss the advantages of using a wired network. Discuss the Wi-Fi standards.
Demonstrate how to view the network adapters installed on a computer by opening the Windows
Network & Internet settings and selecting Change adapter options.
Discuss the hardware needed for a network, which can include a modem and a router. Discuss the
different types of modems available.
Discuss how networks can include both wired and wireless devices.
Objective 4: List and Describe the Software and Protocols Used in Networks
Client for Microsoft Networks A Windows feature that enables a computer to access files and printers
on a Microsoft network remotely.

Domain A network composed of a group of clients and servers under the control of one central
security database on a special server called the domain controller.

Domain controller A special server that contains the central security database of a domain network.

Internet Protocol (IP) The protocol responsible for addressing and routing packets to their destination.

IP address A set of four numbers, separated by periods, which uniquely identifies devices on a
network.

Network operating system (NOS) A multiuser operating system that controls the software and
hardware that runs on a network. It enables multiple client devices to communicate with the server
and each other, share resources, run applications, and send messages.

Protocol A set of rules for communication between devices that determines how data is formatted,
transmitted, received, and acknowledged.

TCP/IP protocol stack A suite of protocols that define many types of data movement including the
transfer files and webpages, sending and receiving email, and network configuration.

Transmission Control Protocol (TCP) The protocol responsible for assuring that data packets are
transmitted reliably.

TEACHING NOTES
Network hardware enables devices to connect to each other physically, but it is the software that
enables them to communicate with and understand each other.
Teaching Tips

with All in One Computer Concepts & Applications Page 5


Demonstrate how to verify that Client for Microsoft Networks is installed on a computer by viewing the
network adapters installed on a computer.
Remind students if a network consists of computers running the same operating system, little or no
configuration is needed, but if there are mixed operating systems, it will take some configuration, but it
can be done.
Review server software and how it enables multiple client devices to communicate with the server and
each other, to share resources, to run applications, and to send messages.
Discuss the different types of servers classified by the types of services they provide—file and print,
email, database, web, chat, audio/video, and applications.
Discuss some of the protocols that belong to the TCP/IP protocol stack, such as those described in
Figure 4.19. Ensure students understand the types of protocols listed and their functions.
Objective 5: Explain How to Protect a Network
Service set identifier (SSID) A wireless network name.

Wi-Fi Protected Setup (WPS) A way to set up a secure wireless network by using a button, personal
identification number (PIN), or USB key to configure devices to connect to a network automatically.

Wireless encryption A system that adds security to a wireless network by encrypting transmitted data.

TEACHING NOTES
Layers of security are needed to protect a network.
Teaching Tips
Discuss how a firewall works to protect a network.
Remind students how important it is to keep all systems up to date and secure. Review things that can
be done to help secure a network, such as changing the SSID and disabling the SSID broadcast.
Objective 6: Recognize Various Types of Cybercrime

Clear web The portion of the web that is indexable by search engines. Also known as the surface web.

Clickbait A link that teases you with just enough information to get you to click the link, driving traffic
to a webpage.

Clickjacking A social network attack in which clicking on a link enables malware to post unwanted links
on your page.

Computer fraud A scheme perpetrated over the internet or by email that tricks a victim into voluntarily
and knowingly giving money or property to a person.

with All in One Computer Concepts & Applications Page 6


Cyberbullying A form of computer harassment that happens between two minors.

Cybercrime Criminal activity on the internet.

Cyberharassment A form of computer harassment that happens between two adults.

Cyberstalking A form of computer harassment that is serious in nature, with a pattern of harassment
and a credible threat of harm.

Cyberterrorism An unlawful attack against computers or networks that is done to intimidate a


government or its people for a political or social agenda.

Dark web A subset of the deep web that is encrypted and hidden and only accessible using the Tor
browser to view it anonymously and securely.

Darknet market A black market located in the dark web that can be accessed anonymously to
purchase illegal items such as guns, drugs, and stolen data.

Data breach A situation in which sensitive data is stolen or viewed by someone who is not authorized
to do so.

Deep web The portion of the web that is not indexable by search engines.

Hacking The act of gaining unauthorized access to a computer system or network.

Hacktivism Hacking to make a political statement.

Identity theft Theft that occurs when someone uses your name, Social Security number, or bank or
credit card number fraudulently.

Keylogger A program or hardware device that captures what is typed on a keyboard.

Network administrator The person responsible for managing the hardware and software on a
network.

Paywall A system that requires you to pay for access to content.

Pharming Redirects you to a phony website to trick you into revealing information, such as usernames
and passwords for your accounts.

