
Domain 1 : Computing Systems and Networks
Presentation
•
Computers
•
11th Grade
•
Practice Problem
•
Medium
alaa jaber
Used 11+ times
FREE Resource
121 Slides • 117 Questions
1
Domain1 : Computing Systems and Networks
2024-2025 Term 1
2
1.Computer systems
3
Objectives:
1.
Identify the hardware components of a given computing system and
describe the function of these components.
2.
Select and operate computing devices that perform a variety of
tasks accurately and quickly based on user needs and preferences.
3.
Explain the functions of common hardware and software
components of computing systems.
4.
Determine potential solutions to solve simple hardware and
software problems using common troubleshooting strategies.
5.
Identify the layers of computer system
4
5
6
Multiple Choice
A _______________________ is a set of integrated devices that input, output, process, and store data and information. Computer systems are currently built around at least one digital processing device. There are five main hardware components in a computer system: Input, Processing, Storage, Output and Communication devices.
Computer system
Troubleshooting
7
Multiple Choice
___________________is a systematic way to figure out how to fix a problem. The objective is to evaluate why something does not perform as expected and describe how to fix the issue
Computer system
Troubleshooting
8
1.1 Computing Systems Hardware:
Is the physical components that a computer system requires to function. It
encompasses everything with a circuit board that operates within a PC or
laptop; including the motherboard, graphics card, CPU (Central
Processing Unit), ventilation fans, webcam, power supply, and so on.
9
1.2 Computing Systems Software:
Controls a computer's internal functioning, chiefly through an operating
system, and also controls such peripherals as monitors, printers, and storage
devices. .
falls into two broad classes:
1-Operating system software
2-application software.
The principal system software is the operating system
10
Multiple Choice
The following software are :
application software
Operating system software
11
Multiple Choice
The following software are :
application software
Operating system software
12
Multiple Choice
______________Is the physical components that a computer system requires to function.
Computing Systems Hardware
Computing Systems Software
Troubleshooting strategies
13
Multiple Choice
______________ Controls a computer's internal functioning, chiefly through an operating system, and also controls such peripherals as monitors, printers, and storage devices.
Computing Systems Hardware
Computing Systems Software
Troubleshooting strategies
14
1.3 Computing Systems Troubleshooting:
Troubleshooting is a systematic way to figure out how to fix a problem. The
objective is to evaluate why something does not perform as expected and describe
how to fix the issue
15
Systematic troubleshooting approach
Step 1: Identify the problem
Step 2: Establish a hypothesis about the cause
Step 3: Propose solution
Step 4: Test the solution
Step 5: Verify and monitor the solution
Step 6: Document the process
16
Multiple Choice
What should be the first step to take when troubleshooting a problem?
a. Implement the solution
b. Identify the problem
c. Identify the cause
d. Plan and test the solution
17
Step 1: Identify the problem
Gather all the relevant information about the issue; including when it started,
symptoms observed, and any error messages. Check available documentation
and online resources for additional details. Clearly define the problem state
18
Step 2: Establish a hypothesis about the cause
Based on the problem identified, list all the probable causes that can lead
to the observed issue. Use trial and error to narrow down the potential
causes. Reduce the problem area by progressively isolating the potential
causes.
19
Step 3: Propose solution
Propose solutions based on the hypothesized cause of the issue,
starting from the simplest to the most complex. Solutions should
directly address the probable cause identified and aim to resolve the
issue
20
Step 4: Test the solution
Test the proposed solutions to verify if the hypothesized cause is
correct and if the solution resolves the issue. Repeat Step 2 if all
solutions fail. Develop new hypotheses and solutions to test
21
Step 5: Verify and monitor the solution
After implementing a verified solution, monitor the system to ensure
no new issues arise and the solution continues to address the root cause
22
Step 6: Document the process
Documentation is essential and must be maintained throughout the systematic
troubleshooting of an issue. It involves recording every relevant detail at each step
which helps in resolving the current problem and aids future troubleshooting efforts.
The documentation can use formats like tables, flowcharts, written descriptions, or a
combination of these to capture the end-to-end troubleshooting methodology
23
24
Multiple Choice
____________________ means : Gather all the relevant information about the issue; including when it started, symptoms observed, and any error messages.
a. Implement the solution
b. Identify the problem
c. Identify the cause
d. Plan and test the solution
25
Multiple Choice
_______________________ based on the hypothesized cause of the issue, starting from the simplest to the most complex.
a. Implement the solution
b. Identify the problem
c. propose the cause
d. Plan and test the solution
26
Multiple Choice
It involves recording every relevant detail at each step which helps in resolving the current problem and aids future troubleshooting efforts.and can use formats like tables, flowcharts, written descriptions, or a combination of these to capture the end-to-end troubleshooting methodology.
a. Implement the solution
Document the process
c. propose the cause
d. Plan and test the solution
27
28
Layers of computing system:
29
30
31
32
33
Operating systems are the fourth layer. An operating system determines how users and
hardware interact. Its main job is to manage computer resources such as the keyboard,
monitors, printers, scanners, and cameras. Operating systems help in communicating
with the computer system and managing the interactions between hardware devices,
programs, and data.A few examples of operating systems are windows, Linux, Mac OX,
Android, and 10S.
34
Applications are programs written to carry out a specific task. Every program you
run on your computer's operating system is an application program that helps you
accomplish a task or solve a certain problem.
35
Communication layers help to communicate with other computers
for exchanging data.Computer technologies like tools used to send,
receive, and process information are used to communicate.
