Professional Documents
Culture Documents
NETWORKS
NETWORKS
-CABLES
used to connect devices through a wired connection.
Cat5e cables are used for Ethernet connections. These cables are able to transfer data of 10Mbits/s,
100Mbitss or 1 Gibes/s.
connect devices through their NIC’s (allows to exchange data)
Cat6 cables- 10Gbites/s. more expensive used in business.
-SWITCH
has ports which can be connected to a device using cable.
makes sure data sent from any devise is sent to proper device on the network.
eg-printer, the laptop will send data that includes IP address to the switch and then to printer.
-GATEWAY
connects 2 different types of network.
ep-LAN connected to WAN
-ROUTER
stores address of all devices that are connected to it so that it can forward network traffic to its
destination using the quickest route.
include switch, wireless access point.
act as gateway , connecting LAN to the internet.
-BOOSTER
used to amplify the signal in a network so that its range can be extended.
can be used for wired and wireless connection.
wireless access point can be set as repeater mood to act as booster.
-SERVER
computer that shares its resources with connected devices.
computer connected to a server re called clients.
shared by one or more server-printers ,storage, application
Web browser
is a type of software application used to request and display information stored on a web server
example Google
search engine
a search engine
provides users with a way to find information in web pages stored on web servers.
uses and the key words that describe the information they want to find the search engine then
compares the keywords with those in its database of web pages and returns the result that by the
closest match to the given keywords it can also be done by images
filter software
Students using from accessing inappropriate information when a user tries to access a webpage the
address URL of the page are compared against the two list of URL and keywords stored in the filters
software that are based
if the results match anything in the blacklist the user will not be able to view the webpage
if the resolve matches anything in the whitelist then the user will be able to view the webpage
if it does not match both of it it won't be allowed to view any information
The Blacklist and whitelist can be updated during software updates which will help children from
accessing disturbing for each inappropriate content
BENEFITS OF LAN
Access to shared peripheral
Access to shared data and storage flexible
access media streaming
communication
shared access to the internet
CAESAR CIPHER
Shift each letter to the left by set number of places.
symmetric key encryption uses the same key is used to in script and this decrypt the data
Public key encryption uses to mathematical related keys called ki paper 1 key is used to encrypt the data
and different key is used to decrypt it
transaction locks help to identify which computer and network devices has been accessed
backup a copy of one or more files stored on a different place from the original file