Assignment IT LEc
Assignment IT LEc
Assignment IT LEc
Assignment in IT LEC
___________________________________________________________________________
1. Computer Network - is a group of computer systems and other computing hardware devices
that are linked together through communication channels to facilitate communication and
resource-sharing among a wide range of users. Networks are commonly categorized based on
their characteristics.
2. The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes
and standardizes the communication functions of a telecommunication or computing system
without regard to their underlying internal structure and technology. Its goal is the interoperability
of diverse communication systems with standard protocols. The model partitions a
communication system into abstraction layers. The original version of the model defined seven
layers.
4. Types of Networks
There are several different types of computer networks. Computer networks can be characterized by
their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of
computers that are part of the network. Networks can cover anything from a handful of devices within
a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
In terms of purpose, many networks can be considered general purpose, which means they are used
for everything from sending files to a printer to accessing the Internet. Some types of networks,
however, serve a very particular purpose. Some of the different networks based on their main purpose
are:
5. Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer
network. Essentially, it is the topological. structure of a network and may be depicted physically
or logically. Physical topology is the placement of the various components of a network,
including device location and cable installation, while logical topology illustrates how data flows
within a network, regardless of its physical design. Distances between nodes, physical
interconnections, transmission rates, or signal types may differ between two networks, yet their
topologies may be identical.
6. Networking Standards
7. Network Devices
1) HUB
2) -Hub falls in two categories:
a. Active Hub
b. Passive Hub
c. Ethernet Hubs
3) -Switches
4) -Bridges
5) Types of Bridges:
6) Transparent Bridge
7) Source Route Bridge
8) Translational Bridge
9) Switches superseding Bridges
8. Wireless is a more modern alternative to traditional wired networking that relies on cables to
connect networkable devices together. Wireless technologies are widely used in both home and
business computer networks.
Cable
If you already have cable TV then you live in an area served by a cable operator. You will need a
special modem to run alongside your TV box, and the operator will often bundle the cost of the TV
and Broadband connections together in a cost effective package.
Satellite
Satellite is generally considered to be the last resort for people living in remote areas. It requires the
installation of a special satellite dish and modem, and the equipment and line rentals are often
extremely expensive.
Wireless
Wireless Broadband is the choice of West Net, it provides a high speed and robust connection across
rural areas and does not require a telephone line of any kind.
11. A computer virus is a malware program that, when executed, replicates by inserting copies of
itself (possibly modified) into other computer programs, data files, or the boot sector of the hard
drive; when this replication succeeds, the affected areas are then said to be "infected".
12. Data security means protecting data, such as a database, from destructive forces and from
the unwanted actions of unauthorized users.
Steaphen Garcia Bernardo
Assignment: IT Lec
1. Computer Network - is a group of computer systems and other computing hardware devices
that are linked together through communication channels to facilitate communication and
resource-sharing among a wide range of users. Networks are commonly categorized based on
their characteristics.
2. The Open Systems Interconnection model (OSI model) is a conceptual model that
characterizes and standardizes the communication functions of a telecommunication or
computing system without regard to their underlying internal structure and technology. Its
goal is the interoperability of diverse communication systems with standard protocols. The
model partitions a communication system into abstraction layers. The original version of the
model defined seven layers.
4. Types of Networks
There are several different types of computer networks. Computer networks can be characterized by
their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of
computers that are part of the network. Networks can cover anything from a handful of devices
within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
In terms of purpose, many networks can be considered general purpose, which means they are used
for everything from sending files to a printer to accessing the Internet. Some types of networks,
however, serve a very particular purpose. Some of the different networks based on their main
purpose are:
5. Network topology is the arrangement of the various elements (links, nodes, etc.) of
a computer network. Essentially, it is the topological. structure of a network and may be
depicted physically or logically. Physical topology is the placement of the various components
of a network, including device location and cable installation, while logical
topology illustrates how data flows within a network, regardless of its physical design.
Distances between nodes, physical interconnections, transmission rates, or signal types may
differ between two networks, yet their topologies may be identical.
6. Networking Standards
7. Network Devices
18) HUB
19) -Hub falls in two categories:
a. Active Hub
b. Passive Hub
c. Ethernet Hubs
20) -Switches
21) -Bridges
22) Types of Bridges:
23) Transparent Bridge
24) Source Route Bridge
25) Translational Bridge
26) Switches superseding Bridges
8. Wireless is a more modern alternative to traditional wired networking that relies on cables to
connect networkable devices together. Wireless technologies are widely used in both home
and business computer networks.
Cable
If you already have cable TV then you live in an area served by a cable operator. You will need a
special modem to run alongside your TV box, and the operator will often bundle the cost of the TV
and Broadband connections together in a cost effective package.
Satellite
Satellite is generally considered to be the last resort for people living in remote areas. It requires the
installation of a special satellite dish and modem, and the equipment and line rentals are often
extremely expensive.
Wireless
Wireless Broadband is the choice of West Net, it provides a high speed and robust connection across
rural areas and does not require a telephone line of any kind.
11. A computer virus is a malware program that, when executed, replicates by inserting copies of
itself (possibly modified) into other computer programs, data files, or the boot sector of
the hard drive; when this replication succeeds, the affected areas are then said to be
"infected".
12. Data security means protecting data, such as a database, from destructive forces and from
the unwanted actions of unauthorized users.
Name: Krista Vielka Cruz
Assignments
4. Types of Networks
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the
number of computers that are part of the network. Networks can cover anything from a
handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
In terms of purpose, many networks can be considered general purpose, which means they
are used for everything from sending files to a printer to accessing the Internet. Some types
of networks, however, serve a very particular purpose. Some of the different networks based
on their main purpose are:
5. Network topology is the arrangement of the various elements (links, nodes, etc.) of
a computer network. Essentially, it is the topological. structure of a network and may be
depicted physically or logically. Physical topology is the placement of the various
components of a network, including device location and cable installation, while logical
topology illustrates how data flows within a network, regardless of its physical design.
Distances between nodes, physical interconnections, transmission rates, or signal types
may differ between two networks, yet their topologies may be identical.
6. Networking Standards
7. Network Devices
35) HUB
36) -Hub falls in two categories:
a. Active Hub
b. Passive Hub
c. Ethernet Hubs
37) -Switches
38) -Bridges
39) Types of Bridges:
40) Transparent Bridge
41) Source Route Bridge
42) Translational Bridge
43) Switches superseding Bridges
Cable
If you already have cable TV then you live in an area served by a cable operator. You will
need a special modem to run alongside your TV box, and the operator will often bundle the
cost of the TV and Broadband connections together in a cost effective package.
Satellite
Satellite is generally considered to be the last resort for people living in remote areas. It
requires the installation of a special satellite dish and modem, and the equipment and line
rentals are often extremely expensive.
Wireless
Wireless Broadband is the choice of West Net, it provides a high speed and robust
connection across rural areas and does not require a telephone line of any kind.
11. A computer virus is a malware program that, when executed, replicates by inserting
copies of itself (possibly modified) into other computer programs, data files, or the boot
sector of the hard drive; when this replication succeeds, the affected areas are then said
to be "infected".
12. Data security means protecting data, such as a database, from destructive forces and
from the unwanted actions of unauthorized users.