36
Multiple Choice
In __________________ layer means a collection of data that has a logical meaning.The _______________ layer refers to the way __________________ is represented on a computer. Binary numbers, Os and 1s, are used to manage __________________ on a computer. This means that a binary format is used to represent all______________ that is processed by a computer
such as text, photos, videos, and audio. Therefore, understanding the binary system is
required to know how data is managed inside a computer. (Same word in all blanks)
Information
Programming
Operating system
Application
37
Multiple Choice
_____________________ layer refers to the physical components of a computer that allow it to function.
Along with the motherboard and the Central Processing Unit, the ________________ components
also include other devices such as gates and circuits, These devices are made of many
transistors and control the flow of electricity. There are millions of transistors inside the _____________ components of a computer (Same word in all blanks)
Information
Hardware
Operating system
Application
38
Multiple Choice
The _______________ layer is about computer software. Software is a solution, or a set of instructions for the hardware layer to follow. The programs at the __________________ layer use instructions to process data, perform computations and manage data. The main goal of these programs is to solve various problems and perform different tasks. (Same word in all blanks)
Information
Hardware
Programming
Application
39
Multiple Choice
__________________ are the fourth layer. A(n) ___________________ determines how users and
hardware interact. Its main job is to manage computer resources such as the keyboard, monitors, printers, scanners, and cameras. _____________s help in communicating with the computer system and managing the interactions between hardware devices,
programs, and data. (Same word in all blanks)
Information
Operating system
Programming
Application
40
Multiple Choice
_________________layer are programs written to carry out a specific task. Every program you run on your computer's operating system is an _______________program that helps you accomplish a task or solve a certain problem.. (Same word in all blanks)
Information
Operating system
Programming
Application
41
Multiple Choice
_____________________ layers help to communicate with other computers for exchanging data.Computer technologies like tools used to send, receive, and process information are used to communicate. (Same word in all blanks)
Information
Communication
Programming
Application
42
Multiple Choice
A few examples of ________________ are windows, Linux, Mac OX, Android, and 10S.
Application software
Programming
operating systems
Information
43
1.4 Computing Devices and Trends:
Top Computer Science Trends
Artificial Intelligence | Edge Computing | Quantum Computing | Robotics
| Cybersecurity | Bioinformatics
44
1.4 Computing Devices and Trends:
Top Computer Science Trends
Artificial Intelligence | Edge Computing | Quantum Computing | Robotics
| Cybersecurity | Bioinformatics
45
1. Artificial intelligence:
centers on machine coding that mimics human and animal intelligence.
AI professionals develop algorithms and program machines to perform
humanlike tasks. professionals develop algorithms and program machines
to perform humanlike tasks. AI helps detect credit card fraud, identify
disease outbreaks, and optimize satellite navigation.
46
2.Edge computing:
In contrast to cloud computing, where data is processed and stored far away from the end
user in large data centers, edge computing puts computer data at "the edge," close to the
end user. Experts do not expect the cloud to disappear completely, but rather work in
tandem with edge computing as it brings processing to users, streamlining anything from
factory production to self driving car response.
Technology like autonomous cars, video conferencing, and augmented reality all benefit
from edge computing. For example,
47
3.Quantum computing:
It is uses powerful computers to solve problems at the atomic and
subatomic levels. Unlike classic computers, which perform
calculations and store data in binary code, quantum computers use
quantum bits, also known as qubits. This allows quantum computers
to crunch numbers and solve problems much more quickly than
previously possible.
48
4. Robotics:
This field studies and develops robots in the pursuit of make life easier. A
multidisciplinary field, robotics incorporates computer science and electrical
and mechanical engineering. Robotics uses artificial intelligence, machine
learning, and other computer science technologies. Robots aim to increase
safety and efficiency in industries like manufacturing, farming, and food
preparation.
People use robotics technologies to manufacture cars, complete dangerous
tasks like bomb diffusion, and conduct complex surgeries.
49
5. Cyber security:
It is focuses on protecting computer systems and networks from
cyberthreats and attacks. As companies continue storing information on
the cloud and conduct operations online, the need for improved
cybersecurity also grows.
Individuals, businesses, and governments experience significant financial
losses due to cyberattacks.
50
6. Bioinformatics:
It is professionals study, store, and analyze biological information. A
multidisciplinary subfield combining computer science and biology,
bioinformatics looks for patterns in sequences of genetic material like
DNA, genes, RNA, and protein.
Bioinformatics workers develop the methods and software applications
that accomplish these tasks.
51
Multiple Choice
centers on machine coding that mimics human and animal intelligence. AI professionals develop algorithms and program machines to perform humanlike tasks
Edge computing
Quantum computing
Robotics
Cyber security
Artificial intelligence
52
Multiple Choice
Technology like autonomous cars, video conferencing, and augmented reality all benefit from __________________
Edge computing
Quantum computing
Robotics
Cyber security
Artificial intelligence
53
Multiple Choice
It is uses powerful computers to solve problems at the atomic and subatomic levels. Unlike classic computers, which perform calculations and store data in binary code
Edge computing
Quantum computing
Robotics
Cyber security
Artificial intelligence
54
Multiple Choice
People use __________ technologies to manufacture cars, complete dangerous tasks like bomb diffusion, and conduct complex surgeries.
Edge computing
Quantum computing
Robotics
Cyber security
Artificial intelligence
55
Multiple Choice
It is focuses on protecting computer systems and networks from cyberthreats and attacks. As companies continue storing information on the cloud and conduct operations online, the need for improved _______________ also grows
Edge computing
Quantum computing
Robotics
Cyber security
Artificial intelligence
56
Multiple Choice
______________ looks for patterns in sequences of genetic material like DNA, genes, RNA, and protein.
Edge computing
Bioinformatics
Robotics
Cyber security
Artificial intelligence
57
2.Design computer
network
58
Objectives:
1.
