SlideShare ist ein Scribd-Unternehmen logo
1 von 20
BIL NAMA
NOMBOR
MATRIK
NOMBOR
TELEFON
1. SYARUL AZHAR BIN MURAD 1161481 014-2540256
2. MUHAMMAD MUJAHID BIN YUSUP 1161549 014-2796180
3. MUHAMMAD AIMAN BIN MANSUR 1161525 019-6200108
4. AMIRUL AFIQ BIN YUNUS 1161469 013-2930830
5. MUHAMMAD AMMAR HANIF BIN MOHD FAUZI 1162433 017-9001243
 A network card, sometime called a network interface card (NIC
pronounced nick), is communications device that enables a
computer or device that does not have built-in networking capability
to access a network.
 Networking capability to access a network. The network card
coordinates the transmission and receipt of data, instructions, and
information to and from the compdevice containing the network card.
 A network card for a desktop is an adapter card that has a port to
which a cableconnects (Figure 10-17). A network card for mobile
computers and devices is in the form of a USB adapter or other device.
 A network card follows the guidelines of a particular network
communications standard, such as Ethernet or token ring.
• A hub or switch is a device that provides
a central point for cables in a network
• Somehubs and/orswitches includerouters.
That is,the hub orswitch receives data
frommany directions and then
forwards it toone ormore
destinations.
• Many homeusers connect
multiple computers and devices
together in a home network.
• Detecting an intruder accessing Your Wireless
Home network .One of the largest Internet
security threats is IP hijacking. Some
cyberthieves use the connection to commit
illegal acts. Experts recommend using the
following steps to determine if someone is
accessing a wireless network without permission.
1. Sign in to the administrative interface. The modem’s user’s
guide will provide instruc- tions to view wireless clients actively
using a wireless access point.
2. Count the number of connected devices.
3. Secure the network. The router’s manufacturer’s website
should provide instructions about upgrading the security
strength. Change the default network name and password, and
be certain to use the latest wireless encryption technology.
Enable the router’s firewall and, if possible, use “stealth mode”
to make the network less visible to outsiders. Disable the
feature that allows users to administer the router wirelessly, so
that changes can be made only when using a physical
connection with an Ethernet cable.
• Planning and Designing Your Home network As with any
network, a home network’s basic purpose is to share
resourcesand connect devices. You can use a home
network to share files and folders or to allow multiple
devices to share a printer. Read Mini Feature 10-3 to
learn about planning and designing your home network.
• Before purchasing hardware, or contracting a network
expert to set up your network, consider how your network
will be used, and by whom. Ask yourself the following
questions:
1. What devices will connect to the network?
2.How large of a range do you need, and where will
most of the use take place?
3. How many users typically will be using the
network, how will they use it, and for what
purposes?
4.Hoe secure do you need your network?
• A modem, such as a cable or DSL modem, that connects to an ISP and
establishes the Internet connection for the network
• A router, which establishes the connection between the Internet and
all computers and devices on the home network and also enables the
devices to communicate with one another
• A wireless access point, often included as part of the router, in order
to connect wireless devices
• Computers and devices, such as desktops, laptops, tablets,
smartphones, televisions, cable set-top boxes, or a VoIP phone, that
you connect to the home network
The following steps describe how to create a home network:
• Establish a connection to the Internet. In many cases, your ISP will
provide a modem that serves as the connection between the
computers and mobile devices in your home and the Internet
connection.
• Most modems allow you to connect only one computer or mobile
device and may not have the capability to serve also as a wireless
access point.
• For computers that will use a wired network connection, connect a
network cable from the computer to an available port on the router.
• Follow the router’s instructions to configure it. If you are configuring
wireless access, you may need to perform the following steps:
1. Set an SSID to uniquely identify your wireless network.
2. Select an encryption method and choose an encryption key that will be easy for
you to remember but very difficult for others to guess.
3. Connect the wireless devices to the network by enabling the wireless card if
necessary, selecting the SSID of your wireless network, and specifying the proper
encryption key. Read How To 5-3 in Chapter 5 for additional information about
SSIDs and encryption methods.
• Test the connection on all devices, whether wired or wireless, that are
connected to the network.
• If desired, enable file sharing so that you can share files among the computers
and mobile devices on your home network.
• For maximum security, disable Internet and network connections when you are
not using them.
• Broadband media transmit multiple signals simultaneously.
• The bandwidth is the amount of data, instructions, and
information that can travel over transmission media
sometimes is called.
The higher the bandwidth, the more data transmitted.
When the bandwidth is too low for the application, you will
notice considerable slowdown in system performance.
• Latency, with respect to communications, is the time it
takes a signal to travel from one locationto another on
a network
• Physical transmission media use wire, cable, and other tangible materialsto
send communicationssignals
• consists of one or more twisted-pair wires bundled together (Figure
10-20). Each twisted-pair wire consists of two separate insulated
cop- per wires that are twisted together.
• The wires are twisted together to reduce noise, which is an
electrical disturbance that can degrade communications
• Coaxial cable, oftenreferredto as coax (pronounced KO-ax),
consists of a single copper wire surrounded by at least three
lay- ers: (1)aninsulating material, (2)a woven or braided metal,
and (3)a plastic outercoating (Figure 10-21).
• CATV network wiring oftenuses coaxial cablebecauseit can
becabled over longer distances than twisted-pair cable
Fiber-optic Cable
• Thecore of a fiber-optic cableconsists of dozens or hundreds
of thin strands of glass or plastic that use light to
transmit signals.
• Each strand, called anoptical fiber, is as thin as a human
hair.
• Inside the fiber-optic cable, aninsulating glass cladding
and a protective coating surround each optical fiber.
 Capability of carrying significantly more signals than
wire cables
 Faster data transmission Less susceptible to noise
(interference) fromother devices, suchasa copy
machine
 Better security for signals during transmission because
they are less susceptible to noise
 Smaller size (much thinner and lighter weight)
Disadvantagesof fiber-optic cable
• costsmore than twisted-pair or
coaxial cable and can be
difficult to install and modify
Pembentangan Kumpulan Berkenaan Teknologi Maklumat

