Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

LIVING IN THE IT ERA Here are five ways that technology has altered the

Introduction Information Technology (IT) way we work:


Week 1 DIFFERENT FACETS OF SCIENCE
Information Technology (IT) Week – 2
- the creation, processing, storing,
protecting, and exchanging of all types of electronic • Mobility
data through the use of computers, storage, • The Cloud
networking, and other physical devices. • AR/VR Innovation
• Customer Data
IMPACT OF INFORMATION TECHNOLOGY • Social Impact
IN OUR DAILY LIVES ABOUT ETHICS OF IT
1. Better Information Access. Ethics is a set of beliefs about what is and is not
2. Improved Communication. acceptable behavior.
3. Decreased Privacy.
4. Flexible Working. Morality refers to social conventions about what is
5. Accessible Shopping from anywhere. right and wrong that are so widely shared that they
form the foundation of an established consensus.
Summary
• IT is the use of technology to create, process, Virtue is a habit that encourages people to do what
store, retrieve, and exchange all kinds of data and is acceptable, whereas
information.
• IT can be many things and cover many facets of Vice is a habit that encourages people to do what is
life. unacceptable. A person who acts with integrity
• IT has different impacts on our daily lives - good follows a personal set of principles.
or bad
MORALS, ETHICS, & LAWS
DIFFERENT FACETS OF SCIENCE • Morals are one's personal beliefs about what is
Week – 2 right and wrong.
SCIENCE • Ethics are the standards or codes of behavior that
• It is the systematic investigation of the structure a group to which one belongs expects of an
and behavior of the natural and physical worlds via individual.
observations and experiments. • The law is a set of rules that govern what we are
and are not allowed to do
TECHNOLOGY
• It is an art, skill, or ability used to create and ETHICS IN IT
develop products as well as to acquire knowledge. The significance of ethics and human values has
been understated in recent years.IT breakthroughs
NATURE OF SCIENCE AND TECHNOLOGY have a wide range of consequences. Here are some
• It includes a wide range of fundamental skills examples of public concern about information
such as agricultural advancement and chemical technology's ethical application.
development, industries, medical technology, and
software development, to name a few. IT PROFESSIONALS
• Understanding the attributes or elements A profession is a calling that necessitates
necessitates knowledge and comprehension specialized knowledge and, in many cases,
of worker intelligence. extensive academic training.

CULTURE AND TECHNOLOGY A "professional employee" is defined in the


Culture - is a broad term that includes both social United States Code of Federal Regulations as
behavior and human society's norms. someone who is engaged in the performance of
work
8 Elements of culture:
• Language THE IMPORTANCE OF INTEGRITY
• Religion Integrity is a pillar of ethical behavior.
• Daily Life Persons of integrity:
• Economy • Adherence to a personal code of principles
• Government • Extend the same courtesy and consideration to
• Arts everyone.
• History • Maintain consistent moral standards in all
• Social Groups situations.
• When moral standards are applied, a lack of
TECHNOLOGY SHAPES CULTURE integrity emerges depending on the situation or the
people involved
• Many ethical quandaries are not as simple as right
and wrong versus incorrect
DIFFERENT FACETS OF SCIENCE DIFFERENT FACETS OF SCIENCE
Week – 2 Week – 2

WHY IS A PROFESSIONAL CODE OF SUPPORTING ETHICAL PRACTICES OF IT


ETHICS IMPORTANT FOR IT USERS
PROFESSIONALS? • Establishing Guidelines for the Use of Company
Software
PROFESSIONAL CODE OF ETHICS • Defining and Limiting the Appropriate Use of IT
A professional code of ethics outlines the Resources
fundamental principles and core values of a specific • Structuring Information Systems to Protect Data
occupational group's work. and Information
• Installing and Maintaining a Corporate Firewall
Public trust and respect—Public trust is based on
the expectation that a professional will act ethically. SUMMARY
• The importance of science and technology.
Evaluation benchmark—A code of ethics includes • How technology shapes culture.
an evaluation benchmark that a professional can use • The importance of Ethics in IT as well as the code
for self-evaluation. The code can also be used by of Ethics in IT is important to IT Professionals.
the professional's peers for recognition or censure. • Also, the significance of certifications in IT has
been emphasized. How this indicates that IT
CERTIFICATIONS Professionals possess a specific set of skills and
Certification indicates that a professional possesses knowledge on the subject matter
a specific set of skills, knowledge, or abilities