Design computer networks based on a given network design requirements and
describe the network organization in term of hardware and software components
and network security.
2.
Differentiate between different types of network types and recommend suitable
network type for a given scenario
3.
Model and describe how people connect to other people, places, information and
ideas through a network.
4.
Examine the scalability and reliability of networks, by describing the relationship
between routers, switches, servers, topology, and addressing.
5.
Differentiate between different types of network types and recommend suitable
network type for a given scenario.
59
60
Fill in the Blank
A _______________ is created when more than one device is connected together
61
62
Multiple Select
What is the purpose of network? Choose two answers
set of rules that set data transmission so that a particular type of data will be formatted in a certain way
communication and collaboration
guard against cyber threats
sharing information and resources
63
64
Multiple Choice
Network enhance many aspects of life and business for individuals and organizations,including, Which of the following is advantages of network?
Specialist staff often required
Roaming profile
Expensive hardware
Reliance on networked resources
65
Multiple Choice
Network enhance many aspects of life and business for individuals and organizations,including, Which of the following is disadvantages of network?
Communication and collaboration
Sharing information and resources
Specialist staff often required
Saving cost
66
67
68
A computer network is a group of computers and/or devices that are
connected with each other for the purpose of communicating data
electronically. Here is an example of a simple computer network:
The most well-known network in the world is the Internet. The Internet is
a global network of networks that connects computer and devices
worldwide.
69
Multiple Choice
The _____________________ is a global network of networks that connects computer and devices worldwide.
Internet
Network
Computer network
e-commerce
70
Multiple Choice
A _______________ is created when more than one device is connected together
Internet
Network
Computer network
e-commerce
71
Multiple Choice
A _________________ is a group of computers and/or devices that are
connected with each other for the purpose of communicating data
electronically
Internet
Network
Computer network
e-commerce
72
Computer networks can be used by individuals and businesses for many
applications. They enable communication, exchange of data as well as
providing access to information, resources and services worldwide via the
Internet.
73
Some applications and services available on computer networks include:
74
There are various types of computer networks. Some are connected
wirelessly, while others are connected through wires. The connection is
within a single room to the millions of computers spread across the globe.
These networks are categorised based on the geographical area covered
and data transfer rate from one device to another.
75
76
77
78
local area network (LAN) is a network that is geographically limited to a
single building or location. The organisation owns and maintains the LAN.
Examples include networks at schools, colleges, universities, small
businesses, small organizations, and homes.
79
An extended form of LAN is the Metropolitan Area Network (MAN). It covers a
larger geographical area like a city or a town.
Examples include cable TV networks or cable-based broadband internet services.
80
A wide area network (WAN) spreads over a wide geographical area. It can spread
across a country or even the world. WAN connects more than one site. Examples
include banks, which are connected to more than one branch, using a WAN. The
WAN connects the main headquarters to the sub-offices and branches, allowing
them to communicate and share data. Telephone infrastructures or wireless
transmission are used for communication. Each office or branch has its own LAN
to which the WAN connects.
Another example of a WAN connection is the internet.
81
Multiple Choice
An extended form of LAN is the _________. It covers a larger geographical area like a city or a town. Examples include cable TV networks or cable-based broadband internet services.
PAN
LAN
MAN
WAN
82
Multiple Choice
Examples of wired _________ include using USB to connect a mobile phone to a laptop. On the other hand, using Bluetooth technology to connect two smartphones is a form of a wireless ________.
PAN
LAN
MAN
WAN
83
Multiple Choice
______________spreads over a wide geographical area. It can spread across a country or even the world. __________ connects more than one site. Examples include banks, which are connected to more than one branch, using a ___________.(Same word in all blanks)
PAN
LAN
MAN
WAN
84
Multiple Choice
_________ is a network that is geographically limited to a single building or location. The organisation owns and maintains the ________
Examples include networks at schools, colleges, universities, small businesses, small organisations, and homes.
PAN
LAN
MAN
WAN
85
Multiple Choice
Example of a _______ connection is the internet.
PAN
LAN
MAN
WAN
86
87
88
89
90
91
92
93
Multiple Choice
Computing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network.it is the most common network setup. What is the topoloy type in the figure below?
Bus topology
Star topology
Ring topology
Mesh topology
Tree topology
94
Multiple Choice
Computing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network. What is the topoloy type in the figure below?
Bus topology
Star topology
Ring topology
Mesh topology
Tree topology
95
Multiple Choice
Computing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network.Where multiple LANs connected. What is the topoloy type in the figure below?
Bus topology
Star topology
Ring topology
Mesh topology
Tree topology
96
Multiple Choice
Computing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network.each device has a unique identity and can detect signals intended for its use. What is the topoloy type in the figure below?
Bus topology
Star topology
Ring topology
Mesh topology
Tree topology
97
Multiple Choice
CComputing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network.each computer and network device is interconnected with every other device in the network. What is the topoloy type in the figure below?
Bus topology
Star topology
Ring topology
Mesh topology
Tree topology
98
Hardware devices that are used to connect computers, printers, laptops
and other electronic devices to a network are called network devices.
Different network devices are required to communicate data in a network.
Let us explore a few of them:
1.
Modem
2.
Network media
3.
Ethernet card
99
Modem stands for MOdulator and DEModulator. It is used for conversion between
analogue signals and digital bits.
