REVIEWER IN COMPAP • Wireless
– Wi-Fi (wireless fidelity)
MODULE 2
– Mobile broadband
– Fixed wireless
Connecting and Communicating Online: – Satellite Internet Service
The Internet, Website, and Media
• A hot spot is a wireless network that provides
The Internet Internet connections to mobile computers and
• The Internet is a worldwide collection of networks that Devices
connects millions of businesses, government agencies, • An Internet service provider (ISP) is a businessthat
educational institutions, and individuals provides individuals and organizations access to the
• The Internet originated as ARPANET in September 1969 Internet free or for a fee
and had two main goals: • Bandwidth is a measure of the capability of a
– Allow scientists at different physical locations network to send and receive data
to share information and work together – Megabyte (MB)
– Function even if part of the network were – Gigabyte (GB)
disabled or destroyed by a disaster
• An IP ADDRESS is a sequence of numbers that
Connecting to the Internet uniquely identifies the location of each computer or device
• With wired connections, a computer or device physically connected to the Internet or any other network
attaches via a cable or wire to a communications device • A DOMAIN NAME is a text-based name that
• Computers without a communications device can use a corresponds(sepadan dengan) to the IP address of a server
wireless modem or other communications device that • A DNS SERVER translates the domain name into its
enables wireless connectivity associated IP address
How a Network Operates
• A network is a system of two of
more devices linked by wires,
cables, or a telecommunications
system
o Requires a combination of
hardware and software
• Some networks provide
• Wired connections to the Internet, which
– Cable Internet service requires the services of an
– DSL (digital subscriber line) Internet Service Provider (ISP)
– Fiber to the Premises (FTTP) o Enables the network to
communicate with other networks o Client/server network ▪ Zombie
that are also connected to the o Peer-to-peer (P2P)
Internet network How Unauthorized Network Use Threatens
Elements of a Connected Network o Cloud computing Communications
• Hub: transfers all data to all Geographic Reach
devices(single) • Local area network (LAN) connects computers and • When hackers can connect to the same network as the
• Switch: transfers data only to the devices in a limited area computer they wish to target, it is easier to obtain
intended recipient(penerima) • Wide area network (WAN) connects devices in a large information
• Router: device that connects two geographic region • Data also might be exposed by connecting to a
or more networks • Metropolitan area network (MAN) is operated by a city fraudulent(penipuan) network
• Modem: communications device or county – When connecting to a public Wi-Fi network,
that connects a communications • Personal area network (PAN) connects personal digital one should not enter confidential information on
channel to a device devices within 30 feet via Bluetooth websites or send personal data in email
o Connects the network to the • Body area network (BAN) small, lightweight – Evil twin
Internet through an ISP biosensors implanted in the body How to Secure a Network
• Two main network types: home • Authentication
and business o User name and a strong
password
Devices Necessary to Create a Network o Biometrics
• Requires two or more devices that need to • Firewall
communicate, a way to communicate, and the o Hardware firewalls
infrastructure to facilitate the communication o Software firewalls
– A network interface card (NIC) is required for a • Encryption
computer to connect to a network
– Cable modem/DSL modem How to Encrypt a Network
• Encryption is the process of converting data so that
it is unrecognizable when it is transmitted on a
network or stored on a storage device, except to
users who enter the correct password
Risks and Benefits with Using a Connected • Ensure that wireless networks support encryption so
Network that data cannot be intercepted easily by others
– Encrypted wireless networks often use a wireless
• Benefits: sharing resources without regard to network key to encrypt data sent between devices
geographic location; easier communication – One common type of encryption on home routers is
• Risks WPA2
o Malware can install itself without permission Following Network Standards and
and damage or steal data from a computer or Protocols
device
o Hackers can gain access to personal data
Physical Connections Between Networks o Phishing
Network Architecture o Social engineering
• Determines the logical o Denial of service (DoS) attack
design of all devices on a ▪ Distributed denial of service (DDoS)
network attack
headings, paragraphs, images, links, and other to propriety rights
content elements that a webpage contains • Some material is in the public domain and can
• A browser is an application that enables users with be used without permission
an Internet connection to access and view • The fair use doctrine allows one to use a
webpages on a computer or mobile device sentence or paragraph of text without permission
– Internet-capable mobile devices such as with citation to the original source
smartphones • Creative Commons (CC): a nonprofit
use a special type of browser, called a mobile browser organization that helps content creators keep
• A home page is the first page that a website copyright to their materials while allowing others
displays to use, copy, or distribute their work
• Computers communicating with each other on a • Current browsers typically support tabbed
network must follow a common set of rules for Browsing
exchanging information, or protocols • A webpage has a unique address, called a web
– TCP/IP (Transmission Control Protocol/Internet address or URL
Protocol) Apply Information Literacy Standards
• Cellular Networks: millions of people use their
mobile phones to access the Internet Citing Sources
– Cellular networks can provide Internet services • A citation is a formal reference to a source
in most • Each type of information source uses a different citation
locations where cellular service is offered style
– 4G and 5G networks provide higher speed data • Failure to cite sources, even if some of the words are
Transmission changed or paraphrased, is plagiarism
• A web app is an application stored on a web server that
you access through a browser
– Web apps usually store users’ data and
information on their
hosts’ servers
The CARS Checklist
• Credibility: identify the author and Types of Websites
check credentials • A web search engine is software that finds
• Accuracy: verify facts and claims, websites, webpages, images, videos, news, maps,
check for bias and other information related to a specific topic
• Reasonableness: examine whether the • A subject directory classifies webpages in an
claims are fair and sensible organized set of categories, such as sports or
• Support: look for reputable sources and shopping, and related subcategories
The World Wide Web
Authorities
• The World Wide Web (WWW), or web, consists of
a worldwide collection of electronic documents Gather Content from Online Sources
(webpages) Follow Ethical Guidelines
• A website is a collection of related webpages and • Copying photos might violate intellectual
associated items property rights
• A web server is a computer that delivers requested • A copyright gives authors and artists the legal
webpages to your computer or mobile device right to sell, publish, or distribute an original work
• HTML (Hypertext Markup Language) is a set of • Some online resources are protected by digital
symbols that developers use to specify the rights management (DRM), which limit access
vouch for authenticity of the
website
• Lock icon
• Requires sign-in with
username/password before
entering sensitive information
• Web publishing is the creation and maintenance
of websites
Pros and cons of e-commerce for consumers
• Pros
– Variety
– Convenience
– Budget
• Cons
– Security
– Fraud(penipuan)
– Indirect experience
Secure Websites
• Use encryption to safeguard
transmitted information
• Hypertext Transfer Protocol
Secure (HTTPS)
• Use digital certificates to