0% found this document useful (0 votes)
3 views

Reviewer in Compap Module 2

The document provides an overview of the Internet, its origins, and how it connects various devices and networks. It discusses different types of connections, network elements, and the importance of security measures such as encryption and firewalls. Additionally, it covers the World Wide Web, web publishing, and ethical guidelines for using online content.

Uploaded by

hazelmaeesta3
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Reviewer in Compap Module 2

The document provides an overview of the Internet, its origins, and how it connects various devices and networks. It discusses different types of connections, network elements, and the importance of security measures such as encryption and firewalls. Additionally, it covers the World Wide Web, web publishing, and ethical guidelines for using online content.

Uploaded by

hazelmaeesta3
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

REVIEWER IN COMPAP • Wireless

– Wi-Fi (wireless fidelity)


MODULE 2
– Mobile broadband
– Fixed wireless
Connecting and Communicating Online: – Satellite Internet Service
The Internet, Website, and Media
• A hot spot is a wireless network that provides
The Internet Internet connections to mobile computers and
• The Internet is a worldwide collection of networks that Devices
connects millions of businesses, government agencies, • An Internet service provider (ISP) is a businessthat
educational institutions, and individuals provides individuals and organizations access to the
• The Internet originated as ARPANET in September 1969 Internet free or for a fee
and had two main goals: • Bandwidth is a measure of the capability of a
– Allow scientists at different physical locations network to send and receive data
to share information and work together – Megabyte (MB)
– Function even if part of the network were – Gigabyte (GB)
disabled or destroyed by a disaster

• An IP ADDRESS is a sequence of numbers that


Connecting to the Internet uniquely identifies the location of each computer or device
• With wired connections, a computer or device physically connected to the Internet or any other network
attaches via a cable or wire to a communications device • A DOMAIN NAME is a text-based name that
• Computers without a communications device can use a corresponds(sepadan dengan) to the IP address of a server
wireless modem or other communications device that • A DNS SERVER translates the domain name into its
enables wireless connectivity associated IP address

How a Network Operates


• A network is a system of two of
more devices linked by wires,
cables, or a telecommunications
system
o Requires a combination of
hardware and software
• Some networks provide
• Wired connections to the Internet, which
– Cable Internet service requires the services of an
– DSL (digital subscriber line) Internet Service Provider (ISP)
– Fiber to the Premises (FTTP) o Enables the network to
communicate with other networks o Client/server network ▪ Zombie
that are also connected to the o Peer-to-peer (P2P)
Internet network How Unauthorized Network Use Threatens
Elements of a Connected Network o Cloud computing Communications
• Hub: transfers all data to all Geographic Reach
devices(single) • Local area network (LAN) connects computers and • When hackers can connect to the same network as the
• Switch: transfers data only to the devices in a limited area computer they wish to target, it is easier to obtain
intended recipient(penerima) • Wide area network (WAN) connects devices in a large information
• Router: device that connects two geographic region • Data also might be exposed by connecting to a
or more networks • Metropolitan area network (MAN) is operated by a city fraudulent(penipuan) network
• Modem: communications device or county – When connecting to a public Wi-Fi network,
that connects a communications • Personal area network (PAN) connects personal digital one should not enter confidential information on
channel to a device devices within 30 feet via Bluetooth websites or send personal data in email
o Connects the network to the • Body area network (BAN) small, lightweight – Evil twin
Internet through an ISP biosensors implanted in the body How to Secure a Network
• Two main network types: home • Authentication
and business o User name and a strong
password
Devices Necessary to Create a Network o Biometrics
• Requires two or more devices that need to • Firewall
communicate, a way to communicate, and the o Hardware firewalls
infrastructure to facilitate the communication o Software firewalls
– A network interface card (NIC) is required for a • Encryption
computer to connect to a network
– Cable modem/DSL modem How to Encrypt a Network

• Encryption is the process of converting data so that


it is unrecognizable when it is transmitted on a
network or stored on a storage device, except to
users who enter the correct password
Risks and Benefits with Using a Connected • Ensure that wireless networks support encryption so
Network that data cannot be intercepted easily by others
– Encrypted wireless networks often use a wireless
• Benefits: sharing resources without regard to network key to encrypt data sent between devices
geographic location; easier communication – One common type of encryption on home routers is
• Risks WPA2
o Malware can install itself without permission Following Network Standards and
and damage or steal data from a computer or Protocols
device
o Hackers can gain access to personal data
Physical Connections Between Networks o Phishing
Network Architecture o Social engineering
• Determines the logical o Denial of service (DoS) attack
design of all devices on a ▪ Distributed denial of service (DDoS)
network attack
headings, paragraphs, images, links, and other to propriety rights
content elements that a webpage contains • Some material is in the public domain and can
• A browser is an application that enables users with be used without permission
an Internet connection to access and view • The fair use doctrine allows one to use a
webpages on a computer or mobile device sentence or paragraph of text without permission
– Internet-capable mobile devices such as with citation to the original source
smartphones • Creative Commons (CC): a nonprofit
use a special type of browser, called a mobile browser organization that helps content creators keep
• A home page is the first page that a website copyright to their materials while allowing others
displays to use, copy, or distribute their work
• Computers communicating with each other on a • Current browsers typically support tabbed
network must follow a common set of rules for Browsing
exchanging information, or protocols • A webpage has a unique address, called a web
– TCP/IP (Transmission Control Protocol/Internet address or URL
Protocol) Apply Information Literacy Standards
• Cellular Networks: millions of people use their
mobile phones to access the Internet Citing Sources
– Cellular networks can provide Internet services • A citation is a formal reference to a source
in most • Each type of information source uses a different citation
locations where cellular service is offered style
– 4G and 5G networks provide higher speed data • Failure to cite sources, even if some of the words are
Transmission changed or paraphrased, is plagiarism
• A web app is an application stored on a web server that
you access through a browser
– Web apps usually store users’ data and
information on their
hosts’ servers
The CARS Checklist
• Credibility: identify the author and Types of Websites
check credentials • A web search engine is software that finds
• Accuracy: verify facts and claims, websites, webpages, images, videos, news, maps,
check for bias and other information related to a specific topic
• Reasonableness: examine whether the • A subject directory classifies webpages in an
claims are fair and sensible organized set of categories, such as sports or
• Support: look for reputable sources and shopping, and related subcategories
The World Wide Web
Authorities
• The World Wide Web (WWW), or web, consists of
a worldwide collection of electronic documents Gather Content from Online Sources
(webpages) Follow Ethical Guidelines
• A website is a collection of related webpages and • Copying photos might violate intellectual
associated items property rights
• A web server is a computer that delivers requested • A copyright gives authors and artists the legal
webpages to your computer or mobile device right to sell, publish, or distribute an original work
• HTML (Hypertext Markup Language) is a set of • Some online resources are protected by digital
symbols that developers use to specify the rights management (DRM), which limit access
vouch for authenticity of the
website
• Lock icon
• Requires sign-in with
username/password before
entering sensitive information

• Web publishing is the creation and maintenance


of websites

Pros and cons of e-commerce for consumers


• Pros
– Variety
– Convenience
– Budget
• Cons
– Security
– Fraud(penipuan)
– Indirect experience

Secure Websites
• Use encryption to safeguard
transmitted information
• Hypertext Transfer Protocol
Secure (HTTPS)
• Use digital certificates to

You might also like