Weitere ähnliche Inhalte

Was ist angesagt?

The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)ainizbahari97
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communicationHashtag IV
 
CSC 103 Networking pt2
CSC 103 Networking pt2CSC 103 Networking pt2
CSC 103 Networking pt2Richard Homa
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Librarysanjay thakur
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Securitydpd
 
Chapter 08 communication and network csc
Chapter 08 communication and network cscChapter 08 communication and network csc
Chapter 08 communication and network cscHisyam Rosly
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
CSC103 Networking pt1
CSC103 Networking pt1CSC103 Networking pt1
CSC103 Networking pt1Richard Homa
 
Peng Li Fall2008 Ece5765 Introduction To Wireless Networks
Peng Li Fall2008 Ece5765 Introduction To Wireless NetworksPeng Li Fall2008 Ece5765 Introduction To Wireless Networks
Peng Li Fall2008 Ece5765 Introduction To Wireless Networkslixxx988
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communicationMuhd Airil
 
Internet and services (95 kb)
Internet and services (95 kb)Internet and services (95 kb)
Internet and services (95 kb)IMRAN KHAN
 
Form4 cd6
Form4 cd6Form4 cd6
Form4 cd6smktsj2
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Biplob Orton
 
Itc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkItc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkAnzaDar3
 
Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivityrahul kundu
 

Was ist angesagt? (20)

The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
CSC 103 Networking pt2
CSC 103 Networking pt2CSC 103 Networking pt2
CSC 103 Networking pt2
 
Pan
PanPan
Pan
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
 
Chapter 08 communication and network csc
Chapter 08 communication and network cscChapter 08 communication and network csc
Chapter 08 communication and network csc
 
