REVIEW ESSAY BYTEBACK/ REVIEW FOR QUIZ OCTOBER 20, 2014
MS.TIWANA ANDERSON
Slide 2
BYTEBACK LESSON 1 AND TAKE THE FINAL EXAM 45 WPM 100 44-40 - 90
39-30 - 80 BELOW 30 - 70
Slide 3
WEEK WEEK AT A GLANCE: Go to Microsoft Word MONDAY DO NOW
LESSON 1 AND FINAL GRADE_______________ YOU WILL CONTINUE TAKING
NOTES FOR YOUR NEXT QUIZ ON FRIDAY REVIEW AND TURN IN ETHREE
STUDENTS WILL BE CHOSEN TO ANSWER THE LAST QUESTION ON THE ESSAY
SSAY ON SCORPION (WILL BE ON TEST) TUESDAY YOU WILL FINISH TAKING
NOTES WEDNESDAY- THURSDAY: COMPLETE QUIIZ AS A MAJOR GRADE
WEDNESDAY CLASSES WILL HAVE A SUBSTITUTE FRIDAY- REVIEW OF QUIZ,
BRIEF INTRODUCTION OF NEXT PROJECT, PLAY KAHOOT.IT ON HACKING
3
Slide 4
DO NOW DO NOW :BYTEBACK FINAL EXAM THOSE STUDENTS WHO NEVER
HAVE TO DO BYTEBACK.. UNLESS THEY CHOOSE TO ANDY - 114 WPM0 ERRORS
KYLE 84 WPM0 ERRORS COREY 64 WPM0 ERRORS WILEY 64 WPM0 ERRIORS
Slide 5
GRADESPEED PROOF: EVERYONE MUST SHOW ME THAT THEY CAN GET INTO
GRADESPEED OR TELL ME WHY NOT IF YOU CANNOT, THEN YOU MUST SIGN MY
LIST AND GIVE A REASON
Slide 6
TURN IN ESSAYS ON SCORPION GET THE HANDOUT FROM THE TEACHER AND
WRITE A FULL ONE PAGE ESSAY SUMMARIZING THE MOVIE LIST CHARACTERS
THE ROLES OF THE CHARACTERS THE BASIS AND PLOT OF EPISODE 1 HOW CAN
WE RELATE IT TO OUR CLASSWORK? YOUR OVERALL OPINION OF THE SITCOM
HOW MANY STARS WOULD YOU GIVE THE SITCOM IF YOU COULD HAVE THEM TO
FIX A PROBLEM, WHAT WOULD IT BE? WHAT WOULD BE THE PLOT OF YOUR
EPISODE
Slide 7
REVIEW: Computer System A basic computer system is made up of
two parts: hardware (physical equipment that you can touch) and
software (programs installed on the computer). Copyright Texas
Education Agency, 2013. All rights reserved. IT: [Principles of
Information Technology] [Networks and Hackers]7
Slide 8
Computer Networks Computer networks allow users to connect over
distances. They allow file sharing, hardware sharing, and instant
communication, making them a necessary tool for offices, schools,
and homes all over the world. A computer network consists of
several components, each of which is important to making the
network function correctly as a whole. Copyright Texas Education
Agency, 2013. All rights reserved. IT: [Principles of Information
Technology] [Networks and Hackers]8
Slide 9
Network Copyright Texas Education Agency, 2013. All rights
reserved. IT: [Principles of Information Technology] [Networks and
Hackers]9
Slide 10
PARTS OF A NETWORK Copyright Texas Education Agency, 2013. All
rights reserved. IT: [Principles of Information Technology]
[Networks and Hackers]10
Slide 11
Workstations These are known as desktop computers. The computer
you use at home or school would be called a workstation in a
network. Copyright Texas Education Agency, 2013. All rights
reserved. IT: [Principles of Information Technology] [Networks and
Hackers]11
Slide 12
Servers Servers can look like desktop computers; however, most
do not look like your normal computer. Servers do not really need
monitors, graphics and sound cards. What they really do need is
hard drives. In most schools, when you save your work, you are
saving to a server. By doing this, you can access your school work
from any computer that is on your school network. Copyright Texas
Education Agency, 2013. All rights reserved. IT: [Principles of
Information Technology] [Networks and Hackers]12
Slide 13
Modems A modem is a device that enables computers to interpret
data they receive from a network or send data in the proper form
along a network. Copyright Texas Education Agency, 2013. All rights
reserved. IT: [Principles of Information Technology] [Networks and
Hackers]13
Slide 14
Hubs A hub is sort of like a car radio. Every computer that has
that section of network (like a radio station) can hear everything
that is being transmitted. All the computers that are connected to
that hub receive all the information that goes through it. Usually,
if you have a hub, you also have a router. Copyright Texas
Education Agency, 2013. All rights reserved. IT: [Principles of
Information Technology] [Networks and Hackers]14
Slide 15
Switches A switch is more complex than a hub and works a lot
like a two-way radio. In a room full of people, only the person
holding the other radio can hear what is being said. It keeps track
of which computers are where, and when something comes in, it sends
it only to that specific computer, not every computer on that
section of the network. It is more secure than a hub, and faster
than a hub, but not as powerful as a router. Copyright Texas
Education Agency, 2013. All rights reserved. IT: [Principles of
Information Technology] [Networks and Hackers]15
Slide 16
Routers Routers work a lot like a telephone system. Each
computer is given its own unique number by the router. When
information comes into the router, it is then sent along to the