Phishing Email messages and instant messages that appear to be from those you do business with,
designed to trick you into revealing personal information, such as usernames and passwords for your
accounts.

Sharebaiting When users share posts, often without actually clicking them first, which can lead you to
believe the links are safe.
with All in One Computer Concepts & Applications Page 7
Shill bidding Fake bidding by a seller or his or her accomplice to drive up the price of an auction item.

Surface web The portion of the web that is indexable by search engines. Also known as the clear web.

TEACHING NOTES
Criminal activity on the internet is called cybercrime and everyone is susceptible.
Teaching Tips
Discuss phishing and pharming and review Figure 4.22, which shows a phishing email message.
Discuss some common attacks that can occur on social networking sites:
● Suspicious emails and notifications
● Phishing and “Please send money” scams
● Clickjacking
● Clickbait
● Sharebaiting

Demonstrate how to access more information on Facebook security at www.facebook.com/help.


Discuss Figure 4.23 showing a Fraud Alert message. Ask students if they have received anything like
this.
Discuss steps to protect against identify theft such as:
● Monitoring bank and credit card statements
● Checking your account online between statements
● Monitoring credit reports
● Placing a fraud alert on your credit reports
● Protecting personal information

Discuss the different categories of hackers: white-hat, gray-hat, and black-hat.


Objective 7: Practice Safe Computing
Acceptable use policy (AUP) A policy that computer and network users in a business or school must
abide by that forces users to practice safe computing.

Administrator account A user account that should be used only when necessary, for such tasks as
configuring and troubleshooting the system, and that should be protected by a strong password.

Biometric scanner An input device that measures human characteristics such as fingerprints, retinal
patterns, and voice patterns.

BitLocker A Windows feature that encrypts an entire drive.

with All in One Computer Concepts & Applications Page 8


Ciphertext Plain text that has been encrypted.

Encrypting File System (EFS) A Windows feature that enables you to encrypt individual files.

FileVault A macOS feature, which when turned on, encrypts the contents of your hard disk.

Guest account A user account for users who need temporary access to a system. This account is turned
off by default.

Keychain A macOS feature that stores various passwords and passphrases in one place and makes
them accessible through a master password.

Multi-factor authentication An account security measure that requires multiple methods of


identification to sign in.

Password manager A program used to store passwords; some of these programs can also generate
passwords.

Standard account A user account created for normal use, which has limited access to change system
and security settings.

Two-factor authentication An account security measure that requires both a password and a
verification code to sign in.

User Account Control (UAC) A Windows feature that will notify you before changes are made to your
computer.

TEACHING NOTES
The list of computer threats grows daily in size and danger. Practicing safe computing is critical to
protecting a computer system and personal information.
Teaching Tips
Review the different types of accounts on a Windows computer—administrator, standard, and guest.
Remind students that it is a good idea to create a standard user account for day-to-day tasks and to
use the administrator account only when necessary for configuration, installation, or troubleshooting.
Discuss how it is not good practice to use the same username and password on multiple accounts for
security reasons. It may be easier to remember, but it is less secure.
Review the rules for good passwords:
● Use at least eight characters.
● Use a mixture of uppercase and lowercase letters.
● Use at least one number.

with All in One Computer Concepts & Applications Page 9


● If allowed, use at least one special character such as ! or *.
● Do not use any words that can be found in a dictionary.
● Do not use anything personally identifiable.
● Do not write it down.
● Answer security questions with unexpected answers, but remember what you
answered.
● Use different passwords for different accounts.
● Use more difficult passwords for accounts such as banks and credit cards.
● Always change default passwords.
● Change your passwords regularly.

Ask students how many of the rules they follow.

Discussion Questions for Chapter 4


1. You may have a network at your home where several people use different computers and access
one central printer or other peripheral device. Draw a diagram of your home network or how you
would like to improve it. If you don’t have a home network, draw a diagram of how you would set up
your network.

2. A public Wi-Fi network is a wireless network that provides internet access to anyone with a wireless
adapter in his or her device. Public Wi-Fi networks are found in cafes, libraries, and airports. Discuss
some of the dangers of surfing in a public hotspot. What are some ideas for how you can keep your
information safe?

3. Securing a home computer is very important. Discuss what steps should be taken to secure a home
computer and network. What can you do to keep your system safe and secure?

4. Technology has made cybercrime easier to commit, which means it is more widespread. Discuss
cybercrime and how to protect yourself.

with All in One Computer Concepts & Applications Page 10

You might also like