Assignment no 4
Assignment no 4Assignment no 4
Assignment no 4
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
CSC103 Networking pt1
CSC103 Networking pt1CSC103 Networking pt1
CSC103 Networking pt1
 
ICTL
ICTLICTL
ICTL
 
Peng Li Fall2008 Ece5765 Introduction To Wireless Networks
Peng Li Fall2008 Ece5765 Introduction To Wireless NetworksPeng Li Fall2008 Ece5765 Introduction To Wireless Networks
Peng Li Fall2008 Ece5765 Introduction To Wireless Networks
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 
Networking
NetworkingNetworking
Networking
 
Internet and services (95 kb)
Internet and services (95 kb)Internet and services (95 kb)
Internet and services (95 kb)
 
Form4 cd6
Form4 cd6Form4 cd6
Form4 cd6
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
 
Itc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkItc lec 12 wired and wireless network
Itc lec 12 wired and wireless network
 
Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivity
 

Andere mochten auch

Ground Handling Financial and M&A overview
Ground Handling Financial and M&A overviewGround Handling Financial and M&A overview
Ground Handling Financial and M&A overviewDidier Bréchemier
 
վայոց ձոր
վայոց ձորվայոց ձոր
վայոց ձորAnri2017
 
Trabajo informatica 1 bach b sergio gómez
Trabajo informatica 1 bach b sergio gómezTrabajo informatica 1 bach b sergio gómez
Trabajo informatica 1 bach b sergio gómezSergiooGoomez
 
leonard hardy cv
leonard hardy cvleonard hardy cv
leonard hardy cvLen Hardy
 
JRIorion-STEMB-21stLit-Group3
JRIorion-STEMB-21stLit-Group3JRIorion-STEMB-21stLit-Group3
JRIorion-STEMB-21stLit-Group3Benjo Vera
 
Ground handling financial and M&A overview
Ground handling financial and M&A overviewGround handling financial and M&A overview
Ground handling financial and M&A overviewDidier Bréchemier
 
Keruntuhan Institusi Rumahtangga Akibat Penyalahgunaan Teknologi
Keruntuhan Institusi Rumahtangga Akibat Penyalahgunaan TeknologiKeruntuhan Institusi Rumahtangga Akibat Penyalahgunaan Teknologi
Keruntuhan Institusi Rumahtangga Akibat Penyalahgunaan TeknologiAkukah Mujahid
 

Andere mochten auch (10)

Ground Handling Financial and M&A overview
Ground Handling Financial and M&A overviewGround Handling Financial and M&A overview
Ground Handling Financial and M&A overview
 
վայոց ձոր
վայոց ձորվայոց ձոր
վայոց ձոր
 
Fruit
FruitFruit
Fruit
 
Trabajo informatica 1 bach b sergio gómez
Trabajo informatica 1 bach b sergio gómezTrabajo informatica 1 bach b sergio gómez
Trabajo informatica 1 bach b sergio gómez
 
leonard hardy cv
leonard hardy cvleonard hardy cv
leonard hardy cv
 
Presentación TIC
Presentación TICPresentación TIC
Presentación TIC
 
Dialog
DialogDialog
Dialog
 
JRIorion-STEMB-21stLit-Group3
JRIorion-STEMB-21stLit-Group3JRIorion-STEMB-21stLit-Group3
JRIorion-STEMB-21stLit-Group3
 
Ground handling financial and M&A overview
Ground handling financial and M&A overviewGround handling financial and M&A overview
Ground handling financial and M&A overview
 
Keruntuhan Institusi Rumahtangga Akibat Penyalahgunaan Teknologi
Keruntuhan Institusi Rumahtangga Akibat Penyalahgunaan TeknologiKeruntuhan Institusi Rumahtangga Akibat Penyalahgunaan Teknologi
Keruntuhan Institusi Rumahtangga Akibat Penyalahgunaan Teknologi
 

