

EXAM G7
Presentation
•
Computers
•
7th Grade
•
Practice Problem
•
Easy
Abednego Gabe
Used 4+ times
FREE Resource
35 Slides • 33 Questions
1
HINTS FOR PAS
Explanation of LAN, WLAN and WAN and their characteristics.
2
Network types
WLAN
LAN
WAN
3
LAN
A local area network (LAN) enables a group of computers that are in
close proximity to each other to be networked.
Typically, a LAN would be used in a school, in an office or at home.
4
Wireless Local Area Network
A local area network accessed using radio wave communication without cable
For Example : Wifi , Bluetooth
WLAN
5
There are two ways of connecting the devices
6
WAN
A Wide Area Network (WAN) is a network that connects separate LANs over
a large geographical area
A WAN will connect cities, a country, or many countries
Example : Internet, Bank
7
Multiple Choice
What is LAN ?
Enables a group of computers that are in close proximity to each other to be networked.
A network that connects separate LANs over
a large geographical area
access using radio wave communication without cable
8
Multiple Choice
What is WLAN ?
Enables a group of computers that are in close proximity to each other to be networked.
A network that connects separate LANs over
a large geographical area
access using radio wave communication without cable
9
Multiple Choice
What is WAN ?
Enables a group of computers that are in close proximity to each other to be networked.
A network that connects separate LANs over
a large geographical area
access using radio wave communication without cable
10
Multiple Choice
Which of the following is true about LAN
Enables a group of computers that are in close proximity to each other to be networked.
A network that connects separate LANs over
a large geographical area
access using radio wave communication without cable
11
HINTS FOR PAS
2. The differences between Wi-Fi and Bluetooth
12
Comparison of Wi-Fi and Bluetooth
13
Multiple Select
Which of the following is true about WIFI
Communication Using Radio Waves
Has a range of up to 100 metres
Low data transfer
Fewer Users Can Be Supported
Devices Cannot Communicate Directly
14
Multiple Select
Which of the following is true about Bluetooh
Communication Using Radio Waves
Many Users Can Be Supported
Low data transfer
Fewer Users Can Be Supported
Devices Cannot Communicate Directly
15
HINTS FOR PAS
3. Two types of network topology
For You : understand the meaning briefly and pictures
16
BUS TOPOLOGY
Bus topology is a way of connecting several computer devices with one cable (bus) as a transmission medium or data traffic center.
17
Intranet VS Extranet
18
STAR TOPOLOGY
a star network is a network model that resembles a star with the server in the middle as the center
19
Multiple Choice
Which one is Bus Topology ?
a way of connecting several computer devices with one cable as a transmission medium or data traffic center.
network model that resembles a star with the server in the middle as the center
20
Multiple Choice
Which one is Star Topology ?
a way of connecting several computer devices with one cable as a transmission medium or data traffic center.
network model that resembles a star with the server in the middle as the center
21
HINTS FOR PAS
4. Types of network devices
For You : understand the meaning briefly and pictures
22
Common network devices
A network interface
card (NIC)
Hub
Switch
Bridge
23
NIC
A Network Interface Card (NIC)
is a printed circuit board that allows the computer to
communicate with other devices over a computer network
24
HUB
Hub
is a device used for connecting computers to form a network. It
broadcast data to all devices not just the one they are intended for
25
Switch
Switch
is a device used for connecting computers to form a network but more
intelligently than a hub by inspecting the MAC address of the device to
which they should be sent
26
Bridge
Bridge
is used to connect the different segments and they can prevent
transmissions from one segment reaching the others.
27
Multiple Choice
What is NIC ??
is a printed circuit board that allows the computer to communicate with other devices over a computer network
a device used for connecting computers to form a network. It broadcast data to all devices not just the one they are intended for
a device used for connecting computers to form a network but more intelligently than a hub by inspecting the MAC address of the device to which they should be sent
to connect the different segments and they can prevent transmissions from one segment reaching the others
28
Multiple Choice
What is Hub ??
is a printed circuit board that allows the computer to communicate with other devices over a computer network
a device used for connecting computers to form a network. It broadcast data to all devices not just the one they are intended for
a device used for connecting computers to form a network but more intelligently than a hub by inspecting the MAC address of the device to which they should be sent
to connect the different segments and they can prevent transmissions from one segment reaching the others
29
Multiple Choice
What is Switch ??
is a printed circuit board that allows the computer to communicate with other devices over a computer network
a device used for connecting computers to form a network. It broadcast data to all devices not just the one they are intended for
a device used for connecting computers to form a network but more intelligently than a hub by inspecting the MAC address of the device to which they should be sent
to connect the different segments and they can prevent transmissions from one segment reaching the others
30
Multiple Choice
What is Bridge ??