CERTIFICATIONS FOR VENDORS COMPUTER SYSTEM


Many IT vendors, including Cisco, IBM, WEEK – 3
Microsoft, SAP, and Oracle, provide certification Computer
programs for users of their products. - The word computer is derived from the
Latin word 'computare', which means 'to
Certifications tied to a vendor's products are useful calculate', 'to count', 'to think', or 'to sum up'.
for jobs with very specific requirements or certain
aspects of broader roles. - is a fast-electronic calculating machine that
accepts digitized input data, processes it using a
INDUSTRY ASSOCIATION list of internally stored instructions, and outputs
CERTIFICATIONS the resulting output data.
There are numerous industry certifications available
in a variety of IT-related subject areas. Their worth PARTS OF THE COMPUTER
varies significantly depending on where people are ACCORDING TO THEIR FUNCTION
in their careers, what other certifications they have, Central Processing Unit
and the nature of the IT job market. - is the computer's "brain" where processing
takes place.
IT PROFESSIONAL MALPRACTICE
Professionals who violate their duty of care are RAM (Random Access Memory)
liable for any injuries caused by their negligence. - It is used to temporarily store data that the
This type of liability is known as professional computer's central processing unit (CPU) is actively
malpractice. using.

COMMON ETHICAL ISSUES FOR IT USERS OUTPUT DEVICES


• Software Piracy It provides feedback to the user
Software piracy in the workplace can sometimes be
traced back to IT professionals, who may either INPUT DEVICES
allow it to happen or actively participate in it. Enable the user to send data to the computer
• Inappropriate Use of Computing Resources
Some employees use their computers to visit STORAGE UNITS
popular Web sites unrelated to their jobs, chat in They are permanent disk storage devices such as
chat rooms, view pornographic sites, and play floppy disks, hard disks, CD-ROMs, memory
computer games. cards, and memory sticks.
• Inappropriate Sharing of Information
Every organization stores vast amounts of data that
can be classified as private or confidential.
COMPUTER SYSTEM COMPUTER SYSTEM
WEEK – 3 WEEK – 3

PARTS OF THE COMPUTER


ACCORDING TO THEIR LOCATION

1.EXTERNAL PARTS
- Computer devices and peripherals that are
connected to but are outside the system unit.

2.INTERNAL PARTS
- Computer parts and peripherals that are
inside the system unit
- Common components of the System Unit

PARTS OF THE MOTHERBOARD

COMMON PC PORTS AND CONNECTORS

EVOLUTION OFTHE COMPUTER


COMPUTER PARTS AND DEFINITION
MECHANICAL ERA

Abacus
- Originated in Asia and was the first
counting device.

Pascaline
- The first mechanical digital calculator with
gears was invented in 1642 by Blaise Pascal, who
performed addition and subtraction on whole
numbers.

Weaving Loom
- It was invented by Joseph Marie Jacquard
in 1804 on the idea of punched cards used in
musical boxes to control the looms.

Difference Engine
- It was invented in 1812 by Charles P.
Babbage. He is known as the “Father of the
computer,” who discovered that many long
calculations involved a large number of similar,
repeated operations.
UNIVAC I
- Mauchly and Eckert built the
COMPUTER SYSTEM COMPUTER SYSTEM
WEEK – 3 WEEK – 3

Augusta Ada Byron UNIVAC I. The UNIVAC I compiler was created


- The first programmer by Dr. Grace Murray Hopper.

Dr. Herman Hollerith's Tabulating Machine First Integrated Circuit


- It was used to compile data for United - Texas Instruments Jack St. Clair Kilby
States Census. and Robert Noyce created the first integrated
circuit, or chip, in 1959.
Vacuum Tube
- It was invented by American physicist Lee THIRD GENERATION: INTEGRATED
De Forest in1906. CIRCUIT (1946-1971)

FIRST GENERATION: VACUUM TUBE 1960s


(1940-1956) - Gene Amdahl designed the IBM
System/360 series of mainframe (G) computers, the
Atanasoff-Berry-Computer (ABC) first general-purpose digital computers to use
- It was constructed by Dr. John V. Integrated circuits.
Atanasoff and his assistant Clifford Berry
construct the first in 1939 laying the groundwork 1965
for advances in electronic digital computers. - BASIC (Beginners All-purpose Symbolic
Instruction Code) programming language
Turing Machine developed by Dr. Thomas Kurtz and Dr. John
- A hypothetical device that could perform Kemeny.
logical operations and read and write. It would
herald the arrival of programmable computers. 1969
- The internet started.
Harvard mark I
- A large automatic digital sequence- FOURTH GENERATION:
controlled computer. MICROPROCESSOR

ENIAC (Electrical Numerical Integrator and Intel 4004 microprocessor (G) chip
Calculator) - It was created by Dr. Ted Hoff.
- John W. Mauchly and J. Presper Eckert
Jr of the University of Pennsylvania. Ed Roberts
- “Father of the Microcomputer”
Transistor
- At Bell Labs in 1947, John Bardeen, Altair 8800
Walter Brattain, and William Shockley invented - It was produced by Micro Instrumentation
the transistor. and Telemetry Systems.