Ähnlich wie Pembentangan Kumpulan Berkenaan Teknologi Maklumat

PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018Fizaril Amzari Omar
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxpicklesvalery
 
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptxtendaisigauke3
 
Intern
InternIntern
InternAwake9
 
ICT PDFNG CGNCGN CHGNJFHMNFHGFNHGNGFF.pptx
ICT PDFNG CGNCGN CHGNJFHMNFHGFNHGNGFF.pptxICT PDFNG CGNCGN CHGNJFHMNFHGFNHGNGFF.pptx
ICT PDFNG CGNCGN CHGNJFHMNFHGFNHGNGFF.pptxMequanentMengistu1
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005 ramloganricki
 
Setting up a network
Setting up a networkSetting up a network
Setting up a networkRachel Espino
 
Communication line, communication devices and home network
Communication line, communication devices and home networkCommunication line, communication devices and home network
Communication line, communication devices and home networkRkSachdev1
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunicationAttaullah Sahil-MBA
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunicationAttaullah Sahil-MBA
 

Ähnlich wie Pembentangan Kumpulan Berkenaan Teknologi Maklumat (20)

Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Networks (unit 4)
Networks    (unit 4)Networks    (unit 4)
Networks (unit 4)
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Intern
InternIntern
Intern
 
ICT PDFNG CGNCGN CHGNJFHMNFHGFNHGNGFF.pptx
ICT PDFNG CGNCGN CHGNJFHMNFHGFNHGNGFF.pptxICT PDFNG CGNCGN CHGNJFHMNFHGFNHGNGFF.pptx
ICT PDFNG CGNCGN CHGNJFHMNFHGFNHGNGFF.pptx
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Communication line, communication devices and home network
Communication line, communication devices and home networkCommunication line, communication devices and home network
Communication line, communication devices and home network
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Computer networks
Computer networksComputer networks
Computer networks
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunication
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunication
 

Kürzlich hochgeladen

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 

Kürzlich hochgeladen (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Pembentangan Kumpulan Berkenaan Teknologi Maklumat

