Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

LESSON 3: COMPUTER NETWORKING

1. Star Topology. Because it’s easy to set up, relatively inexpensive, and provides more
redundancy than other topologies. The star topology is set up by connecting all of the
network’s nodes to a single central device.
a. Everything expands “just enough” to allow the fractured parts to touch as the cable
heats up (due to the heat of the day or the operation of the machine). The fractured
bits separate as it cools. It can also work in the reverse direction.
b. There is 2 type of computer breakdown:
1. Hardware - your computer components malfunction because of damage.
2. Software - your computer operating system malfunction because of corruption of
system data.
If your hardware is faulty, your operating system and software are safe for backup if
your hard disk is not the faulty component. And in the case of operating system
corruption, the simplest solution is a reinstall of the OS. That would remove your
currently running software. Windows provides repair solutions, which are meant to
save your software and applications from being uninstalled or removed. But
personally I have no trust in them and prefer doing a clean reinstall of the OS.
c. The downsides of a star network are that it is expensive to set up since it utilizes the
most cable (network wire is expensive), and it requires additional hardware (hubs or
switches), which adds to the expense. All devices attached to a hub or switch will lose
their network connection if it fails.
2. IP refers to the method of communication used by computers to communicate with one
another. IP sends and receives packets between computers, as well as routing them to
their intended destinations. On the Internet or any other packet-switched network, a
packet is a unit of data that is routed between an origin and a destination.
3. Change the privacy settings on your iPhone, iPad, or iPod touch if you no longer trust a
computer or other device. Reset Location & Privacy by going to Settings > General >
Reset > Reset Location & Privacy. When you connect to previously trusted computers,
the Trust alert will now question if you trust them.
When you connect your iPhone, iPad, or iPod touch to a computer or other device for the first time, an
alert asks whether you trust the computer:
 Trusted computers can sync with your device, create backups, and access your device's photos,
videos, contacts, and other content. These computers remain trusted unless you change which
computers you trust or erase your device.
 If you choose not to trust a computer, you block its access to content on your device. You'll see the
trust alert every time that you connect your device to that computer.

You might also like