EDSAC (Electronic Delay Storage Automatic 1975


Computer) - Microsoft was born.
- Maurice V. Wilkes created the first
stored-program computer. William Gates and Paul Allen
- Two young hackers
EDVAC (Electronic Discrete Variable Automatic
Computer) 1976
-Mauchly Eckert and von Neumann - Cray developed the Cray-I
created the second stored-program computer. supercomputer (G). Apple Computer, Inc. was
founded by Steven Jobs and Stephen Wozniak.
SECOND GENERATION: TRANSISTOR
(1956-1963) 1977
- Jobs and Wozniak designed and built the
Automatic Computing Machine (ACE) first Apple II microcomputer.
- Alan Turing created the ACE
in 1950, which some consider to be the first 1981
programmable digital computer. - The IBM PC was introduced with a 16-bit
microprocessor.
- Distinct pieces of information, are usually
formatted in a special way. All software is divided
COMPUTER SYSTEM into two general categories: data and programs.
WEEK – 3 COMPUTER SYSTEM
WEEK – 3
1984
- Apple Computer launched the Macintosh, Programs are collections of instructions for
the first successful mouse-driven computer with manipulating data. Data can exist in a variety of
GUI. forms -- as numbers or text on pieces of paper, as
bits and bytes stored in electronic memory, or as
1984 facts stored in a person's mind.
- IBM released the first commercial
implementation of 80286 called PC/AT (PC 4.Peopleware
Advanced Technology). It is three times faster than - Components of a Computer System
original PCs and based on the Intel 286 chip. user, programmer, technician and other people
involve in the computer system
1988
- A nondestructive worm was introduced CATEGORIES OF COMPUTER
into the Internet network bringing thousands of 1.Super Computer
computers to a halt. - The fastest type of computer.
Supercomputers are very expensive and are
1989 employed for specialized applications that require
- The Intel 486 became the world's first immense amounts of mathematical calculations
1,000,000 transistor microprocessor.
FIFTH GENERATION: ULSI 2.Mainframe Computer
- A very large and expensive computer
The period of the fifth generation is 1980-till date. capable of supporting hundreds, or even thousands,
In the fifth generation, VLSI technology became of users simultaneously.
ULSI (Ultra Large Scale Integration) technology,
resulting in the production of microprocessor chips 3.Minicomputer
having ten million electronic components. - A midsized computer. In size and power,
-ULSI technology minicomputers lie between workstations and
-Development of true artificial intelligence mainframes.
-Development of Natural language processing
-Advancement in Parallel Processing 4.Microcomputers
-Advancement in Superconductor technology - The term microcomputer is generally
-More user-friendly interfaces with multimedia synonymous with a personal computer (PC), or a
features computer that depends on a microprocessor.
-Availability of very powerful and compact Microcomputers are designed to be used by
computers at cheaper rates individuals, whether in the form of PCs,
workstations, or notebook computers.
COMPONENTS OF A COMPUTER SYSTEM
TERMINOLOGIES OF COMPUTERS
1. Hardware Data – the symbols that represent people, events,
- Computer parts that you can actually things, and ideas
touch, like disks, disk drives, display screens,
keyboards, printers, boards, and chips. Information – data presented in a format that
people can understand and use
2.Software
- Computer instructions or data. Anything Bit –binary codes used by computers consisting of
that can be stored electronically is software. either 1 or 0