  • 1. BIL NAMA NOMBOR MATRIK NOMBOR TELEFON 1. SYARUL AZHAR BIN MURAD 1161481 014-2540256 2. MUHAMMAD MUJAHID BIN YUSUP 1161549 014-2796180 3. MUHAMMAD AIMAN BIN MANSUR 1161525 019-6200108 4. AMIRUL AFIQ BIN YUNUS 1161469 013-2930830 5. MUHAMMAD AMMAR HANIF BIN MOHD FAUZI 1162433 017-9001243
  • 2.  A network card, sometime called a network interface card (NIC pronounced nick), is communications device that enables a computer or device that does not have built-in networking capability to access a network.  Networking capability to access a network. The network card coordinates the transmission and receipt of data, instructions, and information to and from the compdevice containing the network card.  A network card for a desktop is an adapter card that has a port to which a cableconnects (Figure 10-17). A network card for mobile computers and devices is in the form of a USB adapter or other device.  A network card follows the guidelines of a particular network communications standard, such as Ethernet or token ring.
  • 3. • A hub or switch is a device that provides a central point for cables in a network • Somehubs and/orswitches includerouters. That is,the hub orswitch receives data frommany directions and then forwards it toone ormore destinations.
  • 4. • Many homeusers connect multiple computers and devices together in a home network.
  • 5. • Detecting an intruder accessing Your Wireless Home network .One of the largest Internet security threats is IP hijacking. Some cyberthieves use the connection to commit illegal acts. Experts recommend using the following steps to determine if someone is accessing a wireless network without permission.
  • 6. 1. Sign in to the administrative interface. The modem’s user’s guide will provide instruc- tions to view wireless clients actively using a wireless access point. 2. Count the number of connected devices. 3. Secure the network. The router’s manufacturer’s website should provide instructions about upgrading the security strength. Change the default network name and password, and be certain to use the latest wireless encryption technology. Enable the router’s firewall and, if possible, use “stealth mode” to make the network less visible to outsiders. Disable the feature that allows users to administer the router wirelessly, so that changes can be made only when using a physical connection with an Ethernet cable.
  • 7. • Planning and Designing Your Home network As with any network, a home network’s basic purpose is to share resourcesand connect devices. You can use a home network to share files and folders or to allow multiple devices to share a printer. Read Mini Feature 10-3 to learn about planning and designing your home network. • Before purchasing hardware, or contracting a network expert to set up your network, consider how your network will be used, and by whom. Ask yourself the following questions:
  • 8. 1. What devices will connect to the network? 2.How large of a range do you need, and where will most of the use take place? 3. How many users typically will be using the network, how will they use it, and for what purposes? 4.Hoe secure do you need your network?
  • 9. • A modem, such as a cable or DSL modem, that connects to an ISP and establishes the Internet connection for the network • A router, which establishes the connection between the Internet and all computers and devices on the home network and also enables the devices to communicate with one another • A wireless access point, often included as part of the router, in order to connect wireless devices • Computers and devices, such as desktops, laptops, tablets, smartphones, televisions, cable set-top boxes, or a VoIP phone, that you connect to the home network
  • 10. The following steps describe how to create a home network: • Establish a connection to the Internet. In many cases, your ISP will provide a modem that serves as the connection between the computers and mobile devices in your home and the Internet connection. • Most modems allow you to connect only one computer or mobile device and may not have the capability to serve also as a wireless access point. • For computers that will use a wired network connection, connect a network cable from the computer to an available port on the router. • Follow the router’s instructions to configure it. If you are configuring wireless access, you may need to perform the following steps:
  • 11. 1. Set an SSID to uniquely identify your wireless network. 2. Select an encryption method and choose an encryption key that will be easy for you to remember but very difficult for others to guess. 3. Connect the wireless devices to the network by enabling the wireless card if necessary, selecting the SSID of your wireless network, and specifying the proper encryption key. Read How To 5-3 in Chapter 5 for additional information about SSIDs and encryption methods. • Test the connection on all devices, whether wired or wireless, that are connected to the network. • If desired, enable file sharing so that you can share files among the computers and mobile devices on your home network. • For maximum security, disable Internet and network connections when you are not using them.
  • 12. • Broadband media transmit multiple signals simultaneously. • The bandwidth is the amount of data, instructions, and information that can travel over transmission media sometimes is called. The higher the bandwidth, the more data transmitted. When the bandwidth is too low for the application, you will notice considerable slowdown in system performance. • Latency, with respect to communications, is the time it takes a signal to travel from one locationto another on a network
  • 13.
  • 14. • Physical transmission media use wire, cable, and other tangible materialsto send communicationssignals
  • 15. • consists of one or more twisted-pair wires bundled together (Figure 10-20). Each twisted-pair wire consists of two separate insulated cop- per wires that are twisted together. • The wires are twisted together to reduce noise, which is an electrical disturbance that can degrade communications
  • 16. • Coaxial cable, oftenreferredto as coax (pronounced KO-ax), consists of a single copper wire surrounded by at least three lay- ers: (1)aninsulating material, (2)a woven or braided metal, and (3)a plastic outercoating (Figure 10-21). • CATV network wiring oftenuses coaxial cablebecauseit can becabled over longer distances than twisted-pair cable
  • 17. Fiber-optic Cable • Thecore of a fiber-optic cableconsists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals. • Each strand, called anoptical fiber, is as thin as a human hair. • Inside the fiber-optic cable, aninsulating glass cladding and a protective coating surround each optical fiber.
  • 18.  Capability of carrying significantly more signals than wire cables  Faster data transmission Less susceptible to noise (interference) fromother devices, suchasa copy machine  Better security for signals during transmission because they are less susceptible to noise  Smaller size (much thinner and lighter weight)
  • 19. Disadvantagesof fiber-optic cable • costsmore than twisted-pair or coaxial cable and can be difficult to install and modify