Friday, 24 April 2009
Friday, 27 March 2009
Homwork 2
Tuesday, 24 March 2009
Task- Part 2
A file server is a computer attached to a network that has the primary purpose of providing a location for the shared storage of computer files.
A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.
A network switch is a computer networking device that connects network segments.A modem is an internal or external computer hardware device that connects your computer to a phone line and, if you wish, to an Internet Service Provider (ISP) that can link you to the Internet.
A network interface card, more commonly referred to as a NIC, is a device that allows computers to be joined together in a LAN, or local area network.
A hub is a small, simple, inexpensive device that joins multiple computers together.
A network operating system (NOS) is software that controls a network and its message (e.g. packet) traffic and queues, controls access by multiple users to network resources such as files, and provides for certain administrative functions, including security.
The Physical Layer is the first level in the seven-layer OSI model of computer networking. It translates communications requests from the data.Routers are physical devices that join multiple wired or wireless networks together.
Task 5
Star
Pros
Better...Performance Isolation of devices...Benefits from centralization
Cons
High dependence on the system...Network size is limited...Wiring up of the system can be very complex
BusPros
Easy to implement and extend...Cheaper than other technologies...Cost effective as only a single cable is used
Cons
Limited cable length and number of stations...Maintenance costs may be higher in the long run...It is slower than the other topologies
Ring
Pros
Very orderly network where every device has access to the token and the opportunity to transmit...Can create much larger network using token ring...Performs better than a star topology under heavy network load
Cons
Moves, adds and changes of devices can affect the network...Much slower than an Ethernet network under normal load...Network adapter cards and MAU’S are much more expensive than Ethernet cards and hubs
Extended Learning 3
3. This keeps your user area secure PASSWORD
7. Another name for a computer on a network WORKSTATION
8. This usually connects a LAN together CABLE
9. The software that keeps the network safe from hackers and viruses FIREWALL
Down
1. The machine that stores your data and files FILESERVER
2. This tells the server who you are and which files to present to you USERNAME
4. Hardware that can be connected to a network and shared PERIPHERAL
5. The largest WAN in existence INTERNET
6. The network topology which has a server in the middle STAR
10. The network topology which sends data in one direction only RING
Friday, 13 March 2009
Task 3-4
LaptopSpecifications. Price= £369
• 160 GB hard drive.
• 1 GB Memory
• Modem Type 56k
• 1.66 Ghz Processor Speed
• Wifi
• 17” widescreen
http://www.pcworld.co.uk/martprd/store/pcw_page.jsp?BV_SessionID=@@@@1550240563.1236348770@@@@&BV_EngineID=ccdjadegjegijffcflgceggdhhmdgmk.0&page=Product&fm=null&sm=null&tm=null&sku=757590&category_oid=http://www.pcworld.co.uk/martprd/store/pcw_page.jsp?BV_SessionID=@@@@1550240563.1236348770@@@@&BV_EngineID=ccdjadegjegijffcflgceggdhhmdgmk.0&page=Product&fm=null&sm=null&tm=null&sku=757590&category_oid=e=Product&fm=null&sm=null&tm=null&sku=757590&category_oid=
DesktopPrice =£185
Specification
• 160 GB Hardrive
• 1 GB memory
• Ram Memory 1024 MB
• 2200 Processor speed
http://www.pcworld.co.uk/martprd/store/pcw_page.jsp?BV_SessionID=@@@@1550240563.1236348770@@@@&BV_EngineID=ccdjadegjegijffcflgceggdhhmdgmk.0&page=Product&fm=null&sm=null&tm=null&sku=491743&category_oid=-35614http://www.pcworld.co.uk/martprd/store/pcw_page.jsp?BV_SessionID=@@@@1550240563.1236348770@@@@&BV_EngineID=ccdjadegjegijffcflgceggdhhmdgmk.0&page=Product&fm=null&sm=null&tm=null&sku=491743&category_oid=-35614e=Product&fm=null&sm=null&tm=null&sku=491743&category_oid=-35614
Task 12
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs.2. When did the first ICT viruses appear and what did they do? The 1980’s
3. What effects can malicious viruses have? Hack into a persons file and delete them
4. What is the most common way to be affected by a virus? Open an email attatchment
5. What is anti virus software? Software which is used to detect and destroy infections from viruses
6. Give two examples of anti virus software AntiVirus… AVG
7. Why is it important to constantly update anti virus software? So antivirus programs can keep up to date with new viruses, which are being made every day.
8. Give three sensible precautions you can take, to stop the spreading of viruses Antivirus protection
Be careful what e-mails you open
9. Describe what each of the computer pests do, and how they get onto your computer: Trojan, Worm, Adware/Spyware, and Logic bomb . You might need to surf the internet to find out about some of these.
Trojan..
This is an application that appears to do something useful such as a computer game (which is why you loaded it on to your computer in the first place) but quietly, behind the scenes it is doing something with ill-intent. A trojan may:-
Log all your keystrokes and then send the details to a remote computer / server. Used to capture your passwords
Allow someone else to take control of your computer whilst you are online.
Capture screen shots and send them to a remote computer, once again with the intent of obtaining confidential information such as financial screen shots.
Worms
These are a bit like a computer virus but they spread on their own through computer networks. Their biggest problem is the sheer amount of computer time and bandwidth they soak up, so making the network slow to a crawl.
Adware/ Spyware
These are programs designed to keep track of which adverts you click on and then they send specific adverts to your browser. Fairly harmless but annoying and hard to get rid of.