100
101
102
Fill in the Blank
_____________ stands for modulator and demodulator. It is used for conversion between analogue signals and digital bits.
103
Multiple Choice
__________________ are time separated signals and are denoted by square waves. _________________ use only Os and 1s to represent the information. For example, data transmission during computing and for digital electronics. (Choose one for both blanks)
Analogue signals
Digital signals
104
Multiple Choice
__________________ are continuous signals and are denoted by sine waves. The __________________ use values that are in a continuous range. For example, for audio and video transmission. (Choose one for both blanks)
Analogue signals
Digital signals
105
Multiple Choice
Hardware devices that are used to connect computers, printers, laptops and other electronic devices to a network are called_______________
Prepherals
network devices
Input and output devices
End devices
Network media
106
Networks are composed of network media and network hardware.
Network media are the communication channels in network. It is the
actual path over which an electrical signal travel. The signals move from
one component to another. The common types of network media include
twisted-pair cable, coaxial cable, fibre-optic cable, and wireless.
107
Multiple Choice
____________________are the communication channels in network. It is the actual path over which an electrical signal travel.
Prepherals
network devices
Input and output devices
End devices
Network media
108
109
110
111
Multiple Select
The common types of network media include :_____________
twisted-pair cable
coaxial cable
fibre-optic cable
wireless
112
Multiple Choice
________________________ cable is made up of 100 or more very thin strands of glass or plastic . Each strand is capable of transmitting messages which turns into light waves.
twisted-pair cable
coaxial cable
fibre-optic cable
wireless
113
Multiple Choice
____________________ cables are used for telephone communications and most modern Ethernet
networks.
twisted-pair cable
coaxial cable
fibre-optic cable
wireless
114
Multiple Choice
___________________ is a common type of shielded data transmission cable. It consists of a hollow outer cylindrical conductor that surrounds a single inner wire made of two conducting elements. One of these elements, in the centre of the cable, is a copper
conductor.
twisted-pair cable
coaxial cable
fibre-optic cable
wireless
115
116
Multiple Choice
______________________ do not use cables to connect and communicate with each other. Waves technology is used to communicate wirelessly between network devices. When there is a situation where cables cannot be extended, or networks do not prefer cables for
communication, then wireless media can be used for sending and receiving data.
twisted-pair cable
coaxial cable
fibre-optic cable
wi-fi network
117
Bandwidth & Throughput:
Bandwidth: bandwidth is the maximum rate of data transfer across a given path.
Bandwidth may be characterized as network bandwidth, data bandwidth, or digital
bandwidth
Throughput: tells you how much data was transferred from a source at any given
time
118
Multiple Choice
_____________________ is the maximum rate of data transfer across a given path.
Bandwidth
Throughput
119
Multiple Choice
___________________tells you how much data was transferred from a source at any given time
Bandwidth
Throughput
120
Networks hardware includes hosts (also called end devices) and network devices.
You already know about most end devices because you use them to access
information, resources and services on computer networks. Some examples of
end devices are:
121
Multiple Choice
Personal computers,Laptops,smartphones,Tablets,printers,servers are all called__________________:
Prepherals
network devices
Input and output devices
End devices
Network media
122
Network hardware(Cont..)
Network interface cards
The card with a network cable port or radio antenna is known as a network
interface card (NIC). The NIC is used to change data from a host device into a
signal that can be sent over a network. It also changes signals that are received
into data that host devices can understand. Each NIC has a unique identifier
called a MAC address. Here is an example of a network interface card:
123
Fill in the Blank
The NIC card with a network cable port or radio antenna is known as a . The NIC is used to change data from a host device into a signal that can be sent over a network.what is NIC stands for?
124
Multiple Choice
Each NIC has a unique identifier called a _______ address
IP
MAC
125
To communicate between end devices, you need to use network devices.
Network devices are used to create connections between end devices.
This enables host devices to communicate, exchange data and access
information, resources and services on a network. Some examples of
network devices include:
1-Hub
2-Switches
3-Routers
126
127
Multiple Select
Network devices are used to create connections between end devices. This enables host devices to: (Which of the following are the functions of network devices?)
communicate
exchange data and access information
change data from a host device into a signal that can be sent over a network
resources and services on a network
128
129
130
131
132
133
134
Multiple Choice
Which one of the following is not from the examples of network devices?
Switch
Server
Hub
Router
135
Multiple Choice
Which one of the following is most common network device used to host a network?
Switch
Hub
Router
136
Multiple Choice
Which one of the following is act as a gateway to other network, allow communication between hosts on a different networks
Switch
Hub
Router
137
Multiple Choice
Switches are smart Hubs but more effective ,higher performance and a more recent technology.
True
False
138
Multiple Choice
The main difference between switches and Hubs : is that the Hubs are a dedicated bandwidth while Switches are shared bandwidth
True
False
139
140
141
142
Multiple Choice
Google chrome, internet explorer, fire fox, safari are all web browsers and examples on_______________
Servers software
Clients sofware
Network devices
Network media
143
Multiple Choice
__________________ are Hosts that have software installed that enable them to provide information, like email or web pages, to other hosts on the networks.
