0% found this document useful (1 vote)
2K views15 pages

Class 12 Art Integrated Project: Computer Networks

Kendriya Vidhyalaya No. 1 in Gandhinagar assigned a project on computer networks to 12th grade student Rana Harshil. The document discusses media access control (MAC), which determines how data is transmitted between computers through a network cable. It also covers routing, which is the process of selecting paths for traffic between networks using routing tables. Additionally, it defines cyber security as protecting technology from attacks and cybercrime as criminal hacking activities, most aimed at profit but some for other reasons.

Uploaded by

12A36RanaHarshil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
2K views15 pages

Class 12 Art Integrated Project: Computer Networks

Kendriya Vidhyalaya No. 1 in Gandhinagar assigned a project on computer networks to 12th grade student Rana Harshil. The document discusses media access control (MAC), which determines how data is transmitted between computers through a network cable. It also covers routing, which is the process of selecting paths for traffic between networks using routing tables. Additionally, it defines cyber security as protecting technology from attacks and cybercrime as criminal hacking activities, most aimed at profit but some for other reasons.

Uploaded by

12A36RanaHarshil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Kendriya Vidhyalaya

No.1,Sector-30 Gandhinagar
ART INTEGRATED
PROJECT 2021-22
NAME:-RANA HARSHIL
CLASS:- 12 A
ROLL NO:-36
TOPIC:- Computer Networks
MAC(Media access Control)
 A media access control is a network data
transfer policy that determines how data is
transmitted between two computer terminals
through a network cable. ... The essence of
the MAC protocol is to ensure non-collision
and eases the transfer of data packets
between two computer terminals.
Routing is the process of selecting a path for
traffic in a network or between or across
multiple networks. ... The routing process
usually directs forwarding on the basis of
routing tables. Routing tables maintain a record
of the routes to various network destinations.
1)Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks, and
data from malicious attacks. It's also known as information
technology security or electronic information security.
2) Cybercrime is criminal activity that either targets or uses a
computer, a computer network or a networked device. Most,
but not all, cybercrime is committed by cybercriminals or
hackers who want to make money. ... Others are novice
hackers. Rarely, cybercrime aims to damage computers for
reasons other than profit.
THANK YOU

You might also like