correct numberor in this case, computer. There are more options
built into routers than there are available to switches. A router
can have the equivalent phone options of call screening and caller
ID. This is beyond a switchs capabilities. Copyright Texas
Education Agency, 2013. All rights reserved. IT: [Principles of
Information Technology] [Networks and Hackers]16
Slide 17
Routers Copyright Texas Education Agency, 2013. All rights
reserved. IT: [Principles of Information Technology] [Networks and
Hackers]17
Slide 18
PEER-TO-PEER NETWORKS Copyright Texas Education Agency, 2013.
All rights reserved. IT: [Principles of Information Technology]
[Networks and Hackers]18
Slide 19
Peer-to-Peer Network: This is a type of network where the
computers in the network share resources among each other. Every
computer on this network is equal; all the computers run the same
networking software and file systems for sharing. Printers,
scanners, and other external devices are shared by the machine they
are plugged into, otherwise known as managed by. Copyright Texas
Education Agency, 2013. All rights reserved. IT: [Principles of
Information Technology] [Networks and Hackers]19
Slide 20
Peer-to-Peer Network Copyright Texas Education Agency, 2013.
All rights reserved. IT: [Principles of Information Technology]
[Networks and Hackers]20
Slide 21
Pros for a Peer-to-Peer Network It is less expensive to set up
a peer-to-peer network initially. You may already own the software
needed to get a peer-to-peer network set up. This type of network
does not require the installation of dedicated server hardware or
expensive security software. Copyright Texas Education Agency,
2013. All rights reserved. IT: [Principles of Information
Technology] [Networks and Hackers]21
Slide 22
Cons for a Peer-to-Peer Network If you have a peer-to-peer
network, you need to be aware that shared resources, such as
printers, place a special demand on the computers in the network.
Also, due to the nature of this type of network, all of the
computers on the network provide access to all of the machines
resources. The down side of this is that you can unintentionally
expose private files to all the other users on the network. There
is also no data security or protection from hackers, viruses, etc.
Copyright Texas Education Agency, 2013. All rights reserved. IT:
[Principles of Information Technology] [Networks and
Hackers]22
Slide 23
Peer-to-Peer Operating Systems In the peer-to-peer network
operating system, each of the workstations has an operating system
that tells it how to store and share resources with the others.
Copyright Texas Education Agency, 2013. All rights reserved. IT:
[Principles of Information Technology] [Networks and
Hackers]23
Slide 24
CLIENT SERVER NETWORKS Copyright Texas Education Agency, 2013.
All rights reserved. IT: [Principles of Information Technology]
[Networks and Hackers]24
Slide 25
Ethernet Ethernet is a type of connection between computers
that forms the basis of most LANs. It also serves as one of the
main methods for connecting a computer or network to an Internet
hub. The origin of Ethernet was the idea of connecting several
computers together in a network via coaxial cables. Since that
time, it has evolved into a much more sophisticated system that
uses specialized Ethernet cables that connect to a central hub or
router in order to network several computers together. Copyright
Texas Education Agency, 2013. All rights reserved. IT: [Principles
of Information Technology] [Networks and Hackers]25
Slide 26
Ethernet Copyright Texas Education Agency, 2013. All rights
reserved. IT: [Principles of Information Technology] [Networks and
Hackers]26 Ethernet Backbone Ethernet Switch Ethernet Switch
Ethernet Hub The Modern Ethernet Network
Slide 27
LAN LAN stands for Local Area Network. A Local Area Network is
a group of computers that are linked together that share internet
access, file access, applications, storage, and allow connected
computers to share printers and scanners. Copyright Texas Education
Agency, 2013. All rights reserved. IT: [Principles of Information
Technology] [Networks and Hackers]27
Slide 28
LAN Issues For a LAN to work properly, a router must be
installed on the primary computer that is connected to the
Internet. Each computer connected to the LAN must have an Ethernet
card installed. The other issue with a LAN is that they are usually
confined in a single building. Copyright Texas Education Agency,
2013. All rights reserved. IT: [Principles of Information
Technology] [Networks and Hackers]28
Slide 29
WAN WAN stands for Wide Area Networks. A WAN is a collection of
regular local area networks that are all interconnected to form one
giant network. Oftentimes, schools and even large companies will
operate a WAN on premises. Copyright Texas Education Agency, 2013.