is a printed circuit board that allows the computer to communicate with other devices over a computer network
a device used for connecting computers to form a network. It broadcast data to all devices not just the one they are intended for
a device used for connecting computers to form a network but more intelligently than a hub by inspecting the MAC address of the device to which they should be sent
to connect the different segments and they can prevent transmissions from one segment reaching the others
31
HINTS FOR PAS
5. Explanation and examples of Cloud computing and cloud storage
32
Cloud
Computing
VS
Cloud
Storage
33
Cloud computing
●
Cloud Computing is the delivery
of computer services over the
internet.
●
These services, such as software
and storage space, are housed in
remote computers called servers.
34
Cloud Storage
●
Cloud Storage is the
storage of digital data on
remote server
●
Cloud storage is simply
storing data & files and
performing backups to an
external location offsite
35
Cloud Computing & Cloud Storage
In Simple Word
●
You can have cloud storage without cloud computing, but you
won’t be able access data stored in the cloud
●
You cannot have cloud computing without cloud storage
because the apps need to be stored somewhere (the cloud)
Cloud Storage = Data
Cloud Computing = Processing
36
Cloud computing
Examples of
Cloud Computing
●
Google Docs App
●
Photo Viewer App
●
iChat
●
Outlook Online
●
Social Media Apps
37
Examples of
Cloud Storage
●
Google Drive
●
Drop Box
●
iCloud
●
OneDrive Personal
Storage
●
Photo uploads to social
media
Examples of
Cloud Computing
●
Google Docs App
●
Photo Viewer App
●
iChat
●
Outlook Online
●
Social Media Apps
38
Multiple Select
Examples of Cloud Storage
Google Drive
Drop Box
IChat
Social Media Apps
ICloud
39
Multiple Select
Examples of Cloud Computing
Google Docs App
Google Drive
IChat
Social Media Apps
Photo Viewer App
40
HINTS FOR PAS
5. Explanation Security of Networks
For You : understand the meaning briefly and pictures
41
Security of
Computer
Networks
42
Encryption
Encryption is the process by which digital messages are transformed
into secret codes so that it remains safe and hidden until it reaches
the receiver. Encryption is used on the Internet to transfer data such as
payment information, e-mails, or personal data confidentially and
protected from manipulation
Sender
Recipients
43
Firewalls
Firewalls are either software or hardware devices that protect against
unauthorised access to a network, and are primarily used to prevent
unauthorised access from the internet.
44
Authentication
Authentication is the process or act of proving or showing something
that is true, genuine or valid
45
Multiple Choice
What is Encryption ?
the process by which digital messages are transformed into secret codes
either software or hardware devices that protect against unauthorised access to a network, and are primarily used to prevent unauthorised access from the internet.
the process or act of proving or showing something that is true, genuine or valid
46
Multiple Choice
What is Firewalls ?
the process by which digital messages are transformed into secret codes
either software or hardware devices that protect against unauthorised access to a network, and are primarily used to prevent unauthorised access from the internet.
the process or act of proving or showing something that is true, genuine or valid
47
Multiple Choice
What is Authentication ?
the process by which digital messages are transformed into secret codes
either software or hardware devices that protect against unauthorised access to a network, and are primarily used to prevent unauthorised access from the internet.
the process or act of proving or showing something that is true, genuine or valid
48
Authentication
A password is a secret word or phrase
that is used to authenticate a user so
that they can gain access.
Personal and security data can be encoded
on the magnetic stripe of a card and can
be swiped through a reader to allow access
Password
Magnetic stripe
49
Authentication
A smart card is a physical card that has
an embedded integrated chip that acts
as a security token.
a small piece of electronic equipment that
provides a safe way for exchanging data
and money online
Smart card
Electronic Token
50
Authentication
A method of authentication not requiring
a user to login. Using network, location,
and device signals to recognize users.
Zero Login
51
Multiple Choice
What is Password ?
a secret word or phrase that is used to authenticate a user so that they can gain access
Personal and security data can be encoded on the magnetic stripe of a card and can be swiped through a reader to allow access
a small piece of electronic equipment that provides a safe way for exchanging data and money online
A method of authentication not requiring a user to login. Using network, location, and device signals to recognize users.
a physical card that has an embedded integrated chip that acts as a security token
52
Multiple Choice
What is Magnetic Stripe ?