Clients
Network devices
Routers
Servers
144
145
146
Multiple Choice
_____________________provides a service that controls
access to separately stored files as part of a
multiuser system. (service povided by server)
directory service
Dynamic Name Service (DNS)
File Server
Index/Search Service
147
Multiple Choice
_________________________is an Internet service that translates a domain name into an IP address. For example, the IP address 198.105.232.4 might translate to wwiw.example.com (service povided by server)
directory service
Dynamic Name Service (DNS)
File Server
Index/Search Service
148
Multiple Choice
A ______________________ is the software system
that stores, organizes, and provides
access to information in a computer
operating system's directory (service povided by server)
directory service
Dynamic Name Service (DNS)
File Server
Index/Search Service
149
Multiple Choice
________________________inventories all files
on a sever or network and organizes
them in such a way that they can be
easily located by executing a search
query. (service povided by server)
directory service
Dynamic Name Service (DNS)
File Server
Index/Search Service
150
Multiple Choice
______________________provides a sevice for hosting and
managing Websites. (service povided by server)
Email Service
Database Service
Proxy Server
Web Server
151
Multiple Choice
_______________________provides users with
the ability to send, receive, and review
email from their web browsers or email
client, such as Outlook. (service povided by server)
Email Service
Database Service
Proxy Server
Web Server
152
Multiple Choice
__________________provides service for information that
is organized so that it can easily be accessed,
managed, and updated. (service povided by server)
Email Service
Database Service
Proxy Server
Web Server
153
Multiple Choice
_______________________is a hardware or software system that acts as an intermediary between an endpoint device and another server from which that device is requesting a service. (service povided by server)
Email Service
Database Service
Proxy Server
Web Server
154
Multiple Choice
Some server platforms provide a _______________ that turns the server into a security apparatus for the network. This type of ________________ uses a series of preconfigured rules, and monitors and blocks any inappropriate traffic. (service povided by server)
Management Server
Virtualization Service
Proxy Server
Print service
Firewall Service
155
Multiple Choice
__________________ allows multiple instances of a server application to be run on a single physical system. (service povided by server)
Management Server
Virtualization Service
Proxy Server
Print service
Firewall Service
156
Multiple Choice
Most enterprise server solutions contain a series
of tools that allow an administrator to monitor
and resolve any performance or stability issues with the server. (service povided by server)
Management Server
Virtualization Service
Proxy Server
Print service
Firewall Service
157
Multiple Choice
_____________________allows multiple employees to access a single printer. A _______________ will generally administer more than one printer. (service povided by server)
Management Server
Virtualization Service
Proxy Server
Print service
Firewall Service
158
•A Protocol is a set of rules that set data transmission so
that a particular type of data will be formatted in a certain way
•Network Protocol is a formal standards and policies comprised of rules ,
procedures and formats that define communication between two or more devices
over a network
•Network and internet standards ensure that all devices connecting to the network
implement the same set of rules or protocols in the same manner
159
Multiple Select
Which of the following is the definition or function of newtowrk protocol?
set of rules that set data transmission so that a particular type of data will be formatted in a certain way
is a formal standards and policies comprised of rules , procedures and formats that define communication between two or more devices over a network
ensure that all devices connecting to the network implement the same set of rules or protocols in the same manner
160
Multiple Choice
_____________is a set of rules that set data transmission so that a particular type of data will be formatted in a certain way.
Network
TCP
Protocol
IP address
161
TCP is used to create a connection between host devices on a network
for data exchange. TCP is also used to break data into packets for
transmission on the network and accepting packets and reassembling
data when receiving it from a network.
A real-life analogy of TCP is a delivery service. For example, the service
would choose the route to deliver your packages to your home address
and decide how many packages the courier can deliver per shipment.
162
Internet protocol is used to deliver data packets from the source host to the
destination host on a network using IP addresses in data packet headers. IP
also defines the methods used to label the data with source and destination
Information.
A real-life analogy of IP could be map co-ordinates. For example, you could give
map co-ordinates of your home address to a delivery company but co-ordinates
are not easy to remember.An example of aV4 IP address is 172.16.32.77.
163
Multiple Choice
________is used to create a connection between host devices on a network for data exchange. ______ is also used to break data into packets for transmission on the network and accepting packets and reassembling data when receiving it from a network.
Network
TCP
Protocol
IP address
164
Multiple Choice
A real-life analogy example of ______ is a delivery service.The service would choose the route to deliver your packages to your home address and decide how many packages the courier can deliver per shipment.
Network
TCP
Protocol
IP address
165
Multiple Choice
A real-life analogy of _____ could be map co-ordinates. For example, you could give map co-ordinates of your home address to a delivery company but co-ordinates are not easy to remember.An example of _____ address is 172.16.32.77.
Network
TCP
Protocol
IP address
166
Multiple Choice
__________is used to create a connection between host devices on a network for data exchange.
IP
TCP
Protocol
IP Address
167
Fill in the Blank
TCP is stands for ___________
168
Multiple Choice
__________is used to deliver data packets from the source host to the
destination host on a network using IP addresses in data packet headers.
TCP
Internet Protocol
IP address
Router
169
Communication protocols (Cont..)
TCP and IP are used in combination to enable connections and data exchange
between host devices on networks. Other protocols in the TCP/IP suite rely on
these foundational protocols to work. Some commonly used protocols in the
TCP/IP suite are:
170
A domain name service (DNS) is used to allow people to request resources such as web
pages using a uniform resource locator (URL). When you request a webpage with a URL
such as www.google.ae, a request is made from your device to a DNS. A DNS keeps a
list of URLs and IP addresses. When a DNS receives a request, it finds the IP address of
the device hosting the resource and sends the IP address back to your device.
A real-life analogy of DNS is your home address. For example, a courier could put your
home address into a map application and the map would find
The co-ordinates of your home. A home address is easier to
remember than map co-ordinates.
171
Hypertext Transfer Protocol (HTTP) is used to transmit web pages and media
used in them from the worldwide web. Host devices with web browser software
use HTTP to send requests to web servers for the resources needed to load
webpages. Requests happen when a user enters a URL or clicks a hyperlink.
Web servers hosting webpages send the resources to fulfil requests.
172
Simple Mail Transfer Protocol (SMTP) is used for sending and receiving e-mail between
host devices on a network. Though it is normally used with POP3 (Post Office Protocol)
or IMAP (Internet Message Access Protocol), that let users store messages in a mailbox
and download them as needed from the mail server.
