0% found this document useful (0 votes)
0 views

Computing

The document outlines key concepts in networking, including types of networks (PAN, LAN, WAN), the differences between copper and fiber-optic cables, and the advantages and disadvantages of wired versus wireless networks. It also discusses data safety during transfer, error checking methods, and the role of operating systems and utility software. Additionally, it highlights various security threats and protection measures to keep data safe.

Uploaded by

harleenpangu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Computing

The document outlines key concepts in networking, including types of networks (PAN, LAN, WAN), the differences between copper and fiber-optic cables, and the advantages and disadvantages of wired versus wireless networks. It also discusses data safety during transfer, error checking methods, and the role of operating systems and utility software. Additionally, it highlights various security threats and protection measures to keep data safe.

Uploaded by

harleenpangu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Computing

Final Project
By Nisreen and
Geurinah
Key facts
1. Types of networks – PAN, LAN, WAN 2. Choosing the right network for a
task
3. Copper vs fibre cables
4. Wired vs wireless networks
5. Keeping data safe during transfer
6. Error checking methods
7. Firewalls and antivirus protection
8. What operating systems do
9. Utility software and augmented reality
10. Using flowcharts with "if"
statements
Personal area
network
(PAN)
A PAN (Personal Area Network) is a small network that connects
devices close to one person, usually within 10 meters. It’s used for
personal tasks like sharing files, playing music, or transferring
data.

PANs can be wired (like a USB cable between a phone and laptop)
or wireless (like Bluetooth earphones or AirDrop between Apple
devices).

Example: Connecting your smartphone to wireless earphones


using Bluetooth is a PAN.
Local area
network
A LAN (Local Area Network) is a network that connects
computers and devices within a small area, like a home, school, or
oice. It lets users share files, printers, and internet access.

LANs can use wired connections (like Ethernet) or wireless (like


Wi-Fi). Wired LANs are faster and more stable, while wireless LANs
oer more flexibility.

Example: In a school, all classroom computers connected to the


same printer and internet form a LAN. It helps people work
together and share resources easily.
Wide area network
A WAN (Wide Area Network) is a network that covers a large geographic area, often
connecting devices and smaller networks (like LANs) across cities, countries, or even
the world. It allows people in dierent locations to communicate and share data.

WANs usually use public networks like telephone lines, satellites, or the internet to
send data over long distances.

Example: The internet is the largest example of a WAN, connecting millions of


devices and networks all around the world.

WANs are useful for big businesses, governments, and schools with branches in
dierent places that need to stay connected.
Uses and characteristics of
copper and fibre-optic
Copper Cables cables Fibre-Optic Cables

Characteristics: Characteristics:

● Made of copper wires, which are good conductors of electricity. ● Made of thin glass or plastic fibres.
● Use electrical signals to transmit data. ● Use light signals to transmit data.
● Signal strength weakens over long distances. ● Can carry data over long distances without losing signal strength.
● Easily aected by electromagnetic interference (EMI). ● Not aected by electromagnetic interference.
● Cheaper and easier to install than fibre-optic cables. ● More expensive and harder to install than copper cables.
● Provide faster data transmission and higher bandwidth.
Common Uses:
Common Uses:
● Used in electrical power distribution.
● Used for telephone lines and landline communication. ● Used for high-speed internet (like fibre-to-the-home services).
● Used in local area networks (LANs) for home and oice connections. ● Used in long-distance telephone and data communication.
● Used in undersea cables between continents.
● Common in data centers and large network backbones.
Advantages and
disadvantages of wired
and wireless networks
Wired Networks Wireless Networks

Advantages: Advantages:

● Faster and more stable connection – Good for ● Greater mobility – You can move around with laptops, phones, and tablets.
gaming, streaming, or heavy downloads. ● Easier setup – No need for cables between devices.
● More secure – Harder for outsiders to access Cheaper for wide areas – No need to install lots of wiring.
since it needs a physical connection.
● Less interference – Not aected by walls,
signals, or other devices. Disadvantages:

● Slower and less stable – Performance drops with distance or interference.


Disadvantages: ● Less secure – Easier for hackers to access if not properly protected.
● Can be aected by walls or other electronics – This weakens the signal.
● Limited mobility – Devices must stay close to
the cable. Which is More Secure?
● Harder to set up – Needs cables, routers, and
sometimes drilling.
Wired networks are more secure because access requires a physical connectio
● More expensive for large areas – Running
Wireless networks are easier to hack since they can be accessed remotely
cables through buildings costs more. without being close to the device.
How an echo check tests for accuracy
in transmission
An echo check tests transmission accuracy by sending a signal from the sender
to the receiver, which then sends it back unchanged. The sender compares the
returned signal with the original one. If they match, the transmission was
accurate; if not, there are errors that need fixing. This method helps ensure data
is transmied correctly.

Echo checks are commonly used in communication systems like telephones,


satellite networks, and data transmission systems. They help detect issues like
signal loss or interference, ensuring that the transmied information is clear and
reliable.
Threat: Description: Protection Measures:

1) Malware (Viruses, Worms, Malicious software that can infect Antivirus software: Detects, removes, and
Trojans) devices, causing damage, data prevents malware infections. Regularly
update antivirus definitions. Be cautious about
theft, or system disruption.
downloading files or clicking on links from
untrusted sources.

2) Unauthorized Access Intruders gaining access to a Firewalls: Hardware or software that


network or device without monitors and controls network traffic, blocking
unauthorized access. Strong passwords and
permission.
multi-factor authentication. Access control
lists. Intrusion detection systems.

3) Spyware Software that secretly gathers Anti-spyware software: Detects and


information about a user's activity removes spyware. Be cautious about
installing software from untrusted sources.
and transmits it to a third party.
Regularly scan your system.

4) Phishing The act of capturing data as it Encryption: Encoding data so that it is


travels across a network unreadable without the correct
decryption key. Secure network
protocol
FUnction of Operating
systems
An operating system (OS) is essential system software that manages a
computer's hardware and software resources, enabling users to interact with
the device and run applications. It acts as an intermediary between the user
and the hardware, providing a user interface and managing the execution of
programs.
Utility
softwares:
Utility software, also known as system software, is designed to maintain,
enhance, and troubleshoot computer systems. It helps manage and
optimize the computer's resources and performance, rather than directly
performing tasks for the user like application software. Examples include
antivirus software, disk cleanup tools, backup utilities, and file managers.
THANKS!
Does anyone have any questions?

CREDITS: This presentation template was created by Slidesgo,


including icons by Flaticon, infographics & images by Freepik

You might also like