Module 3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Name: JESUS W. PALOMA JR.

Course/Section: INF 1B
Subject: INTRODUCTION COMPUTER

CS 111 – Introduction to Computing Activity Number 11

Answer the following. You may use another sheet for your answer.

1. What is security?
Ans: Computer security, also called cybersecurity, is the protection of computer systems and information
from harm, theft, and unauthorized use.
2. State the difference between old security measures versus modern world security measures.
Ans: A modern security system always accompanies a high-resolution camera. Traditional security systems relied
a lot on infrared image formation and detection. Checking your house for safety while you are out on vacation is
extremely easy with digital access to all your house cameras on your phone and laptop.
3. What is network and internet security?
Ans: Network Security protects your network and data from breaches, intrusions and other
threats.
4. How secure are you today? Establish an example why privacy is already compromised nowadays.
Ans: Privacy helps us establish boundaries to limit who has access to our bodies, places and things, as well as our
communications and our information.
5. Why we need to know protocols in handling information across computer networks?
Ans: Networking makes the internet work, but neither can succeed without protocols. Common network
protocols and functions are key for communication and connection across the internet. Without network
protocols, the modern internet would cease to exist.
6. As social media fan like Facebook, what you should post and not to post in your personal account? Why?
Ans: You should not post sensitive content or any personal information like bank acc. and etc. to prevent you
from hackers.

CS 111 – Introduction to Computing Activity Number 12

Answer the following. You may use another sheet for your answer.
Fill in the blanks:

1. Internet is also defined as an Information superhighway where one can access


information over the web.
2. IP address identifies a computer location with a unique set of numbers.
3. The origin of Internet devised from the concept of ARPANET.
4. Computer network is a network of computers and servers created by connecting them
through the internet.
5. The An intranet is a private network that belongs to a particular organization
designed for the exclusive use of an organization and its associates.
6. Intranet basically comprises three components: a web server, an intranet platform, and applications.
7. extranet is a private network that securely shares internal information and operations
of a firm with authorized people outside the firm without giving access to the
company's entire network.
8. Extranet is set up in the form of a Virtual Private Network as it is prone to security threats due
to the use of the internet to connect outsiders to an organization's intranet.
9. To provide more security to Intranet, the following two measures are also taken by
an organization: intranet and (10) Extranets

Discussion: Explain the following briefly.


1. What are the advantages and disadvantages of internet?
ADVANTAGES DISADVANTAGE
Source of Information: A Waste of Time:
It is the best source of a variety of Most people argue that spending a
information. Now even students of lot of time using the internet is bad
colleges and universities mainly which leads to obesity in the young
depend on it to complete not only generation.
their assignments but also to keep
themselves up-to-date. There is no Not Safe Place for Children:
better source of research other than If children are allowed to use the
the internet. We can find the latest internet then parents become
trends, we can talk to specialists worried if they are spending much
without actually visiting them, and time on the internet.
we can also get professional assistance
through the internet. Privacy Exposure:
Because of the hacker's community
Source of Entertainment: now it’s very easy to decipher
Online games, chatting, surfing, someone’s chat or email messages.
music, movies, dramas, and TV As we know data is transmitted in
shows are becoming the most the form of packets, hackers sniff
common sources of entertainment. that packets and easily reconstruct.

Keep Informed: Online Threatening or Harassment:


Internet is a source of the newest If someone manages to get your
news because there are hundreds personal IDs or email address then it
and thousands of news-groups and becomes easier to harass in chat
services which keep you informed rooms, online messages, and through
with every tick of the clock. emails.

Online Shopping:
Internet shopping is becoming
popular because of virtual shops
where you can buy anything you
want and need without going out of
the home. Virtual shops are earning
much money recently.

2. What is the difference between intranet and extranet?


Ans: An intranet is a network where employees can create content, communicate, collaborate, and
develop the company culture. Meanwhile an extranet provides controlled access to authorized customers,
vendors, partners, or others outside the company.

CS 111 – Introduction to Computing Activity Number 13

Answer the following. You may use another sheet for your answer.
Define the following:

1. Computer network
Ans: Computer networking refers to interconnected computing devices that can exchange data and
share resources with each other. These networked devices use a system of rules, called
communications protocols, to transmit information over physical or wireless technologies.
2. Local Area Network
Ans: The computers in a LAN connect to each other via TCP/IP ethernet or Wi-Fi. A LAN is normally
exclusive to an organization, such as a school, office, association or church.
3. Wide Area Network
Ans: WANs can facilitate communication, the sharing of information and much more between devices
from around the world through a WAN provider.
4. Metropolitan Area Network
Ans: A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN).
5. Topologies
Ans: Physical network topology examples include star, mesh, tree, ring, point-to-point, circular,
hybrid, and bus topology networks, each consisting of different configurations of nodes and links.

Discussion: Explain the following briefly.


1. Differentiate the 4 types of computer networks. Provide an example.
Ans: The vital computer network is divided into four types based on their size and functions. They
are LAN, MAN, PAN, and WAN. Here LAN stands for Local Area Network, MAN stands for
Metropolitan Area Network, Personal Area Network is abbreviated into PAN whereas WAN is expanded
as Wide Area Network.

You might also like