When a host device wants to send an email first, an e-mail server uses
SMTP to send a message from the device to the sender’s e-mail server. The
senders e-mail server uses SMTP to send the e-mail to the receiver's e-mail
server. The receiving server uses a mail client to store incoming mail in the
receivers mailbox using POP3 or IMAP.
173
File Transfer Protocol (FTP) is used for transmitting files between host devices on
a network. FTP uses two communications channels between a client and a server.
a channel for control and a data channel for transmitting file content.
A user would usually need to log in to access a server for file
transfers. The client device can then start communication with the
file server. The client device can then perform file operations on the
server such as uploading, downloading, deleting, renaming, moving
and copying.
174
Multiple Choice
_______is used to allow people to request resources such as web pages using a uniform resource locator (URL). When you request a webpage with a URL such as www.google.ae, a request is made from your device to a_______
HTTP(Hyper Text Transfer Protocol)
DNS (Domain Name Service)
FTP (File Transfer Protocol)
SMTP(Simple Mail Treansfer Protocol)
175
Multiple Choice
_______is used to transmit web pages and media used in them from the worldwide web. Host devices with web browser software use ______ to send requests to web servers for the resources needed to load webpages.
HTTP(Hyper Text Transfer Protocol)
DNS (Domain Name Service)
FTP (File Transfer Protocol)
SMTP(Simple Mail Treansfer Protocol)
176
Multiple Choice
_____________is used for sending and receiving e-mail between host devices on a network. Though it is normally used with POP3 (Post Office Protocol) or IMAP (Internet Message Access Protocol).
HTTP(Hyper Text Transfer Protocol)
DNS (Domain Name Service)
FTP (File Transfer Protocol)
SMTP(Simple Mail Treansfer Protocol)
177
Multiple Choice
___________is used for transmitting files between host devices on a network.
HTTP(Hyper Text Transfer Protocol)
DNS (Domain Name Service)
FTP (File Transfer Protocol)
SMTP(Simple Mail Treansfer Protocol)
178
Multiple Choice
A real-life analogy of _____ is your home address. For example, a courier could put your home address into a map application and the map would find The co-ordinates of your home.
HTTP(Hyper Text Transfer Protocol)
DNS (Domain Name Service)
FTP (File Transfer Protocol)
SMTP(Simple Mail Treansfer Protocol)
179
180
The Internet Protocol (IP) controls how data is sent between different networks. A
computer using the Internet Protocol to communicate needs an IP address to send
and receive data packets. An example of an IP address is 172.16.32.77. It provides
the location of a computer on the internet. It is like a person's home address.
The Internet Protocol allows computers to send data packets to each device on the
network.
181
Each MAC address is a 12-digit hexadecimal number (48 bits in length).
The first six digits (24 bits) is the device manufacturer's ID, also known as the
Organisational Unique identifier(OUI).
The next six digits (24 bits) represent the unique serial number assigned to the card
by the manufacturer.
A sample MAC address is FC: C8: AE: CE: 5B:23. Here FC: C8: AE is the organisational
unique identifier, and CE: 5B:23 is the unique serial number.
182
183
Internet Protocol (IP) address is a unique address that can be used to
uniquely identify each device in a network. If a computer's IP address is
known, then that computer can be communicated from anywhere in the world.
However, unlike MAC address, IP address changes if the network is changed.
184
185
186
Multiple Choice
Each MAC address is a ________digits hexadecimal number
48
12
24
32
187
Multiple Choice
Each MAC address is a 12-digit hexadecimal number (_____ bits in length).
48
12
24
32
188
Multiple Choice
The first six digits (_____bits) of MAC addess is the device manufacturer's ID, also known as the Organisational Unique identifier (OUI).
48
12
24
32
189
Multiple Choice
The next six digits (24 bits) represent the:
Organisational Unique identifier (OUI)
unique serial number assigned to the card by the manufacturer
190
Multiple Choice
The first six digits (24 bits) is the device manufacturer's ID, also known as the:
Organisational Unique identifier (OUI)
unique serial number assigned to the card by the manufacturer
191
Multiple Choice
An ______ address is represented by eight groups of hexadecimal (base-16) numbers separated by colons.
IPv4
IPv6
192
Multiple Choice
The initial IP address, version (_____), is a 32-bit numeric address. The IP address is
written as four 8-bit decimal numbers separated by periods. Each 8-bit field can take any value from 0 to 255
IPv4
IPv6
193
Multiple Choice
The initial IP address, version 4 (IPV4), is a 32-bit numeric address. The IP address is written as four 8-bit decimal numbers separated by _____periods. Each 8-bit field can take any value from 0 to 255
8
4
3
12
194
Multiple Choice
Due to the increasing number of devices connected to the internet, the 32-bit IP address (IPV4) was no longer sufficient, as it can offer less than a billion unique addresses.
Therefore, a __________ bits IP address, known as IP version 6 (IPV6) was introduced. An IPV6 address is represented by eight groups of hexadecimal (base-16) numbers separated by colons.
48
128
64
32
195
Multiple Choice
The initial IP address, version 4 (IPV4), is a 32-bit numeric address. The IP address is written as four 8-bit decimal numbers separated by eight periods. Each 8-bit field can take any value from 0 to ______
48
128
64
255
196
Multiple Choice
Due to the increasing number of devices connected to the internet, the 32-bit IP address
(IPV4) was no longer sufficient, as it can offer less than a billion unique addresses.
