Computing
Final Project
By Nisreen and
Geurinah
Key facts
1. Types of networks – PAN, LAN, WAN 2. Choosing the right network for a
task
3. Copper vs fibre cables
4. Wired vs wireless networks
5. Keeping data safe during transfer
6. Error checking methods
7. Firewalls and antivirus protection
8. What operating systems do
9. Utility software and augmented reality
10. Using flowcharts with "if"
statements
Personal area
network
(PAN)
A PAN (Personal Area Network) is a small network that connects
devices close to one person, usually within 10 meters. It’s used for
personal tasks like sharing files, playing music, or transferring
data.
PANs can be wired (like a USB cable between a phone and laptop)
or wireless (like Bluetooth earphones or AirDrop between Apple
devices).
Example: Connecting your smartphone to wireless earphones
using Bluetooth is a PAN.
Local area
network
A LAN (Local Area Network) is a network that connects
computers and devices within a small area, like a home, school, or
oice. It lets users share files, printers, and internet access.
LANs can use wired connections (like Ethernet) or wireless (like
Wi-Fi). Wired LANs are faster and more stable, while wireless LANs
oer more flexibility.
Example: In a school, all classroom computers connected to the
same printer and internet form a LAN. It helps people work
together and share resources easily.
Wide area network
A WAN (Wide Area Network) is a network that covers a large geographic area, often
connecting devices and smaller networks (like LANs) across cities, countries, or even
the world. It allows people in dierent locations to communicate and share data.
WANs usually use public networks like telephone lines, satellites, or the internet to
send data over long distances.
Example: The internet is the largest example of a WAN, connecting millions of
devices and networks all around the world.
WANs are useful for big businesses, governments, and schools with branches in
dierent places that need to stay connected.
Uses and characteristics of
copper and fibre-optic
Copper Cables cables Fibre-Optic Cables
Characteristics: Characteristics:
● Made of copper wires, which are good conductors of electricity. ● Made of thin glass or plastic fibres.
● Use electrical signals to transmit data. ● Use light signals to transmit data.
● Signal strength weakens over long distances. ● Can carry data over long distances without losing signal strength.
● Easily aected by electromagnetic interference (EMI). ● Not aected by electromagnetic interference.
● Cheaper and easier to install than fibre-optic cables. ● More expensive and harder to install than copper cables.
● Provide faster data transmission and higher bandwidth.
Common Uses:
Common Uses:
● Used in electrical power distribution.
● Used for telephone lines and landline communication. ● Used for high-speed internet (like fibre-to-the-home services).
● Used in local area networks (LANs) for home and oice connections. ● Used in long-distance telephone and data communication.
● Used in undersea cables between continents.
● Common in data centers and large network backbones.
Advantages and
disadvantages of wired
and wireless networks
Wired Networks Wireless Networks
Advantages: Advantages:
● Faster and more stable connection – Good for ● Greater mobility – You can move around with laptops, phones, and tablets.
gaming, streaming, or heavy downloads. ● Easier setup – No need for cables between devices.
● More secure – Harder for outsiders to access Cheaper for wide areas – No need to install lots of wiring.
since it needs a physical connection.
● Less interference – Not aected by walls,
signals, or other devices. Disadvantages:
● Slower and less stable – Performance drops with distance or interference.
Disadvantages: ● Less secure – Easier for hackers to access if not properly protected.
● Can be aected by walls or other electronics – This weakens the signal.
● Limited mobility – Devices must stay close to
the cable. Which is More Secure?
● Harder to set up – Needs cables, routers, and
sometimes drilling.
Wired networks are more secure because access requires a physical connectio
● More expensive for large areas – Running
Wireless networks are easier to hack since they can be accessed remotely
cables through buildings costs more. without being close to the device.
How an echo check tests for accuracy
in transmission
An echo check tests transmission accuracy by sending a signal from the sender
to the receiver, which then sends it back unchanged. The sender compares the
returned signal with the original one. If they match, the transmission was
accurate; if not, there are errors that need fixing. This method helps ensure data
is transmied correctly.
Echo checks are commonly used in communication systems like telephones,
satellite networks, and data transmission systems. They help detect issues like
signal loss or interference, ensuring that the transmied information is clear and
reliable.
Threat: Description: Protection Measures:
1) Malware (Viruses, Worms, Malicious software that can infect Antivirus software: Detects, removes, and
Trojans) devices, causing damage, data prevents malware infections. Regularly
update antivirus definitions. Be cautious about
theft, or system disruption.
downloading files or clicking on links from
untrusted sources.
2) Unauthorized Access Intruders gaining access to a Firewalls: Hardware or software that
network or device without monitors and controls network traffic, blocking
unauthorized access. Strong passwords and
permission.
multi-factor authentication. Access control
lists. Intrusion detection systems.
3) Spyware Software that secretly gathers Anti-spyware software: Detects and
information about a user's activity removes spyware. Be cautious about
installing software from untrusted sources.
and transmits it to a third party.
Regularly scan your system.
4) Phishing The act of capturing data as it Encryption: Encoding data so that it is
travels across a network unreadable without the correct
decryption key. Secure network
protocol
FUnction of Operating
systems
An operating system (OS) is essential system software that manages a
computer's hardware and software resources, enabling users to interact with
the device and run applications. It acts as an intermediary between the user
and the hardware, providing a user interface and managing the execution of
programs.
Utility
softwares:
Utility software, also known as system software, is designed to maintain,
enhance, and troubleshoot computer systems. It helps manage and
optimize the computer's resources and performance, rather than directly
performing tasks for the user like application software. Examples include
antivirus software, disk cleanup tools, backup utilities, and file managers.
THANKS!
Does anyone have any questions?
CREDITS: This presentation template was created by Slidesgo,
including icons by Flaticon, infographics & images by Freepik