Review 2 Chapters 7, 8, 9. 2 Define a network and its purpose. Explain how communications...

4
Review 2 Chapters 7, 8, 9

Transcript of Review 2 Chapters 7, 8, 9. 2 Define a network and its purpose. Explain how communications...

Page 1: Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.

Review 2

Chapters 7, 8, 9

Page 2: Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.

2

Define a network and its purpose. Explain how communications technologies are used in our

every day lives. Understand the various topologies and architectures a

computer network might use. Explain the difference between a LAN, a WAN, and a PAN,

and between an intranet, an extranet, and the Internet. Name specific types of wired and wireless transmission

media and explain how they transmit data. Understand what protocols are and what they do. List several types of networking hardware and explain the

purpose of each.

Chapter 7

Page 3: Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.

3

Discuss how the Internet evolved and what it is like today. Describe device and connection options for connecting to

the Internet, as well as some considerations to keep in mind when selecting an ISP.

Understand how to effectively search for information on the Internet.

Explain several different types of applications other than web browsing and email that require the internet in order to function.

Discuss censorship and privacy and how they are related to Internet use.

Chapter 8

Page 4: Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.

4

Explain why computer users should be concerned about network and Internet security.

List several examples of unauthorized access, unauthorized use, and computer sabotage.

Explain how access control systems, firewalls, antivirus software, and encryption protect against unauthorized access, unauthorized use, and computer sabotage.

Discuss online theft, identity theft, Internet scams, spoofing, phishing, and other types of dot cons.

Chapter 9