Systems software: Byte – eight bits and are used to represent one
Includes the operating system and all the character
utilities that enable the computer to function.
Character – may be a letter, number, or
Applications software: punctuation mark
Includes programs that do real work for
users. File – a named collection of data that exists on a
storage medium, such as a hard disk, floppy disk, or
3.Data CD
Data File – files that are regarded as passive, the Entertainment
data does not instruct the computer to do anything – interactive games and virtual simulations,
computer-generated effects.
COMPUTER SYSTEM SOFTWARE AND ITS TYPES SYSTEM
WEEK – 3 SOFTWARE AND OPERATING SYSTEM
WEEK – 4
Executable file – files that are considered active,
the instructions stored in the file cause the computer SOFTWARE
to carry out some action • comprises of computer programs, support
modules, and data modules
INFORMATION SIZE MEASUREMENT • provides a computer with the instructions and
Kilobyte (KB) data to carry out a specific type of task.
1KB = 1,024 bytes
1KB = 140 words PROGRAMS
Megabyte (MB) • a set of instructions that solves a problem or
1MB = 1,000KB carries out a task
1MB = 1,000,000 bytes
1MB = 500 pages of the text or one large SUPPORT MODULE
book • provides an auxiliary set of instructions used in
Gigabyte (GB) conjunction with the main software program
1GB = 1,000MB • not designed to be run by the computer user
1GB = 1,000,000 KB
1GB = 1,000,000,000 bytes TYPES OF SOFTWARE
1GB = 1,000 books of text 1. Systems software or System programs
2. Application software or Application programs
Software Generation
BASIC PRINCIPLE OF AN OPERATING
1. First generation: Machine language. SYSTEM
2. Second generation: Low-level programming • An operating system is a collection of software
languages such as that coordinates the working of the different
Assembly language. components of the system and gets the user’s
3. Third generation: Structured high-level job done.
programming languages such • The operating system provides the user with all
as C, COBOL and the basic things necessary to do his job.
FORTRAN.
4. Fourth generation: Domain-specific high-level WHAT DOES AN OPERATING SYSTEM DO?
programming languages such • A computer’s software acts similarly with the
as SQL (for database access) chain of command in an army
and TeX (for textformatting) – Using application software, you issue a
command
COMPUTER APPLICATIONS – Application software tells the operating
Business system what to do
– They use computers to store information, easily • The Operating System instructs the device drivers,
interface with customers, and facilitate the device
processing and presentation of data. drivers instruct the hardware and the hardware
actually does the
Mathematics and Science work
– Watson and Cricks discovery of the structure of • The Operating System interacts with the
the DNA. application software, device drivers, and hardware
to manage a computer’s resources.
Engineering • While interacting with application software,
– degrees of miniaturization and integration have operating system is
multiplied n-fold. busy behind the scenes with other tasks

Medicine WHEN DO I DIRECTLY INTERACT WITH


– more reliable artificial hearts are being offered to THE OPERATING SYSTEM?
those with heart problems. • Launch programs
• Customize the user interface
Education • Manage files
– ease of use in the creation of presentation • Configure equipment
materials and documents. • Get help
SOFTWARE AND ITS TYPES SYSTEM SOFTWARE AND ITS TYPES SYSTEM
SOFTWARE AND OPERATING SYSTEM SOFTWARE AND OPERATING SYSTEM
WEEK – 4 WEEK – 4

WHERE IS THE OPERATING SYSTEM? OPERATING SYSTEM (OS) SERVICES


• The entire operating system is small enough to be • Program Development – variety of services and
stored in ROM for typically handheld computers utilities such as Editors and debuggers. They are
and video game consoles usually referred to as application program
• For nearly all personal computers, servers, development tools.
workstations, mainframes, and supercomputers, the
operating system program is quite large, so most of • Program Execution – involves a number of steps,
it is stored on a hard disk such as loading Instruction and data in the main
• The bootstrap program provides the instructions memory, initialization of I/O devices and files, and
needed to load the core parts (kernel) into memory other resources to be allocated. OS handles the
when the system boots. scheduling.
• Customization utilities and other parts of the
operating system are loaded into memory as they • Access to I/O devices – Each I/O device has its
are needed. own set of Instructions and control signals. O.S.
hides these details to provide a common interface to
BASIC FUNCTION OF AN OS the user/programmer.
• Process Management – handles multi-programs
that are simultaneously running. • Controlled access to files - nature of I/O device
(disk drive, tape drive) and structure of the data
• Memory Management – manage memory stored in the files in the storage medium. In the case
between processes and data according to priority. of multiple users accessing the processor
concurrently, proper protection mechanisms have to
• Storage Management – Managing the permanent be used.
Storage of data on disks or other media
• System access - For shared or public systems, the
• I/O Management – Manage and schedule the O.S. controls access to the system as a whole and to
input and output operations specific system resources. Access system provides
protection of resources, and data from unauthorized
• Device / Resource Management – Managing users, and resolves resource conflicts
devices and resources and allowing the users to
share the resources • Error detection and response – Variety of errors
may occur in computer system. Responses may
• Security and Protection – Securing the system range from program termination, retrial of the same
against possible unauthorized access to data or any operation, or reporting error to the application.
other entity. Protecting the parts of the system
against damage. • Accounting – collecting usage statistics, CPU
usages, monitor performance, etc.
• Booting the System and getting it ready to
work. STRUCTURE OF AN OPERATING SYSTEM

• Data communications – Providing interface to


connect to other computers or allowing others to
connect.