Personal and security data can be encoded on the magnetic stripe of a card and can be swiped through a reader to allow access
a small piece of electronic equipment that provides a safe way for exchanging data and money online
A method of authentication not requiring a user to login. Using network, location, and device signals to recognize users.
a secret word or phrase that is used to authenticate a user so that they can gain access
a physical card that has an embedded integrated chip that acts as a security token
53
Multiple Choice
What is Smart Card ?
A method of authentication not requiring a user to login. Using network, location, and device signals to recognize users.
a small piece of electronic equipment that provides a safe way for exchanging data and money online
a secret word or phrase that is used to authenticate a user so that they can gain access
Personal and security data can be encoded on the magnetic stripe of a card and can be swiped through a reader to allow access
a physical card that has an embedded integrated chip that acts as a security token
54
Multiple Choice
What is Electronic Tokens ?
A method of authentication not requiring a user to login. Using network, location, and device signals to recognize users.
a small piece of electronic equipment that provides a safe way for exchanging data and money online
a secret word or phrase that is used to authenticate a user so that they can gain access
Personal and security data can be encoded on the magnetic stripe of a card and can be swiped through a reader to allow access
a physical card that has an embedded integrated chip that acts as a security token
55
Multiple Choice
What is Zero Login ?Health issues of using it
A method of authentication not requiring a user to login. Using network, location, and device signals to recognize users.
a small piece of electronic equipment that provides a safe way for exchanging data and money online
a secret word or phrase that is used to authenticate a user so that they can gain access
Personal and security data can be encoded on the magnetic stripe of a card and can be swiped through a reader to allow access
a physical card that has an embedded integrated chip that acts as a security token
56
HINTS FOR PAS
6. Explain Positive and negative effect of smart devices used in the home
For You : Page 83
57
Multiple Select
The Positive Effects of Smart Devices Used In The Home ??
Saving Time and Money
Improved Home Security
Smart Devices can make money run out
Depend on the Internet which may Fail
Improved Care and Protection
58
Multiple Select
Smart Device Have Negative Effect on the way we live
More Leisure Time
There is No Family Contact
No Need To Click Button, Just Speak or Do Motion
More Effective and More Efficient
Spend More Time Indoors than outside Involving a Physical Activity
59
HINTS FOR PAS
7. Health Issues of using IT
For You : name the injury and mention a way to reduce the risk
60
Multiple Choice
What is A??
RSI (Repetitive Strain Injury)
Eye Strain
Headaches
Back Problems
61
Multiple Choice
What is A??
RSI (Repetitive Strain Injury)
Eye Strain
Headaches
Back Problems
62
Open Ended
how to reduce headache ? ( mention briefly min 2)
63
Multiple Choice
What is B ??
RSI (Repetitive Strain Injury)
Eye Strain
Headaches
Back Problems
64
Open Ended
how to reduce Eye Strain ? ( mention briefly min 2)
65
Multiple Choice
What is C ??
RSI (Repetitive Strain Injury)
Eye Strain
Headaches
Back Problems
66
Open Ended
how to reduce Back Problems ? ( mention briefly min 2)
67
Multiple Choice
What is D ??
RSI (Repetitive Strain Injury)
Eye Strain
Headaches
Back Problems
68
Open Ended
how to reduce RSI (Repetitive Strain Injury) ? ( mention briefly min 2)
HINTS FOR PAS
Explanation of LAN, WLAN and WAN and their characteristics.
Show answer
Auto Play
Slide 1 / 68
SLIDE
Similar Resources on Wayground
63 questions
Intro to Waves
Presentation
•
6th Grade
62 questions
Plates, Topographic Maps, and Satelite Views Review
Presentation
•
6th - 8th Grade
64 questions
G8 Q1 Lesson 3-5: Forms, Inspection and Storage - Quizizz Class
Presentation
•
8th Grade
64 questions
India's Independence & Gandhi
Presentation
•
7th Grade
61 questions
Sound
Presentation
•
6th - 8th Grade
59 questions
Autumn 2 Revision: Binary, ASCII, E-Safety & Digital Footprint
Presentation
•
7th Grade
60 questions
Ôn tập tin 6
Presentation
•
KG
64 questions
Newton's Second Law of Motion
Presentation
•
7th - 8th Grade
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade
Discover more resources for Computers
20 questions
Revising & Editing practice
Quiz
•
7th Grade
10 questions
Box Plots
Quiz
•
6th - 7th Grade
14 questions
Volume of rectangular prisms
Quiz
•
7th Grade
22 questions
Simple Probability
Quiz
•
7th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
genetics vocabulary
Quiz
•
7th Grade
4 questions
Spring Break rest and recharge
Presentation
•
6th - 8th Grade
24 questions
7th grade STAAR Reading Review
Quiz
•
7th Grade