All rights reserved. IT: [Principles of Information Technology]
[Networks and Hackers]29
Slide 30
WANs Continued Advantages Flexible access: School networks can
be created for students to access files throughout the school
district. Speed: Networks speed up the file sharing and saving
process. Disadvantages Expensive to install: WANs save money over
time, but they are expensive to set up at first. Time: WANs require
maintenance of the network, which costs both money and time.
Copyright Texas Education Agency, 2013. All rights reserved. IT:
[Principles of Information Technology] [Networks and
Hackers]30
Slide 31
Token Rings Token rings work by sending data from one machine
to the next and so on around a ring until it ends up back where it
started. It also uses a special token passing protocol, which means
that a machine can only use the network when it has control of the
token. This ensures that there are no collisions because only one
machine can use the network at any given time. Copyright Texas
Education Agency, 2013. All rights reserved. IT: [Principles of
Information Technology] [Networks and Hackers]31
Slide 32
Token Ring Copyright Texas Education Agency, 2013. All rights
reserved. IT: [Principles of Information Technology] [Networks and
Hackers]32
Slide 33
Token Ring Issues In order for token rings to work, all
computers must check for lost or duplicate tokens all connected
computers must vote a new leader to create a new token Copyright
Texas Education Agency, 2013. All rights reserved. IT: [Principles
of Information Technology] [Networks and Hackers]33
Slide 34
Client/Server Operating Systems Client/Server setup allows the
network to centralize functions and applications in one or more
file servers. File servers become the heart of this system and
provide access to files and resources, as well as providing
security. Workstations have access to the resources to files on the
file servers. Copyright Texas Education Agency, 2013. All rights
reserved. IT: [Principles of Information Technology] [Networks and
Hackers]34
Slide 35
Client/Server Operating Systems There are many different
software programs available for this type of network. Copyright
Texas Education Agency, 2013. All rights reserved. IT: [Principles
of Information Technology] [Networks and Hackers]35
Slide 36
Client/Server Operating Systems Advantages This type of network
makes it easy to install new technology and new elements. The
server can be accessed remotely. Copyright Texas Education Agency,
2013. All rights reserved. IT: [Principles of Information
Technology] [Networks and Hackers]36
Slide 37
Client/Sever Operating Systems Disadvantages Client/Servers
depend on their servers. When they go down, the network will no
longer work. There is a hefty investment for a client/server
network. It pays off in the long run, but it requires money to set
it up. Large networks will require dedicated staff to maintain a
client/server network and to work out the kinks when problems
arise. Copyright Texas Education Agency, 2013. All rights reserved.
IT: [Principles of Information Technology] [Networks and
Hackers]37
Slide 38
NETWORK THREATS Copyright Texas Education Agency, 2013. All
rights reserved. IT: [Principles of Information Technology]
[Networks and Hackers]38
Slide 39
Hackers A computer hacker is someone who finds access into a
computers security system to break into another machine. Hackers
usually collect information on the target computer and then try to
gain access into the computer system. Copyright Texas Education
Agency, 2013. All rights reserved. IT: [Principles of Information
Technology] [Networks and Hackers]39
Slide 40
Security Threats The most common threats are Spam: Unwanted
commercial e-mail. Viruses: Can cause your computer to slow down or
even destroy your hard drive. Adware/Malware: Software that gets
installed on the computer. It can cause annoying pop-ups or even
steal information. Information Threats: Hackers steal important
information, such as client information, bank account numbers,
credit card numbers, etc. Copyright Texas Education Agency, 2013.
All rights reserved. IT: [Principles of Information Technology]
[Networks and Hackers]40
Slide 41
Hackers Networks can take steps to protect their networks. The
most common are Installing a firewall Advising caution on the net
Making sure that the network is password protected, especially if
using a wireless network.. Copyright Texas Education Agency, 2013.
All rights reserved. IT: [Principles of Information Technology]
[Networks and Hackers]41