OPERATING SYSTEM (OS) AS AN


INTERFACE

• User – The system representation of the human


operator who requests for services.

• Application Software – Special software to help


the user do his task (E.g..MS Word)
• Shell – The program that interprets the commands
or requests given by the user and gets the job done
by the kernel.
SOFTWARE AND ITS TYPES SYSTEM SOFTWARE AND ITS TYPES SYSTEM
SOFTWARE AND OPERATING SYSTEM SOFTWARE AND OPERATING SYSTEM
WEEK – 4 WEEK – 4

• Kernel – The core of the operating system. It uses • Server software, including: Web applications,
the hardware to do the jobs required by the user or which usually run on the web server and output
the system. It coordinates among the hardware and dynamically generated web pages to web browsers,
interfaces it with the above layers. using e.g. PHP, Java, ASP.NET, or even
JavaScript that runs on the server.
• System Software – Software that can access the
hardware directly and generally provides various • Plugins and extensions are software that extends
system services. (E.g..The kernel itself, device or modifies the functionality of another piece of
drivers etc.). software, and require that software be used in order
to function;
• Hardware – The set of electronic devices that
work together to ultimately do the job required by • Embedded software resides as firmware within
all the upper levels embedded systems, devices dedicated to a single
use or a few uses such as cars and televisions
TYPES OF OPERATING SYSTEM (although some embedded devices such as wireless
• Single-user Operating System chipsets can themselves be part of an ordinary,
– Deals with one set of input devices, those that can nonembedded computer system such as a PC or
be manipulated by one user at a time. smartphone).
Ex. Windows, Linux & Mac OS X logos
• Microcode is a special, relatively obscure type of
• Multi-user Operating System embedded software which tells the processor itself
– Deals with input, output, and processing requests how to execute machine code, so it is actually a
from many users, all at the same time lower level than machine code. It is typically
proprietary to the processor manufacturer, and any
• Network Operating System necessary correctional microcode software updates
– Provides communications and routing services are supplied by them to users. Thus, an ordinary
that allow computers to share data, programs and programmer would not expect to ever have to deal
peripheral devices with it.

• Multitasking Operating System SOFTWARE COPYRIGHT


– Provides process and memory management • a form of legal protection that grants the author of
services that permit two or more programs to run an original “work”.
simultaneously • an exclusive right to copy, distribute, sell, and edit
that work, except under special circumstances
• Desktop Operating System described by copyright laws
– Designed for a personal computer, either a
desktop or notebook computer EXCEPTIONS
– Designed to accommodate a single user, but may Purchaser
also provide networking and multitasking x can make a backup or extra copy of the
capabilities software for erased or damaged original
copy
APPLICATION SOFTWARE x allowed to copy and distribute parts of a
It is also known as an application or an "app", is software program for reviews and teaching
computer software designed to help the user to x has the right to copy software from a
perform specific tasks. distribution disk or Web site for installation

NATURE OF EXECUTION OF SOFTWARE LICENSE AGREEMENT


• Desktop applications such as web browsers and a legal contract that defines the way in which a
Microsoft Office, as well as smartphone and tablet computer program may be used.
applications (called "apps").
Techniques Validating Software License
• JavaScript scripts are pieces of software • shrink-wrap licenses
traditionally embedded in web pages that are run • installation agreements
directly inside the web browser when a web page is
loaded without the need for a web browser plugin. LICENSE AGREEMENT
Guide Questions for Software License Agreement
o When does the license go into effect?
o Can I sell the software?
SOFTWARE AND ITS TYPES SYSTEM COMPUTER NETWORKS
SOFTWARE AND OPERATING SYSTEM WEEK – 5
WEEK – 4
COMMUNICATION CHANNELS
o Can I rent the software? • a pathway over which information can be
o Am I buying the software or licensing it? transferred
o Can I loan the software to a friend? • information sent over a channel has a source
o Does the software publisher provide a warranty? (transmitter), from which the information originates,
o Under what circumstances can I make copies? and destination (receiver), to which the information
is delivered
TYPES OF SOFTWARE LICENSE
Public Domain Software TYPES OF COMMUNICATION
• may be freely copied, distributed, and resold TRANSMISSION
• not protected by copyright 1. Simplex Channel
-a channel whose direction of transmission is
Commercial Software unchanging
• sold in computer stores or at Web sites
• adheres closely to the limitations provided by 2. Half–Duplex Channel
copyright law -a channel in which the direction may be reversed,
but the transmission does not occur at the same time
Freeware
• a copyrighted software that is available for free 3. Full–Duplex Channel
• allows you to use, copy, and distribute the -a channel that allows simultaneous exchange in
software both directions

