Friday, 27 March 2009

Homwork 2

I would buy the apple mac computer as it has everything in the screen so it is compact. The screen is really big so will be good for watching movies and playing games. It also has easy access to itunes and has many songs. The songs can be saved edited and made up.Yyou can also download games, videos and music from itunes and watch them or listen to them as soon as they have finished downloading. I would buy the wirelss mouse and keyboard to go with it as they have long lasting battery power and give you easier moibility. I would then buy some surround sound to go with it to make it louder and give a good atmosphere.

Tuesday, 24 March 2009

Task 13


Task- Part 2

A file server is a computer attached to a network that has the primary purpose of providing a location for the shared storage of computer files.

A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.

A network switch is a computer networking device that connects network segments.A modem is an internal or external computer hardware device that connects your computer to a phone line and, if you wish, to an Internet Service Provider (ISP) that can link you to the Internet.

A network interface card, more commonly referred to as a NIC, is a device that allows computers to be joined together in a LAN, or local area network.

A hub is a small, simple, inexpensive device that joins multiple computers together.

A network operating system (NOS) is software that controls a network and its message (e.g. packet) traffic and queues, controls access by multiple users to network resources such as files, and provides for certain administrative functions, including security.

The Physical Layer is the first level in the seven-layer OSI model of computer networking. It translates communications requests from the data.Routers are physical devices that join multiple wired or wireless networks together.

Task 5

Star

Pros

Better...Performance Isolation of devices...Benefits from centralization

Cons

High dependence on the system...Network size is limited...Wiring up of the system can be very complex

Bus

Pros

Easy to implement and extend...Cheaper than other technologies...Cost effective as only a single cable is used

Cons

Limited cable length and number of stations...Maintenance costs may be higher in the long run...It is slower than the other topologies

Ring

Pros

Very orderly network where every device has access to the token and the opportunity to transmit...Can create much larger network using token ring...Performs better than a star topology under heavy network load

Cons

Moves, adds and changes of devices can affect the network...Much slower than an Ethernet network under normal load...Network adapter cards and MAU’S are much more expensive than Ethernet cards and hubs

Extended Learning 3

Across
3. This keeps your user area secure PASSWORD
7. Another name for a computer on a network WORKSTATION
8. This usually connects a LAN together CABLE
9. The software that keeps the network safe from hackers and viruses FIREWALL

Down
1. The machine that stores your data and files FILESERVER
2. This tells the server who you are and which files to present to you USERNAME
4. Hardware that can be connected to a network and shared PERIPHERAL
5. The largest WAN in existence INTERNET
6. The network topology which has a server in the middle STAR
10. The network topology which sends data in one direction only RING

Friday, 13 March 2009

Task 3-4

Comparing different types of computing device

LaptopSpecifications. Price= £369



• 160 GB hard drive.
• 1 GB Memory
• Modem Type 56k
• 1.66 Ghz Processor Speed
• Wifi
• 17” widescreen

http://www.pcworld.co.uk/martprd/store/pcw_page.jsp?BV_SessionID=@@@@1550240563.1236348770@@@@&BV_EngineID=ccdjadegjegijffcflgceggdhhmdgmk.0&page=Product&fm=null&sm=null&tm=null&sku=757590&category_oid=http://www.pcworld.co.uk/martprd/store/pcw_page.jsp?BV_SessionID=@@@@1550240563.1236348770@@@@&BV_EngineID=ccdjadegjegijffcflgceggdhhmdgmk.0&page=Product&fm=null&sm=null&tm=null&sku=757590&category_oid=e=Product&fm=null&sm=null&tm=null&sku=757590&category_oid=







DesktopPrice =£185
Specification

• 160 GB Hardrive
• 1 GB memory
• Ram Memory 1024 MB
• 2200 Processor speed

http://www.pcworld.co.uk/martprd/store/pcw_page.jsp?BV_SessionID=@@@@1550240563.1236348770@@@@&BV_EngineID=ccdjadegjegijffcflgceggdhhmdgmk.0&page=Product&fm=null&sm=null&tm=null&sku=491743&category_oid=-35614http://www.pcworld.co.uk/martprd/store/pcw_page.jsp?BV_SessionID=@@@@1550240563.1236348770@@@@&BV_EngineID=ccdjadegjegijffcflgceggdhhmdgmk.0&page=Product&fm=null&sm=null&tm=null&sku=491743&category_oid=-35614e=Product&fm=null&sm=null&tm=null&sku=491743&category_oid=-35614

Task 12

In ICT terms, what is a virus?
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs.2. When did the first ICT viruses appear and what did they do? The 1980’s
3. What effects can malicious viruses have? Hack into a persons file and delete them
4. What is the most common way to be affected by a virus? Open an email attatchment
5. What is anti virus software? Software which is used to detect and destroy infections from viruses
6. Give two examples of anti virus software AntiVirus… AVG
7. Why is it important to constantly update anti virus software? So antivirus programs can keep up to date with new viruses, which are being made every day.
8. Give three sensible precautions you can take, to stop the spreading of viruses Antivirus protection
Be careful what e-mails you open

9. Describe what each of the computer pests do, and how they get onto your computer: Trojan, Worm, Adware/Spyware, and Logic bomb . You might need to surf the internet to find out about some of these.

Trojan..
This is an application that appears to do something useful such as a computer game (which is why you loaded it on to your computer in the first place) but quietly, behind the scenes it is doing something with ill-intent. A trojan may:-
Log all your keystrokes and then send the details to a remote computer / server. Used to capture your passwords
Allow someone else to take control of your computer whilst you are online.
Capture screen shots and send them to a remote computer, once again with the intent of obtaining confidential information such as financial screen shots.

Worms
These are a bit like a computer virus but they spread on their own through computer networks. Their biggest problem is the sheer amount of computer time and bandwidth they soak up, so making the network slow to a crawl.
Adware/ Spyware
These are programs designed to keep track of which adverts you click on and then they send specific adverts to your browser. Fairly harmless but annoying and hard to get rid of.