Therefore, a 128 bits IP address, known as IP version 6 (IPV6) was introduced. An IPV6 address is represented by eight groups of hexadecimal (base-16) numbers separated by_____________.
colons
periods
197
Cyber security and Cyber threats
198
Cybersecurity is a process to protect Individuals, organisations and governments from
digital attacks In this process, the networked systems and data are protected from
attackers. Data needs to be protected at three levels:
●At a personal level, there is a need to protect one’s identity, data and computing
devices from cybercriminals, as they will invade privacy and damage peoples
reputations.
●At the organisational level, there is a need to protect the organisation's data from
cybercriminals,
●At the government level, there is a need to protect data where national security,
economic stability and wellbeing of people are at risk.
199
Multiple Choice
Cybersecurity is a process to protect ________________ from
digital attacks In this process, the networked systems and data are protected from
attackers.
Individuals
organisations
governments
All
200
Multiple Choice
At the ________________________, there is a need to protect data where national security, economic stability and wellbeing of people are at risk.
personal level
organisational level
government level
201
Cybersecurity threats are malicious activities by an individual or
organisation to steal or damage the data. gain access to a network
system. and disrupt digital life. The following are the threats available
today:
A.
Malware
B.
Social engineering
C.
Denial-of-service
D.
Wi-Fi password cracking
202
A. Malware:
Malware is software written to harm or cause issues with a computer, This is also called
malicious code. This code comes in several forms and either harm or steals data from
a computer system. Cybercriminals use many different types of malware or malicious
software to carry out their activities.
203
1-Spyware
Spyware is a type of malware that is designed to spy on a computer system. It
secretly collects the activities on a computer system and then sends the
collected data to another person without the awareness of the computer
system owner.
A computer can become infected with spyware in many methods, including:
·accepting a prompt or pop-up without reading it first.
·downloading software from an unreliable source.
·opening email attachments from unknown senders.
204
Spyware (Cont..)
What can spyware be used for?
·Monitoring online activities
·Logging every key pressed on a keyboard as a keylogger
·Capturing all the personal data like passwords or bank details
Spyware can join itself with legitimate software or Trojan horses. Anti-spyware
software is available to detect and remove unwanted spyware programs.
205
Multiple Select
A computer can become infected with spyware in many methods, including:
accepting a prompt or pop-up without reading it first.
·downloading software from an unreliable source.
·opening email attachments from unknown senders.
keep updating the anti virus or anti spyware
206
Multiple Select
What can spyware be used for?
Monitoring online activities
hijacks the data on a computer system by encrypting it and then demands the owners to pay money for the data to be decrypted.
Logging every key pressed on a keyboard as a keylogger
Capturing all the personal data like passwords or bank details
attackers gain access to remote resources to modify the system files, system investigating files, and monitoring tools.
207
2.Viruses
A virus is a type of malware that infects a computer when executed and
then replicates itself to pass to another computer. Most viruses are spread
by USB drives, optical disks, network shares or email.
Anti-virus software is available to detect and remove viruses. Anti-virus
software is a collection of known viruses. Therefore, if a program is suspected
of being virus-infected, the anti-virus software will warn the user and store it
separately until it is confirmed that it is safe to use.
208
3.Trojan horse
This malware is named after the Greek myth of the Trojan horse. Trojans exploits
user privileges and are often found in image files, audio files or games.
Unlike viruses, Trojans do not self-replicate but carry out malicious operations by
hiding their purpose. Trojans appears genuine, but it is very dangerous. Anti-virus
software is available to remove the trojans.
209
4.Worms
This is malware replicates itself in order to spread from one computer to
another. After the host gets infected by a worm, it does not require any user's
participation.It can run by itself and spread very quickly over the network.
Worms can exploit the system vulnerabilities and can move themselves to cause
damage to computer systems or networks. Installing good anti-virus software can
protect computer systems or networks from getting infected with worms.
210
5.Adware
Adware is a type of malware installed with some software versions and
designed to deliver advertisements to a user on a web browser automatically.
It causes pop-up ads on the screen and is sometimes difficult to close. It is
common for adware to come with spyware. Anti-virus or anti-adware software are
available to detect and prevent adware from infecting a computer system.
211
6.Ransomware
Ransomware is a type of malware that hijacks the data on a computer
system by encrypting it and then demands the owners to pay money for the
data to be decrypted.
Ransomware is often spread through phishing emails that encourages a user to
download a malicious attachment. Anti-virus software is available to prevent the
computer system from ransomware attacks.
212
7.Backdoor
A backdoor malware works in the background of a computer system and is
difficult to detect.
Backdoor malware gains unauthorised access to a system by bypassing the
normal authentication procedures. After a backdoor attack, hackers can remotely
access the resources through system commands.
213
8.Scareware
Scareware is a type of malware that uses 'scare' tactics to take a specific
action.
Scareware usually consists of operating system style windows that pop up to warn
the user that the system is at risk and needs to run a specific program for it to
return to normal operation. If the user gets scared and accepts executing that
specific program, the computer system will become infected with Scareware
malware.
214
9.Rootkit
Rootkit malware is like backdoor malware and is designed to modify the
operating system.
Rootkit malware is hard to detect as the attackers gain access to remote resources
to modify the system files, system investigating files, and monitoring tools.
Therefore, a computer infected with rootkit malware is completed wiped, and
software programs are reinstalled
215
Multiple Choice
___________________________is a type of malware that is designed to spy on a computer system. It secretly collects the activities on a computer system and then sends the collected data to another person without the awareness of the computer
system owner.
Spyware
Virus
Trojan horse
Worm
216
Multiple Choice
This is malware replicates itself in order to spread from one computer to another. After the host gets infected by a _________________, it does not require any user's participation.It can run by itself and spread very quickly over the network.