Shareware TYPES OF TRANSMISSION


• a copyrighted software marketed under a “try TECHNOLOGIES
before you buy” policy • Point-to-point Networks
• allows you to copy and distribute the software -composed of many connections in individual pairs
• provide a low-cost marketing and distribution of machines
channel
• Broadcast Networks
Open Source Software -all the machines on the network share a single
• may be sold or distributed free of charge channel
uncompiled program instructions are available to
programmers who want to alter and improve the TYPES OF NETWORK TOPOLOGIES
software. Examples: Linux, FreeBSD 1. Bus topology is used, each machine is connected
to a single cable. Each computer or server is
COMPUTER NETWORKS connected to the single bus cable through some kind
WEEK – 5 of connector. A terminator is required at each end of
the bus cable to prevent the signal from bouncing
PRINCIPLE OF NETWORKING back and forth on the bus cable.
NETWORKING
• It is the process of delivering a message from a 2. Star topology - each network host (PC) is
source to a destination. connected to a central hub with a point-to-point
connection. All traffic on the network passes
COMMUNICATION through the central hub.
• It is the process of giving meaning to these
messages received. 3. Ring topology - A network topology that is set
up in a circular fashion in which data travels around
COMPUTER NETWORK the ring in one direction and each device
• It is a bunch of computers linked together. incorporates a receiver for the incoming signal and
• It is cost efficient and reliable. a transmitter to send the data on to the next device
• It serves as a good communication medium. in the ring.

USES OF NETWORK FOR PEOPLE 4. Tree topology - (a.k.a. hierarchical topology) can
• Access to remote information be viewed as a collection of star networks
• Person-to-person communication arranged in a hierarchy. This tree has
• Interactive entertainment
individual peripheral nodes (e.g. leaves) which are -spans a large physical distance (geographically -
required to transmit to and receive from one other dispersed collections of LANs)
node only and are not required to act as repeaters or -not owned by any one organization but rather exist

COMPUTER NETWORKS COMPUTER NETWORKS


WEEK – 5 WEEK – 5

regenerators. Unlike the star network, the under collective or distributed ownership and
functionality of the central node may be distributed. management; 256Kbps-2Mbps

5. Mesh topology - The fully connected mesh 4. Personal Area Network (PAN)
topology is generally too costly and complex for -a network arranged within an individual person,
practical networks. It has been used on networks typically within a range of 10 meters.
with only a small number of nodes. n most practical -Personal computer devices that are used to develop
networks that are based upon the partially connected the personal area network are the laptop, mobile
mesh topology, all of the data that is transmitted phones, media player and play stations.
between nodes in the network takes the shortest
path between nodes.

6. Hybrid networks use a combination of any two


or more topologies in such a way that the resulting
network does not exhibit one of the standard
topologies (e.g., bus, star, ring, etc.). A hybrid
topology is always produced when two different
basic network topologies are connected.

7. Daisy chain- Except for star-based networks, the


easiest way to add more computers into a network is
by daisy-chaining, or connecting each computer in
series to the next. If a message is intended for a
computer partway down the line, each system
bounces it along in sequence until it reaches the
destination. A daisy chained network can take two
basic forms: linear and ring.

DISTRIBUTED SYSTEM
Centralized Data Processing (CDP)
-The conventional way of doing all the processing
and control on centralized computers.

Distributed Data Processing (DDP)


-refers to the manipulation of data using distributed
systems.

Client/Server
-an extension of distributed data processing wherein
it provides the best of both centralized and
distributed data processing

TYPES OF NETWORK
1. Local Area Network (LAN)
-connects network devices over relatively short
distances usually owned by an individual or
corporation, 10-100Mbps

2. Metropolitan Area Network (MAN)


-connects computers that are in specific
geographical area like cable television
-5-10 Mbps, slower than LAN and smaller than
WAN.

3. Wide Area Network (WAN)

You might also like