Internet .VS. WWW
The internet is a network of networks. Where as the WWW is a way in which we use these networks to access information.
Business to Consumer, Business to Business, Consumer to Consumer. The use of the Internet for financial transactions.
A bit of data that allows businesses to track your preferences on the internet. Often help decide which ads to be sent.
Malicious Software- Software designed to infiltrate a computer without the consent of the owner.
a reference to a document that the reader can directly follow, or that is followed automatically
a Uniform Resource Locator (URL) is a subset of the Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.
Client VS Server
A client is a consumer or individual a server is the company supplying the connection to the internet
a set of rules that ensures the orderly and accurate transmission and reception of data
The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks.
HyperText Transfer Protocol are the rules computers use to transfer web pages across the Internet.
a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation
A program that attaches itself to another program and spreads itself to other computers. Viruses are hidden within the code of a host program
Intellectual Property Rights
concept that says that a particular group may determine how indigenous knowledge and its products may be used and distributed and the level of compensation required
the co-option of another person's personal information (e.g., name, social security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
-Computer network:Two or more computers connected together
-Devices connected to networks: nodes
-Benefits of a network: Sharing resources, Transferring files
Peer to Peer Network
-Network where a few computers share hardware and information & All computers are equal, and each can have access to devices and files on the others
-Each computer independently stores its own software and information, but can access the information on the other computers
-All computers can access devices connected to any of the other computers
-Used mainly at home & small offices
Client Server Network
-A network in which one or more computers are servers and provide services to the other computers, which are called clients
-Servers have hardware, software, and/or information that the client computers can access
-Servers are usually powerful computers with large storage systems
Local Area Networks- Nodes are within a small geographic region: Homes, Schools, Small businesses
Wide Area Networks- LANs connected over long distances: A few miles to thousands of miles using telecommunications lines
a card or software that enables a laptop computer to send and receive data over a network.
-Receive retransmit data to nodes on the same network
-Sends messages only to the computer that is the intended recipient
-Can handle multiple communications channels at the same time
-Can temporarily segment parts of the network with high traffic from the rest of the network
-Connects computers into a network, and also connects dissimilar networks together
-Can handle multiple communications channels
a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet
Protocol for Wireless Communication
-Uses radio waves to connect nodes
-Basically an Ethernet network that uses radio waves instead of wires
Each node requires a wireless network adapter: Transceivers
a proprietary open wireless protocol for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs).
-Anyone who unlawfully accesses a computer system
-Types of hackers:
Process to create Database
Create proper structure and definitions, -What entities do you want to store information about, -What fields do you want to store about those entities, - I.D. the Key field, -Normalize, -Establish relationships between the tables
Diff. Table Relations
1-1, 1-Many, Many-Many (if many-many occurs you create another table to make them 1-many)