Spyware
Virus
Trojan horse
Worm
217
Multiple Choice
This malware is named after the Greek myth of the _______________. it exploits user privileges and are often found in image files, audio files or games.
Spyware
Virus
Trojan horse
Worm
218
Multiple Choice
A ________________ is a type of malware that infects a computer when executed and then replicates itself to pass to another computer.
Spyware
Virus
Trojan horse
Worm
219
Multiple Choice
_______________is a type of malware installed with some software versions and designed to deliver advertisements to a user on a web browser automatically.
Ransomware
Adware
Backdoor
Scareware
Rootkit
220
Multiple Choice
________________________is a type of malware that hijacks the data on a computer system by encrypting it and then demands the owners to pay money for the
data to be decrypted.
Ransomware
Adware
Backdoor
Scareware
Rootkit
221
Multiple Choice
____________________ usually consists of operating system style windows that pop up to warn the user that the system is at risk and needs to run a specific program for it to return to normal operation.
Ransomware
Adware
Backdoor
Scareware
Rootkit
222
Multiple Choice
_____________ malware is like backdoor malware and is designed to modify the operating system. _____________ malware is hard to detect as the attackers gain access to remote resources to modify the system files, system investigating files, and monitoring tools. Therefore, a computer infected with ________________malware is completed wiped, and software programs are reinstalled.(Same word for all blanks)
Ransomware
Adware
Backdoor
Scareware
Rootkit
223
Multiple Choice
A ________________________ malware works in the background of a computer system and is difficult to detect.__________________ malware gains unauthorised access to a system by bypassing the normal authentication procedures. After a ________________ attack, hackers can remotely access the resources through system commands.(Same word for all blanks)
Ransomware
Adware
Backdoor
Scareware
Rootkit
224
B.Social engineering:
Social engineering is a kind of cyber attack involving psychological
manipulation techniques that exploit human error to access confidential
information. It is like a trick to gain people's confidence, to gather information and
gain unauthorised access to the computer system.
For example, an attacker. will call an authorised employee with an urgent
problem that requires immediate network access: The attacker will try using
techniques to gain the employee's trust and tries to access confidential data:
225
Social engineering (Cont..):
Phishing is a common social engineering attack. The attackers contact a
target through email, phone, or text message to click a link-This link will
redirect the targets to fraudulent websites to provide confidential data like
personal information, banking and credit card information, usernames,
and passwords.
226
C.Denial of Service (DoS):
Denial-of-Service (DoS) attacks are a type of network attack that results.in some sort of
interruption of network service to users, devices, or applications.
An overwhelming quantity of traffic is a type of DoS attack in a network where an
enormous amount of data is sent to the host at a rate it cannot handle. This kind of attack
causes a slowdown in transmission or response or cause a device or service to crash.
The maliciously formatted packet is a type of DoS attack. When a maliciously formatted
packet (collection of data) is sent, the receiver cannot identify the application and will be
unable to handle it. As a result of this, the system will run very slowly.
227
D.Wi-fi Password cracking
One of the most common methods of authenticating to a website is by entering a
username and password. As a result, revealing your password is a simple way for
cybercriminals to gain access to your most sensitive information.
228
Multiple Choice
_______________ is a common social engineering attack. The attackers contact a target through email, phone, or text message to click a link-This link will redirect the targets to fraudulent websites to provide confidential data likepersonal information, banking and credit card information, usernames, and passwords.
Denial of Service (DoS)
Rootkit
Phishing
Ransomware
229
Multiple Choice
_____________________ is software written to harm or cause issues with a computer, This is also called malicious code.
Malware
Social engineering
Denial-of-Service (DoS)
Wi-fi Password cracking
230
Multiple Choice
_____________________attacks are a type of network attack that results.in some sort of interruption of network service to users, devices, or applications. An overwhelming quantity of traffic is a type of DoS attack in a network where an enormous amount of data is sent to the host at a rate it cannot handle. This kind of attack causes a slowdown in transmission or response or cause a device or service to crash.
Malware
Social engineering
Denial-of-Service (DoS)
Wi-fi Password cracking
231
Multiple Choice
___________________________ is a kind of cyber attack involving psychological manipulation techniques that exploit human error to access confidential
information. It is like a trick to gain people's confidence, to gather information and gain unauthorised access to the computer system.
Malware
Social engineering
Denial-of-Service (DoS)
Wi-fi Password cracking
232
Multiple Choice
An attacker. will call an authorised employee with an urgent problem that requires immediate network access: The attacker will try using techniques to gain the employee's trust and tries to access confidential data:
Malware
Social engineering
Denial-of-Service (DoS)
Wi-fi Password cracking
233
Organisations can guard against cyber threats if few safety measures
are taken. For example:
1.
Update the operating system on a regular basis
2.
Use anti-virus software
3.
Use strong passwords
4.
Do not open email attachments from unknown senders
5.
Do not click on links in emails from unknown senders/unfamiliar website
6.
Avoid connecting to unsecured Wi-Fi networks in public places
234
235
236
237
238
Domain1 : Computing Systems and Networks
2024-2025 Term 1
Show answer
Auto Play
Slide 1 / 238
SLIDE
Similar Resources on Wayground
246 questions
Bài thuyết trình chưa có tiêu đề
Lesson
•
9th Grade
219 questions
Topic 1A
Lesson
•
University
250 questions
Kinh tế chính trị
Lesson
•
University
226 questions
Dinamika Kerja Sama Antarnegara
Lesson
•
12th Grade
237 questions
Vakaa sunum
Lesson
•
University
233 questions
IOWA new
Lesson
•
7th - 9th Grade
250 questions
ngáo đá
Lesson
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade