AIO 04 Instructor Manual
AIO 04 Instructor Manual
Image Library
Instructor Manual
PowerPoint Lecture
Scoring Rubrics
Scripted Lectures
Solution Files
Transition Guide
Test Bank
Client-server network A network that has at least one server at its center; users log in to the network
instead of their local computers and are granted access to resources based on that login.
Infrastructure as a Service (IaaS) Part of cloud computing; the use of internet-based servers.
Peer-to-peer network (P2P) A network that does not require a network operating system, in which
each computer is considered equal; each device can share its resources with every other device, and
there is no centralized authority.
Server A multi-user computer system that provides services, such as internet access, email, or file and
print services, to client systems.
Server virtualization Running multiple versions of server software on the same computer.
TEACHING NOTES
Computer networks save both time and money and make it easier to work, which increases
productivity.
Teaching Tips
Discuss peer-to-peer networks. Discuss the pros and cons of P2P networks. Discuss how many devices
can be included in a home network.
Discuss a client-server network. Ask students to discuss the different types of networks they have
already used and how they have changed.
Discuss server virtualization and Infrastructure as a Service (IaaS).
Objective 2: Compare Different Types of LANs and WANs
Bluetooth A technology that connects peripherals wirelessly at short range.
Cellular network A network that uses cell towers to transmit voice and data over large distances. Also
called a mobile network.
Encryption The conversion of unencrypted, plain text into code called ciphertext.
Enterprise network A large network that has multiple local area networks located in the same location.
Ethernet Standards that define the way data is transmitted over a local area network.
Local area network (LAN) A network that has all connected devices or nodes located in the same
physical location.
Metropolitan area network (MAN) A network that covers a single geographic area.
Personal area network (PAN) A small network that consists of devices connected by Bluetooth.
Ring topology A local area network topology in which the devices are connected to a single cable; the
ends of the cable are connected in a circle, and the data travels around the circle in one direction.
Standards Specifications that have been defined by an industry organization, which ensure that
equipment that is made by different companies will be able to work together.
Star topology A local area network topology in which every node on the network is attached to a
central device such as a switch or wireless access point.
Storage area network (SAN) A network between the data storage devices and the servers on a
network that makes the data accessible to all servers in the SAN; regular users are not part of the SAN
but can access the information through the local area network servers.
Switch Network device that connects multiple devices on a local area network and uses address
information to send data packets only to the port to which the appropriate device is connected.
Virtual private network (VPN) Creates a private network through the public network—the internet—
enabling remote users to access a local area network securely without needing dedicated lines.
Wide area network (WAN) A network that spans multiple locations and connects multiple local area
networks over dedicated lines by using routers.
Firewall A device or software that blocks unauthorized access to a network or an individual computer.
IEEE 802.11 standards The standards that define the way data is transmitted over a Wi-Fi network.
Infrastructure wireless network A wireless network in which devices connect through a wireless access
point.
Modem Analog device that connects to the internet; short for modulator-demodulator.
Network adapter A communication device that establishes a connection with a network; may be
onboard, an expansion card, or a USB device, and may be wired or wireless.
Optical network terminal (ONT) The device that connects a fiber optic network to the internet.
Wireless access point (WAP) A device that enables wireless devices to join a network.
Wireless mesh network A way to expand a wireless network by adding mesh nodes—small radio
transmitters that function in the same way as a wireless router—throughout the building.
TEACHING NOTES
Every network has two major components: hardware to create the physical connections between
devices and software to configure the resources and security.
Teaching Tips
Domain A network composed of a group of clients and servers under the control of one central
security database on a special server called the domain controller.
Domain controller A special server that contains the central security database of a domain network.
Internet Protocol (IP) The protocol responsible for addressing and routing packets to their destination.
IP address A set of four numbers, separated by periods, which uniquely identifies devices on a
network.
Network operating system (NOS) A multiuser operating system that controls the software and
hardware that runs on a network. It enables multiple client devices to communicate with the server
and each other, share resources, run applications, and send messages.
Protocol A set of rules for communication between devices that determines how data is formatted,
transmitted, received, and acknowledged.
TCP/IP protocol stack A suite of protocols that define many types of data movement including the
transfer files and webpages, sending and receiving email, and network configuration.
Transmission Control Protocol (TCP) The protocol responsible for assuring that data packets are
transmitted reliably.
TEACHING NOTES
Network hardware enables devices to connect to each other physically, but it is the software that
enables them to communicate with and understand each other.
Teaching Tips
Wi-Fi Protected Setup (WPS) A way to set up a secure wireless network by using a button, personal
identification number (PIN), or USB key to configure devices to connect to a network automatically.
Wireless encryption A system that adds security to a wireless network by encrypting transmitted data.
TEACHING NOTES
Layers of security are needed to protect a network.
Teaching Tips
Discuss how a firewall works to protect a network.
Remind students how important it is to keep all systems up to date and secure. Review things that can
be done to help secure a network, such as changing the SSID and disabling the SSID broadcast.
Objective 6: Recognize Various Types of Cybercrime
Clear web The portion of the web that is indexable by search engines. Also known as the surface web.
Clickbait A link that teases you with just enough information to get you to click the link, driving traffic
to a webpage.
Clickjacking A social network attack in which clicking on a link enables malware to post unwanted links
on your page.
Computer fraud A scheme perpetrated over the internet or by email that tricks a victim into voluntarily
and knowingly giving money or property to a person.
Cyberstalking A form of computer harassment that is serious in nature, with a pattern of harassment
and a credible threat of harm.
Dark web A subset of the deep web that is encrypted and hidden and only accessible using the Tor
browser to view it anonymously and securely.
Darknet market A black market located in the dark web that can be accessed anonymously to
purchase illegal items such as guns, drugs, and stolen data.
Data breach A situation in which sensitive data is stolen or viewed by someone who is not authorized
to do so.
Deep web The portion of the web that is not indexable by search engines.
Identity theft Theft that occurs when someone uses your name, Social Security number, or bank or
credit card number fraudulently.
Network administrator The person responsible for managing the hardware and software on a
network.
Pharming Redirects you to a phony website to trick you into revealing information, such as usernames
and passwords for your accounts.
Phishing Email messages and instant messages that appear to be from those you do business with,
designed to trick you into revealing personal information, such as usernames and passwords for your
accounts.
Sharebaiting When users share posts, often without actually clicking them first, which can lead you to
believe the links are safe.
with All in One Computer Concepts & Applications Page 7
Shill bidding Fake bidding by a seller or his or her accomplice to drive up the price of an auction item.
Surface web The portion of the web that is indexable by search engines. Also known as the clear web.
TEACHING NOTES
Criminal activity on the internet is called cybercrime and everyone is susceptible.
Teaching Tips
Discuss phishing and pharming and review Figure 4.22, which shows a phishing email message.
Discuss some common attacks that can occur on social networking sites:
● Suspicious emails and notifications
● Phishing and “Please send money” scams
● Clickjacking
● Clickbait
● Sharebaiting
Administrator account A user account that should be used only when necessary, for such tasks as
configuring and troubleshooting the system, and that should be protected by a strong password.
Biometric scanner An input device that measures human characteristics such as fingerprints, retinal
patterns, and voice patterns.
Encrypting File System (EFS) A Windows feature that enables you to encrypt individual files.
FileVault A macOS feature, which when turned on, encrypts the contents of your hard disk.
Guest account A user account for users who need temporary access to a system. This account is turned
off by default.
Keychain A macOS feature that stores various passwords and passphrases in one place and makes
them accessible through a master password.
Password manager A program used to store passwords; some of these programs can also generate
passwords.
Standard account A user account created for normal use, which has limited access to change system
and security settings.
Two-factor authentication An account security measure that requires both a password and a
verification code to sign in.
User Account Control (UAC) A Windows feature that will notify you before changes are made to your
computer.
TEACHING NOTES
The list of computer threats grows daily in size and danger. Practicing safe computing is critical to
protecting a computer system and personal information.
Teaching Tips
Review the different types of accounts on a Windows computer—administrator, standard, and guest.
Remind students that it is a good idea to create a standard user account for day-to-day tasks and to
use the administrator account only when necessary for configuration, installation, or troubleshooting.
Discuss how it is not good practice to use the same username and password on multiple accounts for
security reasons. It may be easier to remember, but it is less secure.
Review the rules for good passwords:
● Use at least eight characters.
● Use a mixture of uppercase and lowercase letters.
● Use at least one number.
2. A public Wi-Fi network is a wireless network that provides internet access to anyone with a wireless
adapter in his or her device. Public Wi-Fi networks are found in cafes, libraries, and airports. Discuss
some of the dangers of surfing in a public hotspot. What are some ideas for how you can keep your
information safe?
3. Securing a home computer is very important. Discuss what steps should be taken to secure a home
computer and network. What can you do to keep your system safe and secure?
4. Technology has made cybercrime easier to commit, which means it is more widespread. Discuss
cybercrime and how to protect yourself.